Top Banner
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks
46

Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Dec 23, 2015

Download

Documents

Benedict Horn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals,

Fourth Edition

Chapter 4Vulnerability Assessment

and Mitigating Attacks

Page 2: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Objectives

• Define vulnerability assessment and explain why it is important

• List vulnerability assessment techniques and tools

• Explain the differences between vulnerability scanning and penetration testing

• List techniques for mitigating and deterring attacks

2

Page 3: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment

• Systematic evaluation of asset exposure– Attackers– Forces of nature– Any potentially harmful entity

• Aspects of vulnerability assessment– Asset identification– Threat evaluation– Vulnerability appraisal– Risk assessment– Risk mitigation

3

Page 4: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Asset identification– Process of inventorying items with economic value

• Common assets– People– Physical assets – Data– Hardware– Software

4

Page 5: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Determine each item’s relative value– Asset’s criticality to organization’s goals– How much revenue asset generates– How difficult to replace asset– Impact of asset unavailability to the organization

• Could rank using a number scale

5

Page 6: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Threat evaluation– List potential threats

• Threat modeling– Goal: understand attackers and their methods– Often done by constructing scenarios

• Attack tree– Provides visual representation of potential attacks– Inverted tree structure

6

Page 7: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Table 4-1 Common threat agents

Page 8: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 8

Figure 4-1 Attack tree for stealing a car stereo© Cengage Learning 2012

Page 9: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 9

Figure 4-2 Attack tree for breaking into grading system© Cengage Learning 2012

Page 10: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Vulnerability appraisal– Determine current weaknesses

• Snapshot of current organization security

– Every asset should be viewed in light of each threat– Catalog each vulnerability

• Risk assessment– Determine damage resulting from attack– Assess likelihood that vulnerability is a risk to

organization

10

Page 11: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 11

Table 4-2 Vulnerability impact scale

Page 12: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Single loss expectancy (SLE)– Expected monetary loss each time a risk occurs– Calculated by multiplying the asset value by exposure

factor– Exposure factor: percentage of asset value likely to be

destroyed by a particular risk

12

Page 13: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Annualized loss expectancy (ALE)– Expected monetary loss over a one year period– Multiply SLE by annualized rate of occurrence– Annualized rate of occurrence: probability that a risk

will occur in a particular year

13

Page 14: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition

Vulnerability Assessment (cont’d.)

• Estimate probability that vulnerability will actually occur

• Risk mitigation– Determine what to do about risks– Determine how much risk can be tolerated

• Options for dealing with risk– Diminish– Transfer (outsourcing, insurance)– Accept

14

Page 15: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Table 4-3 Risk identification steps

Page 16: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Techniques

• Baseline reporting– Baseline: standard for solid security– Compare present state to baseline– Note, evaluate, and possibly address differences

Security+ Guide to Network Security Fundamentals, Fourth Edition 16

Page 17: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Techniques (cont’d.)

• Application development techniques– Minimize vulnerabilities during software development

• Challenges to approach– Software application size and complexity– Lack of security specifications– Future attack techniques unknown

Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Page 18: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Techniques (cont’d.)

• Software development assessment techniques– Review architectural design in requirements phase– Conduct design reviews

• Consider including a security consultant

– Conduct code review during implementation phase• Examine attack surface (code executed by users)

– Correct bugs during verification phase– Create and distribute security updates as necessary

Security+ Guide to Network Security Fundamentals, Fourth Edition 18

Page 19: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 19

Figure 4-3 Software development process© Cengage Learning 2012

Page 20: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools

• IP addresses uniquely identify each network device

• TCP/IP communication– Involves information exchange between one

system’s program and another system’s corresponding program

• Port number– Unique identifier for applications and services– 16 bits in length

Security+ Guide to Network Security Fundamentals, Fourth Edition 20

Page 21: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools (cont’d.)

• Well-known port numbers– Reserved for most universal applications

• Registered port numbers– Other applications not as widely used

• Dynamic and private port numbers– Available for any application to use

Security+ Guide to Network Security Fundamentals, Fourth Edition 21

Page 22: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 22

Table 4-4 Commonly used default network ports

Page 23: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools (cont’d.)

• Knowledge of what port is being used– Can be used by attacker to target specific service

• Port scanner software– Searches system for port vulnerabilities– Used to determine port state

• Open

• Closed

• Blocked

Security+ Guide to Network Security Fundamentals, Fourth Edition 23

Page 24: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 24

Figure 4-4 Port scanner© Cengage Learning 2012

Page 25: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 25

Table 4-5 Port scanning

Page 26: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools (cont’d.)

• Protocol analyzers– Hardware or software that captures packets:

• To decode and analyze contents

– Also known as sniffers

• Common uses for protocol analyzers– Used by network administrators for troubleshooting– Characterizing network traffic– Security analysis

Security+ Guide to Network Security Fundamentals, Fourth Edition 26

Page 27: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 27

Figure 4-5 Protocol analyzer© Cengage Learning 2012

Page 28: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools (cont’d.)

• Attacker can use protocol analyzer to display content of each transmitted packet

• Vulnerability scanners– Products that look for vulnerabilities in networks or

systems– Most maintain a database categorizing vulnerabilities

they can detect

Security+ Guide to Network Security Fundamentals, Fourth Edition 28

Page 29: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 29

Figure 4-6 Vulnerability scanner© Cengage Learning 2012

Page 30: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools (cont’d.)

• Examples of vulnerability scanners’ capabilities– Alert when new systems added to network– Detect when internal system begins to port scan

other systems– Maintain a log of all interactive network sessions– Track all client and server application vulnerabilities– Track which systems communicate with other

internal systems

Security+ Guide to Network Security Fundamentals, Fourth Edition 30

Page 31: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Assessment Tools (cont’d.)

• Problem with assessment tools– No standard for collecting, analyzing, reporting

vulnerabilities

• Open Vulnerability and Assessment Language (OVAL)– Designed to promote open and publicly available

security content– Standardizes information transfer across different

security tools and services

Security+ Guide to Network Security Fundamentals, Fourth Edition 31

Page 32: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 32

Figure 4-7 OVAL output© Cengage Learning 2012

Page 33: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Honeypots and Honeynets

• Honeypot– Computer protected by minimal security– Intentionally configured with vulnerabilities– Contains bogus data files

• Goal: trick attackers into revealing their techniques– Compare to actual production systems to determine

security level against the attack

• Honeynet– Network set up with one or more honeypots

Security+ Guide to Network Security Fundamentals, Fourth Edition 33

Page 34: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Vulnerability Scanning vs. Penetration Testing

• Vulnerability scan– Automated software searches a system for known

security weaknesses– Creates report of potential exposures– Should be conducted on existing systems and as

new technology is deployed– Usually performed from inside security perimeter– Does not interfere with normal network operations

Security+ Guide to Network Security Fundamentals, Fourth Edition 34

Page 35: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Penetration Testing

• Designed to exploit system weaknesses

• Relies on tester’s skill, knowledge, cunning

• Usually conducted by independent contractor

• Tests usually conducted outside the security perimeter– May even disrupt network operations

• End result: penetration test report

Security+ Guide to Network Security Fundamentals, Fourth Edition 35

Page 36: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Penetration Testing (cont’d.)

• Black box test– Tester has no prior knowledge of network

infrastructure

• White box test– Tester has in-depth knowledge of network and

systems being tested

• Gray box test– Some limited information has been provided to the

tester

Security+ Guide to Network Security Fundamentals, Fourth Edition 36

Page 37: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Security+ Guide to Network Security Fundamentals, Fourth Edition 37

Table 4-6 Vulnerability scan and penetration testing features

Page 38: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Mitigating and Deterring Attacks

• Standard techniques for mitigating and deterring attacks– Creating a security posture– Configuring controls– Hardening– Reporting

Security+ Guide to Network Security Fundamentals, Fourth Edition 38

Page 39: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Creating a Security Posture

• Security posture describes strategy regarding security

• Initial baseline configuration– Standard security checklist– Systems evaluated against baseline– Starting point for security

• Continuous security monitoring– Regularly observe systems and networks

Security+ Guide to Network Security Fundamentals, Fourth Edition 39

Page 40: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Creating a Security Posture (cont’d.)

• Remediation– As vulnerabilities are exposed, put plan in place to

address them

Security+ Guide to Network Security Fundamentals, Fourth Edition 40

Page 41: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Configuring Controls

• Properly configuring controls is key to mitigating and deterring attacks

• Some controls are for detection– Security camera

• Some controls are for prevention– Properly positioned security guard

• Information security controls– Can be configured to detect attacks and sound

alarms, or prevent attacks

Security+ Guide to Network Security Fundamentals, Fourth Edition 41

Page 42: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Configuring Controls (cont’d.)

• Additional consideration– When normal function interrupted by failure:

• Which is higher priority, security or safety?

– Fail-open lock unlocks doors automatically upon failure

– Fail-safe lock automatically locks• Highest security level

– Firewall can be configured in fail-safe or fail-open state

Security+ Guide to Network Security Fundamentals, Fourth Edition 42

Page 43: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Hardening

• Purpose of hardening– Eliminate as many security risks as possible

• Techniques to harden systems– Protecting accounts with passwords– Disabling unnecessary accounts– Disabling unnecessary services– Protecting management interfaces and applications

Security+ Guide to Network Security Fundamentals, Fourth Edition 43

Page 44: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Reporting

• Providing information regarding events that occur

• Alarms or alerts– Sound warning if specific situation is occurring– Example: alert if too many failed password attempts

• Reporting can provide information on trends– Can indicate a serious impending situation– Example: multiple user accounts experiencing

multiple password attempts

Security+ Guide to Network Security Fundamentals, Fourth Edition 44

Page 45: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Summary

• Vulnerability assessment– Methodical evaluation of exposure of assets to risk– Five steps in an assessment

• Risk describes likelihood that threat agent will exploit a vulnerability

• Several techniques can be used in a vulnerability assessment

• Port scanners, protocol analyzers, honeypots are used as assessment tools

Security+ Guide to Network Security Fundamentals, Fourth Edition 45

Page 46: Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 4 Vulnerability Assessment and Mitigating Attacks.

Summary (cont’d.)

• Vulnerability scan searches system for known security weakness and reports findings

• Penetration testing designed to exploit any discovered system weaknesses– Tester may have various levels of system knowledge

• Standard techniques used to mitigate and deter attacks– Healthy security posture– Proper configuration of controls– Hardening and reporting

Security+ Guide to Network Security Fundamentals, Fourth Edition 46