Network Security,
Firewalls, and VPNs
Network Security Threats
- Malware
- Application vulnerabilities
- System port and vulnerability scanning
- What is risk assessment, and how is it done?
- How is risk measured?
Reconnaissance is a preliminary process that involves discovery, research, and information gathering. Reconnaissance can be done using techniques such as Web research, search engines, background checks, newspaper searches, and social networking.
Scanning is the process of minutely examining a new finding or information gathered during reconnaissance. The various techniques used for scanning are war dialing, war driving, netstumbling, ping sweeps, and port scanning.
Enumeration is the hackers' process of discovering details about a potential target to learn whether any kind of vulnerability exists.
Attacking is all about exploiting system vulnerabilities and gaining access to a system. Interestingly, it’s the shortest phase of the overall hacking process. A successful attack based on solid research and preparation can occur in seconds.
A successful attack means the hacker has breached the target's security to gain some level of access. Some familiar postattack activities include privilege escalation, depositing of additional hacker tools, data pilfering, and removal of evidence.
In case a hacker’s intrusion attack fails, the hacker tries other nonintrusion options, such as denial of service (Dos) attack, eavesdropping, breaking and entering, Web site attacks, and social engineering.
Seven Domains of a Typical IT Infrastructure
Users are attacked using psychological techniques, such as persuasion and impersonation, in order to gain access to facilities or computing resources. Users are also tricked into giving away information, such as logon ids or passwords, via fraudulent e-mail messages. Trojan horses and spyware trick users into installing malware on their systems.
Malware is a significant threat in this domain. Port scanning can be used to find unsecured ports on a workstation, which gives the attacker insight into what type of attack may be successful. Malicious Web sites use attack techniques, such as XSS, to gain access to secured Web transactions.
After a hacker gains access to one system on a network, the rest of the local area network (LAN) is vulnerable to attack. A LAN often consists of dozens to thousands of hosts. Electronic threats to a LAN include malware, malicious code, botnets, and software bugs. Physical threats include hardware failure, natural disasters, and accidental or purposeful damage to equipment. Human threats include disgruntled employees, poorly trained employees, and hackers.
The WAN connections between LAN locations, especially those controlled by third-party entities, are targets. A WAN connection is exposed to the public Internet and so is directly accessible. Sequential port scans can be conducted from public Internet sites, revealing details of configuration that may allow an attacker to better profile additional services.
A WAN spans a large geographic area, such as a state, province, or country. WANs often connect multiple smaller networks, such as LANs, or metropolitan area networks (MANs). In WAN domains, data moves through a public network, which creates electronic isolation. This electronic isolation allows numerous attacks.
This domain consists of servers that host applications, virtualized systems, and/or databases. Attackers may target the physical and virtual systems, the data that resides on them, or even the computing power of the servers.
Remote access is the ability to get access to a computer or a network from a remote distance. Remote access removes the need for the hacker to be physically present to access and attack a LAN. Hackers anywhere in the world with an Internet or telephone connection can still reach out to attack any seemingly isolated target.
- What is social engineering?
- What are the common social engineering techniques?
In this section, you will have an opportunity to practice the concepts and processes that you have explored in this lesson.
The Hands-On Lab provides you with an engaging learning experience that is diagnostic and flexible. Following the instructions provided in the Lab Manual, you will be able to practice the steps IT Security Specialists perform on a daily basis and develop the skills required for effective execution and management of IT Security operations.
In this section, you will have an opportunity to apply what you’ve learned in this lesson in the context of analyzing a business situation. Although simplified, a problem scenario provided here depicts the challenges often faced by professionals in the workplace.
In this interactive case study, you will explore a business situation, review critical information related to the problem discussed in the case, decide on the course of action, and receive a decision analysis summary that discusses the implications of your decision. Once you analyze the impact of your decision, explore alternative solutions to learn about other potential ways to address the issue in the case. Complete your work on the case by submitting the graded assignment that will reflect on your process of analyzing the business situation and defining an appropriate course of action.
After you have gone through the challenge, navigate to Contributing Factors from the panel at the top of your screen.
Did you know that our sales department is quite unhappy with the security department? The sales department has just lost a prestigious bid to the competitor. The department is surprised at how the competitor was able to bid so accurately, just under the bid offered by Corporation Techs, by an exact amount. An outsourced security agency has identified unauthorized access to the Web server as a potential source of compromise. This could be due to the shared reporting and public Web site functions.
Now, your job is to create a security plan that will prevent unauthorized access, while making sure that both public and secured Web access remains available.
You already have the packet trace and vulnerability scans gathered during the outsourcer’s review. Use those scans and meet the consultant, Tim Castleberry for further details.
Ask a Consultant
Select the icon from the top to receive additional
information related to the situation
Tasks
- Access the previously gathered data using NetWitness Investigator.
- Identify hosts within Corporation Techs' network.
- Identify protocols in use within Corporation Techs' network.
- Identify services in use within Corporation Techs' network.
- Create a professional report detailing the findings of the tasks 1-4. This report would be considered the initial document for the development of a network security plan.