Cisco Cybersecurity Essentials Course
Cisco Cybersecurity Essentials Course
Many of the world's original hackers were hobbyists, programmers, and computer
science students during the 1960s. Originally, the term hacker described people with
advanced programming skills. Hackers use these programming skills to test the limits
and capabilities of early systems. These early hackers were also involved in the
development of the first computer games. Many of these games included paladins and
skills.
As hacking culture evolved, it incorporated the lexicon of these games into the culture
itself. Even the outside world began to project the image of powerful champions onto this
misunderstood hacking culture. Books like Where Wizards Stay up Late: The Origins of
The Internet, published in 1996, added to the mystique of hacking culture. The image and
the lexicon stagnated. Many hacking groups today adopt these images. One of the most
infamous hacking groups is known by the name of the Legion of Doom. Understanding
cyber culture is important to understanding cyber criminals and their motivations.
Sun Tzu was a Chinese philosopher and warrior in the 6th century BC. c. Sun Tzu wrote
the book called The Art of War which is a classic work on the strategies available to
defeat the enemy. His book has guided strategists for centuries.
One of Sun Tzu's guiding principles was to know your opponent. Although he was
referring specifically to war, much of his advice translates to other aspects of life,
including the challenges of cybersecurity. This chapter begins by explaining the
structure of the cybersecurity world and why it continues to grow.
This chapter will analyze the role of cybercriminals and their motivations. Finally, the
chapter explains how to become a cybersecurity specialist. These cyber heroes help
defeat cyber criminals who threaten the cyber world.
Kingdoms Overview
There are many groups of data that make up the “cyber world”. When groups can collect
and use enormous amounts of data, they begin to accumulate power and influence. This
data can be in the form of numbers, images, video, audio, or any type of data that can be
digitized. These groups could prove so powerful that they function as if they were
kingdoms. Companies like Google, Facebook and LinkedIn can be considered data
castles in the cyber world kingdom analogy. If we extend the analogy further, the people
who work at these digital companies could be considered cyber champions.
The cyber champions at Google created one of the first and most powerful castles in the
cyber kingdom. Billions of people use Google to search the web daily. Google has
created what could be considered the largest data collection network in the world.
Google develops Android, the operating systems installed on more than 80% of all mobile
devices connected to the Internet. Each device requires users to create Google accounts
that can save bookmarks and account information, save search results, and even locate
the device. Click here to see some of the many services Google currently offers.
Facebook is another powerful castle in the cyber kingdom. Cyber champions at Facebook
recognized that people create personal accounts daily to communicate with friends and
family. By doing so, they provide a lot of personal data. These Facebook champions
formed a massive castle of data to help people connect in ways never before imagined in
the past. Facebook touches the lives of millions of people every day and allows
businesses and organizations to communicate with people in more personal and targeted
ways.
LinkedIn is another data castle in the cyber realm. LinkedIn's cyber champions
recognized that their members would share information in the quest to create a
professional network. LinkedIn users upload this information to create online profiles and
connect with other members. LinkedIn connects employees with employers and
companies with other companies around the world.
A look inside these castles reveals how they are designed. At a fundamental level, these
castles are strong because of the ability to collect user data contributed by users. This
data often includes users' backgrounds, discussions, preferences, locations, trips,
interests, friends and family members, professions, hobbies, and work and personal
schedules. Cyber champions create great value for organizations interested in using this
data to better understand and communicate with their customers and employees.
The data collected from the cyber world goes beyond the data that users voluntarily
contribute. The cyber realm continues to grow as science and technology evolve,
allowing cyber champions to collect other forms of data. Cyber champions now have the
technology to track global weather trends, monitor the oceans, and track the movement
and behavior of people, animals, and objects in real time.
New technologies emerged, such as Geospatial Information Systems (GIS) and the
Internet of Everything (IoE). These new technologies can track the types of trees in a
neighborhood and provide up-to-date locations of vehicles, devices, people, and
materials. This type of information can save energy, improve efficiency, and reduce
safety risks. Each of these technologies will also exponentially expand the amount of
data collected, analyzed, and used to understand the world. The data collected by GIS
and the IoE constitute a major challenge for cybersecurity professionals in the future.
The type of data generated by these devices has the potential to allow cybercriminals to
gain access to the very intimate aspects of everyday life.
In the early years of the cybersecurity world, typical cybercriminals were teenagers or
hobbyists operating from a home PC, and their attacks were limited to pranks and
vandalism. Nowadays, the world of cybercriminals has become more dangerous.
Attackers are individuals or groups who attempt to attack vulnerabilities for personal or
financial gain. Cybercriminals are interested in everything from credit cards to product
designs and anything else of value.
Hobbyists – Hobbyists, or script kiddies, have little or no skills, and typically use existing
tools or instructions found on the Internet to perform attacks. Some are just curious,
while others try to demonstrate their skills and cause damage. They can use basic tools,
but the results can still be devastating.
Hackers – This group of criminals break into computers or networks to gain access for
various reasons. The intent for which they interrupt determines the classification of
these attackers as white, gray or black hat criminals. White hat attackers penetrate
networks or computer systems to discover weaknesses in order to improve the security
of these systems. The system owners grant them permission to perform the interruption
and receive the test results. On the other hand, black hat attackers exploit
vulnerabilities for illegal personal, financial, or political gain. Gray hat attackers are
somewhere between black and white hat attackers. Gray hat attackers can find a
vulnerability and point it to system owners if that action matches their purposes. Some
gray hat hackers publish the facts about the vulnerability on the Internet so that other
attackers can take advantage of them.
The figure provides details on the terms white, black, and gray hat hacker.
Cybercriminal profiles and motives have changed over the years. Hacking began in the
1960s with “phone freaking” (or “phreaking”), an activity that refers to the use of various
audio frequencies to manipulate telephone systems. In the mid-1980s, criminals used
computer dial-up Internet modems to connect computers to networks and used password
cracking programs to gain access to data. Today, criminals go beyond information theft.
Criminals can now use malware and viruses as high-tech instruments. However, the
biggest motivation for most cybercriminals is financial. Cybercrimes have become more
lucrative than illegal drug transactions.
The general hacker profiles and motives have changed a bit. The figure shows modern
hacking terms and a brief description of each.
Why become a cybersecurity specialist?
The demand for cybersecurity specialists has grown more than the demand for other IT
jobs. All the technology that transforms the kingdom and improves people's way of life
can also make them more vulnerable to attack. Technology itself cannot prevent, detect,
respond to, or recover from cybersecurity incidents. Consider the following:
The skill level required by an efficient cybersecurity specialist and the shortage of
qualified cybersecurity professionals translates into the possibility of higher
income.
Establishment of early warning sensors and alert networks. Because of the cost and
inability to monitor each network, organizations monitor high-value targets or create
impostors that look like high-value targets. Because these high-value targets are
more likely to experience attacks, they warn others of potential attacks.
Enactment of new laws to discourage cyber attacks and data breaches. These laws
have severe fines to penalize cybercriminals who carry out illegal actions.
The figure shows measures to thwart cybercriminals and a brief description of each.
https://www.cvedetails.com/
https://www.honeynet.org/node/960
https://www.infragard.org/
http://www.27000.org/
https://cybersecurity.isaca.org/legislation
Laboratory practice: job search in the cybersecurity area
In this lab, you will use popular job search websites to identify jobs in the cybersecurity
profession and learn the qualifications needed for cybersecurity professionals.
Cyber Paladins are innovators and visionaries who create the cyber kingdom. They have
the intelligence and knowledge to recognize the power of data and harness that power to
build great organizations, provide services, and protect people from cyber attacks. Cyber
champions recognize the threat that data presents if it is used against people.
