403CE080
403CE080
Learning Log:
1. Threat Landscape
The first lecture started with a comprehensive overview of the course structure,
assessment methods, and essential resources. The course aims to equip students
with knowledge about the threat landscape, the different types of threat actors, and
effective cybersecurity measures.
The course will be covered over twelve weeks, with each week dedicated to
different aspects of cybersecurity. The topics and assessments are structured as
follows:
- Quizzes: 10%
- Learning Log: 30%
- Final Written Assignment: 60%
A short introductory video about the UCD Professional Academy and the course
team was presented to the students. Key Resources: the lecture emphasized the
importance of several resources, particularly the "ENISA 12 Steps to Securing
Your Business." These steps include:
1. Culture
2. Training
3. Third-party Management
4. Incident Response Plan
5. Secure Access
6. Secure Devices
7. Secure Network
8. Physical Security
9. Backups
10. Engage with Cloud
11. Secure Online Sites
12. Stay Informed
Cybersecurity Definitions:
- NIST 2008: Focuses on preventing, detecting, and responding to attacks.
- NIST 2020: Emphasizes defending the use of cyberspace from cyberattacks.
Threat Landscape:
- Information Security: Understanding how it functions is crucial for mitigating
risks.
- Recent Attacks: Examples include the HSE shutdown and the US pipeline
attack.
Threat Actors:
The lecture categorized threat actors based on their motivations and technological
capabilities:
- Nation-States
- Cybercriminals
- Hacktivists
- Terrorist Groups
- Thrill Seekers
- Insider Threats
CIA Triad: The lecture concluded with an explanation of the CIA triad, which is
fundamental to understanding cybersecurity principles:
- Confidentiality
- Integrity
- Availability
The lecture provided a detailed introduction to the course, outlined the key topics
and assessments, and emphasized the importance of understanding the threat
landscape and cybersecurity measures. Through various resources, definitions,
and real-world examples, students are equipped to navigate and mitigate
cybersecurity threats effectively.
2. Cryptography
This second session lead us directly in the middle of the topic of how information is
shared, how can they be shared safely, avoiding interceptions from third parties.
Horizontally, an overall historical account of cryptography was given, more in detail
the first part was dedicated to the definitions of subjects adherent to cryptography,
then to different examples of ciphers (Caesar’s, substitution, transposition etc..)
while the second part was widely dedicated to Symmetric and Asymmetric
Cryptography, what they entail and in what they differ and how am hybrid version
of both is to be considered the ‘golden standard’ of cryptography, combining the
efficiency of the first and the safety of the latter.
Lastly, we learned about Enigma, its creation and complexity and how the two
Achille’s heels that were identified by the allied forces after several attempts may
have saved the world from a nazi-fascist victory in WW2.
The lecture started with a full revision of the previously introduced Symmetric vs
Asymmetric methods for encryption. Following that we learned how the hypertext
transfer protocol (http) is then evolved into shttp (s for security) by scrambling the
data transferred and hence providing safety for activities such as banking et
similia. The latest standard in website data transfer is then represented by SSL
and TLS which work on a certificate-based model. Then Hashing was introduced at
great length, in short hashing is a widely used 1 way encryption system to
transform an input in a fixed length output with a good capability in terms of
storage and availability. Hashing is the backbone of many system working on
encryption, like cryptocurrencies.
We then learned about ISBN codes and how to check the 13-digit algorithm on
which it is based. The second part of the lecture was dedicated to Identification
and access and everything that is linked to identity management both on the
logical and physical sense. Concerns over each item linked to identification of
subjects trying to access any resource/ objects. It then was explained the concept
of multi factor authentication, which entails the provision of two or more of the
following factors: something the individual knows (information, generally a
password), something the individual has (a phone, a token etc..) and something
the individual ‘is’ (biometric data such as fingerprints or facial structure).
The latter entails some human rights issues that we won’t investigate for the
purpose of this course however the most popular combination is among the first
two factors where a password is then followed by either a badge or a sms received
on the phone.
Finally, the use of password was analysed at length and what a wise password
definition should look like, moreover the salted-hash concept, where of additional
data is added before the proper hashing of the data to be encrypted, was
introduced.
4. Malware
To mitigate malware risks, it is crucial to avoid mixing public and private use of IT
tools. Additionally, valuable resources such as Threllix provide repositories of
ransomware with detailed descriptions. The "No More Ransom" project maintains a
database of all past ransomware, offering tools to help victims recover their data.
To delve deeper into the world of cyber threats, it was suggested to watch the
series "Undeclared War" and reading the book "Crime.com" for a comprehensive
history of malware evolution. Following the lecture I started listening to the
"Lazarus Heist" a bbc podcast that provides an intriguing account of state-funded
North Korean hacking activities.
The first part of the lecture was dedicated to the history of the internet is rich and
complex, tracing back to the early days of computer development. A detailed
timeline can be found at the Computer History Museum, which showcases
significant milestones in computer and internet evolution.
One of the earliest precursors to internet communication was the telex system,
introduced in Nazi Germany in 1934. This system allowed for the transmission of
typed messages over long distances, laying the groundwork for future digital
communication.
Cloud Computing:
- NIST Definition: Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of configurable
computing resources.
- ISO/IEC Definition: Similar to NIST, emphasizing on-demand network access
to shared computing resources.
How to prepare: the 80/20 Rule: 80% of effects come from 20% of causes.
Focusing on key areas can mitigate most threats.
Mobile Systems
- Record the device IMEI.
- Avoid jailbreaking devices.
Remote Access
- Use VPNs and follow best practices for secure remote access.
7. Risk Management
Risk Definitions
Grades of Risk
1. Control: Measures taken to manage and mitigate risks.
2. Total Risk: The overall exposure to risk before any controls are applied.
3. Residual Risk: The remaining risk after controls have been implemented.
4. Secondary Risk: New risks that emerge because of implementing controls.
Risk is defined as the product of threat and vulnerability. This highlights the
importance of both identifying potential threats and understanding vulnerabilities
within the system.
Risk Assessment
Participants
All relevant stakeholders should be involved in the risk assessment process,
ensuring comprehensive coverage and insight.
Frequency
Risk assessments should be conducted at least annually to remain effective and
up to date.
Asset Identification
Knowing and evaluating assets is crucial for effective risk management. This
involves:
- Primary Assets: Core information and critical resources.
- Supporting Assets: Infrastructure and tools supporting primary assets.
Importance
If assets are not identified, it is impossible to determine if they have associated
risks or vulnerabilities.
Risk assessment considers both the likelihood of a risk event and its potential
impact. This qualitative approach helps prioritize risks based on their severity.
Risk Treatment
Control Types
Types of Controls
1. Administrative: Policies, procedures, and organizational structures.
2. Physical: Security measures such as locks, guards, and surveillance.
3. Technical: Technological solutions like firewalls, encryption, and antivirus
software.
Risk Frameworks:
Residual Risks
Organizations must consider residual risks that remain after implementing controls.
The DREAD model helps rate the impact of threats based on:
- Damage Potential: The extent of harm a threat can cause.
- Reproducibility: How easily the threat can be replicated.
- Exploitability: The effort required to exploit the threat.
- Affected Users: The number of users impacted by the threat.
- Discoverability: How easily the threat can be discovered.
Threat Actors: same as introduced in previous lecture, threat actors vary in size
and scope, ranging from small individual hackers to large organized groups: states.
Testing Methodologies:
- Statement of Work (SOW) : Outlines the specific tasks and objectives of the
engagement.
- Master Service Agreement (MSA) : Defines the overall terms and conditions of
the relationship between the client and the testing firm.
- Non-Disclosure Agreement (NDA) : Ensures confidentiality of sensitive
information accessed during the testing.
Reconnaissance:
Reconnaissance involves gathering information about the target system, which can
be done through:
Vulnerability Scanning
Post-Engagement Activities:
Types of Investigations
Digital forensics investigations can be classified into two main categories:
Investigation Process
The digital forensics process consists of several key phases:
E-Discovery Framework:
E-discovery refers to the process of identifying, collecting, and producing
electronically stored information (ESI) in response to a request for production in a
lawsuit or investigation. The framework includes:
- Forensic Duplicators: Used during the acquisition phase to create exact copies
of data.
- Password Cracker: Tools to recover passwords.
- Cryptography Tools: For decrypting encrypted data.
- Hashing Utilities:Used to verify data integrity.
- Digital Forensics Suites: Comprehensive tools like EnCase, FTK, and Sleuth
Kit that provide a range of forensic capabilities.
Finally, we were divided into three groups for a team challenge to find evidence of
wrongdoing. This exercise aimed to apply the concepts and techniques discussed
in the lecture.
This week's lecture covered two crucial topics in cybersecurity: social engineering
and open-source intelligence (OSINT). The session provided insights into the
techniques used in social engineering to manipulate targets into revealing sensitive
information and explored the methods and ethics of gathering intelligence from
publicly available sources.
Recommendations:
- Training Personnel: Regular training sessions to raise awareness about social
engineering tactics.
