Unit-3,4,5 Cyber Sec
Unit-3,4,5 Cyber Sec
1.Physical Layer
2.Data Link Layer
3.Network Layer
4.Transport Layer
5.Session Layer
6.Presentation Layer
7.Application Layer
For example, in Layer 4, the PDU of the Transport Layer is referred to as
a segment based on TCP (Transmission Control Protocol) and with UDP (User
Datagram Protocol) PDU is referred to as a datagram.
Layer Layer
Description
No. Name
Layer Physical In this layer, PDU is bits (1s or 0s) for the transmission of data
1 Layer on the network.
Layer Presentatio
In this layer, PDU is data.
6 n Layer
Layer Application In this layer, PDU contains original data made from a network
7 Layer application.
Security Policies
Security policies are a formal set of rules which is issued by an organization to ensure that the
user who are authorized to access company technology and information assets comply with
rules and guidelines related to the security of information. It is a written document in the
organization which is responsible for how to protect the organizations from threats and how to
handles them when they will occur. A security policy also considered to be a "living document"
which means that the document is never finished, but it is continuously updated as
requirements of the technology and employee changes.
Need of Security policies-
1) It increases efficiency.
The best thing about having a policy is being able to increase the level of consistency which
saves time, money and resources. The policy should inform the employees about their
individual duties, and telling them what they can do and what they cannot do with the
organization sensitive information.
2) It upholds discipline and accountability
When any human mistake will occur, and system security is compromised, then the security
policy of the organization will back up any disciplinary action and also supporting a case in a
court of law. The organization policies act as a contract which proves that an organization has
taken steps to protect its intellectual property, as well as its customers and clients.
3) It can make or break a business deal
It is not necessary for companies to provide a copy of their information security policy to other
vendors during a business deal that involves the transference of their sensitive information. It
is true in a case of bigger businesses which ensures their own security interests are protected
when dealing with smaller businesses which have less high-end security systems in place.
4) It helps to educate employees on security literacy
A well-written security policy can also be seen as an educational document which informs the
readers about their importance of responsibility in protecting the organization sensitive data. It
involves on choosing the right passwords, to providing guidelines for file transfers and data
storage which increases employee's overall awareness of security and how it can be
strengthened.
We use security policies to manage our network security. Most types of security policies are
automatically created during the installation. We can also customize policies to suit our
specific environment. There are some important cybersecurity policies recommendations
describe below-
1. Virus and Spyware Protection policy
This policy provides the following protection:
It helps to detect, removes, and repairs the side effects of viruses and security risks
by using signatures.
It helps to detect the threats in the files which the users try to download by using
reputation data from Download Insight.
It helps to detect the applications that exhibit suspicious behaviour by using SONAR
heuristics and reputation data.
2. Firewall Policy
This policy provides the following protection:
It blocks the unauthorized users from accessing the systems and networks that
connect to the Internet.
It detects the attacks by cybercriminals.
It removes the unwanted sources of network traffic.
3. Intrusion Prevention policy
This policy automatically detects and blocks the network attacks and browser attacks. It also
protects applications from vulnerabilities. It checks the contents of one or more data packages
and detects malware which is coming through legal ways.
4. LiveUpdate policy
This policy can be categorized into two types one is LiveUpdate Content policy, and another
is LiveUpdate Setting Policy. The LiveUpdate policy contains the setting which determines
when and how client computers download the content updates from LiveUpdate. We can
define the computer that clients contact to check for updates and schedule when and how
often clients computer check for updates.
5. Application and Device Control
This policy protects a system's resources from applications and manages the peripheral
devices that can attach to a system. The device control policy applies to both Windows and
Mac computers whereas application control policy can be applied only to Windows clients.
6. Exceptions policy
This policy provides the ability to exclude applications and processes from detection by the
virus and spyware scans.