Threats and vulnerabilities are the main concern of cyber champions. A cybersecurity
threat is the possibility of a harmful event, such as an attack, occurring. Vulnerability is
a weakness that makes a target susceptible to attack. For example, data in the wrong
hands can result in loss of privacy for owners, affect their credit, or compromise their
professional or personal relationships. Identity theft is big business. However, Google
and Facebook are not necessarily the ones that present the biggest risk. Schools,
hospitals, financial institutions, government agencies, the workplace, and e-commerce
pose greater risks. Organizations like Google and Facebook have the resources to hire
top cybersecurity talent to protect their castles. As organizations develop data castles,
the need for cybersecurity professionals increases. This leaves smaller companies and
organizations in the competition for the remaining pool of cybersecurity professionals.
Cyber threats are particularly dangerous for some industries and the records they must
maintain.
The following examples are just some data sources that may come from established
organizations.
Medical records
Going to the doctor's office results in more information being added to an electronic
health record (EHR). Your GP's prescription becomes part of the EHR. An EHR includes
physical and mental status, and other personal information that may not be medically
related. For example, a person goes to therapy as a child because of major changes in
the family. This will appear somewhere in your medical record. In addition to medical
history and personal information, the EHR may also include information about that
person's family. Several laws address the protection of patient records.
Medical devices such as fitness bands use the cloud platform to enable wireless
transfer, storage and display of clinical data such as heart rate, blood pressure and blood
sugar. These devices can generate an enormous amount of clinical data that can become
part of your medical records.
Educational records
Realm services are the same services that a network and ultimately the Internet needs
to operate. These services include routing, addressing, naming, and database
management. These services also serve as prime targets for cybercriminals.
Criminals use packet analysis tools to capture data flows on a network. This means that
all sensitive data, such as usernames, passwords, and credit card numbers, are at risk.
Packet protocol analyzers monitor and record all information coming from a network.
Criminals can also use fake devices, such as unsecured Wi-Fi access points. If the
criminal sets up these devices near a public place, such as a coffee shop, unsuspecting
people can connect and the protocol analyzer will copy their personal information.
The Domain Name Service (DNS) translates a domain name, for example
www.facebook.com into its numerical IP address. If a DNS server does not know the IP
address, it will query another DNS server. With DNS spoofing (or DNS cache poisoning),
the criminal introduces false data into the DNS resolver cache. These poisoning attacks
attack a weakness in DNS software that causes DNS servers to redirect traffic from a
specific domain to the criminal's computer, instead of redirecting it to the legitimate
owner of the domain.
Packets transport data over a network or the Internet. Packet spoofing (or packet
injection) interferes with an established network communication by creating packets to
appear as if they are part of a communication. Packet spoofing allows a criminal to alter
or intercept packets. This process allows criminals to hijack an authorized connection or
deny a person's ability to use certain network services. Cyber professionals call this
activity a man-in-the-middle attack.
The examples given are only general examples of the types of threats that criminals can
launch against kingdom services.
Over the past decade, cyberattacks like Stuxnet have demonstrated that a cyberattack
can successfully destroy or disrupt critical infrastructure. Specifically, the Stuxnet
attack targeted the supervisory control and data acquisition (SCADA) system used to
control and monitor industrial processes. SCADA can be part of various industrial
processes in manufacturing, production, energy and communication systems. Click here
to see more information about the Stuxnet attack.
The advanced threat potential that exists in the realms today demands a special
generation of cybersecurity specialists.
Threats to the kingdom's way of life
Cybersecurity is the constant effort to protect network systems and data from
unauthorized access. On a personal level, everyone needs to protect their identity, their
data and their computing devices. At the corporate level, it is the responsibility of
employees to protect the organization's reputation, data, and customers. At the state
level, national security and the safety and well-being of citizens are at stake.
Cybersecurity professionals are often involved in working with government agencies in
identifying and collecting data.
In the US, the National Security Agency (NSA) is responsible for intelligence gathering
and surveillance activities. The NSA created a new data center to process the increasing
volume of information. In 2015, the US Congress passed the USA Freedom Act which
ended the practice of mass collecting the phone records of US citizens. The program
provided the metadata and gave the NSA information about communications sent and
received.
Efforts to protect people's way of life often conflict with their right to privacy. It will be
interesting to see what happens with the balance between these rights and the security
of the kingdom.
In this lab, you will examine the threats that cybercriminals pose and identify the traits
and requirements necessary to become a cybersecurity specialist.
Lab: Threat Identification
Attacks can originate within an organization or outside it, as shown in the figure. An
internal user, such as an employee or contracted partner, may accidentally or
intentionally:
Accidentally inviting malware to your network with malicious emails or web pages
Internal threats have the potential to cause greater damage than external threats
because internal users have direct access to the building and its infrastructure devices.
Insider attackers typically have knowledge of the corporate network, its resources, and
its sensitive data. They may also be aware of security countermeasures, policies, and
higher levels of administrative privileges.
External threats from amateurs or expert attackers can exploit vulnerabilities in devices
connected to the network or can use social engineering, such as tricks, to gain access.
External attacks exploit weaknesses or vulnerabilities to gain access to internal
resources.
Traditional data
Corporate data includes personnel information, intellectual property and financial data.
Personnel information includes application materials, payroll, offer letter, employee
agreements, and any information used to make employment decisions. Intellectual
property, such as patents, trademarks, and new product plans, allows a company to gain
an economic advantage over its competitors. Consider this intellectual property a trade
secret; Losing this information can be disastrous for the future of the company. Financial
data such as income statements, balance sheets, and cash flow statements provide
information about the health of the company.
Vulnerabilities of mobile devices
In the past, employees typically used company computers connected to a corporate LAN.
Administrators continually monitor and update these computers to meet security
requirements. Today, mobile devices such as iPhones, smartphones, tablets and
thousands of other devices are powerful substitutes or additions to traditional
computers. People are increasingly using these devices to access company information.
Bring Your Own Device (BYOD) is a growing trend. The inability to centrally manage and
update mobile devices presents a growing threat to organizations that allow employee
mobile device use on their networks.
The Internet of Things (IoT) is the set of technologies that allow the connection of
various devices to the Internet. The technological evolution associated with the advent
of the IoT is changing business and consumer environments. IoT technologies allow
people to connect billions of devices to the Internet. These devices include locks,
motors, and entertainment devices, just to name a few examples. This technology
affects the amount of data that needs protection. Users access these devices remotely,
increasing the number of networks that require protection.
With the rise of the IoT, there is much more data that needs to be managed and
protected. All of these connections, plus the expanded storage capacity and services
offered through the cloud and virtualization, have driven exponential data growth. This
expansion of data has created a new area of interest in technology and business called
“big data.”
The impact of big data
Big data is the result of data sets that are large and complex, making traditional data
processing applications inadequate. Big data presents challenges and opportunities
according to three dimensions:
Data speed
There are many examples of major threats in the news. Companies like Target, Home
Depot, and PayPal are targets of highly promoted attacks. As a result, enterprise
systems must make dramatic changes to security product designs and major upgrades to
technologies and practices. Additionally, governments and industries are introducing
more regulations and obligations that require better data protection and security
controls to help protect big data.
Use of advanced instruments
Algorithm attacks can track a system's self-reporting data, such as how much power a
computer uses, and use that information to select targets or trigger false alerts.
Algorithmic attacks can also disable a computer by forcing it to use memory or overwork
its central processing unit. Algorithm attacks are sneakier because they attack the
designs used to improve energy savings, reduce system failures, and improve
efficiencies.
