UNIT 5
UNIT 5
This allows administrators to ensure that the device cannot gain access unless
the proper credentials are presented.
A network access control list (ACL) is a set of rules that either allow or deny
access to a computer environment.
An ACL is similar to a guest list at a private club. Only those on the list are
authorized entries.
The Network Engineers can only permit local traffic, which enhances the
efficiency of the whole connection.
• ACL’s primary goal is to secure the network since the administrator has the
power to give or refuse access to anybody.
• You may grant permission to packets and limit users, packets from
particular networks, or packets that adhere to a specific test.
• ACL used to be the sole method of implementing firewalls, however there
are now a variety of choices.
• ACLs are still used by businesses in conjunction with other technologies like
VPNs.
ACL Name
ACL entries can be recognized by their names. The use of letters and numbers
together rather than a series of numbers is permitted by some routers.
Network Protocol
Permit/allow UDP, ICMP, ICMP, TCP, IPX, IP,NetBIOS, and other protocols.
Statement
Source
A single IP address, a CIDR address range, or all ranges can be specified as the
Origin or End target.
Remark
Some Access points allow you to add comments to an ACL, which is useful for
adding explicit details.
Log
Some devices can store logs whenever ACL fixtures are discovered.
Want to Ace your interviews, then check out our Cyber Security Interview
Questions!
• Standard ACL
These are the Access-lists specifically developed with the source IP address.
These ACLs either permit or prevent access to the whole protocol suite. They
make no distinction between IP traffic types such as TCP, UDP, HTTPS, and so on.
The router will recognize numbers 1-99 or 1300-1999 as a standard ACL and the
specified address as the source IP address.
• Extended ACL
These are the ACLs that make use of the source IP, the destination IP, the source
port, and the destination port. We can specify which IP traffic should be allowed
or denied using these types of ACLs. These ranges are 100-199 and 2000-2699.
Dynamic ACL
Dynamic ACLs employ Telnet, extensive ACLs, and authorization. This kind of
ACL, commonly referred to as “Lock and Key,” can be applied for certain time
periods.
Such lists only provide access to resources or endpoints if the user first
establishes Telnet authentication with the device.
Reflexive ACL
• Reflexive ACLs are also known as IP connection ACLs. These ACLs use
session information from top layers to filter traffic.
• They enable or prevent outbound traffic in response to sessions started
inside the router.
• The router identifies outgoing ACL traffic and adds a new inbound ACL entry.
In brief, Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention,
and virtual private network (VPN) capabilities. It provides proactive threat defense that stops
attacks before they spread through the network.
An ASA is valuable and flexible in that it can be used as a security solution for both small
and large networks.
The Cisco ASA 5500 series is Cisco's follow up of the Cisco PIX 500 series firewall. However,
the ASA is not just a pure hardware firewall. The Cisco ASA is a security device that combines
firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It
provides proactive threat defense that stops attacks before they spread through the
network. Therefore, the Cisco ASA firewall is the whole package, so to speak.
• antispam
• IDS/IPS engine
• VPN device
• SSL device
• content inspection
• The appliance connects the same Layer 3 network subnet on its inside and
outside ports, but each interface of the firewall resides in a different Layer 2
Vlan. The Cisco ASA firewall can operate both in Routed Firewall Mode
(default mode) or in Transparent Firewall Mode.
Features of Adaptive Security Appliance (ASA)
ASA is a Cisco security device that can perform basic firewall capabilities
with VPN capabilities, antivirus, and many other features. Some of the
features of ASA are:
1. Packet filtering
Packet filtering is a simple process of filtering the incoming or outgoing
packet on the basis of rules defined on the ACL that has been applied to
the device. It consists of various permit or deny conditions. If the traffic
matches one of the rules, no other rule is matched and the matched rule is
executed.
2. Stateful filtering
By default, ASA performs stateful tracking of the packet if the packet is
generated from a higher security level to a lower security level. By default,
if the traffic is initiated by the devices in higher security levels for lower
security levels device (as destination), TCP and UDP reply traffic will be
allowed and will able to, say, telnet the other device in Lower security
level. This is because a stateful database is maintained (in which an entry
about the source and destination device information such as IP address,
port numbers are maintained) as stateful inspection is enabled by default.
