Term
|
Definition
Triple DES is a 168-bit (3 × 56-bit) encryption process. DES, or Data Encryption Standard, is a symmetric key encryption algorithm using a block-cipher method. |
|
|
Term
Advanced malware protection (AMP) |
|
Definition
Cisco advanced malware protection (AMP) is designed for Cisco FirePOWER network security appliances. It provides visibility and control to protect against highly sophisticated, targeted, zero-day, and persistent advanced malware threats. |
|
|
Term
AES Advanced Encryption Standard |
|
Definition
Advanced Encryption Standard is a symmetric key encryption algorithm using a block-cipher method developed by Joan Daemen and Vincent Rijmen. Available in key sizes of 128-bit, 192-bit, or 256-bit. |
|
|
Term
amplification DDoS attacks |
|
Definition
A form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim). |
|
|
Term
|
Definition
Cisco’s secure mobility client solution, supporting full-tunnel VPN. Requires a small client on the workstation, but then tunnels all traffic through the SSL or IPsec tunnel, allowing other nonsecure protocols to be transported and secured. |
|
|
Term
|
Definition
The amount of damage an attack can cause. It is used as one property of a signature inside an IPS/IDS. |
|
|
Term
authentication method list |
|
Definition
The list of methods to be used for authentication (RADIUS, TACACS, enable password, Kerberos, vty line, or local database). |
|
|
Term
authorization method list |
|
Definition
The list of methods to be used for authorization (RADIUS, TACACS, Kerberos, local database, or to pass if already authenticated). Used to specify what the authenticated user is authorized to do. |
|
|
Term
C3PL Cisco Common Classification Policy Language. |
|
Definition
This promotes the concept of using class maps and policy maps to identify and provide specific treatment for traffic. |
|
|
Term
CA Certificate authority. |
|
Definition
A system that generates and issues digital certificates. This is usually a device that is trusted by both parties using certificates. |
|
|
Term
CCP Cisco Configuration Professional.
|
|
Definition
CCP Cisco Configuration Professional. A web-based router administration tool with a GUI.
|
|
|
Term
What are CCP communities ? |
|
Definition
Groups of routers presented together in CCP as a community of devices. A way to organize the devices being managed within CCP. |
|
|
Term
|
Definition
Sections of configurations that can be reapplied to multiple devices in CCP, substituting variables (such as a hostname) that are unique to each router. |
|
|
Term
|
Definition
Method to restrict what CCP displays to the administrator, thus limiting what the administrator can see and change through CCP. |
|
|
Term
Cisco AnyConnect Secure Mobility Client full-tunnel VPN |
|
Definition
The client is designed to protect users on computer-based or mobile platforms, providing a solution to encrypt IP traffic, including TCP and UDP.
Note:Clientless SSL VPNs only provide a way to encrypt TCP-based applications.
But Cisco AnyConnect Secure Mobility Client provides a full-tunnel VPN capability to encrypt TCP, UDP, and other protocols. |
|
|
Term
|
Definition
The Cisco public key is needed for the IOS-based IPS to verify Cisco’s digital signature of the IPS signature package provided by Cisco. |
|
|
Term
|
Definition
Security Intelligence Operations. Early warning intelligence, threat and vulnerability analysis, and proven Cisco mitigation solutions to help protect networks. |
|
|
Term
|
Definition
An open source antivirus engine sponsored and maintained by Cisco and non-Cisco engineers. |
|
|
Term
|
Definition
The portion of Modular Policy Framework (MPF) in the ASA, or C3PL on routers and switches, that defines what types of traffic belong to a certain class. Policy maps rely on class maps for the classification of traffic. |
|
|
Term
|
Definition
This special type of class map defines specific classes and types of traffic to be used for further inspection in zone-based firewalls on IOS routers. |
|
|
Term
|
Definition
Allows for limited VPN resource access within some protocols that can natively support TLS, such as HTTPS and CIFS shared over HTTPS. |
|
|
Term
cloud-based MDM deployment |
|
Definition
In a cloud-based MDM deployment, MDM application software is hosted by a managed service provider who is solely responsible for the deployment, management, and maintenance of the MDM solution. |
|
|
Term
|
Definition
A malicious software that infects a host file or system area to perform undesirable outcomes such as erasing data, stealing information, or corrupting the integrity of the system. |
|
|
Term
|
Definition
Security enforcement that involves the observation of users and roles in addition to things like interface-based controls. An example is an ACS providing full access to an administrator who is logged in from his local computer, but restricted access when that same user is logged in through a remote device or through a smartphone. |
