This document discusses various cybersecurity vulnerabilities and weaknesses. It begins by differentiating between internal and external weaknesses. It then explains buffer overflow attacks and how an attacker can cause a buffer overflow. Finally, it discusses how to design countermeasures against vulnerabilities. The document proceeds to list the top five cybersecurity vulnerabilities: injection vulnerabilities, buffer overflows, sensitive data exposure, broken authentication and session management, and security misconfiguration. For each, it provides details on how exploits occur and examples. It concludes by offering tips on how systems can be better secured, such as keeping firewalls enabled, updating software, and using strong, unique passwords.
This document discusses various cybersecurity vulnerabilities and weaknesses. It begins by differentiating between internal and external weaknesses. It then explains buffer overflow attacks and how an attacker can cause a buffer overflow. Finally, it discusses how to design countermeasures against vulnerabilities. The document proceeds to list the top five cybersecurity vulnerabilities: injection vulnerabilities, buffer overflows, sensitive data exposure, broken authentication and session management, and security misconfiguration. For each, it provides details on how exploits occur and examples. It concludes by offering tips on how systems can be better secured, such as keeping firewalls enabled, updating software, and using strong, unique passwords.
This document discusses various cybersecurity vulnerabilities and weaknesses. It begins by differentiating between internal and external weaknesses. It then explains buffer overflow attacks and how an attacker can cause a buffer overflow. Finally, it discusses how to design countermeasures against vulnerabilities. The document proceeds to list the top five cybersecurity vulnerabilities: injection vulnerabilities, buffer overflows, sensitive data exposure, broken authentication and session management, and security misconfiguration. For each, it provides details on how exploits occur and examples. It concludes by offering tips on how systems can be better secured, such as keeping firewalls enabled, updating software, and using strong, unique passwords.
This document discusses various cybersecurity vulnerabilities and weaknesses. It begins by differentiating between internal and external weaknesses. It then explains buffer overflow attacks and how an attacker can cause a buffer overflow. Finally, it discusses how to design countermeasures against vulnerabilities. The document proceeds to list the top five cybersecurity vulnerabilities: injection vulnerabilities, buffer overflows, sensitive data exposure, broken authentication and session management, and security misconfiguration. For each, it provides details on how exploits occur and examples. It concludes by offering tips on how systems can be better secured, such as keeping firewalls enabled, updating software, and using strong, unique passwords.
LEARNING OUTCOMES: At the end of the session, the students should be able to: 1. Differentiate internal and external weaknesses or the vulnerability 2. Explain and discussed attacker cause buffer overflow 3. Designed counter measurement Top five cyber security vulnerabilities • Injection vulnerabilities Injection vulnerabilities occur every time an application sends untrusted data to an interpreter.
• The most popular injection vulnerabilities affect SQL, LDAP, XPath,
XML parsers and program arguments. Top five cyber security vulnerabilities •Buffer Overflows A buffer overflow vulnerability condition exists when an application attempts to put more data in a buffer than it can hold.
• Writing outside the space assigned to buffer allows an attacker to
overwrite the content of adjacent memory blocks causing data corruption, crash the program, or the execution of an arbitrary malicious code. Top five cyber security vulnerabilities •Sensitive Data Exposure Sensitive data exposure occurs every time a threat actor gains access to the user sensitive data.
Sensitive data exposure refers the access to data at
rest, in transit, included in backups and user browsing data. Top five cyber security vulnerabilities • Broken Authentication and Session Management The exploitation of a broken Authentication and Session Management flaw occurs when an attacker uses leaks or flaws in the authentication or session management procedures
• (e.g. Exposed accounts, passwords, session IDs) to impersonate
other users. Top five cyber security vulnerabilities • Security Misconfiguration I consider this category of vulnerability the most common and dangerous. It is quite easy to discover web servers and applications that have been misconfigured resulting in opening to cyber-attacks. Typical Examples of Security Misconfiguration Flaws:
• Running outdated software.
• Applications and products running in production in debug mode or that still include debugging modules. • Running unnecessary services on the system. • Not configuring problems the access to the server resources and services that can result in the disclosure of sensitive information or that can allow an attacker to compromise it. Some typical example of security misconfiguration flaws:
•Not changing factory settings (i.e. default keys and
passwords). • Incorrect exception management that could disclose system information to the attackers, including stack traces. • Use of default accounts.
The exploitation of one of these above scenarios could allow an attacker
to compromise a system. How to be secured?
• Leave the Firewall Enabled and Configure It
Correctly • Uninstall Java • Keep Your Software Updated — Automatically if Possible • Be Careful About Programs You Download and Run How to be secured? • Avoid Pirated and Cracked Software • Beware of Phishing and Social Engineering • Don’t Reuse Passwords • Use Secure Passwords What makes a system secure? • Protect with passwords. • Design safe systems. • Conduct screening and background checks. • Provide basic training. • Avoid unknown email attachments. • Hang up and call back. What makes a system secure?
• Think before clicking.
• Use a virus scanner, and keep all software up-to- date. • Keep sensitive data out of the cloud. • Stay paranoid. THANK YOU!!!! THANK YOU!!!! Research Topic: • How Virus works(Sample codes, how virus flow in the internet and network) • Blockchain Security (How blockchain can play a major role in Cyber Security.) • Cryptography( DES, AES, IDEA, SSL, TLS and all.) • Malware Analysis and Reverse Engineering( analysis, detection, remediation, and technical discussions on decent or broken functionality within anti-malware tools.) • Ransomware (You can give brief of past ransomware attacks- NotPetya, Bad Rabbit, WannaCry etc.) • Mobile Security (Data leakage by using third part apps, avoiding fake access points through hotspots.) • Web Security (SQL Injection, XSS, CSRF attacks etc) • Computer Security, Ethics and Privacy THANK YOU!!!!