7. Host Integrity policy
This policy provides the ability to define, enforce, and restore the security of client computers
to keep enterprise networks and data secure. We use this policy to ensure that the client's
computers who access our network are protected and compliant with companies? securities
policies. This policy requires that the client system must have installed antivirus.
Unit -4
The administrator can take access to a router or a device through a console but it is very
inconvenient if he is sitting far from the place of that device. So, eventually, he has to take
remote access to that device.
But as remote access will be available by using an IP address, therefore, it is possible that an
unauthorized user can take access using that same IP address therefore for security
measures, we have to put authentication. Also, the packets exchanged between the device
should be encrypted so that any other person should not be able to capture that sensitive
information. Therefore, a framework called AAA is used to provide that extra level of security.
1.Authentication –
The process by which it can be identified that the user, which wants to access the
network resources, valid or not by asking some credentials such as username and
password. Common methods are to put authentication on console port, AUX port, or
vty lines.
As network administrators, we can control how a user is authenticated if someone wants to
access the network. Some of these methods include using the local database of that device
(router) or sending authentication requests to an external server like the ACS server. To
specify the method to be used for authentication, a default or customized authentication
method list is used.
2.Authorization –
It provides capabilities to enforce policies on network resources after the user has
gained access to the network resources through authentication. After the
authentication is successful, authorization can be used to determine what resources is
the user allowed to access and the operations that can be performed.
For example, if a junior network engineer (who should not access all the resources) wants to
access the device then the administrator can create a view that will allow particular
commands only to be executed by the user (the commands that are allowed in the method
list). The administrator can use the authorization method list to specify how the user is
authorized to network resources i.e through a local database or ACS server.
3.Accounting –
It provides means of monitoring and capturing the events done by the user while
accessing the network resources. It even monitors how long the user has access to
the network. The administrator can create an accounting method list to specify what
should be accounted for and to whom the accounting records should be sent.
AAA implementation: AAA can be implemented by using the local database of the
device or by using an external ACS server.
local database – If we want to use the local running configuration of the router or
switch to implement AAA, we should create users first for authentication and provide
privilege levels to users for Authorization.
ACS server – This is the common method used. An external ACS server is used (can
be ACS device or software installed on Vmware) for AAA on which configuration on
both router and ACS is required. The configuration includes creating a user, separate
customized method list for authentication, Authorization, and Accounting.
The client or Network Access Server (NAS) sends authentication requests to the ACS server
and the server takes the decision to allow the user to access the network resource or not
according to the credentials provided by the user.
Unit – 5
Vulnerabilities in Endpoints and the Damage They Cause
Vulnerabilities are like holes in a fence — malware exploits them and uses these “holes” to
enter the organization unnoticed. Once inside, they can access an organization’s resources
and move laterally through the network to expand their reach.
The Need for Vulnerability Assessments
All companies have vulnerabilities in their IT environments. Companies use a wide array of
software solutions, and these programs can have bugs that might be exploited by an attacker.
Every time an organization adds a new system or updates its software, there is the potential
that new vulnerabilities will be introduced into its systems.
A vulnerability assessment gives an organization the opportunity to find these vulnerabilities
before an attacker does. By performing regular assessments and acting on the results, an
organization can dramatically reduce its cyber threat exposure by closing the security gaps
that an attacker is most likely to exploit or that pose the greatest threat to the business.
Challenges in Vulnerability Assessment
With a vulnerability assessment, the greatest challenge is ensuring that the
vulnerability assessment meets an organization’s needs. For example,
a vulnerability scan will likely find more issues than an organization can fix, and
prioritization is essential to addressing the most critical threats first. The
vulnerability assessment process should be carefully designed and implemented to
ensure that it meets the needs of an organization’s risk management program.
Types of Vulnerability Assessments
Vulnerability assessment is a general term for the practice of searching for vulnerabilities in
computer systems. Since an organization may have a diverse set of solutions, there are a few
different types of vulnerability assessments focused on different areas, including:
Host Assessment: A host assessment will look for vulnerabilities in the company’s endpoints
with a focus on crucial systems.
