Explain the basics of being safe online, including what cybersecurity is and its potential impact.
Explain the most common cyber threats, attacks and vulnerabilities.
Explain how organizations can protect their operations against these attacks.
Access various information and resources to explore the different career options in cybersecurity.
Module 4 - Protecting the Organization
Welcome to this module, which will outline the various strategies and tools used by cybersecurity
professionals to protect an organization’s network, data and equipment from cybercrime.
You only have to look at the news to understand that all organizations, regardless of type, size or
location, are at risk of a cyber attack. It seems that no one is safe.
So is there anything you can do to help protect an organization from a targeted attack? And with many in
the security industry predicting that it’s not a case of ‘if’ but ‘when’ a cybersecurity breach will
occur, how can you respond to ensure that it has minimal impact?
This module will highlight the actions that you can take to help answer these questions.
Chapter 4.1 - Cybersecurity Devices and Technologies
There is no single security appliance or piece of technology that will solve all the network security
needs in an organization. You must consider what tools will be most effective as part of your security
system.
4.1.1 Security Appliances
Security appliances can be standalone devices like a router or software tools that are run on a
network device. They fall into six general categories.
Find out more about each of these.
4.1.2 Which Is It?
You ask the Chief Technology Officer (CTO), who explains that the following security appliances are
in place. Can you identify which category each of these falls into?
Select an option from each!
Cisco’s ISR 4000 provides routing, filtering and encryption in a single platform.
Cisco’s Firepower 4100 Series shows what’s happening on the network so that you can act
faster in the face of a cyber attack
Cisco’s AnyConnect Secure Mobility Client empowers remote workers with highly secure access
to @Αpollo's network from any device, at any time, in any location
Cisco’s AMP provides next-generation endpoint protection, scanning and constantly monitoring
files for malicious behavior
explanations
In summary, the security appliances in place are:
Cisco Integrated Services Router (ISR) 4000. These routers have many capabilities, including
traffic filtering, the ability to run an intrusion prevention system (IPS), encryption and
VPN capabilities for secure encrypted tunneling.
Cisco’s Firepower 4100 Series is a next generation firewall that has all the capabilities of
an ISR router, as well as advanced network management and analytics. It can help you to see
what’s happening on the network so that you can detect attacks earlier.
Cisco’s AnyConnect Secure Mobility Client is a VPN system that lets remote workers use a
secure encrypted tunnel from their mobile computer to securely connect back to the
organization’s network. All Cisco security appliances are equipped with a VPN server and
client technology, designed for secure encrypted tunneling.
Cisco’s Advanced Malware Protection (AMP) is installed in next generation Cisco routers,
firewalls, IPS devices and web and email security appliances. It can also be installed as
software in host computers.
4.1.3 Firewalls
In computer networking, a firewall is designed to control or filter which communications are allowed
in and which are allowed out of a device or network. A firewall can be installed on a single
computer with the purpose of protecting that one computer (host-based firewall) or it can be a
standalone network device that protects an entire network of computers and all of the host devices
on that network (network-based firewall)
As computer and network attacks have become more sophisticated, new types of firewalls have been
developed, which serve different purposes.
Find out more about the common firewall types.
Network layer firewall
This filters communications based on source and destination IP addresses.
Transport layer firewall
Filters communications based on source and destination data ports, as well as connection states.
Application layer firewall
Filters communications based on an application, program or service.
Context aware layer firewall
Filters communications based on the user, device, role, application type and threat profile.
Proxy server
Filters web content requests like URLs, domain names and media types.
Reverse proxy server
Placed in front of web servers, reverse proxy servers protect, hide, offload and distribute
access to web servers.
Network Address Translation (NAT) firewall
This firewall hides or masquerades the private addresses of network hosts.
Host-based firewall
Filters ports and system service calls on a single computer operating system
4.1.4 Which One?
The CTO forgot to mention that @Apollo has a few firewalls in place. Based on the following
statements, can you identify what category of firewall these are? Answer correctly to earn valuable
defender points that will help safeguard @Apollo from attack.
Select an option from each!
A small, internal local area network with computers requires access to the Internet using a
single Internet connection
By default, Windows tries to block access to applications running on Windows PCs from other
computers in the network
Employees using computers on the network are not permitted access to specific URLs, such as
gambling sites
explanations
Remember:
A NAT firewall filters communications based on source and destination IP addresses.