- Awareness Campaigns: Promoting vigilance among employees.
- Basic IT Hygien: Implementing strong security practices like regular password
updates and multi-factor authentication.
Second part of the lecture was wholly dedicated to OSINT. What is it? involves
collecting and analyzing publicly available information to produce actionable
intelligence. It is used by various actors in both public and private sectors for due
diligence, damage limitation, and understanding social media landscapes.
OSINT in Action:
- Social Media: A rich source of information where deep insights can be
gathered by those skilled in OSINT techniques.
- Challenge: Students were tasked with finding the email address of the lecturer
using OSINT methods.
Additional Resources:
ENISA Report on Identity Theft: Further reading on the implications and
prevention of identity theft.
- ‘Have I Been Pwned?’: A tool to check if personal data has been compromised.
Practical Demonstrations:
The lecture included demonstrations on various tools and techniques:
- Email Harvesting: Techniques to gather email addresses.
- Fake Domains: Creating domains that mimic legitimate ones to lure users.
- Fitness Tracking Apps : Example of how apps like MyFitnessPal can be used
to gather personal information.
The group received then a challenge to USE OSINT techniques: retreive the email
of the lecturer, which was quite easy to do.
Today's lecture provided a comprehensive overview of social engineering and
OSINT, highlighting the tactics used by attackers and the methods for gathering
intelligence ethically. This topic really interests me as I follow and shortly
collaborated in the past with Bellingcat an journalistic enterprise which uses Open
source for intelligence, and I am generally interested in OS intelligence and
journalism: see the case of the Dutch flight downed by the Russians in Ukraine and
how Bellingcat discovered everything about what happened, including the authors
years before the authorities could come up with a conclusion.
The lecture focused on the intertwined concepts of Business Continuity (BC) and
Disaster Recovery (DRP), collectively referred to as BC/DR. While often discussed
together, these concepts address different aspects of maintaining business
operations in the face of disruptions. The lecture covered definitions, industry
standards, key phases, and the roles of various stakeholders in BC/DR planning.
Business Continuity (BC) refers to the strategies and activities that ensure
critical business functions continue during and after a disaster. BC plans typically
include non-IT related activities, encompassing all aspects of a business's
operation.
Industry Standards:
Several industry standards guide the development and implementation of BC and
DR plans:
Definition: DRP focuses on the restoration of IT systems and data, ensuring that
critical technology functions can be resumed quickly.
Key Metrics:
- RTO (Recovery Time Objective) : The target time to restore a service.
- RPO (Recovery Point Objective) : The maximum tolerable period in which
data might be lost.
Damage Classification:
- Negligible: Minimal impact.
- Minor: Some impact but manageable.
- Major: Significant impact requiring considerable effort to manage.
- Crisis: Severe impact necessitating immediate and comprehensive response.
Backup Strategies:
- Full Backup: Complete copy of all data.
- Incremental Backup: Copies only the data that has changed since the last
backup.
- Differential Backup: Copies all data that has changed since the last full backup.
- 321 Strategy: Three copies of data, on two different media, with one copy off-
site.
Testing:
- Read-Through: Review the plan.
- Walkthrough: Step-by-step review of procedures.
- Simulation: Simulated disaster scenarios.
- Parallel: Simultaneously running the plan and normal operations.
- Full Interrupt: Completely stopping normal operations to test the plan.
Best Practice: review the DRP every three months to ensure it remains current.
Event Management
Categorization:
- Non-Incident: No significant impact.
- Incident: Some impact, requiring response.
- Severe Incident: Major impact, necessitating immediate action.
Communication: Essential with both internal and external stakeholders (eg: family
of employees, customers).
The lecture began with an introduction to the technical aspects of the final
assignment, including details about the submission phases. The main topic of the
lecture focused on standards in information security, highlighting the significance of
ISO 27001.
Key Standards in Information Security: ISO 27001, This standard is essential for
anyone looking to pursue a career as an auditor or consultant in information
security. Mastery of ISO 27001 is crucial as it sets the minimum standards for
information security management systems (ISMS), especially for small and
medium-sized enterprises (SMEs).
PCI DSS: The Payment Card Industry Data Security Standard is relevant for card
payment and banking industries, ensuring secure handling of cardholder
information.
We then spoke about main legislation within the EU: DORA (Digital Operational
Resilience Act): Aims to strengthen the IT security of financial institutions.
-GDPR (General Data Protection Regulation): Focuses on data protection and
privacy in the European Union.
NIS (Network and Information Systems Directive) and NIS2: These directives
enhance the cybersecurity of critical infrastructure within the EU.