Unit IV IOT
Unit IV IOT
Unit IV IOT
What Are The Common Use Cases For Network Access Control?
With the rise of work-from-home policies, employees are increasingly relying on their
personal devices to complete work-related tasks. BYOD, the policy of permitting employees
to perform work using the devices they own, increases efficiency and reduces overall cost.
Employees are likely more productive on devices of their choosing rather than those
provided by the company.
NAC policies can be extended to BYOD to ensure that both the device and its owner are
authenticated and authorized to enter the network.
Security cameras, check-in kiosks, and building sensors are just a few examples of IoT
devices. Although IoT devices extend an organization's network, they also expand its
attack surface. Further, IoT devices may go unmonitored or in sleep mode for long periods
of time. NAC can reduce risk to these endpoints by applying defined profiling measures and
enforcing access policies for different categories of IoT devices.
NAC is also helpful for granting temporary access to non-employees, such as contractors,
consultants, and partners. NAC can allow access to such users so they can connect to the
network seamlessly without having to engage the IT team. Of course, the policies for non-
employees have to be different from those of regular employees.
What Are The Capabilities Of Network Access Control?
NAC enforces policies for all users and devices across the organization and adjusts these
policies as people, endpoints, and the business change.
NAC authenticates, authorizes, and profiles users and devices. It also denies access to
unauthorized users and devices.
NAC enables an organization to manage and authenticate temporary users and devices
through a self-service portal.
Incidence response
NAC reduces the number of cyber threats by creating and enforcing policies that block
suspicious activity and isolate devices without the intervention of IT resources.
Bi-directional integration
NAC can integrate with other security point products and network solutions through the
open/RESTful application programming interface (API).
What Is The Importance Of Network Access Control?
Improved security
Because NAC provides oversight of all devices in use across the organization, it enhances
security while authenticating users and devices the moment they enter the network. The
ability to monitor network activity and immediately take action against unauthorized or
unusual behavior means that malware threats and other cyberattacks are reduced.
Saves costs
The automated tracking and protection of devices at scale translates into cost savings for
organizations because fewer IT resources are needed. Further, blocking unauthorized
access or a suspected malware attack prevents companies from suffering financial losses
that may result if those activities are not thwarted.
Automation
As the number and variety of devices organizations use continue to increase, organizations
cannot manually verify users and their endpoints' security policies as they attempt to enter
the network. The automation features of NAC offer tremendous efficiency to the process of
authenticating users and devices and authorizing access.
Enhanced IT axperiences
With seamless access, user experience is frictionless when connecting to the network. That
there are controls in place working in the background gives users confidence that their IT
experience is protected without any effort on their part.
Ease of control
The visibility features of NAC effectively serve as a 24/7 inventory of all the endpoints
authorized by the organization. This is helpful not only when IT needs to determine which
endpoints or users have been granted access to the network but also for life-cycle
management, when devices must be phased out or replaced.
What Are The Types of Network Access Control?
Pre-admission
Pre-admission network access control occurs before access is granted. A user attempting
to enter the network makes a request to enter. A pre-admission network control considers
the request and provides access if the device or user can authenticate their identity.
Post-admission
Authentication
Authentication involves a user providing information about who they are. Users
present login credentials that affirm they are who they claim. As an identity and access
management (IAM) tool, a AAA server compares a user’s credentials with its database of
stored credentials by checking if the username, password, and other authentication tools
align with that specific user.
The three types of authentication include something you know, like a password, something
you have, like a Universal Serial Bus (USB) key; and something you are, such as your
fingerprint or other biometrics.
Authorization
Authorization follows authentication. During authorization, a user can be granted privileges
to access certain areas of a network or system. The areas and sets of permissions granted
a user are stored in a database along with the user’s identity. The user’s privileges can be
changed by an administrator. Authorization is different from authentication in that
authentication only checks a user’s identity, whereas authorization dictates what the user is
allowed to do.
For example, a member of the IT team may not have the privileges necessary to change the
access passwords for a company-wide virtual private network (VPN). However, the network
administrator may choose to give the member access privileges, enabling them to alter the
VPN passwords of individual users. In this manner, the team member will be authorized to
access an area they were previously barred from.
Accounting
Accounting keeps track of user activity while users are logged in to a network by tracking
information such as how long they were logged in, the data they sent or received, their
Internet Protocol (IP) address, the Uniform Resource Identifier (URI) they used, and the
different services they accessed.
Accounting may be used to analyze user trends, audit user activity, and provide more
accurate billing. This can be done by leveraging the data collected during the user’s access.
For example, if the system charges users by the hour, the time logs generated by the
accounting system can report how long the user was logged in to the router and inside the
system, and then charge them accordingly.
There are two main types of AAA for networking: network access and device administration.
Network access
Network access involves blocking, granting, or limiting access based on the credentials of a
user. AAA verifies the identity of a device or user by comparing the information presented or
entered against a database of approved credentials. If the information matches, access to
the network is granted.
Device administration
Device administration involves the control of access to sessions, network device consoles,
secure shell (SSH), and more. This type of access is different from network access because
it does not limit who is allowed into the network but rather which devices they can have
access to.
AAA Benefits
Zero Trust also assumes the organization practices the principle of least
privilege, where users only have just enough data and application
access to do their jobs. Deploying AAA methods gives administrators the
granular control, enforcement, and monitoring needed to apply minimal
network privileges to each respective user.
