Module 1 Introduction To Cyber Security
Module 1 Introduction To Cyber Security
Risk: The potential for loss or damage when a threat exploits a vulnerability.
n
Examples: Financial loss, Privacy issues, Reputation loss.
l.i
Types of Attacks on a System
oo
Operating System Attacks: Attackers search for vulnerabilities in an operating
system’s design, installation or configuration and exploit them to gain access to
ch
a system. Examples: Buffer overflow vulnerabilities, bugs in OS, un-patched
OS
rs
Misconfiguration Attacks: These vulnerabilities affect web servers,
application platforms, databases, networks, or frameworks that may result in
ke
● Governance.
● Risk Assessment.
● Security Operations.
● Security Engineering.
● Threat Intelligence.
● Physical Security.
● Employee Awareness.
Refer:
https://app.box.com/s/sj5xaz8a1461e7u7si3ip1361r070fed/file/803481256925
Hacking
Hacking is the process of exploiting system vulnerabilities and
compromising security systems to gain unauthorized access to the system
resources. It involves modifying system or application features to achieve a goal
outside of the creator’s original purpose.
Ethical Hacking
Ethical Hacking is the process to identify vulnerabilities to assure system
security by use of hacking tools, tricks, and techniques. It focuses on simulating
methods used by attackers to verify the existence of exploitable vulnerabilities
in the system's security.
Hacker
Hackers are intelligent individuals who spend enormous amounts of time
exploring computing resources like networks, websites, mobile devices, etc. to
identify critical vulnerabilities which can be used for exploitation.
Ethical Hacker
Ethical Hacker is an expert in computer internals and networking
concepts, who tries to find out potential vulnerabilities on the target systems
before a hacker could use them, without actually doing any harm to the
information systems on behalf of the owners of the IT Assets.
Types of Hackers
2. Scanning is the phase immediately preceding the attack. Here, the attacker
uses the details gathered during reconnaissance to identify specific
vulnerabilities. An attacker can gather critical network information such as
the mapping of systems, routers, and firewalls by using simple tools such as
the standard Windows utility Traceroute.
3. Gaining Access In this phase in which real hacking occurs. Attackers use
vulnerabilities identified during the reconnaissance and scanning phase to
gain access to the target system or network. Attackers gain access to the
target system locally, over a LAN, or over the Internet.
4. Maintaining Access of the target machine and remaining undetected.
Attackers install a backdoor or a Trojan to gain repeat access. They can also
install rootkits at the kernel level to gain full administrative access to the
target computer. Rootkits are used to gain access at the operating system
level, while a Trojan horse gains access at the application level. Both rootkits
and Trojans require users to install them locally.
5. Clearing Tracks is for avoiding legal trouble, attackers will overwrite the
server, System and application logs to Avoid suspicion and erase all evidence
of their actions. Attackers can execute scripts in the Trojan or rootkit to
replace the critical system and log files to hide their presence in the system.
Terminology
Hack value: Hack value is a notion among the hackers that something is worth
doing. Hackers may feel that breaking down robust network security might give
them great satisfaction and that it is something they accomplished that not
everyone could do.
Zero-day attack: In a 0-day attack, the attacker exploits the vulnerability before
the software developer releases the Patch For them.
● Confidentiality ● Non-Repudiation
● Authenticity ● Authorization
● Integrity ● Availability
Useful Links
Source: Internet
Security and vulnerability Research Websites:
● Securityfocus.com
● Secunia.com
● Packetstormsecurity.com
● Governmentsecurity.org
Hacking Conferences:
● Defcon Conference ● Nullcon Conference
● Shmoocon Conference ● Malcon Conference
● Blackhat Conference ● Club hack Conference
● Phrack.org
● hackin9.org
● 2600.Com
● Magazine.hitb.com
● Pentest magazine
● Hack