CIS NOTES
CIS NOTES
1. SSL
Secure Socket Layer (SSL) provides security to the data that is transferred between web
browser and server. SSL encrypts the link between a web server and a browser which ensures
that all data passed between them remain private and free from attack
Secure Socket Layer Protocols
● SSL Record Protocol
● Handshake Protocol
● Alert Protocol
● Confidentiality
● Message Integrity
In the SSL Record Protocol application data is divided into fragments. The fragment is
compressed and then encrypted MAC (Message Authentication Code) generated by algorithms
like SHA (Secure Hash Protocol) and MD5 (Message Digest) is appended. After that encryption
of the data is done and in last SSL header is appended to the data.
Handshake Protocol
Handshake Protocol is used to establish sessions. This protocol allows the client and server to
authenticate each other by sending a series of messages to each other. Handshake protocol uses
four phases to complete its cycle.
● Phase-1: In Phase-1 both Client and Server send hello-packets to each other. In this IP
session, cipher suite and protocol version are exchanged for security purposes.
● Phase-2: Server sends his certificate and Server-key-exchange. The server end
Client-exchange-key.
● Phase-4: In Phase-4 Change-cipher suite occurs and after this the Handshake Protocol
ends.
SSL Certificate
SSL (Secure Sockets Layer) certificate is a digital certificate used to secure and verify the identity
of a website or an online service. The certificate is issued by a trusted third-party called a
Certificate Authority (CA), who verifies the identity of the website or service before issuing the
certificate.
2. KERBEROS
The Authentication Server performs the initial authentication and ticket for Ticket
Granting Service.
● Database:
The Authentication Server verifies the access rights of users in the database.
The Ticket Granting Server issues the ticket for the Server
Kerberos Overview:
● Step-1:
User login and request services on the host. Thus user requests for ticket-granting
service.
● Step-2:
Authentication Server verifies user’s access right using database and then gives
ticket-granting-ticket and session key. Results are encrypted using the Password of the
user.
● Step-3:
The decryption of the message is done using the password then send the ticket to
Ticket Granting Server. The Ticket contains authenticators like user names and network
addresses.
● Step-4:
Ticket Granting Server decrypts the ticket sent by User and authenticator verifies the
request then creates the ticket for requesting services from the Server.
● Step-5:
● Step-6:
The server verifies the Ticket and authenticators then generate access to the service.
Phishing: Scammers trick you into giving away your personal info, like passwords or credit card numbers, by
pretending to be someone you trust (like a bank or a website).
DDoS Attack: Attackers send so much traffic to a website or server that it crashes, making it unavailable to real users.
SQL Injection: Hackers use a website's search or input boxes to insert harmful commands into its database, letting
them steal or mess with data.
Malware Attacks
Malware refers to malicious software designed to damage or disrupt systems. Common types of malware include:
● Viruses: Malicious programs that attach themselves to legitimate software and spread to other systems.
● Worms: Self-replicating programs that spread across networks without human intervention.
● Trojans: Malware that masquerades as legitimate software to trick users into installing it.
● Ransomware: A type of malware that locks or encrypts files and demands a ransom for their release.
● Spyware: Software that secretly monitors a user’s activities and sends the information to a third party.
● Adware: Software that displays unwanted ads, often bundled with other software.
Masquerade Attack:
In a Masquerade Attack, a hacker pretends to be someone else. They use someone else's identity to gain unauthorized
access to systems or steal information. For example:
● A hacker could send an email pretending to be a trusted person (like your boss) and ask you to do something
harmful, like transferring money or sharing sensitive data.
Modification of Message:
In a Modification of Message attack, a hacker intercepts a message being sent between two parties and changes it
before it reaches the recipient
DMZ receives requests from outside users or public networks to access the information and
website of a company. For such type of request, DMZ arranges sessions on the public network. It
cannot initiate a session on the private network. If anyone tries to perform malicious activity on
DMZ, the web pages are corrupted, but other information remains safe.
The goal of DMZ is to provide access to the untrusted network by ensuring the security of the
private network. DMZ is not mandatory, but a better approach is to use it with a firewall.
The public key infrastructure uses a pair of keys: the public key and the private key to achieve
security.
Encryption:
● If someone wants to send you a secure message, they use your public key to "lock"
(encrypt) the message. Since your private key is the only one that can "unlock"
(decrypt) the message, only you can read it.
Digital Signatures:
● When you send a message, you use your private key to "sign" it. This proves that the
message came from you and hasn’t been tampered with.
● Anyone who gets the message can use your public key to verify your signature,
ensuring that it is really from you and hasn’t been altered.
6. Signature-Based IDS/IPS:
7. Anomaly-Based Method:
Anomaly-based IDS was introduced to detect unknown malware attacks as new malware is
developed rapidly. In anomaly-based IDS there is the use of machine learning to create a trustful
activity model and anything coming is compared with that model and it is declared suspicious if
it is not found in the model. The machine learning-based method has a better-generalized
property in comparison to signature-based IDS as these models can be trained according to the
10 .SET
Secure Electronic Transaction or SET is a security protocol designed to ensure the security and
integrity of electronic transactions conducted using credit cards. Unlike a payment system, SET
operates as a security protocol applied to those payments. It uses different encryption and
hashing techniques to secure payments over the internet done through credit cards. SET
protocol restricts the revealing of credit card details to merchants thus keeping hackers and
thieves at bay.
● The cardholder enters their credit card details and encrypts them using a secret key.
● They also sign the payment request with their private key to prove it’s really them.
● The merchant sends the encrypted payment info to the payment gateway.
● The payment gateway checks the signature to verify the cardholder’s identity using their digital certificate.
● The bank (issuer) checks the cardholder’s details, like card balance and validity.
● If everything’s good, the bank sends an approval message to the payment gateway.
Example: When checkout from the counter of a market after shopping, the receipt (bill) that we
get is a type of audit trail, we (Who/customer) can find all the necessary information on it like
the date and time (when) of checkout, location of the mall and counter number (Where), and
the items purchased (What/data).
1. Cloud Service Models
There are three main cloud service models, each offering different levels of control, flexibility, and management:
ESX and ESXi are virtualization platforms by VMware. While ESX includes a Linux-based Service Console, ESXi is a
more secure, lightweight version without a Service Console.
a) Security Features:
● Locked-down Mode (ESXi): Restricts access to the host for increased security.
● Role-Based Access Control (RBAC): Controls who can perform what actions.
● Firewall and Ports: Built-in firewall restricts incoming and outgoing traffic.
● Secure Boot: Ensures only signed and trusted code runs during boot-up.
● Logging and Auditing: Tracks changes and access to improve monitoring and incident response.
● Patch Management: Regular updates to fix security vulnerabilities.
b) Best Practices:
● Data Encryption: Turning data into a secret code so that only authorized people can read it.
● Access Control: Setting rules about who can view or change the data on each device or software.
● Protection from Viruses: Using antivirus software to stop viruses, worms, and other threats that can damage
data.
● Physical Security: Locking up storage devices and making sure only trusted people can access them.
● Layered Security: Using multiple layers of protection to keep data extra safe.
● No Encryption: Some devices don’t automatically protect data with encryption. That means extra software or
hardware is needed to keep the data safe.
● Cloud Storage Risks: More companies are storing data in the cloud. While it can be secure, it’s also more
complex and requires new tools and skills to manage safely.
● Not Deleting Data Properly: Simply deleting files isn’t enough. If not fully erased, data can still be recovered by
someone with bad intentions. It must be overwritten to be truly gone.
● Poor Physical Security: Sometimes, people forget to lock up storage devices. This allows insiders (like staff or
cleaners) to access data directly, even if network protections are in place.
10. Best practices for cloud data security for firms. (pg. 108,109)
Organizations should have written rules about how to protect different types of data. For example, public data doesn’t
need as much protection as private or confidential data. These rules should explain what kind of security each type of
data needs and what tools or steps to use on storage devices to keep the data safe.
2. Access control
Only the right people should have access to certain data. Role-based access means people can only see or change the
data they need for their job. It’s also important to use strong passwords and change any default passwords. Sometimes,
using two-step verification (like a code sent to your phone) adds extra protection.
3. Encryption
Data should be turned into secret code (encrypted) when it's stored and when it's being sent over the network. Admins
must also have a safe way to keep track of the keys used to lock and unlock this data.
Just encrypting data is not enough. Companies should also use DLP (Data Loss Prevention) tools that watch for signs
of attacks and try to stop them before any data is stolen or damaged.
Storage systems are part of the bigger network, so the whole network needs protection. Tools like firewalls, antivirus
software, and security gateways should be used to keep the storage and the network safe from threats.
6. Redundancy
Redundancy means having extra copies of your data or using systems like RAID. This helps make sure the data is
always available, and in some cases, it can help recover from security issues quickly.
