0% found this document useful (0 votes)
5 views

CHAP 2 @ CS

The document provides an overview of cybersecurity vulnerabilities, including their causes, types, and methods for discovery and prevention. It discusses the importance of access control and authentication, detailing various models and types of authentication methods. Additionally, it covers threat management processes and the role of intrusion detection systems in enhancing cybersecurity measures.

Uploaded by

AFSHA SAYYED
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CHAP 2 @ CS

The document provides an overview of cybersecurity vulnerabilities, including their causes, types, and methods for discovery and prevention. It discusses the importance of access control and authentication, detailing various models and types of authentication methods. Additionally, it covers threat management processes and the role of intrusion detection systems in enhancing cybersecurity measures.

Uploaded by

AFSHA SAYYED
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Chap 2.

Vulnerabilities and Access


Control
Cyber Security Vulnerabilities-Overview:

• These hackers can enter the networks without authorization.


• Examples of Cyber Security Vulnerabilities :
• Missing data encryption
• Lack of security cameras
• Unrestricted upload of dangerous files
• Code downloads without integrity checks
• Weak and unchanged passwords
Causes of Cyber Security Vulnerabilities

• There are many causes of cyber security vulnerabilities. :


• Complexity:
• Familiarity:
• Connectivity:
• Poor Password Management:
• Internet:
• Software Bugs:
TYPES OF CYBER
SEC.VULNERABILITIES
• Types of Cyber Security Vulnerabilities
• Here are a few common types of cybersecurity vulnerabilities

1] System Misconfigurations :
• Network assets can cause system mistakes with incompatible security
settings or Out-of-date

2] Unpatched Software :
• Attackers may use these unpatched vulnerabilities to create threat in
confidential data
3] Missing or Weak Authorization Credentials
• Attackers frequently utilize brute force methods, such as guessing
employee passwords, to gain access to systems and networks.
4] Malicious Insider Threats
• Insider threats can be make challenging task to identify threat.so
Consider purchasing network access control tools is to counting these
risks.
5] Missing or Poor Data Encryption
• If a network has weak, it will be simpler for attackers to intercept system.
6] Zero-day Vulnerabilities
• Since the vulnerability has not yet been identified or reported by the
system
7] Lack of Encryption
Without encrypted data.
Vulnerabilities in Software &
System Administration
• What is a Software Vulnerability?
• A software vulnerability is a defect in software that could allow an
attacker to gain control of a system.
• Weaknesses present in software programs, operating systems,
firmware, and applications.
• Causes:
• Broken access control
• Cryptographic failure
• Secure design pattern
Types of Software Vulnerability:
• 1] Buffer Overflow
• 2] SQL Injection
• 3] Cross-Site Scripting
• 4] Broken Authentication
• 5] Command Injection
• 6] Missing Access Controls
• 7] Cryptographic Failures
• How are Vulnerabilities Discovered ?
• There are several techniques used to identify vulnerabilities in software:
• Vulnerability Scanning:
• Penetration Testing:
• Fuzz Testing:
• Code Review:
• Risk Assessments:
• User/Admin Reports:
• Vendor Advisories:
How Can Software Vulnerabilities Be Prevented and Mitigated?

1] Secure SDLC:
• 2] Developer Training:
• 3] Input Validation:
• 4] Patch Management:
• 5] Segmentation.
• 6] Monitoring:
• 7] Risk Assessments:
Vulnerability in System
Administration
• Definition :
• It is a weakness in a computer system that can be exploited by
cybercriminals.

• System administration functions :


• Installation,
• configuration
• and maintenance,
• network equipment
Duties of System Admin.
Types of system administrator

• Windows Systems Administrator


• Business Systems Administrator
• Security Systems Administrator
• Office 365 Systems Administrator
• Google Workspace Admin
Skills you need as a system administrator

• As a system administrator, you’ll need to develop a core set of skills


that will allow you to conduct function smoothly.

• In-depth knowledge of operating systems:


• Familiarity with hardware:
• Cloud computing skills:
• Knowledge of networks:
• Communication and interpersonal skills:
Complex Network Architecture
• Network architecture refers to the design and structure of a computer
network —
• The main components of a network architecture include the following:
• Network topology:
• The client:
• Routers:
• Switches:
• Protocols:
• Transmission media:
Network architecture types

• 1]Peer-to-peer networks
• 2] Client-server architecture
• 3] Hybrid network architecture
• 4] Cloud-based architecture
• 5] Flat/two-tier network architecture
• 6] Three-tier network architecture
Network architecture designs

• Flat/two-tier network architecture


• The two-tier architecture design consists of two layers — the access layer
and the distribution layer.
• Three-tier network architecture
• A three-tier network architecture organizes your network into three layers.
• The access layer comes at the bottom. It connects user devices like
workstations and printers to the network.
• The distribution layer comes above the access layer. It separates work
groups, like sales and HR.
• At the top, you have the core layer. It acts as backbone and quickly
transfers data.
OSI MODEL
• Physical Layer (Layer 1)
• The physical layer converts and transmits raw bit stream data (1s and 0s) over
the physical medium.
• Wireless frequency links, like Wi-Fi and wireless network connections
• Network cabling,Light-speed transmission, such as fiber-optic cabling
• Data Link Layer (Layer 2)
• The data link layer defines the format of data on the network. Like the
network layer, the data link layer enables data transfer between two directly
connected nodes.
• It also uses logical link control (LLC) to provide flow control and error control.
• Network Layer (Layer 3)
• It’s responsible for breaking up transport layer segments into smaller
network packets for transmission
• Transport Layer (Layer 4)
• The transport layer uses transmission protocols including
Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP), to manage network traffic between systems to ensure correct
data transfers.
• Session Layer (Layer 5)
• The session layer creates and maintains the sessions (connections)
that two systems need in order to speak to each other. Layer 5
defines…:
• When sessions are created and opened
• Presentation Layer (Layer 6)
• The presentation layer ensures the data is prepared in a usable form for the
application layer (receiving side) or for the network layer (sending side). Layer 6 is
responsible for:
• Data translation
• Encryption & decryption
• Compression
• Other data preparation items
• Application Layer (Layer 7)
• The application layer is the closest layer to the end user. It receives information from
the end user and sends results back to the user. Despite its name, Layer 7 is not
where client applications live. This layer provides the protocols that allow
software/apps to transmit data, including:
• HTTP and HTTPS,FTP,POP,SNMP.
# Open Access to Organizational
Data
• Open Access to Organizational Data:

Open access to organizational data refers to the practice of providing


unrestricted access to information within an organization.
• Components of Open Access to Organizational Data:

1] Data Repositories:
2] Access Control Mechanisms
3] Collaboration Platforms
Authentication :
• Authentication is the process of verifying a user or device before
allowing access to a system or resources.
• Authentication is part of a three-step process for gaining access to
digital resources:
• Identification—Who are you?
• Authentication—Prove it.
• Authorization—Do you have permission?
Types of Authentication

1] Single-Factor Authentication :
• one-factor authentication involves matching one credential to gain access to a system
• (i.e., a username and a password)
• 2] Two-Factor Authentication :
• 2FA requires two factors of authentication out of the three categories:
• Something you know (i.e., username and password)
• Something you have (e.g., a security token)
• Something you are (e.g., TouchID or other biometric credentials)
• 3] Three-Factor Authentication
• Three-factor authentication (3FA) requires identity-confirming credentials from three
separate authentication factors (i.e., one from something you know, one from
• Multi-Factor Authentication :
• Multi-factor authentication (MFA) refers to any process that requires
two or more factors of authentication.
• Single Sign-On Authentication
• Single sign-on (SSO) authentication allows users to log in and access
multiple accounts
• One-Time Password
• A one-time password (OTP) or one-time PIN (sometimes called a
dynamic password)
• 3. Financial Loss:
Can lead to financial loss, particularly in cases where attackers gain access to
financial systems or financial data.
• 4. Reputation Damage:
• Weak authentication can damage an organization's reputation.
• Solutions for Improving Authentication Security
• 1. Multi-Factor Authentication:
• Multi-factor authentication (MFA) requires users to provide two or more
forms of authentication before being granted access to a system
• 2. Password Policies:
• Organizations should implement strong password policies that require users
to create complex passwords and change them regularly.
Access control, Audit :
• What is access control?
• Access control is a fundamental component of data security that
dictates who’s allowed to access and use company information and
resources.
• How does access control work?
• Many access control systems also include multifactor authentication
(MFA)

