CISM

Course
Time
12 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:04
all right. Our next step, we looked at threat modeling, secure design and engineering. While those two elements apply to working with the network, we have to think about protecting our network building securely and then continuing to secure throughout the network life cycle. So
00:22
first thing that we're gonna talk about is network protection.
00:26
If you were to hire me to come out to your company and say, Kelly, I need you to give a security speech. In less than five minutes, I would walk out in front,
00:37
tell your audience segmentation is important.
00:41
Then I take my check and I would leave.
00:44
Okay. You probably don't want to hire me to come to your office for less than five minute lecture. But in all seriousness, if I had nothing but a couple of minutes to tell you how to protect your network segmentation
00:56
separate out trusted resource is thes air. The things that I want to protect from untrusted entities don't let untrusted entities access your trusted resource is Well, how do I do that? I segment my network in two different layers of trust. So for Internet and, uh,
01:15
for instance,
01:17
the internet is the greatest area of untrusted. Untrustworthy, right, the Internet. We don't trust anything there while our local area network is very trusted,
01:30
and then we might have a d M. C that is semi trusted. So the idea is, I use devices like firewalls to create the separate segments on my network.
01:40
Routers do that. Routers segment the network. They divide the network up into separate sub nets, if you will. And then villains do that. Also, the lands stands for virtual lands.
01:53
The lanes are very quickly replacing routers because they can essentially do everything. A router used to be done,
02:00
particularly if Dylan's air implemented on a Layer three switch. Now that's more technical than we're gonna go in this class. Absolutely. But you know, when we're looking at areas of segmentation, the devices that do this force routers,
02:16
virtual lands, firewalls. Okay, now lots of different types of firewalls. The first firewalls called the packet filter, and that's a very low in, but it's very fast firewall.
02:30
What that would set his things like source and destination. I p address. It looks at port number looks a protocol usage, and it makes a decision.
02:40
Usually firewalls, we're gonna use what we refer to his white listing and white listing means everything's walked
02:47
except what I allow on the white list, so to speak. So that's kind of Ah, none shall pass. Sort of means Okay, Now, with Black listing the problem with white listing even though it's very good for devices like firewalls, think about spam filters.
03:07
I'm not gonna allow any email to come through,
03:09
except from these 10 known domains were miss out on the Thanh of email. So white listing. Where is white listing blocks? Everything blacklisting allows everything except what is expressly forbidden on the blacklist.
03:27
Okay, s So that's one type of firewall. Very basic. These used to be called generation One.
03:34
Then we have state full firewalls. These were called generation three. Don't ask me what happened to I do not know.
03:40
Eso state Full firewalls are aware of the connection state between devices. So is where with a packet filter. Very basic firewall. I could block D N s Block and D and s is gonna prevent a lot of necessary traffic
03:59
with the state. Full firewall. I can block misbehaving D N s I conglomerate A d. N s Reply when it's not the result of a query that's called unsolicited reply, and that's a problem. But because state full firewalls can view the state of the connection, we can do that state full firewall. So that's a step. Better
04:17
application proxies. Though those air the devices that are the smart moons, you might hear him just called Prop sees. You could hear him called application gateways. Colonel Firewalls You know these air your Gen five again. Jen four.
04:33
I don't know,
04:35
but Generation five, these air the devices that are specific to application layer protocols so you'll have a Web proxy. You'll have an FTP proxy. You'll have a male proxy, but what they need but that means is thes proxies. Air very specialized into a specific protocol.
04:53
So your Web proxy can look for things like malformed or
04:58
yet malformed http headers or malicious injection, perhaps cross site scripting. So we get a lot deeper inspection with application firewalls,
05:12
but deeper inspection is slower.
05:15
So when you look at packet filters the most basic, they're cheap and fast. When you go up. The application proxies that cost more money, but they're and they're slower, but they're more
05:27
okay. Ah, that other idea was segmentation. I just mentioned the D. M Z is a semi trusted zone. So you're going to allow traffic from the Internet into the d M. Z, but it's gonna be very restricted. What you're gonna allow, you're not gonna allow everything in there. So you've got some control over the network. But because you're allowing
05:46
the
05:47
because you're allowing
05:49
access from the Internet, it's not full of trust.
05:53
And then the idea of air gaps, I'll tell you what the best way to secure network computer
05:59
pull it right off the network, right? So physically segmenting your own router A. Your own router be unless you provide some means of connectivity. That's pretty good segmentation. So that's what they mean by air gaps. So segmentation in my mind is the single most
06:18
important concept
06:19
in network security.
06:21
Isolate, trusted from untrusted.
06:25
And then, if untrusted entities have to access your precious resource is
06:30
make sure that that protection or that access is guarded, that you use devices for screening like firewalls, and that you make sure front and applications do the same things. AP eyes. So whether it's in a system or an application,
06:48
Web app, database, whatever,
06:50
we make sure that untrusted doesn't access trust

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor