typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 857: Awakened Form

I originally thought that after four days, my stiff neck would be a little better, so I didn't take ibuprofen. However, after the ibuprofen effect wore off, I found that the pain was still the same as before, and I took the new ibuprofen.

It will take another hour or two to take effect, so I will update it later today, probably around one or two in the morning, and then just refresh this chapter.

…………

Abstract: The situation of organized and purposeful network attacks using network security vulnerabilities is becoming more and more obvious. On the one hand, the time window left for emergency response is getting smaller and smaller. On the other hand, the threat knowledge, professional skills, proficiency, etc. required for emergency response are getting smaller and smaller.

But it continues to increase. This article proposes a concise process and response steps for network operators to carry out emergency response as a defender, providing practical reference for relevant units.

Keywords: network security critical information infrastructure attack and defense drills

1 Introduction

With the increasing importance of information technology in social development, cyberspace has become a new battlefield for great power competition. Cybersecurity attack and defense drills are key to testing the cyber security protection of critical information infrastructure and improving the emergency response level of network operators.

As an important means of work, it is of great significance to promote the improvement of network security capabilities through actual combat and confrontation. From the perspective of network operators, this article takes the actual attack and defense drill process of a government website that participated in the organization as an example to briefly describe the defense in the attack and defense drill.

How to carry out the work and provide relevant units with organizational response experience.

2Drill content

A certain unit organized network security professionals to form several attack teams to conduct security attack tests on the official websites and business systems of secondary institutions within the jurisdiction for 5 days to verify the effectiveness of the target system's security protection capabilities.

The exercise platform submits the defender's report. As the target website and business system operating unit, the author's unit needs to ensure the physical security, operational security and data security of the target information system to minimize the harm of network security emergencies.

3Organizational structure

A defense headquarters was established, with the network security leader as the overall commander, and its members composed of leaders from the network security and business system operation departments. The headquarters consists of a defense working group, a monitoring analysis group, and a research and judgment group, with a total of 20 people.

3.1Defense Command

Coordinate the overall exercise defense work, and be responsible for the command, organization, coordination and process control of the information system attack defense exercise; issue authorization instructions for system shutdown, restoration of key operations and external information submission; report on the progress of the exercise and summary report to ensure that the exercise work meets expectations

Purpose.

3.2 Defense Working Group

Responsible for the specific work of information system emergency drills; building a centralized monitoring and disposal environment for maintenance drills; analyzing and evaluating the impact of information system emergencies on business; collecting and analyzing data information and records during the information system emergency response process; reporting to

The headquarters reports on the progress of the exercise and the development of the situation; is responsible for taking the lead in conducting daily summary and analysis of security incidents; statistics, screening, and submission of reports to the defenders.

3.3Monitoring analysis group

Responsible for business system access monitoring and network security situation monitoring during offensive and defensive drills, discovering and identifying network attacks, recording the monitoring process, and issuing attack warnings to the research and disposition team; timely patching vulnerabilities in the business system and shutting down the business system

and resume work.

3.4 Research and disposition team

In the preparation stage of the drill, they are responsible for rectifying the discovered network security risks and implementing various security protection measures. In the actual stage of the drill, they clean the network attack traffic to ensure the availability of the business system; they flexibly allocate technical resources as needed to complete technical analysis and

Research and judgment, real-time attack confrontation, emergency response, etc.

4Drill implementation

According to past drill experience, small-scale defense should carry out relevant work in three stages: before the drill, during the drill, and after the drill.

4.1 Before offensive and defensive drills

Attack and defense



Establish a complete support team before training









From safety



Technique



Establish a comprehensive monitoring and early warning system





�In the safety system�



area construction



Warning and handling feedback mechanism







Information within the scope of this guarantee



�Relationship�



Conduct a detailed risk assessment



� and security hardening





�Formulate





�Network Security Attack and Defense�



Practice implementation plan











and inform relevant personnel.



�Safety awareness publicity and implementation







4.1.1 Asset sorting













Exhibition information



Organizing assets





�Main�



Carding content includes but is not limited to





Sort out the interactions released to the outside world



Network application system







�combine interactions�



�Online Export and Export�



Equipment and safety measures used





� Sort out the network structure





�Network topology











�Sort out and focus�



of or







Heavy



�Protected Information�



�Relationship�









Application system



Topology between servers





� Sort out network security equipment and network protection status





� Sort out the sslvpn and ipse access situation







4.1.2 Risk assessment











Safety and security experts combine information



Conduct security risk assessment based on the asset sorting results











Survey questionnaire available to safety and security experts







Personnel Interviews and Security�



technique





�infiltration�



�Test











hole scan











�line core�



�etc.





�equal square�









��



By security tools or manual means



�From cybersecurity risks







Application security risks







Host security risks







Conduct security risk assessments from dimensions such as terminal security risks and data security risks.









�The contents of each part can be







��



Down











�1





�Cyber ​​Security Risk Assessment�



�Network Architecture Risk Assessment�









�Using methods such as labor and tools�



�from�



technique







A deeper understanding of strategy and management



Dig out the information that exists in the current network







and risk







Safety



�holes and security�



Low-line risk assessment









�Use scanning tools to scan and comprehensively scan network devices�



















�Password Risk Assessment�









�strict�







stop



Those who have an account



�Password







Empty password situation







account







Permission risk assessment









��







�Administrator account and permissions





�Close not necessary�



account





�Canceling unreasonable account permissions





�Guarantee�



secret







Comply with safety standards



�line�













Remote login whitelist risk assessment









�strict�



Limit the IP addresses that can be remotely managed







��



Remote management using tel







Configuration backup risk assessment









��



All network equipment







Good configuration backup





�Confirm that the backup is valid�



Reply











�2





�Application Security Risk Assessment�



�Identity Authentication Risk Assessment�









�Comment�



�Application system�



Identification and identification



Ability to set up and use configurations





�Application system�



Handling various situations of user login





��



Login failed







Login connection timeout, etc.







Access control risk assessment









�Comment�



�Application system�



access control



Can set the situation





��



Access control policy







Permission settings, etc.







Security Audit Risk Assessment









�Comment�



�Application system�



Security audit configuration





��



Coverage







Recorded items and contents, etc.







Asset exposure risk assessment









�Model�



Hackers conduct information



�Collect





�Get asset details�









�Program name







Version



















dangerous port







Business management background, etc.







Application�



Hole Risk Assessment









�includes web services





��



apache







websphere







tomcat







iis etc.





�Other ssh







ftp and other programs



�Loss of compensation�



or version



�hole�



test







Penetration



�Test





�adopt�





as a means of testing





�Discover test target in information�



�Relationship�



recognize



and authorization







code



review



The security that exists in aspects such as



hole





�and reuse it



Possible hole



accomplished



lose





�Provide�



avoid or prevent such













risk or



Specific improvements or reinforcement measures for holes











�3





�Host Security Risk Assessment�



�webshell risk assessment�









�For systems that provide web services�



Perform webshell backdoor debugging









�Experience�



Server security









�Make sure you clean up any possible breaches�



�The back door left behind











Identity document risk assessment









�Exploiting professional zombie Trojan worms�



Test tools for operating systems



carry out



Careful file arrangement









�and for �



Read the files for behavioral analysis





�Identify virus families and their dangers











�Password Risk Assessment�









�strict�







stop



Those who have an account



�Password







Empty password situation







Port and service risk assessment









�Server only�





Put yourself to provide service-related ports





�Close not necessary�



Ports and external services







Server defense



�Wall Risk Assessment�









�Default�



stop



Actively conduct external visits





��



Yes











��



strict



Develop access control policies





�Implement server external access whitelist







system







Hole Scanning Risk Assessment









�For operating system�









Database and routines



application







The agreement proceeds



hole scan











�4





�Terminal Security Risk Assessment�



�Safety�



Low-line risk assessment









�Operation system for the terminal�



Configure security



�line�













�Guarantee�



End device security











�Password Risk Assessment�









�strict�







stop



Those who have an account



�Password







Empty password situation







Antivirus software risk assessment









��







�Whether anti-virus software is installed on the terminal





�Is the security policy�





start







illegal foreign affairs



�Risk Assessment�









��







�Whether the terminal is configured with dual network cards





�Whether�





Put or connect the hot











Supplement



Update risk assessment









��







�Supplement�



Updates











�5





�Data Security Risk Assessment�



�Safety�



Low-line risk assessment









�Operating system for the database�



Configure security



�line�













�Guarantee�



Database system



Safety







Data access control risk assessment









�Access to data







Evaluate permission settings











Data backup risk assessment









��







�Data backup strategy











Preparation status







4.1.3 Security reinforcement











�Over review�



� and �







The way









�Analytical information�



Optimize assets and critical assets



Information



�Relationship�



safety



Holes and Risks





�and targeted�



Security reinforcement in place







Network equipment







safety equipment







Safety system



Wait for the network



Faced security issues are caused by



��



Network Operations Department�



responsibility reinforcement





�Application system�



existence



hole







code







Editing error







Administrator�



�Password







Middleware



Holes and other hosts and applications



The problem is related by the various phases.







Responsible person for reinforcement





�Guidance provided by security experts�



It is recommended to solve the target system



In safety evaluation



found in



Technique



�Security issues





�pair system�



Security configuration is carried out



Transformation





�Eliminate the relationship�



Improper configuration



�appeared�



��











4.1.4 Security



training







To improve safety



Technical personnel safety



Technical competence and credibility of non-security personnel



�Security awareness





�Defensive Workgroup Customization�



Training course content





�Use relevant teaching materials, practical cases and other materials





�Help relevant people�



Improve security awareness





��



Chemical information



�Security Attack and Defense�



knowledge





�In order to better serve in �



Effectively respond to cyberattacks during training











�trainer�



content





�For security�



technical staff







Security administrator conducts security awareness







Safety knowledge







web composition







often







hole







hot



�0day event







Invasion



Procedure











�Aware software phenomena and defense methods�



training





�For non-security�



Technicians secure from PC











Software security







mobile security







daily work



Live and other dimensions



Improve safety awareness



training







4.1.5Model



Attack and defense







After completing security hardening





�for�



Verify the results of security hardening











Test the safety protection system



�strong�



�and effective�









��







organizational model



Attack and defense



Practice safety skills



test







Can





Please model the security company



The attack team obtains information about the target unit from the outside.



Chemical system



Conduct an attack



practice





��



Test



Training target system



protective capabilities





��



Test



�Train the defensive team�



collaborative support capabilities







The attack methods used by the attack team should not affect the normal business of the target unit.





exhibition





�Including but not limited to penetration�



�Test







system







hole attack







fishing



attack/apt�



combined attack







society



�Engineering attacks, etc.







4.1.6 Environment preparation







In cooperation





The scene



Build



Practice centralized monitoring and disposal of the environment







electricity







Network equipment





�Access to the network according to work task assignments





�Guarantee attack and defense�



Practice



normal operation of equipment







4.2 Offensive and defensive drills in progress

The defense working group guides the monitoring analysis team and research and judgment team to maximize their efforts to defend against network attacks from any attacker during the offensive and defensive drills, and monitor the attack status of the target system in real time; immediately notify the defense headquarters of any network security incident to monitor the drill situation in real time

, do a good job in the analysis and judgment of security incidents, form an analysis and disposal report and report it. 4.2.17x24 hours monitoring and early warning. The monitoring and analysis team uses business system access logs and website security monitoring, network security management center, network security situation awareness and other reporting and early warning platforms,

Achieve centralized monitoring of website security. Assign dedicated cloud personnel to conduct real-time analysis and verification of security events on the monitored website. When security incidents occur, they will be immediately reported to the on-site research and disposition team. All monitoring tasks are assigned to persons, and the monitored security events must be retained.

Record, make detailed records of system backup work and faults, and conduct preliminary diagnosis. 4.2.2 Technical analysis. During the offensive and defensive drills, the number of network attacks increased exponentially. However, traditional security threat discovery methods based on black and white lists, signatures, and rules

, can no longer cope with the escalating and targeted network threats during the exercise. Therefore, when the Internet security monitoring platform and security situation awareness detect a security event, the monitoring analysis team must immediately analyze the security event, locate the problem and trace the source. Determine the non-

After a false alarm, the detailed attack path, attack IP, etc. will be fed back to the research and determination team and the defense working group for reporting. After locating the security problem based on the fault description and diagnosis, we will output solution ideas according to the situation and feedback to the research and determination team. Unable to locate the analysis

Problems are directly fed back to the defense working group. 4.2.3 Expert judgment and confrontation with real-time attacks. The biggest security risk during the offensive and defensive drills comes from attacker attacks, especially targeted and persistent attacks. Early detection and containment of targeted attacks

Persistent and persistent attacks are an effective means to avoid external risks. The exercise period is also an active period for illegal hacker organizations. Hacker organizations may disguise themselves as attack teams to attack defensive units. The monitoring analysis team and research and disposition team need to analyze and judge security events in real time.

According to the event characteristics, add corresponding protection strategies to security equipment such as intrusion prevention systems and web application firewalls, and classify illegal attack events for real-time attack countermeasures. 4.2.4 Emergency response and business recovery. The key to successful emergency response is to handle the emergency quickly according to the precautions.

Establish processes to resolve security incidents that have occurred in an orderly manner.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next