CYB 102 - Fundamentals of Cyber Security 3
CYB 102 - Fundamentals of Cyber Security 3
By
Cybersecurity Best Practices
Cyberspace is particularly difficult to secure due to a number of factors:
I. the ability of malicious actors to operate from anywhere in the world
II. the linkages between cyberspace and physical systems,
III. the difficulty of reducing vulnerabilities and consequences in complex cyber
networks.
•Make sure your desktop web browser uses automatic security updates
•Keep your web browser plugins like Flash, Java, etc. updated
2. Use Anti-Virus Protection & Firewall
▪ Anti-virus (AV) protection software has been the most prevalent solution to
fight malicious attacks.
▪ AV software blocks malware and other malicious viruses from entering your
device and compromising your data.
▪ Use anti-virus software from trusted vendors and only run one AV tool on
your device.
Using a firewall is also important when defending your data against malicious
attacks.
▪ A firewall helps screen out hackers, viruses, and other malicious activity that
occurs over the Internet and determines what traffic is allowed to enter your
device.
▪ Windows and Mac OS X come with their respective firewalls, aptly named
Windows Firewall and Mac Firewall. Your router should also have a firewall
built in to prevent attacks on your network.
3. Use Strong Passwords & Use a Password Management Tool
You have probably heard that strong passwords are critical to online security. The truth is
passwords are important in keeping hackers out of your data.
According to the National Institute of Standards and Technology’s (NIST) 2017 new password
policy framework, you should consider:
•Dropping the crazy, complex mixture of upper case letters, symbols, and numbers. Instead,
opt for something more user-friendly but with at least eight characters and a maximum length
of 64 characters.
•The password should contain at least one lowercase letter, one uppercase letter, one number,
and four symbols but not the following &%#@_
•Choose something that is easy to remember and never leave a password hint out in the open
or make it publicly available for hackers to see.
•Reset your password when you forget it. But, change it once per year as a general refresh.
4. Use Two-Factor or Multi-Factor Authentication
• Two-factor or multi-factor authentication is a service that adds additional layers of security
to the standard password method of online identification.
• Without two-factor authentication, you would normally enter a username and password.
• But, with two-factor, you would be prompted to enter one additional authentication
method such as a Personal Identification Code, another password, or even a fingerprint.
• With multi-factor authentication, you would be prompted to enter more than two
additional authentication methods after entering your username and password.
• According to NIST, an SMS delivery should not be used during two-factor authentication
because malware can be used to attack mobile phone networks and can compromise data
during the process.
5. Learn about Phishing Scams – be very suspicious of emails, phone calls, and flyers
In a phishing scheme attempt, the attacker poses as someone or something the sender is not
to trick the recipient into:
• divulging credentials
• clicking a malicious link,
• opening an attachment that infects the user’s system with malware, trojan, or zero-day
vulnerability exploit.
A few important cyber security tips to remember about phishing schemes include:
1. Bottom line – Don’t open emails from people you don’t know.
2. Know which links are safe and which are not – hover over a link to discover where it directs
to
• Be suspicious of the emails sent to you in general – look and see where it came from and if
there are grammatical errors
• Malicious links can come from friends who have been infected too. So, be extra careful!
6. Protect Your Sensitive Personal Identifiable Information (PII)
• Definition: Personal Identifiable Information (PII) is any information that can be used by a
cybercriminal to identify or locate an individual.
• PII includes information such as name, address, phone number, date of birth, Social Security
Number, IP address, location details, or any other physical or digital identity data.
• In the new “always-on” world of social media, you should be very cautious about the
information you include online.
• It is recommended that you only show the very minimum about yourself on social media.
• Consider reviewing your privacy settings across all your social media accounts, particularly
Facebook.
• Adding your home address, birth date, or any other PII information will dramatically increase
your risk of a security breach. Hackers use this information to their advantage!
7. Use Your Mobile Devices Securely
According to McAfee Labs, your mobile device is now a target to more than 1.5 million new
incidents of mobile malware.
3.Keep Your Device Updated – Hackers Use Vulnerabilities in Unpatched Older Operating
Systems
5.Leverage Find my iPhone or the Android Device Manager to prevent loss or theft
6.Perform regular mobile backups using iCloud or Enabling Backup & Sync from Android
8. Backup Your Data Regularly
• Backing up your data regularly is an overlooked step in personal online
security.
• The top IT and security managers follow a simple rule called the 3-2-1
backup rule.
• Essentially, you will keep three copies of your data on two different
types of media (local and external hard drive) and one copy in an off-
site location (cloud storage).
• By using VPN software, the traffic between your device and the VPN
server is encrypted.
• This means it’s much more difficult for a cybercriminal to obtain access
to your data on your device.
• Use your cell network if you don’t have a VPN when security is
important.