|
|
Term
|
Definition
The control plane of a device handles packets that are generated by the device itself or that are used for the creation and operation of the network itself. Control plane packets always have a receive destination IP address and are handled by the CPU in the network device route processor. |
|
|
Term
control plane policing (CoPP) |
|
Definition
A Cisco IOS-wide feature designed to enable users to restrict the amount of traffic handled by the route processor of their network devices. |
|
|
Term
control plane protection (CPPr) |
|
Definition
A Cisco feature, similar to control plane policing, that can help to mitigate the effects on the CPU of traffic that requires processing by the CPU. CPPr has the capability to restrict traffic with finer granularity by dividing the aggregate control plane into three separate control plane categories known as subinterfaces. |
|
|
Term
CRL Certificate revocation list. |
|
Definition
CRL - Used in a PKI environment to inform clients about certificates that have been revoked by the CA. |
|
|
Term
|
Definition
Level 0 (user) and level 15 (enable) are predefined; anything in between (1–14) is custom privilege level. |
|
|
Term
|
Definition
The logic systems in a device that are responsible for the actual movement (post-decision) of information. End users sending traffic to their servers is one example of traffic on the data plane. |
|
|
Term
DH group The Diffie-Hellman exchange |
|
Definition
The Diffie-Hellman exchange refers to the security algorithm used to exchange keys securely, even over an unsecured network connection. Groups refer to the lengths of the keys involved in the exchange. Group 1 is a 768-bit key exchange, Group 2 is a 1024-bit key exchange, and Group 5 is a 1536-bit key exchange. The purpose of this algorithm is to establish shared symmetrical secret keys on both peers. The symmetric keys are used by symmetric algorithms such as AES. DH itself is an asymmetrical algorithm. |
|
|
Term
|
Definition
DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. |
|
|
Term
|
Definition
An encrypted hash that uniquely identifies the sender of a message and authenticates the validity and integrity of the data received. Signing is done with the private key of the sender, and validation of that signature (done by the receiver) is done using the public key of the sender. |
|
|
Term
|
Definition
The attacks occur when the source of the attack generates the packets, regardless of protocol, application, and so on that are sent directly to the victim of the attack. |
|
|
Term
|
Definition
A signature that is disabled. A signature needs to be both enabled and nonretired to be used by an IPS/IDS. |
|
|
Term
|
Definition
A piece of malware that downloads and installs other malicious content from the Internet to perform additional exploitation on an affected system. |
|
|
Term
dynamic ARP inspection (DAI) |
|
Definition
DAI is a security feature that validates ARP packets in a network. DAI intercepts, logs and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from some man-in-the-middle attacks. |
|
|
Term
|
Definition
A signature that is enabled. A signature needs to be both enabled and nonretired to be used by an IPS/IDS. |
|
|
Term
EUI-64 Extended Unique Identifier-64 |
|
Definition
is an IEEE standard for converting a 48-bit MAC address into a 64-bit host address in IPv6 networks. Used for stateless autoconfiguration. |
|
|
Term
|
Definition
A malicious program designed to “exploit” or take advantage of a single vulnerability or set of vulnerabilities. |
|
|
Term
|
Definition
After a malicious attempt or malware is detected, Cisco next-generation products (such as the Cisco ASA, Cisco WSA, and Cisco Next-Generation IPS) with AMP capabilities continue to cross-examine files over an extended period of time. |
|
|
Term
|
Definition
If malware is detected, the Cisco AMP capabilities can put files in a sandbox to inspect its behavior, combining the inspection with machine-learning analysis to determine the threat level. Cisco Cognitive Threat Analytics (CTA) uses machine-learning algorithms to adapt over time. |
|
|
Term
|
Definition
A unidirectional process rather than a reversible algorithm, it takes a variable-sized input and creates a fixed-size output. Common examples include MD5 and SHA. |
|
|
Term
HMAC Hash Message Authentication Code, |
|
Definition
used to verify data integrity and authenticity of a message. |
|
|
Term
|
Definition
A digital certificate assigned to a device, host, person, or e-mail in a PKI infrastructure offering a concept of validated identity. |
|
|
Term
Identity Services Engine (ISE) |
|
Definition
The Cisco ISE is a critical piece to the Cisco BYOD solution. It is the cornerstone of the authentication, authorization, and accounting (AAA) requirements for endpoint access, which are governed by the security policies put forth by the organization. |
|
|
Term
What happens during IKE Phase 1?
Internet Key Exchange Phase 1
|
|
Definition
The negotiation of the parameters for the IKE Phase 1 tunnel, including hash, DH group, encryption, and lifetime.
|
|
|
Term
|
Definition
A free community-based antivirus software maintained by Cisco Sourcefire. |
|
|
Term
IPS (intrusion prevention system) |
|
Definition
Intrusion prevention systems, primarily using signature matching, can alert administrators about an attack on the network and can prevent the initial packet from entering the network. |
|
|
Term
|
Definition
IPsec is the suite of protocols used to protect the contents of Layer 3 IP packets. ESP is the primary protocol used to encapsulate the Layer 3 packets
|
|
|
Term
LDAP Lightweight Directory Access Protocol. |
|
Definition
This protocol can be used for gathering/managing information from an LDAP-accessible directory/database. An example of its use is having a AAA server use an LDAP request to Active Directory to verify the credentials of a user. |
|
|
Term
LLDP (Link Layer Discovery Protocol) |
|
Definition
LLDP was developed by Cisco and others within the Internet and IEEE community as a new, standardized discovery protocol, 802.1AB. Similar to CDP, LLDP defines basic discovery capabilities and was enhanced to specifically address the voice application. |
|
|
Term
|
Definition
A type of malicious code that is injected to a legitimate application. An attacker can program a logic bomb to delete itself from the disk after it performs the malicious tasks on the system. |
|
|
Term
1. mailers and mass-mailer worms
2. malvertising |
|
Definition
1. A type of worm that sends itself in an e-mail message.
2. This is the act of incorporating malicious ads on trusted websites, which results in users’ browsers being inadvertently redirected to sites hosting malware. |
|
|
Term
|
Definition
The management plane refers to traffic and technologies involved in being able to manage the network and its devices. This could include management sessions with SSH, HTTPS, and so on, and could also include information-gathering tools such as SNMP or NetFlow. |
|
|
Term
|
Definition
Message digest algorithm 5 is a cryptographic function with a 128-bit hash. Hashing algorithms are unidirectional. The enable secret on an IOS router is stored using an MD5 hash. |
|
|
Term
|
Definition
MD5 hashing is applied to the authentication of routing updates between routers to ensure the integrity of routing protocol updates. MD5 route authentication is available for OSPF, EIGRP, RIPv2, and BGP. |
|
|
Term
MPF Modular Policy Framework. |
|
Definition
A newer technique using the class map and policy map framework to bring about all sorts of manipulations or additional functions to a router. This is what the ASA refers to when using class maps, policy maps, and the service policy commands. On an IOS router, these are referred to as C3PL components. |
|
|
Term
NFP Network foundation protection. |
|
Definition
The concept of breaking down the network into functional components, such as control plane, management plane, and data plane, and then providing protection for each of those components. |
|
|
Term
PFS Perfect Forward Secrecy. |
|
Definition
New keys within DH are not based on seeds from previous keys when PFS is enabled, further increasing security. PFS is associated only with IKE Phase 2. |
|
|
Term
- PKCS#10 Public Key Cryptography Standards #10
- PKCS#12 Public Key Cryptography Standards #12
- PKCS#7 Public Key Cryptography Standards #7
|
|
Definition
- Public Key Cryptography Standards #10 is a file format used when sending certificate requests to a CA.
- Public Key Cryptography Standards #12 is a file format used to store private keys with accompanying public key certificates.
- Public Key Cryptography Standards #7 is used by a CA to distribute digital certificates.
|
|
|
Term
PKI Public key infrastructure. |
|
Definition
A scalable architecture that includes software, hardware, people, and procedures to facilitate the management of digital certificates. |
|
|
Term
1. policy map
2. policy map type inspect |
|
Definition
1. The portion of MPF or C3PL that defines what actions occur to traffic belonging to each class.
2. The policy map type is associated with Zoned-Based Firewalls on the IOS. The ASA also has specific purpose policy maps for deep packet inspection.
