Implementation Flashcards
Adds security features to RTP
- Keep conversations private
Encryption
- Uses AES to encrypt the voice/video flow
Authentication, integrity, and replay protection
-HMAC-SHA1 - Hash-based message authentication code using SHA1
SRTP (Secure Real-Time Transport Protocol)
Secure network time protocol
Cleaned up the code base
- Fixed a number of vulnerabilities
NTPsec
Public key encryption and digital singing of mail content
- Requires a PKI or similar organization of keys
S/MIME (Secure/Multipurpose Internet Mail Extensions)
Use a STARTTLS extension to encrypt POP3 with SSL or use IMAP with SSL
Secure POP and Secure IMAP
If the mail is browser based, always encrypt with SSL
SSL/TLS
Use public key encryption
- Private key on the server
-Symmetric session key is transferred using asymmetric encryption
- Security and speed
Browser-based management
Encrypted communication
HTTPS
Security for OSI Layer 3
- Authentication and encryption for every packet
Confidentiality and integrity/anti-replay
- Encryption and packet signing
Very standardized
- Common to use multi-vendor implementations
Two core protocols
- Authentication Header (AH)
- Encapsulated Security Payload (ESP)
IPSec
FTP over SSL
FTPS (File Transfer Protocol Secure)
Provides file system functionality
Resuming interrupted transfers, directory listings, remote file removal
SFTP (SSH File Transfer Protocol)
Protocol for reading and writing directories over an IP network
- An organized set of records, like a phone directory
X.500 specification was written by the International Telecommunications Union (ITU)
- They know directories
Lightweight and uses TCP/IP
Protocol used to query and update an X.500 directory
- Used in Windows Active Directory, Apple OpenDirectory, OpenLDAP, etc
LDAP (Lightweight Directory Access Protocol)
A non-standard implementation of LDAP over SSL
LDAPS (LDAP Secure)
Provides authentication using many different methods, i.e., Kerberos or client certificate
SASL (Simple Authentication and Security Layer)
Encrypted terminal communication
Replaces Telnet (and FTP)
Provides secure terminal communication and file transfer features
SSH (Secure Shell)
Validate DNS responses
- Origin authentication
- Data integrity
Public key cryptography
- DNS records are signed with a trusted third party
- Signed DNS records are published in DNS
DNSSEC
Confidentiality - Encrypted data
Integrity - No tampering of data
Authentication - Verifies the sources
SNMPv3 (Simple Network Management Protocol version 3)
Securing DHCP
- DHCP does not include any built-in security
- There is no “secure” version of the DHCP protocol
Rogue DHCP servers
- In Active Directory, DHCP servers must be authorized
- Some switches can be configured with “trusted” interfaces
- DHCP distributioin is only allowed from trusted interfaces
- Cisco calls this DHCP Snooping
- DHCP client DoS - Starvation attack
- Use spoofed MAC addresses to exhaust the DHCP pool
- Switches can be configured to limit the number of MAC addresses per interface
- Disable an interface when multiple MAC addresses are seen
Network address allocation
Automated subscriptions
- Anti-virus/Anti-malware signature updates
- IPS updates
- Malicious IP address databases/Firewall updates
Constant updates
- Each subscription uses a different update method
Check for encryption and integrity checks
- May require an additional public key configuration
- Set up a trust relationship
- Certificates, IP addresses
Subscription services
The user’s access - Applications and data
Stop the attackers - Inbound attacks, outbound attacks
Many different platforms - Mobile, desktop
Protection is multi-faceted - Defense in depth
The endpoint
Anti-virus is the popular term
- Refers specifically to a type of malware
- Trojans, worms, micro viruses
Malware refers to a broad malicious software category
- Anti-malware stops spyware, ransomware, fileless malware
The terms are effective the same these days
- The names are more of a marketing tool
- Anti-virus software is also anti-malware software now
- Make sure your system is using a comprehensive solution
Anti-virus and anti-malware
A different method of threat protection
- Scale to meet the increasing number of threats
Detect a threat
- Signatures aren’t the only detection tool
- Behavioral analysis, machine learning, process monitoring
- Lightweight agent on the endpoint
Investigate the threat
- Root cause analysis
Respond to the threat
- Isolate the sytem, quarantine the threat, rollback to a previous config
- API driven, no user or technician intervention required
Endpoint detect and response (EDR)
Where’s your data?
- Social Security numbers, credit card numbers, medical records
Stop the data before the attacker gets it
- Data “leakage”
So many resources, so many destinations
- Often requires multiple solutions
- Endpoint clients
- Cloud-based systems
- Email, cloud storage, collaboration tools
Data Loss Prevention (DLP)
The OSI Application Layer - All data in every packet
Can be called different names
- Application layer gateway
- Stateful multilayer inspection, deep packet inspection
Broad security controls
- Allow or disallow application features
- Identify attacks and malware
- Examine encrypted data
- Prevent access to URLs or URL categories
Next-generation firewall (NGFW)
Software-based firewall
- Personal firewall, runs on every endpoint
Allow or disallow incoming or outgoing application traffic
- Control by application process
- View all data
Identify and block unknown processes
- Stop malware before it can start
Manage centrally
Host-based firewall
Uses log files to identify intrusions
Can reconfigure firewalls to block
Host-based Intrusion Detection System (HIDS)