Module 4. Protecting The Organization
Module 4. Protecting The Organization
Security appliances can be standalone devices like a router or software tools that are run on a
network device. They fall into six general categories:
1. Routers-used to interconnect various network segments together and also provide basic
traffic filtering capabilities.
2. Firewalls- is a network security device that monitors and filters incoming and outgoing
network traffic based on an organization's previously established security policies
3. Intrusion prevention systems- IPS systems use a set of traffic signatures that match
and block malicious traffic and attacks.
4. Virtual private networks-VPN systems let remote employees use a secure encrypted
tunnel from their mobile computer and securely connect back to the organization’s
network.
5. Antimalware or antivirus-use signatures or behavioral analysis of applications to
identify and block malicious code being executed.
Firewalls
A firewall is designed to control or filter which communications are allowed in and which are
allowed out of a device or network.
Types:
Port scanning
Port scanning is a process of probing a computer, server or other network host for open ports. It
can be used maliciously as a reconnaissance tool to identify the operating system and services
running on a computer or host, or it can be used harmlessly by a network administrator to verify
network security policies on the network.
Intrusion Detection and Prevention Systems
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are security
measures deployed on a network to detect and prevent malicious activities.
Types:
Netflow
NetFlow technology is used to gather information about data flowing through a network,
including who and what devices are in the network, and when and how users and devices
access the network.
Penetration testing
Penetration testing, commonly known as pen testing, is the act of assessing a computer system, network
or organization for security vulnerabilities. A pen test seeks to breach systems, people, processes and
code to uncover vulnerabilities which could be exploited. This information is then used to improve the
system’s defenses to ensure that it is better able to withstand cyber-attacks in the future.
Steps:
1. Planning-The pen tester gathers as much information as possible about a target system
or network, its potential vulnerabilities and exploits to use against it. This involves
conducting passive or active reconnaissance (footprinting) and vulnerability research.
2. Scanning-The pen tester carries out active reconnaissance to probe a target system or
network and identify potential weaknesses which, if exploited, could give an attacker
access. Active reconnaissance may include:
4. Maintaining access-The pen tester will maintain access to the target to find out
what data and systems are vulnerable to exploitation. It is important that they
remain undetected, typically using backdoors, Trojan horses, rootkits and other
covert channels to hide their presence. When this infrastructure is in place, the
pen tester will then proceed to gather the data that they consider valuable.
5. Analysis and reporting-The pen tester will provide feedback via a report that recommends
updates to products, policies and training to improve an organization’s security.
Many large organizations have a Computer Security Incident Response Team (CSIRT) to
receive, review and respond to computer security incident reports. Cisco CSIRT goes a step
further and provides proactive threat assessment, mitigation planning, incident trend
analysis and security architecture review in an effort to prevent security incidents from
happening.
Cisco’s CSIRT takes a proactive approach, collaborating with the Forum of Incident
Response and Security Teams (FIRST), the National Safety Information Exchange
(NSIE), the Defense Security Information Exchange (DSIE) and the DNS Operations
Analysis and Research Center (DNS-OARC) to ensure we stay up-to-date with new
developments.
There are several national and public CSIRT organizations, like the CERT Division of
the Software Engineering Institute at Carnegie Mellon University, that are available to
help organizations and national CSIRTs to develop, operate and improve their incident
management capabilities.
Security playbook
Is a collection of repeatable queries or reports that outline a standardized process for incident
detection and response?
It should:
1. Highlight how to identify and automate the response to common threats such as the
detection of malware-infected machines, suspicious network activity or irregular
authentication attempts.
2. Describe end clearly define inbound and outbound traffic.
3. Provide summary information including trends, statics and counts.
4. Provide usable and quick access to key statistics and counts.
5. Provide usable and quick access to key statistics and metrics.
6. Correlate events across all relevant data sources.
1. Security information and event management (SIEM) system-collects and analyzes security
alerts, logs and other real-time and historic data from security devices on the network to
facilitate early detection of cyber-attacks.
2. A data loss prevention (DLP) SYSTEM-is designed to stop sensitive data from being stolen from
or escaping a network. It monitors and protects data in 3 different states: data in use (data being
accessed by a user), data in motion (data traveling through a network), and data at rest (data
stored in a computer network or device).
Cisco Identity Services Engine (ISE) and TrustSec enforce user access to network resources by creating
role-based access control policies.