Security Threats & Vulnerabilities Module 4
Security Threats & Vulnerabilities Module 4
Types of IDS:
• Network-based IDS (NIDS): Monitors traffic on a network and analyzes packets for
any suspicious activity. It is typically deployed at network entry points such as routers
or firewalls to detect external threats. NIDS can help identify attacks such as DoS
attacks, malware, and unauthorized access attempts.
• Host-based IDS (HIDS): Monitors activity on a specific host or system, including file
integrity, system logs, and user activity. HIDS can detect internal attacks and
unauthorized changes to the system.
• Hybrid IDS: Combines both NIDS and HIDS to provide a more comprehensive
monitoring solution.
Key Features:
• Signature-based Detection: This method uses known attack patterns or signatures to
detect threats. While effective at identifying known attacks, it is unable to detect new
or unknown threats.
• Anomaly-based Detection: The system establishes a baseline of normal activity and
alerts when deviations from this baseline occur. This approach can help detect
previously unknown attacks but may generate false positives.
• Behavioral-based Detection: This approach analyzes the behavior of network traffic
and systems over time to identify abnormal or malicious patterns, offering an added
layer of threat detection.
Mitigation:
• Regularly update the IDS signatures and the anomaly detection baseline to ensure
detection of new threats.
• Use IDS in conjunction with other security measures, such as firewalls and encryption,
for enhanced security.
Features:
• File Integrity Checking: HIDS checks system files for unauthorized changes. If a file is
altered unexpectedly, an alert is generated, helping to detect malware or
unauthorized modifications.
• Log Monitoring: HIDS continuously analyzes logs for suspicious activities, such as
failed login attempts or privilege escalations.
• Real-time Alerts: Alerts can be configured to notify administrators in real-time of
suspicious activities, such as the execution of unauthorized programs or access to
sensitive files.
Key Advantages:
• It provides granular monitoring of system activities on an individual host.
Countermeasures:
Features:
• Traffic Analysis: NIDS analyzes packet-level traffic to detect patterns and anomalies
that indicate malicious behavior, such as port scanning, malware communication, or
unauthorized access attempts.
• Protocol Analysis: NIDS can detect attacks targeting vulnerabilities in network
protocols, such as TCP/IP or DNS. It can also flag suspicious payloads in network traffic.
• Real-time Alerts: NIDS can generate alerts in real time when it detects suspicious
traffic patterns, helping security personnel to respond immediately.
Key Advantages:
• It offers broad coverage by monitoring network traffic across multiple systems and
devices.
• It can detect network-level attacks, such as DoS or port scanning, that might bypass
endpoint security.
Countermeasures:
Features:
• Local Detection: Each agent on the endpoint monitors its own environment, providing
real-time detection of potential threats.
• Centralized Management: The agents send data to a central monitoring system,
where it can be analyzed for patterns and potential threats. This allows for a more
coordinated response.
• Minimal Impact on Performance: Since agents work locally on the device, they can
efficiently detect threats without affecting overall system performance.
Advantages:
• Distributed monitoring allows for faster detection of threats across multiple
endpoints.
Key Elements:
• Business Continuity Plan (BCP): A strategy that ensures essential business operations
can continue during and after a disruptive event. It includes backups, alternative work
arrangements, and redundant systems.
• Disaster Recovery Plan (DRP): A detailed process for recovering IT infrastructure and
data after a disaster. This includes data backups, offsite storage, and a recovery
timeline.
• Crisis Management Plan: A structured approach to managing communication,
decision-making, and recovery during a crisis. It ensures that all stakeholders are
informed and that actions are taken efficiently.
Best Practices:
• Regularly test contingency plans through drills and simulations to ensure readiness.
• Maintain up-to-date contact lists and communication channels for all stakeholders.
• Ensure backups are regularly updated and stored in multiple locations, including
offsite or in the cloud.
Functions of CSIRTs:
• Incident Detection and Analysis: CSIRTs investigate potential incidents and analyze
their scope and impact.
• Response and Mitigation: Once an incident is confirmed, the CSIRT executes the
response plan to contain the attack and prevent further damage.
• Recovery: The CSIRT assists in restoring normal operations, ensuring data is
recovered, and vulnerabilities are patched.
• Post-Incident Review: After resolving the incident, the CSIRT conducts a thorough
review to identify lessons learned and improve future response strategies.
Best Practices:
• Ensure that CSIRTs are well-trained and regularly updated on new attack vectors.
• Establish clear communication channels between the CSIRT and other departments,
such as IT and legal, to ensure coordinated responses.
• Regularly review and update incident response plans to account for emerging threats.
Best Practices:
• Conduct regular refresher training to keep employees informed of the latest threats.
• Use interactive and engaging training methods, such as gamified security exercises.
• Create a reporting system where employees can easily report suspicious activities.
8. Risk Assessment for Risk Management
Definition: Risk assessment is the process of identifying, evaluating, and prioritizing risks
based on their likelihood and potential impact. It is an essential part of risk management,
helping organizations take preventive measures to minimize or mitigate risks.
Key Steps:
• Risk Identification: Identify potential threats and vulnerabilities that could affect the
organization.
• Risk Evaluation: Assess the likelihood and impact of each identified risk, considering
factors like the organization's current security posture and potential consequences of
an attack.
• Risk Treatment: Implement strategies to address the risks. These can include risk
avoidance, mitigation, or transfer (e.g., insurance).
• Risk Monitoring and Review: Continuously monitor risks and reassess the risk
management strategies in response to changes in the threat landscape.
Best Practices:
• Regularly update the risk assessment to account for new vulnerabilities or threats.
• Involve stakeholders from different departments (e.g., IT, legal, finance) to ensure a
comprehensive assessment.
• Implement risk mitigation strategies based on the organization's tolerance for risk and
available resources.