10. Review Your Online Accounts & Credit Reports Regularly for
Changes
• With the recent Equifax breach, it’s more important than ever for
consumers to safeguard their online accounts and monitor their credit
reports.
• A credit freeze is the most effective way for you to protect your personal
credit information from cyber criminals right now.
• You can then use this PIN when you need to apply for credit.
Top Causes of Security Breaches
• But, what’s more troubling, these hacking attempts are the result of
human errors in some way.
2. Vulnerability Scan
• Following the discovery stage this looks for known security issues by using automated tools
to match conditions with known vulnerabilities.
• The reported risk level is set automatically by the tool with no manual verification or
interpretation by the test vendor.
• This can be supplemented with credential-based scanning that looks to remove some
common false positives by using supplied credentials to authenticate with a service (such as
local Windows accounts).
3. Vulnerability Assessment
• This uses discovery and vulnerability scanning to identify security vulnerabilities and places
the findings into the context of the environment under test.
• An example would be removing common false positives from the report and deciding risk
levels that should be applied to each report finding to improve business understanding and
context.
4. Security Assessment
• Builds upon Vulnerability Assessment by adding manual verification to confirm exposure,
but does not include the exploitation of vulnerabilities to gain further access.
• Verification could be in the form of authorized access to a system to confirm system settings
and involve examining logs, system responses, error messages, codes, etc.
• A Security Assessment is looking to gain a broad coverage of the systems under test but not
the depth of exposure that a specific vulnerability could lead to.
5. Penetration Test
▪ Penetration test simulates an attack by a malicious party.
▪ Building on the previous stages involves the exploitation of found vulnerabilities to gain
further access.
▪ Using this approach will result in an understanding of the ability of an attacker to gain
access to confidential information, affect data integrity or availability of a service, and the
respective impact.
▪ Each test is approached using a consistent and complete methodology in a way that allows
the tester to use their problem-solving abilities.
▪ The output from a range of tools and their own knowledge of networking and systems to
find vulnerabilities that would/ could not be identified by automated tools.
▪ This approach looks at the depth of attack as compared to the Security Assessment
approach which looks at the broader coverage.
6. Security Audit
• Driven by an Audit / Risk function to look at a specific control or compliance
issue.
7. Security Review
• Verification that industry or internal security standards have been applied to
system components or products.
• This activity does not utilize any of the earlier approaches (Vulnerability
Assessment, Security Assessment, Penetration Test, Security Audit)
Incident Response
• Definition: Incident response is an organized, strategic approach to
detecting and managing cyber attacks in ways that minimize damage,
recovery time, and total costs.
After all, without the right people to support them and put them into practice, security policies,
processes, and tools mean very little.
This cross-functional group consists of people from diverse parts of the organization who are
responsible for completing the steps and processes involved in incident response.
• Telltale markers of an imminent attack include mentions of the organization on the dark
web the registration of similar domain names to be used for phishing attacks, and
confidential information - such as user account credentials - put up for sale.
Cybersecurity Risk Management Strategy
➢ A cybersecurity risk management strategy implements four quadrants that deliver comprehensive
and continuous Digital Risk Protection (DPR).
➢ DRP platforms use multiple reconnaissance methods to find, track, and analyze threats in real-time.
➢ Using both indicators of compromise (IOCs) and indicators of attack (IOAs) intelligence, a DRP
solution can analyze risks and warn of attacks.
• Monitor - Search the public and dark web for threat references to your digital assets. Translate found
threats to actionable intelligence.
• Mitigate - Automated actions to block and remove identified threats to digital assets. Includes
integration with other security initiatives in place.
• Manage - Manage the process used in Map, Manage, and Mitigate quadrants. Enriching IOCs and
prioritizing vulnerabilities in this step is also essential to successful digital risk protection.
What are the Benefits of Cybersecurity Risk Management?
➢ Implementing cybersecurity risk management ensures cybersecurity is not relegated
to an afterthought in the daily operations of an organization.
➢ Having a cybersecurity risk management strategy in place also ensures that
procedures and policies are followed at set intervals and that security is kept up to
date.
➢ Cybersecurity Risk Management provides ongoing monitoring, identification, and
mitigation of the following threats:
▪ Phishing Detection
▪ VIP and Executive Protection
▪ Brand Protection
▪ Fraud Protection
▪ Sensitive Data Leakage Monitoring
▪ Dark Web Activity
▪ Automated Threat Mitigation
▪ Leaked Credentials Monitoring
▪ Malicious Mobile App Identification
▪ Supply Chain Risks
Why is Cybersecurity Risk Management Important?
➢ Cybersecurity risk management is important because it helps a business assess its
current cybersecurity risk profile.
➢ It's essential to have a clear understanding of the risks in your organization and
those that might arise in the future