Cybersec 1 2
Cybersec 1 2
1 - Overview of Security:
Security Attacks:
Cloud Security:
Controls inbound and outbound network traffic using predefined security rules.
Prevents malicious traffic from entering the network.
NGFWs can block malware and application-layer attacks.
Detects and prevents network security attacks (e.g., DoS, exploitation of vulnerabilities).
Quickly blocks known vulnerability exploits.
Network Segmentation:
Microsegmentation:
Worms:
Viruses:
Trojan Horse:
Malicious code that deceives users into loading and executing it.
Cannot replicate like viruses or worms.
Allows cybercriminals to perform harmful actions on a computer.
Trap Door:
Countermeasure: Discard packets with TCP protocol and IP Fragment offset equal to 1.
Attackers exploit buffer overflow issues by overwriting an application's memory, changing its execution
path, and causing damage or data exposure.
Stack-based Buffer Overflow: More common, targets stack memory during function execution.
Heap-based Buffer Overflow: Harder to execute, floods memory allocated for a program beyond
current runtime operations.
Attackers can intentionally feed input that overflows the buffer and overwrites memory areas containing
executable code, effectively replacing it with their own instructions.
Intruders are individuals who attempt to breach security, ranging from benign exploration to serious data
theft or system disruption.
Benign Intruders: Explore the internet out of curiosity, consume resources, and may slow system
performance, but not necessarily malicious.
Misfeasors: Authorized users who misuse their granted access and privileges for unauthorized
purposes.
Clandestine Users: Individuals with administrative control who misuse their power, often for
financial gains.
Intruders pose significant security threats by stealing confidential information, selling it to third parties, and
exploiting system vulnerabilities.
Threats to Kill or Physically Injure: Threats to harm individuals, their spouses, children, parents, or
siblings.
Network Taps: Devices used to monitor and access data transmitted over a network, typically for
security and monitoring purposes.
Piracy: The illegal use, copying, modification, distribution, sharing, or selling of copyrighted
computer software. Software piracy is a violation of copyright laws.
2.6 - Firewalls:
A firewall is a network security device, either hardware or software-based, that monitors incoming and
outgoing traffic based on a defined set of security rules. It accepts, rejects, or drops traffic according to these
rules. Key points about firewalls include:
Firewalls create a barrier between secured internal networks and untrusted external networks, such as the
Internet. They serve to protect the internal network from external threats and provide a controlled link.
Firewalls are used to establish an outer security perimeter between the local network and the internet.
They act as a single choke point for security and audit purposes.
Firewalls can be a single system or a set of cooperating systems.
They must be immune to penetration, typically using a trusted system with a secure operating system.
Service Control: Determines the types of internet services that can be accessed, inbound or outbound.
It may filter traffic based on IP address and TCP port number, provide proxy software, or host server
software.
Direction Control: Specifies the direction in which service requests can be initiated and allowed to
flow through the firewall.
User Control: Controls access to services based on the user attempting to access them.
Behavior Control: Regulates how specific services are used.
Capabilities of Firewalls:
Establish a single choke point to keep unauthorized users out, block vulnerable services, and protect
against IP spoofing and routing attacks.
Provide a location for monitoring security-related events, enabling audits and alarms.
Serve as a platform for various non-security-related internet functions.
Be used for IPsec implementations.
Limitations of Firewalls:
Cannot protect against attacks that bypass the firewall via internal systems with dial-out capabilities or
modem pools for dial-in.
Do not protect against internal threats, such as insider attacks.
Cannot prevent the transfer of virus-infected programs or files.
Before firewalls, network security relied on Access Control Lists (ACLs) on routers. ACLs lacked the ability
to determine the nature of blocked packets and couldn't effectively keep threats out of the network. Firewalls
became necessary to secure internal networks from unauthorized traffic.
Working of Firewalls:
The Three D's of Security refer to the strategies used to enhance security:
Deter: The goal is to discourage attacks or threats from happening in the first place. This can be
achieved through visible security measures, policies, and practices that make it less attractive or more
difficult for attackers to target a system or organization.
Detect: This involves identifying and verifying threats as they occur or shortly after. Detection
mechanisms, such as intrusion detection systems (IDS) and security monitoring tools, help in spotting
suspicious or malicious activities.
Delay: Delaying a threat means postponing its impact or the time it takes to reach critical assets. This
provides additional time for response and mitigation. Delay mechanisms can include physical barriers,
access controls, and network segmentation.
By incorporating these three principles into security strategies, organizations aim to reduce vulnerabilities
and enhance their overall security posture.
In the realm of cybersecurity, it's crucial to understand various aspects of attacks, including their tactics,
techniques, and procedures (TTPs). Here's a breakdown:
Tactics: Tactics are the highest-level descriptions of a threat actor's behavior. They represent the
overall goals behind an attack and the general strategies followed to execute that attack. For example,
a tactic might involve infiltrating a website to steal customer credit card information.
Techniques: Techniques provide a more detailed description of the threat actor's actions within the
context of a tactic. These methods outline how the threat actor plans to achieve their goals. Examples
of techniques include e-skimming, magecart attacks, JavaScript injection attacks, or cross-site
scripting (XSS).
Procedures: Procedures are the most detailed level of an attack description. They provide a step-by-
step account of the attack, including the specific tools and methods used to orchestrate it.
Cybersecurity analysts often use an attack's procedures to create profiles or fingerprints for threat
actors or groups.
Understanding these aspects of attacks helps cybersecurity professionals and organizations better prepare for
and defend against various threats.
Website attacks are malicious activities aimed at exploiting vulnerabilities in websites. These attacks can lead
to unauthorized access, data theft, introduction of malicious content, or alteration of a website's content. Here
are some common website attacks:
SQL Injection is an attack that targets a web application's database by manipulating the SQL queries it
sends to the database.
Attackers input malicious SQL statements into web forms or other input fields to exploit
vulnerabilities in the application.
Successful SQLi attacks can result in unauthorized access to data, data theft, and even the
manipulation or deletion of data.
Cross-Site Scripting (XSS) attacks involve injecting malicious scripts into trusted websites.
Attackers insert scripts, often written in JavaScript, into web pages that are then executed by
unsuspecting users.
XSS attacks can steal cookies, change user settings, hijack user sessions, and deface websites,
potentially leading to impersonation and data breaches.
LDAP Injection:
LDAP Injection attacks occur when web applications don't adequately validate user input, creating a
vulnerability that allows unauthorized modifications to LDAP statements.
Attackers can manipulate queries and control their meaning using metacharacters, leading to
unauthorized queries or content modification within the LDAP tree.
LDAP Injection can expose sensitive data, including credentials, roles, permissions, and more.
Injection attacks involve injecting malicious code or commands into web applications.
In Code Injection, attackers exploit vulnerabilities to inject and execute code within the application's
web server.
Command Injection occurs when attackers insert operating system commands that execute on the
host system.
CCS Injection exploits vulnerabilities in the ChangeCipherSpec processing in some versions of
OpenSSL to seize encryption key materials and access communications.
These injection attacks are common and dangerous web threats. They can lead to data breaches, data
manipulation, denial of service (DoS) attacks, and server compromises. Protecting web applications against
these attacks is crucial for maintaining security.