# EC-Council CND 各章節重點
更新時間:2024/04/29
通過考試條件
---
- 考試科目:312-38 EC-Council Certified Network Defender
目前教材版本為 v2/v3
- 考試時間4小時,100題
- 單選題(有單選式多選題)、多選題
- 必須答對60%~85%題目才會PASS
- 目前考試支援的語系版本僅只有英文
- 考試地點:Pearson VUE考試中心(基本上建議就跟在恆逸上課、恆逸考試)
- 考試費用:有報課程會送考試券一張,沒有報課程單獨考要550美金,如果在恆逸重考有優惠價格
其他補充
---
今年有去上課 聽到一些消息
就是說EC-Council的考試科目陸續會通過ANSI 17024 驗證
如果在還沒通過之前的那些科目
考試就會有所謂的版號也就是 V1 V2 V3之類 以此類推
其他通過的幾本上證書不會有版號
但是課程有比如說 現在上CND課本版號是V2
如果這門已經通過ANSI那他出來證書上就是印
EC-Council Certified Network Defender
相反的如果是SOC因為他還沒有過ANSI 17024
所以目前SOC還是
EC-Council Certified SOC Analyst v1
證書上面也沒有ANSI的印記
考試大綱/章節比重
--
參考CND Exam Blueprint v3.0
CND-Blueprint-v3.0
https://cert.eccouncil.org/images/doc/CND-Blueprint-v3.0.pdf
領域 Network Defense Management
Network Attacks and Defense Strategies
Administrative Network Security
比重大概是10%,在考試比例約有10題
領域 Network Perimeter Protection
Technical Network Security
Network Perimeter Security
比重大概是16%,在考試比例約有16題
領域 Endpoint Protection
Endpoint Security Windows Systems
Endpoint Security Linux Systems
Endpoint Security Mobile Devices
Endpoint Security-IoT Devices
比重大概是15%,在考試比例約有15題
領域 Application and Data Protection
Administrative Application Security
Data Security
比重大概是13%,在考試比例約有13題
領域 Enterprise Virtual, Cloud, and Wireless Network Protection
Enterprise Virtual Network Security
Enterprise Cloud Network Security
Enterprise Wireless Network Security
比重大概是12%,在考試比例約有12題
領域 Incident Detection
Network Traffic Monitoring and Analysis
Network Logs Monitoring and Analysis
比重大概是14%,在考試比例約有14題
領域 Incident Response
Incident Response and Forensic Investigation
Business Continuity and Disaster Recovery
比重大概是10%,在考試比例約有10題
領域 Incident Prediction
Risk Anticipation with Risk Management
Threat Assessment with Attack Surface Analysis
Threat Prediction With Cyber Threat Intelligence
比重大概是10%,在考試比例約有10題
另外就是目前收到消息
2024/4/10之後會有新的CND V4 exam blueprint
上面的3.0 blueprint 在4/9前有效
4/10後發行的 CND V4 exam blueprint
https://cert.eccouncil.org/wp-content/uploads/2024/04/CND-Exam-Blueprint-v4.pdf
另外是 Handbook V6
https://cert.eccouncil.org/wp-content/uploads/2024/03/CND-Handbook-v6.pdf
4/10開始 考試各章節比重調整
領域Network Defense Management
Network Attacks and Defense Strategies
Administrative Network Security
比重大概是10%,在考試比例約有10題
(第一章、第二章各5題)
領域Network Perimeter Protection
Technical Network Security
Network Perimeter Security
比重大概是10%,在考試比例約有10題
(第三章、第四章各5題)
領域Endpoint Protection
Endpoint Security-Windows Systems
Endpoint Security-Linux Systems
Endpoint Security-Mobile Devices
Endpoint Security-IoT Devices
比重大概是20%,在考試比例約有20題
(第五章、第六章、第七章、第八章各5題)
領域Application and Data Protection
Administrative Application Security
Data Security
比重大概是10%,在考試比例約有10題
(第九章、第十章各5題)
領域Enterprise Virtual, Cloud, and Wireless Network Protection
Enterprise Virtual Network Security
Enterprise Cloud Network Security
Enterprise Wireless Network Security
比重大概是15%,在考試比例約有15題
(第十一、十二、十三章各5題)
領域Incident Detection
Network Traffic Monitoring and Analysis
Network Logs Monitoring and Analysis
比重大概是10%,在考試比例約有10題
(第十四、十五章各5題)
領域Incident Response
Incident Response and Forensic Investigation
Business Continuity and Disaster Recovery
比重大概是10%,在考試比例約有10題
(第十六、十七章各5題)
領域Incident Prediction
Risk Anticipation with Risk Management
Threat Assessment with Attack Surface Analysis
Threat Prediction With Cyber Threat Intelligence
比重大概是15%,在考試比例約有15題
(第十八、十九、二十章各5題)
各章節(內容敘述僅供參考)
---
**第一章 Network Attacks and Defense Strategies (網路攻擊與防禦策略)**
資產 Asset
威脅來源:
自然環境威脅
無心或無意造成的威脅
有心或者刻意造成的威脅
內部威脅
外部威脅
Unskilled administrators / Accidents / Lacy or untrained employees
Hacktivist 駭客激進份子/他的動機可能跟政治或宗教有關/小型或少量的群體為達到政治目的而未經允許侵入電腦系統的人
「激進駭客」採取資訊技術、駭客攻擊展開公民不服從運動,以期達到推動政治議程或社會變革的目標。
Individuals who promote a political agenda by hacking, especially by defacing or disabling websites
Cyber Terrorists 網路恐怖份子/較大的群體
Suicide Hackers 個人/可能是不開心的員工/自殺型的駭客
State Sponsored Hackers 跟政府有關係的/組織型駭客
Organized Hackers 組織型的駭客
Professional hackers who attack a system for profits
Script Kiddies 個人/沒技術沒技能腳本小子
弱點 Vulnerability
**風險 Risk = Asset + Threat + Vulnerability**
Asset = Value 不是我們來定
Threat = Source
Vulnerability = exploit
未知的弱點 Zero Day
Reputation 商譽/客戶的信任
**Attack = Motive(Goal) + Method (TTPs) + Vulnerability**
unknow 未知的
use case 使用案例 know 已知的
Method (TTPs) 攻擊手法
Tactics 戰術 從開始到結束
“Tactics” is defined as the strategy adopted by an attacker to perform the attack from the beginning to the end
Technique 技術
“Techniques” is defined as technical methods used by an attacker to achieve intermediate results during the attack
Procddures 程序
“Procedure” is defined as a systematic approach adopted by threat actors to launch an attack
Reconnaissance 偵查
---
常見網路攻擊活動
Man-in-the-Middle 中間人攻擊
Password Dictionary 字典密碼攻擊
DNS Poisoning Attack DNS 詐騙 / DNS快取中毒
ARP Poisoning Attack ARP 詐騙 / ARP快取中毒
DHCP Starvation attack 類似DHCP DOS 攻擊
MAC Spoofing Attack WIFI 也有
Floding - > DOS、DDOS 阻斷服務攻擊/分散式阻斷服務攻擊
Directory/Path Traverl 目錄遍歷/路徑遍歷
Cross-Site Request Forgery,CSRF/XSRF 跨站請求偽造
Cross-Site-Scripting,CSS/XSS 跨站腳本
Cross-Origin Resource Sharing,CORS 跨站資源共享
Server Side Request Forgery,SSRF 伺服器端請求偽造
應用層 有 dos 根據你的運算資源 導致 session time out
Session Hijacking Attack 連線劫持
Social engineering 社交工程
Piggybacking => 一般解釋為一個人跟著另一個有權限的人進入授權區域,而這個跟在別人後面的人可能有、或者沒有權限 (搭順風車)
Tailgating => 尾隨
電子郵件會搭配社交工程攻擊
電子郵件炸彈 對你的郵件信箱 視為 郵件的 dos
運用電子郵件做釣魚 Phishing
Spamming 垃圾郵件
SMSiShing 簡訊釣魚
android => rooting 破解
ios => jailbreaking 越獄
藍芽 Bluebugging
無線網路 Rogue War Driving Honeypot
無線網路阻斷攻擊 Jamming attack
--------------------------
Preventive Approach 預防性
Reactive Approach 被動/消極/事後
Retrospective Approach 回顧/檢討
Proactive Approach 積極主動
控制措施
管理面
實體面
技術面
Defense in depth 縱深防禦
多層次防護
supply chain attack 供應鏈攻擊
---
實體安全的補充
UPS (Uninterruptible Power Supply)
Standby UPS (Offline UPS)
後備式或者稱離線式不斷電系統
屬於備援性質UPS,市電直接供電給用電設備也同時為電池充電,一旦市電品質不穩或停電,市電迴路自動切斷電池的直流電會轉換成交流點接手供電任務,直到市電恢復正常
Line-Interactive UPS
線上交錯式又稱線上互動式或在線互動式不斷電系統,基本運作方式和離線式一樣,不同之處在於線上交錯式雖不像在線式全程介入供電,但隨時都在監視市電的供電狀況,本身具備升壓和減壓補償電路,在市電供電不理想時,即時校正減少不必要的切換
Online UPS (Double Conversion UPS)
在線式不斷電系統的運作模式為市電和用電設備本身隔離,市電不會直接供電給用電設備,而是到了UPS就被轉換成直流電,之後再分兩路,一路給電池充電另一路轉回交流電,供電給用電設備,市電品質不穩或者停電時,電池從充電轉為供電,直到市電恢復正常時才轉回充電,UPS在用電的整個過程式全程介入的,優點是輸出的波型和市電一樣是正弦波,而且純淨無雜訊不受市電不穩定影響,可供電給電感型負載
---
**第二章 Administrative Network Security (網路安全管理)**
相關的管理框架跟法規
金字塔由上而下
Regulatory Frameworks -> Polices -> Standards -> Procedures,Practices,Guidelines
Compliance 合規
常見相關的法規
HIPPA (Health Insurance Portability and Accountability Act,1996) 美國健康保險可攜與責任法 醫療 資料安全
SOX (Sarbanes Oxley Act,2002) 美國沙班氏/歐克斯利法案 沙賓法案 美國上市上櫃公司 公開的財報上要簽署
FISMA (Federal Information Security Modernization Act,2014) 美國聯邦資訊安全管理法案
DMCA (Digital Millennium Copyright Act,DMCA,1998) 美國數位千禧年著作權法 智慧財產
GLBA (Financial Services Modernization Act,1999) 美國金融服務法現代化法案 個人 金融資訊
PCI-DSS (Payment Card Industry Data Security Standard) 支付卡產業資料安全標準
DPA (Data Protection Act,2018) 英國資料保護 (改寫1998版本)
GDPR (General Data Protection Regulation,(EU) 2016/679)歐盟個資法 歐盟通用資料保護規則
ISO/IEC 國際標準(International Organization for Standardization)
USA Patriot Act,2001 美國愛國者法案
The Human Right Act,1998 英國人權法案
FOIA (Freedom of Information Act,1967)美國資訊自由法案
Freedom of Information Act,2000 美國資訊自由法案
Electronic Communications Privacy Act,1986 美國電子通訊隱私法
Computer Fraud and Abuse Act,1986 美國電腦詐欺與濫用法案
安全政策的管理 你必須要強制 Enforce
資通安全政策
資產的盤點、安全控制措施、通訊安全、憑證、系統開發、
供應商、事故處理、持續營運、適度的稽核、風險管理、
修正
對外的承諾 對內的要求
Policy Statements
Baseline 基準線
Step to Creat and Implement Security Policies 9 個
Design of a Security Policy
因產業 因公司 因性質會有所不同
安全政策分三大類
**Enterprise Information Security Policy (EISP) **
These policies support organizations by offering ideology, purpose, and methods to create a secure environment for enterprises. It establishes a method for development, implementation, and management of security programs. These policies also ensure the proposed information security framework requirements are met.
**Issue-Specific Security Policy (ISSP)**
These policies address specific security issues in an organization. The scope and applicability of these security policies are completely dependent on the type of issue and the methods used by them. It specifies the necessary technologies along with preventive measures such as authorization of user access, privacy protection, and fair and responsible use of technologies
**System-Specific Security Policy (SysSP)**
The implementation of these policies focuses on the overall security of a particular system in an organization. An organization often develops and manages this type of policy, including the procedures and standards, for system maintenance. The technologies used by an organization should also be included in system-specific policies. It addresses the implementation and configuration of technology and user behavior.
Internet Access Policies
Promiscuius Policy
no rule no restrictions
Permissive Policy black-list rule
Prudent Policy White-list rule 較嚴謹安全 但有需要開放
Paranoid Policy 偏執政策 全部不准去
Acceptable Use Policy read and copy 針對組織資產 定義你的使用
User Account Policy 使用者帳戶政策
Remote Access Policy 遠端存取的政策
Information Protection Policy processing stroing transmitting state
Firewall Management Policy 防火牆政策
Special Access Policy 例外
Network Connection Policy 避免 Rogue device
Business Partner Policy
Email Security Policy
Password Policy
Physical Security
Information System Security Policy
BYOD
Mobile 有四個
Software / Application Security
Data Classification 分三大類 至少 對外 對內 機密嚴謹的 限制更多
UAC
Policy checklist
政策落實 awareness training
Employee
Primary asset
組織的安全政策
實體安全政策
資料分級
員工訓練 社交工程演練
離職員工 員工的監控 需要合法
**第三章 Technical Network Security (網路安全技術)**
存取控制 跟 模型
職務區隔 Separation of Duties (SoD)
可知原則 Need-to-know
最小權限 Principle of Least Privilege (POLP)
存取控制模型
Mandatory Access Control (MAC)
=>Bell-LaPadula Model(BLM)
=>Biba Integrity Model
Discretionary Access Control (DAC)
=>Access Control Matrix
Role-based Access Control (RBAC)
Rule-based Access Control (RB-RBAC)
Castle-and-Moat Model
Zero Trust Model 零信任模型
Identity and Access Management (IAM)
User Identity Management (IDM)
User Access Management (AM)
Encryption 加密
Symmetric Encryption 對稱式加密
Asymmetric Encryption 非對稱式加密
Hashing 雜湊
Digital Signatures 數位簽章
Public Key Infrastructure (PKI) 公開金鑰基礎設施
加解密演算法
Data Encryption Standard (DES)
Triple Data Encryption Standard (3DES)
Advanced Encryption Standard (AES)
=> 128bit
Rivest Cipher 4 (RC4)
Rivest Cipher 5 (RC5)
Rivest Cipher 6 (RC6)
Digital Signature Algorithm (DSA)
Rivest Shamir Adleman(RSA)
Message Digest Algorithm 5 (MD5)
Secure hash algorithm (SHA)
(sha1)(sha2)(sha3)(sha256)
Hash-based Message Authentication Code (HMAC)
Network Segmentation
Demilitarized Zone(DMZ)
Firewall (pFsense)
Intrusion Detection and Prevention System(IDS/IPS) (snort)
Honeypot (KFSenor)
Proxy Server
(squid proxy)
(Protoport Proxy Chain)
(ProxyCap)
(CCProxy)
Network Protocal Analyzer (Wireshark)
Web Content Filter
(OpenDNS)
(Netsentron)
(Net Nanny)
Load Blancer
Unified Threat Management (UTM)
(Endian Unified Threat Management)
(Sophos Essential UTM Firewall)
Security Information and Event Management(SIEM)
(splunk)
Network Access Control(NAC)
Virtual Private Network(VPN)
(OpenVPN)
Network Security Protocols
RADIS ->網路設備連線模式
TACAS+ ->網路設備連線身分驗證模式
HTTPS ->連線加密
TLS -> 連線加密/通道加密
SSL -> 連線加密模式 常用於網頁交易
IPsec -> 連線加密模式用於VPN
PGP ->檔案加解密
S/MIME ->郵件加密
Kerberos -> Windows身分驗證模式
**第四章 Network Perimeter Security (周邊網路安全)**
防火牆的政策 跟 相關的設定
邊界層(Perimeter Layer)
OSI 7 Layer
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
TCP/IP 4 Layer
Link Layer
Internet Layer
Transport Layer
Application Layer
Bypass的規則
防火牆的功能和局限
防火牆的發展 (NGFW) 各種型態的防火牆
**Packet Filtering Firewall 封包過濾型**
網路層(Network Layer)
這種防火牆會檢查封包標頭的接收端和發送端IP位址、封包類型、埠號和其他網路資訊,並允許符合規則的封包通過,但不會檢查封包內的資料內容,**作用於網路層。使用ACL監控**。
**Circuit-Level Gateway 電路閘道器**
電路閘道器不需要大量的運算能力和資源。**它工作在 OSI 模型的會話層Session Layer(或TCP/IP的應用層和傳輸層之間)**。它監視數據包之間的 TCP 握手以確定請求的會話是否合法。但它不會檢查封包內的資料內容,只檢查封包來源。不過這種作法無法保證安全性,因為惡意程式仍可能隱藏在封包中。
Application Level Gateways 應用層閘道器
應用層防火牆也稱為代理防火牆,這種防火牆在應用層運作,會檢查內部網路和流量來源之間的流量。它先經由代理伺服器傳遞流量,並檢查傳入的流量,然後才允許流量進入內部網路中。
應用層防火牆有點類似狀態檢查,會同時檢查封包和 TCP 三向交握。兩者之間的主要差異是,狀態檢查防火牆只會檢查封包來源,應用層防火牆則會檢查封包內容,並進行深度封包檢查(DPI)。
**Stateful Multilayer Inspection Firewall
狀態檢視防火牆**
一種能夠提供狀態封包檢查(stateful packet inspection,縮寫為SPI)或狀態檢視(stateful inspection)功能的防火牆,能持續追蹤穿過這個防火牆的各種網路連線(例如TCP與UDP連線)的狀態。這種防火牆被設計來區分不同連線種類下的合法封包。只有符合主動連線的封包才能夠被允許穿過防火牆,其他的封包都會被拒絕。但因為狀態檢查防火牆執行較多的處理,因此效能比封包過濾防火牆較差。
**network and the transport layers **
Next Generation Firewall(NGFW)次世代防火牆
Application Proxy 應用代理
Network Address Translation (NAT)網路轉址
Virtual Private Network (VPN)虛擬私人網路
防火牆拓樸
硬體式防火牆
軟體式防火牆
主機型防火牆
網路型防火牆
內部防火牆
外部防火牆
防火牆的管理
Intrusion Detection Systems(IDS)
Approach-based IDS
Behavior-based IDS
Protection-based IDS
Structure-based IDS
Analysis Timing-based IDS
Source Data Analysis-based IDS
Zero-Trust Model Security
Software-Defined Perimeter (SDP)
**第五章 Endpoint Security-Windows Systems (端點安全之視窗系統)**
Windows 作業系統 各版本差異及發展
Windows 作業系統架構
Hardware abstraction layer
Kernel/micro kernel
Executive services
Environment subsystem
Integral subsystem
User Mode Has limited access to resources
Kernel Mode
Unrestricted access to system memory and external devices Kernel
Windows 安全元件
Security reference monitor (SRM)
Local Security Authority Subsystem (LSASS)
LSASS policy database
Security Accounts Manager (SAM)
SAM database
Active Directory (AD)
Authentication packages
Windows logon application (Winlogon)
Logon user interface (LogonUI)
Credential providers (CPs)
Network logon service (NetLogon)
Kernel Security Device Driver (KSecDD)
Windows 安全基準
Windows Security Baseline Configurations
Windows Security Baseline Configuration Using Security Compliance Toolkit (SCT)
Windows 使用者帳號管理
關閉無使用的帳號
檢視有特權權限帳號
Enforce Password Policy
Password Length 密碼長度原則
Password Protection Using Credential Guard
Credential
常用指令 net user
Windows 存取控制
Windows Access Checks: Security Identifier (SID)
Windows Integrity Control
Virtual Service Accounts
Secure File Sharing
Restricting Access to Files and Folders
Prevent Unauthorized Changes in System
User Account Control (UAC)
Administrative Access Management Using Just Enough Administration (JEA)
微軟安全性技術,類似 Linux capabilities,可透過 PowerShell 管理受允許委派管理的項目
Windows 修補管理
Enable Automatic Updates
Disable Force System Restarts
Windows 防毒軟體與防火牆 Defender
Windows Defender Firewall
Windows 登錄編輯器
HKEY_CLASS_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HEKY_USER
HEKY_CURRENT_CONFIG
Windows 網域管理
Windows Hardening 設定
Windows 遠端桌面服務
Windows 網路芳鄰
**第六章 Endpoint Security-Linux Systems (端點安全之 Linux 系統)**
Linux 作業系統架構
Linux 作業系統安裝及修補
Linux OS Hardening 設定
Linux 檔案權限控管
Linux 防火牆 iptable 設定
Security-Enhanced Linux (SELinux)
**第七章 Endpoint Security-Mobile Devices (端點安全之行動裝置)**
BYOD (Bring Your Own Device)
COBO (Company Owned , Business Only)
COPE (Company Owned , Personally Enabled)
CYOD (Choose Your Own Device)
Security Guidelines
MDM (Mobile Device Management)=>管整台設備
MAM (Mobile Application Management) =>管應用程式
MCM (Mobile Content Management) =>管內容
MEM (Mobile Email Management)=>管email
MTD (Mobile Threat Defense)
UEM (Unified endpoint management)
SMS Phishing 簡訊釣魚
Android and ios Security
**第八章 Endpoint Security-IoT Devices (端點安全之物聯網裝置)**
Internet of Things (IoT)
Internet of Everything (IoE)
IoT-enabled Environments
Connect anytime 任何時間都在連都可連線
Connect anything 任何裝置的可以連
Connect any place 任何情況下(地方)都可以連
Sensing technology 偵測技術
IOT gateways 閘道
Cloud server/data storage 雲端伺服器跟儲存
Remote control using mobile apps 遠端控制程式
Layers of the IOT Architecture
User / Devices / Gateway / Connection / Cloud
Applications (CRM ERP SCM PLM)
Processes Practices and Polices
四層Device Layer、Communication Layer、Cloud Platform Layer、Process Layer
IOT 通訊模型
Device-to-Device Model
Device-to-Cloud Model
Device-to-Gateway Model
Cloud-to-Cloud(Back-end Data-sharing Model)
IOT-enable IT Environment
Attack Vectors in IOT Architecture
DDoS Attack from Hacked IOT Devices
OWASP TOP 10 IOT Vulnerabilities
Stack-wise IOT Security Principles
Traffic Analysis Attack
RFID Cloning
Malicious Code Inject
Sleep Deprivation Attack
RFID Spoofing
Sinkhole Attack
Use Proper Network Segmentation to Isolate IOT Device 網段隔離
Scan IOT Devices for known Vulnerabilitess
-> beSTORM IOTsploit IOTSeeker
Bitdefender Home Scanner
IOTInspector
更新IOT韌體及修補弱點
配置點對點IOT裝置的傳輸加密機制
強化使用者驗證
Isolate IOT Devices 當有連線到無線網路時
監控IOT設備的活動及記錄還有風險管理
IOT安全工具
SeaCat.io
AIOTI WG03 IOT標準
NIST Security Feature Recommendations for IOT Devices
US DHS Strategic Priciples for Securing IOT
GSMA IOT Security Guidelines and Assessment
**第九章 Administrative Application Security (應用程式安全管理)**
應用程式安全
應用程式 白名單/黑名單/沙箱/修補管理/防火牆
使用者軟體限制規則 / 應用程式白名單
Windows Potentially Unwanted Application Protection Feature
群組原則管理/本機安全性設定
應用程式白名單管理工具
應用程式沙箱
Windows 沙箱
Windows Defender Application Guard Microsoft Edge
Linux 沙箱 Firejail
Sandboxie
應用程式的修補管理
網站應用程式防火牆 WAF
Reverse proxy / Layer-2 brige / Out of band
Server resident / Internet hosted cloud
WAF的限制性
IIS Server的WAF套件 URLScan
其他常用WAF 或工具
**第十章 Data Security (資料安全)**
資料安全首要應該是 識別、分類、分級、盤點 機敏資料
Data at Rest、Data in Use、Data in Teansit
資料安全涵蓋資料的存取控制、資料加密、資料標記、資料的韌性及備份、資料的破壞、資料的保存
存取控制通常有(MAC、RBAC、DAC、RB-RBAC、ACLs、群組原則、帳號導向、密碼存取金鑰
資料的加密 大概有幾種方式(磁碟加密、檔案層級加密、可移除式儲存媒體加密、資料庫加密)
Windwos內建支援的磁碟加密 BitLocker
先決條件 TPM模組、UEFI
MacOS系統內建支援的磁碟加密 FileVault
Linux系統內建支援的磁碟加密 dm-crypt
LUKS Extension
LUSK device header
(Linux Kernel v2.6以後版本支援)
Android系統內建支援的磁碟加密 dm-crypt
ios系統支援磁碟加密 Passwordcode
第三方磁碟加密軟體 VeraCrypt / Symantec Driver Encryption
Windows上檔案層級的加密 Encrypting File System (EFS)
第三方檔案層級的加密軟體 For Windows AxCrypt
MacOS 檔案層級的加密 Disk Utility
第三方檔案層級加密軟體 for Linux
GnuPrivacy(GPG)/OpenPGP
傳輸加密/MS-SQL 資料庫加密
Transparent Database Encryption in MS SQL Server(TDE) encrypts
Clumn-level Encryption in MS SQL Server
Cell-level Encryption Methods
Passphrase to encrypt and decrypt the data
Asymmetric
Symmetric
Certificates
Always Encrypted in MS SQL Server
Randomized Encryption
Deterministic Encryption
Transparent Data Encryption in Oracle
Transparent data encryption (TDE)
資料傳輸加密
Secure HTTP Connection using Digital Certificate
資料庫傳輸加密 MS SQL
Enable TLS encryption to secure the data transmitted between instances of SQL Server and SQL clients/application
Enable SSL/TLS Encryption in Oracle Server
Email Encryption
MS Outlook
S/MIME、using Digital Certificate
Gmail support S/MIME
SecureGmail and Google Chrome extension
資料遮罩
Static data Masking(SDM)
Dynamic data Masking(DDM)
On-the-fly data masking
Data masking and the cloud
Dynamic Data Masking in SQL Server 2019
Data Masking in Oracle Database
八種技術
Encryption
Character scrambling
Lookup substitution
Nulling out or delection
Shuffling
Number and data variance
Masking out
資料備份跟還原
備份的策略(儲存媒體、備份技術、RAID Level、備份方式、備份型態)
RAID Level (0、1、3、5、10、50)
HardWare and Software RAID
Storage Area Nerwork(SAN)
Network Attached Storage(NAS)
備份的型態
Full backup
Incremental backup
Differential backup
Linux備份工具
Gnome Disk Utility
DD Command
MacOS Time Machine
Database Backup
MS SQL Server
Full database backup
Differntial backup
Transaction Log backup
Oracle
Offline (Cold) Backup
Online (Hot) Backup
Email backup
POP3 IMAP data
Gmail Google Drive
Web Server Configuration Backup (IIS)
資料銷毀 data destruction
delete and destroyed
Delete/Reformat
Wipe
Overwriting data
Erasure
Degaussing
Physical destruction
Electronic shredding
Solid-state shredding
clean desktop 清空你的桌面
行動裝置 贈與 轉售 折讓 設備還原的動作
CD DVD 的破壞 實體破壞
重複使用的 銷毀 用 覆蓋的方式
三個技術
Cleaning 清除 Overwriting Wiping Erasure
Purging 消磁 Degaussing
Destroying 實體破壞 Disintegration incineration pulverizing and melting Shredding
Disk Wipe
Windows Diskpart Utility
sp800-88
Data Loss Prevention (DLP)
Endpoint DLP
Network DLP
Storage DLP
Windows Information Protection(WIP)
MyDLP
**第十一章 Enterprise Virtual Network Security (企業虛擬網路安全)**
虛擬化架構與傳統架構
虛擬化架構下的元件
Hypervisor / Virtual Machine Mointor
Gust Machine / Virtual Machine
Host Machine
Management Server
Management Console
Network Virtualization(NV) 網路虛擬化
通常類似Hypervisor的網路介面
abstraction layer 抽象層
常見Hypervisor
VMware ESXi
Citrix XenServer
Hyper-V
VirtualBox
Virtual Network VLANS 虛擬化網路
虛擬化網路可能有的風險跟威脅
MAC Flooding Attack
ARP Attack
VLAN Hopping Attack
STP Attack
DHCP Starvation Attack
Multi Brute-Force Attack
Hyper-V Security
同步問題
存取權限問題
Isolated User Mode(IUM)
VMware Security
Time Synchronization
Restrict User Access
Encrypting Gust Virtual Machines
VirtualBox Security
Disable Nestd Paging
Disable Hyperthreading
Flush Level 1 Cache Data
geographically limited 地理限制
expansion
Software Defined Network (SDN) 軟體定義網路 Security
Data Plane
Control Plane
Application Plane
Northbound API
Southbound API
Open flow
SDN 的安全原則
Clearly Define Security Dependencies and Trust Boundaries
Build Security based on Open Standards
Protect Operational Reference Data
Provide Accountability and Tranceability
Ansure robust identity
Protect the information Security Triad
Make Systems Secure by Default
Consider properties of Manageable Controls
SDN可能被攻擊的風險
DDoS Attacks
Malicious Application Attacks
Misconfiguration Attacks
Control Chanel Attacks
Network Manipulation Attack
Traffic Dirversion Attack
Side Channel Attack
App Mainpulation
ARP Spoofing Attack
API Exploitation
Traffic Sniffing
Password Gussing or Brute Force
Network Function Virtualization (NFV) 網路功能虛擬化 Security
NFV元件
NFV Infrastructure (NFVI)
Hardware resources
Virtualization layer
Virtual resources
Virtualized Network Functions(VNFs)
Virtual Network Function(VNF)
Element Management System(EMS)
NFV Management and Orchestration(MANO)
management system for NFVI
硬體跟軟體分開
NFV Hardware/ Software
SDN Controll / Forward
Container
Container Engine
Container Orchestration
Container Orchestration Software
Container 跟 VM的差異
Docker
Docker Engine
Docker Architecture
Docker Networking
Kuvernetes (K8s)
NIST 800-190
isolated 隔離
注意到沙箱逃逸問題
**第十二章 Enterprise Cloud Network Security (企業雲端網路安全)**
雲端運算的定義
雲端運算八個特性
On-demand self-service
Distributed storage
Rapid elasticity
Automated management
Broad network access
Resource pooling
Measured service
Virtualization technology
雲端網路安全
訂閱制度 on-demand
Broad network access
Distributed storage
Rapid elasticity
自動化管理 Automated management
資源池 Resource pooling
測量 Measured service
Virtualization technology
IaaS,Infrastructure as a Service,基礎設施即服務
如:Amazon EC2、Azure Virtual Machines
PaaS,Platform as a Service,平臺即服務
如:Google App Engine、AWS Elastic BeanStalk、AWS Lambda、SAP Cloud Platform
SaaS,Software as a Service,軟體即服務
如:Microsoft Office 365、Webmail service(Gmail、Outlook)
FWaaS,Firewall as a service 防火牆即服務
雲的責任劃分 根據 SLA
Public Cloud 公有雲
Private Cloud 私有雲
Community Cloud 社區雲
Hybrid Cloud 混和雲
5大角色
Cloud Consumer
Cloud Provider
Cloud Carrier
Cloud Auditor
Cloud Broker
NIST Cloud Deployment Reference Architecture
Identity and Access Management (IAM)
Data Stroage Security
Amazon AWS
AWS Relational Database Servive(RDS)
AWS Elastic Map Reduce(EMR)
AWS Elastic Beanstalk
Simple Storage Service(S3)
DynamoDB
Amazon Glacier
SQS
Amazon EC2
Amazon S3 bucket Storage
Amazon EBS
Amazon VP3
AWS CloudTrail
Microsoft Azure
Azure AD
Azure AD Self-service password reset(SSPR)
Azure MFA
Azure AD Privileged Identity Management
Azure AD Connect Sync
Azure Storage Service Encryption(SSE)
Transparent Data Encryption(TDE)
Azure Key Vault
Azure Site-to-Site VPN
Azure Network Security:Disable RDP/SSH Access to Virtual Machine / Optimize Uptime and Performance Load Balancing
Microsoft Antimalware
Active Geo-replication
Azure Security Center
Azure Management Portal
Google GCP
GCP Identity and Access Management
Grant Pre-define Roles
Google's default encryption
GCP Key Management:Cloud KMS
GCP Logging:Stackdriver
ZTNA,Zero Trust Network Access 零信任網路存取
CSP,Cloud Service Provider 雲端服務提供者
Cloud Access Security Broker(CASB) 雲端存取安全代理
Cloud Workload Protection Platforms (CWPP) 雲端工作負載保護平台
Cloud Security Posture Management (CSPM) 雲安全狀態管理/雲端安全勢態管理
SSPM,SaaS Security Posture Management SaaS安全狀況管理
CNAPP,Cloud-Native Application Protection Platform 雲原生應用程式防護平台
CIEM,Cloud Infrastructure Entitlements Management 雲端基礎結構權限管理
KSPM,Kubernetes Security Posture Management
SSE,Secure Service Edge 安全服務邊界
SASE,Secure Access Service Edge 雲端原生安全服務框架
SWG,Secure Web Gateway,安全網站閘道
**第十三章 Enterprise Wireless Network Security (企業無線網路安全)**
Wi-Fi/Bluetooth/WiMax
802.11 2.4G DSSS/FHSS
802.11a 5G/3.7G OFDM
802.11b 2.4G DSSS
802.11e Qos
802.11g 2.4G OFDM
802.11n 5G/2.4G MIMO-OFDM
802.11ac 5G MIMO-OFDM
802.11az 2.4G/5G/6G MIMO-OFDM
Standakone Architecture (Ad-hoc Mode)
Centrally Coordinated Archiecture(Infrastructure Mode)
Lightweight Extensible Authentication Protocol,LEAP
Extensible Authentication Protocol,EAP
Point-to-Point Protocol,PPP
(EAP-SIM)(EAP-TLS)(EAP-AKA)(EAP-TTLS)
驗證 LEAP EAP
TKIP WEP WPA WPA2 WPA3
WPA-Personal / WPA2-Personal / WPA3-Personal
WPA-Enterprise / WPA2-Enterprise / WPA3-Enterprise
注意那張比較表
天線
Parabolic Grid Antenna 網狀拋物面天線
Yagi Antenna 八木天線
Dipole Antenna 偶極子天線
Reflector Antenna 反射面天線
加密 802.11 802.11E
802.11 a/b/g/n/ac/ax
Shared Key Authentication
WEP RC4 40/104-bits CRC32
WPA RC4,TKIP 128-bits Michael algorithm CRC32
WPA2 AES-CCMP 128-bits CBC-MAC
WPA3 AES-GCMP256 192-bits BIG-GMAC-256
WWAN / WPAN / WMAN
RADIS
Rogue 設備
無線網路的安全性設定建議
無線網路的攻擊防護
**第十四章 Network Traffic Monitoring and Analysis (網路流量監控與分析)**
抓取封包工具
Wireshark / tcpdump / WinDump /dsniff
ManageEngine NetFlow Analyzer
NetworkMiner
network interface card (NIC)
promiscuous mode (snifer)
Switched Port Analyzer (SPAN) Port--Cisco
Roving Anakysis Port(RAP)--3COM
Packet
TCP/IP 3 WAY handshake
Unusual/Suspicious Information in the Header 封包標頭
Content-based signature
Context-based signature
Atomic signature
Composite signature
Suspicious Data in the Payload
FTP Traffic TCP port 21
To check for unsuccessful FTP password cracking attempts, apply the filter
ftp.response.code==530
To check for successful FTP password cracking attempts, apply the filter
ftp.response.cdoe==230
Telnet Traffic TCP port 23
HTTP Traffic TCP port 80
Traffic for Passive OS Fingerprinting Attempt
ICMP-Based and TCP-Based OS Fingerprinting
PING sweep
(icmp.type==8 && (!(icmp.code==8))
(icmp.type==13) ||
(icmp.type==15||(icmp.type==17)
(tcp.flags==0x02) && (tcp.window_size <1025) tcp.flags==0x2b tcp.flags==0x00 tcp.options.wscale_val==10
TCP OS fingerprinting attempt
tcp.options.mss_val<1460
Use the filter icmp.type==8 or icmp.type==0 to detect an ICMP ping sweep attempt
Use the filter tcp.dstport==7 to detect a TCP ping sweep attempt
Use the filter udp.dstport==7 to detect an UDP ping sweep attempt
SYN+ACK, RST, and RST+ACK packets or ICMP type 3
TCP Null Scan Attempts
TCP.flags==0x000
to detect SYN/FIN DDoS attempt
tcp.flags==0X029
SYN/FIN DDoS Attempts
Use the filter tcp.flags==0x003 to detect a SYN/FIN attack.
the following filter is used to detect a SYN/FIN attack
tcp.flags==0x001
UDP Scan Attempts
ICMP Type-3 Code-3 response
ICMP Type 3 Code 3, then the port is unavailable. This is a sign of a UDP port scan on the network
icmp.type==3 and icmp.code==3
ARP Poisoning Attempts
Check for “duplicate IP address configured” messages in the Warnings tab in Wireshark To locate duplicate IP address traffic, use the following filter:
arp.duplicate-address-detected
SQL Injection Attempts
SQL injection such as OR, --, ‘, and =.
**第十五章 Network Logs Monitoring and Analysis (網路日誌監控與分析)**
Log is a collection of information/data on events
Logging is the process of recording and storing logs of the events that occur in the network
Log file contains various types of information that helps provide valuable and actionable information
To identify actionable information from the logs, proper log analysis and monitoring is required
Local Logging / Centralized Logging
Windows Logs
Windows event logs, consisting of a header and a series of event records
Windows Event log audit configurations (i.e., log retention, log size, etc.) are recorded based on the registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\<Event Log>
file named Security.evtx, and the databases related to applications are stored in a file named Application.evtx. These Windows event log files are stored in C:\Windows\System32\winevt\Logs folder
Linux Logs
Most Linux logs are located at /var/log directory in plain ASCII text format
/var/log/httpd/ Apache access and error logs directory
/var/log/auth.log Authentication logs
var/log/utmp or /var/log/wtmp Login records file
Severity Level and Value of Linux Logs
Level 0—Emergency: This level represents emergency conditions where the system comes unusable; for example, imminent system crash.
Level 1—Alert: This level represents those conditions that require immediate actions; for example, a corrupted system database.
Level 2—Critical: This level represents critical conditions such as a hardware error.
Level 3—Error: This level represents error messages.
Level 4—Warning: This level represents warning messages.
Level 5—Notice: This level represents those messages that are not an error but require special attention.
Level 6—Information: This level represents informational messages.
Level 7—Debug: This level represents those messages that are required during debugging programs.
cat command/less command/tail command/more command /grep command
Log Format
Mac Logs
Mac security-related log information is saved in secure.log file and found in /private/var/log directory
Firewall log data is stored in appfirewall.log file and found at /private/var/log/appfirewall.log
AccessLog
/var/log/cups/access_log-%s
ErrorLog
/var/log/cups/error_log-%s
Log Format
Syntax: MMM DD HH:MM:SS Host Service: Message
Firewall Logging
Windows Defender Firewall Log
Location of Windows Defender Firewall log Default firewall log location in windows is C:\Windows\System32\LogFiles\Firewall Open the file named as pfirewall.log
Mac OS X Firewall Logs
Default location of the firewall log file in Mac is /private/var/log/ Log file is saved as appfirewall.log, open the recent log file
Linux Firewall: iptables
iptables is a rule-based inbuilt firewall in different versions of Linux OS iptables log messages to a /var/log/messages file through Linux syslogd daemon
Cisco ASA Firewall
Check Point Firewall
fw log command is used to display the log file content
Cisco Router Log
seq no:timestamp: %facility-severity-MNEMONIC:description
Internet Information Services (IIS) Logs
IIS 6.0 %system32%\LogFiles\W3SVCN
IIS 7.0 %SystemDrive%\Inetpub\Logs\LogFiles\W3SVCN
IIS 8.0 %SystemDrive%\inetpub\logs\LogFiles
IIS 10.0 %SystemDrive%\inetpub\logs\LogFiles
Apache Logs
Apache access log
In RHEL/Red Hat/CentOS/Fedora Linux, Apache access log files are stored at /var/log/httpd/access_log
In Debian/Ubuntu Linux, Apache access log files are stored at /var/log/apache2/access.log
In FreeBSD, Apache access log files are stored at /var/log/httpd-access.log
If the server is running on RHEL/Red Hat/CentOS/Fedora Linux OS: sudo tail -100 /etc/httpd/logs/access_log
If the server is running on Debian/Ubuntu Linux OS: sudo tail -100 /var/log/apache2/access.log
Apache error log file
In RHEL/Red Hat/CentOS/Fedora Linux, Apache error log file is stored at /var/log/httpd/error_log
In Debian/Ubuntu Linux, Apache error log file is stored at /var/log/apache2/error.log
In FreeBSD, Apache error log file is stored at /var/log/httpd-error.log
If the server is running on RHEL/Red Hat/CentOS/Fedora Linux OS: sudo tail -100 /etc/httpd/logs/error_log
If the server is running on Debian/Ubuntu Linux OS: sudo tail -100 /var/log/apache2/error.log
Apache common log format
LogFormat "%h %l %u %t \"%r\" %>s %b" common
Apache combined log format
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\"" combined
Centralized Logging
Collection Server
Storage Server
Log Transmission
Syslog UDP/Syslog TCP/Encrypted syslog/HTTP/HTTPS/SOAP over HTTP
Log Normalization 日誌正規化
**第十六章 Incident Response and Forensic Investigation (資安事故應變與鑑識調查)**
九大程序 Preparation for IR Incident
Incident Recording and Assignment
Incident Triage
Notification
Containment Incident
Evidence Gathering and Forensic Analysis
Eradication
Recovery
Post-Incident Activities
First Response 第一發現者
注意到 第六個程序 數位鑑識
Event 跟 Incident 的差別
Incident Response Team(IRT)
Incident Response Plan
business and operating environment
BIA / CBF
in-house(內部團隊)
external IRT team (外部團隊)
角色 / 責任
containing (隔開) 不要讓他傷害擴大
Attorney 法律 律師
Incident Response Plan (mission and Vision)
first responder
Reporting
Alerting
Containing
Identifying
Collecting
Protecting
Documenting
Preserving
Packaging
Fear, Uncertainty, and Doubt (FUD)
False Positive 偽陽性
True Positive 真陽性
False Negative 偽陰性
True Negative 真陰性
六大類事件
未經授權存取 High C
阻斷服務 High A
惡意代碼
合法不合理(政策有關/AUP)
掃描刺探 Low
Multiple Conponent (以上五種的結合)
Avoid Futher Harm
Control Access to Suspected Devices
Record Your Action
Witnessess to support
Do Not Change the State of Suspected Decice
Disable Virus Protection
Preparation for IR
Incident Recording and Assignment / NOC/SOC
Incident Triage
Notification inside/outside stakeholder
Containment / Control / authorization
Evidence Gathering and Forensic Analysis
Eradication / Root Cause 第七
Recovery / Backup / Restore
Post-Incident Activities / follow up / Compliant
Incident Triage
Incident Containment (控制措施)
Eradication
improve the response
第六大程序 用數位件事的方法 如何收 如何處理
Expert Witness 專家證人
Evidence Manager
Evidence Documenter
證據保存鏈 Chain of Custody
**第十七章 Business Continuity and Disaster Recovery (持續營運與災難復原)**
Business Continuity (BC)
Critical Business Functions (CBF)
ISO standard
BC business-centric
acceptable predefined levels 可接受
disruptive incident
Minimize the effects of the disaster
Provide compliance benefits
Mitigate business risks and minimize financial losses
Disaster Recovery (DR) 災難復原
data-centric
restore business data and applications
https://uptime.is
downtime
Business Continuity Management,BCM 營運持續管理
Business Impact Analysis,BIA 營運衝擊分析
Recovery time objective (RTO)
Recovery point objective (RPO)
活動/步驟/step
Prevent/Response/Resumption/Recovery/Restoration
Business Continuity Plan (BCP)
document
resilience against potential threats
potential risks
risk management
Disaster Recovery Plan (DRP)
recover from a disaster (specific departments)
標準 ISO 22301:2019 Requirements
標準 ISO 22313:2012 Guidance
標準 ISO/IEC 27031:2011 基礎架構
setting up and managing
**第十八章 Risk Anticipation with Risk Management (風險管理之風險預測)**
Risk Management Frameworks 風險管理框架
pro-active
acceptable level 可接受
Key Risk Indicators (KRI) 風險指標
Risk Analysis 風險分析
Risk Identification 風險識別/盤點
Risk Assessment Matrix 風險矩陣 probability / likelihood / consequence / impact
quantitative 定量分析 $$
qualitative 定性分析 百分比率/高中低
風險等級
Risk Assessment 風險評鑑
Risk Treatment & Control 風險處理與控制
Risk Tracking & Review 風險追蹤
Risk Avoidance 風險避免
Risk Acceptance 風險接受
NIST Risk Management Framework 風險管理框架
6 個 RMF 目前有新的版本
Categorize 盤點
Select 選擇控制措施
Implement 實施控制措施
Access / Authorize / Mointor
COBIT Framework IT治理框架 = > ISACA
弱點管理
弱點管控六個流程
Disccovery -> Asset Prioritization -> Accessment -> Reporting -> Remediation -> Verification
弱點掃描 / 修補 / 驗證
外部掃描 / 外部弱點
nmap -sV -T4 -f www.certifiedhacker.com
內部弱點掃描 常見工具
Tenable Nessus
OpenVas
**第十九章 Threat Assessment with Attack Surface Analysis (可攻擊面積分析之威脅評估)**
attack surface analysis 攻擊面分析
known, unknown, and potential
Decrease in vulnerabilities deceases the attack surface
5大分類 (Network、Software、Physical、Human、System)
4個步驟做分析
Understand、Identify、Simulte、Reduce
Visualization 視覺化出現
asset、topologies、Policies
Visualization using securiCAD / Skybox / Threatpath
Indicators of Exposures (IoEs) 曝險指標
potential risk exposures 已知的 攻擊者直接利用 進行攻擊
OWASP Attack Surface Detector
Burp Suit
AttackSurfaceMapper
Attack Simulation
virtual penetration testing
Breach and attack simulation (BAS)
Infection Monkey / Cymulate
Apply vulnerability patch to the identified risk exposures
Retest the vulnerabilities to analyze the effects of a given fix
Cloud Attack Surface
Attack Surface of IOT
**第二十章 Threat Prediction with Cyber Threat Intelligence (網路威脅情資之威脅預測)**
collection and analysis of information about threats and adversaries
Cyber threat intelligence (CTI)
Indicators of compromise (IoCs)
Indicators of attack (IoAs)
unknown threats into known threats 未知轉成已知
Strategic Threat Intelligence 策略型的威脅情報 / 看風險
執行面/長期觀察
Tactical Threat Intelligence 戰術型
技術面 / 攻擊的技術能量 / 長期觀察
Tactics, Techniques, Procedures (TTPs)
Operational Threat Intelligence
Indicators of Compromise 入侵指標
技術的指標
Indicators of Attack
策略指標
new and modified threats
Threat Intelligence feeds (TI feeds)
https://threatfeeds.io
Reference
---
藍隊資安防禦通識-EC-Council CND認證課程
https://www.uuu.com.tw/Course/Show/1249/%E8%97%8D%E9%9A%8A%E8%B3%87%E5%AE%89%E9%98%B2%E7%A6%A6%E9%80%9A%E8%AD%98-EC-Council-CND%E8%AA%8D%E8%AD%89%E8%AA%B2%E7%A8%8B
Network Security Certification | Certified Network Defender
https://www.eccouncil.org/train-certify/certified-network-security-course/
Certified Network Defender
https://cert.eccouncil.org/certified-network-defender.html
CND Candidate Handbook
https://cert.eccouncil.org/images/doc/CND%20Handbook%20v1B.pdf
ECCouncil-312-38-Exam-Practice-Test
https://github.com/paulettebrown1/Eccouncil-312-38-Exam-Practice-Test
Exam Prep Session – CND (Certified Network Defense) | Koenig Solutions
https://www.youtube.com/watch?v=juTuWG0uw3I
Certified Network Defender Practice Exams 2024 (UNOFFICIAL)
https://www.udemy.com/courses/search/?src=ukw&q=ECcouncul+CND
Network-Defense-Essentials-Notes
https://github.com/Twavesx/Network-Defense-Essentials-Notes
NDE
https://github.com/kaio6fellipe/NDE
###### tags: `EC-Council` `CND`