CC - Mike Chapels Notes
CC - Mike Chapels Notes
Breakdown of Exam
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 1 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Other Professionals
may file a
complaint, due to
the nature of the
complaint
● Professionals only
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 2 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
against
snooping
● Dumpster Diving
○ Looking through
trash for information
■ Shredding
protects
against
Dumpster
Diving
● Eavesdropping
■ Rules about
sensitive
conversations
prevent
eavesdropping
● Wiretapping
○ Electronic
Eavesdropping
■ Encryption
protects
against
wiretapping
● Social Engineering
○ Attacker uses
psychological tricks
to persuade
employee to give it
or give access to
information
■ Education
and Training
protects
against
social
engineering
_____
Integrity Concerns
● Unauthorized Modification
○ Attackers make
changes without
permission (can be
internal=employees
or external
■ Follow the
Rules of
Least
Privilege to
prevent
unauthorized
modification
● Impersonation
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 3 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Attackers pretend to
be someone else
■ User
education
protects
against
Impersonation
● Man-in-the-Middle (MITM)
○ Attackers place the
themselves in the
middle of
communication
sessions
○ Intercepts network
traffic as users are
logging in to their
system and
assumes their role.
○ Impersonation on
an electronic/digital
level.
■ Encryption
prevents
man-in-the-
middle
attacks
● Replay
○ Attackers
eavesdrop on logins
and reuse the
captured
credentials
■ Encryption
prevents
Replay
attacks
_____
Availability Concerns
● Denial of Service (DoS)
○ When a malicious
individual bombards
a system with an
overwhelming
amount of traffic.
○ The idea to is to
send so many
requests to a server
that it is unable to
answer any
requests from
legitimate users
■ Firewalls
block
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 4 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
unauthorized
connections
to protect
against
Denial of
Service
attacks
● Power Outages
■ Having
redundant
power
sources and
back-up
generators
protect
against
power
outages
● Hardware Failures
○ Failure of servers,
hard drives,
network gear etc
■ Redundant
components
protect
against
hardware
failure
■ Building
systems that
have a built-
in
redundancy,
so that if one
component
fails, the
other will
take over
● Destruction
■ Backup data
centers
protect
against
destruction
(ex=cloud)
● Service Outages
○ Service outage may
occur due to
programming
errors, failure of
underlying
equipment, and
many more reasons
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 5 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
■ Building
systems that
are resilient
in the fact of
errors and
hardware
failures
protect
against
service
outages
_____
1) Identification
● Identification
involves making a
claim of identity
(Can be false)
○ Electronic
identification
commonly
uses
usernames
2) Authentication
● Authentication
requires proving a
claim of identity
○ Electronic
authentication
commonly
uses passwords
3) Authorization
● Authorization
ensures that an
action is allowed
○ Electronic
authorization
commonly
takes the
form of
access
control lists
■
Access
Control
Lists
also
provides
Accounting
functionality
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 6 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
●
Accounting
allows
to
track
and
maintain
logs
of
user
activity
●
Can
track
systems
and
web
browsing
history
Authentication + Authorization
+ Accounting = AAA
_____
Password Security
Password Managers
● Secured password vaults
often protected by
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 7 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
biometric mechanisms
(ex=fingerprints)
● Facilitates the use of
strong, unique passwords
● Stores passwords
_____
Non-repudiation
● Prevents someone from
denying the truth
○ Physical signatures
can provide non-
repudiation on
contracts, receipts
etc
○ Digital signatures
use encryption to
provide non-
repudiation
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpPD…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 8 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
_____
Privacy
electronic
communications
such as: email,
instant chats etc
○ You do not have a
reasonable
expectation of
privacy when
sharing PII with an
organization
○ You do not have a
reasonable
expectation of
privacy when using
employer resources
_____
Risk Management
1) Internal Risks
● Risks that arise
from within the
organization
○ Internal
control
prevents
internal risks
2) External Risks
● Risks that arise
outside the
organization
○ Build
controls that
reduce the
chance of
attack/risks
being
successful
(ex= multi
factor
authentication,
or social
engineering
awareness
campaigns)
3) Multiparty Risks
● Risks that affect
more than one
organization
● Intellectual
property
theft poses a risk to
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 10 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
knowledge-based
organizations
● If attackers are able
to alter, delete or
steal this
information, it would
cause significant
damage to the
organization and its
customers/counterparties
● Software license
agreements issues
risk fines and legal
actions for violation
of license
agreements
_____
Risk Assessment
● Identifies and triages risks
Threat
● Are external forces that
jeopardize security
● Threat Vector
○ Threat
Vectors are
methods
used by
attackers to
get to their
target (ex=
social
engineering,
hacker
toolkit, etc)
Vulnerabilities
● Are weaknesses in your
security controls
○ Examples : Missing
patches,
Promiscuous
Firewall rules, other
security
misconfiguration
______
Ranking of Risks
● We rank risks by
likelihood and impact
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 11 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Likelihood
● Probability a risk will occur
Impact
● Amount of damage a risk
will cause
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 12 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Risk Profile
● Combination of risks that
an organization faces
_____
Inherent Risk
● Initial level of risk, before
any controls are put in
place
Residual Risk
● Risk that is reduced and
what is left of it is known as
the residual risk
Control Risk
● New risk that may have
been introduced by the
controls applied to mitigate
risk
○ Example : Controls
Applied may be
installing a firewall.
While that firewall
may have mitigated
the inherent risk,
the risk of that
firewall failing is
another newly
introduced risk
Risk Tolerance
● Is the level of risk an
organization is willing to
accept
_____
Security Controls
● Are procedures and
mechanisms that reduce
the likelihood or impact of a
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 13 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Defense in Depth
● Uses overlapping security
controls
● Different methods of
security with a common
objective
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 14 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
3) Physical
● Controls that impact
the physical world
● Examples: Locks,
Security guard
_____
Configuration Management
● Tracks the way specific
devices are set up
● Tracks both operating
system settings and the
inventory of software
installed on a device
● Should also create Artifacts
that may be used to help
understand system
configuration (Legend,
Diagrams, etc)
Baselines
● Provide a configuration
snapshot
● Dual Net
● You can use the snapshot
to assess if the settings are
outside of an approved
change management
process system
● Basically the default
configuration setting set by
an organization
Versioning/Version Controls
● Assigns each release of a
piece of software and an
incrementing version
number that may be used
to identify any given copy
● These verison #s are
written as three part
decimals, with the
○ First number
representing the
major version of
software
○ Second number
representing a
major updates
○ Third number
representing minor
updates
Ex= IPhone IOS 14.1.2
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 15 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Standardizing Device
Configurations by:
● Standardizing Naming
conventions
● IP Addressing schemas
_____
Security Governance
● Compliance
with
Standards
are
mandatory
3) Guidelines
● Provide
advice to the
rest of the
organization
on best
practices
● Compliance
with
Guidelines
are optional
4) Procedures
● Step-by-step
procedures
of an
objective.
● Compliance
can be
mandatory
or optional
_____
Best Practice of Security Policies
1) Acceptable Use Policies
(AUP)
● Described
authorized uses of
technology
2) Data Handling Policies
● Describe how to
protect sensitive
information
3) Password Policies
● Describes
password security
practices
● An area where all
the password
requirements
(length, complexity)
gets officially
documented
4) Bring Your Own Device
Policies (BYOD)
● Cover the usage of
personal devices
with company
information
5) Privacy Policies
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 17 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
_____
Business Continuity
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 18 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Redundancy
● The level of protection and
against the failure of a
single component
1) High Availability
● Uses multiple
systems to protect
against service
failure (Different
from AWS Cloud as
in that it does not
just apply to AZs
but rather
everything including
multiple firewalls
etc)
2) Fault-Tolerance
● Makes a single
system resilient
against technical
failures
Load Balancing
● Spreads demand across
available systems
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 19 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Can use
multiple
power
supplies
○
Uninterruptible
Power
Supplies
(UPS) -
supplies
battery to
devices
during brief
power
disruptions.
UPS may be
backed up
by an
additional
power
generator
○ Power
Distribution
Units
(PDUs)
provide
power
clearing and
management
for a rack
2) Storage Media
● Protection against
the failure of a
single storage
divide
○ Redundant
Array of
Inexpensive
Disks (RAID)
: Comes in
many
different
forms but
each is
designed to
provide
redundancy
by having
more discs
than needed
to meet
business
needs
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 20 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ There are 2
RAID
technologies
■
Mirroring
●
Considered
to
be
RAID
Lvl
1
●
Server
contains
2
identical
synchronized
discs
■
Striping
●
Disc
Striping
with
parity
●
RAID
Lvl
5
●
Contains
3
or
more
discs
●
Also
includes
an
extra
disc
called
Parity
Block
●
When
one
of
the
disc
fails,
the
Parity
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 21 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Block
is
used
to
regenerate
the
failed
disc’s
content
■ RAID
is a
Fault-
Tolerance
technique
NOT
a
Back-
up
strategy
3) Networking
● Improve networking
redundancy by
having multiple
Internet service
providers
● Improve networking
redundancy by
having dual-network
interface cards
(NIC) or NIC
Teaming (similar to
how you use
multiple power
supplies)
● Implement
Multipath
Networking
Fault-Tolerance mechanisms
prevents systems from failing,
even if one of these above points
experience a complete failure
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 22 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Diversity of Security
Controls
_____
Incident Response
NIST SP 800-61
● Assists organization
mitigating the potential
business impact of
information security
incidents providing
practical guidance.
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 23 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Physical Security
Incident Identification
● Organizations have a
responsibility to collect,
analyze and retain security
information
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 24 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Designed to only
provide an
alert about a
potential incident
● Firewalls
● Authentication Systems
● Integrity Monitors
● Vulnerability Scanners
● System Event Logs
● Netflow Records
● Antimalware Packages
Highest Priority
● The highest priority of a
First Responder must be
containing damage
through isolation
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 25 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Disaster Recovery
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 26 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
_____
Backups
● Provides an organization
with a fail-safe way to
recover their data in the
event of
○ Technology failure
○ Human error
○ Natural disaster
Backup Methods
1) Tape Backups
● Practice of
periodically copying
data from a primary
storage device to a
tape cartridge
● Traditional method -
outdated
2) Disk-to-disk Backups
● Writes data from
Primary Disks to
special disks that
are set aside for
backup purposes
● Backups that are
sent to a storage
area network or a
network attached
storage are also
fitting in this
category of backup
3) Cloud Backups
● AWS, Azure, GC
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 27 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 28 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
automatically
deployed
● Very expensive
2) Cold Site
● Used to restore
operations
eventually, but
requires a
significant amount
of time
● Empty Data
Centers
● Stocked with core
equipment,
network, and
environmental
controls but do not
have the servers
or data required to
restore business
● Relatively
Inexpensive
● Activating them
may take weeks or
even months
3) Warm Site
● Hybrid of Hot and
Cold
● Stocked with core
requirements and
data
● Not maintained in
parallel fashion
● Similar in expense
as a Hot Site
● Requires significant
less time from IT
Staff
● Activating them
may take hours or
days
Disaster Recovery Sites don’t
only provide a facility for
technology operations, but also
serve as an Offsite Storage
Location. They are:
● Geographically distant
● Site Resiliency
● Allows backups to be
physically transported to
the disaster recovery
facility either manually or
electronically called “Site
Replication”
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 29 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 30 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Uses a practice
scenario to test the
Disaster Recovery
Plan
● Scenario based-
very specific
circumstances
4) Parallel Test
● While above are all
theoretical
approaches, the
Parallel Test
actually activates
the Disaster
Recovery
Environment
● However, they do
not switch
operations to the
backup
environment
5) Full Interruption
● Most effective
● Activate Disaster
Recovery
Environments
● Also switch primary
operations to the
backup
environment
● Can be very
disruptive to
business
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 31 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
CPTED
● Crime Prevention Through
Environmental Design
○ Basically giving
principles to design
your crime
prevention
mechanisms in a
way that is
appropriate with
your environmental
surroundings
CPTED Goals
1) Natural Surveillance
● Design your
security in a way
that allows you to
observe the natural
surroundings of
your facility
○ Windows,
Open Areas,
Lightning
2) Natural Access Control
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 32 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Visitor Management
● Visitor management
procedures protect against
intrusions
Visitor Procedures
● Describe allowable visit
purposes
● Explain visit approval
authority
● Describe requirements for
unescorted access
● Explain role of visitor
escorts
● All visitor access to secure
areas should be logged
● Visitors should be clearly
identified with distinctive
badges
● Cameras add a degree of
monitoring in visitor areas
● Cameras should always be
disclosed
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 33 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 34 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Inaccurate
Permissions
■
Wrong
permissions
assigned
that
results
in too
little
access
to do
their
job or
too
much
access
(violates
least
privilege)
■
Result
of
Privilege
Creep
○
A
condition
that
occurs
when
users
switch
roles
and
their
previous
role’s
access
to
system
has
not
been
revoked
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 35 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
and access
permissions.
3) Continuous Account
Monitoring
● Watch for
suspicious activity
● Alert
administrations to
anomalies
● Will catch any
unauthorized use of
permissions or acts
● Flags Access Policy
Violations
○ Impossible
travel time
logins
○ Unusual
network
location
logins
○ Unusual
time-of-day
logins
○ Deviations
from normal
behavior
○ Deviations i
volume of
data
transferred
4) Geotagging
● Adds user location
information to logs
5) Geofencing
● Alerts when a
device leaves
defined boundaries
_____
Provisioning
● After onboarding,
administrators create
authentication credentials
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 36 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Deprovisioning
● During the off-boarding
process, administrators
disable accounts and
revoke authorizations at
the appropriate time.
● Prompt Termination
(quickly acting after off
boarding) is critical
○ Prevents users from
accessing
resources without
permission
○ More important if
employee leaves in
unfavorable terms
_____
Authorization
● Final step in the Access
Control Process
● Determines what an
authenticated user can do
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 37 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Protects against
internal risks as a
malicious
employee’s damage
will be limited to
their access
○ Protects against
external risk as if an
account was
hacked, the
damage they can
do would be limited
to the permissions
on the stolen
account.
Network
● Connect computers
together
● Can connect computers
within an office (LAN) or to
the global internet
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 38 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 39 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
_____
Internet Protocols
● Main function is to provide
an addressing scheme,
known as the IP address
● Routes information across
networks
● Not just used on the
internet
● Can be used at home or an
office
● Deliver packets(chunks of
information) from source →
destination
● Serves as a Network
Layer Protocol
○ Supports Transport
Layer Protocols -
which have a higher
set of
responsibilities
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 40 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Three-Way
Handshake
■ TCP
packets
include
special
flags
that
identify
the
packets
known
as
TCP
Flags.
Within
the
TCP
Flags:
●
SYN
Flag:
Opens
a
connection
●
FIN
Flag:
Closes
an
existing
connection
●
ACK:
Used
to
acknowledge
a
SYN
or
FIN
packet
TCP Three-
Way
Handshake
1)
Source
SYN
sent
to
request
open
connection
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 41 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
to
Destination
2)
Destination
sends
ACK
+
request
(SYN)
to
reciprocate
a
open
connection
3)
Source
acknowledges
and
sends
ACK
● Guarantees
delivery through the
destination system
acknowledging
receipt
● Widely used for
critical applications
(email , web traffic
etc)
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 42 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
is not essential.
Every single packet
doesn't have to
reach the
destination for video
and voice to be
comprehensible.
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 43 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Manages the
exchange of
communications
between
systems
Layer 6: Presentation Layer
● Translates
data so that
it may be
transmitted
on a network
● Encryption
and
Decryption
Layer 7: Application Layer
● How users
interact with
data, using
web
browsers or
other apps
OSI
TCP Model
_____
IP Addresses
● Uniquely identify systems
on a network
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 44 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● No duplicates of IP
addresses on Internet-
connected systems (Just
like your phone#)
● Allow duplicates if on
private networks
○ Your router or
firewall takes care
of
translating private
IP Addresses to
public IP addresses
when you
communicate over
the internet
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 45 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ This translating
process is called
NAT (Network
Address
Translation)
● IP Addresses are divided
into 2 parts
○ 1) Network Address
○ 2) Host Address
● IPv4 (Containing 4
numbers) is running out so
we are shifting to → IPv6
○ IPv6
■ Uses 128
bits
(compared
to 32 bits
(8x4num
bers = 32)
for IPv4
■ Consists of 8
groups of 4
hexadecimal
numbers
● ex=
fd02:24c1:b942:01f3:ead2:123a:c3d2:cf2f
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 46 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
2) Dynamic Host
Configuration Protocol
(DHCP)
●
Automatic assignment
of IP Address from
an administrator
configured pool
Typically,
Servers are configured with Static
IP Addresses
End-user devices are configured
with Dynamically-Changing IP
Addresses
_____
Network Ports
● Like Apartment #s, guide
traffic to the correct final
destination
● IP addresses uniquely
identifies a system while
the Network Ports uniquely
identifies a particular
location of a system
associated with a specific
application
● Think of it as
○ IP Addresses -
Street # of an
Apartment
○ Network Ports- Unit
# of an Apartment
Port Ranges
● 0 - 1,023 = Well-known
ports
■ Reserved for
common
applications
that are
assigned by
internet
authorities
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 47 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
■ Ensures
everyone on
the internet
will know
how to find
common
services
such as :
web servers,
email
servers
● Web-
servers
use
the
Well-
known
port
80
●
Secure
Web-
servers use
the
Well-
known
port
443
● 1,024 - 49,151 =
Registered ports
■ Application
vendors may
register their
applications
to use these
ports
●
Examples
○
Microsoft
Reserve
port
1433
for
SQL
Server
database
connections
○
Oracle
Reserve
port
1521
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 48 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
for
Database
Important Port #s
Administrative Services
● Port 21 : File Transfer
Protocol (FTP)
■ Transfers
data
between
systems
Mail Services
● Port 25 : Simple Mail
Transfer Protocol (SMTP)
■ Exchange
email
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 49 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
between
servers
Web Services
● Port 80 : Hypertext
Transfer Protocol (HTTP)
■ For
unencrypted
web
communications
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 50 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
■ 1) Preshared
Keys (Home
Wifi, Office,
Cafe)
○
Changing
Preshared keys
is
difficult
○
Prevents
individual
identification
of
users
■ 2) Enterprise
Authentication
○
Uses
individual
passwords
○ 3) Captive Portals
■ Used in
Starbucks,
Airports,
Tim-Hortons
■ Provide
authentication
on
unencrypted
wireless
networks
■ Intercepts
web
requests to
require Wi-Fi
login
_____
Wireless Encryption
● A best practice for network
security
● Encryption hides the true
content of network traffic
from those without the
decryption key
● Takes, Radio Waves, and
makes it secure
The Original approach to Security
was: Wired Equival7ent Privacy
(WEP)
● This is now
considered insecure
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 51 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
In Summary,
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 52 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Important Commands
1) ping
● Checks whether a
remote system is
responding or
accessible
● Works using the
Internet Control
Message Protocol
(ICMP)
○ Basically
sending a
request and
acknowledgement
to confirm a
connection
○
Troublingshooting with
Ping:
■ You
can
ping
the
remote
system:
●
a)
if
you
receive
a
response
:
it
is
not
a
network
issue
and
a
local
web
server
issue
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 53 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
●
b)
if
you
don’t
receive
a
response
:
you
may
next
ping
another
system located
on
the
internet :
if
that
responds
:
this
will
tell
you
your
internet
is
successful
and
the
issue
is
with
the
web
server
or
network
connection
●
c)
if
you
ping
many
systems
on
internet
and
there
is
no
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 54 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
response,
it
is
likely
that
the
problem
is
on
your
end
●
d)
You
can
ping
a
system
on
your
Local
Network
:
if
that
responds,
there's
probably
an
issue
with
your
network’s
connection
to
the
internet
●
e)
If
a
Local
Network
does
not
respond
:
Either
your
Local
network
is
down
or
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 55 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
there
is
a
problem
with
your
computer
●
f)
Last
Resort
:
Repeat
process
on
another
computer
○ Some
systems do
not respond
to ping
requests
■
Example
:A
firewall
may
block
ping
requests
2) hping
● Creates customized
ping requests
● A variant of the
basic “ping”
command
● Allows you to
interrogate a
system to see if it is
present on the
network
● Old and not
monitored but still
works
3) traceroute
● Determines the
network
path between two
systems
● If you want to know
how packets are
traveling today from
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 56 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
my system Located
in Toronto to a
LinkedIn.com
webserver,
wherever that is
located
● Works only on Mac
and Linux
● In Windows, it is :
tracert
4) pathping
● Windows
only command
● Combines ping and
tracert functionality
in a single
command
_____
Network Threats
Malware
● One of the most significant
threats to computer
security
● Short for Malicious
Software
● Might steal information,
damage data or disrupt
normal use of the system
● Malwares have 2
components:
○ 1) Propagation
Mechanism
■
Techniques the
malware
uses to
spread from
one system
to another
○ 2) Payload
■ Malicious
actions
taken by
malware
■ Any type of
malware can
carry any
type of
payload
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 57 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Types of Malware
1) Virus
● Spreads after a
user takes some
type of user action
○ Example :
Opening an
email
attachment,
Clicking a
Link,
Inserting an
infected
USB
● Viruses do not
spread unless
someone gives
them a hand
● User education
protects against
viruses
2) Worms
● Spread on their
own by exploiting
vulnerabilities
● When a worm
infects a system, it
will use it as it’s
base for spreading
to other parts of the
Local Area Network
● Worms spread
because the
systems are
vulnerable
● Patching protects
against worms
3) Trojan Horse
● Pretends to be a
useful legitimate
software, with
hidden malicious
effect
● When you run the
software, it may
perform as
expected however
will have
payloads behind
the scene
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 58 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Application Control
protects against
Trojan Horses
○ Application
Controls limit
software that
can run on
systems to
titles and
versions
_____
Botnets
● Are a collection of zombie
computers used for
malicious purposes
● A network of infected
systems
● Steal computing power,
network bandwidth, and
storage capacity
● A hacker creating a botnet
begins by
○ 1) Infecting a
system with
malware through
any methods
○ 2) Once the
malware takes
control of the
system (hacker
gains control), he or
she joins/adds it to
the preconceived
botnet
In Summary Botnets:
1) Infect Systems
2) Convert to bots
3) Infect others
4) Check in through
Command and Control
Network
5) Get Instructions
6) Deliver payload
_____
Eavesdropping Attacks
● All eavesdropping attacks
rely on a compromised
communication path
between a client and a
server
○ Network Device
Tapping
○ DNS poisoning
○ ARP poisoning
Man-in-the-browser Attacks
● Variation of Man-in-the-
Middle attack
● Exploit flaws in browsers
and browser plugins to
gain access to web
communications
Replay Attack
● Uses previously captured
data, such as an encrypted
authentication token, to
create a separate