3. Routing support
ASA can perform static routing, Default routing also dynamic routing
protocols like EIGRP, OSPF, and RIP.
Transparent firewall
ASA can operate in two modes:
Routed mode: In this mode, ASA acts like a layer 3 device (router hop)
and needs to have two different IP addresses (means two different
subnets) on its interface.
Transparent mode: In this mode, ASA operates at layer 2 and only a
single IP address is needed to manage ASA management purpose as both
the interfaces (inside and outside) act as a bridge.
4. AAA support
ASA supports AAA services either using its local database or using an
external server like ACS (Access Control Server).
5. VPN support
The SA supports VPN connections, allowing remote users, branches, and
partners to access secure corporate networking resources through
encrypted channels. It provides support for various VPN protocols
including IPsec VPN, SSL VPN, and AnyConnect VPN, ensuring secure
connections and data privacy.
6. Centralized management
ASA devices can be managed centrally through Cisco Security Manager
(CSM) or Cisco Adaptive Security Device Manager (ASDM), which provides
a unified interface for configuration, monitoring, and troubleshooting
Centralized management simplifies operations and provide greater
visibility and security system control and devices.
7. VPN load Balancing
It is a Cisco proprietary feature of Cisco ASA. Multiple clients can be
shared across multiple ASA units at the same time.
8. Stateful failover
ASA supports the high availability of pair of Cisco ASA devices. If one of
the ASA goes down, the other ASA device will perform the operations
without any interruption. When stateful failover is enabled, the active unit
continuously passes connection state information to the backup device.
After the failover occurs, the same connection information is available on
the new active unit.
9. Clustering
Cisco ASA lets us configure multiple ASA devices as a single logical
device. The cluster can consist of a maximum of 8 cohesive units. This
results in high throughput and at the same time provides redundancy.
10. Advanced Malware Protection (AMP)
Cisco ASA provides support for Next-Generation firewall features which
can provide protection advanced malware protection in a single device as
the classic firewall features are combined with NGFWs features.
11. Modular Policy Framework (MPF)
MPF is used to define policies for different traffic flows. It is used in ASA
to utilize advanced firewall features like QoS, Policing, prioritizing, etc.
For using MPF, we define Class-map for identifying the type of traffic,
policy-map for identifying what action should be taken like prioritize, and
service-policy for where it should be applied.
3:Routers
The routers are used to transmit the data packets between different networks. These
are the hardware devices, which are placed at gateways of two connected
networks. For example, if we want to connect our LAN to our ISP, we can use
the router. Using the router, we can connect our network with the internet.
Working of Routers
A router checks the IP address of the source and destination of each packet. After that,
it will go to the routing table, which provides directions to transfer the data to the
destination of a particular network and check the destination of the packet. Then it will
route the packet to another router. This process will stop when the destination IP is
reached and responded back. If we have many ways to go to the IP address of the
destination, the router will select the most economical way. If the list of routing
table does not contain the packet's destination IP address, the default router will get
the packet. If the packet has no destination, the packet will be dropped.
Most routers have different ports so that they can connect the different devices to the
internet simultaneously. The router uses the routing table to find out where the traffic is
coming and where to send the data. Generally, ISP (Internet service provider) provides
the router. The ISP assigns our router's IP address, and that IP address is the public IP
address. Whenever we use the internet on our device, we are identified in the world
using the public IP address. Routers keep our private IP addresses protected. Our
laptop, TV media box, desktop, and network copier have different private IP addresses. If
they don't have a different private IP address, the router will be unable to recognize the
requesting device.
Importance of Router
o Ethernet is the most commonly used network. Apart from that, we have many
other networks like the Token ring and ATM. The network uses different
methods to encapsulate the data or packets so that the data cannot directly
communicate. Routers translate these packets, which are coming from
different networks so that the packets can understand each other.
o A broadcast storm is prevented by the routers. If we don't have a router, the
broadcast will go to every device's every port and be processed by every device.
If we have a large amount of broadcasts in the whole network, chaos can occur.
A router sub-divides the network into more than one smaller network, and all
that networks are connected by the router. A router would not allow the
broadcast to flow between subnets.
Security features of Routers
The following are some security feature of the router:
Firewall
Firewall
In the event of an emergency, the firewall is used as a wall to block the fires.
A network firewall is used to set a barrier between the internet and LAN (local area
network). The purpose of a network firewall is to protect our private LAN. It is used
to save our important data from leaking out. Without the firewall capability,
the routers will blindly pass traffic between two different networks. A firewall is used
to monitor the traffic and block the traffic, which is not authorized to go out.
A network firewall separates the internet and the LAN. In the LAN, it also segments
the ordinary data and the important data. Due to this, the internal invasion can be
avoided. You will determine the amount of threats that are blocked by your firewall.
By blocking, firewall prevents your private network from outside users. You need to
create a Demilitarized Zone (DMZ) if you allow remote access from others to your
network. Most of the firewall provided the DMZ option. It will designate a directory on
the computer of a gateway, just like Demilitarized Zone. Virus protected is offered by
some firewalls. It is recommended for every computer to install the anti-virus.
Working of Network Firewall
Some hardware firewalls allow you to define the blocking rules like UDP (User diagram
protocol) or TCP (transmission control protocol) or by IP address. This helps you to
forbidden the IP address and unwanted ports. Software applications and services
define some other type of firewall. Such firewall acts like a proxy server, which is used
to interconnect the two separate networks. The combination of a software firewall and
a hardware firewall is more efficient and safer.
Importance of Firewall
o Using the firewall, you can protect your home computer. To protect your network,
you should use a hardware firewall if you have more than one computer. You should
follow the policy of the network administrator if you are using a public computer.
o A firewall is designed to protect the organization from cyber-attacks. Many internal
programs that have potentially exploitable can be protected by firewall from danger
by limiting the traffic that crosses the boundary of the network, which is available only
for authorized traffic.
o A firewall provides you a clear boundary between the outside and inside of your
network. Firewall solution provides filtering, ensuring that the users inside your
network can access the external services easily. It also prevents your internal computers
from getting the connection from external computers until they meet specific access
requirements.
Prevention–level functionalities of
IDPS
1. Stopping the attack
Otherwise known as ‘banishment vigilance’, intrusion prevention
systems prevent incidents before they occur. This is done by
blocking users or traffic originating from a particular IP address. It
also involves terminating or resetting a network connection.
2. Security environment changes
This involves changing security configurations to prevent attacks.
An example is the IPS reconfiguring the firewall settings to block a
particular IP address.
3. Attack content modification
Malicious content can be introduced into a system in various
forms. One way of making this content more benign is to remove
the offending segments.
Techniques of IDPS
1. Signature-based detection
A signature is a specific pattern in the payload. This specific
pattern can be anything from the sequence of 1s and 0s to the
number of bytes. Most malware and cyberattacks come with their
own identifiable signature. Another example of a signature is
something as simple as the name of the attachment in a malicious
email.
2. Anomaly-based detection
Anomaly detection works on threshold monitoring and profiling.
The ‘normal’ behavior of all users, hosts, systems, and applications
is configured. Any deviation from this norm is considered an
anomaly and alerted for. For example, if an email ID generates
hundreds of emails within a few hours, the chances of that email
account being hacked are high.
3. Stateful protocol analysis
Anomaly detection uses host- or network-specific profiles to
determine suspicious activity. Stateful protocol analysis goes one
step further and uses the predefined standards of each protocol
state to check for deviations.
For example, file transfer protocol (FTP) only allows logins when
unauthenticated. Once a session is authenticated, users can view,
create, or modify files based on their permissions.
5:Host-Based vs Network-Based
Intrusion Detection System (IDS)
What Is a Host-Based IDS?
A host-based IDS is a type of IDS that monitors both network traffic and devices for
suspicious or malicious activity. They are installed locally on endpoints, such as computers.
You can install a host-based IDS on your computer. After configuring it, the host-based IDS
will monitor traffic on your business’s network and the computer on which it’s installed.
6:Web Filtering
Web Filtering definition
A web filtering software is used to control which websites an end user is able to
access. It compares the content and its source to a set of rules in order to decide
whether or not to display it.
Internet content such as spyware, viruses, and material deemed improper for the
workplace can be blocked by implementing a web filtering policy for an organization.
Filtering unsuitable content from the internet can help employees operate more
efficiently, limit legal exposure, and safeguard a company's network from outside
attacks.
In addition to its primary filtering function, a web filtering system may also include a
plethora of additional features. Notable characteristics include the ability to report on
traffic, soft blocking that can show warnings before denying access, and an override
feature that lets administrators unclog webpage.
• Allow Listing
Allow listings list sites a person, machine, or application can visit. Any web traffic
with an unlisted destination is discarded and this restricts site access.
• Block Listing
Block lists are diametrically opposed to allow lists. They mention forbidden sites
instead of allowed ones. Blocklists check all traffic and drop traffic to destinations on
the list. This method is utilized to stop phishing sites, drive-by malware downloads,
and obnoxious material.
• Content Filtering
Based on a webpage's material, this approach allows or blocks circulation. An entity
can filter explicit data online. If the policy is breached, the site is blocked. This
decontamination method lets a corporate avert unknown malevolent or unacceptable sites.
URL filtering systems implement rules differently based on filter type and location.
These processing techniques are applied in several ways:
• DNS Filtering
It is the Internet's phone book, translating realms like google.com to IP addresses
used by computers to route data. This filtering permits or restricts DNS requests
based on policy.
• URL Filtering
They are webpage addresses. URL filtering checks web requests' URLs and decides
if they're allowed based on policy.
• Content Filtering
This analyses a webpage's content and congest policy-violating responses
performing a cloud based web filtering.
6. Regulatory Compliance
. Monitoring worker web usage helps prevent internet-related mishaps. Posting hateful,
bigoted, or obscene content on blogs or social media, cyberbullying, or downloading
copyright-protected material could result in liability. With the world becoming so polarized,
you must always defend your firm and brand by carefully controlling the information you and
your workers let in or send out.
Coordinating CSIRT
A coordinating CSIRT manages other, typically subordinate CSIRT units,
coordinating incident response activities, workflows, and information flow
among distributed teams. Typically, a coordinating CSIRT does not provide
independent incident response services. Rather, it ensures resources and
activities are effectively distributed between disparate teams.
Hybrid CSIRT
A hybrid CSIRT consists of a centralized full-time unit and distributed units
employing subject matter experts (SMEs). Typically, SMEs participate in incident
response activities ad-hoc—as needed during specific events. This model
employs a central CSIRT unit to detect a potential event and analyze it to
determine the appropriate response. Next, the relevant distributed CSIRT
experts are asked to assist in incident response activities.
CSIRT/SOC Hybrid
A CSIRT/SOC Hybrid model puts the security operations center (SOC)
responsible for receiving all security alerts, reports, and alarms that indicate
potential incidents. The CSIRT is activated only if the SOC requires help with
additional analysis. The SOC performs incident detection and passes incidents
to the CSIRT, acting as a front end for the CSIRT.
Outsourced CSIRT
An outsourced CSIRT helps organizations that lack the staff or resources
required to build an in-house incident response team. This model typically
supplements an internal team with external contractors or outsources CSIRT
services and tasks on-demand, like digital forensics.
8:Honeypot
What is Honeypot?
•••
Honeypot is a network-attached system used as a trap for cyber-
attackers to detect and study the tricks and types of attacks used by hackers.
It acts as a potential target on the internet and informs the defenders about
any unauthorized attempt to the information system.
Honeypots are mostly used by large companies and organizations involved in
cybersecurity. It helps cybersecurity researchers to learn about the different
type of attacks used by attackers. It is suspected that even the cybercriminals
use these honeypots to decoy researchers and spread wrong information.
The cost of a honeypot is generally high because it requires specialized skills
and resources to implement a system such that it appears to provide an
organization’s resources still preventing attacks at the backend and access to
any production system.
A honeynet is a combination of two or more honeypots on a network.
Types of Honeypot:
Advantages of honeypot:
Disadvantages of honeypot: