Cyber Security UNIT1
Cyber Security UNIT1
Smaller enterprises are not immune to attacks either--in fact they may be
more at risk because they don't have adequate cybersecurity measures in
place. Malicious hackers and other bad actors make risk assessments of
their own and look for easy targets.
What are the benefits of threat modeling?
⚫ The process of threat modeling can:
⚫ Provide an enhanced view of systems. The steps involved in threat
modeling--creating data flow diagrams (DFDs) and graphical
representations of attack paths, as well as prioritizing assets and risks--
help IT teams gain a deeper understanding of network security and
architecture.
⚫ Help enable better collaboration on security. Proper threat modeling
requires input from many stakeholders. Participating in the process can
help instill cybersecurity consciousness as a core competency for all
participants.
⚫ Facilitate risk prioritization. Businesses can use the threat data provided
by modeling to make decisions about which security risks to prioritize--a
helpful process for understanding where to allocate people and budget
resources.
What are the benefits of threat modeling?
⚫ The process of threat modeling can:
⚫ Provide an enhanced view of systems. The steps involved in threat
modeling--creating data flow diagrams (DFDs) and graphical
representations of attack paths, as well as prioritizing assets and risks--
help IT teams gain a deeper understanding of network security and
architecture.
⚫ Help enable better collaboration on security. Proper threat modeling
requires input from many stakeholders. Participating in the process can
help instill cybersecurity consciousness as a core competency for all
participants.
⚫ Facilitate risk prioritization. Businesses can use the threat data provided
by modeling to make decisions about which security risks to prioritize--a
helpful process for understanding where to allocate people and budget
resources.
What is involved in the threat modeling
process?
⚫ Steps involved in threat modeling include:
⚫ Identify assets. An asset could be account data, intellectual property, or simply the
reliable functioning of a system.
⚫ Diagram the system. DFDs provide a high-level, asset-centric view of systems and
the data flows of attacks. An attack tree, or graphic representation of an attack
path, illustrates the possible origins and paths of attacks.
⚫ Analyze threats. Use threat modeling methods to further analyze specific threat
types, identify potential threats, map data flows, and quantify risk.
⚫ Perform risk management and prioritization. Many threat modeling tools produce
threat scores and data for calculating risk. Stakeholder input is essential to this
step.
⚫ Identify fixes. Once you identify the areas, assets, or threats that matter most to
the organization, the next steps may be apparent. Changing firewall, encryption, or
multi-factor authentication settings are examples of steps to address a threat.
Demo-1
How do I measure the effectiveness of threat
modeling?
⚫ Two ways to measure effectiveness are:
⚫ Common Vulnerability Scoring System (CVSS). CVSS produces
standardized scores for application vulnerabilities, IT systems
and elements, and IoT devices; the scores can be calculated with
a free online tool. For additional perspective, scores can be
compared against a database of existing scores crowdsourced
from similar enterprises.
⚫ Penetration testing. Sometimes referred to as "ethical hacking,"
penetration testing is the process of staging dummy attacks on a
system to measure its strengths and weaknesses. Pen tests may
require a good deal of time-consuming data analysis, so
organizations should be wary of running too many tests, or tests
on assets that are not sufficiently high-risk to justify the cost.
Threat modeling methods and tools
ARP Poisoning
What is MITM?
⚫ The Man-in-the-Middle attack (abbreviated
MITM, MitM, MIM, MiM, MITMA) implies
an active attack where the adversary
impersonates the user by creating a
connection between the victims and sends
messages between them. In this case, the
victims think that they are communicating
with each other, but in reality, the malicious
actor controls the communication.
Demo 2
⚫ In this exercise, we have used Ettercap to
perform ARP poisoning in LAN environment
using VMware workstation in which we have
installed Kali Linux and Ettercap tool to sniff
the local traffic in LAN.
List of software requied
⚫ VMware workstation
⚫ Kali Linux or Linux Operating system
⚫ Ettercap Tool
⚫ LAN connection
Local LAN
⚫ Note − This attack is possible in wired and wireless networks.
You can perform this attack in local LAN.
⚫ Step 2 − Login into the Kali Linux using username pass “root,
toor”.
⚫ Step 3 − Make sure you are connected to local LAN and check
the IP address by typing the command ifconfig in the terminal.
Step 4 − Open up the terminal and type “Ettercap
–G” to start the graphical version of Ettercap
Step 5 − Now click the tab “sniff” in the menu bar and select “unified sniffing”
and click OK to select the interface. We are going to use “eth0” which means
Ethernet connection.
Step 6 − Now click the “hosts” tab in the menu bar and click “scan
for hosts”. It will start scanning the whole network for the alive
hosts.
⚫ Step 7 − Next, click the “hosts” tab and select “hosts list” to see the
number of hosts available in the network. This list also includes the
default gateway address. We have to be careful when we select the
targets.
Continue..
⚫ Step 8 − Now we have to choose the targets.
In MITM, our target is the host machine,
and the route will be the router address to
forward the traffic.
⚫ In an MITM attack, the attacker intercepts
the network and sniffs the packets. So, we
will add the victim as “target 1” and the
router address as “target 2.”
Continue..
⚫ In VMware environment, the default
gateway will always end with “2” because
“1” is assigned to the physical machine.
⚫ Like ARP poisoning, there are other attacks such as MAC flooding, MAC
spoofing, DNS poisoning, ICMP poisoning, etc. that can cause significant
loss to a network.
⚫ In the next chapter, we will discuss another type of attack known as DNS
poisoning.
Network Security Model
What is the network security model?
⚫ A network security model is the security
process of interconnecting various computer
networks to protect them from unwanted
threats and access.
⚫ This security model provides top-notch
safety to network infrastructure.
What are the benefits of moving from
traditional security models to 'Zero Trust
Networks'?
⚫ Zero Trust Network challenges traditional
security by verifying every application, user
and device before granting access.
⚫ Some benefits it provides over traditional
security are
⚫ 1) easy governance and 2) compliance,
3)enhanced protection of data, 4) better
security and much more.
Why do we need a network security
model?
⚫ The Internet and other private networks are
hubs of opportunities for users worldwide,
but it also exposes us to unwanted threats.
⚫ https://www.ojp.gov/ncjrs/virtual-library/
abstracts/seminar-cyber-terrorism-and-i
nformation-warfare-threats-and
Career Average Salary
⚫ A mid-career Cyber Security Specialist with
4-9 years of experience earns an average
salary of ₹12.5 Lakhs per year, while an
experienced Cyber Security Specialist with
10-20 years of experience earns an average
salary of ₹26.3 Lakhs per year.