Cybersecurity Midterms
Cybersecurity Midterms
Cybersecurity Midterms
A domain has a domain controller that governs all basic domain functions and manages network security. Thus, a domain
is used to manage all user functions, including username, password, and shared system resource authentication and
access. It is also used to assign specific resource privileges, such as user accounts.
In a simple network domain, many computers and workgroups are directly connected. A domain comprises combined
systems, servers, and workgroups. Multiple server types may exist in one (1) domain such as Web, database, and print
that depend on network requirement.
DOMAIN RISKS
User Domain – This covers all the users that • User can destroy data in the application (intentionally or
have access to the other domains. not) and delete all.
• User can use the password to delete his/her file.
• User can insert infected CD or flash drive into the computer.
Workstation Domain – It is a computer of an • The workstation’s operating system can have a known
individual user where the production takes software vulnerability that allows a hacker to connect
place. remotely and steal data.
• A workstation’s browser can have a software vulnerability,
which allows unsigned scripts to install malicious software
silently.
• A workstation’s hard drive can fail to cause loss of data.
LAN Domain – This contains all of the • A work can spread through the LAN and infect all computers
workstation, hubs, switches, and routers. This is in it.
also a trusted zone. • LAN server OS can have a known software vulnerability.
• An unauthorized user can access the organization’s
workstations in a LAN.
WAN Domain – It consists of the Internet and • The service provider can have a major network outage.
semi-private lines. • Server can receive a Denial of Service (DOS) or Distributed
Denial of Service (DDOS) attack.
• A file transfer protocol (FTP) can allow anonymously
uploaded illegal software.
LAN/WAN Domain – It is the boundary • A hacker can penetrate an IT infrastructure and gain access
between the trusted and untrusted zones. The to the internal network.
zones are filtered with a firewall. • A firewall with unnecessary ports open can allow access
from the Internet.
System/Application Storage Domain – This • A fire can destroy primary data.
domain is made up of user-accessed servers • A DOS attack can cripple the organization’s e-mail.
such as e-mail and database. • A database server can be attacked by SQL injection,
corrupting the data.
Remote Access Domain – This is the domain in • Communication circuit outage can deny connection.
which a mobile user can access the local • Remote communication from the office can be unsecured.
network usually through a VPN.
Table 1. The typical domains of IT Infrastructure.
[email protected] Page 1 of 6
IT1914
LAN Domain
The Local Area Network (LAN) domain is defined as a sub-network that is made up of servers and clients—each of which
is controlled by a centralized database. User approval is obtained through a central server or a domain controller. The
term “domain” can refer to descriptors for Internet sites, which is a site’s Web address, or to LAN subnetworks.
WAN Domain
The Wide Area Network (WAN) is a communications network that spans a large geographic area such as cities, states, or
countries. It can be private to connect parts of a business, or it can be more public to connect smaller networks.
One common method of providing remote access is via a remote access virtual private network (VPN) connection. A VPN
creates a safe and encrypted connection over a less secure network, such as the Internet. The VPN technology was
developed as a way to enable remote users and branch offices to log into corporate applications and other resources
securely.
[email protected] Page 2 of 6
IT1914
System/Application Domain
System/Application Domain
This consists of all of a business’ mission-critical systems, applications, and data. It is important to ensure that this domain
is secure at all times. Otherwise, a business could easily lose large amounts of sensitive information as well as face the
threat of having productivity come to a halt. The common targeted systems and applications are operating systems
(desktop, server, and network), e-mail applications and servers, enterprise resource planning (ERP) applications and
systems, and Web browsers. System/Application attacks are generalized into three (3) categories: denial or destruction,
alteration, and disclosure.
[email protected] Page 3 of 6
IT1914
closets because they contain a vast amount of sensitive information. However, it is also important to keep in mind that
physical entities such as important documents can be targets to this threat.
Software Vulnerabilities
This is a flaw that exists in the programming of a software component or system that allows a malicious attacker to gain
unauthorized access to that system through an exploit. These vulnerabilities can be exploited through malicious software
known as “malware” that is accidentally executed on the system by a user or more directly exploited by an attacker.
Weaknesses in software that lead to vulnerabilities can occur in any software that is running on a system, including the
operating system itself. Many common applications, such as Adobe Flash or Internet Explorer, may contain software
vulnerabilities. Even custom built in-house software is not immune to software vulnerabilities.
