0% found this document useful (0 votes)
39 views24 pages

Network Defense Course Overview IT4831E

Uploaded by

rvgjackjack
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views24 pages

Network Defense Course Overview IT4831E

Uploaded by

rvgjackjack
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

12/09/2024

Network Defense

Course Overview

1
12/09/2024

Course Overview

• Course ID: IT4831E


• Credits: 2(2-1-0-4)
• Lecturer
• Bùi Trọng Tùng, Department of Computer Engineering,
SoICT
• Office: 405 – B1
• Email: tungbt@[Link]
• Course on MOOC

Learning Objectives

• Computer Network Defense(CND)


Fundamentals: CND triad, Defense-in-depth,
Network Monitoring
• Technical Control: VPN, Firewall, IDPS
• Physical Control
• Security Operation: Hardening, Backup and
Restore, Incident Response
• Design Security Policy
• Design Secure Network

2
12/09/2024

Other courses

• Prerequisites:
• IT3080E: Computer networks
• IT4010E: Introduction to Cryptography and Security
• IT4260E: Network Security
• Relevances:
• IT4450E: Digital Forensics
• IT4413E: Penetration Testing Practice
• IT4651E: Network Design and Implementation

Grading Structure

• Mid-term: 40%
• Execises: 3 homeworks in total, weighted equally
• Quizzes: gradescope with instant feedback, you can
keep trying until you get the answer right:
• Complete all quizzes: +1 point
• Not complete 1-2 quizzes: +0 point
• Not complete 3-4 quizzes: -1 point
• Not complete from 5 quizzes: -2 point
• No credit for submitting late, unless you have an
extension
• Final-term: 60%

3
12/09/2024

Lecture 01.
Network defense fundamentals

Objectives

• Explain the goals of information security


• Describe the threats to network security
• Explain the goals of network defense
• Explain the benefits and challenges of network
defense
• Overview of different types of network defense
approaches
• Describe the different types of network security
controls

4
12/09/2024

1.1. Introduction to
Information Security

Information Security

• Security = state of being secure, free from danger.


• Information Security: practice of defending digital
information from unauthorized
• Goal of security:

CONFIDENTIALITY ASSURANCE

CIA triad AAA triad …

10

10

5
12/09/2024

CNSS security model

• CNSS = Committee on National Security Systems


• McCumber Cube – Rubik’s cube-like detailed model for
establishment and evaluation of information security
• to develop a secure system, one must consider not only key
security goals (CIA) but also how these goals relate to various
states in which information resides and full range of available
security measures

11

11

Security threats

• Security threat – any action/inaction that could


cause disclosure, alteration, loss, damage or
unavailability of a company’s/individual’s assets
• There are three components of threat:
• Targets: organization’s asset that might be attacked
• information (its confidentiality, integrity, availability),
software, hardware, network service, system resource, etc.
• Agents: people or organizations originating the threat
– intentional or non-intentional
• employees, ex-employees, hackers, commercial rivals,
terrorists, riminals, general public, customers
• Events: type of action that poses the threat

12

12

6
12/09/2024

Threat events

• Forces of Nature
• Fire, flood, earthquake, hurricane, tsunami,
electrostatic, discharge, dust contamination
• Organization must implement controls to limit damage
as well as develop incident response plans and
business continuity plans
• Hardware and Software Failures and Errors
• Cannot be controlled or prevented by the organization
• Best defense: maintain, keep up-to-date about latest
hardware /software vulnerabilities

13

13

Threat events (cont.)

• Act of Human Error or Failure:


• Organization’s own employee’s are one of its greatest
threats
• Examples:
• entry of erroneous data
• accidental deletion or modification of data
• failure to protect data
• storing data in unprotected areas
• Much of human error or failure can be prevented
• Training and ongoing awareness activities
• Enhanced control techniques:
• Instrusions/Attacks

14

14

7
12/09/2024

Security vulnerability

• Weaknesses in the system that can be exploited


to compromise security
• Some causes of vulnerabilities:
• Inadequate policies
• Design flaws
• Drawback of technology
• Improper implementation and operation

15

15

Security attacks

• Footprinting: These are actions Footprint


that an attacker performs to
collect information about the
system: users, customers, Scan &
business activities, information Enumera
about the organization... te

• Can be repeated periodically Grant


until there is an opportunity to access
attack more easily
• Active footprinting : interaction Maintain
with the target presence

• Passive footprinting : no Clean


interaction with the target and
hide

16

16

8
12/09/2024

Footprinting (cont.)

• Search engines: Google, Footprint


Shodan, Censys
• Social networks: FB, Tweetter, Scan &
Linkedin Enumera
te
• Target's website, Email system
• WHOIS, DNS Grant
access
• Social Engineering
Maintain
presence

Clean
and
hide

17

17

Defensive strategies

• Be careful about what information is made public.


• Train employees to be cautious about what they
share online.
• Regularly check what information about the
company is available through these tools.
• Use privacy settings on social media and company
websites.

18

18

9
12/09/2024

Scanning & Enumerating

• Scanning to identify information Footprint


about the system based on the
information collected from the
footprinting Scan &
Enumera
• The attacker has a more detailed te
view of the system: the services
provided, the open service ports, Grant
access
IP addresses, operating systems
and software…
Maintain
• Extracting information from this presence
stage allows the attacker to plan
in detail to carry out the attack Clean
and
hide

19

19

Defensive strategies

• Keep all software up to date to fix known


weaknesses.
• Only keep necessary services running and close
unused ports.
• Use firewalls and other security tools to hide
information from scans.
• Regularly do their own scans to see what an
attacker might find.

20

20

10
12/09/2024

Access granting

• Exploit and gain access to the Footprint


system at different levels:
network level, operating system
level, application level Scan &
Enumera
• Escalate Privileges: obtains te

further access to corporate Grant


systems and data within the access
environment
Maintain
presence

Clean
and
hide

21

21

Defensive strategies

• Implement strong perimeter defenses like firewalls,


intrusion detection systems (IDS), and intrusion
prevention systems (IPS)
• Apply strict access control policies, such as multi-
factor authentication (MFA) and role-based access
control (RBAC)
• Regularly patching and updating software
• Implement endpoint detection and response (EDR)
solutions,
• Continuous monitoring of system logs
• Conduct regular penetration testing and vulnerability
assessments

22

22

11
12/09/2024

Maintain presence

• Change, interfere with system Footprint


operations
• Install spyware Scan &
• Conceal system activities Enumera
te
• Scan deeply into the system
Grant
• Expand the attack scope access
• Escalate the attack
Maintain
presence

Clean
and
hide

23

23

Defense strategies

• Deploy endpoint detection and response (EDR)


systems
• Real-time monitoring and behavioral analytics
• Regular system audits and integrity checks
• Network segmentation and isolation of critical
assets
• Maintain up-to-date backups and implement
incident response plans
• Continuous staff training and awareness
programs for employees

24

24

12
12/09/2024

Clean and hide

• Goal: erase traces of their Footprint


activities and cover their
tracks to avoid detection and
maintain long-term access Scan &
• Delete or modify system logs, Enumera
te
• Remove the evidence of
exploit technique, and obscure Grant
access
any changes made to the
system
• Employ techniques such as Maintain
presence
rootkits, fileless malware, and
encrypted communication Clean
channels and
hide

25

25

Defense strategies

• Robust logging and monitoring systems in place


that are resistant to tampering
• Using secure log storage
• Deploy SIEM
• Version control and system integrity monitoring
• Regular forensic audits
• Implement advanced threat detection, such as ML
model
• Employ encryption and MFA
• Maintain well-practiced incident response plan
that includes regular system backups and
snapshots

26

26

13
12/09/2024

1.2. Fundamental concepts of


Network Defense

27

27

CNSSI 4009-2022: Cyberspace Operation (CO)

• “The employment of cyberspace capabilities


where the primary purpose is to achieve
objectives in or through cyberspace.”
• “Comprised of cyberspace attack, cyberspace
defense, and related cyberspace exploitation
enabling operations”
Cyberspace Operation = Cyber Attack +
Cyberspace Exploitation + Cyberspace Defense

28

28

14
12/09/2024

CNSSI 4009-2022: CO (cont.)

• Cyber Attack: Actions taken in cyberspace that


create noticeable denial effects (i.e., degradation,
disruption, or destruction) in cyberspace or
manipulation that leads to denial that appears in a
physical domain, and is considered a form of fires.
• Cyberspace Exploitation: Actions taken in
cyberspace to gain intelligence, maneuver, collect
information, or perform other enabling actions
required to prepare for future military operations.

