Soc Iq-1
Soc Iq-1
b. Integrity confirms data is accurate and not altered by unauthorized people throughout its
lifecycle.
c. Availability ensures authorized users can access data whenever needed. This is done
through properly maintaining and configuring technical infrastructure and systems that hold and
display the information.
There should be a balance among these three. For example, higher confidentiality may require
more computing power for decryption, causing lower availability. Therefore, a balance among
these three are important.
***********************************************************************************************************
***********************************************************************************************************
6. What is a firewall?
A. It is a first line of defense in network security. It helps to monitor incoming and outgoing
network
traffic. Using an access control list (ACL), we can decide whether to allow or block specific traffic
based on a defined set of security rules (destination port, IP, protocol).
C. Types of Firewalls:
a. Host-based
b. Network-based
c. Next-Generation Firewall
A. The browser will use DNS lookup to find the IP address of google.com in the following way:
i. First, the browser checks its cache for DNS records of previously visited websites to find
the related IP. If it isn't found, the next step will take place.
ii. Second, the browser checks the OS cache since the OS also maintains a cache of DNS
records. If it isn't found, the next step will take place.
iii. Third, the browser checks the router cache as it also maintains its own cache of DNS
records. If it isn't found, the next step will take place.
iv. Fourth, the browser checks the ISP cache as ISP maintains its own DNS server. If it isn't
found, the next step will take place.
v. Fifth, ISP’s DNS server initiates a DNS query to find the server’s IP address that hosts
Google.com.
vi.Sixth, If the ISP does not know then it asks the root name server. The root name server
will redirect it to the .com domain name server. .com name server will redirect it to the
google.com name server. The google.com name server will find the matching IP address
for google.com in its DNS records and return it to your ISP’s DNS server, which will send
it back to your browser.
A. A (forward) proxy server is a system that provides a gateway between users and the
internet. It is a server, “intermediary” because it goes between end-users and the web pages
they visit Online.
B. A (forward) proxy is located at the edge of the network bordering the internet and
internal network. There are three main use of the forward proxy:
a. It improves performance by caching content, which improves the speed and saves the
Bandwidth.
b. It allows multiple clients to route traffic to an external network. For instance, a
business
may have a proxy that routes and filters employee traffic to the public Internet.
c. It can be configured to block certain URLs, whitelist or blacklist certain protocols.
C. A reverse proxy is a system that sits in front of web servers and forwards client
requests to those web servers.
************************************************************************************************************
A. Social engineering is a manipulation technique that is used to exploit human error. It is mostly
done to gain private information, access, or valuables.
B. Social engineering attacks are built around how people think and act. To do that, an attacker
may do some research about the person, once an attacker understands what motivates a user’s
actions, they can deceive and manipulate the user effectively.
C. Some types of social engineering: Phishing, Whaling, Diversion Theft, Baiting, Honey Trap,
Pretexting, SMS Phishing, Scareware.
A. Phishing attacks send fraudulent communications that appear to come from a reliable source.
C. It usually aims to get a person to click a malicious link in the email, download an attachment
with malicious intent, or simply ask to perform a certain type of task.
D. The intentions of phishing attacks may be trying to get personal or sensitive information,
download and execute a malicious program on the computer, or persuade a person to perform
some tasks such as making a monetary transaction.
E. In addition to email security solutions, phishing awareness and staff education are among the
most important practices to protect an organization from phishing attacks.
11. What is the Cyber Kill Chain?
A. The Cyber Kill Chain Framework, by Lockheed Martin, explains the typical procedure that
hackers take when performing a successful cyber attack.
B. It also helps to identify vulnerabilities, and helps security teams to stop the attacks at every
stage of the chain.
B. This framework is a guideline for classifying and describing cyberattacks and intrusions. It
provides a structured method to help to understand and stop attacks.
C. The framework consists of 14 tactics categories, which are then broken down further into
specific techniques and sub-techniques.
**********************************************************************************************************
B. While a DoS attack is launched from one point, a DDoS attack comes from numerous
compromised devices (botnets), often distributed globally.
C. TCP Handshake and SYN flood attacks are common DoS/DDoS attacks.
TCP sessions use a three-way handshake when establishing a session between two systems.
These two systems start a session by exchanging three packets (1 SYN - 2 SYN/ACK - 3 ACK).
After a successful handshake, the session will be established, and the data exchange starts.
In TCP Handshake and SYN flood attacks, attackers never send the last ACK packet, leaving
the session half open. These half-open sessions consume the server’s resources while waiting
for the third packet and may cause the server to crash.
Real-life example: Microsoft Mitigated Record-Breaking 3.47 Tbps DDoS Attack on Azure
Customers
14. What is ARP poisoning?
● The attacker must have access to the network. They scan the network to determine the
IP addresses of at least two devices—let’s say these are a workstation and a router.
● The attacker uses a spoofing tool, such as Arpspoof or Driftnet to send out forged ARP
responses.
● The forged responses advertise that the correct MAC address for both IP addresses
belonging to the router and workstation is the attacker’s MAC address. This fools both
the router and workstation into connecting to the attacker’s machine instead of to each
other.
● The two devices update their ARP cache entries and, from that point onwards,
communicate with the attacker instead of directly with each other. The attacker is now
secretly in the middle of all communications.
Due to clear text transmission, ARP Poisoning is effective in HTTP, FTP, TelNet, etc.
Keywords:
Video resource: ARP Poisoning | Man-in-the-Middle Attack
15. What is DNS poisoning?
DNS (Domain Name System) poisoning attacks modify or corrupt DNS data. Attackers attempt
to modify/replace the IP address in the DNS record with a malicious website’s IP address. If
successful, users will be sent to malicious websites instead of those they intend to visit.
DNS poisoning (aka DNS Sinkhole) is also used by SOC to protect the organization.
Keywords:
More resources: What is DNS Spoofing and Cache Poisoning?
************************************************************************************************************
A. The Open Web Application Security Project (OWASP) is a nonprofit organization focused on
improving software security.
B. OWASP Top-10 lists the ten most common web application security risks.
C. It is a great, free foundational resource for developers when writing code, performing tests
with
these Top 10 risks in mind, and building secure applications/programs.
Keywords:
More resources: OWASP Top Ten
16- What is DNS Sinkhole?
This technique can be used to prevent hosts from connecting to or communicating with known
malicious destinations such as a botnet C&C server.
*****************************************************************************************************
A. Databases using Structure Query Language (SQL) can be vulnerable to SQL injection attack.
An attacker can cause an SQL database to perform actions that the developer did not intend
like revealing, modifying, or deleting sensitive data.
B. In an SQL attack, an attacker uses malicious SQL code/script/sql query generally in the login
page, forms.) In the query, the TRUE statement must work all the time. Such as 1=1, like in the
ROCKYOU hacking incident.
*********************************************************************************************************