SecurityPlus_11-Lessons
SecurityPlus_11-Lessons
Lesson 1
Authentication Methods
Lesson Objectives
Windows
Five default registry keys:
HKEY_CLASSES_ROOT, HKEY_LOCAL_MACHINE, HKEY_USERS, HKEY_CURRENT_USER, HKEY_CURRENT_CONFIG
Security Accounts Manager (SAM)
Understanding Kerberos
A method for storing keys in a centralized repository
Kerberos versions
Version 4
Version 5
Microsoft
Kerberos components
Key Distribution Center (KDC) Resource
Principal Trust relationship
Authentication Service (AS) Repository
Ticket Granting Service (TGS) Realm
Ticket Granting Ticket (TGT) Ticket
Understanding Kerberos (cont’d)
Serpent
CAST
Rijndael
Advanced Encryption Standard (AES)
Many candidates
Rijndael chosen
Additional symmetric algorithms
Strengthening Symmetric-Key Encryption
Web of trust
Common Trust Models (cont’d)
Single CA trust
Common Trust Models (cont’d)
Hierarchical trust
Common Trust Models (cont’d)
Type Description
Ping A host directs a number of ping packets at a
scan collection of hosts on a network. Used to determine
the hosts that exist on a network.
Port A host scans some or all of the TCP and UDP ports
scan on a system to see which ports are open.
In firewall-to-firewall
communication,
hosts must
exchange public
keys
Virtual Private Networks (cont’d)
Tunneling
Tunneling components
Passenger protocol
Encapsulation protocol
Transport protocol
Benefits of tunneling
Point-to-Point Tunneling Protocol (PPTP)
PPTP vs. Point-to-Point Protocol (PPP)
PPTP and Generic Routing Encapsulation (GRE) protocol
Layer 2 Tunneling Protocol (L2TP)
L2TP elements
Encryption and L2TP
VPN vulnerabilities
Comparing L2TP and PPTP
TACACS and TACACS+
RADIUS terminology
RADIUS benefits
RADIUS vulnerabilities
IPsec
An IETF standard that provides packet-level
encryption, authentication and integrity between
firewalls or between hosts in a LAN
IPsec uses the following
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Two IPsec modes
Tunnel
Transport
Security association (SA) and Internet Key
Exchange (IKE)
IPsec (cont’d)
Wireless networks
Popular
Convenient
Often improperly configured, used or placed on the network
Wireless networking media
Direct Sequence Spread Spectrum (DSSS)
Frequency Hopping Spread Spectrum (FHSS)
Wireless Network Technologies ( cont’d)
Wireless networking modes
Wireless Network Technologies ( cont’d)
Wireless access points (WAPs)
Wireless cells
Types of authentication in wireless networks
Open System Authentication (OSA)
Shared Key Authentication (SKA)
Basic Service Set Identifier (BSSID)
Service Set Identifier (SSID)
WAP beacon
Host association
Wireless Application Protocol (WAP)
Strong encryption
Strong authentication via 802.1x
Physical and configuration solutions
Site Surveys
NAT considerations
1 9 2 .1 6 8 .3 7 .2 1 9 2 .1 6 8 .3 7 .3
192.168.37.0/16
Masquerading
NAT benefits
1 9 2 .1 6 8 .3 7 .1
1 9 2 .1 6 8 .3 7 .4 1 9 2 .1 6 8 .3 7 .5
3 4 .0 9 .4 5 .1 /8
T h e fir e w a lls tr a n s la te a d d r e s s e s
fr o m th e 1 9 2 .1 6 8 .3 7 .0 /1 6 a n d
1 0 .5 .7 .0 /8 n e tw o r k s in to In te r n e t-
a d d r e s s a b le fo r m .
In tern et
2 0 7 .1 9 .1 9 9 .1 /2 4
1 0 .5 .7 .2 1 0 .5 .7 .3
1 0 .5 .7 .1
10.5.7.0/8
1 0 .5 .7 .5
1 0 .5 .7 .4
Types of Bastion Hosts
Internal firewalls
Traffic Control Methods
Packet filters
Packet filter drawbacks
Stateful multilayer inspection
Popular packet-filtering products
Proxy servers
Application-level proxy
Circuit-level proxy
Advantages and disadvantages of circuit-level proxies
Traffic Control Methods (cont’d)
1 9 2 .1 6 8 .3 7 .2 1 9 2 .1 6 8 .3 7 .3
a proxy server 1 9 2 .1 6 8 .3 7 .4 1 9 2 .1 6 8 .3 7 .5
the same as
the proxy server
In tern et
Traffic Control Methods (cont’d)
Recommending a proxy-oriented firewall
Proxy server advantages and features
Authentication
Logging and alarming
Caching
Fewer rules
Reverse proxies and proxy arrays (cascading
proxies)
Proxy server drawbacks
Client configuration
Bandwidth issues
Configuring Firewalls
Default firewall stances
Default open: Allows all traffic by default. You add rules to
block certain types of traffic.
Default closed: Allows no traffic at all by default. You add
rules to allow only certain types of traffic.
Configuring an ACL
Source address
Source port
Destination address
Destination port
Action
Network Hardening
Securing the perimeter
Audit the modem bank
Identify illicit wireless networks
Make sure that VPN traffic goes through the firewall
Upgrading network operating system hardware, software
and firmware
Enabling and disabling services and protocols
Improving router security
Password-protect and authenticate automatic updates
Obtain the latest operating system updates
Consider the router’s susceptibility to denial-of-service attacks
Disable unnecessary protocols
Consider updates
Restrict physical access to the router
Network Security Concerns
Network hosts
Servers
Workstations
Mobile devices
Network connectivity devices
Routers
Switches
WAPS and other wireless equipment
Firewalls
Remote access devices
Convergence issues
Misuse of legitimate equipment
Physical Security Concerns
Your job as a security professional does not end
with network security
Ensuring proper access to network resources also
includes taking steps to physically secure your
organization's buildings and all server rooms and
wiring closets
Ensuring access control
Access control and social engineering
Physical barriers
Environmental changes
Location of wireless cells
Physical Security Concerns (cont’d)
Coaxial cable
Common coax types (RG-8, RG-58)
Coaxial cable and termination
Security concerns for coaxial cable
Twisted-Pair Cable
Plenum cabling
Interference
Crossover cables
Wiretapping
Fiber-Optic Cable
Made of a glass or plastic cylinder enclosed in a
tube, called cladding
An insulating sheath covers the core and cladding
Two modes
Single-mode
Multimode
Connector types
Benefits of fiber-optic cable
Resistant to EMI and RFI
Resistant to wiretapping
Drawbacks of fiber-optic cable
Protecting the Network
Against Common Physical Attacks
Consider the following issues
False ceilings
Exposed communication lines
Exposed jacks
Exposed heating/cooling ducts
Doors with exposed hinges
Inadequate lighting
Lack of surveillance
Poor lock quality
Not even a high-quality password can thwart certain
physical attacks
Security+
Lesson 10
Risk Analysis, Intrusion
Detection and Business
Continuity
Lesson Objectives
Define risk identification concepts
Distinguish between types of intrusion detection
Identify the purpose and usefulness of a honey pot
Implement an incident response policy
Identify key forensics issues, including chain of
custody, collection of evidence and preservation of
evidence
Determine disaster recovery steps
Distinguish between disaster recovery and
business continuity
Risk Identification
A risk assessment allows you to locate resources
and determine the likelihood of a successful attack
Sometimes called a “gap analysis”
Consider the following terms
Threat
Vulnerability
Risk
Return on investment
Risk Assessment Steps
Asset identification
Consider business concerns
Consider potential for internal and external attacks
Threat identification
Common techniques used in man-made attacks
Identifying and eliminating vulnerabilities: risk
assessment
Vulnerability scanners
Updates
Penetration-testing tools
Managing the process of eliminating vulnerabilities
Risk Assessment Steps
System configuration monitoring tools
Calculating loss expectancy
Determining specific losses for your risk assessment
Justifying cost
Intrusion Detection
Basic definition
The real-time monitoring of network activity behind the firewall
Detects and logs network and/or host-based traffic
Intrusion-detection strategies
Signature detection
Anomaly detection
Typical actions taken by an IDS
IDS application types
Host-based
Network-based
Network-Based Intrusion Detection
Used to identify traffic on the network
A network-based IDS scans the entire network, then
issues alerts when certain thresholds are exceeded
Passive detection versus active detection
Benefits and drawbacks
Switched networks and network-based IDS applications
Host-Based Intrusion Detection
Management structure
Agent
Encrypted and
authenticated connection
Router
Agent
Reporting System
Encrypted and
authenticated connections
IBM AS/400
Agent
Manager
SQL Server
Encrypted and Agent
authenticated connection
Reporting system
File Server
Host-Based Intrusion Detection ( cont’d)
Consider the following
Active versus passive host-based IDS
Manager-to-agent communication
Strengths and limitations of host-based IDS applications
Monitoring specific services
IDS Signatures and Rules
As with antivirus applications and vulnerability
scanners, an IDS application requires a current
signature database
Both network and host-based IDS applications use
a signature database
Rules
Actions
Securing intrusion-detection devices and
applications
Harden the IDS application and/or the operating system
Physically secure the system
Choosing the Correct IDS
Each type of IDS application has its own place
Problem Ideal IDS
Choice
DOS attacks involving Network-based IDS.
traffic floods
emanating from the
internal network
Brute-force attacks on Both a network-based and host-
an e-mail server based IDS will work. However, a
host-based IDS will give you more
account.
granular information about a
specific e-mail server.
File 2
File 3
Parity
Backups and Business Continuity
RAID provides fault tolerance and redundancy. It
does not provide a dedicated data backup service.
For the Security+ exam, you will need to understand
the following backup methods
Full backup
Differential backup
Incremental backup
Media reuse and backup methods
Benefits and drawbacks of full, differential and
incremental backups
Backup Strategies
Understand the following strategies
Full backup nightly
Full and differential backups
Full and incremental backups
Father/son/grandfather
Backup verification
An unverified backup is almost the same as having no backup
at all
Consider the following strategies
Verifying archive existence
Listing contents of the archive
Performing a test backup
Verifying archive integrity (e.g., using MD5sum)
Backup strategies (cont’d)
Backup storage issues
Sunlight
Excessive heat or cold
Improper humidity
Magnetic fields
Backup and encryption
Security+
Lesson 11
Security Policy
Management
Lesson Objectives
Define components of a security policy, including
acceptable use and HR policy
Define privilege management concepts
Train company employees to work securely
Document company and network security plans
Security Policy
Security
policy
elements
Security Policy (cont’d)
Need to know
Acceptable use and code of ethics
Addresses the ways that employees can use equipment and
services provided by the company
Publicizing the policy
Due care versus due diligence
Separation of duties
IT workers should not be responsible for securing the
services they provide. It can be a direct conflict of interest.
Password management
Security Policy (cont’d)
Vendor relations
Workers may leave the company with vital information
Document all contacts
The Service Level Agreement (SLA)
Store all SLAs for later reference
Sensitive data disposal
Hard copy
Servers and workstations
Network connectivity equipment
Destroying logs
Human Resources Policies
Hiring
Consider the following hiring procedures
Orientation
Informing IT
Assigning user permissions
Verifying correct privileges
Emphasize the creation of specific procedures and policies to new
hires
Termination
Revoking user rights
Conducting exit interviews
Forcibly logging off terminated user(s)
Providing an escort for the user, if necessary
Writing a Specific Policy
The following elements are commonly found
Policy name
Approval date
Active date
Policies replaced
Policies directly affected
Scope
Purpose
Additional notes
Responsible individuals
Privilege Management
Issues to consider
Users, groups and roles
Single sign-on
Centralized versus decentralized
MAC/DAC/RBAC issues
Privilege auditing, network use and improper
escalation
Training Secure Practices
Education
Awareness training
Communication and escalation training
Software education
IT training
Opportunities for education
Information resources
Hard copy
Online
Sample resources
Documentation
IT standards and guidelines
Examples
Operating system installation
Equipment replacement
Software updates
Auditing
Additional policies exist
Documenting systems architecture
Documenting network architecture
Logs and inventories
Keeping logs
Log size
Impact of logging
Classification and Notification
Classification levels: Unclassified, Confidential,
Secret and Top Secret
Ensure that all documents notify readers about their
classification level
Document that all employees are aware of their current
security level
Change management
Change documentation and compliance
Change-management issues
Classification and Notification (cont’d)
Creating change
documentation
Documents can
include various
elements, including
a description of
the host, the reason
for the change, and
detailed information
about the change
itself
Retention and Storage Issues
Documentation will accrue through time. You
eventually must answer the following questions, so
write them into your security policy.
How long should old network documentation (e.g., network
maps) be stored?
When should procedures documents be revised?
How should the department dispose of old documents?