Module 1 Network Security Introduction
Module 1 Network Security Introduction
Vulnerability:
Vulnerabilities in network security can be summed up as the “soft spots” that are present in
every network. The vulnerabilities are present in the network and individual devices that
make up the network.
Networks are typically plagued by one or all of three
primary vulnerabilities or weaknesses:
i. Technology weaknesses
Weakness Description
TCP/IP protocol HTTP, FTP, and ICMP are inherently insecure. Simple Network
weaknesses Management Protocol (SNMP), Simple Mail Transfer Protocol
(SMTP), and SYN floods are related to the inherently insecure
structure upon which TCP was designed.
Operating The UNIX, Linux, Macintosh, Windows NT, 9x, 2K, XP, and OS/2
system Operating systems all have security problems that must be addressed.
weaknesses
System accounts with This common problem is the result ofpoorly selected and
Weakness How the Weakness Is Exploited
Security Policy Weaknesses Security policy weaknesses can create unforeseen security
threats. The network can pose security risks to the network if users do not follow the security
policy.
Lack of continuity Poorly chosen, easily cracked, or default passwords can allow
unauthorized access to the network.
Threats
The people eager, willing, and qualified to take advantage of each security weakness, and
they continually search for new exploits and weaknesses.
i. Unstructured threats:
a. Unstructured threats consist of mostly inexperienced individuals using easily available
hacking tools such as shell scripts and password crackers.
b. Even unstructured threats that are only executed with the intent of testing and challenging
a hacker’s skills can still do serious damage to a company.
ii. Structured threats:
a. Structured threats come from hackers who are more highly motivated and technically
competent.
b. These people know system vulnerabilities and can understand and develop exploit code
and scripts.
c. They understand, develop, and use sophisticated hacking techniques to penetrate
unsuspecting businesses. These groups are often involved with the major fraud and theft
cases reported to law enforcement agencies.
iii. External threats:
a. External threats can arise from individuals or organizations working outside of a company.
They do not have authorized access to the computer systems or network.
b. They work their way into a network mainly from the Internet or dialup access servers.
iv. Internal threats:
a. Internal threats occur when someone has authorized access to the network with either an
account on a server or physical access to the network.
b. According to the FBI, internal access and misuse account for 60 percent to 80 percent of
reported incidents.
Attacks
The threats use a variety of tools, scripts, and programs to launch attacks against networks
and network devices. Typically, the network devices under attack are the endpoints, such as
servers and desktops.
i. Reconnaissance
ii. Access
System access is the ability for an unauthorized intruder to gain access to a device for which
the intruder does not have an account or a password. Entering or accessing systems to which
one does not have authority to access usually involves running a hack, script, or tool that
exploits a known vulnerability of the system or application being attacked.
a. A computer virus is a program that is loaded on your computer without your knowledge
and runs without your permission. A virus is designed to reproduce itself through legitimate
processes in computer programs and operating systems; therefore, a virus requires a host in
order to replicate.
b. The term, Trojan horse, is usually used to refer to a non-replicating malicious program
which is the main characteristic that distinguishes it from a virus. Trojan horses often appear
as e-mail attachments with enticing names that induce people to open them.
c. A worm is a small piece of software that uses security holes within networks to replicate
itself. The worm scans the network for another computer that has a specific security hole. It
copies itself to the new machine exploiting the security hole, and then starts replicating from
that system as well.
There are more devices connected to the internet than ever before. This is music to
an attacker's ears, as they make good use of machines like printers and cameras
which were never designed to ward off sophisticated invasions. It's led companies
and individuals alike to rethink how safe their networks are.
As the amount of these incidents rises, so does the way we need to classify the
dangers they pose to businesses and consumers alike. Three of the most common
terms thrown around when discussing cyber risks are vulnerabilities, exploits, and
threats. Here’s a breakdown of each and what they mean in terms of risk:
What Is a Vulnerability?
Mistakes happen, even in the process of building and coding technology. What’s left
behind from these mistakes is commonly referred to as a bug. While bugs aren’t
inherently harmful (except to the potential performance of the technology), many
can be taken advantage of by nefarious actors—these are known as vulnerabilities.
Vulnerabilities can be leveraged to force software to act in ways it’s not intended to,
such as gleaning information about the current security defenses in place.
Generally speaking, a vulnerability scanner will scan and compare your environment
against a vulnerability database, or a list of known vulnerabilities; the more
information the scanner has, the more accurate its performance. Once a team has a
report of the vulnerabilities, developers can use penetration testing as a means to
see where the weaknesses are, so the problem can be fixed and future mistakes
can be avoided. When employing frequent and consistent scanning, you'll start to
see common threads between the vulnerabilities for a better understanding of the
full system. Learn more about vulnerability management and scanning here.
There are a number of Security Vulnerabilities, but some common examples are:
What Is a Threat?
While it may seem like you’re constantly hearing about a new attack or cyber threat
in the world, these terms can help give further context to the stages and dangers
that security professionals deal with on a daily basis. So, what can you do to lower
your overall risk? For a proactive approach, scan your environment for
vulnerabilities with a vulnerability management tool. To stay responsive to unwanted
activity, Security Information and Event Management (SIEM) is a systematic
process that can make it easier to control what's happening on your network. SIEM
tools can help companies set up strong, proactive defenses that work to fend off
threats, exploits, and vulnerabilities to keep their environment safe.
1) Identifying Vulnerabilities
2) Evaluating Vulnerabilities
3) Treating Vulnerabilities
4) Reporting Vulnerabilities
Step 1: Identifying Vulnerabilities
Vulnerability scanners aren’t the only way to gather system vulnerability data
anymore, though. Endpoint agents allow vulnerability management solutions to
continuously gather vulnerability data from systems without performing network
scans. This helps organizations maintain up-to-date system vulnerability data
whether or not, for example, employees’ laptops are connected to the organization’s
network or an employee’s home network.
After vulnerabilities are identified, they need to be evaluated so the risks posed by
them are dealt with appropriately and in accordance with an organization’s risk
management strategy. Vulnerability management solutions will provide different risk
ratings and scores for vulnerabilities, such as Common Vulnerability Scoring
System (CVSS) scores. These scores are helpful in telling organizations which
vulnerabilities they should focus on first, but the true risk posed by any given
vulnerability depends on some other factors beyond these out-of-the-box risk ratings
and scores.
Like any security tool, vulnerability scanners aren’t perfect. Their vulnerability
detection false-positive rates, while low, are still greater than zero. Performing
vulnerability validation with penetration testing tools and techniques helps weed out
false-positives so organizations can focus their attention on dealing with real
vulnerabilities. The results of vulnerability validation exercises or full-blown
penetration tests can often be an eye-opening experience for organizations that
thought they were secure enough or that the vulnerability wasn’t that risky.
Once a vulnerability has been validated and deemed a risk, the next step is
prioritizing how to treat that vulnerability with original stakeholders to the business
or network. There are different ways to treat vulnerabilities, including:
When remediation activities are completed, it’s best to run another vulnerability
scan to confirm that the vulnerability has been fully resolved.
Threats and attackers are constantly changing, just as organizations are constantly
adding new mobile devices, cloud services, networks, and applications to their
environments. With every change comes the risk that a new hole has been opened
in your network, allowing attackers to slip in and walk out with your crown jewels.
Every time you get a new affiliate partner, employee, client or customer, you open
up your organization to new opportunities, but you’re also exposing it to new
threats. Protecting your organization from these threats requires a vulnerability
management solution that can keep up with and adapt to all of these changes.
Without that, attackers will always be one step ahead.
1. Identifying vulnerabilities
The first and most essential step in any vulnerability management process, of
course, is to bring to light all of the vulnerabilities that may exist across your
environment. A vulnerability scanner goes about this by scanning the full range of
accessible systems that exist—from laptops, desktops, and servers on to
databases, firewalls, switches, printers, and beyond.
From there, the vulnerability scanner identifies any open ports and services that are
running on those systems, logging in to those systems and gathering detailed
information where possible before correlating the information it obtains with known
vulnerabilities. This insight can be used to create reports, metrics, and dashboards
for a variety of audiences.
2. Evaluating vulnerabilities
Once you’ve identified all the vulnerabilities across your environment, you’ll need to
evaluate them in order to appropriately deal with the risks they pose according to
your organization’s risk management strategy. Different vulnerability management
solutions use different risk ratings and scores for vulnerabilities, but one commonly
referenced framework for new programs is the Common Vulnerability Scoring
System (CVSS).
Vulnerability scores can help organizations determine how to prioritize the
vulnerabilities they’ve discovered, it’s important to also consider other factors to
form a complete understanding of the true risk posed by any given vulnerability. It’s
also worth noting that vulnerability scanners can generate false positives in rare
instances, thus underscoring the necessity of including other considerations in
addition to risk scores at this stage of the process.
3. Treating vulnerabilities
After you’ve prioritized the vulnerabilities that you’ve found, it’s important to
promptly treat them in collaboration with your original business or network
stakeholders. Depending on the vulnerability in question, treatment usually
proceeds according to one of the following three paths:
4. Reporting vulnerabilities
Improving the speed and accuracy with which you detect and treat vulnerabilities is
essential to managing the risk that they represent, which is why many organizations
continually assess the efficacy of their vulnerability management program. They can
take advantage of the visual reporting capabilities found in vulnerability
management solutions for this purpose. Armed with the insights needed, IT teams
can identify which remediation techniques will help them fix the most vulnerabilities
with the least amount of effort. Security teams, for their part, can use this reporting
to monitor vulnerability trends over time and communicate their risk reduction
progress to leadership. Ideal solutions will include integrations with IT ticketing
systems and patching tools to accelerate the process of sharing information
between teams. This helps customers make meaningful progress toward reducing
their risk. Businesses can also use these assessments to fulfill their compliance and
regulatory requirements.
Four tips for a better vulnerability management
program
Businesses face growing risks as the attack surface continues to expand, increasing
the number of vulnerabilities for hackers to exploit. Vulnerability management
programs give companies a framework for managing these risks at scale, detecting
vulnerabilities across the entire environment with greater speed. Meanwhile,
analytics help organizations continually optimize the techniques they use for
remediation. With a strong vulnerability management program in place, businesses
can better address the risks they face not only today but well into the future.
Common areas that will need patches include operating systems, applications, and
embedded systems (like network equipment). When a vulnerability is found after the
release of a piece of software, a patch can be used to fix it. Doing so helps ensure
that assets in your environment are not susceptible to exploitation.
It would be a poor strategy to just install new patches the second they become
available for all assets in your organization's inventory without considering the
impact. Instead, a more strategic approach should be taken. Patch management
should be implemented with a detailed, organizational process that is both cost-
effective and security-focused.
Make a list of all security controls that are in place within your
organization: Keep track of your firewalls, antivirus, and vulnerability
management tool. You’ll want to know where these are sitting, what they’re
protecting, and which assets are associated with them.
It’s up to organizations to decide which option is best for them in specific situations,
though patching is the ideal treatment to ultimately strive for.
Establish asset management. Your ability to reduce risk is only as good as the
visibility you have into your environment. An asset management solution helps
you gain a full understanding of the assets you have and the vulnerabilities
associated with each asset. With that knowledge, you are equipped to prioritize
vulnerabilities, remediate issues, and communicate effectively with stakeholders.
Prioritize vulnerabilities. With limited time and resources and an ever-changing
threat landscape, it’s unrealistic to think that you can fix every vulnerability as
soon as it appears. Consequently, prioritization is one of the most critical aspects
of vulnerability management.
Remediate vulnerabilities to reduce risk. Identifying and prioritizing
vulnerabilities is important, but you’re not actually reducing risk unless you’re
remediating the issues.
Measure the success of your vulnerability management program. No matter
how many fancy features a vulnerability management solution has, it’s only worth
the investment if it meets your organization’s unique needs and adds value for
you and your team. To determine if you’re achieving a good ROI—and justify the
purchase to senior leadership—you’ll have to determine how to measure
success.
Develop partnerships and support. When something goes wrong, you want to
know you have a team of people you can rely on to help troubleshoot.
What is Incident Response?
When a security team detects a threat, it’s essential organizations are ready for
what comes next. That requires having a tightly coordinated incident response plan
(IRP) and sequence of actions and events assigned to specific stakeholders on a
dedicated incident response team. Some businesses may have their own in-house
team, some may outsource their incident response services , while others might take
a hybrid approach where they outsource technical analysis but manage the rest of
the IRP in-house. Either way, this team should have trained and planned for these
incident response events well before any trouble rears its head.
Organization-Wide Preparation
Preparation is key to allow for fast action when minutes matter. It’s not ideal to wait
until a situation becomes a full-fledged escalated incident to start chasing down and
educating stakeholders. Major players should know their responsibilities well ahead
of time so that they only need the signal to jump into action. To help ensure team
members are trained and empowered enough to take the right actions, at the right
time, teams should conduct non-technical tabletop exercises and full breach
simulations to run through the technical and non-technical processes.
After successfully responding to an incident, it's not time to rest just yet. The
incident response team should conduct a post-mortem to learn from the experience
—both to fine tune their incident response program specifically, and also to retune
their security program overall. What worked, what didn't work, and what could work
better or faster? There's no better teacher than experience, so it’ll be important to
glean as many lessons as possible from responding to a real incident.
An incident response plan delineates what steps need to be taken, and by whom,
when a breach or security crisis occurs in an organization. A robust response plan
should empower teams to leap into action and mitigate damage as quickly as
possible. Emergency responders go through regular training simulations and
process checks, so when a situation arises they know how to act almost by muscle
memory. Information security teams would be wise to follow their example: When an
emergency occurs, you don’t want to waste time figuring out incident response
processes and procedures while precious minutes are ticking away. Having a plan
in place becomes paramount.
To prevent this from happening to your organization, your incident response team
should have a carefully mapped incident response plan, rehearsed regularly for a
variety of possible scenarios with all stakeholders included across a variety of roles.
After all, when a security incident occurs, it’s not just technical teams that need to
act; non-technical resources—such as legal and communications—as well as
outside parties will need to be involved, especially if you partner with a security
service provider.
The key here is “quick.” If you don’t have the internal expertise or resources to
conduct a quick response, or your toolset isn’t giving you the information as quickly
as you need it, then you may want to look into external incident response
services to help address these gaps and speed up your incident response times.
(Make sure to include this external team in any drills you conduct!)
If you need some support with your incident response plan, external providers can
help address strategic and tactical gaps by:
It may sound repetitive, but the worst time to prepare for a breach really is after one
has occurred. Having a robust incident response plan in place—and ensuring it has
been communicated to all stakeholders—is the best way to prepare for this worst-
case scenario.
Known threats can sometimes slip past even the best defensive measures, which is
why most security organizations actively look for both known and unknown threats
in their environment. So how can an organization try to detect both known and
unknown threats?
There are several methods available in the defender's arsenal that can help:
Instead of waiting for a threat to appear in the organization's network, a threat hunt
enables security analysts to actively go out into their own network, endpoints, and
security technology to look for threats or attackers that may be lurking as-yet
undetected. This is an advanced technique generally performed by veteran security
and threat analysts.
Ideally, a well-developed security threat detection program should include all of the
above tactics, amongst others, to monitor the security of the organization's
employees, data, and critical assets.
Threat Detection Requires a Two-Pronged Approach