Security+ 4-2C All Slides
Security+ 4-2C All Slides
Security+ 4-2C All Slides
Cryptography
Domain Objectives
A Security+ candidate is expected to:
Given a scenario, utilize general cryptography concepts
Given a scenario, use appropriate cryptographic methods
Given a scenario, use appropriate PKI, certificate management
and associated components
General Concepts
Cryptology
The science of cryptography and cryptanalysis.
Cryptography
The process of converting intelligible text into unintelligible
characters or symbols.
Cryptanalysis
Exploiting cipher weaknesses
General Concepts
Plaintext
Information without any protections applied
Algorithm
Instructions how to transform data
Cipher
The style used to encode data
Ciphertext
Information that has been transformed
General Concepts
Key
A variable used to transform data
Ephemeral Key
Ad hoc key
Keyspace
Pool of values that a key can be chosen from
Cryptography Goals
Confidentiality
Secrecy of data
Integrity
Baseline of data trustworthiness
Authentication
Prove yourself
Non-repudiation
Theres no denying it
Digital Signatures
Steganography
Greek compound word
steganos means covered, or hidden; graphein, to write
Usage
Metadata
Covert channel
Ciphers
Substitution Cipher
Shift Cipher
Mono-alphabetic Cipher
Polyalphabetic Cipher
Transposition Cipher
Stream Cipher
Block Cipher
Substitution Cipher
Changes one character or symbol into another character or
symbol
Each character keeps its position in the message but
changes its identity
Shift Cipher
Mono-alphabetic Cipher
Poly-alphabetic Cipher
Substitution Cipher
Shift Cipher
Shifting of the alphabet
Caesars Shift Cipher, ROT13
Plain-text:
Cipher-text:
Plain
the
time
to
attack is
now
a b c d efgh i j k l m n o p q r s t u v w x y z
Cipher D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Frequency Analysis
Using frequently used characters to crack the remaining
ciphertext
Some plaintext letters (e, r, s, t) are more commonly found in
everyday language than others
SHE
? H E
? I M
THE
DIME
ELIME
? O
TIME
NO
?SO
? A C K
I S
TO ATTACK
? = T
N O W
Transposition Cipher
Changing the positions of plaintext letters
Example Scytale
Stream Cipher
Bit by bit encryption
Plaintext mixed with a keystream controlled by a key
Example: RC4
Block Cipher
Encrypts fixed-size chunks of data at a time
Typical block sizes are either 64 bit or 128 bit
Requires more resources
Processing
Memory
Cipher Suite
Negotiated package of algorithms, ciphers, and protocols
used to manage a conversation between two systems
Confidentially, integrity, authentication, nonrepudiation, and key
exchange options
Example
Converted Plaintext
0101 0001
Keystream
0111 0011
Output of XOR
0010 0010
1100
1010
0110
1 XOR 0=1
Hello Mom,
Just
dropping a
note to say
hello.
1001101010100001
1010001010111001
0010101010010110
0101010001010101
0101010101000011
1111000101010101
0010101111010010
1000100111101100
0000001000111100
1111111000000000
1010000000110001
0101100000111111
1001000101111010
Ciphertext
0101111100110101
1000100111101100
0000001000111100
1111111000000000
1010000000110001
0101100000111111
1001000101111010
One-time pad
Message
10101111100110101
1101010110010100
0010101101010101
0010100010101010
1010101001010101
1111010101110010
1010100101101010
1011101010101000
01101010110010100
0010101101010101
0010100010101010
1010101001010101
1111010101110010
1010100101101010
1011101010101000
Ciphertext
11001101010100001
1010001010111001
0010101010010110
0101010001010101
0101010101000011
1111000101010101
0010101111010010
One-time pad
1 XOR 0=1
Hello Mom,
Just
dropping a
note to say
hello.
Message
Synonyms:
Salt
Nonce
Key Stretching
The process of systematically making something longer so it
is harder to attack
Used on
Passwords before they get encrypted
Keys (cryptovariables)
Noteworthy protocols
bcrypt
PBKDF2
Key Exchange
Out-of-band Exchange
In-band Exchange
Branches of Cryptography
Hashing
Symmetric
Asymmetric
Quantum
Hashing
Algorithm that takes a variable-length input and generates
a fixed-length output
Public, one-way function
Primary purpose: data integrity baseline
Message Digests
Cryptographic checksums
MD5 ("The quick brown fox jumps over the lazy dog") =
9e107d9d372bb6826bd81d3542a419d6
MD5 ("The quick brown fox jumps over the lazy eog") =
ffd93f16876049265fbaef4da268dd0e
Name
Hash Length
MD4
MD5
SHA (SHA-1)
SHA-2
SHA-224
SHA-256
SHA-384
SHA-512
Digest sizes:
224 bits
256 bits
384 bits
512 bits
SHA-3
SHA-224
SHA-256
SHA-384
SHA-512
Digest sizes:
224 bits
256 bits
384 bits
512 bits
RIPEMD
RIPEMD-160
HAVAL
Digest sizes: 128 bits, 160 bits, 192 bits, 224 bits, and
256 bits
Whirlpool
Hashing Attacks
Hash Collision
Hashing Attacks
Birthday Attack
Based on the Birthday Paradox
Dictionary Attack
List of words
Symmetric Cryptography
Private Key Cryptography
Symmetric Cryptography
Advantages
Less computationally intensive
Produces smaller cipher sizes
Faster transmissions
Disadvantages
Key Distribution
Key Management
N (N 1) / 2
Lacks non-repudiation
Shared key: can you trust the other party?
Symmetric Algorithms
Data Encryption Standard (DES)
Block size:
64 bits
Key size: 64 bits (8 bits used for parity)
Effective key size: 56 bits
Comments:
Based on IBMs Lucifer algorithm
Data Encryption Algorithm (DEA)
Easily broken
Symmetric Algorithms
Triple DES (3DES)
Block size:
64 bits
Key size: 168 bits*
Comments:
Uses DES three times in a row
Designed to mitigate some of the weaknesses of DES
Still used today
Symmetric Algorithms
Advanced Encryption Standard (AES)
Block size:
Key size(s):
128 bits
128, 192, 256 bits
Comments:
Official replacement of DES
Based on the Rijndael algorithm
Symmetric Algorithms
Blowfish
Block size:
Key size(s):
64 bits
variable (32 to 448 bits)
Comments
Fastest of the Symmetric algorithms
Used in SSH
Symmetric Algorithms
Twofish
Block size:
Key size(s):
128 bits
128, 192, 256 bits
Comments:
One of the 5 finalists of the AES contest
Symmetric Algorithms
CAST-128
Block size:
Key size(s):
64 bits
variable (40 to 128 bits)
CAST-256
Block size:
Key size(s):
128 bits
128, 160, 192, 224, 256 bits
Symmetric Algorithms
International Data Encryption Algorithm (IDEA)
Block size:
64 bits
Key size: 128 bits
Comments
Developed by the Swiss
Prominently used in European countries
Symmetric Algorithms
RC variants
RC4
Stream cipher
Key sizes:
variable (0-2048 bits)
RC5
Block sizes:
Key sizes:
RC6
Block size:
Key sizes:
128 bits
variable (0-2048 bits)
Symmetric Algorithms
Secure And Fast Encryption Routine (SAFER)
SAFER+
Block size:
128 bits
SAFER++
Block sizes:
Comments:
Used in Bluetooth for key derivation, not for encryption
Symmetric Algorithms
Skipjack
Block size:
64 bits
Key size: 80 bits
Comments:
Created by NSA
Key Escrow
Clipper Chip
Asymmetric Cryptography
Public Key Cryptography
Each user is assigned a mathematically related key pair
Public Key is available to everyone
Private Key is kept secret
Comments:
Whatever is encrypted with one key, must be decrypted with the other key
Supports all 4 cryptographic goals: authentication, confidentiality, integrity,
and non-repudiation
Asymmetric Cryptography
Advantages:
Key Management (N * 2)
Public key provides in-band distribution
Provides:
Confidentiality, integrity checks, digital signatures, key exchange,
authentication, and non-repudiation
Disadvantages:
Slower than symmetric cryptography
File size increases
Asymmetric Algorithms
Diffie-Hellman
Provides:
Key Exchange
Key Agreement
Comments:
Based on discrete logarithms
Asymmetric Algorithms
El Gamal
Provides:
Key Exchange
Confidentiality
Digital Signatures
Comments
Based upon Diffie-Hellman
Uses discrete logarithms
Asymmetric Algorithms
RSA
Provides:
Key Exchange
Confidentiality
Variable block and key sizes:
2048-4096 bits considered secure
Digital Signatures
Comments:
Uses very large prime numbers
Asymmetric Algorithms
ECC
Provides:
Key Exchange
Confidentiality
Digital Signatures
Comments:
Uses two points on an elliptical curve
Uses smaller key sizes than RSA, with the same level of strength
Protection Mechanisms
Digital Signatures
MAC
HMAC
Digital Signatures
Digital version of someones paycheck signature
Provides:
Authentication
Integrity
Non-repudiation
2.
3.
The Recipient:
1.
2.
3.
Signing
Sending
Receiving
GBe4YLe2
/////////////
/////////////
Senders
Public Key
Senders
Private Key
GBe4YLe2
Message
Digest
////////////
////////////
GBe4YLe2
Message
Digest
DSS / DSA
Digital Signature Standard / Digital Signature Algorithm
Established by NIST FIPS
Asymmetric Algorithm: RSA / ECC
Hashing algorithm: SHA
Two goals:
1.
2.
MAC
Message Authentication Code
Establishes message authenticity
Validate the source (data origin)
Validate the packet (integrity)
Packet data is encrypted with the session key using a symmetric algorithm
(DES, 3DES, RC4)
Requires sender and receiver to have an established shared secret key
Used in SSL, WPA
MAC
Sender
Message
Secret Key
Channel
Receiver
Message
Message
Symmetric
Algorithm
MAC
MAC
Secret Key
Symmetric
Algorithm
MAC
MAC
Y
Message is
authentic
=?
N
Message has
been altered
HMAC
Hashed MAC
Establishes packet authenticity
Validate the source (data origin)
Validate the packet (integrity)
Packet data is concatenated with the session key, then hashed with a
hashing algorithm (MD5, SHA)
Requires sender and receiver to have an established shared secret key
Faster than a MAC
HMAC
Sender
Secret Key +
1
Message
Hashing
Algorithm
HMAC 1
Message
Message
HMAC 1
Receiver
Channel
+ Secret Key
5
Hashing
Algorithm
HMAC 2
7
HMAC=Hashed Message
Authentication Code
HMAC 1
Hybrid Cryptography
Asymmetric Cryptography provides
Key Exchange
Key encryption
Digital Signatures
Hybrid Cryptography
Send
Encrypt Message
w/Session Key
Generate
Hash
Header
Generate
Session Key
B3DF421A
TimeStamp
Session Key
Sign w/Senders
Private Key
Signed ICV
Senders ID
Encrypt w/Recipient
Public Key
Hybrid Cryptography
Header
Decrypt Message
w/Session Key
Session Key
Signed ICV
Senders ID
Session Key
Generate
Hash
Verify w/Senders
Public Key
& Separate the
Auth Block
B3DF421A
Equal?
ICV
B3DF421A
TimeStamp
Quantum Cryptography
Uses photons and qubits instead of bits
Pulses of light, LEDs, and fiber optics
Based on the Heisenberg Principle
One cannot determine the finite position and the finite speed of an object
at the same time
The more precise the location, the less accurate speed measurement
Quantum Cryptography
Trust Models
Common Trust models
Single-authority trust
Hierarchical trust
Bridge trust
Web of trust (Peer-to-Peer trust)
Single-Authority Trust
A third-party
central certifying
authority signs a
given key and
authenticates the
owner of the key.
CA
User
User
Hierarchical Trust
Multiple CAs deployed within
an inverted tree structure
Various levels of CAs are
subordinate to an overall root
CA
Root CA
Intermediate CAs
Leaf CAs
Bridge Trust
Two or more separate authorities establish a trust
relationship with each other
Often used between business partners
Two-way transitive trusts
Root CA
Intermediate CAs
Root CA
Intermediate CAs
Web of Trust
CA does not
exist to certify
owners
User
User
User
Certificate Management
Public Key Infrastructure (PKI)
Framework for creating, managing, issuing, distributing, and
storing:
Asymmetric private keys
X.509 Digital Certificates
Digital Certificate
Asymmetric Public Key digitally signed by a 3rd party
Typically a CA
Subjects name
Public Key
CAs Name
CAs Digital Signature
Periodicity: when is it usable
Certificate policy: what can it be used for
Serial Number
Subject
Pub Key
Signature
Certificate Authority
The entity responsible for issuing, storing, revoking, and
distributing digital certificates
Houses the Certificate Revocation List (CRL)
Trusted Root CA
The root of the hierarchical trust model
Creates and signs keys for themselves
Creates and signs keys for intermediate CAs
Intermediate CAs sign for end users
Example Trusted Root CA = CA-2
Example Intermediate CA = CA-31
Trusted Root CAs create Asymmetric Private and Public keys for
themselves and Digitally Sign their own Public Keys.
