You are on page 1of 35

Study Guide for NSE 1: The Threat Landscape 2016

Study Guide
for NSE 1:
The Threat
Landscape

February 1

2016

This Study Guide is designed to provide information for the Fortinet


Network Security Expert Program Level 1 curriculum. The study
guide presents discussions on concepts and equipment necessary as a
foundational understanding for modern network security prior to
taking more advanced and focused NSE program levels.

Fortinet
Network
Security
Solutions

Study Guide for NSE 1: The Threat Landscape 2016


Contents
Figures ..................................................................................................................................................... iii
Tables ...................................................................................................................................................... iv
Threat Landscape .......................................................................................................................................... 1
Evolution of Adversaries ........................................................................................................................ 1
Hacker Tools ............................................................................................................................................ 5
Oldbut not Dead .......................................................................................................................................................... 6
Threat Timeline ....................................................................................................................................... 7
Anatomy of a Hacking Attack ................................................................................................................. 9
Advanced Threats ........................................................................................................................................................ 10
The Advanced Threat Lifecycle .............................................................................................................................. 11
The Advanced Attack Kill Chain ............................................................................................................................. 13
Introduction to Modern Network Security ................................................................................................. 15
Infrastructure Evolution ....................................................................................................................... 17
Size Matters............................................................................................................................................ 19
Advanced Threats ........................................................................................................................................................ 20
Advanced Threat Protection (ATP)...................................................................................................... 20
Breaking the Advanced Threat Kill Chain .......................................................................................................... 21
Advanced Threats and Network Security: Continuing Evolution...................................................... 25
Key Acronyms.............................................................................................................................................. 26
Glossary ....................................................................................................................................................... 28

ii

Study Guide for NSE 1: The Threat Landscape 2016


Figures
Figure 1. Ranking adversaries to network security. ...................................................................................... 3
Figure 2. Chronology of major networks attacks October 2013 to June 2014. ............................................ 7
Figure 3. Anatomy of an attack: The Hacker's point of view. ....................................................................... 9
Figure 4. The Advanced Threat lifecycle. .................................................................................................... 11
Figure 5. Kill chain of an advanced attack................................................................................................... 13
Figure 6. The Network Security Battle of the minds. .............................................................................. 15
Figure 7. From closed networks to Global Information Grid ...................................................................... 18
Figure 8. The scope of modern global network users................................................................................. 19
Figure 9. UTM versus traditional ad hoc model.......................................................................................... 19
Figure 10. Miniaturization of computers and network access appliances. ................................................ 20
Figure 11. Advanced Threat Protection (ATP). ........................................................................................... 21
Figure 12. Breaking the advanced threat kill chain - Part 1. ....................................................................... 22
Figure 13. Breaking the advanced threat kill chain - Part 2. ....................................................................... 23

iii

Study Guide for NSE 1: The Threat Landscape 2016


Tables
Table 1. Major network attacks October 2013 to June 2014. ...................................................................... 8
Table 2. Recent attacks on major sites. ........................................................................................................ 9

iv

Study Guide for NSE 1: The Threat Landscape 2016


Threat Landscape
One may view the threat landscape much the same as law enforcement views threats using three
primary characteristicsmotive, means, and opportunity. In terms of technology threats, these terms
are translated into motivation (motive), knowledge (means), and access (opportunity). Motivation may
be as simple as a student trying to get into protected information or as malicious as a competitor trying
to delay or disable a companys ability to reach the market. Knowledge on networksand hackingis
widespread, with books and guides available
globally through the Internet and often at little or
no cost. As for Access, this is the area where the
veracity of your network security will pay off
identifying potential threats, analyzing them, and
either determining validity or cataloging and
rejecting them as a threat.

Contemporary and future threat landscapes are dynamic and often include unforeseen technological
advances. Devices and applications are under development and appear on the market at more rapidly
and with those new technologies come new threats. Not only companies and organizations, but
individual users of less expensive technology such as smartphones, tablets, and laptop computers who
are novices where information security is concerned must deal with optimizing their devices and
applications while blocking potential threats.
With the explosion of social media as the
primary source of connectivity for so many
people internationally, addressing the hidden
threats from social media sites is a continuing
challengeand more cross-platform sharing and
integration will continue to make device and
network security an evolving challenge at all
levels.

Evolution of Adversaries
Computer hacking was once the realm of curious teenagers. It's now the arena of government spies,
professional thieves and soldiers of fortunebut dont count out the curious teenagers just yet; more
and more young people are enamored with the prospectand thrillof hacking and seeing how far
they can get.

Study Guide for NSE 1: The Threat Landscape 2016


The whole concept of "hacking" sprouted from the Massachusetts Institute of Technology nearly 50
years ago. Computer science students there borrowed the term from a group of model train enthusiasts
who hacked electric trains and switches in 1969 to improve performance. These new hackers were
already figuring out how to alter computer software and hardware to speed it up, even as the scientists
at AT&T Bell Labs were developing UNIX, one of the world's first major operating systems.
The Golden Age of Hacking was the 1980s, as people bought personal computers for their homes and
hooked them up to the telephone network. The Web wasn't yet alive, but computers could still talk to
one another through venues like hosted chat rooms and FTP. In fact, the 1980s was still the age of MSDOS and command line interface (CLI) programming and online interaction. These curious kids tapped
into whatever computer system they could find just to explore. Some broke into computer networks at
companies. And digital hangouts started, such as Chat City and other hosted group online
communication sites.
As hacking progressing into the 1990s, the purposes for hacking ranged across a number of motives.
Some hacked for money. Others did it for revenge. However, hacking was still more of an annoyance
than anything devastating, though it was quickly becoming apparent that the potential was there for
damage, including industrial espionage, hardware damage, file damage, and so forth. The stock market,
hospitals, credit card transactions, and corporate or personal file storage -- everything was running on
computers now.
As the 21st Century turned the clocks, loosely affiliated amateurs were replaced by well-paid, trained
professionals. By the mid-2000s, hacking had become a widespread tactic for organized crime,
governments, and hacktivists.
Crime. Hackers around the world wrote malicious software (malware) to hijack tens of
thousands of computers, using their processing power to generate spam. They wrote
banking Trojans to steal website login credentials. Hacking payment systems turned out
to be insanely lucrative, too. Albert Gonzalezs theft of $94M credit cards from TJX in
2007 proved to be a precursor to later retailer data breaches, like Target, Home Depot
and others.
Government. When the United States wanted to sabotage the Iranian nuclear program
in 2009, it hacked a development facility and unleashed the most dangerous computer
virus to date--Stuxnet caused the Iranian lab computers to spin centrifuges out of
control. Russia used cyberattacks to shut down media during the 2008 war in Georgia.
And now, it is suspected that both China and Russia have hacked into US Government
systems, stealing PII on millions of government personnel and their families.
Hacktivists. The populist group Anonymous hacks into police departments to expose
officer brutality and floods banks with garbage Internet traffic and a group calling
themselves Vigilante takes down Islamic jihadist websites.
Figure 1 depicts how various adversaries pose a threat to network security.

Study Guide for NSE 1: The Threat Landscape 2016


What exists now is a tricky world. When the White House got hacked, was it the Russian government,
nationalists acting on their own, or freelance agents paid by the government? Meanwhile, with the
explosion of technology-focused classes at all levels of education and training, it is easier than ever to
become a hacker. Because of the tools that are availableand ongoing development of new threat
methods--attribution is very difficult when an attack occurs.

Figure 1. Ranking adversaries to network security.


As one examines Figure 1, it is important to understand that there is no distinct barrier separating these
methods. In fact, it is easily conceivable that one type of adversary couldpurposely or inadvertently
enable another to access a network or system.
The early days of personal computer availability to consumers and the advent of the Internet and
Worldwide Web are behind us. These events were followed by parallel development of more powerful
hardware appliances and more complex applications for those machines. Unfortunately, with those
developments also came a thriving developmental path for malware and other methods by which to
breach system and network security to obtain data from or deny use of targeted platforms.
From a starting point of small, direct attacks on computers, hackers have evolved along with computers,
networks, and security. Modern hackers are skilled cybercriminals, motivated by such issues as financial
gain, criminal organization sponsorship, radical political groups, or even sovereign states. Modernand
futurehackers have far more resources than their counterparts of a quarter century ago, greater
technical knowledge and concentration, and greater funding and organization. There are a number of
different types of hackers that have developed since the 1980s.

Study Guide for NSE 1: The Threat Landscape 2016


Adversaries attempt to gain access to many different types of data for many different reasons, ranging
from personal information to covert access to machines or networks to attacks that harvestor prevent
the receipt ofinformation. In some cases, the motive is simpleextortion. Among the reasons for
hacking into systems are:
IP. Gaining the IP address of a target, so that traffic into/out of the address can be
monitored, stopped, or otherwise affected.
Financial Information. This runs a broad scope from hacking banks for the fourth
decimal place amount of interest money on all the institutions accounts, to
ransomware that makes the target pay a fee to get the antidote code for the malware,
to small purchases with credit card information stolen from consumers.
PII Identity Theft. This includes everything from credit information to identification
documentation to Social Security numbers, birthdates, and other data that may be used
to create an identity without the target being aware until it is too late and the damage
has been done.
Shutting Down Competition. Tactics like DDoS attacks have been used to block business
competitors from broadcasting product/service information. Other attacks may infect
manufacturing systems, payrolls, and other functions that result in a company having to
shut down operations until the problem(s) is/are resolved This may also include
industrial sabotage, whereby data is gained that gives a company advantage over
competitors or alters their product so it is unmarketable.
Wikileaks. The media coverage of Julian Assange and the Wikileaks organization has
spurred on activists to follow in his footsteps and work to expose things with which they
disagree, either publicly shaming the company into changing procedures/products or
using the information as collateral for a ransom.
Profit. This is the prime motivator behind criminal enterprises, and it is no different
when they apply their trade to network attacks.
Sabotage. At a major company, organization, or government level, sabotage is the
means to an endusually the shutdown of a program (as with the 2009 use of Stuxnet
to shut down Irans nuclear program for a time), catastrophic loss of systems and/or
data, or stealing of industrial information.

As you review the illustration of escalating threat levels (Figure 1), you will notice that a key factor
defining threat level is the level of resources (training, equipment, funding) available to the adversary.
As hacking elevated from individuals to large, well-organized, and well-resourced entities, additional
benefits became available to hackers that provide enhanced capability over individual efforts.

Study Guide for NSE 1: The Threat Landscape 2016


Because organizational hacking provides the benefit of collaboration and increased funding, it provides a
breeding ground for hackers and development of new cyber-threats. Some of the benefits of
organizational hacking include:

Education, training, tech support


Storefront for hacking tools and zero-day exploits/vulnerability information
Sophisticated organization
Backed by governments
Supported by currencies like bitcoin
Obscured through anonymous networks like TOR

Hacker Tools
Hackers rely on two primary categories of tools to facilitate their activities:

Social engineering Techniques


Malware Tools

Social engineering is the use of content that convinces or encourages people to do something to
accomplish the hackers missionusually something damaging. The tactics vary as methods and tools
vary among different hackers with different objectives. Social engineering relies on non-technical
methods of intrusion that often trick people into breaking normal security procedures. Because it
leverages the human factor, social engineering is one of the greatest threats to organizations because of
the difficulty in controlling individual actions among members or employees.
Numerous techniques are available to the hacker. In fact, this is by necessity, as social engineering
targets human factors, which vary across a wide range of technical, social, and responsibility levels.
Therefore, social engineering encompasses numerous techniques that provide options to influence
many different human perspectives, and may include the following methods:
Spoofing is a technique where one person or program masquerades successfully as
another. This is usually accomplished by falsifying data to make the hacker appear as the
other entity.
Phishing is not unlike going fishing. The hacker attempts to acquire sensitive user
information (such as usernames, passwords, account data, or even directly steal money)
for malicious reasons by masquerading as a trustworthy entity in electronic
communications. This is particularly widespread among e-mail, but may also be used
through false web pages.
Spearphishing is an e-mail spoofing fraud that targets specific organizations in order to
gain unauthorized access to confidential, proprietary, or personal data. This is generally
a technique not used by individuals; rather, spearphishing is often used by perpetrators
out for financial gain, trade secrets, or military information.
Watering-hole Attacks target specific groupsorganizations, companies, industry,
regionto indirectly infect the groups network machines. The attacker analyzes which
Internet sites people from the group are likely to visit, infects the site(s) with malware,
and then waits for an individual from the group to access it. Once the individual is
infected, that person spreads it within the organization, widening access for the hacker.

Study Guide for NSE 1: The Threat Landscape 2016


Phone calls and impersonation are still viable in the technology age. PhoneBotsalso
known as auto-dialerspresent a predetermined message when the recipient answers
the phone. These messages typically request the recipient to call a number for a specific
purpose. The number may be attempting a scam as simple as having the recipient call a
number that is a pay-per-minute programwithout the recipient being awarewhich
later shows up as a charge on their phone bill.
Malvertising is the use of online ads to spread malware. These ads do not require
specific action by the usersuch as clicking on the ad; rather, they take advantage of
macros and advertisement windows that vary ads based on use preferences to spread
malware. Malvertising can run across legitimate sites without directly compromising the
site(s).
Social Media links are literally a playground for hackers and thieves, because many
people using social media platforms believe that web-based or SaaS platforms are
impervious to hackers. Often the hacker will use an intriguing picture, video, or
hyperlink to entice victims to interact, resulting in effects such as stealing browser
windows, embedding malware to steal data, or even tricking the user into a purchase.
Malware is a category of malicious code that includes viruses, worms, and Trojansit is a primary tool
for hackers when using social engineering techniques to gain access to systems or networks. The effects
of malware are not unlike how a human body becomes infected and how the immune system reacts:

Known viruses. These are cataloged in anti-virus programs and defenses have been developed
to counter the threatsometimes referred to as inoculating the machine or network against the
virus.
Unknown viruses. These are viruses that are not yet cataloged or do not yet have a
countermeasure developed to inoculate machines or networks. These unknowns may include
exploits developed and for sale to hackers, adaptive viruses, wrappers, and polymorphic code.
Combination. Because an attack does in restricted neither to a single piece of malware nor a
single attacking device or vector, the use of multiple viruses that include both known and
unknown varieties, may be used by hackers.

