Cyber Security Guide
Cyber Security Guide
Subject
Cyber Security
Vol.01
Empowering Youth!
Cyber Security
Course name:
•
•
Course Id-
•
Candidate Eligibility : Diploma/ Graduate
Course Duration: (In hours) 550
Website : www.stlacad.tech
Let us now see what the sections in the modules have for you.
This section introduces you to the learning objectives and knowledge criteria covered in the module.
It also tells you what you will learn through the various topics covered in the module.
This section provides you with the knowledge to achieve relevant skill and proficiency to perform
tasks of the Cyber Security Professional. The knowledge developed through themodule will enable
you to perform certain activities related to the job market. You should read through the textual
information to develop an understanding on the various aspects of the module before you complete
the exercise(s).
Section 3: Exercises
Each module has exercises, which you should practice on completion of the learning sessions of
the module. You will perform the activities in the classroom, at home or at the workplace. The
activities included in this section will help you to develop necessary knowledge, skills and attitude
that you need for becoming competent in performing the tasks at workplace. The activities should
be done under the supervision of your trainer who will guide you in completing the tasks and also
provide feedback to you for improving your performance.
The review questions included in this section will help you to check your progress. You must be able
to answer all the questions before you proceed to the next module.
CONTENTS
Module 1 Introduction to Cyber Security 1
1.1 Overview of Cyber Security 1
1.2 Cybersecurity Fundamentals 8
1.3 Enterprise Architecture and Components 13
1.4 Information System Governance and Risk Assessment 18
1.5 Incident Management 24
Exercises 33
Assessment Questionnaire 36
MODULE 1
INTRODUCTION TO CYBER SECURITY
Solution
▪ Install a security suite that protects the computer against threats such as viruses and worms.
Hackers
▪ In Common a hacker is a person who breaks into computers, usually by gaining access to
administrative controls.
Types of Hackers
➢ White Hat / Ethical Hackers
➢ Black Hat Hackers
➢ Gray Hat Hackers
➢ Script Kiddies
➢ Green Hat Hackers
➢ Blue Hat Hackers
➢ Red Hat Hackers
➢ State/Nation Sponsored Hackers
➢ Hacktivist
➢ Malicious insider or Whistleblower
▪ Their intentions are noble, but these hackers often take unethical or illegal routes to take down
bad hackers.
Script Kiddies
▪ The Script Kiddies are amateurs types of hackers in the field of hacking.
▪ They try to hack the system with scripts from other fellow hackers.
▪ They try to hack the systems, networks, or websites.
▪ The intention behind the hacking is just to get the attention of their peers.
▪ Script Kiddies are juveniles who do not have complete knowledge of the hacking process.
Hacktivist
▪ These types of hackers intend to hack government websites.
▪ They pose themselves as activists, so known as a hacktivist.
▪ Hacktivists can be an individual or a bunch of nameless hackers whose intent is to gain access
to government websites and networks.
▪ The data gained from government files accessed are used for personal political or social gain.
Malware
▪ The Word “Malware” comes from the term “MALicious softWARE.”Malware is any software that
infects and damages a computer system without the owner’s knowledge or permission.
▪ Malware:
➢ Trojans Trojans
To Stop Malware
▪ Download an anti-malware program that also helps prevent infections.
▪ Activate Network Threat Protection, Firewall, Antivirus.
Trojan Horses
▪ Trojan Horses are email viruses that can duplicate themselves, steal information, or harm the
computer system.
▪ Once inside your device, a Trojan can lay low,
collecting information and setting up holes or
backdoors into your system undetected, or it
may just take over your computer
Unexplained Behavior
▪ Any mysterious increase in CPU usage is definitely a red flag.
▪ If your computer has increased its processing activity for no reason, then a Trojan may be the
reason.
▪ Use your activity monitor to check what is draining your CPU and end the action if you find a
problem.
System Failures
▪ If your system suddenly slows down significantly or starts crashing regularly, then there’s
something wrong.
▪ Use a high-quality security suite to see if you can identify the problem.
Increase in Spam
▪ Pop-ups, annoying adverts, and a general rise in spam on your machine could indicate an
adware Trojan.
▪ This malware type uses infected ads to spread the virus further.
▪ Avoid clicking on anything that looks suspicious!
Unidentified Programs
▪ If you spot an app or program that you didn’t download, it’s a cause for concern.
▪ Google the name to ensure it’s not an important part of the operating system. If it’s not— delete it
immediately!
Use a firewall
▪ Firewalls screen data that enters your device from the internet.
▪ While most operating systems come with a built-in firewall, it’s also a good idea to use a
hardware firewall for full protection.
Securing Password
▪ Use Always Strong Password.
▪ Never use same password for two different sites.
Password Cracking
▪ Password Attacks are attacks by hackers that are able to determine passwords or find
passwords to different protected electronic areas and social network sites.
Identify
▪ Use Organizational Understanding to minimize risk to systems, assets, data and capabilities.
Protect
▪ Design safeguards to limit the impact of potential events on critical services and infrastructure.
Detect
▪ Implement activities to identify the occurrence of a cybersecurity event.
Respond
▪ Take Appropriate action after learning of a security event.
Recover
▪ Plan for resilience and the timely repair of compromised capabilities and services.
Cybersecurity Roles
Governance
▪ It’s the responsibility of the board of directors and senior management of the organization,
provide strategic direction, ensure that objectives are achieved, ascertain whether risk is being
managed appropriately and verify that the organization’s resources are being used responsibly,
are goals of the governance program.
Risk Management
▪ It’s the Process by which an organization manages risk to acceptable levels, it requires the
development and implementation of internal controls to manage mitigate risk throughout the
organization, including financial and investment risk, physical risk and cyber risk.
Compliance
▪ The Act of adhering to mandated requirements defined by laws and regulations, this also include
contractual obligations with clients, partners and internal policies.
▪ Cyber threats are increasingly targeting the core functions of the economies in nations
throughout the world, as well as their governments on local, regional, and national levels.
▪ The potential for cyber-attacks to disrupt critical services of both the private enterprise and
nongovernmental agencies is growing at an alarming rate.
DDoS
▪ Distributed Denial of Service is an attack used by the attacker to send a large number of
requests to the server, network, or website.
▪ These requests normally fill up the servers and networks so that it breaks down. So, attackers
use this simple software to deal with damage to the company.
Phishing
▪ Phishing attacks sends the target to a false website to try and take the confidential data like the
login information or the passwords.
▪ The attackers use this type of attack to get the data related to the networks and to steal the
secret data.
Keylogger
▪ If you download this program, it logs all the system’s keystrokes.
▪ Then the attacking systems get all of these data.
▪ The attacker gets data like passwords, user ids, and so on.
Scareware
▪ It is a program that is created to scare any person and make them buy an anti-virus.
▪ After it is installed, they get a number of messages on the screen. These messages read that
your system is undergoing an attack and makes them go into a panic mode.
▪ It then sends them to a fake website to buy an anti-virus.
Spyware
▪ Attackers use this software to spy on a targeted system or network.
▪ If the attacker is successful at injecting the spyware, then monitoring every activity becomes easy
for the attacker.
▪ The attacker then copies the original activity of the purchase that you do on a daily basis to steal
any important data.
Worms
▪ This program does not cause any harm, but it multiplies on its own.
▪ It is also harmful because it can multiply continuously. So, it eventually takes up more than half of
the space on the hard disk.
▪ The networks and systems gradually slow down because of this.
Virus
▪ It is a harmful software that damages the system and the documents.
▪ This program multiplies in number and spreads through infected files.
▪ It does not need a system that is infected already.
Risk- Based
▪ Risk based security relies on identifying the unique risk a particular organization faces and
designing and implementing security controls to address that risk above and beyond the entity’s
risk tolerance and business needs.
Ad-Hoc
▪ An ad hoc approach simply implements security with no particular rationale or criteria.
▪ Ad hoc implementations may be driven by vendor marketing, or they may reflect insufficient
subject matter expertise, knowledge or training when designing and implementing safeguards.
Risk Treatment
▪ Risk Treatment Options:
➢ Risk Reduction
➢ Risk Retention
➢ Risk Avoidance
➢ Risk Transfer
➢ Residual Risks
Risk Reduction/Mitigation
▪ Implement controls and/or countermeasures
Risk Retention/Acceptance
▪ If the cost of the mitigation controls is higher than the cost the impact the risk represents
Risk Transfer
▪ Purchase insurance to address the risk. which will be transferred 'o the insurance company
Essential Terminologies
Vulnerability
▪ Existence of a weakness, design or implementation error that
can lead to an unexpected event compromising the security of the system
Asset
▪ Anything that represents value for the organization and is worth protecting
Threat
▪ Anything capable of acting against an asset in a manner that can result in harm
Backdoor
▪ A mean of regaining access to a compromised system by installing SW or configuration existing
SE to enable remote access.
Buffer Overflow
▪ When an app tries to store more data in a buffer (temporary data storage area) than it was
designed to hold. this corrupts the app and enables the attacker to introduce or run commands.
DDoS Attack
▪ An assault on a service from different sources that floods the target with so many requests that it
becomes unavailable to anyone.
MitM Attack
▪ The Attacker intercepts the communication stream between 2 parts, the attacker can sniff or
replace the traffic.
Social Engineering
▪ Any attempt to exploit social vulnerabilities to gain access to information systems.
Phishing
▪ The Attacker attempts by email to convince a user that the originator is genuine. but with
malicious intentions to obtaining information.
Exploit
▪ A breach of IT system security through vulnerabilities.
Payload
▪ It is the part of an exploit code that performs that intended malicious action. such as destroying,
creating backdoors, and hijacking computer.
SQL Injection
▪ SQL syntax is used without proper validation as part of SQL queries, this could harm the DB or
even the OS.
Bot
▪ A "bot" is a software application that can be controlled remotely to execute or automata
predefined tasks.
Zero-Day Attack
▪ An Attack that exploits computer application vulnerabilities before the software developer
releases a patch for the vulnerability.
XSS
▪ Cross-site scripting, malicious scripts are injected into benign and trusted websites
<script>alert("PW ND") </script>
APT
▪ Advance Persistent Threats are complex and coordinated attacks directed at a specific target,
they require enormous research and time.
Spoofing
▪ Faking the Sending address to gain illegal entry into a system.
Benefits
▪ By deploying an enterprise cyber security architecture with an ELA, an organization can achieve
significant benefits, including:
Lower TCO
▪ An integrated security architecture with an ELA eliminates overlapping and underutilized security
tools. Additionally, with an ELA, an organization may have access to competitive pricing and
discounts.
Operational Efficiency
▪ An enterprise security architecture is composed of solutions that are designed to work together to
provide the organization with comprehensive protection against threats.
▪ By eliminating security gaps and overlapping solutions and simplifying security monitoring and
management, an enterprise security architecture increases the efficiency of the corporate
security architecture and SOC.
Guidance
▪ The policies and procedures that act as the guidance should be design and implement properly.
▪ The policies should include the documentation that includes the objectives and goals for
designing the architecture, standards, policies, rules and regulations for the organization,
identification of scope and function, identification of other security policies.
Identity Management
▪ It is the type of system that include the organization processes, technologies and policies that
directly help users to gain access to the online applications and other network resources.
▪ For the organization, the proper responsibilities and roles need to be clearly stated, and
individual tasks need to be designed for the employees.
Validation of Architecture
▪ As the technology advances, the company need to renew the policies and laws as per the
changes, and continuous effort is needed by the organization in this change.
▪ For that, the continuous monitoring is required, and according to that, proper changes can be
made in the architecture.
Training
▪ As for the organization, to maintain the privacy and integrity, the security architecture system is
very important.
▪ As there is a continuous change in the system, it becomes important that the employee should
know about the changes and proper training is given to them so that they can use the system
and protect the company assets and elements.
Technology
▪ To reinforce the security architecture, the software and hardware used for making the
architecture become very crucial for the organization.
▪ Because of continuous change in technology, there is a requirement of continuous change in the
system so that the system can be up to date and help to make the system secure and private.
Enterprise Frameworks
▪ Following Enterprise frameworks, such as can help achieve goals of aligning security needs with
business needs.
➢ Sherwood Applied Business Security
Architecture (SABSA)
➢ COBIT
➢ The Open Group Architecture Framework
(TOGAF)
SABSA
▪ SABSA is a business-driven security framework
for enterprises that is based on risk and
opportunities associated with it.
▪ SABSA does not offer any specific control and
relies on others, such as the International Organization for Standardization (ISO) or COBIT
processes.
▪ It is purely a methodology to assure business alignment.
▪ The SABSA methodology has six layers (five horizontals and one vertical).
▪ Each layer has a different purpose and view.
▪ The contextual layer is at the top and includes business requirements and goals.
▪ The second layer is the conceptual layer, which is the architecture view.
COBIT
▪ COBIT 5, from ISACA, is “a comprehensive framework that assists enterprises in achieving their
objectives for the governance and management of enterprise IT.”
▪ This framework includes
tool sets and processes
that bridge the gap
between technical issues,
business risk and process
requirements.
▪ The goal of the COBIT 5
framework is to “create
optimal value from IT by
maintaining a balance
between realising benefits
and optimising risk levels
and resource use.”
▪ COBIT 5 aligns IT with business while providing governance around it.
▪ The COBIT 5 product family has a lot of documents to choose from, and sometimes it is tough to
know exactly where to look for specific information.
▪ COBIT Enablers are factors that, individually and collectively, influence whether something will
work.
▪ The COBIT framework is based on four principles.
▪ Applying those principles to any architecture ensures business support, alignment and process
optimization.
▪ COBIT 5 Principles:
➢ Meeting Stack holder Needs
➢ Covering the Enterprise End-to-end
➢ Applying a Single Integrated
Framework
➢ Enabling a Holistic Approach
▪ By using a combination of the SABSA
frameworks and COBIT principles,
enablers and processes, a top-down
architecture can be defined for every
category.
▪ As an example, when developing
computer network architecture, a top-down approach from contextual to component layers can
be defined using those principles and processes.
TOGAF
▪ TOGAF is a framework and a set of supporting tools
for developing an enterprise architecture.
▪ The TOGAF architecture development cycle is great
to use for any enterprise that is starting to create an
enterprise security architecture.
▪ Similar to other frameworks, TOGAF starts with the
business view and layer, followed by technology and
information.
▪ TOGAF is a useful framework for defining the
architecture, goals and vision; completing a gap
analysis; and monitoring the process.
▪ By using SABSA, COBIT and TOGAF together, a
security architecture can be defined that is aligned
with business needs and addresses all the
stakeholder requirements.
▪ After the architecture and the goals are defined, the
TOGAF framework can be used to create the projects and steps, and monitor the implementation
of the security architecture to get it to where it should be.
Risk Assessment
Strategy
▪ Information security
should align with business objectives.
▪ IT strategic plans need to satisfy the current and future business requirements.
▪ The goal of information security governance is to align business and IT strategies with
organizational objectives
Implementation
▪ Information security governance requires commitment, resources, assignment of responsibilities,
and implementation of policies and procedures that address the controls within a chosen
framework.
▪ Buy-in from senior management and above is critical to the implementation of the program.
Operation
▪ It’s important that adequate
resources are in place, projects that
align with your overall strategy are
deployed, and operational and
technology risks are addressed and
mitigated to appropriate levels.
Monitoring
▪ Metrics and monitoring help document the effectiveness of the program, provide information to
help management make decisions, address any compliance issues, and establish information
security controls with a more proactive approach.
Risk assessment
▪ The process of identifying,
analyzing, and evaluating risk
is the only way to ensure that
the cybersecurity controls are
appropriate to the risks that
an organization faces.
▪ Without a risk assessment to
inform cybersecurity choices,
one could waste time, effort
and resources – there is, after
all, little point implementing
measures to defend against
events that are unlikely to occur or won’t have much material impact on an organization.
Organizations must
▪ Establish and maintain certain information security risk criteria
▪ Ensure that repeated risk assessments “produce consistent, valid and comparable results”
▪ Identify “risks associated with the loss of confidentiality, integrity and availability for information
within the scope of the information security management system”, and identify the owners of
those risks
▪ Analyze and evaluate information security risks, according to the criteria established earlier
▪ It is important that organizations “retain documented information about the information security
risk assessment process” so that they can demonstrate that they comply with these
requirements.
▪ They will also need to follow a number of steps – and create relevant documentation – as part of
the information security risk treatment process.
▪ ISO 27005 provides guidelines for information security risk assessments and is designed to
assist with the implementation of a risk-based ISMS (information security management system).
2.Value Delivery
▪ Ensures the delivery of strategic benefits, with cost optimization and the intrinsic value of IT.
3. Resource Management
▪ Investment optimization and management of critical IT resources such as Applications,
Information, Infrastructure, and People.
4. Risk Management
▪ Understanding the corporate appetite for risk, regulatory compliance requirements, and
transparency. Understanding of the significant risks to the business and implementing risk
management responsibilities within the organization.
5. Performance Measurement
▪ Monitor implementation strategies, project closures, and resource utilization. Perform the process
of delivering IT services in a Balanced Scorecard framework that transforms strategy into
effective action, for achieving measurable objectives (indicators).
Incident Management
▪ In the field of cybersecurity, incident management can be defined as the process of identifying,
managing, recording, and analyzing the security threats and incidents related to cybersecurity in
the real world.
▪ Good incident management can reduce the adverse effects of cyber destruction and can prevent
a cyber-attack from taking place.
▪ It can prevent the compromising of a large number of data leaks.
▪ An organization without a good incident response plan can become a victim of a cyber-attack in
which the data of the organization can be compromised at large.
▪ An incident is an unexpected disruption to a
service.
▪ It disturbs the normal operation thus
affecting end user’s productivity.
▪ An Incident may be caused due to an asset
that is not functioning properly or network
failure.
▪ Examples of Incidents include printer issue,
wifi connectivity issue, application lock issue,
email service issue, laptop crash, AD
authentication error, file sharing issue etc.
▪ Incident Management restores normal service operation while minimizing impact to business
operations and maintaining quality.
▪ An incident, by definition, is an occurrence that can disrupt or cause a loss of operations,
services, or functions.
Incident vs Problem
▪ A Problem is a series of incidents with an unknown root cause, whereas incident arises as soon
as something breaks or stops working disrupting normal service.
▪ Incident handling is usually a reactive process whereas problem management is more proactive.
▪ Incident management system aims at restoring services quickly whereas problem management
aims at finding a permanent fix.
Prevention of Incidents
▪ Once incidents are identified and mitigated, knowledge of those incidents and necessary
responses can be applied to future incidents for faster resolution or all-around prevention.
▪ Increase incident deflection rate by reducing tickets and call volumes using self-service portals
and ServiceNow chatbots employees are able to find answers on their own before needing to log
an incident, effectively preventing issues before they impact users with AIOps.
Incident Response
▪ Always make a habit of collecting evidence and analyze forensics which is a necessary part of
incident response. For these circumstances, the following things are needed.
➢ A well-defined policy to collect evidence to ensure that it is correct and very much sufficient
to make it admissible in the Court of Law.
➢ It is also importantly needed to have the ability to employ forensics as needed for analysis,
reporting, and investigation.
➢ The personnel of the IRT must be trained in cyber forensics, functional techniques and
would also have some knowledge in the legal and governance.
Endpoint protection
▪ An endpoint is a device that is connected to your organization's network, such as laptops,
smartphones, etc.
▪ Each of these devices is a potential entry point for cybercriminals. Therefore, it is important that
all of those devices are adequately protected.
Detection Tools
▪ Each detection tool (e.g. IDS) has a specific purpose and is able to monitor from a different
perspective: network-based or host-based.
▪ Given the variety of different threats, the tools should be using and be tuned to the correct inputs.
Categories of Incidents
4. Incident Prioritization
▪ The proper priority can have a direct impact on the SLA of an incident response, ensuring that
business-critical issues are addressed on time and neither customers nor employees experience
any lapse in service.
Situational Awareness
▪ After the detection of an incident, it is essential to collect all available information on the activities
around the incident’s timeframe.
▪ Central collection and archiving of security information (e.g. system logs, firewall policy logs)
provides the analyst with easy access to this information.
▪ Important factors to take into account are integrity of the information and indexation.
Step-1
▪ The process of incident management starts with an alert that reports an incident that took place.
▪ Then comes the engagement of the incident response team (IRT). Prepare for handling
incidents.
Step-2
▪ Identification of potential security incidents by monitoring and report all incidents.
Step-3
▪ Assessment of identified incidents to determine the appropriate next steps for mitigating the risk.
Step-4
▪ Respond to the incident by containing, investigating, and resolving it (based on the outcome of
step 3).
Step-5
▪ Learn and document key takeaways from every incident.
Section 3: Exercises
b) AI
c) Database
d) Attacks
10. What does the World Economic Forum regard as one of the top 5 risks confronting nations of
the world today?
a) World Hunger
b) Threat of Nuclear War
c) Rise of sentient technology
d) Cybersecurity
11. What is a pertinent factor that must be taken into cybersecurity concerns?
a) Financial loss
b) Data Leaks
c) Privacy
d) World War
12. What are the concerns that private and governmental agencies face on an ongrowing basis?
a) Disruption of operations
b) Disruption of services
c) Freezing of assets
d) Hacking
Questions
1. What are the types of Hackers?
2. ________ are email viruses that can duplicate themselves, steal information, or harm the
computer system.
3. How to spot Trojans?
4. How to protect from Trojans?
5. What is Cyber Security?
6. __________ is an attack used by the attacker to send a large number of requests to the server,
network, or website.
7. The attackers use ______ attack to get the data related to the networks and to steal the secret
data.
8. If you download _____ program, it logs all the system’s keystrokes.
9. _______ is a program that is created to scare any person and make them buy an anti-virus.
10. If the attacker is successful at injecting the spyware, then monitoring every activity becomes
easy for the attacker. (True/False)
11. ____ is harmful because it can multiply continuously. So, it eventually takes up more than half
of the space on the hard disk.
12. What is a mean of regaining access to a compromised system by installing SW or configuration
existing SE to enable remote access?
MODULE 2
DESIGN SYSTEMS TO SECURE APPLICATIONS, NETWORKS & DEVICES
Internet
CLIENT
▪ Knows how to communicate with a particular type of server to use the information stored on that
server.
SERVER
▪ Handles requests for data, email, file transfer, and other network services. It stores information to
be used by clients.
What is IP Address?
▪ Internet Protocol (IP) address a unique string of characters that identifies each computer using
the Internet Protocol to communicate over a network.
▪ Number that uniquely identifies each computer device connected to the internet
▪ Four groups of numbers, separated by a dot
▪ Number in each group is between 0 and 255
▪ Ex. 74.125.71.103
Broadband
“Broadband is defined as a high bandwidth connection to the Internet. Broadband is easier and
faster to use than the traditional telephone and modem as information can be sent and downloaded
much quicker”
▪ Broadband speed is measured in megabits per second (Mbps)
▪ File sizes are measured in megabytes (MB) or gigabytes (GB)
▪ There are 8 bits in a byte (10101010)
▪ A download speed of 8 bits will shift 1MB per second
Mbps vs MBPS
▪ Mbps is used to specify Internet connection speeds, whereas MBps is used to specify how much
of a file is downloaded/uploaded per second.
▪ Mbps vs. MBps. Mbps: (Small "b") A megabit per second (Mbit/s or Mbps) is a unit of data
transfer rate equal to 1,000,000 bits per second or 1,000 kilobits per second.
▪ 8 Megabits per second is equivalent to 1 Megabyte per second (i.e., 8 Mbps = 1 MBps).
Switches
▪ Switches are the foundation of most business
networks.
▪ A switch acts as a controller, connecting computers,
printers, and servers to a network in a building or a
campus.
▪ Switches allow devices on your network to
communicate with each other, as well as with other
networks, creating a network of shared resources.
▪ Through information sharing and resource allocation, switches save money and increase
productivity.
▪ There are two basic types of switches to choose from as part of your networking basics: on-
premises and cloud-managed.
➢ On-Premises
➢ Cloud-Managed
On-premises
▪ A managed on-premises switch lets you configure and monitor your LAN, giving you tighter
control of your network traffic.
Cloud-Managed
▪ Have a small IT team? A cloud-managed switch can simplify your network management. You get
a simple user interface, multisite full-stack management, and automatic updates delivered
directly to the switch.
Routers
▪ Routers connect multiple networks together.
Wireless Networking
▪ To create your wireless network, you can choose between three types of deployment:
1. Centralized Deployment
2. Converged Deployment
3. Cloud-based Deployment
1. Centralized Deployment
▪ Centralized deployments are traditionally used in campuses where
buildings and networks are in close proximity.
▪ This deployment consolidates the wireless network, which makes
upgrades easier and facilitates advanced wireless functionality.
▪ Controllers are based on-premises and are installed in a centralized
location.
2. Converged Deployment
▪ For small campuses or branch offices, converged deployments offer consistency in wireless and
wired connections.
▪ This deployment converges wired and wireless on one network device—an access switch—and
performs the dual role of both switch and wireless controller.
3. Cloud-based Deployment
▪ This system uses the cloud to a manage network devices deployed on-premises at different
locations.
▪ The solution requires Cisco Meraki cloud-managed devices, which provide full visibility of the
network through their dashboards.
Firewalls
▪ A firewall is a network security device that monitors incoming and outgoing network traffic and
decides whether to allow or block specific traffic based on a defined set of security rules.
▪ Firewalls have been a first line of defence in network security for over 25 years.
▪ They establish a barrier between secured and controlled internal networks that can be trusted
and untrusted outside networks, such as the Internet.
▪ A firewall can be hardware, software, or both.
▪ A personal firewall is software that runs on the user’s workstation and blocks incoming and
outgoing LAN traffic.
▪ When used properly, a personal firewall can be much more effective than a perimeter firewall in
protecting the user’s workstation.
▪ With regard to traffic in and out of a user’s workstation, the perimeter firewall configuration is
usually very general.
▪ A properly configured personal firewall can be very specific to a user’s need for LAN traffic.
▪ The proper way to configure a personal firewall is to block everything in and out of the
workstation.
▪ As the user encounters warnings of attempted activity that has been blocked, the user can
choose to permit that traffic.
▪ In a short period of time, the user will have unblocked the majority of the needed traffic to and
from the LAN.
▪ The configuration of the personal firewall now represents the user’s very specific needs.
Hardware Firewalls
▪ Example of hardware firewalls are routers through which the network is connected to the network
outside the organization i.e., Internet.
Software Firewalls
▪ These firewalls are installed and installed on the server and client machines, and it acts as a
gateway to the organizations‟ network.
▪ The firewalls are an essential component of the organizations‟ network.
▪ They not only protect the organization against the virus and other malicious code but also
prevent the hackers to use your network infrastructure to launch DOS attacks.
▪ The firewalls can be configured to follow “rules” and “policies” and based on these defined rules
the firewalls can follow the following filtering mechanisms.
▪ The firewalls can be configured to follow “rules” and “policies” and based on these defined rules
the firewalls can follow the following filtering mechanisms.
Proxy
▪ All the outbound traffic is routed through proxies for monitoring and controlling the packets that
are routed out of the organization.
Packet Filtering
▪ Based on the rules defined in the policies each packet is filtered by their type, port information,
and source & destination information. The example of such characteristics is IP address, Domain
names, port numbers, protocols etc. Basic packet filtering can be performed by routers.