CA Architecture
Root CA
Intermediate CAs
Leaf CAs
Registration Authority
Validates subjects
Middleman between subscribers and CA
Can distribute keys on behalf of the CA
Can accept registrations for the CA
RA does not issue certificates on their own
Enrollment
The subject must first prove their identity to the CA/RA
before a digital certificate is created
Proof comes from:
Physically appearing
Identification and authentication data within a web form
Certificate Policy
Dictates the circumstances a specific certificate can be used
Protects the CA from claims of loss if the certificate is
misused
Should identify the users community
Drivers license
Social Security Number
Phone number
Email address
Certificate Revocation
Certificates are revoked due to:
Key theft
Loss
Illegal activity
Voluntary
Significant changes in the organization
OCSP
Online Certificate Status Protocol
Querying protocol that checks a CAs CRL file for bad digital
certificates
Server responds with either:
Good
Revoked
Unknown
Certificate Suspension
Certificates can be suspended
Ensures the key may be usable again in the future
Mandatory vacations
Policy acknowledgements incomplete yet
Certificate Expiration
If certificate expires, a new certification should be
requested
Expired certificates do not get added to the CRL
Certificate Renewal
Unexpired certificates can be renewed prior to the
certificate's expiration
Allows the same certificate to be used past the original expiration
time
Certificate Destruction
Have an established policy for destroying keys
Address data remanence issues
Deregistration
Update CAs CRL and OCSP servers
Key Management
Protecting private keys
The strength of asymmetric cryptography lies in the secrecy and
security of its private keys
If the private key is compromised:
The certificate must be revoked and a new key pair generated
Key Management
Key Length
Use sufficiently long keys
The more valuable the data the longer the key should be
Crypto Period
Establish policies for setting key lifetimes
The more valuable the data, the shorter the lifetime of the key should be
Key Management
Centralized Key Management
A centralized entity is in charge of issuing keys
Users do not have control of their keys
The central authority keeps a copy of the key
Key Storage
Software-based
Hardware-based
Easily destroyed
Subject to the security of the
software system
Key Escrow
3rd party under certain contractual circumstances has
access to the decryption keys
Recovery mechanism is external to the organization
Keys are stored outside of the organization
Allows for Key Recovery
Recovery Agent
Someone within the organization has access to the keys
Internal to the organization
Practice M of N control
Domain Objectives
A Security+ candidate is expected to:
Utilize general cryptography concepts
Use appropriate cryptographic methods
Use appropriate PKI, certificate management, and associated
components
Questions?
Review Question 1
Which of the following are valid cryptographic hash
functions : (choose three)
RIPEMD
RC4
SHA-512
MD5
Twofish
Review Question 2
Which of the following protocols would return an X.509
Digital Certificate status of good, revoked, or
unknown?
CRL
TLS
PKI
OCSP
HMAC
Review Question 3
A Certificate Authority takes which of the following actions
in PKI?
Review Question 4
The security administrator wants each user to individually
decrypt a message but allow anybody to encrypt it. Which
of the following MUST be implemented to allow this type of
authorization?
Use of CA certificate
Use of public keys only
Use of private keys only
Use of public and private keys
Review Question 5
A security administrator must implement a system to allow
clients to securely negotiate encryption keys with the
companys server over a public unencrypted
communication channel. Which of the following would
satisfy the criteria? (Select TWO).
PBKDF2
ECDHE
Steganography
bcrypt()
Diffie-Hellman
Review Question 6
Which of the following algorithms has well documented
collisions? (Select TWO).
AES
MD5
SHA-256
RSA
SHA
Review Question 7
A company requires all internal messages to be digitally
signed. This is a form of which of the following security
goals?
Availability
Non-repudiation
Authorization
Cryptography
Confidentiality
Review Question 8
A web server that utilizes PKI needs a new X.509 Digital
Certificate. Which of the following should be submitted to
a CA?
CSR
CLR validation
Private key
OCSP request
Ephemeral key
Review Question 9
Which of the following algorithms would be capable of
using a 128-bit key? (Select TWO).
RSA
3DES
Twofish
DES
AES
SHA-2
Review Question 10
Which of the following symmetric algorithms would use a
block cipher of 128-bits?
RSA
3DES
AES
DES
ECC
Blowfish
Domain 2
Network Security
Domain Objectives
A Security+ candidate is expected to:
OSI Model
OSI
Usage
OSI Model
User
Programs
Protocol Examples
Hardware
7-Application
FTP
Telnet
SMTP
HTTP
SIP
6-Presentation
JPG
MPEG
GIF
MP3
HTML
5-Session
RPC
SQL
NFS
NetBIOS
ASP
4-Transport
SCTP
TCP
UDP
NetBEUI
RTP
3-Network
IGMP
ICMP
IPX
IPv4, v6
IPsec
Router
2-Data Link
PPP
PPTP
L2TP
ARP
802.3
1-Physical
USB
DSL
Firewire
ISDN
ATM
Cable
7
6
5
4
3
2
1
Application
Presentation
Session
Transport
Network
Data Link
Physical
TCP/IP Model
Application
3
2
Host to Host
Internet
Network Interface
Encapsulation
Networking Models
OSI Model
TCP/IP Model
Encapsulation Example
PDUs
Application
HTTP
Presentation
HTML
Session
ASP.NET
Segment
Transport
Packet
Network
Frame
Data Link
Bits
Physical
SRC
MAC
SRC
Port
DST
Port
PDUs
SRC
IP
DST
IP
Protocol
Number
Segment
DST
MAC
Ethernet
Packet
FCS
10100010010101001101010110100110011010101
Common Definitions
Addresses
Identifies networks and devices on a network
Messages
Typically addressed to both the device and the port number of
the service
Port Numbers
Identifies specific services running on a device
Common Definitions
Socket
IP address:port number (147.63.12.2:8080)
Socket Pairs
Client IP address:port number and the Servers IP address:port
number
177.41.72.6:3022 communicating to 41.199.222.3:80
Half-duplex communication
Virtual circuit
Port Assignments
Assigned by IANA (Internet Assigned
Numbers Authority)
http://www.iana.org/assignments/port-numbers
Service
PORT
Service
FTP Data/Control
161/162
SNMP
22
SSH/SFTP/SCP
389
LDAP
23
Telnet
443
HTTPS / SSTP
25
SMTP
465
SMTPS
53
49
67/68
DNS
TACACS+
DHCP
514
636
989/990
SYSLOG
LDAPS
FTPS (Implicit)
69
TFTP
993
IMAPS
80
HTTP
995
POP3S
88
Kerberos
1701
L2TP
110
POP3
1723
PPTP
123
NTP
1812
RADIUS
137-139, 445
NetBIOS
3389
RDP
143
IMAP v4
5060
SIP
TCP
Transmission Control Protocol
SCTP
Stream Control Transmission Protocol
UDP
Provides best effort delivery
Connectionless
Lacks flow control
Lacks error recovery
TCP
Reliable, connection-oriented protocol
3-way handshake
Provides flow control
Sliding window
SYN
SYN
ACK
ACK
SCTP
Connection-oriented
Resources aren't allocated until 4-way handshake is completed
Multi-homing
Multiple NICS to transmit and receive with
Multi-streaming
Streaming data
Telephony
INIT
INIT
ACK
COOKIE
ECHO
COOKIE
ACK
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
ICMP
Used for network troubleshooting
0- Echo Reply
3- Destination Unreachable
8- Echo
30- Traceroute
IP Addressing
Unique identifier to differentiate one host from another
host
A name indicates what we seek. An address indicates where it is. A route
indicates how to get there. The Internet Protocol deals primarily with
addresses.
IPv6
128-bit address
IPv4 Addressing
Made up of a 32-bit address or four-octet address
Referred to as dotted decimal representation of a binary number
Example: the IP address of 195.143.67.2 is actually the following
binary:
11000011
195
10001111
143
01000011
67
00000010
2
Class A
10.0.0.0 10.255.255.255
Class B
172.16.0.0 172.31.255.255
Class C
192.168.0.0 192.168.255.255
APIPA
Automatic Private Internet Protocol Address
Assigned by own operating system when a static or dynamic IP
address has not been assigned
169.254.0.0 169.254.255.255
Non-routable IP address
Allows peer-to-peer communications within a workgroup
Subnet Mask
Determines:
192
168
10
20
IP Address: 11000000
10101000
00001010
00010100
11111111
11111111
00000000
255
255
255
Network
Host
CIDR
Classless Inter-Domain Routing
IPv4 Subnetting
Used to divide large groups of hosts within a larger network
into smaller, manageable network collections
More efficiently manages traffic
Creates multiple, smaller broadcast domains
IPv4 Subnetting
Example 192.168.10.20/24
IP address + subnet mask defines IP schema
IP Address:
Subnet Mask:
192
168
10
20
11111111
255
.
.
11111111
255
.
.
11111111
255
.
.
00000000
0
nnnnnnnn
nnnnnnnn
nnnnnnnn
hhhhhhhh
Network:
192
168
10
Host 1
192
168
10
Host + 1
192
168
10
h+1
Host 254
192
168
10
254
192
168
10
255
Broadcast:
IPv4 Subnetting
Example: from 192.168.10.20/24 to /26
IP Address:
192
168
10
20
Subnet Mask:
255
255
255
192
nnnnnnnn
nnnnnnnn
nnnnnnnn
nnhhhhhh
Network #1:
192
168
10
Broadcast #1:
192
168
10
63
Network #2:
192
168
10
64
Broadcast #2:
192
168
10
127
Network #3:
192
168
10
128
Broadcast #3:
192
168
10
191
Network #4:
192
168
10
192
Broadcast #4:
192
168
10
255
Improved troubleshooting
Faster to trace a problem on a subnet
Flexibility
Customization of number of hosts on a subnet
IPv6 Addressing
3FFE:0B00:0800:0002:0000:0000:0000:000C
3FFE:B00:800:2::C
IPv6 Addresses
Global address
Link-local address
Local address
Loopback address
169.254.0.0/16
Self-configured
Non-routable.
Begins with fe80 in the first block.
iSCSI
Internet Small Computer System Interface
IP-based protocol
Encapsulates SCSI commands into IP
Routable across networks
Authentication
Uses CHAP by default
Eavesdropping issues
Use VLANs and IPsec
Fibre Channel
SAN communication protocol
High speed: 16 Gbps
Uses fiber optics or copper-based wiring
Expensive hardware and cabling
Fibre Channel switch
Natural isolation
Separate architecture isolates backup data from the rest of the network
FCoE
Fibre Channel over Ethernet
Ethernet and Fibre Channel standards are modified and then
merged into a single standard
Fibre Channel commands are encapsulated inside of modified Ethernet
frames
Can be used within the Ethernet LAN but is not routable by itself to other
networks
Supports 10Gbps Ethernet support
NetBIOS
Network Basic Input Output Systems
DNS
Domain Name Service
IETF standard for FQDN to IP address lookups
Fully Qualified Domain Name
Root
TLDs
Intermediates
DNS
Local host file
Stores information about nodes in a network
etc/hosts
DNS
DNS Zones
The portion of the DNS domain namespace over which a DNS
server has authority
DNS servers zone can comprise:
A single domain
Some or all subdomains
Multiple separate domains
ACME
Corp
Sales
Engr
QA
Acct
Retail
Web
4 zones 9 domains
HR
DNS
DNS Zone Transfers
Publishes information about the domain and the name servers of
any domains subordinate
A hacker can gain sensitive information about all systems within
the domain
Footprinting
DNSSEC
DNS Security
Zone transfer tamper protection mechanism
Digital signatures
Mitigates
Man-in-the-Middle attacks between DNS servers
DNS poisoning
A- IPv4 address
MX- Email server
NS- authoritative name servers
AAAA - IPv6 Address
DNS Poisoning
Incorrect DNS data that is injected into a DNS namespace
Redirects traffic to incorrect sites
Can be also called DNS Cache poisoning
DNS Kiting
DNS Tasting
Legitimate 5-day grace period
DNS Kiting
Attacker cancels domain registration before 5-day grace period
ends, then later re-registers
Fraud: domain is never paid for
Ties up legitimate domain names from being hosted legitimately
Email
Email protocols
SMTP
POP3
IMAP
SSL/TLS
S/MIME
PGP
SMTP
Simple Mail Transport Protocol
Delivers email to an email server on TCP 25
Plaintext issues
Use SMTPS on TCP 465
SPAM issues
Disable HTML formatting, use text-based only
Avoid SMTP open relay
Implement blacklisting
Implement whitelisting
Malware issues
Use antivirus scanning
Downloading Email
POP3
Post Office Protocol version 3
TCP 110 plaintext issue
POP3S uses TCP 995
IMAP4
Internet Message Access Protocol version 4
TCP 143 plaintext issue
IMAPS uses TCP 993
PGP
Pretty Good Privacy
Decentralized
P2P Web of Trust
PGP-based Digital Certificates
Peers Digital Signatures
Hybrid cryptosystem
Asymmetric Cryptography
Provides Key Distribution of the symmetric session key
X.509v3 Digital Certificates
Mutual Authentication
Symmetric Cryptography
MAC
HTTPS 443
SMTPS 465
LDAPS 636
IMAPS 993
Vulnerabilities
Smaller key sizes because no longer updated
Compromised root CAs
Outdated Digital Certificates
Hybrid cryptosystem
Asymmetric Cryptography
Provides Key Distribution of the symmetric session key
X.509v3 Digital Certificates
Mutual Authentication
Symmetric Cryptography
HMAC
HTTPS Process
CA
SSH
Secure Shell
Secures remote access and remote terminal communications
Secure replacement for Telnet and FTP
Protects against man-in-the-middle attacks and spoofing
SSH suite (SCP, SSH, SFTP, Slogin)
Uses TCP Port 22
OpenSSH, Putty
Hybrid Cryptosystem
Symmetric cryptography for encryption
PKC for connection/authentication
FTP
File Transfer Protocol
FTP Alternatives
File Transfer Protocol Secure (FTPS)
Session is encrypted using SSL/TLS protocols
TCP 989 and 990
Telephony
Streaming data
Web conferencing
VoIP
Video chat
CCTV
Supporting protocols:
SIP
RTP
SCTP
VoIP
Voice over Internet Protocol
IP-based protocol that converts analog voice signals into digital
packets.
Uses SIP to manage session
Issues:
Eavesdropping
SPIT
VoIP Protocols
Session Initiation Protocol (SIP)
Decentralized, peer-to-peer, multimedia communication protocol
Based on HTTP, works at Application layer
Ports 5060 (plaintext), 5061 (TLS)
NAC
Network Access Control
Evaluates system security status before allowing a connection to
the network
Anti-virus status
System update level
Configuration settings
Software firewall enabled
NAC
Quarantine Portal
Redirects to a web page with hyperlinks to fix parts of the system
that arent in compliance
Patch Management
Antivirus
Application Whitelisting
NAC
Captive Portal
Redirects to satisfy identification, authentication, authorization,
or policy requirements
Hotel network requiring the visitor to provide credentials
User gets redirected to the hotels login page to provide room number, last
name, and password
Remote Administration
Network backbone administration ports
Console port (line con 0)
Auxiliary port (line aux 0)
Virtual terminals (line vty 0 4)
SNMPv3
Telnet
SSH
RDP / Terminal Services
SNMP
Simple Network Management Protocol
Application Layer protocol that manages and monitors devices in
a network
Ports 161/162
Telnet
Command line interface used for remote administration of
TCP/IP-based systems on a network
Application Layer protocol
Passes data in plaintext
Use either SSH or TLS instead
TCP port 23
RDP
Remote Desktop Protocol
Terminal Services
Tunneling
Virtual dedicated connection between two systems or
networks
Encapsulation within a routable protocol
Can send private network data across a public network by encapsulating
data into other packets
May or may not include protection mechanisms such as encryption
Why tunnel?
Tunneling Protocols
Point-to-Point Protocol (PPP)
Used for establishing remote connections over a serial line or dialup connection
Allows TCP/IP traffic to be transmitted over telecommunication
lines
Dial-up modems
No encryption
EAP, CHAP, or PAP Authentication
Tunneling Protocols
Point-to-Point over Ethernet (PPPoE)
PPP encapsulated inside of Ethernet
IETF standard that works at the Data Link layer
Creates a direct, virtual point-to-point connection (PPP) between two
systems over a multipoint-aware network (Ethernet)
PPPoE Discovery
Provides:
Authentication
PAP, CHAP, EAP
Encryption
Compression
PPTP
Point-to-Point Tunneling Protocol
Encapsulates and encrypts PPP over IP packets
Negotiation in the clear
After negotiation is completed, channel is encrypted
Uses MPPE to encrypt data
Tunneling Protocols
Layer 2 Forwarding (L2F)
Tunneling protocol created by Cisco to tunnel PPP frames
Provides authentication only
Mutual Authentication
No data encryption
Layer 2 Data Link layer
UDP port 1701
L2TP
Layer 2 Tunneling Protocol
Combines L2F and PPTP at Layer 2
Message types
Control Messages: Establish, maintain, and tear down tunnels
Data Messages: Encapsulates PPP frames
No data encryption
Use IPsec
Authentication: PAP, CHAP, MS-CHAP, EAP-TLS
Examples:
PPTP
L2TP
SSH
IPsec
IPsec
IP Security
Most widely deployed VPN technology
Works at Layer 3 to protect IPv4 or IPv6 traffic
Authentication
X.509 Digital Certificates
Pre-shared keys
Kerberos
MAC/HMAC
Anti-replay services
IPsec Modes
Transport Mode
Designed for end-to-end encryption of data
Packet data is protected, but the header is left intact
Tunnel ModeIP
Data
IP
Data
IPsec Protocols
Authentication Header (AH)
Offers authentication and integrity services
HMAC
SHA or MD5
AH Transport Mode
IP Protocol #51
NAT issues
IP
HDR
NAT-T
AH
HDR
L4
HDR
L4
DATA
Integrity Check
AH Tunnel Mode
New IP
HDR
AH
HDR
Old IP
HDR
L4
HDR
Integrity Check
L4
DATA
IPsec Protocols
Encapsulating Security Payload (ESP)
Offers authentication, integrity, and confidentiality
Uses either AES, 3DES, or DES
IP protocol #50
IP
HDR
L4
HDR
L4
DATA
ESP
Trailer
ESP
AUTH
Encrypted
Integrity Check
ESP
HDR
Old IP
HDR
L4
HDR
L4
DATA
Encrypted
Integrity Check
ESP
Trailer
ESP
AUTH
ISAKMP
Internet Security Association and Key Management
Protocol
Defines the framework of procedures and packet formats that
establish, negotiate, modify, and delete Security Associations
UDP port 500
IKE
Internet Key Exchange
Provides Key Management and Key Exchange
Standard automated method for creating and negotiating shared secret
keys in IPsec
Interference Issues
Electromagnetic Interference (EMI)
External interference source
Power cables, fluorescent lights
Crosstalk
Internal interference source
Compromising emanations
Shielding and twisted wire pairs (CAT5)
Eavesdropping
Splicing Attack
Physical hacking of cable
Vampire taps
Packet Sniffing
Protocol Analyzer
Promiscuous Mode
Coaxial Cabling
BNC Connector
Vulnerabilities:
STP/UTP
Unshielded Twisted Pair (UTP) and Shielded Twisted Pair
(STP)
Easiest and cheapest to install
Most popular: CAT 5e/6
Vulnerabilities:
Electromagnetic Interference (EMI)
UTP is the more vulnerable of the two
Wire tapping
How and where wires are run in a building
CAT Standards
Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP)
Category Speed
Usage
CAT 1
Voice
POTS
CAT 2
4 Mbps
Token Ring
CAT 3
10 Mbps
10Base-T
CAT 4
CAT 5
100 Mbps
10-, 100Base-T
CAT 5e
1000 Mbps
CAT 6
1000 Mbps
Wireless Networking
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance
802.11
Wireless Local Area Network (WLAN)
802.15
Wireless Personal Area Network (WPAN)
802.16
Wireless Metropolitan Area Network (WMAN)
802.11 Standards
Protocol
Frequency
Throughput
Modulation
802.11
2.4 GHz
2 Mbps
FHSS
802.11a
5 GHz
54 Mbps
OFDM
802.11b
2.4 GHz
11 Mbps
DSSS
802.11g
2.4 GHz
54 Mbps
OFDM / DSSS
802.11n
*600 Mbps
OFDM / DSSS
802.11ac
5 GHz
*1.69 Gbps
OFDM / DSSS
Modulation Types
FHSS
Frequency Hopping Spread Spectrum
DSSS
Direct Sequence Spread Spectrum
OFDM
Orthogonal Frequency Division Multiplexing
Wireless Terminology
Wi-Fi
Access Point
Association
Beacon Frame
SSID (Service Set ID)
BSSID (Basic Service Set ID)
ESSID (Extended Service Set ID)
YAGI
Transmitter Power
Attenuation
PARABOLIC (GRID)
PANEL
WLAN Authentication
Establish WLAN authentication requirements
Open
Pre-Shared Key (PSK)
IEEE 802.1X
Extensible Authentication Protocol (EAP)
Mutual Authentication
MAC Filtering
WEP Issues
Static Keys
Small key sizes
Replay attacks
Evil Twin attacks
WPA/WPA2 Modes
IEEE 802.11i Modes
Personal (WPA-PSK)
Pre-Shared Key grants access to WLAN
Residential WLANs
Enterprise (WPA-802.1X)
Centralized Key Management
Uses EAP-variant 802.1X authentication server
PEAP / EAP-TLS / EAP-TTLS / EAP-FAST
WAP
Wireless Application Protocol
Commonly used in small mobile devices such as cell phones that
have a web browser
Functions are equivalent to TCP/IP Suite
WAP 1.x uses WTLS
Gap in the WAP
Physical Devices
Layer 1 Physical
Layer 2 Data Link
Layer 3 Network
Upper layers
Layer 1
NIC
Connects host to the network (Layer 1)
MAC address stored in firmware (Layer 2)
Modem
Connects host to the telephone network
Modulate-Demodulate
Hub
Allows nodes to communicate with each other
No path determination
Layer 2
Switch
Connects multiple network segments
Trunking ports
Access ports
Loop Protection
Loops
More than one Layer 2 path between two endpoints
Affects network availability: can bring down the network
Broadcast Storm
Loop Protection
Manages switch ports automatically
Use Spanning Tree Protocol (STP) on switches
Prevent loops in the LAN
Selects the fastest network links
STP will failover to an alternate link if there is a failed link
Broadcast Storm
Frames are broadcast, received and rebroadcast by each
switch, resulting in the frame never being delivered
Can cause severe network congestion
Degrades switch processing
Switch memory depletion
Mitigation:
IEEE 802.1D STP
Subnetting
VLANs
VLAN
Virtual LAN
Devices on the same physical network are divided into multiple
logical networks
Segments users or groups on a network
Created using VLAN-capable switches
Benefits:
Decreases broadcast traffic
Reduces traffic interception
Better management of network assets
VLAN3
172.16.2.0/24
.41
.22
.26
VLAN2
192.168.0.0/24
.3
.42
VLAN1
10.10.10.0/24
.43
Router
SRC:192.168.1.43
DST:192.168.1.42
Different VLANs
VLAN4
192.168.1.0/24
VLAN3
172.16.2.0/24
.41
.22
.26
VLAN2
192.168.0.0/24
.3
.42
VLAN1
10.10.10.0/24
.43
Router
SRC:192.168.1.43
DST:172.16.2.3
VLAN3
172.16.2.0/24
.41
.33
.3
.42
.22
.26
VLAN2
192.168.0.0/24
VLAN1
10.10.10.0/24
.43
Router
SRC: 192.168.10.43
DST: 192.168.10.33
VTP
VLAN Trunking Protocol
Allows switches to see all the VLANs within the whole network
Birds eye view of nested VLANs
Layer 2 protocol
QinQ attacks
Layer 3
Router
Change Control
Save each configuration change and document all modifications
ACL
Access Control List
Rule based access control configured on an interface to restrict
access to resources
Anti-spoofing filter
Last line is the implicit deny statement
Firewall Rules
Firewall Rules
Allow a computer to send traffic to, or receive traffic from,
programs, system services, computers, or users
Inbound traffic (ingress)
Outbound traffic (egress)
Internet
Source IP:
Dest IP:
192.168.1.1
9.8.7.6
LAN
RTR
Client Client Client
Destination IP
Source IP
Destination port
Source port
Flag (TCP only)
Destination IP
Source IP
Destination port
Source port
Flag (TCP only)
SPI Firewall
Stateful Packet Inspection Firewall
Tracks each TCP connection in a state table
May examine the header information and/or the contents of the
packet
Filtering is based on rules and on context that has been
established by prior packets
Works at Layers 3 and 4
SPI Firewall
Stateful Inspection Firewall
Active Sessions Table
Access Control List
Destination IP
Source IP
Destination port
Source port
Flag (TCP only)
Destination IP
Source IP
Destination port
Source port
Flag (TCP only)
SOCKS
Network service/protocol designed to allow clients to
communicate with Internet servers through firewall
Often uses encryption
Proxy Server
Proxy Server
A border device used to protect security zones
Can be configured to:
Improve performance by caching content locally
Use ACLs to filter content for inbound/outbound traffic
NAT
Network Address Translation (NAT)
Translates a private address into a public address
Allows sharing of a single public IP address or a pool of public IP
addresses at the network gateway
SNAT
DNAT
PAT/overloaded NAT
NAT
147.51.217.1
147.51.217.2
147.51.217.3
192.168.10.10
INTERNET
example.com
Original Request
192.168.10.12
example.com
example.com
147.51.217.1
192.168.10.12
147.51.217.1
192.168.10.11
Rewritten Request
192.168.10.12
example.com
Original Response
147.51.217.1
example.com
PAT
Port Address Translation (PAT)
Allows many hosts to share a single IP address by multiplexing
streams differentiated by TCP/UDP port numbers
Ports are selected at random for each inside address which generates a
request
PAT
147.51.217.1:58753
INTERNET
example.com
Original Request
192.168.10.12
192.168.10.10
example.com
example.com
147.51.217.1:58753
192.168.10.12
192.168.10.12
147.51.217.1:58753
192.168.10.11
Rewritten Request
example.com
Original Response
147.51.217.1:58753 example.com
VPN Concentrator
Device that handles inbound VPN tunnels
All-in-One Appliance
Device that combines numerous security functions into one
Example: Cisco Adaptive Security Appliances (ASA) 5500s
ASA combines the
PIX firewall (Routing, ACL, NAT)
4200 Series IPS (IPS functions)
3000 Series VPN concentrator (VPN management)
Flood Guards
A network device (firewall) designed to thwart DDoS attacks
Fraggle
Smurf
Syn Flood
Authentication DOS attacks
Load Balancers
Distributes workload across multiple computers or network
links
Can be used to implement failover
In the event of server or application failure, load balancers
facilitate automatic failover to ensure continuous availability
Can be hardware or software-based
Examples: Barracuda, Cisco, Foundry, F5
Server Clustering
Group of independent servers that work together to
increase the availability of applications and services
Failover cluster
Minimizes disruptions
Mitigates Single Point of Failure
Network Monitoring
Promiscuous Mode
Packet capture and analysis
Protocol Analyzers
NIDS / NIPS
HIDS / HIPS
Protocol Analyzer
Hardware or software utility for capturing and analyzing
network traffic
IDS
Intrusion Detection Systems (IDS)
Monitoring system which collects and analyzes traffic
Used to Detect:
Attacks coming from outside the network
Attacks and misuse from within the network
IDS Types:
Network Based
Host Based
Anomaly (Heuristics)
Baseline
Must learn what activities are normal and acceptable
NIDS
Network-based IDS
Monitors network traffic in real time
Analyzes protocols and other relevant packet information
Particularly suited for detecting port scanning and DDoS attacks
Sensors are deployed and usually report back to a system running a
management console
