Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This lesson covers enterprise security assessment. In enterprise security assessment, it's important to look at the network and look at all the means through which they are accessible. Among other things, companies must examine risks associated with wireless networks and evaluating internal and external networks.

Video Transcription

00:04
So the first thing we do is we look at our connective ity,
00:07
internal networks, external networks, um, you know, network connected to each other connected to the Internet. We've got to evaluate and look at all the means that these networks are accessible. It would be much more secure if we didn't have access to the Internet. It would be much more secure if we had
00:25
a singularly constrained network
00:28
if all the computers in this building were connected to each other and nobody else. Now again, from a business perspective, we know we can't do that.
00:36
But that does add security. So at the very least, what we can do is we can limit pathways out to the Internet, make sure people aren't getting out to the Internet and 10 different ways. Make sure that they go through a trusted source, a proxy server, perhaps
00:53
that inspects their Outward Bound requests and make sure it meets the internal criteria
00:59
that inspects any traffic coming in. You know that we have these inspection devices that connect their networks in a proxy can be there lots of uses for the term proxy, but ultimately, when we talk about a proxy or an application proxy. It's just a elevated type of firewall, and the idea is
01:18
no. Traffic comes
01:19
from an untrusted network to a trusted network without being inspected.
01:25
Okay, so or the strategies we have in place guarding network access? Are they working
01:30
for the most sensitive networks? You know, not every computer in your environment needs access to the Internet.
01:38
The computers that don't need access should be segmented from a security standpoint and should not be physically connected. We always want to follow that idea of the principle of Lise privilege. If this system doesn't need an inter Internet access, it doesn't get Internet access because that's a huge vulnerability that you're opening up to.
01:57
Okay, so look at our networks, their network and activities. Follow that principle of Lise privilege, make sure trusted networks or separate separated from untrusted on that there's some sort of inspection device monitoring that
02:12
wireless again. It would be great if I didn't allow access to anybody without them physically being plugged into a port on the wall. But today's business environment, at least in many companies, demands wireless connectivity and that ability to Rome. Well, if we're going to support that
02:30
First of all, we need to make sure that we're using secure mechanisms to connect to our wireless network.
02:37
Ah, first of all, we want to make sure that we protect those connections using W p A. To later on when we get telecommunications. Will talk about weap, which was the predecessor. Stood for Wired equivalent. Privacy Web. That's how we used to encrypt wireless traffic. Absolutely worthless.
02:55
Um, as a matter of fact, it's pretty much been worthless since it was ratified in approved.
03:00
But it was the best game in town for a while, so wept with something that we used and we'll pick apart. We'll talk about the vulnerabilities Wet brings to the table later on in other modules. But Webb was a choice Web being exploited so easily gave way to wife. I've protected access. Probably heard of w P A.
03:17
Now what? We're honest. W p A. To which provides much greater security than the two predecessors did.
03:23
If we're gonna allow people to connect to our wireless network, we don't want plain text credentials. We don't want plain text data. We're gonna enable w. P a two for security and encryption
03:34
authentication later this week or later, during the Siri's, we're gonna talk about Radius and a radius server, providing central authentication for things like wireless devices and other mechanisms. So we want to make sure we have good, strong authentication policy.
03:52
People connecting wirelessly to the network should have to provide strong authentication.
03:58
All right, um, device configurations are our network devices configured securely, and one of the first things that we think about with secure configuration is we think about getting rid of default configurations. Most devices come out of the box working, so to speak,
04:16
meaning
04:18
you know, Cisco Devices for a long time. User name was administrator password with Cisco. Well, that's great. I can get it up and running very, very quickly. The downside is, everybody knows with the user name and passwords are. I was reading an article about a couple of students that were riding a high school paper
04:35
on security vulnerabilities, associate ID with teller machines,
04:41
and it was a great article, and I wish I could do this article justice. But essentially what they did is they did some research
04:49
about what was available publicly available on the Internet about configuration settings of ATMs, And one of the things was a default code toe access maintenance mode with a teller machine for a specific vendor.
05:04
Well, surely there is no bank on the planet that would implement an A T. M with its default configurations. Right? That would never happen.
05:14
So of course, thes two students went, tried it.
05:17
What do you think the chances are that it worked? And they were able to access maintenance mode?
05:21
Yep. Absolutely. It was with their local bank. It was the 1st 1 they tried. Well, these were good ethical guys, and they went to the bank manager and they said we got a problem here. And what was the bank managers thought? He's got 2 16 year old guys sitting in his office saying, Hey, you're a team can be compromised.
05:40
The bank manager essentially threw him out. You know, it wasn't rude, but he was like, Yeah, yeah, thanks. You know, that's fine.
05:46
What they did is they actually went out to the parking lot, compromised the 80 m, impede it of all its cash, and thank goodness that they were ethical,
05:56
brought the cash right directly into the bank manager and said, Do you have time for us. Now
06:01
all of a sudden, the bank manager has an ear and has a couple of minutes to spare for these two young guys. But I thought that was really fascinating because you just assume
06:11
that people know you don't leave password as password. You don't leave. The administrative account is administrator if you follow the news at all. One of the recent trends are one of the recent attacks. Really. They're more pranks, but they can have much sinister effects.
06:28
Has been hijacking Thea Department of Transportation, road signs.
06:31
And as you've probably seen these, you know, the one that amused me is this was happening Austin or something. One of the street signs the deity signs was hijacked to read caution Zombies ahead.
06:46
Now, I don't anticipate people hit the brakes turned around because of the potential for zombies. But if you think about it especially, you know, I think about this being from the greater metro D C area. If I'm driving down for 95 I see a sign that says,
07:00