Stateful Inspection
▪ Rather than going through all the field of a packet, key features are defined. The
outgoing/incoming packets are judged based on those defined characteristics only.
Detection
▪ Detection is the key to good security
▪ Detection requires a lot of time and resources because you are aiming at an ever-changing
target.
▪ Most companies prefer to install a firewall, say they are secure, and forget about it, but this leads
to a false sense of security, which most people would argue is worse than having no security at
all.
▪ If companies really want to be secure, they need to realize that setting up systems to prevent
breaches is only half the battle.
Type of attacks
▪ The following list of the types of network-based attacks occurring on the Internet:
Active Attacks
➢ Denial of service
➢ Breaking into a site
➢ Intelligence gathering
➢ Resource usage
➢ Deception
Passive Attacks
➢ Sniffing
➢ Passwords
➢ Network traffic
➢ Sensitive information
➢ Information gathering
LAN Security
▪ A LAN is a private network which makes it quite secure and reliable for use in companies and
businesses.
▪ It can hold off any outside interference with the network.
▪ A LAN can operate at a comparatively higher level than other kinds of wide area networks.
PRE-CONNECT
▪ The Pre-Connect process PREVENTS unauthorized access to the network by non-compliant
endpoints.
▪ Within Pre-Connect there are 3 requirements that must be met before a user is allowed on the
network:
(i) Safe
▪ scan the endpoint to check for AV, OS & Spyware updates
(ii) Authenticated
▪ verify user credentials with AAA infrastructure
(iii) Authorized
▪ Create a binding of User ID, Mac and IP address and retrieve group membership from AAA or
Directory service
POST-CONNECT
▪ The Post-Connect process includes user access CONTROL and DETECTs threats and other
malware.
▪ CONTROL – and monitor user activity through simple, automated creation of policies for each
user based on their role in the organization and group memberships in existing AAA and
directory infrastructure.
▪ Quarantine and/or Alert inappropriate access on a per flow basis in line with company policies.
▪ DETECT – threats on the network at wire speed by inspecting every packet looking for known
signatures and anomalies in every flow to and from the user. Quarantine and/or Alert on a per
flow basis in line with company policies.
▪ You want hardware stored in a controlled room or locked office where a member of the
organization can keep an eye on it.
▪ An extra precaution would be to monitor the hardware with a security camera.
Categories
▪ Basically, IDSs are classified under the following categories:
1. Host-based intrusion detection systems
Host-based IDSs are designed to monitor, detect, and respond to activity and attacks on a given
host. In most cases, attackers target specific systems on corporate networks that have confidential
information.
▪ Frequently, intrusion detection systems have difficulty in working with encrypted information and
traffic from virtual private networks.
▪ Corporate networks can be spread over great distances. Some attacks target an organization’s
entire network spread over such big dimensions.
▪ Distributed systems could be integrated for performance and operations under such
environments.
NetworkAccess Control
▪ Network Access Control (NAC) is a cybersecurity technique that prevents unauthorized users
and devices from entering private
networks and accessing sensitive
resources.
▪ Also known as Network Admission
Control, NAC first gained a
foothold in the enterprise in the
mid-to-late 2000s as a way to
manage endpoints through basic
scan-and-block techniques.
▪ As knowledge workers became
increasingly mobile, and as BYOD
(bring your own device) initiatives
spread across organizations, NAC solutions evolved to not only authenticate users, but also to
manage endpoints and enforce policies.
▪ Essentially, IPs are used by almost all types of applications, which makes them a highly suitable
medium for incorporating security-related protocols.
IPSec-based encryption schemes provide many different security features, including the
following:
➢ Confidentiality
➢ Authentication
➢ Data integrity
➢ Protection against data replay attacks
▪ Because IPSec provides for connection-oriented networks, unlike the conventional Internet
Protocol, which is basically a connectionless protocol, a trusted key management facility has to
be present for IPSec communication to take place effectively.
▪ Protocols such as the Internet Security Association, Key Management Protocol, and the Internet
Key Exchange Protocol address the issues related to key management.
2. Economy of Mechanism
▪ This Principle aims to make the security mechanisms as basic as possible by simplifying the
design and implementation of the same.
▪ The idea behind this principle is that the smaller the design, the fewer are the occurrences of the
error. This in turn reduces the load in the testing phase.
▪ The interfaces between the Lessons are prone to more vulnerabilities.
▪ This is because it handles many assumptions about the data flowing in as input and the data
flowing out as output.
▪ A simpler security framework eliminates confusion and provides better clarity to the development
team.
4. Fail-safe Defaults
▪ The idea behind fail-safe defaults is that, when a system fails, it should still be able to maintain a
secure state.
▪ This is typically done by denying access to any object outside the scope during downtime.
▪ This protocol drives the system to undo any changes on failure and restore to a secure state.
▪ This way attackers are not able to gain access to the privileged objects that are normally
vulnerable during a failure.
▪ Hence the integrity and confidentiality of the system are still in good shape even though the
availability of the system has been compromised.
5. Network Security
▪ Network security serves as a foundation to establish policies and architectures for maintaining a
secure network.
▪ It reduces the risk of becoming a victim in cyberspace.
▪ It nails down a framework through which the data flowing into the system and out from the
system should pass through.
▪ This helps us cut down any threats entering via the network before reaching the system and vice
versa.
▪ Firewalls help to filter any virus that is trying to enter into the system perimeter.
▪ Similarly, filters prevent malware from sending out infected data to other nodes in the network.
7. Open Design
▪ It states that the security of a mechanism should not completely rely on the secrecy of its design
or implementation.
▪ If a mechanism completely relies on secrecy to protect data, it becomes completely vulnerable
and wide open to attack when the secrecy breaks. Open security protects the system
components with methods whose designs are publicly available.
▪ This strengthens the secrecy of the key by implementing cryptographic methods for encryption.
▪ Maintain different levels of security to ensure secrecy of key and allow only authorized users to
see the key.
8. Monitoring
▪ Monitoring gives complete visibility over the security activities happening across the organization.
▪ It comes as a savior to rescue our system when intrusion detection and prevention facilities fail to
handle a security breach.
▪ An organization achieves this by framing a monitoring strategy with backing up policies.
▪ It involves monitoring individual systems, user activities, decluttering, and finally reviewing and
recording the lessons learned.
9. Complete Mediation
▪ This principle makes sure that every user who gets object access must be an authorized user.
▪ It sets up a fool-proof protection scheme that checks the compliance behind requests to every
object.
▪ The system must improve performance by remembering the results of previous authorization
checks and update the permissions systematically.
▪ It also involves operations like initialization, recovery, shutdown, and maintenance.
▪ Timed sessions for online transactions are a great example of complete mediation.
▪ This makes it necessary to establish risk-based policies for the company to support home and
mobile networking.
▪ These policies prevent the loss of information which is critical to the organization.
Data Classification
▪ Data classification is broadly defined as the process of organizing data by relevant categories so
that it may be used and protected more efficiently.
▪ On a basic level, the classification process makes data easier to locate and retrieve.
▪ Data classification is of particular importance when it comes to risk management, compliance,
and data security.
▪ Data to make it easily searchable and trackable.
▪ It also eliminates multiple duplications of data, which can reduce storage and backup costs while
speeding up the search process.
▪ Though the classification process may sound highly technical, it is a topic that should be
understood by your organization’s leadership.
Disaster Recovery
▪ Disaster recovery is all about making sure your business can continue operating with minimal
losses in the event of a disaster.
▪ Cybersecurity disaster recovery focuses explicitly on disasters resulting from cyber threats, such
as DDoS attacks or data breaches.
▪ Your recovery plan will detail the steps your organization needs to take to stop losses, end the
threat, and move on without jeopardizing the future of the business.
▪ These are some of the biggest goals you’ll need to achieve with any plan you develop.
2. Data protection
▪ You’ll also need to think about protecting your data.
▪ This includes minimizing data accessibility to hackers, reducing the threat of data loss, and
making it possible to back up your data when the threat is over.
3. Loss minimization
▪ Businesses can suffer various other losses and forms of damage in the wake of a disaster.
▪ These include financial losses, legal ramifications, and reputational blows. Therefore, part of your
disaster recovery plan needs to focus on minimizing these losses.
4. Communication
▪ You also need to think about how you will communicate this disaster, both internally and
externally.
▪ How will you make sure all your staff members are up-to-date about what has happened? And
how are you going to break the news to stakeholders?
5. Restoration
▪ Once the threat has been mitigated or completely ended, you can focus on restoration.
▪ What steps do you need to take to restore your systems back to normal, and what’s the fastest
and most efficient path to do this?
6. Improvements
▪ Every disaster recovery plan should also have a phase documented for reflection and
improvement.
▪ Why did this threat jeopardize your business? What did you do right? What did you do wrong?
And what improvements can you make in the future?
Cyber Forensics
▪ Cyber forensics means investigating, gathering, and analyzing information from a computer
device which can then be transformed into hardware proof to be presented in the court regarding
the crime in question.
▪ A very important aspect of the investigation is making a digital copy of the storage cell of the
computer and further analyzing it so that the device itself doesn’t get violated accidentally during
the whole process.
▪ The aim is to only find malware in the software part of the device and leave the actual component
of it on one side.
▪ While studying the entry and exit points of the device’s storage, one can easily and efficiently
learn about the individuals who accessed the device and the circumstances under which the logs
were made which in turn gives a crystal-clear picture of what happened and at what date and
time.
▪ Cyber forensics is an unavoidable force that is extremely significant in today’s everchanging,
evolving, and technologically transforming world.
▪ Cyber forensic is a branch of science which deals with tools and techniques for investigation of
digital data to find evidences against a crime
which can be produced in the court of law.
▪ It is a practice of preserving, extracting, analysing
and documenting evidence from digital devices
such as computers, digital storage media,
smartphones, etc. so that they can be used to
make expert opinion in legal/administrative
matters.
▪ The computer forensic plays a vital role in an
organization as the our dependency on computing
devices and internet is increasing day-by-day.
▪ Digital forensic investigation is a highly skilled task which needs the expose of various tools,
techniques and guidelines for finding and recovering the digital evidences from the crime scene
or the digital equipment used in the crime.
▪ With digital equipment like smartphone, tablets, palmtops, smart tv, etc having increasing
processing capabilities and computation speed, the possibility of use of these devices in cyber
crime cannot be ruled out.
▪ A forensic investigator must not only have deep understanding of the working of these devices
and also hands-on exposure to the tools for accurate data retrieval so that the value and integrity
of the data is preserved.
▪ An experienced computer forensic investigator plays a crucial role in distinguishing direct and
indirect attack.
▪ Computer forensic experts are also useful for recovery of accidental data loss, to detect industrial
espionage, counterfeiting, etc
Types
Database forensics
▪ The examination of information contained in databases, both data and related metadata.
Email forensics
▪ The recovery and analysis of emails and other information contained in email platforms, such as
schedules and contacts.
Malware forensics
▪ Sifting through code to identify possible malicious programs and analyzing their payload. Such
programs may include Trojan horses, ransomware or various viruses.
Memory forensics
▪ Collecting information stored in a computer's random access memory (RAM) and cache.
Mobile forensics
▪ The examination of mobile devices to retrieve and analyze the information they contain,
including contacts, incoming and outgoing text messages, pictures and video files.
Network forensics
▪ Looking for evidence by monitoring network traffic, using tools such as a firewall or intrusion
detection system.
▪ In large organization, as soon as a cyber crime is detected by the incident handling team, which
is responsible for monitoring and detection of security event on a computer or computer network,
initial incident management processes are followed.
This is an in-house process. It follows following steps:
➢ Preparation
➢ Identification
➢ Containment
➢ Eradication
➢ Recovery
Preparation
▪ The organization prepares guidelines for incident response and assigns roles and the
responsibilities of each member of the incident response team.
▪ Most of the large organizations earn a reputation in the market and any negative sentiment may
negatively affect the emotions of the shareholders.
▪ An effective communication is required to declare the incident. Hence, assigning the roles based
on the skill-set of a member is important.
Identification
▪ Based on the traits the incident response team verifies whether an event had actually occurred.
▪ One of the most common procedures to verify the event is examining the logs.
▪ Once the occurrence of the event is verified, the impact of the attack is to be assessed.
Containment
▪ Based on the feedback from the assessment team, the future course of action to respond to the
incident is planned in this step.
Eradication
▪ In this step, the strategy for the eradication or mitigate of the cause of the threat is planned and
executed.
Recovery
▪ It is the process of returning to the normal operational state after eradication of the problem.
Lesson Learned
▪ If a new type of incident is encounter, it is documented so that this knowledge can be used to
handle such situations in future.
Investigate
▪ The image of the disk is restored from the backup and the investigation is performed by
reviewing the logs, system files, deleted and updates files, CPU uses and process logs,
temporary files, password protected and encrypted files, images, videos and data files for
possible stenographic message, etc.
Web-Based Attacks
These are the attacks which occur on a website or web applications. Some of the important web-
based attacks are as follows-
➢ Injection attacks
➢ DNS Spoofing
➢ Session Hijacking
➢ Phishing
➢ Brute force
➢ Denial of Service
➢ Dictionary attacks
➢ URL Interpretation
➢ File Inclusion attacks
➢ Man in the middle attacks
1. Injection attacks
▪ It is the attack in which some data will be injected into a web application to manipulate the
application and fetch the required information.
▪ Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
▪ DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS
resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the
attacker’s computer or any other computer.
▪ The DNS spoofing attacks can go on for a long period of time without being detected and can
cause serious security issues.
3. Session Hijacking
▪ It is a security attack on a user session over a protected network.
▪ Web applications create cookies to store the state and user sessions.
▪ By stealing the cookies, an attacker can have access to all of the user data.
4. Phishing
▪ Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number.
▪ It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.
5. Brute force
▪ It is a type of attack which uses a trial-and-error method.
▪ This attack generates a large number of guesses and validates them to obtain actual data like
user password and personal identification number.
▪ This attack may be used by criminals to crack encrypted data, or by security, analysts to test an
organization's network security.
6. Denial of Service
▪ It is an attack which meant to make a server or network resource unavailable to the users.
▪ It accomplishes this by flooding the target with traffic or sending it information that triggers a
crash.
▪ It uses the single system and single internet connection to attack a server. It can be classified
into the following-
Volume-based attacks
▪ Its goal is to saturate the bandwidth of the attacked site and is measured in bit per second.
Protocol attacks
▪ It consumes actual server resources and is measured in a packet.
7. Dictionary attacks
▪ This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
▪ It is a type of attack where we can change the certain parts of a URL, and one can make a web
server to deliver web pages for which he is not authorized to browse.
System-Based Attacks
▪ These are the attacks which are intended to compromise a computer or a computer network.
Some of the important system-based attacks are as follows-
➢ Virus
➢ Worm
➢ Trojan horse
➢ Backdoors
➢ Bots
1. Virus
▪ It is a type of malicious software program that spread throughout the computer files without the
knowledge of a user.
▪ It is a self-replicating malicious computer program that replicates by inserting copies of itself into
other computer programs when executed.
▪ It can also execute instructions that cause harm to the system.
2. Worm
▪ It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers.
▪ It works same as the computer virus.
▪ Worms often originate from email attachments that appear to be from trusted senders.
3. Trojan horse
▪ It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle.
▪ It misleads the user of its true intent.
▪ It appears to be a normal application but when opened/executed some malicious code will run in
the background.
4. Backdoors
▪ It is a method that bypasses the normal authentication process.
▪ A developer may create a backdoor so that an application or operating system can be accessed
for troubleshooting or other purposes.
5. Bots
▪ A bot (short for "robot") is an automated process that interacts with other network services.
▪ Some bots’ programs run automatically, while others only execute commands when they receive
specific input.
▪ Common examples of bots’ program are the crawler, chatroom bots, and malicious bots.
Purpose of DNS
▪ Domains are “namespaces”
▪ Everything below .com is in the com domain.
▪ Everything below ripe.net is in the ripe.net domain and in the net domain.
▪ The Domain Name System matches domain names, like cloudflare.com, to IP addresses, like
192.0.2.24.
▪ DNS is necessary in order to allow users to
access websites without memorizing
confusing lists of numbers – just as a
person is able to store their friends' phone
numbers in their smartphone contacts list
instead of memorizing every individual
phone number.
▪ Anytime a user opens up a website or
accesses a web application, the process of
loading the content only starts after the
user's device has looked up the correct IP
address.
Primary Server
▪ The primary server is the authoritative server for the zone.
▪ All administrative tasks associated with the zone (such as creating subdomains within the zone,
or other similar administrative tasks) must be performed on the primary server.
▪ Any changes associated with the zone or any modifications or additions to RRs in the zone files
must be made on the primary server.
▪ For any given zone, there is one primary server, except when you integrate Active Directory
services and Microsoft DNS Server.
Secondary Server
▪ Secondary servers are backup DNS Servers. Secondary servers receive all of their zone files
from the primary server zone files in a zone transfer.
▪ Multiple secondary servers can exist for any given zone — as many as necessary to provide load
balancing, fault tolerance, and traffic reduction.
▪ Additionally, any given DNS Server can be a secondary server for multiple zones.
▪ In addition to primary and secondary DNS Servers, additional DNS Server roles can be used
when such servers are appropriate for a DNS infrastructure.
▪ These additional servers are caching servers and forwarders.
Caching Server
▪ Caching servers, also known as caching-only servers, perform as their name suggests; they
provide only cached-query service for DNS responses.
▪ Rather than maintaining zone files like other secondary servers do, caching DNS Servers
perform queries, cache the answers, and return the results to the querying client.
▪ The primary difference between caching servers and other secondary servers is that other
secondary servers maintain zone files (and do zone transfers when appropriate, thereby
generating network traffic associated with the transfer), caching servers do not.
▪ Most Home users will use the DNS severs provided by their ISP via their home router.
▪ However, you can use alternative DNS servers like OpenDNS and Google Public DNS.
▪ This does mean that you will need to manually add these server addresses to your DNS settings.
DNS Security
How DNS is used in attacks?
▪ DNS can be used in different ways. Some threats include attacks against the infrastructure:
▪ DDoS attacks against DNS can make websites unreachable by making the DNS servers that
serve them unavailable by saturating the networks with what looks like legitimate traffic.
▪ A classic example of this is the 2016 DDoS attack against Dyn, where an army of bots hosted on
Internet connected cameras caused outages to many major websites, including Amazon, Netflix,
Spotify, and Twitter.
DNS Tunneling
▪ As DNS is a trusted protocol, most organizations allow it to freely enter and leave their networks.
▪ Cybercriminals take advantage of DNS for data exfiltration with malware whose DNS requests
contain the data being exfiltrated.
▪ Since the target DNS server is typically controlled by the owner of the target website, the
attackers ensure that the data reaches a server where it can be processed by them and a
response sent in the DNS response packet.
DNS Typosquating
▪ Typosquatting is the fraudulent process of registering domain names that have a strong
resemblance to well-known brands and companies in order to deceive users.
▪ The users could enter the website address incorrectly and end up on a malicious site that
perfectly resembles a legitimate website.
▪ The risky part is that users might then carry out transactions and reveal private information.
▪ Typosquatting might be combined with phishing and other online attacks.
Reputation Filtering
▪ Like any other Internet user, most malware needs to make DNS requests to find the IP
addresses of the sites that it is visiting.
▪ Organizations can block or redirect DNS requests to known malicious domains based on threat
intelligence to stop users from visiting dangerous sites or malware from communicating with its
operator.
DNS Inspection:
▪ The use of DNS for data exfiltration (via DNS tunneling) and other malicious activities can be
detected and blocked by an intrusion prevention system (IPS) integrated into a next-generation
firewall (NGFW).
▪ This helps to block the abuse of DNS for malware command and control and other attacks.
Threat Hunting
▪ Threat hunting is the process of identifying and understanding threat actors who may
compromise a company's infrastructure by concentrating on recurring behaviors.
▪ Using the presumption of compromise, threat hunting is a proactive cyber defense tactic that
enables you to focus on potential risks in your network that may have gone undetected.
▪ Although managed DNS service providers and Internet service providers can both be attacked,
having a backup is crucial not just in the event of a planned attack on your vendor.
▪ Hardware or network failures are more frequently to blame for DNS performance problems or
outages.
IPAM
▪ Internet protocol address management (IPAM) is a system that enables IP address management
in a corporate setting.
▪ It does this by facilitating the organization, tracking, and modification of data pertaining to the IP
addressing space.
▪ The network services that assign IP addresses to machines in a TCP/IP model and resolve them
are DNS and Dynamic Host Configuration Protocol (DHCP).
▪ These services will be connected by IPAM, enabling each to be informed of modifications in the
other. For example, DNS will update itself in accordance with the IP address selected by a client
via DHCP.
Social Engineering
▪ Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables.
▪ In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data,
spreading malware infections, or giving access to restricted systems. Attacks can happen online,
in-person, and via other interactions.
Social Engineering
▪ Scams based on social engineering are built around how people think and act.
▪ As such, social engineering attacks are especially useful for manipulating a user’s behavior.
▪ Once an attacker understands what motivates a user’s actions, they can deceive and manipulate
the user effectively.
▪ Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables.
▪ In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data,
spreading malware infections, or giving access to restricted systems. Attacks can happen online,
in-person, and via other interactions.
▪ Scams based on social engineering are built around how people think and act.
▪ As such, social engineering attacks are especially useful for manipulating a user’s behavior.
▪ Once an attacker understands what motivates a user’s actions, they can deceive and manipulate
the user effectively.
Heightened emotions
▪ Emotional manipulation gives attackers the upper
hand in an any interaction. You are far more likely to
take irrational or risky actions when in an enhanced emotional state. The following emotions are
all used in equal measure to convince you.
➢ Fear
➢ Excitement
➢ Curiosity
➢ Anger
➢ Guilt
➢ Sadness
Urgency
▪ Time-sensitive opportunities or requests are another reliable tool in an attacker’s arsenal.
▪ You may be motivated to compromise yourself under the guise of a serious problem that needs
immediate attention.
▪ Alternatively, you may be exposed to a prize or reward that may disappear if you do not act
quickly. Either approach overrides your critical thinking ability.
Trust
▪ Believability is invaluable and essential to a social engineering attack. Since the attacker is
ultimately lying to you, confidence plays an important role here.
▪ They’ve done enough research on you to craft a narrative that’s easy to believe and unlikely to
rouse suspicion.
▪ There are some exceptions to these traits. In some cases, attackers use more simplistic methods
of social engineering to gain network or computer access.
▪ For example, a hacker might frequent the public food court of a large office building and
"shoulder surf" users working on their tablets or laptops. Doing so can result in a large number of
passwords and usernames, all without sending an email or writing a line of virus code.
Buffer Overflow
▪ Buffers are memory storage regions that temporarily hold data while it is being transferred from
one location to another.
▪ A buffer overflow (or buffer overrun)
occurs when the volume of data
exceeds the storage capacity of the
memory buffer.
▪ As a result, the program attempting to
write the data to the buffer overwrites
adjacent memory locations.
▪ For example, a buffer for log-in
credentials may be designed to expect
username and password inputs of 8
bytes, so if a transaction involves an
input of 10 bytes (that is, 2 bytes more
than expected), the program may write
the excess data past the buffer boundary.
Security Testing
▪ Security testing is a sort of software
testing that identifies vulnerabilities,
hazards, and dangers in a software
program and guards against intruder
assaults.
▪ The goal of security tests is to find any
potential flaws and vulnerabilities in the
software system that might lead to a
loss of data, income, or reputation at
the hands of workers or outsiders.
▪ The basic purpose of security testing is
to find and assess possible
vulnerabilities in a system so that
attacks may be faced and the system
does not cease working or be exploited.
▪ It also aids in the detection of any potential security vulnerabilities in the system, as well as
assisting developers in the resolution of issues via code.
Honeypots
▪ Honeypot is a network-attached system used as a trap for cyber-attackers to detect and study
the tricks and types of attacks used by
hackers.
▪ It acts as a potential target on the internet
and informs the defenders about any
unauthorized attempt to the information
system.
▪ The cost of a honeypot is generally high
because it requires specialized skills and
resources to implement a system such
that it appears to provide an
organization’s resources still preventing
attacks at the backend and access to any production system.
▪ Honeypots are mostly used by large companies and organizations involved in cybersecurity.
▪ It helps cybersecurity researchers to learn about the different type of attacks used by attackers.
▪ It is suspected that even the cybercriminals use these honeypots to decoy researchers and
spread wrong information.
▪ Vulnerability assessment tools discover which vulnerabilities are present, but they do not
differentiate between flaws that can be exploited to cause damage and those that cannot.
▪ Vulnerability scanners alert companies to the preexisting flaws in their code and where they are
located.
2.4 Handling bugs, Securing storage platforms and the power grid,
Hack IOT
Bugs
▪ A software bug is an error, flaw or fault in a computer program or system that causes it to
produce an incorrect or unexpected result.
▪ This can sometimes cause very subtle, minor
impacts but in some cases it can cause an entire
system to crash or break.
▪ In cybersecurity, a bug is a flaw or vulnerability
in the software or hardware design that can be
potentially exploited by the attackers.
▪ These security bugs can be used to exploit
various vulnerabilities by compromising – user
authentication, authorization of access rights and
privileges, data confidentiality, and data integrity.
▪ A bug is when the system isn't behaving as it's
supposed to, whereas a vulnerability is a bug
that manifests itself as an opportunity for
exploitation.
▪ Not all bugs are cyber security issues, they aren’t all vulnerable to exploitation, where an attacker
can use the fault to steal data, or even run code remotely.
▪ However, some of these bugs can be very serious, and allow attackers to distribute hundreds of
thousands of malicious programs to users, or steal swathes of data from a database.
Bug Hunting
▪ Despite the lack of formal documentation, common techniques and methodologies exist for
hunting bugs. Here are the seven ways that are regularly use at Core Security Technologies.
➢ Source code audit
➢ Reverse engineering: Debug & disassembly
➢ Reverse engineering: Network traffic
➢ Black-box security testing
➢ Brute force
➢ Top-down analysis
➢ Information gathering
▪ A lightbulb that can be switched on using a smartphone app is an IoT device, as is a motion
sensor or a smart thermostat in your office or a connected streetlight.
▪ An IoT device could be as fluffy as a child's toy or as serious as a driverless truck.
▪ The term IoT is mainly used for devices that wouldn't usually be generally expected to have an
internet connection, and that can communicate with the network independently of human action.
▪ For this reason, a PC isn't generally considered an IoT device and neither is a smartphone, even
though the latter is crammed with sensors.
▪ A smartwatch or a fitness band or other wearable device might be counted as an IoT device.
Hacking IoT
▪ After viruses infected computers in the late 1990s, software makers invested in making their
products more secure. Computer users are wiser about the dangers and how to protect
themselves from losing data or being hacked.
▪ As mobile devices proliferated in the past decade, hackers have focused on trying to gain
access. While infections remain relatively small, the sheer number of mobile devices mean
mobile malware can be a lucrative business.
▪ The Internet of Things is now also attracting the attention of hackers and cybercriminals. Devices
from cars to consumer electronics, which were first thought to be of little interest to hackers, now
raise more cybersecurity concerns.
▪ Most IoT devices lack security, it's easy due to a surprising array of software and hardware tools
available to hackers that too often makes their job of finding and exploiting IoT vulnerabilities
trivial.
▪ These tools exploit insecure interfaces, decompile firmware, and simulate and analyze code to
find flaws leading to cyber-exploits.
▪ By hacking IoT devices, attackers pursue very specific objectives related to the commercial use
of captured resources.
▪ The most popular methods are anonymous spamming, DDoS attacks, malware distribution, and
industrial espionage.
▪ Hackers infect devices with malware to turn them into botnets that probe access points or search
for valid credentials in device firmware that they can use to enter the network.
▪ Organizations typically choose the method that makes the most sense based on their unique
security and compliance requirements.
▪ The four access control models are:
➢ Discretionary access control (DAC)
➢ Mandatory access control (MAC)
➢ Role-based access control (RBAC)
➢ Attribute-based access control (ABAC)
Kerberos
▪ Traditionally, when users access computer systems, they do so by entering a password. The
challenge with this authentication method is that if hackers obtain the password, they can take on
the user's identity and gain access to an organization's network. Organizations need a better way
to protect their systems and users. This is where Kerberos comes in.
▪ A Kerberos is a system or router that provides a gateway between users and the internet.
Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred
to as an “intermediary” because it goes between end-users and the web pages they visit online.
▪ Kerberos is a computer network security protocol that authenticates service requests between
two or more trusted hosts across an untrusted network, like the internet.
▪ It uses secret-key cryptography and a trusted third party for authenticating client-server
applications and verifying users' identities.
Benefits of Kerberos
Secure
▪ Kerberos never transmits passwords over the network.
▪ Kerberos proves user identity by sending time-bound cryptographic messages that become
invalid after a set period.
▪ Even the messages were intercepted and decrypted, they’d be useless in a matter of minutes!
Single-Sign-On
▪ Kerberos only requires the user to type their password once when first authenticating the client.
▪ From then on, the user has access across all kerberized services within a Kerberos realm
without needing to re-enter their password.
▪ Single Sign-on simplifies working with multiple services by removing the hassle of multiple login
requirements.
Trusted third-party
▪ Kerberos uses a centralized authentication server known as the Key Distribution Center (KDC)
that all other devices in the network trust by default.
▪ All authentication requests, such as cryptographic messages, are routed through this server.
▪ This outsourcing ensures that sensitive information is not stored on a local machine.
Mutual authentication
▪ In Kerberos, both ends of communication must be authenticated before the communication is
permitted.
▪ Mutual authentication drastically reduces the ability of fraudulent actors to trick systems into
sending confidential information.
An example of mutual authentication:
▪ A user in a network using Kerberos can authenticate to a mail server to prove they are who they
claim to be. On the other end, the mail server must also authenticate that it is truly the mail
server and not some other service in the network pretending to be the mail server. If both sides
are authenticated, the connection is established.
Ticket-Granting Ticket
▪ This ticket is granted by the KDC after the client is successfully authenticated.
▪ The TGT is encrypted and contains permissions on what services the client can access, how
long access is granted, and also a session key used to communicate with the client.
▪ Clients cannot decrypt the TGT, as they do not have the TGS key.
▪ They must, therefore, blindly present the TGT to desired services (which can access the TGS)
and allow the services to decide if the client can access it.
▪ By hiding the TGT from the client, Kerberos prevents permissions from being copied or altered
fraudulently by the client.
Authentication Server
▪ The Authentication Server is the first stop in getting authenticated with Kerberos.
▪ The client first must authenticate themself to the AS using a username and password login.
▪ Once this is complete, the AS forwards the username to the KDC that in turn grants a TGT.
▪ Without completing this first step, the client cannot interact with any other part of the Kerberos
system.
Working of Kerberos
▪ Kerberos has three parts a client, server, and trusted third party (KDC) to mediate between them.
▪ Clients obtain tickets from the Kerberos Key Distribution Center (KDC), and they present these
tickets to servers when connections are established.
User/Client Login
▪ This phase’s interactions are between the User and the Client.
▪ The user enters their username and password information into the client.
▪ The client then transforms that password into a cipher key stored locally.
▪ If this completes correctly, the client can begin authentication with the AS.
Client/AS Authentication
▪ In this phase the client and Authentication Server connect to authenticate the user’s username
and ensure that they’re part of the system.
▪ The AS then checks that the username is already documented in the system.
▪ If so, the Client and AS exchange encrypted verification messages to verify each other.
▪ By the end, both are authenticated, a connection is established, and the client may move to
authentication with the service.
Client/Service Authentication
▪ In this phase the client and server must authenticate each other, keeping in line with the mutual
authentication practice.
▪ The client and server exchange encrypted verification messages similar to the previous phase.
▪ If these all pass, the client and service are authenticated and the client is cleared to request their
service.
Client/Service Request
▪ Finally, the client can request a named service from the service server.
▪ The service server then verifies that it has the requested service available.
▪ If yes, the service server grants the service to the client.
▪ As the client has been authenticated through all steps of this process, they may continue to use
the service until their permissions expire.
Kerberos Process
1. Login
2. Client Requests for Ticket Granting Server
3. Server Verifies the Username
4. Ticket Granting Ticket Returned to the Client
5. Client Obtains the TGS session key
6. Client Requests Service Access From Server
7. Server Verifies the service
8. Server Obtains TGS Session Key
9. Server Generates Service Session Key
10. Client Obtains Service Session Key
11. Client Contacts the Service
12. Service Decrypts
13. Service Verifies the Request
14. Service is Authenticated to the Client
15. Client Verifies the Service
16. Client and Service Communicate Freely
Identity Federation
▪ Identity federation is the process
where the authentication
responsibility of a user is delegated
to an external partner, this makes
life easier and faster for the user, as
the user only has to login once.
▪ It also increases security, as the
user only has to remember one set
of credentials (provided that they’re
using a strong password).
▪ In corporate environments, and
within a corporate network,
Microsoft's Active Directory (AD) is a common user directory that is responsible for user
authentication within the corporate domain.
▪ When combined with Active Directory Federation Services (ADFS), AD is then able to interact
with other online services and ADFS is an Federated Identity Provider that supports federation.
▪ In online environments, Google Account can be used as an alternative Federated Identity
Provider, and Microsoft also has Azure AD.
Identity Governance
▪ Identity governance provides organizations with visibility and control over identity and access life
cycles across multiple systems.
▪ The goal of identity governance is to help customers understand how people, applications, data,
and devices are linked together in order to determine who has access to what, the potential risks
that it poses, and also the ability to take action when policy violations are identified.
▪ Specifically, identity governance and administration gives admins and the enterprise itself a way
to establish role-based access for activities aligned with the specific role a user has.
▪ The reason it goes beyond the mere assigning of roles is identity governance and administration
tools monitor permissions users have, and revoke unnecessary ones if discovered, through
automation.
▪ This greatly assists with administration in terms Human Resources that would be needed; it also
helps with compliance as the analysis feeds into he collection of data that help gain an
understanding of risk.
Advanced Cryptography
▪ Below are core principles of modern-day cryptography.
➢ Data Confidentiality
➢ Data Integrity
➢ Authentication
➢ Non-repudiation
1. Confidentiality refers to certain rules and guidelines usually executed under confidentiality
agreements which ensure that the information is restricted to certain people or places.
2. Data integrity refers to maintaining and making sure that the data stays accurate and consistent
over its entire life cycle.
3. Authentication is the process of making sure that the piece of data being claimed by the user
belongs to it.
4. Non-repudiation refers to ability to make sure that a person or a party associated with a contract
or a communication cannot deny the authenticity of their signature over their document or the
sending of a message.
▪ Consider two parties Alice and Bob.
▪ Alice wants to send a message m to Bob over a secure channel. So, what happens is as follows.
▪ The sender’s message or sometimes called the Plaintext, is converted into an unreadable form
using a Key k.
▪ The resultant text obtained is called the Ciphertext. This process is known as Encryption.
▪ At the time of receival, the Ciphertext is converted back into the plaintext using the same Key k,
so that it can be read by the receiver. This process is known as Decryption.
For example:
Plaintext : Geeksforgeeks
Ciphertext : Jhhnvirujhhnv
Crypto Algorithm
▪ Cryptography algorithms are the means of altering data from a readable form to a protected form
and back to the readable form.
▪ Cryptographic algorithms are used for important tasks such as data encryption, authentication,
and digital signatures.
➢ Signature algorithms that are used to digitally “sign” data to provide authentication. Hashing
algorithms that are used to provide data integrity.
Symmetric-key algorithms
▪ Also referred to as a secret-key algorithm, a symmetric-key algorithm transforms data to make it
extremely difficult to view without possessing a secret key.
▪ The key is considered symmetric because it is used for both encrypting and decrypting.
▪ These keys are usually known by one or more authorized entities.
▪ Symmetric key algorithms are used for:
➢ Providing data confidentiality by using the same key for encrypting and decrypting data.
➢ Providing Message Authentication Codes (MACs) for source and integrity authentication
services. The key is used to create the MAC and then to validate it.
➢ Establishing keys during key-establishment processes
➢ Generating deterministic random numbers
Asymmetric-key algorithms
▪ Also referred to as public-key algorithms, asymmetric-key algorithms use paired keys (a public
and a private key) in performing their function.
▪ The public key is known to all, but the private key is controlled solely by the owner of that key
pair.
▪ The private key cannot be mathematically calculated through the use of the public key even
though they are cryptographically related. Asymmetric algorithms are used for:
➢ Computing digital signatures
➢ Establishing cryptographic keying material
➢ Identity Management
▪ The PKI allows users and systems to verify the legitimacy of certificate-holding entities and
securely exchange information between them over the air.
▪ The introduction of a PKI enables
stronger, certificate-based
security, as well as identity
services and management tools
to maximize network efficiency
and security.
▪ PKI (Public Key Infrastructure), is
a framework that enables the
encryption of public keys and
includes their affiliated crypto-
mechanisms.
▪ The underlying purpose of any
PKI setup is to manage the keys
and certificates associated with it, thereby creating a highly secure network environment for use
by applications and hardware.
▪ X.509 certificates and public keys form the cornerstone of PKI, acting as the mechanism through
which cryptography can be established for an endpoint consequently, PKI may refer to any
software, policy, process, or procedure that may be employed while configuring and managing
those certificates and keys.
▪ In a nutshell, PKI is responsible for making online interactions more secure, and it does this by:
▪ Establishing the identity of endpoints on a network
▪ Encrypting the flow of data via the network’s communication channels
▪ It does this by using private keys and public keys for encryption and decryption respectively,
which are facilitated in turn by digital certificates.
Components of PKI
▪ The components of a PKI include:
➢ public key
➢ private key
➢ Certificate Authority
➢ Certificate Store
Public Key
▪ A Public Key is a cryptographic key that can be distributed to the public and does not require
secure storage.
▪ Messages encrypted by the public key can only be decrypted by the corresponding private key.
Private Key
▪ Private Keys are used by the recipient to decrypt a message that is encrypted using a public key.
▪ Since the message is encrypted using a given public key, it can only be decrypted by the
matching private key.
▪ This establishes the ownership of the private and public key, ensuring the message is only read
by the approved parties.
Certificate Lifecycle
▪ The lifecycle of a certificate can be broken into a handful of distinct steps.
1. Certificate Enrollment – An entity submits a request for a certificate to the Certificate
Authority (CA). An entity can be a person, a device, or even just a few lines of code.
2. Certificate Issuance – The CA needs to validate the identity of the applicant, which is
typically done through credentials or by trusting another CA that has already validated the
applicant.
3. Certificate Validation – Every time the certificate is used to authenticate, the RADIUS
server checks with the CA to confirm that the certificate is still valid and hasn’t expired or
been revoked.
4. Certificate Revocation – Certificates contain an expiration date that’s specified when they
are first issued, usually for a duration of several years. When that date is reached, the
certificate will automatically be considered invalid for any authentication attempt.
5. Certificate Renewal – Instead of automatically being shunted to a CRL, some CA’s have
settings that renew certificates upon expiration date, though typically they re-verify identity.
At this time, you can choose whether or not to generate a new key pair – effectively making
it a totally new certificate.
Section 3: Exercises
Exercise 1: Identify the Public and Private Key in below Picture.
MODULE 3
BUILD A HACKER MINDSET AND DEFEND AGAINST
FUTURE ATTACKS
Section 1: Learning Outcomes
After completing this module, you will be able to explain the concepts of:
▪ Ethical Hacking
▪ Footprinting
▪ Scanning Networks
▪ Enumeration
▪ Vulnerability Analysis
▪ System Hacking
▪ Malware Threats
▪ Sniffing
▪ Social Engineering
▪ Denial-of-service
▪ Session Hijacking
▪ IDS, Firewalls, and Honeypots
▪ Hacking Web Servers
▪ Hacking Web Applications
▪ SQL Injection
▪ Hacking Wireless Networks
▪ Hacking Mobile Platforms
▪ IoT Hacking
▪ Cloud Computing
▪ Cryptography
Section 2: Relevant Knowledge
3.1 Ethical Hacking
Introduction to Ethical Hacking
▪ Ethical hacking can be referred to as a documented and authorized try to gain control and
access to a computer network or system, data or even just an application.
▪ One must devise a strategy which is on par or similar to a generic hacker that tries to gain
access for nefarious reasons.
▪ Ethical hacking helps to understand the vulnerabilities of a system and helps individuals and
companies keep their data safe from being exploited by third parties for whatever reasons.
Types of Threats
Network
▪ Any threat that would come via a network connection e.g.
▪ Man In the Middle Attack
▪ DOS
▪ DNS/ARP Positioning
Network
➢ Man in the Middle Attack
➢ Denial of Services
DOS
▪ A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making
it inaccessible to its intended users.
▪ DoS attacks accomplish this by flooding the target with traffic, or sending it information that
triggers a crash.
▪ Deny anybody the ability to be able to access data that is the malicious guy hammer the server
with a ton of requests that it is unable to fulfill all of them and thus the servers become either a
bandwidth saturated or CPU and RAM is completely utilized.
DNS/ARP Poisoning
▪ When an attacker builds a clone of an authentic website and make people believe to visit his
clone to gain access to their vital information such as credit card numbers.
Password Cracking
▪ Cracking someone’s password by guessing or running some sort of brute force mechanism.
Malware
▪ Running a social engineering campaign and get someone to click on a link which further allows
me to get him to download the malicious software that gives me the access to his machine.
Privilege Escalation
▪ Raise the level of access in a machine.
Code Execution
▪ Wanting someone’s device to execute some malicious code through a mechanism like a buffer
overflow, that is having some level of access to it some way, shape or form and that grants the
access to the OS through a malicious attack.
Stay legal
▪ Obtain proper approval before accessing and performing a security assessment.
Report vulnerabilities
▪ Notify the organization of all vulnerabilities discovered during the assessment. Provide
remediation advice for resolving these vulnerabilities.
▪ Types of information security controls include security policies, procedures, plans, devices and
software intended to strengthen cybersecurity.
▪ There are three categories of information security controls:
➢ Preventive security controls, designed to prevent cyber security incidents.
➢ Detective security controls, aimed at detecting a cyber security breach attempt (“event”) or
successful breach (“incident”) while it is in progress, and alerting cyber security personnel.
➢ Corrective security controls, used after a cyber security incident to help minimize data loss
and damage to the system or network, and restore critical business systems and processes
as quickly as possible (“resilience”).
Penetration Testing
▪ Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts
to find and exploit vulnerabilities in a computer system.
▪ The purpose of this simulated attack is to identify any weak spots in a system’s defenses which
attackers could take advantage of.
▪ This is like a bank hiring someone to dress as a burglar and try to break into their building and
gain access to the vault.
▪ If the ‘burglar’ succeeds and gets into the bank or the vault, the bank will gain valuable
information on how they need to tighten their security measures.
Footprinting
▪ Footprinting is the process of identifying and understanding the security risks present in an
organization.
▪ Like reconnaissance, it involves gathering as much information about the target as possible,
including information that may not be readily available online.
▪ This information can then be used to build a profile of the organization’s security posture and
identify potential vulnerabilities.
▪ In the world of Cyber Security, Footprinting is the first step which lets penetration testers gather
information about hardware or network.
▪ It is basically an exploration process which helps us to know our enemy.
▪ In order to complete the penetration process, one ought to gather as much information as
possible.
Types of Footprinting
➢ Footprinting
➢ Passive
➢ Active
▪ Same will be the result from other search engines. But different search engines are often used
for particular searches.
▪ As shown above, Google is good for general information. If you want to know which websites are
hosted on a particular server then you can use the Bing search engine.
▪ To know an IP address of any website just ping the website as shown below :
▪ Now, open bing.com and type the IP in the search tab and press enter.
▪ To do so, open google.com/alerts and type the name of the website that you wanted to alert
about. And then click on create an alert.
Eavesdropping
▪ It is the process of intercepting unauthorized communication to gather information.
Shoulder surfing
▪ Secretly observing the target to gather sensitive information like passwords, personal
identification information, account information etc.
Dumpster Diving
▪ This is a process of collecting sensitive information by looking into the trash bin. Many of the
documents are not shredded before disposing them into the trash bin.
▪ Retrieving these documents from trash bin may reveal sensitive information regarding contact
information, financial information, tender information etc.
▪ They provide information such as images of buildings, as well as surroundings, including Wi-Fi
networks.
▪ Tools such as Google Maps even locate entrances of building, security cameras, and gates.
▪ These tools provide interactive maps, outline maps, satellite imagery, and information on how to
interact with and create one’s own maps. Google Maps, Yahoo Maps, and other tools provide
driving directions, traffic conditions, locate landmarks, give us detailed information about address
and contact information.
Footprinting Tools
Whois
▪ A WHOIS lookup could be a way for you to search the general public database for information a
few specific domain, like the expiration date, current registrar, registrant information, etc.
▪ Once you enter a domain into the search bar at Uniregistry.com/whois, a request is sent to the
general public WHOIS database of the domain’s registrar or registry and therefore the stored
record is displayed.
NSlookup
▪ nslookup is a simple but very practical command-line tool, which is principally wont to find the IP
address that corresponds to a host, or the domain name that corresponds to an IP address (a
process called “Reverse DNS Lookup”).
▪ nslookup allows itself to be used in the command-line of the OS in question; Windows users start
the service via the command prompt, and Unix users via the terminal window.
Sam Spade
▪ Sam Spade runs on all versions of Windows starting with Windows 95 and makes it simple to do
a lot of investigation and analysis quickly, from determining the owner of a specific IP address
block to examining the contents of an internet page.
▪ It also has several features that are specific to the detection of spam and sites that relay spam.
▪ Sort of a real PI , Sam Spade doesn’t do anything that you couldn’t do yourself if you knew how
and had the correct tools; this software integrates the capabilities found in ping, traceroute, time,
whois, nslookup, finger, DIG, a packet sniffer, a port scanner, a scripting language, and more, all
with a nice GUI to boot.
SuperScan
▪ Download Super Scan from its new location and install it.
▪ SuperScan allows you to scan a variety of information processing addresses and do TCP port
scanning.
▪ It will check all ports, or those you choose. it’s a awfully quick and powerful tool.
Nmap
▪ Download Nmap from its site. you’ll use it in each Windows and UNIX/Linux.
▪ It will do ping sweeps, OS identification, additionally to what is finished SuperScan.
▪ You’ll be able to see most of its choices and commands at its site choices outline and a lot of
details is seen in its on-line book version.
TcpView
▪ TcpView may be a free tool for Windows that allows you to observe all open TCP and UDP ports
on the native laptop.
▪ You’ll be able to transfer it from the Microsoft Sysinternals download website. As you’ll be able to
see during this image it shows not solely the open ports, however additionally what application in
your computer is coupled to the open ports.
▪ If a affiliation is established with a foreign host you’ll be able to see the remote
host information processing range.
▪ TcpView isn’t a Intrusion Detection System, however provides an image of goes on in your laptop
relating to ports and refreshes mechanically, therefore you’ll be able to see the changes that are
happening.
My ip Suite
▪ Its combines domain-to-IP device, Batch Ping, Tracers, Whois, Website Scanner And connection
Monitor in addition as an IP-to-country device into one Interface.
Dns enumerator
▪ its AN automated sub-domain retrieval tool and it scan google to extract the result
Spider Foot
▪ It will scarpe the the web site on it domain in addition as search Google, Netcraft, Whois and
DNS to create up info.
Nessus
▪ Once you discover the list of open ports, future step is begin searching for vulnerability within the
servers.
▪ One in all the efficient tools to vulnerability scan is Nessus. keep in mind that Nessus is not a free
tool.
Countermeasures
▪ Creating awareness among the employees and users about the dangers of social engineering.
▪ Limiting the sensitive information
▪ Encrypting sensitive information
▪ using privacy services on who is lookup database
▪ Disable directory listings in the web servers
▪ Enforcing security policies
Network Scanning
▪ Network scanning helps to discover any live computer or hosts, open ports, and the IP address
of a victim.
▪ It helps to discover the services that are running on any host computer.
▪ It allows the decoding of the system architecture of any target and the operating system.
▪ The method helps to deal with and discover if there are any vulnerabilities in a live host.
Port Scanning
▪ Post scanning is a conventional method that is used to penetrate into the hackers and the testers
to search if there are any open doors from where the hacker will be capable of accessing the
system of the organization.
▪ It tries to figure out the route of the hacker, to find out the live hosts, the operating system that is
used, and the installed firewalls as well as the topology of the targeted organization.
▪ Once the hacker gets the IP address of the organization of the victim using the UDP and the TCP
ports the hacker will map the network of the organization and put it in his grab.
▪ A map is a tool that is used to carry out port scanning techniques.
Vulnerability Scanning
▪ The vulnerability scanning method proactively identifies the vulnerability of the network in an
automated method that helps to find out whether the system may be threatened or exploited.
▪ To carry out this type of scanning the computer needs to be connected to the internet.
Scanning Methodologies
1. Hackers and Pen-testers check for Live systems
2. Check for open ports
3. Scanning beyond IDS (Intrusion Detection System)
4. Banner Grabbing: is the method for obtaining information regarding the targeted system on a
network and services running on its open ports. Telnet and ID Serve are the tools used
Ping Sweep
▪ Ping sweep is used to determine the range of IP addresses that is mapped to active devices.
▪ It allows hackers to calculate subnet masks and identify the number of present hosts in the
subnet.
▪ This in turn enables them to create an inventory of active devices in the subnet.
TCP Connect
▪ TCP connect scan used for detecting open ports upon the completion of the three-way
handshake.
▪ It works by establishing a full connection and then dropping it by sending a RST packet.
Stealth Scan
▪ Stealth scan is used for bypassing firewall and logging mechanisms.
▪ It works by resetting the TCP connection before the three-way handshake is completed, which in
turn makes the connection half open.
Xmas Scan
▪ Xmas scan works by sending a TCP frame with FIN, URG, and PUSH flags set to the target
device.
▪ Based on the response, it is possible to determine whether the port is open or closed. If there is
no response, then the port is open.
▪ If the response is RST, then the port is closed. It is important to note that this scan works only for
UNIX hosts.
TCP Connect
▪ TCP connect scan used for detecting open ports upon the completion of the three-way
handshake.
▪ It works by establishing a full connection and then dropping it by sending a RST packet.
Stealth Scan
▪ Stealth scan is used for bypassing firewall and logging mechanisms.
▪ It works by resetting the TCP connection before the three-way handshake is completed, which in
turn makes the connection half open.
▪ This is done by analyzing the TTL and WINDOW field of the received RST packet’s header. The
port is open if the TTL value is less than 64.
▪ Similarly, the port is also considered to be open if the WINDOW value is not 0 (zero). Otherwise,
the port is considered to be closed.
▪ ACK flag probe is also used to determine the filtering rules of the target network.
▪ If there is no response, then that means that a stateful firewall is present.
▪ If the response is RST, then the port is not filtered.
UDP Scanning
▪ UDP scanning uses UDP protocol to test whether the port is open or closed.
▪ In this scan there is no flag manipulation. Instead, ICMP is used to determine if the port is open
or not.
▪ If a packet is sent to a port and the ICMP port unreachable packet is returned, then that means
that the port is closed.
▪ If, however, there is no response, then the port is open.
Tools that can are used to scan networks and ports are:
▪ Nmap: extract information such as live hosts on the network, services, type of packet
filters/firewalls, operating systems, and OS versions.
▪ Angry IP Scanner: scans for systems available in a given input range.
▪ Hping2/Hping3: are command-line packet crafting and network scanning tools used for TCP/IP
protocols.
▪ Superscan: is another powerful tool developed by Mcafee, which is a TCP port scanner, also
used for pinging.
▪ ZenMap: is another very powerful Graphical user interface (GUI) tool to detect the type of OS,
OS version, ping sweep, port scanning, etc.
▪ Net Scan Tool Suite Pack: is a collection of different types of tools that can perform a port scan,
flooding, webrippers, mass emailers; and This tool is a trial version, but paid versions are also
available.
▪ Wireshark and Omnipeak are two powerful and famous tools that listen to network traffic and act
as network analyzers.
▪ Names of other famous PCs tools are Advanced Port Scanner, Net Tools, MegaPing, CurrPorts,
PRTG Network Monitor, SoftPerfect Network Scanner, Network Inventory Explorer, etc.
▪ There are various other scanners available free and inbuilt in Kali Linux OS.
▪ Tools and software that are used in mobiles as scanners include the names such as Umit
Network Scanner, Fing, IP network Scanner, PortDroid network Analysis, Panm IP Scanner,
Nessus Vulnerability Scanner, Shadow Sec Scanner, etc.
Network Diagrams
Network Sweeping
▪ We try to figure out which of the addresses in the range are in use.
▪ We do this by sending our ICMP packets and listening carefully, if we get a response we know
that an address is in use, giving us awareness of the active systems.
OS Scanning/ Fingerprinting
▪ In this scan we try to enumerate the OS of the target system.
▪ This is done by sending a crafted packet which checks for the response of the system.
▪ Every OS has a different behavior over the network, these specific crafted packets can check
which OS is responding.
▪ Sometimes we want to be less noisy on the system so you can also perform a passive
fingerprinting scan which won’t send any packets but will receive them.
▪ Based on the response, you can decide what OS the system is and we can also figure out the
OS of a system via HTTP headers.
▪ Direct and indirect banner grabbing can grab OS data, hosts often announce their OS to anyone
trying to make a connection to them through banners.
Port Scanning
▪ In this scan we try to figure out the different TCP and UDP ports that are open on the system.
▪ Primarily there are two types of port scans; SYN scan and FIN scan.
▪ Remember these scans can be intensive and might bring the system down so be careful.
Vulnerability Scanning
▪ In this scan we try to find out if the application is vulnerable to any known vulnerabilities which
stem from unpatched or mis-configured applications.
3.4 Enumeration
▪ Enumeration belongs to the first phase of Ethical Hacking, i.e., “Information Gathering”.
▪ This is a process where the attacker establishes an active connection with the victim and try to
discover as much attack vectors as possible, which can be used to exploit the systems further.
Classification of Enumeration
Process of Enumeration
Enumeration Techniques
▪ Extract User Names using email IDs
▪ Extract Information using the default password
▪ Brute Force Active
▪ Extract user names using SNMP
▪ Extract user groups from windows
▪ Extract Information using DNS transfer
SNMP Enumeration
▪ SNMP (Simple Network Management Protocol) enumeration is a cycle of specifying client
records and gadgets on an objective framework utilizing SNMP.
▪ SNMP comprises a manager and a specialist; specialists are inserted on each organization
gadget, and the trough is introduced on a different PC.
▪ Vulnerability assessments provide security teams and other stakeholders with the information
they need to analyze and prioritize risks for potential remediation in the proper context.
▪ Vulnerability assessments are a critical component of the vulnerability management and IT risk
management lifecycles, helping protect systems and data from unauthorized access and data
breaches.
▪ Vulnerability assessments typically leverage tools like vulnerability scanners to identify threats
and flaws within an organization's IT infrastructure that represents potential vulnerabilities or risk
exposures.
▪ Vulnerability assessments allow security teams to apply a consistent, comprehensive, and clear
approach to identifying and resolving security threats and risks.
▪ This has several benefits to an organization:
➢ Early and consistent identification of threats and weaknesses in IT security.
➢ Remediation actions to close any gaps and protect sensitive systems and information.
➢ Meet cybersecurity compliance and regulatory needs for areas like HIPAA and PCI DSS.
➢ Protect against data breaches and other unauthorized access.
Scoring Systems
▪ The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal
characteristics of a vulnerability and produce a numerical score reflecting its severity.
▪ The numerical score can then be translated into a qualitative representation (such as low,
medium, high, and critical) to help organizations properly assess and prioritize their vulnerability
management processes.
▪ CVSS is a published standard used by organizations worldwide, and the SIG's mission is to
continue to improve it.
▪ The CVSS Special Interest Group (SIG) is currently working on individual improvements that will
form the basis of the next version of the CVSS standard.
▪ The SIG is composed of representatives from a broad range of industry sectors, from banking
and finance to technology and academia.
Scoring Tools
▪ Vulnerability assessment tools are designed to automatically scan for new and existing threats
that can target your application.
▪ Types of tools include:
1. Web application scanners that test for and simulate known attack patterns.
2. Protocol scanners that search for vulnerable protocols, ports and network services.
3. Network scanners that help visualize networks and discover warning signals like stray IP
addresses, spoofed packets and suspicious packet generation from a single IP address.
▪ It is a best practice to schedule regular, automated scans of all critical IT systems. The results of
these scans should feed into the organization’s ongoing vulnerability assessment process.
▪ A vulnerability assessment report will show you the raw number of vulnerabilities detected in your
systems at a point in time.
▪ In an ideal scenario, you want your vulnerability report to contain nothing = zero issues.
2. Social Engineering
▪ This typically refers to the process of tricking users into believing the hacker is a legitimate agent.
▪ A common tactic is for hackers to call a victim and pose as technical support, asking for things
like network access passwords in order to provide assistance.
▪ This can be just as effective if done in person, using a fake uniform and credentials, although
that’s far less common these days.
3. Malware
▪ Keyloggers, screen scrapers, and a host of other malicious tools all fall under the umbrella of
malware, malicious software designed to steal personal data.
▪ Alongside highly disruptive malicious software like ransomware, which attempts to block access
to an entire system, there are also highly specialised malware families that target passwords
specifically.
5. Dictionary attack
▪ This uses an automated process of feeding a list of commonly-used passwords and phrases into
a computer system until something fits.
▪ Most dictionaries will be made up of credentials gained from previous hacks, although they will
also contain the most common passwords and word combinations.
6. Mask attack
▪ Where dictionary attacks use lists of all possible phrase and word combinations, mask attacks
are far more specific in their scope, often refining guesses based on characters or numbers
usually founded in existing knowledge.
▪ The goal here is to drastically reduce the time it takes to crack a password, and remove any
unnecessary processing.
▪ Rainbow tables go one step further, as rather than simply providing a password and its hash,
these store a precompiled list of all possible plain text versions of encrypted passwords based on
a hash algorithm.
▪ Hackers are then able to compare these listings with any encrypted passwords they discover in a
company’s system.
▪ Much of the computation is done before the attack takes place, making it far easier and quicker
to launch an attack, compared to other methods.
▪ The downside for cyber criminals is that the sheer volume of possible combinations means
rainbow tables can be enormous, often hundreds of gigabytes in size.
8. Network Analyzers
▪ Network Analyzers are tools that allow hackers to monitor and intercept data packets sent over a
network and lift the plain text
passwords contained within.
▪ Such an attack requires the use of
malware or physical access to a
network switch, but it can prove highly
effective.
▪ It doesn’t rely on exploiting a system
vulnerability or network bug, and as
such is applicable to most internal
networks.
▪ It’s also common to use network
analyzers as part of the first phase of an attack, followed up with brute force attacks.
9. Spidering
▪ Spidering refers to the process of hackers getting to know their targets intimately in order to
acquire credentials based on their activity.
▪ The process is very similar to techniques used in phishing and social engineering attacks, but
involves a far greater amount of legwork on the part of the hacker - although it’s generally more
successful as a result.
Hiding Files
Steganography
▪ The art of hiding a data inside another data/medium is called steganography.
▪ For eg: hiding data within an image file
▪ The secret message is called overt file and the covering file is called covert file.
Types of Steganography
➢ Image Steganography
➢ Document Steganography
➢ Folder Steganography
➢ Video Steganography
➢ Audio Steganography
➢ White Space Steganography
Covering Tracks
▪ Covering tracks is one of the most stage during system hacking. during this stage, the attacker
tries to cover and avoid being detected, or “traced out,” by covering all track, or logs, generated
while gaining access to the target networks or computer.
▪ This starts with erasing the contaminated logs and possible error messages generated within the
attack process.
▪ Then, attackers make changes within the system configuration in order that it does riot log future
activities by manipulating and tweaking the event logs, attackers trick the supervisor in believing
that there’s no malicious activity within the system, which no intrusion or compromise has
actually taken place.
▪ An attacker first configures the local client to attach with the victim.
▪ The victim’s system is triggered to encapsulate a TCP payload in an ICMP echo packet which is
forwarded to the proxy server.
▪ The proxy server de-encapsulates and extracts the TCP payload and sends it to the attacker.
IP Identification field
▪ This can be a simple approach where a payload is transferred bitwise over a longtime session
between two systems. Here, one character is encapsulated per packet.
▪ The attacker can manipulate the log files with the assistance of :
– SECEVENT.EVT (security): failed logins, accessing files without privileges
– APPEVENT.EVT (applications)
CCleaner
▪ CCleaner may be a system optimization, privacy, and cleaning tool.
▪ It allows you to get rid of unused files and cleans track of online networks browsing details from
the P.
▪ It keeps your privacy online, and makes the system faster and safer. additionally, it frees up hard
disc space for further use.
▪ With this tool, an attacker can erase his/her track very easily.
▪ CCleaner also deans traces of your online activities like online networks history.
▪ Malware can allow unauthorized access, use system resources, steal passwords, lock you out of
your computer and ask for ransom, and more.
▪ Cybercriminals that distribute malware are often motivated by money and will use infected
computers to launch attacks, obtain banking credentials, collect information that can be sold, sell
access to computing resources, or extort payment from victims.
▪ There are some telltale signs you can learn that typically indicate you have been the victim of a
malware attack, including:
1. A slow computer. Malware often affects the speed of your device while you are using the
internet or applications.
2. A computer that frequently crashes or freezes during normal use.
3. A ton of pop-up ads. These often indicate that adware, a type of malware, has gotten into
your system. If you see these, it is important to not click on them because they could launch
code that causes further damage.
4. A loss of disk space. If you feel your available disk space has suddenly diminished, it could
be because malware is on your hard drive.
5. A swell in internet activity on your network. Some automatically access the internet, causing
an unusual increase in internet activity that does not correlate with user behavior.
6. When your system is working harder than it normally would. This could be due to malware
taking up valuable resources.
7. Your browser is showing new toolbars, extensions, or a different homepage.
Types of Malware
▪ There is a full range of malwares which can seriously degrade the performance of the host
machine.
▪ There is a full range of malwares which are simply written to distract/annoy the user, to the
complex ones which captures the sensitive data from the host machine and send it to remote
servers
➢ Adware
➢ Spyware
➢ Browser hijacking software
➢ Virus
➢ Worms
➢ Trojan Horse
➢ Scareware
1. Adware
▪ It is a special type of malware which is used for forced advertising.
▪ They either redirect the page to some advertising page or pop-up an additional page which
promotes some product or event.
▪ These adware are financially supported by the organizations whose products are advertised.
2. Spyware
▪ It is a special type of which is installed in the target computer with or without the user permission
and is designed to steal sensitive information from the target machine.
▪ Mostly it gathers the browsing habits of the user and the send it to the remote server without the
knowledge of the owner of the computer.
▪ Most of the time they are downloaded in to the host computer while downloading freeware i.e.
free application programmes from the internet.
▪ Spywares may be of various types; It can keeps track of the cookies of the host computer, it can
act as a keyloggers to sniff the banking passwords and sensitive information, etc.
4. Virus
▪ A virus is a malicious code written to damage/harm the host computer by deleting or appending a
file, occupy memory space of the computer by replicating the copy of the code, slow down the
performance of the computer, format the host machine, etc.
▪ It can be spread via email attachment, pen drives, digital images, e-greeting, audio or video clips,
etc.
▪ A virus may be present in a computer but it cannot activate itself without the human intervention.
▪ Until and unless the executable file(.exe) is execute, a virus cannot be activated in the host
machine.
5. Worms
▪ They are a class of virus which can replicate themselves.
▪ They are different from the virus by the fact that they does not require human intervention to
travel over the network and spread from the infected machine to the whole network.
▪ Worms can spread either through network, using the loopholes of the Operating System or via
email.
▪ The replication and spreading of the worm over the network consumes the network resources
like space and bandwidth and force the network to choke.
6. Trojan Horse
▪ Trojan horse is a malicious code that is installed in the host machine by pretending to be useful
software.
▪ The user clicks on the link or download the file which pretends to be a useful file or software from
legitimate source.
▪ It not only damages the host computer by manipulating the data but also it creates a backdoor in
the host computer so that it could be controlled by a remote computer.
▪ It can become a part of botnet(robot-network), a network of computers which are infected by
malicious code and controlled by central controller.
▪ The computers of this network which are infected by malicious code are known as zombies.
▪ Trojens neither infect the other computers in the network nor do they replicate.
▪ Trojan Horse is a program in which the malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and cause damage, such as
ruining the file allocation table on your hard disk.
▪ Trojans get activated upon users' certain predefined actions.
▪ Indications of a Trojan attack include abnormal system and network activities such as disabling
of antivirus, redirection to unknown pages, etc.
▪ Trojans create a covert communication channel between victim computer and attacker for
transferring sensitive data.
Types of Trojans
✓ VNC Trojan
✓ HTTP Trojan
✓ HTTPS Trojan
✓ ICMP Trojan
✓ FTP Trojan
✓ Data Hiding Trojan
✓ Destructive Trojan
✓ Botnet Trojan
✓ Proxy Server Trojan
✓ Remote Access Trojan
✓ Defacement Trojan
✓ E-banking Trojan
✓ Covert Channel Trojan
✓ Notification Trojan
✓ Mobicle Trojan
✓ Command Shell Trojan
7. Spareware
▪ Internet has changed how we talk, shop, play etc.
▪ It has even changed the way how the criminal target the people for ransom.
▪ While surfing the Internet, suddenly a pop-up alert appears in the screen which warns the
presence of dangerous virus, spywares, etc. in the user‟s computer.
▪ As a remedial measure, the message suggests the used download the full paid version of the
software.
▪ As the user proceeds to download, a malicious code, known as scareware is downloaded into
the host computer.
▪ It holds the host computer hostage until the ransom is paid.
▪ The malicious code can neither be uninstalled nor can the computer be used till the ransom is
paid.
Malware Analysis
▪ Malware analysis is the process of understanding the behavior and purpose of a suspicious file
or URL.
▪ The output of the analysis aids in the detection and mitigation of the potential threat.
▪ The key benefit of malware analysis is that it helps incident responders and security analysts:
Dynamic Analysis
▪ Dynamic malware analysis executes suspected malicious code in a safe environment called
a sandbox.
▪ This closed system enables security professionals to watch the malware in action without the risk
of letting it infect their system or escape into the enterprise network.
▪ Dynamic analysis provides threat hunters and incident responders with deeper visibility, allowing
them to uncover the true nature of a threat.
▪ As a secondary benefit, automated sandboxing eliminates the time it would take to reverse
engineer a file to discover the malicious code.
▪ The challenge with dynamic analysis is that adversaries are smart, and they know sandboxes are
out there, so they have become very good at detecting them.
▪ To deceive a sandbox, adversaries hide code inside them that may remain dormant until certain
conditions are met. Only then does the code run.
Hybrid Analysis
▪ Basic static analysis isn’t a reliable way to detect sophisticated malicious code, and sophisticated
malware can sometimes hide from the presence of sandbox technology.
▪ By combining basic and dynamic analysis techniques, hybrid analysis provide security team the
best of both approaches –primarily because it can detect malicious code that is trying to hide,
and then can extract many more indicators of compromise (IOCs) by statically and previously
unseen code.
▪ Hybrid analysis helps detect unknown threats, even those from the most sophisticated malware.
➢ Threat Hunting
➢ Malware Research
Malware Countermeasures
➢ Frequent deletion of stored cookies and temporary files from Web browsers.
➢ Regular scanning for viruses and other malware.
➢ Regular installation of updates and patches for operating systems.
➢ Refusing to click on links that appear within e-mail messages.
3.8 Sniffing
Sniffing Concepts
▪ Sniffing involves capturing, decoding, inspecting and interpreting the information inside a network
packet on a TCP/IP network.
▪ The purpose is to steal information, usually user IDs, passwords, network details, credit card
numbers, etc.
▪ Sniffing is generally referred to as a “passive” type of attack, wherein the attackers can be
silent/invisible on the network. This makes it difficult to detect, and hence it is a dangerous type
of attack.
▪ The sniffing process is used by hackers either to get information directly or to map the technical
details of the network in order to create a further attack.
▪ Hackers are always in favour of sniffing, because it can be done for a longer time without getting
caught.
▪ Sniffers get the job done by capturing and
inspecting the data “packets” traveling along a
network.
▪ Imagine internet traffic like real-world traffic: It’s like
a series of cars driving on a road, and it ebbs and
flows depending on a variety of factors.
▪ On the internet, each car is a packet, and the
people inside are the data it carries.
▪ Some sniffers are available as hardware appliances, often built directly into network devices such
as routers for convenient management. But in most cases, people opt for sniffing software over
hardware.
Types of Sniffing
▪ There are two main types of sniffing techniques: passive and active sniffing.
▪ The type of sniffing technique used depends on the structure of the network one is trying to sniff.
▪ Passive sniffing works with hubs, but if switches are involved, active sniffing is required.
➢ Sniffing
➢ Passive
➢ Active
Passive Sniffing
▪ Hubs are simple networking devices that connect several devices together into a single network.
▪ There aren’t any regulatory mechanisms that steer traffic to its intended recipient; rather, all
devices receive all the traffic, and then determine whether or not that traffic is relevant.
▪ Because all devices in a hub receive all the network’s traffic, a sniffer can easily and passively
soak up everything that’s being sent.
▪ There’s nothing to actually do other than sit back and sniff. This makes passive sniffing very
difficult to detect. Not impossible, but difficult.
Active Sniffing
▪ In order to access all the traffic passing through the network, an active sniffer needs to get
around or overcome the way switches direct everything.
▪ There are a few different ways to accomplish this, but all of them involve injecting additional
traffic into the network.
▪ The upside for potential victims is that an active sniffer is easier to detect, because it gives its
own presence away.
➢ Ettercap
➢ OmniPeek
➢ Dsniff
➢ EtherApe
➢ MSN Sniffer
➢ NetWitness NextGen
➢ Colasoft Capsa
➢ Telerik Fiddler
2. Ettercap
▪ Ettercap tool is a software comprehensively sharp tool suited for man-in-the-middle attacks for
networks.
▪ It has features as well as sniffing of live connections, content filtering.
▪ It supports active and passive dissection of many protocols and includes many features such as
the network and the host analysis.
3. Tcpdump
▪ The tcpdump tool is a well-known command-line packeting analyzer.
▪ It provides the ability to intercept and ability to observing TCP/IP and other packets during
transmission over the network.
▪ Available at www.tcpdump.org. thus, tcpdump captures all traffic on the specified networks via
libcap and then “dumps” it directly at your screen.
4. Wireshark
▪ The Wireshark tool is one of the most widely common software as known and uses packet
sniffers.
▪ It offers an unlimited number of features designed to implement and assist in the dissection and
analysis of traffic for it.
▪ The Wireshark packet sniffing tool is known for both its data capture and analysis capabilities.
▪ We can apply filters to limit the scope of data as well as Wireshark collecting through it, or simply
let it collect all traffic passing through your selected networks.
Social Engineering
▪ Scams based on social engineering are built around how people think and act.
▪ As such, social engineering attacks are especially useful for manipulating a user’s behavior.
▪ Once an attacker understands what motivates a user’s actions, they can deceive and manipulate
the user effectively.
▪ In addition, hackers try to exploit a user's lack of knowledge.
Scareware
▪ Scareware involves victims being bombarded with false alarms and fictitious threats.
▪ Users are deceived to think their system is infected with malware, prompting them to install
software that has no real benefit (other than for the perpetrator) or is malware itself.
▪ Scareware is also referred to as deception software, rogue scanner software and fraudware.
Pretexting
▪ Here an attacker obtains information through a series of cleverly crafted lies.
▪ The scam is often initiated by a perpetrator pretending to need sensitive information from a victim
so as to perform a critical task.
▪ The attacker usually starts by establishing trust with their victim by impersonating co-workers,
police, bank and tax officials, or other persons who have right-to-know authority.
▪ The pretexter asks questions that are ostensibly required to confirm the victim’s identity, through
which they gather important personal data.
▪ All sorts of pertinent information and records is gathered using this scam, such as social security
numbers, personal addresses and phone numbers, phone records, staff vacation dates, bank
records and even security information related to a physical plant.
Phishing
▪ Phishing scams are email and text message campaigns aimed at creating a sense of urgency,
curiosity or fear in victims.
▪ It then prods them into revealing sensitive information, clicking on links to malicious websites, or
opening attachments that contain malware.
▪ An example is an email sent to users of an online service that alerts them of a policy violation
requiring immediate action on their part, such as a required password change. It includes a link
to an illegitimate website nearly identical in appearance to its legitimate version prompting the
unsuspecting user to enter their current credentials and new password. Upon form submittal the
information is sent to the attacker.
Spear Phishing
▪ This is a more targeted version of the phishing scam whereby an attacker chooses specific
individuals or enterprises.
▪ They then tailor their messages based on characteristics, job positions, and contacts belonging
to their victims to make their attack less conspicuous.
▪ Spear phishing requires much more effort on behalf of the perpetrator and may take weeks and
months to pull off.
▪ They’re much harder to detect and have better success rates if done skillfully.
▪ A spear phishing scenario might involve an attacker who, in impersonating an organization’s IT
consultant, sends an email to one or more employees.
▪ It’s worded and signed exactly as the consultant normally does, thereby deceiving recipients into
thinking it’s an authentic message.
▪ The message prompts recipients to change their password and provides them with a link that
redirects them to a malicious page where the attacker now captures their credentials.
Types
Steps
▪ There are four main steps to performing a social engineering penetration test including:
➢ Test planning and scoping
➢ Attack vector identification
➢ Penetration attempts
➢ Reporting
▪ For Example:
▪ Security guards will be tested using a tailgating test. This test will involve the tester closely
monitoring employees as they enter the building and entering the building, or secure area, while
a high volume of people are entering.
▪ Personnel in accounting will be tested using a phishing test. This test will involve sending an
accountant a phishing email that spoofs the Chief Executive Office and will request the last
month’s expense report for review.
▪ An employee in IT will be tested using an impersonation test. This test will involve a member of
the pen test requesting a password reset for an employee in the account receivable department.
Step 4: Reporting
▪ The reporting step of a pen test is where you bring all of the results in together. While writing the
report remember who your audience is.
▪ In most cases, the audience is senior management and your report should speak to them.
▪ Make sure to address all of their initial concerns discussed at the inception of the test as well as
all of the vulnerabilities you found during the test.
▪ In the report, you should not only mention the vulnerabilities found, but you should also provide
recommendations for how to mitigate the vulnerabilities.
▪ A typical pen testing report consists of:
1. An executive summary
2. A walkthrough of technical risks found
3. The potential impact of the vulnerabilities found
4. The remediation options available for each vulnerability found
5. Your concluding thoughts of the pen test
6. Vulnerability Elimination
3.10 Denial-of-Service
Denial-of-Service (DoS)
▪ Denial of service (DoS) is a type of cyber attack designed to disable, shut down or disrupt a
network, website or service.
▪ Typically, a malware is used to interrupt or inhibit the normal flow of data into and out of a system
to render the target useless or inaccessible for a certain period.
▪ An example of a DoS attack: when a website is accessed massively and repeatedly from
different locations, preventing legitimate visitors from accessing the website.
▪ A DDoS attack is launched from numerous compromised devices, often distributed globally in
what is referred to as a botnet.
▪ It is distinct from other denial of service (DoS) attacks, in that it uses a single Internet-connected
device (one network connection) to flood a target with malicious traffic.
▪ This nuance is the main reason for the existence of these two, somewhat different, definitions.
▪ Changing permissions or breaking authorization logic to prevent users from logging into a
system.
▪ One common example involves triggering a rapid series of false login attempts that lockout
accounts from being able to log in.
▪ Deleting or interfering with specific critical applications or services to prevent their normal
operation (even if the system and network overall are functional).
➢ UDP Flood
➢ ICMP (Ping) Flood
➢ SYN Flood
➢ Ping of Death
➢ Slowloris
➢ NTP Amplification
➢ HTTP Flood
DDoS Techniques
➢ DoS/DDoS Attacks
➢ Volume Based Attacks
➢ Protocol Attacks
➢ Application Layer Attacks
Protocol Attacks
▪ Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more.
▪ This type of attack consumes actual server resources, or those of intermediate communication
equipment, such as firewalls and load balancers, and is measured in packets per second (Pps).
▪ Comprised of seemingly legitimate and innocent requests, the goal of these attacks is to crash
the web server, and the magnitude is measured in Requests per second (Rps).
GOLDENEYE
▪ GoldenEye is another piece of open-source DDOS attack testing software.
▪ The application is based on HULK but it differs from its predecessor significantly, as it doesn’t
just send packets to the server, it also simulates the users staying connected to the server.
▪ This program is perfect for carrying out stress tests on networks and applications.
HULK
▪ HULK or Http Unbearable Load King is a program created by cybersecurity expert Barry
Shteiman.
▪ This tool effectively finds its way around caching and attacks the server directly with unique
packets.
▪ Unlike many other DDOS testing tools that utilize a predictable pattern when sending the
packets, making the attack easier to detect and stop, HULK makes each request unique.
▪ This tool also allows you to carry out the simulated attack safely with the ability to control and
stop it at any time.
▪ Listen to the views of experts, for the attack in advance to respond to the emergency program.
▪ Monitoring the network and web traffic. If it is possible to configure multiple analysis tools, such
as Statcounter and Google analytics, you can more visually understand the pattern of traffic
changes and get more information from it.
▪ To protect DNS to avoid DNS amplification attacks.
▪ Disable ICMP on the router. Open ICMP only when testing is required. The following strategies
are also considered when configuring the router: flow control, packet filtering, half-connection
timeout, garbage packet discard, source forged packet drop, SYN threshold, disable ICMP and
UDP broadcast.
▪ A byproduct of this type of attack is the ability to gain access to a server without having to
authenticate to it.
▪ Once the attacker hijacks a session, they no longer have to worry about authenticating to the
server as long as the communication session remains active.
▪ The attacker enjoys the same server access as the compromised user because the user has
already authenticated to the server prior to the attack.
▪ To cause an interrupt in the communication between client and server, the attackers send
massive traffic to attack a valid session and cause a denial of service attack(DoS).
Hybrid Hijacking
▪ The combination of Active Session Hijacking and Passive Session Hijacking is referred to as
Hybrid Hijacking.
▪ In this the attackers monitors the communication channel (the network traffic), whenever they
find the issue, they take over the control on the web session and fulfill their malicious tasks.
Man-in-the-browser
▪ Man-in-the-browser uses a Trojan Horse (program that uses malicious code) to perform its
required action.
▪ The attacker puts themselves in the communication channel of a server and a client.
▪ The main purpose of performing this attacks by the attacker is to cause financial fraud.
Malware infections
▪ In Malware Infections, attacker can deceive the user to open a link that is a malware or Trojans
program which will install the malicious software in the device.
▪ These are programmed to steal the browser cookies without the user’s knowledge.
Session Fixation
▪ Attackers create a duplicate or another disguised session in Session Fixation.
▪ It simply motivates or trick the user into authenticating the vulnerable server.
▪ This can be done by sending an email to the user, which on clicking directs to the attacker
session.
Session side-jacking
▪ In Session side-jacking, the attackers tries to get access over a session using the network traffic.
▪ This becomes easy when the user is using an insecure Wi-Fi. The reading of network traffic and
stealing of session cookie is done by packet sniffing.
Use a VPN
▪ A VPN helps prevent attackers from intercepting traffic, making it more difficult for them to steal
session IDs (McCann & Hardy, 2022).
▪ We simulate a scenario where the attacker steals all the cookies which are not protected against
disclosure over HTTP, and presents them to the website to access the victim’s account.
▪ If these cookies are enough to act on the victim’s behalf, session hijacking is possible.
▪ Here are the steps for executing this test:
1. Login to the website as the victim and reach any page offering a secure function requiring
authentication.
2. Delete from the cookie jar all the cookies which satisfy any of the following conditions.
➢ in case there is no HSTS adoption: the SECURE attribute is set.
➢ in case there is partial HSTS adoption: the SECURE attribute is set or the DOMAIN
attribute is not set.
3. Save a snapshot of the cookie jar.
4. Trigger the secure function identified at step 1.
5. Observe whether the operation at step 4 has been performed successfully. If so, the attack
was successful.
6. Clear the cookie jar, login as the attacker and reach the page at step 1.
7. Write in the cookie jar, one by one, the cookies saved at step 3.
8. Trigger again the secure function identified at step 1.
9. Clear the cookie jar and login again as the victim.
10. Observe whether the operation at step 8 has been performed successfully in the victim’s
account. If so, the attack was successful; otherwise, the site is secure against session
hijacking.
▪ It is recommend to use two different machines or browsers for the victim and the attacker.
▪ This allows you to decrease the number of false positives if the web application does
fingerprinting to verify access enabled from a given cookie.
▪ A shorter but less precise variant of the testing strategy only requires one testing account. It
follows the same pattern, but it halts at step 5 (note that this makes step 3 useless).
▪ Modern organizations incorporate them into a security information and event management
(SIEM) strategy along with other cybersecurity devices.
▪ They may be installed at an organization's network perimeter to guard against external threats, or
within the network to create segmentation and guard against insider threats.
▪ In addition to immediate threat defense, firewalls perform important logging and audit functions.
▪ They keep a record of events, which can be used by administrators to identify patterns and
improve rule sets.
▪ Rules should be updated regularly to keep up with ever-evolving cybersecurity threats.
▪ Vendors discover new threats and develop patches to cover them as soon as possible.
▪ In a single home network, a firewall can filter traffic and alert the user to intrusions.
▪ They are especially useful for always-on connections, like Digital Subscriber Line (DSL) or cable
modem, because those connection types use static IP addresses.
▪ They are often used alongside to antivirus applications.
▪ Personal firewalls, unlike corporate ones, are usually a single product as opposed to a collection
of various products.
▪ They may be software or a device with firewall firmware embedded.
▪ Hardware/firmware firewalls are often used for setting restrictions between in-home devices.
▪ If the honeypots don’t actually contain confidential data and are well-monitored, one can get
insight on attacker tools, tactics, and procedures (TTPs) and gather forensic and legal evidence
without putting the rest of the network at risk.
▪ An HTTP server can be accessed through the domain names of the websites it stores, and it
delivers the content of these hosted websites to the end user's device.
▪ Whenever a browser needs a file that is hosted on a web server, the browser requests the file via
HTTP.
▪ When the request reaches the correct
(hardware) web server, the (software)
HTTP server accepts the request, finds
the requested document, and sends it
back to the browser, also through
HTTP. (If the server doesn't find the
requested document, it returns a 404
response instead.)
To publish a website, you need either a static or a dynamic web server.
▪ A static web server, or stack, consists of a computer (hardware) with an HTTP server
(software). We call it "static" because the server sends its hosted files as-is to your browser.
▪ A dynamic web server consists of a static
web server plus extra software, most
commonly an application server and a
database. We call it "dynamic" because the
application server updates the hosted files
before sending content to your browser via
the HTTP server.
▪ For example, to produce the final
webpages you see in the browser, the
application server might fill an HTML
template with content from a database.
▪ Sites like MDN or Wikipedia have
thousands of webpages. Typically, these kinds of sites are composed of only a few HTML
templates and a giant database, rather than thousands of static HTML documents.
Phishing Attacks
▪ A Phishing attack is a social engineering attack to obtain sensitive, confidential information such
as usernames, passwords, credit card numbers, etc.
▪ It is a practice of fraudulent attempts that appear to come from a reputable source.
▪ Scammers mostly use emails and text messages to trick you in a phishing attack.
Website Defacement
▪ Website Defacement is an attack where an attacker changes the website/web page's visual
appearance with their messages.
▪ SQL injection attack is mainly used in web defacement.
▪ An attacker can add SQL strings to craft a query maliciously and exploit the webserver.
Footprinting
▪ An attacker uses passive methods
to find information about the victim
before performing an attack.
▪ The attacker keeps minimum
interactions with the victim to
avoid detection and alerting the target of the attack.
▪ Footprinting can quickly reveal the vulnerabilities of the target system and can exploit them.
▪ There are various methods to gather information such as Whois, Google Searching, Operating
system detection, network enumeration, etc.
Metasploit
▪ This is an open source tool for developing, testing and using exploit code.
▪ It can be used to discover vulnerabilities in web servers and write exploits that can be used to
compromise the server.
Mpack
▪ This is a web exploitation tool.
▪ It was written in PHP and is backed by MySQL as the database engine.
▪ Once a web server has been compromised using MPack, all traffic to it is redirected to malicious
download websites.
Zeus
▪ This tool can be used to turn a compromised computer into a bot or zombie.
▪ A bot is a compromised computer which is used to perform internet-based attacks.
▪ A botnet is a collection of compromised computers.
▪ The botnet can then be used in a denial of service attack or sending spam mails.
Patch management
▪ This involves installing patches to help secure the server.
▪ A patch is an update that fixes a bug in the software.
▪ The patches can be applied to the operating system and the web server system.
▪ An organization can adopt the following policy to protect itself against web server attacks.
▪ Secure installation and configuration of the operating system
▪ An organization can adopt the following policy to protect itself against web server attacks.
▪ Firewalls can be used to stop simple DoS attacks by blocking all traffic coming the identify
source IP addresses of the attacker.
▪ Antivirus software can be used to remove malicious software on the server
▪ An organization can adopt the following policy to protect itself against web server attacks.
▪ Disabling Remote Administration
▪ Default accounts and unused accounts must be removed from the system
▪ Default ports & settings (like FTP at port 21) should be changed to custom port & settings (FTP
port at 5069)
12. Bruteforce SSH,FTP, and other services login credentials to gain unauthorized access.
13. Perform session hijacking to capture valid session cookies and ID’s,use tools such
as Burb suite , Firesheep ,jhijack to automated session hijacking.
14. Performing a MITM attack to access sensitive information by intercepting the
communications between the end-users and web servers.
15. Use tools such as Webalizer, AWStats to examine the web server logs .
Angry IP scanner
▪ The tool helps by assisting hackers in scanning IP addresses as well as ports looking to find a
doorway into another
user’s system.
▪ The software is open
source and cross-
platform, which makes it
one of the most reliable
hacking tools you will
find on the market.
▪ The app is mostly used
by network
administrators and
system engineers.
▪ Let users find the most vulnerable route through which an attack can be made
▪ Helps in finding loopholes that can lead to the theft of sensitive data.
▪ In the current market demand, there has been a sharp increase in mobile usage, which has
become a major potential for attacks. Accessing websites through mobile phones is prone to
more frequent attacks and hence compromising data. Penetration Testing thus becomes very
important in ensuring we build a secure system that can be used by users without any worries of
hacking or data loss.
➢ You can classify SQL injections types based on the methods they use to access backend data
and their damage potential.
1. In-band SQLi
▪ In-band SQL Injection occurs when an attacker can use the same communication channel to
launch the attack and gather results.
a. Error based
▪ Error-based injections give insight into the database.
▪ These errors can be helpful to developers and network administrators but must be restricted
on the application side.
▪ Example: If the server responds to this URL with an SQL error, it shows the server has
connected to the database in an insecure way. After this step, some of the SQL commands
can be run to tamper or destroy the database.
b. Union-based
▪ It is a type of injection that combines the results of two or more SELECT statements into a
single result using the UNION operator to get more information from the database.
▪ Example: The below example shows an attacker can get the number of columns using this
type of injection attack.
2. Out-of-band SQLi
▪ Out-of-band SQL injection occurs when an attacker is unable to use the same channel to launch
the attack and gather results.
▪ The database server can send data to an attacker with the ability to make DNS or HTTP
requests.
a. Boolean-based
▪ This technique forces different responses to get from the application, depending on whether
the query returns correct or incorrect results by sending queries to the database.
▪ Example: As in the first query, we can estimate the length of the database with Boolean
expressions based on the answers returned from the database. And of course, we can even
find out its name by furthering a query like this. With a query like in the second example, we
can ensure that all items in the x category are displayed from the database.
b. Time-based
▪ This technique forces the database to wait for a while before responding after the query is
submitted.
▪ Example: With this technique, we can query whether the user is a system admin from the
returned response time using a time-based query with a conditional query as in the first
example. Or we can determine that the database type is MySQL from the slowness of the
response time returned by using an example such as the second query and a query such as if
the database version is equal to MYSQL 5.
▪ SELECT * FROM products WHERE id=1; IF SYSTEM_USER='sa' WAIT FOR DELAY
'00:00:15’
▪ SELECT * FROM card WHERE id=1-IF(MID(VERSION(),1,1) = '5', SLEEP(15), 0)
Countermeasures
▪ SQL Injection vulnerabilities can be
prohibited with special prevention
techniques according to the subtype of
SQLi vulnerability, SQL database engine, and programming language.
▪ The general principles you can follow to keep your web application secure are as follows:
Primary Defenses
▪ Option 1: Using Prepared Statements
▪ Option 2: Using Stored Procedures
▪ Option 3: Using Whitelist for Inputs
▪ Option 4: Not Using User Inputs
Additional Defenses
▪ Option 1: Using Least Privilege
▪ Option 2: Performing Whitelist Input
Validation
▪ To prevent SQL Injection:
➢ Use Stored Procedure, Not Dynamic SQL
➢ Use Prepared Statements
➢ Use Object Relational Mapping (ORM)
Framework
➢ Least Privilege
➢ Input Validation
➢ Character Escaping
➢ Vulnerability Scanners
➢ Use Web Application Firewall
Detection Techniques
▪ The first step in this test is to understand when the application interacts with a DB Server in order
to access some data.
▪ Typical examples of cases when an application needs to talk to a DB include:
➢ Authentication forms: when authentication is performed using a web form, chances are that
the user credentials are checked against a database that contains all usernames and
passwords (or, better, password hashes).
➢ Search engines: the string submitted by the user could be used in a SQL query that extracts
all relevant records from a database.
➢ E-Commerce sites: the products and their characteristics (price, description, availability, etc)
are very likely to be stored in a database.
▪ The tester has to make a list of all input fields whose values could be used in crafting a SQL
query, including the hidden fields of POST requests and then test them separately, trying to
interfere with the query and to generate an error.
▪ Consider also HTTP headers and Cookies.
▪ The very first test usually consists of adding a single quote ' or a semicolon ; to the field or
parameter under test.
▪ The first is used in SQL as a string terminator and, if not filtered by the application, would lead to
an incorrect query.
▪ The second is used to end a SQL statement and, if it is not filtered, it is also likely to generate an
error.
▪ The output of a vulnerable field might resemble the following (on a Microsoft SQL Server, in this
case):
▪ Microsoft OLE DB Provider for ODBC Drivers error '80040e14' [Microsoft][ODBC SQL Server
Driver][SQL Server]Unclosed quotation mark before the character string ''. /target/target.asp, line
113
▪ Also comment delimiters (-- or /* */, etc) and other SQL keywords like AND and OR can be used
to try to modify the query.
▪ A very simple but sometimes still effective technique is simply to insert a string where a number
is expected, as an error like the following might be generated:
▪ Microsoft OLE DB Provider for ODBC Drivers error '80040e07' [Microsoft][ODBC SQL Server
Driver][SQL Server]Syntax error converting the varchar value 'test' to a column of data type int.
/target/target.asp, line 113
▪ Monitor all the responses from the web server and have a look at the HTML/JavaScript source
code.
▪ Sometimes the error is present inside them but for some reason (e.g. JavaScript error, HTML
comments, etc) is not presented to the user.
▪ A full error message, like those in the examples, provides a wealth of information to the tester in
order to mount a successful injection attack.
▪ SELECT * FROM Users WHERE Username='1' OR '1' = '1' AND Password='1' OR '1' = '1'
▪ Wireless networks are based on IEEE 802.11 standards defined by the Institute of Electrical and
Electronics Engineers (IEEE ) for ad hoc networks or infrastructure networks.
▪ Infrastructure networks have one or more access points that coordinate the traffic between the
nodes. But in ad hoc networks, there is no access point; each node connects in a peer-to-peer
way.
▪ Two types of vulnerabilities can be found in the Wireless LAN:
➢ Poor configuration
➢ Poor encryption
▪ Poor configuration is caused by the network admin who manages the network. It may include a
weak password, a lack of security settings, use of default configurations and other user-related
issues.
▪ Poor encryption is related to security keys used to protect the wireless network. These
vulnerabilities exist because of issues in WEP or WPA.
▪ To get unauthorized access to a network, one needs to crack these security protocols. Many
tools can crack Wi-Fi encryption.
▪ These tools can either take advantage of WEP weaknesses or use brute force password
guessing attacks on WPA/WPA2/WPA3.
Types of Threats
Deauthentication Attacks
▪ Disabling networks using deauthentication attacks.
▪ These attacks exploit a known weakness in the protocol and can be generated on standard PC
equipment or using cheap devices available online:
➢ Evil Twin attacks
➢ Spying on WiFi
Methodologies
Wi-Fi Discovery
▪ Wi-Fi discovery is a process used to learn about WLAN's presence in the environment.
▪ WiFi discovery process is not against any law, since you are not acting offensively at any point,
you are simply, passively listening to the Wi-Fi frequency bands, using your wireless client.
▪ In order to discover what type of WLAN networks are present, you need to use specific tools that
uses wireless hardware and listens on either a 2.4GHz or a 5GHz band.
▪ Some of them are built-in to the operating system (they are most often very ineffective for
detailed WLAN analysis), and other ones are simple tools.
War Driving
▪ Wardriving is the process of finding a Wireless Network (wireless network discovery) by a person
in a car using their personal laptop, smartphone or other wireless client tools.
▪ Basically, the intention is to find some free-access wireless network, that malicious user can use
without any legal obligations.
▪ Examples might be some market, that offer free Wi-Fi, without registration or some hotel that you
can just register with fake data.
GPS Mapping
▪ There is a number of satellites that orbit the globe, each of them sending a low-power radio
signal towards the piece of earth it covers.
▪ The GPS device that you use, it may be for example a smartphone with google maps application
started, receives that signal from multiple satellites at the same time.
▪ The device itself combines those signals together and calculate current geographical location on
earth.
▪ The idea of GPS mapping is to map a wireless network that the user encounters on the global
map of wireless network in reference to its geographical location.
▪ One may use the Kismet tool to map its wireless network to the geographical location, and then
put its coordinates on the google earth map.
GPS mapping
▪ GPS is a radio navigation system that allows land, sea, and airborne users to determine their
exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the
world.
Wireless traffic analysis
▪ Wireless traffic analysis provides a means for many investigational leads for a forensic
examination.
Execute attacks
▪ These statements control a database server behind a web application.
▪ Attackers can use SQL Injection vulnerabilities to bypass application security measures.
Hacker’s Profit
Hacking Android OS
▪ Android OS is Developed by google.
Features
▪ Enabling reuse and replacement of components
▪ Variety of pre-build UI components
▪ Open source Blink and Webkit engine
▪ Media Support
▪ Rich development environment
Android Rooting
▪ Allows user to attain privileged control within androids subsystem
▪ Involves executing security vulnerabilities in the device firmware and granting execute
permissions
Rooting Tool
➢ KingoRoot - can be used with or without a PC
➢ TunesGo - Root Android - Done with PC
➢ One Click Root - Done with PC
Network Spoofer
▪ Change websites on other peoples computers
DroidSheep
▪ Perform web session hijacking
Orbot
▪ Proxy app that hides identity
FaceNiff
▪ Sniff and intercept web session profiles
Android Trojans
➢ BankBot
➢ SpyDealer
Hacking IOS
Apple IOS
▪ Apples Mobile OS
▪ Uses direct manipulation and multi touch gestures
Jailbreaking
▪ Installing a modified set of kernel patches that allows users to run third party applications not
singed by OS vendor
▪ Provides root access to the OS
▪ Removes sandbox restrictions
Types of Jailbreaking
▪ Userland Exploit - Allows user-level access
▪ iBoot Exploit - Allows user-level access and iboot-level access
▪ Bootrom Exploit - Allows user-level access and iboot-level access
Jailbreaking Techniques
▪ Untethered Jailbreaking - Allows the device to reboot and the kernel will still be patched
▪ Semi-tethered Jailbreaking - If the device reboots the kernel will no longer have a patched
kernel but will still be usable for normal functions
▪ Tethered Jailbreaking - If the device reboots the kernel will no longer have a patched kernel
and will get stuck in a partially started state
Jailbreaking Tools
▪ Cydia - Enables a user to find and install software packages
▪ Pangu Anzhuang - Online jailbraking app
▪ Keen Jailbreak - Unofficial semi-tethered tool
IOS Trojans
▪ AceDeceiver - Exploits flaw in DRM (Digitals Rights Management)
▪ Spy/MobileSpy!iPhoneOS - Malware allows and attacker to eavesdrop all incoming and
outgoing communications
IoT Hacking
▪ There are billions of such devices and because of poor security practices they're increasingly
becoming the target of hackers: especially those wanting to create a network of compromised
devices, or botnet.
▪ As the number of unsecured devices connected to corporate networks increases, so do IoT
ransomware attacks.
▪ Hackers infect devices with malware to turn them into botnets that probe access points or search
for valid credentials in device firmware that they can use to enter the network.
Fiddler
▪ It is an open-source web proxy tool that works with any browser or platform.
▪ It has many features to help a pen-testing device.
▪ It allows users to debug the web traffic on any system.
Metasploit
▪ It is a security tool that gives software security information and enhances penetration testing.
▪ It is an open-source penetration tool used to test vulnerabilities in the computer and gain access
to the computer remotely and secure them from hacking.
Maltego
▪ It is an open-source tool; it has a comprehensive method to collect and connect the information
to investigative tasks through Open-Source intelligence and graphical relation analysis in real-
time.
▪ Maltego focuses on providing a library of transforms to find data from open sources and visualize
it in a graph format that can be used for connection analysis and data mining.
➢ Modifications of firmware
➢ Debugging
➢ Detection of configuration interfaces or backdoors
Misconfiguration Mishaps
▪ Attacks associated with misconfiguration occur due to incorrect setup of information assets, such
as when an organization fails to safeguard their data in the public cloud.
▪ Sensitive data may be stored and inadequately guarded.
▪ In constant search for attack vectors, hackers rely on misconfigurations to collect targeted data.
Examples of misconfiguration include:
➢ Insecure data storage elements or containers
➢ Excessive permissions – the opposite of following the principle of least privilege
➢ Unchanged default credentials and configuration settings
➢ Disabled standard security controls
▪ SSRF is a danger because hackers can provide or access URLs, read configuration data, and
infiltrate further to internal services without authorized access.
▪ A server-side request forgery (SSRF) can occur when a web application fails to validate a URL
provided by a malicious user. Attackers can supply a URL that tells the application to make a
request or provide data that would otherwise be off-limits. SSRF attacks are growing in popularity
among cloud hackers.
Ransomware Transfers
▪ Ransomware can affect cloud storage services just as much as on-premises databases, often
leaping from one to the other.
▪ For example, if businesses automatically sync local files to the cloud, then a ransomware attack
infecting local systems would result in the cloud files being affected as well.
▪ The past few years have seen a surge in so-called “ransomcloud” attacks.
3.20 Cryptography
▪ In computer science, cryptography refers to secure information and communication techniques
derived from mathematical concepts and a set of rule-based calculations called algorithms, to
transform messages in ways that are hard to decipher.
▪ Cryptography is the practice and study of hiding information.
▪ Cryptography is used in applications present in technologically advanced societies. Ex: ATM
cards, computer passwords, and electronic commerce etc.
Cryptography in Hacking
Cryptography Algorithms
▪ An encryption algorithm is the method used to transform data into ciphertext.
▪ Encryption: A process of encoding a message, so that its meaning is not obvious. ( = encoding,
enciphering)
▪ Decryption: A process of decoding an encrypted message back into its original form. ( =
decoding, deciphering)
▪ Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock
(decrypt) it.
Cryptography Technique
Cryptanalysis
▪ Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text.
▪ Cryptanalysis uses mathematical formulas to search for algorithm vulnerabilities and break into
cryptography or information security systems.
▪ Cryptanalysis is used to understand the weaknesses within a cryptographic algorithm to decrypt
the contents of in-transit or at-rest data.
▪ While the objective of cryptanalysis is to find weaknesses in or otherwise defeat cryptographic
algorithms, cryptanalysts' research results are used by cryptographers to improve and strengthen
or replace flawed algorithms.
▪ Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis
uses mathematical formulas to search for algorithm vulnerabilities and break into cryptography or
information security systems.
Hashing
▪ Hashing generates a unique signature of fixed length for a data set or message.
▪ Each specific message has its unique hash, making minor changes to the information easily
trackable.
▪ Data encrypted with hashing cannot be deciphered or reversed back into its original form. That’s
why hashing is used only as a method of verifying data.
▪ Many internet security experts don’t even consider hashing an actual encryption method, but the
line is blurry enough to let the classification stand.
▪ The bottom line, it’s an effective way of showing that no one has tampered with the information.
PKI Deployment
▪ PKIs provide a framework that enables cryptographic data security technologies such as digital
certificates and signatures to be effectively deployed on a mass scale.
▪ PKIs support identity management services within and across networks and underpin online
authentication inherent in secure socket layer (SSL) and transport layer security (TLS) for
protecting internet traffic, as well as document and transaction signing, application code signing,
and time-stamping.
▪ PKIs support solutions for desktop login, citizen identification, mass transit, mobile banking, and
are critically important for device credentialing in the IoT.
▪ Device credentialing is becoming increasingly important to impart identities to growing numbers
of cloud-based and internet-connected devices that run the gamut from smart phones to medical
equipment.
Countermeasures
▪ To prevent people with malicious intent from breaking into a secure device, the device must be
designed with features that not only provide security but also protect the device from attacks.
▪ Maxim’s secure devices have robust countermeasures to protect against all these attacks. Here
are some of the implemented features:
➢ Patented physically unclonable function (PUF) technology to secure device data.
➢ Actively monitored die shield that detects and reacts to intrusion attempts.
➢ Cryptographic protection of all stored data from discovery.
▪ Six practices we suggest organizations should follow to keep your data and assets safe from
cyber attacks:
➢ Install software updates and patches
➢ SecOps best practice: Integrate security into each development lifecycle step
➢ Configure Cloud environments and containers properly
➢ Assign and time-limit hard-to-crack passwords to admin consoles (Zero Trust)
➢ Leverage the community: Everybody hurts
➢ Continuously monitor cloud environments and react quickly
Section 3: Exercises
19. ______ means revealing sensitive information, clicking on links to malicious websites, or
opening attachments that contain malware.
20. What are four main steps to perform a social engineering penetration test?
21. What are the types of DDoS attacks?
22. What are three DDoS techniques?
23. ________, also known as TCP session hijacking, is a method of taking over a web user session
by surreptitiously obtaining the session ID and masquerading as the authorized user.
24. What are the methods of session hijacking?
25. A _______is software or firmware that prevents unauthorized access to a network.
26. An HTTP server is software that understands:
27. ________is an attack where an attacker changes the website/web page's visual appearance
with their messages.
28. What are the types of web applications?
29. What is SQL Injection?
30. _____are the two main security protocols used in Wi-Fi LAN.
31. What are types of Jailbreaking?
32. What are IoT hacking countermeasures?
33. What are the phases of cloud pen testing?
34. An ______ algorithm is the method used to transform data into ciphertext.
35. A cryptographic key is a string of characters used within an encryption algorithm for altering
data so that it appears random. (True/False)
MODULE 4
DESIGN, ENGINEER AND MANAGE THE OVERALL SECURITY
POSTURE OF AN ORGANIZATION
Section 1: Learning Outcomes
After completing this module, you will be able to:
▪ Explain Enterprise Architecture and Components
▪ Describe Risk Assessment and Principles of security
▪ Comprehend cyber-attacks, honeypots, vulnerability and pen testing
▪ Handle bugs, secure storage platforms
▪ Build a hacker mindset and defend against future attacks
▪ Explain Ethical Hacking, Footprinting and Reconnaissance
▪ Perform Network scanning and Enumeration
▪ Perform Vulnerability Analysis and System Hacking
▪ Describe concept of Malware, Sniffing and Social Engineering
▪ Explain concepts of Denial-of-service and Session Hijacking
▪ Show how to evade IDS, Firewalls, and Honeypots
▪ Hack IoT, Web Servers, Web Applications, Wireless Networks and Mobile Platforms
▪ Explain SQL Injection and Advanced Cryptography
▪ Explain Details of CISSP Exam
▪ Describe about Asset Security and Security Engineering
▪ Design secure network architecture
▪ Explain about components and communication channels
▪ Describe about Identity and Access Management
▪ Perform Security Assessment and Testing
▪ Explain about Security Operations and Software Development Security
Overview of CISSP
▪ To earn the CISSP credential, the candidate must pass the certification exam, as well as
complete the CISSP exam agreement, subscribe to the (ISC)² code of ethics, answer
background qualification questions and receive an endorsement from an active (ISC)²-certified
professional.
▪ To maintain the CISSP certification, candidates are required to earn at least 40 Continuing
Professional Education (CPE) credits each year and pay an annual maintenance fee of $85.
Introduction to ISC2
▪ The International Information System Security Certification Consortium, or (ISC)², is a non-profit
organization which specializes in training and certifications for cybersecurity professionals.
▪ It has been described as the "world's largest IT security organization”, founded in 1989.
▪ (ISC)2 maintains what it calls a Common Body of Knowledge for information security for the
following certifications:
▪ Certified Information Systems Security Professional (CISSP), including:
➢ Information Systems Security Architecture Professional (CISSP-ISSAP)
➢ Information Systems Security Engineering Professional (CISSP-ISSEP)
➢ Information Systems Security Management Professional (CISSP-ISSMP)
➢ and including:
➢ Certified Secure Software Lifecycle Professional (CSSLP)
➢ Certified Authorization Professional (CAP)
➢ Certified Cloud Security Professional (CCSP)
➢ Systems Security Certified Practitioner (SSCP)
➢ Health Care Information Security and Privacy Practitioner (HCISPP)
▪ It is certified by ANSI and meets the requirements of ANSI/ISO/IEC Standard 17024, a personnel
certification accreditation program.
CISSP Examinations
▪ Preparing to take the Certified Information Systems Security Professional (CISSP) exam requires
a great deal of time and effort.
▪ The exam covers eight domains:
1. Security and Risk Management
2. Asset Security
3. Security Architecture and Engineering
4. Communication and Network Security
5. Identity and Access Management (IAM)
6. Security Assessment and Testing
7. Security Operations
8. Software Development Security
Objectives
▪ The objective of information security management is to protect data:
Confidentiality
▪ Protecting data confidentiality requires restricting access to data to only authorized users. Data
breaches are a breach of confidentiality.
Integrity
▪ Ensuring data integrity requires the ability to ensure that data is accurate and complete.
▪ A cyber threat actor that corrupts data in an organization’s databases is a breach of data
integrity.
Availability
▪ Data and the services that rely upon it must be available to authorized users, whether inside or
outside of the company. A Distributed Denial of Service (DDoS) attack is an example of a threat
against the availability of an organization’s data and services.
Importance
▪ The average organization collects a great deal of data. This includes sensitive customer data,
intellectual property, and other data that is vital to an organization’s competitive advantage and
ability to operate.
▪ The value of this data means that it is under constant threat of being stolen by cybercriminals or
encrypted by ransomware.
▪ An effective security management architecture is vital because organizations need to take steps
to secure this data to protect themselves and their customers.
with regulatory data security requirements scalable and sustainably makes implementing strong
security management processes and procedures necessary.
Benefits
▪ In addition to improving an organization’s data security, an infosec management program can
provide the following benefits:
Brand Image
▪ Data breaches and other security incidents can harm an organization’s brand image.
▪ Demonstrated compliance with security best practices can help an organization’s reputation and
improve relationships with customers and partners.
Platforms
▪ Some cyber security platforms are designed with comprehensive, consolidated security
management in mind based on four pillars:
Automated
▪ Automating security processes and integrating them into CI/CD pipelines helps to eliminate
configuration errors and speed deployments while prioritizing security.
Consolidated
▪ A consolidated security architecture enhances visibility and simplifies management while
increasing efficiency and decreasing OPEX and CAPEX.
Dynamic
▪ Agile and dynamic security management solutions enable an organization to keep up with the
rapidly evolving cyber threat landscape and reduce time to manage security.
