Introduction To Cybersecurity
Introduction To Cybersecurity
Cybersecurity
CH {1}
Cybersecurity is the ongoing effort to protect these networked systems and all of the data
from unauthorized use or harm. On a personal level, you need to safeguard your identity, your
data, and your computing devices. At the corporate level, it is everyone’s responsibility to
protect the organization’s reputation, data, and customers. At the state level, national security,
and the safety and well-being of the citizens are at stake.
Data on your
computing
devices
Education
Medical data
data
Where is Your
Data?
Your data
Information Financial
online data
Types of Organizational Data
Traditional Data
Corporate data includes personnel information, intellectual properties, and financial data. The personnel
information includes application materials, payroll, offer letters, employee agreements, and any
information used in making employment decisions. Intellectual property, such as patents, trademarks and
new product plans, allows a business to gain economic advantage over its competitors. This intellectual
property can be considered a trade secret; losing this information can be disastrous for the future of the
company. The financial data, such as income statements, balance sheets, and cash flow statements of a
company gives insight into the health of the company.
Hackers
Types of Attackers
Organized Hackers
Internal Security Threats
Facilitate outside attacks by connecting infected USB media into the corporate computer system
Accidentally invite malware onto the network through malicious email or websites
What is Cyberwarfare?
Cyberspace has become another important
dimension of warfare, where nations can carry
out conflicts without the clashes of traditional
troops and machines. This allows countries
with minimal military presence to be as strong
as other nations in cyberspace. Cyberwarfare
is an Internet-based conflict that involves the
penetration of computer systems and
networks of other nations. These attackers
have the resources and expertise to launch
massive Internet-based attacks against other
nations to cause damage or disrupt services,
such as shutting down a power grid.
stuxnet virus
Finding Security Vulnerabilities
Software vulnerabilities
Software vulnerabilities are usually introduced by errors in the operating system or application code, despite all the
effort companies put into finding and patching software vulnerabilities, it is common for new vulnerabilities to surface.
Microsoft, Apple, and other operating system producers release patches and updates almost every day. Application
updates are also common. Applications such as web browsers, mobile apps and web servers are often updated by the
companies or organizations responsible for them.
In 2015, a major vulnerability, called SYNful Knock, was discovered in Cisco IOS. This vulnerability allowed attackers to
gain control of enterprise-grade routers, such as the legacy Cisco 1841, 2811, and 3825 routers.
Hardware vulnerabilities
Hardware vulnerabilities are often introduced by hardware design flaws. RAM memory for example, is essentially
capacitors installed very close to one another. It was discovered that, due to proximity, constant changes applied to one
of these capacitors could influence neighbor capacitors. Based on that design flaw, an exploit called Rowhammer was
created. By repeatedly rewriting memory in the same addresses, the Rowhammer exploit allows data to be retrieved
from nearby address memory cells, even if the cells are protected.
Hardware vulnerabilities are specific to device models and are not generally exploited through random compromising
attempts. While hardware exploits are more common in highly targeted attacks, traditional malware protection and a
physical security are sufficient protection for the everyday user .
Categorizing Security Vulnerabilities
Buffer overflow
When a malicious application accesses
memory allocated to other processes.
Non-validated
Data coming into a program with malicious
content, designed to force the program to
Race conditions behave in an unintended way
When the output of an event depends on
ordered or timed outputs
Weaknesses in security practices
When developers attempt to create their own
security applications
Access-control problems
Incorrectly regulating who does what and
what they can do with resources.
Types of Malware
Spyware Adware
Scare
Bot
ware
Man-In-
Ransom The-
Rootkit Mobile
ware
Man-In- (MitMo)
The-
Virus
Middle
(MitM)
Trojan
Worms
horse
Symptoms of Malware
There is an increase in CPU usage.
There is a decrease in computer speed.
The computer freezes or crashes often.
There is a decrease in Web browsing speed.
There are unexplainable problems with network connections.
Files are modified.
Files are deleted.
There is a presence of unknown files, programs, or desktop icons.
There are unknown processes running.
Programs are turning off or reconfiguring themselves.
Email is being sent without the user’s knowledge or consent.
Social Engineering
Social engineering is an access attack that attempts to manipulate individuals into performing actions or
divulging confidential information. Social engineers often rely on people’s willingness to be helpful but also
prey on people’s weaknesses. For example, an attacker could call an authorized employee with an urgent
problem that requires immediate network access. The attacker could appeal to the employee’s vanity, invoke
authority using name-dropping techniques, or appeal to the employee’s greed.
These are some types of social engineering attacks:
Pretexting - This is when an attacker calls an individual and lies to them in an attempt to gain access to
privileged data. An example involves an attacker who pretends to need personal or financial data in order
to confirm the identity of the recipient.
Tailgating - This is when an attacker quickly follows an authorized person into a secure location.
Something for Something (Quid pro quo) - This is when an attacker requests personal information from a
party in exchange for something, like a free gift.
Wi-Fi Password
Cracking
Wi-Fi password cracking is the process of discovering the password used to protect
a wireless network. These are some techniques used in password cracking:
Network sniffing – By listening and capturing packets sent on the network, an
attacker may be able to discover the password if the password is being sent
unencrypted (in plain text). If the password is encrypted, the attacker may still be
able to reveal it by using a password cracking tool.
Phishing
Phishing is when a malicious party sends a fraudulent email disguised as
being from a legitimate, trusted source. The message intent is to trick the
recipient into installing malware on their device, or into sharing personal
or financial information. An example of phishing is an email forged to look
like it was sent by a retail store asking the user to click a link to claim a
prize. The link may go to a fake site asking for personal information, or it
may install a virus.
Spear phishing is a highly targeted phishing attack. While phishing and
spear phishing both use emails to reach the victims, spear phishing
emails are customized to a specific person. The attacker researches the
target’s interests before sending the email. For example, an attacker
learns the target is interested in cars, and has been looking to buy a
specific model of car. The attacker joins the same car discussion forum
where the target is a member, forges a car sale offering and sends email
to the target. The email contains a link for pictures of the car. When the
target clicks on the link, malware is installed on the target’s computer
Vulnerability Exploitation
Exploiting vulnerabilities is another common method of infiltration. Attackers will scan computers to gain
information about them. Below is a common method for exploiting vulnerabilities:
Step 1. Gather information about the target system. This could be done in many different ways such as a port
scanner or social engineering. The goal is to learn as much as possible about the target computer.
Step 2.One of the pieces of relevant information learned in step 1 might be the operating system, its version,
and a list of services running on it.
Step 3. When the target’s operating system and version is known, the attacker looks for any known
vulnerabilities specific to that version of OS or other OS services.
Step 4. When a vulnerability is found, the attacker looks for a previously written exploit to use. If no exploits have
been written, the attacker may consider writing an exploit.
DoS
Denial-of-Service (DoS) attacks are a type of network attack. A DoS attack results
in some sort of interruption of network service to users, devices, or applications.
There are two major types of DoS attacks:
DoS attacks are considered a major risk because they can easily interrupt
communication and cause significant loss of time and money. These attacks are
relatively simple to conduct, even by an unskilled attacker.
DDoS
A Distributed DoS Attack (DDoS) is similar to a DoS
attack but originates from multiple, coordinated
sources. As an example, a DDoS attack could
proceed as follows:
Provide details. Explain why the situation took place and what was compromised. It is also expected that the
company take care of the costs of identity theft protection services for affected customers.
Understand what caused and facilitated the breach. If necessary, hire forensics experts to research and learn
the details.
Apply what was learned from the forensics investigation to ensure similar breaches do not happen in the future.
Ensure all systems are clean, no backdoors were installed, and nothing else has been compromised. Attackers
will often attempt to leave a backdoor to facilitate future breaches. Make sure this does not happen.
Real Time Scanning from Edge to Endpoint - Detecting attacks in real time requires actively scanning for
attacks using firewall and IDS/IPS network devices. Next generation client/server malware detection with
connections to online global threat centers must also be used. Today, active scanning devices and software
must detect network anomalies using context-based analysis and behavior detection.
DDoS Attacks and Real Time Response - DDoS is one of the biggest attack threats requiring real-time
response and detection. DDoS attacks are extremely difficult to defend against because the attacks originate
from hundreds, or thousands of zombie hosts, and the attacks appear as legitimate traffic, as shown in the
figure. For many companies and organizations, regularly occurring DDoS attacks cripple Internet servers and
network availability. The ability to detect and respond to DDoS attacks in real-time is crucial.
Protecting Against Malware
How do you provide defense against the constant presence
of zero-day attacks, as well as advanced persistent threats
(APT) that steal data over long periods of time? One
solution is to use an enterprise-level advanced malware
detection solution that offers real-time malware detection.
Cyber criminals will often rent out Botnets, for a fee, to third
parties for nefarious purposes.
The Kill Chain in Cyberdefense
The attacker performs
The attacker gathers The attacker sends the Malware and backdoors malicious actions like
information about the exploit and malicious are installed on the information theft, or executes
target. payload to the target by target. additional attacks on other
email or other method. devices from within the
network by working through
the Kill Chain stages again.
Command
Reconnaissance Weaponization Delivery Exploitation Installation and Control Action
Behavior-based security is a form of threat detection that does not rely on known malicious signatures, but
instead uses informational context to detect anomalies in the network. Behavior-based detection involves
capturing and analyzing the flow of communication between a user on the local network and a local, or
remote destination. These communications, when captured and analyzed, reveal context and patterns of
behavior which can be used to detect anomalies. Behavior-based detection can discover the presence of
an attack by a change from normal behavior.
Honeypots - A Honeypot is a behavior-based detection tool that first lures the attacker in by appealing
to the attacker’s predicted pattern of malicious behavior, and then, when inside the honeypot, the
network administrator can capture, log, and analyze the attacker’s behavior. This allows an
administrator to gain more knowledge and build a better defense.
Cisco’s Cyber Threat Defense Solution Architecture - This is a security architecture that uses
behavior-based detection and indicators, to provide greater visibility, context, and control. The goal is to
know who, what, where, when, and how an attack is taking place. This security architecture uses many
security technologies to achieve this goal.
NetFlow
Technology is constantly changing. That means cyberattacks are evolving too. New vulnerabilities and attack
methods are discovered continuously. Security is becoming a significant business concern because of the
resulting reputation and financial impact from security breaches. Attacks are targeting critical networks and
sensitive data. Organizations should have plans to prepare for, deal with, and recover from a breach.
One of the best way to prepare for a security breach is to prevent one. There should be guidance on identifying
the cybersecurity risk to systems, assets, data, and capabilities, protecting the system by the implementation of
safeguards and personnel training, and detecting cybersecurity event as soon as possible. When a security
breach is detected, appropriate actions should be taken to minimize its impact and damage. The response plan
should be flexible with multiple action options during the breach. After the breach is contained and the
compromised systems and services are restored, security measures and processes should be updated to include
the lessons learned during the breach.
All this information should be compiled into a security playbook. A security playbook is a collection of repeatable
queries (reports) against security event data sources that lead to incident detection and response. Ideally the
security playbook must accomplish the following actions:
Security Playbook
The scanning performed by the IDS slows down the network (known as latency). To
prevent against network delay, an IDS is usually placed offline, separate from regular
network traffic. Data is copied or mirrored by a switch and then forwarded to the IDS
for offline detection. There are also IDS tools that can be installed on top of a host
computer operating system, like Linux or Windows.
An Intrusion Prevention System (IPS) has the ability to block or deny traffic based on
a positive rule or signature match. One of the most well-known IPS/IDS systems is
Snort. The commercial version of Snort is Cisco’s Sourcefire. Sourcefire has the
ability to perform real-time traffic and port analysis, logging, content searching and
matching, and can detect probes, attacks, and port scans. It also integrates with
other third party tools for reporting, performance and log analysis.