Cyber Security Chapter 4
Cyber Security Chapter 4
Cyber Security Chapter 4
CHAPTER 4
FIREWALL TYPES
• FIRE WALL :Control or filter incoming or outgoing communications on a network or device.
Network Layer source and destination IP addresses
Firewall
Transport Layer source and destination data ports, connection states
Firewall
Application Layer application, program or service
Firewall
Context Aware user, device, role, application type, and threat profile
Application Firewall
Proxy Server web content requests
Reverse Proxy protect, hide, offload, and distribute access to web servers
Server
Network Address hides or masquerades the private addresses of network hosts
Translation (NAT)
Firewall
Host-based Firewall – filtering of ports and system service calls on a single computer
operating system
PORT SCANNING :-
• Process of probing a computer, server or other network host for open ports.
• Port numbers are assigned to each running application on a device.
• Reconnaissance tool to identify running OS and services • Nmap – A port scanning tool
Common responses:-
Open or Accepted -a service is listening on the port.
• DDoS originates from hundreds, or thousands of zombie hosts, and the attacks appear as legitimate traffic.
SECURITY BEST PRACTICES:-
Some published Security Best Practices:
Perform Risk Assessment – Knowing the value of what you are protecting will help in justifying security expenditures.
Create a Security Policy – Create a policy that clearly outlines company rules, job duties, and expectations.
Physical Security Measures – Restrict access to networking closets, server locations, as well as fire suppression.
Human Resource Security Measures – Employees should be properly researched with background checks.
Perform and Test Backups – Perform regular backups and test data recovery from backups.
Maintain Security Patches and Updates – Regularly update server, client, and network device operating systems and
programs.
Employ Access Controls – Configure user roles and privilege levels as well as strong user authentication.
Regularly Test Incident Response – Employ an incident response team and test emergency response scenarios.
Implement a Network Monitoring, Analytics and Management Tool - Choose a security monitoring solution that integrates with
other technologies.
Implement a Comprehensive Endpoint Security Solution – Use enterprise level antimalware and antivirus software.
Educate Users – Educate users and employees in secure procedures.
Encrypt data – Encrypt all sensitive company data including email.
BOTNET
• A group of bots connect through the Internet
Bot
• Typically infected by visiting a website,
6. Command and Control - Remotecontrol from a command and control channelor server.
architecture review
SECURITY PLAYBOOK
• Collection of repeatable queries against security event data sources that lead to incident detectionand response:-
• Software that collects and analyzes security alerts, logs and other real time and historical data fromsecurity devices on the network
• Stops sensitive data from being stolenor escaped from the network