If a virus or ransomware attack hits the system, sometimes the only way to fix it is by restoring data from a backup. It’s
very important to have good backup systems that are also well-protected—just like your main storage.
1. Resource distribution
When virtualization divides up system resources, some parts may run very well, while others might not get enough
resources to work properly. These issues often show up during the transition to virtualization. Working with your service
provider to plan capacity ahead of time can help fix this problem.
2. VM Sprawl
VM sprawl happens when too many virtual machines are created without proper control. It can cause serious issues like
running out of resources. It’s important to plan how VMs will be managed, decide who will handle them, and what tools
will be used. The best time to do this planning is during the testing phase, before full setup.
3. Backward compatibility
Older systems don’t always work well with new virtualized software, leading to compatibility problems. These can take
time to fix. A good service provider can help by suggesting updates or workarounds to make sure everything works
smoothly.
4. Performance monitoring
Unlike traditional hardware, virtual systems are harder to monitor for performance. You can use special tools like
VMmark to test how well the virtual system is working and keep an eye on how much of the resources are being used.
5. Backup
In virtualization, there’s no physical hard drive for backing up data, which can make things tricky—especially during
frequent updates. Backup tools like Windows Server Backup can help by keeping all backups in one place, making
them easier to manage and restore when needed.
6. Security
If users don’t follow safety rules—like using strong passwords or being careful with downloads—virtual systems can
become risky. But the good thing is, virtual machines are separated from each other, which helps reduce the chances of
one machine affecting the others if a security issue happens.
Mobile security architecture is the overall structure and strategy used to protect mobile devices (like smartphones and
tablets), the data they handle, and the apps they run. It ensures that mobile devices are safe from threats like hacking,
data theft, and malware.
Key Components:
○ Apps should be from trusted sources only (like Google Play Store or App Store).
○ Use of secure coding practices to avoid app vulnerabilities.
3. Data Security
○ Data should be encrypted (both stored data and data sent over the internet).
○ Use secure storage and avoid saving sensitive info in plain text.
4. Network Security
○ Companies use MDM tools to control, update, and protect mobile devices used for work.
○ Allows blocking of harmful apps and enforcing security settings.
7. Operating System Security
GSM Security
GSM (Global System for Mobile Communications) is one of the most secure mobile communication systems today. Its
security features are designed to:
● It uses temporary identification numbers instead of the actual mobile number to keep your identity safe.
● It uses encryption and frequency hopping (changing channels during calls) to prevent others from listening to
your conversations.
UMTS Security
UMTS (Universal Mobile Telecommunications System) improves on GSM and includes four main security areas:
a. Protects the communication between network parts inside the service provider’s system.
b. Keeps internal data safe from attacks.
3. User domain security
a. Makes sure only the authorized person can access the mobile phone or SIM.
4. Application domain security
a. Allows apps (both in the phone and in the network) to exchange data securely.
○ SMS (text messages) are widely used, even for sensitive tasks like banking.
○ Many users trust SMS for passwords and reports, but hackers can predict and manipulate the SMS
system because it follows a set format.
○ This makes it easier to trick users or steal information.
3. Signaling attacks
○ Calls and data between the phone and the tower are encrypted (protected) using A5 algorithms.
○ But once the call enters the mobile company’s system, it often travels in plain text, making it easier for
attackers with access to the system to listen in.
○ If hackers get into the SS7 signaling system, they can even track locations, listen to calls, and steal
encryption keys.
15. Four security feature groups in the UMTS specification (pg 116)
UMTS (Universal Mobile Telecommunications System) improves on GSM and includes four main security areas:
Bluetooth reconnaissance is the process of scanning and identifying nearby Bluetooth-enabled devices to collect
information about them. It is usually the first step in Bluetooth security testing or attacks, where an attacker tries to find
out:
● How it works: The scanning device actively sends out Bluetooth signals (called inquiry messages) to detect
nearby devices that are in discoverable mode.
● What it finds:
○ Device name
○ Bluetooth MAC address
○ Device class/type (like phone, speaker, etc.)
● Pros: Finds all devices that are set to be discoverable.
● Cons: Can be easily detected by the target devices or monitored by Bluetooth security tools.
● How it works: The scanning device just listens to Bluetooth signals that are already being broadcast by nearby
devices — it does not send any signals itself.
● What it finds:
○ Bluetooth addresses
○ Signals being broadcast
○ May detect non-discoverable devices if they are already communicating
● Pros: Stealthy — hard to detect by the target.
● Cons: May miss some devices that are not actively transmitting.