Finally, the new generation of attacks involves intelligent victim selection. In the past,
attacks selected the easiest options or the most vulnerable victims. However, with more
attention to detecting and isolating cyberattacks, cybercriminals must be more careful.
They can't risk early detection or cybersecurity specialists will close the castle doors.
As a result, many of the most sophisticated attacks will only be launched if the attacker
can match the target's signature.
Federated identity management refers to multiple companies allowing users to use the
same identification credentials that gain access to the networks of all companies in the
group. This extends the range and increases the chances of a cascading effect if an
attack occurs.
Security implications
Emergency call centers in the US They are vulnerable to cyberattacks that could shut
down 911 networks, compromising public safety. A telephone denial of service (TDoS)
attack uses telephone calls to a target telephone network, subduing the system and
preventing legitimate calls from getting through. Next-generation 911 call centers are
vulnerable because they use voice over IP (VoIP) systems instead of traditional landlines.
In addition to TDoS attacks, these call centers can also be at the mercy of distributed
denial of service (DDoS) attacks that use many systems to overwhelm the target's
resources, making it unavailable to legitimate users. Today, there are many ways to
request 911 help, from using an app on a smartphone to a home security system.
Defenses against cyberattacks at the beginning of the cyber age were low. A smart high
school student or script kiddie could have access to the systems. Countries around the
world are becoming more aware of the threats of cyber attacks. The threat posed by
cyberattacks now tops the list of the biggest threats to national and economic security
in most countries.
In the US, the National Institute of Standards and Technology (NIST) created a
framework for companies and organizations that need professionals in the area of
cybersecurity. The framework allows companies to identify the main types of
responsibilities, positions and workforce skills needed. The National Cybersecurity
Workforce Framework classifies and describes cybersecurity work. It provides a common
language that defines cybersecurity work along with a common set of tasks and skills
required to become a cybersecurity specialist. The framework helps define cybersecurity
professional requirements.
Protect and defend includes identifying, analyzing and mitigating threats to internal
systems and internal networks.
Collect and operate includes specialized attack and deception operations, and the
collection of cybersecurity information.
Analyze includes the highly specialized review and evaluation of incoming cybersecurity
information to determine whether it is useful for intelligence.
Within each category, there are several areas of specialty. The specialty areas then
define common types of cybersecurity work.
The figure shows each of the categories and a brief description of each one.
Professional organizations
Cybersecurity specialists must often collaborate with professional colleagues.
International technology organizations often sponsor workshops and conferences. These
organizations generally keep cybersecurity professionals inspired and motivated.
Click on the logos in the figure to learn more about some important security
organizations.
Cybersecurity student competitions and organizations
Cybersecurity specialists must have the same skills as hackers, especially black hat
hackers, to offer protection against attacks. How can a person create and practice the
skills necessary to become a cybersecurity specialist? Student skills competencies are a
great way to develop cybersecurity knowledge skills and capabilities. There are many
national cybersecurity skills competitions available to cybersecurity students.
Click on the logos above to learn more about student cybersecurity competencies,
organizations, and clubs.
https://www.uscyberpatriot.org/
https://www.skillsusa.org/
https://www.uscyberchallenge.org/
https://www.nationalcyberleague.org/index.shtml
Industry certifications
In a world of cybersecurity threats, there is a great need for expert and qualified
information security professionals. The IT industry established standards for
cybersecurity specialists to obtain professional certifications that provide proof of skills
and level of knowledge.
CompTIA Security+
The CCNA Security certification confirms that a cybersecurity specialist has the
knowledge and skills necessary to protect Cisco networks.
To become a successful cybersecurity specialist, the potential candidate must take into
account some of the unique requirements. Heroes must be able to respond to threats as
soon as they occur. This means that work hours can be unconventional.
Cyber Heroes also analyze policies, trends and intelligence to understand how cyber
criminals think. Many times, this can include a lot of discovery work.
The following recommendations will help aspiring cybersecurity specialists achieve their
goals:
Look for Internships – Pursuing a security internship as a student can translate into
opportunities down the road.
In this lab, you will examine the daily responsibilities of a cybersecurity professional and
identify the types of controls and security precautions that large organizations must take
to protect their information and information systems.
In this Packet Tracer activity, you will accomplish the following objectives:
In this Packet Tracer activity, you will accomplish the following objectives:
The term "sorcerer" is a label that describes cybersecurity professionals who protect the
cyber world. Like sorcerers of the mystical world, cybernetic sorcerers are interested in
promoting good and protecting others. John McCumber is one of the first cybersecurity
wizards. He developed a framework called McCumber's Cube that cybersecurity wizards
use to protect the cyber world. McCumber's Cube resembles the Rubik's Cube.
The first dimension of the cybersecurity skills cube includes the three principles of
cybersecurity. Cybersecurity professionals refer to the three principles as the CID Triad.
The second dimension identifies the three states of information or data. The third
dimension of the cube identifies the powers of sorcerers that provide protection. These
powers are the three categories of mechanisms of cybersecurity measures.
The chapter also analyzes the ISO cybersecurity model. The model represents an
international framework to standardize the administration of information systems.
The first dimension of the cybersecurity skills cube identifies the objectives to protect
the cyber world. The objectives identified in the first dimension are the basic principles
of the world of cybersecurity. These three principles are confidentiality, integrity and
availability. The principles provide focus and allow the cyber sorcerer to prioritize
actions in protecting the cyber world.
The cyber world is a world of data; Therefore, cyber wizards focus on data protection.
The second dimension of the cybersecurity skills cube focuses on the problems of
protecting all states of data in the cyber world. The data has three possible states:
Data in transit
Stored data
Data in process
Cybersecurity measures
The third dimension of the cybersecurity skills cube defines the types of powers that a
cybersecurity wizard draws on to protect the cyber world. Cybersecurity professionals
must use all available powers at their disposal to protect data from the cyber world.
The Cybersecurity Skills Cube identifies the three types of powers and instruments used
to provide protection. The first type of power includes technologies, devices, and
products available to protect information systems and keep cybercriminals out.
Cybersecurity professionals have a reputation for mastering the technological tools at
their disposal. However, McCumber reminds us that technological tools are not enough
to defeat computer criminals. Cybersecurity professionals must also create a strong
defense by establishing the policies, procedures and guidelines that allow citizens of the
cyber world to stay safe and follow proper practices. Lastly, like the world of sorcerers,
citizens of the cyber world must strive to gain more knowledge about their world and the
dangers that threaten their world. They must continually seek greater knowledge and
establish a culture of learning and awareness.
Organizations collect large amounts of data. Most of this data is not confidential because
it is publicly available, such as names and phone numbers. Other data collected,
however, is confidential. Sensitive information refers to data protected from
unauthorized access to protect a person or organization. There are three types of
confidential information:
Access control defines various protection schemes that prevent unauthorized access to
a computer, network, database, or other data resources. The AAA concept involves three
security services: Authentication, Authorization and Auditing. These services provide the
primary framework for controlling access.
The first “A” in AAA represents authentication. Authentication Verifies a user's identity
to prevent unauthorized access. Users prove their identity with a username or ID.
Additionally, users must verify their identity using one of the following ways, as shown in
Figure 1:
For example, if you go to an ATM to get cash, you need your bank card (something you
have) and you need to know the PIN. This is also an example of multi-factor
authentication. Multi-factor authentication requires more than one type of
authentication. The most popular form of authentication is the use of passwords.
Authorization Authorization services determine what resources users can access, along
with the operations that users can perform, as shown in Figure 2. Some systems
accomplish this with an access control list or ACL. An ACL determines whether a user
has certain access privileges once the user authenticates. Just because you can't log in
to the company network doesn't mean you're allowed to use the high-speed color printer.
Authorization can also control when a user has access to a specific resource. For
example, employees may have access to a sales database during work hours, but the
system locks them out after hours.
Accounting Tracks user activities, including the sites they have access to, the amount of
time they have access to resources, and the changes made. For example, a bank keeps
track of each customer account. An audit of that system can reveal the timing and
quantity of all transactions and the employee or system that executed the transactions.
Cybersecurity audit services work the same way. The system tracks each data
transaction and provides audit results. An administrator can configure computer policies,
as shown in Figure 3, to enable system auditing.
The concept of AAA is similar to using a credit card, as indicated in Figure 4. The credit
card identifies who uses it and how much the user can spend and explains how many
items or services the user purchased.
The cybersecurity audit tracks and monitors in real time. Websites, such as Norse,
display attacks in real time based on data collected as part of an audit or tracking
system. Click here to visit Norse's real-time tracking website.
Laws and responsibilities
Confidentiality and privacy seem interchangeable, but from a legal point of view, they
have different meanings. Most privacy data is sensitive, but not all sensitive data is
private. Access to confidential information occurs after confirming appropriate
authorization. Financial institutions, hospitals, medical professionals, law firms, and
corporations manage confidential information. Sensitive information has private status.
Maintaining confidentiality is more than an ethical duty.
Privacy is the appropriate use of data. When organizations collect information provided
by customers or employees, they may only use that data for its intended purpose. Most
organizations require a customer or employee to sign an authorization form giving the
organization permission to use the data.
All of the laws listed in the figure include a provision to address privacy that begins with
US laws. in Figure 1. Figure 2 lists a sample of international efforts. Most of these laws
are a response to the massive growth in data collection.
Integrity is the accuracy, consistency, and reliability of data throughout its lifecycle.
Another term for integrity is quality. Data undergoes various operations such as capture,
storage, retrieval, update and transfer. Unauthorized entities must keep data unaltered
during all these operations.
Methods used to ensure data integrity include hashing, data validation checks, data
consistency checks, and access controls. Data integrity systems may include one or
more of the methods mentioned above.
Data integrity is a fundamental component of cybersecurity. The need for data integrity
varies depending on how an organization uses data. For example, Facebook does not
verify the data that a user posts on a profile. A bank or financial organization places a
higher importance on data integrity than Facebook. Customer transactions and accounts
must be accurate. In a healthcare organization, data integrity can be a matter of life and
death. Prescription information must be accurate.
Protecting data integrity is a constant challenge for most organizations. Loss of data
integrity can make all data resources corrupt or unusable.
Integrity checks
Common hash functions include MD5, SHA-1, SHA-256, and SHA-512. These hash
functions use complex mathematical algorithms. The hash value is simply there for
comparison. For example, after downloading a file, the user can verify the integrity of the
file by comparing hash values from the source with that generated by any hash
calculator.
Accurate backups help maintain data integrity if data becomes corrupted. A company
needs to verify the backup process to ensure the integrity of the backup before data loss
occurs.
Data availability is the principle used to describe the need to maintain the availability of
information systems and services at all times. Cyber attacks and system failures can
prevent access to information systems and services. For example, altering the
availability of a competitor's website by removing it can provide an advantage to your
rival. These denial of service (DoS) attacks threaten system availability and prevent
legitimate users from accessing and using information systems when necessary.
People use different information systems in their daily lives. Computers and information
systems control communications, transportation, and product manufacturing. The
continuous availability of information systems is essential for modern life. The term "high
availability" describes systems designed to avoid downtime. High availability ensures a
level of performance for a higher than normal period. High availability systems typically
include three design principles (Figure 1):
Eliminate single points of failure
The goal is the ability to continue functioning under extreme conditions, such as during
an attack. One of the most popular high availability practices is the five nines practice.
The five nines refer to 99.999%. This means downtime is less than 5.26 minutes per year.
Figure 2 provides three approaches to the five nines.
Ensure availability
Stored data refers to saved data. Stored data means that a type of storage device retains
data when no user or process uses it. A storage device can be local (on a computing
device) or centralized (on the network). There are several options for storing data.
Direct Attached Storage (DAS) provides storage attached to a computer. A hard drive or
USB flash drive is an example of direct-attached storage. By default, systems are not
configured to share direct-attached storage.
Redundant Array of Independent Disks (RAID) uses multiple hard drives in an array,
which is a method of combining multiple disks so that the operating system sees them
as a single disk. RAID provides better performance and fault tolerance.
A network attached storage (NAS) device is a storage device attached to a network that
enables storage and retrieval of data from a centralized location by authorized users of
the network. NAS devices are flexible and scalable, meaning administrators can increase
capacity as needed.
Cloud storage is a remote storage option that uses space at a data center provider and is
accessible from any computer with Internet access. Google Drive, iCloud, and Dropbox
are examples of cloud storage providers.
Direct-attached storage can be one of the most difficult types of data storage to manage
and control. Direct attached storage is vulnerable to malicious attacks on the local host.
Stored data may also include backup data. Backups can be manual or automatic.
Organizations should limit the types of data stored in direct-attached storage. In
particular, an organization would not store critical data on direct-attached storage
devices.
Network storage systems offer a more secure alternative. Network storage systems
including RAID, SAN, and NAS provide increased performance and redundancy. However,
network storage systems are more complicated to configure and manage. They also
handle more data, which presents a greater risk to the organization if the device fails.
The particular challenges of network storage systems include system configuration,
testing, and monitoring.
Data transmission involves sending information from one device to another. There are
several methods to transmit information between devices, including the following:
Transfer Network – Uses removable media to physically move data from one
computer to another
Wired networks include copper and fiber optic cabling networks. Wired networks can
serve a local geographic area (local area network) or can span large distances (wide
area networks).
Wireless networks are replacing wired networks. Wireless networks are becoming faster
and capable of handling more bandwidth. Wireless networks extend the number of guest
users with mobile devices in small office, home office (SOHO) and enterprise networks.
Wired and wireless networks use packets or units of data. The term packet refers to a
unit of data that moves between a source and a destination on the network. Standard
protocols such as Internet Protocol (IP) and Hypertext Transfer Protocol (HTTP) define
the structure and formation of data packets. These standards are open source and
available to the public. Protecting the confidentiality, integrity and availability of
transmitted data is one of the most important responsibilities of a cybersecurity
professional.
Protecting data confidentiality – Cybercriminals can capture, store and steal data in
transit. Cyber professionals must take steps to counter these actions.
Protecting data integrity – Cybercriminals can intercept and alter data in transit.
Cybersecurity professionals implement data integrity systems that evaluate the
integrity and authenticity of transmitted data to respond to these actions.
Protecting data integrity begins with the initial data entry. Organizations use various
methods to collect data, such as manual data entry, analysis forms, file uploads, and
data collected from sensors. Each of these methods represents potential threats to data
integrity. An example of data corruption during the capture process includes errors in
data entry or system sensors that are disconnected, malfunctioning, or inoperable. Other
examples may include misidentification, incorrect, or mismatched data formats.
Data modification refers to any changes to the original data, such as users' manual
modification of data, program processing and data change, and equipment failure,
resulting in modification of data. the data. Processes such as encoding and decoding,
compression and decompression, and encryption and decryption are examples of data
modification. Malicious code also causes data corruption.
Data corruption also occurs during the data output process. Data output refers to data
output from printers, electronic displays, or directly to other devices. The accuracy of
the output data is critical as the result provides information and affects decision making.
Examples of data corruption include incorrect use of data delimiters, incorrect
communication settings, and incorrectly configured printers.