A proxy server filters web content requests like URLs, domain names and media types.
A host-based firewall filters ports and system service calls on a single computer operating
system.
4.1.5 Port Scanning
In networking, each application running on a device is assigned an identifier called a port number.
This port number is used on both ends of the transmission so that the right data is passed to the
correct application. Port scanning is a process of probing a computer, server or other network host
for open ports. It can be used maliciously as a reconnaissance tool to identify the operating system
and services running on a computer or host, or it can be used harmlessly by a network administrator
to verify network security policies on the network.
how to carry out a port scan on a computer on your local home network.
4.1.6 What Does It Mean?
Your manager asks you to evaluate @Apollo’s computer network’s firewall and port security. You
execute a port scan, which returns an ‘open’ state response.
Complete the sentence below by filling in the blanks to understand what this means.
The port scan reported an ‘open’ state response. This means that the service running on the
network
by other network devices. Therefore, if the service contains a
vulnerability, it
by an attacker.
explanations
Remember:
An ‘open’ state response means that the service running on the network can be accessed by
other networks and if the service does contain a vulnerability, it could be exploited by an
attacker who could potentially gain access to computers on the network.
It’s important to note that port scanning should be seen as a precursor to a network attack
and therefore should never be carried out on public servers on the internet or on an
organization's network without permission.
4.1.7 Intrusion Detection and Prevention Systems
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are security measures
deployed on a network to detect and prevent malicious activities.
Software is not perfect. And more than ever before, hackers are exploiting flaws in software before
creators get a chance to fix them. When they do this, hackers are said to have carried out a
zero-day attack!
The ability to detect these attacks in real time, and stop them immediately, or within minutes of
occurring, is the ultimate goal.
4.1.8 Real-Time Detection
Many organizations today are unable to detect attacks until days or even months after they occur.
4.1.9 Protecting Against Malware
One way of defending against zero-day attacks and advanced persistent threats (APTs) is to use an
enterprise-level advanced malware detection solution, like Cisco’s Advanced Malware Protection (AMP)
Threat Grid.
This is client/server software that can be deployed on host endpoints, as a standalone server or on
other network security devices. It analyzes millions of files and correlates them against hundreds
of millions of other analyzed malware artifacts for behaviors that reveal an APT. This approach
provides a global view of malware attacks, campaigns and their distribution.
Find out more about the benefits of Cisco's Threat Grid.
Secure Operations Center team
The Threat Grid allows the Cisco Secure Operations Center team to gather more accurate,
actionable data.
Incidence Response team
The Incidence Response team therefore has access to forensically sound information from which it
can more quickly analyze and understand suspicious behaviors.
Threat Intelligence team
Using this analysis, the Threat Intelligence team can proactively improve the organization’s
security infrastructure.
Security Infrastructure Engineering team
Overall, the Security Infrastructure Engineering team is able to consume and act on threat
information faster, often in an automated way.
4.1.10 Security Best Practices
Many national and professional organizations have published lists of security best practices. Some
of the most helpful guidelines are found in organizational repositories such as the National
Institute of Standards and Technology (NIST) Computer Security Resource Center.
Find out more about some of these.
Perform a risk assessment
Knowing and understanding the value of what you are protecting will help to justify security
expenditures.
Create a security policy
Create a policy that clearly outlines the organization’s rules, job roles, and
responsibilities and expectations for employees.
Physical security measures
Restrict access to networking closets and server locations, as well as fire suppression.
Human resources security measures
Background checks should be completed for all employees.
Perform and test backups
Back up information regularly and test data recovery from backups.
Maintain security patches and updates
Regularly update server, client and network device operating systems and programs.
Employ access controls
Configure user roles and privilege levels as well as strong user authentication.
Regularly test incident response
Employ an incident response team and test emergency response scenarios.
Implement a network monitoring, analytics and management tool
Choose a security monitoring solution that integrates with other technologies.
Implement network security devices
Use next generation routers, firewalls and other security appliances.
Implement a comprehensive endpoint security solution
Use enterprise level antimalware and antivirus software.
Educate users
Provide training to employees in security procedures.
One of the most widely known and respected organizations for cybersecurity training is the
SANS Institute. Click
here
to learn more about SANS and the types of training and certifications they offer.
Encrypt data
Encrypt all sensitive organizational data, including email.