AAA Protocols
Mechanisms of an attack
How to identify that an attack is happening
Ways different types of attacks might affect the business
Action-oriented advice about how to defend against attacks
Many forms of cyber attacks are common today, including zero-day exploits, malware,
phishing, man-in-the-middle attacks, and denial of service attacks. Different ways of
attacking computer systems and networks constantly evolve as cybercriminals find new
vulnerabilities to exploit. Cyber Threat Intelligence (CTI) helps organizations stay
informed about new threats so that they can protect themselves. Cyber security experts
organize, analyze, and refine the information they gather about attacks to learn from
and use it to protect businesses better.
Threat intelligence (or security intelligence) also helps stop or mitigate an attack that is
in progress. The more an IT team understands about an attack, the better they will be
able to make an informed decision about how to combat it.
Strategic: Strategic threat intelligence is high-level information that puts the threat in
context. It is non-technical information that an organization could present to a board of
directors. An example of strategic threat intelligence is the risk analysis of how a business
decision might make the organization vulnerable to cyber attacks.
Tactical: Tactical threat intelligence includes the details of how threats are being carried
out and defended against, including attack vectors, tools, and infrastructures attackers are
using, types of businesses or technologies that are targeted, and avoidance strategies. It
also helps an organization understand how likely they are to be a target for different types
of attacks. Cybersecurity experts use tactical information to make informed decisions
about security controls and managing defenses.
Operational: Operational threat intelligence is information that an IT department can use
as part of active threat management to take action against a specific attack. It is
information about the intent behind the attack, as well as the nature and timing of the
attack. Ideally, this information is gathered directly from the attackers, which makes it
difficult to obtain.
Technical: Technical threat intelligence is specific evidence that an attack is happening or
indicators of compromise (IOCs). Some threat intelligence tools use artificial intelligence
to scan for these indicators, which might include email content from phishing campaigns,
IP addresses of C2 infrastructures, or artifacts from known malware samples.
Unusual privileged user account activity: Attackers often try to gain higher account
privileges or move from a compromised account to another account that has higher
privileges.
Login anomalies: After-hours logins that attempt to access unauthorized files, logins in
quick succession to the same account from different IPs around the world, and failed
logins from user accounts that do not exist are all good indicators that something is amiss.
Increases in database read volume: Seeing a large increase in database read volume
could indicate that someone is extracting an unusually large amount of data, such as all of
the credit card numbers in a database.
Unusual domain name system (DNS) requests: Large spikes in DNS requests from a
specific host and patterns of DNS requests to external hosts are both red flags because
they could mean someone from outside the organization is sending command and control
traffic.
Large numbers of requests for the same file: A large part of cybercriminal activity
involves repeated attacks, which can indicate that someone is searching for a
vulnerability. Seeing 500 requests for the same file could indicate that someone is trying
different ways to find a weakness.
Unexplained configuration or system file changes: While it is difficult to find a credit
card harvesting tool, it is easier to find system file changes that happen from the tool
being installed.
Malware disassemblers: These tools reverse engineer malware to learn how it works
and help security engineers decide how to defend against future, similar attacks.
Security information and event management (SIEM) tools: SIEM tools allow security
teams to monitor the network in real-time, gathering information about unusual behavior
and suspicious traffic.
Network traffic analysis tools: Network traffic analysis tools collect network information
and record network activity to provide information that makes detecting an intrusion
easier.
Threat intelligence communities and resource collections: Freely accessible websites
that aggregate known indicators of compromise and community-generated data about
threats can be a valuable source of threat intelligence. Some of these communities
support collaborative research and provide actionable advice on how to prevent or combat
threats.
Endpoint protection
Endpoint protection is a cybersecurity approach that protects devices from
malicious software and cyberattacks. It's important because devices like
laptops, tablets, and mobile phones can be used to access corporate
networks and resources, which can create attack paths for security threats.
Endpoint protection uses a variety of technologies and practices, including:
Endpoint protection platforms (EPPs)
These solutions scan files for threats as they enter a network, and can also
investigate and remediate security incidents.
Antivirus (AV) software
This is a common endpoint protection solution that scans files for known
malware signatures.
Network-level restrictions
Organizations can restrict access to the network based on a device's security
policy compliance.
Software installation
Organizations can install software directly on endpoints to monitor and
protect them.
Some endpoint protection platforms include: SentinelOne Singularity Platform,
CrowdStrike Falcon, Microsoft Defender for Endpoint, Trellix Endpoint
Security Suite, and Sophos Intercept X
Why is Endpoint Protection
important?
The transition to remote and hybrid work models has transformed businesses’
IT infrastructures, moving corporate endpoints outside the enterprise network
and its perimeter-based defenses. As endpoints become organizations’ first
line of defense against cyber attacks, they require endpoint security solutions
to identify and block these threats before they pose a risk to the company.
Endpoints are the target of many cyberattacks, and, with shifts in corporate IT
infrastructure, are becoming more vulnerable to attack. Increased support for
remote work moves corporate endpoints outside of the enterprise network and
its protections. Bring your own device (BYOD) policies allow employee-owned
devices to connect to the enterprise network and access sensitive corporate
data.
Endpoint protection has always been important for defense in depth, but the
blurring of the enterprise network perimeter due to remote work and BYOD
policies has made it even more important. Endpoints are companies’ first line
of defense against cyber threats and a major source of cyber risk.
Data Encryption: Encryption is the most effective way to protect data against
unauthorized access and potential breach. Endpoint security solutions should
offer full disk encryption (FDE) and support encryption of removable media.