Is2c CC Notes
Is2c CC Notes
Confidentiality Concerns
- Snooping
- Involves gathering information that is left out in the open
- Clean desk policies protect against snooping
- Dumpster Diving
- Looking through trash for information
- Shredding protects against Dumpster Diving
- Eavesdropping
- Rules about sensitive conversations prevent eavesdropping
- Wiretapping
- Electronic Eavesdropping
- Encryption protects against wiretapping
- Social Engineering
- Attacker uses psychological tricks to persuade employee to give it or give access to information
- Education and Training protects against social engineering
Integrity Concerns
- Unauthorized Modification
- Attackers make changes without permission (can be internal=employees or external
- Follow the Rules of Least Privilege to prevent unauthorized modification
- Impersonation
- Attackers pretend to be someone else
- User education protects against Impersonation
- Man-in-the-Middle (MITM)
- Attackers place themselves in the middle of communication sessions
- Intercepts network traffic as users are logging in to their system and assumes their role.
- Impersonation on an electronic/digital level.
- Encryption prevents man-in-the-middle attacks
- Replay
- Attackers eavesdrop on logins and reuse the captured credentials
- Encryption prevents Replay attacks
Availability Concerns
- Denial of Service (DoS)
- When a malicious individual bombards a system with an overwhelming amount of traffic.
- The idea to is to send so many requests to a server that it is unable to answer any requests
from legitimate users
- Firewalls block unauthorized connections to protect against Denial of Service attacks
- Power Outages
- Having redundant power sources and back-up generators protect against power outages
- Hardware Failures
- Failure of servers, hard drives, network gear etc
- Redundant components protect against hardware failure
- Building systems that have a built-in redundancy, so that if one component fails, the other will
take over
- Destruction
- Backup data centers protect against destruction (ex=cloud)
- Service Outages
- Service outage may occur due to programming errors, failure of underlying equipment, and
many more reasons
- Building systems that are resilient in the fact of errors and hardware failures protect against
service outages
Password Security
Controls you can implement when setting password requirements:
- Password length requirements
- Password complexity requirements
- Password expiration requirements
- Force password changes
- Password history requirements
- Cannot use previously used passwords
Password Managers
- Secured password vaults often protected by biometric mechanisms (ex=fingerprints)
- Facilitates the use of strong, unique passwords
- Stores passwords
Multi Factor Authentication
3 types of authentication factors
Note: Passwords combined with security questions are NOT multi factor authentication
Passwords and security questions are both something you know
Non-repudiation
- Prevents someone from denying the truth
- Physical signatures can provide non-repudiation on contracts, receipts etc
- Digital signatures use encryption to provide non-repudiation
- Other methods can be biometric security controls, Video-surveillance etc
Privacy
Organization Privacy Concerns
Risk Management
Internal Risks
- Risks that arise from within the organization
- Internal control prevents internal risks
External Risks
Multiparty Risks
Risk Assessment
Identifies and triages risks
Threat
- Are external forces that jeopardize security
- Threat Vector
- Threat Vectors are methods used by attackers to get to their target (ex= social engineering,
hacker toolkit, etc)
- Vulnerabilities
- Are weaknesses in your security controls
- Examples : Missing patches, Promiscuous Firewall rules, other security misconfiguration
Ranking of Risks
- We rank risks by likelihood and impact
Likelihood
- Probability a risk will occur
Impact
- Amount of damage a risk will cause
Qualitative Techniques
- Uses subjective ratings to evaluate risk likelihood and impact: Usually in the form of low,
medium or high on both the likelihood and impact scales.
Quantitative Techniques
- Uses subjective numeric ratings to evaluate risk likelihood and impact
1. Risk Avoidance
Changes business practices to make a risk irrelevant
2. Risk Transference
Attempting to shift the impact of a risk from your organization to another organization
Example : Insurance policy
Note that you cannot always transfer the risk completely. Reputation damage etc.
3. Risk Mitigation
Actions that reduce the likelihood or impact of a risk
4. Risk Acceptance
Choice to continue operations in the face of a risk
Risk Profile
- Combination of risks that an organization faces
Inherent Risk
- Initial level of risk, before any controls are put in place
Residual Risk
- Risk that is reduced and what is left of it is known as the residual risk
Control Risk
- New risk that may have been introduced by the controls applied to mitigate risk
- Example : Controls Applied may be installing a firewall. While that firewall may have mitigated
the inherent risk, the risk of that firewall failing is another newly introduced risk
Risk Tolerance
- Is the level of risk an organization is willing to accept
Security Controls
- Are procedures and mechanisms that reduce the likelihood or impact of a risk and help identify
issues
Defense in Depth
- Uses overlapping security controls
- Different methods of security with a common objective
1. Prevent
- Stops a security issue from occurring
2. Detect
- Identify security issues requiring investigation
3. Correct
- Remediate security issues that have already occurred
1. Technical
- Use technology to achieve control objectives
- Examples: Firewalls, Encryption, Data Loss Prevention, Antivirus Software)
- Technical Control a.k.a Logical Control
2. Administrative
- Uses processes to achieve control objectives
- Examples: User access reviews, log monitoring, performing background checks)
3. Physical
- Controls that impact the physical world
- Examples: Locks, Security guard
Configuration Management
- Tracks the way specific devices are set up
- Tracks both operating system settings and the inventory of software installed on a device
- Should also create Artifacts that may be used to help understand system configuration
(Legend, Diagrams, etc)
-
Baselines
- Provide a configuration snapshot
- Dual Net
- You can use the snapshot to assess if the settings are outside of an approved change
management process system
- Basically, the default configuration setting set by an organization
Versioning/Version Controls
- Assigns each release of a piece of software and an incrementing version number that may be
used to identify any given copy
- These verison #s are written as three part decimals, with the
- First number representing the major version of software
- Second number representing a major updates
- Third number representing minor updates Ex= IPhone IOS 14.1.2
- You must first identify how domestic and international Laws and Regulations apply to an
organization. A framework that everyone in an organization must follow
Policies
- Provide the foundation for an organization’s information security program
- Describes organization’s security expectations
- Policies are set by Senior Management
- Policies should stand the test of time anticipating future changes
- Compliance with Policies are mandatory
Standards
- Describes the specific details of security controls
- Compliance with Standards are mandatory
Guidelines
- Provide advice to the rest of the organization on best practices
- Compliance with Guidelines are optional
Procedures
- Step-by-step procedures of an objective.
- Compliance can be mandatory or optional
Business Continuity
Business Continuity Planning (BCP)
- The set of controls designed to keep a business running in the face of adversity,
whether natural or man-made
- Also known as Continuity Of Operations Planning (COOP)
- Directly impacts the #3 goal of security = Availability
- When planning, proactively as what business activities, systems, and controls will it
configure
In Clouding, Business Continuity Planning requires collaboration between cloud providers and
customers
Redundancy
- The level of protection and against the failure of a single component
1. High Availability
- Uses multiple systems to protect against service failure (Different from AWS Cloud as in that it
does not just apply to AZs but rather everything including multiple firewalls etc)
2. Fault-Tolerance
- Makes a single system resilient against technical failures
- Load Balancing
- Spreads demand across available systems
1. Power Supply
- Contains moving parts
- High failure rate
- Can use multiple power supplies
- Uninterruptible Power Supplies (UPS) - supplies battery to devices during brief power
disruptions. UPS may be backed up by an additional power generator
- Power Distribution Units (PDUs) provide power clearing and management for a rack
2. Storage Media
- Protection against the failure of a single storage divide
- Redundant Array of Inexpensive Disks (RAID) : Comes in many different forms but each is
designed to provide redundancy by having more discs than needed to meet business needs
- There are 2 RAID technologies
- Mirroring
- Considered to be RAID Lvl 1
- Server contains 2 identical synchronized discs
- Striping
- Disc Striping with parity
- RAID Lvl 5
- Contains 3 or more discs
- Also includes an extra disc called Parity Block
- When one of the disc fails, the Parity Block is used to regenerate the failed disc’s content
- RAID is a Fault-Tolerance technique NOT a Back-up strategy
3. Networking
- Improve networking redundancy by having multiple Internet service providers
- Improve networking redundancy by having dual-network interface cards (NIC) or NIC Teaming
(similar to how you use multiple power supplies)
- Implement Multipath Networking
Fault-Tolerance mechanisms prevents systems from failing, even if one of these above points
experience a complete failure . Always attempt to add Diversity in your infrastructure to
improve redundancy
Incident Identification
- Organizations have a responsibility to collect, analyze and retain security information
When these systems and security mechanisms FAIL do detect risks before dealt with internally, an
EXTERNAL source (customer) may be first to detect a risk. Therefore, IR Team should have a
consistent method for receiving, recording, and evaluating external reports
Backups
- Provides an organization with a fail-safe way to recover their data in the event of
- Technology failure
- Human error
- Natural disaster
Backup Methods
1. Tape Backups
- Practice of periodically copying data from a primary storage device to a tape cartridge
- Traditional method - outdated
2. Disk-to-disk Backups
- Writes data from Primary Disks to special disks that are set aside for backup purposes
- Backups that are sent to a storage area network or a network attached storage are also
fitting in this category of backup
3. Cloud Backups - AWS, Azure, GC
1. Full Backups
- Include a complete copy of all data
- Snapshots and images are types of full backups
2. Differential Backups
- Includes all data modified since the last full backup
- Supplements Full Backups
3. Incremental Backups
- Include all data modified since the last full or incremental backup
Scenario: Joe performs full backups every Sunday evening and differential backups every weekday
evening. His system fails on Friday morning. What backups does he restore?
Scenario: Joe performs full backups every Sunday evening and incremental backups every weekday
evening. His system fails on Friday morning. What backup does he restore?
Trade off: Incremental backups takes longer to restore but requires smaller storage
1. Hot Site
- Premier for of disaster recovery facility
- Fully operational Data Centers
- Can be activated in moments or automatically deployed
- Very expensive
2. Cold Site
- Used to restore operations eventually, but requires a significant amount of time
- Empty Data Centers
- Stocked with core equipment, network, and environmental controls but do not have the
servers or data required to restore business
- Relatively Inexpensive
- Activating them may take weeks or even months
3. Warm Site
- Hybrid of Hot and Cold
- Stocked with core requirements and data
- Not maintained in parallel fashion
- Similar in expense as a Hot Site
- Requires significant less time from IT Staff
- Activating them may take hours or days
Disaster Recovery Sites don’t only provide a facility for technology operations, also serve as an
Offsite Storage Location. They are:
- Geographically distant
- Site Resiliency
- Allows backups to be physically transported to the disaster recovery facility either
manually or electronically called “Site Replication”
- Online or offline backups
- Online backups are available for restoration immediately, but is very expensive
- Offline backups may require manual intervention, but is very inexpensive
1. Data Centers
- Most important
2. Server Rooms
- Has sensitive information in less secure locations
3. Media Storage Facilities
- If in a remote location may require as much security as the Data Centers
4. Evidence Storage Locations
5. Wiring Closets
- Literally a cluster of wires
- Needs to be protected as it offers access to digital eavesdroppers and network intruders
6. Distribution Cabling
- Neatly organized cables in the ceiling
7. Operations Center
Visitor Management
- Visitor management procedures protect against intrusions
Visitor Procedures
- Describe allowable visit purposes
- Explain visit approval authority
- Describe requirements for unescorted access
- Explain role of visitor escorts
- All visitor access to secure areas should be logged
- Visitors should be clearly identified with distinctive badges
- Cameras add a degree of monitoring in visitor areas
- Cameras should always be disclosed
4. Geotagging
- Adds user location information to logs
5. Geofencing
- Alerts when a device leaves defined boundaries
Provisioning
- After onboarding, administrators create authentication credentials and grant appropriate
authorization
Deprovisioning
- During the off-boarding process, administrators disable accounts and revoke authorizations
at the appropriate time.
- Prompt Termination (quickly acting after off boarding) is critical
- Prevents users from accessing resources without permission
- More important if employee leaves in unfavorable terms
- User should have the minimum set of permission necessary to perform their job
- Protects against internal risks as a malicious employee’s damage will be limited to their
access
- Protects against external risk as if an account was hacked, the damage they can do would
be limited to the permissions on the stolen account.