29

29

CNSSI 4009-2022: Cyberspace defense

• “Actions taken within protected cyberspace to


defeat specific threats that have breached or are
threatening to breach cyberspace security
measures and include actions to detect,
characterize, counter, and mitigate threats,
including malware or the unauthorized activities
of users, and to restore the system to a secure
configuration.”

30

30

15
12/09/2024

Essentials of Network defense

• Goal: A completely secure and robust network


can be designed with proper implementation and
cofiguration of network security elements.
• Elements of network security
• Network devices
• Network protocols
• Network security control
• Network security is not just a terminology, but is
a process that organization perform to defend the
network in the context of reality.

31

31

Network defense benefits

• Protect information assets


• Comply with government and industry specific
regulations
• Ensure secure communication with clients and
suppliers
• Reduce the risk of being attacked
• Gain competitive edge over competitor by
providing more secure services

32

32

16
12/09/2024

Network defense challenges

• Distributed computing environments


• Networks are becoming vast and complex
• Information assets are widely distributed across
multiple locations.
• Enemies are not only distributed but also remain
anonymous
• Potential threats to the network evolve each day
• Lack of security skills
• TCP/IP protocol stack is not completely secure

33

33

Types of network defense approaches

• Preventive approaches: methods are used to


avoid threats or attacks on the target network
• Cryptography
• Authentication and Authorization
• Traffic filtering
• Hardening
• Vulnerabilities scanning and patching

34

34

17
12/09/2024

Types of network defense approaches (cont.)

• Reactive approaches: methods are used to detect


attacks on the target network
• Cryptography
• System monitoring
• Logging and auditing
• Honeypot
• Intrusion Detection System
Detect if you can’t prevent

35

35

Types of network defense approaches (cont.)

• Retrospective approaches: examine causes for


attacks, and contain, remediate, eradicate, and
recover from damage caused by attacks.
• Backup and Restore
• Digital Forensic
• Incident Response/Incident Handling

36

36

18
12/09/2024

Types of network defense approaches (cont.)

• Proactive approaches: methods are used to make


informed decisions on potential attacks in the
future:
• Threat hunting
• Threat intelligence
• Risk management
• Security policy

37

37

Components of network defense: Technologies

• Evaluated products
• Configuration management systems
• Firewalls
• IDS
• Access control systems
• Content filtering software
• Hardened/patched operating systems
• Encryption mechanism
• Authentication system

38

38

19
12/09/2024

Components of network defense: People

• Security Architects
• Security Engineers
• End-users
• CND Operations Staff
• Network Technicians
• Security Analysts
• Informed Leadership
• Developer
•…

39

39

Components of network defense: Operations

• Security policy
• Standard operating procedures
• Business continuity plans
• Disaster Recovery
• Continuity of Operations
• Configuration Control Boards
• Incident response processes
• Forensics capabilities
• Security training
• Security as a culture

40

40

20
12/09/2024

1.3. Defense-in-depth
principle

41

41

Defense-in-depth(DID) principle

• There is no one-size-fits-all solution that can


protect against all types of attacks
• Defense in depth (DID): Cyber-attack prevention
solutions need to be built with multiple layers of
protection:
• Each layer performs a number of tasks
• Layers must coordinate to form a common strength for
the system
• Gradually weaken the attack capability
• Attacks become increasingly difficult to access the
inner layers
• Distinguishing from prevention

42

42

21
12/09/2024

DID principle

• DID should be designed based on the components


of CND:
• People
• Operation People
• Technology
Operation

Technology

Asset

43

43

DID principle

44

44

22
12/09/2024

Network security controls

• Administrative securiy controls: the management


implements administrative access control to
ensure the safety of the organization
• Regulatory framework compliance
• Security policy
• Employee monitoring and supervising
• Assets classification
• Security awareness and training

45

45

Network security controls (cont.)

• Physical security controls: a set of security


measures taken to prevent unauthorized access
to physical devices
• Locks
• Fences
• Badge system
• Security guards
• Mantrap doors
• Lighting
• CCTV camera
• Motion detectors
• Alarm
• ….

46

46

23
12/09/2024

Network security controls (cont.)

• Technical security controls:


• Access controls: Authentication – Authorization -
Auditing
• Security protocols
• Network Segmentation
• VPN
• Firewall
• IDS/IPS
• Honeypot
• Antivirus/Anti-malware software

47

47

24

You might also like