Introduction To Cyber Security: Important Part of Any Organization
Introduction To Cyber Security: Important Part of Any Organization
Introduction To Cyber Security: Important Part of Any Organization
It covers the security of the users from cybercrimes, mental and emotional harassment,
financial extortion and social exploitation.
It also covers the security of the data generated due to the mutual interaction of the
technologies involved.
Script Kidde:
Amateur persons having knowledge only about tools, but not enough knowledge.
Risk Assessment : - Identify the bugs/data leaks from the major critical risk areas and
conclude them, further, it also relates to assessment of all the possible IT assets for
Cyber-attack. Include Vulnerability Scans & Penetration Testing.
Penetration Testing: Practice of exploring a bug and discovering the depth of the
problem to find out exactly what type of information could be revealed, if the website
was exploited. It generally depend upon the ability of the tester.
Application Security: Now-a-days, the major challenge on the IT world is how to secure
the Applications installed on the system or even apps on the mobile applications.
Infrastructure Security: The another major domain in which people now a days works
are in Infrastructure like, oil pipeline, electricity, stock market which form the backbone
of the economy of a country needs to be secured from the cyber-attacks.
Combines the best of the SIM (Security Information Management systems) & SEM
(Security Event Management systems).
Servers
Proxy Analyze
Servers Routers
Permeter Application
Report
Devices
Switches
4. It’s key capabilities include data aggregation, correlation, alerting, complying with
compliance, retention and forensic analysis.
SEM systems accumulate discretely stored and interpreted log into one place, thereby allowing
the security analyst to perform real time analysis on the data in quick and efficient manner.
SIM Systems, on the other hand collect discrete data and stored in some central repository that
acts as a central link. Analyst uses this to analyze the latest trends in security domain. It also
produce the automated reports that can be used for compliance reporting.
Cyber Attack Responses
AT SERVER
Attacks on the servers (web, application or network) are common and most successfully
used security threats.
1. Application Server: Outdated applications & server versions, faulty configuration,
older versions of plug-ins are some of the potential threats that may give a hacker to
chance to attack a server.
Some other types of attacks are of:
ARP Spoofing: A type of Server attack in which the target system (user) received fake
address resolution protocol (ARP) messages. These messages are sent over a LAN. As
soon as the recipient receives the messages, the MAC address of an attacker get
linked with the recipient legal IP Address. This established link allow the attackers to
receive any data intended for the official recipient, intercept information, modify it
or stop the messages from reaching the intended recipient. Attacks like DoS attacks,
session hijacking and man-in the middle are some popularly ARP spoofing attacks.
Botnet: Hackers hack into multiple systems with the help of malware, viruses or
Trojan horses and form a network of these compromised systems. This network is
known as botnet network and works without the letting the owner realize the
compromised state of their system. Personal Computers are most common target
of bot attacks.
Cache Poisoning: DNS Server is targeted for the attack. In this, the attacker corrupts
the DNS’s cache databases by sending falsified replies from a fake DNS thereby, re-
routing the domain name to another IP address. Computer worms, viruses and
malware are spread through cache poising attacks.
Important Terms:
1. Malware (Malicious Software):
A malware is malicious piece of Code that is specifically designed to disrupt, damage, or
gain unauthorized access to a computer system.
Types of malware are:
Virus:- A malicious piece of code that attaches itself to some software/files,
replicates itself when needed. Activates only when the host file came into action.
It destroy/manipulates the functionality of the host program whom it attaches.
Worm: - A worm is same as virus, but it is not attached to some software, rather
it continuously searches for the vulnerabilities in the system to exploit. The worm
is a stand-alone software that itself transmit over the network.
Phases of Hacking:
1. Footprinting:
Tester tries to extract as much information as possible about the source i.e.
identification of the source, IP address range, DNS records, networks.
Includes network scanning for identifying active hosts on the network, check out
for user internet searches, domain name searches in recent time.
2. Scanning:
This phase begins with the searches of all the possible open ports & possible
vulnerabilities in the system by the hacker.
The hacker must have all the possible knowledge of protocols, network, OS &
ports.
3. Gaining Access:
Attacker exploits the system. The objective is to either extract information of value
to the attacker or use the network as a launch site for attacks against the other
targets.
The vulnerabilities detected by the attacker in first 02 stages are now exploited to
gain access.
4. Maintaining Access:
After the attacker gains the access to the system, next step is to maintain the
access as long as it accomplish its objectives.
Even attacker successfully penetrate your system, but the more he stays, the more
there are chances, he caught.
It will be necessary for him to take further steps to secure its presence.
5. Clearing Tracks:
After the attacker’s objective is successfully achieved, the attacker usually take
steps to hide all the possible controls left behind during all the phases.
Erase all the contaminated logins and any possible error messages that may be
generated during the attack process.
May install several backdoors for future exploitation.
CRYPTOGRAPHY
Cryptography involves creating written or generated codes that allow information to be kept
secret.
Cryptography is associated with the process of converting plain text into unintelligible text
and vice-versa.
It is also a process of storing and transmitted data only to the intended user.
Further, it not only secure data against theft or alteration, but also used for user
authentication.