Vapt 3
Vapt 3
Title: V u l n e r a b i l i t y S c a n n i n g w i t h O p e n V A S
Risk Prioritization:
Focuses on addressing vulnerabilities based on their potential impact and
exploitability.
2. Key Concepts
Common Vulnerabilities and Exposures (CVE):
A publicly disclosed list of known vulnerabilities.
Scores range from 0 to 10, with higher scores indicating more critical
vulnerabilities.
1
Foundation of Cyber Security (1)
OpenVAS:
Open-source and free to use.
2
Foundation of Cyber Security (1)
Title: T h r e a t I n t e l l i g e n c e a n d A u t o m a t e d R e s p o n s e .
1. Objective
Goal: Enhance detection and enable automated responses to emerging threats
using threat intelligence.
Focus Areas:
Understanding IOCs and threat feeds.
2. Key Concepts
Indicators of Compromise (IOCs):
Definition: Artifacts observed on a network or in operating system files that
indicate a potential intrusion.
Threat Feeds:
Description: Continuous streams of data that provide information about
known threats.
3
Foundation of Cyber Security (1)
Title: D e c e p t i o n T e c h n o l o g i e s .
1. Objective
Goal: Enhance detection and enable automated responses to emerging threats
using threat intelligence.
Honeypots:
A honeypot is a security mechanism that creates a virtual trap to
lure attackers. An intentionally compromised computer system allows
attackers to exploit vulnerabilities so you can study them to improve
your security policies.
2. Key Concepts
4
Foundation of Cyber Security (1)
1. Types of Honeypots:
Low-Interaction Honeypots:
Example: Honeyd
Characteristics:
Simulate services and systems.
Limited interaction with attackers.
Easier to deploy and maintain.
High-Interaction Honeypots:
Example: Cowrie
Characteristics:
Full operating systems that allow attackers to interact.
More resource-intensive.
3. Ethical Considerations:
Legal Implications:
Ensure compliance with local laws regarding data privacy and
monitoring.
3. Learning Approach
Case Studies:
Analyze real-world examples of honeypots successfully capturing
attacker activity.
5
Foundation of Cyber Security (1)
Figure1.1 HoneyPot
Title: Z e r o T r u s t P r i n c i p l e s
6
Foundation of Cyber Security (1)
1. Objective:
Understand the fundamentals of Zero Trust Architecture (ZTA).
Zero Trust is a security model granting access to only verified and authenticated users.
It provides an ultra-safe defense against potential threats by the user, devices, and
network access control. Unlike traditional security models, it does not assume that
people within an organization are safe. Instead, it requires every user to be authorized
before granting any access.
2. Key Concepts:
Never Trust, Always Verify:
7
Foundation of Cyber Security (1)
Micro-segmentation:
This involves dividing the network into smaller, isolated segments to limit
lateral movement and reduce the attack surface.
Supporting Tools:
Platforms like Zscaler and Cloudflare Access facilitate the
implementation of ZTA by providing secure access to applications and
data.
Zscaler:
The Zscaler Zero Trust Exchange is a cloud native platform that securely
connects users, apps, and devices—using business policies—over any
network, in any location.
It's the world’s largest cloud security platform, enabling increased user
productivity, reduced business risk, lower costs, and far less complexity.
Cloudflare:
Cloudflare offers several tools for Zero Trust, including Access, Gateway,
Tunnel, and WARP Connector.
These tools help organizations enforce security policies and protect their
data.
8
Foundation of Cyber Security (1)
network.
Assumes that users and devices inside the network are trustworthy.
Emphasizes the need for granular access controls and least privilege
access.
Once inside the network, users typically have broad access without further
verification.
4) Response to Breaches
Zero Trust:
Quick detection and response to anomalies or breaches.
Once inside, attackers may have more freedom to move laterally across
9
Foundation of Cyber Security (1)
the network.
5) Implementation Complexity
Zero Trust:
Can be complex to implement due to the need for comprehensive identity
management and continuous monitoring.
10