Security+ Prep Guide
Security+ Prep Guide
© 2017 TrainACE
Table of Contents
© 2017 TrainACE
www.trainace.com
1.15 Switches
1.16 Uniform Resource Locator (URL) Filtering
1.17 Virtual Private Network Concentrators (VPN)
1.18 Web Security Gateways
© 2017 TrainACE
www.trainace.com
1.3 Network Access Control (NAC)
1.8 Telephony
1.9 Virtualization
© 2017 TrainACE
www.trainace.com
Network Security: An Introduction
A secure network is essential to any organization’s business operations. An
unsecured network is an open invitation to all kinds of cyber attacks, much like
leaving the front door unlocked at night.
© 2017 TrainACE
www.trainace.com
Security Network Devices and
Technologies: Functions and
Purposes
All-in-one Anti-SPAM Application Dual-Homed
Content and Multi -
Security and Email Firewall Filtering Homed
Inspection
Appliances Hygiene Firewall Firewalls
• IPS
• IDS
• Web filtering
• Email filtering
• Malware scanning
• VPN support
© 2017 TrainACE
www.trainace.com
• Combined firewalls
• Others
1.2 Anti-SPAM and Email Hygiene – are part of data loss prevention mechanism
that organizations implement for regulations compliance and best practices
application. Messaging systems also offer secure email programs to reroute and
encrypt messages according to predefined conditions.
Anti-SPAM and email hygiene measures seek to protect against threats such as:
• SPAM
• Scams
• Phishing attacks
• Malicious code attachments
• Other unsolicited email messages
Email filtering solutions come in both hardware and software versions. These ensure
delivery of legitimate emails and denial of unsolicited ones. Email filtering strategies
include:
Email filtering solutions are best placed nearest the sources of messages that need
to be filtered. Ex. Internet-based email should be filtered at the gateway.
Note: The unsolicited email problem now extends to other technological divides such as
phone-based text message and VoIP systems spamming.
© 2017 TrainACE
www.trainace.com
1.3 Content Inspection – this type of filter evaluates displayed web page
content for irrelevant, sensitive, and objectionable data to a business’
operations. Content inspection is commonly used as data loss prevention
control as well as to deny access to specific content.
1.4 Firewalls – Most commonly the first line of defense against Internet-
based attacks, firewalls are an integral component of network security
strategies. Firewalls are a software package or appliance that segregates
public and private networks in a logical manner. It supervises transmitted
traffic between the two in both ingress (network inbound) and egress
(network outbound) directions. Firewalls use network rule sets and traffic
filtering mechanisms to recognize traffic that should be allowed or denied
access to a network. It can also be used to extend protection to internal sub-
networks under the main network scope.
From the first, firewalls have been developed according to their functions, platform
support, and placement and positioning within a network. Modern firewalls today
are capable of network traffic deep packet analysis through a combination of
application filtering and use of intrusion prevention technology into a single unit.
These are often used not only on network perimeters but also on internal networks,
workstations, and servers in response to menacing progress observed in threats.
© 2017 TrainACE
www.trainace.com
interfaces they use. Dual-home firewalls use separate interfaces for the
external and internal networks while multi-homed firewalls contain multiple
interfaces for both connections. Multiple interfaces are typically used to
define demilitarized zone (DMZ) segments. These allow Internet facing
services (such as email, serves, and DNS) to function without exposing an
internal network to risk.
Note: Many security analysts and providers use the term Next Generation Firewalls due to its
popularity.
Rule sets or access control lists (ACL) are generally configured to evaluate packets
through analysis of packet headers for source and destination addresses, ports
(TCP/UDP), protocols, or a combination of these. Based on these assessments,
packet filtering firewalls will make a decision whether to allow or deny packets
access.
Packet filtering firewalls are scalable, useful for restricting traffic flow, and usually
perform well. However they are also vulnerable to attacks particularly those that
© 2017 TrainACE
www.trainace.com
exploit potential loopholes in applications. Packet filtering firewalls are also
incapable of recognizing packets that bear falsified or spoofed network addresses.
• Cross-site scripting
• SQL injection attacks
• Vandalism
• Other malicious codes
Aside from scanning for threats, web application firewalls also validate user input,
sanitize output, and learn how an application should operate. Organizations that
process Internet-based credit card transactions and need to comply with PCI
standards use web application firewalls or submit a vulnerability assessment of web
application environment. The Open Web Application Security Project (OWASP) is
the authority that certifies whether web application firewalls meet or go beyond
requirements.
Note: Web application firewalls differ from network firewalls because they fulfill
a specific role and provide countermeasures that network firewalls don’t
© 2017 TrainACE
www.trainace.com
1.5 Internet Content Filters – because no restrictions exist regarding the content
posted on the Internet, individuals and organizations alike set their own policies to
manage content delivery using Internet content filters. These filters restrict different
types of information by scanning for questionable or malicious:
• Keywords
• Hostnames
• URLs
• Malware
On the other hand, web security gateways, all-in-one security appliances, and host
based solutions address risks linked with accessing Internet hosted content.
1.6 Load Balancer – load balancers disperse a huge load across multiple systems,
devices, and networks to avoid overload on a single unit. It comes in both hardware
and software forms, with different options for services. Another kind of load
balancing is known as round robin DNS which does not need dedicated hardware
or software. Round robin DNS instead designates multiple IP addresses to one
specified fully qualified domain name (FQDN).
© 2017 TrainACE
www.trainace.com
host-based malware scanning systems is a strongly recommended security
measure.
Once these are identified, NIDS sends alerts to administrators for investigation.
© 2017 TrainACE
www.trainace.com
internal machines behind anonymity and improving network performance by
caching resources which are commonly requested.
Routers are not meant to replace firewalls, which are designed and dedicated to
security. Therefore, strict guidelines should be enforced when a router is added to a
network to address exposure issues. Unlike internal network routers or physically
connected routers, wireless routers/wireless access points/Internet facing routers are
more exposed.
Note: Switches join local network segments while routers set up connectivity
© 2017 TrainACE
www.trainace.com
1.14 Screened Subnet – screened subnets are defined by a configuration where
external traffic passes through a router first before going through a firewall. Traffic
must pass through an additional firewall if it is destined for hosts within an internal
network.
1.15 Switches – switches restrict network traffic by exclusively delivering traffic to the
switch a host is connected to. To accomplish this, switches keep a table which map
device MAC addresses to switchport numbers.
Switches function at OSI protocol layers one to three devices that connect network
segments and individual computers. They come in a variety of sizes and shape from
compact four-port Ethernet units to 48-port Gigabit units.
Network switches are able to establish virtual LANs (VLANs) for improved corporate
network administration and security. VLAN is the logical grouping of systems based
on security, resource, or business reasons rather than physical location. Modern
multilayer switches are capable of:
• Inspecting packets
• Ranking traffic priority
• Performing as Routers
• Serving as Load Balancers
• Adding Quality of Service (QoS) to network traffic
To properly guard against such threats, switches and VLANs alike need to be
configured correctly.
Note: Hubs broadcast traffic on all ports while switches deliver exclusively.
© 2017 TrainACE
www.trainace.com
1.16 Uniform Resource Locator (URL) Filtering – URL filters check hyperlinks
and URL for specific commands, keywords, and malicious code. This type of
filtering is usually utilized by web and email scanning engines. URL filters use
reputation services and usually access the suspicious content in a sandboxed
environment to check if resource request is questionable in nature. For tiny
URLs, a plug-in is necessary for URL filtering.
Note: Use of tiny or short URLs is a technique often used by cyber attackers.
VPN concentrators are offered by vendors in various feature set model by model.
These can be used to establish connections between remote offices and
organizations. VPN concentrators come in both IPSec and SSL configuration (few
providers offer support for both). Superior VPN concentrators are able to encrypt
entire sessions and wipe them out once they are concluded. Other VPN
concentrators integrate firewall technologies to permit or deny access according to
health checks of connecting systems like security patches and antivirus programs.
VPN concentrators may offer remediation options for discovered issues as well.
1.18 Web security gateways – are used to filter inbound and outbound
web traffic, suspicious codes, malicious content, and usage of application to
guard against Internet-based attacks.
In cases of outdated web browsers and neglected security updates, web security
gateways serve as an essential feature in defense-in-depth strategy residing at an
organization’s Internet Gateway. Web security gateways are generally available as
appliances which offer several modules and licensing options.
© 2017 TrainACE
www.trainace.com
• Filtering of web traffic (malicious content and code)
• Detect and take action on applications
• Avert information leakage
• Impose email security controls
© 2017 TrainACE
www.trainace.com
Network Administration Principles:
Application and Implementation
Access Control
802.1x Firewall Rules Flood Guard
Lists (ACL)
Loop Network
Implicit Deny Port Security
Protection Bridging
• RADIUS systems
• TACACS+
• Network Access Control (NAC)
• Network Access Protection (NAP)
• Others
© 2017 TrainACE
www.trainace.com
However, 802.1x doesn’t uses the Point-to-Point Tunneling protocol that EAP
traditionally required. In addition, 802.1x is capable of creating encrypted tunnels
where credentials can pass between devices and the authentication server.
Devices requesting connection to the network, also known as supplicants, are first
sent to an authenticator to be fitted with credentials (e.g., user ID/password set).
The credentials are forwarded by the authenticator to the authentication server to
be validated for access permission or denial.
1.2 Access Control Lists (ACL) – ACLs constitute basic security checklists that are
used in assessing permitted access and actions. An access control list dictates
which actions a user may execute when modifying, accessing, or creating a
specific object such as applications and services. These are defined by
administrators as basic permission schemes to specify how a subject or group of
subjects may interact with a protected data or resource.
Several technologies from file permissions to firewalls are deployed to preserve ACL
and avert illegal access to protected resources.
1.3 Firewall Rules – firewall rules should be set to ‘deny all’ unless purposely
allowed.
This can be configured by setting the last rule in the set to either deny-any or block.
Firewalls rules in this context are specified to deny traffic that failed to meet
predefined criteria in the rule set. By following the deny-all concept, firewall rules
achieve the most secure design. It also presents an effective point of discussion in
cases where business requirement validation necessitates a new rule or
modification in the existing rule set.
1.4 Flood Guard – flood guards serve as preventive control against denial-of-
service (DoS) or distributed denial-of-service (DDoS) attacks. Flood guards
are available either as standalone devices or as firewall components. It is
© 2017 TrainACE
www.trainace.com
capable of monitoring network traffic to identify DoS attacks in progress
generated through packet flooding. Examples of DoS and DDoS attacks
are:
• Ping flood
• MAC flood
• UDP flood
• ICMP flood
• SYN flood
These attacks seek to disrupt or take down network services by overwhelming the
target network with requests. When a flood guard detects a DoS attack it drops the
packets or applies filters rule sets on switches and routers.
1.5 Implicit Deny – the ‘implicit deny’ security stance treats everything not
given specific and selective permission as suspicious. Network boundaries
that follow an implicit deny concept only allows specific IP addresses and/or
service ports while blocking all others. On the contrary, a network implicitly
allows traffic when it operates on an open computing environment to which
any connection may be established. The “implicit deny” concept generally
applies to information security principles.
Note: An ‘explicit deny’ security stance blocks traffic from particular addresses and towards
specific ports.
© 2017 TrainACE
www.trainace.com
• Operational problems
• Security risks
• Possible looping
• Degradation of network performance
VLANs can be specified in switches to establish firewall routers and logically isolated
networks to prevent network bridging.
1.8 Port Security – port security can be divided into two categories based
on the OSI model.
Physical Port Security Network Port Security
Can be unplugged Unused ports are closed
Can be enabled with MAC address Monitored by firewalls recognition
Covers physical objects such as Ethernet Controls port usage with TCP and UDP
jacks and USB ports protocols
Can be blocked on a local system using: A significant number of most commonly
• Physical plugs used ports are frequently left open (0 BIOS settings
1023 of 65,535 ports available)
• Device control settings
Device products generally allow for exclusive use
of permitted devices
Network ports are usually scanned by attackers to identify available ports and the
services allowed on them. Security professionals should ensure that only ports crucial
© 2017 TrainACE
www.trainace.com
to a business’ operations are left open, with strict rules sets to govern traffic. The
amount of traffic should also match the port’s requirements.
Note: A technique called port knocking considers all ports closed until a connection request
is made to a particular port. In the event of a connection request, firewall rules are
immediately changed once the connecting system supplies an encrypted packet or sends
the correct sequence on the connection string.
1.9 Rule-Based Security Management – this type of security
management uses rule sets to define the scope of what kind of activities
should be allowed on a network. If the requested activity fails to match the
pre-defined rules for the network, it is implicitly denied. This entails that the last
rule in the set should default to a deny action or decision.
• Firewalls
• IPS
• Proxies
• Email filters
• Web filters
• IDS
© 2017 TrainACE
www.trainace.com
The last step mentioned above, blocking the ICMP redirect traffic, acts as a
preventive security control against attacks such as ICMP floods and the ping of
death that leverage ICMP protocol for malicious purposes.
Note: Setting up wireless routers and wireless access points for secure router configuration
require additional steps.
© 2017 TrainACE
www.trainace.com
Design Elements and Compounds: Identification and
Distinction
Remote Access
Remote Access Subnetting Telephony
Servers
Companies that rely on cloud computing and cloud-based resources should take
effective means to implement stable and secure Internet connection. Multiple
Internet connections, failover, and load-balancing should also be considered when
using cloud services.
Cloud computing is a powerful tool that carries its own benefits and risks.
Companies should weigh these carefully before using cloud computing for their
operations.
© 2017 TrainACE
www.trainace.com
Storage Centralized, off-site storage frees • How and where data will
up space for company use be stored
• Levels of encryption used
• Data replication to other
facilities
Responsibility Cloud provider is responsible for • Physical and logical
maintenance and security of all: security measures used at
• Servers the cloud facility
• Operating systems • Effectiveness of company
• Infrastructure security policy regarding
• Issue resolutions cloud computing risks
• SAS 70 compliance of the
cloud provider
Solutions Cloud-hosted solutions include: • What disaster recovery and
• Redundancy business continuity plans
• Failover are used by the cloud
• Load-balancing provider
• What incident response
procedures are used by
the cloud provider
• How and when client will
be notified in case of
security breach
Access Usually no download or Who can access the systems
installation of software is and users’ data
required for clients to access
cloud computing services
While cloud computing reduces cost and need for additional resources, it carries
significant security risks that companies need to be prepared for.
1.2 Demilitarized Zone (DMZ) – a DMZ is a portion of a network kept
separate from the protected internal network for security purposes. The DMZ
sets up a physically separate buffer zone meant for public-facing private
company servers like web and FTP. DMZs provide a compromise between
public services and private servers operation without full exposure to threats
and high-risk environments.
© 2017 TrainACE
www.trainace.com
1.3 Network Access Control (NAC) – a frequently used networking
security solution, NAC seeks to validate existing functional security controls on
a system requesting connection before it is allowed access to the network.
NAC checks for and defines security controls such as:
• Firewalls
• Operating system
• Virus protection
• Service packs
• 802.1x
• Other network security enforcement procedures
NAC is useful for implementing system health requirements upon network access.
Systems that are recognized to be unhealthy are either administratively denied
access or redirected to an issue resolution site relevant to its security issues. For
example, a system with outdated anti-malware protection may be forwarded to an
Intranet Web site to mitigate its security issues. Once the security risk has been
addressed, users are usually allowed to reconnect.
© 2017 TrainACE
www.trainace.com
1.5 Remote Access – offers convenient remote connection to networks.
Remote access solutions can be applied in a variety of ways such as:
Remote access servers that allow access to internal network resources should be
protected irrespective of the remote access solution used. It is recommended that
publicly accessible RAS systems be audited and monitored for security purposes.
1.6 Remote Access Servers – these systems provide connection to a server for
authentication and access grant to internal network resources. Connections usually
are made through modem from the Internet.
• Time boundaries
- Availability
- Session length
- Timeouts
• Implementation of particular authentication mechanism
• Directing network traffic to travel along specified route
RAS servers are frequently positioned in DMZ, with firewall devices next in line along
the route.
1.7 Subnetting – is the logical division of a network into classes of smaller networks,
or subnets. Subnetting prevents Ethernet collisions and conflicts in address
assignment.
© 2017 TrainACE
www.trainace.com
Subnets are classified into Class A, B and C segments according to their progressively
smaller sizes. These can be individually protected by firewalls as well as given various
access rights and network permissions based on their job functions.
• Wired/wireless phones
• Voicemail systems
• Digital computers
Both guest systems and the physical system should have security measures
implemented such as firewalls and virus protection.
Note: Some security products include protection measures for virtual environment
components. Ex. Prevention of terminating virtual machine processes.
1.10 Virtual Local Area Network (VLAN) – VLAN is logically arranging a single
physical switched network into segments of multiple logical networks. A single
company may use multiple VLAN broadcast domains to quarantine
© 2017 TrainACE
www.trainace.com
crosscontaminations and manage departments. Each VLAN broadcast domain
may be individually protected according to the needs of the network. LAN
segments may be dispersed across a single campus or throughout various regions in
the country.
© 2017 TrainACE
www.trainace.com
Common Protocols:
Implementation and Usage
Hypertext
Commonly Used File Transfer
Domain Name Transfer
Default Network Protocol Secure
System (DNS) Protocol Secure
Ports (FTPS)
(HTTPS)
1.1 Commonly Used Default Network Ports – Port usage is assigned by the Internet
Assigned Numbers Authority (IANA) to applications and processes. These are divided
into three ranges:
© 2017 TrainACE
www.trainace.com
List of default network ports:
Protocol Port
1.2 Domain Name System (DNS) – DNS is a key network component that preserves
hosts records and resolves host names to IP addresses for system access through
name or IP address. A company’s name servers need auditing and assessment to
avoid security risks facing DNS such as:
© 2017 TrainACE
www.trainace.com
1.3 File Transfer Protocol Secure (FTPS) – FTPS incorporates additional support to FTP
for TLS and SSL so that connecting systems can securely transfer files. FTPS operates
in two modes:
Note: Secure FTP and SSH File Transfer Protocol are not the same as FTPS.
HTTPS connections operate below application layers for HTTP messages encryption
before being transmitted. This is also applicable to incoming message decryption
© 2017 TrainACE
www.trainace.com
upon arrival. Web browsers generally integrate HTTPS for page request encryption
and decryption across TCP port 443 instead of port 80 (usually used with HTTP).
Note: HTTPS is not the same as secure HTTP (S-HTTP, RFC 2660). The latter is an alternative
though commonly used for web transaction encryption.
1.5 Internet Control Message Protocol (ICMP) – ICMP is part of the Internet Protocol
(IP) suite and used in error message transmission (not data). ICMP is utilized by
traceroute, pings, and other similar tools. Routers can block ICMP traffic delivery to avoid
network attacks such as ICMP flooding and ping of death.
1.6 Internet Protocol Security (IPSec) – IPSec is an OSI layer 3 network level
cryptographic framework that provides authentication header (AH) and encapsulating
security payload (ESP) services. Using AH and ESP together enables secure
communication and data integrity through the following steps:
© 2017 TrainACE
www.trainace.com
IPSec functions in two modes of operation:
IPSec Operation Modes Function Application
Transport Mode Only encrypts packet Endpoints connections
payload
(Note: Plaintext Telnet Ex. Host-to-host
sessions can travel Host-to-gateway
between workstation to
router via IPSec)
Tunnel Mode Serves like a proxy to Used between gateways
accommodate hidden in network topology
hosts
Encrypts entire packet Ex. Secure connectivity
including the header between branch
officeheadquarters,
houseworkplace, etc.
1.7 IPSec Key Management Functions – The Internet security association and key
management protocol (ISAKMP) establishes key management functionality for
IPSec. Key functions include authentication, distribution, and generation of
cryptographic keys for secure communications. ISAKMP also integrates mechanisms
for negotiation, establishment, modification, and deletion of security associations
(SAs) including respective attributes. Through ISAKMP, cryptographic Internet Key
Exchange (IKE) keys and SAs can be dispersed in a scalable and standard method.
ISAKMP also provides procedures for:
• Peer authentication
• Creation, generation, and management of keys or SAs
• Neutralization of well-known network attacks
1.8 IPv4 and IPv6 – both IPv4 and IPv6 are essential computer networking protocols
but differ from each other in several respects.2128, or approximately 3.4×1038
addresses, or more than 7.9×1028 times as many as IPv4
© 2017 TrainACE
www.trainace.com
IPv4 IPv6
Network address translation (NAT) addressed IPv4 exhaustion concerns but IPv6
remains relevant.
1.9 Secure Copy (SCP) – SCP is a protocol for transferring files through a SSH session
using RCP commands on Unix system. Unlike FTP, SCP retains file permissions and
timestamps through inclusion with the transferred files themselves, thereby ensuring
data confidentiality during transit.
1.10 Secure FTP – also known as SSH FTP (SFTP) and FTP Secure (FTPS. Both supply
mechanisms for secure file transfer but vary in method. FTPS – uses SSL or TLS for
traffic flow encryption
SFTP clients must transact with a SFTP client or run a command line. SFTP servers will
not work with standard FTP clients and vice versa.
1.11 Secure Shell (SSH) – SSH was traditionally designed to secure remote
administrative login and shell. SSH establishes secure activities between networked
© 2017 TrainACE
www.trainace.com
devices such as logins, channels, and transfers. SSH prevents malicious third party
attacks such as eavesdropping, connection tampering, and interception.
Because Telnet, FTP, and NFS is vulnerable to attacks due to transmission of details in
cleartext (ex. login credentials), SSH supplies the need for cryptography to ensure
network privacy. SSH2 uses public key cryptography as well as traditional
username/password logins for authentication.
1.12 Secure Socket Layer (SSL) – SSL is an OSI layer 4 transport layer encryption
protocol used for securing end-to-end tunnels that HTTP and application traffic use
to pass through. SSL sessions are ‘stateful’ because connection states are kept from
initiation to connection teardown.
• SNMP Versions 1 and 2–transmits in clear text, sets default community strings
to read/write
• SNMP Version 3 – provides additional confidentiality and integrity by
incorporating packet encryption to transmitted data
Note: SNMP should be disabled on devices that do not require it. Default
© 2017 TrainACE
www.trainace.com
1.13 Transmission Control Protocol / Internet Protocol (TCP/IP) –
TCP/IP are networking components considered part of TCP/IP
protocol suites.
1.14
Function
• Commonly used by Internet
applications, email, file transfers,
etc.
• Supplies a stable data stream
between programs from different
systems
• Able to request package resending
Note: TCP and IP are melded into one term (TCP/IP) because they are frequently used
together.
1.15 Transport Layer Security – TLS is preceded by the SSLv3 protocol, which it
phased out. TLS follows the same Internet Engineering Task Force (IETF) standards
track RFC 5246 originally based on early SSL specification. TLS is not
backwardcompatible with its predecessor SSL but creates cryptographically-secure
endpoint (ex. host-to-host) connectivity that can guard against attacks like
tampering, message forgery, and eavesdropping. Both parties of a conversation
© 2017 TrainACE
www.trainace.com
can be mutually authenticated using TLS thanks to its bidirectional authentication
mode.
© 2017 TrainACE
www.trainace.com
VI. Key Terms Review List
• Asymmetric Encryption • Mandatory Access
• Authentication Control
• Authentication Factors • Mandatory Vacations
/Two factor Mantrap
• Backdoors • Mutual Authentication
• Block Ciphers • NAC - Network Access
• Botnet Control
• Certificate Authority • NAT - Network Address
• Certificate Revocation Translation
List • Non-Repudiation
• Chain of Custody • Phishing
• CIA • PKI
• Ciphers • Positive pressurization
• Cryptography RAID and Types
• Denial of Service (DOS) • Registration Authority
• Device Encryption • Remote Wipe /Sanitation
• Digital Certificates • Rogue Access Points
• Discretionary Access • Role based Access
Control Control RootKits
• Distributed Denial of • Rule based Access
Service Control
(DDOS)
• DNS Poisoning Evil Twin
• Flood Guards
• Honeypot
• Hot Site/ Cold Site /
Warm Site Job Rotation
• Kerberos
• Key Escrow
• Least Privilege
• Logic Bombs
• Looping/SPT
© 2017 TrainACE
www.trainace.com
• Separation of Duties • UPS
• Skimming • Virus
• Smart Card • Vishing
• Social Engineering • VOIP/SIP and RTP
• SPAM • War Dialing
• SPIM • War driving/War Chalking
• Stream • Whaling
• Symmetric Encryption • White Box/Black Box
• Trojans