Computer Networking
Network
- Connect computers together
- Can connect computers within an office (LAN) or to the global internet
Internet Protocols
- Main function is to provide an addressing scheme, known as the IP address
- Routes information across networks
- Not just used on the internet
- Can be used at home or an office
- Deliver packets (chunks of information) from source → destination
- Serves as a Network Layer Protocol
- Supports Transport Layer Protocols - which have a higher set of responsibilities
-
2 Types of Transport Layer Protocols
OSI (Open Systems Interconnection) Model - Describes networks as having 7 different layers
For the Internet Protocol (IP) to successfully deliver traffic between any two systems on a network, it
has to use an addressing scheme
IP Addresses
- Uniquely identify systems on a network
- Written in dotted quad notation (ex- 192.168.1.100). Also known as IPv4
- Means 4 numbers separated by periods
- Each of these numbers may range between 0-255
- Why 255?
- Each number is represented by 8-bit binary numbers
- Those bits can represent 2 to the power of 8 = 256 possible values
- But we start at 0 so 256-1=255
- No duplicates of IP addresses on Internet-connected systems (Just like your phone#)
- Allow duplicates if on private networks
- Your router or firewall takes care of translating private IP Addresses to public IP addresses
when you communicate over the internet
- This translating process is called NAT (Network Address Translation)
Network Ports
- Like Apartment #s, guide traffic to the correct final destination
- IP addresses uniquely identifies a system while the Network Ports uniquely identifies a
particular location of a system associated with a specific application
- Think of it as
- IP Addresses - Street # of an Apartment
- Network Ports- Unit # of an Apartment
Network Port Numbers
- 16-bit binary numbers
- 2 to the power of 16 = 65,646 possible values
- 65,646-1 (for 0) = 0-65,535 possibilities
Port Ranges
- 0 - 1,023 = Well-known ports
- Reserved for common applications that are assigned by internet authorities
- Ensures everyone on the internet will know how to find common services such as : web
servers, email servers
- Web-servers use the Well-known port 80
- Secure Web-servers use the Well-known port 443
Administrative Services
- Port 21 : File Transfer Protocol (FTP)
- Transfers data between systems
- Port 22 : Secure Shell (SSH)
- Encrypted administrative connections to servers
- Port 3389 : Remote Desktop Protocol (RDP)
- Encrypted administrative connections to servers
- Ports 137, 138, and 139 : NetBIOS - Windows
- Network Communications using the NetBIOS protocol
- Port 53 : Domain Name Service (DNS)
- All systems use Port 53 for DNS lookups
Mail Services
- Port 25 : Simple Mail Transfer Protocol (SMTP)
- Exchange email between servers
- Port 110 : Post Office Protocol (POP)
- Allows clients to retrieve mail
- Port 143 : Internet Message Access Protocol (IMAP)
- Allows to retrieve mail
Web Services
- Port 80 : Hypertext Transfer Protocol (HTTP)
- For unencrypted web communications
- Port 443: Secure HTTP (HTTPS)
- For encrypted connections
-
Securing Wireless Networks
Network Threats
Malware
- One of the most significant threats to computer security
- Short for Malicious Software
- Might steal information, damage data or disrupt normal use of the system
- Malwares have 2 components:
1) Propagation Mechanism
- Techniques the malware uses to spread from one system to another
2) Payload
- Malicious actions taken by malware
- Any type of malware can carry any type of payload
Types of Malware
1. Virus
- Spreads after a user takes some type of user action
- Example : Opening an email attachment, Clicking a Link, Inserting an infected USB
- Viruses do not spread unless someone gives them a hand
- User education protects against viruses
2. Worms
- Spread on their own by exploiting vulnerabilities
- When a worm infects a system, it will use it as it’s base for spreading to other parts of the
Local Area Network
- Worms spread because the systems are vulnerable
- Patching protects against worms
3. Trojan Horse
- Pretends to be a useful legitimate software, with hidden malicious effect
- When you run the software, it may perform as expected however will have payloads behind
the scene
- Application Control protects against Trojan Horses
- Application Controls limit software that can run on systems to titles and versions
4. Botnets
- Are a collection of zombie computers used for malicious purposes
- A network of infected systems