Network Assessment: A network assessment ensures that corporate networks have secure
policies and security controls in place to prevent unauthorized access to the company’s
networks and the systems connected to them.
Database Assessment: A database assessment inspects a company’s databases
for security misconfigurations, unauthorized databases, misclassified data, and
similar data security threats.
Application Assessment: An application assessment tests an organization’s web
applications and other software for potentially exploitable vulnerabilities such
as SQL injection, buffer overflows, and other common threats.
Vulnerability Assessment Process
Vulnerability assessments are typically considered a four-step process that includes the
following:
1. Identification: The first step of the vulnerability assessment process is identifying the
potential vulnerabilities in an organization’s systems. This typically involves running a
vulnerability scanner, which will produce a list of potential vulnerabilities.
2. Analysis: In this step, the list of provided vulnerabilities will be further analyzed, either
manually or automatically. For example, this analysis might determine if a result is a true
threat or false positive or look for a root cause of each vulnerability.
3. Prioritization: Most organizations lack the resources to fix every vulnerability, and the ROI of
doing so may be low for low-risk vulnerabilities. To maximize the benefit and effectiveness of
remediation efforts, vulnerabilities should be prioritized based on their likelihood of
exploitation and potential impacts on the business.
4. Remediation: After developing a prioritized list, the organization can work on fixing these
issues in order. This may involve applying patches or mitigating issues and should include
testing to verify that a fix worked.
Vulnerability Assessments vs. Penetration Tests
Vulnerability assessments and penetration tests are both designed to identify
vulnerabilities in an organization’s systems. However, they work in very different
ways. Some of the key differences include:
Automated vs. Human-Driven: Vulnerability assessments typically use automated tools to
search for vulnerabilities. Penetration tests are human-driven exercises.
Broad vs. Deep: Vulnerability scans typically try to identify all vulnerabilities in operating
systems, applications, etc. . Penetration testers drill deeper trying to achieve a particular goal
and may miss some vulnerabilities.
Vulnerability Exploitation: Vulnerability assessments typically do not involve the exploitation
of discovered vulnerabilities, which can result in false positive detections. Penetration testers
may exploit vulnerabilities that they find while exploring an organization’s systems and trying
to achieve a particular objective.
In the end, vulnerability assessments and penetration tests are complementary tools, and
penetration testers will often begin their assessment with a vulnerability scan.
What are Network Profiling Tools?
Network profiling tools are software programs that analyze and monitor your network traffic.
They collect data on the devices connected to your network, the traffic that passes through
your network, and the performance of your network. This data is then used to create a profile
of your network, which can be used to identify potential problems and optimize performance.
How Do Network Profiling Tools Work?
Network profiling tools work by capturing and analyzing network traffic. They use a variety of
techniques to collect data, including packet capture, flow analysis, and SNMP polling. Once
the data is collected, it is analyzed using algorithms that identify patterns and anomalies in the
traffic.
The output of the analysis is then presented in a variety of ways, including graphs, charts, and
reports. This information can be used to identify network performance bottlenecks, security
threats, and other issues that may be impacting your network.
Why Do You Need Network Profiling Tools?
There are several reasons why you need network profiling tools. First, they can help you
identify potential problems before they cause downtime or lost productivity. By monitoring
your network traffic, you can identify performance bottlenecks, security threats, and other
issues that may be impacting your network.
Second, network profiling tools can help you optimize your network performance. By
analyzing your network traffic, you can identify areas where you can improve performance,
such as by upgrading equipment or adjusting network settings.
Finally, network profiling tools can help you ensure compliance with regulations and
standards. By monitoring your network traffic, you can identify potential security threats and
ensure that your network is in compliance with industry standards and regulations.
Popular Network Profiling Tools
There are many different network profiling tools available on the market today. Here are a few
examples of popular tools and how they can help you manage your network:
Wireshark
Wireshark is a popular packet capture tool that allows you to capture and analyze network
traffic. It is open-source and available for free, making it a popular choice for network
administrators. Wireshark can be used to identify network performance issues, security
threats, and other issues that may be impacting your network.
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor is a comprehensive network monitoring tool that
allows you to monitor your network traffic, identify potential issues, and optimize performance.
It includes features such as packet capture, flow analysis, and SNMP polling, which allow you
to collect data on your network traffic and analyze it in real-time.
PRTG Network Monitor
PRTG Network Monitor is a powerful network monitoring tool that allows you to monitor your
network traffic, identify potential issues, and optimize performance. It includes features such
as packet capture, flow analysis, and SNMP polling, which allow you to collect data on your
network traffic and analyze it in real-time. PRTG also includes a variety of alerting and
reporting features, which allow you to stay on top of potential issues and optimize your
network performance.
What is Common Vulnerability Scoring System (CVSS)
CVSS stands for the Common Vulnerability Scoring System. It's a way to evaluate and rank
reported vulnerabilities in a standardized and repeatable way. The goal of CVSS is to help
you compare vulnerabilities in different applications – and from different vendors - in a
standardized, repeatable, vendor agnostic approach.
CVSS generates a score from 0 to 10 based on the severity of the vulnerability. A score of 0
means the vulnerability is less significant than the highest vulnerability with a score of 10, if
you're only using CVSS. By using CVSS to prioritize vulnerabilities, you can focus on the
most critical ones first and reduce the overall risk to your organization.
CVSS values have been grouped as well into the rankings that you may have seen, of
Critical, High, Medium, and Low.For CVSS v3, they are as follows:
CVSS Base CVSS Severity
Score Level
0 None
The above is what is defined within the CVSS documentation, which can be found
on the FIRST website.
What is all taken into account to generate the CVSS score?
That is a great question, and it is a slightly more complex question to answer than what is
CVSS. The CVSS score combines a lot of factors to be able to generate a score. Those
factors are:
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
That’s a lot of things that go into the mix. Now let’s dig a little deeper into each of these.
Attack Vector
The attack vector has 4 different values that can be assigned to it:
Network,
Adjacent,
Local, or
Physical.
Think of these as how the attacker can access the system in system in question.
Ranging from anywhere to I need to physically connect something to the system. A
network value here will generate the highest CVSS value.
Attack Complexity
Attack Complexity comes down to how hard it is to exploit the vulnerability.Two possible
values exist for this, which are:
Low or
High.
The low attack complexity will generate the highest score.
Privileges Required
This outlines what privileges the attacker needs to have BEFORE exploiting the vulnerability.
Possible values are:
None,
Low, or
High.
None is no access to any settings or files on the system.Low is basic user capabilities.High is
administrative level privileges are needed.
User Interaction
This defines how a user needs to be engaged somehow to successfully exploit the
vulnerability. The options here are:
None or
Required.
When no user is required the impact on the CVSS score is highest.
Scope
This is a slightly harder sub-component to understand. Here it is trying to measure if the
vulnerability can impact items that are outside of the security authority of the affected
component. A security authority is something that controls access to objects under its control.
Examples of a security authority could be an application (controls how things work inside the
application), an operating system (controls how things work within the environment). Values
here are:
Unchanged or
Changed,
A scope change haS the largest impact.
Confidentiality
Confidentiality is the potential for unauthorized access to sensitive information. The possible
values are:
High,
Low, or
None.
The greatest impact comes from the High value, or total confidentially being lost.
Integrity
This component measures the potential for unauthorized modification, a data breach or
deletion of data. Potential values are:
High,
Low, or
None.
High is the most severe.
Availability
Availability attempts to measure the potential for denial of access to authorized users. This
could be the denial access to a service or processor cycles. Potential values for Availability
are:
High,
Low, or
None.
What is an ISMS?
An information security management system (ISMS) is a framework of policies and
procedures for systematically managing an organization’s sensitive data.
It includes the processes, people, technology, and procedures that are designed to protect
against unauthorized access, use, disclosure, disruption, modification, or destruction of
information.
Implementing an ISMS
There are numerous ways of approaching the implementation of an ISMS. The
most common method to follow is a ‘Plan Do Check Act’ process.
ISO 27001 is the international security standard that details the requirements of
an ISMS.
ISO 27001, along with the best-practice guidelines contained in ISO 27002, serve
as two excellent guides to get you started with implementing an ISMS.
An ISMS that is certified and audited can provide customers with the assurance that the
organization has taken steps to protect its information assets from risks that have been
identified.
The strength of an ISMS is based on the robustness of the information security risk
assessment, which is key to any implementation.
Recognizing the risks that the organization and its data may face in the future is necessary to
implement the mitigating measures (controls).
ISO 27001 provides a recommended list of controls that can help assess whether the
necessary controls have been considered for legislative, business, contractual, or regulatory
purposes.
What is the Cyber Kill Chain in Cybersecurity?
Derived from a military model by Lockheed Martin in 2011, the cyber kill chain is a step-by-
step approach to understanding a cyberattack with the goal of identifying and stopping
malicious activity.
Also called the cyber attack lifecycle, the cyber kill chain can help organizations gain a deeper
understanding of the events leading up to a cyberattack and the points at which they can
prevent, detect, or intercept attackers in the future.
Although the original cyber kill chain model contained only seven steps, cybersecurity experts
expanded the kill chain to include eight phases: reconnaissance, weaponization, delivery,
exploitation, installation, command and control, actions on objective, and monetization.
Most of the time, organizations use the cyber kill chain to defend against the most
sophisticated cyberattacks, including ransomware, security breaches, and advanced
persistent threats (APTs).
How the Cyber Kill Chain Works
The term “cyber kill chain” was adapted from the military and describes the structure of an
attack (either offensive or defensive) broken into a pattern of identifiable stages, including
identifying a target, dispatch, decision, order, and destruction of the target.
In cybersecurity, the cyber kill chain is a model outlining the various phases of common
cyberattacks. Using the cyber kill chain, organizations can trace the stages of a cyberattack to
better anticipate and prevent against cyber threats in the future.
Each stage of the cyber kill chain is related to a specific type of activity in a cyberattack
(regardless of whether it’s an internal or external attack).
How Does the Cyber Kill Chain Protect Against Attacks?
The cyber kill chain is not a security system: it’s a framework that enables security teams to
anticipate how attackers will act so they can stop them as quickly as possible or intercept
them if the attack has already transpired.
The cyber kill chain maps out the exact path a typical attacker will take so cybersecurity
teams can recognize the starting point of common cyberattacks. Cyber kill chain simulations
allow security teams to gain firsthand experience in dealing with a cyber threat, and
evaluating simulation responses can help organizations identify and remediate any security
gaps that may exist.
It can guide strategy, training, and tool selection by revealing which parts of a security
strategy may or may not need updating, such as employee training, endpoint security
software, or VPNs.
Cyber Kill Chain Steps
Computer scientists at Lockheed Martin may have been the first to take this concept and
apply it to information security, but the cyber kill chain continues to evolve with the changing
nature of cyber threats.
At the core of the cyber kill chain is the notion that cyberattacks often occur in phases and
they can be disrupted through controls established at each phase.
1. Reconnaissance
During what some call the observation phase, the reconnaissance phase is when attackers
begin to identify targets and make a plan of action. This stage often includes activities such as
researching potential targets, determining vulnerabilities, and exploring potential entry points.
The more information an attacker can glean during this phase, the more sophisticated and
successful the attack can be.
1. Weaponization
At this stage, attackers create the attack vector that will be used in the cyberattack. This could
include remote access malware, ransomware, or a virus or worm that can exploit a
vulnerability identified during the reconnaissance phase.
During the weaponization phase, attackers may also try to reduce the likelihood of being
detected by any security solutions in place.
1. Delivery
Attackers then deliver the attack vector through a medium like phishing emails or by hacking
into the target’s system or network. Regardless of the type of attack they intend to carry out,
this is the stage at which the attacker officially launches an attack against a target.
1. Exploitation
Next, the malicious code is executed within the target’s systems. By breaching the perimeter,
attackers now have the opportunity to further exploit the target’s systems by installing tools,
running scripts, or modifying security certificates. Common examples of exploitation attacks
include scripting, dynamic data exchange, and local job scheduling.
1. Installation
Immediately following the exploitation phase, the installation phase is when the attack vector
is installed on the target’s systems. During the installation stage, attackers may also create
back doors into the target’s systems or networks so they can continue to access them even if
the original point of entry is identified and closed.
1. Command and Control
During the command and control phase, attackers use the successfully installed attack vector
to control devices or identities remotely within the target’s network. Threat actors may
also move laterally during the command and control phase in order to avoid detection and
establish additional points of entry.
1. Actions on Objective
In the final phase of Lockheed Martin’s cyber kill chain, attackers take the final steps to carry
out their original objective, be it data theft, destruction, encryption or exfiltration.
The above steps are taken directly from Lockheed Martin’s cyber kill chain, which was
originally developed in 2011. Since then, cybersecurity experts have expanded on the seven
phases to include an eighth: monetization.
1. Monetization
During the monetization phase, attackers focus on deriving income from the successful
attack, whether through some form of ransom or selling sensitive information on the dark web.
Since its inception, the cyber kill chain has evolved to better anticipate and understand
modern cyber threats. It has also been adopted by data security organizations and
professionals to help define the stages of an attack.
However, because of the constantly evolving nature of cyber threats, the future of the cyber
kill chain is unknown. As extended detection and response (XDR) becomes increasingly
important for modern cybersecurity strategy, a new XDR framework or kill chain that
leverages MITRE ATT&CK framework could be more beneficial to security teams.
Critiques of the Cyber Kill Chain
Current critiques can be bucketed into two main categories: perimeter security and attack
vulnerabilities.
Perimeter Security
One of the biggest critiques of Lockheed’s Cyber Kill Chain model is the fact that the first two
phases of an attack (reconnaissance and weaponization) often occur outside the target
network. This can make it difficult for organizations to understand or defend against any
actions occurring during these phases.
Attack Vulnerabilities
Some critics believe that the methodology also reinforces traditional perimeter-based and
malware-prevention-based defensive strategies, which aren’t enough in today’s cybersecurity
climate.
Additionally, some critics believe the traditional cyber kill chain isn’t a suitable model for
simulating insider threats. This potentially puts organizations at greater risk given the
likelihood of successful attacks that breach a target’s internal network perimeter.
Although many have adopted the cyber kill chain, acceptance is far from universal and there
are many critics that are quick to point to what they believe are fundamental flaws.
Fortunately, there are a number of other cybersecurity frameworks that may satisfy some of
the cyber kill chain’s shortcomings.
What is Diamond Model of Intrusion Analysis?
The Diamond Model of Intrusion Analysis is a model to describe cyber attacks. It contains 4
parts - adversary, infrastructure, capability, and target. It gives analysts a comprehensive view
of cyber attacks.
Adversary: Where are attackers from? Who are the attackers? Who is the sponsor?
Why attack? What is the activity timeline and planning?
Infrastructure: Infected computer(s), C2 domain names, location of C2 servers, C2
server types, mechanism and structure of C2, data management & control, and data
leakage paths
Capability: What skills do the attackers have to do reconnaissance, deliver their
attacks, attack exploits and vulnerabilities, deploy their remote-controlled malwares
and backdoors, and develop their tools?
Target: Who is their target country/region, industry sector, individual, or data?
Why Does It Matter?
For various cyber attacks, the diamond model of intrusion analysis can help enterprise
cybersecurity teams find system breaches and deal with them. By doing so, they can
successfully achieve cybersecurity defense goals.