Unit V - 293186717
Unit V - 293186717
2. Access Controls
Access control is a security technique that regulates who can access what resources and what
actions they can perform.
Types of Access Controls
Discretionary Access Control (DAC)
• Users control access to their own data.
• Example: A file owner sets permissions (chmod 700 myfile.txt in Linux).
Mandatory Access Control (MAC)
• Access is strictly controlled by system policies, typically used in military and government
systems.
• Example: Classified information (Top Secret, Secret, Confidential) with strict clearance levels.
Role-Based Access Control (RBAC)
• Access is assigned based on roles (e.g., Admin, Manager, Employee).
• Used in corporate environments and enterprise applications.
• Example: Database admins have full access, while regular users can only read data.
Attribute-Based Access Control (ABAC)
• Access is determined based on multiple attributes (e.g., user role, location, device, time of
access).
• Example: A user may access a company network only during work hours from an authorized
device.
Rule-Based Access Control
• Uses pre-defined rules (firewall rules, access control lists).
• Example: A firewall blocking access to a network based on IP address rules.
1. Wireless Security
Wireless networks are vulnerable to attacks due to their broadcast nature. Without proper security,
attackers can intercept, modify, or inject malicious traffic into a network.
Common Wireless Security Threats
Eavesdropping (Packet Sniffing) – Attackers capture Wi-Fi packets using tools like Wireshark.
Man-in-the-Middle (MitM) Attacks – Hackers intercept communication between devices.
Rogue Access Points (Evil Twin Attack) – Attackers set up fake Wi-Fi networks to steal credentials.
Brute-Force Attacks on Wi-Fi Passwords – Weak passwords can be cracked using tools like
Aircrack-ng.
Denial of Service (DoS) Attacks – Attackers flood the network with traffic, causing disruptions.
Best Practices for Wireless Security
Use Strong Encryption (WPA3 is Recommended)
• WPA3 (Wi-Fi Protected Access 3) offers improved encryption over WPA2.
• Avoid outdated security protocols like WEP (easily hackable).
Enable MAC Address Filtering
• Restrict network access to specific MAC addresses.
Disable SSID Broadcasting
• Hides your Wi-Fi network from casual attackers.
Use a Strong Wi-Fi Password (Passphrase)
• Use at least 12+ characters with symbols and numbers.
• Change default router credentials immediately.
Implement 802.1X Authentication
• Uses RADIUS (Remote Authentication Dial-In User Service) for authentication.
Deploy a Separate Guest Network
• Prevents guest devices from accessing the main corporate network.
Regularly Monitor Wireless Traffic
• Use Intrusion Detection Systems (IDS) to detect unusual activity.
Use a VPN Over Public Wi-Fi
• Encrypts data traffic, preventing sniffing and interception.
2. Honeypots
A honeypot is a decoy system designed to attract cyber attackers, monitor their behavior, and collect
intelligence on attack techniques.
Types of Honeypots
Low-Interaction Honeypots
• Simulate real systems but with limited interaction.
• Easy to deploy and mainly used for early warning and detection.
• Example: A fake SSH login page that logs login attempts.
High-Interaction Honeypots
• Fully functional systems that allow real attacks.
• Provide deeper insights into attack tactics and malware behavior.
• Example: A fake banking website that logs how attackers try to exploit it.
Research vs. Production Honeypots
• Research Honeypots: Used to analyze new threats and cybercriminal behavior.
• Production Honeypots: Deployed in real networks to distract and detect attackers.
Honeypot Deployment Strategies
Place Honeypots in a DMZ (Demilitarized Zone)
• Separates the honeypot from the main network to prevent compromise.
Deploy Multiple Honeypots (Honeynet)
• A network of honeypots designed to trap and analyze various attack methods.
Monitor Logs & Alerts from the Honeypot
• Use SIEM (Security Information and Event Management) to analyze attacker activity.
Use Deception Techniques
• Deploy fake databases, credentials, or SSH servers to lure attackers.
Examples of Honeypot Tools
• Kippo / Cowrie – Fake SSH server to track brute-force attacks.
• Honeyd – Simulates multiple virtual hosts to attract attackers.
• Dionaea – Captures malware samples for analysis.
2. Firewalls
A firewall is a security device or software that monitors, filters, and controls incoming and outgoing
network traffic based on security rules.
Types of Firewalls
Packet Filtering Firewall (Layer 3)
• Examines IP headers and allows or blocks packets based on rules.
• Example: Configuring rules in Linux iptables.
Stateful Inspection Firewall (Layer 4)
• Tracks active connections and blocks unauthorized traffic.
• Example: Cisco ASA (Adaptive Security Appliance).
Proxy Firewall (Application Layer) (Layer 7)
• Inspects HTTP, FTP, and other application protocols.
• Example: Squid Proxy Firewall.
Next-Generation Firewall (NGFW)
• Combines traditional firewalls + intrusion prevention + deep packet inspection.
• Example: Palo Alto Networks NGFW, Fortinet.
Best Practices for Firewall Security
Follow the Principle of Least Privilege (PoLP) – Only allow necessary traffic.
Regularly Update Firewall Rules – Prevent outdated vulnerabilities.
Use Geo-IP Filtering – Block traffic from suspicious locations.
Enable Logging & Alerts – Monitor firewall activity for potential attacks.
Combine Firewalls with IDS/IPS – Improves detection and response to threats.
2. Secure Email
Secure email protects confidentiality, integrity, and authenticity in email communication.
Threats to Email Security
Phishing Attacks – Fake emails tricking users into revealing sensitive data.
Man-in-the-Middle (MitM) Attacks – Attackers intercept email traffic.
Email Spoofing – Fake sender addresses used to impersonate trusted contacts.
Business Email Compromise (BEC) – Cybercriminals impersonate executives to manipulate
employees.
Techniques for Secure Email Communication
Use End-to-End Encryption (E2EE)
• Ensures only sender & recipient can read emails.
• Example: PGP (Pretty Good Privacy), S/MIME (Secure/Multipurpose Internet Mail
Extensions)
Enable SPF, DKIM, and DMARC
• SPF (Sender Policy Framework) prevents spoofing.
• DKIM (DomainKeys Identified Mail) ensures email authenticity.
• DMARC (Domain-based Message Authentication, Reporting & Conformance) stops
phishing.
Use Secure Email Providers
• ProtonMail, Tutanota, or enterprise solutions like Microsoft 365 with E2EE.
Deploy Anti-Phishing Tools
• Use AI-based filters to detect phishing emails.
• Example: Google Workspace, Mimecast.
Enable Two-Factor Authentication (2FA)
• Adds an extra layer of security to email accounts.
3. Mobile Security
Mobile security focuses on protecting smartphones, tablets, and mobile applications from cyber
threats.
Common Mobile Security Threats
Malware & Spyware – Apps that steal data or track user activity.
App-Based Attacks – Malicious apps disguised as legitimate ones.
Public Wi-Fi Risks – Attackers intercept unencrypted data.
SIM Swapping – Hackers take control of a phone number for fraud.
Lost/Stolen Devices – Unauthorized access to sensitive data.
Best Practices for Mobile Security
Keep Your OS & Apps Updated
• Patch vulnerabilities by regularly updating Android/iOS.
Use Trusted App Stores (Google Play, Apple App Store)
• Avoid downloading apps from unknown sources.
Enable Device Encryption
• Protects stored data in case of theft.
• Example: Full-disk encryption on Android & iOS.
Use Strong Authentication
• Biometric authentication (fingerprint, Face ID) + 2FA for better security.
Avoid Public Wi-Fi & Use VPNs
• Encrypts internet traffic to prevent snooping.
Install Mobile Security Apps
• Example: Norton Mobile Security, Lookout, or Google Play Protect.
Remote Wipe & Find My Device Features
• Example: Apple Find My iPhone, Android Find My Device to erase lost/stolen phones.
Comparison Table
Security Area Purpose Techniques & Tools
Intrusion Detection Detects cyberattacks on networks & Snort, Suricata, OSSEC, AI-based
Systems (IDS) systems anomaly detection
Protects email privacy, authenticity, PGP, S/MIME, SPF, DKIM, DMARC,
Secure Email
and security Anti-phishing filters
Secures smartphones & mobile apps Encryption, 2FA, VPN, Mobile
Mobile Security
from cyber threats security apps, Remote wipe