Sy0 701
Sy0 701
Sy0 701
Introduction
Introduction
• CompTIA Security+ (SY0-701) certification is considered an intermediate level
information technology certification and an entry level cyber security certification
that focuses on your ability to assess the security posture of an enterprise
environment
– This certification is designed for information technology professionals or
aspiring cybersecurity professionals who have already earned their CompTIA
A+ and Network+ certifications, but this is a recommendation from CompTIA
and not a strict requirement
• If you have the equivalent of 1-2 years of working with hardware,
software, and networks, then you will do fine in this course
– This course is designed as a full textbook replacement, but if you would like
to get a textbook to study from as well, we recommend the official CompTIA
Security+ Student Guide available directly from CompTIA
– CompTIA Security+ (SY0-701) certification exam consists of five domains or
areas of knowledge
• 12% of General Security Concepts
• 22% of Threats, Vulnerabilities, and Mitigations
• 18% of Security Architecture
• 28% of Security Operations
• 20% of Security Program Management and Oversight
– When taking the CompTIA Security+ certification exam at the testing center
or online using the web proctoring service, you are going to have 90 minutes
to answer up to 90 questions
• You’re going to be answering multiple-choice questions, but you may
get a few multiple-select questions where they ask you to pick 2 or 3
correct answers for a single question
• You will also get a handful of performance-based questions
– To pass the Security+ certification exam, you must score at least 750 points
out of 900 on their 100 to 900 point scale
– To take the exam, you do have to pay an exam fee to cover the cost of testing,
and you do that by buying an exam voucher
• How do you sign up and schedule your exam?
– CompTIA Store
• You can do this by going to store.comptia.org and
buying it from their web store
• The price does vary depending on which country you
will be taking your exam from since CompTIA uses
region based pricing
– Dion Training
• You can go to diontraining.com/vouchers and purchase
your voucher directly from us, because we are a
certified Platinum Level CompTIA Delivery Partner
• You’ll save an extra 10% or so off the regular CompTIA
price
• We’ll give you free access to our searchable video
library as a bonus for buying your voucher from us
• 4 tips for success in this course
– Turn on closed captioning
• Control the playback speed
• Join our FB or Discord group
– facebook.com/groups/diontraining
– diontraining.com/discord
• Download and print the study guide
Exam Tips
• There will be no trick questions
– Always be on the lookout for distractors or red herrings
• At least one of the four listed possible answer choices that are written
to try and distract you from the correct answer
– Pay close attention to words in bold, italics, or all uppercase
– Answer the questions based on CompTIA Security+ knowledge
• In cybersecurity, there really is no 100% correct answers in the real
world because everything is situational
• When in doubt, choose the answer that is correct for the highest
number of situations
– Understand the key concepts of the test questions
– Do not memorize the terms word for word, try to understand them instead
• During the exam, the answers will be from multiple-choice style questions
Fundamentals of Security
Objectives:
• 1.1 - Compare and contrast various types of security controls
• 1.2 - Summarize fundamental security concepts
Fundamentals of Security
• Information Security
– Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction
– Information Systems Security
• Protecting the systems (e.g., computers, servers, network devices)
that hold and process critical data
– CIA Triad
• Confidentiality
– Ensures information is accessible only to authorized personnel
(e.g., encryption)
• Integrity
– Ensures data remains accurate and unaltered (e.g., checksums)
• Availability
– Ensures information and resources are accessible when
needed (e.g., redundancy measures)
– Non-Repudiation
• Guarantees that an action or event cannot be denied by the involved
parties (e.g., digital signatures)
• CIANA Pentagon
– An extension of the CIA triad with the addition of non-repudiation and
authentication
– Triple A’s of Security
• Authentication
– Verifying the identity of a user or system (e.g., password
checks)
• Authorization
– Determining actions or resources an authenticated user can
access (e.g., permissions)
• Accounting
– Tracking user activities and resource usage for audit or billing
purposes
– Security Control Categories
• Technical
• Managerial
• Operational
• Physical
– Security Control Types
• Preventative
• Deterrent
• Detective
• Corrective
• Compensating
• Directive
– Zero Trust Model
• Operates on the principle that no one should be trusted by default
• To achieve zero trust, we use the control plane and the data plane
– Control Plane
• Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
– Data Plane
• Subject/system, policy engine, policy administrator, and
establishing policy enforcement points
Confidentiality
• Confidentiality
– Refers to the protection of information from unauthorized access and
disclosure
• Ensure that private or sensitive information is not available or
disclosed to unauthorized individuals, entities, or processes
– Confidentiality is important for 3 main reasons
• To protect personal privacy
• To maintain a business advantage
• To achieve regulatory compliance
– To ensure confidentiality, we use five basic methods
• Encryption
– Process of converting data into a code to prevent unauthorized
access
• Access Controls
– By setting up strong user permissions, you ensure that only
authorized personnel can access certain types data
• Data Masking
– Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data’s
authenticity and use for authorized users
• Physical Security Measures
– Ensure confidentiality for both physical types of data, such as
paper records stored in a filing cabinet, and for digital
information contained on servers and workstations
• Training and Awareness
– Conduct regular training on the security awareness best
practices that employees can use to protect their
organization’s sensitive data
Integrity
• Integrity
– Helps ensure that information and data remain accurate and unchanged from
its original state unless intentionally modified by an authorized individual
• Verifies the accuracy and trustworthiness of data over the entire
lifecycle
– Integrity is important for three main reasons
• To ensure data accuracy
• To maintain trust
• To ensure system operability
– To help us maintain the integrity of our data, systems, and networks, we
usually utilize five methods
• Hashing
– Process of converting data into a fixed-size value
• Digital Signatures
– Ensure both integrity and authenticity
• Checksums
– Method to verify the integrity of data during transmission
• Access Controls
– Ensure that only authorized individuals can modify data and this reduces the
risk of unintentional or malicious alterations
• Regular Audits
– Involve systematically reviewing logs and operations to ensure
that only authorized changes have been made, and any
discrepancies are immediately addressed
Availability
• Availability
– Ensure that information, systems, and resources are accessible and
operational when needed by authorized users
– As cybersecurity professionals, we value availability since it can help us with
the following
• Ensuring Business Continuity
• Maintaining Customer Trust
• Upholding an Organization’s Reputation
– To overcome the challenges associated with maintaining availability, the best
strategy is to use redundancy in your systems and network designs
• Redundancy
– Duplication of critical components or functions of a system
with the intention of enhancing its reliability
• There are various types of redundancy you need to consider when designing your
systems and networks
– Server Redundancy
• Involves using multiple servers in a load balanced or failover
configuration so that if one is overloaded or fails, the other servers
can take over the load to continue supporting your end users
• Data Redundancy
– Involves storing data in multiple places
• Network Redundancy
– Ensures that if one network path fails, the data can travel
through another route
• Power Redundancy
– Involves using backup power sources, like generators and UPS
systems
Non-repudiation
• Non-repudiation
– Focused on providing undeniable proof in the world of digital transactions
• Security measure that ensures individuals or entities involved in a
communication or transaction cannot deny their participation or the
authenticity of their actions
– Digital Signatures
• Considered to be unique to each user who is operating within the
digital domain
• Created by first hashing a particular message or communication that
you want to digitally sign, and then it encrypts that hash digest with
the user’s private key using asymmetric encryption
• Non-repudiation is important for three main reasons
– To confirm the authenticity of digital transactions
• To ensure the integrity of critical communications
• To provide accountability in digital processes
Authentication
• Authentication
– Security measure that ensures individuals or entities are who they claim to
be during a communication or transaction
– 5 commonly used authentication methods
• Something you know (Knowledge Factor)
– Relies on information that a user can recall
• Something you have (Possession Factor)
– Relies on the user presenting a physical item to authenticate
themselves
• Something you are (Inherence Factor)
– Relies on the user providing a unique physical or behavioral
characteristic of the person to validate that they are who they
claim to be
• Something you do (Action Factor)
– Relies on the user conducting a unique action to prove who
they are
• Somewhere you are (Location Factor)
– Relies on the user being in a certain geographic location before
access is granted
– Multi-Factor Authentication System (MFA)
• Security process that requires users to provide multiple methods of
identification to verify their identity
• Authentication is critical to understand because of the following
– To prevent unauthorized access
• To protect user data and privacy
• To ensure that resources are accessed by valid users only
Authorization
• Authorization
– Pertains to the permissions and privileges granted to users or entities after
they have been authenticated
– Authorization mechanisms are important to help us with the following
• To protect sensitive data
• To maintain the system integrity in our organizations
• To create a more streamlined user experience
Accounting
• Accounting
– Security measure that ensures all user activities during a communication or
transaction are properly tracked and recorded
– Your organization should use a robust accounting system so that you can
create the following
• Create an audit trail
– Provides a chronological record of all user activities that can be
used to trace changes, unauthorized access, or anomalies back
to a source or point in time
• Maintain regulatory compliance
– Maintains a comprehensive record of all users’ activities
• Conduct forensic analysis
– Uses detailed accounting and event logs that can help cybersecurity experts
understand what happened, how it happened, and how to prevent similar
incidents from occurring again
• Perform resource optimization
– Organizations can optimize system performance and minimize costs by
tracking resource utilization and allocation decisions
• Achieve user accountability
– Thorough accounting system ensures users’ actions are
monitored and logged , deterring potential misuse and
promoting adherence to the organization’s policies
– To perform accounting, we usually use different technologies like the
following
• Syslog Servers
– Used to aggregate logs from various network devices and
systems so that system administrators can analyze them to
detect patterns or anomalies in the organization’s systems
• Network Analysis Tools
– Used to capture and analyze network traffic so that network
administrators can gain detailed insights into all the data
moving within a network
• Security Information and Event Management (SIEM) Systems
– Provides us with a real-time analysis of security alerts
generated by various hardware and software infrastructure in
an organization
Gap Analysis
• Gap Analysis
– Process of evaluating the differences between an organization’s current
performance and its desired performance
– Conducting a gap analysis can be a valuable tool for organizations looking to
improve their operations, processes, performance, or overall security
posture
– There are several steps involved in conducting a gap analysis
• Define the scope of the analysis
• Gather data on the current state of the organization
• Analyze the data to identify any areas where the organization’s
current performance falls short of its desired performance
• Develop a plan to bridge the gap
• 2 Basic Types of Gap Analysis
– Technical Gap Analysis
• Involves evaluating an organization’s current technical infrastructure
– identifying any areas where it falls short of the technical
capabilities required to fully utilize their security solutions
• Business Gap Analysis
– Involves evaluating an organization’s current business
processes
– Identifying any areas where they fall short of the capabilities
required to fully utilize cloud-based solutions
• Plan of Action and Milestones (POA&M)
– Outlines the specific measures to address each vulnerability
– Allocate resources
– Set up timelines for each remediation task that is needed
Zero Trust
• Zero Trust demands verification for every device, user, and transaction within the
network, regardless of its origin
– To create a zero trust architecture, we need to use two different planes
• Control Plane
– Refers to the overarching framework and set of components
responsible for defining, managing, and enforcing the policies
related to user and system access within an organization
– Control Plane typically encompasses several key elements
• Adaptive Identity
– Relies on real-time validation that takes into
account the user’s behavior, device, location, and
more
• Data Plane
• Threat Scope Reduction
– Limits the users’ access to only what they need for their work tasks because
this reduces the network’s potential attack surface
– Focused on minimizing the “blast radius” that could occur in the event of a
breach
• Policy-Driven Access Control
– Entails developing, managing, and enforcing user access policies based on
their roles and responsibilities
• Secured Zones
– Isolated environments within a network that are designed to house sensitive
data
• Ensures the policies are properly executed
– Data plane consists of the following
• Subject/System
– Refers to the individual or entity attempting to gain access
– Policy Engine
• Cross-references the access request with its predefined
policies
– Policy Administrator
• Used to establish and manage the access policies
– Policy Enforcement Point
• Where the decision to grant or deny access is actually
execute
Threat Actors
Objectives:
• 1.2 - Summarize fundamental security concepts
• 2.1 - Compare and contrast common threat actors and motivations
• 2.2 - Explain common threat vectors and attack surfaces
Threat Actors
• Threat Actor Motivations
– Data Exfiltration
• Blackmail
• Espionage
• Service Disruption
• Financial Gain,
• Philosophical/Political Beliefs
• Ethical Reasons
• Revenge
• Disruption/Chaos
• War
– Threat Actor Attributes
• Internal vs. External Threat Actors
• Differences in resources and funding
• Level of sophistication
– Types of Threat Actors
• Unskilled Attackers
– Limited technical expertise, use readily available tools
• Hacktivists
– Driven by political, social, or environmental ideologies
• Organized Crime
– Execute cyberattacks for financial gain (e.g., ransomware,
identity theft)
• Nation-state Actor
– Highly skilled attackers sponsored by governments for cyber
espionage or warfare
• Insider Threats
– Security threats originating from within the organization
– Shadow IT
• IT systems, devices, software, or services managed without explicit
organizational approval
– Threat Vectors and Attack Surfaces
• Message-based
• Image-based
• File-based
• Voice Calls
• Removable Devices
• Unsecured Networks
– Deception and Disruption Technologies
• Honeypots
– Decoy systems to attract and deceive attackers
• Honeynets
– Network of decoy systems for observing complex attacks
• Honeyfiles
– Decoy files to detect unauthorized access or data breaches
• Honeytokens
– Fake data to alert administrators when accessed or used
Unskilled Attackers
• Unskilled Attacker (Script Kiddie)
– Individual who lacks the technical knowledge to develop their own hacking
tools or exploits
• These low-skilled threat actors need to rely on scripts and programs
that have been developed by others
– How do these unskilled attackers cause damage?
• One way is to launch a DDoS attack
• An unskilled attacker can simply enter in the IP address of the system they want to
target, and then click a button to launch an attacker against that target
Hacktivists
• Hacktivists
– Individuals or groups that use their technical skills to promote a cause or
drive social change instead of for personal gain
– Hacktivism
• Activities in which the use of hacking and other cyber techniques is
used to promote or advance a political or social cause
– To accomplish their objectives, hacktivists use a wide range of techniques to
achieve their goals
• Website Defacement
– Form of electronic graffiti and is usually treated as an act of
vandalism
• Distributed Denial of Service (DDoS) Attacks
– Attempting to overwhelm the victim’s systems or networks so
that they cannot be accessed by the organization’s legitimate
users
• Doxing
– Involves the public release of private information about an
individual or organization
• Leaking of Sensitive Data
– Releasing sensitive data to the public at large over the internet
– Hacktivists are primarily motivated by their ideological beliefs rather than
trying to achieve financial gains
• Most well-known hacktivist groups is known as “Anonymous”
– Anonymous
• Loosely affiliated collective that has been involved in numerous
Organized Crime
• Organized cybercrime groups are groups or syndicates that have banded together to
conduct criminal activities in the digital world
– Sophisticated and well structured
• Use resources and technical skills for illicit gain
– In terms of their technical capabilities, organized crime groups possess a
very high level of technical capability and they often employ advanced
hacking techniques and tools
• Custom Malware
• Ransomware
• Sophisticated Phishing Campaigns
– These criminal groups will engage in a variety of illicit activities to generate
revenue for their members
• Data Breaches
• Identity Theft
• Online Fraud
• Ransomware Attacks
– Unlike hacktivists or nation state actors, organized cybercrime groups are
not typically driven by ideological or political objectives
• These groups may be hired by other entities, including governments,
to conduct cyber operations and attacks on their behalf
• Money, not other motivations is the objective of their attacks even if the attack takes
place in the political sphere
Nation-state Actor
• Nation-state Actor
– Groups or individuals that are sponsored by a government to conduct cyber
operations against other nations, organizations, or individuals
– Sometimes, these threat actors attempt what is known as a false flag attack
• False Flag Attack
– Attack that is orchestrated in such a way that it appears to
originate from a different source or group than the actual
perpetrators, with the intent to mislead investigators and
attribute the attack to someone else
– Nation-state actors possess advanced technical skills and extensive
resources, and they are capable of conducting complex, coordinated cyber
operations that employ a variety of techniques such as
• Creating custom malware
• Using zero-day exploits
• Becoming an advanced persistent threats
– Advanced Persistent Threat (APT)
• Term that used to be used synonymously with a nation-state actor
because of their long-term persistence and stealth
• A prolonged and targeted cyberattack in which an intruder gains
unauthorized access to a network and remains undetected for an
extended period while trying to steal data or monitor network
activities rather than cause immediate damage
• These advanced persistent threats are often sponsored by a nation-
state or its proxies, like organized cybercrime groups
• What motivates a nation-state actor?
– Nation-state actors are motivated to achieve their long-term strategic goals,
and they are not seeking financial gain
Insider Threats
• Insider Threats
– Cybersecurity threats that originate from within the organization
• Will have varying levels of capabilities
– Insider threats can take various forms
• Data Theft
• Sabotage
• Misuse of access privileges
– Each insider threat is driven by different motivations
• Some are driven by financial gain and they want to profit from the sale
of sensitive organizational data to others
• Some may be motivated by revenge and are aiming to harm the
organization due to some kind of perceived wrong levied against the
insider
• Some may take actions as a result of carelessness or a lack of
awareness of cybersecurity best practices
– Remember
• Insider threat refers to the potential risk posed by individuals within
an organization who have access to sensitive information and
systems, and who may misuse this access for malicious or unintended
purposes
• To mitigate the risk of an insider threat being successful,
organizations should implement the following
– Zero-trust architecture
• Employ robust access controls
– Conduct regular audits
• Provide effective employee security awareness programs
Shadow IT
• Shadow IT
– Use of information technology systems, devices, software, applications, and
services without explicit organizational approval
• IT-related projects that are managed outside of, and without the
knowledge of, the IT department
– Why does Shadow IT exist?
• An organization’s security posture is actually set too high or is too
complex for business operations to occur without be negatively
affected
– Bring Your Own Devices (BYOD)
• Involves the use of personal devices for work purposes
Threat Vectors and Attack Surfaces
• Threat Vector
– Means or pathway by which an attacker can gain unauthorized access to a
computer or network to deliver a malicious payload or carry out an
unwanted action
– Attack Surface
• Encompasses all the various points where an unauthorized user can
try to enter data to or extract data from an environment
• Can be minimized by
– Restricting Access
• Removing unnecessary software
– Disabling unused protocols
– Think of threat vector as the “how” of an attack, whereas the attack surface is
the “where” of the attack
– Several different threat vectors that could be used to attack your enterprise
networks
• Messages
– Message-based threat vectors include threats delivered via
email, simple message service (SMS text messaging), or other
forms of instant messaging
– Phishing campaigns are commonly used as part of a message-
based threat vector when an attacker impersonates a trusted
entity to trick its victims into revealing their sensitive
information to the attacker
• Images
– Image-based threat vectors involve the embedding of
malicious code inside of an image file by the threat actor
• Files
– The files, often disguised as legitimate documents or software,
can be transferred as email attachments, through file-sharing
services, or hosted on a malicious website
• Voice Calls
– Vhishing
• Use of voice calls to trick victims into revealing their
sensitive information to an attacker
• Removable Devices
– One common technique used with removable devices is known as baiting
• Baiting
– Attacker might leave a malware-infected USB drive in a
location where their target might find it, such as in the parking
lot or the lobby of the targeted organization
• Unsecure Networks
– Unsecure networks includes wireless, wired, and Bluetooth
networks that lack the appropriate security measures to
protect these networks
– If wireless networks are not properly secured, unauthorized
individuals can intercept the wireless communications or gain
access to the network
– Wired networks tend to be more secure than their wireless
networks, but they are still not immune to threats
• Physical access to the network infrastructure can lead
to various attacks
– MAC Address Cloning
– VLAN Hopping
– By exploiting vulnerabilities in the Bluetooth protocol, an
attacker can carry out their attacks using techniques like the
BlueBorne or BlueSmack exploits
• BlueBorne
– Set of vulnerabilities in Bluetooth technology
that can allow an attacker to take over devices,
spread malware, or even establish an on-path
attack to intercept communications without any
user interaction
• BlueSmack
– Type of Denial of Service attack that targets
Physical Security
Objectives:
• 1.2 - Summarize fundamental security concepts
• 2.4 - Analyze indicators of malicious activity
Physical Security
• Physical Security
– Measures to protect tangible assets (buildings, equipment, people) from
harm or unauthorized access
– Security Controls
• Fencing and Bollards
– Bollards
• Short, sturdy vertical posts controlling or preventing
vehicle access
– Fences
• Barriers made of posts and wire or boards to enclose or
separate areas
• Brute Force Attacks
– Forcible entry
– Tampering with security devices
– Confronting security personnel
– Ramming a barrier with a vehicle
• Surveillance Systems
– An organized strategy to observe and report activities
– Components
• Video surveillance
• Security guards
– Lighting
• Sensors
• Access Control Vestibules
– Double-door system electronically controlled to allow only one
door open at a time
– Prevents piggybacking and tailgating
• Door Locks
– Padlocks
– Pin and tumbler locks
– Numeric locks
– Wireless locks
– Biometric locks
– Cipher locks
– Electronic access control systems
• Access Badges
– Use of Radio Frequency Identification (RFID) or Near Field
Communication (NFC) for access
Surveillance Systems
• Surveillance System
– Organized strategy or setup designed to observe and report activities in a
given area
– Surveillance is often comprised of four main categories
• Video Surveillance
– Can include the following
• Motion detection
• Night vision
• Facial recognition
– Remote access
– Provides real-time visual feedback
– A wired solution security camera is physically cabled from the
device back to the central monitoring station
• A wireless solution relies on Wi-Fi to send its signal back to the central monitoring
station
– Pan-Tilt-Zoom (PTZ) System
• Can move the camera or its angle to better detect issues during an
intrusion
– Best places to have cameras
• Data center
• Telecommunications closets
• Entrance or exit areas
– Cameras should be configured to record what they’re
observing
• Security Guards
– Flexible and adaptable forms of surveillance that organizations
use
– Helps to reassure your staff or your customers that they are
safe
• Lighting
– Proper lighting is crucial for conducting effective surveillance
using both video and security guards
– If you create well-lit areas, this can deter criminals, reduce
shadows and hiding spots, and enhance the quality of your
video recordings
• Sensors
– Devices that detect and respond to external stimuli or changes
in the environment
– There are four categories of sensors
• Infrared Sensors
– Detect changes in infrared radiation that is often
emitted by warm bodies like humans or animals
• Pressure Sensors
– Activated whenever a specified minimum amount of weight is detected on
the sensor that is embedded into the floor or a mat
• Microwave Sensors
– Detect movement in an area by emitting microwave pulses and
measuring their reflection off moving objects
• Ultrasonic Sensors
– Measures the reflection of ultrasonic waves off
moving objects
Door Locks
• Door Locks
– Critical physical security control measure designed to restrict and regulate
access to specific spaces or properties, preventing unauthorized intrusions
and safeguarding sensitive data and individuals
– Types of Door Locks
• Traditional Padlocks
– Easily defeated and offer minimal protection
• Basic Door Locks
– Vulnerable to simple techniques like lock picking
• Modern Electronic Door Locks
– Utilize various authentication methods for enhanced security
– Authentication Methods
• Identification Numbers
– Require entry of a unique code, providing a
balance of security and convenience
• Wireless Signals
– Utilize technologies like NFC, Wi-Fi, Bluetooth, or
RFID for unlocking
• Biometrics
– Rely on physical characteristics like fingerprints,
retinal scans, or facial recognition for
authentication
– Biometric Challenges
• False Acceptance Rate (FAR)
– Occurs when the system
erroneously authenticates an
unauthorized user
– Lower FAR by increasing scanner
sensitivity
• False Rejection Rate (FRR)
– Denies access to an authorized
user. Adjusting sensitivity can
increase FRR
• Crossover Error Rate (CER)
– A balance between FAR and FRR
for optimal authentication
effectiveness
• Some electronic door locks use multiple factors, such as an identification number
and fingerprint, to increase security
– Cipher Locks
• Mechanical locks with numbered push buttons, requiring a correct
combination to open
• Commonly used in high-security areas like server rooms
– Secure entry areas in office buildings, often using electronic access systems
with badges and PINs for authentication
Social Engineering
Objectives:
• 2.2 - Explain common threat vectors and attack surfaces
• 5.6 - Given a scenario, you must be able to implement security awareness practices
Social Engineering
• Social Engineering
– Manipulative strategy exploiting human psychology for unauthorized access
to systems, data, or physical spaces
– Motivational Triggers
• Used by Social Engineers
– Familiarity and Likability
– Consensus and Social Proof
– Authority and Intimidation
– Scarcity and Urgency
– Social Engineering Techniques
• Impersonation
– Pretending to be someone else
– Includes brand impersonation, typo-squatting, and watering
hole attacks
• Pretexting
– Creating a fabricated scenario to manipulate targets
– Impersonating trusted figures to gain trust
• Types of Phishing Attacks
– Phishing
• Vishing
• Smishing
• Spear Phishing
• Whaling
• Business Email Compromise
– Frauds and Scams
• Deceptive practices to deceive people into parting with money or
valuable information
• Identifying and training against frauds and scams
– Influence Campaigns
• Spreading misinformation and disinformation, impacting politics,
economics, etc.
– Other Social Engineering Attacks
• Diversion Theft
• Hoaxes
• Shoulder Surfing
• Dumpster Diving
• Eavesdropping
• Baiting
• Piggybacking
• Tailgating
Motivational Triggers
• Six main types of motivational triggers that social engineers use
– Authority
• Most people are willing to comply and do what you tell them to do if
they believe it is coming from somebody who is in a position of
authority to make that request
• Urgency
– Compelling sense of immediacy or time-sensitivity that drives
individuals to act swiftly or prioritize certain actions
• Social Proof
– Psychological phenomenon where individuals look to the
behaviors and actions of others to determine their own
decisions or actions in similar situations
• Scarcity
– Psychological pressure people feel when they believe a
product, opportunity, or resource is limited or in short supply
• Likability
– Most people want to interact with people they like, and social
engineers realize this
– Can be
• Sexual attraction
• Pretending to be a friend
• Common interest
• Fear
– These types of attacks generally are focused on “if you don’t do
what I tell you, then this bad thing is going to happen to you”
Impersonation
• Four main forms of impersonation used by attackers
– Impersonation
• Attack where an adversary assumes the identity of another person to
gain unauthorized access to resources or steal sensitive data
– Requires the attacker to collect information about the
organization so that they can more easily earn the trust of their
targeted users
– Attackers provide details to help make the lies and the
impersonation more believable to a potential victim
– Consequences
• Unauthorized access
• Disruption of services
• Complete system takeover
– To mitigate against these types of attacks, organizations must
provide security awareness training to their employees on a
regular basis so that they remain vigilant against future attacks
• Brand Impersonation
– More specific form of impersonation where an attacker
pretends to represent a legitimate company or brand
– Attackers use the brand’s logos, language, and information to
create deceptive communications or website
– To protect against brand impersonation, organizations should
do the following
• Educate their users about these types of threats
• Use secure email gateways to filter out phishing emails
• Regularly monitor their brand’s online presence to detect any fraudulent activities
as soon as they occur
– Typosquatting
• Also known as URL hijacking or cybersquatting
– Form of cyber attack where an attacker will register a domain
name that is similar to a popular website but contain some
kind of common typographical errors
– To combat typosquatting, organizations will often do the
following
• Register common misspellings of their own domain
names
• Use services that monitor for similar domain
registrations
• Conduct user security awareness training to educate
users about the risks of typosquatting
• Watering Hole Attacks
– Targeted form of cyber attack where attackers compromise a
specific website or service that their target is known to use
– The term is a metaphor for a naturally occurring phenomenon
• In the world of cybersecurity, the “watering hole” the
attacker chooses to utilize will usually be a trusted
website or online service
– To mitigate watering hole attacks, organizations should do the
following
• Keep their systems and software updated
• Use threat intelligence services to stay informed about
new threats
• Employ advanced malware detection and prevention
tools
Pretexting
• Pretexting
– Gives some amount of information that seems true so that the victim will give
more information
– Mitigation involves training the employees not to fall for pretext and not to
fill in the gaps for people when they are calling
Phishing Attacks
• Different Types of Phishing Attacks
– Phishing
• Sending fraudulent emails that appear to be from reputable sources
with the aim of convincing individuals to reveal personal information,
such as passwords and credit card numbers
• Spear Phishing
– More targeted form of phishing that is used by cybercriminals
who are more tightly focused on a specific group of individuals
or organizations
– Has a higher success rate
• Whaling
– Form of spear phishing that targets high-profile individuals,
like CEOs or CFOs
– Attacker isn’t trying to catch the little fish in an organization,
but instead they want to catch one of the executives, board
members, or higher level managers in the company since the
rewards are potentially much greater
– Often used as an initial step to compromise an executive’s
account for subsequent attacks within their organization
• Business Email Compromise (BEC)
– Sophisticated type of phishing attack that usually targets businesses by using
one of their internal email accounts to get other employees to perform some
kind of malicious actions on behalf of the attacker
• Taking over a legitimate business email accounts through social
engineering or cyber intrusion techniques to conduct unauthorized
fund transfers, redirect payments, or steal sensitive information
• Vishing (Voice Phishing)
– Attacker tricks their victims into sharing personal or financial
information over the phone
• Smishing (SMS Phishing)
– Involves the use of text messages to trick individuals into
providing their personal information
Influence Campaigns
• Influence Campaigns
– Coordinated efforts to affect public perception or behavior towards a
particular cause, individual, or group
• Are a powerful tool for shaping public opinion and behavior
• Foster misinformation and disinformation
– Misinformation
• False or inaccurate information shared without harmful intent
– Disinformation
• Involves the deliberate creation and sharing of false information with
the intent to deceive or mislead
– Remember, misinformation and disinformation can have serious
consequences because
they can undermine public trust in institutions, fuel social divisions, and even influence the
outcomes of elections
Malware
Objective 2.4: Given a scenario, analyze indicators of malicious activity
Malware
• Malware
– Malicious software designed to infiltrate computer systems and potentially
damage them without user consent
– Categories
• Viruses
• Worms
• Trojans
• Ransomware
• Spyware
• Rootkits
• Spam
– Threat Vector vs. Attack Vector
• Threat Vector
– Method used to infiltrate a victim’s machine
– Examples
• Unpatched software
• USB drive installation
• Phishing campaigns
• Attack Vector
– Means by which the attacker gains access and infects the system
– Combines both infiltration method and infection process
• Types of Malware Attacks
– Viruses
• Attach to clean files, spread, and corrupt host files
• Worms
– Standalone programs replicating and spreading to other
computers
• Trojans
– Disguise as legitimate software, grant unauthorized access
• Ransomware
– Encrypts user data, demands ransom for decryption
• Zombies and Botnets
– Compromised computers remotely controlled in a network for
malicious purposes
• Rootkits
– Hide presence and activities on a computer, operate at the OS
level
• Backdoors and Logic Bombs
– Backdoors allow unauthorized access, logic bombs execute
malicious actions
• Keyloggers
– Record keystrokes, capture passwords or sensitive information
• Spyware and Bloatware
– Spyware monitors and gathers user/system information,
bloatware consumes resources without value
– Malware Techniques and Infection Vectors
• Evolving from file-based tactics to modern fileless techniques
• Multi-stage deployment, leveraging system tools, and obfuscation
techniques
• Indications of Malware Attack
– Recognizing signs like the following
• Account lockouts
– Concurrent session utilization
– Blocked content
– Impossible travel
– Resource consumption
– Inaccessibility
– Out-of-cycle logging
– Missing logs
– Documented attacks
Viruses
• Computer Virus
– Made up of malicious code that’s run on a machine without the user’s
knowledge and this allows the code to infect the computer whenever it has
been run
– 10 Different Types of Viruses
• Boot Sector
– One that is stored in the first sector of a hard drive and is then
loaded into memory whenever the computer boots up
• Macro
– Form of code that allows a virus to be embedded inside
another document so that when that document is opened by
the user, the virus is executed
• Program
– Try to find executables or application files to infect with their malicious code
• Multipartite
– Combination of a boot sector type virus and a program virus
– Able to place itself in the boot sector and be loaded every time
the computer boots
– It can install itself in a program where it can be run every time
the computer starts up
• Encrypted
– Designed to hide itself from being detected by encrypting its
malicious code or payloads to avoid detection by any antivirus
software
• Polymorphic
– Advanced version of an encrypted virus, but instead of just
encrypting the contents it will actually change the viruses code
each time it is executed by altering the decryption module in
order for it to evade detection
• Metamorphic
– Able to rewrite themselves entirely before it attempts to infect
a given file
• Stealth
– Technique used to prevent the virus from being detected by
the anti-virus software
• Armored
– Have a layer of protection to confuse a program or a person
who’s trying to analyze it
• Hoax
– Form of technical social engineering that attempts to scare our
end users
into taking some kind of undesirable action on their system
Worms
• Worm
– Piece of malicious software, much like a virus, but it can replicate itself
without any user interaction
• Able to self-replicate and spread throughout your network without a
user’s consent or their action
• Worms are dangerous for two reasons
– Infect your workstation and other computing assets
• Cause disruptions to your normal network traffic since they are
constantly trying to replicate and spread themselves across the
network
– Worms are best known for spreading far and wide over the internet in a
relative short amount of time
Trojans
• Trojan
– Piece of malicious software that is disguised as a piece of harmless or
desirable software
• Claims that it will perform some needed or desired function for you
– Remote Access Trojan (RAT)
• Widely used by modern attackers because it provides the attacker
with remote control of a victim machine
– Trojans are commonly used today by attackers to exploit a vulnerability in
your workstation and then conducting data exfiltration to steal your
sensitive documents,
creating backdoors to maintain persistence on your systems, and other malicious activities
Ransomware
• Ransomware
– Type of malicious software that is designed to block access to a computer
system or its data by encrypting it until a ransom is paid to the attacker
– How can we protect ourselves and our organizations against ransomware?
• Always conduct regular backups
• Install software updates regularly
• Provide security awareness training to your users
• Implement Multi-Factor Authentication (MFA)
– What should you do if you find yourself or your organization as the victim of
a ransomware attack?
• Never pay the ransom
– Paying the ransom doesn’t actually guarantee that you will
ever get your data back
• If you suspect ransomware has infected your machine, you should
disconnect it from the network
• Notify the authorities
• Restore your data and systems from known good backups
Rootkits
• Rootkit
– Allows the person to install programs, delete programs, open ports, shut
ports, and do whatever it is they want to do on that system
• In a UNIX, Linux, or MacOS computer, this type of administrator
account is actually called the root account
– A computer system has several different rings of permissions throughout the
system
• Ring 3 (Outermost Ring)
– Where user level permissions are used
• Ring 0 (Innermost or Highest Permission Levels)
– Operating in Ring 0 is called “kernel mode”
– Kernel Mode
• Allows a system to control access to things like device
drivers, your sound card, your video display or monitor,
and other similar things
– If you login as the administrator or root user on a system, you have root
permission and you will be operating at Ring 1 of the operating system
• Remember, the closer the malicious code is to the kernel, the more
permissions it will have and the more damage it can cause on your
system
– When a rootkit is installed on a system, it tries to move from Ring 1 to Ring 0
so that it can hide from other functions of the operating system to avoid
detection
– One technique used by rootkits to gain this deeper level of access is a DLL
injection
• DLL Injection
– Technique used to run arbitrary code within the address space
of another process by forcing it to load a dynamic-link library
• Dynamic Link Library (DLL)
– Collection of code and data that can be used by multiple
programs simultaneously to allow for code reuse and
modularization in software
• Shim
development
• Piece of software code that is placed between two components and that intercepts
the calls between those components and can be used redirect them
– Rootkits are extremely powerful, and they are very difficult to detect because
the operating system is essentially blinded to them
• To detect them, the best way is to boot from an external device and
then scan the internal hard drive to ensure that you can detect those
rootkits using a good anti-malware scanning solution from a live boot
Linux distribution
Keylogger
• Keylogger
– Piece of software or hardware that records every single keystroke that is
made on a computer or mobile device
– Keyloggers can be either software-based or hardware-based
• Software Keyloggers
– Malicious programs that get installed on a victim’s computer
– Often bundled with other software or delivered through social
engineering attacks, like phishing or pretexting attacks
• Hardware Keyloggers
– Physical devices that need to be plugged into a computer
– These will resemble a USB drive or they can be embedded
within a keyboard cable itself
– To protect your organization from keyloggers, ensure the following
• Perform regular updates and patches
• Rely on quality antivirus and antimalware solutions
• Conduct phishing awareness training for your users
• Implement multi-factor authentication systems
• Encrypt keystrokes being sent to your systems
• Perform physical checks of your desktops, laptops, and servers
Data Protection
Objectives:
• 1.4 - Explain the importance of using appropriate cryptographic solutions
• 3.3 - Compare and contrast concepts and strategies to protect data
• 4.2 - Explain the security implications of proper hardware, software,and data asset
management
• 4.4 - Explain security alerting and monitoring concepts and tools
• 5.1 - Summarize elements of effective security governance
Data Protection
• Data Protection
– Safeguarding information from corruption, compromise, or loss
– Data Classifications
• Types
– Sensitive
– Confidential
– Public
– Restricted
– Private
– Critical
– Data Ownership Roles
• Data Owners
• Data Controllers
• Data Processors
• Data Custodians
– Data Stewards
– Data States
• States
– Data at rest
– Data in transit
– Data in use
• Protection Methods
– Disk encryption
– Communication tunneling
– Data Types
• Examples
– Regulated data
– Trade secrets
– Intellectual property
– Legal information
– Financial information
– Human vs non-human readable data
– Data Sovereignty
• Information subject to laws and governance structures within the
nation it is collected
– Securing Data Methods
• Geographic Restrictions
• Encryption
• Hashing
• Masking
• Tokenization
– Obfuscation
• Segmentation
• Permission Restriction
– Data Loss Prevention (DLP)
• Strategy to prevent sensitive information from leaving an
organization
Data Classifications
• Data Classification
– Based on the value to the organization and the sensitivity of the information,
determined by the data owner
– Sensitive Data
• Information that, if accessed by unauthorized persons, can result in
the loss of security or competitive advantage for a company
• Over classifying data leads to protecting all data at a high level
– Importance of Data Classification
• Helps allocate appropriate protection resources
• Prevents over-classification to avoid excessive costs
• Requires proper policies to identify and classify data accurately
– Commercial Business Classification Levels
• Public
– No impact if released; often publicly accessible data
• Sensitive
– Minimal impact if released, e.g., financial data
• Private
• Contains internal personnel or salary information
– Confidential
• Holds trade secrets, intellectual property, source code, etc.
• Critical
– Extremely valuable and restricted information
– Government Classification Levels
• Unclassified
– Generally releasable to the public
• Sensitive but Unclassified
– Includes medical records, personnel files, etc.
• Confidential
– Contains information that could affect the government
• Secret
– Holds data like military deployment plans, defensive postures
• Top Secret
– Highest level, includes highly sensitive national security
information
– Legal Requirements
• Depending on the organization’s type, there may be legal obligations
to maintain specific data for defined periods
– Documentation
• Organizational policies should clearly outline data classification,
retention, and disposal requirements
– Note: Understanding data classifications and their proper handling is vital for
protecting sensitive information and complying with relevant regulations
Data Ownership
• Data Ownership
– Process of identifying the individual responsible for maintaining the
confidentiality, integrity, availability, and privacy of information assets
– Data Owner
• A senior executive responsible for labeling information assets and
ensuring they are protected with appropriate controls
– Data Controller
• Entity responsible for determining data storage, collection, and usage
purposes and methods, as well as ensuring the legality of these
processes
– Data Processor
• A group or individual hired by the data controller to assist with tasks
like data collection and processing
– Data Steward
• Focuses on data quality and metadata, ensuring data is appropriately
labeled and classified, often working under the data owner
– Data Custodian
• Responsible for managing the systems on which data assets are
stored, including enforcing access controls, encryption, and backup
measures
– Privacy Officer
• Oversees privacy-related data, such as personally identifiable
information (PII), sensitive personal information (SPI), or protected
health information (PHI), ensuring compliance with legal and
regulatory frameworks
– Data Ownership Responsibility
• The IT department (CIO or IT personnel) should not be the data
owner; data
owners should be individuals from the business side who understand the data’s content
and can make informed decisions about classification
• Selection of Data Owners
– Data owners should be designated within their respective departments
based on their knowledge of the data and its significance within the
organization
– Note: Proper data ownership is essential for maintaining data security,
compliance, and effective data management within an organization. Different
roles contribute to safeguarding and managing data appropriately
Data States
• Data at Rest
– Data stored in databases, file systems, or storage systems, not actively
moving
• Encryption Methods
– Full Disk Encryption (FDE)
• Encrypts the entire hard drive
– Partition Encryption
• Encrypts specific partitions, leaving others unencrypted
– File Encryption
• Encrypts individual files
– Volume Encryption
• Encrypts selected files or directories
– Database Encryption
• Encrypts data stored in a database at column, row, or
table levels
– Record Encryption
• Encrypts specific fields within a database record
• Data in Transit (Data in Motion)
– Data actively moving from one location to another, vulnerable to interception
• Transport Encryption Methods
– SSL (Secure Sockets Layer) and TLS (Transport Layer Security)
• Secure communication over networks, widely used in
web browsing and email
– VPN (Virtual Private Network)
• Creates secure connections over less secure networks
like the internet
– IPSec (Internet Protocol Security)
• Secures IP communications by authenticating and
encrypting IP packets
– Data in Use
• Data actively being created, retrieved, updated, or deleted
• Protection Measures
– Encryption at the Application Level
• Encrypts data during processing
– Access Controls
• Restricts access to data during processing
– Secure Enclaves
• Isolated environments for processing sensitive data
– Mechanisms like INTEL Software Guard
• Encrypts data in memory to prevent unauthorized
access
– Note: Understanding the three data states (data at rest, data in transit, and
data in use) and implementing appropriate security measures for each is
essential for comprehensive
data protection
Data Types
• Regulated Data
– Controlled by laws, regulations, or industry standards
• Compliance requirements
– General Data Protection Regulation (GDPR)
– Health Insurance Portability and Accountability Act (HIPAA)
– PII (Personal Identification Information)
• Information used to identify an individual (e.g., names, social security
numbers, addresses)
• Targeted by cybercriminals and protected by privacy laws
– PHI (Protected Health Information)
• Information about health status, healthcare provision, or payment
linked to a specific individual
• Protected under HIPAA
– Trade Secrets
• Confidential business information giving a competitive edge (e.g.,
manufacturing processes, marketing strategies, proprietary software)
• Legally protected; unauthorized disclosure results in penalties
– Intellectual Property (IP)
• Creations of the mind (e.g., inventions, literary works, designs)
• Protected by patents, copyrights, trademarks to encourage innovation
• Unauthorized use can lead to legal action
– Legal Information
• Data related to legal proceedings, contracts, regulatory compliance
• Requires high-level protection for client confidentiality and legal privilege
– Financial Information
• Data related to financial transactions (e.g., sales records, tax
documents, bank statements)
• Targeted by cybercriminals for fraud and identity theft
• Subject to PCI DSS (Payment Card Industry Data Security Standard)
– Human-Readable Data
• Understandable directly by humans (e.g., text documents,
spreadsheets)
– Non-Human-Readable Data
• Requires machine or software to interpret (e.g., binary code, machine
language)
• Contains sensitive information and requires protection
Data Sovereignty
• Data Sovereignty
– Digital information subject to laws of the country where it’s located
• Gained importance with cloud computing’s global data storage
– GDPR (General Data Protection Regulation)
• Protects EU citizens’ data within EU and EEA borders
• Compliance required regardless of data location
• Non-compliance leads to significant fines
– Data Sovereignty Laws (e.g., China, Russia)
• Require data storage and processing within national borders
• Challenge for multinational companies and cloud services
– Access Restrictions
• Cloud services may restrict access from multiple geographic locations
– Data sovereignty and geographical considerations pose complex challenges,
but
organizations can navigate them successfully with planning, legal guidance, and strategic
technology use, ensuring compliance and data protection
Securing Data
• Geographic Restrictions (Geofencing)
– Virtual boundaries to restrict data access based on location
• Compliance with data sovereignty laws
• Prevent unauthorized access from high-risk locations
– Encryption
• Transform plaintext into ciphertext using algorithms and keys
• Protects data at rest and in transit
• Requires decryption key for data recovery
– Hashing
• Converts data into fixed-size hash values
• Irreversible one-way function
• Commonly used for password storage
– Masking
• Replace some or all data with placeholders (e.g., “x”)
• Partially retains metadata for analysis
• Irreversible de-identification method
– Tokenization
• Replace sensitive data with non-sensitive tokens
• Original data stored securely in a separate database
• Often used in payment processing for credit card protection
– Obfuscation
• Make data unclear or unintelligible
• Various techniques, including encryption, masking, and pseudonyms
– Hinder unauthorized understanding
– Segmentation
• Divide network into separate segments with unique security controls
• Prevent lateral movement in case of a breach
• Limits potential damage
– Permission Restrictions
• Define data access and actions through ACLs or RBAC
• Restrict access to authorized users
• Reduce risk of internal data breaches
Cryptographic Solutions
• Cryptography
– Practice and study of writing and solving codes
• Encryption to hide information’s true meaning
– Encryption
• Converts plaintext to ciphertext
• Provides data protection at rest, in transit, and in use
– Data States
• Data at Rest
– Inactive data on storage devices
• Data in Transit
– Moving across networks
• Data in Use
– Currently undergoing change
– Algorithm and Key
• Algorithm (Cipher)
– Performs encryption or decryption
• Key
– Essential for determining cipher output
– Key Strength and Rotation
• Key Length
– Proportional to security
• Key Rotation
– Best practice for security longevity
– Symmetric and Asymmetric Encryption
• Symmetric
– Uses same key for encryption and decryption
• Asymmetric
– Uses a pair of keys for encryption and decryption
– Symmetric Algorithms
• DES
• Triple DES
• IDEA
• AES
• Blowfish
• Twofish
• Rivest Cipher
– Asymmetric Algorithms
• Diffie-Hellman
• RSA
• Elliptic Curve Cryptography
– Hashing
• Converts data into fixed-size string (digest) using hash functions
• Algorithms
– MD5
• SHA Family
– RIPEMD
– HMAC
– Public Key Infrastructure (PKI)
• Framework managing digital keys and certificates for secure data
transfer
– Digital Certificates
• Electronic credentials verifying entity identity for secure
communications
– Blockchain
• Decentralized, immutable ledger ensuring data integrity and
transparency
– Encryption Tools
• TPM
• HSM
• Key Management Systems
• Secure Enclave
– Obfuscation
• Steganography
• Tokenization
• Data Masking
– Cryptographic Attacks
• Downgrade Attacks
• Collision Attacks
• Quantum Computing Threats
Symmetric vs Asymmetric
• Symmetric Encryption
– Uses a single key for both encryption and decryption
• Often referred to as private key encryption
• Requires both sender and receiver to share the same secret key
• Offers confidentiality but lacks non-repudiation
• Challenges with key distribution in large-scale usage
– More people means more sharing of the keys
– Asymmetric Encryption
• Uses two separate keys
– Public key for encryption
– Private key for decryption
• Often called “Public Key Cryptography”
• No need for shared secret keys
• Commonly used algorithms include Diffie-Hellman, RSA, and Elliptic
Curve Cryptography (ECC)
• Slower compared to symmetric encryption but solves key distribution
challenges
– Hybrid Approach
• Combines both symmetric and asymmetric encryption for optimal
benefits
• Asymmetric encryption used to encrypt and share a secret key
• Symmetric encryption used for bulk data transfer, leveraging the
shared secret key
• Offers security and efficiency
– Stream Cipher
• Encrypts data bit-by-bit or byte-by-byte in a continuous stream
• Uses a keystream generator and exclusive XOR function for
encryption
• Suitable for real-time communication data streams like audio and video
– Often used in symmetric algorithms
– Block Cipher
• Breaks input data into fixed-size blocks before encryption
– Usually 64, 128, or 256 bits at a time
• Padding added to smaller data blocks to fit the fixed block size
• Advantages include ease of implementation and security
• Can be implemented in software, whereas stream ciphers are often
used in hardware solutions
Symmetric Algorithms
• DES (Data Encryption Standard)
– Uses a 64-bit key (56 effective bits due to parity)
• Encrypts data in 64-bit blocks through 16 rounds of transposition and
substitution
• Widely used from the 1970s to the early 2000s
– Triple DES (3DES)
• Utilizes three 56-bit keys
• Encrypts data with the first key, decrypts with the second key, and
encrypts again with the third key
• Provides 112-bit key strength but is slower than DES
– IDEA (International Data Encryption Algorithm)
• A symmetric block cipher with a 64-bit block size
• Uses a 128-bit key, faster and more secure than DES
• Not as widely used as AES
• AES (Advanced Encryption Standard)
– Replaced DES and 3DES as the US government encryption standard
• Supports 128-bit, 192-bit, or 256-bit keys and matching block sizes
• Widely adopted and considered the encryption standard for sensitive
unclassified information
– Blowfish
• A block cipher with key sizes ranging from 32 to 448 bits
• Developed as a DES replacement but not widely adopted
– Twofish
• A block cipher supporting 128-bit block size and key sizes of 128, 192,
or 256 bits
• Open source and available for use
– RC Cipher Suite (RC4, RC5, RC6)
• Created by cryptographer, Ron Rivest
• RC4 is a stream cipher with variable key sizes from 40 to 2048 bits,
used in SSL and WEP
• RC5 is a block cipher with key sizes up to 2048 bits
• RC6, based on RC5, was considered as a DES replacement
– Classification
• All the mentioned algorithms are symmetric
• Most are block ciphers except for RC4, which is a stream cipher
– Note: When working with encryption, identify if it’s symmetric or
asymmetric and whether it’s a block or stream cipher
Asymmetric Algorithms
• Public Key Cryptography
– No shared secret key required
• Uses a key pair
– Public key for encryption
• Private key for decryption
• Provides confidentiality, integrity, authentication, and non-
repudiation
– Confidentiality with Public Key
• Encrypt data using the receiver’s public key
• Only the recipient with the corresponding private key can decrypt it
– Non-Repudiation with Private Key
• Encrypt data using the sender’s private key
• Anyone with access to the sender’s public key can verify the sender’s
identity
– Integrity and Authentication with Digital Signature
• Create a hash digest of the message
• Encrypt the hash digest with the sender’s private key
– Digital Signature
• A hash digest of a message encrypted with the sender’s
private key to let the recipient know the document was
created and sent by the person claiming to have sent it
• Encrypt the message with the receiver’s public key
• Ensures message integrity, non-repudiation, and confidentiality
– Common Asymmetric Algorithms
• Diffie-Hellman
– Used for key exchange and secure key distribution
– Vulnerable to man-in-the-middle attacks, requires
authentication
– Commonly used in VPN tunnel establishment (IPSec)
• RSA (Ron Rivest, Adi Shamir, Leonard Adleman)
– Used for key exchange, encryption, and digital signatures
• Relies on the mathematical difficulty of factoring large prime numbers
– Supports key sizes from 1024 to 4096 bits
• Widely used in organizations and multi-factor authentication
• Elliptic Curve Cryptography (ECC)
– Efficient and secure, uses algebraic structure of elliptical
curves
– Commonly used in mobile devices and low-power computing
– Six times more efficient than RSA for equivalent security
– Variants include
• ECDH (Elliptic Curve Diffie-Hellman)
• ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
• ECDSA (Elliptic Curve Digital Signature Algorithm)
Hashing
• Hashing
– One-way cryptographic function that produces a unique message digest from
an input
– Hash Digest
• Like a digital fingerprint for the original data
• Always of the same length regardless of the input’s length
– Common Hashing Algorithms
• MD5 (Message Digest Algorithm 5)
– Creates a 128-bit hash value
– Limited unique values, leading to collisions
– Not recommended for security-critical applications due to
vulnerabilities
• SHA (Secure Hash Algorithm) Family
– SHA-1
• Produces a 160-bit hash digest, less prone to collisions than MD5
– SHA-2
• Offers longer hash digests (SHA-224, SHA-256, SHA-
348, SHA-512)
– SHA-3
• Uses 224-bit to 512-bit hash digests, more secure, 120
rounds of computations
• RIPEMD (RACE Integrity Primitive Evaluation Message Digest)
– Versions available
• 160-bit (Most common)
• 256-bit
• 320-bit
– Open-source competitor to SHA but less popular
• HMAC (Hash-based Message Authentication Code)
– Checks message integrity and authenticity
– Utilizes other hashing algorithms (e.g., HMAC-MD5, HMAC-
SHA1, HMAC-SHA256)
– Digital Signatures
• Uses a hash digest encrypted with a private key
• Sender hashes the message and encrypts the hash with their private
key
• Recipient decrypts the digital signature using the sender’s public key
• Verifies integrity of the message and ensures non-repudiation
– Common Digital Signature Algorithms
• DSA (Digital Security Algorithm)
– Utilized for digital signatures
• Uses a 160-bit message digest created by DSS (Digital Security Standard)
– RSA (Rivest-Shamir-Adleman)
• Supports digital signatures, encryption, and key distribution
– Widely used in various applications, including code signing
– Hashes change drastically even with minor changes in input
– Hashing is used to verify data integrity and detect any changes
Digital Certificates
• Digital Certificates
– Digitally signed electronic documents
• Bind a public key with a user’s identity
– Used for individuals, servers, workstations, or devices
• Use the X.509 Standard
– Commonly used standard for digital certificates within PKI
– Contains owner’s/user’s information and certificate authority
details
– Types of Digital Certificates
• Wildcard Certificate
– Allows multiple subdomains to use the same certificate
– Easier management, cost-effective for subdomains
– Compromise affects all subdomains
• SAN (Subject Alternate Name) field
– Certificate that specifies what additional domains and IP
addresses are going to be supported
– Used when domain names don’t have the same root domain
• Single-Sided and Dual-Sided Certificates
– Single-sided
• Only requires the server to be validated
– Dual-sided
• Both server and user validate each other
• Dual-sided for higher security, requires more
processing power
• Self-Signed Certificates
– Digital certificate that is signed by the same entity whose
identity it it certifies
– Provides encryption but lacks third-party trust
– Used in testing or closed systems
• Third-Party Certificates
• Digital certificate issued and signed by trusted certificate authorities (CAs)
– Trusted by browsers and systems
• Preferred for public-facing websites
– Key Concepts
• Root of Trust
– Highest level of trust in certificate validation
– Trusted third-party providers like Verisign, Google, etc.
– Forms a certification path for trust
• Certificate Authority (CA)
– Trusted third party that issues digital certificates
– Certificates contain CA’s information and digital signature
– Validates and manages certificates
• Registration Authority (RA)
– Requests identifying information from the user and forwards
certificate request up to the CA to create a digital certificate
– Collects user information for certificates
– Assists in the certificate issuance process
• Certificate Signing Request (CSR)
– A block of encoded text with information about the entity
requesting the certificate
– Includes the public key
– Submitted to CA for certificate issuance
– Private key remains secure with the requester
• Certificate Revocation List (CRL)
– Maintained by CAs
– List of all digital certificates that the certificate authority has
already
revoked
• Checked before validating a certificate
– Online Certificate Status Protocol (OCSP)
• Determines certificate revocation status or any digital certificate using
the certificate’s serial number
– Faster but less secure than CRL
• OCSP Stapling
– Alternative to OCSP
– Allows the certificate holder to get the OCSP record from the
server at regular intervals
– Includes OCSP record in the SSL/TLS handshake
– Speeds up the secure tunnel creation
• Public Key Pinning
– Allows an HTTPS website to resist impersonation attacks from
users who are trying to present fraudulent certificates
– Presents trusted public keys to browsers
– Alerts users if a fraudulent certificate is detected
• Key Escrow Agents
– Securely store copies of private keys
– Ensures key recovery in case of loss
– Requires strong access controls
• Key Recovery Agents
– Specialized type of software that allows the restoration of a
lost or or corrupted key to be performed
– Acts as a backup for certificate authority keys
– Trust in Digital Certificates
• Trust is essential in digital certificates
– Compromised root CAs can impact all issued certificates
• Commercially trusted CAs are more secure
• Self-managed CAs must be vigilant against compromises
Blockchain
• Blockchain
– Shared immutable ledger for transactions and asset tracking
• Builds trust and transparency
• Widely associated with cryptocurrencies like Bitcoin
• Is essentially a really long series of information with each block
containing information in it
– Each block has the hash for the block before it
• Block Structure
– Chain of blocks, each containing
• Previous block’s hash
• Timestamp
• Root transactions (hashes of individual transactions)
– Blocks are linked together in a chronological order
• Public Ledger
– Secure and anonymous record-keeping system
– Maintains participants’ identities
– Tracks cryptocurrency balances
– Records all genuine transactions in a network
– Blockchain Applications
• Smart Contracts
• Self-executing contracts with code-defined terms
– Execute actions automatically when conditions are met
• Transparent, tamper-proof, and trust-enhancing
• Commercial Uses
– Companies like IBM promote blockchain for commercial
purposes
– Permissioned blockchain used for business transactions
– Enhances trust and transparency with immutable public ledger
• Supply Chain Management
– Transparency and traceability in the supply chain
– Immutable records of product origin, handling, and
distribution
– Ensures compliance and quality control
– Broad Implications of Blockchain
• Versatility
– Beyond finance and cryptocurrencies
– Applications across various industries
– Promises transparency, efficiency, and trust
• Decentralization
– Key feature of blockchain
– Eliminates need for central authorities
– Empowers peer-to-peer networks
• Immutable Ledger
– Ensures data integrity
– Records cannot be altered or deleted
– Reinforces trust in transactions and information
• Digital Evolution
– Blockchain’s impact on technology and industries
• Potential to reshape traditional systems
– Offers transparency, efficiency, and trust in the digital era
Encryption Tools
• Encryption Tools for Data Security
– TPM (Trusted Platform Module)
• Dedicated microcontroller for hardware-level security
– Protects digital secrets through integrated cryptographic keys
– Used in BitLocker drive encryption for Windows devices
– Adds an extra layer of security against software attacks
• HSM (Hardware Security Module)
– Physical device for safeguarding and managing digital keys
– Ideal for mission-critical scenarios like financial transactions
– Performs encryption operations in a tamper-proof
environment
– Ensures key security and regulatory compliance
• Key Management System
– Manages, stores, distributes, and retires cryptographic keys
– Centralized mechanism for key lifecycle management
– Crucial for securing data and preventing unauthorized access
– Automates key management tasks in complex environments
• Secure Enclaves
– Coprocessor integrated into the main processor of some
devices
– Isolated from the main processor for secure data processing
and storage
– Safeguards sensitive data like biometric information
– Enhances device security by preventing unauthorized access
Obfuscation
• Obfuscation Techniques in Data Security
– Steganography
• Conceals a message within another to hide its very existence
– Involves altering image or data elements to embed hidden
information
– Primary goal is to prevent the suspicion that there’s any
hidden data at all
– Used alongside encryption for added security
– Detection is challenging due to hiding data in plain sight
• Tokenization
– Substitutes sensitive data with non-sensitive tokens
– Original data securely stored elsewhere
– Tokens have no intrinsic value
– Reduces exposure of sensitive data during transactions
– Commonly used for payment systems to comply with security
standards
• Data Masking (Data Obfuscation)
– Disguises original data to protect sensitive information
– Maintains data authenticity and usability
– Used in testing environments, especially for software
development
– Reduces the risk of data breaches in non-production settings
– Common in industries handling personal data
– Masks portions of sensitive data for privacy, e.g., credit card
digits, social security numbers
Cryptographic Attacks
• Cryptographic Attacks
• Techniques and strategies that adversaries employ to exploit vulnerabilities in
cryptographic systems with the intent to compromise the confidentiality, integrity,
or authenticity of data
– Downgrade Attacks
• Force systems to use weaker or older cryptographic standards or
protocols
• Exploit known vulnerabilities or weaknesses in outdated versions
• Example: POODLE attack on SSL 3.0
• Countermeasures include phasing out support for insecure protocols
and version-intolerant checks
– Collision Attacks
• Find two different inputs producing the same hash output
• Undermine data integrity verification relying on hash functions
• Vulnerabilities in hashing algorithms, e.g., MD5, can lead to collisions
• Birthday Paradox or Birthday Attack
– The probability that two distinct inputs, when processed
through a hashing function, will produce the same output, or a
collision
– Quantum Computing Threat
• Quantum computing
– A computer that uses quantum mechanics to generate and
manipulate quantum bits in order to access enormous
processing powers.
– Uses quantum bits (qubits) instead of using ones and zeros
• Quantum Communication
– A communications network that relies on qubits made of
photons (light) to send multiple combinations of ones and
zeros simultaneously which results in tamper resistant and
extremely fast communications
• Qubit
• A quantum bit composed of electrons or photons that can represent numerous
combinations of ones and zeros at the same time through superposition
– Enable simultaneous processing of multiple combinations
• Quantum computing is designed for very specific use cases
– Complex math problems
– Trying to do something like the modeling of an atom or atomic
structure
• Threat to traditional encryption algorithms (RSA, ECC) by rapid
factorization of large prime numbers
• Post-quantum cryptography
– A new kind of cryptographic algorithm that can be
implemented using today’s classic computers but is also
impervious to attacks from future quantum computers
– Aims to create algorithms resistant to quantum attacks
– First method is to create post-quantum cryptography is to
increase the key size
• Increases the number of permutations that are needed
to be brute-forced
– Second method is to create something like lattice-based
cryptography and super singular isogeny key exchange
• NIST selected four post-quantum cryptography standards
– CRYSTALS-Kyber - general encryption needs
– Digital signatures
• CRYSTALS-Dilithium
• FLACON
• SPHINCS+
Risk Management
Objective 5.2: Explain elements of the risk management process
Risk Management
• Risk Management
– Fundamental process involving identification, analysis, treatment,
monitoring, and reporting of risks
– Risk Management Lifecycle
• Risk Identification
– Proactive process recognizing potential risks
– Goal
• Create a comprehensive list based on events hindering
objectives
• Risk Analysis
– Evaluate likelihood and potential impact
– Qualitative or quantitative methods
– Outcome
• Prioritized list for guiding risk treatment
• Risk Treatment
– Develop strategies
• Avoidance
• Reduction
• Sharing
• Acceptance
• Strategy choice based on potential impact and risk tolerance
– Goal
• Reduce potential impact to an acceptable level
• Risk Monitoring
– Ongoing process tracking identified risks
– Monitor residual risks, identify new risks, and review risk
management effectiveness
– Ensures dynamic responsiveness to organizational changes
• Risk Reporting
– Communicate risk information and effectiveness of risk
management to stakeholders
– Various forms
• Dashboards
• Heat Maps
• Detailed Reports
– Crucial for accountability and informed decision-making
– Risk Assessment Frequency
• Types
– Ad-hoc
– Recurring
– One-time
– Continuous
• Varies
– Based on organization nature and types of risks involved
• Risk Identification
– Process
• Identify potential risks; perform business impact analysis.
• Concepts
– Recovery Time Objective
– Recovery Point Objective
– Mean Time to Repair
– Mean Time Before Failure
– Qualitative Risk Analysis
• Assess and prioritize risks based on likelihood and impact
– Quantitative Risk Analysis
• Numerically estimate probability and potential impact
– Risk Management Strategies
• Types
– Risk Transfer
– Risk Acceptance
– Risk Avoidance
– Risk Mitigation
– Risk Monitoring and Reporting
• Crucial Steps
– Continuous tracking and regular reporting
• Long-Term Impact
– Significant for the effectiveness of the risk management
process
Risk Identification
• Risk Identification
– Crucial first step in risk management
• Involves recognizing potential risks that could impact an organization
• Risks can vary from financial and operational to strategic and
reputational
• Techniques
– Brainstorming
• Checklists
– Interviews
– Scenario Analysis
• Organization should consider a wide range of risks, including
operational, financial, strategic, and reputational risks
• Document and analyze risks based on impact and likelihood
– Business Impact Analysis (BIA)
• Evaluates effects of disruptions on business functions
• Identifies and prioritizes critical functions
• Assesses impact of risks on functions
• Determines required recovery time for functions
• Key Metrics in BIA
– Recovery Time Objective (RTO)
• Maximum acceptable time before severe impact
• Target time for restoring a business process
– Recovery Point Objective (RPO)
• Maximum acceptable data loss measured in time
• Point in time data must be restored to
– Mean Time to Repair (MTTR)
• Average time to repair a failed component or system
• Indicator of repair speed and downtime minimization
– Mean Time Between Failures (MTBF)
• Average time between system or component failures
• Measure of reliability
Risk Register
• Risk Management
– Crucial for projects and business, it involves the identification and
assessment of uncertainties that may impact objectives
– Risk Register
• Records identified risks, descriptions, impacts, likelihoods, and
mitigation actions
• Key tool in risk management
• May resemble a heat map risk matrix
• Facilitates communication and risk tracking
• Key component of project and business operations
– Components of Risk Register
• Risk Description
– Identifies and describes the risk
– Clear and concise description
• Risk Impact
– Potential consequences of risk occurrence
– Rated on a scale (e.g., low, medium, high)
• Risk Likelihood
– Probability of risk occurrence
– Rated on a scale (e.g., numerical or descriptive)
• Risk Outcome
– Result of the risk if it occurs
– Related to impact and likelihood
• Risk Level or Threshold
– Determined by combining the impact and likelihood
• Prioritizes risks (e.g., high, medium, low)
– Cost
• Financial impact on the project
– includes potential expenses if it occurs or the cost of risk
mitigation
– Risk Tolerance and Risk Appetite
• Risk Tolerance/Risk Acceptance
– An organization or individual’s willingness to deal with
uncertainty in pursuit of their goals
– Maximum amount of risk they are willing to accept
– Acceptance without countermeasures
• Risk Appetite
– Willingness to pursue or retain risk
– Types
• Expansionary
• Conservative
• Neutral
– Key Risk Indicators (KRIs)
• Predictive metrics signaling increasing risk exposure
• Provide early warning of potential risks
• Tied to the organization’s objectives
• Used to monitor risk changes and take proactive steps
– Risk Owner
• Responsible for managing the risk
• Monitors, implements mitigation actions, and updates Risk Register
• Accountable for risk management
Qualitative Risk Analysis
• Qualitative Risk Analysis
– Primary method in risk management
• Assesses risks based on potential impact and likelihood
• Categorizes risks as high, medium, or low
• Subjective and relies on expertise and experience
• Avoids quantitative complexity
– Key Components
• Likelihood/Probability
– Chance of risk occurrence
– Qualitatively expressed as low, medium, or high
– Based on past experience, statistical analysis, or expert
judgment
• Impact
– Potential consequences if risk occurs
– Qualitatively rated as low, medium, or high
– Assess damage to project or business objectives
– Impact Levels
• Low Impact
– Minor damage, essential functions operational
• Medium Impact
– Significant damage, loss to assets
• High Impact
– Major damage, essential functions impaired
Vendor Assessment
• Vendor Assessments
– Process to evaluate the security, reliability, and performance of external
entities
• Crucial due to interconnectivity and potential impact on multiple
businesses
– Entities in Vendor Assessment
• Vendors
– Provide goods or services to organizations
• Suppliers
– Involved in production and delivery of products or parts
• Managed Service Providers (MSPs)
– Manage IT services on behalf of organizations
– Penetration Testing of Suppliers
• Penetration Testing
– Simulated cyberattacks to identify vulnerabilities in supplier
systems
• Validates supplier’s cybersecurity practices and potential risks to
your organization
– Right-to-Audit Clause
• Contract provision allowing organizations to evaluate vendor’s
internal processes for compliance
• Ensures transparency and adherence to standards
• Internal Audits
– Vendor’s self-assessment of practices against industry or organizational
requirements
• Demonstrates commitment to security and quality
– Independent Assessments
• Evaluations conducted by third-party entities without a stake in the
organization or vendor
• Provides a neutral perspective on adherence to security or
performance standards
– Supply Chain Analysis
• Assessment of an entire vendor supply chain for security and
reliability
• Ensures integrity of the vendor’s entire supply chain, including
sources of parts or products
Governance
• Governance
– Part of the GRC triad (Governance, Risk, and Compliance)
• Strategic leadership, structures, and processes ensuring IT aligns with
business objectives
• Involves risk management, resource allocation, and performance
measurement
– Purpose of Governance
• Establishes a strategic framework aligning with objectives and
regulations
• Defines rules, responsibilities, and practices for achieving goals and
managing IT resources
– Influence on IT Components
• Shapes guidelines for recommended approaches in handling
situations
• Drives policy development, outlining organizational commitments
(e.g., data protection)
• Impacts standards, defining mandatory rules for policy adherence
• Ensures procedures align with objectives, providing task-specific
guidance
– Adaptation and Revision
• Governance must adapt to technological advancements, regulatory
changes, and industry culture shifts
• Monitoring evaluates governance effectiveness and identifies gaps
• Revision updates governance framework
Governance Structures
• Organizational Governance
– Complex, multifaceted concept essential for successful organization
operation
• Comprises various components, each with unique functions
– Governance Structures
• Boards
– Elected by shareholders to oversee organization management
– Responsible for setting strategic direction, policies, and major
decisions
• Committees
– Subgroups of boards with specific focuses
– Allows detailed attention to complex areas
• Government Entities
– Play roles in governance, especially for public and regulated
organizations
– Establish laws and regulations for compliance
• Centralized and Decentralized Structures
– Centralized
• Decision-making authority at top management levels
• Ensures consistent decisions and clear authority
• Slower response to local/departmental needs
– Decentralized
• Decision-making authority distributed throughout the
organization
• Enables quicker decisions and local responsiveness
• Potential for inconsistencies
Policies
• Acceptable Use Policy (AUP)
– Document that outlines the do’s and don’ts for users when interacting with
an organization’s IT systems and resources
• Defines appropriate and prohibited use of IT systems/resources
• Aims to protect organizations from legal issues and security threats
– Information Security Policies
• Cornerstone of an organization’s security
• Outlines how an organization protects its information assets from
threats, both internal and external
• These policies cover a range of areas
– Data Classification
– Access Control
– Encryption
– Physical Security
• Ensures confidentiality, integrity, and availability of data
– Business Continuity Policy
• Ensures operations continue during and after disruptions
• Focuses on critical operation continuation and quick recovery
• Includes strategies for power outages, hardware failures, and
disasters
– Disaster Recovery Policy
• Focuses on IT systems and data recovery after disasters
• Outlines data backup, restoration, hardware/software recovery, and
alternative locations
– Incident Response Policy
• Addresses detection, reporting, assessment, response, and learning
from
security incidents
• Specifies incident notification, containment, investigation, and prevention steps
– Minimizes damage and downtime during incidents
– Software Development Lifecycle (SDLC) Policy
• Guides software development stages from requirements to
maintenance
• Includes secure coding practices, code reviews, and testing standards
• Ensures high-quality, secure software meeting user needs
– Change Management Policy
• Governs handling of IT system/process changes
• Ensures controlled, coordinated change implementation to minimize
disruptions
• Covers change request, approval, implementation, and review
processes
Standards
• Standards
– Provides a framework for implementing security measures, ensuring that all
aspects of an organization’s security posture are addressed
– Password Standards
• Define password complexity and management
• Include length, character types, regular changes, and password reuse
rules
• Emphasize password hashing and salting for security
– Access Control Standards
• Determine who has access to resources within an organization
• Include access control models like
– Discretionary Access Control (DAC)
– Mandatory Access Control (MAC)
– Role Based Access Control (RBAC)
• Enforce principles of least privilege and separation of duties
– Physical Security Standards
• Cover physical measures to protect assets and information
• Include controls like perimeter security, surveillance systems, and
access control mechanisms
• Address environmental controls and secure areas for sensitive
information
– Encryption Standards
• Ensure data remains secure and unreadable even if accessed without
authorization
• Include encryption algorithms like AES, RSA, and SHA-2
• Depends on the use case and balance between security and
performance
Procedures
• Procedures
– Systematic sequences of actions or steps taken to achieve a specific outcome
in an organization
• Ensures consistency, efficiency, and compliance with standards
– Change Management
• Systematic approach to handling organizational changes
• It aims to implement changes smoothly and successfully with minimal
disruption
• Key Stages
– Identifying the need for change
– Assessing impacts
– Developing a plan
– Implementation
– Post-change review
• Onboarding and Offboarding Procedures
– Onboarding integrates new employees into the organization
• ensures productivity and engagement
– Includes orientation, training, and integration activities
• Offboarding manages the transition when an employee leaves
– Tasks include property retrieval, access disabling, and exit
interviews
– Playbooks
• Detailed guides for specific tasks or processes
• They provide step-by-step instructions for consistent and efficient
execution
• Used in various situations, from cybersecurity incidents to customer
complaints
• Include resource requirements, steps to be taken, and expected
outcomes
Governance Considerations
• Regulatory Considerations
– Organizations must comply with various regulations, depending on industry
and location
• Regulations cover areas such as
– Data Protection
– Privacy
– Environmental Standards
– Labor Laws
• Non-compliance leads to penalties, sanctions, and reputational
damage
– Legal Considerations
• Complement regulatory considerations, encompassing contract,
intellectual property, and corporate law
• Employment laws address minimum wage, overtime, safety,
discrimination, and
benefits
• Litigation risks include breach of contract, product liability, and employment
disputes
– Robust legal strategies and resources are needed to manage legal risks
– Industry Considerations
• Refer to industry-specific standards, practices, and ethical guidelines
• Not legally binding but influence customer, partner, and regulator
expectations
• Non-adoption may lead to competitive disadvantages and stakeholder
criticism
– Geographical Considerations
• Geographical regulations impact organizations at local, regional,
national, and global levels
• Local considerations include city ordinances, zoning laws, and
operational restrictions
• Regional considerations, like CCPA in California, impose state-level
regulations
• National considerations, e.g., ADA in the US, affect businesses across
the entire country
• Global considerations, like GDPR, apply extraterritorially to
organizations dealing with EU citizens’ data
• Conflict of laws between jurisdictions is a significant challenge
• Navigating these differences requires deep legal knowledge and
flexibility in governance
Compliance
• Compliance
– Ensures adherence to laws, regulations, guidelines, and specifications
• Includes compliance reporting and compliance monitoring
• Compliance Reporting
– Systematic process of collecting and presenting data to demonstrate
adherence to compliance requirements
• Two Types of Compliance Reporting
– Internal Compliance Reporting
• Ensures adherence to internal policies and procedures
• Conducted by an internal audit team or compliance
department
– External Compliance Reporting
• Demonstrates compliance to external entities
• Mandatory, often by law or contract
– Compliance Monitoring
• Regularly reviews and analyzes operations for compliance
• Includes due diligence and due care, attestation and
acknowledgement, and internal and external monitoring
– Due Diligence and Due Care
• Due Diligence
– Identifying compliance risks through thorough review
• Due Care
– Mitigating identified risks
– Attestation and Acknowledgement
• Attestation
– Formal declaration by a responsible party that the
organization’s processes and controls are compliant
• Acknowledgement
– Recognition and acceptance of compliance requirements by all
relevant parties
• Internal and External Monitoring
– Internal Monitoring
• Regularly reviewing an organization’s operations to ensure
compliance with internal policies
• External Monitoring
– Third-party reviews for compliance with external regulations
or standards
– Role of Automation in Compliance
• Streamlines data collection, improves accuracy, and provides real-
time monitoring
Non-compliance Consequences
• Compliance in IT is essential to avoid severe consequences
– Consequences of non-compliance include
• Fines
– Monetary penalties imposed by regulatory bodies
• Sanctions
– Strict measures by regulatory bodies to enforce compliance
– Range from restrictions to bans
• Reputational Damage
– Negative impact on a company’s reputation
– Significant and long-lasting in the age of social media
• Loss of License
– Loss of the right to operate, relevant in regulated industries
• Contractual Impacts
– Breach of contracts due to non-compliance with laws and
regulations
– Can lead to legal disputes, financial penalties, or contract
termination
• To avoid these consequences, companies should prioritize compliance by
– Understanding and adhering to relevant laws and regulations
• Implementing robust cybersecurity measures
• Regularly reviewing and updating compliance programs
Asset Management
• Asset Management
– Systematic approach to governing and maximizing the value of items an
entity is responsible for throughout the asset’s life cycle
• Tangible Assets
– Office buildings
• Computers
• Machinery
– Intangible Assets
• Intellectual property
• Organization’s reputation
• Goodwill
– Assignment and Accounting of Assets
• Each asset assigned to a person or group, known as owners
• Process referred to as the allocation or assignment of ownership
• Avoids ambiguity, aids troubleshooting, upgrades, and replacements
– Classification and Categorization
• Assets should be classified and categorized
• Classification based on criteria such as function and value
• Informs maintenance, replacement, or retirement decisions
• High-value assets may require stringent maintenance schedules
• Low-value assets may be considered for recycling or disposal
– Monitoring and Tracking of Assets
• Ensures proper accounting and optimal use of assets
– Asset Monitoring
• Maintaining an inventory with specifications, location,
and assigned users
– Asset Tracking
• Goes beyond monitoring, involving the location, status,
and condition of assets using specialized software and
tracking technologies
– Enumeration
• Identifies and counts assets, especially in large
organizations or during times of asset procurement or
retirement
• Aids in maintaining an accurate inventory
• Proactive approach for risk management and resource optimization
– Mobile Device Management (MDM)
• Manages and tracks mobile devices
– Smartphones
– Tablets
– Laptops
– Wearables
• Centralizes management, enforces corporate policies, ensures
software uniformity, safeguards sensitive data
• Enables remote lock and wipe of lost devices, remote software
updates, and consistent user experiences
• Reduces risks associated with unsecured or outdated devices
Change Management
• Change Management
– Orchestrated strategy to transition teams, departments, and organizations
from existing state to a more desirable future state
• Necessary in modern business environments due to constant changes
– Change is essential but requires
• Precision
• Planning
• Structured approach
– Ensures changes are properly controlled, planned, and
integrated to avoid disruptions
– Challenges of Change
• Unplanned or poorly coordinated changes can lead to resistance and
confusion
• Even seemingly simple changes, like software upgrades, can cause
issues
• Existing processes become disrupted by changes, impacting efficiency
• Change Approval and Assessment
– Changes must be approved and assessed
• Organizational processes and procedures for change approval
• Assessment evaluates value and potential disruptions
• Change Advisory Board (CAB)
– Body of representatives from various parts of an organization
that is responsible for evaluation of any proposed changes
– Evaluates proposed changes before approval, assesses
viability, impacts, and alignment with objectives
– Change Owner
• Individual or team responsible for initiating change request
• Advocates for the change, details reasons, benefits, and challenges
• Key in presenting the case for the change
– Stakeholders
• Individuals or teams with a vested interest in the proposed change
• Directly impacted or involved in assessment and implementation
• These individuals or teams must be
– Consulted
– Their feedback considered
– Their concerns addressed
• Include technical, business, and end-user stakeholders
– Impact Analysis
• Integral part of the Change Management process
• Essential before implementing proposed changes
• Assesses potential fallout, immediate effects, long-term impacts
• Identifies challenges and prepares for maximizing benefits
Documenting Changes
• Documenting changes provides a clear history of the what, when, and why for
accountability and future reference
– Version Control
• Tracks and manages changes in documents, software, and other files
• Allows multiple users to collaborate and revert to previous versions
when needed
• Ensures changes do not create chaos and helps track project evolution
• Preserves past iterations and ensures continuity and stability
– Proper Documentation
• All accompanying documentation should be updated when
implementing a change
• Updates should reflect the implementation of the change, from minor configurations
to major network overhauls
– Key elements of proper documentation
• Updating diagrams to provide a visual representation of system
architecture
– Revising policies and procedures to address issues or
improvements
– Updating change requests and trouble tickets to reflect
successful completion
• Proper documentation is critical for clarity and accountability
– Continuous Improvement
• After implementing a change, evaluate the process and its success
• Identify issues and revise policies and procedures to prevent
recurrence
• Emphasizes iterative process improvement to ensure smoother future
changes
• Learn from past mistakes for better change management practices
– Importance of Records
• Change requests and trouble tickets help create a clear timeline of
change actions
• Inform stakeholders and provide a record of change history for future
reference
• Records are essential for communication and accountability in change
management
Penetration Testing
• Penetration Testing (Pentesting)
– Simulated cyber attack to identify exploitable vulnerabilities in a computer
system
• Assesses systems for potential weaknesses that attackers could
exploit
• Various types include
– Physical
– Offensive
– Defensive
– Integrated
• Physical Penetration Testing
– Evaluates an organization’s physical security measures
• Examples
– Testing locks
– Access card
– Security cameras
• Identifies vulnerabilities and recommends improvements for
enhanced physical security
• Benefits
– Improved security awareness
– Preventing unauthorized access
– Offensive Penetration Testing
• Known as “red teaming”
• Actively seeks vulnerabilities and attempts to exploit them, like a real
cyber attack
• Helps uncover and report vulnerabilities to improve security
• Can simulate real-world attacks and gain support for cybersecurity
investments
– Defensive Penetration Testing
• Known as “blue teaming”
• A reactive approach focused on strengthening systems, detecting and
responding to attacks
• Monitors for unusual activity and improves incident response times
• Enhances detection capabilities and helps improve incident response
– Integrated Penetration Testing
• Known as “purple teaming”
• Combines elements of offensive and defensive testing
• Red team conducts offensive attacks, while the blue team detects and responds
– Encourages collaboration and learning between the red and blue teams
• Benefits
– Comprehensive security assessment
– Promotes collaboration within cybersecurity teams
– Conducts simulated attacks and responses to improve skills
Reconnaissance in Pentesting
• Reconnaissance
– Initial phase where an attacker gathers information about the target system
• Information helps plan the attack and increase its success rate
– Importance of Reconnaissance
• Crucial step in penetration testing
• Identifies potential vulnerabilities in the target system
• Helps plan the attack to reduce the risk of detection and failure
• Types of Reconnaissance
– Active Reconnaissance
• Engaging with the target system directly, such as scanning for open
ports using tools like Nmap
• Passive Reconnaissance
– Gathering information without direct engagement, like using
open-source intelligence or WHOIS to collect data
– Reconnaissance and Environment Types
• Known Environment
– Penetration testers have detailed information about the target
infrastructure
• Focuses on known assets
– Evaluates vulnerabilities and weaknesses
• Aims to understand exploitability and potential damages
– Resembles an insider threat scenario
• Partially Known Environment
– Testers have limited information, simulating a scenario where
an attacker has partial inside knowledge
– Focus on discovering and navigating the broader environment
• Unknown Environment
– Minimal to no information about the target system
– Simulates a real-world external attacker aiming to find entry
points and vulnerabilities
– Extensive reconnaissance is essential
Attestation of Findings
• Attestation
– Involves formal validation or confirmation provided by an entity to assert the
accuracy and authenticity of specific information
• Crucial in internal and external audits to ensure the reliability and
integrity of the following
• Data
– Systems
• Processes
– Attestation of Findings in Penetration Testing
• Used to prove that a penetration test occurred and validate the
findings
• May be required for compliance or regulatory purposes (e.g., GLBA,
HIPAA, Sarbanes-Oxley, PCI DSS)
• Includes a summary of findings and evidence of the security
assessment
• Evidence helps to prove that identified vulnerabilities and exploits are
valid
• The difference between attestation and the report
– Attestation includes evidence
– Report focuses on findings and recommended remediation
• A letter of attestation may be provided to prove the occurrence of the
penetration testing, especially when required by third parties
interested in network security
– Types of Attestation
• Software Attestation
– Involves validating the integrity of software to ensure it hasn’t
been tampered with
• Hardware Attestation
– Validates the integrity of hardware components to confirm
they haven’t been tampered with
• System Attestation
– Validates the security posture of a system, often related to
compliance with security standards
• Attestation in Audits
– In internal audits, attestation evaluates organizational compliance,
effectiveness of internal controls, and adherence to policies and procedures
• In external audits, third-party entities provide attestation on financial
statements, regulatory compliance, and operational efficiency
• Attestation builds trust, enhances transparency, ensures
accountability, and is essential for stakeholders in making informed
decisions
High Availability
• High Availability Basics
– High Availability
• Aims to keep services continuously available by minimizing downtime
– Achieved through load balancing, clustering, redundancy, and
multi-cloud strategies
• Uptime and Availability Standards
– Uptime
• The time a system remains online, typically expressed as a percentage
• Five nines
– Refers to 99.999% uptime, allowing only about 5 minutes of
downtime per year
• Six nines
– Refers to 99.9999% uptime, allows just 31 seconds of
downtime per year
– Load Balancing
• Distributes workloads across multiple resources
• Optimizes resource use, throughput, and response time
• Prevents overloading of any single resource
• Incoming requests are directed to capable servers
– Clustering
• Uses multiple computers, storage devices, and network connections as
a single system
• Provides high availability, reliability, and scalability
• Ensures continuity of service even in case of hardware failure
• Can be combined with load balancing for robust solutions
– Redundancy
• Involves duplicating critical components to increase system reliability
• Redundancy can be implemented by adding multiple
– Power supplies
– Network connections
– Servers
– Software services
• Service providers
– Prevents single points of failure in systems
• Examples
– Redundant power supplies
– Network connections
– Backup servers
– Multi-Cloud Approach
• Distributes data, applications, and services across multiple cloud
providers
• Mitigates the risk of a single point of failure
• Offers flexibility for cost optimization
• Aids in avoiding vendor lock-in
• Requires proper data management, unified threat management, and
consistent policy enforcement for security and compliance
– Strategic Planning
• Design a robust system architecture to achieve high availability
• Utilize load balancing, clustering, redundancy, and multi-cloud
approaches
• Proactive measures reduce the risk of service disruptions and
downtime costs
• Safeguard organizational continuity and reliability in a competitive
environment
Data Redundancy
• RAID Overview
– RAID (Redundant Array of Independent Disks)
• Combines multiple physical storage devices into a single logical
storage device recognized by the operating system
– RAID 0
• Provides data striping across multiple disks
• Used for improved performance but offers no data redundancy
– Multiple drives increase read and write speeds
• Suitable for scenarios where performance is essential, and data
redundancy is not a concern
– RAID 1
• Provides redundancy by mirroring data identically on two storage
devices
• Ensures data integrity and availability
• Suitable for critical applications and maintains a complete copy of
data on both devices
• Only one storage device can fail without data loss or downtime
– RAID 5
• Utilizes striping with parity across at least three storage devices
• Offers fault tolerance by distributing data and parity
• Can continue operations if one storage device fails
• Data reconstruction is possible but results in slower access speeds
– RAID 6
• Similar to RAID 5 but includes double parity data
• Requires at least four storage devices
• Can withstand the failure of two storage devices without data loss
– RAID 10
• Combines RAID 1 (mirroring) and RAID 0 (striping)
• Offers high performance, fault tolerance, and data redundancy
• Requires an even number of storage devices, with a minimum of four
– RAID Resilience Categories
• Failure-resistant
– Resists hardware malfunctions through redundancy (e.g., RAID
1)
• Fault-tolerant
– Allows continued operation and quick data rebuild in case of failure (e.g.,
RAID 1, RAID 5, RAID 6, RAID 10)
• Disaster-tolerant
– Safeguards against catastrophic events by maintaining data in
independent zones (e.g., RAID 1, RAID 10)
– RAIDs are essential for ensuring data redundancy, availability, and
performance in enterprise networks
– The choice of RAID type depends on specific requirements for performance
and fault tolerance
Capacity Planning
• Capacity Planning
– Critical strategic planning effort for organizations
• Ensures an organization is prepared to meet future demands in a cost-
effective manner
– Four Main Aspects of Capacity Planning
• People
– Analyze current personnel skills and capacity
– Forecast future personnel needs for hiring, training, or
downsizing
– Ensure the right number of people with the right skills for
strategic objectives
– Example
• Hiring seasonal employees for holiday retail demand
• Technology
– Assess current technology resources and their usage
• Predict future technology demands
– Consider scalability and potential investments in new technology
• Example
– Ensuring an e-commerce platform can handle traffic spikes
• Infrastructure
– Plan for physical spaces and utilities to support operations
– Includes office spaces, data centers, and more
– Optimize space and power consumption
– Example
• Data center capacity planning for server installations
• Processes
– Optimize business processes for varying demand levels
• Streamline workflows, improve efficiency, and consider outsourcing
– Example
• Automating employee onboarding to handle high
demand
Data Backups
• Data Backup
– Creating duplicate copies of digital information to protect against data loss,
corruption, or unavailability
• Safeguards data from accidental deletion or system failures
– Onsite and Offsite Backups
• Onsite Backup
– Storing data copies in the same location as the original data
• Offsite Backup
– Storing data copies in a geographically separate location
• Importance
– Onsite backups are convenient but vulnerable to disasters
– Offsite backups protect against physical disasters
– Backup Frequency
• Determining factor of backup frequency is the organization’s RPO
– Recovery Point Objective (RPO)
• Ensures that the backup plan will maintain the amount
of data required to keep any data loss under the
organization’s RPO threshold
• Considerations
– Data change rate
– Resource allocation
– Organizational needs
– Encryption
• Fundamental safeguard that protects the backup data from
unauthorized access and potential breaches
– Data-at-rest Encryption
• Encrypting data as it is written to storage
– Data-in-transit Encryption
• Protecting data during transmission
– Importance
• Safeguarding backup data from unauthorized access
and breaches
– Snapshots
• Point-in-time copies capturing a consistent state
• Records only changes since the previous snapshot, reducing storage requirements
– Use cases
• Valuable for systems where data consistency is critical, like databases
and file servers
– Data Recovery
• Several key steps in the data recovery process
– Selection of the right backup
– Initiating the recovery process
– Data validation
– Testing and validation
– Documentation and reporting
– Notification
• Importance
– Regaining access to data in case of loss or system failure; a
well-defined and tested recovery plan is essential
– Replication
• Real-time or near-real-time data copying to maintain data continuity
• Benefits
– Ensures seamless data continuity
– Suitable for high-availability environments
– Journaling
• Maintaining a detailed record of data changes over time
• Benefits
– Enables granular data recovery
– Maintains an audit trail
• Ensures data integrity and compliance
– Considerations
• Data tracking granularity, size, retention policies, and security
Security Architecture
Objectives:
• 3.1 - Compare and contrast security implications of different architecture models
• 4.1 - Given a scenario, apply common security techniques to computing resources
Security Architecture
• Security Architecture
– Design, structure, and behavior of an organization’s information security
environment
– On-Premise vs. Cloud Deployment
• On-Premise
– Traditional local infrastructure setup
• Cloud
– Delivery of computing services over the internet
– Cloud Security Considerations
• Shared Physical Server Vulnerabilities
• Inadequate Virtual Environment Security
• User Access Management
• Lack of Up-to-date Security Measures
• Single Point of Failure
• Weak Authentication and Encryption Practices
• Unclear Policies and Data Remnants
• Virtualization and Containerization
– Different virtualization types
• Containerization benefits and risks
• Vulnerabilities like vm escape and resource reuse
– Serverless Computing
• Cloud provider manages server allocation
• Developers focus solely on writing code
– Microservices Architecture
• Collection of small, autonomous services
• Each performs a specific business process
– Software-Defined Network (SDN)
• Dynamic, programmatically efficient network configuration
• Improves network performance and monitoring
– Infrastructure as Code (IaC)
• Automation of managing and provisioning technology stack
• Software-driven setup instead of manual configuration
– Centralized vs. Decentralized Architectures
• Benefits and risks of centralized and decentralized setups
– Internet of Things (IoT)
• Network of physical devices with sensors and connectivity
• Enables data exchange among connected objects
– ICS and SCADA
• Industrial Control Systems (ICS)
– For industrial production
• Supervisory Control and Data Acquisition (SCADA)
– Subset of ICS
• Embedded Systems
– Dedicated computer system designed for specific functions
• Part of a complete device system with hardware components
Cloud Security
• Shared Physical Server Vulnerabilities
– In cloud environments, multiple users share the same physical server
• Compromised data from one user can potentially impact others on the
same server
• Mitigation
– Implement strong isolation mechanisms (e.g., hypervisor
protection, secure multi-tenancy)
– Perform regular vulnerability scanning, and patch security
gaps
– Inadequate Virtual Environment Security
• Virtualization is essential in cloud computing
– Inadequate security in the virtual environment can lead to
unauthorized access and data breaches
• Mitigation
– Use secure VM templates
• Regularly update and patch VMs
– Monitor for unusual activities
– Employ network segmentation to isolate VMs
– User Access Management
• Weak user access management can result in unauthorized access to
sensitive data and systems
• Mitigation
– Enforce strong password policies
– Implement multi-factor authentication
– Limit user permissions (Principle of Least Privilege)
– Monitor user activities for suspicious behavior
– Lack of Up-to-date Security Measures
• Cloud environments are dynamic and require up-to-date security
measures
– Failure to update can leave systems vulnerable to new threats
• Mitigation
– Regularly update and patch software and systems
– Review and update security policies
– Stay informed about the latest threats and best practices
– Single Point of Failure
• Cloud services relying on specific resources or processes can lead to
system-wide outages if they fail
• Mitigation
– Implement redundancy and failover procedures
– Use multiple servers, data centers, or cloud providers
• Regularly test failover procedures
– Weak Authentication and Encryption Practices
• Weak authentication and encryption can expose cloud systems and
data
• Mitigation
– Use multi-factor authentication
– Strong encryption algorithms
– Secure key management practices
– Unclear Policies
• Unclear security policies can lead to confusion and inconsistencies in
implementing security measures
• Mitigation
– Develop clear, comprehensive security policies covering data
handling, access control, incident response, and more
– Regularly review and update policies and provide effective
communication and training
– Data Remnants
• Data Remnants
– Residual data left behind after deletion or erasure processes
– In a cloud environment, data may not be completely removed,
posing a security risk
• Mitigation
– Implement secure data deletion procedures
– Use secure deletion methods
– Manage backups securely
– Verify data removal after deletion
– Remember that cloud security is a shared responsibility
Serverless
• What is Serverless?
– Serverless computing doesn’t mean no servers; it shifts server management
away from developers
• Relies on cloud service providers to handle server management,
databases, and some application logic
• Functions as a Service (FaaS) Model
– Developers write and deploy individual functions triggered by
events
– Benefits of Serverless
• Reduced operational costs
– Pay only for compute time used, no charges when code is idle
• Automatic scaling
– Cloud provider scales resources based on workload, ensuring optimal
capacity
• Focus on core product
– Developers can concentrate on application functionality, not
server management
• Faster time to market
– Reduced infrastructure concerns speed up application
development
– Challenges and Risks
• Vendor Lock-in
– Reliance on proprietary interfaces limits flexibility and may
increase costs
• Immaturity of best practices
– Serverless is a relatively new field, and best practices are still
evolving
– Not a one-size-fits-all solution
• Consider the specific needs and requirements of your application;
serverless introduces challenges like Vendor Lock-in and service
provider dependencies
Microservices
• Microservices
– Architectural style for breaking down large applications into small,
independent services
• Each microservice runs a unique process and communicates through
a well-defined, lightweight mechanism
• Contrasts with traditional monolithic architecture, where all
components are interconnected
– Each service in the microservice architecture is self-contained
and able to
run independently
• Advantages of Microservices
– Scalability
• Services can be scaled independently based on demand
• Flexibility
– Microservices can use different technologies and be managed
by different teams
• Resilience
– Isolation reduces the risk of system-wide failures
• Faster Deployments and Updates
– Independent deployment and updates allow for agility and
reduced deployment risk
– Challenges of Microservices
• Complexity
– Managing multiple services involves inter-service
communication, data consistency, and distributed system
testing
• Data Management
– Each microservice can have its own database, leading to data
consistency challenges
• Network Latency
– Increased inter-service communication can result in network
latency and slower response times
• Security
– The distributed nature of microservices increases the attack
surface, requiring robust security measures
Network Infrastructure
• Network Infrastructure
– Backbone of modern organizations
• Comprises hardware, software, services, and facilities for network
support and management
– Physical Separation
• Security measures to protect sensitive information
• Often referred to as “Air Gapping”
• Isolates a system by physically disconnecting it from all networks
• Physical separation is one of the most secure methods of security, but
it is still vulnerable to sophisticated attacks
– Logical Separation
• Establishes boundaries within a network to restrict access to certain
areas
• Implemented using firewalls, VLANs, and network devices
– Comparison
• Physical Separation (Air-Gapping)
– High security, complete isolation
• Logical Separation
– More flexible, easier to implement
– Less secure if not configured properly
Embedded Systems
• Embedded Systems
– Specialized computing components designed for dedicated functions within
larger devices
• They integrate hardware and mechanical elements and are essential
for various daily-use devices
– Real-Time Operating System (RTOS)
• Designed for real-time applications that process data without
significant delays
• Critical for time-sensitive applications like flight navigation and
medical equipment
• Risks and Vulnerabilities in Embedded Systems
– Hardware Failure
• Prone to failure in harsh environments
• Software Bugs
– Can cause system malfunctions and safety risks
• Security Vulnerabilities
– Vulnerable to cyber-attacks and unauthorized access
• Outdated Systems
– Aging software and hardware can be more susceptible to
attacks
– Key Security Strategies for Embedded Systems
• Network Segmentation
– Divide the network into segments to limit potential damage in
case of a breach
• Wrappers (e.g., IPSec)
– Protect data during transfer by hiding data interception points
• Firmware Code Control
– Manage low-level software to maintain system integrity
• Challenges in Patching
– Updates face operational constraints; OTA updates demand
meticulous planning and security measures
• Over-the-Air (OTA) Updates
• Patches are delivered and installed remotely
Security Infrastructure
Objectives:
• 3.2 - Given a scenario, you must be able to apply security principles to secure
enterprise architecture
• 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance
security
Security Infrastructure
• Security Infrastructure
– Encompasses hardware, software, networks, data, and policies working
cohesively for information asset safeguarding
– Firewalls
• Types
– Web Application
– Unified Threat Management
– Next-generation
– Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
• Mechanisms
– Identifying trends
– Showcasing signatures
– Network Appliances
• Specialized hardware or software for specific networking functions
• Functions
– Load Balancing
– Proxying
• Monitoring
– Security Enforcement
– Port Security
• Restricting and controlling network access
• Basis
– Media Access Control (MAC) addresses
• Concepts
– 802.1x and EAP
– Securing Network Communications
• Technologies
– VPNs
– IPSec
– TLS
• Objective
– Create a secure backbone for communication
– Software-Defined Wide Area Networks (SD-WAN) and Secure Access Service
Edge (SASE)
• SD-WAN
– Optimize WAN connections with software-defined principles
• SASE
– Cloud-based service integrating security and wide area
networking
– Infrastructure Considerations
• Aspects
– Device placement, security zones, screen subnets, attack
surfaces
• Connectivity
– Concerns and considerations
• Device Attributes
– Active vs. passive, inline vs. taps or monitors
• Failure Mode Options
– Fail-open or fail-closed for security devices
– Selection of Infrastructure Controls
• Choosing controls aligned with network needs
• Tailoring
– Ensuring robust security architecture
Firewalls
• Firewall
– A network security device or software that monitors and controls network
traffic based on security rules
• Protects networks from unauthorized access and potential threats
• Screened Subnet (Dual-homed Host)
– Acts as a security barrier between external untrusted networks and internal
trusted networks using a protected host with security measures like a
packet-filtering firewall
– Types of Firewalls
• Packet Filtering Firewalls
– Inspect packet headers for IP addresses and port numbers
– Limited in inspection, operates at Layer 4 (Transport Layer)
• Stateful Firewalls
– Track connections and requests, allowing return traffic for
outbound requests
– Operates at Layer 4, with improved awareness of connection
state
• Proxy Firewalls
– Make connections on behalf of endpoints, enhancing security
– Two Types of Proxy Firewalls
• Circuit level (Layer 5)
• Application level (Layer 7)
• Kernel Proxy Firewalls
– Minimal impact on network performance, full inspection of
packets at every layer
– Placed close to the system they protect
– Firewall Evolutions
• Next Generation Firewall (NGFW)
– Application-aware
• distinguish between different types of traffic
– Conduct deep packet inspection and use signature-based
intrusion
protection
• Operate fast within minimal network performance impact
– Offer full-stack traffic visibility
• Can integrate with other security products
– Can be a problem if organizations become reliant on a single
vendor due to firewall configurations tailored to one product
line
• Unified Threat Management (UTM) Firewall
– Combines multiple security functions in a single device
– Functions include firewall, intrusion prevention, antivirus, and
more
– Reduces the number of devices
– Are a single point of failure
– UTMs use separate individual engine
• NGFW uses a single engine
• Web Application Firewall (WAF)
– Focuses on inspecting HTTP traffic
– Prevents common web application attacks like cross-site
scripting and SQL injections
– Can be placed
• In-line (live attack prevention)
– Device sits between the network firewall and the
web servers
• Out of band (detection)
– Device receives a mirrored copy of web server
traffic
– Layer based Firewalls
• Layer 4 Firewall
– Operates at the transport layer
• Filters traffic based on port numbers and protocol data
– Layer 7 Firewall
• Operates at the application layer
– Inspects, filters, and controls traffic based on content and data
characteristics
Configuring Firewalls
• Firewalls and Access Control Lists (ACLs)
– Firewalls
• Dedicated devices for using Access Control Lists (ACLs) to protect
networks
• Access Control Lists (ACLs)
– Essential for securing networks from unwanted traffic
– Consist of permit and deny statements, often based on port
numbers
– Rule sets placed on firewalls, routers, and network
infrastructure devices
– Control the flow of traffic into and out of networks
– May define quality of service levels inside networks but are
primarily used for network security in firewalls
– Configuring ACLs
• A web-based interface or a text-based command line interface can be
used
• The order of ACL rules specifies the order of actions taken on traffic
(top-down)
• The first matching rule is executed, and no other ACLs are checked
• Place the most specific rules at the top and generic rules at the bottom
• Some devices support implied deny functions, while others require a
“deny all” rule at the end
• Actions taken by network devices should be logged, including deny
actions
• ACL Rules
– Made up of some key pieces of information including
• Type of traffic
– Source of traffic
– Destination of traffic
– Action to be taken against the traffic
– Firewall Types
• Hardware-Based Firewall
– A dedicated network security device that filters and controls
network traffic at the hardware level
– Commonly used to protect an entire network or subnet by
implementing ACLs and rules
• Software-Based Firewall
– A firewall that runs as a software application on individual
devices, such as workstations
– Utilizes ACLs and rules to manage incoming and outgoing
traffic, providing security at the software level on a per-device
basis
– Key Takeaway
• Firewalls use ACLs to control network traffic, ensuring security by
specifying permitted and denied actions
• Proper ACL configuration and rule order are crucial for effective
network protection
Network Appliances
• Network Appliance
– A dedicated hardware device with pre-installed software for specific
networking services
– Different Types of Network Appliances
• Load Balancers
– Distribute network/application traffic across multiple servers
– Enhance server efficiency and prevent overload
– Ensure redundancy and reliability
– Perform continuous health checks
– Application Delivery Controllers (ADCs) offer advanced
functionality
– Essential for high-demand environments and high-traffic
websites
• Proxy Servers
– Act as intermediaries between clients and servers
• Provide content caching, requests filtering, and login management
– Enhance request speed and reduce bandwidth usage
– Add a security layer and enforce network utilization policies
– Protect against DDoS attacks
– Facilitate load balancing and user authentication
– Handle data encryption and ensure compliance with data
sovereignty laws
• Sensors
– Monitor, detect, and analyze network traffic and data flow
– Identify unusual activities, security breaches, and performance
issues
– Provide real-time insights for proactive network management
– Aid in performance monitoring and alerting
– Act as the first line of defense against cyber threats
• Jump Servers/Jump Box
– Secure gateways for system administrators to access devices in
different security zones
– Control access and reduce the attack surface area
– Offer protection against downtime and data breaches
– Simplify logging and auditing
– Speed up incident response during cyber-attacks
– Streamline system management and maintenance
– Host essential tools and scripts
– Monitor system health for performance and security
Port Security
• Port Security
– A network switch feature that restricts device access to specific ports based
on MAC addresses
• Enhances network security by preventing unauthorized devices from
connecting
– Network Switches
• Networking devices that operate at Layer 2 of the OSI model
• Use MAC addresses for traffic switching decisions through
transparent bridging
• Efficiently prevent collisions, operate in full duplex mode
• Remember connected devices based on MAC addresses
• Broadcast traffic only to intended receivers, increasing security
– CAM Table (Content Addressable Memory)
• Stores MAC addresses associated with switch ports
• Vulnerable to MAC flooding attacks, which can cause the switch to fail
open
– Port Security Implementation
• Associate specific MAC addresses with interfaces
• Prevent unauthorized devices from connecting
• Can use Sticky MACs for easier setup
• Susceptible to MAC spoofing attacks
– 802.1x Authentication
• Provides port-based authentication for wired and wireless networks
• Requires three roles
– Supplicant
– Authenticator
– Authentication server
• Utilizes RADIUS or TACACS+ for actual authentication
• Prevents rogue device access
– RADIUS vs. TACACS+
• RADIUS is cross-platform, while TACACS+ is Cisco proprietary
• TACACS+ is slower but offers additional security and independently
handles authentication, authorization, and accounting
• TACACS+ supports all network protocols, whereas RADIUS lacks
support for some
– EAP (Extensible Authentication Protocol)
• A framework for various authentication methods
• Has different variants which have their own features
– EAP-MD5
• Uses simple passwords and the challenge handshake
authentication process to provide remote access
authentication
• One-way authentication process
• Doesn’t provide mutual authentication
– EAP-TLS
• Uses public key infrastructure with a digital certificate
which is installed on both the client and the server
• Uses mutual authentication
– EAP-TTLS
• REquires a digital certificate on the server, but not on
the client
• The client uses a password for authentication
– EAP-FAST
• Uses protected access credential, instead of a certificate,
to establish mutual authentication
– PEAP
• Supports mutual authentication using server
certificates and
Active Directory databases to authenticate a password from the client
• EAP-LEAP
– Cisco proprietary and limited to Cisco devices
– Integration for Network Security
• Combining port security, 802.1X, and EAP enhances network security
• Ensures only authenticated and authorized devices can access
sensitive resources
Infrastructure Considerations
• Device Placement
configurations
Multi-factor Authentication
• Multi-factor Authentication (MFA)
– A security system requiring multiple methods of authentication from
independent categories of credentials
• Enhances security by creating a layered defense against unauthorized
access
– Five Categories of Authentication for MFA
• Something You Know (Knowledge-Based Factor)
– Authentication based on information the user knows, like a
password, PIN, or answers to secret questions
• Something You Have (Possession-Based Factor)
– Authentication based on physical possession of an item
• Smart card
• Hardware token (key fob)
• Software token on a device
• Something You Are (Inherence-Based Factor)
– Authentication based on biometric characteristics unique to
individuals
• Fingerprints
• Facial recognition
• Voice recognition
• Somewhere You Are (Location-Based Factor)
– Authentication based on the user’s location, determined
through IP address, GPS, or network connection
• Geographical location restrictions can be applied
– Something You Do (Behavior-Based Factor)
• Authentication based on recognizing unique patterns associated with
user behavior
– Keystroke patterns
• Device interaction
– Rarely used as a primary factor but can provide an additional
layer of security
– Authentication Types
• Single Factor Authentication
– Uses one authentication factor to access a user account
• Two Factor Authentication (2FA)
– Requires two different authentication factors to gain access
• Multi-factor Authentication (MFA)
– Uses two or more factors to authenticate a user
– MFA can involve 2, 3, 4, or 5 factors depending on the chosen
configuration
• Generally, using more authentication types makes a
system safer, but is less convenient for the end user
• Knowledge-based factors like passwords and PINs are the most
common authentication methods
– Password managers can generate different long, strong, and
complex passwords for each website or application
• Passkeys (Passwordless Authentication)
– An alternative to traditional passwords for authentication
– Involves creating a passkey secured by device authentication
methods like
fingerprint or facial recognition
• Provides a more secure and user-friendly authentication method
– Passkeys utilize public key cryptography
Password Security
• Password Security
– Measures the effectiveness of a password in resisting guessing and brute-
force attacks
• Estimates the number of attempts needed to guess a password
correctly
– Group Policy Editor for Password Policies
• Used to create password policies in Windows
• Available for local machines, and global policy orchestrator can be
used in domain environments
– Five Characteristics of Password Policies
• Password Length
– Longer passwords are harder to crack
– Strong passwords should be at least 12 to 16 characters
– Longer passwords increase security exponentially
• Password Complexity
– Combines uppercase and lowercase letters, numbers, and
special characters
– Complexity makes passwords resistant to brute force attacks
– The more character choices, the more secure the password
• Password Reuse
– Avoid using the same password for multiple accounts
– Reusing passwords increases vulnerability
• Password Expiration
– Requires users to change passwords after a specific period
• Overemphasis on expiration can lead to poor password choices
• Password Age
– Password age refers to the time a password has been in use
– Older passwords have a higher risk of being compromised
– Password Managers
• Tools for storing and managing passwords securely
• Features
– Password generation
• Password managers create unique strong passwords for
accounts to prevent reuse and enhance security
– Auto-fill
• Password managers autofill login details, sparing users
the need to recall or input information manually
– Secure sharing
• Password managers provide secure methods to share
passwords without directly disclosing the password
itself
– Cross-platform access
• Password managers offer cross-device compatibility,
allowing access to passwords from any location or
device
• Promote password complexity, prevent reuse, and offer easy access to
strong, unique passwords
– Passwordless Authentication Methods
• Provide a higher level of security and better user experience
• Methods
– Biometric Authentication
• Uses unique biological characteristics
– Hardware Token
• Generate ever-changing login codes
– One-Time Passwords (OTP)
• Sent to email or phone for one-time use
– Magic Links
• One-time links sent via email for automatic login
– Passkeys
• Rely on device screen lock for authentication
Password Attacks
• Password Attacks
– Methods used by attackers to crack or recover passwords
• Types of password attacks
– Brute Force
– Dictionary
– Password Spraying
– Hybrid
– Brute Force Attack
• Tries every possible character combination until the correct password
is found
• Effective for simple passwords but time-consuming for complex ones
• Mitigation
– Increasing password complexity and length
– Limiting login attempts
• Using multi factor authentication
– Employing CAPTCHAS
– Dictionary Attack
• Uses a list of commonly used passwords (a dictionary) to crack
passwords
• May include variations with numbers and symbols
• Effective against common, easy-to-guess passwords
• Mitigation
– Increase password complexity and length, limit login attempts,
use multifactor authentication, and employ CAPTCHAS
– Password Spraying
• A form of brute force attack that tries a few common passwords
against many usernames or accounts
• Effective because it avoids account lockouts and targets weak
passwords
• Mitigation
– Use unique passwords and implement multi-factor
authentication
– Hybrid Attack
• Combines elements of brute force and dictionary attacks
• May include variations, such as adding numbers or special characters
to passwords
• Can use a static dictionary or dynamically create variations
• Effective for discovering passwords following specific patterns
Federation
• Federation
– Links electronic identities and attributes across multiple identity
management systems
• Enables users to use the same credentials for login across systems
managed by different organizations
• Based on trust relationships between systems
• Federation extends beyond an organization’s boundaries
– Partners
– Suppliers
– Customers
• Simplifies user access to various services
• Ensures security through trust relationships between networks
– Federation Process
• Login Initiation
– User accesses a service or application and chooses to log in
• Redirection to Identity Provider
– Service Provider (SP) redirects the user to their Identity Provider (IdP) for
authentication
• Authentication of the user
– IdP validates the user’s identity using stored credentials
– Validates the user’s identity
• Generation of Assertion
– IdP creates an assertion (token) with user identity and
authentication status in a standardized format
• Return to Service Provider
– User returns to the original service or application with the
assertion from the IdP
• Verification and Access
– Service Provider verifies the assertion and grants access based
on the information it contains
• Login Complete
– User gains access to the service or application and potentially
others within the federation without additional logins
– Benefits
• Simplified user experience
• Reduced administrative overhead
• Increased security through reduced password reuse and improved
management
Assigning Permissions
• Privileges
– Define the levels of access that users have
• Local Administration Account
– High level of access
– Allows administrator to
• change system settings
• install softwares
• perform a variety of managerial tasks
• Standard User Accounts
– Can’t change system settings
– Can store files in their designated area only
– Principle of Least Privilege
• A user should only have the minimum access rights needed to
perform their job
functions and tasks, and nothing additional or extra
• Microsoft Account
– Free online account that you can use to sign in to a variety of Microsoft
services
– User Account Control (UAC)
• A mechanism designed to ensure that actions requiring administrative
rights are explicitly authorized by the user
• Access is limited to what the user needs to do a job
• Purpose is to minimize the risk of users gaining access to
administrative privileges
– Access control and permissions can also apply to groups of users
– File and Folder Permissions
• Setting permissions at the folder level applies those permissions to all
files within that folder
• In Windows, these file and folder permissions are accessed by
– Right-click on a file or folder
– Select ‘Properties’
– Navigate to the ‘Security’ tab
– Always ensure to only give out the necessary permissions
Hardware Vulnerabilities
• Hardware Vulnerabilities
– Security flaws or weaknesses in a device’s physical components or design
that can be exploited to compromise system integrity, confidentiality, or
availability
– Types of Hardware Vulnerabilities
• Firmware Vulnerabilities
– Specialized software stored on hardware devices
– Can grant attackers full control, leading to unauthorized access
or takeover
• Vulnerabilities due to insecure development, outdated practices, and overlooked
updates
– End-of-Life, Legacy, and Unsupported Systems
• End-of-life
– No updates or support from the manufacturer
• Legacy
– Outdated and superseded by newer alternatives
• Unsupported
– No official support, security updates, or patches
– Vulnerable due to the lack of patching and updates
• Unpatched Systems
– Devices, applications, or software without the latest security
patches
– Exposed to known exploits and attacks
– Risk from oversight, negligence, or challenges in updating
• Hardware Misconfigurations
– Incorrect device settings or options
– May lead to vulnerabilities, performance issues, or unintended
behavior
– Caused by oversight, lack of understanding, or deployment
errors
– Mitigation Strategies
• Hardening
– Tighten security by closing unnecessary ports, disabling
services, and setting permissions
• Patching
– Regular updates to fix known vulnerabilities in software,
firmware, and applications
• Configuration Enforcement
– Ensure devices adhere to secure configurations
• Decommissioning
– Retire end-of-life or legacy systems posing security risks
• Isolation
– Isolate vulnerable systems from the enterprise network
• Segmentation
– Divide the network into segments to limit the impact of
breaches
Zero-day Vulnerabilities
• Zero-day Vulnerabilities
– Discovered or exploited before vendors issue patches
– Zero-day Exploits
• Attacks that target previously unknown vulnerabilities
– Zero-day
• Refer to the vulnerability, exploit, or malware that exploits the
vulnerability
– Zero-Day Exploits and Value
• Zero-day exploits are significant in the cybersecurity world and can be
lucrative
• Bug bounty hunters can earn money by discovering zero-day
vulnerabilities
•Zero-days are also sold to government agencies, law enforcement, and
criminals
• Threat actors save zero-days for high-value targets, using generic
malware for initial attempts
• An up-to-date antivirus can detect known vulnerabilities’ exploitation
– Countries and nation states may stockpile zero-days for espionage and
strategic operations
password = ‘pass123’;
<question>
<ID>SECURITY-002-0001</ID>
<choice1>Option 1</choice1>
<choice2>Option 2</choice2>
</question>
• XML Exploits
– XML Bomb (Billion Laughs Attack)
• Consumes memory exponentially, acting like a denial-of-service attack
– XXE (XML External Entity) Attack
• Attempts to read local resources, like password hashes
in the shadow file
• Example
– <?xml version=“1.0” encoding=“UTF-8”?>
<foo>Some data</foo>
• Prevention
– Implement proper input validation
replaces it with his or her own machine by spoofing the original host IP
• Session Prediction
– Type of spoofing attack where the attacker attempts to predict the session
token in order to hijack the session
– Prevent these attacks by using a non-predictable algorithm to generate
session tokens
• Malicious script is used to exploit a session started on another site within the same
web browser
– Can be disguised
• Can use tags, images, and other HTML code
• Doesn’t need victim to click on a link
• Prevention
– Use user-specific tokens in all form submissions
– Add randomness and prompt for additional information
whenever a user tries to reset their password
• Require two-factor authentication
– Require users to enter their current password when changing
their password
Buffer Overflow
• Buffer Overflow Attack
– Occurs when a process stores data outside the memory range allocated by
the developer
• Common initial attack vector in data breaches
– 85% of data breaches used buffer overflow as the initial vector
• Attackers exploit the excess data written beyond buffer boundaries to manipulate
program execution
– Buffers
• Temporary storage areas used by programs to hold data
• They have a defined memory capacity, just like a glass holding a
limited amount of water
• Overflowing a buffer results in data spilling into adjacent memory
locations, causing unintended consequences
– Technical Aspects
• Stack
– Programs have a reserved memory area called a stack to store
data during processing
• The stack uses a “first in, last out” organization
• Stack contains return addresses when a function call instruction is
received
• Attackers aim to overwrite the return address with their malicious
code’s address
– Smashing the Stack
• Attackers aim to overwrite the return address with a pointer to their
malicious code
• When the non-malicious program hits the modified return address, it
runs the attacker’s code
• This gives attackers a command prompt on the victim’s system for
remote code execution
– NOP Slide
• Attackers fill the buffer with NOP (No-Operation) instructions
• The return address slides down the NOP instructions until it reaches
the attacker’s code
• Mitigations against Buffer Overflow Attack
– Address Space Layout Randomization (ASLR)
• Helps prevent attackers from guessing return pointer addresses
– Randomizes memory addresses used by well-known programs,
making it harder to predict the location of the attacker’s code
Race Conditions
• Race Conditions
– Software vulnerabilities related to the order and timing of events in
concurrent processes
• Exploiting race conditions allows attackers to disrupt intended
program behavior and gain unauthorized access
– Understanding Race Conditions
• Race conditions occur when multiple threads or processes access and
manipulate shared resources simultaneously
• Dereferencing
– Software vulnerability that occurs when the code attempts to
remove the relationship between a pointer and the thing that
the pointer was pointing to in the memory which allows
changes to be made
• Vulnerabilities stem from unexpected conflicts and synchronization
issues
– Exploiting Race Conditions
• Attackers exploit race conditions by timing their actions to coincide
with vulnerable code execution
• Exploitation may lead to unauthorized access, data manipulation, or
system crashes
• Dirty COW Exploit
– A real-world example of race condition exploitation
• Targeted Linux and Android systems, leveraging race conditions in
the Copy On Write function
– Types of Race Conditions
• Time-of-Check (TOC)
– Attackers manipulate a resource’s state after it is checked but
before it is used
– For example, overdrawing a bank account due to a time delay
between checking and transferring funds
• Time-of-Use (TOU)
– Attackers alter a resource’s state after it is checked but before
it is used
– Focuses on the time when the resource is utilized, rather than
the time of the initial check
• Time-of-Evaluation (TOE)
– Attackers manipulate data or resources during the system’s
decision-making or evaluation process
– Can lead to incorrect results or unexpected behavior
– Mitigating Race Conditions
• Use locks and mutexes to synchronize access to shared resources
– Mutex
• Mutually exclusive flag that acts as a gatekeeper to a
section of code so that only one thread can be processed
at a time
• Mutexes ensure only one thread or process can access a
specific section of code at a time
• Properly design and test locks to prevent deadlocks
• Deadlock
– Occurs when a lock remains in place because the process it’s waiting for is
terminated, crashes, or doesn’t finish properly, despite the processing being
complete
Malicious Activity
Objective 2.4: Given a scenario, you must be able to analyze indicators of malicious activity
Malicious Activity
• Malicious Activity
– Constantly evolving threats in the digital age
• Concerns
– Cyber attacks, increasing in frequency and sophistication
• Purpose
– Delve into cyber threats, types, mechanisms, and impacts
– Understanding Cyber Threats
• Importance
– First step to effective prevention and mitigation
• Insights
– Tactics, techniques, and procedures employed by
cybercriminals
– Distributed Denial of Service (DDoS) Attacks
• Variants
– Denial of Service
– Amplified DDoS
– Reflected DDoS
– Domain Name Server (DNS) Attacks
• Types
– DNS Cache Poisoning
– DNS Amplification
– DNS Tunneling
• Domain Hijacking
– DNS Zone Transfer
– Directory Traversal Attacks
• Exploiting insufficient security validation of user-supplied input file
names
– Privilege Escalation Attack
• Exploiting system vulnerability to gain elevated access
– Replay Attacks
• Malicious or fraudulent repeat/delay of a valid data transmission
– Session Hijacking
• Attacker takes over a user session to gain unauthorized access
– Malicious Code Injection Attacks
• Introduction of harmful code into a program or system
– Indicators of Compromise (IoC)
• Examples
– Account lockout
– Concurrent session usage
– Blocked content
– Impossible travel
– Resource consumption
– Inaccessibility
– Out-of-cycle logging
– Published documents indicating hacking
– Missing logs
Replay Attacks
• Replay Attacks
– Type of network-based attack where valid data transmissions are maliciously
or fraudulently re-broadcast, repeated, or delayed
• Involves intercepting data, analyzing it, and deciding whether to
retransmit it later
• Different from a Session Hijack
– In a Session Hijack, the attacker alters real-time data
transmission
– In a Replay Attack, the attacker intercepts the data and then
can decide later whether to retransmit the data
– Applications of Replay Attacks
• Not limited to banking; can occur in various network transmissions
– Email
– Online shopping
– Social media
• Common in wireless authentication attacks, especially with older
encryption
protocols like WEP (Wired Equivalent Privacy)
• Credential Replay Attack
– Specific type of replay attack that Involves capturing a user’s login
credentials during a session and reusing them for unauthorized access
– Preventing Replay Attacks
• Use session tokens to uniquely identify authentication sessions
• Session tokens are generated for each session, making it challenging
for attackers to replay sessions
• Implement multi-factor authentication to require additional
authentication factors, making replay more difficult
• By using multi-factor authentication, attackers lack the necessary
additional information to replay login sessions
• Implement security protocols like WPA3 (Wi-Fi Protected Access 3) to
mitigate replay attack threats
Session Hijacking
• Session Management
– Fundamental security component in web applications
• Enables web applications to uniquely identify a user across a number
of different actions and requests, while keeping the state of the data
generated by the user and ensuring it is assigned to that user
– Cookie
• Text file used to store information about a user when they visit a
website
• Cookies must be protected because they contain client information
that is being transmitted across the Internet
• Session cookies
– Non-persistent, reside in memory, and are deleted when the browser
instance is closed
• Persistent Cookies
– Cookies that are stored in the browser cache until they are
deleted by the user or pass a defined expiration date
– Cookies should be encrypted if they store confidential
information
– Session Hijacking
• A type of spoofing attack where the attacker disconnects a host then
replaces it with his or her own machine, spoofing the original host’s IP
address
• Session hijacking attacks can occur through the theft or modification
of cookies
– Session Prediction Attacks
• A type of spoofing attack where the attacker attempts to predict the
session token to hijack a session
• A session token must be generated using a non-predictable algorithm
and it must not reveal any information about the session client
– Cookie Poisoning
• Modifies the contents of a cookie after it has been generated and sent
by the web service to the client’s browser so that the newly modified
cookie can be used to exploit vulnerabilities in the web app
On-path Attacks
• On-Path Attack
– An attack where the attacker positions their workstation logically between
two hosts during communication
• The attacker transparently captures, monitors, and relays
communications
between those hosts
• Methods for On-Path Attacks
– ARP Poisoning
• Manipulating Address Resolution Protocol (ARP) tables to redirect
network traffic
• DNS Poisoning
– Altering DNS responses to reroute traffic
• Rogue Wireless Access Point
– Creating a fake wireless access point to intercept traffic
• Rogue Hub or Switch
– Introducing a malicious hub or switch to capture data on a
wired network
– Replay Attack
• Occurs when an attacker captures valid data and then replays it
immediately or with a delay
• Common in wireless network attacks; can also be used in wired
networks
– Relay Attack
• The attacker becomes part of the conversation between two hosts
• Serves as a proxy and can read or modify communications between
the hosts
• Any traffic between the client and server goes through the attacker
– Challenges with Replay and Relay
• Encryption can make interception and crafting communication
difficult
• Strong encryption schemes like TLS 1.3 can pose significant
challenges for attackers
• Techniques like SSL stripping may be used to downgrade encryption to an
unsecured connection
– SSL Stripping
• An attack that tricks the encryption application into presenting an
HTTP connection instead of HTTPS
– Enables attackers to capture unencrypted data when the user
believes they are using a secure connection
– Downgrade Attack
• An attacker forces a client or server to abandon a higher security
mode in favor of a lower security mode
• Scope of Downgrade Attacks
– Downgrade attacks can be used with various encryption and
protection methods, including Wi-Fi and VPNs
– Any situation where a client agrees to a lower level of security
that is still backward compatible can be vulnerable to a
downgrade attack
Injection Attacks
• Lightweight Directory Access Protocol (LDAP)
– An open, vendor-neutral, industry standard application protocol for
accessing and maintaining distributed directory information services over an
Internet Protocol network
– LDAP Injection
• An application attack that targets web-based applications by
fabricating LDAP statements that are typically created by user input
• Use input validation and input sanitization as protection against an
LDAP injection attack
• Command Injection
– Occurs when a threat actor is able to execute arbitrary shell commands on a
host via a vulnerable web application
– Process Injection
• Method of executing arbitrary code in the address space of a separate
live process
• There are many different ways to inject code into a process
– Injection through DLLs
– Thread Execution Hijacking
– Process Hollowing
– Process Doppel Ganging
– Asynchronous Procedure Calls
– Portable Executable Injections
• Mitigation includes
– Endpoint security solutions that are configured to block
common sequences of attack behavior
– Security Kernel Modules
– Practice of Least Privilege
Hardening
Objectives:
• 2.5 - Explain the purpose of mitigation techniques used to secure the enterprise
• 4.1 - Given a scenario, you must be able to apply common security techniques to
computing resources
• 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance
security
Hardening
• Hardening
– Process of enhancing system, application, or network security
• Measures
– Apply security patches, configure access controls, disable
unnecessary services
• Purpose
– Strengthen overall security posture and resilience against
cyberattacks
– Study Topics
• Default Configurations
– Definition and identification of default configurations
– Changing default passwords, open ports, and insecure
configurations
• Restricting Applications
– Application restriction approach
– Allow listing, blocking unauthorized software
• Disabling Unnecessary Services
– Identifying unnecessary services
• Risks and consequences of running unnecessary services
– Disabling unnecessary services to reduce the attack surface
• Trusted Operating Systems
– Definition and characteristics of trusted operating systems
– Rigorous security evaluations and certifications
• Updates and Patches
– Understanding updates vs. patches
– Importance of regular software updates
– Systematic process of patch management
• Group Policies
– Role of Group Policies in Windows environments
– Central management and control of user and computer settings
• SELinux (Security-Enhanced Linux)
– Role and implementation of SELinux
– Mandatory access controls for enhanced security
• Data Encryption Levels
– Different levels of data encryption
• Full-disk
• Partition
• File
• Volume
• Database
• Record Level Encryption
• Secure Baselines
– Definition and purpose of secure baselines
– Establishing a secure starting point for minimizing security
risks
Restricting Applications
• Least Functionality
– Involves configuring systems with only essential applications and services
• Least functionality aims to provide only the necessary applications
and services
• Unneeded applications should be restricted or uninstalled to reduce
vulnerabilities
• Over time, personal computers accumulate unnecessary programs
– Managing Software
• Keeping software up-to-date is crucial for security
• New programs may be installed without removing old versions
• Large networks require preventive measures to control excessive
installations
• Creating Secure Baseline Images
– Secure baseline images are used to install new computers
• Images include the OS, minimum required applications, and strict
configurations
• These images should be updated based on evolving business needs
– Preventing Unauthorized Software
• Unauthorized software installation poses security risks
• Application allowlisting and blocklisting are used to control which
applications can run on a workstation
– Application Allowlisting
• Only applications on the approved list are allowed to run
• All other applications are blocked from running
• Similar to an “Explicit Allow” statement in access control
– Application Blocklisting
• Applications placed on the blocklist are prevented from running
• All other applications are permitted to run
• Any application on the blocklist is denied
– Choosing Between Allowlisting and Blocklisting
• Allowlisting is more secure, as everything is denied by default
• Managing allowlists can be challenging as updates require list
adjustments
• Blocklisting is less secure, as everything is allowed except what’s
explicitly denied
• Managing blocklists can be difficult, as every new program variation
would be allowed until a rule is created
– Centralized Management
• Microsoft Active Directory domain controllers allow centralized
management of lists
• Group policies can be used to deploy and manage allowlists and
blocklists across
workstations in a network
Patch Management
• Patch Management
– Planning, testing, implementing, and auditing of software patches
– Important for compliance
– Four Step Process
• Planning
– Creating policies, procedures, and systems to track and verify
patch compatibility
– A good patch management tool confirms patch deployment,
installation, and functional verification on servers or clients
• Testing
– Do this to prevent the patch from causing additional problems
• Implementing
– Deploy to all devices that need it
– Can be done manually or automated
• Large organizations should use a central update server instead of Windows Update
or other tool
– Mobile devices can be patched using an MDM
• Patch Rings
– Implement patches one group (or ring) at a time
• Auditing
– Scan network to ensure the patch was installed correctly
– Determine if there are any unexpected problems as a result of
the patch
– Firmware versions should also be monitored and patched
• Companies will have centralized resources to help keep firmware
patched
Group Policies
• Group Policy
– A set of rules and policies that can be applied to users or computer accounts
within an operating system
– Accessing Group Policy Editor
• Access the Group Policy Editor by entering “gpedit” in the run prompt
• The local Group Policy Editor is used to create and manage policies
within a Windows environment
– Group Policies Overview
• Each policy acts as a security template applying rules such as
– Password complexity requirements,
– Account lockout policies
– Software restrictions
– Application restrictions
• In a Windows environment with an Active Directory domain
controller, you have
access to an advanced Group Policy Editor
• Security Templates
– A group of policies that can be loaded through one procedure
• In corporate environments, create security templates with predefined
rules based on administrative policies
• Security Template
– A group of policies that can be loaded through the Group Policy
Editor
• Group Policy Objective (GPO)
– Used to harden the operating system and establish secure
baselines
– Baselining
• A process of measuring changes in the network, hardware, or
software environment
• Helps establish what “normal” is for the organization
• Identifies abnormal or deviations for investigation
– Group Policy Editor in Windows
• Access the Group Policy Editor by entering “gpedit” in the run prompt
• Create allow or block list rules for application control policies
• Creating a Rule in Group Policy Editor
– Launch the Group Policy Editor
• Navigate to “Computer Configuration” > “Windows Settings” >
“Security Settings”
> “Application Control Policies” > “App Locker”
• Create an executable rule
– Choose to allow or deny
• Select who the rule applies to (e.g., everyone)
• Define the rule based on conditions like publisher, path, or file hash.
• Specify the path to be blocked (e.g., the temp directory)
– Name the rule and provide a description
• Decide whether to create default rules (allow or deny) and save the
policy
• Deploy the policy across the environment for system hardening
– Rules in Group Policy Editor
• Allow Rules (Default)
– Allow files in the “Program Files” directory to launch
– Allow files in the “Windows” folder to launch
– Allow administrators to launch any file
• Deny Rule (Custom)
– Block all files from running in the “temp directory”
– By following these steps, you can establish a secure baseline for your
Windows systems, improving overall security and policy management
SELinux
• SELinux and MAC Basics
– SELinux (Security Enhanced Linux)
• A security mechanism that provides an additional layer of security for
Linux distributions
– Enforces Mandatory Access Control (MAC)
• Mandatory Access Control (MAC)
– Restricts access to system resources based on subject
clearance and object labels
• Context-based permissions
– Permission schemes that consider various properties to
determine whether to grant or deny access to a user
• Two main context-based permission schemes in Linux that use MAC
– SELinux
• AppArmor
• DAC vs. MAC
– DAC (Discretionary Access Control)
• Each object has a list of entities that are allowed to
access it
• Allows object owners to directly control access using
tools like ‘chown’ and ‘chmod’
– SELinux relies on MAC for permissions and access control, not
DAC
– SELinux
• The default context-based permission scheme in CentOS and Red Hat
Enterprise Linux created by NSA
• Used to enforce MAC on processes and resources
• Enables information to be classified and protected
• Enhances file system and network security, preventing unauthorized
access, security breaches, and execution of untrustworthy programs
– Three Main Contexts in SELinux
• User Context
– Defines which users can access an object, including common
contexts like ‘unconfined_u,’ ‘user_u,’ ‘sysadm_u,’ and ‘root’
• Role Context
– Determines which roles can access an object, using ‘object_r’
for files and directories
• Type Context
– Essential for fine-grained access control, grouping objects with
similar security characteristics
• Optional Context
– Level Context
• Describes the sensitivity level of a file, directory, or process
– Known as a multi-level security context, allowing further
access control refinement
– SELinux Modes
• Disabled Mode
– Turns off SELinux, relying on default DAC for access control
• Enforcing Mode
– Enforces all SELinux security policies, preventing policy
violations
• Permissive Mode
– Enables SELinux but doesn’t enforce policies, allowing
processes to bypass security policies
• SELinux Policies
– SELinux Policy
• Describes access permissions for users, programs, processes, files, and
devices
• Two Main Policy Types
– Targeted Policies
• Only specific processes are confined to a domain, while
others run unconfined
– Strict Policies
• Every subject and object operates under MAC, but it’s
more complex to set up
• Violation Messages
– SELinux captures violation messages in an audit log
• Violations can occur when someone tries to access an unauthorized
object, or an action contradicts an existing policy
– Policy Configuration
• Initial SELinux setup may result in false violations, requiring policy
tweaking and fine-tuning
• Strong security depends on creating effective restricted profiles and
hardening applications to prevent malicious attacks
Secure Baselines
• Secure Baseline
– Standard set of security configurations and controls applied to systems,
networks, or applications to ensure a minimum level of security
• Helps organizations maintain consistent security postures and
mitigate common vulnerabilities
– Establishing a Secure Baseline
• The process begins with a thorough assessment of the system,
network, or application that requires protection
• Identify the type of data involved, understand data workflows, and
evaluate potential vulnerabilities and threats
• Best practices, industry standards, and compliance requirements (e.g.,
ISO
27001, NIST SP 800-53) are used as starting points for defining the secure baseline
• Create a secure baseline configuration by securing the operating system on a
reference device (e.g., a laptop)
– Configuring a Secure Baseline
• Install, update, configure, and secure the operating system on the
reference device
• Check the device against baseline configuration guides and scan for
known vulnerabilities or misconfigurations
• Install required applications (e.g., Microsoft Office suite, endpoint
detection and response agents)
• Scan for vulnerabilities in the installed applications and remediate
them
• Create an image of the reference device as the “known good and
secure baseline”
– Deployment
• Configure firewalls, set up user permissions, implement encryption
protocols, and ensure antivirus and anti-malware solutions are
properly installed and updated
• Use automated tools and scripts to ensure consistent application of
the secure baseline across devices
• In a Windows environment, Group Policy Objects (GPO) can be used
to dictate policies, user rights, and audit settings
• In cloud environments (e.g., AWS), services like AWS Config are
employed to define and deploy secure configurations
– Maintenance
• Lock down systems to prevent unauthorized software installation or
configuration changes
• Regular audits, monitoring, and continuous assessment are required to keep the
baseline up-to-date
– Continuous monitoring tools help identify deviations from the baseline and
trigger alerts for immediate remediation
• Periodically review and update the secure baseline to adapt to
changes in organizational infrastructure, business needs, and
emerging threats
– Employee Training and Awareness
• Conduct training sessions to educate employees about the importance
of adhering to secure baseline configurations
• Raise awareness about the potential risks of deviating from the
baseline
• Encourage employees to report any suspicious activities they notice
when using their systems
Security Techniques
Objectives:
• 4.1 - Given a scenario, you must be able to apply common security techniques to
computing resources
• 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance
security
Security Techniques
• Security Techniques
– Protecting digital assets from evolving cyber threats
• Scope
– Traditional to advanced security techniques
– Study Topics
• Wireless Infrastructure Security
– Significance of wireless networks
– Challenges and security considerations
• Wireless Security Settings
– WPA3, AAA/RADIUS, Cryptographic protocols
– Authentication protocols in wireless security
• Application Security
– Input validation, secure cookies
– Static and dynamic code analysis
– Code signing and sandboxing
• Network Access Control (NAC)
– Purpose and functionality of NAC
• Policy enforcement on devices and users
– Web and DNS Filtering
• Agent-based web filters, centralized proxy
– URL scanning, content categorization, block rules
– Reputation-based filtering
• Email Security
– DMARC, DKIM, SPF protocols
– Gateway protocol and spam filtering techniques
• Endpoint Detection and Response (EDR)
– Continuous monitoring of endpoint devices
– Identifying, investigating, and preventing cyber threats
• User Behavior Analytics (UBA)
– Leveraging machine learning and data analytics
– Identifying potentially harmful activities
– Detection of anomalies or deviations
• Selecting Secure Protocols
– Protocol selection, port selection
– Transport method selection
Application Security
• Application Security
– Focuses on building secure applications
• Aims to prevent, detect, and remediate security vulnerabilities
– Six Key Areas in Application Security
• Input Validation
– Ensures that applications process well-defined, secure data
– Guards against attacks exploiting data input vulnerabilities
(e.g., SQL injection, XSS, buffer overflows)
– Serves as a kind of quality control for data to ensure that every
piece of information is valid, secure, and correctly formatted
– Validation Rules
• Delineate acceptable and unacceptable inputs
– Validates data early in the process (front-end validation)
– Used with additional tools for defense in-depth
• Secure communication protocols
• Regular security auditing
• Implementing proper error handling
• Cookies
– Small data pieces stored by web browsers
– Maintain stateful information between the server and client
– Secure Cookies
• Secure cookies are transmitted over HTTPS for
enhanced security
• Best practices
– Refraining from persistent cookies for session verification
• Enabling the Secure attribute
– Enabling HttpOnly attribute
• Configuring the SameSite attribute
• Static Code Analysis (SAST)
– A method of debugging an application by reviewing and
examining its source code before running the program
– Identifies issues like buffer overflows, SQL injection, and XSS
– Important for proper input validation in both front-end and
back-end code
• Dynamic Code Analysis (DAST)
– Analyzes applications while they run
– Common methods of DAST
• Fuzzing (Fuzz Testing)
– Inputs random data to provoke crashes or
exceptions
– Helps uncover security flaws and weaknesses
• Stress Testing
– Evaluates system stability and reliability under
extreme conditions
– Reveals bottlenecks and assesses system
recovery
• Code Signing
– Confirms the software author’s identity and integrity
– Utilizes digital signatures to verify code authenticity
– Protects against code tampering but doesn’t guarantee absence
of vulnerabilities
• Sandboxing
– Isolates running programs, limiting their access to resources
• Prevents harmful actions on the host device or network
– Used to execute untrusted or untested programs securely
Email Security
• Email Security
– Encompasses techniques and protocols to protect email content, accounts,
and infrastructure from unauthorized access, loss, or compromise
– Key email security techniques
• DKIM (DomainKeys Identified Mail)
– Allows the receiver to verify the source and integrity of an
email by adding a digital signature to the email headers
– The recipient server validates the DKIM signature using the
sender’s public cryptographic key in the domain’s DNS records
– Benefits
• Email authentication
• Protection against email spoofing
• Improved email deliverability
• Enhanced reputation score
• SPF (Sender Policy Framework)
– Prevents sender address forgery by verifying the sender’s IP
against authorized IPs listed in the sender’s domain DNS
records
– A receiving server checks if the sender’s IP is authorized in the
SPF record
before accepting the email
• Benefits
– Preventing email spoofing
• Improving email deliverability
– Enhancing the domain’s reputation
• DMARC (Domain-based Message Authentication, Reporting and
Conformance)
– DMARC detects and prevents email spoofing by setting policies
for email sending and handling failures
– DMARC can work with DKIM, SPF, or both
– Implementation helps protect against
• Business email compromise attacks
• Phishing
• Scams
• Cyber threats
• Email Gateway Protocol Configuration
– Email gateways serve as entry and exit points for emails,
facilitating secure and efficient email transmission
– They use SMTP (Simple Mail Transfer Protocol) to send and
receive emails
– Email gateways handle email routing, email security, policy
enforcement, and email encryption
– Email Gateway Deployment Options
• On-Premises Email Gateway
– A physical server located within an
organization’s premises, offering full control but
requiring maintenance and updates
• Cloud-Based Email Gateway
– Hosted by third-party cloud service providers, providing scalability but
limited control over configurations
• Hybrid Email Gateway
– Combines on-premises and cloud-based gateways for a balance
between control and convenience
– Spam Filtering
• Spam filtering detects and prevents unwanted and unsolicited emails
from reaching users’ inboxes
• Techniques
– Content analysis
– Bayesian filtering
– DNS-based sinkhole list
– Email filtering rules
• Emails with spam-like keywords are flagged and often moved to the
spam folder
Vulnerability Management
Objective 4.3: Explain various activities associated with vulnerability management
Vulnerability Management
• Vulnerability Management
– Systematic process for identifying, evaluating, prioritizing, and mitigating
vulnerabilities
• Goals
– Maintain secure and resilient cybersecurity posture, minimize
security breaches, and manage risk effectively
– Study Topics
• Identifying Vulnerabilities
– Recognizing weaknesses in systems, applications, and
networks
– Critical first step for building a robust security posture
• Threat Intelligence Feeds
– Provide essential information on emerging threats
– Proactive identification and mitigation of vulnerabilities
• Responsible Disclosure Programs
– Framework for ethical reporting of discovered vulnerabilities
– Fostering collaboration between security researchers and
organizations
• Analyzing Vulnerabilities
– Evaluating severity and potential impact
– Prioritizing remediation efforts effectively
• Vulnerability Scans
– Employing scanning tools and methodologies
• Systematically searching for vulnerabilities
• Assessing Scan Results
– Comprehensive analysis of gathered data
– Determining vulnerabilities requiring immediate attention
• Responding and Remediating
– Developing effective response strategies
– Promptly addressing and reducing exposure to potential
threats
• Validating Remediation
– Ensuring remediation actions effectively mitigate
vulnerabilities
– Confirming the security of systems
• Vulnerability Reporting
– Communicating findings and remediation progress
– Maintaining transparency and facilitating decision-making
Identifying Vulnerabilities
• Identifying Vulnerabilities
– Systematic practice of recognizing and categorizing weaknesses in systems,
networks, or applications that could be exploited
• This process is crucial for enhancing system security, preventing
unauthorized access, and protecting the integrity of an organization’s
data and systems
– Methods for Identifying Vulnerabilities
• Vulnerability Scanning
– Automated probing of systems, networks, and applications to
discover potential vulnerabilities
• Tools like Nessus and OpenVAS are used to analyze the current state of systems
against a database of known vulnerabilities
– Prioritize identified vulnerabilities, apply patches, and implement mitigation
measures to prevent exploitation
• Application Security
– Protecting software from manipulation during its lifecycle
– Techniques include static analysis, dynamic analysis, and
package monitoring for custom software applications
– Static analysis examines the source code without execution to
identify vulnerabilities
– Dynamic analysis evaluates applications in real-time to detect
vulnerabilities
– Package monitoring ensures the security and updates of
libraries and components that applications depend on
• Penetration Testing
– Simulates real-world attacks on systems to evaluate their
security
– Examining penetration test results to understand how systems
were infiltrated or exploited
– Mitigate identified issues to prevent similar attack vectors
from being used by attackers
• System and Process Audits
– Comprehensive reviews of information systems, security
policies, and procedures
– Ensures adherence to security best practices and industry
standards
• The Four-Step Process for Identifying Vulnerabilities
– Planning
• Establish policies, procedures, and mechanisms to systematically
track and evaluate vulnerabilities
– Determine how vulnerability testing will be conducted and
fixes deployed
• Testing
– Evaluate patches and updates in a controlled environment
before deploying them across the entire enterprise network
– Verify that solutions to mitigate vulnerabilities do not
introduce new issues
• Implementation
– Deploy patches and updates across devices and applications
– Applies to small and large networks to mitigate identified
vulnerabilities
• Auditing
– Ensure that security patches and configuration changes have
been implemented effectively
– Verify that no issues have arisen after the implementation of
changes
Analyzing Vulnerabilities
• Vulnerability Confirmation
– Determining the accuracy of identified potential security weaknesses
• True Positive
– Real and exploitable vulnerability correctly identified
– False Positive
• Incorrectly stated vulnerability
• True Negative
– Correctly identifies the absence of a vulnerability
• False Negative
– Serious finding – vulnerability exists but remains undetected
– Prioritizing Vulnerabilities
• Ranking identified vulnerabilities by severity and potential impact
• Factors include ease of exploitation, potential damage, system
importance
• Use scoring systems like Common Vulnerability Scoring System
(CVSS)
• Ensure focus on the most critical security threats
– Classifying Vulnerabilities
• Categorizing vulnerabilities based on type, potential impact, and
affected
systems
• Streamlines management and response efforts
– Vulnerabilities might be classified into categories such as
• Software flaws
– Configuration errors
– Security policy gaps
• CVE (Common Vulnerabilities and Exposures)
– System that provides a standardized way to uniquely identify
and reference known vulnerabilities in software and hardware
– Provides solutions and mitigation strategies
– Help assess security and prioritize vulnerability fixes
– Organizational Impact of Vulnerabilities
• Assessing potential impact on confidentiality, integrity, and
availability
• Consider industry-specific impact
• Impact on reputation, business continuity, regulatory fines, customer
trust
– Exposure Factor (EF)
• A quantifiable metric to estimate the percentage of asset damage
• Helps understand potential loss due to vulnerability exploitation
• Supports qualitative risk management in the organization
– Risk Tolerance
• The level of risk an organization is willing to accept
• Determines the urgency of vulnerability remediation
• High risk tolerance may allow monitoring of certain vulnerabilities
• Low risk tolerance may require swift remediation of even minor
vulnerabilities
• Alignment of vulnerability management with overall business
strategies and objectives
Vulnerability Reporting
• Vulnerability Reporting
– Process of documenting and communicating security weaknesses in software
or systems to individuals and organizations responsible for addressing the
issues
• Reports should use clear, concise, and transparent language
• Confidentiality is crucial to prevent exploitation, reputation damage,
and legal repercussions
• Internal Reporting
– First line of defense in vulnerability management within the organization
• Identifying, documenting, and communicating vulnerabilities within
the organizational structure
• Information remains internal
• Timely reporting reduces exposure to unpatched vulnerabilities
• Establish clear communication paths and protocols
– External Reporting
• Reporting vulnerabilities outside the organization, involving vendors,
partners, customers, or the public
• Coordinating with vendors to address vulnerabilities for the benefit of
all customers
• Sharing non-sensitive details with databases like CVE or vendor
knowledge bases
• Respect privacy when discussing vulnerabilities with external
organizations
– Responsible Disclosures
• Ethical and judicious disclosure to affected stakeholders before public
announcement
• Collaborate with the entity responsible for the vulnerability (e.g.,
software developer)
• Consider bug bounty programs
• Give vendors time to address the issue before public disclosure
• Provide detailed reports, including methods used to exploit
vulnerabilities and recommended mitigations
– Importance of Confidentiality
• Confidentiality is non-negotiable to prevent exploitation
• Vulnerability reports are valuable maps for attackers
• Encrypt reports and use secure storage
– Share reports on a need-to-know basis
• Consider executive summaries for non-technical stakeholders
• Breaching confidentiality can lead to exploitation, reputation damage,
and legal repercussions
Monitoring Resources
• Monitoring Systems
– Involves observing a computer system’s performance, including
• CPU
– Memory
– Disk usage
– Network performance
• Baseline
– A reference point representing normal system behavior under typical
operating conditions
• Baseline metrics can include CPU usage, memory utilization, disk
activity, and network traffic
• Deviations from the baseline can indicate potential issues, prompting
proactive troubleshooting and maintenance
– Application Monitoring
• Focuses on managing and monitoring software application
performance and availability
• Tracks errors, bottlenecks, and issues that may affect an application’s
performance or user experience
• Tools like New Relic and AppDynamics track response times and
error rates
• Slower response times may indicate code problems or resource
deficiencies
– Infrastructure Monitoring
• Observes physical and virtual infrastructure, including servers,
networks, virtual machines, containers, and cloud services
• Provides insights into network traffic, bandwidth usage, and device
status
• Tools like SolarWinds and PRTG Network Monitor help monitor
network infrastructure
• Overloaded network switches can signal the need for additional
capacity or configuration issues
Incident Response
Objective 4.8: Explain appropriate incident response activities
Incident Response
• Incident Response
– Systematic approach to managing and mitigating security incidents
• Goals
– Minimize impact
– Reduce detection and containment time
– Facilitate recovery
• Key Steps
– Detection
– Classification
– Containment
– Eradication
– Evidence preservation
– Communication
– Lessons learned
– Study Topics
• Incident Response Process
– Steps
• Preparation
• Detection
• Analysis
• Containment
• Eradication
– Recovery
• Lessons Learned
• Threat Hunting
– Proactive cybersecurity approach for continuous threat
identification
– Purpose
• Identify hidden or emerging threats
• Root Cause Analysis
– Systematic process to investigate incidents and identify
underlying factors
– Purpose
• Understand the cause of security breaches or
operational issues
• Incident Response Training and Testing
– Methods
• Tabletop Exercises
• Simulations
• Drills
• Live Exercises
– Purpose
• Prepare personnel and systems for effective incident
response
• Digital Forensic Procedures
– Systematic techniques to gather, analyze, and preserve digital
evidence
– Purpose
• Investigate cybercrimes or security incidents
• Data Collection Procedures
– Established methods for gathering relevant information during
incident response
• Concept
– Order of volatility (prioritizing data collection based on volatility)
• Disk Imaging and Analysis
– Creating a bit-by-bit copy (image) of a storage device,
examining content
– Purpose
• Recover data
• Investigate incidents
• Identify security issues
Threat Hunting
• Threat Hunting
– Proactive cybersecurity technique to detect threats that haven’t been
discovered by normal security monitoring
• Involves actively seeking out potential threats within your network,
as opposed to waiting for them to trigger alerts
– Steps in Threat Hunting
• Establishing a Hypothesis
– Conduct threat modeling to identify potential threats with high
impact
– Use threat intelligence to form hypotheses about threat actors
or campaigns that may target your organization
• Profiling Threat Actors and Activities
– Create scenarios to understand how attackers might attempt
an intrusion
– Determine the type of threat actor (insider, hacktivist, criminal,
nation
state)
• Identify their objectives and potential targets
– Threat Hunting Process
• Utilizes security monitoring and incident response tools
– Analyzes logs, system data, file systems, and registry
information
– Focuses on finding threats not detected by existing rules
– Start by assuming that the current rules haven’t flagged
potential threats
– Seeks new tactics, techniques, and procedures used by threat
actors
– Key Considerations
• Threat hunters must stay updated on the latest attacks and threats
• Use advisories and bulletins published by vendors and researchers to
identify new TTPs and vulnerabilities
• Utilize intelligence fusion and threat data, combining SIEM logs with
real-world threat feeds
– Benefits of Threat Hunting
• Improves detection capabilities by identifying threats that bypass
existing defenses
• Enhances threat intelligence by correlating external threat feeds with
internal logs
• Provides actionable intelligence to strengthen security measures
Investigating an Incident
• Data Sources for Incident Investigation
– Dashboards and Automated Reports
• Purpose
– Provide high-level insights
– Role
• Initial overview of the security landscape
• Vulnerability Scans
– Purpose
• Identify system vulnerabilities
– Role
• Foundation for understanding potential entry points
• Packet Captures
– Purpose
• Capture and analyze network traffic
– Role
• Reveal communication patterns and potential threats
• Logs (Various Types)
– Firewall Logs
• Monitor network traffic, detect unauthorized access
• Application Logs
– Record application-specific events, identify abnormal behavior
• Endpoint Logs
– Capture activities on individual devices
– OS-Specific Security Logs
• Monitor operating system security events
– IPS and IDS Logs and Alerts
• Track intrusion attempts and system compromises
– Network Logs
• Record network activities and connections
– Metadata
• Provide contextual information about other data
sources
Investigative Data
• SIEM (Security Information and Event Monitoring System)
– Real-time analysis of security alerts from applications and network hardware
• Combination of different data sources into one tool
• Provides a consolidated view of network activity
• Allows for trend analysis, alert creation, and correlation of data
• Considerations
– Sensors
– Sensitivity
– Trends
– Alerts
– Correlation
• Log Files
– Records events and messages in operating systems, software, and network
devices
• Includes network, system, application, security, web, DNS,
authentication, dump files, VoIP, and call managers
– Syslog, Rsyslog, Syslog-ng
• Tools for centralizing log data from different systems into a repository
• Commonly used to feed data into SIEM
– JournalCTL
• Linux command-line utility for querying and displaying logs from the
Journal Daemon (SystemD’s logging service)
– NXLog
• Multi-platform, open-source log management tool
• Identifies security risks and analyzes logs from server, OS, and
applications
– NetFlow
• Network protocol for collecting active IP network traffic data
• Provides information on source, destination, volume, and paths
– SFlow (Sampled Flow)
• Open-source alternative to NetFlow
• Exports truncated packets and interface counter for network
monitoring
– IPFIX (Internet Protocol Flow Information Export)
• Universal standard for exporting IP flow information
• Used for mediation, accounting, and billing by defining data format for
exporters and collectors
– Metadata
• Data that describes other data
• Useful for understanding details about events, calls, emails, web visits, and files
during investigations
– Use Cases for Metadata
• Email
– Analyze metadata for phishing campaigns
– Mobile
• Review data transfer, call duration, and contacts
• Web
– Determine website visits and user behavior
• File
– Examine file details, such as creation time and viewer statistics
Dashboards
• Dashboards
– Graphical displays of information across multiple systems
– Single Pane of Glass
• A single screen for analysts to access everything across the
organization
– Splunk
• A big data platform for ingesting various types of data, including
security and incident response data
• Collects data from firewalls, applications, endpoints, operating
systems, intrusion detection systems, intrusion prevention systems,
antivirus software, and networks
– Dashboards help analyze trends over time and inform actions
– Use the dashboard as a central starting point for investigations and incident
response
Automated Reports
• Automated Reports
– Generated by computer systems to provide information about various
aspects of a network’s security
• Common sources are antivirus software, endpoint detection response
capabilities, and other security tools
– Automated Security Incident Report Key Elements
• Report ID
– A unique identifier for the report
• Generation date
– The date the report was generated
• Report period
– The time frame covered by the report
• “Prepared by”
– The entity responsible for creating the report
• Executive Summary
– Provides a brief overview of the report’s content, helping
readers determine its relevance
• Incident Alerts
– Can be categorized into different levels
• Critical
• High
• Moderate
• Informational
• Incident Details
– Timestamps
• User accounts
– Affected systems
– Incident descriptions
– Actions taken
• Automated responses can include suspending user
accounts, blocking IP addresses, and resetting
passwords
• Outbound traffic and software installations may trigger
alerts, which require investigation to determine their
nature and potential security implications
• Incident Analysis
– May include threat trends, user behavior, and data flow
anomalies
• Security Recommendations
– Suggest actions to address identified security issues
• Conclusion
– Summary of the report’s findings and contains outlines of any
further actions to be taken
• Appendices
– May include log snippets, IP addresses, domains, or other
relevant data
– Automation and orchestration enable real-time responses to security
incidents, helping to prevent major security breaches and network outages
Vulnerability Scans
• Vulnerability Scan Report
– Generated automatically after completing a vulnerability scan
• Analysis of the report is essential to confirm the validity of identified vulnerabilities
– False Positives
• Vulnerability scanners may produce false positives, meaning they
report vulnerabilities that don’t actually exist on your system
• It is crucial to differentiate real vulnerabilities from false positives
– Analysis of Vulnerabilities
• For each identified vulnerability, assess whether it was detected by
the scanner and if it exists on your system
• Determine the severity and criticality of each vulnerability
• Create a plan of action and milestones for remediation
– Components of a Vulnerability Scan Report
• Report ID
• Scan Date and Time
• System or Software Version
• Scan Initiator
– The person who ran the scan
• Executive Summary
– Highlights themes and trends for large networks
• Vulnerabilities – listed by severity (critical, high, medium, low,
informational) or by hosts
– CVE (Common Vulnerability and Exposure) ID – Vulnerability
ID
• CVE website (cve.org) contains detailed information
about vulnerabilities
– Description
– Affected system
• Impact
– Common Vulnerability Scoring System (CVSS) Score
• Measures severity
– Remediation Recommendations
• Additional Findings
• Recommendations
• Conclusion
Packet Captures
• Packet Capture
– Captures data going to or from a network device
• Can be set up on a span port to capture all data going to and from
devices on the network
• Packet captures in exam are typically short snippets, not massive data
dumps
– Packet Capture Columns
• Number
– Packet sequence number in the capture
• Time
– Elapsed time since the capture started
• Source/Destination IP Addresses
– Show where the data is coming from and going to
• Protocol
– Typically TCP or UDP
• Length
– The size of the packet
• Info
– Provides information from the packet header, including flags, sequence,
window, length, MSS, source port, and destination port
– Look for patterns that indicate attack types, such as SYN floods or DDoS
attacks
– Consider the relationship between source and destination IP addresses to
identify the type of attack
Metadata
• Metadata
– Information about a file, application, or other data
– MD5/SHA256 Checksum
• Serves as unique digital fingerprint for file identification, including
potential malware
Automating Onboarding
• Automation
– Involves using technology to execute repetitive tasks without continuous
human intervention
– Automating the onboarding process impacts organizational productivity,
employee satisfaction, and retention rates
• Streamlining onboarding ensures new hires are integrated quickly
and efficiently into their roles and the organization’s culture
• Benefits
– Eliminates manual tasks, reduces errors, and provides
structured, consistent onboarding
– Reduces administrative burden on HR and IT departments
– Enhances support ticket management processes
• Areas to Automate in Onboarding
– Creation of documentation records
• Scheduling training
• Provisioning equipment
• Managing access rights
• Distributing checklists
• Collecting feedback
– User Provisioning
• Involves creating and managing user accounts and access rights
• Ensures new employees have necessary access to systems,
applications, and resources
• Process includes the following
– Collecting information
– Creating accounts
– Assigning roles and access
– Sending notifications
– Conducting synchronization and updates
• Steps in User Provisioning
– Employee provides personal details, role, and department
information
– Automation creates user accounts in various systems
– Automation assigns roles and access levels based on
department and position
– Automated notifications sent to the employee, manager, or IT
department
– Automation keeps user information synchronized across
platforms
• Resource Provisioning
– Ensures timely allocation of physical and digital resources needed by new
employees
• Resources include
– Workstations
– Software licenses
– Communication tools
• Process involves
– Requirements analysis
– Resource allocation
– Configuration
– Verification and auditing
– Gathering feedback
• Steps in Resource Provisioning
– Analyze role and department information to determine specific
resources
– Initiate procurement workflows or allocate available resources
based on rules
– Configure resources to meet the employee’s role
– Verification process to ensure successful allocation
– Auditing to track allocated resources for inventory
management and compliance
– Employee and manager feedback on resource suitability and
additional requirements
Automating Security
• Automating Security
– Helps prevent security vulnerabilities, respond to threats swiftly, and
maintain consistent security policies
• It involves using technology to perform crucial but repetitive security
tasks to maintain updated defenses and swift response to security
threats
• Automation includes the use and configuration of guardrails, security
groups, service access management, and permissions
– Ways to Automate Security
• Implementing Guardrails
– Guardrails are automated safety controls to protect against
insecure infrastructure configurations
– Configured according to security standards and enforce
security policies automatically
– Continuously monitor infrastructure, detect security violations,
and take predefined corrective actions
• Managing Security Groups
– Security groups act as virtual firewalls for cloud-based server
instances
– Specify allowed incoming and outgoing network traffic using
predefined rules
– Automate assignment of instances to appropriate security
groups
– Dynamically adjust security group configurations to respond to
evolving threats
– Analyze traffic for unauthorized access attempts
• Enabling and Disabling Services and Access
– Automate service access management to prevent unnecessary
risks and
maintain operational efficiency
• Regularly review and manage access to services
– Monitor for unusual activity and automatically restrict or disable access if
suspicious
• Enable or disable services based on a predefined schedule when not
continuously needed
• Automating Permissions Management
– Manage permissions using Role-based Access Controls (RBAC)
– Automate provisioning and de-provisioning of access rights
based on assigned roles
– Ensure no unauthorized access to sensitive information
– Perform regular checks on permissions settings to verify
compliance with policies and regulations
– Make necessary adjustments over time to maintain security
Security Awareness
Objective 5.6: Given a scenario, you must be able to implement security awareness
practices
Security Awareness
• Security Awareness
– Knowledge and understanding of security threats and mitigation measures
• Goal
– Equip individuals to recognize and respond to threats for data
protection
• Focus
– Common threats, potential risks, best practices for secure
digital interactions
– Insider Threats
• Security risk from individuals within an organization
• Source
– Employees, former employees, contractors, or business
partners
• Risk
– Exploiting inside information intentionally or unintentionally
– Password Management
• Practices and tools for creating, storing, and managing passwords
• Goal
– Ensure strong, unique passwords; securely stored; reduces
unauthorized access risk
• Social Engineering Attacks
– Techniques
• Maintaining situational awareness, avoiding shoulder surfing,
eavesdropping
• Prevention
– Avoiding unauthorized media, cables, recognizing phone
scams, maintaining operational security
– Policies and Handbooks
• Policies
– Formal guidelines defining organization operations and
decisions
• Handbooks
– Comprehensive guides providing information, serving as
references
– Remote and Hybrid Work Environments
• Remote Work
– Performing job functions outside the office using technology
• Hybrid Work
– Combining in-office and remote work for flexibility
– Creating a Culture of Security
• Organizational mindset prioritizing security in daily tasks and
decision-making
• Characteristics
– Continuous education
– Proactive risk mitigation
– Collective responsibility
Password Managers
• Password Manager
– Specialized tool, plugin, or extension used with web browsers
• Helps users securely store and manage various usernames and
passwords for different websites
– Password Reuse Risks
• Reusing passwords across multiple websites is dangerous
• Breaches of one website can expose reused passwords
• Attackers use known credentials to compromise other sites
• Most usernames are email addresses, further increasing risk
• Built-In vs. Third-Party Password Managers
– Many web browsers offer built-in password functionality
• Third-party password managers like Bitwarden, Dashlane, LastPass,
or OnePass are often preferred for enhanced security
– Advantages of Password Managers
• Securely store and manage multiple credentials
• Prevent password reuse and enhance security
• Simplify password management with a single master password
• Encrypt and protect all stored passwords
• Automatically fill in login details for easy access
• Organize and manage numerous passwords efficiently