Defensive Security
If you want to learn security, or if you already are a security professional/engineer, can you answer the following questions on Security? Do you know the answers to the following questions on Security?
True or false, all email servers in the Internet are configured properly?
What can you used to check if an email server is configured properly? What tools, and software?
How will you use? What are the steps that you will follow?
What is MXToolbox?
Is MXToolBox still a good security tool? mxtoolbox.com?
When it comes to email server security can you explain what are the following and how they help in security? or what will you do with them when it comes down to Security?
–Open mail relay, server hello, mail reverse DNS, email aliases/group nesting, DNS Servers?
Is outsourcing email server is a great idea? when, when not? why, why not?
How can you secure a DNS server?
Should you allow DNS recursive queries in your organization’s DNS server?
What does segregation mean when it comes down to DNS servers? How will you use Segregation?
What is an internal DNS server? What is an external DNS server? Will you segregate them from security reasons? Why? Why not? What can go wrong?
What is passive DNS? Is it a good idea to implement passive DNS?
SinkHole DNS and Blackhole DNS what are these?
How can you obscure your organizations internal resources from the outside?
Can you configure your SMTP-SSL of 4043? Is it a good move?
What is logging?
What is monitoring?
What are the Logging software that might be great for security?
Did you use a software tool called Nagios? What is this for? How did you use this? Did you see any flaws? Is it easy to use?
What will you log? and why? What is your experience on your approaches?
Will you log everything or just the required stuff? why, why not? when? can you or will you switch to the other from one? What steps will you follow?
Where will you save/store the log data? and why? what are the risks? What are the related approaches?
What is SIEM?
What are the steps in SIEM?
What is log analysis when it comes down to security? What do you want to get out of Log Analysis?
Can you give the names of some important and/or common logging practices for security purposes?
What are user login logging, repeated login failures, login from unusual places/IPs/locations?
Proxy and Firewall logs — what are these?
What is log aggregation?
How can log help to identify brute force attack, data exfiltration, impossible or unlikely user movements, and ransomware?
What are IDS, IPS, and NIDS?
What are snort, suricata, bro?
What is Host Based IDS? How is it different from NIDS? What will you use and why? Will you use both? What are the drawbacks of each one of them?
Where do you put NIDS and IPS? and why? is there any particular strategy that worked for you?
Give some examples of encrypted protocols? How do they relate to NIDS/IDS/IPS?
What is defensive security?
What is offensive security?
What is purple teaming? What is read team and what is blue team?
What is OSINT i.e. Open Source Intelligence?
What are Dumpster diving, Shoulder surfing? What are the related security concepts?
What does the tool Maltego do? Is there any free version?
What is recon-ng? What is Metasploit? What are the different modules of recon-ng? What do they do? How can you use them for security?
What is the Harvester.py?
What is the Responder tool? hint. NetBios, Link Local Multicast Name Resolution
What is RAWr? What does it stand for?
Rapid Access Web Resources
What is the best programming language considering security i.e. when you are developing for your organization what programming language should you use?
Is PHP a secure programming language? How does it compare with Java or Python or C/C++?
Is security is integral to the programming language? or it might depend on the programmer as well? As PHP might be known to be not-a-very secure language: does it come from PHP or from the programmers who do not implement stuff in PHP considering security?
Can a Java/Python/C/C++ software be less secure than PHP?
What is security testing of a software? How does your organization do it?
What is penetration testing?
What is port scanning?
What is vulnerability scanning?
What is Network segmentation? What does it have to do with Security?
What are Physical and logical segmentation?
What is Demilitarized zone (DMZ)?
How VLANs, ACLs, NACs, VPNs help with security? What are risks/limitations in each cases?
What is SDN? Is it good considering security?
By
Sayed Ahmed
Linkedin: https://ca.linkedin.com/in/sayedjustetc
Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com
If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide
Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz
Hottest Deals on Amazon CA: http://tiny.cc/bgnddz
Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz
Reference: Defensive Security Handbook