Router
Firewall
a firewall is designed to control or filter which communications are allowed in and which are allowed out of a device or network.
-> Network layer Firewall
-> Transport Layer Firewall
-> Application layer Firewall
-> Context aware layer firewall
-> Proxy server
-> Reverse proxy server
-> Network Address translation (NAT) firewall
-> Host-based FirewallIntrusive Prevention System (IPS)
Virtual Private Network (VPN)
Antimalware or Antivirus
Cisco Integrated Services Router (ISR) 4000 - routers
Cisco’s Firepower 4100 Series - firewall
Cisco’s AnyConnect Secure Mobility Client - VPN
Cisco’s Advanced Malware Protection (AMP) - Antimalware
Port Scanning:
An ‘open’ state response means that the service running on the network can be accessed by other networks and if the service does contain a vulnerability, it could be exploited by an attacker who could potentially gain access to computers on the network.
IDS IPS
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are security measures deployed on a network to detect and prevent malicious activities.
Penetration Testing
Planning
Scanning
Gaining Access
Maintaining Access
Analysis and Reporting
Computer Security Incident Response Team (CSIRT) : To help ensure organization, system and data preservation by performing investigations into computer security incidents
Security Information and Event Management (SIEM) : system collects and analyzes security alerts, logs and other real-time and historical data from security devices on the network.
Data Loss Prevention (DLP) : System is designed to stop sensitive data from being stolen from or escaping a network.
Intrusion detection systems (IDS) : scans data against a database of rules or attack signatures, looking for malicious traffic.
Intrusion prevention systems (IPS) : can block or deny traffic based on a positive rule or signature match.
Nmap: tools can be used to provide a list of open ports on network devices
IDS: tool can identify malicious traffic by comparing packet contents to known attack signatures
What protocol is used to collect information about traffic traversing a network? - Netflow