CCST Cyber Security
CCST Cyber Security
Technician (CCST)
Cyber Security
Cybersecurity is the practice of protecting computers, networks, and
data from cyberattacks, unauthorized access, and damage.
It involves using tools and strategies to keep information safe from
hackers, viruses, and other online threats.
Introduction to CCST
Phases of Hacking:-
1. Information Gathering
2. Scanning & Enumeration
3. Gaining Access
4. Maintaining Access
5. Clearing Logs
LAB Set-up
Risk : Risk is the probability that a threat will be realized against the
Vulnerability.
Expressed through Qualitative (low, medium or high) or Quantitative
(Percentage)
Attack Vectors
The path that an attacker takes to exploit specific vulnerability is
called attack vectors.
Authenticity - Ensuring that data, users, or systems are genuine and not
tampered with or impersonated. Authenticity verifies that something is
what it claims to be.
Malware
DoS / DDoS
Human Trust
Psychological manipulation
Lack of suspicion
Human based
Computer Based
Mobile Based
Human-based Social Engineering
Impersonation
Identity Theft
Eavesdropping
Shoulder Surfing
Dumpster Diving
Reverse Social Engineering
Piggybacking or Tailgating
Quid pro quo --> Latin term that translates to "something for
something" or "this for that."
Computer-based Social Engineering
Hoax Letter: Fake news on any Media. Email message warning recipients of a non-existent
threat.
Chain Letter: A chain letter is a message that attempts to convince the recipient to make a
number of copies and pass them on to a certain number of recipients.
Spam Emails: Unsolicited and unwanted junk email.
Phishing : Attackers pretend to be a trusted source (like a bank or social media) to steal
personal information (e.g., passwords, credit card details).
Baiting: A type of social engineering attack where a scammer uses a false promise to lure a
victim into a trap to steal sensitive information or to download malware.
Scareware : Type of malware designed to scare users into thinking their computer is infected,
with the goal of tricking them into purchasing unnecessary antivirus software or downloading
real malware.
Mobile-based Social Engineering
AAA ensures that the resources are accessed and modified by the
authorised subjects.
Remote Authentication Dial-in User
Service (RADIUS)
Widely used for WiFi and VPN authentication, Support for Multi-
Factor Authentication (MFA), Network Access Control (NAC)
solutions, etc.
Multi-Factor Authentication (MFA)
Biometric
Symmetric Encryption
Disk Encryption
Database Encryption
Different Types of Encryption
Asymmetric Encryption
Email encryption
Digital Signature
Hashing is called one way function, which means it is very easy to calculate
in one direction but very difficult to reverse. It has a fixed length of string.
Data Integrity
Blockchain
Certificate & Public key infrastructure
(PKI)
A certificate containing a public key that is used to encrypt electronic
messages, files, documents, or data transmissions, or to establish or
exchange a session key for these same purposes
Code Signing
TCP and UDP provide the transport mechanism for the network
across the internet.
HTTP is the most common protocol for web browsers and the
servers to communicate.
TCP Handshake
UDP Protocol
Connectionless Protocol
UDP sends the message to all the nodes in the network, a process
called broadcasting.
Various different DOS attack can be performed in UDP
Network needs more than core protocols to operate.
Attackers often respond to ARP request with their own MAC address and
are able to intercept
ICMP Protocol
This is designed to help administrators to troubleshoot network problems.
ICMP helps sending queries to the target and collect return information from
the device. Admin’s use this return information status to determine the cause
Most widely recognised ICMP packet is ping packet, attackers used this to
check if the node is active
DHCP Protocol
● The way the packets in a private network can leave that network
When the private IP reached the border router, the NAT protocol is used to
The collection of devices and nodes which includes several firewalls, IDS, IPS to
system.
power, and software over the internet, rather than on a local computer or server. It
allows users to access and use these resources on-demand, without needing to
own or maintain the physical hardware. Examples include services like Google
detect and study the tricks and types of attacks used by hackers
MAC address filtering
Network scanners
- NMAP
- Advanced IP scanners
- Angry IP scanners
It's important to document the configuration of each node, and to manage the
services running on each node and control how each one is accessed.
This gives a clear understanding of what assets are connected in a network.
If theres a week node thats connected in a network that will lead to the
unauthorised access and risk.
Software Inventory and program
deployment
Every node in a network is a computing device which has hardware and
software.
Hardware - physical aspect of a device
Software - provides instruction how it operates.
Specific compliance that the organization should comply depends on the nature of
the organization .
● PCI DSS
● HIPAA
● FISMA
● FERPA
● GDPR
PCI DSS (Payment Card Industry Data
Security Standard)
● PCI DSS (Payment Card Industry Data Security Standard) is a set of security
standards designed to protect sensitive cardholder information during and
after financial transactions. It was developed by the Payment Card Industry
Security Standards Council (PCI SSC), which is made up of major payment
card companies like Visa, MasterCard, American Express, Discover, and JCB.
● The PCI DSS aims to ensure that companies that store, process, or transmit
cardholder data
do so securely, reducing the risk of data breaches and fraud.
● Consequences of Non-Compliance
Failure to comply with PCI DSS standards can result in various penalties,
including:
● Right to Access: Individuals have the right to access and obtain copies of their health
records.
● Right to Amend: Individuals can request corrections to their health records if they
believe they are incorrect.
● Right to Restrict Disclosure: Patients can request restrictions on the use or sharing of
their health information.
● Right to Confidential Communications: Patients can request that communications
(e.g., appointment reminders, medical billing) be sent in a way that protects their
privacy.
Federal Information Security
Management act (FISMA)
● FISMA (Federal Information Security Modernization Act) is a U.S. federal law
that was enacted in 2002 and updated in 2014. It mandates the
establishment of comprehensive security programs for federal agencies and
contractors to ensure the protection of government information systems.
● FISMA has a broad impact across the federal government by ensuring that
agencies consistently implement and manage information security practices.
● The law has also helped improve security in critical infrastructure systems and
other sectors that rely on government data.
● Access to Records: Parents and eligible students have the right to inspect
and review education records.
● Scope: GDPR applies not only to organizations based in the EU but also to any
entity outside the EU that processes personal data of individuals within the
EU.
● Stricter Requirements: GDPR provides stronger protections than previous data
protection laws, such as the Data Protection Directive (1995), with specific
and more comprehensive rights for individuals.
● Accountability and Transparency: GDPR places a greater emphasis on
accountability and transparency, requiring organizations to be able to
demonstrate compliance with its provisions.
BYOD (Bring your own Device)
● BYOD policies establishes guidelines for how a personal device can be used
for organizational purpose and access critical data.
Security researchers find new vulnerabilities and new attacks and report t the
hardware and software vendors.
Windows and application updates
Device drivers are software programs, they may need new updates as new
features are added
Firmware is a software that is transferred to an onboard chip
Patching is applying the updates on to the existing softwares. That will help
eliminating the known vulnerabilities.
Event Viewer
Log files are valuable for both security professionals and attackers.
System and application log files contain audit trails for both expected and
unexpected activities
After any cyber attack, the investigators and cyber security professionals
check the event logs to find the trace of the attacker.
So the attacker can remove the evidence from the system.
Syslog
To avoid the log file tampering, the ethical hackers have different approach to
protect the log file
● Transfer the Log file entries to a secured remote location, where they would
vbe difficult to alter.
● Linux syslog utility allows system to transmit logging message that are
resistant to Modification.
● Syslog separate log file message generation from log file message storage.
Anomaly Identification
● The log file can provide valuable inputs. The value of any log file is entirely
dependent on the ability to separate normal and abnormal behaviour.
If there’s 100 login attempts in just 5 sec, what can we log that as ? normal or
abnormal ?
It's more difficult to determine if 5 connection request from same IP 10 sec is a
potential attack.
The best way to identify the malicious behaviour is to understand what normal
behaviour looks like.
Domain 4 : Vulnerability Assessment and
Risk Management
Vulnerability Management
Testing Phase :
Scanning the target
Nmap utility is the favorite tool in port scanning.
Threat Intelligence :
Threat intelligence is the process of identifying and analysing cyber threats. It
can refer to the data collected on a potential threat or the process of
gathering, processing and analysing that data to better understand threats.
Ad-Hoc Threat Intelligence :
Ad hoc is a term derived from Latin that means "for this" or "for this
situation." In the context of technology and computing, "ad hoc" refers to
solutions that are developed specifically for a particular problem or task,
without considering broader applications.
Ad-Hoc and Automated Intelligence
1. Enumeration phase : Developing the architectural detailed plan for your target
environment.
2. Acceptance : If the risk is realized and cause little damage to the organization,
the the best strategy is to accept it.
3. Control : This is best for any risk that cannot be accepted or avoided.
Ex: Adding firewall, IDS, IPS.
While risk are global across any organization, other risk target specific
data.
Common Classes
1. Personal Identifiable Information (PII)
2. Personal Health Information (PHI)
Disaster recovery and Business
Continuity
Disaster recovery Plan (DRP) and
Business Continuity Plan (BCP)
A BCP addresses short term interruptions, while a DRP addresses severe damage
to the infrastructure that supports operation.
BCP is activated when one or more Critical Business functions (CBF) interrupts
DRP is activated when there is a massive damage to the Inffrastructure
Backup
The Backup is one of the most common components of the BCP and DRP, that
allows the operations to continue
Disaster Recovery Control
The goal of using a SOAR platform is to improve the efficiency of physical and
digital security operations.
The responsibility of a SOAR system is to help Cyber security professional to
tdentify, classify and respond to security incidents as effectively as possible.
Identifying Security Incidents
Events include
● Account Sign-in
● Requesting access to resource
● Consuming services
Detection process
1. Collected Event Information
2. Analyse Event Information
3. Examine the analysed Event Information to detect if any event satisfies the
criteria of security incident
Identifying Security Incidents
Identifying Security Incidents
Suspicious Event :
Any action that occurs in an IT infrastructure that deviates from a
normal behaviour.
We need to study the normal behaviour in order to understand the abnormal
behaviour.
Identifying Security Incidents
First step to identify a behaviour
● Train Observer on the appearance of the normal behaviour.
Attack Framework
Cyber Kill Chain Model
Attack Framework
Mitre Attack
Go to : https://attack.mitre.org/tactics/enterprise/
Tactics Techniques and Procedures (TTP)