Reasons for Network Security
5 Security terms in Risk Management
Asset Vulnerability Threat Risk Countermeasure
Traffic Light Protocol (TLP)
is a set of designations used to ensure that sensitive information is shared with the correct audience. It employs four colors to indicate different degrees of sensitivity
(red, amber, green, white) = (dont share outside of group, dont share outside of organization, dont share outside of partnered organizations, share whenever you want)
Network Vulnerabilities can stem from:
Policy flaws, Design errors, protocol weaknesses, misconfiguration, software vulnerabilities, human factors, Malicious Software, Hardware Vulnerabilities, Physical access to network resources.
Common control methods that are used to implement countermeasures in network security:
Administrative: Written bolicies, procedures, guidelines and standards
Physical: Physical security for network equipment and servers.
Technical or Logical: Controls used to provide access to data in a manner that conforms to management policies. passwords, firewalls, intrusion prevention systems, access lists, VPN tunnels, etc.
3 network security objective categories (CIA triad)
Confidentiality
Integrity
Authentication
Confidentiality
Different methods of confidentiality are put in place to prevent sensitive information from reaching the wrong people, while making sure that only the right people can access it. (data at rest and data in motion)
Methods of implementing confidentiality:
Integrity
Availability
-Availability is all about making sure that your data is always available with a minimum of downtime
Factors that pertain to availability
Security Information Event Management (SIEM)
SIEM provides details on the source of suspicious activity, Including:
Using the information provided by SIEM what questions can network security engineers answer??
Internet of Things (IoT) Privacy
IoT Security
Attack Vector
Campus Area Network (CAN)
is a computer network that links the buildings and consists of two or more local area networks within the limited geographical area
Securing Hosts:
End points are secured using various features including antivirus, anti-malware software, host intrusion protection system features, and 802.1X authentication features
Securing Layer 2 Switches:
Access layer switches are secured, and they connect user-facing ports to the network. Several different features can be implemented, such as port security, DHCP, snooping, and 802.1X user authentication.
Securing Layer 3 Switches:
Distribution layer switches are secured and provide dsecure redundant trunk connections to the layer 2 switches. Several different features can be implemented, such as: ACLs, DHCP Snooping, Dynamic ARP Inspection (DAI), and IP source guard
Mobile Device Management (MDM) Security:
Intrusion prevention System (IPS)
a Cisco intrusion prevention system device continuously monitors incoming and outgoing traffic for malicious activity. it logs information about the activity and attempts to block and report it.
AAA Server
an authentication, authorization, and accounting server authenticates users, authorizes what they are allowed to do, and tracks what they are doing. These can be a RADIUS server, or a TACACS+ server.