Cybersecurity Notes
Cybersecurity Notes
>>Network Types:
There are two types of network
1) LAN (Local Area Network)
2) WAN(Wide Area Network)
----------------------------------------
>>Network Devices:
1.Routers
2. Switches
3. Firewall
4. IDS/IPS
5. Proxy
6. Load Balancer
7. WAF (Web Application Firewall)
8. Email Gateway
----------------------------------------------------------------------
>>Difference between LAN & WAN
LAN WAN
Stands for Locan Area Network Stands for Wide Area Network
Small Area covered Large area covered
Usually getting low speed Usually getting a fast speed
Within a campus (With in organisation) One city to Another
Using Switches Using Routers.
----------------------------------------------------------------------
>> Firewall
Firewall is a network security device. with the help of firewall we can monitor incoming and
outgoing traffic. as well as it will protect from unauthorised users. Its works on rule based.
There is two types of firewall
1. Perimeter Firewall
2. Next Gen. Firewall (Traditional Firewall)
IDS - IDS scan the traffic & detects malacious traffic & report it to the admin based on the
network signature.I
IPS - IPS scan the traffic & detects and can also block ( prevent) the malacious traffic based on
network signature.
Vendors:
Cisco FTD
----------------------------------------------------------------------
Proxy:
Its a network security device. It will protect and Block malacious websites.It will protect
internet related bad traffic.Protect from unauthorised and bad traffic.
Vendor
Zscaler
----------------------------------------------------------------------
Load Balancer:
Its a network security device. It will balance the traffic as well as distributed traffic.
Vendor:
Big IPF5
----------------------------------------------------------------------
WAF ( Web Application Firewall):
Its a network security device. it will protect company websites as well as applications.It will
protect from web related attacks.
ex. DoS Attack, DDoS Attack, SQL Injection, Cross site scripting Attack.
Top Vendors
Alkamai
Cloudflare
Imperva
----------------------------------------------------------------------
Email Gateway: Its a device to protect from malacious phishing emails.Email Gateway is
installed in server which is connected to core switch. Here we are using SMTP protocol.
-------------------------------------------------------------------------------------------------------
-------------------------------------
Antiviurs: Antivirus is the endpoint user device security purpose. we are using to protect and
prevent from viruses worms and trojans etc. In our laptop there is an antivirus agent which
are connected to
antivirus manager which is installed in server. Antivirus works on signature based.Av scan
only enternal files. To monitor malacious and suspecious activity.as well as we have to check
which user's
antivirus signature is up-to-date or not.
Top Vendors:
Symentech
MCcaffe
Defender
Norton
VIRUS : A computer program that can copy itself and infect a computer without permission or
knowledge of the user.A virus might corrupt or delete data on a computer,
use e-mail programs to spread itself to other computers, or even erase everything on a
hard disk. See malicious code
WORM : In this definition of computer worms, the worm virus exploits vulnerabilities in your
security software to steal sensitive information, install backdoors that can be used to access
the system, corrupt files,
and do other kinds of harm. Worms consume large volumes of memory, as well as
bandwidth.
TROJANS : A Trojan Horse Virus is a type of malware that downloads onto a computer
disguised as a legitimate program.
The delivery method typically sees an attacker use social engineering to hide
malicious code within legitimate software to try and gain users' system access with their
software.
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
----
EDR ( End point Detection and Response)
- Its a device to protect our end point device
- its a next generation of Antivirus
- Its a Advance than Antivirus
- its detects file also
- EDR works on BEHAVIOUR based.
-------------------------------------------------------------------------------------------------------
-------------------------------------
Top Vendor :
Netscope
Forcepoint
-------------------------------------------------------------------------------------------------------
-------------------------------------
IP Address:
How to search our laptop IP Address?
Go to search bar- type cmd- in command prompt type ipconfig.
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
OSI Layers:
If we want build a new network then network engineers follows OSI Layers. There are 7 OSI
Layers
6 PRESENTATION- Format the data so that it can be viewed by the users.Encrypt and
Decrypt Ex. JPG, GIF, HTTPS, SSL, TLS
5 SESSION- Maintain connections and is responsible for controlling ports and session
4 TRANSPORT- Transmits data using transmition protocols including tcp and udp
3 NETWORK- Reads the IP Address form the packet. Ex. Routers, Layers, Switches
1 PHYSICAL- Send the data on to the physical wire Ex. Hubs, Cables.
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
1. TCP/UDP : 20/21
2. HTTP : 80
3. HTTPS : 443
4. DNS : 53
5. DHCP : 67/68
6. TELNET : 23
7.SSH : 22
8. FTP : 20
9. SMTP : 25
10 SNMP : 167/162
11. SMB : 445
12. RDP : 3389
13. LDAP : 389
14 SYSLOG :514
TCP UDP
Secured Unsecured
Connection Oriented Connection Less
Slow Fast
Guranted Transmission No Gurantee
Ex. DNS, HTTPS, FTP Ex. DNS, DHCP, SNMP
-----------------------------------------------------------------------------
Differnce Between HTTP And HTTPS 80/443
HTTP HTTPS
Hyper Text Transfer Protocol Hyper Text Transfer Protocol Secure.
Its a Plain Text Protocol Its a Cypher Text Protocol
Less secured More Secured
Its works on Application Layers Its works on Transport Layer.
Port no. 80 Port no.443
Ex. End user want to access www.Facebook.com request will go to DNS Resolver. If DNS
Resolver does not have availabilty then its forwording request to DNS root,Again send to
name server
then Root 53 sending IP Address to DNS Resolver.
DNS Records:
Name server ( NS)
Mail Exchange (MX)
Address (A)
Canonical Name ( C NAME )
Text Record (TXT RECORD)
Time to live Record ( TTL)
Pointer Record (PTB)
-----------------------------------------------------------------------------
Every company have DHCP server. Once your laptop connected to LAN. Laptop send request
to the DHCP Server for IP Address called Discover. DHCP server offer IP Address to laptop.
Then sending request for that IP address then DHCP server Acknoledge to system.
-----------------------------------------------------------------------------
TELNET SSH
Plain Text Protocol Cypher Text Protocol
Less security Protocol More Security Protocol
Unencrypted Encrypted
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
X send to mail Y , Firstlly mail goes to the Authorised SMTP Server. It will check X's IP Address
as well as checking sender is genune or not , After confirmation if its legitimate then it
Forword to Y.
The Simple Mail Transfer Protocol (SMTP) is an application used by mail servers to send,
receive, and relay outgoing email between senders and receivers
-------------------------------------------------------------------------------------------------------
---------------------------------------------------
SNMP 167/162
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
ISP - ROUTER- PERIMETER FIREWALL- INTERNAL ROUTER- IDS/IPS- NEXT GEN FIREWALL-
PROXY- LOAD BALANCER- WAF- CORE SWITCH ( Criticle server connected ) - ACCESS SWITCH
( End user )
Ad
_______________________________________________________________________
_____________________________________________________________________
_______________________________________________________________________
_____________________________________________________________________
MODULE - 2
SECURITY CONCEPT
Encryption: It is the process of using an algorithm to transfer plain text into cypher text.
Readable to unreadable format is called Encryption.
Example: AES, DES, 3 DES (ALL ARE ALGORITHEM) .
Decryption: The conversion of encrypted data into its original form is called Decryption.
Unreadable to readable format is called Decryption.
Example: RSA (Algorithm)
-----------------------------------------------------------------------------
Encryption Types :
There are two types of Encryption
1. Symmetric Encryption
2. Asymmetric Encryption
Symmetric : Symmetric encryption involves using a single key to encrypt and decrypt data.
Example: AES, DES, 3 DES (ALL ARE ALGORITHEM)
Asymmetric: Asymmetric encryption uses private key and public key to encrypt and decrypt
the data. It is more secured then symmetric.
Example: RSA (Algorithm)
-----------------------------------------------------------------------------
Hashing :
- Its a process to transferring any given key or string of character into another value.
- Its a fix length of character
- Once you convert the data into hashing value no one can modified it.
-----------------------------------------------------------------------------
CIA
C- CONFIDENTIALITY
I- INTEGRITY
A- AVAILIBILTY
I - Integrity - Whatever we have the customer data that data should not be modified. [We are
using Hashing alogorithem.]
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
-------------------------
Cyber Kill Chain Process:
Attackers will follow to cyber kill chain process to hack network. It 鈥檚 a process attacker
can trying to attack on organization attacker will follow the cyber kill chain process.
There are 7 phases in cyber kill chain process.
1. Reconnaissance: Gathering the information is called reconnaissance.
2. Weaponisation: To prepare the weapon or to prepare the payload.(Malicious link, viruses)
3. Delivery: Via phishing email to deliver the weapon on organization or specific user
4. Exploitation: Once delivered the weapon code is triggered exploiting vulnerabilities
application or system.
5. Installation: The weapon installs a backdoor on a target 鈥檚 system allowing persistent
access.
6. Command & Control: Outsider server communication with the weapons providing hands on
keyboard access inside the target network. Servers are communicating with attacker 鈥檚
laptop.
7. Action on objectives: Attacker can achieves his target is called Action on objectives.
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
-------------------------
Types of Attackk:
Web Attacks:-
1. DoS Attack (Denial of Service Attack): DoS attacks accomplish this is by flooding the target
with ICMP Traffic, or sending it information that triggers a crash.
In this attack attacker use single system only.
Attacker is using single system to attack web server with the help of ICMP Floods is called
DoS attack.
2. DDos Attack (Distributed Denial of Service Attack): Attacker is using multiple system to
attack on the server with the use of ICMP Flood traffic that is called DDoS Attack.
3. SQL Injection attack: In this attack, attacker can inject the malicious code on the script.
Then attacker gain the access to DB and steal the valuable data.
With the help of SQL Injection attacker can change the price of product also.
4. Cross site Scripting (XSS): Cross site scripting is an attack in which an attacker injects
malicious executable scripts into the code of a trusted application or website.
Attacker trying to attack on webpage, website. Even attacker can change information on page.
-----------------------------------------------------------------------------
Network Attacks
1. MITM Attack (Man In The Middle Attack): A man-in-the-middle attack is a type of cyber-
attack in which the attacker secretly intercepts and relays messages between two parties
who believe they are communicating directly with each other.
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
Security Framework:
NIST: We need to follow NIST Guidlines, Its a powerfull tools to organize and improve your
Cybersecurity programm.
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
HIPPA-
Its a framework which provides security provision & data privacy. In order to keep patients
medical inforamtion safe.
-----------------------------------------------------------------------------
PCI DSS-
In Payment card industry
-----------------------------------------------------------------------------
GDPR-
General Data Protection Regulation
We can use, process and store personal data
It is a European Union (EU) law.