Cyber Security: Study Notes
Cyber Security: Study Notes
STUDY NOTES
TABLE OF CONTENTS
1
WEEK 1 – INTRODUCTION TO CYBERSECURITY
DEFENCE STRATEGY
- Prevention – Stop attackers from violating security
policies
- Detection – Detect attackers’ violation of security
policies
- Recovery – Stop attacks, assess and repair damage
- Education – Best defence is intelligence
BASIC DEFINITIONS
- Computer Security – Controls which ensure confidentiality, integrity, and availability of information system
assets including hardware, software, firmware, and information being processed, stored, and
communicated
- Network Security – Measures to prevent, detect, and correct security violations that involve the
transmission of information
- Cyber Security – Measures to protect and defend the use of a global domain within the information
environment consisting of the interdependent network of information systems infrastructures including the
Internet, telecommunications networks, computer systems, embedded processors and controllers
2
SECURITY CHALLENGES
- Potential attacks on the security features need to be considered
- Procedures used to provide particular services are often counter-intuitive
- It is necessary to decide where to use the various security mechanisms
- Requires constant monitoring, is often an afterthought
- Security mechanisms typically involve more than a particular algorithm or protocol
- Security is essentially a battle of wits between a perpetrator and the designer
- Little benefit from security investment is perceived until a security failure occurs
- Strong security is often viewed as an impediment to efficient and user-friendly operation
RISK ASSESSMENT
- Risk = Probability (Exploit) x Exploit Cost
- Probability can be a combination of: Discoverability (D), Reproducibility (R) and Exploitability (E)
- Exploit cost can be a combination of: Number of affected users (A) and Damage potential (D)
- DREAD Model – Used to evaluate risk – Lowest = 1, Highest = 5
o EG. SQL Injection that reveals customer data
D = 3, R = 5, E = 3, A = 4, D = 5
Risk = (3+5+3+4+5)/5 = 4/5
CYBER THREATS
- Threat Actors:
o Social – People are the primary attack vector
o Operational – Failures of policy and procedure
o Technological – Technical issues with the system
o Environmental – From natural or physical facility factors
- Threat modelling – Helps determine the threat surface, assign risk and drive vulnerability mitigation
3
- Security Mechanism – Process that is designed to detect, prevent or recover from a security attack
- Security Service – Enhances security of data processing systems and information transfers of an
organisation
ATTACK SURFACE
- Consists of the reachable and exploitable vulnerabilities in a system
o Network attack surface – Vulnerabilities over a network, or internet
o Software attack surface – Vulnerabilities in application, utility or OS code
o Human attack surface – Vulnerabilities created by personnel or outsiders.
EG. Social Engineering
VULNERABILITY ASSOCIATED WITH ATTACK TREES
SECURITY MECHANISMS
- Hardening of OS and applications
- Patches in OS and applications via security updates
- Local, domain and public security policies
- Cryptography (Hash functions for authenticity, Symmetric, Public-key infrastructure, Certificates, PRNG)
- Authentication and key establishment within a domain
1. HOST PROTECTION
- Use of Anti-malware software
- OS and application security patches
- Host-based firewall and intrusion detection
o Patterns of specific known exploits and vulnerabilities are looked for
o Behavioural-based analysis watches for suspicious behaviour
- Configuration hardening
4
2. NETWORK ACCESS CONTROL/PROTECTION (NAC/NAP)
- Needs a server side and client side (agent) software process in a host
- Agent reports the health state of the host to NAC/NAP server
- Policies for user/group/process access rights – Cisco ACS, Symantec Endpoint Protection Manager
- Cisco Network Admission Control (NAC), Symantec and McAfee NAC
4. PERIMETER PROTECTION
- Can be physical (Router Interface) or virtual (VLAN)
- Firewall provides ongoing inspection and filtering of IP and transport headers
- IDS: Reports detected malicious packets, IPS: Blocks and reports detected malicious packets
- Detection based on signatures and abnormal behaviours