You are on page 1of 17

Monitoring and Diagnosing

Networks Terminology
Massimo Chirivì – CompTIA Security+ COURSE
Security+ Terminology
• Demilitarized Zone (DMZ)
• Honeynet
• Honeypot
• Information Security Management System
• Intrusion Detection System
• Intrusion Prevention System
• Personally Identifiable Information (PII)
• Software Defined Network (SDN)
• Stateful Packet Ispection (SPI)

E' vietata la distribuzione non autorizzata.


Frameworks, Best Practices, and
Configuration Guides
• ISO 27001:2013
• ISO 27002
• ISO 27017
• NERC
• NIST (Special Publication 800-12 e 800-14)
• NIST (800-53 , 800-82, 800-30, 800-35)
• ISA / IEC 62443
• PCI-DSS
• OWASP

E' vietata la distribuzione non autorizzata.


Frameworks, Best Practices, and
Configuration Guides

E' vietata la distribuzione non autorizzata.


Frameworks, Best Practices, and
Configuration Guides

ISO 27001
AUDIT

E' vietata la distribuzione non autorizzata.


Frameworks, Best Practices, and
Configuration Guides

ISO 27017

E' vietata la distribuzione non autorizzata.


Frameworks, Best Practices, and
Configuration Guides

The Eight Principles:


1. Computer Security supports the mission of the organization.

NIST 2. Computer security is an integral element of sound management.


3. Computer security should be cost-effective

800-14 4. Systems owners have security responsibilities outside their own organizations.
5. Computer security responsibilities and accountability should be made explicit.
6. Computer security requires a comprehensive and integrated approach.
7. Computer security should be periodically reassessed
8. Computer security is constrained by societal factors.

E' vietata la distribuzione non autorizzata.


Frameworks, Best Practices, and
Configuration Guides
The fourteen IT Security Practices:
1. Policy ( Program Policy, Issue-Specific Policy, System-Specific Policy)
2. Program Management (Central Security Program - System-level Program)
3. Risk Management (Risk Assessment, Risk Mitigation, Uncertainty analysis)
4. Life Cycle Planning (Security plan, Initiation Phase, Development/Acquisition phase, Implementation

NIST Phase, Operations/Maintenance Phase, Disposal Phase)


5. Personnel/User Issues (Staffing, User Administration)
6. Preparing for Contingencies and Disasters (Business Plan, Identify Resources, Develop Scenarios,
Develop Strategies, Test and Revise Plan)

800-14 7. Computer Security Incident Handling (Uses of a Capability, Characteristics)


8. Awareness and Training
9. Security Consideration in Computer Support and Operations
10.Physical and Environmental Security
11. Identification and Authentication (Identification, Authentication, Passwords, Advanced
Authentication)
12.Logical Access Control (Access Criteria, Access Control Mechanisms)
13.Audit Trails (Contents of Audit Trail Records, Audit Trail Security, Audit Trail Reviews, Keystroke
Monitoring)
14.Cryptography

E' vietata la distribuzione non autorizzata.


OWASP (Open Web Application Security
Project)
The Top 10 Proactive Controls

The list is ordered by importance with list item number 1 being the most important:

C1: Define Security Requirements


C2: Leverage Security Frameworks and Libraries
C3: Secure Database Access
C4: Encode and Escape Data
C5: Validate All Inputs
C6: Implement Digital Identity
C7: Enforce Access Controls
C8: Protect Data Everywhere
C9: Implement Security Logging and Monitoring
C10: Handle All Errors and Exceptions

E' vietata la distribuzione non autorizzata.


Other
• Web Server
• Operating System
• Network Infrastructure Devices

E' vietata la distribuzione non autorizzata.


Secure Network Architecture Concepts
General Work Low Security
Zones Secure zone
Zone Zone Honeypots
and
Honeynets
DMZ Web Server
Tunneling /
VPN
Extranet and
Wireless
Intranet Placing
Security
Devices
Wireless WEP WPA WPA2
Stateful Packet
Packet Filter
Firewalls Firewalls
Proxy Firewalls Inspection
Firewalls
Segmentation
and defense in VLAN SUBNETTING
depth
SDN
Control
Diversity

IDS / IPS
Vendor
Diversity

E' vietata la distribuzione non autorizzata.


Secure Systems Design

• Hardware and Firmware Security


• Operating Systems
• Patch Management
• Secure Configurations
• Peripherals
• Secure Staging Deployment Concepts

E' vietata la distribuzione non autorizzata.


Some screens

E' vietata la distribuzione non autorizzata.


Some screens

E' vietata la distribuzione non autorizzata.


Some screens

E' vietata la distribuzione non autorizzata.


Some screens

E' vietata la distribuzione non autorizzata.


Some screens

E' vietata la distribuzione non autorizzata.

You might also like