Screen-Shot-2019-12-09-at-10.21.14-AM-1024x716.webp
• The four access control models are:
• Discretionary access control (DAC):
• administrator of the protected system, data, or resource sets the
policies for who is allowed access.
• Mandatory access control (MAC):
• This model is common in government and military environments.
• Role-based access control (RBAC):
• This widely used method is based on a complex combination of role
assignments, authorizations, and permissions.
• Attribute-based access control (ABAC):
access is based on a set of attributes and environmental conditions, such
as time of day and location.
Audit :
• A cybersecurity audit involves a comprehensive analysis and review of your IT
infrastructure.

An audit performs helps organizations to:

• 1] Identify and remediate cybersecurity risks

• 2] Fulfill internal and external compliance requirements.

• 3] Applicable to laws and regulations

• 4] Improve credibility with customers/partners


• The following three steps outline best practices for performing a
thorough cybersecurity audit.

• 1. Determine Scope -
2. Identify Threats
3. Plan Response
Intrusion Detection System :
• An intrusion detection system (IDS) is a network security tool that
monitors network traffic and devices for known malicious activity,
suspicious activity.

• An IDS can help accelerate and automate network threat detection by


alerting security administrators to known or potential threats.

A centralized security tool such as a security information and event


management (SIEM) system can combine data.
Types of intrusion prevention
systems :
• IDSs are categorized as ----
• Network intrusion detection systems (NIDSs)
• monitor inbound and outbound traffic to devices across the network.
NIDS are placed at strategic points in the network.

• Host intrusion detection systems (HIDSs)


• are installed on a specific endpoint, like a laptop, router, or server. The
HIDS only monitors activity on that device.
• An application protocol-based IDS (APIDS)
• works at the application layer, monitoring application-specific
protocols. An APIDS is often deployed between a web server and an
SQL database to detect SQL injections.

• It consists of following blocks:
• Log File:
• Packet sniffer Win Dump collects packet headers of data coming from internet or LAN. This file
is called as log file.
• Data Formatting Unit:
• Data collected in log file is classified according to various fields in the packet header.
• Log Database:
• It contains different tables according to different protocols (like TCP/IP, UDP, ICMP, and ARP).
For each protocol there is one table.
• Each table consists of attributes related to that particular protocol.
• Misuse Detection Block:
• Misuse Detection technique is used for detection of known attacks. Many computer attacks
have fix signature.
• Attack Database:
• Attack database also contains tables for different protocols as in case of log database.
• The entries from log database which are declared as attacks are stored in attack database.
Threat Management
• Threat management refers to the process of identifying, assessing, and
mitigating threats to an organization's information assets, including hardware,
software, data, and networks.
• The goal of threat management is to minimize the impact of threats.
• The threat management process typically involves several steps, including:
• 1. Risk assessment:
• Identifying potential threats and vulnerabilities to an organization's information
asset.
• 2. Threat identification:
• Determining severity of potential threats to an organization's information
assets.
• 3. Threat mitigation:
• Implementing security measures to prevent and respond to potential threats,
including firewalls, intrusion detection systems, antivirus software, and access
controls.
• 4.Incident response:
• Establishing a plan for responding to security incidents and recovering
from them, including backup and recovery procedures
• incident reporting, and incident analysis.
• 5. Continuous monitoring:
• Regularly monitoring an organization's information assets.
•Thank you

You might also like