net-sec-samenvatting/01_introduction.md

71 lines
2.3 KiB
Markdown

# Introduction
## Teams involved in security
* red: attack team
* test effectiveness of security by performing attacks
* blue: defend team
* defend against attacks by constantly surveiling the network
* yellow: build team
* builds applications that can be used by the other teams
* sharing knowledge
* orange: builders learn from attackers
* green: builder learn from defenders
* purple: defenders learn from attackers
![Teams](img/ch01/security-teams.jpg)
## Penetration testing
### Penetration testers <-> red teams
* penetration testing
* methodical approach
* limited by Rules of Engagement (restricted scope)
* 1-2 week engagement
* generally announced
* goal is to assess security of network and systems
* red team
* flexible approach
* anything goes (as long as it's legal)
* 1 week to 6 months engagement
* no announcement
* goal is to test general security posture of company
### Penetrating testing <-> vulnerability assessments
* penetration testing
* find vulnerabilities, both automated and manually
* exploit them
* attempt to gather confidential data
* intended to go deeper and focus on technical issues
* vulnerability assessment
* find vulnerabilities through automated means
* don't exploit them or gather data
* broader and often includes explicit policy and procedure review
### assumed breach exercise
* pentest where attackers are assumed to already be inside
* malware is dropped inside company boundaries
* getting caught not the end -> reset and try again
* **Time To Detect** (TTD): how long it takes to notice breach
* **Time To Mitigate** (TTM): how long it takes to perform corrective action
### Useful resources
* [MITRE](https://attack.mitre.org/): knowledge base of attack tactics and
techniques
* explanation of **TTP**s (Tactics, Techniques and Procecures)
* [APT Groups and Operations](https://apt.threattracking.com/): Google doc containing
list of dangerous groups
* [Cyber Fundamentals](https://atwork.safeonweb.be/nl/tools-resources/cyberfundamentals-framework)
* concrete measures on how to protect data and ensure safety in company
* four assurance levels
* five core functions
1. identify
2. protect
3. detect
4. respond
5. recover