CS29 Modules 1 4
CS29 Modules 1 4
SECURITY FUNDAMENTALS
SUBTOPIC 1
INFORMATION SECURITY CYCLE
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Define Information Security and its goals;
▪ Demonstrate the abstract view of the components of a goal of security;
▪ Enumerate the types of risks, threats, vulnerability, intrusion and attacks;
▪ Explain the Information Security Controls;
▪ Discuss Security Management Process;
▪ Give different aspects of CIA Triad.
What Is Information Security?
Data
Resource
Data Resource
Goals of Security
• Prevention
• Detection
• Recovery
A fundamental understanding of the standard concepts of security is
essential before people can start securing their environment.
Risk
Likelihood: Rare
Damage: Moderate
Network-Based Attacks
Security Controls
• Controls are the countermeasures that you need to put in place to avoid,
mitigate, or counteract security risks due to threats or attacks.
Availability
The CIA Triad is a well-known, venerable model for the development of security
policies used in identifying problem areas, along with necessary solutions in the
arena of information security.
Confidentiality
❑Strong encryption
❑Strong authentication
❑Stringent access controls
Integrity
❑Something you do
✓Keystroke patterns
Authorization
Rule-Based Access
Control
Accounting and Auditing
• The process of tracking and recording system activities and resource access.
Common Security Practices
❑Implicit deny
❑Least privilege
❑Separation of duties
❑Job rotation
❑Mandatory vacation
❑Time of day restrictions
❑Privilege management
Implicit Deny
Default Deny
An implicit deny only denies a permission until the user or group is allowed
to perform the permission
Least Privilege
Perform their jobs with User 1 User 4 Perform their jobs with
fewer privileges more privileges
User 2 User 3
Data Entry Clerks Financial Coordinators
Audit
Access Control
Firewall Restore
MANDATORY VACATIONS policies require employees to take time away from their job.
Time of Day Restrictions
AM PM
TIME OF DAY RESTRICTIONS limit when users can access specific systems based on
the time of day or week.
Security Tokens
Unique
PIN
Value
User Password
Information
Password
ID Card
Cipher is a system of writing that prevents most people from understanding the message
Stream Cipher
Cipher Types
Plaintext Ciphertext
Block Cipher Block
Block cipher takes a block of plain text and a key, and outputs a block of
ciphertext of the same size.
Steganography
A Hash function can only encrypt data; that data cannot be decrypted
Hashing Encryption
= Two Letters
Following
Symmetric encryption uses a single key to encrypt and decrypt data. Therefore,
it is also referred to as secret-key, single-key, shared-key, and private-key
encryption.
Symmetric Encryption Algorithms
Asymmetric encryption, also known as public key cryptography, uses two mathematically
related keys.
Asymmetric Encryption Techniques
❑RSA - Rivest–Shamir–Adleman
❑DH - Diffie–Hellman key exchange.
❑ECC - Elliptic curve cryptography
❑DHE - Diffie–Hellman key exchange
❑ECDHE - Elliptic curve Diffie-Hellman
Key Exchange
Sender Receiver
For messages to be exchanged, the sender and receiver need the right cryptographic keys
Hash Value of
Hash Value Matches
Signature
Single-Use Key
Individual Policy
Formal
Policy
Statement Resources to
Protect
Implementation
Measures
All security policies should include a well-defined security vision for the
organization.
Enforcement – This section should clearly identify how the policy will be
enforced and how security breaches and/or misconduct will be handled.
User Access to Computer Resources – This section should identify the roles and
responsibilities of users accessing resources on the organization’s network.
Security Policy Components
Security Profiles – This section should include information that identifies how
security profiles will be applied uniformly across common devices
Internet – This section is about usage and what content filtering is in place.
Anti-Virus – This section identifies the frequency of updating the file definitions
as well as how removable media, e-mail attachments and other files are scanned.
Audit policy defines account limits for a set of users of one or more
resources.
Common Security Policy Types
Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls
the working environment of user accounts and computer accounts.
Security Document Categories
System architecture - is the conceptual model that defines the structure,
behavior, and more views of a system
Classification
Every paper or electronic record has a specific amount of time that it needs
to be kept. This is called a retention period.
Once the retention period has ended, records are disposed
according to their value and content:
▪ Shred
▪ Recycle
▪ Delete
▪ Transfer
• CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Paperback – October 12, 2017 by Darril Gibson
Here are a few tips that organizations can incorporate into their security awareness
training programs that will help users to avoid social engineering schemes:
https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/
Hackers and Attackers
❑Malicious insiders
❑Hacktivists
❑Data thefts
❑Script kiddies
❑Electronic vandals
❑Cyberterrorists
Malicious insiders
Hacktivists - a person who gains unauthorized access to computer files or
networks in order to further social or political ends.
Data theft is the act of stealing information stored on computers, servers, or other
devices from an unknowing victim with the intent to compromise privacy or obtain
confidential information.
Script kiddie, skiddie, or skid is an unskilled individual who uses scripts or
programs, such as a web shell, developed by others to attack computer
systems and networks and deface websites.
Electronic vandalism entails the determined and intentional malicious
attempt to destroy or manipulate the electronic media and data through
viruses, malevolent codes and other similar means
Cyberterrorism is the use of the Internet to conduct violent acts that result
in, or threaten, loss of life or significant bodily harm, in order to achieve
political or ideological gains through threat or intimidation.
• CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Paperback – October 12, 2017 by Darril Gibson
Administrative
access granted
xxxxxxxxx
xPxxxxxxx
xPassxxxx
xPass1234
!Pass1234
✓ Dictionary attack
✓ Brute force attack
✓ Man In the Middle
✓ Birthday attack
✓ Rainbow Table Attack
Types of Password Attacks
Dictionary attack - An attack that takes advantage of the fact people tend
to use common words and short passwords.
Types of Password Attacks
Man In the Middle - the hacker’s program doesn’t just monitor information being
passed but actively inserts itself in the middle of the interaction, usually by
impersonating a website or app.
Types of Password Attacks
Known flaw in
application
Types of Application Attacks
Application Attack Description
Cross-site scripting An attack that injects malicious scripts into trusted websites to be run when a
(XSS) user visits the site.
An attack that occurs when the security level of a system is at its lowest,
Zero day exploit
immediately after the discovery of a vulnerability.
Cookies An attack where an attacker injects a meta tag in an HTTP header, making it
manipulation possible to modify a cookie stored in a browser.
An attack where a website running Flash stores data objects (Flash cookies)
LSO attack on a user’s computer that are difficult to detect and remove, and may threaten
the user’s privacy.
An attack where the attacker can merge malicious software or code into a
Attachment attack downloadable file or attachment on a web server so that users download and
execute it on client systems.
Types of Application Attacks (Cont.)
An add-on that is meant to look like a normal add-on, except that when a user
Malicious add-ons installs it, malicious content will be injected to target the security loopholes that
are present in a web browser.
An attack in which data goes past the boundary of the destination buffer and
Buffer overflow begins to corrupt adjacent memory, which may cause an app to crash or rogue
code to execute on a system.
An attack in which a computed result is too large to fit in its assigned storage
Integer overflow space, which may lead to crashing or data corruption, and may trigger a buffer
overflow.
Cross-site scripting - This attack is the type of an injection in which there are
some malicious scripts inserted into the websites which are pretty trusted ones
by the users.
Types of Application Attacks
SQL injection - This attack is the technique in which some code injection
method is used.
Types of Application Attacks
LDAP injection - This attack falls into the category of the applications attacks as
well since it is also associated to some applications.
Types of Application Attacks
XML injection - When this attack is taken place, the attack mainly makes some efforts
and has an aim to inject some XML tags into the SOAP message and hence he wants
to modify the source of XML
Types of Application Attacks
Buffer overflow - This term is seed very basically and widely in the computer
programming and security.
Types of Application Attacks
Zero-day - It is also known s the zero hour or the day zero attacks.
Types of Application Attacks
Cookies and attachments - There is a possibility that the cookies which are
downloaded are infected ones and the attachments which are downloaded are
also the victim of them.
Types of Application Attacks
LSO (Locally Shared Objects)- Local shared objectives are the pieces of the
data which belong to some website and they are happened when the adobe
flash is stored on the user's computer.
