Complete Study Material
Complete Study Material
Complete Study Material
Security Concepts
• Information Assurance Concepts
o Confidentiality, Integrity, and Availability (CIA) Triad: A guiding model in information security. A
comprehensive information security strategy includes policies and security controls that minimize threats to
these three crucial components:
o Confidentiality: Not disclosing data to unauthorized persons or processes.
o Integrity: The proof that data has not been altered in an unauthorized manner.
o Availability: Ensuring timely and reliable access to and use of information by authorized users.
o Other Information Assurance Concepts
o Authenticity/ Trustworthiness: The ability to verify the source of information and its integrity.
o Privacy: The right of an individual to control the distribution of information about themselves.
o Accountability: Ensuring that employee actions, along with their security ramifications, are
appropriately tracked as to be held accountable for inappropriate activities.
o Non-Repudiation: An access control process that compares one or more factors of identification, to
validate that the identity claimed by a user or entity is known to the system.
o Resilience: The quick availability of a system, technology, or data during and after a failure event.
Networking Terminology
• Terminology
o Bit: The most essential form of data (0 or 1) at Layer 1 of the Open Systems Interconnection (OSI) model.
o Byte: A unit of digital information that most commonly consists of eight bits.
o Frame: Representation of data at Layer 2 of the OSI model.
o Packet: Representation of data at Layer 3 of the OSI model.
o Segment/ Datagram: Representation of data at Layer 4 of the OSI model.
o Data: Representation of data at Layers 5, 6 and 7 of the OSI model.
o Multi-Cast: Transmission is a one-to-several form of sending Internet traffic.
o Broadcast: Transmission is a one-to-everyone form of sending Internet traffic.
o Loopback: The routing of electronic signals or digital data streams back to their source without intentional
processing or modification. It is primarily a means of testing the communications infrastructure.
o Hardware: The physical parts of a computer and related devices.
o Software: A collection of programs and data that tell a computer how to perform specific tasks.
o Firmware: Computer software that provides the low-level control for a device's specific hardware.
o Ports: A port in networking is a software-defined number associated to a network protocol that receives or
transmits communication for a specific service. A port in computer hardware is a jack or socket that
peripheral hardware plugs into.
o Protocols: A set of rules, formats, and procedures to control communication between systems.
o Payload: The primary action of a malicious code attack.
o Network: Two or more computers linked together to share data, information, or resources.
o Fault Tolerance: A system designed to continue functioning even if hardware or software components fail.
o High Availability: The percentage of the time a system or resource is expected to be operating and
responsive, such as 5 Nines system (Up for 99.999% of the time, which should be down for no more than
5.26 minutes per year). Strategies focus on limiting expected disruptions and improving recovery times.
They include redundant failover systems, which can quickly take over if the primary system fails.
o Scalability: Ability to cope with significant changes on demand without suffering performance problems,
service interruptions due to upgrades, or procedural bottlenecks. Strategies are closely related to high
availability but focus more on provisioning extra resources to a service before failures even occur.
o Timeouts: In networking, timeouts are typically preset time periods for handling unplanned events. One may
experience a network timeout for a number of reasons; The system is down, an incorrect IP address was
used, a service is not running or not offered on that system, a firewall is blocking the traffic or network
traffic is congested, causing packet loss.
o Latency: The time between a source sending a packet and the packets destination receiving it. High latency
is slow, which is typically a problem. It is often caused by low bandwidth or saturation. In addition, routers
overloaded by network traffic may cause high network latency.
o Jitter: A term used to indicate high deviations from a network's average latency. For streaming services, for
example, jitter can have serious negative impacts.
o Packet Drop: Also-called packet loss. This occurs when a network packet fails to reach its destination.
Unreliable network cables, failing adapters, network traffic congestion, and underperforming devices are the
main reasons for packet drop. Routers contain buffers that allow them to hold on to network packets when
their outbound queues become too long. If the router cannot forward its IP packets in a reasonable time
frame, it will drop the packet located in its buffer.
o Baseband: A single cable with a digital signal that can be fiber or copper. The communication signal uses all
of the bandwidth. Either 0% or 100%. Bidirectional communication is optional, but not at the same time
using the same wire or fiber.
o Bandwidth: A measurement of the maximum data amount that can be transferred between two network
points over a period of time. This measurement is typically represented by number of bytes per second.
o Throughput: A measurement of the actual data amount that is transferred between two network over a
period of time. Bandwidth is the maximum rate and throughput is the actual rate.
o Saturation: Also called congestion or bandwidth saturation. This occurs when traffic exceeds capacity.
o Bufferbloat: Some router manufacturers attempt to avoid packet loss by increasing their routers buffer size.
This leads to a condition called bufferbloat, which increases network latency and congested segments due to
packet staying too long in the router’s buffer.
o Page File/Swap File: When RAM becomes full, Windows moves some of the data from RAM back to the hard
drive, placing it into a page file. This file is a form of virtual memory and is highly volatile.
Networking Concepts
• Network Types
o Personal Area Network (PAN): Connects electronic devices close to the user, such as a wireless mouse, a
keyboard, and a computer.
o Small Office/ Home Office (SOHO): A type of Local Area Network (LAN) connection designed for small
businesses with fewer than 10 employees, or a home network. SOHO networks can be a small, wired
Ethernet LAN, or a combination of wired and wireless computers.
o Local Area Network (LAN): A group of computers and peripheral devices that share a common
communication line or wireless link to a server within a distinct geographic area. A LAN may serve as few as
2-3 users in a home office, or thousands of users in a corporation's central office.
o Wireless Local Area Network (WLAN): A wireless network that links two or more devices within a limited
area, such as a home, school, computer laboratory, campus, or office building.
o Campus Area Network (CAN): A network made up of an interconnection of LANs within a limited
geographical area, such as the size of a corporate or university campus.
o Metropolitan Area Network (MAN): A network that interconnects users with computer resources in a
geographic region the size of a metropolitan area.
o Wide Area Network (WAN): Telecommunications network that extends over a large geographic area.
o Global Area Network (GAN): A network composed of different interconnected networks that cover an
unrestricted geographical area. The term is synonymous with the Internet.
o Virtual Private Network (VPN): A mechanism for creating a secure connection between a computing device
and a computer network, or between two networks, using an otherwise unsecure communication medium.
o Enterprise Private Network (EPN): A dedicated computer network that connects an organization's various
locations, such as offices, warehouses, and production sites, in a secure manner. The network is designed to
share resources and protect data and can be tailored to the organization's specific needs.
o Storage/System Area Network (SAN): A network of storage devices that can be accessed by multiple servers
or computers, providing a shared pool of storage space.
o Passive Optical Local Area Network (POLAN): A fiber-optic telecommunications technology that provides
broadband network access to customers using a point-to-multipoint architecture. POLANs are an alternative
to traditional LAN networks and can be used for both residential and business purposes.
• Common Network Devices
Ethernet A family of wired computer networking technologies commonly used in Local Area Networks
(LANs), Metropolitan Area Networks (MANs) and Wide Area Networks (WANs).
Hub A device that links mul@ple computers and devices. Also called repeaters or concentrators. Each
connected device is on the same subnet and receives all data sent to the hub.
Switch Mul@-port network bridge that uses MAC addresses to forward data.
Router A device that connects two or more packet-switched networks or subnetworks. It manages
traffic between these networks by forwarding data packets to their intended IP addresses and
allows mul@ple devices to use the same Internet connec@on.
Firewall A security system that restricts Internet traffic into, out of, or within a private network. This
soIware or dedicated hardware-soIware unit func@ons by blocking or allowing data packets.
Server A computer or system that provides resources, data, services, or programs to other computers,
known as clients, over a network.
End Points A desktop, laptop, tablet, mobile phone, Voice over IP (VoIP), or any other end user device.
Sensor, Collector, Tap Monitors network data from various sources, and sends it to a central loca@on for storage,
viewing, and analysis. Place inside a firewall or near a cri@cal server to capture malicious traffic.
§ Networks are typically divided into subnets. The first allocated address in any network or subnet is
used for the network itself (216.12.146.0). The last is used for the broadcast address
(216.12.146.255).
• Subnetting: The practice of logically dividing a network into two or more smaller networks.
Computers that belong to the same subnet are addressed with an identical group of its most
significant bits of their IP addresses.
• Subnet Masks: Used to define the part of the address used for the subnet. The mask is
usually converted to a decimal notation like 255.255.255.0.
§ IPV 4 addressing does not provide enough addresses for our needs. To address this shortcoming,
IPv4 was subdivided into public and private address ranges.
• Public Addresses: Are limited with IPv4.
• Private Addresses: Can be shared by anyone and can be reused. Address ranges to be used
by private networks:
o Class A: 10.0. 0.0 to 10.255. 255.254.
o Class B: 172.16. 0.0 to 172.31. 255.254.
o Class C: 192.168. 0.0 to 192.168. 255.254.
• Loopback Address: 127.0.0.1. Used to provide a mechanism for self-diagnosis and
troubleshooting at the machine level.
• Common Address Redundancy Protocol (CARP): Allows multiple hosts on the same network
segment to share an IP address.
• Network Address Translation (NAT): For private IP addresses to communicate across the
Internet, they need to be mapped to a public IP address. NAT is a method of mapping a
private IP address to a public IP address to conserve available IPv4 address space. IPv4 is
slowly being phased out by IPv6 to improve security and support more devices.
o IPv6: Provides several important features and improvements upon IPv4.
§ A much larger address field: IPv6 addresses are 128-bits, which supports far more hosts, and
ensures that address space will never run out.
§ Improved Security: IPsec is an optional part of IPv4 networks, but a mandatory component of IPv6
networks. This will help to ensure the integrity and confidentiality of IP packets and allow
communicating partners to authenticate with each other.
§ Improved Quality of Service (QoS): Helps services obtain an optimal share of network bandwidth.
§ Complex Addressing: An IPv6 address is shown as eight groups of four digits. Instead of the numeric
digits like IPv4, IPv6 addresses use the hexadecimal range (0000-ffff) and are separated by colons
rather than periods. Example: 2001: 0db8: 0000: 0000: 0000: FFFF: 0000: 0001. To make it easier for
humans to read and type, it can be shortened by removing the leading zeros at the beginning of
each field and substituting two colons for the longest consecutive 0 fields. All fields must retain at
least one digit. After shortening, the example address above is rendered as 2001:db8::FFFF:0:1.
§ Loopback Address: ::1
• Routing Protocols
o Routing Information Protocol (RIP): One of the oldest distance-vector protocols, which employs hop count
as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a
path from source to destination.
§ RIPv1: Deprecated. Do not use.
§ RIPv2: An enhanced version of RIP that includes support for important routing features, such as
classless addressing and variable-length subnet masks.
§ RIPng: (RIP-Next Generation): An extension of RIPv2 for support of IPv6.
o Interior Gateway Routing Protocol (IGRP): A type of routing protocol used for exchanging routing table
information between gateways within an Autonomous System (AS). This routing information can then be
used to route Network Layer protocols, like IP.
o Enhanced Interior Gateway Routing Protocol (EIGRP): Advanced distance-vector protocol designed by Cisco
Systems as a proprietary protocol, available only on Cisco routers.
o Open Shortest Path First (OSPF): An Interior Gateway Protocol (IGP) for the Internet. Used to distribute IP
information throughout a single Autonomous System (AS) in an IP network. More prone to cyberattacks.
o Intermediate System to Intermediate System (IS-IS): Moves information efficiently within a network by
determining the best route for data through a packet-switching network. Less prone to cyberattacks.
o Exterior Gateway Protocol (EGP): Used to connect different Autonomous Systems (AS) on the Internet from
the mid-1980s until the mid-1990s, when it was replaced by Border Gateway Protocol (BGP). Deprecated.
o Border Gateway Protocol (BGP): A standardized exterior gateway protocol for exchanging routing and
reachability information among Autonomous Systems (AS). Mostly used by Internet Service Providers (ISP).
Network Connec6vity
• Ethernet
o A piece of networking hardware that is used to connect one network device to other, or to connect two or
more computers to shared devices, such as printers or scanners.
• Wired Topologies
o Point-to-Point: A simple topology that directly links two nodes and reserves the entire bandwidth of the
connection for them to communicate with one another
o Bus: Consists of one flat network, where all devices directly connect and transmit data between one
another. This topology is inefficient because it broadcasts data to all devices on the network, which can
cause network congestion and reduce performance. If one link goes down, the whole network goes down.
o Ring: A configuration where every device directly connects to two other devices on the network, forming a
continuous circle in a non-hierarchical structure. Data sent to a specific device transmits from device to
device, around the ring, until it reaches its intended destination.
o Mesh: Infrastructure nodes connect directly, dynamically, and non-hierarchically, to as many other nodes as
possible and cooperate to efficiently route data to and from clients.
o Star: Every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to
transmit messages. The star network is one of the most common computer network topologies.
o Hybrid: Two or more different topologies are integrated or combined to lay out a network.
o Tree: A hybrid Star-Bus network in which Star networks are interconnected via Bus networks. Tree networks
are hierarchical, and each node can have an arbitrary number of child nodes.
• Wireless Connectivity
o Wireless Access Points (WAPs): A hardware device that allows other Wi-Fi devices to connect to a wired
network or wireless network.
§ Fat: Includes everything necessary to handle wireless clients. If end users deploy several Fat WAPs,
each one needs to be configured individually.
§ Thin: Acts as a radio and antenna that is controlled by a wireless switch. If multiple Thin WAPs are
deployed, the entire configuration takes place at the switch. This is the far cheaper option.
§ Controller-Based: Requires a controller for centralized management and is not manually configured.
§ Stand-Alone: This does not require a controller and is generally used in smaller environments.
o Types of Wireless/ Mobile Connectivity
§ Point-to-Point (PtP): Used to connect two locations using directional antennas with Line of Sight
(LoS). They use a combination of small, powerful, highly directional aerials, routers, and cables to set
up the connection. An example is a Wi-Fi repeater, used to extend the length of an existing network.
§ Point-to-Multi-Point: A one-to-many connection, providing multiple paths from a single point to
multiple locations.
§ Cellular: Where the link to and from end nodes is wireless and the network is distributed over land
areas called cells, each served by at least one fixed-location transceiver.
§ SATCOM: Satellite communication that is used in remote areas and during natural disasters.
Potential risks include GPS data leak, remote code execution, and difficulty in remote updates.
§ Hotspot/ Tethering: Using the existing mobile phone and data plan to share a secure Internet
connection with another device, typically a laptop or tablet. True hotspots allow for access to a
dedicated device, like a portable Wi-Fi hotspot, that is capable of connecting to the closest cellular
tower. This can be done over a mobile LAN, Bluetooth, or a wired device, such as a USB. Hotspots
tend to use Wi-Fi, while tethering tends to use a UBS.
§ Ad Hoc Mode/ Mobile Direct: When two wireless devices communicate in a Peer-to-Peer (P2P)
manner without using Access Points (APs) or wireless routers. For example, a client workstation with
wireless capability can be configured in ad hoc mode, enabling another device to connect to it. Or
connecting two mobile devices directly; commonly seen in home networks.
§ Near Field Communication (NFC): A set of protocols that enables communication between two
electronic devices over a distance of 4 cm or less. It is best known as the technology enables
consumers to pay retailers and each other with their cell phones.
• Cloud Connectivity
o Deployment Models
§ Public: Infrastructure is entirely owned, managed, and maintained off-site via the Internet, by third-
party service providers such as Amazon, Microsoft, or Google. Cloud Service Providers (CSP) rent out
their computing resources, like servers, storage, and applications, to various organizations.
§ Private: Infrastructure is dedicated to a single organization or enterprise. The software and
applications are usually proprietary platforms tailored to meet the needs of the business. The
architecture can be hosted and managed either internally by on-site staff or externally by a third-
party service provider.
§ Community: Shared by enterprises with common operational and regulatory concerns, such as trade
associations, nonprofits, and government agencies. This model is hosted either on-site or off-site
and owned by one or more of the organizations or by a Cloud Service Provider (CSP).
§ Hybrid: This infrastructure combines elements from private and public cloud deployments, offering
the security of a private cloud and the additional storage and cost-effectiveness of a public cloud.
This deployment is optimal for industries that store sensitive information, such as healthcare,
government, and finance. These regulated industries are often required to keep certain types of
sensitive data on-premises while allowing less sensitive data to be stored in the cloud.
o Service Models
§ Software as a Service (SaaS): Allows users to use cloud-based apps over the Internet.
§ Platform as a Service (PaaS): A complete code development and deployment environment in the
cloud, with resources that enable delivery from simple cloud-based apps to sophisticated cloud-
enabled enterprise applications.
§ Infrastructure as a Service (IaaS): Provides on-demand access to computing resources such as
servers, storage, networking, and virtualization.
Security Controls
• Primary Security Controls
o Physical Controls: Controls implemented through a tangible mechanism. The components are put in place to
protect a physical building, perimeter, database center, or server room. Examples include data center
perimeter fencing, locks, guards, access control cards, badge readers, biometric access control systems,
surveillance cameras, architectural features, and intrusion detection sensors.
o Technical/Logical Controls: The hardware and software components that protect a system against
cyberattack. Examples include firewalls, Intrusion Detection Systems (IDS), encryption, Access Control Lists
(ACLs), steganography, and identification and authentication mechanisms.
o Administrative Controls: A set of security rules, policies, procedures, or guidelines specified by management
to control access and usage of confidential information. Applies to all the levels of employees and
determines the privileged access to the resources to access data. Examples includes password policies,
Incident Response (IR) procedures and Disaster Recovery Plans (DRPs).
• Other Security Control Concepts
o Managerial Controls: The security controls that focus on the management of risk and the management of
information system security. Includes vulnerability management, change management, asset management,
and standardized penetration testing.
o Procedural Controls: Establishes a framework for validating and maintaining the computer system, and for
ensuring that users understand how to use the system. Takes the form of Standard Operating Procedures
(SOPs) and user manuals.
o Operational Controls: The security controls that are primarily implemented and executed by people, as
opposed to systems. Security controls for day-to-day operations. They can include policies and procedures
that dictate who can use IT assets, such as access lists for computers, virtual machines, and networking
equipment. They can also include allowed operations for users, such as the principle of least privilege.
• Security Control Classifications
o Preventative Controls: Implemented before a threat event to reduce and/or avoid the likelihood and
potential impact of a successful threat event. Includes policies, standards, processes, procedures,
encryption, firewalls, and physical barriers. Physical controls are often preventative controls.
o Detective Controls: Detects, logs, and alerts after an event has occurred. Includes Intrusion Detection
Systems (IDSs) and motion detectors. May not prevent access.
o Corrective Controls: Used to remediate or mitigate the effect of a security incident and prevent the same
security incident from recurrence. Includes account lockout, Intrusion Prevention Systems (IPS), or a sprinkler
system coming on after detecting smoke.
o Directive Controls: Enforce behavioral rules, often through policies or training. Includes employee training,
or phishing campaigns.
o Deterrent Controls: Administrative mechanisms that are used to guide the execution of security within an
organization. Includes policies, procedures, standards, guidelines, laws, and regulations. May not directly
prevent access but will discourages an intrusion attempt.
o Mitigating/ Compensating Controls: A substitute for principal controls to provide equivalent protection.
Measures taken to address any weaknesses of existing controls or to compensate for the inability to meet
specific security requirements due to various constraints. Doesn’t prevent an attack but restores by other
means. Includes patches, firewalls, backups, and hot sites.
• Security Controls Related to the CIA Triad
o Confidentiality-Related Controls
§ Principle of Least Privilege.
§ Mandatory Access Control (MAC).
§ Separation of Duties.
§ Encryption.
o Integrity-Related Controls
§ Hashing.
§ Digital Signatures.
§ Certificates.
§ Version Control.
o Availability-Related Controls
§ Data Backups.
§ Hardware Redundancy.
§ Fault Tolerance.
§ Patch Management.
• Security Postures
o Security Through Obscurity: The reliance on secrecy as the main method of providing security to a system or
component, whether by design or implementation.
o Defense in Depth/ Layered Defense: A security concept realized by placing multiple, varying layers of
security controls throughout an IT system to provide several consecutive controls to protect an asset.
§ Example of a Defense in Depth Security Posture
• Data Controls: Protecting data with technology such as encryption, data leak prevention,
and Identity and Access Management (IAM).
• Application Controls: Protecting applications with technologies such as data leak protection,
application firewalls, and database monitors.
• Host Controls: Placed at the endpoint level, such as antivirus, endpoint firewall,
configuration, and patch management.
• Internal Network Controls: Protecting against uncontrolled data flow and user access with
technologies such as Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs),
internal firewalls, and Network Access Control (NAC).
• Perimeter Controls: Protecting against unauthorized access with the use of technology, such
as gateway firewalls, honeypots, malware analysis, and Demilitarized Zones (DMZs).
• Physical Controls: Provides a physical barrier, such as locks, walls, or access control.
• Policies, Procedures, and Awareness: Initiating administrative controls that reduce insider
threats (intentional and unintentional) and identify risks as soon as they appear.
o De-Perimeterization: Shifts focus from defending network boundaries to protecting individual resources.
Essential due to cloud computing, remote work, mobile devices, outsourcing, and wireless networks.
o Implicit Deny: A security strategy that automatically denies unauthorized or unknown communication. It can
be used in firewalls, where the default answer to whether the communication is allowed is "no" or "deny".
o Zero Trust Architecture (ZTA): No one is trusted, by default, from inside or outside the network. Verification
is required from everyone trying to gain access to resources on the network. This added layer of security has
been shown to prevent data breaches. Zero Trust can be achieved through micro-segmentation, firewalls,
Multi-Factor Authentication (MFA), Identity and Access Management (IAM), and data analytics.
§ Key components of Zero trust architecture: Network and endpoint security, Identity and Access
Management (IAM), policy-based enforcement, cloud security, network visibility, network
segmentation, data protection, and threat detection and prevention.
§ Zero Trust Security Concepts: Adaptive identity, threat scope reduction, policy-driven access
control, and device posture assessments.
o Microsegmentation: Part of a zero-trust strategy that breaks LANs into small, highly localized zones, using
firewalls at every connection point.
Procedural Controls
• Asset Management Policies
o Asset: Anything of value that is owned by an organization. Assets include both tangible items such as
information systems and physical property and intangible assets such as intellectual property.
o Asset Management: The process of identifying, on a continuous, real-time basis, the IT assets that the
organization owns and the potential security risks or gaps that affect them.
§ Asset Management Software. Automatically discover, track, and catalog various assets, with a
centralized dashboard for management.
o Asset Tracking: The tracking of physical assets, either by scanning barcode labels attached to the assets or
by using GPS or RFID tags, which broadcast their location. Includes procedures for tagging, inventory
management, and procedures for lost or stolen devices. Assets are often tracked using Inventory
Management Databases.
o Package Monitoring: Tracks and assesses the security of third-party software packages, libraries and
dependencies. Ensures that they are up to date and free from known vulnerabilities.
• Configuration Management (CM) Policies
o Configuration Management: The process of maintaining systems, such as computer hardware and software,
in a desired state. A discipline that is used to ensure that only changes made to a system are those that have
been authorized and validated. One must conduct inventory baselines, updates, and patches. This process
ensures that systems perform in a manner consistent with expectations over time.
§ Configuration Management Database (CMDB): A central repository for infrastructure information.
o Configuration Management Process
§ Identification of assets and configurations.
§ Baseline of last known good state, and desired configurations.
§ Change Control, including formal processes and procedures for implementing change.
§ Verification and approval of changes.
§ Continuous Auditing.
o The Information Technology Infrastructure Library (ITIL) Framework: A set of best practices and processes
for managing IT and digital services. The four elements of configuration management are as follows:
§ Service Assets: Any resource or capability that can contribute to the delivery of a service. This can
include resources like infrastructure, applications, and data, as well as capabilities like people,
organizations, and management.
§ Configuration Items (CIs): Any component that needs to be managed to deliver an IT service. CIs can
be hardware, software, or data, and can range in complexity, size, and type. Some examples of CIs
include routers, servers, applications, virtual machines, single modules, entire systems, minor
hardware components, single software packages, or documentation.
§ Baseline Configurations: Note any static allocation of IP addresses, versus DHCP.
• IP Address Management (IPAM): Used for planning and managing the assignment and use
of IP addresses in a network.
§ Configuration Management Systems (CMS): A set of tools and databases that are used to manage
the configuration data of a customer's IT infrastructure and services. The CMS contains data about
users, suppliers, locations, business units, and customers.
• CM Diagrams: Includes any relevant workflows, physical and logical network diagrams, and
network rack layouts. Should include standard naming conventions that are easily
understood by everyone, and a clear IP address schema.
• Change Management/ Change Control
o Change Management: The systematic process of managing and controlling changes related to information
security within an organization. The operational steps needed to ensure that changes are necessary, well-
documented, and cause minimal disruption.
§ Request for Change (RFC): A change request, sometimes called a change control request, is a
document containing a call for an adjustment of a system.
§ Approval: Approvers are authorized to stop a request and determine whether the RFC will be
accepted or rejected.
§ Regression/ Rollback: Follow up on the change by updating documentation and monitoring for
negative effects. In case something breaks during the change/update, have a rollback plan ready.
o Change Control: The process that management uses to identify, document, and authorize changes to an IT
environment. It minimizes the likelihood of disruptions, unauthorized alterations, and errors.
§ Change Control Process
• Identify and document the reason why a change is necessary.
• Research and document the required steps, the potential impacts, and who will be affected.
• Go through the organization’s approval process for a specific change.
• Prepare for the change; Gather resources and notify users of when it will be performed.
• Implement and test the change, but have a rollback plan ready.
• Microso^’s DREAD
o A sojware rahng system designed by Microsoj, to evaluate risk and threat. It uses a mnemonic: Damage
potenhal, Reproducibility, Exploitability, Affected users, and Discoverability. Each factor is given a value
between 1-3. A total threat value falls between 5-15, with higher values being more serious.
• RFC 3227-Guidelines for Evidence Collection and Archiving
o A set of best practices for the acquisition, analysis and reporting of digital forensics.
Security Terminology
• Terminology
o Threat: Any event with the potential to adversely impact organizational operations (including mission,
functions, image, or reputation), organizational assets, individuals, other organizations, or the nation, via
unauthorized access, destruction, disclosure, modification of information, and/or Denial of Service (DoS).
o Risk: The potential or likelihood of exposing business information and communications systems to
dangerous actors, elements, or circumstances capable of causing loss or damage.
o Vulnerability: A weakness in an information system, system security procedure, internal controls, or
implementation, that could be exploited or triggered by a threat source.
o Likelihood/ Probability: The chances that a potential vulnerability may be exercised within the construct of
an associated threat environment. A weighted factor that is based on a subjective analysis of the probability
that a given threat is capable of exploiting a given vulnerability.
o Impact Planning: Determining the magnitude of harm that can be expected from the consequences of
unauthorized disclosure, modification, destruction or loss of information or availability.
Cyber Threats
• Threat Sources
o Adversarial: An individual or a group that intends to perform malicious actions against cyber resources.
o Accidental: A non-malicious insider or supply chain vendor, unknowingly threatening security.
o Structure Failure: Hardware or software failure, without fault tolerance.
o Environmental: Natural disasters, earthquakes, or overheating of a server room.
o Black Hat: Criminals who break into computer networks with malicious intent.
o Grey Hat: A security expert who may violate laws or ethical standards but does not have malicious intent.
o White Hat: Ethical Hackers or Pen-Testers aiming to identify vulnerabilities in an IT system.
o Shadow IT: The use of IT-related hardware or software by a department or individual without the
knowledge of the organization.
• Threat Vectors
o A specific path or method that can be exploited to break into a system and compromise its security.
§ Direct Physical Access.
§ Human Vectors: Social Engineering and Insider Threats.
§ Wired and Wireless Access.
§ E-mail or Personal Communication.
§ Message-Based Vectors: Social Media, IM, or SMS.
§ Supply Chains.
§ Removable Media on Mobile Devices.
§ Lure-Based Vectors: Executable Documents and Image Files.
§ Cloud Services.
§ Artificial Intelligence or Machine Learning.
• Threat Awareness
o Knowledge and understanding of which attack surfaces or vulnerabilities are more likely to be targeted, and
how to mitigate those vulnerabilities. It includes research on how the current threat landscape is changing.
§ Current Known Threats.
§ Current Vulnerabilities Discovered through Vulnerability Scans and Pen-Testing.
§ Trending Attacks.
§ Emerging Threat Sources.
§ Zero-Day Vulnerabilities and Attacks.
• Threat Intelligence Research
o Knowledge, skills, and experience-based information concerning the occurrence and assessment of both
cyber/physical threats and threat actors, that is intended to help mitigate potential attacks and harmful
events. Threat intelligence must be current, timely, and consistent.
§ Threat Intelligence Types
• Strategic: Non-technical, high-level, and used to make big-picture decisions.
• Operational: Known adversaries and their actions. Changes more frequently.
• Tactical: Immediate and specific threats/actions, generated by logs. Highly technical.
• Counterintelligence: Active security strategy to use intelligence offensively to lure attackers.
Gathering threat information on foreign threat intelligence actors.
§ Threat Intelligence Sources
• Open-Source Intelligence (OSINT): Publicly available sources, such as discussion groups,
social media, public hearings, government websites, financial reports, maps, or databases.
• Closed-Source or Proprietary Intelligence: Threat intelligence services that provide (for a
fee), threat analytics and correlation across different data sources.
• MITRE CVE list and NIST National Vulnerability Database (NVD): A community-managed list
of vulnerabilities found by security researchers.
• Automated Indicator Sharing (AIS): A free service from the Department of Homeland
Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) that allows
organizations to share and receive cyber threat indicators (CTIs) and defensive measures
(DMs) in real-time.
• Collective Defense: A collaborative strategy that involves organizations working together to
defend against cyber threats. This strategy recognizes that no single entity can withstand
sophisticated cyber threats alone, and instead emphasizes sharing resources, expertise, and
threat intelligence.
• Dark Web Intelligence: Data from the dark web that can help organizations identify and
mitigate cyber threats. Data sources include dark web forums, illegal marketplaces, and
private messaging platforms.
• Indicators of Compromise (IoC): A system event that indicates an intrusion with a high level
of confidence.
• Predictive Analysis: Analyzing large amounts of data very quickly to identify suspicious
patterns, often combined with Machine Learning.
• Threat Maps: A worldwide perspective of real attack data that identifies attacks and trends.
• File Code Repositories: Public code repositories that showcase what hackers are building,
such as those found on GitHub, for example.
§ Threat Research Sources
• Vendor Websites: Vendors and manufacturers know their products better than anyone.
They react when surprises happen and are often involved in the disclosure process.
• Vulnerability Feeds: Automated vulnerability notifications from third-party feeds.
• Conferences: Security researchers often use conferences to convey new methods of
protecting data, intelligence gathering, and/or hacking the latest technology. These
presentations are often based on experience fighting and recovering from attacks.
• Local Industry Groups: A gathering of local peers with shared industry, technology, and
geographical presence.
• Academic Journals: Research from academic professionals on cutting-edge security analysis.
Includes an evaluation of existing security technologies and the latest attack methods.
• Social Media: Monitoring hacking group conversations, or groups where professionals
discuss vulnerability analysis. Keyword monitoring (zero-day, for example) is also helpful.
• Threat Feeds: Monitoring thread announcements from sources such as the U.S. Department
of Homeland Security (DHS), VirusTotal Intelligence, AT&T Security, Malware Information
Sharing Project (MISP), Spamhaus, or the U.S. Federal Bureau of Investigation (FBI).
• Request for Comments (RFCs): A formal document that contains information about Internet
and computer networking topics, published by the Internet Society (ISOC) and often written
by The Internet Engineering Task Force (IETF).
• Tactics, Techniques, and Procedures (TTPS): Proactively looking for threats and information
about what adversaries are doing and how they are doing it.
§ Threat Intelligence Cycle
• Define Intelligence Requirements.
• Collect and Process Information.
• Analyze and Turn Processed Information into Actionable Intelligence.
• Disseminate Information to Decision-Makers.
• Generate Feedback.
• Strategic Intelligence
o Provides a high-level view of the attack trends, techniques, and methods used by attackers, including their
motivations and attributions, and helps answer a specific set of questions: Who are the adversaries? What
do they want? What threat groups are active in the same sector or region?
• Threat Hunting
o The practice of proactively searching for cyber threats that are lurking undetected in a network. Digs deep to
find malicious actors in the environment that have slipped past initial endpoint security defenses.
§ Threat Hunting Process
• Determine the purpose of the hunt, such as identifying attackers or finding weaknesses in
Incident Response (IR) processes. Determine which systems and threats to include.
• Collect raw data from internal logging and external threat intelligence.
• Analyze raw data to establish a hypothesis about potential threats. May be based on threat
intelligence, data analytics, or awareness of the network. It must ask testable questions.
• Build a plan to test the hypothesis, then obtain approval through a standard procedure.
• Execute the approved plan by analyzing data. Revisit the hypothesis based on the findings.
• Compile the results into a report which details discovered threats and vulnerabilities, along
with recommended solutions.
• Act based on the results of the report. Implement Incident Response (IR) or Vulnerability
Management (VM).
• Perform a retrospective analysis of the hunt to provide feedback for future hunts.
§ Advisory Analysis: A notification that includes analytical insights into new trends or developments
that may threaten an organization's information systems. These insights can include information
about an adversary's intentions, technologies, tactics, or trends.
§ Defensive Maneuvering: The active, real-time defense of a network in response to an attack,
whether it be automated or supervised by a computer security specialist.
§ Data Fusion: The process of combining data from multiple sources to create more accurate,
consistent, and useful information than any individual data source could provide.
• Collect the Data: Use logs, sensors, Internet events, and network/ intrusion detection data.
• Add External Sources: Threat feeds, governmental alerts, advisories, and social media.
• Correlate with Big Data Analytics: Focus on predictive analytics and User and Entity
Behavior Analytics (UEBA). Use mathematical analysis of unstructured data.
• Communicating Threat Information
o Protocols and Frameworks
§ Structured Threat Information eXpression (STIX): A language designed by MITRE for standard
expression of threat information, such as observed or recorded events, associated threat actors,
adversary techniques, and defensive actions.
§ Trusted Automated eXchange of Indicator Information (TAXII): An Application Layer protocol
designed for exchanging STIX-based information over HTTPS. It allows secure relationships for
organizations to distribute threat information from a central clearinghouse, subscribe to a central
source, or exchange information with peers.
§ OpenIoC: Allows the expression of Indicators of Compromise (IoC) in a standard, machine-readable
format containing a wide variety of criteria, such as files, URLs, processes, and network connections.
It is a popular tool for creating or editing indicators. Once done, they can be converted to a STIX
format and shared using TAXII.
§ Cyber Observable eXpression (CyBOX): A framework developed by MITRE, which is similar in
purpose to OpenIoC. It describes a broader range of observable events by default but was designed
with extensions to allow OpenIoC entries.
• Collective Defense
o The ability for organizations, comprising a sector, supply chain, or country, to share threat intelligence
securely and in real-time, providing all members an early warning system about potential incoming attacks.
• Threat Assessments
o The practice of determining the credibility and seriousness of a potential threat, as well as the probability
that the threat will become a reality.
§ Potential Threats to Assess
• Accidents and Disasters.
• Equipment Failure.
• Supply Chain Failure.
• Human Error or Negligence.
• Malicious Outsider.
• Malicious Insiders.
o Useful Frameworks for Threat Assessments
§ MITRE ATT&CK: Adversarial Tacdcs, Techniques, and Common Knowledge- MITRE: A guideline for
classifying and describing cyberaoacks and intrusions. A valuable tool to use in conjunchon with
threat modeling to idenhfy potenhal aoack vectors and tachcs used by threat actors.
§ MITRE Common Vulnerabilides and Exposures (CVE): A list of publicly disclosed vulnerabilihes and
exposures, associated with The Common Vulnerability Scoring System (CVSS Scores), which
provides a numerical (0-10) value of the severity of an informahon security vulnerability.
§ NIST Nadonal Vulnerability Database (NVD): A U.S. government repository of standards-based
vulnerability management data represented using the Security Content AutomaZon Protocol. This
data enables automahon of vulnerability management, security measurement, and compliance. Fully
synchronized with the MITRE CVE list.
§ OWASP Top 10: A standard awareness document for developers and web applicahon security. It
represents a broad consensus about the most crihcal security risks to web applicahons. Globally
recognized by developers as the first step towards more secure coding.
Cyber Risk
• Risk Awareness
o Forms the foundation of an organization’s defense against cyber threats. It involves educating employees
about potential risks, promoting best practices, and fostering a culture of vigilance so cyber pitfalls and
threats can be avoided.
• Risk Analysis
o The process of identifying risks to system security and determining the probability of occurrence, the
resulting impact, and the additional safeguards that mitigate this impact.
• Risk Models
o Risk Concepts
§ Inherent Risk: The inherent probability that a cybersecurity event may occur due to a lack of
countermeasures.
§ Residual Risk: The risk level that remains after risk mitigation efforts and internal controls have
been implemented.
§ Control Risk: The risk that a control put in place to mitigate risks will also fail.
§ Risk Tolerance: The level of risk that an organizahon is prepared to take on, to achieve its objechves.
§ Risk Threshold: Defines acceptable risk levels based on various factors.
§ Key Risk Indicators (KRIs): Predictive indicators to monitor and predict potential risks, supporting
proactive risk management.
o Risk Appedte: A strategic assessment of tolerable residual risk levels.
§ Risk Treatment: Determining the best way to address an idenhfied risk.
§ Risk Midgadon: Reducing the impact of potenhal risks by implemenhng controls and plans.
§ Risk Deterrence: Placing visible controls to deter potenhal aoacks.
§ Risk Avoidance: Eliminahng any hazard that might harm the organizahon.
§ Risk Acceptance: Acknowledging that the potenhal loss from a risk is not great enough to warrant
spending money to avoid it.
§ Risk Excepdons/ Exempdons: A formal recognihon of risks that cannot be mihgated within the
specified condihons.
§ Risk Transference: Use of insurance or disclaimers, to transfer liability for expected loss.
• Managed DetecDon and Response (MDR): A vendor monitors firewall and other security
tools to provide experhse in triaging events.
• Managed Service Provider (MSP): Outsource IT infrastructure security.
• Managed Security Service Provider (MSSP): A third-party organizahon that can help
organizahons protect their applicahons, devices, and systems from cyberthreats. They can
also help reduce the need for an organizahon to hire, train, and retain security personnel.
• Cyber Risk Assessments
o Assesses the potenhal implicahons, risks, and costs of a cyber-aoack or data breach on the organizahon and
its stakeholders.
§ Qualitadve Risk Assessment
• The primary focus is to quickly idenhfy risks. These use either numerical rahngs (1-5) or
colors (green, yellow, and red) to rank risks based on their likelihood of occurrence,
frequency, and the magnitude of the impact on the business. Less monetary-based, but shll
uses standard metrics to analyze likelihood and impact.
o MITRE Common Vulnerability Scoring System (CVSS): Used by many vulnerability
management products. It involves 14 separate metrics, with non-numeric values.
Metrics include: The attack vector, ease of repeatability, privileges required, user
interaction required, scope of impact, and types of impact. The results yield low,
medium, high, or critical-level risks.
o DREAD: A software rating system by Microsoft. Evaluates risk and threat. It uses a
mnemonic: Damage Potential, Reproducibility, Exploitability, Affected Users, and
Discoverability. Each factor is given a value between 1-3. A total threat value falls
between 5-15, with higher values being more serious.
o ISO 31000- International Standards for Risk Management Practices: A risk
management standard which focuses on IT management at the organizational level.
It is comprehensive in terms of the risks it covers, but for qualitative analysis, it
generates a total risk metric ranging from 0-9.
§ Quandtadve Risk Assessment
• Involves numerical values, stahshcal analyses, and measurable data to provide a more
precise and objechve measure of cybersecurity risk. Also involves a monetary value assigned
to potenhal loss/impact.
o Single Loss Expectancy (SLE): Cost of a single loss or damage.
o Annual Rate of Occurrence (ARO): Expected loss per year.
o Annual Loss Expectancy (ALE): SLE x ARO = ALE
§ Site Risk Assessment
• A standard risk assessment that is specific to a single site or facility. Since each business site
has individual risks, business functions, and roles in a disaster, one is needed for each site.
Many site risk assessments begin as a generic assessment but are then filtered to contain
only risks relevant to that site.
§ Risk Control Assessment
• Evaluahng the effechveness of current controls and mihgahons.
o Risk Assessment Steps
§ Identify Assets Potentially at Risk.
§ Conduct a Threat Assessment for Each Asset.
§ Analyze the Business Impact of Each Threat.
§ Determine the Likelihood of a Given Threat Doing Damage.
§ Prioritize Risks by Weighing the Likelihood Versus Potential Impact of Each Threat.
§ Create a Risk Mitigation Strategy to Shape Future Security Policies.
o Comprehensive Assessments
§ Determine the Attack Surface.
§ Code Review: Updates, Patches, and Installation.
§ Code Review: After Updates/ Installation.
§ Architecture Review: Hardware and Software Appliances.
§ Configuration Review: Network Connections, Permissions and Passwords.
§ Log Review: System, Network, and Application Logs.
§ Baseline Review: Compare Current Status to Last Known Good Baselines.
§ Risk Assessment Results.
o Results and Repordng
§ Event Evaluadon
• True Positive: Correctly identifying a risk event.
• False Positive: Incorrectly reporting a risk event.
• True Negative: Correctly reporting no known risk event.
• False Negative: Incorrectly identifying no known risk event.
§ Risk Heatmap/ Risk Matrix: A graphical representation of cyber risk data, where the individual
values are represented as colors that connote meaning. Risk heat maps are used to present cyber
risk assessment results in an easy-to-understand, visually attractive, and concise format.
§ Risk Register: A document used as a risk management tool to fulfill regulatory compliance. A
repository for all risks identified. Includes additional information about each risk, such as the nature
of the risk, reference and owner, and mitigation measures. It can be displayed as a scatterplot or as
a table. Used for documenting risk assessments and sharing risk information with stakeholders.
o Third-Party Risks
§ System Integration Risk.
§ Lack of Vendor Support.
§ Outsourced Code Development.
§ Supply Chain Risk.
§ Data Storage Risk.
§ Human Error.
• Cybersecurity Gap Analysis
o Also known as a Security Gap Assessment. A process that evaluates an organization's current security
posture and identifies areas for improvement. Organizations can compare their current security posture to
industry-standard security frameworks and create a security baseline. One commonly used framework is the
ISO/IEC – 27002 standard, which provides best practices for Information Security Management (ISM).
§ Steps Involved in a Gap Assessment
• Gathering Information on the Organization's Current Information Security Posture.
• Evaluate the Organization's Cybersecurity Strategy.
• Identify Critical Assets, such as Networks, Systems, and Data.
• Identify Vulnerabilities.
• Assess Overall Cyber Risk and Security Risks.
• Determine if Measures are Adequate.
• Create a Plan for Improvement.
• Make Recommendations on Security Controls, Processes, and Procedures.
• Prioritize and Budget Spending.
• Risk Management
o The process of identifying, evaluating, and controlling threats, including all the phases of risk context, risk
assessment, risk treatment, and risk monitoring. Enterprises frequently use a Risk Management Framework,
or a structured approach to oversee and manage risks.
§ Useful Frameworks for Managing Risk
• NIST RMF-Risk Management Framework: A United States federal government guideline,
standard, and process for risk management to help secure information systems. Mandated
for government agencies.
• OWASP Top 10: A standard awareness document for developers and web applicahon
security. It represents a broad consensus about the most crihcal security risks to web
applicahons. Globally recognized by developers as the first step towards more secure coding.
• ISO 31000-International Standards for Risk Management Practices: A risk management
standard which focuses on IT management at the organizational level. It is very
comprehensive in terms of the risks it covers, but for qualitative analysis, it generates a total
risk metric ranging from 0-9.
Impact Planning
• Potential Impacts of Cyber Incidents
o Data Breach.
o Data Loss, Exposure or Exfiltration.
o Protected Information Disclosure.
o Theft of Financial, Physical, and Intellectual Property (IP).
o Availability Loss/ Denial of Service (DoS).
o High Recovery or Downtime Costs.
o Public Reputation Damage.
o Legal Consequences.
o Fines and Reparations.
o Identity Theft.
• Business Impact Analysis (BIA)
o Conducted before intrusion or disruption but referred to during Incident Recovery. An assessment that
identifies critical business functions, how long the business can operate without them, and what threats
exist to each. Predicts the consequences of a disruption to the business, and gathers information needed to
develop recovery strategies. Potential loss scenarios would also be identified during a Risk Assessment. The
comparison of risk and impact is used to conduct a Cost-Benefit Analysis.
§ Creating a BIA
• Identify Mission Essential Functions (MEFs) critical to sustained business operations. A
function is critical if its loss would lead to considerable revenue loss, safety risks, or failures
to comply with regulations and/or contractual obligations.
• Identify systems, resources, and other functions used by each critical function, also known
as Primary Business Functions (PBFs).
• Prioritize critical functions according to Maximum Tolerable Downtime (MTD), or how
quickly they must be restored to prevent severe damage to business operations.
• Consider Key Performance Indicators (KPIs), such as Recovery-Time Objective (RTO),
Recovery Point Objective (RPO), Mean-Time to Repair (MTTR), Mean-Time Between
Failures (MTBF), and Work Recovery Time (WRT) to assess asset reliability/recovery time.
• Identify threats that could compromise each business function.
• Determine mitigation techniques that could be used against each threat.
• Cost-Benefit Analysis
o A systematic approach to estimating whether the benefit of a control outweighs the cost it incurs or the cost
of not implementing it. Used to determine whether it is more cost-effective to replace legacy systems, patch
them, or simply accept the risk associated with using them.
§ Total Cost of Ownership (TCO): The purchase price of an asset plus the costs of operation. Assessing
the TCO requires understanding of the value of a product now and over time.
§ Return on Investment (ROI): A ratio between net income and investment. A high ROI means the
investment's gains compare favorably to its cost. As a performance measure, ROI is used to evaluate
the efficiency of an investment or to compare the efficiencies of several different investments.
§ Recovery-Time Objective (RTO): The maximum amount of time that is considered tolerable for a
service or a certain business function to be unavailable. The duration of time within which a
business process must be restored after a disaster to avoid unacceptable consequences.
§ Recovery Point Objective (RPO): The maximum amount of data that can be lost after a recovery
from a disaster or failure, before data loss will exceed what is acceptable to an organization.
§ Mean-Time to Repair (MTTR): The average time it takes to recover from a product or system failure.
§ Mean-Time Between Failures (MTBF): A measure of the reliability of a system or component,
representing the average time that it will operate before it fails.
§ Mean-Time Between Service Incidents (MTBSI): MTBF + MTTR.
System Vulnerability
• Vulnerability Assessments
o The process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the
software that runs on them. Frequently conduct vulnerability assessments to find vulnerabilities/attack
vectors and to harden the system. The goals of vulnerability assessments may be to find and mitigate the
following: Missing security controls, open ports and services not blocked by a firewall, unsecure network
protocols, weak encryption, unsecure accounts, open permissions, misconfigured security controls,
unsecure data, already-compromised systems, exploitable vulnerabilities, unpatched firmware, and
software, or system/ human configuration errors.
§ Vulnerability Types
• Zero-Day: A previously unknown system vulnerability, with the potential of exploitation
without risk of detection or prevention, because it does not fit any recognized patterns,
signatures, or methods.
• Open Permissions: There is a high statistical chance that a hacker will find an open
permission. This is increasingly common with cloud storage.
• Open Ports and Services: Manage open ports and services. Close unnecessary ports.
• Weak Encryption: Some cipher suites are easier to break than others. Stay updated with
current best practices.
• Unsecured Root Account: Protect and correctly configure root and administrator accounts.
• Unsecure Protocols: Some protocols aren't encrypted. Use the encrypted versions.
• Default Settings: Never keep the default settings, usernames, or passwords.
• Improper Patch Management: Keep firmware, operating systems, applications, and
programs updated and patched.
• Legacy platforms: May require additional security protections or firewall rules.
• Errors: These messages can provide useful information to an attacker, such as the service
type, version information, or debug data.
§ Vulnerability Scanning: Both active and passive vulnerability scans identifying security weaknesses
and flaws in systems and software running on them.
• Non-Intrusive/ Intrusive: Non-intrusive scans simply identify a vulnerability and report on it
so it can be fixed. Intrusive scans attempt to exploit a vulnerability when it is found.
• Non-Credentialed/ Non-Authenticated Scans: Do not require credentials and do not get
trusted access to the systems they are scanning. While they provide an outsider's view of an
environment, they tend to miss most vulnerabilities within a target environment.
• Credentialed/ Authenticated Scans: Require administrative access to the systems being
scanned and are performed using the same credentials and privileges as an administrator.
§ Scan Results
• True Positive: A vulnerability exists, and it was correctly identified.
• True Negative: A vulnerability was not identified, and one does not exist.
• False Positive: A vulnerability is identified that doesn't exist.
• False Negative: A vulnerability exists, but it was not correctly identified.
§ Best Practices
• Credentialed scans offer more accurate and detailed results.
• Agent-based scanning of target servers provide inside-out understanding.
• Change the perspective of the scan: External, internal, agent, and inside data center.
• Patch and update scanners regularly to avoid scanner-based vulnerabilities.
• Update the plug-ins daily to keep up with current and new threats.
• Run more intense vulnerability scans in a test environment first to avoid disrupting activity
or damaging certain content on the system.
• Vulnerability Management Process
o A Vulnerability Assessment is typically a one-time, but repeatable event. In contrast, Vulnerability
Management is a continuous, cyclical, ongoing process with several steps. There are several models tailored
to the vulnerability management process. One such model consists of five steps: Identification, Evaluation,
Remediation, Verification, and Reporting.
Identification
Reporting Evaluation
Verification Remediation
Intrusion Terminology
• Terminology
o Event: Any observable occurrence in a network or system.
o Incident/ Adverse Event: An event that actually or potentially jeopardizes the confidentiality, integrity, or
availability of an information system or the information the system processes, stores, or transmits.
o Exploit: A particular attack that exploits system vulnerabilities.
o Attacker: Also known as a threat actor, bad actor, malicious actor, or adversary. A person or a group of
people that take part in an action that is intended to cause harm to a computer, device, system, or network.
o Attack/Threat Vector: An avenue for attackers to enter a network or system. Common attack vectors
include social engineering, credential theft, vulnerability exploits, and insider threats.
o Zero-Day Attack: A previously unknown system vulnerability, with the potential of exploitation without risk
of detection or prevention, because it does not fit any recognized patterns, signatures, or methods.
o Attack Surface: The number of all possible points, or attack vectors, where an unauthorized user can access
a system and extract data. The smaller the attack surface, the easier it is to protect.
o Intrusion: A security event or a combination of events that constitutes a deliberate security incident in
which an intruder gains or attempts to gain access to a system or system resources without authorization.
o Breach: The loss of control, compromise, unauthorized disclosure, or unauthorized acquisition, where a
person other than an authorized user accesses personally identifiable information (PII), or an authorized user
accesses PII for other than an authorized purpose.
o Cyber Warfare: Use of cyber-attacks against an enemy state, causing comparable harm to actual warfare
and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage,
propaganda, manipulation, or economic warfare.
AIacks
• Attacker/ Threat Actor Types
o Hackers: Skilled in information technology and can use non-standard methods to achieve their goals.
§ Black Hat: Criminals who break into computer networks with malicious intent.
§ Grey Hat: A security expert who violates laws or ethical standards, without malicious intent.
§ White Hat: Ethical Hackers or Pen-Testers aiming to identify vulnerabilities in the current system.
o Script Kiddies: Unskilled hackers who rely on commonly available attack tools and malicious scripts.
o Hacktivists: Hackers who attack organizations to send a political or ideological message.
o Criminal Syndicates/ Organized Crime: Criminal hackers seeking financial gain, who work as a part of the
larger organization.
o Competitors: Business competitors may seek to gain access to organization secrets that will give them a
competitive business advantage.
o Insiders (Malicious and Unintentional): A threat to an organization that comes from people within the
organization, such as employees, former employees, contractors, or business associates, who have inside
information concerning the organization's security practices, data, and computer systems. Actors can be
malicious, such as disgruntled ex-employees, or non-malicious, accidental threat actors. These actors have a
much larger attack surface than external actors.
o Nation States: Typically, sophisticated, and well-resourced threats from other nations or military groups.
o Advanced Persistent Threats (APT): Ongoing series of sophisticated attacks against an organization.
o Hybrid War: Cyber techniques used alongside physical war. May include sabotaging critical infrastructure,
intelligence collecting, disseminating propaganda, or planting fake news to confuse or enrage.
• Reconnaissance
o Passive Reconnaissance: An attempt to gain information about targeted computers and networks without
actively engaging with the systems. Gathering the information without alerting the victim. If the victim host
is alerted, then it drastically decreases the likelihood that the attack will work, due to increased defenses.
o Active Reconnaissance: Gathering information by actively engaging with the targeted system.
§ Xmas Attack: A TCP packet with all flags set, a combination of options never used in routine
communication. How a remote host responds can reveal information about its inner workings open
ports. Processing such packets takes longer, making them useful in Denial of Service (DoS) attacks.
§ Null Packet: A TCP packet with no flags set, reveals information about the inner workings of a
remote host.
§ Fuzzing: Inserts random or invalid data into fields or application data input. Fuzzing attacks can
result in access, permissions, or applications failure.
§ Banner Grabbing: Sending a routine packet, such as a connection request, to a network service and
seeing what information is returned. Many services report their software and protocol version,
application identity, or other information that an attacker can use to search for known exploits.
§ Port Scanning: A technique hackers use to discover open doors or weak points in a network.
§ Side Channel: A passive, non-invasive attack to observe the operations of a device. Methods include
power monitoring, timing, and fault analysis attacks.
• Social Engineering
o The psychological manipulation of people into performing actions or divulging confidential information.
§ Phishing: A scam where attackers deceive people into revealing sensitive information or installing
malware such as ransomware. Domain-Based Message Authentication, Reporting, and Conformance
(DMARC) is an E-mail security protocol that verifies E-mail senders and helps prevent spoofing.
• Spear Phishing: Targeted Phishing.
• Whaling: Phishing with a specific high-level target.
• Smishing: SMS or Text Phishing.
• Vishing: Voice or VoIP Phishing.
§ Diversion Thel: Tricking the vichm into sending sensihve data to or sharing it with the wrong
person. The thief ojen accomplishes this by spoofing the E-mail address of someone in the vichm's
company, an audihng firm, or a financial inshtuhon.
§ Business E-mail Compromise (BEC): An E-mail-based social engineering aoack that aims to defraud
its vichms. Campaigns ojen bypass tradihonal E-mail filters.
§ Quid Pro Quo: When a social engineer offers a service, such as “tech support,” in exchange for
access to secure informahon.
§ Tailgadng/Piggybacking: An unauthorized actor gains access by following behind authorized
personnel.
§ Shoulder Surfing: Used to obtain confidential information, such as PINs, passwords, by looking over
the victim's shoulder.
§ Dumpster Diving: Finding sensitive documents or data that have been carelessly thrown away.
§ Lunchtime Attack: A user's decrypted computer is more readily available while the user is out to
lunch, or away from their desk.
o Psychological Principles of Social Engineering
§ Authority: People tend to obey authority figures, even if told to perform objectionable acts.
§ Intimidation: Attempting to intimidate a victim by trying to appear superior. This is a high-risk
strategy for an attacker and is likely to be reported by a victim.
§ Familiarity: Using charisma or likeability to get a victim to complete a request. This is a low-risk
strategy for an attacker and is unlikely to be reported by a victim.
§ Consensus/ Social Proof: Convinces a victim that the attacker can be trusted by pretending that
others would or already have trusted the threat actor or their tools and have completed a request.
§ Scarcity: Creating a false sense of urgency so the victim thinks they must act quickly or lose out.
§ Trust: The attacker assumes an alter ego that targets are expected to trust inherently.
§ Urgency: Encouraging victims to act quickly before they notice suspicious signs.
o Tactics Used By Social Engineers: The Set Up.
§ Baidng: Using a false promise to pique a vichm’s greed or curiosity.
§ Impersonation: A powerful technique in large organizations or those with frequent guests/ visitors.
§ Pre-texting: Designing a fictional scenario, or pretext, to go with an initial claim. This cover story
gives the victim reason to believe and prevents the attacker from stumbling over easy questions.
§ Information-Seeking: Via interview, interrogation, or elicitation.
§ Disinformation/ Misinformation: Disinformation aims to deceive, while misinformation involves
unintentionally repeating false claims.
§ Brand Impersonation/ Brandjacking: Involves accurately duplicating company logos and formatting
to create visually compelling fakes.
§ Scareware: Bombarding victims with false alarms and fictitious threats.
§ Honeytrap: The social engineer assumes the idenhty of an aorachve person. They then engage in a
relahonship with the vichm online to try to get sensihve informahon from them.
o Goals of Social Engineering
§ Reconnaissance: Gathering sensitive data either as a primary goal or to set up further attacks.
§ Credential Harvesting: Attacks designed to gain access to secure systems. May include the
download of a malicious file or document, that runs harvesting programs in the background.
§ Influence Campaigns: Intended to shape people's opinions about a topic.
§ Identity Fraud: Attacks to gather personal information to sell, or to commit fraud.
§ Financial Fraud: Scams conducted for financial gain.
• Malware
o Any software designed to intentionally disrupt a computer, server, client, or network, leak private
information, gain unauthorized access to information or systems, deprive access to information, or which
interferes with the user's computer security and/or privacy.
§ Malware Vectors
• Virus: Spreads within code without authorization. Classified by payload.
o Program: Targeted executable code that hides in applications.
o Boot Sector: Targeted executable code that hides in device boot programs.
o Memory Resident: Infects applications as they are opened by a user.
o Non-Resident: Can infect executable files even when programs are not running.
o Macro/ Script: Written in macro, a programming language that is embedded inside
software applications like Microsoft Office.
o Multipartite: Harms the files of computers, systems, or devices and attacks both the
boot sector and the executable files.
• Worm: Self-propagates within code, without authorization or action by the user. The best
remediation is to change the default application password.
• Trojan: A malicious program concealed within a benign one. Intended to spread malware
through an outwardly innocent vector.
o Drive-by Malware: Messages containing links to malware, or other malicious
attachments that appear benign.
o Remote Access Trojan (RAT): This attack establishes a connection which allows
remote commands to be executed. Allows an attacker to remotely control an
infected computer. Creates the ultimate backdoor, and total control of the device.
This may include screen recording, keylogging, copying files, and embedding more
malware. The best remediation is to implement a host-based IPS.
o Potentially Unwanted Program (PUP)/ Grayware: Preinstalled bloatware or
installed alongside another application. Installation may be covert.
o Easter Eggs: A form of hidden attack that exploits vulnerabilities in a system. They
are often disguised as harmless features or games, making them difficult to detect.
• Malicious Update: Update containing harmful code disguised as legitimate.
• Prepending: Links to false login sites, or misleading E-mails/ text that appear legitimate.
• Watering Hole: An attacker guesses or observes which websites an organization often uses
and infects one or more of them with malware.
o Drive-by Download: A compromised, or malicious website designed to spread
malware to its visitors.
• Logic Bomb: A piece of code intentionally inserted into software that will set off a malicious
function when specified conditions are met. Often initiated by a malicious insider.
• Removable Devices
o Malicious Flash Drive: Also called a BadUSB or USB Key Drop. Can allow a victim to
steal stored passwords, gain access to sensitive files, or directly open a backdoor to
gain control of a device. In rare cases, it may even damage the device so badly that
it can no longer be used.
o Malicious USB Cable: Any cable that performs an unwanted function. The most
common malicious capabilities are found in USB cables. Data exfiltration, GPS
tracking, and audio eavesdropping are primary malicious functions.
o Human Interface Device (HID): Takes advantage of external devices, usually
connected via USB, to maliciously run commands on a computer or device.
• Evasive Malware
o Low-Observable Characteristics (LOC) Attacks: A type of stealth attack that evades
detection by most security solutions and impacts forensic analysis efforts.
§ Stealth Malware: Has an intelligent architecture, making it difficult to
detect and eliminate from a computer system.
§ Polymorphic/ Metamorphic Malware: The code intelligently changes itself
every time it runs, so it appears differently and is difficult to catch, but the
function of the code stays the same.
• Polymorphic Engine: A software component that alters the payload
of polymorphic code, while preserving the same functionality.
§ Retrovirus: An anti-anti-virus virus; It attacks and disables any anti-virus or
protective software on the system it is trying to infect, to avoid detection.
§ Fileless Malware: Exploits remote execution and memory residence to
deliver malicious payloads. May run from a script or Trojan, and/or use a
shell code to create backdoors or download additional tools. They gain
persistence through the registry, and live off the land, via built-in tools.
§ Rootkit/ Kernel Driver: A collection of computer software, typically
malicious, designed to enable access to a computer or an area of its
software that is not otherwise allowed and often masks its existence or the
existence of other software. Modifies core system files. They can reside in
firmware and resist attempts to remove it by formatting drives and
reinstalling the OS.
§ Advanced Volatile Threats (AVT): An advanced kind of cyberattack where
the malicious code does not need to reach its victim's hard drive to deliver
its payload. Traditional antivirus solutions depend on the presence of a file
on the hard drive. That makes this attack particularly more potent than the
related Advanced Persistent Threat (APT).
§ Shim: Intercepts information passing between hardware and operating
systems.
§ Refactor: Rearranges code. Can intelligently redesign itself so it appears
differently each time it is loaded.
§ Malware Payloads
• Ransomware: Locks user out by replacing shell and denies access until payment is made.
o Crypto-Malware: High-impact ransomware that encrypts data files or drives.
o Crypto-Mining/ Crypto-Jacking: Hijacking resources to mine cryptocurrency.
• Command and Control (C2): A more advanced form of malware that uses automated
processes to establish and maintain remote control of an infected system.
o Backdoor Malware: Negates normal authentication procedures to access a system.
As a result, remote access is granted to resources within an application, such as
databases and file servers, giving perpetrators the ability to remotely issue system
commands and update malware. Alternatively, an attacker embeds hidden access in
an internally developed application that bypasses account login. In the second
example, the best remediation would be to conduct a code review.
o Beaconing: When malware periodically calls out to the attacker's C2 server to get
further instructions on tasks to perform on the victim machine.
o Bots/ Zombies: A computer or device infected with malware that is controlled
remotely by a hacker. Zombies may be used to launch online attacks or send spam
or phishing E-mails to infect other devices.
• Adware: Software that generates revenue for its developer by automatically generating
online advertisements in the user interface of the software or on a screen presented to the
user during the installation process.
o Spam: Aggressive form of unsolicited advertising.
o Spam over VoIP (SPIT): Unsolicited calls initiated by Voice over Internet Protocol
(VoIP) systems. The spammer attempts to initiate a voice session and if the receiver
answers, they play a recorded message. Robocalls can be delivered automatically
using telephony software.
o Spam Over Instant Message (SPIM): A type of spam targeting users of instant
messaging services, SMS, or private messages within websites.
o Hoaxes: A threat that doesn’t exist but appears as though it could be real. These can
take the form of false virus alerts, E-mails, memorandums, chain letters, attempts at
spreading false information, wasting time, or causing panic.
o Influence Campaigns: Fake news sites or spreading false news with bot accounts.
o Deep-Fake Technology: Synthetic media that have been digitally manipulated to
replace one person's likeness convincingly with another. Fake audio, video, or faces.
§ Malware Indicators
• Antivirus Notifications.
• Overt Ransomware Notification.
• Changes to File Systems or Registry.
• New Temporary Files.
• Browser Changes.
• Sandbox Execution.
• Resource Utilization or Consumption.
• Evidence of Compromised Software or Firmware.
• Forced Access Attacks
o Card Cloners: Hardware-based attack where a cloner can read ID, credit, ATM, or gift cards and produce a
working facsimile.
o Skimmers: Attached to ATMs and appear to be a normal part of the machine. They capture the user's card
information and PIN. May include a small camera. Digital skimmers use a similar principle but work by
inserting scripts into website login pages or online payment forms.
o Transitive Trust: Machine A trusts Machine B and Machine B trusts Machine C. Therefore, Machine A can
attack Machine C, and Machine C will automatically trust the attack.
o Transitive Access: Occurs when a user is inadvertently given advanced access to another part of the
application or system on which it is hosted.
o Password Cracking: The process of finding, recovering, and decrypting scrambled passwords.
§ Brute Force: Trying every possible password in systematic order until the right one is found. Brute
force can theoretically crack any password, but it is impractically slow against long passwords.
§ Password Spraying: An attack, usually dictionary-based, which targets many different usernames on
the same system at one time. By trying a short list of common passwords against many accounts, an
attacker can increase the chance of finding a user with a weak password.
§ Dictionary Attack: Uses a word list, such as a literal dictionary, or list of common passwords
downloaded from the Internet. Dictionary attacks won't find random character strings, but they
work well against the word or name-based passwords many users choose.
§ Credential Stuffing: A kind of dictionary attack where the dictionary is made up of stolen usernames
and password pairs from another compromised system. Like password spraying, the attacker targets
many accounts at once. Makes use of the fact that many people use the same username and
password across multiple systems or sites.
o Password Hash Cracking
§ Birthday Attack: Attacks that exploit hash collisions in weaker hashing and digital signature
algorithms, allowing increased cracking speed.
§ Rainbow Attack: The ability to crack large numbers of hashes at once by using a precomputed table
containing a long list of possible hash values, along with the passwords behind them.
§ Pass the Hash: In Single Sign-On (SSO) systems, an attacker can compromise one system and steal its
stored hashes. The attacker can then present the stolen hash to access resources on another
computer, instead of using credentials.
§ Collision Attacks: Exploits weak hashing functions to create the same hash for different inputs.
o Golden Ticket Attacks: A technique that allows a malicious actor to gain unrestricted full access to an Active
Directory (AD) domain by creating a fake Kerberos Ticket Granting Ticket (TGT).
o Silver Ticket Attacks: Using a silver ticket, an attacker can create multiple Ticket-Granting Service (TGS)
tickets for a specific service without communicating with a Domain Controller (DC) in a network. Not full
access but still useful for an attacker.
• Denial of Service (DoS) Attacks
o Denial of Service (DoS): Rendering a computer or other device unavailable to its intended users by
interrupting the device's normal functioning.
o Distributed Denial of Service (DDOS): Flooding a server with Internet traffic, usually from several different
devices, to prevent users from accessing connected online services and sites.
§ Bot/ Zombie: A computer that has been infected with malware, allowing for remote control.
§ Botnet: A group of devices, each of which runs one or more bots/zombies. An attacker sends
multiple SYN packets from multiple sources. The best remediation is to enable DDoS protection.
§ Smurf Attack: Large numbers of Internet Control Message Protocol (ICMP) packets with the victim's
spoofed source IP are broadcasted to a computer network using an IP broadcast address.
§ Fraggle Attack: A DoS attack that involves sending a large amount of spoofed UDP traffic to a
router's broadcast address. It is very similar to a Smurf Attack, which uses spoofed ICMP traffic
rather than UDP traffic to achieve the same goal.
§ Ping Flood: Overwhelming the victim with ICMP echo request packets. This is most effective by using
the flood option of ping which sends ICMP packets as fast as possible without waiting for replies.
§ Ping of Death: Occurs when an attacker crashes, destabilizes, or freezes computers or services by
targeting them with oversized data packets.
§ SYN Flood: Rapidly initiating a connection to a server without finalizing the connection.
§ Amplified SYN Flood: Spoofing the victim’s IP address and attempting to open connections with
multiple servers. Those servers direct their SYN/ACK responses to the victim.
§ Resource Exhaustion: Exploits that crash, hang, or otherwise interfere with the targeted program or
system. May only require one device with low bandwidth.
§ ZIP Bomb: A 42-kilobyte compressed .zip file, that when decompressed, expands to 4.5 petabytes
(4,500 terabytes).
§ DHCP Starvation: The attacker floods a network with IP address requests. The MAC address changes
each time. The DHCP server eventually runs out of addresses to allocate.
§ Oversized Packet Attacks: The attacker sends packets that are too large for the network to handle
efficiently. This can cause network congestion, degrade performance, and system crashes.
§ Packet Drops Attack/ Black Hole Attack: A malicious user manually or through software gains
unauthorized access to a router and configures it to drop packets instead of forwarding them.
§ Operational Technology (OT) Attack: A DoS against embedded systems. Can be more vulnerable to
mis-crafted packets than computing hosts.
§ Distributed Reflected Denial of Service (DrDoS): Occurs when attackers compromise computers to
send multiple simultaneous requests to their chosen target. They redirect or reflect their requests to
the victims' systems before they are sent to a selected website, server, application, or computer.
• Eavesdropping Attacks
o Packet Sniffing: Technique that involves collecting data packets that travel through an unencrypted
computer network. Packet sniffers monitor the data packets in network traffic, to intercept sensitive
information, like personal financial details, to sell or use in other attacks.
o On-Path/ Man-in-the-Middle (MiTM): Attackers place themselves between two devices (often a web
browser and a web server) and intercept or modify communications between the two. The attackers can
then collect information as well as impersonate either of the two agents.
§ Replay: The attacker intercepts data transmissions, especially those with authentication credentials
or encryption key exchanges, then delays or resends them. Replaying allows the attacker to disrupt
legitimate communications, gain authorized access, or both.
§ Session Replay: A type of replay attack targeting secure websites. An attacker with a stolen session
ID can take over an existing but idle session, without having login credentials. Relies on header
manipulation.
§ Session Hijacking/ Sidejacking: Similar to session replay except the attacker takes over the session
immediately after the client logs in. Relies on header manipulation.
§ Downgrade: The attacker interferes with the initial connection set up to force legitimate clients into
using weak or no encryption.
§ SSL Stripping: An on-path attack intended to bypass secure connections that use SSL/TLS encryption,
such as HTTPS.
§ Browser-Based: On-path attack where a Trojan or other spyware infects the web browser, then
either modifies the page that the user views or the actions the user takes.
§ On-Path/Man-in-the-Browser: Compromises the browser in ways that inspect session data, change
browser settings, perform redirection, or perform code injection.
o Spyware: Any software with malicious behavior that gathers information about a person or organization,
using recording devices and screenshots, and sending it to another entity. Harms the user by violating their
privacy or endangering the device's security. May also redirect DNS queries, track cookies, or install adware.
§ Keystroke Logger/ Keylogger: Recording the keys struck on a keyboard, typically covertly, so that a
person using the keyboard is unaware that their actions are being monitored. Data can then be
retrieved by the person operating the logging program. The attacker uses hardware to remotely
monitor a user's input activity and harvest credentials. The best remediation would be to implement
Two Factor Authentication (2FA) using push notifications.
§ Data Exfiltration: A form of data theft that occurs when malware and/or a malicious actor carries
out an unauthorized data transfer from a computer. It is also commonly called data extrusion or
data exportation.
• Spoofing Attacks
§ IP Spoofing: Alters the source IP address used to route packets on IP networks. It is often used to
impersonate another device on the network.
§ MAC Spoofing: Alters the source MAC address used to identify physical devices on local networks. It is
defined in hardware but can be changed in software.
§ MAC Cloning: A form of MAC Spoofing used to impersonate another device on the same network by copying
its MAC address. MAC Cloning can be useful in defeating some forms of Network Access Control (NAC).
§ MAC Flooding: A form of MAC Spoofing used to compromise the security of a switch by spoofing many MAC
addresses to override its MAC table cache. Can be used to assist eavesdropping or redirection attacks.
§ E-mail Spoofing: Altering the sender’s E-mail address. Frequently used in phishing attacks. Domain-based
Message Authentication, Reporting, and Conformance (DMARC) is an E-mail security protocol that verifies E-
mail senders and helps prevent E-mail spoofing.
§ Caller-ID Spoofing: Spoofs the origin of a telephone call. A common feature in vishing attacks.
§ Reflected Attack: Makes use of a potentially legitimate third-party component to send the attack traffic to a
victim, ultimately hiding the attackers' own identity.
§ Header Manipulation: Changing values and headers used by a communication protocol, either directly used
by an application or by the underlying network layers. MAC and IP Address Spoofing are examples of Header
Manipulation, as are Xmas Attacks and other non-standard flag use. Session Hijacking attacks frequently rely
on TCP header manipulation as well.
• Re-Direction Attacks
o ARP Poisoning: Using spoofed ARP messages to alter the ARP cache of a target host or switch, associating
the given IP address with the physical device of the attacker’s choice. The attacker can then silently
eavesdrop, actively modify data in transit, or block network traffic entirely. ARP only works on the local
network segment, so ARP Poisoning can generally only be performed by inside attackers.
o DNS Poisoning: Compromising or impersonating a DNS server to modify the DNS cache of a target host or
DNS server, to associate a legitimate host or domain name with an IP address of the attacker’s choice.
o Pharming: Redirecting a website's traffic to another fake site by installing a malicious program on the
computer. Can be conducted either by changing the host files on a victim's computer or by exploiting a
vulnerability in DNS server software.
o URL Redirection: Attackers can manipulate compromised pages or poorly designed sites and redirect users
to malicious sites that install malware or perform credential theft. Often used in phishing attacks.
o URL Hijacking/Typo Squatting: Also called a Sting Site or Fake URL. A type of Cybersquatting, and potentially
Brandjacking, which relies on user typing mistakes. Registering a URL that is close to that of a legitimate site,
but with a misspelled word or typo. This sends people to malicious sites if they make that typing error.
o Domain Hijacking: Re-registering an expired domain name or compromising the account that controls one.
An attacker can then redirect traffic from the original site to an imitator.
o DNS Sinkhole/ Blackhole DNS: A DNS that hands out incorrect IP addresses. Used to redirect all traffic for a
given domain name to a specific monitored server. Can be used to redirect users to a malicious site.
o Clickjacking: Once on a redirected page, clickable content is hidden under seemingly normal content.
Actions (clicking) may share information with the malicious party.
o VLAN-Hopping: Compromising the protocols used to define and control VLANs and diverting traffic to the
wrong VLAN, exposing it to attack.
• Application Attacks
o Directory/ Path Traversal: Accessing directories on the target machine that regular clients do not. Also
known as the Dot Dot Slash (../) Attack, Directory Climbing, or Backtracking.
o Privilege Escalation: Gaining increased privileges within an existing session. For example, accessing
administrator-only commands from an ordinary user account.
§ Vertical: An increase of privileges/access beyond what a user or application already has.
§ Horizontal: Gaining access to the rights of another account, human or machine, with similar
privileges. This action is referred to as account takeover.
o Improper Error Handling: Error messages that leak information and provide attackers with attack options.
o Improper Input Handling: Input handling describe functions such as validation, sanitization, filtering, or
encoding/decoding of input data. Improper Input Handling is a leading cause of critical vulnerabilities that
exist in today's systems and applications.
o Memory Manipulation: Sending input into a program that will affect variables in memory, either to produce
unexpected behavior or to crash the application in a Denial of Service (DoS) attack.
§ Buffer Overflow: Sending too much information in a request will cause an application to overfill the
buffer and further overflow into adjacent memory. Overflows can allow arbitrary code execution.
Mitigations include Address Space Layout Randomization (ASLR), and Data Execution Prevention
(DEP), both of which will cause service crashes, prevent code execution, and alert an administrator.
§ Integer Overflow: Causes applications to calculate values that are out-of-bounds. Doesn't spread
into other memory. It just makes the number wrap-around, causing undesired behavior.
§ Memory Leaks: Coding errors can cause an application to allocate memory but never release it. The
resulting leak of system memory eventually consumes so much memory that the application or host
crashes. An attacker can exploit memory leaks as a Denial of Service (DoS) attack.
§ Resource Exhaustion: Spawning activity to use up CPU time, system memory allocation, fixed disk
capacity, and/or network utilization.
o Code Injection Attacks: A broad term for sending specially formatted input that will be processed by some
sort of command interpreter within the web application or its host machine.
§ Arbitrary Code Execution: Executing code on a remote computer, also known as Remote Code
Execution.
§ Command Injection: When an application allows data to be passed to a command shell on a server,
an Injection attack can execute operating system commands. This isn't an attack against the
application or database, but it is a way into the server itself. Especially used in conjunction with
Directory Traversal or Privilege Escalation.
§ SQL Injection: A code injection technique used to attack data-driven applications, in which malicious
Structured Query Language (SQL) statements are inserted into an entry field for execution.
• Unfiltered Escape Characters: If an input field includes special characters used by SQL or the
scripting language, they might be mistaken for a command. Well-designed applications use
escaping techniques to encase or substitute those characters so that it is clear that they're
data, rather than code. Poorly implemented techniques allow for code injection.
• Improper Input Types: Applications should check that any data inputs are the right type. If
the application is too trusting, an attacker could enter a string of numeric data either to
generate a useful error or to alter the query.
• Stacked Queries: Appending additional forged queries into the original legitimate one. A
semi-colon tells SQL that the query is over, and a new one is beginning. Since the following
query can be anything the attacker wants, it's a powerful technique.
• Blind Injection: Securely designed production servers hide SQL error messages from end
users to prevent attackers from gaining information. Blind Injection attacks use statements
that should create verifiable changes in page output, or perform time-insensitive operations
that creates a server delay.
• Signature Evasion: More sophisticated attacks carefully format queries to avoid matching
IDS signature files, while still behaving identically on the server.
§ NoSQL Injection: An attacker can inject arbitrary text into NoSQL queries. NoSQL Injections are very
similar to the traditional SQL Injections, except that the attack is against a NoSQL database.
§ Lightweight Directory Access Protocol (LDAP) Injection: An attack used to exploit web-based
applications that construct LDAP statements based on user input.
§ eXtensible Markup Language (XML) Injection: Any technique used to manipulate or compromise
the logic of an XML application or document.
• XML External Entities (XXE): Any attack that exploits a common XML parser feature. XML is
a tagged markup language designed to be both human and machine-readable.
§ Dynamic Link Library (DLL) Injection: Inserting executable code into a running process from a
shared library file. It is frequently used as a malware vector or payload but can also be triggered by a
Buffer Overflow attack against a web application. It can also be used for Privilege Escalation.
§ Application Programming Interface (API) Injection: Sending an API malicious commands through a
user input field, whether a text input, file upload, or other means.
o Cross-Site Scripting (XSS): An attacker injects malicious executable scripts into the code of a trusted
application or website. Attackers often initiate an XSS attack by sending a malicious link to a user and
enticing the user to click it.
§ Stored/Persistent: The attacker uploads a script to the server, where it can be viewed as content on
a vulnerable web page. It is usually placed where a typical user can add content, such as a comment
field, message forum, or social media.
§ Reflected/Non-Persistent: This occurs when a malicious script is reflected off of a web application
to the victim's browser.
§ Document Object Model (DOM)-Based: The attack payload is executed as a result of modifying the
DOM environment in the victim's browser used by the original client-side script so that the client-
side code runs unexpectedly.
o Cross-Site Request Forgeries (XSRF): An attack on a session between a user and a legitimate web server.
This attack begins with a link to an attacker's site. The page has hidden code that instructs the victim's
browser to make requests to another server.
§ Server-Side Request Forgery (SSRF): Malicious exploit of a website or web application where
unauthorized commands are submitted from a user that the web application trusts.
o Null Pointer Dereferencing: Pointers are used in C/ C++ to refer to memory locations. Dereferencing occurs
when the program tries to read or write the location via the pointer. An attacker can cause a vulnerable
application to dereference to a null or invalid pointer. Doing so might crash the application, bypass a
security function, or return useful debug information.
o Race Conditions: A bug that generates errors or corrupts data. Can compromise security controls, or an
attacker can deliberately manipulate one. Execution depends on timing and sequence of events.
o Bogus DNS/NTP Queries: Queries can be constructed to generate large response packets. Attackers then
direct the responses to the victim.
• OWASP Top 10 Web Application Security Risks (2023)
o OWASP Top 10 is a standard awareness document for developers and web application security. It represents
a broad consensus about the most critical security risks to web applications. Globally recognized by
developers as the first step towards more secure coding.
Detec6on Terminology
• Terminology
o Indicators of Attack (IoA): Forensic signs that typically surround a cyberattack. Finding them warns that such
an attack is likely to be in progress.
o Indicators of Compromise (IoC): An artifact observed on a network or in an operating system that, with high
confidence, indicates a computer intrusion has already taken place.
o Security Audits: An independent review and examination of system records, activities, and documents
related to an organization’s security posture.
o Data Analysis: The process of collecting data, then organizing it, and presenting it in a way that provides
useful insights.
o Data Analytics: Applying business or technical knowledge to create formal algorithms that can process the
data further and extract hidden information that simple analysis won't reveal.
o Artificial Intelligence/Machine Learning: Enables computers to simulate human intelligence and behavior.
o Scripting: Automation of activity through programs, scripts, and scripting languages.
o Automation: The process of automatically detecting, investigating, and remediating cyber threats, with or
without human intervention, using a programmatic solution specifically designed for this purpose.
o Orchestration: Allows for easy sharing of information. It also enables multiple tools to respond to incidents
as a group, even when the data is spread across a large network and multiple systems or devices.
o Penetration Testing/ Ethical Hacking: An authorized attempt to gain unauthorized access to a computer
system, application, or data. Carrying out an ethical hack involves duplicating the strategies and actions of
malicious attackers.
o Active Defense: Proactive approach to cybersecurity. This involves predicting the attacker’s actions and
setting relevant traps to detect a wide range of attacks with precision and speed. Uses tactics like bogus DNS
entries, web server decoys, and fake telemetry to raise attack costs and tie up adversary resources.
o Counterintelligence: Activities designed to prevent or thwart spying, intelligence gathering, and sabotage by
an enemy or other foreign entity.
Decepdon Strategies
Honeypot A service or computer configured to act as a decoy, aPrac@ng aPackers.
Honeynet Network of honeypots used to lure aPackers to study their ac@vi@es.
Honey Files Seemingly important files located on a honeypot.
Honey Tokens Fic@@ous words/records added to legi@mate databases. If data is stolen,
these allow admins to iden@fy who it was stolen from or how it was leaked.
Fake Telemetry Similar to honey files. Contains decoy data that can be used to en@ce
aPackers while capturing data on and about the aPack
Breadcrumbs Can be in the form of cookies, registry values, files, mounted drives, and ARP
table values, all with fake creden@als and data. Breadcrumbs should be
strategically placed in order to be effec@ve with decoys.
Bogus DNS Records False DNS records to lure an aPacker.
Decoy Realis@c lures, such as domains, databases, directories, servers, apps, files, or
Directories/Resources creden@als, alongside real network assets.
Disrup'on Strategies
Port Spoofing Relies on using Secure Shell (SSH) protocol on non-standard ports.
DNS Sinkhole/ A DNS that reports incorrect IP addresses. Redirects all traffic for a given
Blackhole DNS domain to a specific monitored server. An aPacker may redirect users to a
malicious site. A defender may redirect malicious domains to a benign
address, while watching the malicious address. Users hiWng the malicious
address could indicate devices infec@on.
Darknet The dark web is an encrypted part of the Internet not indexed by search
engines and needs specific authoriza@on to access.
Proac've Programs
Bug BounCes An ongoing formal offer of name recogni@on or financial reward to any
individual who finds a soIware bug or security exploit in a specific website
applica@on or other product.
Phishing Campaigns Simulates a phishing aPack to monitor how employees respond. Sending a
suspicious E-mail and tracking data for the company over @me.
Response Terminology
• Terminology
o Incident Response: The technical procedures by which an organization handles a data breach or
cyberattack. It is an effort to quickly identify an attack, minimize its effects, contain damage, and remediate
the cause to reduce the risk of future incidents.
o Incident Handling: Management procedures that include planning, coordination, and communication
before, during, and after an incident. Incident Response and Incident Handling should work closely together
as two halves of the same operation but should be treated distinctly.
o Incident Recovery: Used to designate specific roles, establish staff hierarchy, and prioritize tasks in the wake
of a serious cyberattack or data breach. This is a multi-staged process that requires the cooperation and
dedication of the entire IT staff.
o Digital Forensics: A branch of forensic science encompassing the recovery, investigation, examination, and
analysis of material found in digital devices, often about mobile devices and computer crime.
Incident Response
• Incident Response Plan (IRP)
o A written document, formally approved by the senior leadership team, that helps the organization before,
during, and after a security incident.
• Incident Response Teams
o Computer Incident Response Teams (CIRTs) or Computer Security Incident Response Teams (CSIRTs) assist
with investigating the incident, assessing the damage, collecting evidence, reporting the incident, and
initiating recovery procedures. They also participate in the remediation and lessons learned stages and help
with the root cause analysis.
§ CIRT/CSIRT Responsibilities
• Determine the amount and scope of damage caused by the incident.
• Determine whether any confidential information was compromised during the incident.
• Implement procedures to restore security and recover from any incident-related damage.
• Supervise the implementation of any additional security measures necessary to improve
security and prevent recurrence of the incident.
• Incident Response Process
o Preparation
§ Develop Policies Approved by Management.
§ Identify Critical Data and System Single Points of Failure.
§ Train Staff on Incident Response (IR).
§ Implement an Incident Response Team.
§ Identify Roles and Responsibilities.
§ Practice Incident Identification via Simulation.
§ Plan the Coordination of Communication Between Stakeholders.
o Detection and Analysis
§ Monitor All Possible Attack Vectors.
§ Identify Precursors: Log Files and Alerts Often Warn of Potential Problems.
§ Analyze Incidents Using Known Data and Threat Intelligence.
§ Prioritize Incident Response.
§ Standardize Incident Documentation.
o Containment, Investigation, Eradication and Recovery/ Reconstitution
§ Choose an Appropriate Containment Strategy.
§ Isolate the Attack.
§ Gather Evidence.
§ Identify the Attacker.
§ Eliminate the Root Cause of the Incident.
§ Prevent Immediate Recurrence.
o Post Incident Activity/ Follow-Up
§ Reconstitution: A Phased Approach to Recovery After a Breach.
§ Apply Vulnerability Mitigations.
§ Identify Evidence that Must be Retained.
§ Document Lessons Learned.
o Incident Reporting
§ Write a Brief Overview and Summary of the Nature and Scope of the Incident.
§ Present a Timeline of the Incident, Including When it Began and Ended.
§ Compile a List of Personnel Involved in the Response Process.
§ Cite the Root Cause of the incident.
§ Provide a Detailed List of Actions Taken in the Response Process.
§ Document Remaining Vulnerabilities and Possible Actions that Could Prevent a Recurrence.
§ Document Evidence Gathered During the Response Process, as Well as How it Will be Retained.
Incident Recovery
• Business Continuity Plan (BCP)/ Continuity of Operations Plan (COOP)
o A document including an analysis of risks to business operations, controls to mitigate them, and the
proactive development of procedures to restore business operations after a disaster or other significant
disruption to the organization. The capability of an organization to continue service delivery at pre-defined
acceptable levels. A well written BCP should include preventative, corrective and recovery controls.
§ Components of a Business Continuity Plan (BCP)
• List of the BCP team members, including multiple contact methods and backup members.
• Immediate response procedures and checklists, such as security and safety procedures, fire
suppression procedures, and notification of appropriate emergency response agencies.
• Notification systems and call trees for alerting personnel that the BCP is being enacted.
• Guidance for management, including designation of authority for specific managers.
• How and when to enact the plan.
• Contact numbers for critical members of the supply chain, such as vendors, customers,
possible external emergency providers, and 3rd party partners.
§ Continuity of Operations Plan (COOP): Refers to similar activities but in government agencies.
Procedures for moving critical operations to a temporary site during disaster recovery.
• Site Resilience/ Redundancy/ Fault-Tolerance
o Hot Sites: A fully functional backup site that already has data mirrored.
o Cold Sites: Provides power, networking capability, and cooling, but no other
hardware.
o Warm Sites: Contains all elements of cold sites but adds storage hardware. Still
requires data to be transported should a disaster occur.
• Restoration Order
o Power Delivery Systems.
o Switch Infrastructure and Routing Appliances.
o Network Security Appliances.
o Critical Network Servers.
o Back-End and Middleware (Verify Data Integrity).
o Front-End Applications.
o Client Workstations and Devices.
o Client Browser Access.
• Information System Contingency Plan (ISCP)
o Procedures for restoring individual information systems after a disaster or for maintaining partial function
during the recovery process.
• Crisis Communication Plan (CCP)
o Procedures for communications in the event of a disaster. Crisis Communication Plans should coordinate (in
advance of a crisis) internal communications, to aid in recovery efforts and define a single authority for
providing information to or answering questions from customers or outside organizations.
• Succession Plan (SP)
o Procedures for managing sudden changes of personnel. They should identify essential employee roles within
the organization and identify/train replacements to step in should those roles suddenly become open. They
should also define a clear Chain of Command during disaster recovery.
• Functional Recovery Plan (FRP)
o A step-by-step guide for going from an outage to being back up and running. FRP's are assessed through
walkthroughs, tabletop exercises, functional exercises, and full-scale exercises.
• Disaster Recovery Plan (DRP)
o Process of maintaining or reestablishing vital infrastructure and systems following a natural or human-
induced disaster, such as a storm or war. It employs policies, tools, and procedures.
§ Disaster Types
• Environmental/ Natural.
• Person-Made/ War.
• Malicious/ Accidental Insiders.
• Malicious Outsiders/ Adversaries.
§ Components of a Disaster Recovery Plan (DRP)
• Critical disaster recovery team members must have checklists to guide their actions amidst
the chaotic atmosphere of a disaster.
• IT personnel must have technical guides to help them get alternate sites up and running.
• Managers and public relations personnel must have simple, high-level documents to help
them communicate the issue accurately without requiring input from other team members.
§ Information Needed to Create a DRP
• System Documentation: Network diagrams, facility blueprints, system configurations, user
credentials, and software activation keys.
• Reserve Resources: Replacement parts, redundant systems, and alternate sites, which can
repair or replace the affected resource.
• Vendor Lists: Vendors and suppliers for equipment that may need to be replaced and
procedures or contracts needed for quick replacement of critical components.
• Alternate Practices: Procedures allowing business needs to be met during recovery,
especially regarding regulatory requirements.
• Backup Policies: Procedures for creating and safely storing backups that can be restored in
case of system or data loss.
• Recovery Procedures: Detailed procedures for assessing, containing, and repairing damage
to critical systems, as well as for restoring those that cannot be repaired.
• Restoration Order: A list of what functionalities should be restored, in which order,
following a disaster. Business criticality is an integral part of restoration order. It should also
consider dependencies between functions or the duration and difficulty of specific tasks.
• Personnel List: Responsibilities and contact information for the members of recovery teams.
• Emergency Contacts: Contact information for relevant parties, such as upper management,
utility companies, or emergency services.
Digital Forensics
• Digital Forensics
o A branch of forensic science encompassing the recovery, investigation, examination, and analysis of material
found in digital devices, often related to mobile devices and computer crime.
§ RFC 3227-Guidelines for Evidence Collection and Archiving: A set of best practices for the
acquisition, analysis and reporting of digital forensics.
§ Forensics Concepts
• Due Process: Procedural safeguards that ensure fairness in forensic investigations and trials.
• Legal Hold: Also known as a litigation hold. The process organizations use to inform relevant
parties, such as Data Custodians, that they must preserve data for anticipated litigation.
• Chain of Custody: A chronological paper trail that records the sequence of custody, control,
transfer, analysis, and disposition of materials, including physical or electronic evidence.
• Admissibility: Not all data can be used in a court of law. There are different rules for
different jurisdictions. Factors that influence admissibility are obtaining legal authorization
for search and seizure, using proper scientific procedures and tools, and the verification of
the technical and academic qualifications of the experts.
• E-Discovery: Legal Discovery where the information sought is in an electronic format. Filters
relevant evidence from forensic examination data for use as trial evidence. Tools assist in
deduplication, search, tagging, security and disclosure of evidence.
• Provenance: A chain of custody for data handling that guarantees authenticity and integrity.
• Order of Volatility: Prioritizing the collection of the most volatile data first. By collecting the
most time-sensitive or easily changed evidence first, the chances of losing it are minimized.
o CPU registers and cache memory.
o Routing tables, ARP cache, process tables, and kernel statistics.
o Other RAM contents, browsing history, clipboard data, encryption keys, and
command history.
o Swap files/ page files and other temporary file systems.
o Other data on hard drives, disks, or flash media, such as OS files, logged-in users,
open ports, processes currently running, and attached device list.
o Network and remote monitoring and logging data.
o Security and authentication logs for all affected systems and accounts.
o System and application logs representing host activity.
o Memory dump files from hosts or applications.
o Web, DNS, and other network logs.
o SIP traffic, call manager logs, and other VoIP records.
o Data and metadata on mobile devices, such as phone calls, contact information, text
messages, E-mails, images, movies, date, time and GPS location.
o Virtual Machine (VM) Snapshots and Images.
o Firmware data.
o Physical configuration and network topology.
o Other artifacts found in log information, flash memory, prefetch cache files, recycle
bin, browser bookmarks, and browser logins.
o Analyze the USB device history log.
o Vulnerability scan results.
o External data, such as surveillance feeds and physical sensor data.
o Archival media, such as optical discs or printouts.
§ Forensics Process
• Determine what data needs to be collected. If unsure, it's better to collect too much than
too little. Include any information placed on a legal hold by involved parties. If information
outside of the organization's control is relevant, then coordinate with an attorney to
establish a legal hold on it. Verify that the gathered information will answer any questions
(who, what, where, why, and how) later in the investigation.
• Secure physical and remote access to any systems or data relevant to the investigation
before they can be accidentally or deliberately altered.
• Document the scene whether physical or digital, as it was found. Document any known
changes made during containment or before the area was fully secured. Take pictures of the
scene and the evidence collected.
• Use forensic backup software to make disk images, copy memory, or save configuration
files. Include unallocated space and slack space. These applications will preserve valuable
information that conventional backup software will not.
• Back up the image. Ensure the integrity of evidence by avoiding alterations during
acquisition. Use write blockers to prevent changes to source data or metadata. Create a
hash of files submitted to evidence.
• Conduct a File Integrity Check. This is done with an application that can verify that the files
have not been modified using a hash algorithm to authenticate the file.
• Use analysis tools for password cracking, file carving, and memory/ cryptographic analysis.
• Include mobile device, cloud, virtualization and container forensics.
• Secure the confidentiality, integrity, and authenticity of the findings.
• Consider the use of a Faraday Cage: Used in electronic labs, where stray EM fields must be
kept out. This is important for testing sensitive wireless receiving equipment. Also good to
prevent signals from being sent to mobile devices during a forensic investigation.
• For a formal investigation, observe the chain of custody, legal holds, and standards for the
preservation of data. For an ordinary investigation, just make sure that the collection is
accurate and doesn't cause any security leaks.
• Consider timestamp calculation methods to account for potential clock synchronization
issues. Record offsets between local and UTC time.
• Hashing for Integrity, Data-Continuity and Non-Repudiation
o Message Digest: A fixed-size numeric representation of the contents of a message, computed by a hash
function. A message digest can be encrypted, forming a digital signature.
o Check Digit: One or more digits (or letters) computed by an algorithm from the other digits (or letters) in the
sequence input. With a check digit, one can detect simple errors in the input.
o Checksum: A digital fingerprint of a piece of data that can be used to check that it is an unaltered copy.
o Cryptographic Nonce: Random or pseudo-random numbers that authentication protocols attach to
communications. Sometimes these numbers include a timestamp to intensify their fleeting nature.
§ Initialization Vector (IV): A type of nonce used for randomizing and encryption schemes. Used in
encryption ciphers, WEP, and some SSL implementations.
§ Salt/Pepper: A pepper is similar to a salt, or a random bit of data is added to the password before
it's hashed. But unlike a salt, it's not kept in the database along with the hash value. Instead, it's
usually hard coded into the website's source code.
o Hash Functions
§ Message Digest 5 (MD5): Widely used hash function producing a 128-bit hash value. Has collisions.
§ Secure Hash Algorithm (SHA-1): Produces a 160-bit hash for the same input.
§ Secure Hash Algorithm 2 (SHA-2): Produces 224 to 512-bit hashes. A 256-bit hash is most common.
§ Secure Hash Algorithm 3 (SHA-3): Six hash functions with digests (hash values) that are 128, 224,
256, 384, or 512 bits. Newer, more secure, but slower. SHA3-256 is the most widely used algorithm.
Secure Applica6ons
• DevOps/ DevSecOps
o DevOps: A set of practices that stress the collaboration of developers and IT operations teams, to form an
environment where software can be rapidly developed, tested, and released in a mostly automated process.
Primarily focused on increasing the speed and quality of software development and delivery.
o DevSecOps: Aims to secure the software development process by integrating security early and throughout
the software development life cycle. Developers and operations teams work together.
• Software Lifecycle Models
o Waterfall: Breaks the software lifecycle up into consecutive phases, one after the other. The first formal
description of this model describes six steps.
§ Requirements: Determining what the software's function and usability requirements will be, along
with the hardware and resources that will be required to run and support it.
§ Analysis: Working with stakeholders to turn their requirements document into a product model
with enough detail to begin system design.
§ Design: Creating detailed frameworks and algorithms for how the application will achieve its
functional and usability goals. The design phase maps out the application’s look and feel, chooses
the technologies used to develop it, and breaks it up into components that can be coded separately.
§ Development: Coding individual modules and integrating the application into a functional whole.
§ Testing: A systematic process of finding and removing software bugs and verifying that the
application meets stakeholder requirements.
§ Maintenance: Deploying and maintaining the application through the remainder of its use.
o Agile: Follows an iterative or incremental model. Instead of a monolithic project, development is broken up
into many successive iterations, that each add a little bit more to the product. Each iteration is a new
software version with the same phases, requirements, and testing. Not all of them will be deployed into
production, but each can be shared across teams and with stakeholders. This method allows fast delivery
and constant user feedback and is well-suited to online or cloud distributions, where frequent software
updates aren't difficult. It is more difficult to track documents and ensure that design principles, including
security, remain sound throughout.
o Spiral: Uses repeated development iterations like Agile, but the goal isn't to have a rapidly developing
product. Instead, the spiral model uses repeated prototyping cycles to create a mature end-product. It also
incorporates risk management into every iteration.
o Continuous Integration/Delivery: These methods aspire to an ideal where software is continually being
improved yet can be released into production at any time.
§ Continuous Integration (CI): The practice of merging code changes to the main branch several times
a day. Designed to prevent integration conflicts caused by multiple developers making independent
changes to their working copies of the same code. To prevent merging bad code, CI relies on
automated testing and building processes, maintaining a test environment, and ensuring each
change is committed as a single operation. Everything is orchestrated into a single workflow.
§ Continuous Delivery (CD): The practice of developing software that can be reliably released at any
time without additional preparation. Typically, it relies on short development cycles, geared towards
frequent, even daily, releases into production.
§ Continuous Deployment (CD): A further extension to continuous delivery, which automates and
orchestrates the entire release process, from committing code to deploying production software. No
human intervention is required.
§ Continuous Validation (CV): Adds a validation package as an additional output to the CI/CD pipeline.
It contains evidence that all mandated development practices were followed during the
development process, to allow easy auditing.
§ Continuous Monitoring (CM): Adds automated processes to monitor the performance of the
application and its environment. It is especially important as a final quality safeguard in DevOps
environments, where code is pushed into production environments as quickly as possible.
• The Secure Development Lifecycle
o Core Security Training: Ensuring that all personnel directly involved are trained appropriately for their role.
o Requirements: Establishing security and privacy requirements and performing risk assessments.
o Design: Establishing design requirements, analyzing the attack surface, and performing threat modeling.
o Implementation: Creating the documentation and tools needed to compile and deploy the program,
establishing best practices for development, and analyzing code before it's compiled.
o Verification: Performing dynamic testing and compiling code to verify that it meets security requirements
defined in the previous phases.
o Release: Performing a final security review, designing incident response procedures, archiving all relevant
data, and finally releasing the product itself to users.
o Response: Executing an Incident Response Plan (IRP) for any security or privacy incidents that arise within
the deployed software.
• Quality Control
o Concerned with ensuring that the created product is fit for usage. It focuses mostly on the quality of the
product/service given to clients during or after software deployment.
§ Quality Control Steps
• Quality Test: A process organizations use to ensure their products and services meet
specified regulations and standards.
• Quality Assessment: Assessment of the precision and accuracy of the data, after analysis.
• Quality Audit: Conducted to check the causes of poor quality, corrective action taken, and
the confirmation or verification activities undertaken related to quality.
• Quality Evaluation: A quality management activity in which another individual, typically a
supervisor or someone from the QM team, scores the product or process based on key
criteria defined in a quality form.
• Application Programming Interfaces (API)
o A set of standards, protocols, and tools for building software. How external entities interact with a service.
§ Simple Object Access Protocol (SOAP): A strict and secure way to build APIs, that encode data in
XML. Used for standardized, protocol-based communication requiring high security and reliability.
§ Representational State Transfer (REST): An architectural style and an approach for communication
used in the development of web services. More flexible and allows applications to exchange data in
multiple formats.
• Other DevSecOps Concepts
o Immutable Systems: Deploying systems or other infrastructure as a monolithic instance that can be
replaced by the next iteration, but not modified or upgraded. Immutable systems are locked and unable to
change. To update a component, the entire platform must be updated. Immutability prevents the process of
upgrading from introducing unforeseen vulnerabilities.
o Baseline: A documented, lowest level of security configurations allowed by a standard or organization.
o Benchmark: A checklist of potential vulnerabilities in a piece of software along with the configuration
settings used to mitigate them.
o Compiled Code: Code that is optimized by an application and converted into an executable.
o Runtime Code: Code that is interpreted as it runs.
o Code Reuse: The use of old code to build new applications via copy-paste. If the old code has security
vulnerabilities, reusing the code spreads it to other applications.
o Dead Code: A section in the source code that is executed but the result is never used in any other
computation. All code, especially unnecessary code, is an opportunity for a security problem.
o Transitive Access: Occurs when a user is given access to another part of the application or system.
Developers must ensure that the application does not allow access in the event of a crash or malfunction.
o Infrastructure as Code (IaC): Writing code that can automate the provision or configuration of
infrastructure, such as servers and network appliances, so that a new iteration can be deployed rapidly and
with minimal chance of error. Orchestration tools automate sequences of tasks such as provisioning and
configuring Virtual Machines (VMs).
o Function-as-a-Service (FaaS): Serverless architecture where applications are separated into individual
autonomous functions. Developers can still create server-side logic. Can run in a stateless compute
container without an operating system. May be event triggered or ephemeral. May only run for one event.
Managed by a third-party.
ISC/SCADA Systems
• ISC/SCADA
o Industrial Control Systems (ICS): An electronic control system and associated instrumentation used for
industrial process control.
o Supervisory Control and Data Acquisition (SCADA): Developed to monitor state changes in large-scale
distribution systems, such as electrical grids, waste control systems, and transportation.
§ Industrial Control Systems (ICS) are often managed via a Supervisory Control and Data Acquisition
(SCADA) system that provides operators with a Graphical User Interface (GUI) to easily observe the
status of a system, receive alarms, enter system adjustments, and manage processes. Typically runs
as software on ordinary computers. Gathers data from and manages plant devices with embedded
PLCs (field devices) and uses WAN communications like cellular or satellite to link field devices.
o Distributed Control System (DCS): Designed to extend process control systems in refineries and other
industrial plants, while remaining within the confines of a single operation. It offers more real-time control
than SCADA but has less tolerance for unreliable networks.
Security Controls
Security+ 701 Study Guide
By: Krystal Ballew
Network Security
• Physical Controls
o Physical Redundancy and Backups: Remove single points of failure and create fault tolerance.
§ Power Distribution Units (PDU): A power strip connected to ethernet for better control and
monitoring of power usage across the network.
§ Power Conditioner: Improves the quality of power that is delivered to electrical equipment.
§ Backup Power Supplies: Provides fault tolerance in the event of an electrical outage. Useful for data
center, operations, and network security.
• Backup Gas Powered-Generator: Also known as a natural gas generator. A portable piece of
equipment that converts fuel into electricity. Used for backups and in natural disasters.
• Dual Power Supplies: Can be used as a backup power supply for mission-critical equipment.
• Uninterruptible Power Supply (UPS): A type of continual power system that provides
automated backup electric power when the input power source fails.
§ Protected Distribution System (PDS): Metal cable and fiber protectors that prevent cable and fiber
taps or cuts. All data flows through physically secured conduits. Requires periodic visual inspection.
§ Electromagnetic Shielding: A method of using conductive or magnetic materials to create a barrier
around electronics and cables to protect them from Electromagnetic Frequencies (EMF).
• Electrostatic Discharge (ESD): A sudden and momentary flow of electric current between
two differently charged objects when brought close together.
• Electromagnetic Interference (EMI): A disturbance generated by an external source that
affects a circuit by electromagnetic induction, electrostatic coupling, or conduction.
• Radio Frequency Interference (RFI): An electrical disturbance within the radio frequency
spectrum.
• Electromagnetic Pulse (EMP): Also called a Transient Electromagnetic Disturbance (TED), it
is a brief burst of electromagnetic energy or pulse.
o Anti-Static Wrist Strap: Used when troubleshooting hardware, replacing parts, or
taking apart a device, to provide grounding. This protects the technician from shock
and preserves the components of the device, and data on them.
o Personal Protective Equipment (PPE): Insulated clothing or rubber gloves to
prevent shock.
o Faraday Cage: Used in electronic labs, where stray EM fields must be kept out. This
is important in the testing of sensitive wireless receiving equipment. Also good to
prevent signals from being sent to mobile devices during a forensic investigation.
o Physical Network Segmentation: Minimizing the attack surface of a network through physical means such
as port security and isolation. Making it more difficult for a successful attack of one component or computer
to spread throughout the network.
§ Hardware and Vendor Diversity: Choosing hardware and appliances from more than one vendor
provides fewer attack surfaces and eliminates single points of failure.
§ Port Security: Disable unused physical ports on network devices/appliances (especially switches).
§ Air Gap: A security measure that involves isolating a computer or network and preventing it from
establishing an external connection. A network where the devices are physically separate from one
another and don't share any components to communicate. Also describes the physical space
between facilities, server rooms, and networks.
§ System Isolation/ Containment: A security measure taken in the event of attack, to prevent the
spread of malware, or other malicious action. Involves physically disconnecting the system from the
rest of the LAN, and disabling wired, and wireless connectivity.
• Logical Controls
o Logical Network Segmentation: Also known as Virtual Network Segmentation. Dividing a network into
smaller, more manageable sections using software. This can be done through subnetting, Virtual Local Area
Networks (VLANs), or network addressing schemes.
§ Security Zones: Internal security topology based on network segmentation and access control.
Different zones for different levels of trust and access control requirements.
§ Micro-Segmentation: A network security approach that constructs security zone boundaries per
machine in data centers and cloud deployments, to segregate and secure workloads independently.
Allows an organization to limit which business functions, units, offices, or departments can
communicate with each other, and enforce the concept of least privilege.
§ De-Perimeterization: Focuses on protecting specific assets instead of network boundaries. Essential
due to the prevalence of cloud, remote work, mobile devices, outsourcing, and wireless networks.
§ Virtual Local Area Networks (VLANs): Using switches to create software-based LAN segments,
which can segregate or consolidate traffic across multiple switch ports. Devices that share a VLAN
communicate through switches as if they were on the same Layer 2 network. Broadcast traffic is
limited to the VLAN, reducing congestion, and reducing the effectiveness of some attacks.
§ Screened Subnet: Previously called a Demilitarized Zone (DMZ) or Perimeter Network. Refers to the
use of one or more routers as a firewalls to define three separate subnets: An external router, that
separates the external network from a perimeter network, and an internal router that separates the
perimeter network from the internal network. Acts as a neutral zone between an organization's
internal network and the Internet. Separates public-facing servers from sensitive internal resources.
Hosts web, E-mail, DNS or FTP services accessible from the Internet but isolated from internal
systems to limit damage from breaches. Firewalls control traffic to and from the Screen Subnet,
providing an additional layer of protection.
• Dual Firewalls (DMZ): This implementation uses two firewalls to create a DMZ.
• Intranet: Only available internally.
• Extranet: Accessed by trusted business partners or others who need access to hosted data
or services but who should not get access to the entire private network. It is commonly
accessed through a VPN.
• Bastion Hosts: Dedicated server that lets authorized users access a private network from an
external network.
• Three-Homed Firewall: A network architecture where a single firewall is used with three
network interfaces, creating segmentation.
• Jump Server: Also called the Jump Box or Secure Admin Workstation (SAW). A highly secured
steppingstone from one zone to another. From a workstation in a corporate network, log
into a jump server. Access the DMZ without directly exposing the workstation to the DMZ.
• Out-of-Band Management: Ensure a separate network for administrative access. Enhances
security by limiting direct access to administrative interfaces.
§ Subnets: A logical subdivision of an IP network. The practice of dividing a network into two or more
networks is called subnetting.
• Network Address Translation (NAT): A logical measure to map multiple private IP addresses
inside a local network to a single public IP address before transferring the information onto
the Internet. Saves IPv4 address space.
• Port Address Translation (PAT): Similar to Network Address Translation (NAT). It permits
multiple devices on a LAN to be mapped to a single public IP address to save address space.
Found on a router or virtual switch, primarily in SOHO networks.
• Source Network Address Translation (SNAT): Used when most traffic comes from internal
systems, such as internal client workstations connecting to Internet servers. It helps security
by making it harder for outside attackers to contact internal hosts, but it also makes it
harder to run server applications.
• Destination Network Address Translation (DNAT): Used when traffic is generally initiated
by external systems, such as intranet clients connecting to local servers. It requires pre-
configured address assignments for internal servers.
• Common Address Redundancy Protocol (CARP): Allows multiple hosts on the same network
segment to share an IP address.
o Network Appliances (Hardware-Based)
§ Port Mirrors: Copies network packets from one switch port to another switch port's network
monitoring connection. It's also known as Switched Port Analyzer (SPAN) or traffic mirroring. Limited
functionality but can work for light traffic.
§ Network Taps: A hardware device that performs Port-Mirroring. Sends a copy of network packets
from one switch port (or an entire VLAN) to a network monitoring connection on another port.
§ Sensors: Monitors data in different locations on the network and sends that data to a central
location (like a SIEM) for storage, viewing, and analysis. Can be hardware or software and can be a
component of a different network appliance, such as a switch, firewall or router. Place on the inside
of a firewall, or close to a critical server to detect malicious traffic.
§ Collectors: Hardware or software that receives, stores, and preprocesses network monitoring data,
especially in the context of NetFlow analysis. Works with data from proprietary consoles, SIEM
consoles, syslog servers, Intrusion Prevention Systems (IPSs), and firewalls.
§ Correlation Engines: Compares and corresponds data collected from the sensors to determine if an
attack is present. Often built into a SIEM.
§ Wrappers: A hardware, software, or network appliance that intercepts all communications meant
for a legacy or deprecated device and handles security for it. Comparable to adding a complete
Firewall/Antivirus/IDS solution to a system that cannot otherwise run them.
§ Switches: A hardware or virtual component that connects devices on a network, allowing them to
communicate and share resources.
• Virtual Local Area Network (VLANs): Switches can create software-based LAN segments,
which can segregate or consolidate traffic across multiple switch ports. Devices that share a
VLAN communicate as if they were on the same Layer 2 network. Broadcast traffic is limited
to the VLAN, reducing congestion, and reducing the effectiveness of some attacks. VLANs
can be configured based on switch port, IP subnet, MAC address, and protocols. VLAN IDs
(2- 4,094) are assigned, enabling different ports on the same switch to belong to different
VLANs. Routers are required for VLANs to communicate
o Security Concerns
§ Collision Domains: Data collisions may occur.
§ Broadcast Domains: All broadcasts are forwarded.
§ VLAN Hopping: Attacks where a host on one VLAN can gain access to traffic
in another, that would normally not be accessible.
o Security Features
§ ARP Inspection: A security feature for Address Resolution Protocol (ARP).
Checks all ARP packets on untrusted interfaces and compares them to the
DHCP snooping database and/or an ARP access list.
§ Spanning Tree Protocol (STP)/ Rapid Spanning Tree Protocol (RSTP):
Prevents broadcast storms, unstable MAC tables, loops, and collisions.
• STP States
o Blocking: Preventing a loop.
o Listening: STP determines whether the port should
participate in frame forwarding or not.
o Learning: Learns MAC addresses before entering a
forwarding state.
o Forwarding: The interface will forward Ethernet frames,
enabling data transmission.
• Loop Protection/ Loop Guard: Prevents loops from forming on
unmanaged switches.
• Bridge Protocol Data Unit (BPDU) Guard: Disables ports if
unwarranted BPDUs are sent.
• Root Guard: A port cannot be selected as the root port. It is
assigned an alternate port role and enters a blocking state.
§ Port Security: Tracks device MAC addresses connected to each port on a
switch and can allow or deny traffic based on MAC address. Can prevent
unauthorized devices from joining the network, or block attacks that rely on
MAC spoofing.
§ MAC Filtering: Prevents physical connections from neighboring MAC
addresses. Security Through Obscurity.
§ DHCP Snooping: Excludes rogue DHCP servers and blocks malicious or
malformed DHCP traffic.
§ Broadcast Storm Control: The switch intentionally stops broadcast traffic if
the bandwidth consumed exceeds a designated threshold.
§ Flood Guard: Limits the devices that can communicate through a switch
interface. Protects against Denial of Service (DoS) and SYN Flood attacks.
§ MACsec Encryption: A security protocol that guards against network data
breaches by encrypting traffic between Ethernet-connected devices.
§ Routers: A device that connects networks and allows devices to share an Internet
connection. Usually connected to a modem and acts as a central hub, directing data packets to their
intended destinations. Can also provide network security features and allow wireless setup.
• MAC Address Filtering: Block, allow, or filter traffic through the router based on the
hardware MAC address of the device.
• Access Control Lists (ACLs): Protect against spoofing by blocking Martian Packets with
unusual source addresses and/or packets arriving on invalid interfaces.
§ Firewalls: Hardware or software devices. Rules consist of a source address, source port, destination
address, destination port, and an action that determines whether to Allow or Deny the packet.
• Access Control Lists (ACLs): Firewalls are based on an implicit deny rule and must specify
which traffic should be allowed. Rules are processed top to bottom with the most specific
rule first. Implicit deny is the default rule, often listed at the bottom, even if not specified.
o Whitelists/ Blacklists: Allow List/ Block List. Can explicitly block or allow a range of
IP addresses on the network. Any rules listed will create a log.
o Firewall-Based Content Filter: Controlling the Internet content users can access.
o Port Filtering: A feature in which packets that are ingressed through a certain
source port can be blocked from egressing on a specific set of ports.
§ Block all unnecessary Ports and Protocols.
§ Use Private Ports where possible.
§ Use secure versions of Protocols.
§ Block Port 23 for Telnet.
• Dynamic Packet Filtering: A Screen that sits between the client and a server, that examines
each data packet as it arrives. Based on information in the packet, the state retained from
previous events, and security policy rules, the Screen will either pass the data packet
forward, or block and drop it.
• North/South Traffic: Network traffic flowing into (South) and out of (North) a data center.
o Ingress: Refers to traffic that originates from outside a network. Devices and tools
that offer logging and alerting opportunities for Ingress Monitoring are:
§ Firewalls.
§ Gateways.
§ Remote Authentication Servers.
§ IDS/IPS Tools.
§ SIEM Solutions.
§ Anti-Malware Solutions.
o Egress: Data shared externally via a network's outbound traffic. Egress Monitoring is
used in conjunction with Data Loss Prevention (DLP) and Data Leak Protection.
These solutions inspect all data leaving the organization, including E-mail contents
and attachments, copy to portable media, File Transfer Protocol (FTP), posting to
web pages/websites, applications, and Application Programming Interfaces (APIs).
• East/West Traffic: Network traffic among devices within a specific data center. Requires a
different security posture than North/South traffic.
• Firewall Types
o Stateless Firewalls: Older and does not keep track of traffic flows. Needs more rules
because it doesn’t remember active sessions.
§ Packet Filtering Firewall: The earliest network firewall configured using ACL
rules. It is Stateless in that it does not preserve information about network
sessions. Each packet is analyzed independently. Vulnerable to attacks
spread over multiple packets. Can introduce traffic flow problems, especially
with load balancing or dynamically assigned ports. Considered deprecated.
§ Transparent Firewall Mode: The firewall acts as an L2 device, not an L3.
o Stateful Firewalls: Tracks information about established sessions between hosts.
Incorporates stateful inspection capabilities by storing session data in a state table.
Checks incoming packets against existing connections in the state table. Once a
connection is allowed, traffic usually passes unmonitored to conserve processing
effort. Remembers sessions and traffic flows and needs fewer rules.
§ Layer 3 Firewall: A type of firewall that operates on Layer 3 of the Open
Systems Interconnection (OSI) model.
• Routed Firewall Mode: Considered a L3 device. It supports multiple
interfaces with each interface on a different subnet. It can perform
Network Address Translation (NAT) between connected networks.
§ Layer 4 Firewall: Examines the TCP 3-Way Handshake to distinguish new
connections from established connections. Can track UDP traffic and detect
IP headers and ICMP anomalies, such as a SYN without an ACK.
§ Layer 7 Firewall/Web Application Firewalls (WAF): Also known as an
Application Layer Firewall, an Application-Aware Firewall or Deep Packet
Inspection. A specific firewall that filters, monitors, and blocks HTTP traffic
to and from a web service. Verifies that the application protocol matches
the expected port. External traffic is filtered by a traditional or Next
Generation Firewall (NGFW) first. Designed to protect web servers and back-
end databases from Code Injection and Denial of Service (DoS) attacks. Can
apply rules to API communication to help prevent API injection. Can be
deployed as an appliance or plug-in software.
§ Next-Generation Firewall (NGFW): Also called Application Layer Gateway,
Stateful Multilayer Inspection, or Deep Packet Inspection. Third-generation
firewall technology, combining a conventional firewall with other network
device filtering functions. Can contain Intrusion Detection System (IDS),
Intrusion Prevention Systems (IPS), Content Filtering, Web Proxy, Anti-Bot,
Anti-Malware, Virtual Private Network (VPN), and Identity and Access
Management (IAM) functionality.
• Deep Packet Inspection: A type of data processing that inspects the
data being sent over a computer network in detail, and may take
actions such as alerting, blocking, re-routing, or simply logging it.
• Other Firewall Deployments
o Zero Trust: By default, no one is trusted from inside or outside the network.
Verification is required from everyone trying to gain access to resources. This added
layer of security has been shown to prevent data breaches.
o Virtual Wire Firewall: A firewall that is transparently installed on a network
segment by binding two firewall interfaces together. Can be stateless or stateful.
o Three-Homed Firewall: A network architecture where a single firewall is used with
three network interfaces, creating network segmentation.
o Dual Firewalls (DMZ): This implementation uses two firewalls to create a DMZ. The
first firewall, called the Front-End Firewall, must be configured to allow traffic
destined for the DMZ only. The second firewall, called a Back-End Firewall, only
allows traffic from the DMZ to the internal network.
§ Network Intrusion Detection Systems (NIDS): Monitors and evaluates network activity to detect
attacks or event anomalies. A single NIDS can monitor large networks by using remote sensors to
collect data at key locations, which send data to a central management console. These sensors can
monitor traffic at routers, firewalls, and switches that support port mirroring. NIDSs can detect the
initiation of an attack or ongoing attacks, but they can't provide information about the success or
effects of an attack, nor can they monitor the content of encrypted traffic.
• Passive Monitoring: Examines a copy of traffic via a port mirror or network tap.
• Out-of-Band Response: IDS sends RESET frames to stop subsequent frames but cannot block
the first frame.
• Stateful Protocol Analysis: Methods that use Deep Packet Inspection (DPI) to examine traffic
by comparing a profile of how the protocol is supposed to work. Can detect many attacks
signature-based methods won't, but it's only as good as the profiles it uses and doesn't work
well with poorly documented proprietary protocols.
• Signature-Based: Methods that look for behavior characteristics of known attacks. A
signature list might include a specific malformed packet used by a Telnet attempt into a root
account. Signature-based methods are excellent at stopping known attacks, but they'll miss
anything that's not on the list.
• Anomaly-Based: Heuristic methods that look for behavior that seems unusual relative to a
normal baseline. Heuristic detection rules are challenging to design and rely on a large set of
baseline data to be accurate. Their main advantage is the ability to identify dangerous zero-
day attacks against undetected vulnerabilities.
§ Network Intrusion Prevention Systems (NIPS): Automatically detects and blocks attacks before they
reach target systems. All traffic must pass through the NIPS. Rules are based on implicit allow and
must specify which traffic to block. It is common to see NIPS function integrated into firewalls.
• In-Line Monitoring: All traffic must flow through the appliance.
• In-Band Response: Can monitor and block traffic on the spot.
• Stateful Protocol Analysis: Methods that use Deep Packet Inspection (DPI) to examine traffic
by comparison to a profile of how its protocol is supposed to work.
• Signature-Based: Methods that look for behavior characteristics of known attacks.
• Anomaly-Based: Heuristic methods that look for unusual behavior relative to a baseline.
§ Network Detection and Response (NDR) Solutions: Also called Network Traffic Analysis (NTA), or
Network Analysis and Visibility (NAV). Analyzes behavioral heuristics. Uses machine learning and
data analytics to compare baselines and known good behavior to anomalous behavior. Unusual
behaviors generate a report or alert.
§ Proxy Servers: Sits between users and the external network. Receives the user’s request and sends
the request on their behalf. Also receives the response, evaluates the response, and sends the result
back to the user. Can control much of the traffic flow. Performs Application Layer filtering,
deconstructs packets, performs analysis, and rebuilds packets according to rules.
• Forward Proxy: An internal proxy, used to control internal access to the Internet.
• Reverse Proxy: Protects inbound traffic from the Internet to the internal servers.
• Transparent Proxy: Operates like a Forward Proxy but doesn't require any special client
configuration. Commonly used on large enterprise networks. Sometimes called a Forced
Proxy because the client doesn't choose whether to use them.
• Application Proxy: Receives requests intended for another server and acts as the proxy to
obtain the requested service. An application proxy server is often used when the client and
the server are incompatible for direct communication.
• Anonymous Proxy: Usually hosted on the Internet and masks the client's original IP address
from the server. Security concern.
• Open Proxy: Uncontrolled and available to anyone. Can circumvent security protocols.
• Jump Server: Also called the Jump Box or Secure Admin Workstation (SAW). A highly secure
steppingstone from one zone to another.
• Content Distribution Networks (CDNs): Geographically distributed network of proxy servers
and their data centers. Provides High Availability (HA) and performance by distributing the
service relative to end user. Can come with Distributed Denial of Service (DDoS) mitigation.
§ Load Balancers: Distribute a set of tasks over a set of resources, to streamline processing. Can
optimize response time and avoid unevenly overloading some compute nodes, while other compute
nodes are left idle. Also increases hardware redundancy and data availability. Load Balancers use
heartbeat or health check probes to verify the availability and the load of each node.
• Active/Active: All redundant servers are always available and sharing the load. If one fails,
its workload is distributed to the remaining nodes. Most load balancers are active/active.
This utilizes maximum capacity but may degrade performance during a failover.
• Active/Passive: In addition to any active nodes, there are one or more failover nodes that
are left on standby. When a node fails, a new node becomes immediately activated. Ensures
no performance impact during failover.
• Load Testing: Validates system performance under expected or peak loads.
• Failover Testing: Validate easy transition between primary and secondary infrastructure.
• Monitoring System Testing: Validates effective detection and response to failures/issues.
• Load Balancing Modes: A method of distributing network traffic or workloads across
multiple resources, to reduce the strain on each resource and improve performance.
Round Robin Client requests are forwarded to each server, in turn, going
down the list of servers in a group.
Weighted Round Robin Each server in a pool is given a fixed numerical weight so client
requests are forwarded in a particular order.
Dynamic Round Robin The numerical weight assigned to servers is assigned based on
the server’s current load and idle capacity.
Active Balancing Divides workload among multiple nodes based on availability.
Source Affinity/ Sticky Directs all requests from a particular end user to a specific
Session/ Session Persistence server, which preserves data that might otherwise be lost.
• Types of Load Balancers
o Layer 4 Load Balancer: Makes forwarding decisions based on IP address and
TCP/UDP ports. They also conduct basic connectivity tests and health checks.
o Layer 7 Load Balancer/ Content Switch: A higher layer router that uses Network
Address Translation (NAT) to split server requests between multiple identical servers
that share a single virtual IP address. Used to direct requests for specific types of
content to targeted servers by way of load-balancing virtual servers. Makes
forwarding decisions based on Application-Level data such as URLs or data types like
video or audio streaming. Can test an application state when doing a health check.
• Clustering: Load Balancing distributes traffic, while Clustering provides fault tolerance by
enabling multiple redundant nodes to share data and accept connections. Clustering
ensures continuity of service by allowing connections to fail over to working nodes.
§ AAA Servers: Controls access to resources, enforces policies, and audits usage. Identification
creates unique user IDs. Authentication proves that the user is who they claim to be. Authorization
proves that the user is allowed access the resource. Accounting includes logging and audit methods.
• Remote Authentication Dial-In User Service (RADIUS): Authentication and authorization.
Members of one organization can authenticate to the network of another organization using
their normal credentials. Only encrypts the passwords. Centralized authentication for users
logging in to routers, switches, firewalls, VPNs, servers, and 802.1x. Works well with VPN
Concentrators. Available for any server operating system. The client is a Network Access
Server (NAS), which prompts a user for credentials and then relays user (supplicant)
authentication requests to the RADIUS server, which responds with an acceptance or
rejection. Uses UDP, over ports 1812 (Authentication and Authorization) and 1813
(Accounting). Supports protocols like PAP, CHAP, and EAP for authentication. Not as
versatile as LDAP for authorization.
• DIAMETER: Next-generation industry-standard protocol used to exchange Authentication,
Authorization, and Accounting (AAA) information in Long-Term Evolution (LTE) and IP Multi-
Media Systems (IMS) networks. An evolution of RADIUS.
• Terminal Access Controller Access-Control System (TACACS): A family of protocols that
provides remote authentication in a server environment. Each server on the network
submits individual authentication requests to the centralized server, even though there's a
common authentication database. Now considered obsolete, with the advent of TACACS+.
o TACACS+: More recent version. Supports more authentication requests and
response codes. Encrypts entire access request. Centralized logins for administrative
accounts on network appliances. It offers advantages such as TCP-based
communication, encryption of all data, and discrete Authentication, Authorization,
and Accounting functions. No SSO functionality.
o XTACACS (Extended TACACS): CISCO proprietary tool that has additional support for
Accounting and Auditing. Now obsolete.
• Kerberos: Authentication through a cryptographic ticket-granting service. Allows for Single
Sign-On (SSO). Authenticate once, and the device is trusted by the system. Users can gain
access to multiple resources with one authentication. Still requires individual servers to
maintain the access databases. Works well in Microsoft environments.
o Authentication Service/ Server (AS): Users log in to initiate the authentication
process. The AS directs the login process through multiple Kerberos servers.
o Key Distribution Center (KDC): The AS passes the login request to the KDC, which
issues the user a Ticket-Granting Ticket (TGT). The TGT has a timestamp and time
limit. The KDC encrypts the ticket to make it harder to duplicate or impersonate.
o Ticket Granting Service (TGS): After the KDC issues the user ticket, the user can log
on to any network server that supports Kerberos.
§ Unified Threat Management (UTM) Solutions: A single hardware or software installation that
provides multiple security functions, including anti-virus, content filtering, E-mail, web filtering, and
anti-spam. Potential single point of failure, and high latency under a heavy load.
§ VPN Concentrators: A hardware device that manages VPN traffic for multiple users, allowing secure
remote access a network. Can also be built into a firewall. Encrypts and decrypts communication.
§ Hardware Security Models (HSM): High-end cryptographic hardware that stores and generates
encryption keys and offloads CPU overhead for cryptographic processing from other devices.
§ SSL/TLS Accelerators: Device on the edge of the network used to offload processor-intensive public-
key encryption for Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), to a
hardware accelerator. Useful because the SSL handshake is CPU-intensive, and time consuming.
§ Distributed Denial of Service (DDoS) Mitigators: Sits between the network and the Internet and
identifies and blocks DDoS attacks in real-time.
o Network Appliances (Software-Based)
§ Syslog: A standard by which network devices can send logs to a shared server for centralized
compilation. The server can be configured to send alerts when notable events occur. Any network
device can operate as a client, logging operational events and sending them to the syslog server.
• Severity Level: An essential concept for event logging. Syslog defines eight levels ranging
from emergency messages about severe error conditions, to detailed information on
everyday activities that can be used to troubleshoot applications.
§ Bandwidth Monitors: Provides fundamental network statistics and monitors the percentage of
network use over time. Helps identify issues. There are many different ways to gather this metric,
such as NetFlow, IPFIX, sFLOW, and other software agents, such as protocol analyzers.
• NetFlow: A standard collection method that gathers traffic statistics from all flows and
shared communication between devices. Uses probes and collectors, where probes watch
the network communication, and summary records are sent to the collector.
• IP Flow Information Export (IPFIX): A newer NetFlow-based standard that evolved from
NetFlow v9. Includes flexible data support and uses templates to describe the data.
• Sampled Flow (sFLOW): Not technically a network traffic flow analyzer as it only looks at a
portion of the actual network traffic. This is usually embedded in infrastructure such as
switches and routers. Sampling usually occurs in hardware.
• Protocol Analyzers: Gather packets on the network or in the air, sometimes built into a
device. View detailed traffic information, identify unknown traffic, verify packet filtering and
security controls, and view a plain language description of the application data.
§ Security Information and Event Management (SIEM) Tools: Aggregate and correlate log data from
various sources (hosts, switches, routers, firewalls, IDS sensors etc.) across the enterprise to better
understand potential security concerns and apportion resources accordingly. Creates alerts for
system administrators to respond to. Combines event, threat, and risk data into a single system to
improve the detection and remediation of security issues and provide an extra layer of in-depth
defense. Configure SIEM to aggregate appropriate data sources, develop correlation rules, and
display alerts, status indicators, and trend analysis, via a dashboard.
• Detecting Threats
o Rules: Based on fixed criteria. When an event matches the rule, a specific action is
taken. Rules can be written or write themselves.
o Correlations: Based on more open-ended criteria using elaborate Boolean Logic and
wild card terms. A correlation can recognize a broader range of incidents than a
rule, but it is more likely to produce false positives.
o Models: Evaluate events using machine learning algorithms, allowing advanced
analytics. Useful for detecting unknown threats that rules and correlations cannot.
• SIEM Notifications
o Trend: The aggregate result of many minor events on the network that do not need
individual responses but form a meaningful pattern when taken as a whole.
o Alert: A low-priority notification regarding an event that may or may not need an
administrator response and isn't immediately critical.
o Alarm: A high-priority notification of a critical or ongoing incident requiring a
prompt response.
• Data Sources
o Network Traffic Log Files: Monitors the flow of traffic through switches, routers,
access points, VPN concentrators, and other infrastructure. Logs routing updates,
authentication issues, and network security events. Includes Intrusion Detection
data and protocol flow statistics.
o System Log Files: OS/file information, authentication details, and security events,
such as the detection of monitoring apps, brute force attempts, or file changes.
o Application Log File: Specific to the application, such as DNS, web, or VoIP.
o Security Log Files: Detailed security-related information, such as blocked and
allowed traffic flows, exploit attempts, blocked URL categories, or DNS sinkhole
traffic. Includes monitoring of security devices, such as Intrusion Prevention Systems
(IPSs), firewalls, and proxy servers.
o Web Log Files: Detailed log of all web server access, including any access errors,
exploit attempts, start-up and shut-down notices, or restart messages.
o DNS Log Files: View lookup requests and other DNS queries. See the IP address of
the request. Identify queries to known bad URLs, including malware sites, and
known Command and Control (C2) domains. Lock or modify known bad requests at
the DNS server. Log the results and report on malware activity.
o Authentication Log Files: Know who logged in or who didn't. Identify multiple
failures and potential brute force attacks. Correlate with other events, such as file
transfers, authentications to other devices, and installed applications.
o Dump Log Files: Stores all memory into a diagnostic file. Useful for developers.
o VoIP and Call Manager Log Files: View inbound and outbound call information,
endpoint details, gateway communication, and security information. Includes
Session Initiation Protocol (SIP) traffic logs, such as call setup, management, and
tear-down, and alerts on unusually numbered country codes.
o Host Log File: Network, system, security, and vulnerability scan outputs.
§ Security Orchestration Automation and Response (SOAR): A group of cybersecurity technologies
that allow organizations to respond to certain incidents automatically. These often integrate Cyber
Threat Intelligence (CTI) feeds and can act as the remediation and response engine to SIEM alerts.
Best used for Incident Response (IR) and Threat Hunting.
• User and Entity Behavior Analytics (UEBA): Uses Machine Learning and Data Analytics to
compare current Baselines and known good behavior to anomalous behavior. Unusual
behaviors generate a report or alert. Monitors use, performance, security, and trends.
o Runbooks: A set of conditional steps that must be performed as part of any security
process, such as log review, vulnerability scanning, or Incident Response (IR). A set of
rules that can be largely automated. While it may involve a human element, little
human intervention is needed. Often used to automate features such as Threat
Response, Threat Intelligence Enrichment, and other activities that the platform can
orchestrate on its own. These rules are generally condition-based, so instead of
following a step-by-step pattern, they are triggered by pre-set conditions.
o Playbooks: A looser workflow or checklist that is used to organize or document a
security response process. Step-by-step actions that occur in the SOAR process
itself. Focuses on assisting security analysts in responding to large incidents or those
heavily reliant on human decision-making. These actions typically need to be
performed by humans, so playbooks serve as a definitive guides to ensure that any
documentation, required reporting, or other mandated actions that require human
involvement and decision-making, occur exactly when they should.
§ Network Access Control (NAC): A network security component, usually installed as a software agent
on an endpoint. A critical component of both network and endpoint security. Unifies endpoint
security, user and system authentication, and network security. When someone tried to connect on
a Bring-Your-Own-Device (BYOD), NAC performs a security posture/health assessment to determine
whether it is safe to allow the connection. Factors that may influence a posture assessment are: Is
this a trusted device? Is it running antivirus? Which one? Is it updated? Are the correct corporate
applications installed? Is it a mobile device? Is the disk encrypted? NAC software can authenticate
users and devices, ensure that devices comply with security policies, and regulate traffic between
devices. It can also automatically scan devices for updates and schedule security patches.
• Persistent Agents: Software installed on the local device.
• Dissolvable Agents: Software runs but does not stay installed on the machine.
• Agentless: Checks are made during login and log-off.
• Quarantine Network: Built for devices that don’t pass the health check.
§ Virtual Private Networks (VPNs): A mechanism for creating secure connections between a
computing device and a computer network, or between two networks, using an unsecure
communication medium, such as the public Internet.
• VPN/Tunneling Protocols: Communication and encryption methods for VPNs.
o Point-to-Point Protocol (PPP): Connects one computer to another. Computers use
PPP to communicate over the telephone network or the Internet. A PPP connection
exists when two systems physically connect through a telephone line.
o Point-to-Point Tunneling Protocol (PPTP): A network protocol used to create VPN
tunnels between public networks. Considered deprecated.
o Layer Two Tunneling Protocol (L2TP): An extension of the Point-to-Point Tunneling
Protocol (PPTP) used by Internet Service Providers (ISPs) to enable VPNs. Commonly
implemented with IPsec for encryption.
o Transport Layer Security (TLS) Tunneling: Mutual authentication using digital
certificates. TLS creates an encrypted tunnel for user authentication and data
transmission. Preferred for VPN access.
o IPSec Tunneling: Not a cryptographic protocol, but a Layer 3 framework, typically at
a VPN application’s core. It does not enforce a particular key method or encryption
algorithm. Connects sites over a Layer 3 network as if they were connected at a
Layer 2. It adds encryption and authentication to make the protocol more secure.
§ Authentication Header (AH): No encryption but does contain a hash of the
IPsec packet to provide integrity, origin authentication, and replay attack
protection. Authenticates the entire IP packet, including the IP header.
§ Encapsulating Security Payload (ESP): Encrypts the data and the IP packet.
Provides data integrity, confidentiality and encryption, limited traffic flow
confidentiality, and replay attack protection. While AH authenticates the
entire IP packet, including the IP header, ESP authenticates only the IP
datagram portion of the IP packet.
• Transport Mode: Only encrypts the payload of the packet. Used for
host-to-host communication.
• Tunnel Mode: Provides end-to-end security by encrypting the entire
IP packet and adding a new IP header. Used for connecting entire
networks with a site-to-site VPN.
§ Internet Key Exchange (IKE): Authentication and key exchange for IPSec.
Negotiates security associations and establishes a secure channel between
hosts. Negotiations occur in two phases: Key Agreement and Cipher
Selection. IKEv2 enhances IKE with Extensible Authentication Protocol (EAP)
authentication and a simplified setup, providing reliability and support for
Network Address Translation (NAT) traversal.
• VPN Options
o Host-to-Host: Joins two computers as though they were directly wired together.
Securing traffic between two computers on an untrusted private network.
o Host-to-Site/Remote Access VPN: A computer joins a trusted network remotely, via
a VPN Gateway. Software is installed on the device that needs the VPN tunnel. The
encrypted tunnel is created to connect to a specific network. The VPN software
connects to a VPN Concentrator and can be configured as always-on. Always-On
VPNs establish connections automatically when detecting trusted networks.
Suitable for telecommuters and field employees.
§ Transport Layer Security (TLS)/ Secure Socket Layer (SSL) VPN: Enables
users to access a network, client-server applications, or internal network
utilities and directories, without the need for specialized software. Can be
run from a browser or light VPN client. Establishes a secure connection over
Port 443, encrypting data and ensuring user authentication.
§ HTML 5 VPN: Allows users to access internal resources via pre-configured
VPN Concentrator, using only a browser as a client.
o Site-to-Site: Connects two or more private networks. This could be a corporate
network where multiple offices work in conjunction with each other, or a network
with a central office and multiple branch locations. Done by installing a VPN on both
sides. Traffic is encrypted as it passes through the local VPN Concentrator and is
decrypted in the concentrator on the other side.
§ Full Tunnel: All data goes through the concentrator, which makes the
forwarding decisions.
§ Split Tunnel: Some information is sent through the tunnel and other
information can be sent outside of the tunnel. Only traffic to the corporate
network traverses the VPN tunnel. Traffic to all other sites is split from the
tunnel and is not encrypted.
§ Secure Web Gateway (SWG): A software application, hardware device, or cloud service that is
deployed at the boundaries of a network to monitor and stop malicious traffic from entering the
organization, and to block users from accessing malicious or suspicious web resources. Includes URL
Filtering, Spam Filtering, Malware Inspection, routing and switching, IDS/IPS, firewall, Bandwidth
Monitoring, and VPN endpoints. Next-Gen Firewalls (NGFW) perform these functions as well.
§ Content Filters/ Web Filters/ URL Filters: Control the content users can access over the
Internet. Can be hardware, software, or on a firewall. Issues include over-blocking, under-blocking,
handling of encrypted traffic and privacy concerns.
§ DNS Filters: Restrict web content.
§ Data Loss Prevention (DLP): Prevents the sharing or transmitting of sensitive data through E-mail,
cloud, USB, or other means. Also includes Pattern-Matching and Watermarking. DLP solutions can
inspect all data leaving the organization, including E-mail contents and attachments, copy to
portable media, File Transfer Protocol (FTP), posting to web pages/websites, applications, and
Application Programming Interfaces (APIs).
§ Software Defined Networking (SDN): An approach to network management that enables dynamic,
programmatically efficient network configuration to improve network performance and monitoring.
It separates the functions of routers, switches, and related devices into two planes. Administrators
can centrally manage the network through a network controller that separates the two planes.
• Data Plane: Does the work of moving individual frames and packets through the network. It
routes packets, schedules queues, and reads routing tables and ARP values.
• Control Plane: Makes decisions about the overall flow of traffic, and encompasses the
duties of routing protocols, switching protocols, Quality of Service (QoS) settings, and other
settings that store or communicate rules through the network.
• Network Controller: Communicates with upper-level SDN applications to govern the control
plane functions and with lower-level SDN data paths to adjust settings in the data plane.
§ Software-Defined Visibility (SDV): Visibility refers to being aware of everything within and moving
through the network with the help of network visibility tools, such as Next-Generation Firewalls
(NGFW), Web Application Firewalls (WAF) and Security Information and Event Management (SIEM)
solutions. SDV combines visibility with an automation framework. Gathers data from taps on the
physical network and redirects it according to its logical structure. SDV collects real-time data about
network traffic and host configurations for improved anomaly detection and incident response.
• Network Packet Brokers (NPB): Gathers and forwards visibility traffic and performs
additional tasks, such as data deduplication, SSL decryption, data masking, and other
features to improve security and reduce network load.
§ NIC Teaming/ Load Balancing Fail-Over (LBFO): The process of combining multiple network cards
for performance, load balancing, and redundancy reasons. Group two or more physical NICs into a
single logical network device, called a bond.
§ Traffic Shaping Devices: Regulate abusive users, safeguard applications and networks against traffic
spikes, and stop network attacks from overwhelming network resources.
§ Quality of Service (QoS): Creates an undesired list and gives priority to certain kinds of traffic over
others, such as giving VoIP traffic a higher priority than web browsing.
§ Domain Name Service Security Extensions (DNSSEC): A suite of extensions that improve Domain
Name System (DNS) security by verifying that DNS results have not been tampered with. Provides
authorization services when performing operations on the DNS. Must be digitally signed.
§ Domain-Based Message Authentication, Reporting, and Conformance (DMARC): An E-mail security
protocol that verifies E-mail senders and helps prevent spoofing.
§ Windows Registry: Primary configuration database that monitors unwanted application changes.
Backup the registry before making changes.
§ Configuration Management Systems (CMS): Tools/databases that are used to manage IT
infrastructure configuration and data for users, suppliers, locations, business units, and customers.
§ Configuration Management Database (CMDB): A central repository for infrastructure information.
• CM Diagrams: Includes workflows, physical and logical network diagrams, and rack layouts.
• Baseline Configurations: Note any static allocation of IP addresses, versus DHCP. May utilize
IP Address Management (IPAM) Suites for managing the assignment of IP addresses.
§ Asset Management Software: Automatically discover, track, and catalog various assets, providing a
centralized dashboard for management.
• Administrative Controls
o Onboarding Policies
§ Hiring Qualified Candidates.
§ Employee Background Check/ Clearances.
§ Social Media Analysis.
§ Code of Ethics.
§ Provision Accounts/ Credentials.
§ Employee Training.
• Gamification.
• Tabletop Exercises.
• Hands-On/ Live Demo.
• Audits/ Walk-Throughs.
• Phishing Simulations/Campaigns.
• Computer-Based Training (CBT).
• Capture the Flag (CTF): Jeopardy or Attack/Defense Style.
• Pen-Testing/ Attack Simulation.
o Role-Based Security Awareness Policies
§ End Users: Understanding threats and how to protect against them. Password security, phishing
awareness, and physical security may also be components of end-user training.
§ Customer-Facing Employees: Recognizing social engineering and protect the company’s reputation.
§ Privileged Users: Understanding the permissions they have been given, what responsibilities come
with them, and the importance of not sharing credentials.
§ Administrators: Understanding technical threats, network configuration, and security solutions.
§ Incident Response Teams: Understanding how to respond to physical threats, malware removal,
legal procedures and forensics investigations.
§ Management: High-level knowledge of current controls and how they could be compromised.
§ Recertification: Defines how frequently users must certify their need for a resource or membership.
o Privacy/User Agreement Policies
§ Terms of Service/ Terms of Use/ Terms and Conditions (T&C’s).
§ Standard Operating Procedures (SOP).
§ Privacy Notices/ Privacy Policy.
§ Acceptable Use Policies.
§ Non-Disclosure Agreements (NDA)/ Non-Competes.
o Password Policies
§ Change all default usernames and passwords.
§ Minimum/ Maximum Password Age.
§ Complexity: Length/ character/ Re-use restrictions.
§ Passphrase.
o Secure Personnel Policies
§ Principle of Least Privilege: The user is given a minimum level of access needed to perform a job.
§ Clean Desk Policy: Requires that employees shred or contain all physical documents each time they
leave a work environment. Requires all laptops and phones to be password-protected.
§ Mandatory Vacation: A policy that requires employees to take a set number of vacation days per
year. Used to detect fraud/malicious insiders, as well as to prevent employee burnout.
§ Separation/ Rotation of Duties: Users must not be granted enough privileges to misuse a system.
§ Two-Person/ Dual Integrity: Prohibits individual access to certain material by requiring the presence
of at least two authorized persons, each capable of detecting incorrect or unauthorized security
procedures concerning the task being performed.
§ M of N Control: A protection measure that requires that a minimum number of agents (M) out of
the total number of agents (N) work together to perform high-security tasks.
o Time-Based Access Policies: Disallow network access before or after business hours.
o Location-Based Policies: Disallow network access depending on device location.
§ Network Location: Disallowing network access from certain countries.
§ Geolocation: Process of determining the geographic position of an object or user.
§ Geofencing: A virtual perimeter for a real-world geographic area.
§ Impossible Travel: Office 365 includes a security feature to detect remote hacking attempts. With
each login from a new location, it calculates the travel time from the previous login location and
uses it to determine whether the travel is possible.
o Asset, Configuration, and Change Policies
§ Asset Management Policies: Asset Tracking, RFID Tagging, and procedures for lost/stolen devices.
§ Configuration Management (CM) Policies: The process of maintaining systems in a desired state.
CM requires inventory baselines, updates and patches.
§ Change Management Policies: Procedures for implementing a change, involving the Request for
Change (RFC), Approval, and Regression/Rollback processes.
o Risk Planning Policies
§ Cyber Risk Assessment: Identifying the risks to system security and determining the probability of
occurrence, the resulting impact, and the additional safeguards that mitigate this impact.
• Qualitative Risk Assessment: Quickly identify risks using numerical ratings (1-5) or colors
(green, yellow, red) that rank risks based on likelihood of occurrence and business impact.
• Quantitative Risk Assessment: Involves numerical values, statistical analysis, and
measurable data to provide a more precise and objective measure of cybersecurity risks.
o Single Loss Expectancy (SLE): The expected cost of one loss event.
o Annual Rate of Occurrence (ARO): The number of loss events expected in a year.
o Annual Loss Expectancy (ALE)= SLE x ARO: The total value lost over a year.
• Audit Risk Model: Assesses the potential implications, risks, and costs of a data breach or
cyber-attack on the organization and its stakeholders.
• Privacy Impact Assessment (PIA): An analysis of how Personally Identifiable Information
(PII) is handled to ensure compliance with regulations, determine privacy risks associated
with information systems or activities, and evaluate ways to reduce risk.
§ Risk Transference: A risk management technique in which risk is transferred to a third party.
• Cybersecurity Insurance Policies: Insurance is useful in the event of a data breach.
• Managed Detection and Response (MDR): A service where a vendor monitors firewalls and
other security tools to provide expertise in triaging events. Offers hosted security services.
• Managed Service Providers (MSPs): Companies that manage the IT assets and cybersecurity
of other companies.
• Security-as-a-Service (SECaaS): A business model in which a service provider integrates their
cloud-based security services into a corporate infrastructure on a subscription basis. May
include authentication, anti-malware, Intrusion Detection Systems, (IDSs), and Security
Information and Event Management (SIEM).
§ Vulnerability Management Policies: The process of identifying, evaluating, treating, and reporting
security vulnerabilities in systems and the software that runs on them. Frequently conduct
assessments to find vulnerabilities and possible attack vectors, as well as to harden the system.
§ Penetration Testing/ Ethical Hacking Policies: An authorized attempt to gain unauthorized access to
a computer system, application, or data. Carrying out an ethical hack involves duplicating the
strategies and actions of malicious attackers. Certain industries are required to conduct semi-regular
penetration tests to stay compliant with regulations, such as PCI DSS.
o Incident and Impact Planning Policies
§ Incident Response Plan (IRP): A written document, formally approved by the senior leadership
team, that helps the organization before, during, and after a security incident.
§ Business Impact Analysis (BIA): Predicts the consequences of a business disruption and develops
recovery strategies. Potential loss scenarios should be identified during a risk assessment.
§ Business Continuity Plan (BCP): The capability of an organization to continue the delivery of
products or services at pre-defined acceptable levels following a disruptive incident. A well-written
BCP should include preventative, corrective and recovery controls.
§ Disaster Recovery Plan (DRP): Maintaining or reestablishing vital infrastructure following a natural
or human-induced disaster, such as a storm or war. It employs policies, tools, and procedures.
• Site Resilience/ Redundancy/ Fault-Tolerance
o Hot Sites: A fully functional backup site that already has mirrored data.
o Warm Sites: Contains all elements of cold sites but adds storage hardware. Still
requires data to be transported, should a disaster occur.
o Cold Sites: Provides power, networking, and cooling, but no other hardware.
§ Functional Recovery Plan (FRP): A step-by-step guide from an outage to being back up and running.
§ Measurement System Analysis (MSA): A thorough assessment of a measurement process. Includes
an experiment that seeks to identify the components of variation in that measurement process.
o Offboarding Policies
§ Disabling Accounts and Passwords.
§ Disabling Permissions and Access to VPN, E-mail, Network, Servers, and Files.
§ Policy Enforcement, Conduct Requirements, and Discipline.
§ Exit Interviews.
Wireless Security
• Logical Controls
o Wireless Access
§ Captive Portals: Web page accessed with a web browser that is displayed to newly connected users
of a Wi-Fi or wired network before they are granted access to network resources.
§ Wi-Fi Protected Setup (WPS): A feature on many routers. It is designed to make the process of
connecting to a wireless network easier. Connect by pushing a button on the router, by bringing the
device near the router (NFC), or by entering a PIN/passphrase on the device. Best to disable this
feature or opt for the more secure Easy Connect DPP.
• Easy Connect DPP: Also known as Wi-Fi Easy Connect or Device Provisioning Protocol (DPP).
A Wi-Fi Alliance-certified standard that allows devices to be securely added to a network. It
uses techniques, such as QR Code scanning, to simplify the process.
o Wireless Authentication and Encryption
§ Wired Equivalent Privacy (WEP): A severely flawed security algorithm for 802.11 wireless networks.
§ Wi-Fi Protected Access (WPA): A stronger wireless authentication and encryption standard.
• WPA: Provides more sophisticated data encryption and stronger authentication than WEP.
Uses the RC4 encryption algorithm with TKIP. Was later replaced by WPA2.
o Temporal Key Integrity Protocol (TKIP): Provides more secure encryption than the
earlier WEP, without needing to replace existing hardware.
• WPA2: WPA2 replaces RC4 and TKIP with stronger encryption and authentication
mechanisms: Advanced Encryption Standard (AES), an encryption mechanism, and CCMP, an
authentication mechanism. Has a Pre-Shared Key (PSK) brute-force problem. Since there is
no Perfect Forward Secrecy, once an attacker has the PSK, they can easily ascertain all keys.
o WPA2-Personal-PSK: Pre-Shared Key (PSK). All users of a SOHO network use the
same key/password to authenticate. All passwords are 8 to 63 characters long.
o Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
(CCMP): Based on 128-bit AES. More secure than TKIP. Was advanced for its time.
Provides data confidentiality and message integrity.
• WPA3: Offers individualized data encryption for each device connected to the network,
even in open Wi-Fi networks. Each device has a unique encryption key, enhancing privacy
and security. Offers improved security with enhanced, open, updated cryptographic
protocols, key agreement, and mutual authentication. Creates a shared session key without
sending that key across the network. Includes Simultaneous Authentication of Equals (SAE),
Management Frame Protection (MFP), Galois/Counter Mode Protocol (GCMP), and Perfect
Forward Secrecy (PFS). Eliminates the need for four-way handshakes and hashes. Has no
brute force problems.
o Simultaneous Authentication of Equals (SAE): Also known as Dragonfly Key
Exchange. A password-based protocol that authenticates and exchanges keys
between two parties.
o Management Frame Protection (MFP): Also known as Protected Management
Frames (PMF). A security feature that protects unencrypted management messages
and broadcast frames between wireless devices.
o Galois/Counter Mode Protocol (GCMP): An authenticated mode that combines
Counter Mode with a hash-based authentication code. Provides data authenticity
and integrity. Useful for hashes as well. Widely used.
o Perfect Forward Secrecy (PFS): Generates a new key each session. Prevents stolen
private keys from decrypting all past and current connections. Increases complexity
for attackers, which enhances security.
• Administrative Controls
o Wireless Security Policies and Procedures: Address how wireless networks can be used and what types of
information can be transmitted. Policies should also outline procedures for installation, protection,
management, and usage.
§ Enforce Access Control: Restrict access to the network based on the organization's security policies.
For example, limit access to certain IP addresses or only allow access from certain locations.
§ Restrict Wi-Fi Access: Choose a router that allows change to the strength of the signal to ensure
only authorized users can use the connection.
§ Require Automatic Firmware Updates: Keep networking equipment firmware current, as updates
often contain security patches.
§ Require Authentication: Ensures that data or control packets come from the right source.
§ Disable SSID Broadcasting: Prevent unauthorized users from seeing and connecting to the network.
§ Require VPNs: Encrypt data to make it unreadable to eavesdroppers on public Wi-Fi networks. Look
for VPNs that use industry-standard AES-256 encryption and open-source protocols.
Cloud Security
• Logical Controls
o Server-Side Encryption: The encryption of data at its destination by the application that receives it.
o Client-Side Encryption: Encrypting data on the sender's side before it is transmitted to a server.
o Cloud-Related Security Appliances
§ Virtual/ Cloud Firewall: A software-based security device or service that monitors and filters
network traffic for Virtual Machines (VMs). Also known as cloud firewalls, they are designed to offer
the same security and inspection capabilities as a physical firewall but with additional capabilities for
cloud deployment. Virtual firewalls provide valuable East/West network security.
§ Next-Gen Firewall (NGFW): Third-generation firewall technology, combining a conventional firewall
with other network device filtering functions. Can contain Intrusion Detection System (IDS), Intrusion
Prevention Systems (IPS), Content Filtering, Web Proxy, Anti-Bot, Anti-Malware, Virtual Private
Network (VPN), and Identity and Access Management (IAM) functionality. Also called an Application
Layer Gateway, Stateful Multi-Layer Inspection, or Deep Packet Inspection.
§ Next-Gen Secure Web Gateway (NG-SWG): A new cloud-native solution for protecting enterprises
from the growing volume of sophisticated cloud-enabled threats and data risks. It is the logical
evolution of the traditional Secure Web Gateway, also known as a Web Proxy or Web Filter.
§ Cloud-Based Intrusion Prevention System (IPS): Any IPS is based on implicit allow. Its rules are
designed to specify types of traffic that should be blocked.
• In-Line Monitoring: All traffic must flow through the appliance.
• In-Band Response: Can monitor and block traffic on the spot. Can examine traffic for
signatures, baseline deviations, anomalies, and/or behavior heuristics.
§ Cloud Access Security Broker (CASB): An on-premises, client-side software, physical hardware
device, or cloud-based software that sits between cloud service users and cloud applications.
Monitors all activity and enforces security policies. Mediates access to cloud services, provides
visibility into application use and data security policy use, and enforces access controls. Other
functions include verification of compliance with formal standards and the monitoring and
identification of threats. Can be implemented as a forward proxy, reverse proxy, or API-based.
§ Service Integration and Management (SIAM): Allows the integration of many different cloud service
providers into a single management system. This simplifies the application management and
deployment process when using separate cloud providers.
• Administrative Controls
o Cloud Security Policies and Procedures: Govern network security and manage risk in the cloud.
§ Access Control: The process of granjng or denying users or enjjes access to cloud resources, such
as sensijve data and applicajons.
§ User Educadon: Training to help ensure security awareness.
§ Password Administradon: Managing passwords.
§ Background Checks: A prevenjve administrajve control.
§ Backup and Recovery: A policy for backing up and recovering data.
§ Incident Response: A policy for responding to incidents.
§ Audidng: A policy for audijng cloud security controls.
Endpoint Security
• Physical Controls
o Cable Locks: Secure laptops, desktop computers, audio equipment, and other hardware from theft.
o Server Racks: Organize and lock server racks. Consider standard naming conventions and rack layout
diagrams for easier servicing.
o Privacy Screens: Shields the content on a screen from everyone except the user.
o USB Data Blocker: Considered Data Loss Prevention (DLP) and prevents Malicious USB attacks.
o Port Security: Disable unused physical ports on routers, switches, and other network hardware.
• Logical Controls
o Power On Self-Test (POST): A hardware check that is performed before booting an OS.
o Hardware Root of Trust (RoT): A fundamental security component that provides a trusted source of
function, so a device can establish strong security levels. Highly reliable hardware, firmware, and software
components that perform specific, critical security functions. Often integrated as a chip and is considered
inherently trusted, so it must be secure by design. The RoT starts a chain of trust, which ensures that no
malicious code is present before the boot process begins. Utilizes Trusted Platform Modules (TPMs) which
store encryption keys, hashed passwords and user identification. A secure subsystem providing attestation.
§ Boot Integrity (Chain of Trust): Assures the integrity of a platform by demonstrating that the boot
process starts from a trusted combination of hardware and software and continues until the OS has
fully booted and applications are running.
• Secure Boot: In the BIOS EUFI, this checks the bootloader’s digital certificates and signature.
Password-protecting the BIOS EUFI creates an additional layer of security.
• Trusted Boot: Verifies the OS Kernel and starts the Early Launch Anti-Malware (ELAM)
process, which checks for trusted drivers and won’t load untrusted ones.
• Measured Boot: Verifies that nothing on the computer has been changed by malicious
software or other processes. Uses the TPM to check hashes of key system state data. The
attestation server receives a boot log report signed by the TPM for analysis. Changes are
monitored and managed.
§ Remote Attestation: A mechanism for hardware and software to prove their identity and integrity
while logging on. Uses a combination of a digital certificate and cryptographic hashes of relevant
software files and settings, to determine that they haven’t been tampered with.
§ File Integrity Monitoring: Validates the integrity of operating system and application software files
using a verification method between the current file state and a known good baseline.
• File Integrity Checks: Using hash algorithms to ensure that files have not been modified.
o (Identification), Authentication, Authorization, and Accounting (AAA): A cybersecurity framework that
controls access to computer resources and networks, enforces policies, and audits usage.
§ Identification: The management of identity controls. Digital Identity is represented by accounts
managed by network administrators. Cryptography enhances identity security on public networks.
§ Identity Proofing: Also known as Identity Verification. A process that verifies and
authenticates a person's identity when they try to access a service or system. The goal is to
confirm that the person's identity is true and that they are the rightful owner.
§ Authentication: The act of proving the identity of a user/system with passwords, keys, and tokens.
§ Authentication Protocols: A communications or cryptographic protocol specifically designed
for transfer of authentication data between two entities.
o Password Authentication Protocol (PAP): No encryption. Passwords are sent in
cleartext unless the application itself provides the encryption.
o Challenge Handshake Authentication Protocol (CHAP): Encrypted challenge sent
over the network.
§ 3-Way Handshake: After the link is established, the server sends a challenge
message. The client responds with the password hash calculated from the
challenge and the password. The server compares the received hash with
the stored hash. The challenge-response continues periodically during the
connection. No password is sent in the clear, unlike PAP.
o MS-CHAPv2: Microsoft's proprietary version of CHAP, which uses encrypted tunnels.
o Extensible Authentication Protocol (EAP): An authentication framework that
provides general guidance for authentication methods. Provides a secure way to
send identifying information across a wireless network.
§ Protected EAP (PEAP): A protocol that encapsulates EAP within an
encrypted and authenticated TLS tunnel. An extension of EAP that is
sometimes used with 802.1x. The authentication server uses a digital
certificate, but the client does not.
§ Lightweight Extensible Authentication Protocol (LEAP): A Cisco-proprietary
network authentication mechanism for wireless LANs.
§ EAP Flexible Authentication over Secure Tunneling (EAP-FAST): A Cisco-
designed replacement for LEAP. A method that enables secure
communication between a client and an authentication server. Works with
a RADIUS server. Supports certificates, but they are not required.
§ EAP Transport Layer Security (EAP-TLS): An IETF open standard that uses
public key cryptography and public key infrastructure to securely identify
both the client and the network. Uses certificates and TLS for mutual
authentication between a client and a server. Complex to implement
because it requires a digital certificate for the authentication server and all
other devices. One of the most secure EAP standards and is widely used.
§ EAP Tunneled Transport Layer Security (EAP-TTLS): A framework to support
authentication across several communication systems. All authentication
methods work inside the TLS tunnel. Allows for systems to use older
authentication methods, such as PAP, within a TLS tunnel. Requires a digital
certificate on the authentication server and builds a TLS tunnel using this
digital certificate. It does not require digital certificates on every device.
o IEEE 802.1x: Port-Based Network Access Control (NAC): A hardware-based Network
Access Control (NAC). Centralized authentication for enterprise environments. An
authentication protocol used in VPNs, wired, and wireless networks. In VPNs, it is
used via a RADIUS server. Wired networks use it for port-based authentication.
Wireless networks use it in enterprise mode. Uses a centralized server so all users
can use their normal credentials to authenticate. Can be used with certificate-based
authentication. Requires integration with Extensible Authentication Protocol (EAP)
and an authentication server. Works alongside RADIUS, LDAP, and TACACS+. Can
also be used as a Network Access Server (NAS). No SSO functionality.
• Single Sign-On (SSO): An authentication scheme that allows a user to login to any of several
related, yet independent, software systems, with a single ID
o OAuth: Authorization framework, not an authentication protocol. Works with Open
ID Connect, which provides authentication. Determines which data is accessible to
the user. Users can allow one application to interact with another, without using a
password. Facilitates sharing of resources between sites. Doesn’t share password
data, but instead uses authorization tokens to prove identity.
o OpenID: An open standard authentication protocol. Adds authentication to OAuth
and validates user presence.
o Open ID Connect: Handles Single Sign-On (SSO) authentication over TLS. Establishes
trust between one account (Google, for example) and a third-party account. Users
decide how much access the third-party account will have to the original account.
Doesn’t contain security features, like encryption. It relies on TLS. This means it is
susceptible to any attacks that bypass TLS. Links between accounts can be removed
at any time. Example: Facebook Connect.
• Federated Identities: Extends network accessibility beyond employees. Allows access to
trusted accounts from different networks. Users provide attestation of identity to service
providers. Can log in with credentials from other sites, such as Google or Facebook. Provides
authentication for partners, suppliers, customers, and employees.
o Transitive Trust: If one party has explicit trust relationships with two other parties,
that can form an implied trust relationship between those two.
o Identity Provider (IdP): A system entity that creates, maintains, and manages
identity information, and also provides authentication services to applications
within a federated network. Identity Providers (IdP) offer user Authentication-as-a-
Service (AaaS).
o RADIUS Federation: Members of one organization can authenticate to the network
of another organization using their normal credentials. Uses 802.1x as the
authentication method, RADIUS on the backend, and EAP to authenticate.
o Security Assertion Markup Language (SAML): Open standard for authentication and
authorization for users to access third-party resources. Authenticates through a
third-party source to gain access. The resource is not responsible for authentication.
The request is passed through a trusted third-party server. The authentication
process starts with the Principal directly contacting the Service Provider (SP) and the
SP asking for an authentication token from the Identity Provider (IdP). If granted, the
SP gives access. If not granted, the principal automatically negotiates with the IdP
for authentication. The SP and the IdP do not need to communicate to maintain a
trusting relationship. Doesn’t work well for mobile applications.
§ Shibboleth: An open-source software that uses SAML to provide a third-
party Federated, Single Sign-On (SSO) authentication.
• Authentication Factors: Evidence that a person provides to verify their identity when trying
to sign in to an application, online account, or other resource.
o Knowledge-Based Authentication (KBA) Factors: Easy to memorize.
§ Something You Know: Password, PIN, or challenge question.
• Passphrase: A type of password that uses a text string or sentences,
with or without spaces.
• Static Codes: PINs that stay the same until they are changed.
• Secret Questions: Users answer at least one secret question.
o Static: Pre-configured secrets to recover a password, such
as the street you grew up on.
o Dynamic: Identity verification questions, such as which
address looks familiar to you?
o Possession Factors: Digital data that a human cannot be expected to memorize.
§ Something You Have: Cryptographic identification device, physical key, ID
badge, smartcard, or token.
• Smart Card: A physical electronic chip or integrated circuit card.
o Common Access Card (CAC): A verification card used by the
U.S. military and the Department of Defense (DoD), for
identification and access to secure systems and locations.
o Personal Identification Verification Card (PIV): A security
standard and smart card used by federal agencies in the
U.S. Used by civilians working in the federal government.
• Hardware Token/Token Key: Contains the security credentials for a
login session and identifies the user, the user's groups, the user's
privileges, and a particular application.
• Authenticator Applications: Adds an extra layer of security to
online accounts via Time-Based One-Time Passwords (TOTPs).
o HMAC-Based, One-Time Password (HOTP): HMAC stands
for Hash-Based Message Authentication Code. Used only
once before a new code must be generated.
o Time-Based One-Time Password (TOTP): Uses a randomly
generated code as an additional authentication token.
Provides an indicator of integrity, the current local time.
• SMS/Phone Call: Verifies phone numbers and phone access.
• Push Notifications: Enables user authentication by sending a push
notification directly to a secure application on the user's device.
• Digital Certificates: A file created and signed using cryptographic
algorithms, which demonstrates that the person presenting the
public certificate also holds its private key.
o Inherence Factors: A unique physical or behavioral trait.
§ Something You Are: Body measurements and calculations for human
characteristics. Biometrics are Personally Identifiable Information (PII), and
protocols must not reveal this data without consent. Fingerprints and other
scans are not usually stored. Data is stored as a mathematical computation.
• Physiological Biometric Systems: Measure characteristics of a
person, such as a fingerprint, iris scan, retinal scan, palm scan, or
venous scan. Some can check for pulse and temperature on a
fingerprint scanner to detect counterfeiting.
§ Something You Can Do: Actions, gestures, gait analysis, or signatures.
• Behavioral Biometric Systems: Measures how a person acts via
voice prints, gait, signature dynamics, or keystroke dynamics.
§ Something You Exhibit: Inherent behaviors, like personality traits or even
detectable neurological activities.
• Evaluation Metrics for Biometric Patterns
o False Rejection Rate (FRR): Measures legitimate users not
recognized.
o False Acceptance Rate (FAR): Measures interlopers
accepted.
o Crossover Error Rate (CER): Where FRR and FAR meet,
indicating system efficiency.
o Context-Aware Factors: Time of day, physical location, behavior or risk-based
authentication, or relationship to someone trusted.
§ Somewhere You Are: Current location.
• Geofencing: A virtual perimeter for a real-world geographic area.
• Impossible Travel: Detects remote hacking attempts. With each
login from a new location, it calculates the travel time from the
previous login location and uses it to determine whether both logins
can belong to the same person.
§ Someone You Know: Connection to another person who is trusted via
personal relationships or chain of trust authentication systems.
• Two-Factor Authentication (2FA): Requires two forms of identification to access resources.
o 2-Step Verification: Also known as out-of-band mechanisms. Sends a software token
to a user-controlled resource via SMS, phone call, push notification, or E-mail.
Though considered two-factor authentication, intercepting the code within the time
frame would compromise security.
• Multi-Factor Authentication (MFA): A user is granted access only after successfully
presenting two or more pieces of evidence to an authentication mechanism. Most widely
used authentication option.
• Continuous Authentication: Monitors user activity post-login, enhancing security. Currently
in the research phase.
• Adaptive Identity: The process of tailoring each customer authentication to the specifics of
the request. It involves calibrating multiple sets of risk indicators to determine the type of
authentication needed, and how strong to make it.
• Password Vaults: Generates random passwords and securely stores them, reducing the risk
of data breaches. Risks include compromise of the master password, and other attacks
related to vendors, the cloud, or impersonation.
o Windows Credential Manager: Provides secure storage for credentials used to
access Windows computers, as well as storage for certificates and passwords used
for network services or websites.
o Keychain: Stores passwords, certificates, and other credentials in MacOS.
o The Credential Management API: Password management by web browsers and
applications. Includes federated credentials, such as Single Sign-On (SSO) tokens.
o KeePass: Third-party password manager that stores passwords or other credentials
in an encrypted file and is protected by a central account.
o LastPass: Third-party password manager that stores passwords online.
• Digital Signatures: Combines public key cryptography with hashing for authentication,
integrity, and non-repudiation. The sender creates a hash of the message and signs it with
their private key. The recipient verifies the signature using the sender's public key. Added to
clear text messages. Verifies the message has not been tampered with by a MitM.
§ Authorization: Specifying access rights and privileges for resources.
• Identity and Access Management (IAM): A framework of policies and technologies to
ensure that the right users have the appropriate access to technology resources. IAM
encompasses four main processes: Identification, Authentication, Authorization and
Accounting. Identification creates unique IDs, authentication verifies identities,
authorization determines access rights, and accounting tracks authorized usage. Includes
Account Life Cycle Maintenance.
• Directory Services: Determines authorization by referencing a single database, or Directory,
composed of the organization’s usernames and passwords. Also contains computers,
printers, and other devices. All authentication requests must reference this directory. Each
user only needs one set of credentials. Access Directory Services via Kerberos or LDAP.
o Microsoft Active Directory (AD): A Directory Service that uses a combination of
Kerberos for authentication and Single Sign-On (SSO), and LDAP for resource
authorization queries.
§ Kerberos: Authentication through a cryptographic ticket-granting service.
Authenticate once, and the device is trusted by the system. Users can gain
access to multiple resources with one authentication. Still requires
individual servers to maintain their access databases. Allows for Single Sign-
On (SSO). Works well in Microsoft environments.
§ Lightweight Directory Access Protocol (LDAP): A database that stores
information about network users, systems, and services. Utilizes a
hierarchical tree database structure to store information about both
network users and resources. Network administrators can enter permissions
for various network resources into the LDAP database structure. This
provides centralized authorization for all servers in the network. Secure
LDAP (LDAPS) over TSL has a large attack surface, so it is not used over the
Internet. No SSO functionality.
• Simple Bind Authentication: A common way to authenticate LDAP
clients to a directory server. It's also known as password-based
authentication because the client provides a password to the
Directory Proxy Server.
• Privilege Management: A combination of people, processes, and technologies that help
organizations control access to critical resources.
o Privileged Access Management (PAM): Also known as Privileged Identity
Management (PIM). Manages privileged accounts (superuser, admin, and root
users) and their credentials. Policies, procedures, and controls to prevent the abuse
of privileged accounts. Privileges are granted by request, doled out for a short time,
and easily logged and audited. Privileged accounts are stored in digital vaults.
Requires stringent authentication, mandatory logging, and frequent audits.
o Just-In-Time (JIT) Permissions: Elevates privileges only when needed, for a limited
duration. Implemented through temporary elevation, password vaulting, or
ephemeral credentials. Ensures Zero Standing Privileges (ZSP), a security principle
that eliminates persistent, always-on access rights for accounts and identities.
§ Accounting: Account policies that enforce privilege management. They dictate what users can do
and enforce strong credential policies. This helps manage risk from compromised accounts. Auditing
and permissions reviews aid in detecting suspicious activity and preventing data breaches.
o Public Key Infrastructure (PKI): The policies, procedures, software, hardware, and employees needed to
create, distribute, manage, store, and revoke digital keys and digital certificates. Also includes the binding of
public keys to people or devices. The user maintains control over their private key but can share the public
key with any server that requires it for login. The user presents the private key, and the server matches it to
the public key already stored on the server. If not managed properly, PKI can lead to critical vulnerabilities.
§ Private and Public Keys: Sessions are encrypted with a recipient’s public key and decrypted with the
recipient’s private key. Compromised private keys endanger the authentication process and
therefore, data confidentiality.
• Static Keys: For use in many instances of a cryptographic key establishment process, over a
relatively long period of time.
• Ephemeral Keys: Session keys created with the symmetric and asymmetric keys, generated
for each execution of a key establishment process.
• Symmetric Keys: A single, shared, public key. Also called a private, secret, or session key.
• Asymmetric Keys: Each user has a public key and a private key. The use of the public key is
the basis for Public Key Infrastructure (PKI).
§ Key Exchange: An encryption key is used to decrypt ciphertext back into plain/clear text. Users
cannot exchange, or decrypt encrypted data without first securely exchanging keys. Keys are
securely exchanged between two parties, with the help of a cryptographic algorithm.
• In-Band Key Exchange: Exchanging keys in the same communication channel that is going to
be encrypted. Poses a security threat.
• Out-of-Band Key Exchange: Exchanging keys in a separate, more secure communication
channel, such as sending a smart card via the mail, or communicating a password verbally.
Keys are more secure, but the communication is slower and less convenient.
• Digital Envelopes: Combine symmetric and asymmetric encryption to securely exchange
keys and ensure message confidentiality. The process is as follows: The sender encrypts the
message with the symmetric key to make a session key. The session key is then encrypted
with the recipient's public key and sent along with the encrypted message (Double
encryption). The recipient decrypts the session key with their private key and then decrypts
the message with the symmetric key.
§ Key Management: Technology, policies and procedures for protecting, storing, organizing, and
distributing public and private keys. The process of managing cryptographic keys and related
security parameters throughout their lifecycle. This includes the generation, storage, distribution,
use, rotation, and destruction of keys. Key management also involves establishing and controlling
access to keys, and ensuring that only authorized individuals can access them
• Key Generation: Create a strong key, using the proper cipher.
• Certificate Generation: Allocate a key to a user.
• Distribution: Make the key available to the user.
• Storage: Securely store and protect private keys against unauthorized use (usually in a
Trusted Platform Module (TPM).
• Revocation: Manage keys that have been compromised.
• Expirations: Monitoring the certificate’s shelf life.
§ Digital Certificates: Small data files that contain identity credentials. A public assertion of identity,
validated by a Certificate Authority (CA). An electronic document assigned to a person or device,
used to prove the validity of a public key. Binds the digital certificate owner to a public and private
key. Also used to encrypt data or create digital signatures. Based on x.509 standard, certificate
attributes are as follows: Serial number, signature algorithm, issuer, validity dates, subject name,
public key, extensions, and Certificate Authority (CA) signature.
• Certificate Authority (CA): A third-party organization that verifies the authenticity and
identity of an entity, such as a website, E-mail address, or person. CAs also provide
cryptographic keys for data encryption.
o Public/Commercial Certificate Authorities: Built into Browsers and trusted across
organizations and networks. Creates a key pair and signs the public key. Purchase a
website certificate from a CA that will be trusted by browsers.
o Private Certificate Authority (Self-Signed): An in-house CA used in medium-large
organizations. All devices must trust the internal CA. While useful for internal trust,
self-signed certificates should never be used in a production environment.
§ Single CA: The Single CA is both a root CA and an issuing CA. Simple to
implement, but risky, as a compromise could lead to a system collapse.
Often used on private networks.
§ Third Party/ Hierarchical CA: Several CAs share the load. Limits damage if
any CA becomes compromised. Requires a Chain of Trust, which lists all the
certificates between the server and the root CA. Adds layers of security, but
still vulnerable at the root level.
• Web of Trust: Adds other users who vouch for and self-sign each
other’s certificates.
• Mesh: Cross-certifying CAs. Doesn’t scale well.
• Mutual Authentication: A server and client mutually authenticate.
o Offline Certificate Authority (CA): A CA that is isolated from network access and is
often kept in a powered-down state. The purpose of keeping a CA offline is to
protect an organization's most valuable information by separating it from
potentially malicious third parties.
• Certificate Types
o Root Certificate: The certificate that identifies the Root Certificate Authority (CA).
Everything starts with this certificate. The root certificate issues other certificates.
Access to the root certificate allows for the creation of any trusted certificate.
o Web Server/SSL Certificate: A data file hosted on a website's origin server that
enables websites to use HTTPS. SSL certificates make SSL/TLS encryption possible.
They contain the website's public key, identity, and other related information.
§ Subject Alternative Name (SAN) Certificates: Allows the certificate to
contain multiple names, such as multiple website domains or the names of
both the website and the organization. Preferred over the Common Name
(CN), for specifying the identity of the certificate subject.
§ Domain Validation (DV) Certificate: Used to identify a DNS host or a
domain name for TLS-protected protocols like HTTPS.
§ Extended Validation (EV) Certificates: A certificate backed by a stricter
identity validation process than the CA's default.
§ Wildcard Certificates: A multi-domain certificate that can apply to any
number of sub-domains within a single domain.
o User or Machine Certificates: Used to identify an entity like a user or a computer.
Typically issued by a Private CA for use within an organization, so users and devices
within a corporate network trust each other.
§ Self-Signed Certificates: Used when PKI is too difficult or expensive. These
can be deployed on machines, web servers, or programs. They are trusted
within the corporate network but marked untrusted by the OS or browser.
Suitable for non-critical environments like development or testing.
o E-mail Certificates: Usable for sending and receiving E-mail messages. Usually only
requires proof that the user owns the associated E-mail address.
o Code-Signing Certificates: Used to authenticate the source and integrity of
executable files.
• Certificate Management: The process of monitoring and controlling digital certificates to
ensure network security and prevent disruption. It involves managing every step in a
certificate's lifecycle, including issuing, renewing, deploying, and revoking certificates.
o Registration Authority (RA): Identifies and authenticates certificate requesters,
maintains certificates for current certificate holders, and prevents the use of expired
certificates. Facilitates the identity verification process and submits CSRs to the CAs.
RAs do not issue certificates.
o Certificate Signing Request (CSR): The process for requesting certificates. The
subject generates a key pair and submits a CSR to the CA. The CA reviews and
validates the information before issuing the certificate. A private key is not a part of
the CSR and must be securely stored by the subject.
o Certificate Chain of Trust: List of all the certificates between the server and the Root
Certificate. Any certificate between the SSL Certificate and the Root Certificate is a
chain or intermediate certificate. The web server needs to be configured with the
proper chain, otherwise the end user will receive an error.
o Key Escrow: A method of storing, archiving and recovering important keys. Escrow
involves archiving keys with a third-party for secure storage. Root CA keys require
stringent access controls. Key recovery mechanisms ensure encrypted data can be
accessed if keys are lost.
o Certificate Revocation List (CRL): A list of digital certificates that have been revoked
by the Certificate Authority (CA) before their scheduled expiration date. Revoked
certificates are no longer valid. Suspended certificates can be re-enabled.
o Online Certificate Status Protocol (OCSP): The method by which a browser can
automatically check for certificate revocation. OCSP servers provide real-time
certificate status checks. OSCP Stapling and Certificate Pinning enhance security.
§ OSCP Stapling: The device that holds the certificate will be the one to
provide status of any revocation. Stapling helps maintain the privacy of the
end user, as the OCSP request does not require a connection to the CRL.
§ Certificate Pining: Embeds or pins a certificate to a service. When the
application contacts the service, the service certificate will be compared to
the pinned certificate. If the certificate matches, the application knows that
it can trust the service. If the certificate doesn't match, then the application
can choose to shut down, show an error message, or make the user aware
of the discrepancy.
o Host-Based Security Appliances
§ Antivirus/Anti-Malware: Used to prevent, detect, and remove malware. Automated detection and
removal of heuristic viruses by checking files and code that may be behaving suspiciously.
§ Host-Based Firewall: Firewall software that runs on an individual computer or device connected to a
network. These types of firewalls are a granular way to protect individual hosts from malware.
Firewalls are based on an implicit deny rule and specify which traffic should be allowed. This is
contrary to IPSs, which are based on implicit allow, and specific which traffic to be blocked.
§ Host-Based Intrusion Detection System (HIDS): Monitors activity on a single computer, including
process calls and information recorded in the system, application, security, and host-based firewall
logs. Can pinpoint specific files compromised in an attack and also track processes employed by the
attacker. It can detect anomalies on the host system that a NIDS cannot detect. For example, it can
detect infections where an intruder has infiltrated a system and is controlling it remotely. HIDS are
more costly to manage than NIDS because they require administrative attention on each system.
HIDS cannot detect network attacks or prevent host attacks.
• Passive Monitoring: Examines a copy of traffic via a port mirror or network tap.
• Out-of-Band Response: Sends RESET frames to stop subsequent frames but cannot block
the first frame.
§ Host-Based Intrusion Prevention System (HIPS): Automatically detects and blocks attacks before
they affect target systems. Can examine traffic for signatures, anomalies compared to the baseline,
behaviors, or heuristics. Involved machine learning. Any IPS is based on implicit allow. Its rules are
designed to specify types of traffic that should be blocked.
• In-Line Monitoring: All traffic must flow through the appliance.
• In-Band Response: Can monitor and block traffic on the spot.
• Signature-Based: Methods that look for behavior characteristics of known attacks.
• Stateful Protocol Analysis: Methods that use Deep Packet Inspection (DPI) to examine traffic
by comparing it to a profile of how the protocol is supposed to work.
• Anomaly-Based: Heuristic methods that look for behavior that seems unusual relative to a
normal baseline.
§ End-Point Detection and Response (EDR) Solution: Also called Endpoint Threat Detection and
Response (ETDR), or Endpoint Protection Platform (EPP). Comprehensive endpoint security software,
which gathers security-related behaviors from individual network hosts, and then uses the data to
investigate suspicious activities and trends. Has rule-based automated response and analysis
capabilities. Data collected might include processes, configuration changes, file system activity, and
network connections. Machine learning and process monitoring look for and block malicious actions
instead of signatures. Provides real-time visibility, continuous monitoring, and containment.
• Behavioral Heuristics/User and Entity Behavior Analytics (UEBA): Uses machine learning
and data analytics to determine anomalous behavior by comparing known good behavior
baselines to the current state. Unusual behaviors generate use, performance, or security
alerts. Also conducts trend analysis.
§ Endpoint Data Loss Prevention (DLP): Prevents the sharing or transmitting of sensitive data. DLP
solutions inspect all data leaving the organization, including, E-mail contents, attachments, copy to
portable media, File Transfer Protocol (FTP), posting to web pages and websites, applications, and
Application Programming Interfaces (APIs).
§ Network Access Control (NAC): Performs a security posture and health assessment on the endpoint
to determine whether it is safe to connect. Primarily a software-based, network security component
that runs on or interacts with endpoints. Can be hardware-based (802.1x: Port-Based Network
Access Control (NAC)). Listed here because it does offer host-based security analysis.
§ Unified Endpoint Management (UEM): Manages mobile and non-mobile endpoint devices. An
evolution of the Mobile Device Manager (MDM).
§ Trusted Platform Module (TPM): Hardware for individual devices that helps with cryptographic
functions. Built into the motherboard of the device. Not susceptible to Dictionary Attacks.
• Administrative Controls
o Password Policies: Change all default usernames and passwords. Require password complexity and prevent
password re-use. Activate account lockout and require users to change their password frequently. Consider
a minimum/maximum password age and length.
§ NIST Guidance: While strict password policies seem more secure, research shows that they
encourage poor password storage and writing passwords down, which ultimately decreases
security. NIST recommends allowing user-selected passwords between 8 and 64 characters and
avoiding complexity rules. Aging policies should not be enforced. Users should choose when to
change passwords. Password hints should not be used for account recovery.
o Separate User Accounts: No shared or generic accounts. Restrict or disable guest accounts to avoid
potential privilege escalation. Only use privileged accounts when necessary. Choose usernames carefully
according to a standard naming convention. A username should not be easy to guess by knowing the name
of a job role or the account owner. It should be easy for users to remember their names and for help desk
employees to find the account of a particular user. For auditing purposes, usernames should never be
changed and should be easily filtered for reports.
o Account Limits: Users must only have access to what is needed to perform their job duties. Conduct
frequent Groups and Permissions audits to verify that resources are being provisioned and used correctly.
o Patch Management: Establish automated and scheduled patch management. Update firmware,
applications, and OS frequently. Consider using a trusted OS. Test in an isolated sandbox or VM before
deploying. Have a backup and rollback plan ready.
§ Patch: A set of changes to a program or its supporting data, designed to update, fix, or improve it.
§ Hotfix: A quick-fix engineering update that is a single, cumulative package, and includes information
that is used to address a problem in a software product.
§ Service Pack: Comprises a collection of updates, fixes, or enhancements to a software program
delivered in the form of a single installable package.
§ Upgrade: The process of replacing a product with a newer version of the same product.
§ Maintenance Release: A release of a product that does not add new features or content, but may
solve minor problems, typically bugs or security issues.
§ Definition Update: Updates to files that are used to identify spyware and other potentially
unwanted software.
§ Unofficial Patch: A patch for a piece of software, created by a third party such as a user community
without the involvement of the original developer.
§ Rolling Release: Also known as rolling update or continuous delivery. Frequently delivering updates
to applications.
o User Training/ Education: The process of educating end users about how to avoid social engineering and
malware attacks. Using guided digital learning tools is one of the most popular methods.
Virtualiza:on Security
• Logical Controls
o Virtual Machines (VM): Provides the functionality of a physical computer. Their implementations may
involve specialized hardware, software, or a combination of the two. A computer on which a hypervisor runs
one or more virtual machines is called a host machine, and each virtual machine is called a guest machine.
§ Hypervisors: Type of software, firmware, or hardware that creates and runs virtual machines.
• Type 1: Also called bare metal hypervisors. These hypervisors directly access underlying
machine resources. They implement custom resource allocation to service the VMs.
• Type 2: Also called a hosted hypervisor. These hypervisors negotiate resource allocation
with the operating system, which makes the process slower and less efficient.
§ Virtual Network Interface Cards (VNICs): A software-based NIC that allows a VM to join a network.
They have a MAC address, IP address, and all other functions of a real card, except instead of
sending and receiving physical signals, all of its traffic passes through the hypervisor. Multiple VNICs
can correspond to one physical NIC. VNICs allow the hypervisor to behave as a virtual switch, router,
firewall or NAT. Since routers and firewalls are essentially network hosts themselves, users could
install one as a VM. Many firewall and router vendors offer virtual versions of their products.
§ Benefits of Virtualization
• Snapshots: Easily create a snapshot of a VM, a read-only copy of the disk file and
configuration information, much like a system image or a restore point on a physical host. By
creating a snapshot before risky activities or updates, users can quickly roll back if needed.
• Security Control Testing: Virtual test environments are an ideal place to thoroughly test
security protocols before deploying them on the real network.
• Patch Compatibility: A test VM is useful for testing any operating system or application
patches to make sure they don't introduce any problems.
• Host Availability and Elasticity: Easily maintain High Availability (HA) for services hosted on
a VM by transferring the VM if the physical host has problems or needs maintenance. Easily
provide elasticity by changing the resources allocated to the VM based on its load. Copy it to
create redundant systems for load balancing.
• Sheep Dip: The process of using a dedicated device to test inbound files on removable
media for viruses before they are allowed to be used with other computers.
§ Other VM Technologies
• Thin Clients: Optimized for establishing a remote connection with a server-based computing
environment. Relies on a network connection for computing and processes very little on the
actual hardware. Thin clients connect to VMs stored on company servers. Can use VMs to
provision corporate desktops, effectively replacing traditional desktop computers.
• Thick Clients: Systems that connect to servers even without a network. They do not rely on
server applications since they can process, store, and manage data independently.
• Containers: Instead of a bare metal or a hosted hypervisor, the host operating system runs a
container service that can host multiple containers. Like a VM, a container is isolated from
other containers on the same computer. It can also perform relatively low-level operating
system tasks, such as defining its file system. Unlike a VM, containers do not have a guest
operating system. Instead, it shares the kernel of the host operating system. Containers are
somewhat less flexible than VMs, but they consume fewer resources and can be deployed
more quickly. Containers have similar security concerns as any other application
deployment method, such as bugs, insufficient security controls, or misconfigurations. Use
container-specific operating systems, which are minimal and designed specifically for
containers. Group container types on the same host by purpose, sensitivity, and threat
posture. This limits the scope of any potential intrusion.
• Storage Segmentation: Separates the information on a device into partitions.
• Sandboxes: Can be used as a test environment for code execution, patches, updates,
rollback planning, quarantining, segmentation during Incident Response, or reverse-
engineering malware.
• Virtual Desktop Infrastructure (VDI)/ Virtual Mobile Infrastructure (VMI): A virtual desktop
that allows users to access their desktop from a mobile endpoint. Applications and data are
managed externally from the device, on a separate server, or in the cloud. Minimizes risk
from device loss. Uses virtual machines to provision corporate desktops, replacing
traditional desktop computers.
o Non-Persistent VDI: The central server only stores one master image or golden
image of a fully configured computer. Whenever a user logs in, the server starts a
VM based on that master image, but it doesn't directly change any of its files or
settings. All changes are applied to a temporary copy or file system instead. When
the user logs out, all of the temporary data is deleted. When a user logs back in, or
when different users log in simultaneously, they each receive a new, generic VM.
Saves on storage space and also makes it easy to apply updates for configuration
changes. Prevents users from making changes that will cause security risks. Works
best for users that only need standard workstations without customization. They do
not work very well for users who have unique configurations or software needs.
o Application Layering: A given user can have a customized VM that includes all the
applications assorted with their user profile, without the server needing a separate
master image for each unique combination of installed applications.
§ VM Security
• Virtual Machine Life Cycle Management (VMLM) Software: A set of processes that help
oversee the implementation, delivery, operation, and decommissioning of VMs.
• Virtual/ Cloud Firewall: A software-based security device or service that monitors and filters
network traffic for Virtual Machines (VMs) and virtualized environments. Provides valuable
East/West network security.
• Network Segmentation: Allows administrators to isolate network traffic and organize
resources. Virtual networks use subnets, security groups, routing, and firewall rules to
manage network communications within and between segments.
• Role-Based Access Control: Allows administrators to grant access to users based on their
role, authorization, and permissions. This can help delegate administrative controls across a
company, allowing different users to access different parts of the environment.
• Just-in-Time (JIT) VM Access: Limits inbound traffic to VMs, reducing exposure to attacks.
• Administrative Controls
o VM Policies and Procedures: Enforced to help secure Virtual Machines (VMs).
§ Patching and Updates: Keeping VMs current with the latest patches and updates for their operating
systems and applications can help avoid vulnerabilities and exploits.
§ Deactivate Unnecessary Functionality: Deactivating features that are used infrequently can help
minimize potential points of attack.
§ VM Life Cycle Management: This includes restricting storage of VM images and snapshots, using
backup and failover systems, tagging VMs based on their sensitivity or risk level, and creating a
formal change management process for VM images.
§ Monitor Resource Utilization: Deploying monitoring tools to track resource usage across VMs can
help identify underutilized or overprovisioned VMs.
§ Use Separate Management APIs: Isolating service from infrastructure management and
orchestration can help protect the network.
Mobile Security
• Logical Controls
o Carrier Locking/ Unlocking: In the locked state, only the SIM card of a specific carrier will work. In the
unlocked state, the device has no carrier restrictions, and any SIM card will work.
o Mobile Device Management: A proven methodology and toolset used to provide workforce mobile
productivity tools and applications, while keeping corporate data secure.
§ Mobile Device Management (MDM): Centralized management of mobile devices. Can implement
screen locks, account lockout, patch management, Over-the-Air (OTA) updates, and remote wipe.
§ Mobile Application Management (MAM): Allows provisioning and access control for approved
enterprise apps. Has features for app delivery, configuration management, authentication, access
control, push notifications, and reporting. Creates an enterprise-approved application catalog to
choose from. Can also remotely wipe application data.
§ Mobile Content Management (MCM): Delivers centrally hosted data and services to mobile devices,
allowing device-specific formatting and security controls. Features include data encryption, secure
connection to web applications, and DLP rules.
§ Mobile Identity Management (MIM): Centralized Identity and Access Management (IAM) for mobile
devices. Features include Single Sign-On (SSO), certificate management, and device enrollment.
§ Enterprise Mobility Management (EMM): An evolution of MDM, with MAM, MCM, and MIM.
Popular in BYOD environments. Detects rooted/jailbroken devices to help protect enterprise data.
§ Unified Endpoint Management (UEM): A further evolution of EMM, which provides central
management of all endpoints from a single platform. In addition to mobile devices, it supports
desktops, printers, and IoT devices. Can detect rooted/jailbroken devices to protect enterprise data.
o Virtual Desktop Infrastructure (VDI)/ Virtual Mobile Infrastructure (VMI): A virtual desktop that allows
users to access their desktop from a mobile device. Apps and data are managed and stored externally from
the device, in the cloud. Minimizes risk from device loss. Managed from a single platform, like a remote
desktop. Works best for Android devices.
o SEAndroid: Security enhancements for Android devices. Considered a Trusted OS.
o MicroSD HSM: Provides security services for mobile devices, such as encryption, key generation, digital
signatures, authentication, and secure storage. Works well to securely store cryptocurrency.
o Lightweight Cryptography: Field of study in the pursuit of developing more powerful tools and algorithms
that use less computer power and resources.
o Elliptical Curve Cryptography (ECC): Math based on calculating the properties of curves, instead of prime
numbers. Uses a smaller key size and curve algorithms to secure data. Lower CPU usage. Stronger security
with much shorter keys than other asymmetric algorithms. Perfect for mobile and portable devices.
• Administrative Controls
o Corporate Device Deployment Models
§ Corporate Owned, Business Only (COBO).
§ Corporate Owned, Personally Enabled (COPE).
§ Choose Your Own Device (CYOD).
§ Bring Your Own Device (BYOD).
§ Virtual Desktop Infrastructure (VDI)/ Virtual Mobile Infrastructure (VMI).
o Mobile Device Management Policies: Logical controls enforced by administrative policies.
§ Acceptable Use Policies: Set policies on apps, data, camera usage, etc.
§ Application Management: Block the use of apps that have not been expressly approved.
§ Screen Locks: Set policies for auto-locking mobile devices.
§ Passcode/PIN Requirements: Implements Screen Locks and PINs, as well as a Screen Lockout after
too many failed login attempts. May require Biometrics, and/or Multi-Factor Authentication (MFA).
§ Authentication: Allow or disallow the use of Biometrics for authentication, and manage Context-
Aware Authentication, which takes additional factors into account, like location.
§ Data Management: Set policies for data backups, encryption, and remote wipe.
§ Over the Air (OTA) Firmware Updates: Push required firmware/OS updates and patches.
§ Geolocation/ Geofencing: A virtual perimeter for a geographic area. Can disable or enable location,
geotagging, camera, microphone, and recording devices, depending on location. Helps with DLP.
§ Data Loss Prevention (DLP): Can disable the ability to plug-in or read external storage devices, such
as flash drives, SD cards, USBs, or USB On-the-Go devices.
Web Security
• Logical Controls
o HTTPS: The primary protocol for sending data between a website and a browser. HTTPS uses encryption to
secure data transfer, making it important for transmitting sensitive data like login credentials, banking
information, and credit card numbers. Protects users from Eavesdropping, Man-in-the-Middle (MitM),
Domain Name System (DNS) Spoofing, and transaction tampering.
o Captchas: A type of challenge-response test used to determine whether the user is human, to deter bot
attacks and spam.
o Secure Cookies: An HTTP cookie that sets a Secure attribute. Limits a search to secure channels only.
o Web Application Firewalls (WAF)/ Application Layer Firewalls: An Application-Layer firewall that filters,
monitors, and blocks HTTP traffic to and from a web service. It monitors all traffic, encrypted or not, for
malicious behaviors, before passing commands to a web server. External traffic is filtered by a traditional or
Next Generation Firewall (NGFW) first. May take actions such as alerting, blocking, re-routing, or logging.
Protects web servers and back-end databases from code injection and Denial of Service (DoS) attacks. Uses
application-aware processing rules and pattern-matching to filter traffic and detect threats. Includes Deep
Packet Inspection. Can be deployed as a hardware appliance or plug-in software on a host/web server.
Firewalls are based on implicit deny and must specify which traffic will be allowed.
o Secure Web Gateways (SWG): A software application, hardware device, or cloud service that is deployed at
the boundaries of a network to monitor and stop malicious traffic from entering the organization, and to
block users from accessing malicious or suspicious web resources. Includes URL Filtering, Spam Filtering,
Malware Inspection, routing and switching, IDS/IPS, firewall, Bandwidth Monitoring, and VPN endpoints.
Next-Gen Firewalls (NGFW) perform these functions as well.
o Content Filters/Web Filters/URL Filters: Control the content users can access over the Internet. Can be
hardware, software, or on a firewall. Issues include over-blocking, under-blocking, handling of encrypted
traffic and privacy concerns.
o DNS Filters: Restrict web content.
o Remote Browser Isolation (RBI): A web security technology that neutralizes online threats by hosting users'
web browsing sessions on a remote server instead of the user's endpoint device. RBI separates web content
from the user's device to reduce its attack surface. An example of Zero Trust being applied to websites.
• Administrative Controls
o Access Control Management: Administrators manage access controls based on an organization's security
policies. For example, restricting access to only approved IP addresses.
o Web Security Awareness Training: Implementing an educational program to improve cybersecurity
awareness and skills among all users.
o Information Privacy Policies: Also known as data privacy, this is the ability to control how personal
information is accessed, stored, and used. This includes information like names, addresses, contact
information, and online behavior. It also includes the right to consent to the collection, disclosure, and use
of data, and to ensure that data is accurate and current. Information privacy is important because it protects
individuals from criminals who may use their personal data for fraud or harassment, or from entities that
may sell their data to advertisers without their consent.
Applica:on Security
• Logical Controls
o Quality Assurance (QA): Logical controls/procedures for the secure development of applications.
§ Dynamic Analysis: Testing and evaluating a program, while the software is running.
§ Fuzzing: Also called Fault Injection, Robustness Testing, Syntax Testing or Negative Testing. Used to
test for code injection, errors, and other exploits.
• Protocol Fuzzing: Send modified, replayed, or nonstandard packets to an application.
• Application Fuzzing: Tests input/output functions of the application.
• File Format Fuzzing: Creates and saves randomly formatted file samples to be opened and
parsed by an application.
§ Stored Procedures: SQL queries that execute server-side instead of on the client side of the
application. The client application calls the stored procedure on the server. This prevents the client
from making any changes to the actual SQL queries.
§ Input Validation: The process of testing input received by the application for compliance against a
standard defined within the application. It can be as simple as strictly typing a parameter and as
complex as using expressions or business logic to validate input.
§ Output Encoding: Translating special characters into a different but equivalent form that is no
longer dangerous to the target interpreter.
§ Error Handling: Creating meaningful error messages for the user, useful diagnostic information to
the site maintainers, but no other useful information to an attacker.
§ Escaping: Adding a special character to avoid misinterpretation. For example, adding a \ character
before a " character so that it is interpreted as text and not as closing a string.
§ Data Execution Prevention (DEP): Memory regions are marked as non-executable, preventing code
from being executed. This protects against memory abuse attacks, such as Buffer Overflows.
§ Static Application Security Testing (SAST): Static code analyzer that identifies security flaws.
§ Code Signing: The process of digitally signing executables and scripts, to confirm the software
author and guarantee that the code has not been altered or corrupted. The encryption is
asymmetric, where a trusted CA signs the developer’s public key, and the developer signs the code
with their private key. Also employs a cryptographic hash to validate authenticity and integrity.
o Web Application Firewall (WAF)/ Application Layer Firewalls: An Application-Layer firewall that filters,
monitors, and blocks HTTP traffic to and from a web service. Includes Deep Packet Inspection. May take
actions such as alerting, blocking, re-routing, or logging. Uses application-aware processing rules and
pattern-matching to filter traffic and detect threats. Can be deployed as an appliance or plug-in software.
o Allow Lists and Deny Lists: The OS allows or disallows applications from running or being installed.
o Cryptographic Obfuscation: Taking something that is normally understandable and making it very difficult to
understand. Many developers will obfuscate their code to prevent others from following the logic used in
the application. Protects code from reverse engineering. Used by malware to hide itself from scanners.
o Compilers: Source code to binary for a computer-readable format.
o De-Compilers: Binary back to source code.
• Administrative Controls
o Application Development Models
§ DevOps: Focused on increasing the speed and quality of software development and delivery.
§ DevSecOps: Integrates security early and throughout the Software Development Life Cycle.
Developers and operations teams work together.
o Secure Deployment Policies
§ Harden the Underlying Host and Network: Ensure the host is kept updated. Disable unnecessary
applications, services, and user accounts. Apply antivirus and HIDS/HIPS software on the host.
Protect the network with firewalls, NIDS/NIPS, or a Web Application Firewall (WAF). If the
application uses multiple servers, make sure all of them are suitably hardened.
§ Securely Configure the Application: Choose securely coded applications using secure protocols.
Make sure that the app components and users operate in a least privilege environment. Apply
secure client-side validation features. Apply special protections against likely attack vectors.
§ Thoroughly Test the Application Before Deployment: Use a combination of human testing and
fuzzing techniques. For critical applications, consider outside security audits or penetration tests.
§ Maintain the Deployed Application Security Over Time: Use rigorous patch management to update
software without introducing new vulnerabilities. Conduct regular security audits. Educate users to
prevent attacks that rely on social engineering. Be aware of evolving network application threats.
Data Security
• Logical Controls
o Windows Group Policy Tool: Puts users into groups and grants privileges based on job function. Enforces
password policies, sets firewall rules, blocks access to folders or network shares, and restricts the use of
desktop features, like task manager. Includes manual and automated reviews of Identities and Access.
Windows has two types of permissions that restrict access: NTFS Permissions and Share Permissions.
§ NTFS Permissions: Apply to every file and folder stored on a volume formatted with the NTFS file
system. Permissions are inherited from a Root Folder to the files and subfolders beneath it by
default, but this can be disabled.
• Basic Permissions: A simpler way to set permissions. Each basic permission maps to one or
more advanced permissions.
• Advanced Permissions: Also known as special permissions. More granular settings that
divide basic permission levels.
§ Share Permissions: Apply only to shared folders. Takes effect when a folder is accessed from a
remote system. There are three types of share permissions: Full Control, Change, and Read.
• Full Control: Allows Users Read, Change, and Edit permissions, and file Ownership.
• Change: Allows Users to Read, Execute, Write and Delete folders and files within a share.
• Read: Allows Users to View the folders contents, including folder and subfolder names, file
data, and programs contained in the folder.
o Linux File Permissions: Each object in a file system has an Access Control List (ACL), which contains lists of
allowed accounts and permissions. chmod: Sets or modifies permissions using Symbolic or Absolute mode.
§ Symbolic Mode: Uses letters and symbols to add or remove permissions. For example, u+x gives the
Owner permission to Execute. Symbolic mode is good for small modifications, like adding Execute
permissions to files that already have Read permissions. Use commas to separate symbolic modes.
Read (r), Write (w), and Execute (x) can be applied to Owner/User (u), Group (g), and Others (o). Also
includes No Permissions (-). Math operators include + to add permissions, - to remove permissions,
and = to give no access.
• Examples of Symbolic Permissions
o u+r: Grants the User Read permission.
o g+rw: Grants the Group Read and Write permissions.
o o-rw: Removes Read and Write permission from Others.
o rw-r–r–: Users can Read and Write, while Groups and Others can Read.
§ Absolute Mode: Uses numeric octal values to represent permissions levels. For example, 6 gives
Read and Write, but not Execute access. Absolute mode is good for large modifications, like
removing all World and Group permissions. The sum of the values is added in a specific order: User,
then Group, then Others.
• Examples of Absolute Permissions
o chmod 700: Removes all permissions for the Group and World.
o chmod 701: Gives the Owner all permissions and World Execute permissions.
o chmod 705: Gives the Owner all permissions and World Read and Execute.
o chmod 640: Gives the Owner Read and Write permission, members of the Group
Read permissions, and no permissions for anyone else.
o Cryptography: The study and practice of techniques that help secure data and communication in the
presence of adversarial behavior.
§ Cryptographic Concepts
• Plaintext: Readable text before it is encrypted into ciphertext, or after it is decrypted.
• Ciphertext: The result of using an encryption algorithm or cipher, on plaintext.
• Confusion: Encrypted data made to be drastically different from the plaintext, making the
mathematical relationship between the plaintext and keys as complex as possible.
• Diffusion: Changing one character of the input will cause many characters to change in the
output. Breaking up patterns in the plaintext so they won't be at all apparent in the
ciphertext. Known contents won't be useful in decoding the ciphertext.
• Cryptographic Obfuscation: Taking something that is normally understandable and making
it very difficult to understand. Many developers will obfuscate their code to prevent others
from following the logic used in the application. Protects code from those who would try to
reverse engineer it. Sometimes used by malware to hide itself from scanners.
• Cryptographic Agility: The capability of an organization to quickly and efficiently switch
between cryptographic algorithms without disrupting existing systems. Ensures that an
organization can adapt to new cryptographic standards as threats evolve or new
vulnerabilities are discovered.
• Steganography: Representing information within another message or physical object, in
such a manner that the presence of the information is not evident to human inspection. An
example of Security Through Obscurity. Not innately secure, but harder to see.
§ Cryptographic Protocols
• Pretty Good Privacy (PGP): A security program that enables users to communicate securely
by decrypting and encrypting messages, authenticating messages through digital signatures,
and asymmetrically encrypting files. It was one of the first freely available forms of public-
key cryptography software. Perfect for lower-budget cryptography needs. Uses a peer-to-
peer, web of trust model for E-mail security.
o GNU Privacy Guard (GPG): A free, open-source version of PGP that provides
equivalent encryption and authentication services.
• Secure Socket Layer (SSL): A security protocol that provides privacy, authentication, and
integrity to Internet communications. Certificate-based authentication that performs a key
exchange to set up symmetrically encrypted communication sessions that last until one side
breaks the connection. Can also perform two-way authentication, where both the client and
server must have a certificate to present to the other.
• Transport Layer Security (TLS): SSL eventually evolved into Transport Layer Security (TLS). It
works with HTTP to route encrypted web traffic. TLS employs symmetric encryption for the
data and a public key for confirming the system's identity. Data includes a Message
Authentication Code (MAC) to prevent alteration during transmission or MitM attacks. In
addition, TLS has restrictions that curb replay attacks.
• Datagram Transport Layer Security (DTLS): A secure communication protocol, that is
designed to employ only UDP packets. It is sometimes known as UDP TLS. Because UDP is a
connectionless protocol, DTLS is faster, and it does not suffer the performance problems of
other stream-based protocols. DTLS is based on SSL/TLS, and it provides similar security
protections. This makes it favorable to use for VPN software.
§ Early Ciphers
• Transposition Ciphers: Scrambles the positions of characters without changing the
characters themselves.
o Rail Fence/ Zigzag: The plaintext is written downwards or diagonally on successive
rails of an imaginary fence, then moving up when the bottom rail is reached, down
again when the top rail is reached, and so on.
• Substitution Cipher: Units of plaintext are replaced with the ciphertext, in a defined
manner, with the help of a key.
o Monoalphabetic Cipher: A cipher in which each letter in the plaintext is replaced by
a letter with some fixed number of positions down the alphabet.
§ Caesar: Replaces a letter with the letter 3 places after it in the Latin
alphabet. A becomes D.
§ ROT13: Replace a letter with the 13th letter after it in the Latin alphabet.
o Polyalphabetic Cipher: A substitution cipher, using multiple substitution alphabets.
§ Vigenère Cipher: A method of encrypting alphabetic text where each letter
of the plaintext is encoded with a different Caesar cipher, whose increment
is determined by the corresponding letter of another text, called the Key.
§ One-Time Pad (OTP): An encryption system that is unbreakable providing
certain conditions are met. Plaintext is paired with a random secret key that
is also called a One-Time Pad.
o Progressive Key Cipher: A primitive form of substitution encryption that uses a
rolling key. Can be used with any of the above ciphers. Includes an incremental shift.
§ Modern Ciphers
• Stream Ciphers: A symmetric cipher where plaintext digits are combined with a
pseudorandom cipher digit stream. Each plaintext digit is encrypted one at a time.
Examples: RC-4, Salsa, and SEAL. The most widely used stream cipher is RC-4. Mainly used
for symmetric encryption. High speed and low hardware complexity. The key is often
combined with an Initialization Vector (IV), so the starting state is never the same twice.
• Block Ciphers: A deterministic algorithm that operates on fixed-length groups of bits, called
blocks. Examples: AES, DES, 3DES, Twofish and Blowfish. The most widely used block cipher
is AES. While the block size is a fixed size, not all data matches the block size perfectly. Some
modes require padding before encrypting. Each block is encrypted and decrypted
independently. Mainly used for symmetric encryption.
• Block Cipher Modes: Additional algorithms called modes of operation can be used to change
how the key is applied to successive blocks. Defines the method of encryption. May provide
a method of authentication. Available modes depend on the encryption protocol used.
Helps to avoid patterns in the encryption output.
o Electronic CodeBook Mode (ECB): Applies the key the same way to each block. It is
sufficient for a single block but provides little security for longer messages.
o Cipher Block Chaining Mode (CBC): Performs an XOR operation on each block of
plaintext using the previous block of ciphertext, then encrypts it with the key. A
corrupted block will prevent the decryption of the subsequent block, but not the
following blocks. Symmetric and uses an Initialization Vector (IV) for randomization.
Encryption that is dependent on the block before it. Slower than other modes.
§ Exclusive OR (XOR): A mathematical operation that's a part of all symmetric
operations. Done by comparing bits of plaintext and a key (same= 0,
different= 1). Can be reversed to get the plaintext back.
o Cipher FeedBack Mode (CFB): For each block, the key stream is modified using an
XOR of the previous ciphertext, making sure it's always different. CFB makes it easy
to encrypt a stream of values smaller than the standard block.
o Output FeedBack Mode (OFB): Like CFB, but the keystream is generated
independently of the previous ciphertext. Chaining still happens, but only after the
key is applied to the plaintext. It is better able to correct errors in transmitted
ciphertext, but it still can't correct for missing or added bits.
o Counter Mode (CTR): A stream cipher mode where each block encryption uses a
successively incremental counter. Converts blocks into streams. Uses an
Initialization Vector (IV). Its main benefit is performance. It has low overhead and is
well suited to parallelization during encryption and decryption. Widely used.
o Galois Counter Mode (GCM): An authenticated mode that combines Counter Mode
with a hash-based Galois authentication code. Provides data authenticity and
integrity. Minimal latency and operational overhead. Widely used.
o Offset Codebook Mode (OCB): An authenticated encryption mode that applies a
Message Authentication Code (MAC) and encryption in a single pass. OCB has very
high performance and is easier to implement than GCM, but it is under patent
protection, which has limitations.
o Data Encryption: Protects confidentiality of data by scrambling it and making it unreadable to humans. The
encryption key is stored in a file and can decrypt the ciphertext back into plaintext.
§ Categories of Encryption
• Transport Encryption: Protect data in transit, such as that being sent over the network.
• Storage Encryption: Protects data at rest, on some sort of persistent storage medium.
• Memory Encryption: Protects data in use, such as RAM data or data that is being processed.
Memory Encryption is challenging to implement without hurting performance and
interoperability, but it is increasingly desirable to organizations with strict security needs.
• Homomorphic Encryption: Ciphertext that can be analyzed as if it were in its original form.
Perform research or calculations without viewing the data. Uses a public key and is more
secure than traditional encryption. Decrypted data can only be viewed with the private key.
§ Symmetric Encryption: Uses a single, shared key. Also called Private/Secret/Session Key
Cryptography. Faster than asymmetric encryption but is considered less secure. Efficient enough to
handle bulk data encryption, but not secure enough to be used for secure key exchange.
• Algorithms
o Advanced Encryption Standard (AES): A symmetric, block cipher chosen by the U.S.
government to protect classified information. AES is the strongest block cipher and
is widely used, typically with 128-bit, 192-bit or 256-bit keys. No known
cryptographic weaknesses. This is the encryption standard used by WPA2.
o Twofish: A symmetric block cipher with a 128-bit, 192-bit, or 256-bit key size. Uses a
very complex key structure with 128-bit blocks. No known cryptographic
weaknesses. Not limited by patents. As good as AES.
o Blowfish: A variable-length, symmetric, 64-bit block cipher, with a maximum key
size of 448 bits. Not limited by patents.
o Data Encryption Standard (DES): A symmetric-key block cipher. Its short key length
of 56-bits makes it too unsecure for modern applications. Was common until
replaced by AES. The block size is 64 bit. It can be easily brute forced.
o Triple Data Encryption Standard (3DES): A symmetric block cipher, which applies
DES three times to each block. Has an optional mode where a decryption operation
is applied in the middle of its procedures. Block size is 64-bit. Key sizes are 112-bit or
168-bit. Considered a secure upgrade over DES, although not widely used.
o RC-4: A symmetric algorithm that was part of the original WEP standard with SSL.
Removed in the next implementation. Key sizes between 40-bits and 2048-bits.
Considered deprecated due to biased output.
§ Asymmetric Encryption: Each user has a public key and a private key. Also called Public Key
Cryptography. Sessions are encrypted with the recipient’s public key and decrypted with their
private key. Allows for non-repudiation of origin and delivery, access control, and data integrity.
More secure than symmetric encryption, but slower, with more cryptographic processing overhead.
It is mathematically intensive, and impractical for everyday use or encrypting large amounts of data.
For that purpose, symmetric encryption is more efficient. Asymmetric encryption is more often used
for secure key exchange, digital certificates, and sharing public keys.
• Algorithms
o Rivest, Shamir, and Adleman (RSA): A type of asymmetric encryption, which uses
two different, but linked keys. In RSA, both the public and the private keys can
encrypt a message. The opposite key from the one used to encrypt is used to
decrypt. This was the first practical use of public key cryptography. It uses large
prime numbers as a basis for encryption. Most widely used asymmetric algorithm.
o Digital Signature Algorithm (DSA): A cryptographic algorithm used to generate
digital signatures, authenticate the sender of a digital message, and prevent
message tampering. DSA involves two keys: A private key owned by the sender and
a public key held by the receiver.
§ Elliptic Curve Digital Signature Algorithm (ECDSA): Offers a variant of the
Digital Signature Algorithm (DSA), using Elliptical-Curve Cryptography (ECC).
o Elliptical Curve Cryptography (ECC): Uses math based on the difficulties of
calculating properties of curves, instead of prime numbers. Use smaller key sizes
and curve algorithms to secure data. Lower CPU usage. Stronger security with much
shorter keys than other asymmetric algorithms. It is much faster than RSA and DSA.
Perfect for mobile and portable devices.
o Diffie-Hellman (Key) Exchange (DH/DHE): An asymmetric standard for exchanging
keys. Primarily used to send private keys over a public, unsecured network. Allows
two parties that have no prior knowledge of each other, to jointly establish a shared
secret key over an unsecure channel.
§ Diffie-Hellman (DH) Groups: Determines the strength of the key used in the
key exchange process. Higher group numbers are more secure but require
additional time to compute the key.
§ Diffie Hellman Ephemeral (DHE): A DH key exchange with different keys.
§ Elliptical Curve Diffie-Hellman Ephemeral (ECDHE): A key agreement
protocol that allows two parties, each having an elliptical curve public-
private key pair, to establish a shared secret over an unsecure channel.
o ElGamal: An asymmetric algorithm for public-key cryptography, based on Diffie-
Hellman key exchange. It is probabilistic, meaning that a single plaintext can be
encrypted into many possible ciphertexts.
o Disk Encryption: A technology that protects information by converting it into code that cannot be
deciphered easily by unauthorized people or processes.
§ Full Disk Encryption (FDE): Encrypts the entire storage device, including metadata, via BitLocker or
FileVault software. FDE keys are securely stored in the TPM or on a USB drive.
§ Self-Encrypting Drive (SED): Hardware-based full-disk encryption based on the Opal Storage
Standard. Built-in encryption mitigates the performance issues of FDE.
§ Partition-Based Encryption: Allows selective encryption for different partitions.
§ Master Symmetric Key: A symmetric key that protects other keys, such as session keys. Also
protects Hard Disk Drive (HDD) data when whole drive encryption is implemented.
§ Recovery Agent: In the case of file encryption, the role of the recovery agent is to give a copy of the
recovered file back to the user in plaintext.
o Blockchain Technology: An advanced database mechanism that allows transparent information sharing
within a network. Stores data in blocks that are linked together in a chain. Each block is linked by hashing.
§ Public Ledger: Peer-to-peer transactions are public and cannot be deleted or reversed because to do
so would invalidate the hash.
o Hashing: The process of transforming any given key or a string of characters into another value. The hash
cannot be turned back into the original data but can be compared to the data to verify its integrity and or
authenticity. Also useful for generating keys from passwords created by humans.
§ Message Digest: A fixed-size numeric representation of the contents of a message, computed by a
hash function. A message digest can be encrypted, forming a digital signature.
§ Check Digit: One or more digits (or letters) computed by an algorithm from the other digits (or
letters) in the sequence input. With a check digit, one can detect simple errors in the input.
§ Checksum: A digital fingerprint or piece of data that helps check for unaltered copies of that data.
§ Salt/Pepper: A pepper is similar to a salt, a random bit of data that is added to the password before
it's hashed through an algorithm. But unlike a salt, it's not kept in the database along with the hash
value. Instead, it's usually hard coded into source code.
§ Key Stretching: An algorithm that increases key length through multiple iterations. Hashing a
password and then hashing that hashed value protects a weak password from brute-force attacks.
• Bcrypt: Protects passwords by repeating the Blowfish cipher.
• Password-Based Key Derivation Function 2 (PBKDF2): Applying the RSA function to
passwords to create a stronger key.
§ Hash Table: A data structure for stored hashes that allows for searching and organizing large
amounts of data, such as recognizing duplicate files stored in different folders. Identity hashing is
used for source code management systems, file-sharing networks, and image databases.
§ Password Hash Storage: Many password databases only store the hash, not the plaintext password.
When a user enters a password, it is hashed and compared to the stored hash in the database.
§ Hashing Algorithms
• Message Digest (Algorithm) 5 (MD5): A widely used hash function producing ONLY a 128-bit
hash value. Has collisions. Do not use.
• Secure Hash Algorithm (SHA-1): Produces ONLY 160-bit digest for the same input.
• Secure Hash Algorithm 3 (SHA-2): Commonly produces a 256-bit digest. The functions range
from 224 to 512-bit.
• Secure Hash Algorithm 3 (SHA-3): Six hash functions with digests (hash values) that are 128,
224, 256, 384, or 512 bits: Newer, more secure, but slower. SHA3-256 is the most widely
used algorithm.
• Hash-Based Message Authentication Code (HMAC): A hashing algorithm combined with a
symmetric key. Provides data integrity and authenticity. Faster than asymmetric encryption.
• RACE Integrity Primitives Evaluation Message Digest (RIPEMD): It is based on MD.
Collisions were found, but with security improvements and additional functions to produce
hashes between 128-320 bits, it is more secure now. The most popular is RIPEMD-160,
which is similar to SHA-1 in performance, but has fewer known flaws.
o Redundant Data Storage: Remove single points of failure and create fault tolerance.
§ Multi-Pathing: Connections allowing multiple paths between two points, so that an interruption or
failure of one won't interrupt service. Most often used in Fiber Channel SANs and other storage
solutions, which use them to increase both reliability and performance.
§ Load-Balancing: Spreads traffic load across multiple servers or databases so that a server failure
won’t interrupt service. Provides fault-tolerance and redundancy.
§ Clustering: Multiple servers in a cluster supply redundant resources, are aware of each other, and
work toward a common goal. Clusters can dynamically reallocate duties when individual servers fail.
§ Virtualization: Virtual and cloud systems make it much easier to quickly deploy new copies of
existing systems. Beyond recovery from failure, it also includes elasticity to meet transient surges in
demand, and scalability to meet long-term growth.
§ Geographic Dispersal: Organizations maintain alternate facilities for the sake of redundancy and
fault tolerance. If a disaster disables one site, others pick up the slack until full service is restored.
§ Data Replication: Maintains exact copies of data at multiple locations, providing redundancy and
ensuring data availability in the case of disasters.
• Synchronous Replication: Writes data to all replicas simultaneously.
• Asynchronous Replication: Copies data to replicas at scheduled intervals.
§ Redundant Array of Independent/ Inexpensive Disks (RAID): A data storage virtualization
technology that combines multiple physical drive components into one or more logical units for data
redundancy, performance improvement, or both.
• Striping: The technique of segmenting logically sequential data, so that consecutive
segments are stored on different physical storage devices. Striping is useful when a
processing device requests data more quickly than a single storage device can provide it.
• Parity: A calculated value that's used to restore data from information found on the other
drives, if a drive fails.
• Mirroring: The replication of logical disk volumes onto separate physical hard disks in real-
time to ensure continuous availability.
RAID 0 Striping. Splits data into blocks that get written across all drives in an array.
Uses all storage capacity with no overhead. NOT redundant. No mirroring,
and no parity. Loss of any disk will cause complete data loss.
RAID 1 Mirroring. Two drives that contain the exact same data. No striping or parity.
Slower write speed but provides redundancy if one drive fails. Uses only 50%
of available disk space because saved data is duplicated on a second disk.
This does not minimize disk space compared to RAID 5.
RAID 5 Striping with Parity. No mirroring. Requires at least three drives. Writes data
evenly across disks in a striped set. Error recovery information is distributed
across disks, such that the failure of a single drive can be tolerated. If a drive
fails, data is recovered using parity. Requires less storage space and is more
cost effective compared to RAID 1. High read speeds and fault tolerance.
RAID 6 Striping with Dual Parity. Similar to RAID 5, but parity data is written to two
drives. Requires at least four drives and can withstand two drive failures.
RAID 10 Mirroring and Striping. Requires at least four drives. Provides speed of RAID
0 and redundancy of RAID 1. Most expensive way to provide redundancy.
o Data Backups
§ 3-2-1 Rule: 3 copies of data, across 2 media types, with one offline and one off-site.
§ Backup Types
• Online: Instant availability, but vulnerable to ransomware and other attacks.
• Offline: A manual connection is required. Better security, but less convenient.
• Full Backup: A complete copy of data assets. Requires all files to be backed up into a single
version. It is the best data protection option in terms of speed of recovery and simplicity.
• Incremental Backup: Successive copies of the data contain only the portion that has
changed since the preceding backup (of any kind) was made. When a full recovery is
needed, the restoration process requires the last full backup plus all the incremental
backups that took place up until the point of restoration.
• Differential Backup: Copies all of the files that have changed since the last full backup was
performed. This includes any data that has been created, updated, or altered in any way.
• Image: A full backup of an entire system, allowing it to be restored to full operation from a
bare metal state. Images are especially popular for freshly configured servers and
workstations and are valuable for horizontal scaling and non-persistence.
• Snapshot: A type of backup used to quickly capture the state of a system at a given point,
with limited impact on ongoing operations. Snapshots make a virtual copy of the active
system and then back up that copy. The backups can be full, incremental, or differential.
Popular for VMs or High Availability (HA) databases.
• Replication: Create redundant copies of data for availability and recovery. Enhances data
protection across multiple locations and systems.
o Remote Journaling: A data replication method that copies journal or transaction
logs from one system to another, often to a separate location.
o SAN Replication: A data protection technique that copies data from one device on a
Storage Area Network (SAN) to another.
o VM Replication: A process that creates a copy, or replica, of a VM and keeps it in
sync with the original. The replicas are stored in a powered-off state, so they don't
use compute resources. If the original VM's data is lost or corrupted, the replica can
be used to restore the machine.
§ Backup Utilities
• Backup and Restore: A traditional backup utility that allows manual or scheduled backups of
folders, volumes, or drive images. It does not include continuous backups.
• File History: By default, it copies the contents of libraries and user folders to an external
drive, but it can be configured to include any folder. Once configured, it operates
continuously, keeping data protected. It even stores multiple versions of each file, so if a
previous version is needed, it can be restored.
• Windows Server Backup: Similar to Backup and Restore but found on Windows Server
operating systems. It has additional options intended for use in a server environment.
• System Restore: Reverts the computer to a previous state, undoing system changes and
application installations. It does not copy user files, nor does it save data to external drives.
It allows users to revert unwanted system changes to a known good state. Automatically or
manually creates restore points before software or Windows Update installations.
• WinRE: Windows Recovery Environment (WinRE) is available from advanced boot options or
a system disk. It includes troubleshooting tools and can also attempt automated boot repair
or restore data from a system image. It isn't used to create backups, but if the data is still
available, it can be used to repair the system.
• Volume Shadow Copy Service (VSS): A technology used by Windows Backup and System
Restore, that allows Windows to take backup or replica copies of files or entire volumes,
even when they're already in use and would otherwise be locked from reading.
§ Backup Media
• Disk: Small Office/Home Office (SOHO) backups. They lack enterprise-level capacity,
scalability, and manageability.
• Tape: Enterprise-level capacity, scalability, and manageability.
• Network Attached Storage (NAS): A specialized hardware appliance with nothing but hard
drives, a network interface, and a stripped-down operating system optimized for sharing
files. Any host with appropriate permissions can access its storage. Allows file-level access.
• Storage Area Network (SAN): Block-level access to storage devices. Highly configurable with
mixed storage technologies to implement performance tiers. Looks and feels like a local
storage device. Very efficient reading and writing. Requires a lot of bandwidth. May use an
isolated network and high-speed network topologies. If one device fails, users can still work
with the data. It has very fast recovery times compared to traditional backups.
o SAN Snapshot: Create a data state at a point in time. Copy that state to other SANs.
o SAN-to-SAN Replication: Duplicate data from one data center to another.
• Cloud: Functions are distributed over multiple locations, each of which is a data center.
o Normalization: A technique used to design and redesign databases. It is a process or set of guidelines used
to optimally design a database to reduce redundant data.
o Database Management Systems (DBMS): Software systems used to store, retrieve, and run queries on data.
A DBMS serves as an interface between an end-user and a database, allowing users to create, read, update,
and delete data in the database. The identification methods are often implemented within DBMSs
o Content Management Systems: A software application that manages digital content. Provides indexing,
which allows for file-labeling (names, dates, and file types), and data classifications. Search and access
content across multiple websites and mobile apps. This feature provides more flexibility in how, where, and
when content files can be accessed.
o Data Loss Prevention (DLP): Prevents the sharing or transmitting of sensitive data. DLP solutions inspect all
data leaving the organization, including E-mail contents and attachments, copy to portable media, File
Transfer Protocol (FTP), posting to web pages/websites, applications, and Application Programming
Interfaces (APIs). Also includes Pattern-Matching and Watermarking.
o Information Rights Management (IRM): Controls printing, editing, copying, pasting, or screenshots.
Restricts file permissions and forwarding.
o File Integrity Checks: An application that verifies that files have not been modified, using a hash algorithm.
o Advanced Intrusion Detection Environment (AIDE): A file and directory integrity checker, which creates a
database from the regular expression rules that it finds in the configuration files. Once this database is
initialized it can be used to verify the integrity of the configuration files.
o Hardware Security Module (HSM): High-end hardware to store and generate encryption and decryption
keys, and offload CPU overhead for cryptographic processing from other devices. Useful as network devices
in PKI environments. Can be a plug-in device or a network appliance.
o Trusted Platform Module (TPM): A cryptographic component in the motherboard of mobile devices.
o Quantum Computing: Performs very large calculations in a very short period. Monitoring conversations
would modify the keys, preventing verification. Prevents MitM attacks because the act of observing a
conversation would alter the conversation. Just theoretical at this point but will eventually render existing
cryptographic methods useless.
§ Qubit: The smallest unit of information.
§ Superposition: Zeros, ones, and any combination in between, at the same time.
§ Quantum Key Distribution (QKD): Create unbreakable encryption by sending a random stream of
qubits (the key), across a quantum channel. Both sides can verify the key. If it's identical, the key was
not viewed during transmission. Any attacker eavesdropping on the communication would modify
the data stream. This act would violate quantum physics.
• Administrative Controls
o Data Privacy Policies
§ Data Minimization: A data controller should limit the collection of personal information to what is
directly relevant and necessary to accomplish a specified purpose. They should also retain the data
only for as long as is necessary to fulfill that purpose.
§ K-Anonymity: Ensures that data cannot be linked to fewer than “K” individuals, reducing re-
identification risks. If identifiers for each person in a dataset are identical to at least (k – 1) other
people in the dataset, then the data is not unique to a certain individual and can't be used to
identify them. This is achieved by hiding individual records in groups of similar records, which
significantly reduces the possibility of identification.
§ Tokenization: A process by which a piece of sensitive data, such as a credit card number, is replaced
by a surrogate value known as a token. The sensitive data still generally needs to be stored securely
at one centralized location for subsequent reference. Requires strong protections.
§ Data Masking: ****
§ De-Identification: Removing the association between a set of identifying data and the data subject.
§ Anonymization: A de-identification technique that involves the complete and irreversible removal of
any information from a dataset that could lead to an individual being identified.
§ Pseudo-Anonymization: Removing personal identifiers and replacing them with placeholders.
o Data Governance Policies
§ Data Classification
• Public/Unclassified.
• Private/Classified.
• Restricted/Internal Use Only.
• Sensitive.
• Confidential.
• Secret.
• Critical.
• Top Secret.
§ Data Sensidvity Labels
• Proprietary.
• Personally Idenhfiable Informahon (PII).
• Protected Health Informahon (PHI).
§ Access Control Policies
• Discretionary Access Control (DAC): The owner has full control over the resource.
• Attribute-Based Access Control (ABAC): Fine-grained access control. Decisions are based on
a combination of subject, object, and context attributes.
• Rule-Based Access Control (RBAC): Access is based on pre-defined organizational rules.
• Role-Based Access Control (RBAC): Access is allocated to pre-defined organizational roles.
• Mandatory Access Control (MAC): Based on security clearance level.
• Conditional Access: Suspends account or requires re-authorization based on conditions.
§ Data Retention Policies
• Data Minimization: Collect as little data as possible.
• Purpose Limitation: Use data for only expressed purposes.
§ Data Sanitization Policies
• Purge: Destroy some of the data.
• Wipe: Unrecoverable deletion.
§ Secure Data Destruction Policies
• Pulping: Removes ink, breaks down paper, and recycles it.
• Shredding: Industrial shredder is used to break documents and drives into bits.
• Degaussing: Using a strong magnet to wipe the data.
• Destroying: Physically drilling a hole through the device or smashing it to pieces.
• Incinerating: Burning the medium.
• Third-Party Certificate of Destruction: Proof that a third-party destroyed the data.
Security Tools
Security+ 701 Study Guide
By: Krystal Ballew
Network Hardening
• General Network Hardening
o Physical Hardening
§ Use a Defense-in-Depth or Layered security posture.
§ Where possible, use vendor diversity on network appliances.
§ Physically protect cables from cu:ng, disconnec=ng, rearranging, stepping and/or tripping.
§ Lock server racks, and bulk cable connec=ons.
§ Consider standard naming conven6ons for server racks and cable organiza=on.
§ Make switch and router hardware less physically accessible.
§ Use fire suppression systems.
§ Consider intrusion sensors and personnel barriers.
§ Physically block unused router and switch ports.
§ Keep physical and logical network maps current with device names and IP address naming schemas.
§ Conduct semi-regular Site Surveys.
§ Consider backup power, redundant storage, and/or hot, warm or cold sites in the event of a disaster.
§ Consider the use of an Uninterrup6ble Power Supply (UPS).
§ Replace legacy/deprecated systems at the End of Life (EOL) or End of Service Life (EOSL).
§ If a legacy system cannot be replaced, use a hardware, soIware, or network wrapper.
o Logical Hardening
§ Implement logical separa6on: Divide the network into zones that can be co-allocated on the same
hardware or network cable.
§ Configure authen=ca=on on network appliances.
§ Change all default usernames and passwords/passphrases.
§ Enable usernames and passwords/passphrases on user, enable and config modes.
§ Require Mul6-Factor Authen6ca6on (MFA).
§ Disable Dynamic Trunking Protocol (DPT).
§ Disable old, insecure rou=ng protocols, like RIPv1.
§ Disable unused logical ports and use private ports where possible.
• Disable or password-protect Telnet.
• Password-protect and use SSH.
• Disable remote login, when not needed.
• Use secure and updated versions of all protocols.
§ Install a network firewall.
§ Consider security appliances, such as a NIDS/NIPS, or a Unified Threat Management (UTM) solu=on.
§ Use baselines for Trend Analysis and Integrity Measures Checks.
§ Implement Access Control Lists (ACL), whitelists and blacklists for MAC addresses and IP addresses.
§ Keep security patches current.
§ Consider requiring VPN use.
§ Implement user segmenta6on: Control which areas of the network individual users can access.
o Administra@ve Hardening
§ Enforce strong password/passphrase policies.
§ Define rules and policies for Internet use, remote login, personal and corporate account use.
§ Define rules and policies for hardware, soIware, and mobile device use.
§ Enforce policies for geofencing, context-aware authen6ca6on, 6me/loca6on-based login, and
impossible travel. Where possible, prevent aQer-hours logins.
§ Ini=ate Least Privilege, Dual Control, Separa6on of Du6es, Job Rota6on, and/or Mandatory Vaca6on.
§ Monitor and manage poten=al breaches in supply chain security.
§ Conduct frequent permissions and configura=ons audits.
§ Disable unused accounts: Ensure malicious ac=ons cannot occur aIer an employee’s exit.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
• Wireless Network Hardening
o Physical Hardening
§ Ensure that router and Wireless Access Point (WAP) hardware is not physically accessible.
§ Protect any physical network cables from cu:ng, disconnec=ng, rearranging, stepping, or tripping.
o Logical Hardening
§ Disable SSID Broadcas6ng.
§ Configure authen=ca=on on network appliances.
§ Change the default SSID and password/passphrase.
§ Disable the Wi-Fi Protected Setup (WPS) buTon on routers and Wireless Access Points (WAPs).
§ Consider op=ng for the more secure protocol, Easy Connect DPP.
§ Lower the Wi-Fi signal strength to prevent unauthorized use.
§ Choose non-overlapping channels (1, 6, and 11) in buildings with more than one Access Point (AP).
§ Use Heatmaps and Signal Strength Measures to look for Rogue Access Points or Evil Twins.
§ Use WPA3 (Wi-Fi Protected Access 3): WEP and WPA are deprecated.
§ Implement Access Control Lists (ACL), whitelists and blacklists for MAC addresses and IP addresses.
§ Keep security patches for hardware, firmware and soIware current.
§ Consider cap6ve portals with health checks, for new or guest devices.
§ Consider requiring VPN use.
o Administra@ve Hardening
§ Implement employee training on secure network use, and general threat awareness.
§ Enforce strong password/passphrase policies.
§ Define rules and policies for Internet use, remote login, personal and corporate account use.
§ Enforce policies for geofencing, context-aware authen6ca6on, 6me/loca6on-based login, and
impossible travel. Where possible, prevent aQer-hours logins.
§ Conduct frequent permissions and configura=ons audits.
§ Disable unused accounts: Ensure malicious ac=ons cannot occur aIer an employee’s exit.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
• Cloud Network Hardening
o Logical Hardening
§ Block public access.
§ Implement Iden6ty and Access Management (IAM).
§ Put users into groups based on job func=on.
§ Assign permissions to groups rather than individual accounts.
§ Avoid the use of generic accounts, such as guest accounts or others shared by mul=ple users.
§ Configure Mul=-Factor Authen=ca=on (MFA) for cloud environments.
§ Use a VPN for cloud access.
§ Configure cloud-based virtualized networks.
§ Use a cloud-based firewall and/or cloud-based IPS.
§ Consider a Next-Gen Secure Web Gateway (NG-SWG).
§ Create separate Availability Zones (AZ).
§ Duplicate data and store backups in different geographic loca=ons.
§ Use a cloud-based Security Informa6on and Event Manager (SIEM).
§ Use Load Balancers to provide High Availability (HA).
o Administra@ve Hardening
§ Implement employee training on secure cloud network use, and general threat awareness.
§ Enforce strong password/passphrase policies.
§ Define rules and policies for cloud access and Acceptable Use.
§ Enforce policies for context-aware authen6ca6on.
§ Conduct frequent permissions and configura=ons audits.
§ Disable unused accounts: Ensure malicious ac=ons cannot occur aIer an employee’s exit.
§ Consider the use of a Cloud Access Security Broker (CASB) or a Managed Service Provider (MSP).
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
Endpoint Hardening
• General Endpoint Hardening
o Physical Hardening
§ Consider physically blocking the use of media, such as USB, USB OTG, and flash drives for DLP.
§ Consider cable locks on all endpoints that are accessible to the public.
§ Consider privacy screens to prevent shoulder surfing.
§ Replace legacy/deprecated systems that have reached End of Life (EOL) or End of Service Life (EOSL).
§ If a legacy system cannot be replaced, use a hardware, soIware, or network wrapper.
o Logical Hardening
§ Require Mul6-Factor Authen6ca6on (MFA).
§ Consider logically blocking the use of plug-in media, and disks for DLP.
§ Ensure all hardware and soIware is legi=mately sourced and unaltered.
§ Only install apps from trusted loca=ons.
§ Consider Trusted Opera6ng Systems (TOS): These sufficiently meet high security standards.
§ Apply secure configura=ons: Change the unsecured default se:ngs.
§ Apply the principle of Least Func6onality: Limit the OS to be able to perform only what is necessary.
§ Assign Administrators two accounts apiece, an administrator account for tasks that require escalated
privileges, and a standard user account for all other work.
§ When giving mul=ple accounts to a user, ensure that each account has a separate password.
§ Avoid the use of generic accounts, guest accounts, or accounts shared by mul=ple users.
§ Assign permissions to groups rather than individual accounts.
§ Manage permissions to avoid authoriza6on creep.
§ Ini=ate an Applica6on Blocklist/Approved List and quaran=ne any suspicious applica=ons.
§ Use host-based firewalls, spam filters, and HIDS/HIPS and SIEMs.
§ Configure security logs to record key indicators and review for suspicious ac=vity.
§ Ensure all systems have up-to-date an=-malware, with real-=me monitoring.
§ Regularly install security patches.
§ Encrypt all endpoint data.
o Administra@ve Hardening
§ Implement employee training on secure endpoint use, and general threat awareness.
§ Maintain Acceptable Use policies.
§ Enforce strong password/passphrase policies.
§ Define rules and policies for Internet use, remote login, and personal/corporate account use.
§ Enforce policies for geofencing, context-aware authen6ca6on, 6me/loca6on-based login, and
impossible travel. Where possible, prevent aQer-hours logins.
§ Conduct regular audits on group membership, permissions, and creden=als.
§ Disable unused accounts: Ensure malicious ac=ons cannot occur aIer an employee’s exit.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
• Virtual Machine (VM) Endpoint Hardening
o Logical Hardening
§ Use a library of standard VM images.
§ Archive or recycle underu=lized VMs.
§ Consider using Virtual Machine Lifecycle Management (VMLM) soIware.
§ Ensure all hardware and soIware is legi=mately sourced and unaltered.
§ Only install apps from trusted loca=ons.
§ Consider a Trusted Opera6ng Systems (TOS): These sufficiently meet high security standards.
§ Apply secure configura=ons: Change the unsecured default se:ngs.
§ Apply the principle of Least Func6onality: Limit the VM’s OS to perform only what is necessary.
§ Assign Administrators two accounts apiece, an administrator account for tasks that require escalated
privileges, and a standard user account for all other work.
§ When giving mul=ple accounts to a user, ensure that each account has a separate password.
§ Avoid the use of generic accounts, guest accounts, or accounts shared by mul=ple users.
§ Assign permissions to groups rather than individual accounts.
§ Manage permissions to avoid authoriza6on creep.
§ Use a host-based virtual firewall, spam filter, HIDS/HIPS and SIEMs.
§ Implement a Data Loss Preven6on (DLP) solu=on.
§ Configure security logs to record key indicators and review for suspicious ac=vity.
§ Ensure all systems have up-to-date an=-malware, with real-=me monitoring.
§ Regularly install security patches.
§ Encrypt the data stored on VMs.
o Administra@ve Hardening
§ To avoid VM Sprawl, administrators should enforce strict policies and procedure for deploying VMs.
§ Implement employee training on secure VM use, and general threat awareness.
§ Maintain Acceptable Use policies.
§ Enforce strong password/passphrase policies.
§ Define rules and policies for VM use, remote login, and personal and corporate account use.
§ Enforce policies for context-aware authen6ca6on, 6me/loca6on-based login, and aQer-hours logins.
§ Conduct regular audits on group membership, permissions, and creden=als.
§ Disable unused accounts: Ensure malicious ac=ons cannot occur aIer an employee’s exit.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
• Mobile Endpoint Hardening
o Physical Hardening
§ Disable the ability to plug-in or read external storage devices, such as flash drives, SD cards, USBs, or
USB On-the-Go (OTG) devices for DLP.
§ Consider cable locks for mobile devices and laptops, when in public areas.
§ For kiosks and public tablet use, consider using mechanisms and sensors to detect and respond to
physical breaches. Store in secure enclosures, especially when in public. Use tamper resistant and
tamper evident components.
o Logical Hardening
§ Consider using a Mobile Device Manager (MDM) solution.
§ Use strong passwords/passphrases, Multi-Factor Authentication (MFA), and Biometrics.
§ Ensure public or free Wi-Fi is protected before logging on.
§ Utilize a mobile VPN.
§ Encrypt the data on the device.
§ Install an anti-virus application.
§ Only install apps from trusted locations.
§ Ini=ate an Applica6on Blocklist/Approved List and quaran=ne any suspicious applica=ons.
§ Update to the latest software.
§ Keep OS, application, and firmware patches current.
§ Keep data backups, whether on a plug-in device, or in the cloud.
§ Implement a Data Loss Prevention (DLP) solution.
§ In a BYOD environment, use containerization to keep corporate data separate from personal data.
§ Block the use of apps that have not been expressly approved.
§ Implements Screen Locks and PINs.
§ Implement Screen Lockout aIer too many failed login aTempts.
§ Consider adding a virtual perimeter for a geographic area through geofencing or geoloca6on.
§ Disable or enable loca=on, geotagging, camera, microphone, and recording, depending on loca=on.
o Administrative Hardening
§ Determine which mobile deployment model is most suitable for the needs of the organiza=on.
§ Implement employee training on secure mobile device use, and general threat awareness.
§ Enforce strong password/passphrase policies.
§ Define rules and policies for mobile use, and personal and corporate account use.
§ Enforce policies for context-aware authen6ca6on, 6me/loca6on-based login, and aQer-hours logins.
§ Set Acceptable Use policies for applica=ons, data, camera usage, etc.
§ Set policies for auto-locking mobile devices.
§ Set policies for the use of Biometrics for authen=ca=on.
§ Set policies for data backups, encryp=on, and remote wipe.
§ Disable unused accounts: Ensure malicious ac=ons cannot occur aIer an employee’s exit.
§ In the event of device loss or theI, consider remote wipe.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
• IoT Endpoint Hardening
o Physical Hardening
§ Use tamper resistant and tamper evident components.
§ Store in secure enclosures, especially when in public.
§ Use mechanisms and sensors to detect and respond to physical breaches.
o Logical Hardening
§ IoT devices and embedded systems require segmenta6on.
§ Change all default usernames and passwords/passphrases.
§ Use strong passwords, MFA and encryp=on for devices and their applica=ons.
§ Only install apps from trusted loca=ons.
§ Push required firmware/OS updates and patches.
§ Patch all ac=ve devices and disconnect devices no longer in use.
o Administra@ve Hardening
§ Enforce strong password/passphrase policies.
§ Define rules and policies for IoT use, and personal/corporate account use.
§ Manage both ac=ve and inac=ve devices. Understand which devices are circula=ng on the network.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).
Applica8on Hardening
• ApplicaAon Hardening
o Logical Hardening
§ Work with developers on secure coding techniques, to provide specific mi=ga=ons against aTacks.
§ Document the use of approved coding languages and launch loca=ons.
§ Use code signing to make malicious code easier to detect.
§ Review and test code using sta6c and dynamic analysis.
§ Use a combina=on of human tes=ng and fuzzing techniques.
§ For cri=cal applica=ons, consider outside security audits or penetra6on tests.
§ Choose securely coded applica=ons using secure protocols.
§ Make sure that the app components and users operate in a Least Privilege environment.
§ Apply special protec=ons against likely aTack vectors.
§ Pay par=cular aTen=on to input valida6on, output encoding, error handling, and data exposure.
§ Sani6ze input by filtering or subs=tu=ng dangerous characters that could modify SQL queries.
§ Validate input by making sure all data is in the expected format before submi:ng it as a query.
§ Apply secure client-side valida6on features.
§ Use Automa6on and Con6nuous Integra6on/Delivery/Deployment/Monitoring and Valida6on, to
ensure secure and consistent development, staging, and produc=on environments.
§ Restrict end-user error informa6on to the minimum.
§ Use Informa6on Rights Management (IRM): Control prin=ng, edi=ng, copying, pas=ng, or
screenshots. Restrict file permissions and forwarding.
§ Restrict user and applica=on privileges to limit the damage a code injec6on can do.
§ Disable all unnecessary services.
§ Passwords/passphrases should be stored on a server, not on the applica=on itself.
§ Redundancy: Remove single points of failure and create fault tolerance.
§ Implement Patch Management for the applica=on OS.
§ Manage Service Accounts, a server’s permission to access data and interact with the applica=on.
§ Implement Windows User Account Control (UAC): Allows the app only the permission it needs.
§ Harden the underlying host and network. Apply an=virus and HIDS/HIPS soIware on the host.
Protect the network with firewalls, NIDS/NIPS, or a Web Applica6on Firewall (WAF).
§ Disable unnecessary applica=ons, services, and user accounts.
§ If the applica=on uses mul=ple servers, make sure all of them are suitably hardened.
o Administra@ve Hardening
§ Use rigorous patch management to update soIware without introducing new vulnerabili=es.
§ Conduct regular security audits.
§ Educate users to prevent aTacks that rely on social engineering.
§ Be aware of evolving network applica=on threats.
§ Review MITRE’s CVE List and NIST’s Na6onal Vulnerability Database (NVD).