Efficient
▪ High-performance, efficient security ensures that security management is not a bottleneck and
doesn’t impede digital transformation.
Risk Analysis
▪ A risk analysis is one step in the overall cybersecurity risk management and risk assessment
process.
▪ The analysis entails examining each risk to the security of your organization's information
systems, devices, and data and prioritizing the potential threats.
▪ Once the analysis is done, you know where to allocate your resources to prevent cyberattacks
and, should a data breach occur,
which systems to prioritize so your
ability to do business can continue
with little or no disruption.
▪ Risk analysis identifies and analyzes
the potential impact that could
adversely affect key business
initiatives or projects.
▪ This process is performed to help
organizations avoid or mitigate those
risks.
▪ An essential part of risk analysis is
identifying the estimated damage
from these events and the likelihood
of their occurrence.
▪ Risk assessment is a larger process
where all potential threats are
considered. During the risk analysis
process, the level of each risk is
determined. Both fall under the
broader umbrella of risk management
tools.
▪ Risk analysis is a process of reviewing risks that come with a particular asset or event.
▪ It is a crucial security process for any type of company.
▪ The risk analysis includes identifying the assets most vulnerable to cyberattack.
Risk Register
▪ A risk analysis, performed with the aid of a risk register (that is, a formal list of your organization’s
risks), considers two main factors:
➢ Probability: The likelihood of an attack
➢ Impact: The operational, reputational, or financial effect of the risk on your organization
▪ These two elements will help you determine the severity of each potential risk in your register
and improve decision-making so that you can develop strategies for each risk according to your
security posture and tolerance.
▪ You can risk remediation in several ways: accept, avoid, transfer or mitigate risk.
➢ Cyber Law has also been referred to as the "law of the internet."
▪ According to the Ministry of Electronics and Information Technology, Government of India :
▪ Cyber Laws yields legal recognition to electronic documents and a structure to support e-filing
and e-commerce transactions and also provides a legal structure to reduce cyber crimes.
Fraud
▪ Consumers depend on cyber laws to protect them from online fraud.
▪ Laws are made to prevent identity theft, credit card theft, and other financial crimes that happen
online.
▪ A person who commits identity theft may face confederate or state criminal charges. They might
also encounter a civil action brought by a victim. Cyber lawyers work to both defend and
prosecute against allegations of fraud using the internet.
Copyright
▪ The internet has made copyright violations easier.
▪ Both companies and individuals need lawyers to bring an action to impose copyright protections.
▪ Copyright violation is an area of cyber law that protects the rights of individuals and companies to
profit from their creative works.
Defamation
▪ When people use the internet to say things that are not true, it can cross the line into defamation.
▪ Defamation laws are civil laws that save individuals from fake public statements that can harm a
business or someone’s reputation.
▪ When people use the internet to make statements that violate civil laws, that is called Defamation
law.
Freedom of Speech
▪ Even though cyber laws forbid certain behaviors online, freedom of speech laws also allows
people to speak their minds.
▪ Cyber lawyers must advise their clients on the limits of free speech including laws that prohibit
obscenity.
▪ Cyber lawyers may also defend their clients when there is a debate about whether their actions
consist of permissible free speech.
Trade Secrets
▪ Companies doing business online often depend on cyber laws to protect their trade secrets. For
example, Google and other online search engines spend lots of time developing the algorithms
that produce search results.
▪ They also spend a great deal of time developing other features like maps, intelligent assistance,
and flight search services to name a few.
▪ Cyber laws help these companies to take legal action as necessary to protect their trade
secrets.
Network
➢ Disable Public email system
➢ Secure communication system
➢ Strong firewall
➢ Intrusion detection & Prevention system
➢ Content Filtering Prevent Cyber Attacks Access Control
Data
➢ Disabled Floppy & CD Disk Drives/Writers
➢ No Local Data Storage
➢ No Removable Media Devices
➢ Download Restrictions
➢ Antivirus Software
➢ Staff
➢ Non –Disclosure Agreements
➢ Training
➢ Background Verification
➢ RFID based Attendance
NIST Compliance
▪ The Cybersecurity Framework (NCFS), authorized by the National Institute of Standards and
Technology (NIST), offers a harmonized approach to cybersecurity as the most reliable global
certifying body.
▪ NIST Cybersecurity Framework encompasses all required guidelines, standards, and best
practices to manage the cyber-related risks responsibly.
▪ This framework is prioritized flexibility and cost-effectiveness.
▪ It promotes the resilience and protection of critical infrastructure by:
➢ Allowing better interpretation, management, and reduction of cybersecurity risks to mitigate
data loss, data misuse, and the subsequent restoration costs
➢ Determining the most important activities and critical operations to focus on securing them
➢ Demonstrates the trust-worthiness of organizations that secure critical assets
➢ Helps to prioritize investments to maximize the cybersecurity ROI
➢ Addresses regulatory and contractual obligations
➢ Supports the wider information security program
Confidentiality
▪ Sensitive data, including personally identifiable information (PII) like identification numbers and
bank account numbers, must be kept confidential.
▪ Confidentiality is different from secrecy. If you aren’t aware something exists (such as data or a
web service), then it is a secret. But keeping something secret, by itself, doesn’t ensure
confidentiality.
▪ To ensure confidentiality, you must make certain that even if someone is aware that something
valuable exists (such as a store that processes credit card transactions or a file share with
sensitive data), they can’t get to it. At a high level, you use access controls locked doors, folder
permissions and two-factor authentication to maintain confidentiality.
▪ At a lower level, you use encryption to protect data at rest, hashing to protect data in motion, and
physical security for data in use (privacy screens or physical separation between data in use and
unauthorized persons). You can use a “default deny” configuration so that unless somebody has
been expressly authorized to access data, they are denied access.
Integrity
▪ You also have to make certain that data isn’t changed improperly. Encryption helps ensure the
integrity of data at rest, but it isn’t the best option for data in motion.
▪ Instead, hashing is typically used. Hashing data assigns the data a numeric value, which is
calculated at the source before the transfer and then again by the recipient after the transfer; a
match proves data integrity.
▪ Algorithms such as SHA256 and SHA512 are commonly used for hashing; older algorithms, such
as SHA-1, have become susceptible to attack and therefore are rarely used.
Availability
▪ To ensure high availability of services and data, use techniques like failover clustering, site
resiliency, automatic failover, load balancing, redundancy of hardware and software components,
and fault tolerance.
▪ For example, they can help you thwart a denial of service (DoS) attack that aims to deny the
availability of a service or data by overloading a system with invalid requests or requests that
take a long time to process.
▪ Privacy is about protection of PII. Laws vary. The European Union has tough laws around
privacy. Be familiar with the General Data Protection Regulation (GDPR).
▪ Understand the legal systems. Civil law is most common; rulings from judges typically do not set
precedents that impact other cases.
▪ With common law, which is used in the USA, Canada, the UK and former British colonies, rulings
from judges can set precedents that have significant impact on other cases.
▪ Customary law takes common, local and accepted practices and sometimes makes them laws.
Within common law, you have criminal law (laws against society) and civil law (typically person
vs. person and results in a monetary compensation from the losing party).
▪ Compliance factors into laws, regulations, and industry standards such as Sarbanes-Oxley
(SOX), the Gramm-Leach-Bliley Act (GLBA), the Payment Card Industry Data Security Standard
(PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), and the Federal
Information Security Management Act (FISMA).
▪ In India, cyber crimes are covered by the Information Technology Act, 2000 and the Indian Penal
Code, 1860. It is the Information Technology Act, 2000, which deals with issues related to cyber
crimes and electronic commerce.
▪ The fact of the matter is that today’s organizations cannot function without data.
▪ The BIA team must take into account all kinds of data associated with the organization.
▪ This is also where Recovery Time Objective (RTO), Mean Time Between Failures (MTBF),
Maximum Tolerable Downtime (MTD) and Recovery Point Objectives (RPO) would come in to
consideration.
▪ Identify the systems and services that the business relies on and figure out the impacts that a
disruption or outage would cause, including the impacts on business processes like accounts
receivable and sales.
▪ You also need to figure out which systems and services you need to get things running again
(think foundational IT services such as the network and directory, which many other systems rely
on).
▪ Be sure to prioritize the order in which critical systems and services are recovered or brought
back online.
▪ As part of the BIA, you will establish the recovery time objectives (RTOs) (how long it takes to
recover), the recovery point objectives (RPOs) (the maximum tolerable data loss), and maximum
tolerable downtime (MTD), along with the costs of downtime and recovery.
▪ To improve security, you need to identify both your data and your physical assets and classify
them according to their importance or sensitivity, so you can specify procedures for handling
them appropriately based on their classification.
Data Classification
▪ Organizations classify their data using labels. You might be familiar with two government
classification labels, Secret and Top Secret.
▪ Non-government organizations generally use classification labels such as Public, Internal Use
Only, Partner Use Only, or Company Confidential.
▪ Data classification can be more granular; for example, you might label certain information as HR
Only.
Confidentiality
▪ A classification system safeguards highly sensitive
data, such as customers' personally identifiable
information (PII), including credit card numbers,
Social Security numbers and other vulnerable data
types.
▪ Establishing a classification system helps an
organization focus on confidentiality and security
policy requirements, such as user permissions and
encryption.
Data integrity
▪ A system that focuses on data integrity will require more storage, user permissions and proper
channels of access.
Data availability
▪ Addressing and ensuring information security and integrity makes it easier to know what data can
be shared with specific users.
Asset Classification
▪ You also need to identify and classify physical assets, such as computers, smartphones, desks
and company cars.
▪ Unlike data, assets are typically identified and classified by asset type.
▪ Often, asset classification is used for accounting purposes, but it can also be tied to information
security.
▪ For example, an organization might designate a set of special laptops with particular software
installed, and assign them to employees when they travel to high-risk destinations, so their day-
to-day assets can remain safely at home.
▪ Classification labels help users disseminate data and assets properly. For example, if Sue has a
document classified as Partner Use Only, she knows that it can be distributed only to partners;
any further distribution is a violation of security policy.
▪ In addition, some data loss prevention solutions can use classification data to help protect
company data automatically. For example, an email server can prevent documents classified as
Internal Use Only from being sent outside of the organization.
▪ People with the right clearance can view certain classifications of data or check out certain types
of company equipment (such as a company truck).
▪ Some organizations use it routinely throughout their environments, while other organizations use
it for special scenarios, such as a merger or acquisition.
Clearance
▪ Clearance dictates who has access to what.
▪ Generally, a certain clearance provides access to a certain classification of data or certain types
of equipment.
▪ For example, Secret clearance gives access to Secret documents, and a law enforcement
organization might require a particular clearance level for use of heavy weaponry.
Protect Privacy
▪ Varonis defines data privacy as a type of “information security that deals with the proper handling
of data concerning consent, notice, sensitivity and regulatory concerns.”
▪ On its most basic level, data privacy is a consumer’s understanding of their rights as to how their
personal information is collected, used, stored and shared.
▪ The use of personal information must be explained to consumers in a simple and transparent
manner and in most cases, consumers must give their consent before their personal information
is provided.
▪ Privacy protection is keeping the information you’d like to keep to yourself from getting into the
hands of companies, hackers, government organizations, and other groups.
▪ Each person has different expectations of privacy, so the level of security they need to feel that
their privacy is truly protected ranges greatly.
▪ All workers need to be aware of the company’s privacy policies and procedures and know how to
contact data owners in the event of an issue.
▪ Key terms to understand include the following:
Data owners
▪ Data owners are usually members of the management or senior management team.
▪ They approve access to data (usually by approving the data access policies that are used day to
day).
Data processors
▪ Data processors are the users who read and edit the data regularly.
▪ Users must clearly understand their responsibilities with data based on its classification. Can
they share it? What happens if they accidentally lose it or destroy it?
Data Remanence
▪ Data remanence occurs when data is deleted but remains recoverable.
▪ Whenever you delete a file, the operating system marks the space the file took up as available.
But the data is still there, and with freely downloadable tools, you can easily extract that data.
▪ Organizations need to account for data remanence to ensure they are protecting their data.
▪ There are a few options:
Degaussing
▪ Degaussing relies on the removal or reduction of magnetic fields on the disk drives.
▪ It is very effective and complies with many government requirements for data remanence.
Collection limitation
▪ Security often focuses on protecting the data you already have. But part of data protection is
limiting how much data your organization collects.
▪ For example, if you collect users’ birthdates or identification card numbers, you then must protect
that data.
▪ If your organization doesn’t need the data, it shouldn’t collect it.
▪ Many countries are enacting laws and regulations to limit the collection of data. But many
organizations are unaware and continue to collect vast amounts of sensitive data.
▪ You should have a privacy policy that specifies what information is collected, how it is used and
other pertinent details.
Hardware
▪ Even if you maintain data for the appropriate retention period, it won’t do you any good if you
don’t have hardware that can read the data.
▪ For example, if you have data on backup tapes and hold them for 10 years, you run the risk of
not being able to read the tapes toward the end of the retention period because tape hardware
changes every few years.
Personnel
▪ Suppose your company is retaining data for the required time periods and maintaining hardware
to read the data.
▪ But what happens if the only person who knew how to operate your tape drives and restore data
from them no longer works at the company, and the new team is only familiar with disk-to-disk
backup? You might not be able to get to your data! By documenting all the procedures and
architecture, you can minimize this risk.
Standards selection
▪ Standards selection is the process by which organizations plan, choose and document
technologies and/or architectures for implementation.
▪ For example, you might evaluate three vendors for an edge firewall solution. You could use a
standards selection process to help determine which solution best fits the organization.
▪ Vendor selection is closely related to standards selection but focuses on the vendors, not the
technologies or solutions. The overall goal is to have an objective and measurable selection
process.
Storage
▪ You can store data in many ways, including on paper, disk or tape.
▪ For each scenario, you must define the acceptable storage locations and inform users about
those locations.
▪ It is common to provide a vault or safe for backup tapes stored on premises, for example.
▪ Personnel who deal with sensitive papers should have a locked cabinet or similar secure storage
for those documents.
▪ Users should have a place to securely store files, such as an encrypted volume or an encrypted
shared folder.
Destruction
▪ Your organization should have a policy for destruction of sensitive data.
▪ The policy should cover all the mediums that your organization uses for storing data - paper,
disk, tape, etc. Some data classifications, such as those that deal with sensitive or confidential
information, should require the most secure form of data destruction, such as physical
destruction or secure data deletion with multiple overwrite passes.
▪ Other classifications might require only a single overwrite pass.
▪ When in doubt, destroy data as though it were classified as the most sensitive data at your
organization.
2. Fail-safe defaults
▪ Unless access to an object has been explicitly given to a subject, it should be denied access to it.
▪ Access decisions are not made on exclusions; rather, they are made on permissions.
▪ The default action is to always deny (not grant) access.
▪ Even if the action fails, the system will still be as secure as it was when the action began.
3. Mechanism economy
All the mechanisms pertaining to the impartment of security should be kept as simple as possible.
Complex mechanisms can be incorrectly:
a) understood
b) configured
c) implemented
d) Modeled
▪ Simpler models entail that “less can go wrong.”
▪ In case of an error, it is always easier to spot and remedy.
▪ Keep the operation, implementation, design, and the interaction with other constituents as simple
as is possible. This makes the processes of analyzing, testing, and verifying simpler.
4. Full mediation
▪ Access to all objects need to be checked to ensure that they are allowed.
▪ The performance vs. security issue often creates problems for system administrators. For
instance, the access check results are often cached to increase performance, but what if the
permissions have been changed since the last access request? In most systems, cache flushing
mechanisms are absent.
▪ Access granting and management needs to be rigorous at all times.
▪ Access needs to be checked every single time without any exception.
6. Separation of privilege
▪ A system should never grant any permissions based on just one condition.
▪ This removes the existence of a single point of failure.
▪ Multiple conditions should be met before the granting of privileges. An example is two-factor
authentication, in which both token recognition and biometric systems are used for authentication
purposes.
7. Efficiency
▪ This is a very interesting, yet less-understood principle.
▪ It dictates that, once security mechanisms get implemented, the resource should not get more
difficult to access than it would have been if the mechanism were not present.
▪ Often people compromise on efficiency because of enhanced security, which is in direct violation
of secure system design fundamentals.
Architecture Frameworks
▪ Cyber security frameworks are sets of documents describing guidelines, standards, and best
practices designed for cyber security risk management.
▪ The frameworks exist to reduce an organization's exposure to weaknesses and vulnerabilities
that hackers and other cyber criminals may exploit.
▪ The word “framework” makes it sound like the term refers to hardware, but that’s not the case. It
doesn’t help that the word “mainframe” exists, and its existence may imply that we’re dealing with
a tangible infrastructure of servers, data storage, etc.
▪ But much like a framework in the “real world” consists of a structure that supports a building or
other large object, the cyber security framework provides foundation, structure, and support to an
organization’s security methodologies and efforts.
▪ A security architecture framework is a set of consistent guidelines and principles for
implementing different levels of business’ security architecture.
▪ Companies may opt to devise their frameworks by combining international standard frameworks,
such as:
➢ TOGAF
➢ SABSA
➢ OSA
Types
▪ Frameworks break down into three types based on the needed function.
Control Frameworks
▪ Develops a basic strategy for the organization’s cyber security department
▪ Provides a baseline group of security controls
▪ Assesses the present state of the infrastructure and technology
▪ Prioritizes implementation of security controls
Program Frameworks
▪ Assesses the current state of the organization’s security program
▪ Constructs a complete cybersecurity program
▪ Measures the program’s security and competitive analysis
▪ Facilitates and simplifies communications between the cyber security team and the
managers/executives.
Risk Frameworks
▪ Defines the necessary processes for risk assessment and management
▪ Structures a security program for risk management
▪ Identifies, measures, and quantifies the organization’s security risks
▪ Prioritizes appropriate security measures and activities.
Best Practices
▪ Although every framework is different, certain best practices are applicable across the board.
Here, we are expanding on NIST’s five functions mentioned previously.
Identify
▪ To manage the security risks to its assets, data, capabilities, and systems, a company must fully
understand these environments and identify potential weak spots.
Protect
▪ Companies must create and deploy appropriate safeguards to lessen or limit the effects of
potential cyber security breaches and events.
Detect
▪ Organizations should put in motion the necessary procedures to identify cyber security incidents
as soon as possible.
Respond
▪ Companies must be capable of developing appropriate response plans to contain the impacts of
any cyber security events.
Recover
▪ Companies must create and implement effective procedures that restore any capabilities and
services damaged by cyber security events.
COBIT
▪ Control objectives for information and related technology or COBIT is a framework that was
developed by ISACA (an organization comprising IT governance officials) around 1995.
▪ Initially, the framework was used only to reduce the presence of technical risks within
organizations but, over the years, it has metamorphosed into COBIT 5, which provides the ability
to align IT with the business goals of a firm.
▪ It can be considered the information security equivalent of the ISO 9000 manufacturing quality
standards.
▪ Depending on the content, it is divided into various sub-standards.
▪ For instance, the ISO 27001 highlights the program requirements, whereas the ISO 27000
comprises a vocabulary and an overview.
▪ The ISO 27002 lays out the procedural steps that need to be followed while building an
information security system.
Biba
▪ Released in 1977, this model was created to supplement Bell-LaPadula.
▪ Its focus is on integrity.
▪ The methodology is “no read down” (for example, users with a Top Secret clearance can’t read
data classified as Secret) and “no write up” (for example, a user with a Secret clearance can’t
write data to files classified as Top Secret).
▪ By combining it with Bell-LaPadula, you get both confidentiality and integrity.
SABSA Framework
▪ Sherwood Applied Business Security Architecture (SABSA) is a methodology and framework that
can be used to develop security architectures and service management platforms at the
enterprise level.
▪ It resembles the Zachman Framework in structure but was developed independently of it.
▪ SABSA can be used to develop risk-driven security architectures that are supportive of critical
business processes and initiatives.
▪ The rudimentary tenet of the model is that the derivation of everything must be made from the
analysis of the enterprise requirements for security.
▪ There are other frameworks, such as ITIL and TNS, that are also worth exploring in this regard.
▪ The choice of the framework needs to be made after adequate brainstorming to ensure that the
subsequent customization of the blueprint
leads to an apt security design.
▪ SABSA, or the Sherwood Applied Business
Security Architecture, is a policy-driven
framework.
▪ It helps define the critical questions that
security architecture can only answer: what,
why, when, and who.
▪ The goal of SABSA is to ensure that after the design
of security services, they are then delivered and
supported as an integral part of the enterprise’s IT
management.
▪ One downside, however, is that SABSA doesn’t get
into specifics regarding technical implementation.
▪ The SABSA methodology has six layers (five
horizontals and one vertical).
▪ The contextual layer is at the top and includes
business requirements and goals.
▪ The second layer is the conceptual layer, which is the
architecture view.
TOGAF Frameworks
▪ TOGAF, or The Open Group Architecture Framework,
helps determine which problems need to be solved
within the security infrastructure in a business.
▪ Its primary focus is on the organization’s goal and
scope, as well as the preliminary phases of security
architecture.
▪ TOGAF does not, however, give specific guidance on
ways to address security issues.
▪ TOGAF is good for implementing very big systems in
very big companies.
▪ It literally attempts to leave no stone unturned when it
comes to creating architectures intended to run at an
enterprise scale.
OSA Frameworks
▪ On the other hand, the Open Security Architecture (OSA) is a framework related to technical and
functional security controls.
▪ OSA offers a comprehensive overview of crucial security components, principles, issues, and
concepts that underlie architectural decisions involved in designing effective security
architectures.
▪ OSA can only be used if the security architecture has already been designed.
▪ Metrics - analytical and quantitative measures that indicate whether the organisations is
achieving its goals, or not.
▪ Actions - activities and initiatives implemented by management to achieve the Goals.
▪ Results - the outcome of the Actions.
▪ Market forces, Customers, Core Competences and Values - external and internal elements
that are influenced by the Results and, in turn, influence the company's Mission and Ambition.
▪ Enterprise Risk Management - a systematic approach to the:
(1) identification and assessment of risks and weaknesses
(2) definition of responses
(3) periodic monitoring of both.
▪ Operational Effectiveness - the dynamic state of an organisation that is constantly focused on
achieving operational excellence through continuous improvement.
The four basic control requirements identified in the Orange Book are:
1. Security policy
▪ The rules and procedures by which a trusted system operates. Specific TCSEC requirements
include
➢ Discretionary access control (DAC): Owners of objects are able to assign permissions to
other subjects.
➢ Mandatory access control (MAC): Permissions to objects are managed centrally by an
administrator.
➢ Object reuse: Protects confidentiality of objects that are reassigned after initial use. For
example, a deleted file still exists on storage media; only the file allocation table (FAT) and
first character of the file have been modified. Thus residual data may be restored, which
describes the problem of data remanence. Object-reuse requirements define procedures for
actually erasing the data.
➢ Labels: Sensitivity labels are required in MAC-based systems. Specific TCSEC labeling
requirements include integrity, export, and subject/object labels.
2. Assurance
▪ Guarantees that a security policy is correctly implemented. Specific TCSEC requirements (listed
here) are classified as operational assurance requirements:
➢ System architecture: TCSEC requires features and principles of system design that
implement specific security features.
➢ System integrity: Hardware and firmware operate properly and are tested to verify proper
operation.
➢ Covert channel analysis: TCSEC requires covert channel analysis that detects unintended
communication paths not protected by a system’s normal security mechanisms. A covert
storage channel conveys information by altering stored system data. A covert timing
channel conveys information by altering a system resource’s performance or timing.
➢ Trusted facility management: The assignment of a specific individual to administer the
security-related functions of a system. Closely related to the concepts of least privilege,
separation of duties, and need-to-know.
➢ Trusted recovery: Ensures that security isn’t compromised in the event of a system crash or
failure. This process involves two primary activities: failure preparation and system recovery.
➢ Security testing: Specifies required testing by the developer and the National Computer
Security Center (NCSC).
➢ Design specification and verification: Requires a mathematical and automated proof that
the design description is consistent with the security policy.
➢ Configuration management: Identifying, controlling, accounting for, and auditing all changes
made to the Trusted Computing Base (TCB) during the design, development, and
maintenance phases of a system’s lifecycle.
➢ Trusted distribution: Protects a system during transport from a vendor to a customer.
3. Accountability
▪ The ability to associate users and processes with their actions. Specific TCSEC requirements
include:
➢ Identification and authentication (I&A): Systems need to track who performs what activities.
➢ Trusted Path: A direct communications path between the user and the Trusted Computing
Base (TCB) that doesn’t require interaction with untrusted applications or operating-system
layers.
➢ Audit: Recording, examining, analyzing, and reviewing security-related activities in a trusted
system.
4. Documentation
▪ Specific TCSEC requirements include:
➢ Security Features User’s Guide (SFUG): User’s manual for the system.
➢ Trusted Facility Manual (TFM): System administrator’s and/or security administrator’s
manual.
➢ Test documentation: According to the TCSEC manual, this documentation must be in a
position to “show how the security mechanisms were tested, and results of the security
mechanisms’ functional testing.”
➢ Design documentation: Defines system boundaries and internal components, such as the
Trusted Computing Base (TCB).
ITSEC Functionality (F) Classes and Evaluation (E) Levels mapped to TCSEC levels
Common Criteria
▪ The Common Criteria for Information Technology Security Evaluation (usually just
called Common Criteria) is an international effort to standardize and improve existing European
and North American evaluation criteria.
▪ The Common Criteria has been adopted as an international standard in ISO 15408.
▪ The Common Criteria defines eight evaluation assurance levels (EALs), which are listed in the
following table.
Distributed Systems
▪ In a distributed system, one must consider many possible security risks. To mitigate these risks
there are a number of strategies that can be employed:
Goals
▪ Security in a distributed system poses unique challenges that need to be considered when
designing and implementing systems.
▪ A compromised computer or network may not be the only location where data is at risk; other
systems or segments may also become infected with malicious code.
▪ Because these types of threats can occur anywhere, even across distances in networks with few
connections between them, new research has been produced to help determine how well
distributed security architectures are actually performing.
▪ In the past, security was typically handled on an end-to-end basis.
▪ All the work involved in ensuring safety occurred “within” a single system and was controlled by
one or two administrators.
▪ The rise of distributed systems has created a new ecosystem that brings with it unique
challenges to security.
▪ Distributed systems are made up of multiple nodes working together to achieve a common goal,
these nodes are usually called peers.
Access Controls
➢ Access Control Matrix
➢ Protection Domains
➢ Trusted Code
➢ Denial of Service
Secure Communication
Authentication
▪ Authentication and integrity are interdependent. For instance, consider a disseminated
framework that supports verification in aid of a relationship, but does not provide rules for
guaranteeing the integrity of the information.
▪ Alternatively, a framework that just ensures data truthfulness, while not measuring for validation.
▪ To guarantee truthfulness of information once it is exchanged subsequent to the right verification,
we make use of special keys encrypted by the session keys.
▪ The session key, which is a shared secret key, applies to the encryption of information
truthfulness (integrity) and discretion (confidentiality). Such a key is usable while, the set up
channel exists. At the point when the channel is shut, the session key is lost.
