Ass.2 Edited
Ass.2 Edited
Ass.2 Edited
An IDS is either a hardware device or software application that uses known intrusion
signatures to detect and analyze both inbound and outbound network traffic for
abnormal activities.
Upon detecting a security policy violation, virus or configuration error, an IDS is able
to kick an offending user off the network and send an alert to security personnel.
Despite its benefits, including in-depth network traffic analysis and attack detection,
an IDS has inherent drawbacks. Because it uses previously known intrusion signatures
to locate attacks, newly discovered (i.e., zero-day) threats can remain undetected.
Furthermore, an IDS only detects ongoing attacks, not incoming assaults. To block
these, an intrusion prevention system is required.
An IPS prevents attacks by dropping malicious packets, blocking offending IPs and
alerting security personnel to potential threats. Such a system usually uses a
preexisting database for signature recognition and can be programmed to recognize
attacks based on traffic and behavioral anomalies.
1
While being effective at blocking known attack vectors, some IPS systems come with
limitations. These are commonly caused by an overreliance on predefined rules,
making them susceptible to false positive
Imperva cloud WAF intrusion prevention solutions are fully customizable tools that
block zero-day and existing web application security threats while reducing false
positives.
Custom rules – IncapRules expands Imperva cloud WAF capabilities by enabling you
to implement your own security and access control policies.
This high degree of customization helps minimize false positives while rooting out
hidden threats specific to your organization.
Imperva cloud WAF allows you to deploy two-factor authentication gateways for any
URL in your web application. This solution is fully customizable, letting you choose
your verification method and easily manage a database of approved users.
2
Two factor authentication helps to prevent intrusions by requiring users to provide
two means of verification when logging into an account.
Cyber threats and data leaks can be prevented and mitigated using good enterprise
cybersecurity practices, such as developing and defining your scope of security,
studying enterprise architecture, and utilizing traditional cybersecurity methods.
These practices can help protect your organization from cybersecurity breaches
Here are two major cyber threats you need to be aware of:
SQL Injection: This injection technique targets the site and database directly. When
successful, the assailant can enter a piece of SQL code that, when executed, allows
access to sensitive information or even gives database editing privileges to the cyber
criminal.
Data Leaks
3
Phishing: Phishing is one of the most popular types of scams on the web. Emails are
sent under the guise of a fellow employee asking you to immediately act to prevent
some unwanted event. An example would be an email telling you that you will lose
access to your computer if you do not provide your password. With this information,
they can use the data to create more havoc and steal even more sensitive data.
Baiting: Baiting uses your curiosity against you. Hackers leave malware or virus on a
USB or similar device in a well traveled area or break room. This is in the hope a
curious passerby will pick it up and try to use it. Once used, it activates and installs
malware to company systems and computers.
Scareware: Scareware involves spamming the victim with threats, trying to trick
them into clicking a link. A pop up stating "Your pc is infected with malware, click
here to resolve!" is an example of scareware. Once the user clicks the erroneous link,
their company or server is injected with malware, giving the attacker access to their
system.
Pretexting: Pretexting is done by gaining someone's trust that has access to sensitive
information. Malicious actors using pretexting will pose as someone of authority such
as a tax official, police officer, or a fellow employee. Once trust is established, they
will ask a series of questions in an effort to gain sensitive data such as credit card
numbers, accounts, and passwords.
Here are five crucial enterprise cybersecurity best practices you need to employ today:
4
Delete or uninstall any software that is no longer used, and remove any unused
hardware. If you're not using an app because the company decided to upgrade to a
more streamlined version, delete the old ones off your systems.
Networks should be secured and necessary ports blocked to prevent access. Also,
think about adding a VPN to your internal network for added security. Have your
network team monitor your connections and ports to ensure traffic to your network is
valid.
Enterprise architecture (EA) creates a blueprint for how and when you want to grow
your business. It analyzes the fastest way to get to your business goals by planning
and analyzing trends in existing data. This architecture type is used to improve
profitability, move a business online, or open new branches of product development.
The key to enterprise architecture is to see where your business is headed, so you can
plan for the future and stay in front of any trends. Planning ahead allows you to
implement security for new features before they happen and be a leader for emerging
cyber threats.
Make sure that employees have proper training across your company to handle
sensitive information. For example, give them security training on the common
causes of a data breach, phishing, social engineering, bating, scamware, and
pretexting.
Use secure passwords and two-factor authentication to access sensitive data. Larger
companies can implement a key card system to access company grounds and establish
a VPN or internal network that is not accessible directly from the Internet.
5
Secure internal email gateways to prevent fraudulent and phishing emails to
unsuspecting employees. Be sure to monitor your network for threats or suspicious
activity.
Once these steps are in place, perform routine access audits to ensure those security
measures are working.
Each part of your scope of security and access points should be tested for
vulnerabilities. If a compromise is found, it needs to be rectified. These tests should
encompass all hardware and software elements of your data and data transfers.
Granted, data transfer will occur as you run your business. The key is to make sure
you limit how data is transferred and make sure when you do move data, it is as
securely as possible.
Run audits on your access to make sure only those qualified to make changes to
programs or devices are allowed access to sensitive data. If it is not necessary for
them to have administrative access, limit their use.
Backup Plan
No matter what you do, technology is always changing and improving. Even the most
up-to-date networks can suffer a data leak. A remediation plan for data backup and
disaster recovery will help any enterprise-level business to consolidate and mitigate
losses in the event of a data leak.
When you have a plan and a protocol in place before a breach in data, it will allow
you and your team the ability to deal with it as quickly as possible. Once the cause is
found, you and your team can be ready to patch and rectify the issue.
6
As technology improves, the need for enterprise cybersecurity to protect your digital
assets from cyber threats becomes an even more imperative part of your business.
Liquid Web takes security very seriously and is dedicated to helping customers
achieve their enterprise cybersecurity goals.
Where enterprise corporations were previously most concerned with protecting their
proprietary code or trade secrets from competitors and counterfeiters, they are now
faced with new data privacy laws in the US and EU that can impose major financial
penalties on organizations that misuse or lose consumer data. The transition to
reliance on cloud infrastructure for business process support introduces new
challenges to corporate security in IT.
Enterprise security is focused on data center, networking, and web server operations
in practice, but technically begins with human resources. Social engineering is the
root cause of as many as two-thirds of all successful hacking attacks according to
some security researchers. In social engineering attacks, weaknesses in human nature,
employee integrity, or personal gullibility are exploited by attackers to gain access to
a network or data resources. Phishing attacks via email encourage employees to click
on links that download and install malware.
Automated hacking attacks are script-driven and target data center resources such as
web servers and online applications on a continual basis through input entry points
such as login screens, contact forms, search-to-database queries, and backend
administration processes. Common examples of script bot attacks are MySQL
injection hacks and cross-site scripting exploits.
7
The ability to send code to a server through unsecured forms can lead to the loss of an
entire database including all of the table information, passwords, and sensitive
customer financial data.
Code injection hacks are different from password cracking which can lead to full
administration access by a hacker or the ability to establish backdoors to a server
through FTP and the command line. Successful hackers typically spend 30 to 90 days
in reconnaissance of a compromised network system with internal access before
beginning the process of transferring database information or installing malicious
remote code.
The threat includes unauthorized agents using packet sniffing software installed on
the telecom network, the ISP, or local WIFI channels.
Although the value of information sent over these connections may vary, no
enterprise company or other complex organization would be willing to have their
trade secrets, client communication, and internal discussions monitored by third-
parties with malicious intent on open channels.
The ability to access unencrypted passwords and login information can compromise
not only individual accounts and data, but also an entire corporate network if an
intruder gains data center access.
8
State-sponsored hacking may target military-industrial secrets related to engineering
in weapons programs, aeronautics, or advanced research in other sensitive industries.
State-sponsored hacking can also target media companies, such as Sony’s film studio
hack by North Korea, on the basis of propaganda activities or seek to compromise the
corrupt behavior of public officials through personal communication leaks.
The Stuxnet virus is just one example of the effects of industrial espionage and
intelligence agency hacking.
The hacking attacks that target personal consumer information can lead to identity
theft, fraudulent charges, or financial embezzlement that is difficult for authorities to
detect or stop without widespread interdiction from law enforcement groups or
international agencies.
The network firewall is considered to be the main barricade against malicious hacking
attacks. Most network firewall software packages now include the ability to scan
packet data in real-time to search for potential viruses, malware, worms, and
ransomware.
The problem with anti-virus scanning is that it is an ex post facto approach to security
that relies on professional agencies to identify malware before it can be detected. In
“zero-day” attacks, exploit code that has never been revealed or categorized by
security experts is used to penetrate a network, software platform, firmware device, or
operating system. Because zero-day attacks cannot be defended against in advance,
companies need to implement multi-tiered security policies that isolate and contain
threats effectively after they inevitably happen.
