Interview
Interview
Interview
IDS only issues alerts for potential attacks, while IPS can take action against
them
___________________________________________________________________________________
_______________________
___________________________________________________________________________________
__
__________________________________________________________________________________
___________________________________________________________________________________
__________________________________________________________
It’s important to create a cyber security policy for your business, It helps the
employees to understand their role in protecting the technology and information
assets of your business
The policy should classify data stored in the network to determine the level of
security that should be put in place to safeguard it.
- High Risk Data
- Confidential Data
- Public Data
When developing your cyber security policy consider the following steps:
1. Identify Key Assets And Threats
2. Prioritize Assets, Risks, and Threats
3. Set Achievable Goals
4. Ensure cybersecurity policy goals complement the Business Objectives
5. Test For Vulnerabilities/Pentesting
6. Have basic security controls in place to ensure maximum cybersecurity, like:
- Set password requirements
- Outline email security measures
- Explain how to handle sensitive data
- Set rules around handling technology
- Set standards for social media and internet access
7. Prepare for an incident
8. Document your policy and keep it up-to-date
_________________________________________________________________________
What is pentesting?
It is one of the cybersecurity audit tools.
_____________________________________
Pentesting Methodology
• Pre-engagement phase: Understand Business Requirements. You must have a clear
understanding of why the customer requires the penetration test? This helps in
determining the scope and type of pentesting efforts. How long assessment will
take? What to expect from the assessment? Client contacts in case of emergencies?
Non-Disclosure Agreement (NDA)... Getting required authorizations from the client.
• Engagement phase:
• Reconnaissance - review past threats, vulnerabilities.
• Scanning & Enumeration: includes target discovery, Vulnerability mapping.
• Gaining Access (Exploitation): actual cyber attacks in controlled
environment.
• Maintaining Access: to put up a robust attack to fully test the system.
• Covering Tracks: removing tools, plugging backdoors, clearing logs,
including audit logs.
+++++++++++++
Pentesting tools:
• Nmap: Nmap is a network scanning tool that uses IP packets to identify all the
devices connected to a network and to provide information on the services and
operating systems they are running.
• SQLMap: Identify SQL injection vulnerabilities
• Nessus: A vulnerability scanner, Detect missing patches
• Metasploit: used to set up and launch exploits at vulnerable hosts.
• Burpsuite: web application intercepting proxy capable of spidering and
downloading a website
• Recon-ng
• Maltego
• Theharvester
• Nikto
• Gobuster
_____________________________________________
Pentesting Vulnerabilities:
Authentication Vulnerabilities:
- Brute Force Attack: attacks will target a single account and use its username,
email address, etc. with large lists of possible passwords, attempting each in
succession. This attack stops when correct password is determined, the account is
locked out, the attack is mitigated, or the threat actor abandons their efforts.
- Credential Stuffing: valid credentials for one service are used to attempt to
authenticate to other services.
most XXE vulnerabilities arise because the application's XML parsing library
supports potentially dangerous XML features that the application does not need or
intend to use. The easiest and most effective way to prevent XXE attacks is to
disable those features.
The vast majority of XXE vulnerabilities can be found quickly and reliably using
Burp Suite's web vulnerability scanner.
• Broken Access Control: As the name tells us, the access control to a
system/application is compromised. Access control ensure that access to resources
is given to authorized personal only. Vertical access controls (user specific
access), Horizontal access controls (can access my account only), Context-dependent
access controls (ex. can't modify shop[ing cart after payment)
• Security Misconfiguration: commonly a result of insecure default configurations.
ex- outdated software, OS, antivirus. ensure they are updated as soon as an update
is available.
• Business logic vulnerabilities: these are due to some very basic mistakes in the
security measures on the websites which are normally invisible to the normal user.
example- allowing unlimited pswd attempts and not locking the account after 3
attempts.
______________________________________________________________________________
This includes things like vulnerability scans to find out security loopholes in the
IT systems. Or conducting penetration tests to gain unauthorized access to the
systems, applications and networks. Finally, the penetration testing reports
generated after performing all the necessary procedures are then submitted to the
organization for further analysis and action.
An IT security audit also comprises the physical part. In which, the auditor
verifies physical hardware access for security and other administrative issues.
Approach Based
- Black Box Audit: Here, the auditor only knows about the info that is publically
available regarding the organization that is to be audited.
- White Box Audit: In this type of security audit, the auditor is provided with
detailed info (i.e. source code, employee access, etc) regarding the organization
that is to be audited.
- Grey Box Audit: Here, the auditor is provided with some info, to begin with, the
auditing process. This info can also be gathered by the auditors themselves but is
provided to save time.
Methodology Based
- Penetration Tests: The auditor tries to break into the organization’s
infrastructure.
- Compliance Audits: Only certain parameters are checked to see if the organization
is complying with security standards.
- Risk Assessments: An analysis of critical resources that may be threatened in
case of a security breach.
- Vulnerability Tests: Necessary scans are performed to find possible security
risks. Many false positives may be present.
- Due Diligence Questionnaires: Used for an analysis of existing security standards
in the organization.
________________________________________________
CAAT - Computer Aided Audit tool - CAATs normally includes using basic office
productivity software such as spreadsheet, and more advanced software packages
involving use of statistical analysis and business intelligence tools. specialized
software are also available to fully automate and streamline the audit process.
___________________________________________________________________________________
_______________
AGILE:
Developers focus on the most important features at any given moment, rather than
going “according to plan.” It is a dynamic approach to software development which
is very helpful nowadays as the client requirement tend to change very frequently
during the software development process.
SCRUM: Scrum is a framework that helps teams work together. Scrum describes a set
of meetings, tools, and roles that work in tandem to help teams structure and
manage their work.
___________________________________________________________________________________
______
___________________________________________________________________________________
_______________________________________
cybersecurity policy
what should be involved in policy
sdlc - agile
pentest - how it is performed/basic pentest commands/types os vulnerabilities
audit tools???? did he mean network audit tools?
Comprehensive Infosec plan includes administrative, technical and physical
safeguards.
Response Program
Business Resumption
___________________________________________________________________________
hepa pipa
trello
Hippa