connection to the server
that’s authenticated but
does not involve the real
end user
● The attacker cannot see
the actually encoded
credentials
● They can only see the
encoded version of them
● Prevent Replay Attacks by
including unique
characteristics:
○ Token
○ Timestamp
SSL Stripping
● Tricks browsers into using
unencrypted
communications
● A variation of
eavesdropping attack
● A hacker who has the
ability to view a user’s
encrypted web
communication exploits the
vulnerability to trick the
users browser into
reverting to
unencrypted communications
for the world to see
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 61 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Implementation of Attacks
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 62 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
■ Measure
encryption
time
■ Attackers
precisely
measures
how long
cryptographic
operations
take to
complete,
gaining
information
about
cryptographic
process that
may be used
to
undermine
security
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 63 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
●
IDS/IPS
triggers
an
alert
when
an
attack
did
not
actually
take
place
■ 2) False
Negative
Error
●
IDS/IPS
fails
to
trigger
an
alert
when
an
actual
attack
occurs
1) Signature Detection
Systems
● Contain databases
with rules
describing
malicious activity
● Alert admins to
traffic matching
signatures = Rule
based Detection
● Cannot detect
brand new attacks
○ Reduce
false positive
rates
● Reliable and time-
tested technology
2) Anomaly Detection
Systems
● Builds models of
“normal” activity,
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 64 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
1) In-band Deployments
● IPS sits in the
path of network
traffic
● It can block
suspicious traffic
from entering the
network
● Risk : It is a single
point of failure so it
may disrupt the
entire network
2) Out-of-band (passive)
Deployments
● IPS sits outside of
network traffic
● IPS is connected to
a SPAN port on a
switch
○ Which
allows it to
receive
copies all
traffic sent
through the
network to
scan
○ It cannot
disrupt the
flow of traffic
● It can react after
suspicious traffic
enters the network
● It cannot pre detect
as it can only know
its existence once it
enters the network
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 65 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Malware Prevention
● Antimalware software
protects against many
different threats
● Antimalware software
protects against viruses,
worms, Trojan Horses and
spyware
1) Signature Detection
● Watches for known
patterns of
malware activity
2) Behavior Detection
● Watches for
deviations from
normal patterns of
activity
● This type of
mechanism is found
in advanced
malware protection
tools like the
Endpoint
Detection and
Response (EDR)
■ Offer
real-
time,
advanced
protection
■ Goes
beyond
basic
signature
detection
and
performs
deep
instrumentation
of
endpoints
■ They
analyze:
●
Memory
●
Processor
use
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 66 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
●
Registry
Entries
●
Network
Communications
■
Installed
on
Endpoint
devices
■ Can
perform
Sandboxing
●
Isolates
malicious
content
_____
Port Scanners
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 67 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
3) Application Scanner
● Tests deep into
application security
flaws
_____
Data Centers
● Have significant cooling
requirements
● Current Standard of
Temperatures
○ Maintain data
center air
temperatures
between 64.6 F
and 80.6 F =
Expanded
Environmental
Envelope
● Humidity is also important
○ Dewpoint says :
Humidity 41.9 F
and 50.0 F
■ This
temperature
prevents
condensation
and static
electricity
● HVAC is important
(Heating, Ventilation and
Air Conditioning Systems)
● Must also look out for fire,
flooding, electromagnetic
interference
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 68 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
standby water
3) Chemical Systems
● Removes oxygen
Security Zones
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 69 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
such
as
mail,
web
servers
■
Because
it is
open,
higher
risk
of
compromise
■ If the
DMZ
is
compromised,
firewalls
will
still
protect
3 Special-Purpose Networks
1) Extranet
● Special intranet
segments that are
accessible by
outside parties like
business partners
2) Honeynet
● Decoy networks
designed to attract
attackers
3) Ad Hoc Networks
● Temporary
networks that may
bypass security
controls
East-West Traffic
● Network traffic
between systems located
in data center
North-South Traffic
● Networks traffic
between systems in the
data center and systems
on the Internet
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 70 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
_____
Switches
● Connect devices to the
network
● Has many network ports
● Reside in wiring closets
and connect the computers
in a building together
● Ethernet jacks are at the
other end of network
cables connected to
switches
● Wireless access points
(WAPs) connect to
switches and create Wi-Fi
networks
○ The Physical APs
itself has a wired
connection back to
the switch
● Switches can only create
Local Networks
● Layer 2 of OSI Model -
Data Link Layer
● Some switches can be in
the Layer 3 of OSI Model -
Network Layer (can
interpret IP Addresses)
○ For this to happen,
they must use
Routers
Routers
● Connect networks to each
other, making intelligent
packet routing decisions
● Serves as a central
aggregation point for
network traffic heading to
or from a large network
● Works as the air traffic
controller of the network
● Makes best path decisions
for traffic to follow
● Use Access Control Lists
to limit some traffic that are
entering or leaving a
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 71 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Configuring VLANs
1) Enable VLAN trunking
● Allow switches in
different locations
on the network to
carry the same
VLANs
2) Configure VLANs for each
switch port
_____
Firewalls
● Often sit at the network
perimeter
● Between Router and
Internet
Switch
I
I
I
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 72 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 73 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 74 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
based
on
identity
of
user,
nature
of
application,
time
of
day
etc.
1) Choose deployment
methodology
a) Network
Hardware
●
Physical
devices
that
sit on
a
network
and
regulate
traffic
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 75 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
b) Host-Based
software
Firewalls
●
Software
applications
that
reside
on a
server
that
performs
other
functions
Most
organizations choose to use both
network firewalls
3) Choose Deployment
Mechanism
a) Hardware
Appliance
b) Virtual
Appliance
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 76 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
VPNs
● Works by using encryption
to create a virtual tunnel
between two systems over
the internet
● Everything on one tunnel is
encrypted and decrypted
when it exits
● VPNs require an
endpoint that
accepts VPN connections
● Endpoints can be many
things:
■ Firewalls
■ Router
■ Server
■ Dedicated
VPN
Concentrators
- Used for
High
Volume
SSL/TLS VPNs
● Works at the Application
Layer over TCP port 443
● Works on any system on a
web browser
● Port 443 = Almost bypass
any firewall
HTML5 VPNs
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 77 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Always on VPN
● Connects automatically
● Takes control from the user
● Always protected by
strong encryption
_____
Supplicant(Sends credentials) →
Authenticator(Receives and
passes it to AS) → Authenticator
Server (authenticates and sends
results to authenticator →
Authenticator → Supplicant →
Access
NAC Roles
1) User and device
authentication (what we
discussed above)
2) Role-based access
● Once authenticator
learns the identity of
requested user it
places the user in
the network based
upon that user’s
identity
3) Posture checking/Health
Checking
● Before granting
access, it check for
compliance
requirements
○ Validating
current
signatures
○ Verifying for
antivirus
presence
○ Ensuring
proper
firewall
configuration
○ If it Fails the
posture
check
■ It will
be
placed
into a
quarantine
VLAN
where
they
will
have
limited
internet
access
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 79 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
and
no
access
to
internal
resources
○ Posture
checking is
done
through an
Agent or
Agentless
_____
Internet of Things
● Smart devices
Security of IOT
● Check for weak default
passwords
● Make sure to regularly
update and patch
● Some have Automatic
Updates and some require
Manual Websites
● If worried get Firmware
Version Control
○ Updates are applied
in orderly fashion
Cloud Computing
● Delivering computing
resources to a remote
customer over a network
● Official Definition: A model
for enabling ubiquitous,
convenient, on-demand
network access to shared
pool of configurable
computing resources
(networks, servers,
storage, applications,
services) that can be
rapidly provisioned and
released with menial
management effort or
service provider interaction
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 81 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Organization uses a
multi-tenancy
infrastructure
(Shared)
3) Hybrid Cloud
● Uses both Private
and Public
4) Multi Cloud
● Combines
resources from two
different public
cloud vendors
(AWS + Azure)
5) Community Cloud
● Shared Consortium
○ 1) Network-Based
CASB
■ Broker
intercepts
traffic
between the
user and the
cloud
service,
monitoring
for security
issues
■ Broker can
block
request
○ 2) API- Based
CASB
■ Does not sit
on traffic
unlike
Network-
Based
CASB
■ The broker
queries the
cloud
service via
API
■ Broker may
not be able
to block
requests,
depending
upon API
capabilities
_____
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 83 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Verify details of
contract
● Confirm security
incident notification
3) Monitoring
4) Offboarding
_____
Vendor Agreements
Non-Disclosure Agreements
(NDA)
● Keep your mouth shut
Service-Level Requirements
(SLR)
● Document specific
requirements that a
customer has about any
aspect of a vendor’s
service performance
● Once agreed sign the
Service Level Agreement
(SLA)
Memorandum of Understanding
(MOU)
● A letter that documents
aspects of relationship
● Commonly used when a
legal dispute is unlikely but
customer and vendor wish
to document their
relationship to avoid future
misunderstanding
● Usually used when a
department another
company is dealing with
another department
Interconnection Security
Agreement (ISA)
● Details that two
organizations will
interconnect their network
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 84 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Statement of Work
(SOW) is used
when another
project comes up
○ SOW is governed
by terms in MSA.
SOW is like am
abeyance or patch
Data Security
Encryption
● Uses math to make data
unreadable to unauthorized
individuals
● Transforms text from
plaintext to ciphertext
● Uses decryption algorithm
key to read message
Symmetric vs Asymmetric
Cryptography
Symmetric Encryption
● You encrypt and decrypt
with the same shared
secret key
● It's like a password to a
message
● You will keep needing more
keys as network populates
Asymmetric Encryption
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 85 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Hash Functions
● One-way function that
transforms a variable
length input into a unique,
fixed-length output
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 86 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
2) SHA-1
● Produces a 160-bit
hash value
● Contains security
flaws
● SHA-1 is no longer
secure
3) SHA-2
● Replaced SHA-1
● Consists of a family
of 6 has functions
● Produces output of
224, 256, 384 and
512 bits
● Uses a
mathematically
similar approach to
SHA-1 and MD5
● SHA-2 is no longer
secure
4) SHA-3
● Designed to replace
SHA-2
● Uses a completely
different has
generation
approach than
SHA-2
● Produces hashes of
user-selected fixed
strength
● Some people do not
trust SHA
algorithms because
NSA created it
5) RIPEMD
● Created as an
alternative to
government-
sponsored hash
functions
● Produces 128, 160,
256, and 320-bit
hashes
● Contains flaws in
the 128-bit version
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 87 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Data Lifecycle
● Explains the different
stages of data in the cloud
Cycle
1) Create
2) Store
3) Use
4) Share
5) Archive
6) Destroy
● Must be done in a
secured manner
● Data Sanitization
Techniques
○ Clearing
overwrites
sensitive
information
to frustrate
causal
analysis
○ Purging
○ Destroying,
shredding,
pulverization,
melting and
burning
_____
Data Classification
● Assign information into
categories, known as
classification, that
determine storage,
handling, and access
requirements
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 88 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
Classification Levels
1) High, Medium, Low
2) Public vs Private
Labeling Requirements
● Requirement to identify
sensitive information
Logging establishes:
1) Accountability
● Who caused the
event
● A.K.A Identity
Attribution
2) Traceability
● Uncover all other
related events
3) Auditability
● Provide clear
documentation of
the events
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 89 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● All systems
send log
entries
directly to
the SIEM
● Firewall log,
Web server
log,
Database
log, Router
log, they are
all sent to to
SIEM where
it will provide
an overall
picture
2) Source of Artificial
Intelligence
_____
Security Awareness and
Training
Social Engineering
● Manipulating people into
divulging information or
performing an action that
undermines security.
Impersonation Attacks
Spam
● Unsolicited commercial
email
● Phishing
○ Phishing is a
category of spam
○ Steales credentials
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 90 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
○ Spear Phishing
■ Highly target
phishing
■ Customized
phishing
attacks
○ Whaling
■ Phishing
targeted on
executives
○ Pharming
■ Using fake
websites
○ Vishing
■ Voice
phishing
● Sda
○ Smishing and Spim
■ SMS and IM
spam
○ Spoofing
■ Faking an
identity
_____
Security Training
● Provides users with the
knowledge they need to
protect the organization’s
security
Security Awareness
● Keeps the lessons learned
during security training top
of mind for employees.
Reminder
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 91 of 92
CC- Mike Chapels Notes 25/11/2023, 1:55 PM
● Consider frequency of
training
● Review training materials
regularly to ensure
relevance
https://docs.google.com/document/d/e/2PACX-1vS4J622T28fpP…iOdeDwc9UaRTWCKoNobkPoWkrNvNmsp6_kWEp4lFyYxc8xZ7rLSGb/pub Page 92 of 92