The use of encryption on data transfers and the establishment of firewall settings for
authorized user access are the two most fundamental aspects of enterprise security
9
after physical access constraints. Most platforms with user sign-on systems now
include lock-out procedures that cut off users after 5 or more incorrect password
logins to prevent cracking attacks.
Web Application Firewalls (WAFs) can be installed that add an extra layer of
protection to web forms to prevent cross-site scripting and MySQL injection attacks.
Anti-virus software from vendors like Symantec, McAfee, Trend Micro, Kaspersky,
Bitdefender, etc. are essential aspects of enterprise security today. Many enterprise
companies also employ the services of a CDN to recognize and prevent DDoS attacks
in production.
The current working paradigm of best practices in enterprise security is to apply all of
the available industry methods of physical security, firewalls, encryption, fraud
protection, intruder detection, WAF, anti-virus, etc. with the expectation that hackers
will still find methods to penetrate systems, compromise hardware, and steal data.
The DMZ model relates to firewalls, barricades, and moats by separating web
processes from a LAN through increased isolation strengthened by proxy edge servers
in the outer ring of defense. VMware vSAN Datastore is used for enterprise database
encryption, while VMcrypt Encryption is used for storage, archives, and backup files.
10
3.List out the popular examples of symmetric and asymmetric encryption algorithm
and describe them detail.
Algorithms
Cryptography
Cryptography Terms
Key: A secret like a password used to encrypt and decrypt information. There are a
few different types of keys used in cryptography.
11
Steganography: It is actually the science of hiding information from people who
would snoop on you. The difference between steganography and encryption is that the
would-be snoopers may not be able to tell there’s any hidden information in the first
place.
Asymmetric encryption takes relatively more time than the symmetric encryption.
Symmetric Encryption:
Both server and client should have same key for encryption
Asymmetric encryption:
RC4, A5/1, A5/2, FISH, Helix, ISAAC etc are a few symmetric stream ciphers that
are commonly used in many software. And, block ciphers are used in Data Encryption
Standard or DES, RC5, Advanced Encryption Standard or AES, Blowfish etc.
12
What is firewall in network security?
The firewall monitors and controls incoming and outgoing network traffic, and based
on specific security rules decides whether certain traffic should be allowed or
blocked. Almost 25 years ago, firewalls were introduced as the first line of defense in
network security.
Firewalls are barriers that hold back traffic going both ways. By installing a firewall, a
local system or network of computers can be protected from network-based threats
while providing easy access to the Internet and wide-area networks outside the
system.
It is a security tool that protects networks by filtering network traffic. Network nodes
can be separated from external traffic sources, internal traffic sources, or even specific
applications using firewall.
Network security devices such as firewalls, which monitor incoming and outgoing
traffic and allow or block data packets in accordance with policies, are designed to
help ensure network security.
The firewall is a tool that helps manage the network traffic on your computer and
protect your data. Incoming network traffic that is unsolicited and unwanted is
blocked by this mechanism. By assessing inbound traffic, a firewall prevents your
computer from being infected with malware or hacked.
• There are FIVE major processing –mode categories of firewalls: Packet filtering
13
Hybrids.(Hybrid firewalls use a combination of other three methods, and in
generation, with the later generations being more complex and more recently
developed.
appliance-based devices.
1.Packet Filtering
2.Application Gateways
3.Circuit Gateways
What is cryptography?
14
verification to protect data privacy, web browsing on the internet and confidential
communications such as credit card transactions and email.
Cryptography techniques
.Integrity. The information cannot be altered in storage or transit between sender and
intended receiver without the alteration being detected.
.Authentication. The sender and receiver can confirm each other's identity and the
origin/destination of the information.
Procedures and protocols that meet some or all of the above criteria are known as
cryptosystems. Cryptosystems are often thought to refer only to mathematical
procedures and computer programs; however, they also include the regulation of
human behavior, such as choosing hard-to-guess passwords, logging off unused
systems and not discussing sensitive procedures with outsiders.
15
Cryptosystems use a set of procedures known as cryptographic algorithms, or ciphers,
to encrypt and decrypt messages to secure communications among computer systems,
devices and applications.
Types of cryptography
16
Securing Web Services
Because of its nature (loosely coupled connections) and its use of open access (mainly
HTTP), SOA implemented by Web services adds a new set of requirements to the
security landscape. Web services security includes several aspects:
Authentication—Verifying that the user is who she claims to be. A user's identity is
verified based on the credentials presented by that user, such as:
Web services security requirements are supported by industry standards both at the
transport level (Secure Socket Layer) and at the application level relying on XML
frameworks.
17
Oracle has been instrumental in contributing to emerging standards, in particular the
specifications hosted by the OASIS Web Services Secure Exchange technical
committee.
Transport-level Security
Secure Socket Layer (SSL), otherwise known as Transport Layer Security (TLS), the
Internet Engineering Task Force (IETF) officially standardized version of SSL, is the
most widely used transport-level data-communication protocol providing:
Application-level Security
Data integrity and authenticity are implemented by XML Signature. XML Signature
binds the sender's identity (or "signing entity") to an XML document. Signing and
signature verification can be done using asymmetric or symmetric keys.
Signature ensures non-repudiation of the signing entity and proves that messages have
not been altered since they were signed. Message structure and message security are
implemented by SOAP and its security extension, WS-Security. WS-Security defines
how to attach XML Signature and XML Encryption headers to SOAP messages. In
addition, WS-Security provides profiles for 5 security tokens: Username (with
password digest), X.509 certificate, Kerberos ticket, Security Assertion Markup
Language (SAML) assertion, and REL (rights markup) document.
18
XML Signature : A W3C recommendation. Provides syntax and processing rules for
signing an XML document. Different parts of a document can be signed to ensure
integrity and to provide authentication.
PKI increases trust on the internet because it provides a system and infrastructure to
secure data, user and device identities and ensure the integrity of the data has
remained intact and is authentic. With PKI, you can issue digital certificates that
authenticate the identity of users, devices, or services. These certificates work for both
public web pages and private internal services (e.g., to authenticate devices
connecting with your VPN, Wiki, Wi-Fi, etc.)
Wireless public key infrastructure (WPKI) is a technology that provides public key
infrastructure functionality using a mobile secure Elements such as a SIM card .it can
be used for example for two-factor authentication.
PKI provides "trust services" - in plain terms trusting the actions or outputs of entities,
be they people or computers. Trust service objectives respect one or more of the
following capabilities: Confidentiality, Integrity and Authenticity (CIA).
19
Integrity: Assurance that if an entity changed (tampered) with transmitted data in the
slightest way, it would be obvious it happened as its integrity would have been
compromised. Often it is not of utmost importance to prevent the integrity being
compromised (tamper proof), however, it is of utmost importance that if integrity is
compromised there is clear evidence of it having done so (tamper evident).
Authenticity: Assurance that you have certainty of what you are connecting to, or
evidencing your legitimacy when connecting to a protected service. The former is
termed server-side authentication - typically used when authenticating to a web server
using a password. The latter is termed client-side authentication - sometimes used
when authenticating using a smart card (hosting a digital certificate and private key).
A public key infrastructure (PKI) is a system for the creation, storage, and distribution
of digital certificates which are used to verify that a particular public key belongs to a
certain entity. The PKI creates digital certificates which map public keys to entities,
securely stores these certificates in a central repository and revokes them if needed
A certificate authority (CA) that stores, issues and signs the digital certificates;
A registration authority (RA) which verifies the identity of entities requesting their
digital certificates to be stored at the CA; A central directory—i.e., a secure location
in which keys are stored and indexed;
A certificate policy stating the PKI's requirements concerning its procedures. Its
purpose is to allow outsiders to analyze the PKI's trustworthiness. The term trusted
third party (TTP) may also be used for certificate authority (CA). Moreover, PKI is
itself often used as a synonym for a CA implementation.
Certificate revocation
20
Authorities in the WebPKI provide revocation services to allow invalidation of
previously issued certificates.
21
Other countermeasures include the following:
conventional firewalls
antivirus programs
Finding and fixing vulnerabilities reduces security risks and doing so helps reduce an
organization's overall attack surface.
Software vulnerabilities are common. While not all of them are serious, even
noncritical vulnerabilities can be combined for use in attack chains. Reducing the
number of security vulnerabilities and weaknesses helps reduce the overall impact of
attacks.
As enterprises move more of their data, code and operations into the cloud, attacks
against those assets can increase. Application security measures can help reduce the
impact of such attacks.Neglecting application security can expose an organization to
potentially existential threats.
22
of the threats. Threat modeling is one of the first steps in application security and
usually includes the following five steps:
identifying what each application does or will do with respect to these assets;
In this context, a threat is any potential or actual adverse event that can compromise
the assets of an enterprise. These include both malicious events, such as a denial-of-
service attack, and unplanned events, such as the failure of a storage device.
The OWASP list focuses on web application software. The CWE list focuses on
specific issues that can occur in any software context. Its goal is to provide developers
with usable guidance on how to secure their code.
The top 10 items on the CWE list and their CWE scores are the following:
Application weaknesses can be mitigated or eliminated and are under control of the
organization that owns the application. Threats, on the other hand, are generally
external to the applications. Some threats, like physical damage to a data center due to
adverse weather or an earthquake, are not explicitly malicious acts. However, most
cybersecurity threats are the result of malicious actors' actions taken.
23
Software injection attacks exploit vulnerabilities in application code that enable
attackers to insert code into the application through ordinary user input.
Cross-site scripting attacks exploit vulnerabilities in the way web applications handle
cookies to steal or forge cookies so that the attacker can impersonate authorized users.
Buffer overflow attacks exploit vulnerabilities in the way applications store working
data in system buffers. Secure development best practices minimize these attacks.
These include using data validation and programming languages that safely manage
memory allocations, keeping software updated with the latest patches and relying on
the principal of least privilege.
The objective of application security is to defeat attacks, while attack vectors give
attackers the means of breaching application security.
.Security professionals use different tactics and strategies for application security,
depending on the application being developed and used. Application security
measures and countermeasures can be characterized functionally, by how they are
used, or tactically, by how they work.
.Application security testing controls help keep weaknesses and vulnerabilities out of
the application as it is being developed.
24
.Authorization controls are used to ensure that users or programs that have been
authenticated are actually authorized to access application resources. Authorization
and authentication controls are closely related and often implemented with the same
tools.
.Encryption controls are used to encrypt and decrypt data that needs to be protected.
Encryption controls can be implemented at different layers for networked
applications. For example, an application can implement encryption within the
application itself by encrypting all user input and output. Alternately, an application
can rely on encryption controls such as those provided by network layer protocols,
like IP Security or IPsec, which encrypt data being transmitted to and from the
application.
.Logging controls are used to track application activities. They are indispensable for
maintaining accountability. Without logging, it can be difficult or impossible to
identify what resources an attack has exposed. Comprehensive application logs are
also an important control for testing application performance.
Another way to classify application security controls is how they protect against
attacks.
.Preventative controls are used to keep attacks from happening. Their objective is to
protect against vulnerabilities. For example, access control and encryption are often
used to prevent unauthorized users from accessing sensitive information;
comprehensive application security testing is another preventive control that is
applied in the software development lifecycle.
Corrective controls reduce the effect of attacks or other incidents. For example,
using virtual machines, terminating malicious or vulnerable programs, or patching
software to eliminate vulnerabilities are all corrective controls.
25
The process of securing an application is ongoing, from the earliest stages of
application design to ongoing monitoring and testing of deployed applications.
Security teams use a broad range of tools and testing practices.
Tools and techniques used for application security are almost as numerous and diverse
as those used for application development.
Most of these tools and techniques fall into one of the following four categories:
.Secure development platforms help developers avoid security issues by imposing and
enforcing standards and best practices for secure development.
.Code scanning tools enable developers to review new and existing code for potential
vulnerabilities or other exposures.
Application testing tools automate the testing of finished code. Application testing
tools can be used during the development process, or they can be applied to existing
code to identify potential issues. Application testing tools can be used for static,
dynamic, mobile or interactive testing.
Application shielding tools are used to protect applications that are in release. Some
examples include the following:
.code obfuscation tools to make source code hard or impossible to decipher and
reverse engineer; and
Of course, application security exists within the context of OSes, networks and other
related infrastructure components that must also be secured. To be fully secure, an
application should be protected from all types of attack.
26
Best practices for application security
Best practices for application security fall into several general categories.
.What must be protected? Experts recommend security professionals map out all of
the systems, software and other computing resources -- in the cloud and on premises
-- that must a part of the application.
.What is the worst that can happen? Experts recommend understanding and
quantifying what is at stake if the worst does happen. This enables organizations to
allocate resources appropriately for avoiding risk.
.What could happen? How could a successful attack be carried out? Threats are the
things that could negatively affect the application, the organization deploying the
application or the application users.
Specific tips for application security best practices focus on identifying general
weaknesses and vulnerabilities and addressing them. Other best practices depend on
applying specific practices like adopting a security framework or implementing
secure software development practices appropriate for the application type.
While the concepts of application security are well understood, they are still not
always well implemented. Security experts have had to adjust as the computing
changed. For example, as the industry shifted from time-shared mainframes to
networked personal computers, application security professionals had to change how
they identified and addressed the most urgent vulnerabilities.
27