Types of Application Attacks
Malicious add-ons - Sometimes the ads on which are available to get can get
injected and they can turn the computers into botnets, it happened once in
the past when the Firefox got some ad on which created this problem.
Types of Application Attacks
Session hijacking - This is also known as the cookie hijack. In this case, the
computer session or the key session is simply exploited and hence the access
to some unauthorized area is gained to get some information or the service in
a computer.
• CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Paperback – October 12, 2017 by Darril Gibson
21 FTP Open
53 DNS Closed
80 HTTP Open
Original
Transmission
User User
10:00 A.M.
1:00 P.M.
Social Network Attacks
▪ Evil twin attack - is a fraudulent Wi-Fi access point that appears to be legitimate but
is set up to eavesdrop on wireless communications.
Drones
❑ UDP flood - attack in which the attacker overwhelms random ports on the
targeted host with IP packets containing UDP datagrams.
Legitimate Computer
Session
Stealing
an Active
Session
Cookie
IP Address
DHCP Server
Redirects
IP Address to Self
Grant access
to:
John
Jane
Alice
Frank
…
Bob
Transitive access is a misuse of trust that causes issues with securing information
or control.
DNS Vulnerabilities
Vulnerability Description
An attacker exploits the traditionally open nature of the DNS system to redirect a
DNS poisoning domain name to an IP address of the attacker's choosing.
An attacker sets up a rogue DNS server. This rogue DNS server responds to legitimate
DNS hijacking requests with IP addresses for malicious or non-existent websites.
Wireless Security
Rogue
Access Point
Evil Twins
dtech devtech
Legitimate Access Point Evil Twin
A rogue wireless access point installed near a legitimate one for purposes of
eavesdropping or phishing.
Jamming
1:00 P.M.
Sinkhole Attacks
Sinkhole attacks are carried out by either hacking a node in the network or
introducing a fabricated node in the network
WEP and WPA Attacks
WEP
CF461
E
IV: CF461E
password
Password
WPA PASSWORD
Passphras
e:
passw0rd p4ssword
passw0rd
4018 291 7
40182917
• Physical security
• Physical threat
• Physical Vulnerability
Physical Security, Threats and Vulnerabilities
❑ Internal
❑ External
❑ Natural
❑ Man-made
Environmental Threats and Vulnerabilities
❑ Fire
❑ Hurricanes and tornadoes
❑ Flood
❑ Extreme temperature
❑ Extreme humidity
• CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Paperback – October 12, 2017 by Darril Gibson
Evaluate
Evaluate
Non-
Production
System
Test
Test
Implement
Implement
Application Security Methods
❑Configuration
❑Application hardening
❑Patch management
Input Validation
Delivered Format:
Expected Format: mm/dd/yyyy:DELET
mm/dd/yyyy E table ‘Users”
Malicious Code
❑Client-side validation:
✓ Input validation and error recovery at the browser
✓ JavaScript, AJAX, VBScript, and HTML 5 attributes
❑Server-side validation:
✓ Input validation and error recover at the server
✓ Perl, PHP, ASP, and other scripting languages
Message:
Incorrect
password
Attacker
XSS - Cross-site scripting
XSS Reflected
Attack
XSS - Cross-site scripting
XSS Stored
Attack
Trust Established
Attacker Exploits
Trust
Cross-site request forgery, also known as one-click attack or session riding and
abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF
Cross-Site Attack Prevention Methods
Weaknesses are
found and tracked
Random data is
sent
✓ Parental controls - give guardians the ability to set parameters for what can
show up on a browser
✓ Automated updating
Web Browser Security
❑Benefits:
✓Prevents unauthenticated storage mapping.
✓Prevents copying data without the assigned HSM.
✓Self-governed; not affected by malicious code or other OS issues.
✓Proves that all computers are encrypted and that data is secure.
Types of Hardware-Based Encryption Devices
❑Data at rest
❑Data in transit
❑Data in use
Permissions and Access Control Lists
❑Permissions:
✓Who can read or change data in a file or folder.
✓Implemented at individual file and folder level.