Protecting against invalid data being modified during the process can have an adverse
effect. Software errors are the reason for many misfortunes and disasters. For example,
just two weeks before Christmas, some of Amazon's third-party retailers saw the posted
price on their items change to just one cent. The problem lasted an hour. The mistake
caused thousands of shoppers to get the discount of a lifetime and the company lost
revenue. In 2016, Nest's thermostat was malfunctioning, leaving users without heat. The
Nest thermostat is a smart technology owned by Google. A software glitch left users
literally out in the cold. A software update was the problem and the device's batteries
died, preventing it from controlling the temperature. As a result, customers were unable
to heat their homes or get hot water on one of the coldest weekends of the year.
Software protection measures include programs and services that protect operating
systems, databases, and other services that operate on workstations, portable devices,
and servers. Administrators install software-based countermeasures or protections on
individual hosts or servers. There are several software-based technologies used to
protect organizational assets:
Network and port scanners detect and monitor open ports on a host or server.
Protocol analyzers, or signature analyzers, are devices that collect and analyze
network traffic. They identify performance problems, detect incorrect
configurations, identify applications that are performing incorrectly, establish
baseline and normal traffic patterns, and debug communication problems.
Firewall devices block unwanted traffic. Firewalls contain rules that define the
traffic allowed in and out of the network.
Virtual Private Network (VPN) is a secure virtual network that uses the public
network (i.e., Internet). The security of a VPN lies in the encryption of the content of
packets between the terminals that define the VPN.
Cloud-based technologies shift the technology component from the organization to the
cloud provider. The three main cloud computing services include the following:
Platform as a Service (PaaS) provides access to the development tools and services
used to provide the applications.
Cloud service providers have expanded these options to include IT as a service (ITaaS),
which provides IT support for IaaS, PaaS, and SaaS service models. In the ITaaS model,
an organization has a contract with the cloud provider for individual or bundled services.
Cloud service providers use virtual security appliances that run in a virtual environment
with a prepackaged and hardened operating system running on virtualized hardware.
Investing a lot of money in technology will not change if the people within the
organization are the weakest link in the area of cybersecurity. A security recognition
program is extremely important for an organization. An employee may not be
intentionally malicious, but may not know what proper procedures are. There are many
ways to implement a formal training program:
Security awareness should be an ongoing process as new threats and techniques are
always on the horizon.
Establishing a culture of cybersecurity knowledge
Members of an organization must be aware of security policies and have the knowledge
to make security a part of their daily activities.
Policies
A security policy is a set of security objectives for an enterprise that includes rules of
behavior for users and administrators and specify system requirements. These
objectives, these rules and these requirements together guarantee the security of a
network, data and computer systems of an organization.
A complete security policy accomplishes several tasks:
Security policies inform users, staff, and managers of an organization's requirements for
protecting technology and information assets. A security policy also specifies the
mechanisms necessary to meet security requirements.
Password policies: Ensure that passwords meet minimum requirements and are
changed periodically.
Acceptable use policies: Identify resources and network usage that are acceptable
to the organization. You can also identify the consequences of policy violations.
Remote access policies: Identify how remote users can access the network and
which is accessible remotely.
One of the most common components of security policy is an acceptable use policy
(AUP). This component defines what users can and cannot do in the different
components of the system. The AUP should be as explicit as possible to avoid
misinterpretation. For example, an AUP lists specific web pages, newsgroups, or
bandwidth-intensive applications that users cannot access using the company's
computers or network.
Standards
One of the most important security principles is uniformity. For this reason, it is
necessary for organizations to establish standards. Each organization develops
standards to support the unique operating environment. For example, an organization
establishes a password policy. The standard is that passwords require a minimum of
eight alphanumeric characters of upper and lower case letters, with at least one special
character. A user must change a password every 30 days, and a password history of 12
previous passwords ensures that the user creates unique passwords for one year.
Guidelines
The guidelines consist of a list of suggestions on how to do things more efficiently and
safely. They are similar to standards, but are more flexible and generally not mandatory.
The guidelines define how standards are developed and ensure compliance with overall
security policies.
Some of the most useful guidelines make up an organization's best practices. In addition
to best practices that define an organization, guidelines are also available from the
following:
Using the password policies example, a pattern is a suggestion in which the user takes a
phrase like “I have a dream” and turns it into a strong password, Ihv@dr3 @m. The user
can create other passwords from this phrase by changing the number, moving the
symbol, or changing the punctuation mark.
Procedures
Procedure documents are more detailed than standards and guidelines. Procedure
documents include implementation details that typically contain step-by-step
instructions and graphics.
The figure shows an example of the procedure that was used to change a password.
Large organizations should use procedure documents to maintain the consistency of
implementation that is needed for a secure environment.
Model Overview
Cybersecurity domains
The ISO/IEC 27000 standard is a computer security standard published in 2005 and
revised in 2013. ISO publishes the ISO 27000 standards. While the standards are not
mandatory, most countries use them as a de facto framework for implementing
cybersecurity.
The structure of the ISO cybersecurity model is different from the OSI model as it uses
domains instead of layers to describe security categories. The reason is that the ISO
cybersecurity model is not a hierarchical relationship. It is a pair model in which each
domain has a direct relationship with the other domains. The ISO 27000 cybersecurity
model is very similar to the OSI model in that it is critical for cybersecurity wizards to
understand both models to be successful.
Click on each domain in the figure to see a brief description.
The twelve domains consist of control objectives defined in part 27001 of the standard.
Control objectives define the high-level requirements for implementing a complete ISM.
An organization's management team uses ISO 27001 control objectives to define and
publish the organization's security policies. Control objectives provide a checklist to use
during security management audits. Many organizations must pass an ISMS audit to
obtain a designation of compliance with the ISO 27001 standard.
Certification and compliance provide trust for two organizations that must trust each
other's sensitive data and operations. Compliance and security audits show that
organizations are continually increasing their cybersecurity management system.
Controls
The ISO/IEC 27002 standard defines computer security management system controls.
Controls are more detailed than objectives. Control objectives tell the organization what
it should do. Controls define how to achieve the objective.
Use strong passwords. A strong password consists of at least eight characters that are a
combination of letters, numbers, and symbols (@, #, $, %, etc.) if allowed. Passwords are
case-sensitive, so a strong password contains both upper and lower case letters.
The controls are not mandatory, but are widely accepted and adopted.
Controls are like guidelines. This means that there may be more than one way to
meet the goal.
The ISO Cybersecurity Model and the CID Triad
The ISO 27000 standard is a universal framework for each type of organization. To use
the framework effectively, an organization must narrow the domains, control objectives,
and controls that apply to its environment and operations.
The ISO 27001 control objectives function as a checklist. The first step that an
organization takes is to determine whether these control objectives apply to the
organization. Most organizations generate a document called a Statement of
Applicability (SOA). The SOA defines the control objectives that the organization needs
to use.
An organization adapts its use of control objectives and available controls to best meet
its priorities regarding confidentiality, integrity, and availability.
The ISO cybersecurity model and data states
Different groups in an organization can be responsible for data in each of the different
states. For example, the network security group is responsible for data during
transmission. Programmers and data entry persons are responsible for the data during
processing. Hardware and server support specialists are responsible for the data stored.
ISO controls specifically address the data security objectives of each of the three states.
In this example, representatives from each of the three groups help identify which
controls are applicable and the priority of each control in their area. The network
security group representative identifies controls that ensure the confidentiality, integrity,
and availability of all transmitted data.
The control objectives of ISO 27001 relate directly to the organization's cybersecurity
policies, procedures and guidelines that are determined by senior management. ISO
27002 controls provide technical direction. For example, senior management establishes
a policy that specifies the protection of all data entering or leaving the organization.
Implementing technology to meet policy objectives would not involve senior
management. It is the responsibility of IT professionals to properly deploy and configure
the equipment used to satisfy policy directives established by senior management.
Lab - Installing a Virtual Machine on a Personal Computer
A virtual machine image file has been created so you can install it on your computer. In
this lab, you will download and import this image file by using your desktop virtualization
application, such as VirtualBox.
In this activity, you will examine, identify, and configure the appropriate authentication,
authorization, or access controls. You will also install and configure security controls.
In this Packet Tracer activity, you will accomplish the following objectives:
Download the client files from the backup file server to Mike's computer
Packet Tracer: How to use file and data integrity checks. Instructions
Packet Tracer: How to use file and data integrity checks. Activity
Threats, vulnerabilities and attacks are the central focus of cybersecurity champions. A
cybersecurity threat is the possibility of a harmful event, such as an attack, occurring. A
vulnerability is a weakness that makes a target susceptible to an attack. An attack is a
deliberate exploitation of a detected weakness in computer information systems, either
as specific targets or simply as targets of opportunity. Cybercriminals may have different
motivations for selecting an attack target. Cybercriminals succeed by continually
searching for and identifying systems with obvious vulnerabilities. Common victims
include unpatched systems or systems that do not have virus and spam detection.
This chapter examines the most common cybersecurity attacks. Cyber sorcerers must
know how each attack works, what it takes advantage of, and how it affects the victim.
The chapter begins by explaining the threat of malware and malicious code, and then
explains the types of tricks involved in social engineering. A cyber attack is a type of
offensive maneuver used by cyber criminals to attack computer information systems,
computer networks, or other computer devices, through a malicious act. Cybercriminals
launch offensive maneuvers against wired and wireless networks.
What is malware?
Virus
A virus is malicious executable code associated with another executable file, such as a
legitimate program. Most viruses require initialization by the end user and can activate
at a specific time or date. Computer viruses generally spread in one of three ways: from
removable media; from Internet downloads and from email attachments. Viruses can be
harmless and simply display an image or they can be destructive, such as those that
modify or delete data. To avoid detection, a virus transforms itself. The simple act of
opening a file can activate a virus. A boot sector or file system virus infects USB flash
drives and can spread to the system's hard drive. Running a specific program can
activate a program virus. Once the program virus is active, it will usually infect other
programs on the computer or other computers on the network. The Melissa virus is an
example of a virus that spreads via email. Melissa affected tens of thousands of users
and caused an estimated $1.2 billion in damages. Click here to read more about viruses.
Worms
Worms are responsible for some of the most devastating attacks on the Internet. For
example, in 2001, the Code Red worm infected 658 servers. Within 19 hours, the worm
infected more than 300,000 servers.
Trojan
A Trojan is malware that executes malicious operations under the guise of a desired
operation. This malicious code attacks the user privileges that execute it. A Trojan
differs from a virus because the Trojan is related to non-executable files, such as image
files, audio files, or games.
logic bomb
A logic bomb is a malicious program that uses an activator to reactivate malicious code.
For example, triggers can be dates, times, other programs running, or deletion of a user
account. The logic pump remains inactive until the triggering event occurs. Once
activated, a logic bomb deploys malicious code that causes damage to a computer. A
logic bomb can sabotage database logs, delete files, and attack operating systems or
applications. Cyber champions recently discovered logic bombs that attack and destroy
the hardware components of a workstation or server, such as cooling fans, CPUs,
memories, hard drives, and power supplies. The logic bomb overwhelms these devices
until they overheat or fail.
Ransomware
Ransomware holds a computer system or the data it contains captive until the target
makes a payment. Ransomware generally works by encrypting computer data with a key
unknown to the user. The user must pay a ransom to the criminals to remove the
restriction.
Some other versions of ransomware can exploit specific vulnerabilities in the system to
lock it down. Ransomware spreads like a Trojan horse and is the result of a downloaded
file or some weakness in the software.
Payment through an untraceable payment system is always the objective of the criminal.
Once the victim pays, the criminals provide a program that decrypts the files or send an
unlock code. Click here to read more about ransomware.
A backdoor or rootkit refers to the program or code generated by a criminal that has
compromised a system. The backdoor bypasses the normal authentication used to
access a system. Some common backdoor programs are Netbus and Back Orifice, which
allow remote access to unauthorized users of the system. The purpose of the backdoor is
to grant cybercriminals future access to the system, even if the organization fixes the
original vulnerability used to attack the system. Typically, criminals get authorized users
to unknowingly run a Trojan program on their machine to install the backdoor.
A rootkit modifies the operating system to create a backdoor. The attackers then use the
backdoor to access the computer remotely. Most rootkits exploit software vulnerabilities
to perform privilege escalation and modify system files. Privilege escalation takes
advantage of programming errors or design flaws to grant the criminal elevated access
to network resources and data. It is also common for rootkits to modify system forensics
and monitoring tools, making them very difficult to detect. Often, the user must clean
and reinstall the operating system of a computer infected by a rootkit.
Defense against malware
A few simple steps can help protect against all forms of malware.
Antivirus program – Most antivirus suites acquire the most widespread forms of
malware. However, cybercriminals develop and deploy new threats daily. Therefore,
the key to an effective antivirus solution is to keep signatures up to date. A
signature is like a footprint. Identify the characteristics of malicious code.
Unwanted email
Email is a universal service used by billions of people around the world. As one of the
most popular services, email has become a major vulnerability for users and
organizations. Spam, also known as “spam,” is unsolicited email. In most cases, spam is
an advertising method. However, spam can be used to send harmful links, malware, or
deceptive content. The ultimate goal is to obtain sensitive information, such as social
security number or bank account information. Most spam comes from multiple computers
on networks infected by a virus or worm. These compromised computers send out as
much mass email as possible.
Even with the implementation of these security features, some spam emails may still
reach your inbox. Some of the most common indicators of spam are:
If a user receives an email that contains one or more of these flags, they should not open
the email or any attachments. It is very common for an organization's email policy to
require a user who receives this type of email to report it to cybersecurity personnel.
Almost all email providers filter spam email. Unfortunately, spam email still consumes
bandwidth and the recipient's server must still process the message.
Adware usually displays annoying pop-ups to generate revenue for its authors. Malware
can analyze user interests by tracking the websites visited. You can then send pop-up
advertising in relation to those sites. Some software versions automatically install
adware. Some adware only delivers ads, but it is also common for adware to include
spyware.
Scareware convinces the user to take specific actions based on the fear. Scareware
fakes pop-up windows that resemble operating system dialog windows. These windows
carry forged messages stating that the system is at risk or requires the execution of a
specific program to return to normal operation. In reality, there are no problems and if
the user accepts and allows the mentioned program to run, the malware will infect his
system.
Identity forgery
Identity theft is a form of fraud. Cybercriminals use email, instant messaging, or other
social media to attempt to collect information such as login credentials or account
information by disguising themselves as a trusted entity or person. Phishing occurs when
a malicious party sends a fraudulent email disguised as a legitimate and trusted source.
The goal of this message is to trick the recipient into installing malware on their device
or sharing personal or financial information. An example of phishing is a spoofed email
similar to one that came from a retail business, asking the user to click a link to claim a
prize. The link may go to a fake site that asks for personal information or may install a
virus.
Targeted phishing is a highly targeted spoofing attack. While phishing and targeted
phishing use emails to reach victims, targeted phishing sends personalized emails to a
specific person. The criminal investigates the interests of the target before sending the
email. For example, the criminal discovers that the target is interested in cars and is
interested in purchasing a specific model of car. The criminal joins the same car
discussion forum where the target is a member, creates an offer to sell the car, and
sends an email to the target. The email contains a link to images of the car. When the
target clicks the link, it unknowingly installs the malware on the computer. Click here to
learn more about email scams.
“Smishing” (short message service spoofing) is identity theft using text messaging on
mobile phones. Criminals pose as a legitimate source in an attempt to gain the victim's
trust. For example, a smishing attack may send the victim a website link. When the
victim visits the website, the malware is installed on the mobile phone.
Whaling is a phishing attack that targets high-level targets within an organization, such
as senior executives. Additional targets include politicians or celebrities.
Click here to read an RSA article on spoofing, smishing, vishing and whaling activities.
Accessories
Adobe's flash and shockwave plugins allow the development of interesting graph and
cartoon animations that greatly enhance the appearance of a web page. Plugins display
content developed using the appropriate software.
Until recently, plugins had a remarkable security record. While Flash-based content grew
and became more popular, criminals examined Flash plugins and software, determined
vulnerabilities, and attacked Flash Player. Successful attack can cause a system to
crash or allow a criminal to take control of the affected system. Expect data losses to
increase as criminals continue to investigate vulnerabilities in popular plugins and
protocols.
SEO Poisoning
Search engines, such as Google, work by ranking pages and presenting relevant results
according to users' search queries. Depending on the importance of the website's
content, it may appear higher or lower in the list of search results. SEO (Search Engine
Optimization) is a set of techniques used to improve the ranking of a website by a search
engine. Although many legitimate companies specialize in website optimization to
improve their rankings, SEO poisoning uses SEO to make a malicious website appear
higher in search results.
The most common goal of SEO poisoning is to increase traffic to malicious sites that may
host malware or perpetrate social engineering. To force a malicious site to rank higher in
search results, attackers take advantage of popular search terms.
Browser hijacker
A browser hijacker is malware that alters a computer's browser settings to redirect the
user to websites that are paid for by cybercriminals' clients. Browser hijackers install
without user permission and are usually part of an unnoticed download. A drive download
is a program that is automatically downloaded to the computer when a user visits a
website or views an HTML email message. Always read user agreements carefully when
downloading programs to avoid this type of malware.
Methods for dealing with spam include email filtering, user training on precautions
against unknown emails, and the use of host and server filters.
It's hard to stop spam email, but there are ways to reduce its effects. For example, most
ISPs filter spam before it reaches the user's inbox. Many antivirus and email software
programs automatically perform email filtering. This means they detect and remove
spam from your email inbox.
Organizations also warn employees about the dangers of opening email attachments that
may contain a virus or worm. Don't assume email attachments are safe, even if they
come from a trusted contact. A virus may try to spread by using the sender's computer.
Always examine email attachments before opening them.
Keeping all software up to date ensures that your system has all the latest security
patches applied to remove known vulnerabilities. Click here to learn more about how to
avoid browser attacks
Social engineering
Social engineers often rely on people's willingness to be helpful, but they also take
advantage of their vulnerabilities. For example, an attacker may call an authorized
employee with an urgent problem that requires immediate access to the network. The
attacker can appeal to the employee's vanity or greed or invoke authority through
naming techniques.
Pretexting: This is when an attacker calls a person and lies in an attempt to gain access
to privileged data. One example involves an attacker claiming to need personal or
financial data to confirm the recipient's identity.
Something for something (quid pro quo): This is when an attacker requests personal
information from a party in exchange for something, for example, a gift.
Social engineers use several tactics. Social engineering tactics include the following:
Authority: People are more likely to comply when they receive instructions from “an
authority.”
Intimidation: Criminals harass a victim into taking action
Consensus/social proof: people will take action if they feel that other people like it
too
Scarcity: People will take action when they believe there is a limited supply
Urgency: People will take action when they feel there is limited time
Trust: Offenders create a relationship of trust with a victim which may take longer
to establish.
Cybersecurity professionals are responsible for training other people in the organization
regarding the tactics of social engineers. Click here to learn more about social
engineering tactics.
"Spying over your shoulder" and "dumpster diving"
A criminal watches, or spies over the man, to collect PINs, access codes or credit card
numbers. An attacker may be very close to his victim or may use binoculars or closed-
circuit cameras to spy. That's one reason a person can only read an ATM screen at
certain angles. These types of security measures make the technique of spying over your
shoulder much more difficult.
"One man's trash is another man's treasure." This phrase may be especially true in the
activity of “trash scavenging,” which is the process of searching through a target's trash
to see what information an organization discards. Please note to protect the trash
receptacle. Any confidential information should be disposed of properly by shredding or
using incineration bags, a container that preserves confidential documents for later
destruction by incineration.
Identity simulation is the action of pretending to be someone else. For example, a recent
telephone scam affected taxpayers. One criminal, who presented himself as an IRS
employee, told victims they owed money to the IRS. Victims must pay immediately via
bank transfer. The impersonator threatened that if he did not pay, this would lead to an
arrest. Criminals also use simulation to attack other people. They can put people's
credibility at risk by using website or social media posts.
A deception is an act carried out with the intention of deceiving or deceiving. A cyber
hoax can cause as much disruption as an actual breach can. A hoax provokes a user's
reaction. The reaction can cause unnecessary fear and irrational behavior. Users
transmit hoaxes through email and social media. Click here to visit a website that offers
a list of hoax messages.
One trap avoids the practice of "piggybacking" by using two sets of doors. Once people
enter an external door, that door must be closed before entering the internal door.
If you forward misleading emails and other non-work related pranks, funny movies, and
emails in the workplace, you may violate the company's acceptable use policy and may
result in disciplinary action. Click here to visit a website that publishes rumors and
monitors information
Organizations should promote awareness of social engineering tactics and properly train
employees on prevention measures, such as:
If you forward misleading emails and other non-work related pranks, funny movies, and
emails in the workplace, you may violate the company's acceptable use policy and may
result in disciplinary action. Click here to visit a website that publishes rumors and
monitors information
Organizations should promote awareness of social engineering tactics and properly train
employees on prevention measures, such as:
Denial of service (DoS) attacks are a type of network attack. A DoS attack results in
some type of disruption of network services to users, devices, or applications. There are
two main types of DoS attacks:
DoS attacks are a major risk because they can easily disrupt communication and cause
significant loss of time and money. These attacks are relatively simple to carry out, even
by an inexperienced attacker.
The goal of a denial of service attack is to deny access to authorized users by making
the network unavailable (remember the three basic security principles: confidentiality,
integrity, and availability). Click Play on Figure 1 to see animations of a DoS attack.
A distributed DoS (DDoS) attack is similar to a DoS attack but comes from multiple
coordinated sources. For example, a DDoS attack could occur as follows:
Click Play on Figure 2 to see animations of a DDoS attack. A distributed denial of service
(DDoS) attack uses many zombies to overwhelm a target.
Analysis
The practice of analysis also has its benefits. Network administrators can use protocol
analyzers to analyze network traffic, identify bandwidth problems, and to troubleshoot
other network problems.
Physical security is important to prevent the introduction of protocol analyzers into the
internal network.
Identity spoofing is an attack that takes advantage of a trust relationship between two
systems. If two systems accept the authentication achieved by each, a person registered
in one system may not go through an authentication process again to access the other
system. An attacker can exploit this provision by sending a packet to a system that
appears to come from a trusted system. Since the trust relationship exists, the target
system can perform the requested task without authentication.
MAC address spoofing occurs when one computer accepts data packets based on
the MAC address of another computer.
The Domain Name System (DNS) maps domain names to IP addresses. DNS server
spoofing modifies the DNS server to redirect a specific domain name to a different
IP address, controlled by the criminal.
Man-in-the-middle attack
Click the steps in the figure to learn the basics of a MitM attack.
Keylogger is a software program that records keystrokes of system users. Criminals can
implement keylogging through software installed on a computer system or through
hardware physically connected to a computer. The criminal configures the key logging
software to email the log file. Keystrokes captured in the log file can reveal usernames,
passwords, websites visited and other sensitive information.
Keyloggers can be legitimate, commercial software. Parents often purchase key logging
software to track websites and children's Internet behavior. Many antispyware
applications can detect and remove unauthorized key records. While keylogging software
is legal, criminals use the software for illegal purposes.
How to defend against attacks
An organization can take several steps to defend against various attacks. Configure
firewalls to discard any packets outside the network that have addresses indicating that
they originated within the network. This situation does not normally occur, and indicates
that a cybercriminal attempted to conduct a phishing attack.
To prevent DoS and DDoS attacks, ensure patches and updates are current, distribute
the workload across all server systems, and block Internet Control Messaging Protocol
(ICMP) packets at the border. Network devices use ICMP packets to send error
messages. For example, the ping command uses ICMP packets to verify that one device
can communicate with another device on the network.
Systems can avoid falling victim to a replay attack by encrypting traffic, providing
cryptographic authentication, and including a timestamp with each part of the message.
Click here to learn more about ways to avoid cyber attacks.
This lab test will introduce tools that can detect threats and eliminate vulnerabilities
from a host.
Grayware technique is becoming a problem area in mobile security with the popularity of
smartphones. Grayware technique includes applications that behave in annoying or
unwanted ways. The Grayware technique may not have recognizable malware, but it can
still pose a risk to the user. For example, grayware can track the user's location.
Grayware creators generally maintain legitimacy by including an application's
capabilities in the fine print of the software license agreement. Users install many
mobile applications without really considering their capabilities.
The term SMiShing is short for SMS spoofing. Use Short Message Service (SMS) to send
fake text messages. Criminals trick the user by visiting a website or calling a phone
number. Unsuspecting victims may provide sensitive information such as credit card
information. Visiting a web page can cause the user to unknowingly download malware
that infects the device.
A rogue access point is a wireless access point installed on a secure network without
explicit authorization. A rogue access point can be configured in two ways. The first is
when a well-intentioned employee tries to be helpful by facilitating the connection of
mobile devices. The second way is when a criminal gains physical access to an
organization by sneaking in and installing the rogue access point. Since both are
unauthorized ways, they present risks to the organization.
A rogue access point can also refer to a criminal's access point. In this case, the
criminal configures the access point as a MitM device to capture user login information.
An attack with an intrusive network AP uses the criminal access point thanks to higher
power and higher antennas to gain being a better connection option for users. Once
users connect to the unauthorized access point, criminals can analyze the traffic and
execute MitM attacks.
RF interference
The frequency, modulation, and power of the RF jammer must match that of the device
the offender wishes to discontinue in order to successfully jam the wireless signal.
Bluetooth vulnerabilities have emerged, but because of the limited range of Bluetooth,
the victim and the attacker must be within range of the other person.
“Bluesnarfing” occurs when the attacker copies the victim's information from their
device. This information may include emails and contact lists.
The WEP protocol uses a key for encryption. There are no provisions for key management
with WEP, so the number of people sharing the key will continually grow. Since everyone
uses the same key, the criminal has access to a large amount of traffic for analytical
attacks.
WEP also has several problems with the initialization vector (IV) which is one of the
components of the cryptographic system:
Wi-Fi Protected Access Protocol (WPA) and later WPA2 came out as enhanced protocols
to replace the WEP protocol. The WPA2 protocol does not have the same encryption
problems because an attacker cannot recover the key by observing the traffic. The WPA2
protocol is susceptible to attacks because cybercriminals can analyze packets sent
between the access point and a legitimate user. Cybercriminals use a packet protocol
analyzer and then execute offline attacks on the password.
There are several steps to follow to defend against attacks on mobile and wireless
devices. Most WLAN products use default configurations. Take advantage of basic
wireless security features such as authentication and encryption by changing the default
configuration settings.
Restrict the location of the access point with the network by placing these devices
outside the firewall or inside a perimeter zone (DMZ) that contains other untrusted
devices, such as email and web servers.
WLAN tools like NetStumbler can discover rogue access points or rogue workstations.
Develop a guest policy to address the need when legitimate guests need to connect to
the Internet while visiting. For authorized employees, use a remote access virtual private
network (VPN) for WLAN access.
This Packet Tracer lab will introduce security measures used to prevent attacks on
mobile and wireless devices.
Cross-site scripting
Cross-site scripting has three participants: the criminal, the victim, and the website. The
cybercriminal does not target a victim directly. The criminal exploits the vulnerability in
a website or web application. Criminals insert client scripts into websites that are
viewed by users, the victims. The malicious script is unknowingly transferred to the
user's browser. Such a malicious script can access cookies, session tokens, or other
sensitive information. If criminals obtain the victim's session cookie, they can
impersonate that user.
Code injection
One way to store data on a website is to use a database. There are different types of
databases, such as a Structured Query Language (SQL) database or an Extensible
Markup Language (XML) database. XML and SQL injection attacks take advantage of
program weaknesses, such as not validating database queries correctly.
XML injection
When using an XML database, an XML injection is an attack that can corrupt data. Once
the user provides input, the system accesses the necessary data through a query. The
issue occurs when the system does not properly inspect the input request provided by
the user. Criminals can manipulate the query by programming it to suit their needs and
gain access to information in the database.
All sensitive data stored in the database is accessible to criminals and they can make
any number of changes to the website. An XML injection attack threatens website
security.
SQL injection
Criminals can impersonate, modify existing data, destroy data, or become database
server administrators.
Buffer overflow
A buffer overflow occurs when data goes beyond the limits of a buffer. Buffers are areas
of memory allocated to an application. By changing data beyond the boundaries of a
buffer, the application accesses memory allocated to other processes. This can lead to a
system crash, data compromise, or escalation of privileges.
Carnegie Mellon University's CERT/CC estimates that nearly half of all computer program
attacks historically arise from some form of buffer overflow. The generic classification of
buffer overflows includes many variants, such as static buffer overflows, indexing errors,
format string errors, ANSI and Unicode buffer size incompatibilities, and stack overflows.
Vulnerabilities that allow cybercriminals to execute malicious code and take control of a
system with the privileges of the user running the application. Remote code execution
allows a criminal to execute any command on a target machine.
Consider, for example, Metasploit. Metasploit is a tool for developing and executing
attack code against a remote target. Meterpreter is an attack module within Metasploit
that provides advanced features. Meterpreter allows criminals to write their own
extensions as a shared object. The criminals upload and insert these files into a running
process of the target. Meterpreter loads and runs all memory extents, so they never
include the hard drive. This also means that these files move under the radar of antivirus
detection Meterpreter has a module to monitor the webcam of a remote system. Once
the criminal installs Meterpreter on the victim's system, the criminal can view and
capture images from the victim's webcam.
Java operates through an interpreter, the Java Virtual Machine (JVM). The JVM enables
the functionality of the Java program. The JVM isolates untrusted code from the rest of
the operating system. Vulnerabilities exist that allow untrusted code to bypass
restrictions imposed by the sandbox. There are also vulnerabilities in the Java class
library, which an application uses for security. Java is the second largest security
vulnerability next to Adobe's Flash plugin.
The first line of defense against an application attack is to write strong code. Regardless
of the language used or the source of external input, prudent programming practice is to
treat input outside a function as hostile. Validate all inputs as hostile.
Keep all software, including operating systems and applications, up to date, and don't
ignore update indicators. Not all programs update automatically. At a minimum, select
the manual update option. Manual updates allow users to see exactly what updates are
being made.