GSEC 401.2 Defense In Depth Exam With Complete
Solutions Latest Update
Inbound Network Traffic - ANSWER * Monitor Inbound network prevention
Outbound Network Traffic - ANSWER * Monitor Outbound network detection
* Majority of problems are outbound
defense in depth - ANSWER * Diversify to keep the vulnerabilities at a minimum
Risk (Formula) - ANSWER Threat x Vulnerability (to that threat)
Three TOP 20 Lists (Outbound Traffic) - ANSWER 1) Number Connections
2) Length of Connections
3) Amount of Data
------------------------
(High false positives, but increase the accuracy of Vulnerabilities)
4a) Percent of Encrypted Traffic
4b) Destination IP Address
Risk Analysis Questions - ANSWER * Before a company spends a dollar of it's money or
a minute of its time; answer the 3 questions
-------------
1) What is the *Risk*
2) Is it the *Highest Priority* risk
3) *Cost Effective* way of reducing the risk
,Top 5 List of Threats - ANSWER Critical Data and Process that support it
Likely Threats
Most likely Vulnerabilities
Questions for CEOs - ANSWER What are the things that worry you most?
What could cause you to be removed from the board?
What keeps you up at night?
Reduce Risk - ANSWER To reduce risk lets reduce Vulnerabilities
3 Goals of Security - ANSWER 1) Confidentiality / Disclosure
2) Integrity / Alteration
3) Availability / Destruction
Confidentiality vs Disclosure - ANSWER Only shared amongst authorized persons or
organisations
Integrity vs Alteration - ANSWER Authentic an complete.
Enough and Correct
Reliable and dependable
Availability vs Destruction - ANSWER Accessible when needed by whoever requires it
Network Visibility Tree - ANSWER * Segmentation per IP Address and Port
ex 10.0.0.X
/\
10.0.0.3 10.0.0.10
/|/|
23 110 5150 43 210 443
, Ports do not have to be utilized
4 methods of Defense In Depth - ANSWER 1) Uniform Protection
2) Protected Enclaves
3) Information Centric
4) Threat Vector Analysis
Uniform Protection - ANSWER 1) Most typical method to DiD
2) Firewall, VPN, Intrusion, Detection, Antivirus, Patching
3) All portions of the organization are provided with the exact amount of protection
4) All of the systems are treated the same
Protected Enclaves - ANSWER 1) Work groups needing extra protection are segregated
from the rest of the internal organization
2) Limit access to a critical segment
3) Internal Firewalls
4) VLANs and ACLs
Information Centric - ANSWER 1) Identify critical assets and layer protection for it
2) Applications access data
3) Applications run on hosts
4) Hosts run on networks
Vector-Oriented - ANSWER 1) The threat needs a vector to cross the vulnerability
2) Remove the ability of th threat to use the vector:
a) USB Thumb drives - Disable USB
b) Auto Answer Modems - Digital Phone PBX
Virus - ANSWER * Usually Target end users
* requires and executable
Solutions Latest Update
Inbound Network Traffic - ANSWER * Monitor Inbound network prevention
Outbound Network Traffic - ANSWER * Monitor Outbound network detection
* Majority of problems are outbound
defense in depth - ANSWER * Diversify to keep the vulnerabilities at a minimum
Risk (Formula) - ANSWER Threat x Vulnerability (to that threat)
Three TOP 20 Lists (Outbound Traffic) - ANSWER 1) Number Connections
2) Length of Connections
3) Amount of Data
------------------------
(High false positives, but increase the accuracy of Vulnerabilities)
4a) Percent of Encrypted Traffic
4b) Destination IP Address
Risk Analysis Questions - ANSWER * Before a company spends a dollar of it's money or
a minute of its time; answer the 3 questions
-------------
1) What is the *Risk*
2) Is it the *Highest Priority* risk
3) *Cost Effective* way of reducing the risk
,Top 5 List of Threats - ANSWER Critical Data and Process that support it
Likely Threats
Most likely Vulnerabilities
Questions for CEOs - ANSWER What are the things that worry you most?
What could cause you to be removed from the board?
What keeps you up at night?
Reduce Risk - ANSWER To reduce risk lets reduce Vulnerabilities
3 Goals of Security - ANSWER 1) Confidentiality / Disclosure
2) Integrity / Alteration
3) Availability / Destruction
Confidentiality vs Disclosure - ANSWER Only shared amongst authorized persons or
organisations
Integrity vs Alteration - ANSWER Authentic an complete.
Enough and Correct
Reliable and dependable
Availability vs Destruction - ANSWER Accessible when needed by whoever requires it
Network Visibility Tree - ANSWER * Segmentation per IP Address and Port
ex 10.0.0.X
/\
10.0.0.3 10.0.0.10
/|/|
23 110 5150 43 210 443
, Ports do not have to be utilized
4 methods of Defense In Depth - ANSWER 1) Uniform Protection
2) Protected Enclaves
3) Information Centric
4) Threat Vector Analysis
Uniform Protection - ANSWER 1) Most typical method to DiD
2) Firewall, VPN, Intrusion, Detection, Antivirus, Patching
3) All portions of the organization are provided with the exact amount of protection
4) All of the systems are treated the same
Protected Enclaves - ANSWER 1) Work groups needing extra protection are segregated
from the rest of the internal organization
2) Limit access to a critical segment
3) Internal Firewalls
4) VLANs and ACLs
Information Centric - ANSWER 1) Identify critical assets and layer protection for it
2) Applications access data
3) Applications run on hosts
4) Hosts run on networks
Vector-Oriented - ANSWER 1) The threat needs a vector to cross the vulnerability
2) Remove the ability of th threat to use the vector:
a) USB Thumb drives - Disable USB
b) Auto Answer Modems - Digital Phone PBX
Virus - ANSWER * Usually Target end users
* requires and executable