Cyber Security-1
Cyber Security-1
II
ABSTRACT
Cyber Security Virtual Internship is generally used as substitute with the terms
Information Security and Computer Security. This work involves an introduction to
the Cyber Security and history of Cyber Security is also discussed. This also
includes Cyber Security that goes beyond the limits of the traditional information
security to involve not only the security of information tools but also the other assets,
involving the person's own confidential information.
In computer security or information security, relation to the human is basically to relate their
duty(s) in the security process. In Cyber security, the factor has an added dimension, referring
humans as the targets for the cyber-attacks or even becoming the part of the cyber-
attack unknowingly. This also involves the details about the cybercriminals and
cyber risks going ahead with the classification of the Cybercrimes which is
against individual, property, organization and society.
Impacts of security breaches are also discussed. Countermeasures for computer security are
discussed along with the Cyber security standards, services, products, consultancy
services, governance and strategies. Risk management with the security architecture has also
been discussed. Other section involves the regulation and certification controls; recovery
and continuity plans and Cyber security skills.
Moreover, we have discussed the importance of cyber security, cyber risk, coupled
with the approach of computer and information security.
Organization Information:
II
• Data loss protection
• Threat Prevention
II
INDEX
S.NO CONTENTS
1. Introduction
2. Cyber Security Networks
3. Certificates
3.1 Introduction to Cybersecurity
3.2 Fundamentals of Network Security
3.3 Fundamentals of Cloud Security
3.4 The Fundamentals of SOC (Security Operations Centre)
4. Conclusion
II
Introduction Palo Alto Networks
Palo Alto Networks offers an enterprise cybersecurity platform that provides network
security, cloud security, endpoint protection, and various cloud-delivered security services.
Palo Alto Networks is one such vendor that offers a comprehensive and easy-to-use set of
firewalls, including NGFWs and Web Application and API Security platform, which includes
a built-in WAF. Palo Alto has a dedicated management interface, which makes it easy to
manage the device and handle the initial configuration. It has fantastic throughput, and its
connection speed is pretty fair, even when dealing with a high-traffic load. With Palo Alto, I
can configure and manage with REST API integration. Palo Alto Networks Next Generation
Firewalls (NGFW) give security teams complete visibility and control over all networks
using powerful traffic identification, malware prevention, and threat intelligence
technologies.
Cybersecurity
II
Cybersecurity Networks
• Introduction to Cybersecurity
• Fundamentals of Network Security
• Fundamentals of Cloud Security
• The Fundamentals of SOC (Security Operations Centre)
Introduction to Cybersecurity
II
In the introduction to cybersecurity, we learn 5 types. They are
• Cybersecurity Landscape
• Cyberattack Types
• Cyberattack Techniques
• APTs and Wi-Fi Vulnerabilities
• Security Models
Cybersecurity Landscape
The modern cybersecurity landscape is a rapidly evolving hostile environment
with advanced threats and increasingly sophisticated threat actors. It describes
the current cybersecurity landscape, explains SaaS application challenges,
describes various security and data protection regulations and standards,
identifies cybersecurity threats and attacker profiles, and explains the steps in
the cyberattack lifecycle.
The nature of enterprise computing has changed dramatically over the past
decade. It changes to the web 2.0 to web 3.0. The vision of Web 3.0 is to return
the power of the internet to individual users, in much the same way that the
original Web 1.0 was envisioned. To some extent, Web 2.0 has become shaped
and characterized, if not controlled, by governments and large corporations
dictating the content that is made available to individuals and raising many
concerns about individual security, privacy, and liberty. In web 3.0, we have AI
and Machine Learning, Blockchain, Data Mining, Mixed Reality, and Natural
Language Search.
Introduction to SaaS
Data is located everywhere in today’s enterprise networks, including in many
locations that are not under the organization’s control. New data security
challenges emerge for organizations that permit SaaS use in their networks. With
SaaS applications, data is often stored where the application resides – in the
cloud. Thus, the data is no longer under the organization’s control, and visibility
is often lost. SaaS vendors do their best to protect the data in their applications,
but it is ultimately not their responsibility. Just as in any other part of the
network, the IT team is responsible for protecting and controlling the data,
II
regardless of its location.
Attacker Profiles
News outlets are usually quick to showcase high-profile attacks, but the sources
of these attacks are not always easy to identify. Each of the different attacker
types or profiles generally has a specific motivation for the attacks they generate.
Here are some traditional attacker profile types. Because these different attacker
profiles have different motivations, information security professionals must
design cybersecurity defenses that can identify the different attacker motivations
II
and apply appropriate deterrents. Click the arrows for more information about
the profile type of each attacker.
Cyberattack Types
Attackers use a variety of techniques and attack types to achieve their
objectives. Malware and exploits are integral to the modern cyberattack strategy.
This lesson describes the different malware types and properties, the relationship
between vulnerabilities and exploits, and how modern malware plays a central
role in a coordinated attack against a target. This lesson also explains the
timeline for eliminating a vulnerability.
Malware
Malware usually has one or more of the following objectives: to provide a remote
control for an attacker to use an infected machine, to send spam from theinfected
machine to unsuspecting targets, to investigate the infected user’s localnetwork,
and to steal sensitive data. Malware is varied in type and capabilities. Let us
review several malware types those are Logic Bombs, Rootkits, Backdoors,
Anti-AV, etc….
II
Ransomware
Ransomware is malware that locks a computer or device (locker ransomware) or
encrypts data (crypto-ransomware) on an infected endpoint with an encryption
key that only the attacker knows, thereby making the data unusable until the
victim pays a ransom (usually in cryptocurrency such as Bitcoin). Reve ton and
Locker are two examples of locker ransomware, while Locky, Tesla
Crypt/Encrypt, Crypto locker, and Crypto wall are examples of crypto
ransomware.
Cyberattack Techniques
Attackers use a variety of techniques and attack types to achieve their objectives.
Spamming and phishing are commonly employed techniques to deliver malware
and exploits to an endpoint via an email executable or a web link to a malicious
website. Once an endpoint is compromised, an attacker typically installs back
doors, remote access Trojans (RATs), and other malware to ensure persistence.
This lesson describes spamming and phishing techniques, how bots and botnet’s
function, and the different types of botnets.
Phishing Attacks
We often think of spamming and phishing as the same thing, but they are
separate processes, and they each require mitigations and defenses. Phishing
attacks, in contrast to spam, are becoming more sophisticated and difficult to
II
identify. In phishing attacks there are some types those are Spear Phishing,
Whaling, Watering Hole, and Pharming.
Wi-Fi Attacks
There are different types of Wi-Fi attacks that hackers use to eavesdrop on
wireless network connections to obtain credentials and spread malware. There
are two types of Doppelgangers and Cookie Guzzler. To protect Wi-Fi, Wi-Fi
Protected Access (WPA) security standard was published as an interim standard
in 2004, quickly followed by WPA2. WPA/WPA2 contains improvements to
protect against the inherent flaws in the Wired Equivalent Privacy (WEP),
including changes to the encryption.
Evil Twin
Perhaps the easiest way for an attacker to find a victim to exploit is to set up a
wireless access point that serves as a bridge to a real network. An attacker can
inevitably bait a few victims with “free Wi-Fi access.”
Baiting a victim with free Wi-Fi access requires a potential victim to stumble on
the access point and connect. The attacker can’t easily target a specific victim,
because the attack depends on the victim initiating the connection. Attackers now
try to use a specific name that mimics a real access point. Click the arrows for
more information about how the Evil Twin attack is executed.
II
Security Models
The goal of a security model is to provide measurable threat prevention through
trusted and untrusted entities. This can be a complicated process, as every
security model will have its customizations, and many variables need to be
identified. This lesson describes the core concepts of a security model and why
the model is important, the functions of a perimeter-based security model, the
Zero Trust security model design principles, and how the principle of least
privilege applies to the Zero Trust security model.
II
• Addressing and Encapsulation
• Network Security Technologies
• Endpoint Security and Protection
The Net
In the 1960s, the U.S. Défense Advanced Research Projects Agency (DARPA)
created ARPANET, the precursor to the modern internet. ARPANET was the
first packet-switched network. A packet-switched network breaks data into small
blocks (packets), transmits each packet from node to node toward its destination,
and then reassembles the individual packets in the correct order at the
destination. The ARPANET evolved into the internet (often referred to as the network
of networks) because the internet connects multiple local area networks (LAN) to a
worldwide wide area network (WAN) backbone. Today billions of devices worldwide
are connected to the Internet
and use the transport communications protocol/internet protocol (TCP/IP) to
communicate with each over a packet-switched network. Specialized devices and
technologies such as routers, routing protocols, SD-WAN, the domain name system
(DNS), and the world wide web (WWW) facilitate communications between connected
devices.
II
Internet of Things (IoT)
With almost five billion internet users worldwide in 2022, which represents well
over half the world’s population, the internet connects businesses, governments,
and people across the globe. Our reliance on the internet will continue to grow,
with nearly 30 billion devices “thing” – including autonomous vehicles,
household appliances, wearable technology, and more – connecting to the
internet of things (IoT) and nearly nine billion worldwide smartphone
subscriptions that will use a total of 160 EB of monthly data by 2025. IoT
connectivity technologies are broadly categorized into five areas: cellular,
satellite, short-range wireless, low-power WAN and other wireless WAN, and
Identity of Things (IDOT).
TCP/IP Overview
In cybersecurity, you must understand that applications sending data from one
host computer to another host computer will first segment the data into blocks
and will then forward these data blocks to the TCP/IP stack for transmission.
The TCP stack places the block of data into an output buffer on the server and
determines the maximum segment size of individual TCP blocks permitted by
the server operating system. The TCP stack then divides the data blocks into
appropriately sized segments, adds a TCP header, and sends the segment to the
II
IP stack on the server. The IP stack adds source and destination IP addresses to
the TCP segment and notifies the server operating system that it has an outgoing
message that is ready to be sent across the network. When the server operating
system is ready, the IP packet is sent to the network adapter, which converts the
IP packet to bits and sends the message across the network.
Numbering Systems
You must understand how network systems are addressed before following the
path data takes across internetworks. Physical, logical, and virtual addressing in
computer networks requires a basic understanding of decimal (base 10),
hexadecimal (base 16), and binary (base 2) numbering.
Legacy Firewalls
Firewalls have been central to network security since the early days of the
internet. A firewall is a hardware platform or software platform or both that
controls the flow of traffic between a trusted network (such as a corporate LAN)
and an untrusted network (such as the internet).
II
Stateful Packet Inspection Firewalls
Application Firewalls
Third-generation application firewalls are also known as application-layer
gateways, proxy based firewalls, and reverse-proxy firewalls. Application
firewalls operate up to Layer 7 (the application layer) of the OSI model and
control access to specific applications and services on the network. These
firewalls proxy network traffic rather than permit direct communication between
hosts. Requests are sent from the originating host to a proxy server, which
analyses the contents of the data packets and, if the request is permitted, sends a
copy of the original data packets to the destination host.
II
Virtual Private Networks
A VPN creates a secure, encrypted connection (or tunnel) across the internet
between two endpoints. A client VPN establishes a secure connection between
a user and an organization's network. A site-to-site VPN establishes a secure
connection between two organizations' networks, usually geographically
separated. VPN client software is typically installed on mobile endpoints, such
as laptop computers and smartphones, to extend a network beyond the physical
boundaries of the organization. The VPN client connects to a VPN server, such
as a firewall, router, or VPN appliance (or concentrator). After a VPN tunnel is
established, a remote user can access network resources, such as file servers,
printers, and Voice over IP (VoIP) phones, as if they were physically in the
office.
II
Secure sockets Layer (SSL)
SSL is an asymmetric/symmetric encryption protocol that secures
communication sessions. SSL has been superseded by TLS, although SSL is still
the more commonly used terminology. An SSL VPN can be deployed as an
agent-based or agentless browser-based connection. An agentless SSL VPN
requires only that users launch a web browser, use HTTPS to open a VPN portal
or webpage and log in to the network with their user credentials. An agent-based
SSL VPN connection creates a secure tunnel between an SSL VPN client
installed on a host computer/laptop and a VPN concentrator device in an
organization's network. Agent-based SSL VPNs are often used to securely
connect remote users to an organization's network. SSL VPN technology is the
standard method of connecting remote endpoint devices back to the enterprise
network. IPsec is most commonly used in site-to-site or device-to-device VPN
connections, such as connecting a branch office network to a headquarters
network or data center.
II
including server and systems administration, directory services, and structured
host and network troubleshooting.
II
networks, data centers, cloud-native applications, SaaS applications, branch
offices, and remote users with a fully integrated and automated platform that
simplifies security.
App-ID
User-ID
The next-generation firewall accurately identifies users for policy control. A key
component of security policies based on application use is identifying the users
who should be able to use those applications. IP addresses are ineffective
identifiers of users or server roles within the network. With the User-ID and
Dynamic Address Group (DAG) features, you can dynamically associate an IP
address with a user or server role in the data center. You can then define user-
and role-based security policies that adapt dynamically to changing
environments.
II
malware and phishing pages. You can use the URL category as a match criterion
in policies, which permits exception-based behavior and granular policy
enforcement. For example, you can deny access to malware and hacking sites
for all users, but allow access to users who belong to the IT Security group.
• Cloud Computing
• Cloud Native Technologies
• Cloud Native Security
• Hybrid Data Centre Security
• Prisma Access SASE Security
• Prisma SaaS
• Prisma Cloud Security
Cloud Computing
The move toward cloud computing not only brings cost and operational benefits
but also technology benefits. Data and applications are easily accessed by users
no matter where they reside, projects can scale easily, and consumption can be
tracked effectively.
II
Cloud Security
In general terms, the cloud provider is responsible for the security of the cloud,
including the physical security of the cloud data centers, and foundational
networking, storage, computing, and virtualization services. The cloud customer
is responsible for security in the cloud, which is further delineated by the cloud service
model.
II
Cloud Native Technologies
A useful way to think of cloud-native technologies is as a continuum spanning
from virtual machines (VMs) to containers to serverless. On one end are
traditional VMs operated as stateful entities, as we’ve done for over a decade
now. On the other are completely stateless, serverless apps that are effectively
just bundles of app code without any packaged accompanying operating system
(OS) dependencies.
Miro-VMs
II
Cloud Native Security
The speed and flexibility that are so desirable in today’s business world have led
companies to adopt cloud technologies that require not just more security but
new security approaches. In the cloud, you can have hundreds or even thousands
of instances of an application, presenting exponentially greater opportunities for
attack and data theft.
The” ports first” traditional data center security solution limits the ability to see
all traffic on all ports. The move toward a cloud computing model – private,
II
public, or hybrid improves operational efficiencies.
II
• People
• Processes
• Interfaces
• Visibility
• Technology
• SOAR
• SOAR Solution
Business
Both Erik and the SOC team are responsible for protecting the business. The
reason for Security Operations, for all of the equipment, for everything SOC
does is ultimately to service one main goal, protect the business. Without the
Business pillar, there would be no need for Erik or the SOC team. The elements
in the Business Pillar and the first one is Mission, Governance, Planning and the
second one is Budget, Staffing, Facility and the third one is Metrics, Reporting,
and Collaboration.
People
The People pillar defines who will be accomplishing the goals of the Security
Operations team and how they will be managed. As a part of the People pillar,
Erik received the training necessary for him to be able to triage the alerts in
addition to the other processes and functions within the SOC. This training
provides Erik with the skills necessary to become efficient at detecting and
prioritizing alerts. As Erik’s knowledge increases, he will have opportunities to
grow on the SOC team. He will also have the skills to advance in his career to
other areas. The elements in the Security operations People pillar define the roles
II
for accomplishing the Security Operations team goals and how those roles will
be managed those are Employee Utilization, Training, Career Path Progression,
and Tabletop Exercises.
Processes
While monitoring the ticketing queue, Erik notices a new set of alerts that has
been sent to the SOC team by one of the network devices. Based on the alert
messages, Erik needs to determine whether the alert message is a security
incident, so he opens an incident ticket. Erik starts by doing his initial research
in the log files on the network device to determine if the threat is real.
After reviewing the log files, Erik determines that the alert is a real threat. Based
on the Severity Triangle, Erik has determined that the severity level for this alert
is currently High.
Interfaces
As Erik is investigating the alert generated by the network device, he partners
with the Threat Intelligence Team to identify the potential risks this threat may
pose to the organization. Erik also interfaces with the Help Desk, Network
Security Team, and Endpoint Security Teams to determine the extent of the
threat that has infiltrated the network. Interfaces should be clearly defined so that
expectations between the different teams are known. Each team will have
different goals and motivations that can help with team interactions. Identifying
the scope of each team’s responsibility and separations of duties helps to reduce
friction within an organization. The interfaces are how processes connect to
external functions or departments to help achieve security operation goals. These
are the Help Desk, Information Technology Operations, DevOps, Operational
Technology Team, Enterprise Architecture, SOC Engineering, Endpoint
Security Team, Network Security Team, Cloud Security Team, Threat Hunting,
Content Engineering, Security Automation, Forensics and Telemetry, Threat
Intelligence Team, Red & Purple Team, Vulnerability Management Team,
Business Liaison, Governance, Risk and Compliance.
Visibility
The Visibility pillar enables the SOC team to use tools and technology to capture
II
network traffic, limit access to certain URLs determine which applications are
being used by end users, and detect and prevent the accidental or malicious
release of proprietary or sensitive information. The visibility pillar is Network
Traffic Capture, Endpoint Data Capture, Cloud Computing, Application
Monitoring, URL Filtering, SSL Decryption, Threat Intelligence Platform,
Vulnerability Management Tools, Analysis Tools, Asset Management,
Knowledge Management, Case Management, and Data Loss Prevention.
Technology
The Technology pillar includes tools and technology to increase our capabilities
to prevent or greatly minimize attempts to infiltrate your network. In the context
of IT Security Operations, technology increases our capabilities to securely
handle, transport, present, and process information beyond what we can do
manually. By using technology, you amplify and extend your abilities to work
with Information securely. The Technology pillar is Firewall, Intrusion
Prevention/Detection System, Malware Sandbox, Endpoint Security, Behavioral
Analytics,
Email Security, Network Access Control, Identity & Access Management,
Honey pots & Deception, Web Application Firewall, Virtual Private Networks,
Mobile Device Management, Security Information & Event Management,
Security Orchestration Automation Response.
SOAR
The only reasonable long-term solution is to empower existing resources with a
combination of innovative orchestration, artificial intelligence, and machine
II
learning technologies to automate many of the manual processes that a SOC
team faces each day. By automating processes, the SOC team can focus its
attention on what is truly critical: identifying, investigating, and mitigating
emerging cyber threats.
SOAR Solution
The SOAR solutions that improve SOC efficiency. Cortex XDR and Cortex
XSOAR allow SOC analysts like Erik to do in minutes what would take them
hours to resolve otherwise. Is tools such as these that will allow SOCs to scale
into the future? Cortex is an artificial intelligence based, continuous security
platform. Cortex allows organizations to create, deliver, and consume innovative
new security products from any provider without additional complexity or
infrastructure.
II
Conclusion
I have gained knowledge of cybersecurity, fundamentals of network security,
cloud security and SOC. These courses helped me to understand the overview
of threat landscape and use various tools and technology to defend todays
cyberattacks.
II
II