Chapter 789101112
Chapter 789101112
Chapter 789101112
3
Risk Assessment
Risk Management:
Risk Assessment: Identity Assets,Threats, vulnerabilities
Risk Analysis:Value of potential Risks
Risk Mitigation: responding to Risk
Risk Monitoring: Risk is FOREVER
Assessment:
Identify and valuate assets
Identify threats and vulnerabilities
Methodologies: OCTAVE, NIST 800-30 and FRAP
The assessment process can be represented as follow:
4
Risk Assessment
Assessment process:
System characterization andThreat identification
Vulnerability identification and Control analysis
Likelihood determination and Impact analysis
Risk determination and Control recommendations
Results Documentation
Risk Analysis:
Qualitative Analysis:
Subjective analysis to help prioritize probability and impact of risk events.
May use Delphi Technique
Objective approach to seek in depth description in narrative form
Used words like” high”,” medium”,” low” to describe likelihood and severity
5
(or probability and impact) of a threat exposing a vulnerability.
Risk Assessment
Quantitative Analysis:
Providing a dollar value to a particular risk event
Much more sophisticated in nature, a quantitative analysis if much more
difficult and requires a special skill set
Business decisions are made on a quantitative analysis
Can’t exist on its own - depends on qualitative information
Objective approach to seek precise measurement in numerical form
7
Chapter Eight
Security System Assessment and Evaluation
The risks and potential of someone intruding into these systems for
sabotage, vandalism, and resource theft are high.
For security assurance of networked systems, such risks must be assessed
To determine the adequacy of existing security measures and safeguards
To determine if improvement in the existing measures is needed
9
Security Assessment
An assessment process consists of a comprehensive and continuous
analysis of the security threat risk to the system that involves:
An auditing of the system
Assessing the vulnerabilities of the system
Maintaining a creditable security policy and
A vigorous regime for the installation of patches and security
updates.
In addition, there must also be a standard process to minimize the risks
associated with nonstandard security implementations across shared
infrastructures and end systems.
10
Security Assessment Process
The process to achieve all these and more consists of several tasks
including:
A system security policy
Security requirements specification
Identification of threat and threat analysis
Vulnerability assessment
Security certification and
The monitoring of vulnerabilities and auditing
15
Security Evaluation
Outcome/Benefits:
The goal of any product producer and security evaluator is to have a
product that gives the buyer the best outcome and benefits within a
chosen standard or criteria.
Evaluation Process:
Product oriented: This is an investigative process to thoroughly examine and test
every state security criteria and determine to what extent the product meets
these stated criteria in a variety of situations.
Process oriented: This is an audit process that assesses the developmental process
of the product and the documentation done along the way, looking for security
Audits:
An audit is usually a check of documentation.
In fact, this is the key to an audit: an audit is a check for compliance.
Reviewing incident response plans, disaster recovery plans, and security policies.
Checking past incident response reports to ensure compliance with the
established plans and policies.
Involve a review of system logs: firewall logs, intrusion detection system logs, or
any other system logs
The primary focus of an audit is to evaluate if the target network complies with the
appropriate policies, regulations, and, in some cases, laws that are applicable to that
23
organization.
Network Security Testing
Vulnerability Scans:
Vulnerability scanning services provide a comprehensive security review of the
system, including both the perimeter and system internals.
Spot critical vulnerabilities and gaps in the system’s security practices.
Scanning is used to:
Map the environment
Identify server versions, open ports and running services
Inventory and validate asset management databases
Identify patch levels
Prove due care and due diligence for compliance issues
24
Network Security Testing
Vulnerability Scans - Types of Scanning:
Vulnerability Scanning: performed with the goal of providing detection &
identification of security flaws and weaknesses in the software/system
Content Scanning: analyzes the actual contents of the document (web pages, files,
etc.) for malicious content in macros, embedded scripts, etc.
Privacy Scanning: Performed to detect violations of privacy policies
Penetration Testing:
A penetration test is an ongoing cycle of research and attack against a target or
boundary.
The attack should be structured, calculated, and, when possible, verified in a lab
before being implemented on a live target.
Whereas scanning is passive, pen-testing looks to actively exploit a weakness
25
Network Security Testing
Penetration Testing:
Reconnaissance (Enumeration and Discovery) which allows learning and listing
information about the network, often from publicly available sources like the
internet.
Resiliency Attack: Attempt to exploit the potential vulnerabilities from the
reconnaissance
Removal of Evidence: Clean up any evidence of the compromise
Reporting and Recommendations: Should include technical vulnerabilities as well
as non-compliance with organizational processes and policies.
A penetration cyber attack provides a successful unauthorized access to:
A protected system resource or an automated system, or
A successful act of bypassing the security mechanisms of a computing system.
26
Network Security Testing
Application Security
A penetration cyber attack can also be defined as any attack that violates the
integrity and confidentiality of a computing system’s host.
Penetration attacks involve breaking into systems using known security
vulnerabilities to gain access to any cyberspace resource.
Full penetration Attack:
Provides an intruder full access to all of a system’s cyberspace resources
Allows an intruder to alter data files, change data, plant viruses, or install Trojan
horse programs into the system.
Allows intruders to use the victim computer on a network, to use a penetration
attack as a launching pad to attack other network resources.
27
Network Security Testing
There are three broad categories of penetration testing.
Black Box,White Box, and Gray Box
These designations are a description of how much information the penetration
tester is given prior to the test.
28
Network Security Testing
A white box penetration testing involves the tester having extensive
knowledge of the target system.
IP addresses of workstations and servers, switches and routers
Operating system information for computers
Information regarding security devices such as firewalls and
intrusion detection systems
Gray Box penetration testing:
This is a rather generic term without specific boundaries
The tester is given some network information but not all
As a practical matter, this is often the easiest to initiate
29
Chapter Eleven and Twelve
32
Abuse Cases in Software Security
Buffer overflow attacks can have serious consequences, such as stealing
data, compromising systems, damaging files, or performing denial-of-
service attacks. They can also enable attackers to bypass security
mechanisms, escalate privileges, or gain remote access
You can read further about the abuse cases:
https://cheatsheetseries.owasp.org/cheatsheets/Abuse_Case_Cheat_Sheet.html
7 Real-Life Data Breaches Caused by InsiderThreats | Ekran System
33
Lab Practices
Packet Tracer
Port security:
Port security allows you to restrict ingress traffic on a switch port by limiting the
MAC addresses that are allowed to send traffic into the port. You can also
configure the action to be taken when a violation occurs, such as shutting down
the port or sending a notification2.
DHCP snooping:
DHCP snooping is a feature that filters DHCP messages between untrusted hosts
and trusted DHCP servers. It prevents rogue DHCP servers from offering IP
42 addresses or other network parameters to hosts.
Basic Switch Configuration
Rapid PVST PortFast and BPDU Guard:
Rapid Per-VLAN Spanning Tree (Rapid PVST) is a version of Spanning Tree
Protocol (STP) that provides faster convergence and loop prevention for VLANs.
PortFast is a feature that allows a switch port to transition directly to the
forwarding state when connected to an end device, bypassing the STP states.
BPDU Guard is a feature that disables a PortFast-enabled port if it receives a
Bridge Protocol Data Unit (BPDU), which indicates a loop in the network
Activate port security on all the active access ports on switch SW-1
SW-1(config)#interface range FastEthernet0/1, FastEthernet0/2,
FastEthernet0/10,FastEthernet0/24
SW-1(config-if-range)#switchport mode access
SW-1(config-if-range)#switchport port-security
43
Basic Switch Configuration
44
Basic Switch Configuration
Other tasks
Statically configure the MAC address of the PC using port security
Configure the port security violation mode to drop packets from MAC addresses
that exceed the maximum
Move all unused switch ports to the BlackHole VLAN
Shutdown all unused switch ports
46
Basic Router Configuration
Security features that can be configured on routers:
SSH: Secure Shell is a protocol that provides a secure and encrypted management
connection to a remote device. SSH is assigned to TCP port 22.
AAA: Authentication, Authorization, and Accounting (AAA) network security
services provide the primary framework through which you set up access control
on your router. Authentication provides the method of identifying users,
authorization provides the method for remote access control, and accounting
provides the method for collecting and sending security server information1.
AutoSecure: AutoSecure is a feature that secures a router by using a single CLI
command to disable common IP services that can be exploited for network
attacks, enable IP services and features that can aid in the defense of a network
when under attack, and simplify and harden the security configuration of the
47
router.
Basic Router Configuration
Security features that can be configured on routers:
Access Lists: Access lists are used to filter traffic based on a variety of criteria,
such as source and destination IP addresses, protocols, ports, and packet
contents. Access lists can be applied to interfaces or routing protocols to control
the flow of traffic.
Cisco IOS Firewall: Cisco IOS Firewall is a feature set that provides stateful
packet inspection (SPI) firewall capabilities on a router. It can inspect traffic at
the application layer, block malicious traffic, and prevent unauthorized access to
network resources.
Cisco IOS IPS: Cisco IOS Intrusion Prevention System (IPS) is a feature that
enables a router to detect and prevent network attacks by analyzing traffic
patterns and signatures. It can block malicious traffic, generate alerts, and log
48
events.
Basic Router Configuration
Security features that can be configured on routers:
VPN: Virtual Private Network (VPN) is a technology that creates a secure tunnel
between two or more devices over a public network, such as the Internet. VPNs
can provide confidentiality, integrity, and authentication for data transmission.
There are different types of VPNs, such as site-to-site VPNs, remote access VPNs,
Dynamic Multipoint VPNs (DMVPN), and Group Encrypted Transport VPNs
(GETVPN).
49
Lab Practices
Wireshark
51
Lab Practices
NMAP
53
Scan IP address (Targets): Scanning
nmap 10.0.0.1 Scan a single host IP
nmap 192.168.10.0/24 Scan a Class C subnet range
nmap 10.1.1.5-100 Scan the range of IPs between 10.1.1.5 up to 10.1.1.100
nmap -iL hosts.txt Scan the IP addresses listed in text file “hosts.txt”
nmap 10.1.1.3 10.1.1.6 10.1.1.8 Scan the 3 specified IPs only
nmap www.somedomain.com Resolve the IP and then scan its IP address
Port Related Commands:
nmap -p80 10.1.1.1 Scan only port 80 for specified host
nmap -p20-23 10.1.1.1 Scan ports 20 up to 23 for specified host
nmap -p80,88,8000 10.1.1.1 Scan ports 80,88,8000 only
nmap -p- 10.1.1.1 Scan ALL ports for specified host
nmap -sS -sU -p U:53,T:22 10.1.1.1 Scan ports UDP 53 and TCP 22
54 nmap -p http,ssh 10.1.1.1 Scan http and ssh ports for specified host