- Steal computing power, network bandwidth, and storage capacity
- A hacker creating a botnet begins by
- 1) Infecting a system with malware through any methods
- 2) Once the malware takes control of the system (hacker gains control), he or she
joins/adds it to the preconceived botnet
How are Botnets Used
- Renting out computing power for profit
- Delivering spam
- Engaging in DDoS attacks
- Mining Bitcoin and Cryptocurrencies
- Perform Brute Force Attacks - against passwords
Botnet Command and Control
- Hackers command botnets through Command and Control Networks as they relay orders
- Communication must be indirect (hides the hackers true location) and redundant
- Must be highly redundant (too much, alot) because security analysts will shut them down
one by one. Its a cat and mouse game, whoever controls the Command and Control
channels retains control of the Botnet the longest
-
Types of Command and Control Mechanisms for Ordering Botnets
- Internet Relay Chat (IRC)
- Twitter
- Peer to Peer within the Botnet
In Summary Botnets:
1. Infect Systems
2. Convert to bots
3. Infect others
4. Check in through Command and Control Network
5. Get Instructions
6. Deliver payload
Eavesdropping Attacks
- All eavesdropping attacks rely on a compromised communication path between a client and a
server
- Network Device Tapping
- DNS poisoning
- ARP poisoning
- During poisoning attacks hackers may use the Man-in-the-Middle technique to trick the user to
connect to the attacker directly, then the attacker directly connects to the server. Now the
original user logs in to a fake server set up by the attacker and the attacker acts as a relay,
the man in the middle, and can view all of the communications.
- The user will not know that there is a Man-in-the-Middle intercepting communications.
Man-in-the-browser Attacks
- Variation of Man-in-the-Middle attack
- Exploit flaws in browsers and browser plugins to gain access to web communications
If the attacker is able to control the network traffic, they may be able to conduct a Reply Attack
Replay Attack
- Uses previously captured data, such as an encrypted authentication token, to create a
separate connection to the server that’s authenticated but does not involve the real end
user
- The attacker cannot see the actually encoded credentials
- They can only see the encoded version of them
- Prevent Replay Attacks by including unique characteristics:
- Token
- Timestamp
SSL Stripping
- Tricks browsers into using unencrypted communications
- A variation of eavesdropping attack
- A hacker who has the ability to view a user’s encrypted web communication exploits the
vulnerability to trick the users browser into reverting to unencrypted communications for
the world to see
- Strips the SSL or TLS protection
Malware Prevention
- Antimalware software protects against many different threats
- Antimalware software protects against viruses, worms, Trojan Horses and spyware
1. Signature Detection
- Watches for known patterns of malware activity
2. Behavior Detection
- Watches for deviations from normal patterns of activity
- This type of mechanism is found in advanced malware protection tools like the Endpoint
Detection and Response (EDR)
- Offer real-time, advanced protection
- Goes beyond basic signature detection and performs deep instrumentation of endpoints
- They analyze:
- Memory
- Processor use
- Registry Entries
- Network Communications
- Installed on Endpoint devices
- Can perform Sandboxing
- Isolates malicious content
-
Port Scanners
Vulnerability Assessment Tools
1. Port Scanner
- Looks for open network ports
- Equivalent of rattling all doorknobs looking for unlocked doors
- nmap
- Popular port scanning tool /command
2. Vulnerability Scanner
- Looks for known vulnerabilities
- Scans deeper than Port Scanner, actually looks at what services are using those ports
- Has a database for all known vulnerability exploits and tests server to see if it contains any
of those vulnerabilities
- Nesssus
- Popular vulnerability scanner
3. Application Scanner
- Tests deep into application security flaws
3 Special-Purpose Networks
1. Extranet
- Special intranet segments that are accessible by outside parties like business partners
2. Honeynet
- Decoy networks designed to attract attackers
3. Ad Hoc Networks
- Temporary networks that may bypass security controls
- East-West Traffic
- Network traffic between systems located in data center
North-South Traffic
- Networks traffic between systems in the data center and systems on the Internet
Configuring VLANs
- Enable VLAN trunking
Allow switches in different locations on the network to carry the same VLANs
- Configure VLANs for each switch port
Firewalls
- Often sit at the network perimeter
- Between Router and Internet
Switch
I
I
I
Switch —------------- Router —------------- Firewall —------------- Internet
I
I
I
Switch
1. Internet
2. Internal Network
3. DMZ
- Contains systems that must accept direct external connections
- Isolates those systems due to risk of compromise
- Protects internal network from compromised DMZ systems
Older Firewalls use Stateless Firewalls
- Evaluate each connection independently
Modern Firewalls use Stateful Inspection
- Keeps track of established connection
1. Network Hardware
- Physical devices that sit on a network and regulate traffic
2. Host-Based software Firewalls
- Software applications that reside on a server that performs other functions
Encryption
HTML5 VPNs
- Work entirely within the web browser
- A remote access VPN
Internet of Things
- Smart devices
IOT Security Challenges
- Difficult to update
- Connect to home and office wireless (Risk for malicious actors)
- Connects back to cloud services for command and control, creating a pathway for external
attackers
Security of IOT
- Check for weak default passwords
- Make sure to regularly update and patch
- Some have Automatic Updates and some require Manual Websites
- If worried get Firmware Version Control
- Updates are applied in orderly fashion
- Security Wrappers (For organizations that must run vulnerable systems)
- Mini firewall for devices
- Device is not directly reached through network
- Only process vetted requests
- Most secure way is Network Segmentation - isolating network to a isolated section where
they will not have access to trusted networks
- Application firewalls provide added protection for embedded devices
- Network Segmentation is the most important control for embedded devices
Cloud Computing
- Delivering computing resources to a remote customer over a network
Vendor Agreements
Non-Disclosure Agreements (NDA)
- Keep your mouth shut
- Service-Level Requirements (SLR)
- Document specific requirements that a customer has about any aspect of a vendor’s
service performance
- Once agreed sign the Service Level Agreement (SLA)
- Memorandum of Understanding (MOU)
- A letter that documents aspects of relationship
- Commonly used when a legal dispute is unlikely but customer and vendor wish to
document their relationship to avoid future misunderstanding
- Usually used when a department another company is dealing with another department
- Business Partnership Agreement (BPA)
- Partnership agreement to conduct business
- Interconnection Security Agreement (ISA)
- Details that two organizations will interconnect their network
- Master Services Agreement (MSA)
- Big project - documentation of expected services
- Statement of Work (SOW) is used when another project comes up
- SOW is governed by terms in MSA. SOW is like am abeyance or patch
- Ensure Security Requirements are mentioned in all agreements
- You encrypt and decrypt with the same shared secret key
- It's like a password to a message
- You will keep needing more keys as network populates
Asymmetric Encryption
- You encrypt and decrypt with different keys from the same pair
- Keys used for Asymmetric encryption and decryption (public & private) must be from the
same pair
Hash Functions
- One-way function that transforms a variable length input into a unique, fixed-length output
- One-way function = Cannot be reversed
- The output of a hash function will always be same length, regardless of input size
- No two inputs to a hash function should produce the same output
Data Classification
- Assign information into categories, known as classification, that determine storage,
handling, and access requirements
Classification Levels
1. High, Medium, Low
2. Public vs Private
Labeling Requirements
- Requirement to identify sensitive information
Social Engineering
- Manipulating people into divulging information or performing an action that undermines
security.
1. Authority
2. Intimidating
3. Consensus
4. Scarcity
5. Urgency
6. Familiarity
Impersonation Attacks
- Unsolicited commercial email
- Phishing
- Phishing is a category of spam
- Steales credentials
- Spear Phishing
- Highly target phishing
- Customized phishing attacks
- Whaling
- Phishing targeted on executives
- Pharming
- Using fake websites
- Vishing
- Voice phishing
- Sda
- Smishing and Spam
- SMS and IM spam
- Spoofing
- Faking an identity