CS with Mr Teasdale

CS, Programming, and CySec stuff...

View on GitHub

Devices & Infrastructure

5.4 NAT

Network address translation occurs due to a limitation in the IPv4 networking scheme. The interent is a public network and needs a routable IP that is registered. Not all devices can have one - ISPs will provide this to a customer.

The router will assign each device on the internal network with a unique IP that is then converted into a routable IP once it leaves the LAN to go into the WAN.

5.5 VPN

A virtual private network VPN is a remote-access connection that uses encryption

Use IPSec over L2TP - PPTP with MSv2CHAP is insecure!

5.6 Web Threat Protection

Threat types

Web threat devices;

Types of Protection Devices

Website/URL content filtering - prevents a user from visiting restricted websites. Specific websites are identified as restricted; employees are not able to view the sites on their browsers. Used to enforce the organization’s internet usage policy. Helps to increase bandwidth availability. Does not protect against malcious sites.

Web filter

Web threat filtering - prevents a user from visiting websites with known malicious content. It maintains a list of websites with known malicious content.

Gateway email spam filters - prevent spam emails from reaching your network, servers, and computers. Spam filters can be configured to block specific senders, emails containing threats (such as false links), and emails containing specific content.

Virus scanners - identify infected content and dispose of it. Often coupled with email scanners.

Anti-phishing software- scans content to identify and dispose of phishing attempts, preventing outside attempts to access confidential information.

Encryption - causes data, such as the content of an email, to be unintelligible except to those who have the proper key to decrypt it. Proxies

Blocking sites via pfSense

Alt text

Add packages Alt text

5.7 Network access control

Can be used to setup admission criteria to the network - if a device does not satisfy a certain criteria it will be placeed onto a restricted network until issues are resolved (device has access to updates and other necessary things to make it conform to the network).

NAC Goals are to prevent zero-day attacks, give role-based controls, encrypt traffic and manage identity / enforce policies.

Alt text


5.8 Network Threats Facts

Network segmentation

secure network-architecture concept. Idea is that if certain parts of a system are compromised, then the rest of the network is okay. Makes it much easier to identify suspicious network traffic.

Most common method is to setup VLANS (Virtual Local Area Networks) - separate these into zones (low, medium, high), etc. Example of a low-trust zone could be a web server. This kind of zone is also referred to as a DMZ, or demilitarized zone.

Types of network attack

User Education and Training

training is very important - phishing is a big concern, therefore educating an organisations employees is beneficial.

Threat focus points

Alt text

Go Home