Can send alerts or terminate connections
Systems with sensor application installed are usually dual homed
NIDS Placement
Server
Server
Server
5
Switch
Router
3
Firewall
DMZ
Wireless AP
Computer
Workstation
Server
Modem
Internet
Mirroring Port
Allows network monitoring across a switch
Frames are duplicated and delivered to the mirroring port of the
switch
Ideal connection for a protocol analyzer or NIDS
Needs to be configured
Effects performance of the switch
HIDS
Host-based IDS
Installed on an individual hosts
Detects attacks against the host and the level of their success
Relies on the auditing and logging capabilities of the operating system
Passive IDS
Looks for security breaches, but effectively takes no action
Logs suspicious activity
Generates alerts if the attack is deemed to be severe
Active IDS
Can be configured to take specific actions
Can automate responses including dynamic policy
adjustment and reconfiguration of supporting network
devices
Might be too late
IPS
Intrusion Prevention System
Monitors network traffic for malicious activity and can block,
reject, or redirect traffic in real-time
Installed in-line
Dual-homed
Encrypted traffic is not inspected
IDS Evaluations
False Positives
IDS reports legitimate activity as an intrusion
Poorly tuned
bad/outdated baseline
False Negatives
IDS fails to detect malicious network activity
Clipping Levels
The set security threshold before a security service reacts
Examples:
IDS Tuning
Failed logon attempts to the admin account will not be reported, unless it
occurs three times in a row over a short period of time
Virtualization Technology
Multiple computers on one physical platform
Virtualized environments are used to help secure networks
Controlled by Hypervisor
Sandbox security model
VM Escape attacks
Hypervisors
Type 1 Hypervisor (native or bare-metal)
Run directly on the host's hardware to control the hardware and
to monitor guest operating-systems
Examples: HyperV, ESXi
Type 2 (hosted)
Run within a conventional operating-system environment as a
separate application
Examples: Virtual PC, VMWare Player
Virtualization Benefits
Computing elasticity
Dynamic, on-demand allocation of systems
Compartmentalization
Partitioning in support of damage control
Containment
Natural isolation of potential compromises
Snapshots
VM rollback capability
Reduction of costs
Virtualization Vulnerabilities
Single point of failure
Physical host fails, they all fail
VM files are all in one spot
Insider Access
VM Escape exploits
Exploitable communication channels
Packet sniffing
Spyware
Cloud Computing
Computing is "in the cloud" (internet)
Software, data access, and storage services that do not require
user knowledge of the location and configuration of the system
delivering services
Three layers
Software as a Service (application)
Platform as a Service (platform)
Infrastructure as a Service (infrastructure)
Platform as a Service
Infrastructure as a Service
Public Cloud
The cloud infrastructure is provisioned for open use by the
general public (Pay-as-you-go Model)
Community Cloud
The cloud infrastructure shared by several organizations which
supports a specific community
Inadequate Encryption
VPN Tunnel
Whole disk encryption
File-level encryption
Domain Objectives
A Security+ candidate is expected to:
Implement security configuration parameters on network devices
and other technologies
Apply and implement secure network administration principles
Explain network design elements and components
Implement common protocols and services
Implement wireless networks in a secure manner
Explain types of wireless attacks
Questions?
Review Question 1
Configuring the mode, encryption methods, and security
associations are part of which of the following?
IPsec
Whole disk encryption
IEEE 802.1X
PKI
Review Question 2
A server is configured to interface with both VLAN1 and
VLAN16. VLAN1 communication works fine, however
VLAN16 communication fails. Which of the following MUST
be implemented?
The servers network switch port must be enabled for 802.11X on
VLAN16
The servers network switch port must use VLAN Q-in-Q for
VLAN16
The servers network switch port must be 802.1q untagged for
VLAN16
The servers network switch port must be 802.1q tagged for
VLAN16
Review Question 3
Which of the following protocols allows for secure transfer
of files? (Select TWO).
ICMP
SNMP
SFTP
SCP
TFTP
Review Question 4
Which of the following is a step in deploying a WPA2Enterprise wireless network?
Review Question 5
Which of the following BEST describes a common security
concern for cloud computing?
Data can be accessed by third parties who have compromised the
cloud platform
Antivirus signatures are not compatible with virtualized
environments
Network connections tend to experience latency issues
CPU and memory resources could be consumed by other servers
in the same cloud
Review Question 6
A security administrator is segregating all web-facing server
traffic from the internal network and restricting it to a
single interface on a firewall. Which of the following BEST
describes this new network?
VLAN
DMZ
VPN
Subnet
Extranet
Review Question 7
Which of the following must Jane, a security administrator,
implement to ensure all wired ports are authenticated
before a user is allowed onto the network?
Review Question 8
Pete, the security administrator, wants to ensure that traffic
to the corporate intranet is secure using HTTPS. He
configures the firewall to deny traffic to port 80. Now users
cannot connect to the intranet even through HTTPS. Which
of the following is MOST likely causing the issue?
The web server is configured on the firewall's DMZ interface.
The VLAN is improperly configured.
The firewall's MAC address has not been entered into the
network ACL.
The firewall executes an implicit deny.
Review Question 9
Which of the following should a security administrator
implement to prevent users from disrupting network
connectivity if a user connects both ends of a network
cable to different switch ports?
VLAN separation
Access control
Loop protection
Split horizon
Review Question 10
A small company needs to invest in a new expensive
database. The company's budget does not include the
purchase of additional servers or personnel. Which of the
following solutions would allow the small company to save
money on hiring additional personnel and minimize the
footprint in their current datacenter?
Domain 3
Access Control and Identity
Management
Domain Objectives
A Security+ candidate is expected to:
Compare and contrast the function and purpose of authentication
services
Given a scenario, select the appropriate authentication,
authorization, or access control
Install and configure security controls when performing account
management, based on best practices
Identification
Claim of who we are
User identification guidelines
Uniqueness
Non-descriptive
Issuance secure
Authentication
Proving your identity is true
Must maintain a 1:1 relationship between user and the
authentication mechanism
Authentication systems or methods are based on one or more of
these five factors:
Authentication Types
Examples
Password or PIN
Something you do
Keystroke Authentication
Location
Authentication
Something you know (Type 1)
Most common, cheapest, and easiest to implement
PINs, passwords, passphrases
One-time Passwords (OTP)
Self-service password resets
Strong passwords
Authentication
One-time Password (OTP)
Password is used for only one login instance
Temporary password
Authentication
Self-service password reset system
Users can reset their own password
Implement Identity Proofing
Implement Strong Authentication
Authentication
Password Policy
Authentication
Strong Passwords
Entropy/randomness
Uppercase and lowercase letters, numbers, and special characters
No part of username or e-mail
Number of Characters
14
~ 920
10
8.4 x 1017
Authentication
Something you have (Type 2)
ATM card
Smart card
CAC / Fortezza card
Digital Certificates or Tokens
Authentication
Token-based Authentication
Small piece of data that holds a sliver of information about the
user
Used to identify and authenticate the user
May contain the rights and access privileges of the token bearer (access
token)
Similar to certificates
Could be a cookie
Authentication
Token-based Authentication categories
Static Token
Dynamic Token
Synchronous
Asynchronous
Authentication
Static Password Token
Passive Token
Swipe card, USB dongle
Authentication
Synchronous Dynamic Token
Active Token
User enters a password or PIN
Considered a one-time password
Two types:
Time-based
Synced with internal clock
Counter-based
Authentication service will advance to the next value
Authentication
Asynchronous Dynamic Token
Active Token
Considered a one-time password
Considered event tokens
Authentication
Smart Cards
Used for access control and security purposes
Usually contains a small amount of memory that can be used to
store permissions and access information.
Common Access Card (CAC) issued by DoD for ID/authentication
for military, contractors, and non-DoD employees
Personal Identification Verification (PIV) like the CAC for federal
employees and contractors
Authentication
Something you are (Type 3)
Biometrics
Inherent non-repudiation
Issues:
Performance
Difficulty
Reliability
Acceptance
Cost
Revocation
Authentication
Biometric Error Rates
Type I Error: False Reject Rate (FRR)
Type II Error: False Accept Rate (FAR)
Crossover Error Rate (CER)
The point at which the FRR equals the FAR
The smaller the value, the more accurate the system
Biometric Examples
Biometric
Fingerprints
(Physiological)
Iris
(Physiological)
Retina
(Physiological)
Face
(Physiological)
Hand
(Physiological)
Voice
(Behavioral)
Signature
(Behavioral)
Advantage
Disadvantage
Easy to use
Expensive
Intrusive and expensive
Easy to use
Accuracy issues
Easy to use
Accuracy issues
Authentication
Something you do
Action a person must take to complete the authentication process
Unlock Patterns (Mobile Devices)
Connecting the dots
Keystroke Authentication
Pattern Analysis that examines how you type.
Authentication
Somewhere you are
Geolocation Tracking (GPS)
Notify Credit Card companies when traveling.
Mutual Authentication
Both endpoints authenticate to each other
Mitigates Evil Twin attacks
Ensures client is authenticating to an authentic server
SSL / TLS
PEAP / EAP-TLS / EAP-TTLS, EAP-FAST, LEAP
Kerberos
IPSec
MS-CHAPv2
Strong Authentication
Uses multiple authentication requirements
Provides layered defense
Usually uses multiple instances of the same authentication factor
Often used in identity proofing
Multifactor Authentication
When two or more authentication methods are part of the
authentication process
A system that requires a smart card and a password/pin is
referred to as a two-factor authentication system
A multifactor system can consist of
two-factor system
three-factor system
Password + PIN
Multi-factor
Two Factor
password
Strong
Authentication Scenario
Single Factor
Authentication
Authentication
Certificate-Based Authentication
More secure than password-based authentication
Can significantly reduce logon time for users
A certificate is mapped to a user account in one of two ways:
One-to-one Mapping
Many-to-one Mapping
Authentication Protocols
PAP
Password Authentication Protocol
Sends the username and password to the authentication server in
plain text
SPAP
Shiva Password Authentication Protocol
encrypts the username and password
Authentication Protocols
CHAP
Challenge Handshake Authentication Protocol
Challenge / Response 3-way handshake
Minimizes password exposure
nonce
Minimizes man-in-the-middle attacks
Intermittent challenges
Peer
Request
Challenge (nonce)
Response
Authenticator
Authentication Protocols
TOTP
Time-Based One-Time Password
Algorithm uses a time-based fact to create unique passwords
HOTP
HMAC-Based One-Time Password
Algorithm is based on using a HMAC algorithm
Authentication Protocols
New Technology LANMAN (NTLM)
Challenge Response Authentication replacement for older
LANMAN protocol
Protocol used for authentication when Kerberos is not applicable /
available
NTLM version 2
Uses MD5 for enciphering
Available since NT4 Service Pack 4
SSO
Single Sign On
Mechanism that allows subjects to authenticate only once
Once authenticated, subjects can use the network/resources without
being challenged again
Purpose is to give users access to all the applications and systems they
need when they log on
Kerberos
Kerberos v5
Created by MIT
Enterprise architecture
Realm
Principals
Centralized authentication server
Key Distribution Center (KDC)
Authentication Service (AS)
Ticket-Granting Server (TGS)
Ticket-Granting Ticket (TGT)
Remote Ticket-Granting Server (RTGS)
UDP port 88
Kerberos Process
1.
2.
3.
4.
Request is made to AS
AS replies with a TGT and session key
TGT is sent to TGS along with an
authenticator generated by client and
encrypted with session key
TGS replies with a Ticket which is
encrypted with the secret key of the
service and a service session key
Resource Server
5.
6.
KDC
Authentication
Server (AS)
(Processes)
Data
Ticket Granting
Server (TGS)
Kerberos Benefits
Provides centralized SSO
Mutual authentication
Confidentiality of authentication credentials
Symmetric Key Cryptography
Anti-replay services
Encrypted timestamps (authenticators)
HMAC
Kerberos Vulnerabilities
KDC is a single point of failure
Tickets are cached
Malware
Spyware
Directory Services
Allows centralized security management
Provides a logical means of organizing resources (users, printers,
etc.)
Uses ACLs to control access to resources
LDAP
Lightweight Directory Access Protocol
Standardized directory access protocol that allows queries to be
made of directories
Follows the X.500 standard light
Uses a hierarchical design with a root object at the top followed
by Organization and OU containers for logical organization
Port 389
Port 636 LDAP over TLS/SSL
LDAP
LDAP Authentication
Anonymous Authentication
Only a username is required to authenticate
Simple Authentication
Username and password in the clear
Uses port 389 by default; port 636 over SSL
LDAP
LDAP Vulnerabilities
Man-in-the-middle
Compromise of username/password
Deploy authentication with SSL or SASL
Employ strong passwords and educate users
Active Directory
Microsoft enterprise architecture
Based on LDAP
Uses Kerberos for enterprise authentication
Tree structure to allow sharing and control
Naming Conventions
LDAP DN/RDN Naming
cn = common name
ou = organizational unit
dc = domain component
o = organization
c = country
Active Directory
cn = common name
ou = organizational unit
dc = domain component
(not supported)
(not supported)
Tree Structure
LDAP DN Name:
cn=William Gates, ou=NCIOC, ou=staff, dc=335sig, dc=army, dc=mil
Canonical Name:
335sig.army.mil/staff/NCOIC/William Gates
Federations
A collection of autonomous computer networks that agree
on a common set of operating standards
Federated Identity Management
Means of linking a users identity with their privileges in a manner
that can be used across business boundaries
Centralized
SAML
Security Assertion Markup Language
A scalable, open standard based on XML
Provides:
Identification
Authentication (SSO)
Authorization
Roles:
Principal
Identity Provider
Service Provider
Remote Access
Getting access to internal network resources from outside
the network
Create a Remote Access Policy
AAA Remote Authentication
Remote Access Servers
RADIUS
TACACS+
Diameter
Remote Access
Remote Access Policies
Outlines and defines acceptable methods for users remotely
connecting to the internal network
Should cover:
All available methods for remote access
When they can be accessed
By whom
Remote Access
Remote Authentication
Communication with a remote host through a dial-up connection
or VPN tunnel
Clients connect to a Remote Access Server (RAS) to gain access to
remote resources or a remote network
Can support modems, broadband, and VPN connections
Remote Access
Remote Access Servers (RAS)
Hardware/software that enables remote access to a network of IT
devices
Authentication protection
Callback / Caller ID
RADIUS
Remote Authentication Dial-In User Service
Centralized system for authentication, authorization, and
accounting (AAA)
Supports PAP, CHAP, and EAP
Only password is encrypted
Authentication and Authorization combined
Uses UDP port 1812 for Authentication
Uses UDP port 1813 for Accounting
RADIUS
Uses IEEE 802.1X
Supplicant
RADIUS Client
Typically a network backbone access device
Dial-up Server, VPN Concentrator, switch, or WAP
RADIUS Server
Stores all user authentication and network service access information
Ability to implement auditing and accounting
TACACS+
Terminal Access Controller Access Control System
Replaced XTACACS
AAA performed separately
Allows use of multi-factor authentication
Allows a RAS to forward user credentials to an authentication
server
Encrypts entire body of authentication packet
Uses TCP port 49
DIAMETER
Replacement for RADIUS
Better performance and encryption
Security provided by TLS or IPSEC
32 bit billions of Attribute Value Pairs (AVP) can support
mobile remote users
Better for roaming support
Handles various LAN/WAN protocols
MAC
Mandatory Access Control
Nondiscretionary method for information access
Reference Monitor: access to objects based on clearance and need to
know
Objects are assigned security labels
Subjects are assigned clearance levels
DAC
Discretionary Access Control
Creator / owner decides access
Network users have some flexibility regarding how information is accessed
Allows users to share information dynamically with other users
RBAC
Rule-Based Access Control
Uses preconfigured rules to grant access
ACLs
Normally found in firewalls and routers
RBAC
Role-Based Access Control
Access granted by job function or by responsibility
Each employee may have one or more roles that allow access to
specific information
Moving from one role to another, access for the previous role will
no longer be available
Review frequently to avoid privilege creep
Comparison
Methods
Mandatory Access Control (MAC)
Access Control
Best Practices
Access Control
Logical Access Control Methods
Access Control List (ACL)
Group Policies
Usernames and Passwords
Password Policy
Domain Password Policy
Privilege Management
Least Privilege Management
Privileges
Given to an individual because of where they work or the group they
belong to
Rights
Assigned to an individual based upon their need-to-know
Permissions
Based upon users need-to-know
File Controls (ACEs)
Privilege Management
Access Control Entries
File/Folder Permissions
Microsoft: Full Control , Modify, Read and Execute, Read, and Write
Linux/UNIX (R)Read, (W)Write, (X)Execute
(R,-, X) means allow Read, deny Write, allow Execute
Physical ACL
Network which traffic is permitted or denied
Physical who has access to a room or building
Privilege Management
Privilege Escalation
The act of exploiting a bug or design flaw in a software application
to gain access
Vertical Privilege Escalation
Lower privilege user accesses functions or content reserved for higher
privilege users
Privilege Management
Separation of Duties
Security Roles
Partitioning functionality and responsibility
Organizational Units (OU)
Security Groups
Multiple accounts
Generic Account Prohibition
Any account that is shared
Privilege Management
Privilege Creep
An individual slowly gains more access than they normally need
Caused by activities such as:
Temporary access
Accidental access
Transferring from departments
Maintenance hooks left in software
Establish new access rights
Domain Objectives
A Security+ candidate is expected to:
Explain the function and purpose of authentication services
Explain the fundamental concepts and best practices related to
authentication, authorization and access control
Implement appropriate security controls when performing
account management
Questions?
Review Question 1
Which of the following is a valid server-role in a Kerberos
authentication system?
Review Question 2
Sara, the IT Manager, would like to ensure that the router
and switches are only available from the network
administrator's workstation. Which of the following would
be the MOST cost effective solution to ensure that only the
network administrator can access these devices?
Review Question 3
Which of the following combinations represents
multifactor authentication?
Review Question 4
Which of the following should Sara, a security
administrator, perform periodically to reduce an
organization's risk exposure by verifying employee access?
Incident management
Account revalidation
Qualitative analysis
Quantitative analysis
Review Question 5
An Organization has introduced token-based authentication
to system administrators due to risk of password
compromise. The tokens have a set of numbers that
automatically change every 30 seconds. Which of the
following type of authentication mechanism is this?
Smart Card
TOTP
CHAP
HOTP
Review Question 6
Which of the following concepts BEST supports the
identification of fraud?
Risk avoidance
Job rotation
ALE calculation
Clean desk policy
Review Question 7
Which of the following authentication services uses a ticket
granting system to provide access?
RADIUS
LDAP
TACACS+
Kerberos
Review Question 8
Jane, the security administrator for a company, needs to
assign permissions for users on her network. Which
concept would Jane follow to give ONLY the appropriate
permissions necessary?
Separation of duties
Job rotation
Privilege escalation
Least privilege
Review Question 9
Which of the following is based on the X.500 ITU standard
and can provide protected authentication through TLS or
Simple Authentication without any protections?
LDAP
SAML
RADIUS
TACACS+
Review Question 10
Which of the following authentication services uses AAA
architecture over TCP port 49?
LDAP
Kerberos
RADIUS
TACACS+
Domain 4
Threats and Vulnerabilities
Domain Objectives
A Security+ candidate is expected to:
Explain types of malware
Summarize various types of attacks
Summarize social engineering attacks and the associated
effectiveness with each attack
Explain types of application attacks
Analyze a scenario and select the appropriate type of mitigation
and deterrent techniques
Domain Objectives
A Security+ candidate is expected to:
Given a scenario, use appropriate tools and techniques to
discover security threats and vulnerabilities
Explain the proper use of penetration testing versus vulnerability
scanning
Malware
Malicious Code
Virus
Spam
Worm
Adware
Trojan Horse
Ransomware
Logic Bomb
Spyware
Rootkits
Zombies
Polymorphic Malware
Botnets
Malware
Virus
Replicates itself on a system
Goals:
Renders your system inoperable
Spreads to other systems
Symptoms:
Performance degradation
Unusual files appear or disappear
Program sizes change from the installed versions
Virus Types
Armored
Makes itself difficult to detect or analyze
Contains protective code that stops debuggers or dissemblers
from examining the code
Retrovirus
Designed to avoid discovery by actively attacking the anti-virus
programs attempting to detect it
Virus Types
Stealth
Hides itself by intercepting disk access requests
When an anti-virus program tries to read files or boot sectors to
find the virus, the stealth virus feeds the anti-virus program a
clean image of file or boot sector
Virus Types
Boot Sector
Spreads by infecting boot sectors
Virus Types
Macro Virus
Malware that is encoded as a macro embedded in a document
Multipartite
Propagates by using both the boot sector and file infector
methods (i.e. DOS executables)
Every part needs to be removed, to prevent re-infection
Virus Types
Companion
Runs instead of legitimate programs
Creates a program with a different file extension (.COM vs .EXE)
File may reside in your systems temporary directory
Virus Types
Polymorphic
Mutates by padding its own code to avoid detection
Makes pattern recognition hard
Metamorphic
Recompiles itself into a new form (directly, no encryption), so the
code is constantly changing
Much harder to discover, but are rare
Malware
Worms
Self contained
Computer program that propagates on its own
Does not need a host application to be transported
Logic Bomb
Malware inserted into a system which sets off an action when
specific conditions are met
Example: Michelangelo and Chernobyl
Malware
Trojan Horse
Social Engineering
A program that is disguised as a benign program
Tricks the user into installing it
Malware
Backdoors
Allows access to a system without having to authenticate
Maintenance or Programming Hooks
Can be spread via malware, such as a Trojan Horse
Remote Access Trojan (RAT)
Malware
Rootkits
Malware that has the ability to embed itself deep within the
operating system
Hides from spyware blockers, the anti-virus program, and system utilities
Malware
Adware
Frequently refers to any software which displays advertisements
Some are spyware or malware
Spyware
Malware that works on collecting information about the system
and what it is used for.
Malware
Ransomware
Software that encrypts key files and folders and demands
payment to a third party.
(By paying the ransom, a code is given to revert system to normal
operations.)
Network Attacks
DoS attacks
DDoS attacks
Man-in-the-Middle attacks
Redirection attacks
Spoofing attacks
Network Attacks
Denial of Service (DoS)
System/service is unavailable for use
Authorized users lack access
Affects Availability of CIA triad
Network Attacks
Distributed Denial of Service (DDoS)
Multiple attackers prevents access to resources for authorized
users
Common Distributed Denial of Service techniques:
Amplification
Smurf attack
Fraggle attack
Massive armies
Botnet attack
SYN Flood attack
Network Attacks
Smurf attack
DDoS attack
Amplification attack
Attacker uses the router to broadcast the attack
Impersonation attack
Attack sets the source address to the victims IP address
ICMP
Network Attacks
Fraggle attack
DDoS attack
Amplification attack
Attacker uses the router to broadcast the attack
Impersonation attack
Attack sets the source address to the victims IP address
UDP
Network Attacks
Smurf / Fraggle attack
Internet
Attacker
Victim
Network Attacks
TCP SYN Flood or TCP ACK Attack
Attacker(s) send(s) a succession of SYN requests to a target
Victim is left with half-open connections
Attacker
Network Attacks
Botnet Attack
Zombie
Compromised systems
Bot
Bots are programs that run automated tasks
Obeys a master or author of the code
Botnet
A network of compromised systems containing malware which acts as a
robot
Bot network
Command and control architecture
Handlers
Spammer Botnet
Network Attacks
Redirection attacks
Man-in-the-Middle attacks
Evil Twin attack
Network Attacks
Man-in-the-Middle attack
Occurs when someone/thing intercepts data and retransmits to
another entity
Network Attacks
ARP Poisoning
Victims ARP table is tricked into recording the attackers MAC
address for the legitimate system
Man-in-the-Middle attack
C:\arp a
Interface: 172.20.200.220
Internet Address Physical Address
172.20.200.201
aa-13-77-77-78-20
172.20.200.1
00-24-e8-14-14-8e
172.20.200.199
00-13-3b-0f-d9-49
172.20.200.41
c8-4c-75-59-ba-8d
AA:13:77:77:78:20
Host: SQL-SRV-10
172.20.200.201
FF:12:34:56:78:90
Host: Admin-laptop
172.20.200.220
00:50:53:00:00:42
Network Attacks
Replay attack
Information (credentials) captured over a network and replayed
later
Network Attacks
Session Hijacking
Takes control of an active TCP session by using sequence number
guessing
192.168.0.1
192.168.0.100
Attacker
Sequence Numbers
Victim
Network Attacks
Spoofing
Impersonating someone/something else by falsifying data
Comes in many forms
IP spoofing
MAC spoofing
Web spoofing
Network Attacks
Typosquatting/URL Hijacking
Registering domains that are similar to those for a known entity
but based on a misspelling or typographical error.
Example: Yahooo.com or Gooogle.com
Network Attacks
Watering Hole Attack
Attacker uses a strategy to identify a site that is visited by those
they are targeting, poisoning that site, and then waiting for the
results.
Network Attacks
Xmas Scan
Scans conducted with Xmas packets
Packet with every single option set for whatever protocol is in use
By observing how a host responds to the packet, assumptions can
be made regarding the host's operating system
Wireless Attacks
Wireless Vulnerabilities
The most common threat of a wireless network comes from
eavesdropping
Packet Sniffing
Promiscuous Mode
Monitor Mode
Tools:
Kismet, AirCrack, NetStumbler
Wireless Attacks
Rogue Access Point
Unauthorized AP installed on the private network
Unauthorized SSID, unauthorized BSSID (MAC)
Evil Twin
Unauthorized AP masquerading as one of the legitimate APs
Authorized SSID, unauthorized BSSID (MAC)
Man-in-the-Middle attack
Wireless Attacks
War Driving
Driving around looking for Hotspots
Administrators performing a wireless audit
Hackers drive past businesses and residential areas looking for open
wireless access points.
Wireless Vulnerabilities
War Driving equipment
Mobility (car)
Mobile computer (laptop or smart phone)
Wireless NIC
Omnidirectional antenna
GPS receiver (optional)
Wireless sniffer
Kismet
NetStumbler
AirSnort
Flying Squirrel
Wireless Attacks
Wireless Attacks
Interference
Jamming
Wireless Attacks
Mitigations
Perform Site Surveys
Site Survey before deployment
Wireless audits
Detect Rogue Access Points
Bluetooth Attacks
Discovery Mode Attacks
Many devices are left in pairing/discoverable mode and default
PIN/code is not changed
Leaves device open and visible to other devices
Older Bluetooth systems (pre 2007) are equipped with "auto
pairing" and have a PIN that cannot be changed
Bluetooth Attacks
Bluebugging
Taking control of a Bluetooth device for personal gain (phone
calls, etc.)
Bluejacking
Sending of unsolicited messages over Bluetooth
Bluesnarfing
Theft of information from a wireless device through a Bluetooth
connection
Wireless Networking
Near-Field Communication (NFC)
Standard primarily used in mobile devices to facilitate easily
accessed communications between 2 or more devices
Performs a type of automatic synchronization and associations between
devices by touching them together
Insider Access
Poses significant risk to an organization
Can lead to data disclosure
Loss of resources
Damage to the organizations reputation
Insider Access
Mitigating the Insider Access threat
Enforce Least Privilege Management
Enforce Separation of Duties
Enforce supervisory controls
Two-person rule
M of N control
Social Engineering
Exploits human psyche by convincing someone to reveal
information or perform an activity
People hacking
Principle techniques
Authority, intimidation
Perception of a group consensus
Scarcity, urgency
Familiarity / likability
Trust
Social Engineering
Spam
Unwanted, unsolicited email
SPIM = SPAM over Instant Messaging
SPIT = SPAM over Internet Telephony
Cost of Spam
Loss of productivity
Can be infected with viruses and worms
Countermeasures
Spam filter
Block HTML formatted emails
Social Engineering
Phishing
Tricking people into divulging PII and/or financial information
Delivered via email
Clicking the hyperlink redirects the victim to a malicious website
Social Engineering
Spear Phishing
Targets a specific group of people or a person
All employees of a company
Whaling
Targets upper management
Vishing
Voice Phishing
Using the telephone to scam people
Whaling
Social Engineering
Pharming Attack
Redirects the user to a malicious website
Countermeasures
Harden the DNS server
Strong authentication
User awareness
Social Engineering
Hoaxes
False virus warnings that entice victims to cause damage to their
own systems
Countermeasures:
Security awareness training
Dumpster Diving
Looking in the trash for sensitive information
Shoulder Surfing
Looking over the shoulder of someone working on a
laptop/PC
Piggybacking
Entering a secured building/area by following an authorized
employee
Tailgating
Impersonation
Pretending to be someone you are not in an attempt to
gain access to what you cant
Password etiquette
Clean desk policy
Personal devices
Mobile storage
Social engineering
Application Attacks
Buffer Overflow
More information is placed in a buffer (memory stack or heap)
than it can hold, which then overflows into the next buffer
DoS
Privilege escalation
Countermeasures:
Patch Management
Input validation
Code Review
Application Attack
Integer Overflow
Large number being place into a buffer designed for smaller
numbers
DoS
Data corruption
+ 1
1
= 254
+ 1
= 255
= 000
Application Security
Arbitrary Code Execution
Attackers ability to execute any commands on a target machine
or in a target process.
Used in arbitrary code execution vulnerability that gives an attacker a way
to execute arbitrary code.
Application Security
Cross-Site Scripting (XSS)
Vulnerability where an attacker can add comments/code to web
pages which allows code injection
Code could redirect valid data to the attacker
Safeguards:
Input validation
Set web apps to tie cookies to IP addresses
Application Security
Cross-site Request Forgery (XSRF)
Involves unauthorized commands coming from a trusted user to
the website
Often done without the users knowledge
Safeguard:
Code review
Two-factor authentication
Proper cookie destruction
Application Security
Transitive Access
A service that invokes another service to satisfy an initial request
An attack involving using a third party to gain access rights
Problem arises from a poor choice of access control mechanism,
one that uses authentication to make access decisions
Application Security
Transitive Access
1.
2.
3.
Application Security
LDAP Injection:
Can occur anywhere that underlying code could use some type of
input for LDAP searches, queries, or any other LDAP function
Implementation of simple precautions during development
Controlling the types and numbers of characters that are accepted by input
boxes
Input validation
Application Security
SQL Injection
Application Security
SQL Injection
Application Security
XML Injection
Attack technique used to manipulate or compromise the logic of
an XML application or service
Injection can cause the insertion of malicious content into the
resulting message/document
Application Security
A parser interprets the input and resolves the second price, overriding the first. The widget now
costs 1.0
Application Security
Command Injection Attack
Manipulating a web interface using command lines
netsh exec or net user
Application Security
Cookies
Small text files stored on your hard drive from the web server
Transient cookies: are active only during a browsing session
Persistent cookies: store user identification information over an extended
period
Safeguards:
Delete cookies
Disable cookies
Mobile Code
ActiveX
Microsoft mobile code that runs on the client
Used in I.E., MS Office, MS Visual Studio, etc.
Authenticode
Code signing mechanism, identifying the publisher of signed
software
Ensures code has not been tampered with, before user
downloads software
Mobile Code
ActiveX Vulnerabilities
Controls are saved to the hard drive
Controls are executed within the security context of the current
user account
Once user accepts author, then it is always accepted (no reverification)
Mobile Code
ActiveX Safeguards
Deploy patches to fix vulnerabilities
Browser should be configured NOT to allow ActiveX to run by
default
Internet Explorer Options
Go to Security tab and choose the level of security to control how ActiveX
responds to enabling, disabling, or prompting
Mobile Code
Java Applets
Stand alone mobile code downloaded from a server to a client,
then runs from the browser
Platform independent (due to bytecode)
Sandbox
A virtual machine architecture
Limits the applets access to system resources
Digitally signed applets can run outside the sandbox
Mobile Code
Java Applet Vulnerabilities
Applets may perform malicious operations
Errors in the Java virtual machine may allow some unsigned
applets to run outside the sandbox
Mobile Code
JavaScript
Scripting language used for web pages
Runs in a client's browser or web server and can be seamlessly
embedded into HTML documents and email
Uses
Opens new windows (controls size and position)
Detects users actions such as keystrokes
Changes images with mouse-move overs
Mobile Code
JavaScript Vulnerabilities
Runs within the web page security level of permission settings
Can allow remote execution of programs
Interfaces with an OS, so potentially can damage systems or be
used to send information to unauthorized persons
JavaScript Safeguards
Apply JavaScript patches for browsers
Disable JavaScripts
Mobile Code
Malicious Add-Ons
Software add-ons are downloaded from a web vendor and are
used to view certain web content/web pages
Toolbars, codecs
Software Review
Code Review
Systematic examination of computer source code
Intended to find and fix mistakes overlooked in the initial
development phase
Can often find and remove common vulnerabilities
Program managers schedule meetings throughout the process
Development personnel walk through the code looking for
design/security flaws
Software Review
Design Reviews
Security Controls
Manually bypassing security controls
Fail Secure
System that is able to resort to a secure state when an error or security
violation is encountered
Fail Safe
A device, in the event of failure, responds in a way that will cause no harm
to other devices or danger to personnel
Security Controls
Manually bypassing security controls
Fail Soft
A system designed to shut down any nonessential components in the
event of a failure, but keep the system and programs running on the
computer.
Fail Closed
When the control fails it denies everything
Consider personnel safety
Examples:
A firewall fails and rejects all packets
A door fails and cannot be unlocked
Logging Procedures
Logging Types
Syslog
Windows Logs
Application/Software Logs
Network Device Logs
Firewalls
Routers
WAP/RADIUS
DNS
Domain Controller
Logging Procedures
Log Storage
Restrict access to all logs
Security Policy
Lenses
Fixed vs. Zoom lenses
Recording
Archive policy
Human monitoring
Chain link
Barbed wire
Concrete walls
Invisible (lasers)
Port Security
MAC Filtering
Restricting access to a network via authorized MAC address
Can be used to strengthen security on a switch or AP
Can be circumvented, MACs can be spoofed
Port Security
Extensible Authentication Protocol (EAP) 802.1X
Authentication framework, not a specific authentication
mechanism
Used over PPP and Wireless LANs
Provides over 40 authentication methods
Switch
Supplicant
If allowed the supplicant is
allowed in the network
Configuration Baselines
Establishes mandatory settings
Minimizes risk
Minimizes mistakes
Domain Objectives
A Security+ candidate is expected to:
Explain types of malware
Summarize various types of attacks
Summarize social engineering attacks and the associated
effectiveness with each attack
Explain types of application attacks
Select the appropriate type of mitigation and deterrent
techniques
Questions?
Review Question 1
When an attack using a publicly unknown vulnerability
compromises a system, it is considered to be which of the
following?
IV attack
Zero day attack
Buffer overflow
Malicious insider threat
Review Question 2
Which of the following is BEST utilized to actively test
security controls on a particular system?
Port scanning
Penetration test
Vulnerability scanning
Grey/Gray box
Review Question 3
Which of the following is Jane, a security administrator,
MOST likely implementing when deleting all the unneeded
files and modules of a newly installed application?
Exception handling
Patch management
System file clean up
Application hardening
Review Question 4
A user downloads a keygen to install pirated software. After
running the keygen, system performance is extremely slow
and numerous antivirus alerts are displayed. Which of the
following BEST describes this type of malware?
Logic bomb
Worm
Trojan
Adware
Review Question 5
Matt, the Chief Information Officer (CIO), wants to protect
laptop users from zero day attacks. Which of the following
would BEST achieve Matt's goal?
Review Question 6
Matt, an administrator, captures malicious DNS traffic on
the network. Which of the following tools would be used to
analyze the nature of this traffic?
Sniffer
Zone transfer
Network tap
Application firewall
Review Question 7
The IT administrator wants to make sure that only certain
devices can connect to the wireless network. Which of the
following can she implement to accomplish this task?
MAC filtering
Increase the power levels of the WAP
Dynamic DHCP
Disable SSID broadcast
Review Question 8
A company is installing a new security measure that would
allow one person at a time to be authenticated to an area
without human interaction. Which of the following does
this describe?
Fencing
Mantrap
A guard
Video surveillance
Review Question 9
Which of the following should Sara, a technician, apply to
prevent guests from plugging in their laptops and accessing
the company network?
Review Question 10
Sara, a student, is interested in learning about distributed
denial of service attacks. Which of the following types of
malware is MOST likely the primary focus of her study?
Botnets
Logic bombs
Spyware
Trojans
Domain 5
Compliance and Operational Security
Domain Objectives
A Security+ candidate is expected to:
Explain the importance of risk related concepts
Summarize the security implications of integrating systems and
data with third parties
Given a scenario, implement appropriate risk mitigation strategies
Given a scenario, implement basic forensic procedures
Summarize common incident response procedures
Domain Objectives
A Security+ candidate is expected to:
Explain the importance of security related awareness and training
Compare and contrast physical security and environmental
controls
Summarize risk management best practices
Given a scenario, select the appropriate control to meet the goals
of security
Risk Management
The process of identifying, monitoring, and reducing risk to
an acceptable level
Residual risk
Due care
Implement safeguards
Risk Management
Risk factors
Likelihood
How likely could this risk happen in our environment?
