6th Unit
6th Unit
CYBERSECURITY
• In today’s world, we are exposed to an immense amount of information daily. Whether it is
online transactions, social media interactions, or scientific research, the complexity of
data continues to grow exponentially.
• Data is one of the most important assets of many companies. It is power, and if presented
correctly, can tip the scales, acquire customers, secure investments, and make impactful
change. This presents a challenge — how to transform this raw data to actionable insights.
Differences:
• Real-time analysis
DAST analyzes applications in real time, identifying vulnerabilities that
might not be apparent in static code analysis.
• Runtime issues
DAST provides a realistic perspective on the potential threats a live
application could face, emphasizing runtime issues and operational
environments.
• Developer insights
DAST tools provide information about the app's
responses, helping developers identify and eliminate
threats.
• Testing and QA phase
DAST tools are used during the testing and QA phase of
the SDLC
Key features of a vulnerability assessment:
• Scanning: Automated tools are used to scan the target
system for known vulnerabilities.
• Identifying Weaknesses: The assessment identifies security
weaknesses and provides a prioritized list of vulnerabilities.
• No Exploitation: Vulnerability assessment does not involve
actively exploiting vulnerabilities; it focuses on identification
and reporting.
• Remediation Recommendations: The assessment results
typically include recommendations for remediation and
mitigation.
Several types of vulnerability assessments can be conducted, including:
1. Network-Based Vulnerability Assessment
• A network-based vulnerability assessment identifies vulnerabilities in
network devices such as routers, switches, firewalls, and other network
infrastructure components.
• The primary goal of a network-based vulnerability assessment is to
identify weaknesses in the network that attackers could exploit to gain
unauthorized access, steal data, or launch attacks.
• Network-based vulnerability assessments typically involve specialized
software tools and techniques that scan the network for vulnerabilities.
These tools may use various methods to identify vulnerabilities, such as
port scanning, vulnerability scanning, password cracking, and network
mapping.
2.Application-Based Vulnerability Assessment
• An application vulnerability assessment is a process of
reviewing security weaknesses in software
applications(Layer 7) including websites, mobile apps
and APIs. It examines if the apps are susceptible to
known vulnerabilities and assigns severity/criticality
levels to those vulnerabilities, recommending
remediation or mitigation if and whenever needed.
• These assessments typically involve testing the
application for common vulnerabilities, such as SQL
injection, cross-site scripting (XSS) etc. Application
vulnerability assessments can be performed using both
automated and manual methods.
3.API-Based Vulnerability Assessment
API vulnerability assessment is conducted to identify and mitigate
potential security risks in APIs. This process identifies vulnerabilities
and weaknesses in the API’s design, implementation, and deployment.
The goal is to ensure that the API is secure, reliable, and resilient to
attacks.
4.Host-Based Vulnerability Assessment
A host-based vulnerability assessment identifies vulnerabilities in
individual host systems, including servers, workstations, and laptops.
These assessments typically involve scanning the host system for
known vulnerabilities, such as missing security patches or outdated
software. Host-based vulnerability assessments can be performed using
both automated and manual methods.
5.Wireless Network Vulnerability Assessment
A wireless network vulnerability assessment focuses on identifying
vulnerabilities in wireless networks, including Wi-Fi networks. These
assessments typically involve testing the wireless network for
common vulnerabilities, such as weak encryption, default passwords.
Wireless network vulnerability assessments can be performed using
specialized software tools and techniques.
6.Physical Vulnerability Assessment
• A physical vulnerability assessment identifies vulnerabilities in
physical security measures, such as locks, surveillance cameras,
and access control systems. These assessments typically involve
physical inspections of the facility and its security measures.
7.Social Engineering Vulnerability Assessment
• A social engineering vulnerability assessment identifies
vulnerabilities in human behaviour, such as phishing
attacks and other social engineering techniques.
• This vulnerability assessment type typically involves
simulated attacks against employees to test their
awareness of security threats and their ability to identify
and respond to them.
8.Cloud-Based Vulnerability Assessment
• A cloud-based vulnerability assessment identifies
vulnerabilities in cloud infrastructure and services, such
as Amazon Web Services (AWS) and Microsoft Azure.
• These assessments scan the cloud infrastructure for
known vulnerabilities and test the security of cloud
applications and services.
What Types of Threats Does Vulnerability
Assessment Find?
Here are some of the most common types of threats that
can be prevented through vulnerability assessment
methods:
1. Malware Infections
• Malware infections are among the most common
cyber threats, which can devastate organizations.
Malware is typically delivered through attack vectors
such as phishing emails, malicious websites, and
software vulnerabilities.
2. Denial of Service (DoS) Attacks
• DoS attacks are a type of cyberattack that aims to
overwhelm a targeted system or network with traffic or
other resources, causing it to crash or become unavailable
to legitimate users. Vulnerability assessment can identify
vulnerabilities in the network or systems that attackers
could exploit to launch DoS attacks.
3. Data Breaches
• Data breaches occur when attackers gain unauthorized
access to sensitive data, such as personal information,
financial data, or intellectual property.
Insider Threats
• Insider threats are threats that originate from within an
organization. These threats could come from current or
former employees, contractors, or business partners
who can access an organization’s IT resources.
• Vulnerability assessment can identify vulnerabilities in
applications, systems, and network devices that insiders
could exploit to steal data or cause damage to an
organization’s IT infrastructure.
Vulnerability Assessment
Methodology
1. Determine Critical and Attractive Assets
• The first step in vulnerability assessment is
understanding your entire ecosystem and determining
which networks and systems are more critical to your
business operation.
• The attacker’s objectives might vary from your
perspective. Review each asset from an attacker’s
perspective and rank them based on attractiveness.
2. Conduct Vulnerability Assessment
• Actively scan your entire network or system through automated tools to
identify security flaws and weaknesses.
• The critical and attractive assets should be termed “targets,” which requires
further analysis, including testing with real-time scenarios to find and
assess perceived security weaknesses.
• The assessments should rely on vendor vulnerability announcements, asset
management systems, vulnerability databases, and threat intelligence feed.
• The vulnerability assessment is complete if the overall network or system
effectiveness meets the defined security requirements. If vulnerabilities are
identified, you should proceed to the next phase.
3. Vulnerability Analysis and Risk Assessment
The next phase in the vulnerability assessment methodology is
identifying the source and root cause of the security weakness
identified in phase two. It offers a coherent view of remediation.
It involves assigning the severity score or rank to each
susceptibility based on factors like.
• What data are at risk?
• Which network or system is affected?
• The severity of the possible attacks
• Ease of compromise
• Potential damage if an attack happens
Remediation
• The main objective of this phase is the closing of
security gaps. For each identified vulnerability,
determine the remediation actions. Certain remediation
actions might include:
• Update all the configuration or operational changes
• Develop and implement vulnerability patches
• Implement new security measures, procedures, or tools
Mitigation
• Not all vulnerabilities can be resolved completely; this is where
mitigation comes into play. Mitigation focuses on lowering the
chances of a vulnerability being exploited or minimizing the
impact of its exploitation.
• A practical approach, known as virtual patching, involves
promptly applying a patch to the identified vulnerability without
making any changes to the actual source code or components.
• This virtual patch creates a protective barrier that prevents
malicious actors from exploiting the vulnerability, effectively
buying time until a permanent patch or code fix can be
implemented
Key features of penetration
testing:
• Active Exploitation: Penetration testing involves actively
attempting to exploit vulnerabilities to assess their impact.
• Realistic Scenarios: Testers simulate real-world attack scenarios
to identify potential entry points and the extent of damage that
could occur.
• Manual and Automated Testing: Both manual techniques and
automated tools are used to identify and exploit vulnerabilities.
• Limited Scope: Penetration testing usually focuses on specific
target systems or components.
• Actionable Insights: Penetration testing provides actionable
insights into the effectiveness of security measures and the
potential impact of successful attacks.
Port Scanning Basics
A port scanner sends a TCP or UDP network packet and asks the
port about their current status.
The three types of responses are below:
1.Open, Accepted: The computer responds and asks if there is
anything it can do for you.
2.Closed, Not Listening: The computer responds that “This
port is currently in use and unavailable at this time.”
3.Filtered, Dropped, Blocked: The computer doesn’t even
bother to respond.
What is a Port Scan?
• Port scan visualization refers to graphically representing the activity of a
network port scan, which is typically used to detect unauthorized access
attempts, identify open ports, or analyze network vulnerabilities.
• Security professionals can use visualizations to detect scanning patterns,
malicious activities, and trends over time.
• A port scanner is an application which is made to probe a
host or server to identify open ports.
• Bad actors can use port scanners to exploit vulnerabilities
by finding network services running on a host.
• They can also be used by security analysts to confirm
network security policies.
• Ports vary in their services offered. They are numbered
from 0 to 65535, but certain ranges are more frequently
used. Ports 0 to 1023 are identified as the “well-known
ports” or standard ports and have been assigned
services by the Internet Assigned Numbers Authority
(IANA). Some of the most prominent ports and their
assigned services include:
• Port 20 (UDP) — File Transfer Protocol (FTP) for data
transfer
• Port 22 (TCP) — Secure Shell (SSH) protocol for secure
logins, FTP, and port forwarding
• Port 23 (TCP) — Telnet protocol for unencrypted text
• Port scans generally occur early in the cyber kill chain,
during reconnaissance and intrusion.
• Attackers use port scans to detect targets with open
and unused ports that they can repurpose for
infiltration, command and control, and data exfiltration
or discover what applications run on that computer to
exploit a vulnerability in that application.
How a Port Scan Works