CHAP 2 @ CS
CHAP 2 @ CS
1] System Misconfigurations :
• Network assets can cause system mistakes with incompatible security
settings or Out-of-date
2] Unpatched Software :
• Attackers may use these unpatched vulnerabilities to create threat in
confidential data
3] Missing or Weak Authorization Credentials
• Attackers frequently utilize brute force methods, such as guessing
employee passwords, to gain access to systems and networks.
4] Malicious Insider Threats
• Insider threats can be make challenging task to identify threat.so
Consider purchasing network access control tools is to counting these
risks.
5] Missing or Poor Data Encryption
• If a network has weak, it will be simpler for attackers to intercept system.
6] Zero-day Vulnerabilities
• Since the vulnerability has not yet been identified or reported by the
system
7] Lack of Encryption
Without encrypted data.
Vulnerabilities in Software &
System Administration
• What is a Software Vulnerability?
• A software vulnerability is a defect in software that could allow an
attacker to gain control of a system.
• Weaknesses present in software programs, operating systems,
firmware, and applications.
• Causes:
• Broken access control
• Cryptographic failure
• Secure design pattern
Types of Software Vulnerability:
• 1] Buffer Overflow
• 2] SQL Injection
• 3] Cross-Site Scripting
• 4] Broken Authentication
• 5] Command Injection
• 6] Missing Access Controls
• 7] Cryptographic Failures
• How are Vulnerabilities Discovered ?
• There are several techniques used to identify vulnerabilities in software:
• Vulnerability Scanning:
• Penetration Testing:
• Fuzz Testing:
• Code Review:
• Risk Assessments:
• User/Admin Reports:
• Vendor Advisories:
How Can Software Vulnerabilities Be Prevented and Mitigated?
1] Secure SDLC:
• 2] Developer Training:
• 3] Input Validation:
• 4] Patch Management:
• 5] Segmentation.
• 6] Monitoring:
• 7] Risk Assessments:
Vulnerability in System
Administration
• Definition :
• It is a weakness in a computer system that can be exploited by
cybercriminals.
• 1]Peer-to-peer networks
• 2] Client-server architecture
• 3] Hybrid network architecture
• 4] Cloud-based architecture
• 5] Flat/two-tier network architecture
• 6] Three-tier network architecture
Network architecture designs
1] Data Repositories:
2] Access Control Mechanisms
3] Collaboration Platforms
Authentication :
• Authentication is the process of verifying a user or device before
allowing access to a system or resources.
• Authentication is part of a three-step process for gaining access to
digital resources:
• Identification—Who are you?
• Authentication—Prove it.
• Authorization—Do you have permission?
Types of Authentication
1] Single-Factor Authentication :
• one-factor authentication involves matching one credential to gain access to a system
• (i.e., a username and a password)
• 2] Two-Factor Authentication :
• 2FA requires two factors of authentication out of the three categories:
• Something you know (i.e., username and password)
• Something you have (e.g., a security token)
• Something you are (e.g., TouchID or other biometric credentials)
• 3] Three-Factor Authentication
• Three-factor authentication (3FA) requires identity-confirming credentials from three
separate authentication factors (i.e., one from something you know, one from
• Multi-Factor Authentication :
• Multi-factor authentication (MFA) refers to any process that requires
two or more factors of authentication.
• Single Sign-On Authentication
• Single sign-on (SSO) authentication allows users to log in and access
multiple accounts
• One-Time Password
• A one-time password (OTP) or one-time PIN (sometimes called a
dynamic password)
• 3. Financial Loss:
Can lead to financial loss, particularly in cases where attackers gain access to
financial systems or financial data.
• 4. Reputation Damage:
• Weak authentication can damage an organization's reputation.
• Solutions for Improving Authentication Security
• 1. Multi-Factor Authentication:
• Multi-factor authentication (MFA) requires users to provide two or more
forms of authentication before being granted access to a system
• 2. Password Policies:
• Organizations should implement strong password policies that require users
to create complex passwords and change them regularly.
Access control, Audit :
• What is access control?
• Access control is a fundamental component of data security that
dictates who’s allowed to access and use company information and
resources.
• How does access control work?
• Many access control systems also include multifactor authentication
(MFA)
Screen-Shot-2019-12-09-at-10.21.14-AM-1024x716.webp
• The four access control models are:
• Discretionary access control (DAC):
• administrator of the protected system, data, or resource sets the
policies for who is allowed access.
• Mandatory access control (MAC):
• This model is common in government and military environments.
• Role-based access control (RBAC):
• This widely used method is based on a complex combination of role
assignments, authorizations, and permissions.
• Attribute-based access control (ABAC):
access is based on a set of attributes and environmental conditions, such
as time of day and location.
Audit :
• A cybersecurity audit involves a comprehensive analysis and review of your IT
infrastructure.
• 1. Determine Scope -
2. Identify Threats
3. Plan Response
Intrusion Detection System :
• An intrusion detection system (IDS) is a network security tool that
monitors network traffic and devices for known malicious activity,
suspicious activity.