Impact
What will this risk do to my companys reputation, recovery time etc.
Risk Management
Risk Management Outline
Conduct a resource inventory
Carry out assessments
Threat Assessment
Business Impact Assessment (BIA)
Vulnerability Assessment
Contingency planning
Risk Management
Responses to risk
Risk avoidance
Not performing the risky activity
Risk transference
Burden of loss is shifted to a 3rd party
Risk acceptance
Risk is acknowledged and safeguard is too expensive
Risk deterrence
Discourage the attacker
Risk mitigation
Implement safeguards
Risk Analysis
Qualitative Risk Analysis
Analyses likelihood and impact
Based on someones judgment, opinion, or emotional attachment
Does not use hard numbers
Risk Analysis
Quantitative Risk Analysis
Assigns "real" numbers
Used in a cost benefit analysis
Used to identify estimated cost in dollars
Incorporates statistics
Risk Analysis
Cost-Benefit Analysis
Countermeasure cost might outweigh the cost of the targeted risk
If the safeguard cost is less than the ALE, implement the safeguard
If the safeguard cost is more than the ALE, accept the risk
Risk Analysis
Single Loss Expectancy (SLE)
Asset Value
Exposure Factor
SLE = (Asset Value) x (Exposure Factor)
Risk Mitigation
Conduct a Threat Assessment
Perform a Cost Benefit Analysis
Sometimes, the cost of some countermeasures may outweigh the
cost of their targeted risks
Risk Mitigation
Identify Threats
Natural
Environmental threats
Manmade
New malware
Social engineering
Social media
P2P file sharing
Social networking sites
Zero-day exploits
Risk Mitigation
Threat Motivations
Disgruntled employee
Espionage
Political agenda
Threat Capabilities
Script Kiddies
Organized Crime
Terrorism
Risk Mitigation
Security Control Categories
Preventive
Deterrent
Detective
Corrective
Recovery
Directive
Compensating
Risk Mitigation
Security Control Types
Several methods used to classify controls
Based on:
Nature of control
Objective of the control
Risk Mitigation
Technical Controls
Technical measures within the organization to enhance security of
a network or system
Risk Mitigation
Management Controls
Policies and procedures put into place to define and guide
employee actions in dealing with sensitive information:
Security Policies
Proper data classification
Security Awareness program
Configuration management
Risk Mitigation
Management Controls
Security Policy
Establishes the goals of the security program how it is organized, and the
responsibilities, etc.
To be effective; security policy must be:
Planned
Implemented
Maintained
Risk Mitigation
Management Controls
Security Policy
Should address the following:
Mandatory Vacations
Job Rotation
Separation of Duties
Least privilege
Need to Know
Risk Mitigation
Management Controls
Privacy Policy
Organization must clearly state what information can and cant be
disclosed
State who is entitled to ask for information within the organization
Policy should clearly state to employees that they should have no
expectations of privacy
Desks, files and other items may be searched
E-mail, voice communications are monitored
Risk Mitigation
Management Controls
Acceptable Use Policy (AUP)
Stipulates which actions are allowed or not allowed with company
resources
Must be enforced and adhered by all to be effective
Some of the areas covered:
Web access
Telephone usage (including company-issued cell phones)
Information usage
System usage
Risk Mitigation
Management Controls
Clean Desk Policy
Sanitize common areas
Devices and sensitive information needs to be locked up to minimize theft
or other security incidents
Mitigates browsing attacks
Information Classification
Military Scheme
Business Scheme
High
Confidential
Restricted
Serious damage
Medium
Internal
Significant damage
Low
Internal
Minimal damage
Sensitive
Private
Limited distribution
Public
Full Distribution
Risk Mitigation
Operational Controls
Operational controls define how people in the organization
should handle data, software and hardware
They are mechanisms and daily procedures that provide
protection for systems
Should be transparent to users
Risk Mitigation
Operational Controls
Physical Security
Environmental Security
Fire protection system
Temperature and humidity control systems:
Emergency backup power
Risk Mitigation
Operational Controls
Environmental Controls
Risk Mitigation
Environmental Controls
Building location and construction
Location Considerations
Visibility
Accessibility
Propensity for environmental problems
Risk Mitigation
Environmental monitoring
HVAC
Dedicated
Temperature controls
Between 60 and 75 degrees Fahrenheit
Possible heat damage (>75 degrees)
Humidity controls
Between 40% and 60%
Electrostatic damage (<40%)
Condensation/corrosion (>60%)
Risk Mitigation
Environmental Controls
Fire suppression
Fixed or portable
Water-based or clean-agent based
Class
Type
Suppression Medium
A
B
Combustibles
Liquids
Water or foam
CO2, FM-200, foam, or dry powder
Electrical
Metal
Dry powder
Risk Mitigation
Environmental Controls
Shielding
Prevent compromising emanations
Electromagnetic Interference (EMI)
Radio Frequency Interference (RFI)
Vulnerability Assessments
Process of identifying, quantifying, and prioritizing
vulnerabilities in a system
Accomplished by:
System Scanning: effectiveness of an organization's security policy, security
mechanism implementations, and deployed countermeasures
Footprinting: accumulating data regarding a specific network environment
Fingerprinting: discovering the underlying operating system on a device
Vulnerability Assessments
Audit should give detailed information on tools used, when
scan was conducted, and vulnerabilities found with risk
levels
Senior management approval needed
Tools
Protocol Analyzers
Vulnerability Scanners
Port Scanners
Network Mappers
Password Crackers
Vulnerability Assessments
Packet Sniffers
Hardware or software that gathers packet-level traffic across the
network
Protocol Analyzers
Vulnerability Assessments
Packet Sniffing on the Network
When a wired NIC (Network Interface Card) is put in promiscuous
mode, the NIC captures all traffic on the network segment it is
installed
When a wireless Interface Card (WIC) is put in monitor mode, the
WIC captures all traffic on the frequencies it monitors
Vulnerability Assessments
Network Mappers
Used to create network maps
Tools:
ICMP
Nmap
SolarWinds
Whats Up Gold
Mapping Techniques:
Active Probing
Route Analytics
SNMP
Vulnerability Assessments
Port Scanners
Probes for all enabled TCP/UDP ports
Used by system administrators or attackers
Tools:
SuperScan
IPScan
Pscan
Vulnerability Assessments
Vulnerability Scanners
Running software which contains a database of known
vulnerabilities against a system
Detects potential vulnerabilities
Tools:
Nessus
SATAN
SAINT
MBSA
Vulnerability Assessments
Open Vulnerability and Assessment Language (OVAL)
Sponsored by the US Department of Homeland Security
Standardizes vulnerability testing
How described and reported
An XML schema and repository of vulnerabilities
Vulnerability Assessments
Password Crackers
Software utility that allows direct testing of a users logon
password strength
Brute force decryption
Dictionary look-up
Rainbow Tables
Examples:
Vulnerability Assessments
Penetration Testing
Vulnerability Assessments
Penetration Testing
Looks for vulnerabilities such as:
Vulnerability Assessments
Three types of penetration testing
Black Box
Examines a program from a hackers perspective
Testers do not have access to internal code
Gray Box
Basic information about the organization is provided
Footprinting
White Box
Examines the internal logical structures of a program, line by line, for errors
Vulnerability Assessments
Honey Pots
A bogus system that appears to be a production server
Configured with pseudo flaws
Can be used to learn the hacking techniques and methods that
hackers employ
Padded Cell
Honeynet
Enticement vs. Entrapment
Business Continuity
Business Continuity Plan (BCP)
Business Continuity
Business Impact Analysis (BIA)
Business Continuity
Succession Planning
Process of identifying and developing internal people to fill key
leadership positions
Business Continuity
Redundancy
Systems that are either duplicated or that fail-over to other
systems in the event of malfunction
Fail-Over
Process of reconstructing a system or switching to other systems when a
failure is detected
Allows services to continue uninterrupted until the primary can be
restored
Fault Tolerance
Fault Tolerance
The ability of a system to sustain operations in the event of a
component failure
Continues operations even though a critical component has failed
(by switching over)
Addition of redundant components
Hardware
Utilities
Backups
Business Continuity
High Availability
The process of keeping services and systems operational during
an outage
Goal: Five nines availability (99.999%)
Need to implement:
Fault tolerant systems
Redundant technology
Backup communication channels
Business Continuity
Data Backup Types
Type
Full
Backup Process
Backs up all files regardless of the archive bit
Archive
Bit
Reset
Yes
Yes
No
No
Differential
Copy
Business Continuity
Full Backup
Backup Characteristics
May Require large tapes for each backup
May take a long time to perform each backup
Restore Characteristics
Restore only the last backup
Takes the longest to make a backup, but is the fastest method to make a
complete restore
Business Continuity
Full + Incremental
Backup Characteristics
Fastest backup method
Restore Characteristics
Restore the last full backup, then every subsequent incremental backup
Provides a good balance between backup and restore time
Business Continuity
Full + Differential
Backup Characteristics
Takes progressively longer to complete, as time elapses since the last full
backup
Restore Characteristics
Restore the last full backup, then the last differential backup
Next to a full backup, this is the fastest restore method
Business Continuity
Grandfather, Father, Son method
Full backups occur at regular intervals
Most recent backup after the full backup is the son
Business Continuity
Onsite storage
Location on site at the computer center
Containers designed and rated for fire, moisture, and pressure
resistance
Offsite Storage
Prevents the same disaster from affecting the network and the
backup media
Business Continuity
Data Restoration/Secure Recovery
Regularly test backups to ensure necessary data has been saved
and can successfully restore
Backup plan should include procedures for proper restoration of
the data
Training should be conducted where backups are actually
restored to a system
Validates the backup and recovery procedures and keeps personnel trained
Business Continuity
RAID Level Description Strengths
0
0+1
(RAID 01
1
1+0
(RAID 10)
3&4
Weaknesses
Minimum disks
Striping
Highest performance
No redundancy;
1 fail = all fail
Mirroring &
Striping
Mirror of
Stripes
No scalability
3 disks needed
Mirroring
Write performance is
slower than RAID 0 or
RAID 1
Increased cost of
additional drives and
parity drives
Striping &
Mirroring
Stripe of
Mirrors
Striped with
dedicated
parity
Block-level
striping with
distributed
parity
Block-level
striping with
double
distributed
parity
Business Continuity
RAID Level
0
0+1
(RAID 01)
1
1+0
(RAID 10)
3&4
Recommended Implementation
Used to boost server performance; high end workstations, real time rendering, transitory data
Mirrored array with high performance but no scalability; operating systems, transaction databases
Used to provide fault tolerance, lower performance; operating systems, transaction databases
Data archives, backups to disk, high availability systems, servers with large capacity and access
requirements
Business Continuity
RAID 3 is no longer used because its performance degraded
when a lot of small requests were made to the disk, as with
databases
RAID 5 is most commonly used today because it strikes a
balance between redundancy and performance
Hardware implementation will run faster than software
implementation
Business Continuity
Redundant (Clustered) Servers
The use of multiple computers and redundant interconnections to
form what appears to be a single highly available system
Provides fail-over capabilities
Ensures if one system fails then another in the cluster will take over
Business Continuity
Redundant ISPs
Allows another path through a different backbone in case of
disruption
Provides an alternative way for the organization to maintain their
connection
Costly due to number of systems involved
Business Continuity
Basic utilities such as electricity, water, and gas are key
aspects of business continuity
Power Considerations
Business Continuity
Alternate Sites
Business function restoration in the event of a large-scale loss
Cost of a site should be considered
Geographically distant
Hot / Warm / Cold / Mobile
Service Bureau
Reciprocal Agreement
Business Continuity
Hot Site
A fully configured and functional facility
Maximum Tolerable Downtime- Hours
Necessary when an organization cannot tolerate any downtime
Business Continuity
Warm Site
Facility with power, A/C, and partially configured systems
Maximum Tolerable Downtime
Example 1-3 days
Adequate when an organization's Maximum Tolerable Downtime (MTD) or
Recovery Time Objective (RTO) is a short time period
Business Continuity
Cold Site
Basic facility with wiring, ventilation, plumbing, and flooring
No hardware infrastructure
Business Continuity
Service Bureau
A contracted site that provides all alternate backup processing
services
Quick response and availability
Testing may be possible
Expense and may be resource contention during a large
emergency
Common for the service provider to oversell its processing capabilities
Business Continuity
Reciprocal / Mutual Aid Agreements
Agreement with another organization
Both parties back up and store each others data
Cost effective
Contract should be detailed
Equipment availability, facility repair, security, etc.
Business Continuity
Disaster Recovery Plan (DRP)
Goal is to recover from the disaster and restore critical functions
to normal operations
Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
Business Continuity
Recovery Time Objective (RTO)
Acceptable amount of downtime for critical services
What an organization determines is an "acceptable loss limit" in a
disaster situation
If the RTO of a company is two hours
All data must be restored to within two hours of the disaster
The company has acknowledged that data in the two hours immediately
preceding the disaster may be lost
Business Continuity
Recovery Point Objective (RPO)
The milestone of acceptable recovery
What an organization determines is an "acceptable loss limit" in a
disaster situation
Interoperability Agreements
On-boarding versus Off-boarding
Interoperability Agreements
Blanket Purchase Agreement/Order (BPA/BPO)
Government Agency and Private Company for ongoing purchases
of goods or services
Interoperability Agreements
Service Level Agreement (SLA)
An agreement between you or your company and a service
provider, typically a technical support provider
Can include guarantees for:
Incident Management
Incidents are handled in the accordance with your Incident
Response policy/plan
Incident Response
Incident Response Policy
Defines how an organization will respond to an incident
Develop procedures to respond to incidents before they occur
Due diligence up front will help the business survive in the event
of a disaster
Types of Evidence
Best
Secondary
Direct
Conclusive
Opinion
Circumstantial
Hearsay
Identification
Preservation
Transportation
Presentation in court
Return to owner, destroy, permanent archive
Register Cache
Routing Table, Memory
Temporary File System
Disks or other storage media
Remote logging and monitoring data
Image Capturing
Data Acquisition:
Taking possession of or obtaining data and adding it to evidence
Data Duplication
Making a copy of data acquired to preserve the original
It is crucial that data is not lost during the acquisition process
Once acquired and duplicated, forensic work is done on the copies
(protects against malware threats, preserves the original)
Image Capturing
Common methods for acquiring data from a system
Bit-Stream Disk to Image File
Most common, image original disc to another disc
Can create numerous copies
Image Capturing
Network Traffic and Logs
Ports used, last logged in, UserID used, URL accessed
Image Capturing
Take Hashes
Used to verify the integrity of your digital evidence
Screenshots
Take pictures of any alarms generated, and pictures of the
desktop screen
Witnesses
Identified, initial interview, sign a witness consent form
Basic Forensics
Data Breach
The intentional or unintentional release of secure information to
an untrusted environment
AKA: Spillage, Data Leak, Information Disclosure
Loss Control
Minimizing the amount of data lost in an incident
Compliance Failure/Fines
Litigation
Damages awarded to victims
Powered on computers
Stop and think before taking any action
RAM may contain vital information, if powered off and it could be
lost
Take photos of screen if viewable
Chain of Custody
Process to keep track of individuals that have accessed
evidence
Improper evidence handling could result in legal
complications, which can consequently prevent prosecution
Carefully manage the chain of custody form during and
after the forensic investigation
Preservation of Evidence
Digital evidence must be handled with care
Placed in a container
Properly labeled (Use permanent marker)
Sealed
Signed / Dated (Use permanent ink)
Container should be locked
First Responder
The person who first arrives at the crime scene and
accesses the system once the incident has been reported
A network administrator
Law enforcement officer
Investigating officer
Person from the forensics lab
Domain Objectives
A Security+ candidate is expected to:
Explain the importance of risk related concepts
Summarize the security implications of integrating systems and
data with third parties
Implement appropriate risk mitigation strategies
Implement basic forensic procedures
Summarize common incident response procedures
Domain Objectives
A Security+ candidate is expected to:
Explain the importance of security related awareness and training
Compare and contrast physical security and environmental
controls
Summarize risk management best practices
Select the appropriate control to meet the goals of security
Questions?
Review Question 1
Which of the following environmental controls would
BEST be used to regulate cooling within a datacenter?
Fire suppression
Video monitoring
EMI shielding
Hot and cold aisles
Review Question 2
Which of the following is a detective security control?
CCTV
Firewall
Design reviews
Bollards
Review Question 3
Select the formula you would need to
calculate SLE.
AV * EF
ARO * ALE
AV * ARO
EF * ARO
Review Question 4
Which of the following will help Matt, an administrator;
mitigate the risk of static electricity?
Lightning rods
EMI shielding
Humidity controls
Temperature controls
Review Question 5
Which of the following is a policy that would force all
users to organize their areas as well as help in reducing the
risk of possible data theft?
Password behaviors
Clean desk policy
Data handling
Data disposal
Review Question 6
A security administrator wants to determine what data is
allowed to be collected from users of the corporate
Internet-facing web application. Which of the following
should be referenced?
Privacy policy
Human Resources policy
Appropriate use policy
Security policy
Review Question 7
Risk can be managed in the following ways EXCEPT?
Mitigation
Acceptance
Elimination
Transference
Review Question 8
VLAN
Flood guards
Cloud computing
Firewall rules
Review Question 9
Review Question 10
Hot site
Remote site
Cold site
Warm site
Domain 6
Application, Data, and Host Security
Domain Objectives
A Security+ candidate is expected to: expected to:
Explain the importance of application security controls and
techniques
Summarize mobile security concepts and technologies
Given a scenario, select the appropriate solution to establish host
security
Domain Objectives
A Security+ candidate is expected to: expected to:
Implement the appropriate controls to ensure data security
Compare and contrast alternative methods to mitigate security
risks in static environments
Fuzzing
Aids in evaluating the security and threshold capabilities of
software and firmware
Used in large software development projects that employ blackbox testing
Often finds odd oversights and defects which human testers often
fail to find
Buffer overflows
Reaction to abnormal data sizes
Performance capabilities
Error handling
Managing failure
Run-time error: occurs during program execution
Bad syntax, unauthorized fetches, race conditions
Mitigation:
Input validation
Error Handler statements
try{} catch(){} statements
Application Baselining
Configuration Baselines (CB)
Establishes the mandatory settings that must be configured for
applications, network devices, and systems on a network
Usually start with host, application, and network hardening
principles
May mark an approved security configuration item, e.g. security
templates, that have been signed off for execution
Application Hardening
Application Hardening
Remove all applications not being used
Restrict access to the application, provide access only to those
who must have it
Update all applications to the latest patches
Code-review internally developed applications for security
weaknesses
Proper input validation
Use encryption for application communications
Patch Management
WSUS
SCCM
Database Architecture
NoSQL
SQL
Not relational
Scales well
Handles Big Data best
Disparate data
Relational
Table relationships
Highly structured
Easy to query
Server-side
Validation checks occur on
server
Must maintain state table
Minimum location for
validation
Client-side
End users interface makes
validation checks
Can be used to filter
legitimate input
Speedier validation
Device Security
Full device encryption
All information is unreadable without key
Backup of key is necessary
Remote wiping
Device is returned to initial factory settings
Lockout
Device is locked after a number on unsuccessful login attempts
Device Security
Screen locks
PIN is required to unlock screen
GPS
Tracks current locations and all the locations visited
Application control
Device manufacturer screens apps that can be downloaded to
device
Storage segmentation
Separate storage for work and personal data
Device Security
Asset tracking
Inventory control
Mobile device management
Device access control
Removable storage
Disabling unused features
Application Security
Key management
Growing concern with as encryption requirements increase
Credential management
Increasing need for stronger methods of protecting and storing
user credentials
Authentication
Rising overhead for multifactor authentication requirements
Risks of automatic authentication
Application Security
Geo-tagging
metadata
Encryption
Application white-listing
Only permits those on the list and denies everyone else
Transitive trust/authentication
BYOD
Data ownership
Support ownership
Patch management
Anti-virus management
Forensics
Privacy
BYOD
On-boarding / Off-boarding
Adherence to corporate policies
User acceptance
Architecture/infrastructure considerations
Legal concerns
Acceptable use policy
On-board camera/video
OS Security
Group Policies
Allows administrators to have more control over the system
settings
Allows for centralized control of all Windows operating system in
the enterprise environment
In Server 2008 they can be configured with the Group Policy
Management Console
OS Security
Domain GPO Design
Windows uses Group Policy Object (GPO) to manage the settings
on containers and objects
Types of containers
Site
Domains
Organizational Units (OUs)
GPO Inheritance
OS Security
Security Templates
Used to support the organizations system security policy
Can be used as a baseline configuration for all the systems on the
network
Can also be used to compare a systems settings to the baseline
settings
A group policy is normally used to create the template
OS Security
OS Security
Local Group Policies
Computer Configuration
Used to configure the settings on one system
User Configuration
Used to configure the settings that control what the users preferences are
and what they can and cannot do on that system
Examples: wallpaper, control panel, etc.
OS Security
OS Hardening
Process of securely configuring the system against security
vulnerabilities
Common methods
OS Hardening
Advanced methods
Patch Management
Applying patches, hotfixes, service packs
Hotfixes
Service Packs
Patches
Patch Management
WSUS
SCCM
Trusted OS
An operating system that meets the organization's
requirements for security
Most common set of standards to evaluate IT security is
Common Criteria (CC)
The CC standard outlines a comprehensive set of evaluation
criteria, broken down into seven Evaluation Assurance Levels
(EALs).
http://www.commoncriteriaportal.org/
Trusted OS
Designed, tested and evaluated
Common Criteria
Evaluation Assurance Level (EAL) 1 - 7
Examples
Data At-Rest
Stored inactive digital data
Protect with strong encryption and access control
Data In-Use
Data hooked or being processed internally
Enforce strong authentication and access controls
Data Encryption
Full Disk (Whole Disk Encryption)
Data Encryption
Database
Choice between cell or full database encryption
TDE (Transparent Data Encryption) provides encryption for data
without user awareness
TDE programs account for the added overhead of encryption and
key management
Does not encrypt data in transit
Data Encryption
Individual Files
Microsoft EFS and Encrypt Stick
Back up the encryption key
Removable Media
USB
External hard drive
CD / DVD
Data Encryption
Mobile devices
Android
Built-in - Gingerbread 2.3.4 (28APR11) and newer
Apple iOS
Built-in
Third Party
Symantec
Hardware-Based Encryption
Trusted Platform Module (TPM)
Hardware Security Module (HSM)
USB encryption
Hard drive
TPM
Trusted Platform Module
A microcontroller that stores keys, passwords, and digital
certificates
Typically affixed to the motherboard of a PC
More secure from external software attack and physical theft
HSM
Hardware Security Module
Standalone devices the help provide a secure storage for
encryption keys on a network
Typically offer protection features like strong authentication and physical
tamper resistance
Traditionally have been used in the banking sector to secure large amounts
of bulk transactions
Other common usage areas are to secure CA keys in PKI deployments and SSL
acceleration
USB Encryption
Protect data if device is lost or stolen
Software examples
Bitlocker To Go
TrueCrypt
GiliSoft
Hardware examples
IronKey by Imation
Kanguru Defender
Kingston DataTraveler
Data Policies
Wiping
How is the data removed from media?
Disposing
How are media discarded when they are no longer needed?
Retention
How long must data be kept?
Storage
Where is data kept, and what security precautions are associated
with its access?
Environments
Supervisory Control and Data Acquisition (SCADA)
Manages automated equipment (factories, dams, power
generators, etc.)
Stuxnet virus attacked Iranian nuclear centrifuges
Environments
Mobile Platforms
Android
iOS
Mainframe
Centralized large-scale computer (server)
Game Consoles
Xbox, Playstation, Wii, etc.
Methods
Network Segmentation
DMZ, extranet, intranet, and internet.
Security Layers
Multiple network security devices protecting the network
segments
Application Firewalls
Protection application servers (web, SQL, email, etc)
Methods
Manual Updates
Automatic updates not possible for some devices (routers,
switches, WAP, etc.)
Methods
Wrappers
Encapsulating sensitive systems with a specific control
Domain Objectives
A Security+ candidate is expected to: expected to:
Explain the importance of application security controls and
techniques
Summarize mobile security concepts and technologies
Select the appropriate solution to establish host security
Domain Objectives
A Security+ candidate is expected to: expected to:
Implement the appropriate controls to ensure data security
Compare and contrast alternative methods to mitigate security
risks in static environments
Questions?
Review Question 1
________ is used to test for or find odd oversights and
defects missed by human testers.
Snooping
Fuzzing
Hunting
Tracking
Shoulder Surfing
Review Question 2
Which of the following mitigation techniques is a technician
MOST likely to implement after the software has been
released to the public?
Review Question 3
Which of the following has a programmer MOST likely failed
to consider if a user entering improper input is able to crash
a program?
SDLM
CRC
Data formatting
BYOD policy
Error handling
Review Question 4
Which of the following would an administrator do to ensure
that an application is secure and all unnecessary features
are disabled?
Baselining
Application hardening
Secure application coding
Patch management
Review Question 5
A vulnerability has been found in an unnecessary service.
Which of the following is the BEST mitigation technique?
Issue a hotfix to lower the vulnerability risk on the network
Issue a group policy to disable the service on the network.
Issue a service pack to ensure the service is current with all
available patches
Issue a patch to ensure the service has a lower level of risk if
compromised
Review Question 6
Which of the following allows a company to analyze data
stores that are measured in many petabytes?
Review Question 7
Setting the web browser, email program, and media
handlers throughout the organization is referred to as:
Exception handling
Application whitelisting
Application patch management
Least Privilege
Implicit Deny
Review Question 8
Which of the following should be performed to ensure no
data can be retrieved from a smart phone after it is lost?
Device encryption
GPS tracking
Screen lock
Remote wipe
Strong Authentication
Review Question 9
Which of the following should be used to help prevent theft
of unused assets?
HSM device
Locking cabinet
Device encryption
GPS tracking
Whole disk encryption
Review Question 10
Which of the following is a best practice for error and
exception handling?