Server Vulnerabilities
Server software vulnerabilities are similar to software vulnerabilities on non-server systems with the exception that
software vulnerabilities that can exist on servers have the potential to be even more damaging. This can exist in the
software that the server uses to provide services (FTP, SSH, and PHP) or in the operating system of the server itself.
Data Loss
Data includes any information stored digitally on a computing system or network. It can be in the form of an e-mail, a
document or spreadsheet, images, database records, or other formats.
Data loss occurs when any stored data is destroyed. Loss can occur during storage, transmission, or processing. These
losses are considered the greatest risk to the system/application domain because the goal of these systems is to allow
users to create, store, retrieved, and manipulate data.
The most common preventative measure is to perform backups of all data. Complete system images are stored in case a
computer needs to be formatted and brought back to a known good state. Daily backups to an off-site or physically
separated storage medium will allow nearly full data recovery in the event of data loss.
Reducing Risk
In summary, the following suggestions should be taken into consideration to reduce risks associated with the
system/application domain:
• Physically secure areas containing sensitive systems.
• Implement encryption and data handling standards.
• Minimize data access.
• Back up data.
• Be aware of all applications on the network.
• Plan, configure, maintain, and improve network servers.
• Develop and implement standards.
• Read and understand the provided Acceptable Use Policy.
• Report suspected IT policy violations to the supervisor.
[email protected] Page 4 of 6
IT1914
The Ethics Manifesto by Gerd Leonhard offers a framework for what he calls a global “ethics in technology” manifesto.
He says it is important, in creating this model, to focus on human rights in an era when machines will be taking on more
human-like characteristics.
Leonhard’s proposed manifesto focuses on five (5) specific human rights that he believes could be endangered if people
don’t have an ethical framework to guide them.
The Code of Ethics for Information Security Professional is derived from the Unified Framework for Information Security
Professionals, which emphasizes these three (3) core ethic values:
Values Descriptions
Integrity • Perform duties under existing laws and exercise the highest moral
principles.
• Refrain from activities that would constitute a conflict of interest.
• Act in the best interests of stakeholders consistent with the public
interest.
• Act honorably, justly, responsibly, and legally in every aspect of your
profession.
Objectivity • Perform all duties in a fair manner and without prejudice.
[email protected] Page 5 of 6
IT1914
_________________________________________________________________________________________________
References:
CyberSecurity Malaysia. (2010). Code of Ethics [PDF]. Retrieved from http://www.cybersecurity.my/data/content_files/11/764.pdf on May 2, 2019
Domain. (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/1326/domain-networking on May 1, 2019
Durkin, N. (n.d.). Pros and cons: 3 types of remote access methods [Web log post]. Retrieved from https://www.wearediagram.com/blog/pros-and-
cons-3-types-of-remote-access-methods on May 1, 2019
Eckel, E. (2006, July 19). The importance of a remote access policy. In TechRepublic. Retrieved from https://www.techrepublic.com/article/the-
importance-of-a-remote-access-policy/ on May 2, 2019
Know the rules of cyber ethics. (n.d.). In Center for Internet Security. Retrieved from https://www.cisecurity.org/daily-tip/know-the-rules-of-cyber-
ethics/ on May 2, 2019
Kostopoulus, G.K. (2018). Cyberspace and Cybersecurity (2nd ed.). Boca Raton, FL: Taylor and Francis Group
Local users and domain users in Windows. (n.d.). In Indiana University. Retrieved from https://kb.iu.edu/d/anbn on May 1, 2019
Mitchell, B. (2019). What is a wide area network (WAN)? [Web log post]. Retrieved from https://www.lifewire.com/wide-area-network-816383 on
May 1, 2019
Perlman, A. (2018). Man vs. Machine: The new ethics of cybersecurity. Retrieved from https://www.securityroundtable.org/new-ethics-of-
cybersecurity/ on May 2, 2019
Poczynek, N., Truong, J., When, A. (2013, April 4). System/Application domain. Retrieved from http://www.personal.utulsa.edu/~james-
childress/cs5493/Projects2013/Silver/SystemApplicationDomainTrainingDocument.pdf on May 2, 2019
The seven domain of a typical IT infrastructure. (n.d.). In BINUS University School of Information Systems. Retrieved from
https://sis.binus.ac.id/2018/01/15/the-seven-domain-of-a-typical-it-infrastructure/ on May 1, 2019
What is a LAN domain? (n.d.). In Reference.com. Retrieved from https://www.reference.com/technology/lan-domain-2489f5ad15657539 on May 1,
2019
Why domain names are so important. (n.d). In AllBusiness. Retrieved from https://www.allbusiness.com/why-domain-names-are-so-important-681-
1.html on May 2, 2019
[email protected] Page 6 of 6
IT1914
Note that the count on the alphabets will depend on the shift. If you decide to encrypt using Caesar cipher with
a shift of 5, then A would be F, B would become G, and so on. If you want to decrypt the encrypted message,
instead of counting to the right, count the alphabet to the left depending on the given shift.
• Keyword Ciphers – To use this method for constructing the ciphertext alphabet, pick a keyword and write it
down while ignoring the repeated letters. Follow it with the letters of the alphabet that have not yet been used.
For example, find the alphabet pairs for the keyword COLLEGE. Crossing out the letters that are making their
second appearance leaves COLEG. To encipher, use the pair of alphabets.
Top row: Plaintext – This will be the basis for getting the letters from the ciphertext.
Bottom row: Ciphertext – The letters will come from this row to get the answer.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
C O L E G A B D F H I J K M N P Q R S T U V W X Y Z
Now, to encrypt the word “UNIVERSITY,” the result would be UMFVGRSFTY.
Note that the keyword will always be given. It can be any word.
• Giovanni’s Method – Around 1580, Giovanni Battista Argenti suggested that one can also pick a keyletter and
begin the keyword UNDER that letter of the plaintext. The Argentis, Giovanni, and his nephew Matteo, come
from one of the great cryptology families of the middle ages. After many years of trying, Giovanni finally became
the papal secretary of ciphers in Rome in 1950, only to quickly weaken from the frequency necessary trips to
Germany and France.
To use Giovanni’s method with key letter “P,” start the word “COLEG” under “PQRST” then place the remaining
letters to the right to convert the plaintext to ciphertext.
Top row: Plaintext – This will be the basis for getting the letters from the ciphertext.
Bottom row: Ciphertext – The letters will come from this row to get the answer.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
J K M N P Q R S T U V W X Y Z C O L E G A B D F H I
If you encrypt UNIVERSITY, the answer based on Giovanni’s method would be AYTBPLETGH.
• Transposition Techniques – A transposition cipher is archived by performing some permutation on the plaintext
letters. The simplest such cipher is the rail fence technique, in which the plaintext is written down as a sequence
of diagonals and then read off as a sequence of rows. An example of this technique is as follows:
Plaintext: MEET ME AFTER THE TOGA PARTY
Solution:
M E M A T R H T G P R Y
E T E F E T E O A A T
• Polyalphabetic Ciphers – Another way to improve on the simple monoalphabetic techniques is to use different
monoalphabetic substitutions as on proceeds through the plaintext message. The best-known and the simplest
algorithm is referred to as the Vigenere cipher.
Example of Polyalphabetic Cipher:
Top row - Key: ATMOSPHERE
Bottom row - Plaintext: HELLO WORLD
Using the Vigenere tableau, find the match of the keyword and plaintext. Example, A and H are H, T and E would
result in X and so on.
A T M O S P H E R E
H E L L O W O R L D
Ciphertext: HXXZGLVVCH
Source: https://flylib.com/books/en/3.190.1.30/1/
_________________________________________________________________________________________________
References:
Alan. (2013, January 25). Why are processes important? [Web log post]. Retrieved from http://www.agiledge.com/process/why-are-processes-important on May 6, 2019
An Introduction to Cyber Security Policy. (n.d). In Infosec Resources. Retrieved from https://resources.infosecinstitute.com/cyber-security-policy-part-1/#gref on May 3,
2019
Caesar Cipher. (n.d). In Practical Cryptography. Retrieved from http://practicalcryptography.com/ciphers/caesar-cipher/ on May 6, 2019
Cryptography. (n.d). In Geeks for Geeks. Retrieved from https://www.geeksforgeeks.org/cryptography-introduction-to-crypto-terminologies/ on May 5, 2019
Dubie, D. (n.d). Network Auditing and Compliance Requires Education Planning. Guide to Network Auditing and Compliance. PC World. Retrieved from
https://www.pcworld.com/article/144633/guide_network_auditing_compliance.html on May 5, 2019
Henshall, A. (2017. August 29). 8 IT Security Processes to Protect and Manage Company Data [Web log post]. Retrieved from https://www.process.st/it-security-processes/
on May 5, 2019
Kim, D. & Solomon M. (2018). Fundamentals of information systems security (3rd ed.). Massachusets: Jones & Bartlett Learning
Network Compliance. (n.d). In Qual Network Society. Retrieved from http://it-network-security.co.uk/our-services/network-compliance/ on May 5, 2019
Policy Makers
Security policy development is a joint or collective operation of all entity of an organization that is affected by its rules.
In general, security policies should not be developed by the IT team itself as it is a responsibility of everyone that has a
stake in the security policy. During policy creating, the following entities should be involved in its development:
• Board – Company board members must render their advice to some form of a review of policies in response to
the exceptional or abominable running condition of the business.
• IT Team – The members of this team usually are the biggest consumers of the policy information in any company
because they develop standards around the usage of the computer system, especially security controls.
• Legal Team – This team ensures the legal points in the document and guides a particular point of
appropriateness in the company.
• HR Team – This team typically obtains a certified certificate from each employee, in which they have read and
understood the stipulated policy, as it deals with reward- and punishment-related issues of employees to
implement discipline.
Requirement
Publication
Gathering
Proposal
Approval
Definition
Policy
Development
Figure 1. Security policy development approach
Policy Audience
Security policy applies to all senior management, employees, stockholders, consultants, and service providers who use
company assets. Therefore, the security policy must be readable, concise, and illustrated to be effectively understandable
to its audience so that everyone adheres to the policies and fulfill their role.
Audience
IT
Employees Management Legal Stockholders
Department
Policy Classification
Every organization typically has three (3) policies: first, it is drafted on paper; second, that is in employees’ minds; and
third that it is implemented. The security policy is a part of the hierarchy of management control; it guides its audience
what to do according to the stipulated terms and conditions of a company. The policy generally requires what must be
done, not on how it should be done.
Security policies could be informative, regulative, and advisory in a broad manner. Generally, these are subdivided into
the following categories:
• Physical security – It mandates what protection should be wielded to safeguard the physical asset from both
employees and management and applies to the prevail facilities, including doors, entry point, surveillance, and
alarm.
• Personnel Management – They are supposed to tell their employees how to conduct or operate day-to-day
business activities in a secure manner. For instance, password management and confidential information
security apply to individual employees.
• Hardware and Software – It directs the administrator what type of technology to use and how network control
should be configured and applied to the system and network administrators.
Policy Audit
Security documents are living documents. It needs to be updated at specific intervals in response to changing business
and customer requirements. A successful security audit accomplishes the following:
• It compares the security policy with the actual practice in place.
• It determines the exposure to threats from the inside.
• It also determines the exposure of an organization from an outside attack.
Policy Enforcement
Enforcement of security policies ensures compliance with the principle and practices dictated by the company because
policy procedure does not work if they are violated. Enforcement is arguably the most significant aspect of a company; it
dissuades anyone from deliberately or accidentally violating policies rules.
Policy Awareness
Company employees are often perceived as a “soft” target to be compromised because they are the least predictable
and easiest to exploit. Trusted employees either “disgruntle” or become framed to provide valuable information about a
company. One of the most robust storage to combat this exposure of information by employees is education. A good
security awareness program must be periodically performed and must include all the existing security policies that are
mandated to be complied with by employees. These awareness programs should integrate communication and reminders
to employees about what they should and shouldn’t reveal information to the outsiders. Security policy awareness
training and education mitigate the threat of information leakage.
Process Management
There are eight (8) security processes to protect and manage data:
• Privileged Password Management – This process seeks to protect the most sensitive data. Within a large
organization, which has requirements to keep customer or client data secure, there is often a limited number of
people who have access to the data. This process is geared to provide short-term access to someone who would
normally not have these permissions.
Having a strong privileged password management process in place is a vital part of securing data. This is
important for company performance. Sufficient levels of security can often be required by law depending on the
nature of the data that is stored and the industry an organization operates within.
• Network Administrator Daily Tasks – This checklist aims to list a series of key daily tasks performed by network
administrators and provide space for those tasks to be recorded. As a result, a network administrator would be
able to run the checklist each day and cycle through the different tasks presented to cover the recurring basics.
• Network Security Audit Checklist – The network security audit checklist deals with hardware and software,
training, and procedures. The risks of a system often down to both human and technical errors and particularly
when both errors meet. For this reason, an audit must go beyond looking at a narrow focus or one (1) specific
area; instead, s/he must try to capture the overview of all the risks inherent in the system.
• Firewall Audit Checklist – This process is thorough and covers a series of precautions. In every step, documenting
activities is encouraged. From reviewing existing policies and assessing the physical security of the servers to
deleting redundant rules from the rule-base, it is vital that changes are documented when executing process
management. Positive process documentation results in better work and makes the life of the next person
auditing the firewall significantly easier.
• Virtual Private Network (VPN) Configuration – In this process, a VPN is set up on a staff member’s laptop, which
allows the staff member to connect to the office network remotely. Built into this process are the checks and
balances which come from using a process to manage the setup. For example, as part of security protections,
both the information technology (IT) and human resource (HR) departments would have recorded the
information of who has remote access to office networks. This prevents risk exposure that otherwise could have
been caused by poor communication practices.
• Apache Server Setup – The most popular server in the world is Apache. It caters different methods of setup by
walking through alternative commands.
• E-mail Server Security – E-mail is one of the first ways anyone is going to try to get into a company. Fighting off
phishing attacks and other malicious attempts to compromise security relies on both strong technical resilience
and a high level of professional training.
• Penetration Testing – This involves testing systems security by trying to break into it. It is centered around trying
to find vulnerabilities in a system and then attempting to sneak inside. The penetration testers’ goal is to see
how much damage they have the potential to cause.
Network Compliance
Network compliance management enables the identification and correction of trends that could lead to business
problems such as network instability and service interruption.
Compliance becomes overwhelming for many IT shops because they don’t have a clear understanding of what various
regulations require. Compliance is a moving target, so such tools must be updated with policies and continue to run after
an audit proves successful to prevent compliance drift. At that point, the technologies are used to maintain an
environment in a compliant state and provide documentation of the ongoing compliance.
Network auditing and compliance tools use scanning and monitoring technologies to track access to critical devices and
ensure actions comply with policies. The products collect data and maintain detailed records, sometimes in the format
required by regulatory compliance demands.
Network audit and compliance software, at times packaged in appliances, include components such as audit, compliance,
and database servers. Audit servers run scans, while the compliance service analyzes and processes the scan results, and
the database server stores raw and processed data. Compliance managers typically tap a Web-based console to view
data collected and generate reports.
How Does Network Compliance Protect You?
There are many obstacles to achieving complete network compliance and security, including technology change, staffing,
and skills shortages, and the need to accelerate business responsiveness. Operational network errors are frequently the
consequence of configuration issues, which are a major source of network downtime, degraded performance, and gaps
in the network security. Network compliance and security is imperative for ensuring quality service, meeting
implementation and regulatory requirements, and managing risks.
Cryptography
Cryptography is the science of secret writing to keep the data secret and an important aspect when dealing with network
security. “Crypto” means secret or hidden. Cryptanalysis, on the other hand, is the science or sometimes the art of
breaking cryptosystems. Both terms are a subset of what is called “cryptology.” Cryptology refers to the study of codes,
which involves both writing (cryptography) and solving (cryptanalysis) them. Cryptography is classified into symmetric
cryptography, asymmetric cryptography, and hashing. Below are the description of these types.
• Symmetric key cryptography – It involves usage of one (1) secret key along with encryption and decryption
algorithms which help in securing the contents of the message. The strength of symmetric key cryptography
depends upon the number of key bits. It is relatively faster than asymmetric key cryptography. There arises a
key distribution problem as the key has to be transferred from the sender to the receiver through a secure
channel.
• Asymmetric key cryptography – Also known as “public key cryptography,” it involves the usage of a public key
along with the secret key. It solves the problem of key distribution as both parties use different keys for
encryption or decryption. It is not feasible to use for decrypting bulk messages for it is very slow compared to
symmetric key cryptography.
• Hashing – It involves taking the plain-text and converting it to a hash value of fixed size by a hash function. This
process ensures the integrity of the message; the hash value on both the sender’s and the receiver’s side should
match if the message is unaltered.
Figure 5. Hashing
Source: https://www.geeksforgeeks.org/cryptography-introduction-to-crypto-terminologies/
Cryptanalysis is the study of cipher text, ciphers, and cryptosystems to understand how they work as well as find and
improve techniques for defeating or weakening threats. For example, cryptanalysts seek to decrypt cipher texts without
knowledge of the plaintext source, encryption key, or the algorithm used to encrypt it. Cryptanalysts also target secure
hashing, digital signatures, and other cryptographic algorithms.
Figure 6. Cryptanalysis
Source: https://www.geeksforgeeks.org/cryptography-introduction-to-crypto-terminologies/