Cloud+ Outline – Module 10

April 22, 2017 | Views: 2431

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Module 10: Security and Recovery

Access Control

Authentication

  • Something you know
    • Something you have
    • Something you are

Single Sign-On

  • Allows a shared login to many networks

Federation

  • Uses SSO to allow users or devices to other network resources
  • When 2 companies agree that users can login to 1 network and access info from another server

Role Based Access Controls (RBAC)

  • Most commonly used with Active Directory
  • Groups and/or roles manage the permissions
  • Permissions are inherited
  • Groups permissions is called implicit permissions
  • Users permissions is called explicit permissions

Mandatory Access Controls (MAC)

  • Permissions are determined by policies (local group policy/GPOs)
  • The OS enforces the policies

Discretionary Access Controls (DAC)

  • The OS or applications do not have power over the permissions
  • Permissions are allowed/managed only by the owner of the data
  • Resources have an access control list (ACL) (who has access to the resource)

Information Security

  • Symmetric Encryption
  • Uses one key that encrypts and decrypts data
  • Used to encrypt files
  • VPN and Wi-Fi networks can be secured
  • PGP

Asymmetric Encryption

  • Uses two keys that encrypts and decrypts data (keys offered by GAL – global access list)
  • A public key and a private key
  • Keys are stored in an account database or on a smartcard
  • Public key is shared
  • Private key is saved by the owner of the key

Common Ciphers

  • AES – 256 WiFi
  • DES – 56 however 3DES is 56+56+56=168
  • RC4 – 128 old WiFi (WEP/WPA, but not WPA2) and Radius
  • Network Security

Layered Security

  • DMZ
  • IDS/IPS Host and Network
  • Firewall
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Ping of Death (PoD)
  • Ping Flood

Hardening

  • Unnecessary software
  • Firmware
  • Control account access
  • Disable unneeded network ports
  • Antivirus software

Penetration Testing

  • Simulates an attack on the network
  • Designed to look for vulnerabilities in the network
  • Exploits security vulnerabilities

Vulnerability Assessments

  • Finds vulnerabilities and weakness in a network
  • Designed to fix vulnerabilities and keep the network secure

Secure Storage

  • Most important part of any network
  • Encryption
  • Backups

Training and up-to-date tools

  • Needed to keep the IT staff up-to-date with current technologies
  • Allows the IT staff to release software that keep the network safe
  • Gives admins the ability to perform job functions and respond to incidents
  • Rapid deployment allows admins to release solutions as quick as possible

High Availability

  • Fault Tolerance
  • Allows a device to function after a hardware failure
  • Hard drives are the most common fault tolerance device
  • Geo Clustering connects multiple computers in different geographic locations

Multipathing

  • Multipathing gives multiple paths to a device
  • Allows redundancy for the system
  • Usually used with storage devices
  • Load Balancing
  • Distributes the workload

Recovery

  • Disaster Recovery Methods
  • Mean Time Between Failures (MTBF)
  • How long a device will function it fails (i.e. projector)
  • Mean Time to Repair (MTTR)
  • The typical amount of time it takes to repair a failed component (i.e. few minutes)
  • Recovery Time Objective (RTO)
  • The time in-between an outage and the restoration (i.e. Exchange)
  • Recovery Point Objective (RPO)
  • The max time that data can be missed due to an incident

Multisite Configuration

  • Cold Site (physical move to another site)
  • Hot Site (take nothing, all is in place prior)
  • Warm Site (a few items may be required to continue working, minimal downtime)

Backups and Recovery

  • Backup is used to copy data in the event of a failure
  • Four different backup functions
  • Full (on Sunday)

Incremental (on Monday, Tuesday, Wednesday…) keeps sizes small in between

Only restore Full, then M, T, Wk –  FIII must be restored)

 

Differential (on Monday, Tuesday, Wednesday…)

sizes compound between Full, less downtime

Only restore Full (Sunday) and Wednesday (last taken)

Image – complete image of the server

 

Snapshots

  • Used with VM
  • Captures the state of a VM (specific VM)
  • Is not a replacement for backups
  • Has all data and files in the VM
  • Used for short term recovery (no more than a month)

Unit Summary

Described Access Control

Described Information Security

Described Network Security

Described High Availability

Described Recovery

 

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 299 / December 14, 2019
How do I Get MTA Certified?
Views: 895 / December 12, 2019
How much does your PAM software really cost?
Views: 1346 / December 10, 2019
How Do I Get into Android Development?
Views: 1725 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel