Lecture 1-Introduction to Security
Lecture 1-Introduction to Security
10/22/2022 3
Key Trends from 2015
10/22/2022 4
Key Threats
10/22/2022 5
Why do Breaches Happen?
Vulnerabilities Malware
▪ Configuration
Errors ▪ Installing
▪ “Weak” defaults suspect
▪ Easy passwords applications
▪ “Bugs” ▪ Clicking
▪ Input malicious links
validation ▪ Phishing Emails
▪ Watering Hole attacks
10/22/2022 6
Case Study
• Attacks are generally carried out in four stages
• These four stages are often referred to as
“The Breach Quadrilateral”
• Controls must be deployed within
the environment that impede your
adversary at each stage of the Infiltration
Exfiltration
breach cycle
Propagation
infiltration stage, but attackers are
often most skilled in this area
Propagation:
• The most critical stage, but treated as an operations hygiene issue
by most organizations. When properly constructed early responses
can keep an issue as an “event” rather than an “incident”
• Most commonly missed component is the work to identify true
issues rather than just symptoms.
10/22/2022 8
Breach Quadrilateral (cont…)
Aggregation:
• Accessing and collecting information. The stage where the issue
transitions from an “event” to an “incident.” Attacker access is
enough for a “breach”
• Corrective actions are focused on the attacker’s ability to remove it
from the environment.
Exfiltration:
• Taking the information out of your environment (intellectual
property, PII, Cardholder Data, corporate financials, etc.)
• Blocking/alerting on these attempts can kill the incident.
• Logging the actions can assist in post-breach issues
10/22/2022 9
A Breach – Attack View
1. Attacker scans and attempts exploitation, but fails
2. Attacker utilizes social engineering against a selected population
3. Victim(s) fall for the ruse allowing attacker to enter the environment
4. Attacker leverages user/system access to spread to other systems
5. Attacker consolidates loot (data, passwords, bank access, etc.)
6. Attacker sends data back out of environment
74% of targeted
attack attempts use
email as a vector
Infiltration
Propagation
Exfiltration
10/22/2022 Aggregation 10
A Breach – Attack View
Infiltration: External scanning/exploit attempts Password cracking, pass the
hash, default passwords, create new accounts Social Engineering Emails
Exfiltration:
Export stolen data out of the environment
10/22/2022 11
A Breach – Corrective View
1. Blacklist attacker, add offending IP to custom IDS alerts
2. Rapid removal of emails, analyze malware from attachments/website, and
add custom AV alert
3. Isolate/rebuild systems, password resets for affected users
4. Mass password resets, network isolation, limitation to data stores
5. Emergency DLP scans, system/network isolation, enhanced logging
6. Emergency exfiltration changes, retroactive analysis of offending internal
and external IPs, initiation of full breach response process
Infiltration
Propagation
Exfiltration
10/22/2022 Aggregation 12
A Breach – Corrective View
Infiltration: Propagation:
IDS alerts System logs, domain logs, authentication sources
Email system alerts,
DNS information, malware alerts Alerts from local protective solutions (endpoint, anti-
virus, internal IDS)
Failed logins, web app logs Failed access attempts
Notification from the attackers
Aggregation: Exfiltration:
Server logs, DLP alerts, database activity Firewall rejects, malicious IP/domain alerts
10/22/2022 13
Aspects of Security
• consider 3 aspects of network security:
– security attack: Any action that compromises the
security of information owned by an organization
– security mechanism: to detect, prevent, or recover
from a security attack
– security service: enhances the security of the data
processing systems and the information transfers
of an organization. The services are intended to
counter security attacks and make use of one or
more security mechanisms to provide the service
10/22/2022 14
Security Attack
• any action that compromises the security of
information owned by an organization
• information security is about how to prevent attacks,
or failing that, to detect attacks on information-
based systems
• often threat & attack used to mean same thing
• have a wide range of attacks
• can focus of generic types of attacks
– passive
– active
10/22/2022 15
Security Attacks
10/22/2022 16
Security Attacks
• Interruption: This is an attack on availability
• Interception: This is an attack on
confidentiality
• Modification: This is an attack on integrity
• Fabrication: This is an attack on authenticity
10/22/2022 17
Security Definitions
• Confidentiality (privacy)
• Authentication (who created or sent the data)
• Integrity (has not been altered)
• Non-repudiation (the order is final)
• Access control (prevent misuse of resources)
• Availability (permanence, non-erasure)
– Denial of Service Attacks
– Virus that deletes files
10/22/2022 18
Security Goals
Confidentiality
Integrity
Avalaibility
10/22/2022 19
10/22/2022 20
Passive Attacks
10/22/2022 22
Active Attacks
attempt to alter system resources or affect their operation.
By modification of data stream to:
+ masquerade of one entity as some other
+ replay previous messages
+ modify messages in transit
+ denial of service
10/22/2022 23
Security Service
10/22/2022 24
Security Services
• Authentication - assurance that the communicating entity is the
one claimed
• Access Control - prevention of the unauthorized use of a resource
• Data Confidentiality –protection of data from unauthorized
disclosure
• Data Integrity - assurance that data received is as sent by an
authorized entity
• Non-Repudiation - protection against denial by one of the parties
in a communication
10/22/2022 25
Security Mechanism
10/22/2022 26
10/22/2022 27
• Software, firmware, and hardware design and implementation
processes have errors or corner cases that can be exploited by an
adversary.
• In computer security we call these weaknesses/vulnerabilities.
• A vulnerability is thus a threat to security.
• We call an attack a threat that is realized by an adversary, usually
exploiting one or more of a system’s vulnerabilities.
Challenges
Technical Challenges
• IP address hiding/masking
• criminals can use a variety of tools to evade detection by
law enforcement agencies and obscure access and hide
darknet sites
• software vulnerabilities: A vulnerability could be a problem
in a programme or a misconfiguration that allows an
attacker to do something they should not be able to do (like
downloading customer credit card information)
• attackers sometimes find a vulnerability before the
company that makes the software: while the vulnerability
remains unknown, the software affected cannot be patched
and anti-virus products cannot detect the attack through
signature-based scanning"
https://www.youtube.com/watch?v=-BIANfzF43k
Technical Challenges
Equifax - a US credit reporting service - lost "sensitive personal
data" on 143 million Americans because of a software
vulnerability. This vulnerability was exploited for three months,
until it was fixed.
Vulnerabilities leading to data loss are relatively common, even
for major organizations because it is difficult to properly create,
configure and secure digital systems
https://www.youtube.com/watch?v=8Q_w7EshIPU
• Cloud: Infrastructure is moved into a cloud- implies that
– The company shifts part of the cybersecurity responsibility to
the cloud provider (e.g., physical system security, data centre
security)
– When breaches happen, the company has to work with the
cloud provider to investigate the incidents, which may further
lead to technical and legal challenges
Ethical Challenges
Ethical conduct using ICT involves refraining from harming others,
systems, and data, and respecting the rule of law and human rights
• Cambridge Analytica:
- paid to acquire Facebook users' personal information through
an outside researcher, Aleksandr Kogan, who created a data-
harvesting personality quiz app that told users that it was
collecting the information for academic purposes - a claim
Facebook did not verify and was not true. Although only
305,000 people participated in the quiz and consented to
having their data harvested, their friends also had their profiles
scraped, bringing the estimated number of those affected to 87
million
- revealed unethical behaviour on the part of those responsible
for the huge amount of data harvested on individuals and used
in a manner unanticipated by users who agreed to provide
information and in unauthorized ways for those who never
consented
Operational Challenges