Skip to the content.

Security Techniques

Wireless Infrastructure Security

Wireless infrastructure security is crucial for protecting networks from unauthorized access and cyber threats. Effective security measures ensure the integrity, confidentiality, and availability of wireless communications.

Wireless Access Points

Wireless access points (WAPs) are essential components in wireless networks, providing connectivity for various devices. Securing them is critical for protecting the network against unauthorized access and potential attacks.

Placements of WAPs

Strategic placement of wireless access points (WAPs) is vital for optimizing network performance and ensuring security. The positioning of the WAPs will significantly impact the range, coverage, and signal strength of your organization’s wireless network.

ESS Configuration

An Extended Service Set (ESS) configuration extends wireless coverage by interconnecting multiple wireless access points (WAPs) to provide seamless connectivity across a larger area. Proper configuration ensures efficient network performance and robust security.

Sample diagram of an ESS Configuration with three access points.

Interference Considerations

When deploying multiple wireless access points in an ESS configuration, interference must be carefully managed. Interference can degrade signal quality and reduce network efficiency, and there are only a limited number of channels that most wireless access points can use.

Site Survey

Conducting a site survey is essential for optimizing the placement and configuration of wireless access points. It helps identify potential interference sources, assess signal strength, and ensure comprehensive coverage.

Heat Map

A heat map visually represents the signal strength and coverage of wireless access points within a specific area. It is an invaluable tool for planning and optimizing wireless networks.

Sample heat map:

Wi-Fi Discovery and Mapping

Wi-Fi discovery and mapping involve techniques used to locate and document the presence and details of Wi-Fi networks. These methods can range from ground-based activities to aerial searches, each serving different purposes and scales of mapping.

Wireless Security Settings

Implementing robust security settings is essential for protecting wireless networks from unauthorized access and attacks. Key security protocols and settings include WPA3, AAA, RADIUS, and EAP.

Wireless Encryption

Wireless encryption nad cryptographic protocols protect wireless networks and safeguarda it from unauthorized access by securing data from interception.

WPA3

WPA3 is the latest security protocol for Wi-Fi networks, designed to provide stronger data protection and improve security against attacks.

WPA3 also introduced advanced security features:

AAA

AAA (Authentication, Authorization, and Accounting) is a framework used in network management to control access and usage, ensuring secure network operations.

More details can be found here: AAA of Security

RADIUS

RADIUS (Remote Authentication Dial-In User Service) is a protocol used for network access authentication, authorization, and accounting, commonly employed in enterprise networks.

More details can be found here: RADIUS

TACACS+

TACACS+ (Terminal Access Controller Access-Control System Plus) separates the functions of AAA to allow for a more granular control over processes.

More details can be found here: TACACS+

EAP

EAP (Extensible Authentication Protocol) is a flexible authentication framework frequently used in network access control, providing various methods for secure authentication.

More details can be found here: EAP Variants

WPS

Wi-Fi Protected Setup (WPS) is a network security standard that aims to simplify the process of connecting devices to a wireless network, but it has known vulnerabilities.

Methods:

Application Security

Application security focuses on protecting software applications from security threats by implementing measures to prevent, detect, and respond to vulnerabilities and attacks.

Input Validation

Input validation is crucial for protecting applications from malicious data by ensuring that only safe and expected inputs are processed.

Validation Rules delineate acceptable and unacceptable inputs.

Secure Cookies

Cookies are small pieces of data stored in the user’s computer by the web browser while browsing a website.

Secure cookies enhance session security by protecting the data stored in cookies from unauthorized access and tampering.

Static Code Analysis

Static code analysis, also known as Static Application Security Testing (SAST), involves examining the source code for vulnerabilities without executing the program, helping to identify security flaws early in the development process.

Dynamic Code Analysis

Dynamic code analysis, also known as Dynamic Application Security Testing (DAST), tests the running application to identify vulnerabilities that may not be apparent in static analysis.

Common Methods:

Code Signing

Code signing is used to verify the authenticity and integrity of software code, ensuring that it has not been tampered with.

It is important to know that the presence of digital signatures on a file or program does not guarantee its absolute security or the absence of vulnerabilities, but the digital signature confirms that the file is in the same state that the developer intended it to be when he/she distributed it.

Sandboxing

Sandboxing is a security mechanism used to isolate running applications to prevent them from affecting the operating system or other applications.

Package Monitoring

Package Monitoring involves keeping track of security of third-party packages and dependencies used.

Web Server Security

Web server security involves protecting web servers and the services they host from various online threats. This includes securing the server software, the web applications, and the underlying infrastructure to ensure data integrity, confidentiality, and availability.

DNS

DNSSEC

DNS Security Extensions (DNSSEC) enhance the security of the Domain Name System (DNS) by ensuring the authenticity and integrity of DNS data. It helps protect against attacks like cache poisoning.

DNS Filtering

DNS filtering controls internet content access by blocking domains at the DNS resolution level, preventing users from accessing harmful or inappropriate websites.

Web Filtering

Web filtering involves controlling the content that users can access on the internet through an organization’s network. This process is crucial for protecting users from harmful websites and maintaining productivity by blocking access to non-work-related content.

Types:

Agent-Based Web Filtering

Agent-based web filtering uses software agents installed on client devices to enforce web content policies directly on the user’s computer.

Centralized Proxies

Centralized proxies route all network requests through a single proxy server, where web content is filtered and monitored.

URL Scanning

URL scanning involves inspecting the URLs accessed by users to determine if they are safe or harmful.

Content Categorization

Content categorization involves classifying web content into categories to facilitate filtering based on predefined rules.

Block Rules

Block rules define specific criteria or conditions under which web access is restricted or blocked.

Reputation-Based Filtering

Reputation-based filtering assesses the trustworthiness of websites based on their history and feedback from a global network of users. It also uses reputation score, which is typically determined by a third-party service.

Email Security

Email security involves protecting email accounts and systems from unauthorized access and malicious activities. It is essential for safeguarding sensitive information and maintaining the integrity of communications.

Types:

DKIM

DKIM (DomainKeys Identified Mail) is an email authentication method designed to detect forged sender addresses in emails, a common technique used in phishing and email spoofing.

SPF

SPF (Sender Policy Framework) is an email validation system designed to prevent spam by verifying the sender’s IP address against the domain’s authorized list.

How it works:

DMARC

DMARC (Domain-based Message Authentication, Reporting, and Conformance) uses SPF and DKIM to determine the authenticity of an email message and allows domain owners to specify how to handle non-authenticated emails.

Receiving mail servers can be configured with a DMARK policy that reject emails that claim to come from the legitimate domain but have already failed the DKIM and SPF checks. The primary purpose of DMARC is to protect a domain from being used in business email compromised attacks.

Email Gateway Protocol

Email gateway protocols are used to secure and manage the flow of email traffic within and between organizations.

Email gateways are implemented to help with:

Deployment Methods:

Spam Filtering

Spam filtering is a technique used to identify and block unwanted or unsolicited email messages.

Techniques used:

Endpoint Detection and Response

EDR

Endpoint Detection and Response (EDR) refers to security technologies that continuously monitor endpoint activities to detect, analyze, and respond to potential security threats.

EDR Process

  1. Data Collection
    • Monitors endpoint activities.
    • Captures data from various sources on the endpoint:
    • System processes
    • Changes to the Registry
    • Memory Usage
    • Patterns of Network Traffic
    • Other system activities
  2. Data Consolidation
    • Aggregates data from multiple endpoints and sends to a database.
    • Centralizes data for easier analysis, could be on-prem or in the cloud.
  3. Threat Detection
    • Analyzes patterns and anomalies in the data.
    • Uses algorithms and techniques to identify potential threats.
    • Signature-based Detection
    • Behavior-based Detection
  4. Alerts and Threat Response
    • Generates alerts for security teams when a potential attack is detected.
    • Initiates predefined response actions to mitigate threats.
  5. Threat Investigation
    • Analyzes the cause and impact of detected threats.
    • Examines data to understand attack methods and sources.
  6. Remediation
    • Applies fixes and updates to prevent further incidents.
    • Implements changes to improve security posture:
    • Removing malicious files
    • Reversing changes made by the threat
    • Restoring effective systems

FIM

File Integrity Monitoring (FIM) is a security measure that ensures the files on a system remain unchanged by unauthorized alterations.

Files that can be checked:

XDR

Extended Detection and Response (XDR) is a security solution that provides integrated threat detection, investigation, and response capabilities across multiple security products.

User Behavior Analytics

UBA

User Behavior Analytics (UBA) involves monitoring and analyzing the behavior of users within a network to identify patterns that may indicate malicious activity or security risks.

How it works:

  1. Collect and analyze data from diverse sources.
  2. Employ advanced analytics methods.
  3. Create a baseline for normal user behavior.
  4. COntinuously monitor user activity to detect anomalies.

UEBA

User and Entities Behavior Analytics (UEBA) extends the principles of traditional user behavior analytics to include all entities in an organization, such as devices, applications, and network connections.


Back to main page