Moudle1 2
Moudle1 2
Moudle1 2
AVINASH KUMAR
WHAT IS CYBER SECURITY?
• "Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and activities, including computer
network operations, information assurance, law enforcement, etc."
• OR
• Cyber security is the body of technologies, processes, and practices designed to protect networks,
computers, programs and data from attack, damage or unauthorized access.
• The term cyber security refers to techniques and practices designed to protect digital data.
• The data that is stored, transmitted or used on an information system
WHAT IS CYBER SECURITY?
• Regulations such as GDPR are forcing organizations into taking better care
of the personal data they hold.
• Because of the above reasons, cyber security has become an important part of
the business and the focus now is on developing appropriate response plans
that minimize the damage in the event of a cyber attack.
• But, an organization or an individual can develop a proper response plan only
when he has a good grip on cyber security fundamentals.
SECURITY TRIADS
• CIA
• Confidentiality is about preventing the disclosure of data to unauthorized parties
• It also means trying to keep the identity of authorized parties involved in sharing and holding data private and
anonymous.
• Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle (MITM) attacks,
disclosing sensitive data.
• Standard measures to establish confidentiality include:
• Data encryption and Hashing ( Higher ) key used for encryption
• Two-factor authentication – Multi-Factor
• Biometric verification – Retina Scanning – Face Recognition
• Security tokens – OTP , RSA Token , API Token
HASHING***
• Availability is making sure that authorized parties are able to access the information when
needed.
• Standard measures to guarantee availability include:
• Backing up data to external drives
• Implementing firewalls – Proxy– vpns- NATting– Load Balancer, DNS Forwarding, WAF,
IDPS (IPS/IDS)
• Having backup power supplies
• Data redundancy
TYPES OF CYBER ATTACKS
• 3. Session Hijacking
• It is a security attack on a user session over a protected network. Web applications
create cookies to store the state and user sessions. By stealing the cookies, an
attacker can have access to all of the user data.
• 4. Phishing
• Phishing is a type of attack which attempts to steal sensitive information like user
login credentials and credit card number. It occurs when an attacker is masquerading
as a trustworthy entity in electronic communication.
WEB-BASED ATTACKS
• 5. Brute force
• It is a type of attack which uses a trial and error method. This attack generates a large
number of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or by
security, analysts to test an organization's network security.
• 6. Denial of Service
• It is an attack which meant to make a server or network resource unavailable to the users. It
accomplishes this by flooding the target with traffic or sending it information that triggers a
crash. It uses the single system and single internet connection to attack a server. It can be
classified into the following-
6. DENIAL OF SERVICE
• 7. Dictionary attacks
• This type of attack stored the list of a commonly used password and validated them to get original password.
• 8. URL Interpretation
• It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web
pages for which he is not authorized to browse.
• 9. File Inclusion attacks
• It is a type of attack that allows an attacker to access unauthorized or essential files which is available on the web
server or to execute malicious files on the web server by making use of the include functionality.
• winint
• 10. Man in the middle attacks
• It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge
between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.
SYSTEM-BASED ATTACKS
• 1) Dormant
• 2) Propogation
• Following the dormant phase is the propagation phase. The propagation phase is when the
virus self-replicates. All viruses self-replicate. Self-replication, in fact, is what distinguishes
viruses from other types of malware. During the propagation phase, viruses will create copies
of their malicious code, which they’ll store on other parts of the infected computer’s disk drive.
• The propagation phase may include a process known as morphing. Some viruses morph as they
self-replicate. Morphing means that the virus doesn’t create an exact copy of itself when self-
replicating. Rather, the virus changes its code. Morphing is designed to make viruses harder to
detect. If a virus morphs, it will typically do so during the propagation phase.
LIFE CYCLE OF VIRUS
• 3) Trigger
• The third phase in a virus’s infection cycle is the trigger phase. The trigger phase involves
activation. Viruses aren’t considered active until they enter the trigger phase. Upon entering
the trigger phase, viruses will initiate their malicious activities.
• Viruses can be programmed to activate in response to different triggers. A trigger might be a
minimum of self-replications, such as 100. Once the virus has self-replicated 100 times, it will
enter the trigger phase. Alternatively, the trigger may consist of the passage of time, such as 48
hours. After 48 hours have passed, the virus will enter the trigger phase. Regardless, viruses
have a trigger that causes them to activate and, thus, initiate their malicious activities.
LIFE CYCLE OF VIRUS
• 4) Execution
• The fourth and final phase of a virus’s infection is the execution phase. The
execution phase involves the release of a payload. Viruses have a payload.
The payload is the malicious code that’s designed to harm or otherwise
negatively affect the targeted computer. Some payloads can delete data.
Others can cause unwanted pop-ups or advertisements.
SYSTEM-BASED ATTACKS
2. Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers. It works same as the computer virus. Worms often originate from email attachments
that appear to be from trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It appears
to be a normal application but when opened/executed some malicious code will run in the
background.
SYSTEM-BASED ATTACKS
4. Backdoors
• It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or
other purposes.
5. Bots
• A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they receive
specific input. Common examples of bots program are the crawler, chatroom bots, and
malicious bots.
THE 7 LAYERS OF CYBER SECURITY SHOULD
CENTRE ON THE MISSION CRITICAL ASSETS
YOU ARE SEEKING TO PROTECT.
• 1: Mission Critical Assets – This is the data you need to protect
• 2: Data Security – Data security controls protect the storage and transfer of data.
• 3: Application Security – Applications security controls protect access to an application, an application’s access
to your mission critical assets, and the internal security of the application.
• 4: Endpoint Security – Endpoint security controls protect the connection between devices and the network.
• 5: Network Security – Network security controls protect an organization’s network and prevent unauthorized
access of the network.
• 6: Perimeter Security – Perimeter security controls include both the physical and digital security methodologies
that protect the business overall.
• 7: The Human Layer – Humans are the weakest link in any cyber security posture. Human security controls
include phishing simulations and access management controls that protect mission critical assets from a wide
variety of human threats, including cyber criminals, malicious insiders, and negligent users.
VULNERABILITY, THREAT, HARMFUL
ACTS
• As the recent epidemic of data breaches illustrates, no system is immune to attacks. Any company that
manages, transmits, stores, or otherwise handles data has to institute and enforce mechanisms to monitor
their cyber environment, identify vulnerabilities, and close up security holes as quickly as possible.
• Before identifying specific dangers to modern data systems, it is crucial to understand the distinction
between cyber threats and vulnerabilities.
• Cyber threats are security incidents or circumstances with the potential to have a negative outcome for
your network or other data management systems.
• Examples of common types of security threats include phishing attacks that result in the installation of
malware that infects your data, failure of a staff member to follow data protection protocols that cause a
data breach, or even a tornado that takes down your company’s data headquarters, disrupting access.
VULNERABILITY, THREAT, HARMFUL
ACTS
• Categories of vulnerabilities
Corrupted (Loss of integrity)
Leaky (Loss of confidentiality)
Unavailable or very slow (Loss of availability)
SECURITY VULNERABILITIES, THREATS
AND ATTACKS –
• Threats represent potential security harm to an asset when vulnerabilities are exploited
• - Attacks are threats that have been carried out
• Passive – Make use of information from the system without affecting system resources
• Active – Alter system resources or affect operation
• Insider – Initiated by an entity inside the organization (LAN)
• Outsider – Initiated from outside the perimeter (WAN=INTERNET)
ASSETS AND THREAT
• What is a threat: A threat is any incident that could negatively affect an asset – for
example, if it’s lost, knocked offline or accessed by an unauthorized party.
• Threats can be categorized as circumstances that compromise the confidentiality,
integrity or availability of an asset, and can either be intentional or accidental.
• Intentional threats include things such as criminal hacking or a malicious insider stealing
information, whereas accidental threats generally involve employee error, a technical
malfunction or an event that causes physical damage, such as a fire or natural disaster.
• Note*** Least Privilege to Access Assets
MOTIVE OF ATTACKERS
• The categories of cyber-attackers enable us to better understand the attackers' motivations and the
actions they take. As shown in Figure, operational cyber security risks arise from three types of
actions:
• i) inadvertent actions (generally by insiders) that are taken without malicious or harmful intent; ii)
deliberate actions (by insiders or outsiders) that are taken intentionally and are meant to do harm;
and
• iii) inaction (generally by insiders), such as a failure to act in a given situation, either because of a
lack of appropriate skills, knowledge, guidance, or availability of the correct person to take action Of
primary concern here are deliberate actions, of which there are three categories of motivation.
MOTIVE OF ATTACKERS
• Masquerade: in this attack, the intruder pretends to be a particular user of a system to gain access or to
gain greater privileges than they are authorized for. A masquerade may be attempted through the use of
stolen login IDs and passwords, through finding security gaps in programs or through bypassing the
authentication mechanism.
• Session replay: In this type of attack, a hacker steals an authorized user’s log in information by
stealing the session ID. The intruder gains access and the ability to do anything the authorized user can
do on the website.
• Message modification: In this attack, an intruder alters packet header addresses to direct a message to
a different destination or modify the data on a target machine.
• In a denial of service (DoS) attack, users are deprived of access to a network or web resource. This is
generally accomplished by overwhelming the target with more traffic than it can handle.
TYPES OF ACTIVE ATTACKS:
Passive Attacks: Passive attacks are relatively scarce from a classification perspective, but can be carried out with
relative ease, particularly if the traffic is not encrypted.
• Types of Passive attacks:
• Eavesdropping (tapping): the attacker simply listens to messages exchanged by two entities. For the attack to be
useful, the traffic must not be encrypted. Any unencrypted information, such as a password sent in response to an
HTTP request, may be retrieved by the attacker.
• Traffic analysis: the attacker looks at the metadata transmitted in traffic in order to deduce information relating
to the exchange and the participating entities, e.g. the form of the exchanged traffic (rate, duration, etc.). In the
cases where encrypted data are used, traffic analysis can also lead to attacks by cryptanalysis, whereby the
attacker may obtain information or succeed in unencrypting the traffic.
• Software Attacks: Malicious code (sometimes called malware) is a type of software designed to take over or
damage a computer user's operating system, without the user's knowledge or approval. It can be very difficult to
remove and very damaging. Common malicious code examples are listed in the following table:
SOFTWARE ATTACKS:
• Virus,
• Worms,
• Trojan Horse
• , Logic Bomb,
• Spyware,
• Adware
• Malware- Locky and Crytpto
• Ransomware,
• Rootkit,
• Bootkit,
PASSIVE ATTACKS: