Ethical Hacking Unit-1
Ethical Hacking Unit-1
Ethical Hacking Unit-1
UNIT- I
Introduction:
Hacking Impacts.
The Hacker.
Framework:
Planning the test.
Sound Operations.
Reconnaissance.
Enumeration.
VulnerabilityAnalysis.
Exploitation.
Final Analysis.
Deliverable.
Integration.
This is the technique which is being used by a lot of professionals to do hacking but that is not illegal it
is preferably ethical. That is the reason it is to be called ethical hacking. Though all the tools, tricks
and techniques are used in this regard are the same as being used in hacking, but it is done with the
consent of the target, that’s why is not hacking it is ethical hacking.
It is the way through which an ethical hacker will discover some vulnerability from the hacker’s point of
view so that the system can be made more secure and safe. Ethical hacking also makes sure that the
claim made by target should be genuine.
It’s part of an overall information risk management program that allows for ongoing security
improvements. Ethical hacking can also ensure that vendors’ claims about the security of their
products are legitimate.
According to the ethical hackers they know every detail about the company and they can destroy the
system. The major skill of the ethical hacker is trustworthiness and the other is patience. The
information found by the hacker can’t be abused. The ethical hacker should be more trustworthy for
the maintenance of the safety and security of the system. Gaining access to somebody’s computer
system or network without their permission is crime and that is not ethical.
Hacking is a neat skill to have. However, such a skill requires great responsibility. Learn about the
responsibility an ethical hacker have in this introductory course to Ethical Hacking. In this course, you
will get a peek into what it means to be an Ethical Hacker, practice hacking ethically, and learn the
tools and techniques to be an efficient hacker
Let’s Be Ethical
Learners will learn about ethical hacking and practice the hacking process as an ethical hacker.
Introduction:- Have you ever thought about a career in bug hunting? Not hunting for little
critters that roam outside your home or inside but hunting for software bugs, errors in the
code, found in an applicati…
The Hacking Process:-Before we go hunting, let’s learn about the hacking process. The
hacking process is a combination of ethical hacking tactics for organizational defense. Having
a list of tactics to ensure organizat…
Hunting for Sensitive Data Exposure :-In this exercise, you will search for bugs and
vulnerabilities in a newly created bank application. The bank application is called FakeBank
Financial. They recently hired an engineering team to c…
Challenge: Hunting for Web Vulnerability :-Here’s a challenge! You’re free to skip this
exercise if you choose. To skip, just select Next to continue. However, if you choose to accept
this challenge, your task is to identify and note as …
Conclusion:-Throughout this lesson, you’ve learned about ethical hacking and bug hunting,
the hacking process, and practiced searching, identifying, and eliminating bugs and
vulnerabilities within an applicati…
Getting Started With Ethical Hacking
Get started with ethical hacking by learning what it takes to become an ethical hacker.
Introduction:-If we want to hack a computer, we must know a few things. Before anything
else, we need to know that the computer exists in the first place - it’s hard to hack a computer
that doesn’t exist. We al…
Ports and You:-An important concept to understand for network enumeration (and
networking in general) is the concept of ports. Ports are to IP addresses, what apartment
numbers are to street addresses. Ports …
Time to Scan:-The situation is as follows: One of the computers in a network has been
infected with malware. > Our task is to use network enumeration to determine which
computer is likely to be infected so the…
Conclusion:-Networking enumeration is a powerful tool for hackers and is used by attackers
and defenders alike. There are many different network enumerators available, with different
specialties.
Learners will learn about evading techniques and the future of computing.
Cryptography is the process of encrypting and decrypting data in order to keep that data
safe when storing or transmitting it.
o Symmetric encryption uses the same key to encrypt and decrypt information.
o Asymmetric encryption uses a public key to encrypt data and a different private key
to decrypt data.
Asymmetric ciphers can be slower than symmetric ciphers but have additional use-cases in
authentication and non-repudiation.
Hashing
Hashing is a one-way process that takes data of any size and represents it as a unique hash value of
a fixed size. No matter how large or complex your file is, hashing provides a fast, reliable way to
compare files and verify their authenticity.
Hashing lets you check if two pieces of information are the same, without knowing what the
information itself actually is.
Ephemeral keys are keys that are discarded after being generated and used.
This means that there is little benefit to an attacker who steals the key because the key quickly
becomes useless!
Cryptography, Confidentiality, and Integrity
Cryptography is a powerful tool for maintaining both confidentiality and integrity. Powerful ciphers
prevent unauthorized parties from accessing information without the appropriate key, while
cryptographic hashing algorithms make it easy to see if information has been altered, maliciously or
otherwise.
Design flaws can allow a cipher to be cracked much faster than would be possible using brute force
alone. Cryptography needs to be implemented and applied correctly to work. Strong ciphers are
useless if the key is easily stolen, or the data they encrypt is stored in plaintext elsewhere.
Unethical Hacking
Become familiar with unethical hacking thru a variety of cyber attacks.
Cross-Site-Scripting (XSS)
<script>alert(1);</script>
Cross-Site Scripting (XSS) is a part of the OWASP Top Ten.
XSS is when an application allows untrusted data, potentially user-supplied data, into a web page
without proper validation or sanitization.
It’s dangerous because it can allow attackers to execute malicious scripts in a victim’s browser
leading to hijacked sessions, or malicious page alterations or redirections.
The code is an example of some code that may be used as part of a XSS attack. It could be inserted
into a URL.
SELECT username, email FROP users WHERE id=’1’ AND ‘1’ = ‘2’
One way SQL injections can be mitigated is through input sanitization. Sanitization is the process of
removing dangerous characters from user input.
• ‘
• ;
• \--
This is important because they allow attackers to extend SQL queries to gain more information from a
database.
Careful, this method is not the perfect defense against SQL injections. Removing characters may
have no effect in some queries and, if an attacker finds a way to bypass the sanitization process, they
can easily inject data into your system.
SQL Injection
A SQL injection is a serious vulnerability affecting applications that use SQL as their database
language. Through cleverly constructed text inputs that modify the backend SQL query, threat actors
can force the application to output private data or respond in ways that provide intel. SQL injections
attacks can ultimately be used to steal information and even take complete control of a system.
Viruses
Adware
Spyware
Scareware
Trojan horses
Rootkits
Ransomware
Worms
Fileless malware
Malware: Spyware
Spyware is malware downloaded without a user’s authorization which is used to steal sensitive
information and relay it to an outside party in a way that harms the original user.
The key word here is “spy”. Clicking suspicious links or downloads could result in spyware.
Phishing Uses
Phishing is a social engineering tactic that can be used for many things, such as stealing credentials
or getting malware onto a system.
Adversarial AI
Adversarial artificial intelligence (AI) is a method used to identify vulnerabilities and attack vectors
to circumvent security systems.
One of the more recent real-world examples of a supply-chain attack affected a company known
as SolarWinds.
There are many areas in society using information technology where the ethical hackers made a great
impact. Ethical Hackers can be Professionals Supporting Organizations Systems from Hackers'
Attacks. Today the entire world is in the hands of information technology and we can't even think
about a life without the internet. Now a day’s internet has become the connecting link for a mobile
device to the world. This made the hackers attack the world.
Employing ethical hackers can improve cybersecurity by detecting possible weaknesses and offering
solutions. It can prevent system down time, prevent espionage, supporting protocols, and
safeguard the integrity of information.
o Impact on Education
Teaching hacking students is a hard process. Students are always interested in learning new
technologies. Whenever a teacher is teaching the students about the hacking he/she can ensure that
how the student will take the concept, it is possible that the student may intend to hack other devices
or do bad things with this. In the class, the 95% students may take lessons in a good manner but the
remaining 5% may have bad intentions. The major problem is that the students really don't know the
importance and impacts of hacking, but they will try to do hacking it can be for a good or bad purpose.
Nowadays the number of the students who are intended for the security courses are increasing. They
want to learn hacking easily and earn its benefits. They are attracted to new hacking technologies
where they can hack computers and other devices. We have to make them understand that ethical
hacking is bad if it does not contain any ethics.
o Impact on Business
Nowadays we use a lot of IT applications in business. We live in a digital world and thus all of the data
is digitized. As a result the whole transactions are done today electronically. The growth and
availability of the internet made people do digital transactions. As a result the rate of the customers
who are using the e-commerce sites has increased. To an ethical hacker it is very easy to buy
products from these sites. In one way he may hack the site and buy the products or he can hack a
person’s account and use it for the payments. Also there are some good and ethical programmers
doing their job neatly. But they can use their talent for bad intentions. They can attack business
persons or companies systems, tap the phone calls, create virus codes, etc. We can't predict the
intentions of an ethical hacker. As technology increases, ethical hackers will increase. We can't stop
them but we can advise them to work for good intentions.
o Impact on Workplace
Security Today most of the companies store their data in the digital form. So the ethical hacker can
hack the data and can use it for his own purpose. The hacker can access the information of the staff
of the company. Sometimes the hacker may attack the company’s servers and access the server
data. For this purpose they use virus code. To prevent the hacking we have to improve the security of
the existing system; it can be achieved by finding the information used by the hackers to hack the
system and correct those weak points to increase the security. The hacker may attack the company’s
server data to gain a large amount. But now the companies have several mechanisms to prevent
ethical hackers.
o Impact on Technology
In this modern world almost nothing is secure. Almost all information is available at our finger point.
Anybody can easily get the information related to any system. So ethical hackers can easily get the IP
addresses of any system and may attack it. There are several tools for ethical hackers to do their
work easily. Hackers may use them for crimes where the ethical hackers will use them to find the
weaknesses and imperfections in the network security.
Today confidential information in society is not at all safe in the existence of hackers. So many ethical
hackers are working in several institutions where financial transactions take place. The hackers
mainly hack our accounts using fake emails and advertisements. There is a great problem for an
ethical hacker to track all the outlines. The hacking is different from ethical hacking. But sometimes
because of all access with ethical hackers, they may also come into this circle. And sometimes for an
ethical hacker it is very difficult to prove that he is not the illegal hacker. For example, if an ethical
hacker is hired to check the vulnerabilities in a system of confidential information and a few days later
some data is leaked from that system then everybody will blame the ethical hacker and will make him
a black–hat hacker.
The Hacker:-
Hackers are the people who have a great Knowledge on operating systems and network
technologies. The hackers who are hacking a system illegally are known as black-hat hackers. But
ethical hackers hack the system in an ethical way. An ethical hacker should see sensitive information
and needs to be extremely trustworthy. Lots of companies don’t believe in hiring hackers. The black-
hat hackers hack the systems for their own gains mean while the ethical hackers hack the systems to
find the vulnerabilities in the system and improve the security of the system.
Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on
their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the
bad guy wears a black cowboy hat and the good guy wears a white hat.
White Hat Hackers
White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they
try to find out weaknesses in a computer or a network system as a part of penetration testing and
vulnerability assessments.
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are
numerous companies that hire ethical hackers for penetration testing and vulnerability assessments.
Black Hat Hackers
Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access
to a system and harm its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data,
violating privacy, damaging the system, blocking network communication, etc.
Grey Hat Hackers
Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent
but for their fun, they exploit a security weakness in a computer system or network without the owner’s
permission or knowledge.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little
bounty from the owners.
Miscellaneous Hackers
Apart from the above well-known classes of hackers, we have the following categories of hackers based
on what they hack and how they do it −
Red Hat Hackers
Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the
level of hacking government agencies, top-secret information hubs, and generally anything that falls
under the category of sensitive information.
Blue Hat Hackers
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a
system prior to its launch. They look for loopholes that can be exploited and try to close these gaps.
Microsoft also uses the term BlueHat to represent a series of security briefing events.
Elite Hackers
This is a social status among hackers, which is used to describe the most skilled. Newly discovered
exploits will circulate among these hackers.
Script Kiddie
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated
tools written by others, usually with little understanding of the underlying concept, hence the
term Kiddie.
Neophyte
A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking
and has almost no knowledge or experience of the workings of technology and hacking.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political
message. In general, most hacktivism involves website defacement or denialof-service attacks.
Framework:
The framework can be used to both justify and condemn hacking depending on the circumstances,
allowing those on the outside to distil and evaluate a political hack, both past and present, while
guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas
and methods.
Planning is essential for having a successful project. It provides an opportunity to give critical thought
to what needs to be done, allows for goals to be set, and allows for a risk assessment to evaluate how
a project should be carried out. There are a large number of external factors that need to be
considered when planning to carry out an ethical hack. These factors include existing security
policies, culture, laws and regulations, best practices, and industry requirements. Each of these
factors play an integral role in the decision making process when it comes to ethical hacking. The
ethical hack of this phase have a deep influence on how the hacking should be performed and the
information shared and collected, and will directly influence the deliverable and integration of the
results into the security program of it. The planning phase will describe many of the details of a
controlled attack. It will attempt to answer questions regarding how the attack is going to be supported
and controlled, what the underlying actions that must be performed and who does what, when, where,
and for how long.
Reconnaissance
Reconnaissance is the information-gathering stage of ethical hacking, where you collect data about
the target system. This data can include anything from network infrastructure to employee contact
details. The goal of reconnaissance is to identify as many potential attack vectors as possible.
In this stage the hacker is supposed to collect all the information of the company whose data is to be
hacked and it is called footprinting. The hacker ensures all the information to be collected and it is the
pre attacking phase in hacking. Tools like network mapping and network vulnerability scanning are
used.
Before performing any penetration tests, hackers footprint the system and gather as much information
as possible. Reconnaissance is a preparatory phase where the hacker documents the organization’s
request, finds the system’s valuable configuration and login information and probes the networks. This
information is crucial to performing the attacks and includes:
Naming conventions
Services on the network
Servers handling workloads in the network
IP Addresses
Names and Login credentials of users connected to the network
The physical location of the target machine
Footprinting Methodology
There are many different ways to approach footprinting, but all approaches should follow a similar
methodology. This includes identifying the assessment goals, gathering information about the target,
analyzing this information, and reporting your findings.
The first step is to identify the goals of the assessment. What do you want to achieve by conducting a
security assessment. Do you want to find out how easy it would be to hack into the organization’s
systems, or do you want to gather general information about the organization’s network
infrastructure?
Once you have identified your goals, you can gather information about the target. This includes
anything relevant, such as the company’s name, website, contact details, and relevant social media
profiles. It is also essential to gather information about the organization’s security posture, such as
what type of security measures they use and how they are implemented.
Once you have gathered all this information, it needs to be analyzed and evaluated. What threats
does this data pose to the organization? Are there any areas of weakness that an attacker could
exploit?
Finally, what recommendations can you make to improve the organization’s security posture?
Reporting your findings is an essential part of the footprinting process. You need to provide a detailed
report that outlines your conclusions and recommendations. This will help improve the organization’s
awareness of cybersecurity threats and help it take steps to mitigate these risks.
Information Gathered Through Footprinting
The information gathered during a footprinting assessment can be used in many different ways. It can
be used to improve an organization’s security posture by identifying vulnerabilities and recommending
corrective actions. It can also be used in future penetration tests or red team exercises (Forbes
Technology Council Expert Panel, 2021) to assess the effectiveness of security measures.
Finally, it can also be used as evidence in the aftermath of a data breach or cyberattack. Having a
comprehensive record of its security posture can help an organization show that it took all reasonable
steps to protect its data.
How Footprinting Is Used
Footprinting in ethical hacking is a common technique used by security professionals to assess an
organization’s security posture. It can be used as part of a more extensive assessment or in isolation
and can provide valuable information about the organization’s cybersecurity vulnerabilities.
For hackers, footprinting can be used to gather information about a target that can then be
incorporated when planning an attack. This includes information such as the names of employees,
contact details, and social media profiles.
Enumeration
Enumeration is extracting a system’s valid usernames, machine names, share names, directory
names, and other information. It is a key component of ethical hacking and penetration testing, as it
can provide attackers with a wealth of information that can be used to exploit vulnerabilities.
It can also be defined as collecting detailed information about the target systems, such as operating
and network infrastructure details. Enumeration can be used in both an offensive and defensive
manner.
Enumeration is one of the most important steps in ethical hacking because it gives hackers the
necessary information to launch an attack. For example, hackers who want to crack passwords need
to know the usernames of valid users on that system. Enumerating the target system can extract this
information.
Enumeration can be used to gather any of the following information:
Operating system details
Network infrastructure details
Usernames of valid users
Machine names
Share names
Directory names
Printer names
Web server details
Process of Enumeration
Enumeration is the process of identifying all hosts on a network. This can be done in several ways,
but active and passive scanning is the most common method. Active scanning involves sending out
requests and analyzing the responses to determine which hosts are active on the network. Passive
scanning involves listening to traffic and then analyzing it to identify hosts.
Both methods have their advantages and disadvantages. Active scanning is more likely to identify all
hosts on a network, but it is also more likely to cause disruptions because it generates a lot of traffic.
Passive scanning is less likely to identify all hosts, but it is also less likely to cause disruptions
because it does not generate any traffic.
Vulnerability Analysis:-
There are a variety of ways that cyber criminals conduct malicious attacks on an organization’s
technological infrastructure. These criminals always find new ways to breach cyber security systems
using viruses, malware, ransomware and phishing.
Viruses:
As its name suggests, a virus is software or code that infects a program, computer or system. Viruses
are insidious in that they can often spread from computer to computer before being detected. Viruses
may be designed to destroy computer functionality or steal data.
Malware:
Malware is software that is harmful to a computer. It includes viruses, as well as spyware (software
that steals personal information such as passwords), adware (software that displays unwanted ads)
and other threats. Malware is often attached to emails or files that are downloaded.
Ransomware:
This type of software is especially detrimental to an organization. Ransomware can lock employees
out of a company’s system and prevent them from accessing important data until a ransom is paid to
the cyber criminals.
Phishing:
This is the most common type of attack used by cyber criminals. Usually, these criminals send
phishing emails that trick employees into entering important information into a fake website. Phishing
emails may also download malicious malware when the email is opened.
Cyber security professionals implement a vulnerability analysis when they are testing an
organization’s technological systems. Vulnerability analysis allows them to prepare for cyber attacks
before they happen. By identifying an organization’s cyber security vulnerabilities, cyber professionals
can institute measures to mitigate these susceptibilities. Multiple steps need to be taken to effectively
implement a vulnerability analysis.
After this process, cyber security professionals define systematic baselines, which involve a variety of
configuration factors. These factors need to meet a set standard of “security best practices,”
according to AT&T Business. Some examples of configuration factors are operating systems (OS),
software, ports and security configurations. Cyber security professionals need to be aware of all these
factors before performing a vulnerability scan.
There are two types of vulnerability scans: unauthenticated and authenticated. Originating at the
network perimeter, unauthenticated scans search for and identify open ports and test for exploits and
attacks, according to AT&T Business. In contrast, authenticated scans perform a “credentialed scan
of the operating system and applications looking for misconfigurations and missing patches” that can
be exploited by cyber criminals. After the scans are complete, cyber security professionals create a
report identifying vulnerabilities in the system.
A variety of skills are necessary to become a cyber security professional. These professionals should
have a deep knowledge of the vulnerability analysis process. Moreover, they must exhibit strong
technical, analytical and critical-thinking skills as well as a thorough understanding of current cyber
attack methodologies.
These skills are vital, as cyber security professionals deal with complex and rapidly evolving technical
systems and security issues. They must anticipate potential problems, establish robust testing
processes to identify and fortify vulnerabilities, successfully handle security breaches in real time, and
conduct thorough reviews after a security breach to ensure it doesn’t happen again.
Discover a Rewarding Career in Cyber Security
Cyber criminals are constantly developing new ways to breach the technological infrastructures and
devices of organizations. Therefore, cyber security professionals who can stay one step ahead of
these criminals are much sought after.
Many businesses are not prepared for the financial impact of a cyber attack. Professionals with an
advanced degree in cyber security can develop the skills to protect an organization’s assets.
The University of North Dakota offers an advanced degree in cyber security that can prepare
graduates to protect against cyber crime and keep cyber criminals at bay. This unique and rigorous
online program offers four tracks: Autonomous Systems Cyber Security, Cyber Security and Behavior,
Data Security and General Cyber Security.
Exploitation:-
A script or programmed software which enables the hackers to take over the control of a system and
exploit its vulnerabilities is known as Exploitation. These vulnerabilities are found with some of the
vulnerability scanners like Nessus, Nexpose, OpenVAS, etc.
Quick Fix
Missing of the updates usually leads to Vulnerabilities. So it is suggested to update the system regularly.
Automatic updation can be activated in Windows by using the option from the Control Panel → System
and Security → Windows Updates.
Final Analysis
Although the exploitation phase has a number of checks and validations to ensure success, a final
analysis is required to categorize it. The vulnerabilities of the system in terms of their level of
exposure and to assist in the derivation of a mitigation plan. The final analysis phase provides a link
between two things the exploitation phase and the creation of a deliverable. A comprehensive view of
the entire attack must exist in order to construct a bigger picture of the security posture of the
environment and express the vulnerabilities in a clear and useful manner.
Deliverable
Deliverables communicate the results of tests in several ways. Some deliverables are short and brief,
only providing a list of vulnerabilities and how to fix them, while others are long and detailed, providing
a list of vulnerabilities with detailed descriptions regarding how they were found and how to exploit
them, the implications of having such a vulnerability and how to remedy the situation. The deliverable
phase is the only way for an ethical hacker to convey the results of their tests. Recently, ethical
hacking has having economic value.