|
|
|
Term
1. qualitative
2. quantitative |
|
Definition
1. A method of risk assessment that uses a scenario model, including expert opinion.
2. A method of risk assessment that uses a mathematical model based on data. |
|
|
Term
|
Definition
A type of malware that compromises a system and then often demands a ransom from the victim to pay the attacker for the malicious activity to cease or for the malware to be removed from the affected system. |
|
|
Term
|
Definition
The certificate at the top of a certificate hierarchy in PKI. |
|
|
Term
|
Definition
A set of tools that an attacker uses to elevate their privilege to obtain root-level access and completely take control of the affected system. |
|
|
Term
|
Definition
In 1977, Rivest, Shamir, and Adleman developed a public key algorithm still used by most browsers today. This is an asymmetrical algorithm used for authentication. |
|
|
Term
SCEP Simple Certificate Enrollment Protocol. |
|
Definition
SCEP was created to facilitate large-scale deployments of PKI, by automating the process of authenticating and enrolling with a CA that supports SCEP. This is a Cisco-sponsored protocol and is supported by some, but not all, other vendors. |
|
|
Term
|
Definition
Part of the Cisco IOS Resilient Configuration feature, preventing the erasure of IOS files from a storage device, such as flash or NVRAM. |
|
|
Term
What is Secure Copy (SCP)? |
|
Definition
A feature that provides a secure and authenticated method for copying device configurations or device image files. |
|
|
Term
|
Definition
Cisco’s security framework to establish and enforce security policies across a distributed network. |
|
|
Term
What is a service policy? |
|
Definition
Just like in MQC for quality of service (QoS), this is the device that ties a policy to an interface (QoS) or to a zone pair (ZBF). On an ASA, this is the command element that links a policy to one or more interfaces. |
|
|
Term
What is a SFR Signature fidelity rating? |
|
Definition
An IPS measurement of the degree of attack certainty related to that signature correctly indicating the attack on which it is supposed to match. |
|
|
Term
What is SHA1 Secure Hash Algorithm 1? |
|
Definition
A successor to MD5, developed by the National Security Agency (NSA). |
|
|
Term
What does the 'show ip cef' command do? |
|
Definition
The output of this command displays the IP prefixes of the packets that will be received and handled by the control plane (CPU) of the device. |
|
|
Term
What does the 'show policy-map control-plan' command do? |
|
Definition
The output of this command provides the status of the policy that has been applied to the control plane. |
|
|
Term
What is SSL- Secure Sockets Layer? |
|
Definition
is the original security method for HTTPS. Although succeeded by TLS, this term is still widely used and assumed. This is a secure alternative to HTTP. |
|
|
Term
What is the difference between standard/extended ACLs? |
|
Definition
Access control list for packet filtering, set up by number. ACLs 1–100 are standard (source IP only), and 100–199 are extended (source and destination IP as well as port information). ACLs 1300–1999 are also standard ACLs, and 2000–2699 are also extended ACLs. |
|
|
Term
What is stateful filtering? |
|
Definition
More than just a simple packet-filter check, stateful inspection can determine whether a network flow exists and can look at information up to the application layer. A stateful filtering firewall dynamically allows the return traffic to the user, from the server they were accessing on the other side of the firewall. This is implemented in the ASA firewall and in the zone-based firewall feature on an IOS router. |
|
|
Term
what are symmetrical keys? |
|
Definition
Literally meaning both sides are the same, such as with pre-shared keys, where both ends have the exact same information used to encode/decode data. DH produces symmetrical keys. Symmetrical keys are used by symmetrical algorithms, such as AES, where one key encrypts the data and the same key is used to decrypt the data. |
|
|
Term
What is a SYN flood attack? |
|
Definition
An exploit against TCP’s three-way handshake opening lots of sessions via the initial SYN packet with no intent of replying to the SYN-ACK and completing the session. This leaves half-open, or embryonic, connections and can overflow a server’s session table. |
|
|
Term
|
Definition
Logging messages can be sent to a syslog server that gathers all incoming messages into text files. Syslog server programs can sort by incoming device IP address and by severity/facility levels to make security monitoring simpler. |
|
|
Term
TLS Transport Layer Security. |
|
Definition
Based on SSL, but more widely adopted as an IETF standard in RFC 5246. |
|
|
Term
Traffic Light Protocol (TLP) |
|
Definition
A set of designations developed by the US CERT to ensure that sensitive information is shared with the correct audience. |
|
|
Term
|
Definition
A set of secure protocol parameters to be used by IPsec in IKE Phase 2. To properly peer, both sides must agree on a common set. |
|
|
Term
|
Definition
Firewall implemented at Layer 2 of the OSI model, but still including the ability to analyze traffic at Layer 3 and higher. |
|
|
Term
|
Definition
A type of malware that executes instructions determined by the nature of the Trojan to delete files, steal data, and compromise the integrity of the underlying operating system. |
|
|
Term
uRPF Unicast Reverse Path Forwarding. |
|
Definition
Comparing the entry point of a packet’s source address against the routing table and making sure the ingress interface matches what the egress interface would be to reach the source of the packet. If the interface does not match, the router assumes the source address is bogus (spoofed) and can drop the packet. |
|
|
Term
|
Definition
Viruses that replicate themselves over the network, infecting numerous vulnerable systems. In most occasions, a worm will execute malicious instructions on a remote system without user interaction. |
|
|
Term
|
Definition
The ITU standard for PKI. Version 3 typically refers more to the IETF standard (RFC 3280), which includes CRL usage. |
|
|
Term
|
Definition
The traffic flow, for initial traffic, unidirectionally between two zones. An example is a zone pair that begins in the inside zone and goes to the outside zone. Policies can then be applied to initial traffic that is moving in the direction of the zone pair (in this case, from inside to outside). |
|
|
Term
|
Definition
The grouping of multiple interfaces under a similar security policy together, such as inside or outside. |
|
|
Term
Purpose for the four classification levels used within the Traffic Light Protocol (TLP). |
|
Definition
It employs four colors to indicate different degrees of sensitivity and the corresponding sharing considerations to be applied by the recipients.
Red
Amber
Green
White |
|
|
Term
Cisco and others have created databases that categorize threats in the public domain. The Common Vulnerabilities and Exposures (CVE) is a dictionary of publicly known security vulnerabilities and exposures |
|
Definition
National Vulnerability Database (NVD), which is a repository of standards-based vulnerability information |
|
|
Term
Common control methods used to implement countermeasures include the following: |
|
Definition
Administrative: Administrative controls could involve items such as background checks for users
Physical: controls are exactly what they sound like,
Logical: often referred to as technical controls. |
|
|
Term
What is a Man-in-the-Middle Attack? |
|
Definition
Its results when attackers place themselves in line between two devices that are communicating, with the intent to perform reconnaissance or to manipulate the data as it moves between them.
Note:This can happen at Layer 2 or Layer 3.
The main purpose is eavesdropping, so the attacker can see all the traffic. |
|
|
Term
|
Definition
the attacker spoofs Layer 2 MAC addresses to make the devices on a LAN believe that the Layer 2 address of the attacker is the Layer 2 address of its default gateway. This is called ARP poisoning
Frames that are supposed to go to the default gateway are forwarded by the switch to the Layer 2 address of the attacker on the same network
To mitigate this risk, you could use techniques such as dynamic Address Resolution Protocol (ARP) inspection (DAI) on switches to prevent spoofing of the Layer 2 addresses. |
|
|
Term
|
Definition
The attacker could also implement the attack by placing a switch into the network and manipulating the Spanning Tree Protocol (STP) to become the root switch (and thus gain the ability to see any traffic that needs to be sent through the root switch). You can mitigate this through techniques such as root guard and other spanning-tree controls |
|
|
Term
|
Definition
A man-in-the-middle attack can occur at Layer 3 by a rogue router being placed on the network and then tricking the other routers into believing that the new router has a better path. This could cause network traffic to flow through the rogue router and again allow the attacker to steal network data. You can mitigate attacks such as these in various ways, including routing authentication protocols and filtering information from being advertised or learned on specific interfaces. |
|
|
Term
Man-in-the-Middle Attacks -general |
|
Definition
To safeguard data in motion, one of the best things you can do is to use encryption for the confidentiality of the data in transit.
Using management protocols that have encryption built in, such as Secure Shell (SSH) and Hypertext Transfer Protocol Secure (HTTPS), is considered a best practice, and using VPN protection for cleartext sensitive data is also considered a best practice. |
|
|
Term
|
Definition
Used when info cannot be effectively acted upon by additional parties
Note: Recipients may not share info w/ outside parties |
|
|
Term
|
Definition
Used when info cannot be effectively acted upon by additional parties
Note: Recipients may not share info w/ outside parties |
|
|
Term
|
Definition
Used when info required support to be effectively acted upon, but carries risk to privacy, reputation, or operations
Note: Recipients may only share info w/ members of their own organization parties |
|
|
Term
|
Definition
Used when info is useful for the awareness of all participating organizations as well as peers in boarder sectors
Note: Recipients may share info w/ peer or partner organizations w/in sector, but not via publicly accessible channels |
|
|
Term
Network Security Threat Landscape |
|
Definition
Financial:There are several different means in which attackers can make financial gains through their malicious actions.
Disruption: Unfortunately, many individuals and groups exist solely to cause disruption to the core business of many organizations and institutions.
Geopolitical: Not surprisingly, there are groups affiliated with certain nation states that leverage the Internet to engage in cyber warfare. |
|
|
Term
Distributed Denial-of-Service Attacks
DDoS attacks can generally be divided into the following three categories: |
|
Definition
Direct: Direct DDoS attacks occur when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.
Reflected: Reflected DDoS attacks occur when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended victim. UDP is often used as the transport mechanism because it is more easily spoofed
Amplification: Amplification attacks are a form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim). |
|
|
Term
Defenses Against Social Engineering |
|
Definition
Password management:
Two-factor authentication:
Antivirus/antiphishing defenses:
Change management:
Information classification:
Document handling and destruction:
Physical security: |
|
|
Term
Malware Identification Tools |
|
Definition
Several factors make this identification particularly difficult:
1. The sheer amount of malware
2. Malware is often embedded in otherwise-trusted applications and sent over allowed protocols
3. limited resources to keep up with the massive amounts of traffic that traverse the network.
4. use of encryption has, not surprisingly, added another layer of complexity( can't see into traffic)
|
|
|
Term
Methods Available for Malware Identification |
|
Definition
1. Packet captures:
2. Snort IDS/IPS
3. NetFlow: often referred to as micro-analytical
4. IPS events:
5. Advanced Malware Protection: Cisco (AMP)
6. NGIPS: The Cisco FirePOWER
|
|
|
Term
|
Definition
-Packet capture is often referred to as "micro-analytical" in terms of the granularity of data being analyzed, but
--NetFlow data is considered more of a macro-analytical approach.
-consists of the creation of buckets or flows of data that are based on a set of predefined parameters such as source IP address, source port, destination IP address, destination port, IP protocol, ingress interface, and type of service (ToS)
|
|
|
Term
What is Advanced Malware Protection: Cisco Advanced Malware Protection (AMP) |
|
Definition
It is designed for Cisco FirePOWER network security appliances.
It provides visibility and control to protect against highly sophisticated, targeted, zero-day, and persistent advanced malware threats.
Helps to identify inconspicuous attacks by continuously analyzing and monitoring files after they’ve entered the network, utilizing retrospective security alerts |
|
|
Term
What is The Cisco FirePOWER next-generation intrusion prevention system (NGIPS) solution |
|
Definition
Provides multiple layers of advanced threat protection at high inspection throughput rates.
Centrally managed through the Cisco FireSIGHT Management Center
Can be expanded to include additional features such as AMP, application visibility and control, and URL filtering. |
|
|
Term
Data Loss and Exfiltration protection Methods |
|
Definition
1. involves a combination of clearly communicated and effective security policies
2. employee education
3. the technologies to help ensure that the security policies put in place can be enforced. |
|
|
Term
Access Control Server (ACS) |
|
Definition
centralized database where all the usernames and passwords are kept for authentication and what the individual users are allowed to do (the authorization portion of AAA)
use ACS for the authentication and authorization components |
|
|
Term
|
Definition
1. it is an identity and access control policy platform
2. it can validate that a computer meets the requirements of a company’s policy related to virus definition files, service pack levels, and so on before allowing the device on the network.
3. can use ISE (in addition) for the posturing and policy-compliance checking for hosts. |
|
|
Term
How to configure the router to forward authentication questions to the ACS server |
|
Definition
The router acts as a client to the ACS server.
Note: Two main protocols may be used between the ACS server and its client
TACACS+(TACACS+ is Cisco proprietary) which encrypts each packet before it is sent on the network
RADIUS (is an open standard), which means that not only ACS supports it but also that other vendors -RADIUS encrypts only passwords, but not the whole packet being sent between the ACS server and the network device. |
|
|
Term
Assets, vulnerabilities, and threats |
|
Definition
an Asset is anything of value to your company or organization
An assets value can be quantitative in dollar terms or qualitative
A vulnerability can be known or unknown okay, but it's basically a weakness in a system or a system design, or weakness in a protocol or a service that can be exploited by a threat or a threat agent
Note: if the vulnerability is theoretical and it hasn't been exploited, then we call that an unrealized threat or a latent threat
A threat is a potential danger to assets, okay. A threat is realized if it's identified by a specific vulnerability and it's exploited, okay, and that exploit is called a threat agent, it's the delivery system of that threat |
|
|
Term
|
Definition
Note: Not all assets have the same inherent value. The purpose of information classification is to provide the appropriate confidentiality, integrity, and availability.
Three main benefits to information classification.
1. It demonstrates the commitment of an organization to security.
2. It identifies the assets that are the most sensitive.
3. And it identifies which countermeasures apply to which information.
|
|
|
Term
Classifying Assets (cont'd) |
|
Definition
Public Sector: Unclassified, SBU or Sensitive but Unclassified, Confidential, Secret, and Top Secret.
Private Sector: Public, Sensitive, Private, and Confidential.
Criteria used for classification: Value, Age, Useful Life, Personal Association, Replacement Cost, and Liability.
Roles: Owner, Custodian, and User.
|
|
|
Term
Confidentiality, Integrity, and Availability
CIA “triad”
|
|
Definition
Confidentiality: There are two types of data: data in motion as it moves across the network; and data at rest, when data is sitting on storage media
Note: It means that only the authorized individuals/systems can view sensitive or classified information.
Integrity:Integrity for data means that changes made to data are done only by authorized individuals/systems.
Availability: This applies to systems and to data. If the network or its data is not available to authorized users—
Note:The failure of a system, to include data, applications, devices, and networks, generally equates to loss of revenue.
|
|
|
Term
|
Definition
It is anything that is valuable to an organization |
|
|
Term
|
Definition
is an exploitable weakness in a system or its design. |
|
|
Term
|
Definition
is any potential danger to an asset. |
|
|
Term
What is a countermeasure? |
|
Definition
is a safeguard that somehow mitigates a potential risk. |
|
|
Term
What are the 4 colors of the TLP? |
|
Definition
|
|
Term
Who developed the Traffic Light Protocol and Why? |
|
Definition
Developed by US-CERT division to ensure that sensitive information is shared with the correct audience |
|
|
Term
What are the Govenment Classification levels? |
|
Definition
Unclassified
SBU
Confidential
Secret
TopSecret |
|
|
Term
What are the Private sectors Classification levels? |
|
Definition
Public
Sensitive
Private
Confidential |
|
|
Term
What are the "four" classification criteria? |
|
Definition
Value
Age
Replacement Cost
Usefull Lifetime |
|
|
Term
What are some Potential network vulnerabilities? |
|
Definition
Policy flaws
Design errors
Protocol weaknesses
Misconfiguration
Software vulnerabilities
Human factors
Malicious software
Hardware vulnerabilities
Physical access to network resources
|
|
|
Term
What is the Common Vulnerabilities and Exposures (CVE) |
|
Definition
It is a dictionary of publicly known security vulnerabilities and exposures. A databases that categorize threats in the public domain. |
|
|
Term
What is the National Vulnerability Database (NVD) |
|
Definition
It is a repository of standards-based vulnerability information |
|
|
Term
What are the "3" types pf countermeasures often used to reduce risk to and asset? |
|
Definition
Administrative:
Physical:
Logical:
|
|
|
Term
What is an example of an administrative countermeasure? |
|
Definition
The written policies, procedures, guidelines, and standards. An example would be a written acceptable use policy (AUP) |
|
|
Term
What is an example of an Physical countermeasure?
|
|
Definition
Physical security for the network servers, equipment, and infrastructure.
An example is providing a locked door between users and the wiring closet |
|
|
Term
What is an example of an Logical countermeasure?
|
|
Definition
include passwords, firewalls, intrusion prevention systems, access lists, VPN tunnels, and so on.
often referred to as "technical controls." |
|
|
Term
Who are some of the potential threat to enterprise security? |
|
Definition
Terrorists
[image] Criminals
[image] Government agencies
[image] Nation states
[image] Hackers
[image] Disgruntled employees
[image] Competitors
[image] Anyone with access to a computing device |
|
|
Term
What are some of the "attack methods" used in an compromise? |
|
Definition
Reconnaissance
Social Engineering
Privilege Escalation
Backdoors
Code Execution
|
|
|
Term
What is a Man-in-the-Middle Attack? |
|
Definition
When attackers place themselves "in line between" two devices that are communicating, with the intent to perform reconnaissance or to manipulate the data as it moves between them.
It can happen at Layer 2 or Layer 3.
Note:The main purpose is eavesdropping, so the attacker can see all the traffic. |
|
|
Term
What is a layer two MitM attack called? |
|
Definition
|
|
Term
How can you prevent MitM attacks at layer 2 and ARP poisoning?
|
|
Definition
With Dynamic Address Resolution Protocol (ARP) inspection (DAI) on switches to prevent spoofing of the Layer 2 addresses.
DAI
|
|
|
Term
What is another layer2 MitM attack frequently used?
How is it mitigated? |
|
Definition
manipulating the Spanning Tree Protocol (STP) to become the root switch (and thus gain the ability to see any traffic that needs to be sent through the root switch).
Cisco RootGuard |
|
|
Term
What is the best way to safeguard data in motion? |
|
Definition
encryption for the confidentiality of the data |
|
|
Term
What are two secure protocols used for device management? |
|
Definition
|
|
Term
Allowing on the minimal access required is an example of what? |
|
Definition
|
|
Term
WHat is a Campus-Area Network (CAN)? |
|
Definition
The network topology used to provide connectivity, data, applications, and services to users of an organization that are physically located at the corporate office (headquarters).
Note: CAN includes a module for each building in the campus, for the data center, for WAN Aggregation, and for the Internet Edge. Security with the Campus Area Network.
|
|
|
Term
What is a Cloud, Wide-Area Network (WAN)? |
|
Definition
It provide a logical and physical location for data and applications that an organization prefers to have moved off-site
Note: It alleviates an organization from having to expend resources to operate, maintain, and manage the services that have been previously located within the organization’s purview.
|
|
|
Term
|
Definition
It is a network that contains the Unified Computing System (UCS) servers, voice gateways, and CUCM servers supporting the VoIP environment, all of which is provided network connectivity by a series of Nexus switches
Note: it is protected by a set of firewalls at the edge that filters all traffic ingressing and egressing.
|
|
|
Term
What is a Small office/Home office (SOHO)? |
|
Definition
The remote site will provide connectivity to the remote users through the use of WAN routers that find their way back to the WAN Aggregation module in the CAN via MPLS WANs
Note: users are provided network connectivity through the presence of access switches
|
|
|
Term
What is Application Centric Infrastructure (ACI)? |
|
Definition
A centralized application-level policy engine for physical, virtual, and cloud infrastructures.
It reduces administrative overhead and improve flexibility and operational efficiency
|
|
|
Term
What is the benefit of the Cisco ASAv? |
|
Definition
It provides detailed visibility and control of application and services within the virtual environment.
and it defines the concept of east-west versus north-south traffic.
|
|
|
Term
What is the major challenge you have when trying to use physical appliances or firewall to protect a virtualized environment? |
|
Definition
sometimes the traffic does not leave the physical server ans as a result is not monitor or analyzed. |
|
|
Term
What are the motivations behind all threat actors? |
|
Definition
Financial
Disruption
Geopolitical |
|
|
Term
What are the types of Distributed Denial-of-Service Attacks? |
|
Definition
DDoS attacks can generally be divided into the following three categories
1. Direct: Direct DDoS attacks are sent directly to the victim of the attack.
2. Reflected: Reflected DDoS attacksoccur when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended victim. --UDP is often used as the transport mechanism
3.Amplification: Amplification attacks are a form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).
|
|
|
Term
What happens during (IKE-2)Internet Key Exchange Phase 2 ? |
|
Definition
It builds the actual IPsec tunnel. This includes negotiating the transform set for the IPsec SA.
|
|
|
Term
What are some Social Engineering Methods and Tactics? |
|
Definition
Phishing
Malvertising
Phone scams |
|
|
Term
What are some Defenses Against Social Engineering? |
|
Definition
Password management
Two-factor authentication
Antivirus/antiphishing defenses
Change management
Information classification
Document handling and destruction
Physical security |
|
|
Term
Why is Malware Identification so difficult? |
|
Definition
The sheer amount of malware that exists and is created on a daily basis is almost incomprehensible often making signature-based detection tools useless.
Malware is often embedded in otherwise-trusted applications and sent over protocols that are traditionally allowed through firewalls and access lists
Organizations have limited resources (both human and technology) to keep up with the massive amounts of traffic that traverse the network
increasing use of encryption has added another layer of complexity
|
|
|
Term
What Methods are Available for Malware Identification? |
|
Definition
Packet captures
Snort
NetFlow
IPS events
Advanced Malware Protection
NGIPS |
|
|
Term
|
Definition
|
|
Term
|
Definition
Stores the Startup config |
|
|
Term
What is the purpose of system: memory |
|
Definition
System RAM, stores the running configuration
|
|
|
Term
What are the two command used to setup IOS Resilient Configuration? |
|
Definition
1."secure boot-image,"
2."secure boot-config"
|
|
|
Term
What does the command secure boot-image do? |
|
Definition
1. It enables the secure boot -image feature
2. It secures the running image
a. maintained in flash, no longer can be
displayed by with the dir command.
b. cannot be deleted via the command line |
|
|
Term
What does the command "secure boot-config" do ?
|
|
Definition
1.It copies running config to secured storage area
2. Secured IOS image and configuration is called the 'secure bootset' |
|
|
Term
What is a Management Information Base(MIB) ? |
|
Definition
1. A database of network management information that is used and maintained by a network management protocol, such as SNMP or CMIP.
2. MIB objects are organized in a tree structure that includes public (standard) and private (proprietary) branches. |
|
|
Term
What commands allow you to verify aaa settings? |
|
Definition
|
|
Term
What is Diffie-hellman key exchange? |
|
Definition
It uses public-private key pair asymmetrical algorithm.... But creates final shared secrets(keys) that are then used by symmetrical algorithms. |
|
|
Term
What is a Reflected DDoS attack? |
|
Definition
1. occur when the sources of the attack are sent spoofed packets that appear to be from the victim
2. Responses are sent to the legitimate source
Note: Often done via UDP
|
|
|
Term
What is an Amplification attack? |
|
Definition
It is form of reflected attacks in which the response traffic (sent by the unwitting participants) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim). |
|
|
Term
What are some examples of Social Engineering Attacks? |
|
Definition
Phishing
Malvertising
Phone scams |
|
|
Term
|
Definition
It is Packet capture is often referred to as micro-analytical in terms of the granularity of data being analyzed.
it's based on a set of predefined parameters such as source IP address, source port, destination IP address, destination port, IP protocol, ingress interface, and type of service (ToS)
|
|
|