▪ By the utilization of an open key calculation, for example, RSA, two keys can be created, one
private and one open.
▪ To make an advanced mark, marking programming, such as an email program, makes a
restricted hash of the electronic information to be agreed upon.
▪ The private key is then used to encode the hash.
▪ The encrypted hash along with other data, such as the hashing algorithm is the digital signature.
▪ The purpose behind encoding the hash rather than the whole message or report is that a hash
capacity can change
over a discretionary
contribution to a settled
length hash esteem,
which is generally
substantially shorter, in
this manner sparing
time as hashing is
considerably quicker
than marking.
▪ Each piece of hashed
information creates an
interesting code. Any
adjustments to the
information brings about an alternate esteem.
▪ This encourages us to approve the integrity of the information by utilizing the endorser’s open
key to unscramble the hash.
Session Keys
▪ During the formation of a protected channel, after completion of the verification stage,
▪ the users generally connect with a master session key to guarantee privacy.
▪ Another strategy is utilizing the same keys for classification and secure key settings.
▪ Assume that, the key that was utilized to build up the session is being utilized to guarantee both
trustworthiness and classification of the message as well.
▪ In this situation, each time the key is imperiled, an assailant can unscramble messages
transmitted during the old discourse, which isn’t at all satisfactory.
▪ Be that as it may, on the off chance that we utilize the session key to meet our motivation, if there
should be an occurrence of a traded off key situation, the assaulted can interrupt just a single
session and transmitted messages during different sessions stay private.
▪ In this manner, the blend of the keys into long-haul session keys, which are less expensive and
brief, is typically a decent decision for executing a protected channel for information trade.
▪ Along these lines, the supervisory reference first looks through its insurance area, at whatever
point the subject demands a question’s activity.
▪ As per space, the supervisory reference can check regardless of whether the application can be
run or not. Rather than being approved to do the supervisory reference in the whole assignment,
each subject could be allowed to complete a declaration to decide it has a place with which sort
of gathering.
▪ One needs to convey his endorsement to supervisory reference each time they need to peruse a
site page from the Internet.
▪ We secure it with digital signatures to ensure the beginning of the testament and its well-being.
Trusted Code
▪ The ability to migrate code between hosts has been created in recent years with the
development of distributed systems.
▪ Such systems can be protected by a tool known as Sandbox, which enables running programs
downloaded from the Internet in separation to prevent system failures or software vulnerabilities.
▪ If while trying to set up a rule is prohibited by the host, the program will come to a halt.
▪ If one wants to build a more flexible sandbox, playground designing procedures can be
downloaded from the internet.
Denial of Service
▪ The purpose of access control is to allow authentic users to have access to resources.
▪ Denial-of-service is an attack that stops authentic users from getting access to resources.
▪ Since distributed systems are open in nature, the need for protection against DoS is even more
essential.
▪ It becomes very difficult to prevent or manage DoS attacks that run from a single/multiple
source(s) to arrange a distributed denial-of-service (DDoS) attack.
▪ The intention usually is to install a malicious software into a victim’s machine.
▪ Firewall plays an important role here in restricting traffic into a internal network from the outside
world based on various filters according to suitable needs of the organization.
Network Elements
▪ Network nodes (computers, routers, etc.), communications protocols (TCP/IP, HTTP, DNS, etc.),
connection media (wired, wireless), and topologies (bus, star, mesh, etc.).
Security Elements
▪ Cybersecurity devices and software, secure communications protocols (e.g. IPsec VPN and
TLS), and data privacy technologies (classification, encryption, key management, etc.).
Converged protocols
▪ Like encapsulation, converged protocols enable communication over different mediums.
▪ For example, FCoE sends typical fibre channel control commands over Ethernet. Voice over IP
(VoIP) sends SIP or other voice protocols over typical IP networks.
▪ In most cases, this provides simplicity, since the same infrastructure can be used for multiple
scenarios.
▪ It can also add complexity by introducing more protocols and devices to manage and maintain on
that same infrastructure.
Software-defined networks
▪ Many networks follow either a two-tier (spine/leaf or core/access) or a three-tier (core,
distribution, edge/access) topology. While the core network might not change that frequently, the
edge or access devices can communicate with a variety of devices types and tenants.
▪ Increasingly, the edge or access switch is a virtual switch running on a hypervisor or virtual
machine manager. You must be able to add a new subnet or VLAN or make other network
changes on demand.
▪ You must be able to make configuration changes programmatically across multiple physical
devices, as well as across the virtual switching devices in the topology.
▪ A software-defined network enables you to make these changes for all devices types with ease.
Wireless Networks
▪ Wireless networks can be broken into the different 802.11 standards.
▪ The most common protocols within 802.11 are shown in the table below.
▪ Additional protocols have been proposed to IEEE, including ad, ah, aj, ax, ay and az. You should
be aware of the frequency that each protocol uses.
▪ You should also be familiar with the wireless security standards:
Operation of hardware
▪ Modems are a type of Channel Service Unit/Data Service Unit (CSU/DSU) typically used for
converting analog signals into digital.
▪ In this scenario, the CSU handles communication to the provider network, while the DSU handles
communication with the internal digital equipment (in most cases, a router).
▪ Modems typically operate on Layer 2 of the OSI model.
▪ Routers operate on Layer 3 of the OSI model, and make the connection from a modem available
to multiple devices in a network topology, including switches, access points and endpoint
devices.
▪ Switches are typically connected to a router to enable multiple devices to use the connection.
Switches help provide internal connectivity, as well as create separate broadcast domains when
configured with VLANs.
▪ Switches typically operate at Layer 2 of the OSI model, but many switches can operate at both
Layer 2 and Layer 3.
Transmission media
▪ Wired transmission media can typically be described in three categories:
➢ Coaxial
➢ Ethernet
➢ Fiber
▪ Coaxial is typically used with cable modem installations to provide connectivity to an ISP, and
requires a modem to convert the analog signals to digital.
▪ Ethernet is typically associated with Category 5 and Category 6 unshielded twisted-pair (UTP) or
shielded twisted pair (STP), and can be plenum-rated for certain installations.
▪ Fiber typically comes in two options, single-mode or multi-mode.
▪ Single-mode is typically used for long-distance communication, over several kilometers or miles.
▪ Multi-mode fiber is typically used for faster transmission, but with a distance limit depending on
the desired speed.
▪ Fiber is most often used in the datacenter for backend components.
Application whitelisting
▪ Only applications on the whitelist can run on the endpoint.
▪ This can minimize the chances of malicious applications being installed or run.
▪ The repositories are synchronized globally, and then each incoming request for a file or service is
directed to the nearest service location.
▪ For example, if a request comes from Asia, a local repository in Asia, rather than one in the
United States. would provide the file access. This reduces the latency of the request and typically
uses less bandwidth.
▪ CDNs are often more resistant to denial of service (DoS) attacks than typical corporate networks,
and they are often more resilient.
Physical devices
▪ Physical security is one of the most important aspects of securing a network. Most network
devices require physical access to perform a reset, which can cause configurations to be deleted
and grant the person full access to the device and an easy path to any devices attached to it.
▪ The most common methods for physical access control are code-based or card-based access.
▪ Unique codes or cards are assigned to individuals to identify who accessed which physical doors
or locks in the secure environment.
▪ Secure building access can also involve video cameras, security personnel, reception desks and
more.
▪ In some high-security organizations, it isn’t uncommon to physically lock computing devices to a
desk. In the case of mobile devices, it is often best to have encryption and strong security
policies to reduce the impact of stolen devices because physically protecting them is difficult.
Firewalls
Voice
▪ Voice communication covers many different technologies, which means that you will need to be
familiar with systems such as:
➢ PBX (private branch exchange)
➢ POTS (plain old telephone system)
➢ VoIP (Voice over Internet Protocol)
▪ Learning about voice technologies is essential because it is still one of the most costly services
that companies incur, so being able to effectively manage, investigate, and administer is really
important.
▪ If outside users are able to use your voice services fraudulently, your company may be liable if
crimes are committed with your services. International toll fraud is also costly, and can come
about from unsecured phone systems.
Multimedia Collaboration
▪ Multimedia collaboration includes applications such as instant messaging programs, video
conferencing, and other real-time collaboration tools.
▪ These tools are combined technologies of voice, data, text and video call in a single application
over the Internet.
VoIP
▪ This includes session controls and signaling protocols that relate to the notification and setup of
calls.
▪ This channel uses two codec software that are audio and video into digital frames as well as
open VoIP protocols such as H.323 and SIP (Session Initiated Protocol).
Remote Access
➢ The dial-up system is the main idea behind remote access.
➢ This allows home-based users and travelling users the ability to access the internal network
from a dial-up modem connection.
➢ This technology is the most affordable method for letting people connect to the system while
out of the office.
Virtualized Networks
▪ A virtualized network is also known as a Software-Defined Network (SDN), this means that
software and hardware are combined together to create a network that is bound and controlled
by a software component.
Voice
▪ As more organizations switch to VoIP, voice protocols such as SIP have become common on
Ethernet networks.
▪ This has introduced additional management, either by using dedicated voice VLANs on
networks, or establishing quality of service (QoS) levels to ensure that voice traffic has priority
over non-voice traffic.
▪ Other web-based voice applications make it more difficult to manage voice as a separate entity.
▪ The consumer Skype app, for example, allows for video and voice calls over the internet.
▪ This can cause additional bandwidth consumption that isn’t typically planned for in the network
topology design or purchased from an ISP.
Multimedia collaboration
▪ There are a variety of new technologies that allow instant collaboration with colleagues.
▪ Smartboards and interactive screens make meeting in the same room more productive.
▪ Add in video technology, and someone thousands of miles away can collaborate in the same
meeting virtually.
▪ Instant messaging through Microsoft Teams, Slack and other applications enables real-time
communication.
▪ Mobile communication has become a huge market, with mobile apps such as WhatsApp,
WeChat and LINE making real-time communication possible anywhere in the world.
Remote access
▪ Because of the abundance of connectivity, being productive in most job roles can happen from
anywhere.
▪ Even in a more traditional environment, someone working outside of the office can use a VPN to
connect and access all the internal resources for an organization.
▪ Taking that a step further, Remote Desktop Services (RDS) and virtual desktop infrastructure
(VDI) can give you the same experience whether you’re in the office or at an airport.
▪ If you have an internet connection, you can access the files and applications that you need to be
productive.
▪ A screen scraper is a security application that captures a screen (such as a server console or
session) and either records the entire session or takes a screen capture every couple of
seconds.
▪ Screen scraping can help establish exactly what a person did when they logged into a computer.
Screen scrapers are most often used on servers or remote connectivity solutions (such as VDI or
Remote Desktop farms).
Data communications
▪ Whether you are physically in an office or working remotely, the communication between the
devices being used should be encrypted.
▪ This prevents any unauthorized device or person from openly reading the contents of packets as
they are sent across a network.
▪ Corporate networks can be segmented into multiple VLANs to separate different resources. For
example, the out-of-band management for certain devices can be on a separate VLAN so that no
other devices can communicate unless necessary.
▪ Production and development traffic can be segmented on different VLANs. An office building with
multiple departments or building floors can have separate VLANs for each department or each
floor in the building.
▪ Logical network designs can tie into physical aspects of the building as necessary. Even with
VLAN segments, the communication should be encrypted using TLS, SSL or IPSec.
Virtualized networks
▪ Many organizations use hypervisors to virtualize servers and desktops for increased density and
reliability. However, to host multiple servers on a single hypervisor, the Ethernet and storage
networks must also be virtualized.
▪ VMware vSphere and Microsoft Hyper-V both use virtual network and storage switches to allow
communication between virtual machines and the physical network.
▪ The guest operating systems running in the VMs use a synthetic network or storage adapter,
which is relayed to the physical adapter on the host.
▪ The software-defined networking on the hypervisor can control the VLANs, port isolation,
bandwidth and other aspects just as if it was a physical port.
Authentication
▪ Traditional authentication systems rely on a username and password, especially for
authenticating to computing devices.
▪ LDAP directories are commonly used to store user information, authenticate users and authorize
users. But there are newer systems that enhance the authentication experience.
▪ Some replace the traditional username and password systems, while others (such as single sign-
on, or SSO), extend them. Biometrics is an emerging authentication method that includes (but is
not limited to) fingerprints, retina scans, facial recognition and iris scans.
Authorization
▪ Traditional authorization systems rely on security groups in a directory, such as an LDAP
directory. Based on your group memberships, you have a specific type of access (or no access).
▪ For example, administrators might grant one security group read access to an asset, while a
different security group might get read/write/execute access to the asset. This type of system has
been around a long time and is still the primary authorization mechanism for on-premises
technologies.
▪ Newer authorization systems incorporate dynamic authorization or automated authorization.
▪ For example, the authorization process might check to see if you are in the Sales department
and in a management position before you can gain access to certain sales data.
▪ Other information can be incorporated into authorization. For example, you can authenticate and
get read access to a web-based portal, but you can’t get into the admin area of the portal unless
you are connected to the corporate network.
▪ Next, let’s look at some key details around controlling access to specific assets.
Information
▪ “Information” and “data” are interchangeable here. Information is often stored in shared folders or
in storage available via a web portal.
▪ In all cases, somebody must configure who can gain access and which actions they can perform.
The type of authentication isn’t relevant here.
▪ Authorization is what you use to control the access.
Systems
▪ In this context, “systems” can refer to servers or applications, either on premises or in the cloud.
▪ You need to be familiar with the various options for controlling access.
▪ In a hybrid scenario, you can use federated authentication and authorization in which the cloud
vendor trusts your on-premises authentication and authorization solutions.
▪ This centralized access control is quite common because it gives organizations complete control
no matter where the systems are.
Devices
▪ Devices include computers, smartphones and tablets. Today, usernames and passwords
(typically from an LDAP directory) are used to control access to most devices.
▪ Fingerprints and other biometric systems are common, too. In high-security environments, users
might have to enter a username and password and then use a second authentication factor
(such as a code from a smartcard) to gain access to a device.
▪ Beyond gaining access to devices, you also need to account for the level of access.
▪ In high-security environments, users should not have administrative access to devices, and only
specified users should be able to gain access to particular devices.
Facilities
▪ Controlling access to facilities (buildings, parking garages, server rooms, etc.) is typically handled
via badge access systems.
▪ Employees carry a badge identifying them and containing a chip.
▪ Based on their department and job role, they will be granted access to certain facilities (such as
the main doors going into a building) but denied access to other facilities (such as the power
plant or the server room).
▪ For high-security facilities, such as a data center, it is common to have multi-factor
authentication. For example, you must present a valid identification card to a security guard and
also go through a hand or facial scan to gain access to the data center. Once inside, you still
need to use a key or smartcard to open racks or cages.
SSO
▪ Single sign-on provides an enhanced user authentication experience as the user accesses
multiple systems and data across a variety of systems.
▪ It is closely related to federated identity management (which is discussed later in this section).
Instead of authenticating to each system individually, the recent sign-on is used to create a
security token that can be reused across apps and systems.
▪ Thus, a user authenticates once and then can gain access to a variety of systems and data
without having to authenticate again. Typically, the SSO experience will last for a specified
period, such as 4 hours or 8 hours.
▪ SSO often takes advantage of the user’s authentication to their computing device. For example,
a user signs into their device in the morning, and later when they launch a web browser to go to
a time-tracking portal, the portal accepts their existing authentication.
▪ SSO can be more sophisticated. For example, a user might be able to use SSO to seamlessly
gain access to a web-based portal, but if the user attempts to make a configuration change, the
portal might prompt for authentication before allowing the change.
▪ Note that using the same username and password to access independent systems is not SSO.
Instead, it is often referred to as “same sign-on” because you use the same credentials.
▪ The main benefit of SSO is also its main downside: It simplifies the process of gaining access to
multiple systems for everyone.
▪ For example, if attackers compromise a user’s credentials, they can sign into the computer and
then seamlessly gain access to all apps using SSO. Multi-factor authentication can help mitigate
this risk.
LDAP
▪ Lightweight Directory Access Protocol (LDAP) is a standards-based protocol (RFC 4511) that
traces its roots back to the X.500 standard that came out in the early 1990s.
▪ Many vendors have implemented LDAP-compliant systems and LDAP-compliant directories,
often with vendor-specific enhancements.
▪ LDAP is especially popular for on-premises corporate networks.
▪ An LDAP directory stores information about users, groups, computers, and sometimes other
objects such as printers and shared folders.
▪ It is common to use an LDAP directory to store user metadata, such as their name, address,
phone numbers, departments, employee number, etc.
▪ Metadata in an LDAP directory can be used for dynamic authentication systems or other
automation.
▪ The most common LDAP system today is Microsoft Active Directory (Active Directory Domain
Services or AD DS).
▪ It uses Kerberos (an authentication protocol that offers enhanced security) for authentication, by
default.
Accountability
▪ Accountability is the ability to track users’ actions as they access systems and data. You need to
be able to identify the users on a system, know when they access it, and record what they do
while on the system.
▪ This audit data must be captured and logged for later analysis and troubleshooting. Important
information can be found in this data.
▪ For example, if a user successfully authenticates to a computer in New York and then
successfully authenticates to a computer in London a few minutes later, that is suspicious and
should be investigated.
▪ If an account has repeated bad password attempts, you need data to track down the source of
the attempts.
▪ Today, many companies are centralizing accountability. For example, all servers and apps send
their audit data to the centralized system, so admins can gain insight across multiple systems
with a single query.
▪ Because of the enormous amount of data in these centralized systems, they are usually “big
data” systems, and you can use analytics and machine learning to unearth insights into your
environment.
Session Management
▪ After users authenticate, you need to manage their sessions.
▪ If a user walks away from the computer, anybody can walk up and assume their identity.
▪ To reduce the chances of that happening, you can require users to lock their computers when
stepping away.
▪ You can also use session timeouts to automatically lock computers.
▪ You can also use password-protected screen savers that require the user to re-authenticate.
▪ You also need to implement session management for remote sessions.
▪ For example, if users connect from their computers to a remote server over Secure Shell (SSH)
or Remote Desktop Protocol (RDP), you can limit the idle time of those sessions.
▪ When you use identity federation, two independent organizations share authentication and/or
authorization information with each other.
▪ In such a relationship, one company provides the resources (such as a web portal) and the other
company provides the identity and user information.
▪ The company providing the resources trusts the authentication coming from the identity provider.
▪ Federated identity systems provide an enhanced user experience because users don’t need to
maintain multiple user accounts across multiple apps.
▪ Federated identity systems use Security Assertion Markup Language (SAML), OAuth, or other
methods for exchanging authentication and authorization information.
On premises
▪ To work with your existing solutions and help manage identities on premises, identity services
often put servers, appliances or services on your internal network.
▪ This ensures a seamless integration and provides additional features, such as single sign-on.
▪ For example, you might integrate your Active Directory domain with a third-party identity provider
and thereby enable certain users to authenticate through the third-party identity provider for SSO.
Cloud
▪ Organizations that want to take advantage of software-as-a-service (SaaS) and other cloud-
based applications need to also manage identities in the cloud.
▪ Some of them choose identity federation they federate their on-premises authentication system
directly with the cloud providers.
Federated
▪ Federation enables your organization to use their existing identities (such as those used to
access your internal corporate systems) to access systems and resources outside of the
company network.
▪ For example, if you use a cloud-based HR application on the internet, you can configure
federation to enable employees to sign into the application with their corporate credentials.
▪ You can federate with vendors or partners.
▪ Federating between two organizations involves an agreement and software to enable your
identities to become portable (and thus usable based on who you federate with).
▪ Federation typically provides the best user experience because users don’t have to remember
additional passwords or manage additional identities.
▪ Other key facts about third-party identity services include:
➢ Often, you still need an on-premises directory service.
➢ Many third-party identity services started off as solutions for web-based applications. They
have since to cover other use cases but still can’t be used for many day-to-day authentication
scenarios. For example, most of them can’t authenticate users to their corporate laptops.
➢ Third-party identity services often offer single sign-on, multi-factor authentication and meta-
directory services (pulling data from multiple directories into a single third-party directory).
➢ Many of the offerings are cloud-based, with a minimal on-premises footprint.
▪ Third-party identity services typically support SAML, OpenID Connect, WS-Federation, OAuth
and WS-Trust.
➢ Rule-based access control methods simplify access control in some scenarios. For example,
imagine a set of rules based on department, title and location. If somebody transfers to a new
role or a new office location, their access is updated automatically. In particular, their old
access goes away automatically, addressing a major issue that plagues many organizations.
Methods
▪ A popular tool for information access control is a virtual private network (VPN).
▪ A VPN is a service that allows remote users to access the Internet as though they were
connected to a private network.
▪ Corporate networks will often use VPNs to manage access control to their internal network
across a geographical distance.
▪ Connecting to the VPN will also help protect the employees against on-path attacks if they are
connected to a public WiFi network.
▪ When connected to a VPN, every data packet a user sends or receives has to travel an extra
distance before arriving at its destination, as each request and response has to hit the VPN
server before reaching its destination.
▪ This process often increases latency.
▪ Create accounts too early and you have dormant accounts that can be targeted.
▪ Wait too long to disable and delete accounts and you also have dormant accounts that can be
targeted.
▪ When feasible, it is a good practice to automate provisioning and deprovisioning. Automation
helps reduce the time to create and delete accounts.
▪ It also reduces human error (although the automation code could have human error).
▪ Your company should establish guidelines for account provisioning and deprovisioning. For
example, your company might have a policy that an account must be disabled while the
employee is in the meeting being notified of their termination.
▪ Organizations need to implement a proactive assessment and test strategy for both existing and
new information systems and assets.
▪ The strategy should be an integral part of the risk management process.
Internal
▪ An internal audit strategy should be aligned to the organization’s business and day-to-day
operations.
▪ For example, a publicly traded company will have a more rigorous auditing strategy than a
privately held company.
▪ However, the stakeholders in both companies have an interest in protecting intellectual property,
customer data and employee information.
▪ Designing the audit strategy should include laying out applicable regulatory requirements and
compliance goals.
External
▪ An external audit strategy should complement the internal strategy, providing regular checks to
ensure that procedures are being followed and the organization is meeting its compliance goals.
Third-party
▪ Third-party auditing provides a neutral and objective approach to reviewing the existing design,
methods for testing and overall strategy for auditing the environment.
▪ A third-party audit can also ensure that both internal and external auditors are following the
processes and procedures that are defined as part of the overall strategy.
Vulnerability assessment
▪ The goal of a vulnerability assessment is to identify elements in an environment that are not
adequately protected.
▪ This does not always have to be from a technical perspective; you can also assess the
vulnerability of physical security or the external reliance on power, for instance.
▪ These assessments can include personnel testing, physical testing, system and network testing,
and other facilities tests.
Penetration testing
▪ A penetration test is a purposeful attack on systems to attempt to bypass automated controls.
▪ The goal of a penetration test is to uncover weaknesses in security so they can be addressed to
mitigate risk.
▪ Attack techniques can include spoofing, bypassing authentication, privilege escalation and more.
▪ Like vulnerability assessments, penetration testing does not have to be purely logical. For
example, you can use social engineering to try to gain physical access to a building or system.
Log reviews
▪ IT systems can log anything that occurs on the system, including access attempts and
authorizations.
▪ The most obvious log entries to review are any series of “deny” events, since someone is
attempting to access something that they don’t have permissions for.
▪ It’s more difficult to review successful events, since there are generally thousands of them, and
almost all of them follow existing policies.
▪ It can be important to show that someone or something did indeed access a resource that they
weren’t supposed to, either by mistake or through privilege escalation.
▪ A procedure and software to facilitate frequent review of logs is essential.
Synthetic transactions
▪ While user monitoring captures actual user actions in real time, synthetic — scripted or otherwise
artificial — transactions can be used to test system performance or security.
➢ Black box testing: The tester has no prior knowledge of the environment being tested.
➢ White box testing: The tester has full knowledge prior to testing.
➢ Dynamic testing: The system that is being tested is monitored during the test.
➢ Static testing: The system that is being tested is not monitored during the test.
➢ Manual testing: Testing is performed manually by humans.
➢ Automated testing: A script performs a set of actions.
➢ Structural testing: This can include statement, decision, condition, loop and data flow
coverage.
➢ Functional testing: This includes normal and anti-normal tests of the reaction of a system or
software. Anti-normal testing goes through unexpected inputs and methods to validate
functionality, stability and robustness.
➢ Negative testing: This test purposely uses the system or software with invalid or harmful
data, and verifies that the system responds appropriately.
Interface testing
▪ This can include the server interfaces, as well as internal and external interfaces.
▪ The server interfaces include the hardware, software and networking infrastructure to support the
server.
▪ For applications, external interfaces can be a web browser or operating system, and internal
components can include plug-ins, error handling and more.
▪ You should be aware of the different testing types for each system.
Account management
▪ Every organization should have a defined procedure for maintaining accounts that have access
to systems and facilities.
▪ This doesn’t just mean documenting the creation of a user account, but can include when that
account expires and the logon hours of the account.
▪ This should also be tied to facilities access. For example, was an employee given a code or key
card to access the building? Are there hours that the access method is also prevented?
▪ There should also be separate processes for managing accounts of vendors and other people
who might need temporary access.
▪ The risk indicators can be used to measure how risky the process, account, facility access or
other action is to the organization.
▪ The performance indicators can be used to ensure that a process or procedure is successful and
measure how much impact it has on the organization’s day-to-day operations.
▪ The type of auditing being performed can also determine the type of reports that must be used.
For example, for an SSAE 16 audit, a Service Organization Control (SOC) report is required.
There are four types of SOC reports:
▪ SOC 1 Type 1: This report outlines the findings of an audit, as well as the completeness and
accuracy of the documented controls, systems and facilities.
▪ SOC 1 Type 2: This report includes the Type 1 report, along with information about the
effectiveness of the procedures and controls in place for the immediate future.
▪ SOC 2: This report includes the testing results of an audit.
▪ SOC 3: This report provides general audit results with a datacenter certification level.
Internal
▪ Security auditing should be an ongoing task of the security team.
▪ There are dozens of software vendors that simplify the process of aggregating log data.
▪ The challenge is knowing what to look for once you have collected the data.
External
▪ External security auditing should be performed on a set schedule.
▪ This could be aligned with financial reporting each quarter or some other business-driven reason.
Third-party
▪ Third-party auditing can be performed on a regular schedule in addition to external auditing.
▪ The goal of third-party auditing can either be to provide checks and balances for the internal and
external audits, or to perform a more in-depth auditing procedure.
▪ Given that technology systems in the modern organization run 24/7, SOCs usually function
around the clock in shifts to ensure a rapid response to any emerging threats.
▪ SOC teams may collaborate with other departments and employees or work expert third party IT
security providers.
Security Operations
Understand and support investigations
Evidence collection and handling
▪ Like a crime scene investigation, a digital investigation involving potential computer crimes has
rules and processes to ensure that evidence is usable in court.
▪ At a high level, you need to ensure that your handling of the evidence doesn’t alter the integrity of
the data or environment.
▪ To ensure consistency and integrity of data, your company should have an incident response
policy that outlines the steps to take in the event of a security incident, with key details such as
how employees report an incident.
▪ Additionally, the company should have an incident response team that is familiar with the incident
response policy and that represents the key areas of the organization (management, HR, legal,
IT, etc.).
▪ The team doesn’t have to be dedicated but instead could have members who have regular work
and are called upon only when necessary.
▪ With evidence collection, documentation is key. The moment a report comes in, the
documentation process begins.
▪ As part of the documentation process, you must document each time somebody handles
evidence and how that evidence was gathered and moved around; this is known as the chain of
custody.
▪ Interviewing is often part of evidence collection. If you need to interview an internal employee as
a suspect, an HR representative should be present. Consider recording all interviews, if that’s
legal.
Investigative techniques
▪ When an incident occurs, you need to find out how it happened.
▪ A part of this process is the root cause analysis, in which you pinpoint the cause (for example, a
user clicked on a malicious link in an email, or a web server was missing a security update and
an attacker used an unpatched vulnerability to compromise the server).
▪ Often, teams are formed to help determine the root cause. Incident handling is the overall
management of the investigation think of it as project management but on a smaller level.
▪ NIST and others have published guidelines for incident handling. At a high level, it includes the
following steps: detect, analyze, contain, eradicate and recover.
▪ There are other smaller parts to incident handling, such as preparation and post-incident
analysis, like a “lessons learned” review meeting.
▪ Other investigators should be able to perform their own analyses and come to the same
conclusions because they have the same data. This requirement impacts many of the
operational procedures.
▪ Instead of performing scans, searches and other actions against the memory and storage of
computers, you should take images of the memory and storage, so you can thoroughly examine
the contents without modifying the originals.
▪ For network forensics, you should work from copies of network captures acquired during the
incident.
▪ For embedded devices, you need to take images of memory and storage and note the
configuration.
▪ In all cases, leave everything as is, although your organization might have a policy to have
everything removed from the network or completely shut down.
▪ New technologies can introduce new challenges in this area because sometimes existing tools
don’t work (or don’t work as efficiently) with new technologies.
▪ For example, when SSDs were introduced, they presented challenges for some of the old ways
of working with disk drives.
Administrative
▪ The primary purpose of an administrative investigation is to provide the appropriate authorities
with all relevant information so they can determine what, if any, action to take.
▪ Administrative investigations are often tied to HR scenarios, such as when a manager has been
accused of improprieties.
Criminal
▪ A criminal investigation occurs when a crime has been committed and you are working with a law
enforcement agency to convict the alleged perpetrator.
▪ In such a case, it is common to gather evidence for a court of law, and to have to share the
evidence with the defense. Therefore, you need to gather and handle the information using
methods that ensure that the evidence can be used in court.
▪ We covered some key points earlier, such as chain of custody. Be sure to remember that in a
criminal case, a suspect must be proven guilty beyond a reasonable doubt.
▪ This is more difficult than showing a preponderance of evidence, which is often the standard in a
civil case.
Civil
▪ In a civil case, one person or entity sues another person or entity; for example, one company
might sue another for a trademark violation.
▪ A civil case typically seeks monetary damages, not incarceration or a criminal record. As we just
saw, the burden of proof is less in a civil case.
Regulatory
▪ A regulatory investigation is conducted by a regulating body, such as the Securities and
Exchange Commission (SEC) or Financial Industry Regulatory Authority (FINRA), against an
organization suspected of an infraction.
▪ In such cases, the organization is required to comply with the investigation, for example, by not
hiding or destroying evidence.
Industry standards
▪ An industry standards investigation is intended to determine whether an organization is adhering
to a specific industry standard or set of standards, such as logging and auditing failed logon
attempts.
▪ Because industry standards represent well-understood and widely implemented best practices,
many organizations try to adhere to them even when they are not required to do so in order to
reduce security, operational and other risks.
Continuous monitoring
▪ Continuous monitoring is the process of streaming information related to the security of the
computing environment in real time (or close to real time).
▪ Some SIEM solutions offer continuous monitoring or at least some features of continuous
monitoring.
Egress monitoring
▪ Egress monitoring is the monitoring of data as it leaves your network.
▪ One reason is to ensure that malicious traffic doesn’t leave the network (for example, in a
situation in which a computer is infected and trying to spread malware to hosts on the internet).
▪ Another reason is to ensure that sensitive data (such as customer information or HR information)
does not leave the network unless authorized.
▪ The following strategies can help with egress monitoring:
▪ Data loss prevention (DLP) solutions focus on reducing or eliminating sensitive data leaving the
network.
▪ Steganography is the art of hiding data inside another file or message. For example,
steganography enables a text message to be hidden inside a picture file (such as a .jpg).
Because the file appears innocuous, it can be difficult to detect.
▪ Watermarking is the act of embedding an identifying marker in a file. For example, you can
embed a company name in a customer database file or add a watermark to a picture file with
copyright information.
Asset management
▪ Assets, such as computers, desks and software applications, have a lifecycle simply put, you buy
it, you use it and then you retire it. Asset management is the process of managing that lifecycle.
▪ You keep track of all your assets, including when you got it, how much you paid for it, its support
model and when you need to replace it.
▪ For example, asset management can help your IT team figure out which laptops to replace
during the next upgrade cycle.
▪ It can also help you control costs by finding overlap in hardware, software or other assets.
Configuration management
▪ Configuration management helps you standardize a configuration across your devices.
▪ For example, you can use configuration management software to ensure that all desktop
computers have anti-virus software and the latest patches, and that the screen will automatically
be locked after 5 minutes of inactivity.
▪ The configuration management system should automatically remediate most changes users
make to a system.
▪ The benefits of configuration management include having a single configuration (for example, all
servers have the same baseline services running and the same patch level), being able to
manage many systems as a single unit (for example, you can deploy an updated anti-malware
application to all servers the same amount of time it takes to deploy it to a single server), and
being able to report on the configuration throughout your network (which can help to identify
anomalies).
▪ Many configuration management solutions are OS-agnostic, meaning that they can be used
across Windows, Linux and Mac computers.
▪ Without a configuration management solution, the chances of having a consistent and
standardized deployment plummets, and you lose the efficiencies of configuring many computers
as a single unit.
▪ For example, a system administrator who is asked to disable a user account doesn’t need to
know that the user was terminated, and a systems architect who is asked to evaluate an IT
inventory list doesn’t need to know that his company is considering acquiring another company.
▪ The principle of least privilege means giving users the fewest privileges they need to perform
their job tasks; entitlements are granted only after a specific privilege is deemed necessary.
▪ It is a good practice and almost always a recommend practice.
▪ Two other concepts are important here:
Aggregation
The combining of multiple things into a single unit is often used in role-based access control.
Transitive trust
▪ From a Microsoft Active Directory perspective, a root or parent domain automatically trusts all
child domains.
▪ Because of the transitivity, all child domains also trust each other. Transitivity makes it simpler to
have trusts.
Job rotation
▪ Job rotation is the act of moving people between jobs or duties.
▪ For example, an accountant might move from payroll to accounts payable and then to accounts
receivable.
▪ The goal of job rotation is to reduce the length of one person being in a certain job (or handling a
certain set of responsibilities) for too long, which minimizes the chances of errors or malicious
actions going undetected.
▪ Job rotation can also be used to cross-train members of teams to minimize the impact of an
unexpected leave of absence.
Information lifecycle
▪ Information lifecycle is made up of the following phases:
➢ Collect data: Data is gathered from sources such as log files and inbound email, and when
users produce data such as a new spreadsheet.
➢ Use data: Users read, edit and share data.
➢ Retain data (optional): Data is archived for the time required by the company’s data retention
policies. For example, some companies retain all email data for 7 years by archiving the data
to long-term storage until the retention period has elapsed.
Delete data
▪ The default delete action in most operating systems is not secure.
▪ The data is marked as deleted, but it still resides on the disks and can be easily recovered with
off-the-shelf software.
▪ To have an effective information lifecycle, you must use secure deletion techniques such as disk
wiping (for example, by overwriting the data multiple times), degaussing and physical destruction
(shredding a disk).
Source files
▪ If you rely on software for critical functions, you need to be able to reinstall that software at any
time.
▪ Despite the advent of downloadable software, many organizations rely on legacy software that
they purchased on disk years ago and that is no longer available for purchase.
▪ To protect your organization, you need to maintain copies of the media along with copies of any
license keys.
Backup media
▪ Backup media is considered sensitive media. While many organizations encrypt backups on
media, you still need to treat the backup media in a special way to reduce the risk of it being
stolen and compromised. Many companies lock backup media in secure containers and store the
containers in a secure location. It is also common to use third-party companies to store backup
media securely in off-site facilities.
Detection
▪ It is critical to be able to detect incidents quickly because they often become more damaging at
time passes.
▪ It is important to have a robust monitoring and intrusion detection solution in place.
▪ Other parts of a detection system include security cameras, motion detectors, smoke alarms and
other sensors.
▪ If there is a security incident, you want to be alerted (for example, if an alarm is triggered at your
corporate headquarters over a holiday weekend).
Response
▪ When you receive a notification about an incident, you should start by verifying the incident. For
example, if an alarm was triggered at a company facility, a security guard can physically check
the surroundings for an intrusion and check the security cameras for anomalies.
▪ For computer-related incidents, it is advisable to keep compromised systems powered on to
gather forensic data.
▪ Along with the verification process, during the response phase you should also kick off the initial
communication with teams or people that can help with mitigation. For example, you should
contact the information security team initially during a denial-of-service attack.
Mitigation
▪ The next step is to contain the incident. For example, if a computer has been compromised and
is actively attempting to compromise other computers, the compromised computer should be
removed from the network to mitigate the damage.
Reporting
▪ Next, you should disseminate data about the incident. You should routinely inform the technical
teams and the management teams about the latest findings regarding the incident.
Recovery
▪ In the recovery phase, you get the company back to regular operations. For example, for a
compromised computer, you re-image it or restore it from a backup. For a broken window, you
replace it.
Remediation
▪ In this phase, you take additional steps to minimize the chances of the same or a similar attack
being successful.
▪ For example, if you suspect that an attacker launched attacks from the company’s wireless
network, you should update the wireless password or authentication mechanism.
▪ If an attacker gained access to sensitive plain text data during an incident, you should encrypt
the data in the future.
Sandboxing
▪ Sandboxing is the act of totally segmenting an environment or a computer from your production
networks and computers; for example, a company might have a non-production environment on
a physically separate network and internet connection.
▪ Sandboxes help minimize damage to a production network. Because computers and devices in a
sandbox aren’t managed in the same way as production computers, they are often more
vulnerable to attacks and malware.
▪ By segmenting them, you reduce the risk of those computers infecting your production
computers.
▪ Sandboxes are also often used for honeypots and honeynets, as explained in the next bullet
Anti-malware
▪ Anti-malware is a broad term that often includes anti-virus, anti-spam and anti-malware (with
malware being any other code, app or service created to cause harm).
▪ You should deploy anti-malware to every possible device, including servers, client computers,
tablets and smartphones, and be vigilant about product and definition updates.
Vulnerability management
▪ A vulnerability is a way in which your environment is at risk of being compromised or degraded.
▪ The vulnerability can be due to a missing patch. But it can also be due to a misconfiguration or
other factors.
▪ For example, when SHA-1 certificates were recently found to be vulnerable to attack, many
companies suddenly found themselves vulnerable and needed to take action (by replacing the
certificates).
▪ Many vulnerability management solutions can scan the environment looking for vulnerabilities.
Such solutions complement, but do not replace, patch management systems and other security
systems (such as anti-virus or anti-malware systems).
▪ Be aware of the following definitions:
Zero-day vulnerability
▪ A vulnerability is sometimes known about before a patch is available.
▪ Such zero-day vulnerabilities can sometimes be mitigated with an updated configuration or other
temporary workaround until a patch is available.
▪ Other times, no mitigations are available and you have to be especially vigilant with logging and
monitoring until the patch is available.
▪ Zero-day exploit
▪ Attackers can release code to exploit a vulnerability for which no patch is available.
▪ These zero-day exploits represent one of the toughest challenges for organizations trying to
protect their environments.
1. The planning stage (also called the feasibility stage) is exactly what it sounds like: the phase in
which developers will plan for the upcoming project.
▪ It helps to define the problem and scope of any existing systems, as well as determine the
objectives for their new systems.
2. The analysis stage includes gathering all the specific details required for a new system as well as
determining the first ideas for prototypes.
Developers may:
➢ Define any prototype system requirements
4. The development stage is the part where developers actually write code and build the application
according to the earlier design documents and outlined specifications.
▪ This is where Static Application Security Testing or SAST tools come into play.
5. Software must be tested to make sure that there aren’t any bugs and that the end-user
experience will not negatively be affected at any point.
▪ During the testing stage, developers will go over their software with a fine-tooth comb, noting any
bugs or defects that need to be tracked, fixed, and later retested.
6. After testing, the overall design for the software will come together.
▪ Different modules or designs will be integrated into the primary source code through developer
efforts, usually by leveraging training environments to detect further errors or defects.
▪ The information system will be integrated into its environment and eventually installed. After
passing this stage, the software is theoretically ready for market and may be provided to any
end-users.
Understand and integrate security throughout the software development lifecycle (SDLC)
▪ The lifecycle of development does not typically have a final goal or destination.
▪ Instead, it is a continuous loop of efforts that must include steps at different phases of a project.
Development methodologies
▪ There are many different development methodologies that organizations can use as part of the
development lifecycle.
▪ The following table lists the most common methodologies and the key related concepts.
Maturity models
▪ There are five maturity levels of the Capability Maturity Model Integration (CMMI):
1. Initial: The development process is ad hoc, inefficient, inconsistent and unpredictable.
2. Repeatable: A formal structure provides change control, quality assurance and testing.
3. Defined: Processes and procedures are designed and followed during the project.
4. Managed: Processes and procedures are used to collect data from the development cycle to
make improvements.
5. Optimizing: There is a model of continuous improvement for the development cycle.
Change management
▪ Changes can disrupt development, testing and release.
▪ An organization should have a change control process that includes documenting and
understanding a change before attempting to implement it.
▪ This is especially true the later into the project the change is requested.
▪ Each change request must be evaluated for capability, risk and security concerns, impacts to the
timeline, and more.
▪ A best practice for securing code repositories is to ensure that they are as far away from the
internet as possible, even if that means that they are on a separate internal network that does not
have internet access.
▪ Any remote access to a repository should use a VPN or another secure connection method.
2. Assembly language
▪ Assembly is a symbolic representation of the machine-level instructions.
▪ Mnemonics represent the binary code, and commands such as ADD, PUSH and POP are used.
▪ The assemblers translate the code into machine language.
3. High-level language
▪ High-level languages introduce the ability to use IF, THEN and ELSE statements as part of the
code logic.
▪ The low-level system architecture is handled by the programming language. FORTRAN and
COLBOL are examples of generation 3 programming languages.
5. Natural language
▪ Generation 5 languages enable a system to learn and change on its own, as with artificial
intelligence.
▪ Instead of developing code with a specific purpose or goal, programmers only define the
constraints and goal; the application then solves the problem on its own based on this
information.
▪ Prolog and Mercury are examples of generation 5 programming languages.
▪ These tools are most effective during the software development process, since it’s more difficult
to rework code after it is in production.
▪ Today, with security being of paramount concern, the expectation is that all source code is
scanned during development and after release into production.
Section 3: Exercises
Exercise 1: Draw Business Continuity Planning Lifecycle.
Questions
1. What are the domains covered in CISSP domain?
2. What are the objectives of information security management to protect data?
3. What are the benefits of Risk Analysis?
4. What are the major areas of cyber laws?
5. _____ is about understanding your security governance principles (policies and procedures)
and the risks to your organization.
6. A __________ is the process of determining the criticality of business activities and associated
resource requirements to ensure operational resilience and continuity of operations during and
after a business disruption.
7. What are secure design principles?
8. A _________ is a service that allows remote users to access the Internet as though they were
connected to a private network.
9. VPN increases latency. (True/False)
10. What are the phases of audit process?
11. ______ provides a neutral and objective approach to reviewing the existing design, methods for
testing and overall strategy for auditing the environment.
12. What is Intrusion Detection System (IDS)?
13. ______ can help block an attack before it gets inside your network.
14. ______ monitoring is the monitoring of data as it leaves your network.
15. _______ is the art of hiding data inside another file or message and _______ is the act of
embedding an identifying marker in a file.
16. What are the phases of Information lifecycle?
17. _______ is the process of marking applications as allowed, while ______ is the process of
marking applications as disallowed.
18. _______ is the act of totally segmenting an environment or a computer from your production
networks and computers.
MODULE 5
TECHNOLOGY, APPLICATION AND POLICY
Section 1: Learning Outcomes
After completing this module, you will be able to:
▪ Describe about New Cybersecurity Technologies
▪ Explain functionalities and features of Security System, Services and Attacks
▪ Differentiate between various types of Cryptography techniques
▪ Compare different types of Network Security Protection
▪ Discuss on Case study of Cybersecurity
▪ Explain the Techniques used for Cybersecurity
▪ Describe the mechanism of Cybersecurity Policy Development and Audits
Behavioral Analytics
▪ Behavioral analytics looks at data to understand how people behave on websites, mobile
applications, systems, and networks.
▪ Cybersecurity professionals can use behavioral analytics platforms to find potential threats and
vulnerabilities.
▪ Analyzing patterns of behavior can lead to identifying unusual events and actions that may
indicate cybersecurity threats.
▪ For example, behavioral analytics may find that unusually large amounts of data are coming from
one device. This may mean a cyberattack is looming or actively happening.
▪ Other indicators of malicious activity include odd timing of events and actions that happen in an
unusual sequence.
▪ Benefits of using behavioral analytics include early detection of potential attacks and the ability to
predict future attacks.
▪ Organizations can automate detection and response using behavioral analytics.
Blockchain
▪ Blockchain is a type of database that securely stores data in blocks.
Cloud Encryption
▪ Cloud services improve efficiency, help organizations offer improved remote services, and save
money.
▪ Storing data remotely in the cloud can increase data vulnerabilities.
▪ Cloud encryption technology changes data from understandable information into an unreadable
code before it goes into the cloud.
▪ Cybersecurity professionals use a mathematical algorithm to complete cloud encryption.
▪ Only authorized users with an encryption key can unlock the code, making data readable again.
▪ This restricted access minimizes the chance of data breaches by unauthorized attackers.
▪ Experts agree that cloud encryption is an excellent cybersecurity technology for securing data.
▪ Cloud encryption can prevent unauthorized users from gaining access to usable data.
▪ Cloud encryption can also foster customer trust in cloud services and make it easier for
companies to comply with government regulations.
Context-Aware Security
▪ Context-aware security is a type of cybersecurity technology that helps businesses make better
security decisions in real time.
▪ Traditional cybersecurity technologies assess whether or not to allow someone access to a
system or data by asking yes/no questions. This simple process can cause some legitimate
users to be denied, slowing productivity.
▪ Context-aware security reduces the chance of denying entry to an authorized user.
▪ Instead of relying on answers to static yes/no questions, context-aware security uses various
supportive information like time, location, and URL reputation to assess whether a user is
legitimate or not.
▪ Context-aware security streamlines data-accessing processes and makes it easier for legitimate
users to do their work. However, end-user privacy concerns pose a challenge.
▪ Cybersecurity researchers can conduct harsher vulnerability tests on machine learning models.
Zero-Trust
▪ Traditional network security followed the motto "trust but verify," assuming that users within an
organization's network perimeter were not malicious threats.
▪ Zero Trust, on the other hand, aligns itself with the motto, "never trust, always verify.“
▪ A framework for approaching network security, Zero Trust makes all users authenticate
themselves before they get access to an organization's data or applications.
▪ Zero Trust does not assume that users inside the network are more trustworthy than anyone
else.
▪ This stricter scrutiny on all users can result in greater overall information security for the
organization.
▪ Cybersecurity professionals can use Zero Trust to deal more safely with remote workers and
challenges like ransomware threats.
▪ A Zero Trust framework may combine various tools, including multi-factor authentication, data
encryption, and endpoint security.
Regulation
▪ As the frequency of cyberattacks continues to grow significantly each year, governments are
beginning to use and promote best practice regulations.
▪ In the past, the governments did not often get involved in cybersecurity issues.
▪ Security Magazine, an industry publication for cybersecurity professionals, predicts that 2022 will
be the year that governments start to play a bigger role in regulating how organizations ensure
user information security.
▪ Potential regulatory changes include executive orders regarding cybersecurity standards for
government suppliers, penalties for companies that do not engage in best practices, increased
demand for cyberinsurance, and ransomware disclosure laws. Greater regulation will likely lead
to improved security standards.
Security Services
▪ The classification of security services are as follows:
Confidentiality
▪ Ensures that the information in a computer system and transmitted information are accessible
only for reading by authorized parties. E.g. Printing, displaying and other forms of disclosure.
Authentication
▪ Ensures that the origin of a message or electronic document is correctly identified, with an
assurance that the identity is not false.
Integrity
▪ Ensures that only authorized parties are able to modify computer system assets and transmitted
information. Modification includes writing, changing status, deleting, creating and delaying or
replaying of transmitted messages.
Non repudiation
▪ Requires that neither the sender nor the receiver of a message be able to deny the transmission.
Access control: Requires that access to information resources may be controlled by or the target
system.
Availability
▪ Requires that computer system assets be available to authorized parties when needed
Security Attacks
▪ There are four general categories of security attack which are listed below.
Interruption
▪ An asset of the system is destroyed or becomes unavailable or unusable.
▪ This is an attack on availability e.g., destruction of piece of hardware, cutting of a communication
line or Disabling of file management system.
Interception
▪ An unauthorized party gains access to an asset.
▪ This is an attack on confidentiality.
▪ Unauthorized party could be a person, a program or a computer. e.g., wire tapping to capture
data in the network, illicit copying of files.
Modification
▪ An unauthorized party not only gains access to but tampers with an asset.
▪ This is an attack on integrity. e.g., changing values in data file, altering a program, modifying the
contents of messages being transmitted in a network.
Fabrication
▪ An unauthorized party inserts counterfeit objects into the system.
▪ This is an attack on authenticity. e.g., insertion of spurious message in a network or addition of
records to a file.
Types of Threats
▪ The security of a system can be threatened via two violations:
Threat
▪ A program that has the potential to cause serious damage to the system.
Attack
▪ An attempt to break security and make unauthorized use of an asset.
▪ Security violations affecting the system can be categorized as malicious and accidental threats.
Malicious threats
▪ As the name suggests are a kind of harmful computer code or web script designed to create
system vulnerabilities leading to back doors and security breaches.
Accidental Threats
▪ On the other hand, are comparatively easier to be protected against.
▪ Cryptography is used to keep sensitive material, such as private passwords, secure online.
▪ Cybersecurity experts use cryptography to design algorithms, ciphers, and other security
measures that codify and protect company and customer data.
▪ To work in cryptography, individuals must possess programming skills.
▪ Cryptography requires professionals to work with various operating systems as well as coding
languages like C++, Java, and Python. Programming makes up the primary task of a
cryptographer’s job.
4 Key Points
▪ Keep the contents of data confidential
▪ Authenticate the identity of a message's sender and receiver
▪ Ensure the integrity of the data, showing that it hasn't been altered
▪ Demonstrate that the supposed sender really sent this message, a principle known as non-
repudiation
Types of Cryptography
1. Symmetric Key Cryptography
▪ It is an encryption system where the sender and receiver of message use a single common key
to encrypt and decrypt messages.
▪ Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have
to somehow exchange key in a secure manner.
▪ The most popular symmetric key cryptography system is Data Encryption System (DES).
2. Hash Functions
▪ There is no usage of any key in this algorithm.
▪ A hash value with fixed length is calculated as per the plain text which makes it impossible for
contents of plain text to be recovered.
▪ Many operating systems use hash functions to encrypt passwords.
Network Security
▪ Network Security protects your network and data from breaches, intrusions and other threats.
▪ This is a vast and overarching term that describes hardware and software solutions as well as
processes or rules and configurations relating to network use, accessibility, and overall threat
protection.
Network Segmentation
▪ Network segmentation is an architectural approach that divides a network into multiple
segments or subnets, each acting as its own small network.
Access Control
▪ Access control is a security technique that regulates who or what can view or use resources in a
computing environment.
Email Security
▪ Email security is a term for describing different procedures and techniques for protecting email
accounts, content, and communication against unauthorized access, loss or compromise.
▪ Email is often used to spread malware, spam and phishing attacks.
Sandboxing
▪ Sandboxing is a cybersecurity practice where you run code, observe and analyze and code in a
safe, isolated environment on a network that mimics end-user operating environments.
▪ Sandboxing is designed to prevent threats from getting on the network and is frequently used to
inspect untested or untrusted code.
▪ The company first publicly announced the incident – which it said took place in 2013 – in
December 2016.
▪ At the time, it was in the process of being acquired by Verizon and estimated that account
information of more than a billion of its customers had been accessed by a hacking group.
▪ Less than a year later, Yahoo announced that the actual figure of user accounts exposed was 3
billion.
▪ Yahoo stated that the revised estimate did not represent a new “security issue” and that it was
sending emails to all the “additional affected user accounts.”
▪ After investigation, it was discovered that, while the attackers accessed account information such
as security questions and answers, plaintext passwords, payment card and bank data were not
stolen.
God User contained information including email addresses, phone numbers, geolocation records,
genders and other social media details, which would give malicious actors plenty of data to craft
convincing, follow-on social engineering attacks in the wake of the leak, as warned by the UK’s
NCSC.
Biometrics
▪ Biometric security is a type of security that verifies people's behavioral and physical
characteristics to identify them.
▪ It is the most accurate and strongest physical security technique for identity verification.
Cloud Security
▪ Protects data stored in cloud computing environments from theft, deletion and leakage.
Computer Forensics
▪ It uses investigative techniques to identify and store evidence from a computer device.
▪ When developing your cyber security policy, one must consider the following steps:
1. Set password requirements
2. Outline email security measures
3. Explain how to handle sensitive data
4. Set rules around handling technology
5. Set standards for social media and internet access
6. Prepare for an incident
7. Keep your policy up-to-date
Cybersecurity Audit
▪ Organizations need to implement a proactive assessment and test strategy for both existing and
new information systems and assets.
▪ The strategy should be an integral part of the risk management process.
could be subject to several information security and data privacy laws, creating a complex net of
requirements.
▪ The audit should be performed by a qualified third party.
▪ In an Information System, Audit is referred to a systematic, technical assessment of an
organization’s security policies.
▪ An audit process depends upon the following phases:
1. Determination of goals and scope
2. Selection of Audit team
3. Audit planning and preparation
4. Conduct an Audit
5. Documentation
6. Issuing the review report
1. Data security
▪ Network access controls, data encryption and the way sensitive information moves through the
organisation.
2. Operational security
▪ information security policies, procedures and controls.
➢ Identify Critical Information
➢ Analyse Threats
➢ Analyse Vulnerabilities
➢ Risk Assessment
➢ Apply Appropriate OPSEC Measures
3. Network security
▪ network controls, antivirus configurations and network monitoring.
4. System security
▪ patching, privileged account management and access controls.
5. Physical security
▪ The organisation’s premises and physical devices that are used to store sensitive information.
Section 3: Exercises
Exercise 1: Here are eight critical elements of an information security policy. Write Down eight
critical elements of an information security policy in given circles.
NOTES
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________