Integration
Finally, it is essential that there is some means of using the test results for something productive.
Often, the deliverable is combined with existing materials of it, such as a risk analysis, security policy,
previous test results, and information associated with a security program to enhance mitigation and
develop remedies and patches for vulnerabilities.
Computer Security
There are various types of computer security which is widely used to protect the valuable information
of an organization.
Information security is securing information from unauthorized access, modification & deletion
Application Security is securing an application by building security features to prevent from
Cyber Threats such as SQL injection, DoS attacks, data breaches and etc.
Computer Security means securing a standalone machine by keeping it updated and patched
Network Security is by securing both the software and hardware technologies
Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks
It’s important to understand the distinction between these words, though there isn’t necessarily a clear
consensus on the meanings and the degree to which they overlap or are interchangeable.
So, Computer security can be defined as controls that are put in place to provide confidentiality,
integrity, and availability for all components of computer systems. Let’s elaborate the definition.
Hardware, the physical part of the computer, like the system memory and disk drive
Firmware, permanent software that is etched into a hardware device’s nonvolatile memory
and is mostly invisible to the user
Software, the programming that offers services, like operating system, word processor,
internet browser to the user
A computer virus is a malicious program which is loaded into the user’s computer without user’s
knowledge. It replicates itself and infects the files and programs on the user’s PC. The ultimate goal of
a virus is to ensure that the victim’s computer will never be able to operate properly or even at all.
Computer Worm
A computer worm is a software program that can copy itself from one computer to another, without
human interaction. The potential risk here is that it will use up your computer hard disk space because
a worm can replicate in greate volume and with great speed.
Phishing
Disguising as a trustworthy person or business, phishers attempt to steal sensitive financial or personal
information through fraudulent email or instant messages. Phishing in unfortunately very easy to
execute. You are deluded into thinking it’s the legitimate mail and you may enter your personal
information.
Botnet
A botnet is a group of computers connected to the internet, that have been compromised by a hacker
using a computer virus. An individual computer is called ‘zombie computer’. The result of this threat is
the victim’s computer, which is the bot will be used for malicious activities and for a larger scale attack
like DDoS.
Rootkit
A rootkit is a computer program designed to provide continued privileged access to a computer while
actively hiding its presence. Once a rootkit has been installed, the controller of the rootkit will be able
to remotely execute files and change system configurations on the host machine.
Keylogger
Also known as a keystroke logger, keyloggers can track the real-time activity of a user on his computer.
It keeps a record of all the keystrokes made by user keyboard. Keylogger is also a very powerful threat
to steal people’s login credential such as username and password.
These are perhaps the most common security threats that you’ll come across. Apart from these, there
are others like spyware, wabbits, scareware, bluesnarfing and many more. Fortunately, there are
ways to protect yourself against these attacks.
Network Security
Network security encompasses any activity that protects computer networks and data from
outside threats. The aim of network security is to create a secure platform for computers and
users, free from disruptions and invasions from unauthorised users and programs.
Passive: The purpose here is to monitor/screen sensitive information. Here, the security of
enterprises and their customers is compromised. Examples of passive threats:
1. Release of message content
2. Traffic analysis
Active: The hackers involved in an active attack intend to destroy the network and the systems
connected. Examples of active threats:
1. Masquerade
2. Replay
3. Modification of message content
4. Denial of Service
Active and passive network security attacks are further divided according to the methods used. The
most prominent ones are:
Application Security
Application security is the process of developing, adding, and testing security features within
applications to prevent security vulnerabilities against threats such as unauthorized access and
modification.
Hardware, software, and procedures that identify and mitigate security vulnerabilities may be included
in application security. Hardware application security refers to a router that stops anyone from viewing
a computer's IP address over the Internet. However, application-level security controls, such as an
application firewall that rigorously limits what actions are allowed and banned, are often integrated
into the software. An application security routine that includes protocols such as regular testing is
an example of a procedure.
Today's applications are frequently available over multiple networks and connected to the cloud, they
are more vulnerable to security attacks and breaches. There is increasing pressure and incentive to
assure security not only at the network level but also within individual applications. One explanation
for this is because hackers are focusing their attacks on applications more now than in the past.
Application security testing can expose application-level flaws, assisting in the prevention of these
attacks.
The faster and earlier you can detect and resolve security concerns in the software development
process, the safer your company will be. Because everyone makes mistakes, the trick is to identify
them as soon as possible.
Application security tools that integrate with your development environment can make this process
and workflow much easier and more efficient. These tools are especially beneficial for compliance
audits, as they can save time and resources by detecting issues before the auditors notice them. The
changing nature of how enterprise applications are built over the last many years has aided the rapid
expansion of the application security industry.
Authentication, authorization, encryption, logging, and application security testing are all examples of
application security features. Developers can also use code to reduce security flaws in applications.
Authentication
When developers include protocols in an application to ensure that only authorized users have access
to it. Authentication procedures verify that the user is who they claim to be. When logging into an
application, this can be performed by requiring the user to supply a user name and password. Multi-
factor authentication necessitates the use of multiple forms of authentication, such as something you
know (a password), something you have (a mobile device), and something you are (a biometric).
Authorization
A user may be authorized to access and use the application after being authenticated. By comparing
the user's identification to a list of authorized users, the system may verify that the user has
permission to access the application. In order for the application to match only validated user
credentials to the approved user list, authentication must take place before authorization.
Encryption
Other security measures can safeguard sensitive data from being seen or utilized by a cybercriminal
after a user has been verified and is using the application. Traffic containing sensitive data that flows
between the end-user and the cloud in cloud-based applications can be encrypted to keep the data
safe.
Logging
If a security breach occurs in an application, logging can assist in determining who gained access to
the data and how they did so. Application log files keep track of which parts of the application have
been accessed and by whom.
A method that ensures that all of these security controls are functioning effectively.
A complete application security approach aids in the detection, remediation, and resolution of a
variety of application vulnerabilities and security challenges. Solutions for linking the impact of
application security-related events to business outcomes are included in the most effective and
advanced application security plans.
Finding the right application security technologies for your company is crucial to the effectiveness of
any security measures your DevOps or security team implements.
Different approaches will uncover different subsets of the application's security flaws, and they'll be
most effective at different stages of the development lifecycle. They all reflect the various time, effort,
cost, and vulnerability trade-offs.
Design Review
The architecture and design of the application can be examined for security flaws before code
is created. The construction of a threat model is a popular strategy used at this phase.
Automated Tooling
Many security tools can be automated by including them in the development or testing
process. Automated DAST/SAST tools that are incorporated into code editors or CI/CD
systems are examples.
Security issues with web applications range from large-scale network disruption to focused database
tampering. The following are some application security threats:
Remote attackers can use denial-of-service (DoS) and distributed denial-of-service (DDoS)
attacks to flood a targeted server or the infrastructure that supports it with various types of
traffic. This illegitimate traffic eventually prevents legitimate users from accessing the server,
causing it to shut down.
SQL injection (SQLi) is a technique used by hackers to exploit database flaws. These
attacks, in particular, can reveal user identities and passwords, as well as enabling attackers
to edit or destroy data, as well as modify or create user rights.
Hackers employ cross-site request forgery (CSRF) to mimic authorized users after duping
them into submitting an authorization request. Since their accounts have additional
permissions, high-level users are obviously frequent targets of this strategy, and once the
account is compromised, the attacker can remove, change, or destroy data.
Memory corruption occurs when bad actors execute a variety of attacks on an application,
they end up unintentionally changing some area of its memory. As a result, the software
exhibits unexpected behaviour or fails.
The buffer overflow occurs when malicious code is injected into the system's designated
memory region. Overflowing the buffer zone's capacity causes surrounding areas of the
application's memory to be overwritten with data, posing a security risk.
Security Architecture
A cyber security architecture is the foundation of an organization’s defense against cyber threats, and
ensures that all components of its IT infrastructure are protected. Environments that are secured by a
cyber security architecture include:
Cloud
Networks
IoT
Endpoints
Mobile
When a cyber security architecture adheres to all seven principles of the Zero Trust security model
(devices, people, data, networks, workload, automation & orchestration, visibility & analytics) an
enterprise can secure data and IT resources wherever they reside.
Small business and large enterprises should adopt a consolidated cyber security architecture to
protect their most critical assets from advanced cyber attacks.
Your information security program practices allow you to safeguard key business processes, IT
assets, and employee data from potentially prying eyes. It also identifies individuals or technological
assets that may impact the security or confidentiality of those assets.
Constructing an effective program involves identifying your information security goals. The more
specific these objectives are to your organization’s reality, the more meaningful and dynamic the
underlying initiatives will be. Once those are established, you can define the IT tools and other
information security assets needed to create, launch, and successfully maintain each project.
Information security is a process that moves through phases building and strengthening itself
along the way. Security is a journey not a destination. Although the Information Security process
has many strategies and activities, we can group them all into three distinct phases - prevention,
detection, and response.
Each phase requiring strategies and activities that will move the process to the next phase. The
dynamic growth of new threats attacking vulnerabilities requires timely adjustments to the
methodologies in the prevention, detection, and response cycle. A change in one phase affects
the entire process in some form. A proactive strategy adjustment in the prevention phase will
adjust the detection and response activities. Lessons learned during the response phase will be
addressed in the planning of prevention measures and detection configurations. As I have
indicated the Information Security process is a journey, it is a living cycle that is under constant
change due to the threat and vulnerability environment. For successful stewardship of the
process, strategies must be one step ahead of the advisories or at least in step with them. To
accomplish this, each phase must be designed with adequate capabilities and management
oversight to ensure the maturity of these capabilities.
The ultimate goal of the information security process is to protect three unique attributes of
information. They are:
Confidentiality – Information should only be seen by those persons
authorized to see it. Information could be confidential because it is
proprietary information that is created and owned by the organization or
it may be customers’ personal information that must be kept confidential
due to legal responsibilities.
Integrity – Information must not be corrupted, degraded, or modified.
Measures must be taken to insulate information from accidental and
deliberate change.
Availability – Information must be kept available to authorized persons
when they need
Attacks compromise systems in a number of ways that affect one if not all of these attributes. An
attack on confidentiality would be unauthorized disclosure of information. An attack on integrity
would be the destruction or corruption of information and an attack on availability would be a
disruption or denial of services. Information security protects these attributes by:
Protecting confidentiality
Ensuring integrity
Maintaining availability
An organization succeeds in protecting these attributes by proper planning. Proper planning
before an incident will greatly reduce the risks of an attack and greatly increase the capabilities
of a timely and effective detection and response if an attack occurs. Lets now examine each
phase of the prevent, detect, respond cycle in turn, illustrating the individual process and how
they relate with the whole.
Risk analysis refers to the review of risks associated with the particular action or event. The risk analysis
is applied to information technology, projects, security issues and any other event where risks may be
analysed based on a quantitative and qualitative basis. Risks are part of every IT project and business
organizations. The analysis of risk should be occurred on a regular basis and be updated to identify
new potential threats. The strategic risk analysis helps to minimize the future risk probability and
damage.
o To anticipates and reduce the effect of harmful results occurred from adverse events.
o To plan for technology or equipment failure or loss from adverse events, both natural and
human-caused.
o To evaluate whether the potential risks of a project are balanced in the decision process when
evaluating to move forward with the project.
o To identify the impact of and prepare for changes in the enterprise environment.
Every organization needs to understand about the risks associated with their information systems to
effectively and efficiently protect their IT assets. Risk analysis can help an organization to improve their
security in many ways. These are:
o Concerning financial and organizational impacts, it identifies, rate and compares the overall
impact of risks related to the organization.
o It helps to identify gaps in information security and determine the next steps to eliminate the
risks of security.
o It can also enhance the communication and decision-making processes related to information
security.
o It improves security policies and procedures as well as develop cost-effective methods for
implementing information security policies and procedures.
o It increases employee awareness about risks and security measures during the risk analysis
process and understands the financial impacts of potential security risks.
Getting the input from management and department heads is critical to the risk assessment process.
The risk assessment survey refers to begin documenting the specific risks or threats within each
department.
This step is used to evaluate an IT system or other aspects of an organization to identify the risk
related to software, hardware, data, and IT employees. It identifies the possible adverse events that
could occur in an organization such as human error, flooding, fire, or earthquakes.
Once the risks are evaluated and identified, the risk analysis process should analyse each risk that
will occur, as well as determine the consequences linked with each risk. It also determines how they
might affect the objectives of an IT project.
After analysis of the Risk that provides an idea about which assets are valuable and which threats will
probably affect the IT assets negatively, we would develop a plan for risk management to produce
control recommendations that can be used to mitigate, transfer, accept or avoid the risk.
The primary goal of this step is to implement the measures to remove or reduce the analyses risks. We
can remove or reduce the risk from starting with the highest priority and resolve or at least mitigate each
risk so that it is no longer a threat.
This step is responsible for monitoring the security risk on a regular basis for identifying, treating and
managing risks that should be an essential part of any risk analysis process.