CISCO Introduction To Cyber Security
CISCO Introduction To Cyber Security
What is Cybersecurity?
The connected electronic information network has become an integral part of our daily lives. All types
of organizations, such as medical, financial, and education institutions, use this network to operate
effectively. They utilize the network by collecting, processing, storing, and sharing vast amounts of
digital information. As more digital information is gathered and shared, the protection of this
information is becoming even more vital to our national security and economic stability.
Cybersecurity is the ongoing effort to protect these networked systems and all of the data from
unauthorized use or harm. On a personal level, you need to safeguard your identity, your data, and your
computing devices. At the corporate level, it is everyone’s responsibility to protect the organization’s
reputation, data, and customers. At the state level, national security, and the safety and well-being of
the citizens are at stake.
Your Data
Any information about you can be considered to be your data. This personal information can uniquely
identify you as an individual. This data includes the pictures and messages that you exchange with your
family and friends online. Other information, such as name, social security number, date and place of
birth, or mother‘s maiden name, is known by you and used to identify you. Information such as medical,
educational, financial, and employment information, can also be used to identify you online.
Medical Records
Every time you go to the doctor’s office, more information is added to your electronic health records
(EHRs). The prescription from your family doctor becomes part of your EHR. Your EHR includes your
physical health, mental health, and other personal information that may not be medically-related. For
example, if you had counseling as a child when there were major changes in the family, this will be
somewhere in your medical records. Besides your medical history and personal information, the EHR
may also include information about your family.
Medical devices, such as fitness bands, use the cloud platform to enable wireless transfer, storage and
display of clinical data like heart rates, blood pressures and blood sugars. These devices can generate
an enormous amount of clinical data that could become part of your medical records.
Education Records
As you progress through your education, information about your grades and test scores, your
attendance, courses taken, awards and degrees rewarded, and any disciplinary reports may be in your
©Saurav Sarker, MICT 4th Batch, BUP P a g e 1 | 43
Introduction to Cyber Security
education record. This record may also include contact information, health and immunization records,
and special education records including individualized education programs (IEPs).
Your financial record may include information about your income and expenditures. Tax records could
include paycheck stubs, credit card statements, your credit rating and other banking information. Your
employment information can include your past employment and your performance.
When you are at the doctor’s office, the conversation you have with the doctor is recorded in your
medical chart. For billing purposes, this information may be shared with the insurance company to
ensure appropriate billing and quality. Now, a part of your medical record for the visit is also at the
insurance company.
The store loyalty cards maybe a convenient way to save money for your purchases. However, the store
is compiling a profile of your purchases and using that information for its own use. The profile shows a
buyer purchases a certain brand and flavor of toothpaste regularly. The store uses this information to
target the buyer with special offers from the marketing partner. By using the loyalty card, the store and
the marketing partner have a profile for the purchasing behavior of a customer.
When you share your pictures online with your friends, do you know who may have a copy of the
pictures? Copies of the pictures are on your own devices. Your friends may have copies of those pictures
downloaded onto their devices. If the pictures are shared publicly, strangers may have copies of them,
too. They could download those pictures or take screenshots of those pictures. Because the pictures
were posted online, they are also saved on servers located in different parts of the world. Now the
pictures are no longer only found on your computing devices.
The criminals are very imaginative when they are trying to trick you into giving them money. They do
not just steal your money; they could also steal your identity and ruin your life.
Corporate data includes personnel information, intellectual properties, and financial data. The
personnel information includes application materials, payroll, offer letters, employee agreements, and
any information used in making employment decisions. Intellectual property, such as patents,
trademarks and new product plans, allows a business to gain economic advantage over its competitors.
This intellectual property can be considered a trade secret; losing this information can be disastrous for
the future of the company. The financial data, such as income statements, balance sheets, and cash flow
statements of a company gives insight into the health of the company.
With the emergence of the Internet of Things (IoT), there is a lot more data to manage and secure. IoT
is a large network of physical objects, such as sensors and equipment that extend beyond the traditional
computer network. All these connections, plus the fact that we have expanded storage capacity and
storage services through the cloud and virtualization, lead to the exponential growth of data. This data
©Saurav Sarker, MICT 4th Batch, BUP P a g e 3 | 43
Introduction to Cyber Security
has created a new area of interest in technology and business called “Big Data". With the velocity,
volume, and variety of data generated by the IoT and the daily operations of business, the
confidentiality, integrity and availability of this data is vital to the survival of the organization.
Confidentiality
Another term for confidentiality would be privacy. Company policies should restrict access to the
information to authorized personnel and ensure that only those authorized individuals view this data.
The data may be compartmentalized according to the security or sensitivity level of the information.
For example, a Java program developer should not have to access to the personal information of all
employees. Furthermore, employees should receive training to understand the best practices in
safeguarding sensitive information to protect themselves and the company from attacks. Methods to
ensure confidentiality include data encryption, username ID and password, two factor authentication,
and minimizing exposure of sensitive information.
Integrity
Integrity is accuracy, consistency, and trustworthiness of the data during its entire life cycle. Data must
be unaltered during transit and not changed by unauthorized entities. File permissions and user access
control can prevent unauthorized access. Version control can be used to prevent accidental changes by
authorized users. Backups must be available to restore any corrupted data, and checksum hashing can
be used to verify integrity of the data during transfer.
A checksum is used to verify the integrity of files, or strings of characters, after they have been
transferred from one device to another across your local network or the Internet. Checksums are
calculated with hash functions. Some of the common checksums are MD5, SHA-1, SHA-256, and SHA-
512. A hash function uses a mathematical algorithm to transform the data into fixed-length value that
represents the data, as shown in Figure 2. The hashed value is simply there for comparison. From the
hashed value, the original data cannot be retrieved directly. For example, if you forgot your password,
your password cannot be recovered from the hashed value. The password must be reset.
After a file is downloaded, you can verify its integrity by verifying the hash values from the source with
the one you generated using any hash calculator. By comparing the hash values, you can ensure that the
file has not been tampered with or corrupted during the transfer.
Availability
Maintaining equipment, performing hardware repairs, keeping operating systems and software up to
date, and creating backups ensure the availability of the network and data to the authorized users. Plans
should be in place to recover quickly from natural or man-made disasters. Security equipment or
software, such as firewalls, guard against downtime due to attacks such as denial of service (DoS).
©Saurav Sarker, MICT 4th Batch, BUP P a g e 4 | 43
Introduction to Cyber Security
Denial of service occurs when an attacker attempts to overwhelm resources so the services are not
available to the users.
By now you know that anything posted online can live online forever, even if you were able to erase all
the copies in your possession. If your servers were hacked, the confidential personnel information could
be made public. A hacker (or hacking group) may vandalize the company website by posting untrue
information and ruin the company’s reputation that took years to build. The hackers can also take down
the company website causing the company to lose revenue. If the website is down for longer periods of
time, the company may appear unreliable and possibly lose credibility. If the company website or
network has been breached, this could lead to leaked confidential documents, revealed trade secrets,
and stolen intellectual property. The loss of all this information may impede company growth and
expansion.
The monetary cost of a breach is much higher than just replacing any lost or stolen devices, investing in
existing security and strengthening the building’s physical security. The company may be responsible
for contacting all the affected customers about the breach and may have to be prepared for litigation.
With all this turmoil, employees may choose to leave the company. The company may need to focus less
on growing and more on repairing its reputation.
Types of Attackers
Attackers are individuals or groups who attempt to exploit vulnerability for personal or financial gain.
Attackers are interested in everything, from credit cards to product designs and anything with value.
1) Amateurs –
These people are sometimes called Script Kiddies. They are usually attackers with little or no skill, often
using existing tools or instructions found on the Internet to launch attacks. Some of them are just
curious, while others are trying to demonstrate their skills and cause harm. They may be using basic
tools, but the results can still be devastating.
2) Hackers –
This group of attackers break into computers or networks to gain access. Depending on the intent of the
break-in, these attackers are classified as white, gray, or black hats. The white hat attackers break into
©Saurav Sarker, MICT 4th Batch, BUP P a g e 7 | 43
Introduction to Cyber Security
networks or computer systems to discover weaknesses so that the security of these systems can be
improved. These break-ins are done with prior permission and any results are reported back to the
owner. On the other hand, black hat attackers take advantage of any vulnerability for illegal personal,
financial or political gain. Gray hat attackers are somewhere between white and black hat attackers.
The gray hat attackers may find a vulnerability in a system. Gray hat hackers may report the
vulnerability to the owners of the system if that action coincides with their agenda. Some gray hat
hackers publish the facts about the vulnerability on the Internet so that other attackers can exploit it.
The figure gives details about the terms white hat hacker, black hat hacker, and gray hat hacker.
3) Organized Hackers –
These hackers include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored
hackers. Cyber criminals are usually groups of professional criminals focused on control, power, and
wealth. The criminals are highly sophisticated and organized, and they may even provide cybercrime
as a service to other criminals. Hacktivists make political statements to create awareness to issues that
are important to them. State-sponsored attackers gather intelligence or commit sabotage on behalf of
their government. These attackers are usually highly trained and well-funded, and their attacks are
focused on specific goals that are beneficial to their government.
• Facilitate outside attacks by connecting infected USB media into the corporate computer system
• Accidentally invite malware onto the network through malicious email or websites
Internal threats also have the potential to cause greater damage than external threats, because internal
users have direct access to the building and its infrastructure devices. Employees also have knowledge
of the corporate network, its resources, and its confidential data, as well as different levels of user or
administrative privileges.
External threats from amateurs or skilled attackers can exploit vulnerabilities in network or computing
devices, or use social engineering to gain access.
What is Cyberwarfare?
Cyberspace has become another important dimension of warfare, where nations can carry out conflicts
without the clashes of traditional troops and machines. This allows countries with minimal military
presence to be as strong as other nations in cyberspace. Cyberwarfare is an Internet-based conflict that
involves the penetration of computer systems and networks of other nations. These attackers have the
resources and expertise to launch massive Internet-based attacks against other nations to cause
damage or disrupt services, such as shutting down a power grid.An example of a state-sponsored attack
involved the Stuxnet malware that was designed to damage Iran’s nuclear enrichment plant. Stuxnet
malware did not hijack targeted computers to steal information. It was designed to damage physical
equipment that was controlled by computers. It used modular coding that was programmed to perform
a specific task within the malware. It used stolen digital certificates so the attack appeared legitimate
to the system. Click Play to view a video about Stuxnet.
The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or
competitors.
A nation can continuously invade other nation’s infrastructure, steal defense secrets, and gather
information about technology to narrow the gaps in its industries and military. Besides industrial and
militaristic espionage, cyberwar can sabotage the infrastructure of other nations and cost lives in the
targeted nations. For example, an attack can disrupt the power grid of a major city. Traffic would be
Furthermore, compromised sensitive data can give the attackers the ability to blackmail personnel
within the government. The information may allow an attacker to pretend to be an authorized user to
access sensitive information or equipment.
If the government cannot defend against the cyberattacks, the citizens may lose confidence in the
government’s ability to protect them. Cyberwarfare can destabilize a nation, disrupt commerce, and
affect the citizens’ faith in their government without ever physically invading the targeted nation.
This chapter explained the features and characteristics of cybersecurity. It explained why the demand
for cybersecurity professionals will only continue to increase. The content explains why your personal
online identity and data is vulnerable to cyber criminals. It gives some tips on how you can protect your
personal online identity and data.
This chapter also discussed organizational data: what it is, where it is, and why it must be protected. It
explained who the cyber attackers are and what they want. Cybersecurity professionals must have the
same skills as the cyber attackers. Cybersecurity professionals must work within the bounds of the local,
national and international law. Cybersecurity professionals must also use their skills ethically.
Finally, this chapter briefly explained cyberwarfare and why nations and governments need
cybersecurity professionals to help protect their citizens and infrastructure.
If you would like to further explore the concepts in this chapter, please check out the Additional
Resources and Activities page in Student Resources.
This chapter covers the ways that cybersecurity professionals analyze what has happened after a
cyberattack. It explains security software and hardware vulnerabilities and the different categories of
security vulnerabilities.
The different types of malicious software (known as malware) and the symptoms of malware are
discussed. The different ways that attackers can infiltrate a system is covered, as well as denial of
service attacks.
Most modern cyberattacks are considered to be blended attacks. Blended attacks use multiple
techniques to infiltrate and attack a system. When an attack cannot be prevented, it is the job of a
cybersecurity professional to reduce the impact of that attack.
Security vulnerabilities are any kind of software or hardware defect. After gaining knowledge of a
vulnerability, malicious users attempt to exploit it. An exploit is the term used to describe a program
Software vulnerabilities
Software vulnerabilities are usually introduced by errors in the operating system or application code,
despite all the effort companies put into finding and patching software vulnerabilities, it is common for
new vulnerabilities to surface. Microsoft, Apple, and other operating system producers release patches
and updates almost every day. Application updates are also common. Applications such as web
browsers, mobile apps and web servers are often updated by the companies or organizations
responsible for them.
In 2015, a major vulnerability, called SYNful Knock, was discovered in Cisco IOS. This vulnerability
allowed attackers to gain control of enterprise-grade routers, such as the legacy Cisco 1841, 2811, and
3825 routers. The attackers could then monitor all network communication and had the ability to infect
other network devices. This vulnerability was introduced into the system when an altered IOS version
was installed in the routers. To avoid this, always verify the integrity of the downloaded IOS image and
limit the physical access of the equipment to authorized personnel only.
The goal of software updates is to stay current and avoid exploitation of vulnerabilities. While some
companies have penetration testing teams dedicated to search, find and patch software vulnerabilities
before they can get exploited, third party security researchers also specialize in finding vulnerabilities
in software.
Google’s Project Zero is a great example of such practice. After discovering a number of vulnerabilities
in various software used by end-users, Google formed a permanent team dedicated to finding software
vulnerabilities. Google Security Research can be found here.
Hardware vulnerabilities
Hardware vulnerabilities are often introduced by hardware design flaws. RAM memory for example, is
essentially capacitors installed very close to one another. It was discovered that, due to proximity,
constant changes applied to one of these capacitors could influence neighbor capacitors. Based on that
design flaw, an exploit called Rowhammer was created. By repeatedly rewriting memory in the same
addresses, the Rowhammer exploit allows data to be retrieved from nearby address memory cells, even
if the cells are protected.
Hardware vulnerabilities are specific to device models and are not generally exploited through random
compromising attempts. While hardware exploits are more common in highly targeted attacks,
traditional malware protection and a physical security are sufficient protection for the everyday user.
Categorizing Security Vulnerabilities
Most software security vulnerabilities fall into one of the following categories:
Buffer overflow – This vulnerability occurs when data is written beyond the limits of a buffer. Buffers
are memory areas allocated to an application. By changing data beyond the boundaries of a buffer, the
Non-validated input – Programs often work with data input. This data coming into the program could
have malicious content, designed to force the program to behave in an unintended way. Consider a
program that receives an image for processing. A malicious user could craft an image file with invalid
image dimensions. The maliciously crafted dimensions could force the program to allocate buffers of
incorrect and unexpected sizes.
Race conditions – This vulnerability is when the output of an event depends on ordered or timed
outputs. A race condition becomes a source of vulnerability when the required ordered or timed events
do not occur in the correct order or proper timing.
Weaknesses in security practices – Systems and sensitive data can be protected through techniques
such as authentication, authorization, and encryption. Developers should not attempt to create their
own security algorithms because it will likely introduce vulnerabilities. It is strongly advised that
developers use security libraries that have already created, tested, and verified.
Access-control problems – Access control is the process of controlling who does what and ranges from
managing physical access to equipment to dictating who has access to a resource, such as a file, and
what they can do with it, such as read or change the file. Many security vulnerabilities are created by
the improper use of access controls.
Nearly all access controls and security practices can be overcome if the attacker has physical access to
target equipment. For example, no matter what you set a file’s permissions to, the operating system
cannot prevent someone from bypassing the operating system and reading the data directly off the disk.
To protect the machine and the data it contains, physical access must be restricted and encryption
techniques must be used to protect data from being stolen or corrupted.
Short for Malicious Software, malware is any code that can be used to steal data, bypass access controls,
or cause harm to, or compromise a system. Below are a few common types of malware:
1) Spyware –
This malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke
collection, and data capture. In an attempt to overcome security measures, spyware often modifies
security settings. Spyware often bundles itself with legitimate software or with Trojan horses.
2) Adware –
Advertising supported software is designed to automatically deliver advertisements. Adware is often
installed with some versions of software. Some adware is designed to only deliver advertisements but
it is also common for adware to come with spyware.
3) Bot –
From the word robot, a bot is malware designed to automatically perform action, usually online. While
most bots are harmless, one increasing use of malicious bots are botnets. Several computers are infected
with bots which are programmed to quietly wait for commands provided by the attacker.
4) Ransomware –
This malware is designed to hold a computer system or the data it contains captive until a payment is
made. Ransomware usually works by encrypting data in the computer with a key unknown to the user.
Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down
the system. Ransomware is spread by a downloaded file or some software vulnerability.
5) Scareware –
This is a type of malware designed to persuade the user to take a specific action based on fear.
Scareware forges pop-up windows that resemble operating system dialogue windows. These windows
convey forged messages stating the system is at risk or needs the execution of a specific program to
return to normal operation. In reality, no problems were assessed or detected and if the user agrees
and clears the mentioned program to execute, his or her system will be infected with malware.
6) Rootkit –
This malware is designed to modify the operating system to create a backdoor. Attackers then use the
backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to
perform privilege escalation and modify system files. It is also common for rootkits to modify system
forensics and monitoring tools, making them very hard to detect. Often, a computer infected by a rootkit
must be wiped and reinstalled.
7) Virus –
A virus is malicious executable code that is attached to other executable files, often legitimate programs.
Most viruses require end-user activation and can activate at a specific time or date. Viruses can be
harmless and simply display a picture or they can be destructive, such as those that modify or delete
data. Viruses can also be programmed to mutate to avoid detection. Most viruses are now spread by
USB drives, optical disks, network shares, or email.
A Trojan horse is malware that carries out malicious operations under the guise of a desired operation.
This malicious code exploits the privileges of the user that runs it. Often, Trojans are found in image
files, audio files or games. A Trojan horse differs from a virus because it binds itself to non-executable
files.
9) Worms –
Worms are malicious code that replicate themselves by independently exploiting vulnerabilities in
networks. Worms usually slow down networks. Whereas a virus requires a host program to run, worms
can run by themselves. Other than the initial infection, they no longer require user participation. After
a host is infected, the worm is able to spread very quickly over the network. Worms share similar
patterns. They all have an enabling vulnerability, a way to propagate themselves, and they all contain a
payload.
Worms are responsible for some of the most devastating attacks on the Internet. As shown in Figure 1,
in 2001 the Code Red worm had infected 658 servers. Within 19 hours, the worm had infected over
300,000 servers as shown in Figure 2.
Man-In-The-Middle (MitM) – MitM allows the attacker to take control over a device without the user’s
knowledge. With that level of access, the attacker can intercept and capture user information before
relaying it to its intended destination. MitM attacks are widely used to steal financial information. Many
malware and techniques exist to provide attackers with MitM capabilities.
Regardless of the type of malware a system has been infected with, these are common malware
symptoms:
Social Engineering
Social engineering is an access attack that attempts to manipulate individuals into performing actions
or divulging confidential information. Social engineers often rely on people’s willingness to be helpful
but also prey on people’s weaknesses. For example, an attacker could call an authorized employee with
an urgent problem that requires immediate network access. The attacker could appeal to the
employee’s vanity, invoke authority using name-dropping techniques, or appeal to the employee’s
greed.
• Pretexting - This is when an attacker calls an individual and lies to them in an attempt to gain
access to privileged data. An example involves an attacker who pretends to need personal or
financial data in order to confirm the identity of the recipient.
• Tailgating - This is when an attacker quickly follows an authorized person into a secure location.
• Something for Something (Quid pro quo) - This is when an attacker requests personal
information from a party in exchange for something, like a free gift.
Wi-Fi password cracking is the process of discovering the password used to protect a wireless network.
These are some techniques used in password cracking:
Social engineering – The attacker manipulates a person who knows the password into providing it.
Brute-force attacks – The attacker tries several possible passwords in an attempt to guess the
password. If the password is a 4-digit number, for example, the attacker would have to try every one of
the 10000 combinations. Brute-force attacks usually involve a word-list file. This is a text file containing
a list of words taken from a dictionary. A program then tries each word and common combinations.
Because brute-force attacks take time, complex passwords take much longer to guess. A few password
brute-force tools include Ophcrack, L0phtCrack, THC Hydra, RainbowCrack, and Medusa.
Network sniffing – By listening and capturing packets sent on the network, an attacker may be able to
discover the password if the password is being sent unencrypted (in plain text). If the password is
encrypted, the attacker may still be able to reveal it by using a password cracking tool.
Phishing
Phishing is when a malicious party sends a fraudulent email disguised as being from a legitimate,
trusted source. The message intent is to trick the recipient into installing malware on their device, or
into sharing personal or financial information. An example of phishing is an email forged to look like it
was sent by a retail store asking the user to click a link to claim a prize. The link may go to a fake site
asking for personal information, or it may install a virus.
Spear phishing is a highly targeted phishing attack. While phishing and spear phishing both use emails
to reach the victims, spear phishing emails are customized to a specific person. The attacker researches
the target’s interests before sending the email. For example, an attacker learns the target is interested
in cars, and has been looking to buy a specific model of car. The attacker joins the same car discussion
forum where the target is a member, forges a car sale offering and sends email to the target. The email
contains a link for pictures of the car. When the target clicks on the link, malware is installed on the
target’s computer.
Vulnerability Exploitation
Exploiting vulnerabilities is another common method of infiltration. Attackers will scan computers to
gain information about them. Below is a common method for exploiting vulnerabilities:
Step 1. Gather information about the target system. This could be done in many different ways such as
a port scanner or social engineering. The goal is to learn as much as possible about the target computer.
Step 2.One of the pieces of relevant information learned in step 1 might be the operating system, its
version, and a list of services running on it.
Step 3. When the target’s operating system and version is known, the attacker looks for any known
vulnerabilities specific to that version of OS or other OS services.
Figure 1 portrays an attacker using whois, a public Internet database containing information about
domain names and their registrants. Figure 2 portrays an attacker using the nmap tool, a popular port
scanner. With a port scanner, an attacker can probe ports of a target computer to learn about which
services are running on that computer.
One way in which infiltration is achieved is through advanced persistent threats (APTs). They consist
of a multi-phase, long term, stealthy and advanced operation against a specific target. Due to its
complexity and skill level required, an APT is usually well funded. An APT targets organizations or
nations for business or political reasons.
Usually related to network-based espionage, APT’s purpose is to deploy customized malware on one or
multiple of the target’s systems and remain undetected. With multiple phases of operation and several
customized types of malware that affect different devices and perform specific functions, an individual
attacker often lacks the skill-set, resources or persistence to carry out APTs.
DoS
Denial-of-Service (DoS) attacks are a type of network attack. A DoS attack results in some sort of
interruption of network service to users, devices, or applications. There are two major types of DoS
attacks:
Overwhelming Quantity of Traffic - This is when a network, host, or application is sent an enormous
quantity of data at a rate which it cannot handle. This causes a slowdown in transmission or response,
or a crash of a device or service.
Maliciously Formatted Packets - This is when a maliciously formatted packet is sent to a host or
application and the receiver is unable to handle it. For example, an attacker forwards packets containing
errors that cannot be identified by the application, or forwards improperly formatted packets. This
causes the receiving device to run very slowly or crash.
DoS attacks are considered a major risk because they can easily interrupt communication and cause
significant loss of time and money. These attacks are relatively simple to conduct, even by an unskilled
attacker.
DDoS
A Distributed DoS Attack (DDoS) is similar to a DoS attack but originates from multiple, coordinated
sources. As an example, a DDoS attack could proceed as follows:
An attacker builds a network of infected hosts, called a botnet. The infected hosts are called zombies.
The zombies are controlled by handler systems.
The zombie computers constantly scan and infect more hosts, creating more zombies. When ready, the
hacker instructs handler systems to make the botnet of zombies carry out a DDoS attack.
Search engines such as Google work by ranking pages and presenting relevant results based on users’
search queries. Depending on the relevancy of web site content, it may appear higher or lower in the
search result list. SEO, short for Search Engine Optimization, is a set of techniques used to improve a
website’s ranking by a search engine. While many legitimate companies specialize in optimizing
websites to better position them, a malicious user could use SEO to make a malicious website appear
higher in search results. This technique is called SEO poisoning.
The most common goal of SEO poisoning is to increase traffic to malicious sites that may host malware
or perform social engineering. To force a malicious site to rank higher in search results, attackers take
advantage of popular search terms.
Blended attacks are attacks that use multiple techniques to compromise a target. By using several
different attack techniques at once, attackers have malware that are a hybrid of worms, Trojan horses,
spyware, keyloggers, spam and phishing schemes. This trend of blended attacks is revealing more
complex malware and placing user data at great risk.
The most common type of blended attack uses spam email messages, instant messages or legitimate
websites to distribute links where malware or spyware is secretly downloaded to the computer.
Another common blended attack uses DDoS combined with phishing emails. First, DDoS is used to take
down a popular bank website and send emails to the bank's customers, apologizing for the
inconvenience. The email also directs the users to a forged emergency site where their real login
information can be stolen.
Many of the most damaging computer worms like Nimbda, CodeRed, BugBear, Klez and Slammer are
better categorized as blended attacks, as shown below:
• Some Nimbda variants used email attachments; file downloads from a compromised web server;
and Microsoft file sharing (e.g., anonymous shares) as propagation methods.
©Saurav Sarker, MICT 4th Batch, BUP P a g e 18 | 43
Introduction to Cyber Security
• Other Nimbda variants were able to modify the system’s guest accounts to provide the attacker or
malicious code with administrative privileges.
The recent Conficker and ZeuS/LICAT worms were also blended attacks. Conficker used all the
traditional distribution methods.
It is important to understand that the impact of a breach is not only related to the technical aspect of it,
stolen data, damaged databases, or damage to intellectual property, the damage also extends to the
company’s reputation. Responding to a data breach is a very dynamic process.
Below are some important measures a company should take when a security breach is identified,
according to many security experts:
• Communicate the issue. Internally employees should be informed of the problem and called to
action. Externally, clients should be informed through direct communication and official
announcements. Communication creates transparency, which is crucial in this type of situation.
• Provide details. Explain why the situation took place and what was compromised. It is also
expected that the company take care of the costs of identity theft protection services for affected
customers.
• Understand what caused and facilitated the breach. If necessary, hire forensics experts to research
and learn the details.
• Apply what was learned from the forensics investigation to ensure similar breaches do not happen
in the future.
• Ensure all systems are clean, no backdoors were installed, and nothing else has been compromised.
Attackers will often attempt to leave a backdoor to facilitate future breaches. Make sure this does
not happen.
This chapter covered the ways that cybersecurity professionals analyze what has happened after a
cyberattack. It explains security software and hardware vulnerabilities and the different categories of
security vulnerabilities. The different types of malicious software (known as malware) and the
symptoms of malware explained. Some of the malware that was discussed included viruses, worms,
Trojan horses, spyware, adware, and others.
©Saurav Sarker, MICT 4th Batch, BUP P a g e 19 | 43
Introduction to Cyber Security
The different ways that attackers can infiltrate a system was covered, including social engineering, Wi-
Fi Password Cracking, Phishing, and vulnerability exploitation. The different types of denial of service
attacks were also explained. Blended attacks use multiple techniques to infiltrate and attack a system.
Many of the most damaging computer worms like Nimbda, CodeRed, BugBear, Klez and slammer are
better categorized as blended attacks. When an attack cannot be prevented, it is the job of a
cybersecurity professional is to reduce the impact of that attack.
This chapter focuses on your personal devices and your personal data. It includes tips for protecting
your devices, creating strong passwords and safely using wireless networks. It also discusses
maintaining your data securely. Your online data is worth something to cyber criminals. This chapter
briefly covers authentication techniques to help you maintain your data securely. It also covers ways to
enhance the security of your online data with tips about what to do and what not to do online.
Your computing devices store your data and are the portal to your online life. Below is a short list of
steps you can take to protect your computing devices from intrusion:
• Keep the Firewall On – Whether it is a software firewall or a hardware firewall on a router, the
firewall should be turned on and updated to prevent hackers from accessing your personal or
company data. Click Windows 7 and 8.1 or Windows 10 to turn on the firewall in the respective
version of Windows. Click here to turn on the firewall for Mac OS X devices.
• Use Antivirus and Antispyware – Malicious software, such as viruses, Trojan horses, worms,
ransomware and spyware, are installed on your computing devices without your permission, in
order to gain access to your computer and your data. Viruses can destroy your data, slow down
your computer, or take over your computer. One way viruses can take over your computer is by
allowing spammers to broadcast emails using your account. Spyware can monitor your online
activities, collect your personal information, or produce unwanted pop-up ads on your web
browser while you are online. A good rule is to only download software from trusted websites to
avoid getting spyware in the first place. Antivirus software is designed to scan your computer and
incoming email for viruses and delete them. Sometimes antivirus software also includes
antispyware. Keep your software up to date to protect your computer from the newest malicious
software.
• Manage Your Operating System and Browser – Hackers are always trying to take advantage of
vulnerabilities in your operating systems and your web browsers. To protect your computer and
your data, set the security settings on your computer and browser at medium or higher. Update
your computer’s operating system including your web browsers and regularly download and
install the latest software patches and security updates from the vendors.
• Protect All Your Devices – Your computing devices, whether they are PCs, laptops, tablets, or
smartphones, should be password protected to prevent unauthorized access. The stored
information should be encrypted, especially for sensitive or confidential data. For mobile devices,
©Saurav Sarker, MICT 4th Batch, BUP P a g e 20 | 43
Introduction to Cyber Security
only store necessary information, in case these devices are stolen or lost when you are away from
your home. If any one of your devices is compromised, the criminals may have access to all your
data through your cloud-storage service provider, such as iCloud or Google drive.
IoT devices pose an even greater risk than your other computing devices. While desktop, laptop and
mobile platforms receive frequent software updates, most of the IoT devices still have their original
firmware. If vulnerabilities are found in the firmware, the IoT device is likely to stay vulnerable. To
make the problem worse, IoT devices are often designed to call home and require Internet access. To
reach the Internet, most IoT devices manufacturers rely on the customer’s local network. The result is
that IoT devices are very likely to be comprised and when they are, they allow access to the customer’s
local network and data. The best way to protect yourself from this scenario is to have IoT devices using
an isolated network, sharing it only with other IoT devices.
Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the network
by way of the network identifier, known as the Service Set Identifier (SSID). To prevent intruders from
entering your home wireless network, the pre-set SSID and default password for the browser-based
administrative interface should be changed. Hackers will be aware of this kind of default access
information. Optionally, the wireless router can also be configured to not broadcast the SSID, which
adds an additional barrier to discovering the network. However, this should not be considered adequate
security for a wireless network. Furthermore, you should encrypt wireless communication by enabling
wireless security and the WPA2 encryption feature on the wireless router. Even with WPA2 encryption
enabled, the wireless network can still be vulnerable.
In October 2017, a security flaw in the WPA2 protocol was discovered. This flaw allows an intruder to
break the encryption between the wireless router and the wireless client, and allow the intruder to
access and manipulate the network traffic. This vulnerability can be exploited
using Key Reinstallation Attacks (KRACK). It affects all modern, protected Wi-Fi networks. To mitigate
an attacker, a user should update all affected products: wireless routers and any wireless capable
devices, such as laptops and mobile devices, as soon as security updates become available. For laptops
or other devices with wired NIC, a wired connection could mitigate this vulnerability. Furthermore, you
can also use a trusted VPN service to prevent the unauthorized access to your data while you are using
the wireless network.
When you are away from home, a public Wi-Fi hot spot allows you to access your online information
and surf the Internet. However, it is best to not access or send any sensitive personal information over
a public wireless network. Verify whether your computer is configured with file and media sharing and
that it requires user authentication with encryption. To prevent someone from intercepting your
information (known as “eavesdropping”) while using a public wireless network, use encrypted VPN
tunnels and services. The VPN service provides you secure access to the Internet, with an encrypted
Click here to learn more about protecting yourself when using wireless networks.
Many mobile devices, such as smartphones and tablets, come with the Bluetooth wireless protocol. This
capability allows Bluetooth-enabled devices to connect to each other and share information.
Unfortunately, Bluetooth can be exploited by hackers to eavesdrop on some devices, establish remote
access controls, distribute malware, and drain batteries. To avoid these issues, keep Bluetooth turned
off when you are not using it.
You probably have more than one online account, and each account should have a unique password.
That is a lot of passwords to remember. However, the consequence of not using strong and unique
passwords leaves you and your data vulnerable to cyber criminals. Using the same password for all your
online accounts is like using the same key for all your locked doors, if an attacker was to get your key,
he would have the ability to access everything you own. If criminals get your password through phishing
for example, they will try to get into your other online accounts. If you only use one password for all
accounts, they can get into all your accounts, steal or erase all your data, or decide to impersonate you.
We use so many online accounts that need passwords that is becomes too much to remember. One
solution to avoid reusing passwords or using weak passwords is to use a password manager. A
password manager stores and encrypts all of your different and complex passwords. The manager can
then help you to log into your online accounts automatically. You only need to remember your master
password to access the password manager and manage all of your accounts and passwords.
To prevent unauthorized physical access to your computing devices, use passphrases, rather than
passwords. It is easier to create a long passphrase than a password, because it is generally in the form
of a sentence rather than a word. The longer length makes passphrases less vulnerable to dictionary or
brute force attacks. Furthermore, a passphrase maybe easier to remember, especially if you are
required to change your password frequently. Here are some tips in choosing good passwords or
passphrases:
• Avoid common or famous statements, for example, lyrics from a popular song
Recently, United States National Institute for Standards and Technology (NIST) published improved
password requirements. NIST standards are intended for government application but can also serve as
a standard for others as well. The new guidelines aim to provide better user experience and put the
burden of user verification on the providers.
• No composition rules, such as having to include lowercase and uppercase letters and numbers
• Improve typing accuracy by allowing the user to see the password while typing
• No password hints
Click here to learn more about the improved NIST password requirement.
Even with access to your computers and network devices secured, it is also important to protect and
preserve your data.
Your data should always be encrypted. You may think you have no secrets and nothing to hide so why
use encryption? Maybe you think that nobody wants your data. Most likely, this is probably not true.
Are you ready to show all of your photos and documents to strangers? Are you ready to share financial
information stored on your computer to your friends? Do you want to give out your emails and account
passwords to the general public?
This can be even more troublesome if a malicious application infects your computer or mobile device
and steals potentially valuable information, such as account numbers and passwords, and other official
documents. That kind of information can lead to identity theft, fraud, or ransom. Criminals may decide
to simply encrypt your data and make it unusable until you pay the ransom.
What is encryption? Encryption is the process of converting the information into a form where an
unauthorized party cannot read it. Only a trusted, authorized person with the secret key or password
can decrypt the data and access it in its original form. The encryption itself does not prevent someone
from intercepting the data. Encryption can only prevent an unauthorized person from viewing or
accessing the content.
Software programs are used to encrypt files, folders, and even entire drives.
Encrypting File System (EFS) is a Windows feature that can encrypt data. EFS is directly linked to
a specific user account. Only the user that encrypted the data will be able to access it after it has been
encrypted using EFS. To encrypt data using EFS in all Windows versions, follow these steps:
Step 5. Files and folders that have been encrypted with EFS are displayed in green, as shown in the
figure.
Your hard drive may fail. Your laptop could be lost. Your smart phone stolen. Maybe you erased the
original version of an important document. Having a backup may prevent the loss of irreplaceable data,
such as family photos. To back up data properly, you will need an additional storage location for the
data and you must copy the data to that location regularly and automatically.
The additional location for your backed up files can be on your home network, secondary location, or
in the cloud. By storing the backup of the data locally, you have total control of the data. You can decide
to copy all of your data to a network attached storage device (NAS), a simple external hard drive, or
maybe select only a few important folders for backup on thumb drives, CDs/DVDs, or even tapes. In that
scenario, you are the owner and you are totally responsible for the cost and maintenance of the storage
device equipment. If you subscribe to a cloud storage service, the cost depends on the amount storage
space needed. With a cloud storage service like Amazon Web Services (AWS), you have access to your
backup data as long as you have access to your account. When you subscribe to online storage services,
you may need to be more selective about the data being backed up due to the cost of the storage and
the constant online data transfers. One of the benefits of storing a backup at an alternate location is that
it is safe in the event of fire, theft or other catastrophes other than storage device failure.
Deleting Your Data Permanently
When you move a file to the recycle bin or trash and delete it permanently, the file is only inaccessible
from the operating system. Anyone with the right forensic tools can still recover the file due to a
magnetic trace left on the hard drive.
In order to erase data so that it is no longer recoverable, the data must be overwritten with ones and
zeroes multiple times. To prevent the recovery of deleted files, you may need to use tools specifically
designed to do just that. The program SDelete from Microsoft (for Vista and higher), claims to have the
ability to remove sensitive files completely. Shred for Linux and Secure Empty Trash for Mac OSX are
some tools that claim to provide a similar service.
The only way to be certain that data or files are not recoverable is to physically destroy the hard drive
or storage device. It has been the folly of many criminals in thinking their files were impenetrable or
irrecoverable.
Besides storing data on your local hard drives, your data may also be stored online in the cloud. Those
copies will also need to be deleted. Take a moment to ask yourself, “Where do I save my data? Is it
backed up somewhere? Is it encrypted? When you need to delete your data or get rid of a hard drive or
computer, ask yourself, “Have I safeguarded the data to keep it from falling into the wrong hands?”
Two Factor Authentication
Popular online services, such as Google, Facebook, Twitter, LinkedIn, Apple and Microsoft, use two
factor authentication to add an extra layer of security for account logins. Besides the username and
password, or personal identification number (PIN) or pattern, two factor authentication requires a
second token, such as a:
Even with two factor authentication, hackers can still gain access to your online accounts through
attacks such as phishing attacks, malware, and social engineering.
Go here to find out if websites you visit use two factor authentication.
OAuth 2.0
Open Authorization (OAuth) is an open standard protocol that allows an end user’s credentials to access
third party applications without exposing the user’s password. OAuth acts as the middle man to decide
whether to allow end users access to third party applications. For example, say you want to access web
application XYZ, and you do not have a user account for accessing this web application. However, XYZ
has the option to allow you to log in using the credentials from a social media website ABC. So you access
the website using the social media login.
For this to work, the application ‘XYZ’ is registered with ‘ABC’ and is an approved application. When
you access XYZ, you use your user credentials for ABC. Then XYZ requests an access token from ABC on
your behalf. Now you have access to XYZ. XYZ knows nothing about you and your user credentials, and
this interaction is totally seamless for the user. Using secret tokens prevents a malicious application
from getting your information and your data.
Do Not Share Too Much on Social Media
If you want to keep your privacy on social media, share as little information as possible. You should not
share information like your birth date, email address, or your phone number on your profile. The people
who need to know your personal information probably already know it. Do not fill out your social media
profile completely, only provide the minimum required information. Furthermore, check your social
media settings to allow only people you know to see your activities or engage in your conversations.
The more personal information you share online, the easier it is for someone to create a profile about
you and take advantage of you offline.
Have you ever forgotten the username and password for an online account? Security questions like
“What is your mother’s maiden name?” or “In what city were you born?” are supposed to help keep your
account safe from intruders. However, anyone who wants to access your accounts can search for the
answers on the Internet. You can answer these questions with false information, as long as you can
remember the false answers. If you have a problem remembering them, you can use password manager
to manage them for you.
Email and Web Browser Privacy
Every day, millions of email messages are used to communicate with friends and conduct business.
Email is a convenient way to communicate with each other quickly. When you send an email, it is similar
to sending a message using a postcard. The postcard message is transmitted in plain sight of anyone
who has access to look, and the email message is transmitted in plain text, and is readable by anyone
who has access. These communications are also passed among different servers while in route to the
destination. Even when you erase your email messages, the messages can be archived on the mail
servers for some time.
With private mode enabled, cookies are disabled, and temporary Internet files and browsing history
are removed after closing the window or program.
Keeping your Internet browsing history private may prevent others from gathering information about
your online activities and enticing you to buy something with targeted ads. Even with private browsing
enabled and cookies disabled, companies are developing different ways of fingerprinting users in order
to gather information and track user behavior. For example, the intermediary devices, such as routers,
can have information about a user’s web surfing history.
Ultimately, it is your responsibility to safeguard your data, your identity, and your computing devices.
When you send an email, should you include your medical records? The next time you browse the
Internet, is your transmission secure? Just a few simple precautions may save you problems later.
Chapter 3: Protecting Your Data and Privacy
This chapter focused on your personal devices, your personal data. It included tips for protecting your
devices, creating strong passwords and safely using wireless networks. It covered data backups, data
storage and deleting your data permanently.
Authentication techniques were discussed to help you maintain your data securely. It briefly covered
how easy it is to share too much information on social media and how to avoid this security risk.
If you would like to further explore the concepts in this chapter, please check out the Additional
Resources and Activities page in Student Resources.
Chapter 4: Protecting the Organization
This chapter covers some of the technology and processes used by cybersecurity professionals when
protecting an organization’s network, equipment and data. First, it briefly covers the many types of
firewalls, security appliances, and software that are currently used, including best practices.
Next, this chapter explains botnets, the kill chain, behavior-based security, and using NetFlow to
monitor a network.
The third section discusses Cisco’s approach to cybersecurity, including the CSIRT team and the security
playbook. It briefly covers the tools that cybersecurity professionals use to detect and prevent network
attacks.
©Saurav Sarker, MICT 4th Batch, BUP P a g e 27 | 43
Introduction to Cyber Security
Firewall Types
A firewall is a wall or partition that is designed to prevent fire from spreading from one part of a building
to another. In computer networking, a firewall is designed to control, or filter, which communications
are allowed in and which are allowed out of a device or network, as shown in the figure. A firewall can
be installed on a single computer with the purpose of protecting that one computer (host-based
firewall), or it can be a stand-alone network device that protects an entire network of computers and
all of the host devices on that network (network-based firewall).
Over the years, as computer and network attacks have become more sophisticated, new types of
firewalls have been developed which serve different purposes in protecting a network. Here is a list of
common firewall types:
• Transport Layer Firewall –filtering based on source and destination data ports, and filtering
based on connection states
• Context Aware Application Firewall – filtering based on the user, device, role, application type,
and threat profile
• Proxy Server – filtering of web content requests like URL, domain, media, etc.
• Reverse Proxy Server – placed in front of web servers, reverse proxy servers protect, hide,
offload, and distribute access to web servers
• Network Address Translation (NAT) Firewall – hides or masquerades the private addresses of
network hosts
• Host-based Firewall – filtering of ports and system service calls on a single computer operating
system
Port Scanning
Port-scanning is a process of probing a computer, server or other network host for open ports. In
networking, each application running on a device is assigned an identifier called a port number. This
port number is used on both ends of the transmission so that the right data is passed to the correct
application. Port-scanning can be used maliciously as a reconnaissance tool to identify the operating
system and services running on a computer or host, or it can be used harmlessly by a network
administrator to verify network security policies on the network.
For the purposes of evaluating your own computer network’s firewall and port security, you can use a
port-scanning tool like Nmap to find all the open ports on your network. Port-scanning can be seen as
a precursor to a network attack and therefore should not be done on public servers on the Internet, or
on a company network without permission.
To execute an Nmap port-scan of a computer on your local home network, download and launch a
program such as Zenmap, provide the target IP address of the computer you would like to scan, choose
a default scanning profile, and press scan. The Nmap scan will report any services that are running (e.g.,
web services, mail services, etc.) and port numbers. The scanning of a port generally results in one of
three responses:
• Open or Accepted – The host replied indicating a service is listening on the port.
• Closed, Denied, or Not Listening – The host replied indicating that connections will be denied to
the port.
To execute a port-scan of your network from outside of the network, you will need to initiate the scan
from outside of the network. This will involve running an Nmap port-scan against your firewall or
router’s public IP address. To discover your public IP address, use a search engine such as Google with
the query “what is my ip address”. The search engine will return your public IP address.
To run a port-scan for six common ports against your home router or firewall, go to the Nmap Online
Port Scanner at https://hackertarget.com/nmap-online-port-scanner/ and enter your public IP
address in the input box: IP address to scan… and press Quick Nmap Scan. If the response is open for any
of the ports: 21, 22, 25, 80, 443, or 3389 then most likely, port forwarding has been enabled on your
router or firewall, and you are running servers on your private network, as shown in the figure.
Security Appliances
Today there is no single security appliance or piece of technology that will solve all network security
needs. Because there is a variety of security appliances and tools that need to be implemented, it is
important that they all work together. Security appliances are most effective when they are part of a
system.
Security appliances can be stand-alone devices, like a router or firewall, a card that can be installed into
a network device, or a module with its own processor and cached memory. Security appliances can also
be software tools that are run on a network device. Security appliances fall into these general categories:
Routers - Cisco Integrated Services Router (ISR) routers, shown in Figure 1, have many firewall
capabilities besides just routing functions, including traffic filtering, the ability to run an Intrusion
Prevention System (IPS), encryption, and VPN capabilities for secure encrypted tunneling.
Firewalls - Cisco Next Generation Firewalls have all the capabilities of an ISR router, as well as,
advanced network management and analytics. Cisco Adaptive Security Appliance (ASA) with firewall
capabilities are shown in Figure 2.
IPS - Cisco Next Generation IPS devices, shown in Figure 3, are dedicated to intrusion prevention.
VPN - Cisco security appliances are equipped with a Virtual Private Network (VPN) server and client
technologies. It is designed for secure encrypted tunneling.
Malware/Antivirus - Cisco Advanced Malware Protection (AMP) comes in next generation Cisco
routers, firewalls, IPS devices, Web and Email Security Appliances and can also be installed as software
in host computers.
Software is not perfect. When a hacker exploits a flaw in a piece of software before the creator can fix
it, it is known as a zero-day attack. Due to the sophistication and enormity of zero-day attacks found
today, it is becoming common that network attacks will succeed and that a successful defense is now
measured in how quickly a network can respond to an attack. The ability to detect attacks as they
happen in real-time, as well as stopping the attacks immediately, or within minutes of occurring, is the
ideal goal. Unfortunately, many companies and organizations today are unable to detect attacks until
days or even months after they have occurred.
• Real Time Scanning from Edge to Endpoint - Detecting attacks in real time requires actively
scanning for attacks using firewall and IDS/IPS network devices. Next generation client/server
malware detection with connections to online global threat centers must also be used. Today,
active scanning devices and software must detect network anomalies using context-based analysis
and behavior detection.
• DDoS Attacks and Real Time Response - DDoS is one of the biggest attack threats requiring real-
time response and detection. DDoS attacks are extremely difficult to defend against because the
attacks originate from hundreds, or thousands of zombie hosts, and the attacks appear as
legitimate traffic, as shown in the figure. For many companies and organizations, regularly
occurring DDoS attacks cripple Internet servers and network availability. The ability to detect and
respond to DDoS attacks in real-time is crucial.
How do you provide defense against the constant presence of zero-day attacks, as well as advanced
persistent threats (APT) that steal data over long periods of time? One solution is to use an enterprise-
level advanced malware detection solution that offers real-time malware detection.
Network administrators must constantly monitor the network for signs of malware or behaviors that
reveal the presence of an APT. Cisco has an Advanced Malware Protection (AMP) Threat Grid that
analyzes millions of files and correlates them against hundreds of millions of other analyzed malware
artifacts. This provides a global view of malware attacks, campaigns, and their distribution. AMP is
client/server software deployed on host endpoints, as a standalone server, or on other network security
devices. The figure shows the benefits of the AMP Threat Grid.
Security Best Practices
Many national and professional organizations have published lists of security best practices. The
following is a list of some security best practices:
• Perform Risk Assessment – Knowing the value of what you are protecting will help in justifying
security expenditures.
• Create a Security Policy – Create a policy that clearly outlines company rules, job duties, and
expectations.
• Physical Security Measures – Restrict access to networking closets, server locations, as well as
fire suppression.
• Perform and Test Backups – Perform regular backups and test data recovery from backups.
• Maintain Security Patches and Updates – Regularly update server, client, and network device
operating systems and programs.
• Employ Access Controls – Configure user roles and privilege levels as well as strong user
authentication.
• Regularly Test Incident Response – Employ an incident response team and test emergency
response scenarios.
• Implement Network Security Devices – Use next generation routers, firewalls, and other
security appliances.
Some of the most helpful guidelines are found in organizational repositories such as the National
Institute of Standards and Technology (NIST) Computer Security Resource Center, as shown in the
figure.
One of the most widely known and respected organizations for cybersecurity training is the SANS
Institute. Go here to learn more about SANS and the types of training and certifications they offer.
Botnet
A botnet is a group of bots, connected through the Internet, with the ability to be controlled by a
malicious individual or group. A bot computer is typically infected by visiting a website, opening an
email attachment, or opening an infected media file.
A botnet can have tens of thousands, or even hundreds of thousands of bots. These bots can be activated
to distribute malware, launch DDoS attacks, distribute spam email, or execute brute force password
attacks. Botnets are typically controlled through a command and control server.
Cyber criminals will often rent out Botnets, for a fee, to third parties for nefarious purposes.
The figure shows how a botnet traffic filter is used to inform the worldwide security community of
botnet locations.
The Kill Chain in Cyberdefense
In cybersecurity, the Kill Chain is the stages of an information systems attack. Developed by Lockheed
Martin as a security framework for incident detection and response, the Cyber Kill Chain is comprised
of the following stages:
Stage 2. Weaponization - The attacker creates an exploit and malicious payload to send to the target.
Stage 3. Delivery - The attacker sends the exploit and malicious payload to the target by email or other
method.
Stage 6. Command and Control - Remote control of the target is gained through a command and
control channel or server.
Stage 7. Action - The attacker performs malicious actions like information theft, or executes additional
attacks on other devices from within the network by working through the Kill Chain stages again.
©Saurav Sarker, MICT 4th Batch, BUP P a g e 34 | 43
Introduction to Cyber Security
To defend against the Kill Chain, network security defenses are designed around the stages of the Kill
Chain. These are some questions about a company’s security defenses, based on the Cyber Kill Chain:
• What are the attack indicators at each stage of the Kill Chain?
• Which security tools are needed to detect the attack indicators at each of the stages?
According to Lockheed Martin, understanding the stages of Kill Chain allowed them to put up defensive
obstacles, slow down the attack, and ultimately prevent the loss of data. The figure shows how each
stage of the Kill Chain equates to an increase in the amount of effort and cost to inhibit and remediate
attacks.
Behavior-Based Security
Behavior-based security is a form of threat detection that does not rely on known malicious signatures,
but instead uses informational context to detect anomalies in the network. Behavior-based detection
involves capturing and analyzing the flow of communication between a user on the local network and
a local, or remote destination. These communications, when captured and analyzed, reveal context and
patterns of behavior which can be used to detect anomalies. Behavior-based detection can discover the
presence of an attack by a change from normal behavior.
• Honeypots - A Honeypot is a behavior-based detection tool that first lures the attacker in by
appealing to the attacker’s predicted pattern of malicious behavior, and then, when inside the
honeypot, the network administrator can capture, log, and analyze the attacker’s behavior. This
allows an administrator to gain more knowledge and build a better defense.
• Cisco’s Cyber Threat Defense Solution Architecture - This is a security architecture that uses
behavior-based detection and indicators, to provide greater visibility, context, and control. The
goal is to know who, what, where, when, and how an attack is taking place. This security
architecture uses many security technologies to achieve this goal.
NetFlow
NetFlow technology is used to gather information about data flowing through a network. NetFlow
information can be likened to a phone bill for your network traffic. It shows you who and what devices
are in your network, as well as when and how users and devices accessed your network. NetFlow is an
important component in behavior-based detection and analysis. Switches, routers, and firewalls
equipped with NetFlow can report information about data entering, leaving, and travelling through the
network. Information is sent to NetFlow Collectors that collect, store, and analyze NetFlow records.
NetFlow is able to collect information on usage through many different characteristics of how data is
moved through the network, as shown in the figure. By collecting information about network data flows,
NetFlow is able to establish baseline behaviors on more than 90 different attributes.
Many large organizations have a Computer Security Incident Response Team (CSIRT) to receive, review,
and respond to computer security incident reports, as shown in Figure 1. The primary mission of CSIRT
is to help ensure company, system, and data preservation by performing comprehensive investigations
into computer security incidents. To prevent security incidents, Cisco CSIRT provides proactive threat
assessment, mitigation planning, incident trend analysis, and security architecture review, as shown in
Figure 2.
Cisco’s CSIRT collaborates with Forum of Incident Response and Security Teams (FIRST), the National
Safety Information Exchange (NSIE), the Defense Security Information Exchange (DSIE), and the DNS
Operations Analysis and Research Center (DNS-OARC).
There are national and public CSIRT organizations like the CERT Division of the Software Engineering
Institute at Carnegie Mellon University, that are available to help organizations, and national CSIRTs,
develop, operate, and improve their incident management capabilities.
Security Playbook
Technology is constantly changing. That means cyberattacks are evolving too. New vulnerabilities and
attack methods are discovered continuously. Security is becoming a significant business concern
because of the resulting reputation and financial impact from security breaches. Attacks are targeting
critical networks and sensitive data. Organizations should have plans to prepare for, deal with, and
recover from a breach.
One of the best way to prepare for a security breach is to prevent one. There should be guidance on
identifying the cybersecurity risk to systems, assets, data, and capabilities, protecting the system by the
implementation of safeguards and personnel training, and detecting cybersecurity event as soon as
possible. When a security breach is detected, appropriate actions should be taken to minimize its impact
and damage. The response plan should be flexible with multiple action options during the breach. After
the breach is contained and the compromised systems and services are restored, security measures and
processes should be updated to include the lessons learned during the breach.
All this information should be compiled into a security playbook. A security playbook is a collection of
repeatable queries (reports) against security event data sources that lead to incident detection and
response. Ideally the security playbook must accomplish the following actions:
These are some of the tools used to detect and prevent security incidents:
• SIEM – A Security Information and Event Management (SIEM) system is software that collects and
analyzes security alerts, logs and other real time and historical data from security devices on the
network.
• DLP – Data Loss Prevention Software (DLP) is a software or hardware system designed to stop
sensitive data from being stolen from or escaping a network. A DLP system may focus on file access
authorization, data exchange, data copying, user activity monitoring, and more. DLP systems are
designed to monitor and protect data in three different states: data in-use, data in-motion and data
at-rest. Data in-use is focused on the client, data in-motion refers to data as it travels through the
network, and data at-rest refers to data storage.
• Cisco ISE and TrustSec – Cisco Identity Services Engine (Cisco ISE) and Cisco TrustSec enforce
access to network resources by creating role-based access control policies that segment access to
the network (guests, mobile users, employees) without added complexity. Traffic classification is
based on user or device identity. Click play in the figure to learn more about ISE.
An Intrusion Detection System (IDS), shown in the figure, is either a dedicated network device, or one
of several tools in a server or firewall that scans data against a database of rules or attack signatures,
looking for malicious traffic. If a match is detected, the IDS will log the detection, and create an alert for
a network administrator. The Intrusion Detection System does not take action when a match is detected
so it does not prevent attacks from happening. The job of the IDS is merely to detect, log and report.
The scanning performed by the IDS slows down the network (known as latency). To prevent against
network delay, an IDS is usually placed offline, separate from regular network traffic. Data is copied or
mirrored by a switch and then forwarded to the IDS for offline detection. There are also IDS tools that
can be installed on top of a host computer operating system, like Linux or Windows.
An Intrusion Prevention System (IPS) has the ability to block or deny traffic based on a positive rule or
signature match. One of the most well-known IPS/IDS systems is Snort. The commercial version of Snort
is Cisco’s Sourcefire. Sourcefire has the ability to perform real-time traffic and port analysis, logging,
content searching and matching, and can detect probes, attacks, and port scans. It also integrates with
other third party tools for reporting, performance and log analysis.
This chapter began by discussing some of the technology and processes used by cybersecurity
professionals when protecting an organization’s network, equipment and data. This included types of
firewalls, security appliances, and software.
Botnets, the kill chain, behavior-based security, and using NetFlow to monitor a network were covered.
Finally, Cisco’s approach to cybersecurity, including the CSIRT team and the security playbook were
explained. It briefly covers the tools that cybersecurity professionals use to detect and prevent network
attacks, including SIEM, DLP, Cisco ISE and TrustSec, as well as IDS and IPS systems.
If you would like to further explore the concepts in this chapter, please check out the Additional
Resources and Activities page in Student Resources.
Chapter 5: Will Your Future Be in Cybersecurity
This chapter covers the legal and ethical issues that arise when working in cybersecurity. It also
discusses educational and career paths for cybersecurity. There are educational paths towards
certifications that you may wish to pursue with the Cisco Networking Academy. Some of these
certifications are prerequisites to Specialization Certificates in many areas of networking, including
cybersecurity.
The Networking Academy Talent Bridge page (netacad.com under Resources) provides good
information to help you write a great résumé and prepare for a job interview. It also contains listings
for Cisco and Cisco Partner jobs. Three external Internet job search engines are presented for you to
explore.
Cybersecurity professionals must have the same skills as hackers, especially black hat hackers, in order
to protect against attacks. One difference between a hacker and a cybersecurity professional is that the
cybersecurity professional must work within legal boundaries.
You do not even have to be an employee to be subject to cybersecurity laws. In your private life, you
may have the opportunity and skills to hack another person’s computer or network. There is an old
saying, “Just because you can does not mean you should.” Keep this in mind. Most hackers leave tracks,
whether they know it or not, and these tracks can be followed back to the hacker.
Cybersecurity professionals develop many skills which can be used for good or evil. Those who use their
skills within the legal system, to protect infrastructure, networks, and privacy are always in high
demand.
Most countries have some cybersecurity laws in place. They may have to do with critical infrastructure,
networks, and corporate and individual privacy. Businesses are required to abide by these laws.
In some cases, if you break cybersecurity laws while doing your job, it is the company that may be
punished and you could lose your job. In other cases, you could be prosecuted, fined, and possibly
sentenced.
In general, if you are confused about whether an action or behavior might be illegal, assume that it is
illegal and do not do it. Your company may have a legal department or someone in the human resources
department who can answer your questions before you do something illegal.
The area of cybersecurity law is much newer than cybersecurity itself. As mentioned before, most
countries have some laws in place, and there will be more laws to come.
Ethical Issues in Cybersecurity
In addition to working within the confines of the law, cybersecurity professionals must also
demonstrate ethical behavior.
A person may act unethically and not be subject to prosecution, fines or imprisonment. This is because
the action may not have been technically illegal. But that does not mean that the behavior is acceptable.
Ethical behavior is fairly easy to ascertain. It is impossible to list all of the various unethical behaviors
that can be exhibited by someone with cybersecurity skills. Below are just two. Ask yourself:
• Would I want to discover that someone has hacked into my computer and altered images in my
social network sites?
If your answer to any of these questions was ‘no’, then do not do such things to others.
Ethics are codes of behavior that are sometimes enforced by laws. There are many areas in
cybersecurity that are not covered by laws. This means that doing something that is technically legal
still may not be the ethical thing to do. Because so many areas of cybersecurity are not (or not yet)
covered by laws, many IT professional organizations have created codes of ethics for persons in the
industry. Below is a list of three organizations with Codes of Ethics:
• The CyberSecurity Institute (CSI) has published a code of ethics that you can read here.
• The Information Systems Security Association (ISSA) has a code of ethics found here.
• The Association of Information Technology Professionals (AITP) has both a code of ethics and a
standard of conduct found here.
Cisco has a team devoted exclusively to ethical business conduct. Go here to read more about it.
This site contains an eBook about Cisco’s Code of Business Conduct, and a pdf file. In both files is an
“Ethics Decision Tree”, as shown in the figure. Even if you do not work for Cisco, the questions and
answers found in this decision tree can easily be applied to your place of work. As with legal questions,
in general, if you are confused about whether an action or behavior might be unethical, assume that it
is unethical and do not do it. There may be someone in your company’s human resources or legal
department who can clarify your situation before you do something that would be considered unethical.
Search online to find other IT-related organizations with codes of ethics. Try to find what they all have
in common.
Cybersecurity Jobs
Many other businesses and industries are hiring cybersecurity professionals. There are several online
search engines to help you find the right job in cybersecurity:
• ITJobMatch – The ITJobMatch search engine specializes in IT jobs of every kind, all over the globe.
• Monster – Monster is a search engine for all types of jobs. The link provided goes directly to
cybersecurity jobs.
• CareerBuilder – CareerBuilder is also a search engine for all types of jobs. The link provided goes
directly to cybersecurity jobs.
These are just three of many different online job search sites. Even if you are just starting your education
in IT and cybersecurity, looking at job search engines is a good way to see what kinds of jobs are
available, all over the world.
Our hope is that this course has peaked your interest in pursuing an education in IT and cybersecurity
and then continuing on to an exciting career! The Cisco Networking Academy provides many courses
for you to continue your education in Cybersecurity. We encourage you to enroll in the next course,
Cybersecurity Essentials, to continue to build strong foundational knowledge in Cybersecurity. Check
out the Cisco Networking Academy and see a list of courses that are available. Furthermore, you can
also access career resources available in Cisco Networking Academy.
Just for fun, click here to read a graphic novel about a cybersecurity superhero!
This chapter began by discussing the legal and ethical issues that professionals in cybersecurity
commonly face. It also presented educational and career paths for those who wish to become
cybersecurity professionals. Three external Internet job search engines are presented for you to
explore.
If you would like to further explore the concepts in this chapter, please check out the Additional
Resources and Activities page in Student Resources.
Background / Scenario
It is important to understand when data has been corrupted or it has been tampered with. A hashing program
can be used to verify if data has changed, or if it has remained the same. A hashing program performs a hash
function on data or a file, which returns a (usually much shorter) value. There are many different hash
functions, some very simple and some very complex. When the same hash is performed on the same data,
the value that is returned is always the same. If any change is performed on the data, the hash value returned
will be different.
Note: You will need installation privileges and some knowledge of the process to install Windows programs.
Required Resources
• PC with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 4 www.netacad.com
Lab – Compare Data with a Hash
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 4 www.netacad.com
Lab – Compare Data with a Hash
e. Click Finish on the last screen, and close the README file if it opened. You may read the file if you wish.
f. HashCalc is now installed and running.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 4 www.netacad.com
Lab – Compare Data with a Hash
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 4 www.netacad.com
Lab – What was Taken?
Objectives
Search for and read about a few recent occurrences of security breaches.
Background / Scenario
Security breaches occur when individuals or applications are trying to gain unauthorized access to data,
applications, services, or devices. During these breaches, the attackers, whether they are insiders or not,
attempt to obtain information that they could use for financial gains or other advantages. In this lab, you will
explore a few security breaches to determine what was taken, what exploits were used, and what you can do
to protect yourself.
Required Resources
• PC or mobile device with Internet access
SC Magazine
SC Magazine
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 2 www.netacad.com
Lab – What was Taken?
Reflection
After reading about the security breaches, what can you do to prevent these types of breaches?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 2 www.netacad.com
Lab – Create and Store Strong Passwords
Objectives
Understand the concepts behind a strong password.
Part 1: Explore the concepts behind creating a strong password.
Part 2: Explore the concepts behind securely storing your passwords?
Background / Scenario
Passwords are widely used to enforce access to resources. Attackers will use many techniques to learn
users’ passwords and gain unauthorized access to a resource or data.
To better protect yourself, it is important to understand what makes a strong password and how to store it
securely.
Required Resources
• PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Create and Store Strong Passwords
Take a moment to analyze the characteristics of a strong password and the common password policy set
shown above. Why does the policy set neglect the first two items? Explain.
A good way to create strong passwords is to choose four or more random words and string them together.
The password televisionfrogbootschurch is stronger than J0n@than#81. Notice that while the second
password is in compliance with the policies described above, password cracker programs are very efficient at
guessing that type of password. While many password policy sets will not accept the first password,
televisionfrogbootschurch, it is much stronger than the second. It is easier for the user to remember
(especially is associated with an image), it is very long and its random factor makes it hard for password
crackers to guess it.
Using an online password creation tool, create passwords based on the common company password policy
set described above.
a. Open a web browser and go to http://passwordsgenerator.net
b. Select the options to conform to password policy set
c. Generate the password.
Is the password generated easy to remember?
Using an online password creation tool, create passwords based on random words. Notice that because
the words are appended together, they are not seen as dictionary words.
d. Open a web browser and go to http://preshing.com/20110811/xkcd-password-generator/
e. Generate a random word password by clicking Generate Another! at the top portion of the webpage.
f. Is the password generated easy to remember?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Create and Store Strong Passwords
Besides you, at least one other entity has access to your passwords. Who is that entity?
While having all your passwords stored on the same place can be convenient, there are drawbacks. Can
you think of any?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com
Lab – Backup Data to External Storage
Objectives
Backup user data.
Part 1: Use a local external disk to backup data
Part 2: Use a remote disk to backup data
Background / Scenario
It is important to establish a backup strategy that includes data recovery of personal files.
While many backup tools are available, this lab focuses on the Microsoft Backup Utility to perform backups to
local external disks. In Part 2, this lab uses the Dropbox service to backup data to a remote or cloud-based
drive.
Required Resources
• PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Backup Data to External Storage
e. Start the backup by clicking the Save settings and run backup.
b. Research the services you listed above. Are these services free?
d. Can you access your data from all devices you own (desktop, laptop, tablet and phone)?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Backup Data to External Storage
Reflection
1. What are the benefits of backing up data to a local external disk?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com
Lab – Who Owns Your Data?
Objectives
Explore the ownership of your data when that data is not stored in a local system.
Part 1: Explore the Terms of Service Policy
Part 2: Do You Know What You Signed Up For?
Background / Scenario
Social media and online storage have become an integral part of many people’s lives. Files, photos, and
videos are shared between friends and family. Online collaboration and meetings are conducted in the
workplace with people who are many miles from each other. The storage of data is no longer limited to just
the devices you access locally. The geographical location of storage devices is no longer a limiting factor for
storing or backing up data at remote locations.
In this lab, you will explore legal agreements required to use various online services. You will also explore
some of the ways you can protect your data.
Required Resources
• PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Who Owns Your Data?
e. What are your rights regarding your data? Can you request a copy of your data?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Who Owns Your Data?
b. What can you do to safeguard your account and protect your data?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com
Lab – Discover Your Own Risky Online Behavior
Objectives
Explore actions performed online that may compromise your safety or privacy.
Background / Scenario
The Internet is a hostile environment, and you must be vigilant to ensure your data is not compromised.
Attackers are creative and will attempt many different techniques to trick users. This lab helps you identify
risky online behavior and provide tips on how to become safer online.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Discover Your Own Risky Online Behavior
2) You verify the URL to ensure it is the institution you were looking for before entering any information.
(0 points)
3) You don’t use online banking or any online financial services. (0 points)
f. You read about a program and decide to give it a try. You look around the Internet and find a trial version
on an unknown site, you:
1) Promptly download and install the program. (3 points)
2) Search for more information about the program creator before downloading it. (1 points)
3) Do not download or install the program. (0 points)
g. You find a USB drive while walking to work. you:
1) Pick it up and plug it into your computer to look at its contents. (3 points)
2) Pick it up and plug it into your computer to completely erase its contents before re-using it. (3 points)
3) Pick it up and plug it into your computer to run an anti-virus scan before re-using it for your own files
(3 points)
4) Don’t pick it up. (0 points)
h. You need to connect to the Internet and you find an open Wi-Fi hotspot. You:
1) Connect to it and use the Internet. (3 points)
2) Don’t connect to it and wait until you have a trusted connection. (0 points)
3) Connect to it and establishes a VPN to a trusted server before sending any information. (0 points)
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Discover Your Own Risky Online Behavior
e. Malicious web pages can be easily made to look like a bank or financial institution website. Before
clicking the links or providing any information, double-check the URL to make sure it is the correct web
page.
f. When you allow a program to run on your computer, you give it a lot of power. Choose wisely before
allowing a program to run. Research to make sure the company or individual behind the program is a
serious and legitimate author. Also, only download the program from the official website of the company
or individual.
g. USB drives and thumb drives include a tiny controller to allow computers to communicate with it. It is
possible to infect that controller and instruct it to install malicious software on the host computer. Because
the malware is hosted in the USB controller itself and not in the data area, no amount of erasing or anti-
virus scanning will detect the malware.
h. Attackers will often deploy fake Wi-Fi hotspots to lure users. Because the attacker has access to all the
information exchanged via the compromised hotspot, users connected to that hotspot are at risk. Never
use unknown Wi-Fi hot spots without encrypting your traffic through a VPN. Never provide sensitive data
such as credit card numbers while using an unknown network (wired or wireless).
Reflection
After analyzing your online behavior, what changes would you make to protect yourself online?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com