um, exit 46 Closed highway closed ahead, detour on exit 44. I'm getting off the highway. You can sit in traffic in D. C for eight hours easily. That's not going to be me. So just by simply hijacking one of these devices, you can reroute hundreds or thousands of vehicles,
07:18
and obviously that could have a much more sinister impact.
07:21
The point I'm trying to make is when you see attacks like this, this isn't some advanced, persistent threat coming out of China, where they're trying to hijack the U. S. Government's road signs. This is some 16 year old kid who's bored, stumbles across this machine, finds the console unlocked
07:39
administrative accounts using the password of password
07:43
or, if they're really secure, password one that's always my favorite. But what we're seeing is people that don't take the time. And how long does it take to change a password?
07:53
Ah, but then people will forget it. Fine. They forget the password, and they're locked out
07:58
right? You don't leave a system available to compromise because it's too hard.
08:03
So device configurations get away from the default settings. The default settings are just that All devices air configured that way to begin a startup procedure so that you can start to configure them properly.
08:16
Also, many devices come with. A lot of service is loaded that you don't need
08:20
one of the as. My fact, the first thing you should ever consider when you're trying to lock down the system or hard this system. If it's not an essential service, remove it.
08:31
If it's not something you need, get it off. Their all that presents is a vulnerability.
08:35
So for device configuration, be smart. You strong passwords change device settings. If it's a service that's an able that isn't necessary, get rid of it.
08:46
Patched the devices or update the devices is necessary. These security updates close security vulnerabilities.
08:54
Be smart,
08:56
you know. And when we failed to make the state these changes, that's where vulnerabilities lie. When I do my assessment, I want to make sure that my devices air well configured.
09:07
Train your people,
09:07
train, train, train your people in addition to telling your people what to do, help them understand why it's important so many times and i t security. We have the because I said so mentality and, uh, that that's not an effective way to get your users on your team.
09:26
One of the first classes I ever taught in this has been 20 years ago was a class to a group of nurses at it. Wait Medical Hospital. This was in Raleigh, North Carolina,
09:37
and I had a group of people nurses that were going from the Windows 31 operating System Tau Windows 95. So I know that stating myself a little bit, But at that time a lot of people didn't have good computer skills the way many people do today. This group was was particularly unskilled with computers
09:54
as, and we spent the first part of the morning discussing the miracle of the right click.
09:58
Now that's not that's not to make fun of me by. Nobody had skills, you know, 20 years ago, the way we do today. And it was a great group of folks and we were hammering through it. We were getting the information, but they were not computer savvy.
10:11
Now, at lunchtime, I had to go. I remember very clearly I was going to eBay, and I was just goofing off. It was lunchtime. I was I was bidding on something. I want to see my bid and just totally goofing off. And when I tried to connect to eBay, the hospital's proxy server blocked me and it said We've blocked this site
10:30
good enough for me. I'm just goofing off. That doesn't bother me. I'll goof off home. But what happened was at that time, as soon as I got that message, one of the nurses and class happened to be walking past my system and she said, Oh, that happens to us all the time. Go to this website www dot proxy seven dot com,
10:48
and when you type in when you go to that site, type in the address you want to go and that'll get you there.
10:52
So this is a woman that did not know a right click from a hole in the ground. And yet she knew howto bypass her company's proxy server settings howto filter a request through an Internet proxy to fool her internal proxy.
11:09
I was stunned. My jaw hit the ground, but the thing is,
11:15
she didn't think she was hacking the system. She didn't think she was even committing a security violation.
11:20
If a door is closed to go to the back door or you go to the next door, you know, and that's all she thought she was doing and she said. We did this all the time. Yeah, that pesky security setting that bothers us all the time. So if we don't train our people, why we do what we do,
11:35
You know, it's not just because in security we like to tell people no, because going to these websites presents the potential for loss to our organization. Rather than having people try to outsmart you or figure out ways around your security mechanisms, get your staff on your team.
11:52
So security awareness training isn't just a list of do's and don'ts.
11:56
Educate people. Let them see the threats and the potential for loss that are out there and then get them on your team. It's much easier to fight with your team than against your team.
12:07
Okay,
12:09
other things. Do we have both proactive and reactive controls in place? Are we preventing and deterring attacks? But then also do we have an equal number of attacks of controls on the inside? In case an attack is successful Intrusion detection systems, audit longs
12:28
alerts and alarms that are triggered in case something has happened.
12:33
We need both proactive and reactive controls.
12:37
Budget four Security now Sadly, not always do we have all the budget that we want. Senior management has to be on board. And believe me when I say
12:48
every organization will spend money on security,
12:52
every organization will
12:54
and their two ways you can spend money on security up front or on the back end.
13:00
I mentioned, I think, earlier that I teach project management classes and we focus on quality well, very tight, parallel with quality and security. When I talk about production environments where you're trying to produce a quality product quality is gonna cost you money. You can pay up front by using good equipment,
13:20
good materials, putting good processes in place,
13:22
training your people.
13:24
But if you don't spend money there because it's too expensive, you're gonna pay on the back end with warranty work, loss of reputation,
13:31
refunds and on and on and on. It's the same idea. With security. I can implement any virus programs. I can have good firewalls. I could have good training strategy, good processes and audits and all of those good things up front. Or I can say it's not gonna happen to me. And then where do I pay for security
13:52
with compromise
13:54
fines for not being in compliance, loss of customer confidence, loss of man hours. So senior management has to understand
14:01
security costs, money one way or the other. You can't get away without paying for security.
14:07
And I've already talked about outsourcing and the risks associated with outsourcing. Just my final reminder here, just because you outsourced does not eliminate your portion of risk. You're transferring that risk to another company, but you still are ultimately liable for the protection of the data.
14:24
So it's your responsibility to make sure the company to whom you've out sourced
14:28
meets the requirements you need.

Up Next

CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor