From the course: CompTIA Security+ (SY0-701) Cert Prep
Deception technologies
From the course: CompTIA Security+ (SY0-701) Cert Prep
Deception technologies
- [Instructor] Cybersecurity analysts play a cat and mouse game with attackers, seeking to prevent them from gaining unauthorized access to a network. Deception technologies can be powerful tools in this battle, allowing analysts to get one step ahead of the attackers. Let's take a look at a few common deception technologies. Analysts use a wide variety of security monitoring systems to detect unauthorized activities on networks, systems and applications. However, it can often be difficult to tell the difference between legitimate traffic and activity that's part of an attack. Darknets are designed to assist with making this distinction. Administrators set aside portions of their normal IP address space for use as a darknet. No legitimate systems use those addresses, so therefore, if a monitoring system detects any activity headed to those addresses, it's very likely that it's an attacker performing network reconnaissance. Activity to a darknet warrants further investigation. Honey tokens are fake records inserted into databases or file systems to detect malicious activity. For example, a database might include a fake email address that routes to the organization's security operation center. Emails sent to that address presumably come from someone who has gained access to the database. Honeyfiles are files that are specifically created to resemble sensitive data, but instead they contain garbage data or intentional misinformation. Honeypots go a step further. These are actual systems placed on a network with the purpose of intentionally attracting attackers. These systems may have names that indicate that they contain sensitive information or they'd be helpful to an attacker, and they may even contain files with fake sensitive data. In reality, they're carefully monitored and instrumented traps for attackers. The honeypot is configured to fool an attacker into thinking that they've compromised a sensitive system, but the honeypot immediately alerts administrators and may trigger an immediate security response. They send fake telemetry to the attacker and real telemetry to the security team. Honeynets are large scale deployments of multiple honeypots on the same network. Another deception technique used by cybersecurity analysts is the DNS sinkhole. When systems are compromised by malware and joined to a botnet, they're configured with a server names of command and control servers that they contact to receive future instructions. When security analysts identify these command and control servers, they can create DNS sync holes for those addresses. To do this, they feed false information to their own DNS servers, telling the server that it is authoritative for the malicious domain and tell it to reroute traffic headed to the command and control server, to the address of a web server that warns users that their system has been compromised. This activity is also logged for administrators who may intervene to clean up the infected system. When you think about it, DNS sinkhole are basically the same thing as DNS poisoning attacks, except in this case, security professionals are waging the attack against their own users to prevent those users from having their systems carry out botnet instructions.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
The goals of information security2m 11s
-
Authentication, authorization, and accounting (AAA)3m 31s
-
Categorizing security controls5m 11s
-
Conducting a gap analysis2m 34s
-
Zero Trust5m 32s
-
Physical access control4m 40s
-
Physical security personnel2m 12s
-
Deception technologies2m 55s
-
Change management6m 2s
-
-
-
Trust models2m 52s
-
PKI and digital certificates4m 5s
-
Hash functions7m 38s
-
Digital signatures3m 50s
-
Digital signature standard1m 27s
-
Create a digital certificate4m 55s
-
Revoke a digital certificate1m 28s
-
Certificate stapling2m 29s
-
Certificate authorities6m 13s
-
Certificate subjects3m 35s
-
Certificate types2m 55s
-
Certificate formats2m 30s
-
-
-
Preventing SQL injection4m 25s
-
Understanding cross-site scripting3m 17s
-
Request forgery4m 8s
-
Overflow attacks3m 21s
-
Explaining cookies and attachments4m 7s
-
Session hijacking4m 8s
-
Code execution attacks2m 43s
-
Privilege escalation1m 56s
-
OWASP Top Ten4m 45s
-
Application security4m 3s
-
Defending against directory traversal3m 4s
-
Race condition vulnerabilities2m 13s
-
-
-
Restricting network access2m 8s
-
Network access control4m 30s
-
Router configuration security4m 5s
-
Switch configuration security3m 42s
-
Maintaining network availability2m 32s
-
Network monitoring3m 41s
-
SNMP2m 54s
-
Isolating sensitive systems2m
-
Zero trust networking4m 9s
-
Secure access service edge (SASE)3m 50s
-
-
-
Operating system security8m 44s
-
Malware prevention7m 25s
-
Application management3m 46s
-
Host-based network security controls7m 44s
-
File integrity monitoring4m 9s
-
Data loss prevention5m 17s
-
Data encryption5m 39s
-
Hardware and firmware security5m 24s
-
Linux file permissions4m 2s
-
Web content filtering1m 47s
-
-
-
What is vulnerability management?5m 2s
-
Identify scan targets4m 24s
-
Scan configuration5m 20s
-
Scan perspective4m 24s
-
Security Content Automation Protocol (SCAP)2m 27s
-
Common Vulnerability Scoring System (CVSS )3m 31s
-
Analyzing scan reports4m 37s
-
Correlating scan results2m 20s
-
Vulnerability response and remediation2m 14s
-
-
-
Authentication factors3m 26s
-
Multifactor authentication2m 17s
-
Something you have4m 24s
-
Password policy4m 19s
-
Password managers2m 3s
-
Passwordless authentication3m 23s
-
Single sign-on and federation3m 9s
-
Kerberos and LDAP5m 18s
-
SAML2m 35s
-
OAUTH and OpenID Connect2m 55s
-
Certificate-based authentication5m 25s
-