Example tools: Kismet, BlueMaho, Ubertooth One.
● How it works: Combines both active and passive techniques. First, it passively listens, then actively scans to
gather more details.
● Pros: Provides a more complete list of nearby devices and their details.
● Cons: May still be detected during the active scan part.
Example usage: Security audits, penetration testing using Kali Linux with Bluetooth tools.
1. Eavesdropping
● What it is: Hackers can listen in on VoIP calls if the data is not properly encrypted.
● Why it’s dangerous: Sensitive information like passwords, personal conversations, or business secrets can be
stolen.
2. Caller ID Spoofing
● What it is: An attacker can fake the caller’s number to trick the recipient.
● Why it’s dangerous: It can be used for scams, phishing, or impersonation.
● What it is: Hackers flood the VoIP server with traffic, making the service slow or unavailable.
● Why it’s dangerous: It can interrupt communication, especially during important business or emergency calls.
4. Voicemail Hacking
● What it is: Attackers guess or crack weak voicemail PINs and access private messages.
● Why it’s dangerous: Voicemails may contain personal or confidential data.
● What it is: SIP is used to start VoIP calls. If it’s not secure, attackers can manipulate or hijack calls.
● Why it’s dangerous: They can redirect calls or cause call failures.
6. Toll Fraud
● What it is: Hackers gain access to a VoIP system and make international or premium-rate calls at the
company’s expense.
● Why it’s dangerous: It leads to high financial loss.
● What it is: VoIP phones and systems can be infected with malicious software.
● Why it’s dangerous: It can steal data or take control of the system.
8. Insecure Networks
● What it is: If the VoIP system runs on an unprotected or public Wi-Fi, it’s easier to attack.
● Why it’s dangerous: It opens the door to multiple types of cyberattacks.
Bluetooth technology is widely used to connect devices wirelessly, but it has certain vulnerabilities that attackers can
exploit. Here are some common Bluetooth attacks and how they work:
1. Bluejacking
● What it does: Sends unsolicited messages (like text or images) to nearby Bluetooth-enabled devices.
● Exploits: Devices that are in "discoverable" mode.
● Impact: Mostly annoying, but it can be used for phishing or spreading fake information.
2. Bluesnarfing
● What it does: Steals data (like contacts, emails, messages) from a Bluetooth device without permission.
● Exploits: Weak or misconfigured Bluetooth security settings.
● Impact: Confidential data can be stolen without the user even noticing.
3. Bluebugging
● What it does: Gives attackers control over a Bluetooth device—letting them make calls, send messages, or
eavesdrop.
● Exploits: Vulnerabilities in the Bluetooth implementation of certain devices.
● Impact: High risk—attackers can spy, steal data, or misuse the device.
● What it does: The attacker impersonates a trusted device and connects without re-authentication.
● Exploits: Flaws in how devices handle stored authentication keys.
● Impact: Can lead to data leakage or unauthorized access.
5. Blueborne
● What it does: Overloads the Bluetooth service or crashes it by sending a large number of requests.
● Exploits: Lack of rate-limiting or poor handling of connections.
● Impact: Disrupts normal device functions.
7. Bluetooth Sniffing
ZigBee is a wireless communication technology used in smart devices like smart bulbs, door sensors, alarms, and other
home or industrial automation systems. It helps these devices talk to each other using low power and short-range
signals. It is based on a standard called IEEE 802.15.4.
ZigBee attacks are ways in which hackers or researchers try to break into or disrupt ZigBee-based networks. These
attacks can:
Even though ZigBee is used in many smart systems, very few studies have been done to understand how to attack it
or protect it. This makes ZigBee networks potentially unsafe, as they may have hidden weaknesses that no one has
fixed yet.
22. Zigbee Security with Standard and High Security Mode. (pg.133)
Standard security mode Formerly known as residential security mode, standard security mode provides authentication
of ZigBee nodes using a single shared key where the Trust Center authorizes devices through the use of an Access
Control List (ACL). This mode is less resource-intensive for devices, since each device on the network is not required to
maintain a list of all device authentication credentials.
High security mode Formerly known as commercial security mode, high security mode requires that a single device in
the ZigBee network, known as the Trust Center, keep track of all the encryption and authentication keys used on the
network, enforcing policies for network authentication and key updates. The Trust Center device must have sufficient
resources to keep track of the authentication credentials used on the network and represents a single point of
failure for the entire ZigBee network, since, if it fails, no devices will be permitted to join the network.