❑ACLs:
✓Who can access files and folders.
✓Implemented as MAC address filters on wireless
routers and wireless APs.
MANAGE DEVICE , MANAGE
MOBILE SECURITY
AND HOST SECURITY
Guidelines for Managing Application Security
❑Consider implementing a combination of client-side validation and
server-side validation.
❑Implement error and exception handling for applications developed in-
house.
❑Establish security configuration baselines.
❑Harden applications, especially web browsers.
❑Implement patch management for applications.
❑Implement input validation.
❑Protect against XSS and XSRF attacks.
❑Protect databases and associated applications.
Hardening
❑ Manage services
❑ Configure firewall
❑ Configure Internet security
❑ Manage automatic updates
❑ Enable auditing and logging
TCB - Trusted Computing Base
Trusted OS
Firmware
A trusted computing base (TCB) refers to
all of a computer system's hardware,
firmware and software components that Hardware
combine to provide the system with a
secure environment.
Security Baselines
Compare
❑ Patches:
▪ Supplemental code
❑ Hotfixes:
▪ Address specific security flaws
❑ Rollups:
▪ Collection of patches and hotfixes
❑ Service Packs:
▪ Comprehensive updates with new features
Application Blacklisting and Whitelisting
❑Black listing:
✓ preventing identified programs from running.
❑White listing:
✓allowing only identified programs to run.
Logging
A log file is a file that records either events that occur in an operating
system or other software runs, or messages between different users of a
communication software.
Auditing
Site security also provides the ability to audit activities within the facility. This
can be done through reviewing camera footage, badge reader logs, visitor
registration logs, or other mechanisms.
Anti-malware Software
Scanning…
Infections detected:
Quarantine 3
infected files
❑Antivirus
❑Anti-spam
❑Anti-spyware
❑Pop-up blockers
❑Host-based firewalls
Virtualization Security Techniques
❑Establish a patch management system.
❑Apply the least privilege concept.
❑Establish log requirements.
❑Establish secure design for virtual components.
❑Take consistent snapshots of virtual environments.
❑Ensure that virtual hosts are consistently available and elastic.
❑Leverage virtual sandboxes for security testing.
Hardware Security Controls
❑Manual updates:
✓Android
✓iOS
❑Wrappers
❑Controlling redundancy and diversity
Strong Passwords
Minimum Length
Special Characters
!Pass1234
Uppercase Letters
Numbers
Lowercase Letters
A basic component of an information security program is ensuring that employees select and
use strong passwords. The strength of a password can be determined by examining the
length, complexity, and randomness of the password.
Mobile Device Types
❑Smartphones
❑Wi-Fi enabled devices
Mobile Device Vulnerabilities
❑Viruses
❑Spam
❑Lost or stolen devices
Mobile Device Security Controls
❑Use device management.
❑Enable screen lock.
❑Require strong passwords.
❑Use device encryption if available.
❑Require remote wipe/sanitization/lockout.
❑Enable GPS tracking if available.
❑Enforce access control.
❑Enforce application control.
❑Track assets and keep inventory.
❑Limit removable storage use.
❑Implement storage segmentation.
❑Disable unused features.
Mobile Application Security Controls
▪ Ingress traffic
▪ Egress traffic
VLAN - Virtual Local Area Network
VLAN1 VLAN2
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a
computer network at the data link layer
Subnet
Network
A network-based IDS (NIDS) monitors network traffic using sensors that are located
at key locations within the network, often in the demilitarized zone (DMZ) or at
network borders.
Wireless IDS
❑Manage network devices so that they are configured according to security policies.
❑Maintain documentation for all current server configurations.
❑Establish and document baselines.
❑Implement strong ACLs and implement implicit deny.
❑Update antivirus software regularly.
❑Configure only required network services.
❑Disable unused interfaces and unused application service ports.
❑Create and implement a DRP.
❑Apply security updates and patches.
❑Encrypt sensitive data.
❑Check event logs for unusual activity.
❑Monitor network activity.
NETWORK DESIGN ELEMENTS,
IMPLEMENT NETWORKING
PROTOCOLS AND SERVICES
Network Monitoring Systems
❑Behavior-based
❑Signature-based
❑Anomaly-based
❑Heuristic.
Web Security Gateway
Web Security
Gateway
NAT Server
24.96.83.120
VPN (Virtual Private Network) is a technology that uses encrypted tunnels to create
secure connections across public networks like the internet
Main Office
VPN Concentrator
VPN
Concentrator
❑Private
❑Public
❑Community
❑Hybrid
Cloud Computing Service Types
• SaaS - Software as a Service
• PaaS - Platform as a Service
• IaaS - Infrastructure as a Service
DNS - Domain Name System (or Service or Server)
DNS Server
www.comptia.org
comptia.org
209.117.62.36
209.117.62.36
HTTP - Hypertext Transfer Protocol.
HTTP
SSL/TLS
HTTPS, the secure version of HTTP web browsing, uses the SSL protocol.
SSL/TLS
1 Request secure connection
3 Negotiate encryption
SECURE SHELL (SSH)
Session is encrypted
SSH Tunnel
Man-in-the-Middle
IPSec Standards
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates
and encrypts the packets of data sent over an Internet Protocol network
NetBIOS
❑Applications communicate across network
❑Connection communication over sessions
❑Connectionless datagram communication
❑Name registration
❑Vulnerable to analysis by malicious users
❑Implement strong passwords
❑Disallow root access
❑Disable null sessions
The BIOS provides an interface between the computer's operating system and the hardware.
File Transfer Protocols
SFTP (SSH File Transfer Protocol) is a network protocol that provides file transfer
and manipulation functionality over any reliable data stream.
File Transfer Protocols
FTPS (FTP/SSL) is a name used to provide a number of ways that FTP software
can perform secure file transfers.
File Transfer Protocols
TFTP - Trivial File Transfer Protocol is a file transfer protocol similar to FTP, but is
much more limited.
Ports and Port Ranges
A port is:
❑Endpoint of logical connections
Loop protection increases the efficiency of STP, RSTP, and MSTP by preventing
ports from moving into a forwarding state that would result in a loop opening up in
the network.
NETWORK SEPARATION is the tool used for dividing a network into smaller
parts which are called subnetworks or network segments.
Network Administration Security Methods
IMPLICIT DENY is a security stance treats everything not given specific and
selective permission as suspicious.
✓ Manage network devices so that they are configured according to security policies.
✓ Maintain documentation for all current server configurations.
✓ Establish and document baselines.
✓ Implement strong ACLs and implement implicit deny.
✓ Update antivirus software regularly.
✓ Configure only required network services.
Guidelines for Applying Network Security Administration Principles
❑Portable
❑Inexpensive
❑No obtrusive cabling
❑Introduces new, significant security issues
Wireless standards are a set of services and protocols that dictate how your Wi-
Fi network (and other data transmission networks) acts.
WIRELESS STANDARDS
802.11: There were actually two variations on the initial 802.11 wireless standard.
Both offered 1 or 2Mbps transmission speeds and the same RF of 2.4GHz.
WIRELESS STANDARDS
802.11a - The first “letter” following the June 1997 approval of the 802.11 standard,
this one provided for operation in the 5GHz frequency, with data rates up to
54Mbps.
WIRELESS STANDARDS
802.11b - Released in September 1999, it’s most likely that your first home router
was 802.11b, which operates in the 2.4GHz frequency and provides a data rate up
to 11 Mbps.
WIRELESS STANDARDS
802.11g offers wireless transmission over distances of 150 feet and speeds
up to 54Mbps compared with the 11Mbps of the 802.11b standard.
WIRELESS STANDARDS
802.11n (Wi-Fi 4)
WIRELESS STANDARDS
802.11ac (Wi-Fi 5) - Current home wireless routers are likely 802.1ac-
compliant, and operate in the 5 GHz frequency space.
Wireless Security Protocols
WPA2 is the security method added to WPA for wireless networks that provides
stronger data protection and network access control
WPA3, released in June 2018, is the successor to WPA2, which security experts
describe as “broken.”
Wireless Security Methods
While there aren’t any specific security capabilities associated with the SSID, there
are some security considerations that should be taken into account: