Amateurs
Amateurs
Amateurs
Amateurs, or script kiddies, have little or no skill, often using existing tools or instructions found
on the Internet to launch attacks. Some are just curious(tafit), while others try to demonstrate
their skills and cause harm. They may be using basic tools, but the results can still be
devastating(haribiwa)
Hackers
This group of criminals breaks into computers or networks to gain access for various reasons.
The intent of the break-in determines the classification of these attackers as white, gray, or black
hats. White hat attackers break into networks or computer systems to discover weaknesses in
order to improve the security of these systems. The owners of the system give permission to
perform the break-in, and they receive the results of the test. On the other hand, black hat
attackers take advantage of any vulnerability for illegal personal, financial or political gain. Gray
hat attackers are somewhere between white and black hat attackers. The gray hat attackers may
find a vulnerability and report it to the owners of the system if that action coincides with their
agenda. Some gray hat hackers publish the facts about the vulnerability on the Internet, so that
other attackers can exploit it.
Organized Hackers
These criminals include organizations of cyber criminals, hacktivists, terrorists, and state-
sponsored hackers. Cyber criminals are usually groups of professional criminals focused on
control, power, and wealth. The criminals are highly sophisticated and organized, and may even
provide cybercrime as a service. Hacktivists make political statements to create awareness to
issues that are important to them. Hacktivists publically publish embarrassing information about
their victims. State-sponsored attackers gather intelligence or commit sabotage on behalf of their
government. These attackers are usually highly trained and well-funded. Their attacks focus on
specific goals that are beneficial to their government. Some state-sponsored attackers are even
members of their nations’ armed forces.
Why Become a Cybersecurity Specialist?
The demand for cybersecurity specialists has grown more than the demand for other IT jobs. All
of the technology that transforms the kingdom and improves people’s way of life also makes it
more vulnerable to attacks. Technology alone cannot prevent, detect, respond and recover from
cybersecurity incidents. Consider the following:
The skill level required for an effective cybersecurity specialist and the shortage of
qualified cybersecurity professionals translates to higher earning potential.
Information technology is constantly changing. This is also true for cybersecurity. The
highly dynamic nature of the cybersecurity field can be challenging and fascinating.
A cybersecurity specialist’s career is also highly portable. Jobs exist in almost every
geographic location.
Establishing early warning sensors and alert networks. Due to cost and the impossibility
of monitoring every network, organizations monitor high-value targets or create
imposters that look like high-value targets. Because these high-value targets are more
likely to experience attacks, they warn others of potential attacks.
Sharing cyber intelligence information. Business, government agencies and countries
now collaborate to share critical information about serious attacks to critical targets in
order to prevent similar attacks in other places. Many countries have established cyber
intelligence agencies to collaborate worldwide in combating major cyberattacks.
Enacting new laws to discourage cyberattacks and data breaches. These laws have severe
penalties to punish cyber criminals caught carrying out illegal actions.
The figure displays measures to thwart cyber criminals and a brief description of each.
Threats to Internet Services
There are many essential technical services needed for a network, and ultimately the Internet, to
operate. These services include routing, addressing, domain naming, and database management.
These services also serve as prime targets for cyber criminals.
Criminals use packet-sniffing tools to capture data streams over a network. This means that all
sensitive data, like usernames, passwords and credit card numbers, are at risk. Packet sniffers
work by monitoring and recording all information coming across a network. Criminals can also
use rogue devices, such as unsecured Wi-Fi access points. If the criminal sets this up near a
public place, such as a coffee shop, unsuspecting individuals may sign on and the packet sniffer
copies their personal information.
Domain Name Service (DNS) translates a domain name, such as www.facebook.com, into its
numerical IP address. If a DNS server does not know the IP address, it will ask another DNS
server. With DNS spoofing (or DNS cache poisoning), the criminal introduces false data into a
DNS resolver’s cache. These poison attacks exploit a weakness in the DNS software that causes
the DNS servers to redirect traffic for a specific domain to the criminal’s computer, instead of
the legitimate owner of the domain.
Packets transport data across a network or the Internet. Packet forgery (or packet injection)
interferes with an established network communication by constructing packets to appear as if
they are part of a communication. Packet forgery allows a criminal to disrupt or intercept
packets. This process enables the criminal to hijack an authorized connection or denies an
individual’s ability to use certain network services. Cyber professionals call this a man-in-the-
middle attack.
The examples given only scratch the surface of the types of threats criminals can launch against
Internet and network services.
Attacks can originate from within an organization or from outside of the organization, as shown
in the figure. An internal user, such as an employee or contract partner, can accidently or
intentionally:
Facilitate outside attacks by connecting infected USB media into the corporate computer
system
Accidentally invite malware onto the network through malicious email or websites
Internal threats have the potential to cause greater damage than external threats because internal
users have direct access to the building and its infrastructure devices. Internal attackers typically
have knowledge of the corporate network, its resources, and its confidential data. They may also
have knowledge of security countermeasures, policies and higher levels of administrative
privileges.
External threats from amateurs or skilled attackers can exploit vulnerabilities in networked
devices, or can use social engineering, such as trickery, to gain access. External attacks exploit
weaknesses or vulnerabilities to gain access to internal resources.
Traditional Data
Corporate data includes personnel information, intellectual property, and financial data.
Personnel information includes application materials, payroll, offer letters, employee
agreements, and any information used in making employment decisions. Intellectual property,
such as patents, trademarks and new product plans, allows a business to gain economic
advantage over its competitors. Consider this intellectual property as a trade secret; losing this
information can be disastrous for the future of the company. Financial data, such as income
statements, balance sheets, and cash flow statements, gives insight into the health of the
company.
With the emergence of IoT, there is much more data to be managed and secured. All of these
connections, plus the expanded storage capacity and storage services offered through the Cloud
and virtualization, has led to the exponential growth of data. This data expansion created a new
area of interest in technology and business called “Big Data".
Algorithm attacks can track system self-reporting data, like how much energy a computer is
using, and use that information to select targets or trigger false alerts. Algorithmic attacks can
also disable a computer by forcing it to use memory or by overworking its central processing
unit. Algorithmic attacks are more devious because they exploit designs used to improve energy
savings, decrease system failures, and improve efficiencies.
Finally, the new generation of attacks involves intelligent selection of victims. In the past,
attacks would select the low hanging fruit or most vulnerable victims. However, with greater
attention to detection and isolation of cyberattacks, cyber criminals must be more careful. They
cannot risk early detection or the cybersecurity specialists will close the gates of the castle. As a
result, many of the more sophisticated attacks will only launch if the attacker can match the
object signature targeted.
Broader Scope and Cascade Effect
Federated identity management refers to multiple enterprises that let their users use the same
identification credentials gaining access to the networks of all enterprises in the group. This
broadens the scope and increases the probability of a cascading effect should an attack occur.
A federated identity links a subject’s electronic identity across separate identity management
systems. For example, a subject may be able to log onto Yahoo! with Google or Facebook
credentials. This is an example of social login.
The goal of federated identity management is to share identity information automatically across
castle boundaries. From the individual user’s perspective, this means a single sign-on to the web.
It is imperative that organizations scrutinize the identifying information shared with partners.
Social security numbers, names, and addresses may allow identity thieves the opportunity to
steal this information from a partner to perpetrate fraud. The most common way to protect
federated identity is to tie login ability to an authorized device.
Safety Implications
Emergency call centers in the U.S. are vulnerable to cyberattacks that could shut down 911
networks, jeopardizing public safety. A telephone denial of service (TDoS) attack uses phone
calls against a target telephone network tying up the system and preventing legitimate calls from
getting through. Next generation 911 call centers are vulnerable because they use Voice-over-IP
(VoIP) systems rather than traditional landlines. In addition to TDoS attacks, these call centers
can also be at risk of distributed-denial-of-service (DDoS) attacks that use many systems to flood
the resources of the target making the target unavailable to legitimate users. There are many
ways nowadays to request 911 help, from using an app on a smartphone to using a home security
system.
Operate and Maintain includes providing the support, administration, and maintenance
required to ensure IT system performance and security.
Protect and Defend includes the identification, analysis, and mitigation of threats to internal
systems and networks.
Investigate includes the investigation of cyber events and/or cyber crimes involving IT
resources.
Collect and Operate includes specialized denial and deception operations and the collection of
cybersecurity information.
Oversight and Development provides for leadership, management, and direction to conduct
cybersecurity work effectively.
Within each category, there are several specialty areas. The specialty areas then define common
types of cybersecurity work.
The figure displays each of the categories and a brief description of each.
Industry Certifications
In a world of cybersecurity threats, there is a great need for skilled and knowledgeable
information security professionals. The IT industry established standards for cybersecurity
specialists to obtain professional certifications that provide proof of skills, and knowledge level.
CompTIA Security+
This intermediate-level certification asserts that cybersecurity specialists holding this credential
possess the skills and knowledge for various hacking practices. These cybersecurity specialists
use the same skills and techniques used by the cyber criminals to identify system vulnerabilities
and access points into systems.
SANS GIAC Security Essentials (GSEC)
The GSEC certification is a good choice for an entry-level credential for cybersecurity specialists
who can demonstrate that they understand security terminology and concepts and have the skills
and expertise required for “hands-on” security roles. The SANS GIAC program offers a number
of additional certifications in the fields of security administration, forensics, and auditing.
The CISSP certification is a vendor-neutral certification for those cybersecurity specialists with a
great deal of technical and managerial experience. It is also formally approved by the U.S.
Department of Defense (DoD) and is a globally recognized industry certification in the security
field.
Cyber heroes responsible for managing, developing and overseeing information security systems
at the enterprise level or for those developing best security practices can qualify for CISM.
Credential holders possess advanced skills in security risk management.
Cyber heroes also analyze policy, trends, and intelligence to understand how cyber criminals
think. Many times, this may involve a large amount of detective work.
The following recommendations will help aspiring cybersecurity specialists to achieve their
goals: