SOC 6
SOC 6
I set up a very strong user name and password for my router and Wi-Fi, its
broadcasting feature is
disabled. I set up MAC address filtering on the router and I use WPA2 (Wi-Fi
protected access 2) security encryption technology. It encrypts the traffic on
wi-fi networks. I disabled the remote access feature. I use a firewall and
configure its security measures and it is always on.
Authorization refers to access control rights. This implies every user on the
network is allowed access to certain portions of data and information and
applications according to his/her level in the organization. For example, a
marketing person will not be able to record financial transactions. Hence, a
user is authorized to perform only certain functions on the network system.
These
authorization levels are defined by the system administrator who has access
to all the resources and
user policies in the network.
IPS is Intrusion Prevention System also analyses packets, but can also stop
the packet from being delivered.
They are both parts of the network infrastructure. They both compare
network packets to cyberthreat databases containing known signatures of
cyberattacks and flag any matching packets.
The main difference between them is that IDS is a monitoring system, while
IPS is a control system. IDS does not alter the network packets in any way
whereas IPS prevents the packet from delivery based on the contents much
like how a firewall prevents traffic by IP address. IDS requires a human or
another system to look at the results.
Many IDS/IPS systems are integrated with firewalls to create unified threat
management technology.IDS and IPS are located in the same area where the
firewall is located between the outside world and the internal
network.IDS/IPS system covers Automation, compliance, and policy
enforcement.
Security information and event management, SIEMs help make IPS and IDS
more scalable and can better enable organizations to achieve compliance,
improve reporting, and identify correlations that can indicate a broader
threat. In short, SIEMs enable organizations to scale their IDS and IPS data
into a more complete security solution.
• SNORT
• Security Onion
• WinPatrol
• Osquery
• Splunk
• OSSEC
SEM security event management carries out analysis of the event and logs
data in real-time to provide event correlation, threat monitoring, and incident
response
SIM security information management retrieves and analyses log data and
generate a report. For the organization that wants complete visibility and
control over what is happening on their network in real-time, SIEM solutions
are critical.
SIEM collects log and event data that is generated by host systems, security
devices, and applications throughout an organization’s network infrastructure
and collating it on a centralized platform. From antivirus events to firewall
logs, SIEM software identifies this data and sorts it into categories, such as
malware activity, failed and successful logins, and other potentially malicious
activity.
When software identifies activity that could signify a threat, alerts are
generated to indicate a potential security issue. These alerts can be set
either low or high priority using pre-defined rules.
A single alert from an antivirus filter may not be a cause of panic on its own,
but if traffic anomaly alerts are received from the firewall at the same time,
this could signify that a severe breach is in progress. SIEM collects all of
these alerts in a centralized console, allowing fast and thorough analysis.
• Splunk
• SIEMonster
• AlienVault
• IBM QRadar
• SolarWinds
• The policy has not made readily available for review by all
employees.
• An organisation is unable to prove that employees reviewed and
understood the content of the policy.
DDOS can be mitigated by analyzing and filtering the traffic in the scrubbing
centers. The scrubbing centers are centralized data cleansing stations
wherein the traffic to a website is analyzed and the malicious traffic is
removed.
What you can control is actually the most important part of the DNS process,
the performance of your authoritative name server answering the recursive
name server on the return trip.
Inspecting DNS traffic between the client’s devices and your local recursive
resolver could be revealing a wealth of information for forensic analysis. DNS
queries can reveal bot botnets and malware is connecting to the C&C server,
so this is why DNS monitoring is very essential.
17. What are encoding, hashing and
encryption?
Encoding: Converts the data in the desired format required for exchange
between different systems.
Hashing: Maintains the integrity of a message or data. Any change did any
day could be noticed.
Encryption: Ensures that the data is secure and one needs a digital
verification code or image in order to open it or access it.
Grey hat hackers: are white hat hackers who sometimes perform
unauthorized activities.
Phishing: Fake emails, text messages, and websites created to look like
they’re from authentic companies. They’re sent by criminals to steal personal
and financial information from you. This is also known as “spoofing”.
Authenticator apps replace the need to obtain a verification code via text,
voice call or email.
Flags:
• SYN
• URG
• ACK
• PSH
• RST
• FIN
Hackers use this method of attack to conceal their own identity and imitate
another.
The ARP program looks in the ARP cache and If it finds the address in the
ARP cache it provides the MAC address so that the packet can be converted
to the right packet length and format and sent to the destination machine. If
no IP address is found, ARP broadcasts the request in a special format to all
the machines on the LAN to see if one machine knows that IP address
associated with it.
ARP poisoning is ARP spoofing, ARP cache poisoning, or ARP poison routing,
is a technique by which an attacker sends (spoofed) Address Resolution
Protocol (ARP) messages onto a local area network. Generally, the aim is to
associate the attacker’s MAC address with the IP address of another host,
such as the default gateway, causing any traffic meant for that IP address to
be sent to the attacker instead.
Stopping the source not to access the destination node via port as the
application works on the ports are blocked to restrict access.
There are packet filtering (stateless), stateful, and application layer network
firewall types. Firewall functionalities can be provided as software and also
hardware devices such as routers or firewall appliances.
Following are the steps you should take to configure the firewall:
• Strong username/Password
• Disable remote administration
• For certain applications to work properly, such as Web server or ftp
server, you need to configure appropriate port forwarding (Port
forwarding is a technique that is used to allow external devices
access to computers services on private networks. if you want, for
example, to host a website on your internal network and that
website needs to be accessible to external clients then you will need
to use a standard port (port 80 for http) as the external client
expects this. To do this you statically map the external IP address
+ port 80 to
the Internal IP address of the web server + port 80 – This is
port forwarding.
• Installing a firewall on a network with an existing DHCP server will
cause conflicts unless the firewall’s DHCP server is disabled
• In order to troubleshoot firewall issues or potential attacks, you
want to make sure to enable logging and understand how to view
the logs.
• Firewalls needs to be configured to enforce security policies.
• Private Key (or Symmetric Key): This means that the encryption
and decryption keys are the same. The two parties must have the
same key before they can achieve secure communication.
• Public Key: This means that the encryption key is published and
available for anyone to use. Only the receiving party has access to
the decryption key that enables them to read the message.
• The target server must have open ports that can accept and initiate new
connections. When the server receives the SYN packet from the client node,
it responds and returns a confirmation receipt – the ACK packet or SYN/ACK
packet.
• The client node receives the SYN/ACK from the server and responds with
an ACK packet. Upon completion of this process, the connection is created
and the host and server can communicate.
3. Using the server’s public key, the client and server establish a session key
that both will use for the rest of the session to encrypt communication.
Worm – Much like viruses, worms can automatically replicate and infect
multiple files. Unlike viruses, they can operate within a computer without a
host file and without attaching to an existing file. Many times, worms gain
access to a computer via email, while other times they enter the network
through a vulnerability. Instead of targeting a single computer, worms
typically seek to harm an entire network or open a backdoor for other
malware.
Trojan -Named after the famed wooden gift horse Greek soldiers used to
invade the city of Troy, Trojans operate in a similar fashion. They are
disguised as legitimate or even beneficial programs, and once a user enables
them, they infect the computer. They are not self-replicating and can only be
spread by user interaction, typically through email attachments or internet
downloads.
Not trusting user input means validating it for type, length, format, and
range whenever data passes through a trust boundary, say from a Web form
to an application script, and then encoding it prior to redisplay in a dynamic
page.
In practice, this means that you need to review every point on your site
where user-supplied data is handled and processed and ensure that, before
being passed back to the user, any values accepted from the client side are
checked, filtered, and encoded.
Splunk components:
Indexer: Indexer takes raw data from forwarders, turns it into events, and
places results into
an index that is stored in a bucket (categorizes and applies metadata to the
data)
Search heads: Search heads act as the user interface and allow users to
create dashboards,
alerts and reports related to analyzed logs and data.
• Input
• Parsing
• Indexing
• Searching
The kill chain can also be used as a management tool to help continuously
improve network defense.
Threats progress through several phases in the model, including: