Chapter 1 and 2-1
Chapter 1 and 2-1
Answer- Security architecture is a unified security design that addresses the necessities and
potential risks involved in a certain scenario or environment. It also specifies when and where
to apply security controls. The design process is generally reproducible.
In security architecture, the design principles are reported clearly, and in-depth security
control specifications are generally documented in independent documents. System
architecture can be considered a design that includes a structure and addresses the connection
between the components of that structure.
Relationships and Dependencies: Signifies the relationship between the various components
inside IT architecture and the way in which they depend on each other.
Benefits: The main advantage of security architecture is its standardization, which makes it
affordable. Security architecture is cost-effective due to the re-use of controls described in the
architecture.
Form: Security architecture is associated with IT architecture; however, it may take a variety
of forms. It generally includes a catalogue of conventional controls in addition to relationship
diagrams, principles, and so on.
Drivers: Security controls are determined based on four factors:
o Risk management
o Benchmarking and good practice
o Financial
o Legal and regulatory
Architecture Risk Assessment: Evaluates the business influence of vital business assets, and
the odds and effects of vulnerabilities and security threats.
Security Architecture and Design: The design and architecture of security services, which
facilitate business risk exposure objectives.
Implementation: Security services and processes are implemented, operated and controlled.
Assurance services are designed to ensure that the security policy and standards, security
architecture decisions, and risk management are mirrored in the real runtime implementation.
Operations and Monitoring: Day-to-day processes, such as threat and vulnerability
management and threat management. Here, measures are taken to supervise and handle the
operational state in addition to the depth and breadth of the systems security.
Page | 1
Answer- A cyber-attack is an exploitation of computer systems and networks. It uses
malicious code to alter computer code, logic or data and lead to cybercrimes, such as
information and identity theft.
We are living in a digital era. Now a day, most of the people use computer and internet. Due
to the dependency on digital things, the illegal computer activity is growing and changing
like any type of crime.
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important
web-based attacks are as follows-
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the
application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a
DNS resolver's cache causing the name server to return an incorrect IP address, diverting
traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on
for a long period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create
cookies to store the state and user sessions. By stealing the cookies, an attacker can have
access to all of the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a
trustworthy entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large number
of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or by
security, analysts to test an organization's network security.
6. Denial of Service
Page | 2
It is an attack which meant to make a server or network resource unavailable to the users. It
accomplishes this by flooding the target with traffic or sending it information that triggers a
crash. It uses the single system and single internet connection to attack a server. It can be
classified into the following-
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in bit per second.
Application layer attacks- Its goal is to crash the web server and is measured in request per
second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a
web server to deliver web pages for which he is not authorized to browse.
It is a type of attack that allows an attacker to access unauthorized or essential files which is
available on the web server or to execute malicious files on the web server by making use of
the include functionality.
It is a type of attack that allows an attacker to intercepts the connection between client and
server and acts as a bridge between them. Due to this, an attacker will be able to read, insert
and modify the data in the intercepted connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network.
Some of the important system-based attacks are as follows-
1. Virus
It is a type of malicious software program that spread throughout the computer files without
the knowledge of a user. It is a self-replicating malicious computer program that replicates by
inserting copies of it into other computer programs when executed. It can also execute
instructions that cause harm to the system.
2. Worm
Page | 3
It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers. It works same as the computer virus. Worms often originate from email
attachments that appear to be from trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some malicious code will run
in the background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or
other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they
receive specific input. Common examples of bots program are the crawler, chatroom bots,
and malicious bots.
Answer- "Information is power," as the saying goes. And in most scenarios it's true: having
critical information, at the right time, and especially knowing how to use it, can be a great
source of power.
Of course, hacking has evolved too: nowadays you can find a lot of automated OSINT
Tools that can help anyone with security research and intel reconnaissance in a way that just
wasn’t possible twenty years ago.
In past decades, ethical hacking and penetration testing were performed by only a few
security experts. Now almost anyone can report security incidents. Ethical hacking tools
allow you to scan, search and find the flaws and vulnerabilities within any company to help
make their systems and applications more secure (as seen in the recent Top CVE’s exploited
in the wild post published a few weeks ago).
Today we’ll explore the best ethical hacking tools used by modern security researchers.
John the Ripper is one of the most popular password crackers of all time. It’s also one of the
best security tools available to test password strength in your operating system, or for
auditing one remotely.
Page | 4
This password cracker is able to auto-detect the type of encryption used in almost any
password, and will change its password test algorithm accordingly, making it one of the most
intelligent password cracking tools ever.
This ethical hacking tool uses brute force technology to decipher passwords and algorithms
such as:
Another bonus is that JTR is open source, multi-platform and fully available for Mac, Linux,
Windows and Android.
¶2. Metasploit
Metasploit is an open source cyber-security project that allows infosec professionals to use
different penetration testing tools to discover remote software vulnerabilities. It also functions
as an exploit module development platform.
One of the most famous results of this project is the Metasploit Framework, written in Ruby,
which enables you to develop, test and execute exploits easily. The framework includes a set
of security tools that can be used to:
Mac OS X
Linux
Windows
¶3. Nmap
Nmap (Network Mapper) is a free open source security tool used by infosec professionals to
manage and audit network and OS security for both local and remote hosts. It's one of the
most popular tools in the hackers toolkit..
Despite being one of the oldest security tools in existence (launched in 1997), it continues to
be actively updated and receives new improvements every year.
Page | 5
It’s also regarded as one of the most effective network mappers around, known for being fast
and for consistently delivering thorough results with any security investigation.
Mac OS X
Linux, OpenBSD and Solaris
Microsoft Windows
4. Wireshark
Wiresharkis a free open-source software that allows you to analyze network traffic in real
time. Thanks to its sniffing technology, Wireshark is widely known for its ability to detect
security problems in any network, as well as for its effectiveness in solving general
networking problems.
While sniffing the network, you’re able to intercept and read results in human-readable
format, which makes it easier to identify potential problems (such as low latency), threats and
vulnerabilities.
Main features:
Wireshark supports up to 2000 different network protocols, and is available on all major
operating systems including:
Linux
Windows
Mac OS X
FreeBSD, NetBSD, OpenBSD
Page | 6
¶5. OpenVAS
OpenVAS (also known as the old classic ―Nessus‖) is an open-source network scanner used
to detect remote vulnerabilities in any hosts. One of the best-known network vulnerability
scanners, it’s very popular among system administrators and DevOps and infosec
professionals.
Main features
While its web-based interface allows it to be run from any operating system, a CLI is also
available and works well for Linux, Unix and Windows operating systems.
The free version can be downloaded from the OpenVAS website, but there is also a
commercial enterprise license available from the Greenbone Security (parent company)
website.
6. IronWASP
If you’re going to perform ethical hacking, IronWASP is another great tool. It’s free, open
source and multi-platform, perfect for those who need to audit their web servers and public
applications.
One of the most appealing things about IronWASP is that you don’t need to be an expert to
manage its main features. It’s all GUI-based, and full scans can be performed in only a few
clicks. So, if you’re just getting started with ethical hacking tools, this is a great way to start.
Page | 7
¶7. Nikto
Nikto is another favorite in the hackers toolkit, well-known as part of the Kali Linux
Distribution. Other popular Linux distributions such as Fedora already come with Nikto
available in their software repositories as well.
This security tool is used to scan web servers and perform different types of tests against the
specified remote host. Its clean and simple command line interface makes it really easy to
launch any vulnerability testing against your target, as you can see in the following
screenshot:
¶8. SQLMap
sqlmap is a cool cyber-security tool written in Python that helps security researchers to
launch SQL code injection tests against remote hosts. With SQLMap you can detect and test
different types of SQL-based vulnerabilities to harden your apps and servers, or to report
vulnerabilities to different companies.
UNION query-based
time-based blind
boolean-based blind
error-based
stacked queries
out-of-band
Main features:
Page | 8
Check out the next video to see the true power of SQLMap using the sqlmap out-of-band
injection working with Metasploit integration against Microsoft SQL Server:
¶9. SQLNinja
SQLNinja is another SQL vulnerability scanner bundled with Kali Linux distribution. This
tool is dedicated to target and exploit web apps that use MS SQL Server as the backend
database server. Written in Perl, SQLNinja is available in multiple Unix distros where the
Perl interpreter is installed, including:
Linux
Mac OS X & iOS
FreeBSD
Test mode
Verbose mode
Fingerprint remote database mode
Brute force attack with a word list
Direct shell & reverse shell
Scanner for outbound ports
Reverse ICMP Shell
DNS tunnelled shell
¶10. Maltego
Maltego is the perfect tool for intel gathering and data reconnaissance while you’re
performing the first analysis of your target.
In this case, it can be used to correlate and determine relationships between people, names,
phone numbers, email addresses, companies, organizations and social network profiles.
Along with online resources like Whois data, DNS records, social networks, search engines,
geolocation services and online API services it can also be used to investigate the correlation
between internet-based infrastructures including:
Domain names
DNS servers
Netblocks
IP addresses
Files
Web Pages
GUI-based interface
Analyzes up to 10.000 entities per graph
Page | 9
Extended correlation capabilities
Data sharing in real time
Correlated data graphics generator
Exports graphs to GraphML
Generates entity lists
Can copy and paste information
This application is available for Windows, Linux, and Mac OS, and the only software
requirement is to have Java 1.8 or greater installed.
Burp Suite may well be one of the most popular platforms used in the security testing and
bug bounty hunting industry today. It includes several hacking tools that enable bug bounty
hunters and security researchers to detect, map, analyze, and ultimately exploit vulnerabilities
within the attack surface of any application.
¶12. NetStumbler
NetStumbler (also known as MiniStumbler) is one of the top ethical hacking tools used to
analyze IEEE 902.11g, 802, and 802.11b networks on Windows operating systems.
Often called ―the Swiss Army knife of wireless network analysis‖, this hacking tool is now
one of the most popular pieces of software used to find, pivot and cross-relate data from a
wireless network, enabling researchers and IT administrators to find, analyze, configure and
harden their wireless networks.
Page | 10
¶13. AirCrack-ng
AirCrack-ng is a respected Wifi security suite for home and corporate security investigations.
It includes full support for 802.11 WEP and WPA-PSK networks and works by capturing
network packets. It then analyzes and uses them to crack Wifi access.
Main features:
airbase-ng
aircrack-ng
airdecap-ng
airdecloak-ng
airdriver-ng
aireplay-ng
airmon-ng
airodump-ng
airolib-ng
airserv-ng
airtun-ng
easside-ng
packetforge-ng
tkiptun-ng
wesside-ng
airdecloak-ng
14. Ettercap
Ettercap is a network interceptor and packet sniffer for LAN networks. It supports active and
passive scans as well as various protocols, including encrypted ones such as SSH and
HTTPS.
Other capabilities include network and host analysis (like OS fingerprint), as well as network
manipulation over established connections -- which makes this tool great for testing man-in-
the-middle attacks.
Main features
Page | 11
Active and passive protocol analysis
Filters based on IP source and destination, Mac and ARP addresses
Data injection into established connections
SSH and HTTPS encryption-based protocols
Sniffs remote traffic over GRE tunnel
Extensible with plugins
Protocol supports include Telnet, FTP, Imap, Smb, MySQL, LDAP, NFS, SNMP,
HTTP, etc.
Determines OS name and version
Able to kill established LAN connections
DNS Hijacking
¶15. Canvas
Canvas is a great alternative to Metasploit, offering more than 800 exploits for testing remote
networks.
Main features
This tool also lets you use its platform to write new exploits or use its famous shellcode
generator. It also integrates an alternative to nmap called scanrand, which is especially useful
for port scanning and host discovery over mid to large networks.
Linux
MacOSX (requires PyGTK)
Windows (requires Python and PyGTK)
4. What is open source Free/ Trial Tools in cyber security? Explain different types of
open source Free/ Trial Tools?
Answer- Hackers are diverse, and so are cyber security tools. Various tools are available for
solving different issues. Paid tools like Acunetix and SolarWinds Security Event Manager
offer many advanced features but require significant investment.
But, many open source cyber security tools offer similar features at little or no cost. If you
have the technical expertise to use these free tools, they can provide everything you need to
secure modern day cloud infrastructure.
Page | 12
Plus, open source tools allow companies to customize the software as they see fit. So, if
you’re interested in free security tools, check out these top 10 open source cyber security
tools.
1. Nmap
Nmap is an open source network scanner that rapidly scans large computer networks. First on
our list of Top 10 Best Free Open Source Cyber Security Tools. Used for hosting discovery
as well as service and OS detection. Utilizes raw IP packets to dig up host information on a
network.
The Nmap Scripting Engine (NSE) offers a solid way of writing and sharing custom scripts
that tackle common problems. You can choose from many readily available scripts to
perform quick network scans.
Pros of Nmap
Map quickly the network without requiring complicating commands.
Admins can search through subdomains and DNS queries at ease.
Highly configurable, so users can easily customize the scans.
Lightweight nature makes it super quick and speeds up the start up process.
Cons of Nmap
Mastering all of Nmap’s features has a steep learning curve.
Scanning can take longer if you do not limit the network.
Some scan types are aggressive and may unintentionally trigger IDS/IPS mechanisms.
Also Read
Cyber Security vs Network Security – What’s the Difference? (Explained)
2. Metasploit
Metasploit is a penetration testing framework that helps security professionals
perform simulation attacks to find loopholes in a system. Robust feature set that helps detect
bugs and validate attacks.
Additionally Metasploit offers premium tiers for enterprises that need an all in one
penetrating platform. However, the community edition is usually enough for SMEs.
Pros of Metasploit
Fully cross platform and runs on Linux, macOS, and Windows systems.
Community support for this open source security tool is excellent.
Codebase is freely available and you can use it for integrations with other tools.
Pro version unlocks powerful automation abilities useful for large scale security teams.
Cons of Metasploit
Free edition is limited in features and requires significant technical expertise.
Noticeable performance difference between the Windows and Linux versions.
User intervention is needed for some exploits to work properly.
3. OSSEC
OSSEC is a free HIDS(Host based Intrusion Detection System) that performs in real
time monitoring and analysis. Equipped with a solid correlation and analysis engine. Most
common uses for OSSEC include log analysis, integrity checks, Windows
registry monitoring, and security policy enforcement.
Pros of OSSEC
Gives you real time alerts for incidents and enables active responses.
Log analysis- accepts them in formats such as FTP servers, databases (PostgreSQL, MySQL)
and web servers.
Compliant with various security auditing standards like PCI-DSS and CIS.
Collects system information effectively and act as a system inventory.
Page | 13
Cons of OSSEC
Lack of a monitoring dashboard can make threat visualization harder.
Upgrading the OSSEC version may result in inconsistencies between rules.
Miscoordination with pre shared keys ca be troublesome.
Also Read
Cloud Security vs Cyber Security – What’s the Difference? (Explained)
4. Kali Linux
Kali is a popular Linux distribution for digital forensic analysis and penetration
testing. Debian based distro that offers you some of the best open source cyber security tools.
This security focused OS has everything that you need for system assessments, including
surveillance and payload delivery tools.
Pros of Kali Linux
Specialized environment for security professionals.
Over 600 penetration tools included.
Wireless device support.
Most of the applications are derived from the Debian testing branch.
You can run it almost everywhere, including the cloud, containers, Android, ARM and WSl.
Cons of Kali Linux
Steep learning curve and may prove hard for beginners.
Some of the security tools found on Kali can feel sluggish.
Driver support for external devices can be improved.
5. OpenVAS
OpenVAS (Open Vulnerability Assessment System) is another choice for our Top 10 Best
Free Open Source Cyber Security Tools. Ideal cyber security tool for vulnerability scanning.
Offer you a solid set of features that can be used for authenticated and unauthenticated
testing. Part of the Greenbone Community Edition suite, a collection of free security tools.
Pros of OpenVAS
Uses a regularly updated list of NVT(Network Vulnerability Test) feeds for vulnerability
tests.
Useful for Small Businesses.
CVE Coverage for bugs and testing.
Large and dedicated community, so finding support is easy.
The open source license of OpenVAS enables third party customization.
Cons of OpenVAS
Requires solid effort to get up and running with this vulnerability scanner.
Doesn’t offer you any cloud scanner for AWS, Azure, or GCP.
Also Read
What is Cyber Security Audit? Why/How is it Important for your Business
6. Wireshark
Wireshark is a free packet capture and analysis tool for troubleshooting network connections
and analysing IP packets. Proven to be one of the most popular open source
cyber security tools since its release. Captures and analyses data packets in real time makes it
desirable to many organizations.
Pros of Wireshark
Captures live packets and saves them for later inspection.
VoIP and VLAN identification.
Very robust filtering capabilities for sorting through captured data.
Exports to CSV, XML and plain text.
Allows you to find problems in networks and solve routing problems
Page | 14
Cons of Wireshark
New users will take time to master all the analysis mechanisms.
Can’t send or alter packets.
Some users may find the user interface confusing initially
7. OpenIAM
OpenIAM is a solid IAM(Identity and Access Management) platform with on premise
and cloud deployment support. Great tool for businesses that want a free but decent IAM
solution. The community edition of OpenIAM is free, but you can also buy a premium
subscription. Cloud, SaaS, Web based and Windows Desktop.
Pros of OpenIAM
Features for identity management, web based logins and multi factor authentication.
Single Sign On.
Hosted on a cloud provider as an Identity as a Service(IDaaS) program.
Integrates with other open source tools via OpenID Connect(OIDC).
Cons of OpenIAM
The documentation support available for this IAM tool is limited.
Does not generate extensive analytical reports.
Also Read
Cyber Security vs Information Security – What’s the Difference? (Explained)
8. OpenEDR
OpenEDR is an open source Endpoint Detection and Response (EDR) program developed by
the US cybersecurity firm Comodo. Companies can use OpenEDR to secure their
infrastructure against malware, ransomware, data breaches and other threats.
Pros of OpenEDR
Sleek dashboard and offers powerful data visualization tools.
Comes with compelling telemetry features and analysis capabilities.
Deploy OpenEDR for any endpoints and control it via a cloud based console.
Cons of OpenEDR
Need to pay for retaining any logs past three days.
There’s no SaaS based deployment tool for OpenEDR yet.
9. OWASP ZAP
OWASP ZAP(Zed Attack Proxy) is one of the most widely used app scanners for the web.
Open source security tool that you can customize as necessary. ZAP’s notable features
include proxy interception, port scanner, passive scanner, automatic testing, etc.
Pros of OWASP ZAP
Excellent GUI interface that makes testing effortless.
Actively maintained and rolls out new features and bug fixes regularly.
API endpoints gives you complete control over its implementation.
Cons of OWASP ZAP
Reporting feature doesn’t follow any specific format and may feel cluttered.
Paid support is not available, so technical expertise is sometimes required.
Also Read
What is Application Security? Types, Tools & Examples (Explained)
10. sqlmap
Last on the list of Top 10 Best Free Open Source Cyber Security Tools is sqlmap. Another
cyber security tool for finding and exploiting SQL injection flaws in databases. Features a
powerful detection engine that can easily discover commonly used SQL attacks. Also you
can get various switches for routine tasks like fingerprinting, data fetching, and remote
command execution.
Page | 15
Pros of sqlmp
Supports all major databases, including MySQL, MSSQL, PostgreSQL,
Firebird, MariaDB, and Amazon Redshift.
Connect directly to the database through IP, port and user credentials.
sqlmap supports enumeration over users, hashes, tables, columns, and privileges.
It can recognize hash formats automatically and crack them via dictionary attacks.
Cons of sqlmap
Lacks any GUI interface and requires command line proficiency.
May need to confirm some vulnerabilities manually.
Answer- The CIA Triad is an information security model, which is widely popular. It
guides an organization’s efforts towards ensuring data security. The three principles—
confidentiality, integrity, and availability which is also the full for CIA in
cybersecurity, form the cornerstone of a security infrastructure. In fact, it is ideal to
apply these principles to any security program. Confidentiality makes sure that only
authorized personnel are given access or permission to modify data
Integrity helps maintain the trustworthiness of data by having it in the correct state
and immune to any improper modifications
Availability means that the authorized users should be able to access data whenever
required
The CIA Triad is so elementary to information security that anytime data violation or any
number of other security incidents occur, it is definitely due to one or more of these
principles being compromised. So, the CIA Triad is always on top of the priority list for any
infosec professional.
Security experts assess threats and vulnerabilities thinking about the impact that they might
have on the CIA of an organization’s assets. Based on that assessment, the security team
enforces a specific set of security controls to minimize the risks within that environment.
To have a better understanding of how the CIA Triad works in practice, consider an ATM
that allows users to access bank balances and other information. An ATM incorporates
measures to cover the principles of the triad:
Page | 16
The two-factor authentication (debit card with the PIN code)
provides confidentiality before authorizing access to sensitive data.
The ATM and bank software ensure data integrity by maintaining all transfer and
withdrawal records made via the ATM in the user’s bank accounting.
The ATM provides availability as it is for public use and is accessible at all times.
The CIA Triad came to form over time as wisdom passed among information security
professionals rather than by a single proponent. The formalization of confidentiality can be
traced back to the 1976 U.S. Air Force study. Integrity, on the other hand, was found in a
1987 paper that mentioned that commercial computing requires a special focus on data
correctness. The conception of availability is not clearly known, but the idea rose to
prominence in 1988 due to the attack of the Morris worm, which had devastating effects back
then on thousands of major UNIX machines and the internet had to be partitioned for days to
fix the mess.
It is, however, not clear when the CIA became a triad. The foundational concept seems to
have been established by 1998.
Now that we have covered what the CIA is, it is time to understand why it is more effective
as a triad. The CIA Triad, in a way, helps make sense of the diverse security techniques,
software, and services available. Rather than a shot in the dark, it helps to clearly draw a
picture of what is exactly required that will address the security concerns.
The three concepts exist in tension with one another when it is worked as a triad. For
example, requiring elaborate authentication, in turn, helps ensure confidentiality, but at the
same time, some people who have the right to the data may not get access, thereby, reducing
availability.
As one is forming information security policies, the CIA Triad will help make more effective
decisions on which of the three principles is most useful for the specific set of data and for
the organization overall.
Page | 17
6. What are threats? Explain different types of threats? What is risk? State different
between risk and threats?
Answer-
THREATS-
In cybersecurity, the most common understanding of a threat is anything that could exploit a
vulnerability, which could affect the confidentiality, integrity or availability of your systems,
data, people and more. (Confidentiality, integrity and availability, sometimes known as the
CIA triad, is another fundamental concept of cybersecurity.)
A more advanced definition of threat is when an adversary or attacker has the opportunity,
capability and intent to bring a negative impact upon your operations, assets, workforce
and/or customers. Examples of this can include malware, ransomware, phishing attacks and
more — and the types of threats out there will continue to evolve.
Importantly, not all threats are the same, according to Bob Rudis, Vice President Data
Science at GreyNoise Intelligence. And that’s where threat intelligence comes in. Rudis says:
“An attacker may have the intent and capability to do harm, but no opportunity.”
For example, your organization may have no vulnerabilities to exploit due to a solid patch
management program or strong network segmentation policies that prevent access to critical
systems. Chances are likely, however, that you do have vulnerabilities, so let’s consider the
risk factor.
Nation states—hostile countries can launch cyber attacks against local companies and
institutions, aiming to interfere with communications, cause disorder, and inflict damage.
Terrorist organizations—terrorists conduct cyber attacks aimed at destroying or abusing
critical infrastructure, threaten national security, disrupt economies, and cause bodily harm to
citizens.
Criminal groups—organized groups of hackers aim to break into computing systems for
economic benefit. These groups use phishing, spam, spyware and malware for extortion, theft
of private information, and online scams.
Hackers—individual hackers target organizations using a variety of attack techniques. They
are usually motivated by personal gain, revenge, financial gain, or political activity. Hackers
often develop new threats, to advance their criminal ability and improve their personal
standing in the hacker community.
Malicious insiders—an employee who has legitimate access to company assets, and abuses
their privileges to steal information or damage computing systems for economic or personal
gain. Insiders may be employees, contractors, suppliers, or partners of the target organization.
They can also be outsiders who have compromised a privileged account and are
impersonating its owner.
Page | 18
Malware Attacks
Viruses—a piece of code injects itself into an application. When the application runs, the
malicious code executes.
Worms—malware that exploits software vulnerabilities and backdoors to gain access to an
operating system. Once installed in the network, the worm can carry out attacks such as
distributed denial of service (DDoS).
Trojans—malicious code or software that poses as an innocent program, hiding in apps,
games or email attachments. An unsuspecting user downloads the trojan, allowing it to gain
control of their device.
Ransomware—a user or organization is denied access to their own systems or data via
encryption. The attacker typically demands a ransom be paid in exchange for a decryption
key to restore access, but there is no guarantee that paying the ransom will actually restore
full access or functionality.
Cryptojacking—attackers deploy software on a victim’s device, and begin using their
computing resources to generate cryptocurrency, without their knowledge. Affected systems
can become slow and cryptojacking kits can affect system stability.
Spyware—a malicious actor gains access to an unsuspecting user’s data, including sensitive
information such as passwords and payment details. Spyware can affect desktop browsers,
mobile phones and desktop applications.
Adware—a user’s browsing activity is tracked to determine behavior patterns and interests,
allowing advertisers to send the user targeted advertising. Adware is related to spyware but
does not involve installing software on the user’s device and is not necessarily used for
malicious purposes, but it can be used without the user’s consent and compromise their
privacy.
Fileless malware—no software is installed on the operating system. Native files like WMI
and PowerShell are edited to enable malicious functions. This stealthy form of attack is
difficult to detect (antivirus can’t identify it), because the compromised files are recognized
as legitimate.
Rootkits—software is injected into applications, firmware, operating system kernels or
hypervisors, providing remote administrative access to a computer. The attacker can start the
operating system within a compromised environment, gain complete control of the computer
and deliver additional malware.
Social engineering involves tricking users into providing an entry point for malware. The
victim provides sensitive information or unwittingly installs malware on their device, because
the attacker poses as a legitimate actor.
Page | 19
Here are some of the main types of social engineering attacks:
Baiting—the attacker lures a user into a social engineering trap, usually with a promise of
something attractive like a free gift card. The victim provides sensitive information such as
credentials to the attacker.
Pretexting—similar to baiting, the attacker pressures the target into giving up information
under false pretenses. This typically involves impersonating someone with authority, for
example an IRS or police officer, whose position will compel the victim to comply.
Phishing—the attacker sends emails pretending to come from a trusted source. Phishing often
involves sending fraudulent emails to as many users as possible, but can also be more
targeted. For example, ―spear phishing‖ personalizes the email to target a specific user, while
―whaling‖ takes this a step further by targeting high-value individuals such as CEOs.
Vishing (voice phishing)—the imposter uses the phone to trick the target into disclosing
sensitive data or grant access to the target system. Vishing typically targets older individuals
but can be employed against anyone.
Smishing (SMS phishing)—the attacker uses text messages as the means of deceiving the
victim.
Piggybacking—an authorized user provides physical access to another individual who
―piggybacks‖ off the user’s credentials. For example, an employee may grant access to
someone posing as a new employee who misplaced their credential card.
Tailgating—an unauthorized individual follows an authorized user into a location, for
example by quickly slipping in through a protected door after the authorized user has opened
it. This technique is similar to piggybacking except that the person being tailgated is unaware
that they are being used by another individual.
Supply chain attacks are a new type of threat to software developers and vendors. Its purpose
is to infect legitimate applications and distribute malware via source code, build processes or
software update mechanisms.
Attackers are looking for non-secure network protocols, server infrastructure, and coding
techniques, and use them to compromise build and update process, modify source code and
hide malicious content.
Supply chain attacks are especially severe because the applications being compromised
by attackers are signed and certified by trusted vendors. In a software supply chain attack, the
software vendor is not aware that its applications or updates are infected with malware.
Malicious code runs with the same trust and privileges as the compromised application.
Page | 20
Man-in-the-Middle Attack
Denial-of-Service Attack
A Denial-of-Service (DoS) attack overloads the target system with a large volume of traffic,
hindering the ability of the system to function normally. An attack involving multiple devices
is known as a distributed denial-of-service (DDoS) attack.
HTTP flood DDoS—the attacker uses HTTP requests that appear legitimate to overwhelm an
application or web server. This technique does not require high bandwidth or malformed
packets, and typically tries to force a target system to allocate as many resources as possible
for each request.
SYN flood DDoS—initiating a Transmission Control Protocol (TCP) connection sequence
involves sending a SYN request that the host must respond to with a SYN-ACK that
acknowledges the request, and then the requester must respond with an ACK. Attackers can
exploit this sequence, tying up server resources, by sending SYN requests but not responding
to the SYN-ACKs from the host.
UDP flood DDoS—a remote host is flooded with User Datagram Protocol (UDP) packets
sent to random ports. This technique forces the host to search for applications on the affected
ports and respond with ―Destination Unreachable‖ packets, which uses up the host resources.
Page | 21
ICMP flood—a barrage of ICMP Echo Request packets overwhelms the target, consuming
both inbound and outgoing bandwidth. The servers may try to respond to each request with
an ICMP Echo Reply packet, but cannot keep up with the rate of requests, so the system
slows down.
NTP amplification—Network Time Protocol (NTP) servers are accessible to the public and
can be exploited by an attacker to send large volumes of UDP traffic to a targeted server. This
is considered an amplification attack due to the query-to-response ratio of 1:20 to 1:200,
which allows an attacker to exploit open NTP servers to execute high-volume, high-
bandwidth DDoS attacks.
Injection Attacks
Injection attacks exploit a variety of vulnerabilities to directly insert malicious input into the
code of a web application. Successful attacks may expose sensitive information, execute a
DoS attack or compromise the entire system.
SQL injection—an attacker enters an SQL query into an end user input channel, such as a
web form or comment field. A vulnerable application will send the attacker’s data to the
database, and will execute any SQL commands that have been injected into the query. Most
web applications use databases based on Structured Query Language (SQL), making them
vulnerable to SQL injection. A new variant on this attack is NoSQL attacks, targeted against
databases that do not use a relational data structure.
Code injection—an attacker can inject code into an application if it is vulnerable. The web
server executes the malicious code as if it were part of the application.
OS command injection—an attacker can exploit a command injection vulnerability to input
commands for the operating system to execute. This allows the attack to exfiltrate OS data or
take over the system.
LDAP injection—an attacker inputs characters to alter Lightweight Directory Access
Protocol (LDAP) queries. A system is vulnerable if it uses unsanitized LDAP queries. These
attacks are very severe because LDAP servers may store user accounts and credentials for an
entire organization.
XML eXternal Entities (XXE) Injection—an attack is carried out using specially-constructed
XML documents. This differs from other attack vectors because it exploits inherent
vulnerabilities in legacy XML parsers rather than unvalidated user inputs. XML documents
can be used to traverse paths, execute code remotely and execute server-side request forgery
(SSRF).
Cross-Site Scripting (XSS)—an attacker inputs a string of text containing malicious
JavaScript. The target’s browser executes the code, enabling the attacker to redirect users to a
malicious website or steal session cookies to hijack a user’s session. An application is
vulnerable to XSS if it doesn’t sanitize user inputs to remove JavaScript code.
What is a risk?
Risk is the probability of a negative (harmful) event occurring as well as the potential of scale
of that harm. Your organizational risk fluctuates over time, sometimes even on a daily basis,
due to both internal and external factors.
Page | 22
A slightly more technical angle, the Open FAIR body of knowledge defines cyber risk as the
probable frequency and probably magnitude of loss. Sounds complicated, until we break it
down: ―For starters,‖ Rudis says, "there is no ethereal risk. Something is at risk, be it a
system, device, business process, bank account, your firm’s reputation or human life.‖
This is where cybersecurity teams can begin to measure that risk:
One way of describing risk was consequence X likelihood, but as security teams have
advanced their processes and intelligence, we see that you have to also account for the
safeguards you’ve already put in place.
7. What are social engineering attacks? Explain different methods of attacks. Explain
different prevention methods of social engineering attacks.
Social engineering is the term used for a broad range of malicious activities accomplished
through human interactions. It uses psychological manipulation to trick users into making
security mistakes or giving away sensitive information.
Social engineering attacks happen in one or more steps. A perpetrator first investigates the
intended victim to gather necessary background information, such as potential points of entry
and weak security protocols, needed to proceed with the attack. Then, the attacker moves to
gain the victim’s trust and provide stimuli for subsequent actions that break security
practices, such as revealing sensitive information or granting access to critical resources.
Page | 23
If you've ever studied famous battles in history, you'll know that no two are exactly
alike. Still, there are similar strategies and tactics often used in battle because they are
time-proven to be effective.
Similarly, when a criminal is trying to hack an organization, they won't re-invent the
wheel unless they absolutely have to: They'll draw upon common types of hacking
techniques that are known to be highly effective, such as malware, phishing, or cross-site
scripting (XSS).
Whether you're trying to make sense of the latest data breach headline in the news or
analyzing an incident in your own organization, it helps to understand the different
attack vectors a malicious actor might try to cause harm. Here’s an overview of some of
the most common types of cybersecurity attacks seen today.
Malware
If you've ever seen an antivirus alert pop up on your screen, or if you've mistakenly
clicked a malicious email attachment, then you've had a close call with malware.
Attackers love to use malware to gain a foothold in users' computers—and,
consequently, the offices they work in—because it can be so effective.
―Malware‖ refers to various forms of harmful software, such as viruses and ransomware.
Once malware is in your computer, it can wreak all sorts of havoc, from taking control of
your machine, to monitoring your actions and keystrokes, to silently sending all sorts of
confidential data from your computer or network to the attacker's home base.
Attackers will use a variety of methods to get malware into your computer, but at some
stage it often requires the user to take an action to install the malware. This can include
clicking a link to download a file, or opening an attachment that may look harmless (like
a Word document or PDF attachment), but actually has a malware installer hidden
within.
Phishing
Of course, chances are you wouldn't just open a random attachment or click on a link in
any email that comes your way—there has to be a compelling reason for you to take
action. Attackers know this, too. When an attacker wants you to install malware or
divulge sensitive information, they often turn to phishing tactics, or pretending to be
someone or something else to get you to take an action you normally wouldn’t. Since
they rely on human curiosity and impulses, phishing attacks can be difficult to stop.
In a phishing attack, an attacker may send you an email that appears to be from someone
you trust, like your boss or a company you do business with. The email will seem
legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected
on your account). In the email, there will be an attachment to open or a link to click.
Upon opening the malicious attachment, you’ll thereby install malware in your
computer. If you click the link, it may send you to a legitimate-looking website that asks
Page | 24
for you to log in to access an important file—except the website is actually a trap used to
capture your credentials when you try to log in.
SQL (pronounced ―sequel‖) stands for structured query language; it’s a programming
language used to communicate with databases. Many of the servers that store critical
data for websites and services use SQL to manage the data in their databases.
A SQL injection attack specifically targets this kind of server, using malicious code to
get the server to divulge information it normally wouldn’t. This is especially problematic
if the server stores private customer information from the website, such as credit card
numbers, usernames and passwords (credentials), or other personally identifiable
information, which are tempting and lucrative targets for an attacker.
An SQL injection attack works by exploiting any one of the known SQL vulnerabilities
that allow the SQL server to run malicious code. For example, if a SQL server is
vulnerable to an injection attack, it may be possible for an attacker to go to a website's
search box and type in code that would force the site's SQL server to dump all of its
stored usernames and passwords for the site.
In an SQL injection attack, an attacker goes after a vulnerable website to target its stored
data, such as user credentials or sensitive financial data. But if the attacker would rather
directly target a website's users, they may opt for a cross-site scripting attack.
Similar to an SQL injection attack, this attack also involves injecting malicious code into
a website, but in this case the website itself is not being attacked. Instead, the malicious
code the attacker has injected only runs in the user's browser when they visit the attacked
website, and it goes after the visitor directly, not the website.
One of the most common ways an attacker can deploy a cross-site scripting attack is by
injecting malicious code into a comment or a script that could automatically run. For
example, they could embed a link to a malicious JavaScript in a comment on a blog.
Page | 25
Denial-of-Service (DoS)
Imagine you're sitting in traffic on a one-lane country road, with cars backed up as far as
the eye can see. Normally this road never sees more than a car or two, but a county fair
and a major sporting event have ended around the same time, and this road is the only
way for visitors to leave town. The road can't handle the massive amount of traffic, and
as a result it gets so backed up that pretty much no one can leave.
This can happen for innocuous reasons of course, say if a massive news story breaks and
a newspaper's website gets overloaded with traffic from people trying to find out more.
But often, this kind of traffic overload is malicious, as an attacker floods a website with
an overwhelming amount of traffic to essentially shut it down for all users.
In some instances, these DoS attacks are performed by many computers at the same time.
This scenario of attack is known as a Distributed Denial-of-Service Attack (DDoS). This
type of attack can be even more difficult to overcome due to the attacker appearing from
many different IP addresses around the world simultaneously, making determining the
source of the attack even more difficult for network administrators.
When you're on the internet, your computer has a lot of small back-and-forth
transactions with servers around the world letting them know who you are and
requesting specific websites or services. In return, if everything goes as it should, the
web servers should respond to your request by giving you the information you're
accessing. This process, or session, happens whether you are simply browsing or when
you are logging into a website with your username and password.
The session between your computer and the remote web server is given a unique session
ID, which should stay private between the two parties; however, an attacker can hijack
the session by capturing the session ID and posing as the computer making a request,
allowing them to log in as an unsuspecting user and gain access to unauthorized
information on the web server. There are a number of methods an attacker can use to
steal the session ID, such as a cross-site scripting attack used to hijack session IDs.
An attacker can also opt to hijack the session to insert themselves between the requesting
computer and the remote server, pretending to be the other party in the session. This
allows them to intercept information in both directions and is commonly called a man -in-
the-middle attack.
Page | 26
Credential Reuse
Users today have so many logins and passwords to remember that it’s tempting to reuse
credentials here or there to make life a little easier. Even though secu rity best practices
universally recommend that you have unique passwords for all your applications and
websites, many people still reuse their passwords—a fact attackers rely on.
Once attackers have a collection of usernames and passwords from a breached website or
service (easily acquired on any number of black market websites on the internet), they
know that if they use these same credentials on other websites there’s a chance they’ll be
able to log in.
No matter how tempting it may be to reuse credentials for your email, bank account, and
your favorite sports forum, it’s possible that one day the forum will get hacked, giving
an attacker easy access to your email and bank account. When it comes to credentials,
variety is essential. Password managers are available and can be helpful when it comes
to managing the various credentials you use.
This is just a selection of common attack types and techniques (follow this link to learn
more about web application vulnerabilities, specifically). It is not intended to be
exhaustive, and attackers do evolve and develop new methods as needed; however, being
aware of, and mitigating these types of attacks will significantly improve your security
posture.
Social engineering attacks come in many different forms and can be performed anywhere
where human interaction is involved. The following are the five most common forms of
digital social engineering assaults.
Baiting
As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity.
They lure users into a trap that steals their personal information or inflicts their systems with
malware.
The most reviled form of baiting uses physical media to disperse malware. For example,
attackers leave the bait—typically malware-infected flash drives—in conspicuous areas
where potential victims are certain to see them (e.g., bathrooms, elevators, the parking lot of a
targeted company). The bait has an authentic look to it, such as a label presenting it as the
company’s payroll list.
Victims pick up the bait out of curiosity and insert it into a work or home computer, resulting
in automatic malware installation on the system.
Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of
baiting consist of enticing ads that lead to malicious sites or that encourage users to download
a malware-infected application.
Page | 27
Scareware
Scareware involves victims being bombarded with false alarms and fictitious threats. Users
are deceived to think their system is infected with malware, prompting them to install
software that has no real benefit (other than for the perpetrator) or is malware itself.
Scareware is also referred to as deception software, rogue scanner software and fraudware.
Scareware is also distributed via spam email that doles out bogus warnings, or makes offers
for users to buy worthless/harmful services.
Pretexting
Here an attacker obtains information through a series of cleverly crafted lies. The scam is
often initiated by a perpetrator pretending to need sensitive information from a victim so as to
perform a critical task.
The attacker usually starts by establishing trust with their victim by impersonating co-
workers, police, bank and tax officials, or other persons who have right-to-know authority.
The pretexter asks questions that are ostensibly required to confirm the victim’s identity,
through which they gather important personal data.
All sorts of pertinent information and records is gathered using this scam, such as social
security numbers, personal addresses and phone numbers, phone records, staff vacation dates,
bank records and even security information related to a physical plant.
Phishing
As one of the most popular social engineering attack types, phishing scams are email and text
message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then
prods them into revealing sensitive information, clicking on links to malicious websites, or
opening attachments that contain malware.
An example is an email sent to users of an online service that alerts them of a policy violation
requiring immediate action on their part, such as a required password change. It includes a
link to an illegitimate website—nearly identical in appearance to its legitimate version—
prompting the unsuspecting user to enter their current credentials and new password. Upon
form submittal the information is sent to the attacker.
Given that identical, or near-identical, messages are sent to all users in phishing campaigns,
detecting and blocking them are much easier for mail servers having access to threat sharing
platforms.
Page | 28
Spear phishing
This is a more targeted version of the phishing scam whereby an attacker chooses specific
individuals or enterprises. They then tailor their messages based on characteristics, job
positions, and contacts belonging to their victims to make their attack less conspicuous. Spear
phishing requires much more effort on behalf of the perpetrator and may take weeks and
months to pull off. They’re much harder to detect and have better success rates if done
skillfully.
Page | 29
*Chapter -2*
Cryptography and Cryptanalysis
Answer- Cryptology has two parts namely, Cryptography which focuses on creating secret
codes and Cryptanalysis which is the study of the cryptographic algorithm and the breaking
of those secret codes. The person practicing Cryptanalysis is called a Cryptanalyst. It helps
us to better understand the cryptosystems and also helps us improve the system by finding
any weak point and thus work on the algorithm to create a more secure secret code. For
example, a Cryptanalyst might try to decipher a ciphertext to derive the plaintext. It can
help us to deduce the plaintext or the encryption key.
To determine the weak points of a cryptographic system, it is important to attack the
system. This attacks are called Cryptanalytic attacks. The attacks rely on nature of the
algorithm and also knowledge of the general characteristics of the plaintext, i.e., plaintext
can be a regular document written in English or it can be a code written in Java. Therefore,
nature of the plaintext should be known before trying to use the attacks.
Page | 30
2. Explain Firewall policy and Intrusion Prevention policy in Cyber Security.
Answer- Firewall policies let you group several firewall rules so that you can update them all
at once, effectively controlled by Identity and Access Management (IAM) roles. These
policies contain rules that can explicitly deny or allow connections, as do Virtual Private
Cloud (VPC) firewall rules.
Cryptography Cryptanalysis
Page | 31
Hash or cypher
Obtaining an original or needs to be more
Concern for cipher or hash
completely new hash. conservative and
Efficient Hash or cipher therefore slower
Less original
1. Confidentiality: Confidentiality ensures that only the intended recipient can decrypt
the message and read its contents.
2. Non-repudiation: Non-repudiation means the sender of the message cannot
backtrack in the future and deny their reasons for sending or creating the message.
3. Integrity: Integrity focuses on the ability to be certain that the information contained
within the message cannot be modified while in storage or transit.
4. Authenticity: Authenticity ensures the sender and recipient can verify each other’s
identities and the destination of the message.
Types of Cryptography
Cryptography can be broken down into three different types:
Secret Key Cryptography, or symmetric cryptography, uses a single key to encrypt data. Both
encryption and decryption in symmetric cryptography use the same key, making this the
Page | 32
easiest form of cryptography. The cryptographic algorithm utilizes the key in a cipher to
encrypt the data, and when the data must be accessed again, a person entrusted with the secret
key can decrypt the data. Secret Key Cryptography can be used on both in-transit and at-
rest data, but is commonly only used on at-rest data, as sending the secret to the recipient of
the message can lead to compromise.
Examples:
AES
DES
Caesar Cipher
Public Key Cryptography, or asymmetric cryptography, uses two keys to encrypt data. One is
used for encryption, while the other key can decrypts the message. Unlike symmetric
cryptography, if one key is used to encrypt, that same key cannot decrypt the message, rather
the other key shall be used.
One key is kept private, and is called the ―private key‖, while the other is shared publicly and
can be used by anyone, hence it is known as the ―public key‖. The mathematical relation of
the keys is such that the private key cannot be derived from the public key, but the public key
can be derived from the private. The private key should not be distributed and should remain
with the owner only. The public key can be given to any other entity.
Examples:
ECC
Diffie-Hellman
DSS
Hash functions are irreversible, one-way functions which protect the data, at the cost of not
being able to recover the original message. Hashing is a way to transform a given string into a
fixed length string. A good hashing algorithm will produce unique outputs for each input
given. The only way to crack a hash is by trying every input possible, until you get the exact
same hash. A hash can be used for hashing data (such as passwords) and in certificates.
MD5
SHA-1
SHA-2 family which includes SHA-224, SHA-256, SHA-384, and SHA-512
SHA-3
Whirlpool
Blake 2
Blake 3
Page | 33
5. What is Firewalls? Types of Firewalls.
The primary goal of a firewall is to block malicious traffic requests and data packets while
letting through legitimate traffic.
There are mainly three types of firewalls, such as software firewalls, hardware firewalls, or
both, depending on their structure. Each type of firewall has different functionality but the
same purpose. However, it is best practice to have both to achieve maximum possible
protection.
A hardware firewall is a physical device that attaches between a computer network and a
gateway. For example- a broadband router. A hardware firewall is sometimes referred to as
an Appliance Firewall. On the other hand, a software firewall is a simple program installed
on a computer that works through port numbers and other installed software. This type of
firewall is also called a Host Firewall.
Besides, there are many other types of firewalls depending on their features and the level of
security they provide. The following are types of firewall techniques that can be implemented
as software or hardware:
o Packet-filtering Firewalls
o Circuit-level Gateways
o Application-level Gateways (Proxy Firewalls)
o Stateful Multi-layer Inspection (SMLI) Firewalls
o Next-generation Firewalls (NGFW)
o Threat-focused NGFW
o Network Address Translation (NAT) Firewalls
o Cloud Firewalls
o Unified Threat Management (UTM) Firewalls
Packet-filtering Firewalls
A packet filtering firewall is the most basic type of firewall. It acts like a management
program that monitors network traffic and filters incoming packets based on configured
security rules. These firewalls are designed to block network traffic IP protocols, an IP
address, and a port number if a data packet does not match the established rule-set.
While packet-filtering firewalls can be considered a fast solution without many resource
requirements, they also have some limitations. Because these types of firewalls do not
prevent web-based attacks, they are not the safest.
Page | 34
Circuit-level Gateways
Circuit-level gateways are another simplified type of firewall that can be easily configured to
allow or block traffic without consuming significant computing resources. These types of
firewalls typically operate at the session-level of the OSI model by verifying TCP
(Transmission Control Protocol) connections and sessions. Circuit-level gateways are
designed to ensure that the established sessions are protected.
Proxy firewalls operate at the application layer as an intermediate device to filter incoming
traffic between two end systems (e.g., network and traffic systems). That is why these
firewalls are called 'Application-level Gateways'.
Unlike basic firewalls, these firewalls transfer requests from clients pretending to be original
clients on the web-server. This protects the client's identity and other suspicious information,
keeping the network safe from potential attacks. Once the connection is established, the
proxy firewall inspects data packets coming from the source. If the contents of the incoming
data packet are protected, the proxy firewall transfers it to the client. This approach creates an
additional layer of security between the client and many different sources on the network.
In simple words, when a user establishes a connection and requests data, the SMLI firewall
creates a database (state table). The database is used to store session information such as
source IP address, port number, destination IP address, destination port number, etc.
Connection information is stored for each session in the state table. Using stateful inspection
technology, these firewalls create security rules to allow anticipated traffic.
In most cases, SMLI firewalls are implemented as additional security levels. These types of
firewalls implement more checks and are considered more secure than stateless firewalls.
This is why stateful packet inspection is implemented along with many other firewalls to
track statistics for all internal traffic. Doing so increases the load and puts more pressure on
computing resources. This can give rise to a slower transfer rate for data packets than other
solutions.
Page | 35
Next-generation Firewalls (NGFW)
Many of the latest released firewalls are usually defined as 'next-generation firewalls'.
However, there is no specific definition for next-generation firewalls. This type of firewall is
usually defined as a security device combining the features and functionalities of other
firewalls. These firewalls include deep-packet inspection (DPI), surface-level packet
inspection, and TCP handshake testing, etc.
NGFW includes higher levels of security than packet-filtering and stateful inspection
firewalls. Unlike traditional firewalls, NGFW monitors the entire transaction of data,
including packet headers, packet contents, and sources. NGFWs are designed in such a way
that they can prevent more sophisticated and evolving security threats such as malware
attacks, external threats, and advance intrusion.
Threat-focused NGFW
Threat-focused NGFW includes all the features of a traditional NGFW. Additionally, they
also provide advanced threat detection and remediation. These types of firewalls are capable
of reacting against attacks quickly. With intelligent security automation, threat-focused
NGFW set security rules and policies, further increasing the security of the overall defense
system.
In addition, these firewalls use retrospective security systems to monitor suspicious activities
continuously. They keep analyzing the behavior of every activity even after the initial
inspection. Due to this functionality, threat-focus NGFW dramatically reduces the overall
time taken from threat detection to cleanup.
Network address translation or NAT firewalls are primarily designed to access Internet traffic
and block all unwanted connections. These types of firewalls usually hide the IP addresses of
our devices, making it safe from attackers.
When multiple devices are used to connect to the Internet, NAT firewalls create a unique IP
address and hide individual devices' IP addresses. As a result, a single IP address is used for
all devices. By doing this, NAT firewalls secure independent network addresses from
attackers scanning a network for accessing IP addresses. This results in enhanced protection
against suspicious activities and attacks.
In general, NAT firewalls works similarly to proxy firewalls. Like proxy firewalls, NAT
firewalls also work as an intermediate device between a group of computers and external
traffic.
Cloud Firewalls
Page | 36
The reason for this is the use of cloud firewalls as proxy servers. However, they are
configured based on requirements.
The most significant advantage of cloud firewalls is scalability. Because cloud firewalls have
no physical resources, they are easy to scale according to the organization's demand or
traffic-load. If demand increases, additional capacity can be added to the cloud server to filter
out the additional traffic load. Most organizations use cloud firewalls to secure their internal
networks or entire cloud infrastructure.
UTM firewalls are a special type of device that includes features of a stateful inspection
firewall with anti-virus and intrusion prevention support. Such firewalls are designed to
provide simplicity and ease of use. These firewalls can also add many other services, such as
cloud management, etc.
6. What is security protocol used for VPN security? What is security at the application
layer in cyber security? Difference between PGP and S/MIME.
VPNs are using tunneling protocols that act as rules for sending the data. It provides
detailed instructions on packaging the data and what checks to perform when it reaches its
destination. These different methods directly affect the process speed and security. Here
are the most popular ones.
IPSec is a VPN tunneling protocol that secures data exchange by enforcing session
authentication and data packet encryption. It is twofold encryption — the encrypted
message sits in the data packet, which is further encrypted again. IPSec protocol combines
with other protocols for added security and frequently utilizes Site-to-site VPN setups due to
its high compatibility.
L2TP works by generating a secure tunnel between two L2TP connection points. Once
established, it uses an additional tunneling protocol to encrypt the sent data, i.e., IPSec.
L2TP's complex architecture helps to ensure high security of the exchanged data. It's another
popular choice for Site-to-site setups, especially when higher security is needed.
Page | 37
Point–to–Point Tunneling Protocol (PPTP)
PPTP is another tunneling protocol that creates a tunnel with a PPTP cipher. However,
since the creation of the cipher in the '90s, the computing power has increased exponentially.
Brute-forcing the cipher wouldn't take too long to crack it to reveal the exchanged data. For
this reason, technology rarely uses this cipher — a replacement containing more secure
tunneling protocols with more advanced encryption is preferable.
Secure Socket Layer and Transport Layer Security protocols are the same standard that
encrypts HTTPS web pages. That way, the web browser acts as the client, and user access is
limited to specific applications rather than the entire network. Since almost all browsers come
equipped with SSL and TLS connections, no additional software is usually required. Usually,
remote access VPNs use SSL/TLS.
OpenVPN
Like the other option, SSH generates an encrypted connection and allows port
forwarding to remote machines via a secured channel. It is useful for accessing your office
desktop via your laptop at home. While it does add additional flexibility, SSH channels
Page | 38
should always be under close supervision to provide a direct entry point for breach. That's
why it's a better fit only in remote access setups.
Wireguard
The most recent widely available tunneling protocol is less complex but much more efficient
and safer than IPSec and OpenVPN. It relies on highly streamlined code to squeeze the
best possible performance with a minimal margin of error. While it still is in the early
adoption stage, you could find offices using Site-to-site connections based on Wireguard.
There even are proprietary WireGuard implementations like NordLynx.
The Open Systems Interconnection (OSI) model and the TCP/IP Model explain the functions
performed for two computers to communicate over a network. These functions are divided
into layers, as shown below:
The topmost layer in both cases is the application layer. A user interacts with the application
layer. The application layer is used to display information to the user as well as receive
information from the user. It allows application-to-application communication by using
services of the layers that are below it.
For example, in a client-server architecture, the client sends a request to the web server
running on a different host. The server will then send over the required information as a
response.
As we have seen, applications can communicate with each other using requests and responses
by sending messages to each other. These messages must be structured properly so that the
end systems can understand them correctly. Application layer protocols describe the structure
as well as the procedure in which these messages are sent. These protocols are responsible
for:
Page | 39
Examples
1. HTTP
There are many different methods defined in HTTP (such as GET, POST, DELETE, PUT,
and PATCH), but the one that is most commonly used is GET, which retrieves a resource
from the host. There are also a variety of other headers that can be included in a request.
These messages can also include any data that needs to be sent to the server.
The status code and message allow the client to understand whether or not their request was
successful. Status 200 indicates a successful request, whereas 404 means that the resource
was not found. There are other status codes as well that are understood by HTTP
applications.
2. FTP
File Transfer Protocol (FTP) is used to share files between local and remote hosts. The first
requirement is for the user to authenticate themselves, after which a control connection is
established with the remote server. There are separate control and data connections between
the server and client. Files can only be safely transmitted once a control connection is
successfully established.
3. DNS
1. using hostname
2. using IP Addresses
It is easier for humans to identify hosts using their hostnames instead of IP addresses.
However, routers prefer to identify hosts using IP addresses since they are of fixed length and
only contain digits that are easy to process. Domain Name System (DNS) is a protocol that
provides the translation between hostnames and IP addresses.
As mentioned in the previous sections, the application layer is the closest to the user.
Therefore, it is very dangerous if it’s to be attacked. In such a situation, performance may be
degraded, data integrity may be compromised, user’s data stolen may be, or the network may
break down.
Some application layer attacks include:
SQL injections
denial of service attacks
cross-site scripting
access to unauthorized data
Page | 40
parameter tampering
Mitigation of attacks
There should be security present at the application layer to ensure that attacks can be
successfully be defended against.
PGP is comparatively less While it is more convenient than PGP due to the
6.
convenient. secure transformation of all the applications.
PGP is the standard for strong While it is also the standard for strong encryption
8.
encryption. but has some drawbacks.
Page | 41
S.NO PGP S/MIME
PGP is used for Securing S/MIME is used for Securing Messages and
13.
text messages only. attachments.
Administrative overhead of
16. Administrative overhead of S/MIME is low.
PGP is high.
7. Type of cryptography. What is security at transport layer SSL and TLS? What is
SHA-256 and SHA-512? What is cryptography implementation?
1. Confidentiality: Confidentiality ensures that only the intended recipient can decrypt
the message and read its contents.
2. Non-repudiation: Non-repudiation means the sender of the message cannot
backtrack in the future and deny their reasons for sending or creating the message.
3. Integrity: Integrity focuses on the ability to be certain that the information contained
within the message cannot be modified while in storage or transit.
Page | 42
4. Authenticity: Authenticity ensures the sender and recipient can verify each other’s
identities and the destination of the message.
5. There are some differences between SSL and TLS which are given below:
SSL TLS
SSL stands for Secure Socket Layer. TLS stands for Transport Layer Security.
SSL (Secure Socket Layer) supports TLS (Transport Layer Security) does not
the Fortezza algorithm. support the Fortezza algorithm.
SSL (Secure Socket Layer) is the 3.0 TLS (Transport Layer Security) is the 1.0
version. version.
Page | 43
There are two families of hash functions, SHA-1 and SHA-2. The SHA 256 belongs to the
SHA-2 family of hashes. SHA-1 is a cryptographic hash function that was designed around
1995 and was disapproved for cryptographic usage after 2010.SHA 256 is a hashing
algorithm that was published in 2001 when the SHA-1 was losing its strength against brute
force attacks. The hashing algorithm was a joint effort between National Security Agency and
NIST.
The number 256 has a unique significance in its functionality. The number signifies the
length of the final hash value or digest. It means that no matter how big the plain text is, the
hash algorithm will always produce a 256-bit hash value.
1. The length of the message, cleartext, or plaintext should be less than 264 bits. Yes, the
message can be of any length, but for random hash values, it should be in the
comparison area.
2. The digest length or the final hashed value should be 256 bits.
3. All the 256-bit hash algorithms should be irreversible. It means that the plaintext
should not be retrievable if the digest is available or vice versa.
Padding bits
The padding bits are a concept in hashing where additional bits like 0 or 1 are added to
complete the block. Let me explain!
The cryptographic algorithm manages the input provided by you in blocks. Hence, if the
block is 512 bits and there are five more bits left to complete the entire message apart from
the last 64 bits, five padding bits will be added to it. These bits will be 1,0,0,0,0.
Just like SHA 256, SHA 512 also belongs to the family of the SHA-2 family of hashes.
Though it is not as widely used as SHA 256, it is also a powerful hashing algorithm.
The characteristics of SHA 512 are almost similar to SHA 256, with the difference of the
following!
Page | 44
Other than this, the padding bits work in the same way as in SHA 256. The block size is
1024. If there are seven bits left other than 128 bits to complete the input or the next multiple
of 1024, padding bits should be added to complete the input. The padding bits would be
1,0,0,0,0,0,0.
1. Uses dedicated hardware thus much 1. Uses shared hardware thus slower to
faster to execute. execute.
2. Not dependent on the operating system. 2. Dependent on the security levels and
Supported by dedicated software for features of the operating system and
operating the hardware. supported software.
Page | 45
Page | 46