Introduction to Cyber Security
Secure Enterprise Architecture and
Component
Learning Objectives
By the end of this lesson, you will be able to:
Describe network architecture
Explain wireless networks
List the network security controls
Explain security testing
Network Architecture
Enterprise Network Architecture
Networks are part of a large, centrally managed, and internetworked architecture solutions.
Enterprise Network Architecture
Web-based front-end Application and database Mainframe servers
application servers servers
Enterprise Network Architecture
Organizations implement service-oriented architectures (SOA) with web software components.
Simple Object Access Protocol (SOAP) Extensible Markup Language (XML)
Basics of Network Architecture
Telecommunications: Protocol:
Electromagnetic transmission of A standard set of rules
data
Types of Network Architecture
Open Network Architecture Closed Network Architecture
Not Proprietary Proprietary
Integrates vendor implementations Not integrated with vendors
Open System Interconnection (OSI) Model
Open System Interconnection (OSI) Model
OSI is a layered architecture.
Simplifies the network design Helps in easier network
management
Helps in debugging network
applications
Seven Layers of OSI Model
Presentation 2 3 Session
Application 1 4 Transport
Physical 7 5 Network
6
Data Link
Types of Networks
Types of Networks
Wide Area Network
(WAN)
Metropolitan Area
Local Area Network Network (MAN)
(LAN)
Storage Area
Personal Area Network (SAN)
Network (PAN)
The types of networks are:
Data Communication Systems
Data Communication Systems
A process of using computing technology to transfer data from one point to another.
Data Communication Systems:
Transfers digital data between nodes
Uses ASCII, EBCDIC, and Unicode for conversion
Data Communication Software Components
Information to be
communicated
The components of Sender and receiver
communication
software are:
Medium or channel
Computer-Based and Business Information Systems
Computer-Based Information System
Procedures
Hardware People
The
computer-
Software applications based Internet
information
system are:
Database Networks
Telecommunications
Business Information Systems
Decision
Support System
SOA Systems
Transaction
Processing
Electronic Commerce
Management
Information
System
Hardware Failure
Hardware Failure
It is a malfunction within the electronic circuits or electromechanical components
Hardware Failure
Encryption Physical Security
Media Sanitization Maintenance
Hardware Failure
• Exposed • Virus
Data • Spyware
• Lost
Hardware
Malicious
Data Loss
Code
Physical Data
Theft Corruption
• Storage • Damaged
Media Drive
• Computers • Corrupted
Drive
Hardware Failure
Asset
Error reports Availability reports Utilization reports management
(automated) reports
Check List the
Detect downtime Document network
failures and caused by the utilization inventory
provide inadequate of machine tools and
corrective facilities and and their
actions excessive peripherals connected
maintenance equipment
Host-Based Security
Host-Based Security
Host security refers to securing the operating system from unauthorized access.
Host-Based Security Controls
Host-Based Firewalls Intrusion Detection System Antivirus
Disk Encryption Regular Backups Access Control
Wireless Networks and Virtual Private Network
Wireless Networks
Wireless networks are computer networks that are not connected by cables of any kind.
Wireless Networks
Benefit: Drawback:
Mobility Speed
Network Reach Security
Flexibility/Scalability
Wireless Attacks
Pose challenges to
security professionals
Easy setup at the cost of security
Wireless Countermeasures
Use encryption Use Antivirus
Use WPA3 Turn off SSID Change the
authentication password
Case Study: Wireless Attack
Tel Aviv free Wi-Fi network was hacked. One notable example of how easy it can be
for a hacker to take over a Wi-Fi network comes from Tel Aviv.
Case Study: Wireless Attack
The free Wi-Fi network of Tel Aviv was hacked.
It incorporates basic security controls to keep users secure in the network.
Case Study: Wireless Attack
Noticed a new Wi-Fi access
Tested its security controls point
Discovered an HTTPS port 443
Virtual Private Network
VPN extends the corporate network securely via encrypted packets sent out via
virtual connections over the public internet to distant offices, home workers,
salespeople, and business partners.
Virtual Private Network
Accesses their Communicates with
Increases the
corporate enterprise business partners
network span
Helps in being efficient Helps grow their
and effective business
Types of Virtual Private Network
Intranet VPN
Remote access VPN
Extranet VPN
Virtual Private Network
Lack of required host Physical access Endpoints
security software
Man-in-the-middle attacks Hardware limitations
VPN Risks
Strong user Host identity Security posture
authentication verification validation
Secure desktop Configuration Education and
considerations awareness
Wireless Network Example: Bluetooth
Speed is 2.4 GHZ and range Introduced in 1994
is between 10 to 30m
Uses radio waves for Short-range wireless
communication communications technology
Bluetooth Attack Example
Bluejacking is the unauthorized sending of text messages to a nearby Bluetooth device.
Bluetooth Countermeasures
Use Bluetooth for confidential information
Change the default PINs on your devices
Do not leave your devices in discovery mode
Turn off Bluetooth when it’s not in active use
Bluetooth Vulnerability: BlueBorne
It is a set of nine exploitable Bluetooth vulnerabilities.
It affects every laptop and The airborne attack is difficult
mobile device. to protect.
Radio-Frequency Identification (RFID)
Radio-Frequency Identification (RFID)
RFID uses radio waves to read and capture information stored on a tag attached to an object.
RFID Risks
Business Process Business
Risk Intelligence Risk
Externality Risk Privacy Risk
RFID Security Controls
Management Operational
Technical
Case Study: RFID Hack
Mobile Keys and Bluetooth
Uses near-field Guests download an app Opens the door with
communication (NFC) to their phones signals
Emanation Security
It is a hardware or electronic device that emits electromagnetic radiation.
Controls Against Electronics
Faraday Cage White Noise
Control Zones
Network Security Controls
Network-Based Security
Hacking, viruses, and
spyware
Denial of service Email spoofing
Trojan Horses Unauthorized
access
Prevents computer network from:
Network Attack Categories
Active attack Passive attack
An intruder initiates An intruder intercepts
commands to disrupt the data traveling through
network's normal operation. the network.
Firewall
Stops hackers from
accessing network
Controls network Allows users to access the
traffic internet
Firewall Features
Controls the vulnerable point
Is a combination of hardware and between a corporate network
software and the internet
Unified Threat Management (UTM)
UTM combines several key elements of network security to offer a comprehensive
security package to buyers.
Unified Threat Management (UTM)
Goals Issues
• Simplicity • Single point of failure
• Streamlined installation • Single point of
and maintenance compromise
• Performance issues
• Centralized control
Web Application Firewall
Filters, monitors, and blocks
HTTP traffic Filters the content of specific
web applications
Prevents attacks from web
application security flaws
Intrusion Detection System (IDS)
Intrusion Detection System otherwise known as IDS is monitored network usage anomaly.
● Works together with firewalls and routers
● Operates in the background
● Alerts when intrusions are detected
● Protects external and internal misuse
Intrusion Detection System Components
Sensor User Interface
Analyzer Admin Console
Intrusion Detection System Categories
Network-based IDS Host-based IDS
(NIDS) (HIDS)
An intruder initiates An intruder intercepts
commands to disrupt the data traveling through
network's normal operation. the network.
Intrusion Prevention System (IPS)
• Closely related to IDS
• Designed to detect and prevent attacks
• Must be properly configured and
tuned to be effective
Network Admission Control
It is a concept of controlling access to an environment through strict adherence and
implementation of security policy.
Network Admission Control Goals
Prevent/reduce Enforce security policy Use identities to perform
zero-day attacks throughout the network access control
Honeypots
A honeypot system is a computer that sits in the screened subnet or the DMZ and
attempts to lure attackers.
Have services emulated
Enable services and ports
Honeypots
Group of honeypots implemented together is called a honeynet.
Security Testing
Vulnerability Scanning
It is a process of examining your systems and network devices for security holes and weaknesses.
Vulnerability Scanning
Vulnerability scanners are designed to help administrators and address vulnerabilities.
Vulnerability Scan Goals
• Identify vulnerability
• Identify lack of security controls
• Identify common misconfigurations
Some scanners are capable of remediation checking for misconfigurations.
Penetration Testing
Tries to exploit the system
The most aggressive form of Uncovers any weaknesses within
security testing the environment
Simulates an attack from a Emulates the same methods
malicious outsider. attackers would use
Types of Penetration Testing
The types depend on the organization, its security objectives, and the management goals.
Types of Penetration Testing
In black box testing, the tester has no knowledge of the internal design or features of the
system. It simulates the external attacker the best.
Types of Penetration Testing
In white box testing, the tester has complete knowledge of the internal system, it may yield a
more complete result, but it may not be representative of an external hacker. It may be a good
indicator of an internal type of threat.
Types of Penetration Testing
In grey box testing, some information about internal working is given to the tester.
• Helps guide tester tactics
• Mitigates the risks
Security Audits
Security Audits
These are systematic evaluations performed with the purpose of demonstrating the
effectiveness of controls to a third party.
Security Audits
It is performed by independent auditors. Auditors provide unbiased view of the state
of security controls.
Types of Security Audits
• It is performed by an organization’s • It is performed by third-party auditors.
internal staff. • The reports are intended for third-party
• The reports are intended for internal stakeholders.
audience. • NDA is a prerequisite.
Disadvantage: Conflict of interest and Disadvantage: Cost
hidden agenda
Key Takeaways
Networks are part of a large, centrally managed, internetworked
architecture solutions.
Wireless networks are computer networks that are not
connected by cables of any kind.
Network-based protection or security is a method of preventing
your computer network from unauthorized user access.
Security testing is a process of examining your systems and
network devices for security holes and weaknesses.