Oldbut not Dead


A misconception about threats is that old threats no longer work because they have standard defense
that have been built into newer software releases. Unfortunately, even with the increase in automated
network updates and functions, not all threats are mitigatedin many cases, it requires action (and
often investment of resources and money) by the user to enable threat defense. Common problems that
allow old threats to remain effective include:
Unpatched systems. The cost of continually running patcheswhen adding manpower,
network down time, and software costsoften leads to programs not receiving patches
to correct identified deficiencies and vulnerabilities. This is especially true with
individual consumers, whose vulnerable machines may pass malware on to
company/organization networks. There are still users with Microsoft Office 2003 on
their machines, for example, which no longer has support.

Study Guide for NSE 1: The Threat Landscape 2016


Old OS versions. In most casesfor both company, organization, and consumer use
this comes down to a single factorcost. For example, Windows 10 was released on July
29, 2015, yet users are still using Windows XP or Windows NT, having not upgraded to
Windows 7 or 8.1. Even when support was halted for these old versionsmaking them
more likely to be vulnerable in the futureboth consumers and organizations continued
risking their use.
AV/AM signatures not up to date. Viruses/Malware are developed at breakneck
rapidity on a continual basis. It literally does not take a computer scientist to develop
malicious codechildren 9 years old have demonstrated superior capability (can you
imagine them at 25?). It is essential to have a program that provides regular updates to
definitions and countermeasures, across individual, company, and organizational
scopes.
SMB, small agencies, partnerships lack security spending but still have network access.
Unfortunately, many times the cost of saving a few pennies early on results in the loss of
dollars later, especially if a major breach occurs.

Threat Timeline
From the last quarter of 2013 through the first quarter of 2014, major network attacks affected large
companies and billions of consumers. These attacks not only affected business systems, but also had the
ability to infect personal systems and mobile devices, such as the Heartbleed and Find My iPhone
attacks. Figure 2 chronicles those threats and the targets affected by them.

Figure 2. Chronology of major networks attacks October 2013 to June 2014.

Study Guide for NSE 1: The Threat Landscape 2016


In the period between October 2013 and June 2014, numerous major network attacks affected large
companies and billions of consumers. Over a year later, the impact of those attacks still resonates in
both company losses and loss of consumer trust. The timeline illustrated in Figure 2 presents some of
the more noteworthy attacks during that nine-month period, as described in Table 1.
Table 1. Major network attacks October 2013 to June 2014.
EVENT

DESCRIPTION

Adobe Hack

An estimated 2.9 million customer IDs, passwords, and possibly names & credit information.

Quarian
Backdoor
MS Office ZeroDay Attack
Android/
Hackdrive
OSX/Crisis
Google Play Hack
(Japanese &
Koreans)
Android/Balloon
Popper:

Spearphishing attacks exploited a vulnerability in MS Office to retrieve .doc data.

EVENT
Android/
GaLeaker
Turkish Hack
Reveton Variants
Adobe Flash in
Exploit Kit
Target Corp Hack
GnuTu (Linux)
Fail & Apple
SSL/TLS Bug
Heartbleed
Find My iPhone
eBay
Basecamp DDoS
Ransom Hack

11 occurred in 2013 and 5 in the first half of 2014.


Mobile malware used in sabotage campaign against political movement in Middle East that
took over all audio functions of smartphones when downloaded.
Attacked Mac systems, using expensive root kit to collect personal data, incl keystrokes.
JavaScript app stole phone number directories from mobile devices.

Android Balloon Pop 2 Game hack stole WhatsApp conversations from users.

DESCRIPTION
Collected Google (Gmail) IDs, but not associated passwords.
Russian hackers stole 54 million Turkish citizens ID numbers, addresses, fathers names.
Ransomware using random extensions to hide DLLs in batch files like rundll32.exe. Locked
machines and would not release unless user paid ransom fee to unlock.
Replacing earlier versions of the Blackhole exploit after arrest of the writer, this malware used
popup technology to disrupt Adobe software use.
Hackers stole credit and debit card information for over 40 million customers
goto fail programming errors left encrypted data open to hackers.

Affected OpenSSL sitesmostly social mediathreatening to expose user data.


Ransomware that locked iPhones using the Find My iPhone app and demanded payment
to unlock the phone. The next month Android phone users were also hit.
In May 2014, eBay hackers gained access to names, email and home addresses, phone
numbers, dates of birth, and encrypted passwords for around 145 million users.
Ransomware Distributed Denial of Service (DDoS) attack against the Basecamp project
management web app.

More recent attacks affected numerous well-known and high-utilization sites (Table 2).

Study Guide for NSE 1: The Threat Landscape 2016


Table 2. Recent attacks on major sites.
SITE
Twitter
Zendesk
New York Times
Schnucks
Markets
Evernote
LivingSocial
Washington
State Court
System

DESCRIPTION
Detected unauthorized access to 250,000 accounts.
Lost thousands of email addresses to a hacker accessed
support information of 3 major clients.
Was attacked by 45 pieces of custom malware, 53
employees systems compromised.
Blames ongoing cyber-attack for a breach, which impacted
2.4 million payment cards.
Resets passwords for 50 million users after detecting
suspicious activity on its network.
Notifies 50 million users that attackers had infiltrated and
gained access to systems.
Indicates up to 160,000 social security numbers exposed by
hack.

Other victims included: Michaels, Home Depot, AOL, Avast, Holiday Inn, Neiman Marcus, P. F. Changs,
and J.P. Morgan Chase.

Anatomy of a Hacking Attack


In some ways, the effective hacking attack is similar to painting a houseit takes more preparation than
execution time. In order for an attack to be successfulespecially and advanced persistent attack
(APT)a number of steps are essential, as indicated in Figure 3.

Figure 3. Anatomy of an attack: The Hacker's point of view.

Study Guide for NSE 1: The Threat Landscape 2016


Choosing a Target: The attacker first determines whom they wish to infiltrate and what
they wish to steal. Is the attacker after confidential financial data? Source code?
Technical drawings? All of these help determine a specific target.
Target Research: Once a target has been selected, the attacker will do extensive
background research on his target. By combing through search engines, employee social
network activity, public email and phone directories and other sources of easily
obtained data, the attacker can build a profile as well as a detailed list of other potential
human targets inside an organization.
Penetration: After a target has been acquired, the attacker typically creates a
customized phishing email in the hope that their target will open an attachment that
contains an exploit that allows the attacker to plant remote access malware on the
targets computer.
Elevation of Privileges: Once the attacker has gained a foothold inside a targets
network, an attempt is made to exploit vulnerabilities on other internal computers to
gain further access on the network. Once access has been gained, the attacker can then
move deeper into the targets network.
Internal Network Movement: If the attacker was successful in gaining further access
inside the network, they can then expand their control to other machines on the
network and compromise other computers and servers, allowing them to access data
throughout the network.
Data Theft: Once network access has been achieved, data can be easily stolen.
Passwords, files, databases, email accounts and other potentially valuable data can all
be sent back to the attacker.
Maintenance and Administration: Even after the requisite data has been stolen, an
attacker may decide to remain present on the targets network. This requires vigilance
on the attackers part in order to evade detection and maintain surveillance on the
targets data assets to ensure further data can be stolen.

Advanced Threats
Advanced threats include modern and emerging threats, many of which engage more complex
methods that the simpler and focused attacks of the past. Advanced Persistent Threat (APT)
technology, has evolved at a Moores Law clip since magician Nevil Maskelyne hacked a public
demonstration of apparently secure wireless telegraphy technology in 1903, sending insulting Morse
code messages through an auditoriums projector. Since the dawn of the computer age, people have
used advanced software to target specific companies or individuals in an attack designed to either
damage or steal data. What makes todays APTs unique and frightening are the sophistication of the
malware, the vectors theyre choosing for attack and the perseverance with which theyre going after
their targets.

10

Study Guide for NSE 1: The Threat Landscape 2016


What exactly does an Advanced Persistent Threat (APT) mean? As indicated in its name, three
components comprise APTs:

Advanced. Using organized methods, advanced malware, buying new tools constantly
developed.

Persistent. Patient. Using more social engineering combined with malware and codes. Can be
very hard to detect, with expectation of higher payout.

Threats. Designed to attack deliberate choices of target. Credit Card info is cheap on the open
market. Now its about business disruption, massive identity theft, IP theft, spying.

The Advanced Threat Lifecycle


As the sophistication of computer network attacks developed, strategies evolved from direct attacks to
employment of strategic, patient, more complex approaches to computer network intrusion and
exploitation. Along with this threat evolution came background and remote threats to computers and
networks from seemingly innocuous sources, such as malware embedded in legitimate Internet links or
files. With these threats, the lifecycle runs from reconnaissance of potential targets and manufacturing
of the method or malware to an endpoint of receiving the desired data or effect and exploiting the
results.
Cybercriminals are creating customized attacks to evade traditional defenses, and once inside, to avoid
detection and enable egress of valuable data. Once inside the network there are few systems in place to
detect or better still protect against APTs. It can be seen from the threat life cycle illustration that once
the perimeter border is penetrated, the majority of the activity takes place inside the boundary of the
network. Activities include disabling any agent-based security, updates from the botnet command and
control system, additional infection/recruitment and extraction of the targeted assets.

Figure 4. The Advanced Threat lifecycle.

11

Study Guide for NSE 1: The Threat Landscape 2016


An attacker has a substantial arsenal of tools at the ready in order to launch and maintain their attack.
Malware. Some hackers use specially crafted malware to exploit a victims computer,
while others use off the shelf malware tools that are easily obtainable online and on
many underground hacking forums.
Social Engineering. A key component in any attack is the ability to make a human target
believe an attack is coming from a trusted source. Using previously obtained research,
an attacker may craft very specific spear-phishing emails with seemingly innocuous
attachments that the target will likely open. Links to Web pages with malicious code
embedded (known as a watering hole attack), spreadsheets and other documents such
as text files and PDF files that take advantage of exploits in order to execute malicious
software are also oftentimes used.
Zero-Day and Other Exploits. As mentioned earlier, a zero-day exploit is a vulnerability
in a software product that allows an attacker to execute unintended code or gain
control of a target computer. These exploits are usually included in spearphishing and
watering hole attacks. In some cases, exploits are used that have recently been fixed by
vendors but have not yet been patched by the target organization. Both have been
shown to be very successful in attacks.
Insiders and Recruits. Sometimes an attacker will recruit an insider to assist in launching
an attack. In the case of Stuxnet, it is believed an insider sympathetic to the attackers
goals was recruited to launch the initial attack by plugging in a specially created USB key
that contained the attack malware. This is often the only way an attacker can reach a
target computer that is not connected to the Internet (or whats known as an air gapped
network).
Forged and Fake Certificates. An attacker may attempt to forge or fake an SSL
certificate in order to get a victim to visit a page that pretends to be from a safe site. In
2011, the certificate authority Comodo was compromised and fake certificates were
issued for popular sites such as Google, Skype and Yahoo.

From the most basic threats of past years through the development and emergence of APTs, the threats
for computers networks continue to evolve, presenting continued challenges to those charged with the
responsibility of network protectionfrom the network security administrator down to the individual
desktop user. The following section presents discussion on fundamental concepts in modern network
security.

12

Study Guide for NSE 1: The Threat Landscape 2016


The Advanced Attack Kill Chain
So how does an advanced attack work? Heres a snapshot of a typical kill chain for an advanced attack
and the typical security technologies that are in play in order to block that attack and break the kill
chain.

Figure 5. Kill chain of an advanced attack.


The number one, most popular method for initiating an advanced attack is to send a malicious email to
the target. This email may have a malicious file attachment or a URL that connects to a malicious web
site. You hope your anti-spam will stop this email from ever reaching an end user target. However, there
are ways to get around antispam and other email gateway security techniques. For example, Bots may
leverage legitimate (but compromised) IPs from which to send the email or they may use targeted spear
phishing techniques and social engineering to get through filters and to entice an end users to click on a
URL. They may encrypt a malicious attachment to hide it from AV scanning.
If an email with a malicious URL gets through and an end user clicks on that URL link, you hope your web
filtering protection will stop the user from ever connecting to that malicious web site and in many cases
this will work. However, some attackers use a fast flux approach, only using a site for a few days or a few
hours harvesting what they can before moving on to another URL.
If the end user connects with the malicious web site, that site will launch exploits at the user and you
hope your Intrusion prevention will block the attack. However, exploits can slip through by taking
advantage of zero-day vulnerabilities, new variants, and encryption.
If an exploit gets through, you hope you will catch any malware it tries to deliver with your antivirus.
And many times this will work but sometimes it doesnt. Malware can use file compression, encryption,
and new malware variants to get through an AV filter.

13

Study Guide for NSE 1: The Threat Landscape 2016


If that malware gets into the organization, it will try to proliferate and it will look for valuable data to
collect. Eventually it will try to exfiltrate stolen data or simply go out to try to pull more threats into the
organization and heres where your application control and IP reputation controls may be able to
identify and stop a connection to a command & control center. But if it doesnt (maybe because the
traffic was encrypted) your organization is breached.

14

Study Guide for NSE 1: The Threat Landscape 2016


Introduction to Modern Network Security
The evolution of network security necessarily followed the evolution of threats to the network. From the
early days of simple, direct attacks to modern threats that include complex, indirect, and coordinated
attacks, security development continues to counter new and future threats. The steps in network
security evolution have necessarily followed the evolution of emerging threats.
Network security is truly a Battle of Minds the battle between how sophisticated hackers and
malicious code is developed and used versus the ability of IT security professionals to innovate and
implement security measures to mitigate current and emerging threats.

Figure 6. The Network Security Battle of the minds.

Included in the Hackers toolkit of threats are:


Bot/Botnet
Malware
Vulnerability Exploiting

Spam/Phishing Message
Malicious URL
Malicious Applications

Malicious Code
General Known Threats
Unknown Threats

On the other side of the battle are the tools for network security managers:
Anti-botnet
Intrusion Prevention (IPS)
Antivirus/Antimalware
(AV/AM)
Vulnerability Management

15

Anti-spam
Web Filtering
IP Reputation
Application Control
Web Application Security

Database Protection
Advanced Threat
Protection (ATP)

Study Guide for NSE 1: The Threat Landscape 2016


Modern network security is comprised of many facets, some of which are in your control, others
which may not be. In an increasingly mobile world, traditional network security measures
focused on desktop platforms and dumbphones are no longer relevant to the world of tablets,
phablets, and smartphones. Because of the constantly changing landscape of network
environments, organizations of all sizes and complexities face challenges in keeping pace with
change, developing counters to emerging threats, and controlling network and security policies.
Once the realm of the highly trained and richly resourced, development of malicious code has
become widespread to the degree that school children have been known to compete with each
other in hacking contests. To meet modern and emerging threats, companies and organizations
must adopt dynamic network security programs that keep pace with changing trends and
activities.
Peopleor the man-machine interfaceis the weakest link in any security process. People are
easily lulled into a false sense of security about the effectiveness of passwords and access codes,
identity verification, and policies regarding the use of information technology (IT) systems and
networks. It takes just one careless moment to potentially breach the integrity of protected
information and systemsif network security user policies and protocols are too complicated,
compliance is less likely. Because of this human factor it is important to focus on userfriendly/threat unfriendly solutions, ensuring that network security schema is clear and simple
for network administrators and users to operate, with the necessary complexity to identify,
deter, or contain threats being embedded in state-of-the-art hardware and software solutions
that are nearly transparent to internal network users.
But a note of cautionjust as every organization is not alike, neither will their networks,
hardware, software, or needs be alike. Each organization needs a customized strategic network
security program tailored to balance its needs against its operating environment, perceived
threats, and operating budget. Of course, the best network security program would be an endto-end, 24/7 monitored program with regular analytics informing plan effectiveness and
potential enhancementsthis would be the holy grail of network security. Systems like Unified
Threat Management (UTM) provide the ability to balance needs, capabilities, and resources to
secure networks while maintaining the ability of the organization to operate. In essence, this
book will help you learn about how to take steps to mitigate best the threats to your network
and optimize network security while balancing those factors.

Infrastructure Evolution
In a world growing ever more complex with network portability being built into an increasing
number of devices of varying capabilities, network security continues to evolve in complexity
and importance. In the 1980s a transition from early closed networks to a broader Internet
occurred, with the advent of Ethernet, Bitnet, TCP/IP, SMTP, DNS, and in 1985the first .com
domain name registration. It was not until six years later, in 1991, that the Worldwide Web
(WWW) came into existence; by 1995, what we know now as the modern Internet became

17

Study Guide for NSE 1: The Threat Landscape 2016


established as a fixture in how businessand the worldwould communicate in the future
(Figure 7).

Figure 7. From closed networks to Global Information Grid

Star Trek introduced the idea of floppy disks and flip cellular phones.
The Forbin Project introduced the idea of supercomputers running complex algorithms
that controlled government functions and could potentially supplant human decisionmakers. Later ideas included War Games and Terminator.
1976 the Osborne 1 was the first portable computeralthough not by todays
standards.
The first .com domain was registered in 1985, and the Worldwide Web began in 1991.
The Internet as we know it today did not come online until 1995a mere 20 years ago!
A Japanese company introduced the first smartphone in 1999although it was a
relatively simple device compared to todays smartphones.
Many of us remember the hype around the Y2K bug (would computers go back to 1900
at midnight?). Early programs were written with just the last two digits of the year with
the 19xx assumed
Believe it or not, the first tablet came out in 2002but not as light and useful as todays
models.
The discussion between the labelling and merits of Next Generation Firewall (NGFW)
and Unified Threat Management (UTM) expanded and carried on through 2009, with
Gartner, IDC, and Fortinet in the fray.
2007 saw the introduction of the first iPhone (wow, seems longer ago than that!)
Finally, 2013-2014 turned out to be a year of breaches by advanced threats targeting
specific entities (which we will discuss more in a few minutes).

No longer was high-tech the sole domain of major companies, organizations, and government
agencies, but the global information network became the domain of everyone from multi-billion
dollar international conglomerates to grade school children (Figure 8). As technologies
developed, the industry response was typically the addition of new stand-alone, single- or dualpurpose hardware or integrated hardware-software packages designed to address newly
identified threats. This resulted in a constant state of expensive upgrades that added network
complexity, integration of new devices and scrubbing and repurposing or disposing of legacy
hardware, new policy development and new management consoles. This served to increase
workload, retraining, and complexity for network administrators and end users, exacerbating
the balancing problem between security and productivity.

18

Study Guide for NSE 1: The Threat Landscape 2016

Figure 8. The scope of modern global network users.


Because new products were not always able to integrate fully into existing systems, the
piecemeal approach to network development and security led to potential blind spots that
threats may exploit undetected. In order to solve this growing challenge, a move toward more
strategic solutions to network security were needednot new stand-alone systems addressing
individual threat vectors; rather, strategic systems and processes designed to protect networks
comprised of systems-of-systems. From this problem developed the Unified Threat
Management (UTM) concept, which goes beyond a system-of-systems approach to integrate
individual system characteristics into strategic systems (Figure 9).

Figure 9. UTM versus traditional ad hoc model.

Size Matters
As technology evolved, appliance size necessary to house its components decreased. From early
computers that used vacuum tubes and took up entire rooms, to decreasing media size with
increased media capacity, to unplugging from cables and wires to conduct operations with
mobile devices, the size of computers has decreased while capabilities grew. Today,
smartphones and tablets can accomplish many functions previously requiring larger appliances
with ever-evolving functionality. In fact, with modern remote technology, a smartphone user

19

Study Guide for NSE 1: The Threat Landscape 2016


may remotely access a desktop platform with greater capability to work on large files or access
data instead of carrying the files on portable media.
Along with size, system and network technology has also decreased. Legacy systems were built
much like 1980s-1990s stereossingle- or dual-function components connected together to
create an overall system. This resulted in the need for additional space for additional
capabilities, caused signal loss through cables connecting distant components, and required
multiple control heads to adjust to achieve the optimum system performance. Modern,
integrated systems provide efficiencies by taking up less space because of less hardware
appliances, less signal loss because multi-function appliances integrate system components, and
a single control head to optimize network-wide performance.

Figure 10. Miniaturization of computers and network access appliances.

Advanced Threats
Experienced hackers or groups of hackers possessing significant resources pose an increased
threat to systems and networks, including developing and implementing techniques not
previously used to compromise, gain control of, or shut down service. Advanced Threat
Protectionalso referred to as Advanced Persistent Threat Protectionprovides integrated
measures to detect and block advanced threats. These measures include botnet and phishing
antivirus profiling, as well as zero-day threat protection and using sandboxing to analyze,
identify, and block suspicious code and add the suspicious code profile to the ATP signature
database.

Advanced Threat Protection (ATP)


In order to protect against modern and emerging future threats, adaptive defense tools like ATP
are being incorporated into network security infrastructures at an increasing pace. This level of
protection provides increased security across all network sizes from SMB to large enterprises.
Critical capabilities brought to bear by ATP include access control, threat prevention, threat
detection, incident response, and continuous monitoring:

20

Study Guide for NSE 1: The Threat Landscape 2016

Access Control. Layer 2/3 firewall, vulnerability management, two-factor


authentication.

Threat Prevention. Intrusion Prevention (IPS), application control, Web filtering, email
filtering, antimalware.

Threat Detection. Sandboxing, botnet detection, client reputation, network behavior


analysis.

Incident Response. Consolidated logs & reports, professional services, user/device


quarantine, threat prevention updates.

Continuous Monitoring. Real-time activity views, security reporting, threat intelligence.

Figure 11. Advanced Threat Protection (ATP).

Breaking the Advanced Threat Kill Chain


Additional discussion in the platform-focused modules of this programs to provide a more indepth examination of these attack mitigation methods; however, these are some methods by
which network security administrators can detect, stop, and mitigate attack consequences.

21

Study Guide for NSE 1: The Threat Landscape 2016

Figure 12. Breaking the advanced threat kill chain - Part 1.


Security Partnerships. Attackers dont rest on their laurels and neither should an
organization. Having a strong partnership with a security organization can provide upto-date information and threat intelligence as well as clearly-defined escalation path
when an incident is detected.
End User Education. Attackers target end users because they find the greatest chance of
success focusing their initial attacks there. Educating end users on proper use of social
media to prevent confidential information from becoming publicly available is one
component. Internal awareness training and regular testing by IT staff can help mitigate
an attack.
Network Segregation. If there is no reason for an employee to have network access to
particular resources that may contain sensitive data, then basic network segregation can
help prevent lateral movement inside the network. By placing resources on segments
that cannot be reached from end users, an organization can potentially prevent an
attacker from moving beyond the initial foothold.
Web Filtering/IP Reputation. By using a solution that provides current IP reputation
data and Web filtering rules, an organization may be able to stop some attacks. By using
an IP reputation service, an organization may be able to stop an attacker that has
launched attacks on other organizations using the same network resources.
Whitelisting. Whitelisting can be used in multiple ways. For example, network
whitelisting can be used to only allow certain internal traffic to reach other network
resources. This can prevent an attacker from moving laterally inside a network. Network
whitelists can also prevent a user from accessing any sites online that are not explicitly
approved. Application whitelisting can be used to allow only a set list of applications

22

Study Guide for NSE 1: The Threat Landscape 2016


from running on a computer, preventing all other software from running. This can
prevent an attacker from running new programs on the targets computer.
Blacklisting. While a whitelist is a list of things that are explicitly allowed to execute or
access resources, a blacklist explicitly blocks items on the list from accessing resources,
sites or applications deemed unsafe.
Application Control. Employees are using Web services like Facebook, Twitter and
Skype on a frequent basis today. Application Control allows you to identify and control
applications on your network, regardless of port, protocol or IP address. Using tools
such as behavioral analysis, end-user association and application classification can
identify and block potentially malicious applications and malware.
Sandboxing. With targeted attacks often designed (and indeed tested) to bypass
traditional security technologies, additional inspection of code activity has emerged.
Whether cloud-based or on-premise, sandboxes analyze code execution and subsequent
activity within contained virtual environments to expose full, previously unknown,
threat lifecycles.
Data Leak Prevention (DLP). By properly identifying sensitive data and implementing a
DLP solution, an organization can prevent sensitive information from leaving a network.
Data being used at the endpoint, data moving inside a network and data being stored
can all be protected from theft or improper use by implementing a DLP solution.

Figure 13. Breaking the advanced threat kill chain - Part 2.

23

Study Guide for NSE 1: The Threat Landscape 2016


Intrusion Prevention (IPS) / Intrusion Detection (IDS): By using a product that
provides IPS and IDS, an organization can add another layer of traffic monitoring
to watch for suspicious activity. A good IPS/IDS system will also alert IT staff of
potential threats in progress.
Proactive Patching: A computer is only as secure as the software on it. It is
essential for companies to deploy patches to their systems as quickly as
possible. Attackers and cyber criminals waste no time integrating proof-of
concept code into their malware and exploit kits in some cases exploits have
been added to an exploit kit within hours or days of a patch being available. By
delaying deployment of critical patches, an organization risks becoming
vulnerable to attack. For business intelligence or in-house applications that
require almost constant uptime, its critical to keep test machines available to
deploy patches to and test mission critical applications without impacting the
main network.
Restricting Administrative Rights: Some companies provide employees with
local administrative rights in order to install drivers or software on an asneeded basis. This can be a double-edged sword. While it can reduce support
calls and empower employees, it can also lead to easier access for attackers to
install malware and remote access tools (also known as RATs) on a victims
computer. By limiting access to administrative rights whenever possible, an
organization may be able to mitigate many attacks.
Network Access Control (NAC): NAC is a solution that can prevent computers on
a network from accessing resources unless certain rules or policies are met. For
example, if a computer hasnt been patched recently, NAC can place that
computer on a segregated subnet that blocks access to resources until the
machine has been properly patched.
Two-Factor Authentication: There are many forms of two-factor authentication
available for end users. By implementing two-factor authentication for remote
users or users that require access to sensitive information, an organization can
make it difficult for an attacker to take advantage of lost or stolen credentials,
as the attacker would need to provide a second form of identification in order to
gain network access. Commonly used two-factor authentication methods
include the standard username and password plus a hardware or softwarebased authentication token, which provides a one-time, time-sensitive
password that must be entered when the username and password is presented
to the authentication server.

24

Study Guide for NSE 1: The Threat Landscape 2016


USB Drive Restrictions: Many computers will accept a USB thumb drive
implicitly and execute any auto-run applications located on the drive. A drive
that has malicious code planted on it can be all an attacker needs to gain an
initial foothold in a network. Limiting USB drive access to employees on an asneeded and justified basis is a good idea; banning them outright is even safer. If
USB drive access is necessary, enabling a proper Group Policy to prevent a drive
from auto-running is essential.
Limiting Access to Cloud-based File Sharing: Services such as Dropbox have
enjoyed wide scale adoption both at home and in the workplace. As with USB
drive access, it is important to limit access to these programs unless absolutely
necessary. Cloud-based file sharing and syncing applications can make it trivial
for an attacker to compromise a home computer and move malware into a
corporate network when a user syncs the files they took home the night before.

Advanced Threats and Network Security: Continuing Evolution


The early days of personal computer availability to consumers and the advent of the Internet
and Worldwide Web are behind us. These events were followed by parallel development of
more powerful hardware appliances and more complex applications for those machines.
Unfortunately, with those developments also came a thriving developmental path for malware
and other methods by which to breach system and network security to obtain data from or deny
use of targeted platforms. This Modern Network Security Program presents current and future
appliances, applications, and concepts to provide the options to keep pace with emerging
capabilities and threatsand maintain the safety and security of your system and network.

25

Study Guide for NSE 1: The Threat Landscape 2016


Key Acronyms
AAA

Authentication, Authorization, and


Accounting

AD

Active Directory

ADC

Application Delivery Controller

ADN

Application Delivery Network

ADOM Administrative Domain

HTML Hypertext Markup Language


HTTP

Hypertext Transfer Protocol

HTTPS Hypertext Transfer Protocol Secure


IaaS

Infrastructure as a Service

ICMP

Internet Control Message Protocol

ICSA

International Computer Security


Association

AM

Antimalware

API

Application Programming Interface

ID

Identification

APT

Advanced Persistent Threat

IDC

International Data Corporation

ASIC

Application-Specific Integrated Circuit

IDS

Intrusion Detection System

ASP

Analog Signal Processing

IM

Instant Messaging

ATP

Advanced Threat Protection

IMAP

Internet Message Access Protocol

AV

Antivirus

IMAPS Internet Message Access Protocol


Secure

AV/AM Antivirus/Antimalware
BYOD Bring Your Own Device
CPU

Central Processing Unit

DDoS

Distributed Denial of Service

DLP

Data Leak Prevention

DNS

Domain Name System

DoS

Denial of Service

DPI

Deep Packet Inspection

DSL

Digital Subscriber Line

FTP

File Transfer Protocol

FW

Firewall

Gb

Gigabyte

GbE

Gigabit Ethernet

Gbps

Gigabits per second

GSLB

Global Server Load Balancing

GUI

Graphical User Interface

26

IoT

Internet of Things

IP

Internet Protocol

IPS

Intrusion Prevention System

IPSec

Internet Protocol Security

IPTV

Internet Protocol Television

IT

Information Technology

J2EE

Java Platform Enterprise Edition

LAN

Local Area Network

LDAP

Lightweight Directory Access Protocol

LLB

Link Load Balancing

LOIC

Low Orbit Ion Cannon

MSP

Managed Service Provider

MSSP Managed Security Service Provider


NGFW Next Generation Firewall
NSS

NSS Labs

OSI

Open Systems Infrastructure

Study Guide for NSE 1: The Threat Landscape 2016


OTS

Off the Shelf

SPoF

Single Point of Failure

PaaS

Platform as a Service

SQL

Structured Query Language

PC

Personal Computer

SSL

Secure Socket Layer

SWG

Secure Web Gateway

SYN

Synchronization packet in TCP

PCI DSS Payment Card Industry Data Security


Standard
PHP

PHP Hypertext Protocol

POE

Power over Ethernet

Syslog Standard acronym for Computer


Message Logging

POP3

Post Office Protocol (v3)

TCP

POP3S Post Office Protocol (v3) Secure


QoS

Quality of Service

Radius Protocol server for UNIX systems

Transmission Control Protocol

TCP/IP Transmission Control Protocol/Internet


Protocol (Basic Internet Protocol)
TLS

Transport Layer Security

RDP

Remote Desktop Protocol

TLS/SSL Transport Layer Security/Secure Socket


Layer Authentication

SaaS

Software as a Service

UDP

User Datagram Protocol

SDN

Software-Defined Network

URL

Uniform Resource Locator

SEG

Secure Email Gateway

USB

Universal Serial Bus

SFP

Small Form-Factor Pluggable

UTM

Unified Threat Management

SFTP

Secure File Transfer Protocol

VDOM Virtual Domain

SIEM

Security Information and Event


Management

VM

Virtual Machine

SLA

Service Level Agreement

VoIP

Voice over Internet Protocol

SM

Security Management

VPN

Virtual Private Network

SMB

Small & Medium Business

WAF

Web Application Firewall

SMS

Simple Messaging System

SMTP Simple Mail Transfer Protocol


SMTPS Simple Mail Transfer Protocol Secure
SNMP Simple Network Management Protocol

27

WANOpt Wide Area Network Optimization


WLAN Wireless Local Area Network
WAN

Wide Area Network

XSS

Cross-site Scripting

Study Guide for NSE 1: The Threat Landscape 2016


Glossary
Application Control. Protects managed desktops and servers by allowing or denying network application
usage based on policies established by the network administrator. Enterprise applications, databases,
web mail, social networking applications, IM/P2P, and file transfer protocols can all be identified
accurately by sophisticated detection signatures.
APT. An Advanced Persistent Threat is a network attack in which an unauthorized person gains access to
a network and stays there undetected for a long period of time. The intention of an APT attack is to steal
data rather than to cause damage to the network or organization. APT attacks target organizations in
sectors with high-value information, such as national defense, manufacturing and the financial industry.
ATP. Advanced Threat Protection relies on multiple types of security technologies, products, and
research -- each performing a different role, but still working seamlessly together -- to combat these
attacks from network core through the end user device. The 3-part framework is conceptually simple
prevent, detect, mitigate; however, it covers a broad set of both advanced and traditional tools for
network, application and endpoint security, threat detection, and mitigation.
AV/AM. Anti-virus/Anti-malware provides protection against virus, spyware, and other types of
malware attacks in web, email, and file transfer traffic. Responsible for detecting, removing, and
reporting on malicious code. By intercepting and inspecting application-based traffic and content,
antivirus protection ensures that malicious threats hidden within legitimate application content are
identified and removed from data streams before they can cause damage. Using AV/AM protection at
client servers/devices adds an additional layer of security.
Bot. An Internet bot, also known as web robot, WWW robot or simply bot, is a software application that
runs automated tasks over the Internet. Typically, bots perform tasks that are both simple and
structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use
of bots is in web spidering, in which an automated script fetches, analyses and files information from
web servers at many times the speed of a human.
Botnet. A botnet (also known as a zombie army) is a number of Internet computers that, although their
owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to
other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer
"robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers
compromised in this way are home-based. According to a report from Russian-based Kaspersky Labs,
botnets -- not spam, viruses, or worms -- currently pose the biggest threat to the Internet. A report from
Symantec came to a similar conclusion.

28

Study Guide for NSE 1: The Threat Landscape 2016


Drive-by. A drive-by download refers to the unintentional download of a virus or malicious software
(malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or
exploit) a browser, app, or operating system that is out of date and has a security flaw. This initial
code that is downloaded is often very small (so you probably wouldnt notice it), since its job is often
simply to contact another computer where it can pull down the rest of the code on to your smartphone,
tablet, or computer. Often, a web page will contain several different types of malicious code, in hopes
that one of them will match a weakness on your computer.
Exploit. A piece of software, a segment of data, or command sequences that takes advantage of
a vulnerability in order to cause unintended or unanticipated behavior to occur on computer software,
hardware, or appliances incorporating the Internet of Things (IoT). Such behavior frequently includes
things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service
attack.
IP/PII. This is what cybercriminals are after. From the IP owned by a corporation or organization to
individual PII, this is the commodity most often sought by hackers, who often use it for financial gain or
blackmail.
IP stands for Internet Protocol, or the address commonly used to identify the origin of an Internet
transmissioni.e. your device.
PII stand for Personally Identifiable Information, sometimes referred to as Personal Information,
and is often equated in the U.S. with Privacy Act Information.
NIST Special Publication 800-122 defines PII as "any information about an individual maintained by an
agency, including (1) any information that can be used to distinguish or trace an individuals identity,
such as name, social security number, date and place of birth, mothers maiden name, or biometric
records; and (2) any other information that is linked or linkable to an individual, such as medical,
educational, financial, and employment information. It has become much more important as IT and the
Internet have made it easier to collect PII through breaches of Internet and network security and Web
browser vulnerabilities.
Recent courts decisions have leaned toward IP not being considered as PII, judging that an IP only
identifies a particular platform or device, not an actual individual.
IPS. Intrusion Prevention System protects networks from threats by blocking attacks that might
otherwise take advantage of network vulnerabilities and unpatched systems. IPS may include a wide
range of features that can be used to monitor and block malicious network activity including: predefined
and custom signatures, protocol decoders, out-of-band mode (or one-arm IPS mode, similar to IDS),
packet logging, and IPS sensors. IPS can be installed at the edge of your network or within the network
core to protect critical business applications from both external and internal attacks.

29

Study Guide for NSE 1: The Threat Landscape 2016


Log Management. The collective processes and policies used to administer and facilitate the generation,
transmission, analysis, storage and ultimate disposal of the large volumes of log data created within an
information system.
Malvertising. This is the use of online advertising to spread malware. Online advertisements provide a
solid platform for spreading malware because significant effort is put into them in order to attract users
and sell or advertise the product. Malvertising can be easily spread across a large number of legitimate
websites without directly compromising those websites. According to Reed Exhibitions, "The interesting
thing about infections delivered through malvertising is that it does not require any user action (like
clicking) to compromise the system and it does not exploit any vulnerabilities on the website or the
server it is hosted from... infections delivered through malvertising silently travel through Web page
advertisements.
Malware. Malware is a category of malicious code that includes viruses, worms, and Trojan horses.
Destructive malware will utilize popular communication tools to spread, including worms sent through
email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded
from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems
making their entry quiet and easy.
Virus. A computer virus is a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer
viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively
easy to produce. Even such a simple virus is dangerous because it will quickly use all available
memory and bring the system to a halt. An even more dangerous type of virus is one capable of
transmitting itself across networks and bypassing security systems.
Worm. Computer worms are similar to viruses in that they replicate functional copies of themselves
and can cause the same type of damage. In contrast to viruses, which require the spreading of an
infected host file, worms are standalone software and do not require a host program or human help
to propagate. To spread, worms either exploit a vulnerability on the target system or use some kind
of social engineering to trick users into executing them. A worm enters a computer through a
vulnerability in the system and takes advantage of file-transport or information-transport features
on the system, allowing it to travel unaided.
Trojan. A Trojan [horse] is a program in which malicious or harmful code is contained inside
apparently harmless programming or data in such a way that it can get control and do its chosen
form of damage, such as ruining the file allocation table (FAT) on your hard drive. In one case, a
Trojan was a program that was supposed to find and destroy computer viruses. A Trojan may be
widely redistributed as part of a computer virus.

30

Study Guide for NSE 1: The Threat Landscape 2016


Network Behavior Anomaly Detection (NBAD). The continuous monitoring of a network for unusual
events or trends. An NBAD program tracks critical network characteristics in real time and generates an
alarm if a strange event or trend is detected that could indicate the presence of a threat. NBAD is an
integral part of network behavior analysis.
Network Forensics. Capturing, recording, and analyzing network events for the purpose of discovering
the source of security attacks or other problem incidents. Catch-it-as-you-can" systems capture
all packets passing through a certain traffic point, store the data, and then perform analysis in batch
mode. "Stop, look and listen" systems perform a basic analysis in memory and save only certain data for
subsequent analyses.
NGFW. Next Generation Firewall provides multi-layered capabilities in a single firewall appliance instead
of a basic firewall and numerous add-on appliances. NGFW integrates the capabilities of a traditional
firewall with advanced features including:

Intrusion Prevention (IPS)


Access Enforcement

Third Party Management


Compatibility

Deep Packet Inspection (DPI)


Distributed Enterprise
Capability
VPN

Network App ID & Control


Extra Firewall Intelligence

Application Awareness

Phishing. Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email
in an attempt to gather personal and financial information from recipients. Typically, the messages
appear to come from well-known and trustworthy Web sites. Web sites that are frequently spoofed by
phishers include PayPal, eBay, MSN, Yahoo, BestBuy, banks, and government agencies. A phishing
expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure
hoping to fool at least a few of the prey that encounter the bait.
Risk Management. The process of identifying, assessing and controlling threats to an organization's
capital and earnings. Such threats include financial uncertainty, legal liabilities, strategic management
errors, accidents, natural disasters and information technology (IT) security threats.
Sandboxing. A Sandbox is designed to detect and analyze advanced attacks designed to bypass
traditional security defenses. Sandboxing refers to the process of isolating unknown or potentially
malicious codes to fully execute all functions before allowing the traffic to download into the network.
By analyzing files in a contained environment to identify previously unknown threats and uncovering the
full attack lifecycle, if malicious activity is discovered, Advanced Threat Protection (ATP) can block it.
Security Information and Event Management (SIEM). An approach to security management that seeks
to provide a holistic view of an organizations information technology (IT) security. Most SIEM systems
deploy multiple collection agents to gather security-related events from end-user devices, servers,
network equipment and specialized security equipment like firewalls, AV/AM or IPS. The collectors
forward events to a centralized management console, which performs inspections and flags anomalies.

31

Study Guide for NSE 1: The Threat Landscape 2016


Security Intelligence (SI) is the information relevant to protecting an organization from external and
inside threats as well as the processes, policies and tools designed to gather and analyze that
information.
Intelligence, in this context, is actionable information that provides an organization with
decision support and possibly a strategic advantage. SI is a comprehensive approach that
integrates multiple processes and practices designed to protect the organization.
UTM. Unified Threat Management provides administrators the ability to monitor and manage multiple,
complex security-related applications and infrastructure components through a single management
console. The advantage to UTM is that it goes beyond the NGFW focus of high performance protection
of data centers by incorporating a broader range of security capabilities as either cloud services or
network appliances, integrating:

Intrusion Prevention (IPS)


Anti-Malware
Anti-Spam
Identity-based Access Control

Content Filtering
VPN Capabilities
Load Balancing

Quality of Service (QoS)


SSL/SSH Inspection
Application Awareness

Vulnerability. In cybersecurity, vulnerability refers to a flaw in a system that can leave it open to attack.
A vulnerability may also refer to any type of weakness in a computer system itself, in a set of
procedures, or in anything that leaves information security exposed to a threat. Cutting down
vulnerabilities provides fewer options for malicious users to gain access to secure information.
Watering Hole. The watering hole attack method targets specific groups (organization, company,
industry, region, etc.). In this attack, the attacker guesses or observes which websites the group often
uses and infects one or more of them with malware. Eventually, some member of the targeted group
gets infected, resulting in the malware being spread to others in the targeted group.
Web Filtering. Web Filtering technology gives you the option to explicitly allow web sites, or to pass web
traffic uninspected both to and from known-good web sites in order to accelerate traffic flows. The most
advanced web content filtering technology enables a wide variety of actions to inspect, rate, and control
perimeter web traffic at a granular level. Using web content filtering technology, these appliances can
classify and filter web traffic using multiple pre-defined and custom categories.

32

You might also like