Cisco !#&? be a network ninja


To the top Chapter 4.3.1 Chapter 4.3.2 Chapter 4.3.3 Chapter 4.3.4 Chapter 4.3.5

Introduction to Cybersecurity

One course of Cisco's "Skills for all"

On completing this course, you will be able to:

Module 4 - Protecting the Organization

Welcome to this module, which will outline the various strategies and tools used by cybersecurity professionals to protect an organization’s network, data and equipment from cybercrime.

You only have to look at the news to understand that all organizations, regardless of type, size or location, are at risk of a cyber attack. It seems that no one is safe.

So is there anything you can do to help protect an organization from a targeted attack? And with many in the security industry predicting that it’s not a case of ‘if’ but ‘when’ a cybersecurity breach will occur, how can you respond to ensure that it has minimal impact?

This module will highlight the actions that you can take to help answer these questions.

Chapter 4.3 - Cisco's Approach to Cybersecurity

Cybersecurity is becoming a significant business concern. Organizations should therefore have plans in place to prepare for, deal with, and recover from a security breach.

Here at @Apollo, we use Cisco technology. Let’s check these out.

4.3.1 Cisco's CSIRT

Many large organizations have a Computer Security Incident Response Team (CSIRT) to receive, review and respond to computer security incident reports. Cisco CSIRT goes a step further and provides proactive threat assessment, mitigation planning, incident trend analysis and security architecture review in an effort to prevent security incidents from happening.

Cisco’s CSIRT takes a proactive approach, collaborating with the Forum of Incident Response and Security Teams (FIRST), the National Safety Information Exchange (NSIE), the Defense Security Information Exchange (DSIE) and the DNS Operations Analysis and Research Center (DNS-OARC) to ensure we stay up-to-date with new developments.

There are several national and public CSIRT organizations, like the CERT Division of the Software Engineering Institute at Carnegie Mellon University, that are available to help organizations and national CSIRTs to develop, operate and improve their incident management capabilities.

4.3.2 Security Playbook

One of the best ways to prepare for a security breach is to prevent it. Organizations should provide guidance on:

  • how to identify the cybersecurity risk to systems, assets, data and capabilities
  • the implementation of safeguards and personnel training
  • a flexible response plan that minimizes the impact and damage in the event of a security breach
  • security measures and processes that need to be put in place in the aftermath of a security breach.

All this information should be compiled into a security playbook.

A security playbook is a collection of repeatable queries or reports that outline a standardized process for incident detection and response. Ideally, a security playbook should:

  • highlight how to identify and automate the response to common threats such as the detection of malware-infected machines, suspicious network activity or irregular authentication attempts
  • describe and clearly define inbound and outbound traffic
  • provide summary information including trends, statistics and counts
  • provide usable and quick access to key statistics and metrics
  • correlate events across all relevant data sources.

4.3.3 Tools for Incident Detection and Prevention

There are a range of tools used to detect and prevent security incidents.

SIEM

A Security Information and Event Management (SIEM) system collects and analyzes security alerts, logs and other real-time and historical data from security devices on the network to facilitate early detection of cyber attacks.

DLP

A Data Loss Prevention (DLP) system is designed to stop sensitive data from being stolen from or escaping a network. It monitors and protects data in three different states: data in use (data being accessed by a user), data in motion (data traveling through the network) and data at rest (data stored in a computer network or device).

Defining and implementing all of these various security policies can be time consuming and challenging. But Cisco has come up with a solution.

4.3.4 Cisco’s ISE and TrustSec

Cisco Identity Services Engine (ISE) and TrustSec enforce user access to network resources by creating role-based access control policies.

4.3.5 Talk the Talk

This module contains a lot of technical information and jargon that you’ll need to know to develop your career in cybersecurity. So, before moving on, let’s check your understanding of some of these key terms. It’s your last chance to gain defender points, so think carefully before making your choices.

Blocks or denies traffic based on a positive rule or signature match

A system designed to stop sensitive data from being stolen from or escaping a network

A system that collects and analyzes security alerts, logs and other real time and historical data from security devices on the network

Scans data against a database of rules or attack signatures, logs any detections and creates an alert for the network administrator

Remember:

  • An IPS can block or deny traffic based on a positive rule or signature match.
  • An IDS scans data against a database of rules or attack signatures, looking for malicious traffic.
  • A DLP system is designed to stop sensitive data from being stolen from or escaping a network.
  • A SIEM system collects and analyzes security alerts, logs and other real-time and historical data from security devices on the network.

Skills for all