SY0-071-Module 1 Powerpoint Slides
SY0-071-Module 1 Powerpoint Slides
policy
physical
Essential Terminology
Term Definition
Vulnerability A weakness or flaw in a system
Threat Anything that can potentially violate the security of a system or organization
Exploit An actual mechanism for taking advantage of a vulnerability
Payload The part of an exploit that actually damages the system or steals the
information
Zero-day attack An attack that occurs before a vendor is aware of a flaw or is able to provide
a patch for that flaw
Control Any policy, process, or technology set in place to reduce risk
Mitigation Any action or control used to minimize damage in the event of a negative
event
Essential Terminology (cont’d)
Term Definition
Non-repudiation • A security concept that prevents the denial of involvement or responsibility
• Usually accomplished by applying a digital signature to a documents
• Provides evidence of the origin and content of the message or document
• Useful for legal, financial, or contractual purposes
Principle of Least • A security concept in which users or systems are granted the minimum level of access
Privilege or permissions that they need to perform their tasks, and nothing more
Accountability Ensures that responsible parties are held liable for actions they have taken
Authenticity The proven fact that something is legitimate or real
Gap analysis • A thorough analysis of an organization's security defenses
• Used to identify “gaps” between the current state of security and the
desired state
• The goal is to reduce the attack surface to prevent breaches
Authentication, Authorization, Accounting (AAA)
• A security strategy
• Never trust, always verify
• Based on the idea that nothing is completely
secure:
• Not people, devices, apps or processes
You can’t separate the “good guys” from the “bad guys”
Three Principles of Zero Trust
Data Plane
Untrusted Trusted
Zone Zone
Policy Enforcement
Point (PEP)
Untrusted Enterprise
client/device resource
Actually moves the data / traffic
Tenets of Implementing Zero Trust
• Policies
• Strong access controls
• Just-in-time access
• Secure network zones
• Micro-segmentation
• Data and system isolation
• Granular segmentation for users, devices, and applications
• Separation of duties
Some Techniques Used to Implement Zero Trust
(cont’d)
• Endpoint Protection
• Multifactor authentication
• Conditional access
• Zero-knowledge cloud data encryption
• User and Entity Behavior Analytics (EUBA)
• Privileged Identity Management (PIM)
• Extended Detection and Response
Question
• Honeypot
• Honeynet
• Honey file
• Honey token
Honey Assets
Asset Description
Honeypot • A decoy intended to look like a legitimate, vulnerable system
• Deployed next to your genuine digital assets
• Designed to make a would-be attacker waste their time, while you collect
information about the attack
Honeynet • A decoy network that contains one or more honeypots
• Looks like a real network with multiple systems
• Typically hosted on one or just a few servers
Honey file • A fake file located on a network file share or server
• Designed to detect attackers who are accessing and potentially stealing data
Honey token • Fake data deployed such that no legitimate user would have a need to access it
AKA honey credentials, • When accessed, an alert fires indicating an attack is in progress
canary traps or canary • May actively collect information such as IP addresses, unique browser
tokens fingerprints, or system information to help identify the attacker
• Might include an executable file or a hidden linked image within a document
that, upon running, extracts data and sends it to the security team
Benefits of Honey Assets
• You can gather information about attackers and their tactics without
impacting production servers
• The methods they use to move around the network
• How they evade other detection techniques
• If they are an insider threat, an outside attacker, or an advanced persistent
threat that is already in the network
• Use honey tokens as breadcrumbs/lures to lead an attacker away from actual
assets to other decoys
• You can adapt cyber defenses accordingly
Honeytoken Examples
• Credentials
• Dummy usernames, passwords, API keys, access tokens and other credentials that are
planted across various applications and systems
• If someone tries to use them, the security team knows an attack is underway
• Attempted use is logged, revealing information about the attacker
• Database entries
• Fake, seemingly high-value database records, including customer or employee credentials
and financial information
• Can be interspersed throughout a real database
• The data should remain dormant. If accessed, it indicates malicious activity.
• Documents
• Dummy Word documents, Excel files, PDFs and other documents that appear to contain
sensitive information
• If accessed, can fire an alert
Honeytoken Examples (cont’d)
• Email addresses
• If an inactive decoy email address starts receiving spam or phishing emails, it indicates that
attackers found it via an intrusion or insider threat
• Email headers can be used to track the spammer/cyber criminal
• Executable files
• Software programs that, when triggered, can automatically collect identifying information,
such as threat actor’s names and IP addresses.
• Can be hidden as a trojan horse inside some other file
• Might not be effective if attackers have their own cyber defense measures in place.
• Web beacons
• A hidden digital object, such as a transparent image or a single tracking pixel, that links to a
unique URL
• If an attacker opens a file that contains a web beacon, it automatically and surreptitiously
initiates a server request that alerts the security team and potentially provides information
about the threat actor
Question
• What can you use to keep a car from ramming into the front of the
building?
• Bollard
Question #5
Intruder
changes
the chirp
response
(chirp)
Question
• Your data center requires entry and exit through multiple access
points:
• a lobby, an access control vestibule, doors leading to the server room itself
and a caged area that contains the hardware
• Which control type is described in this scenario?
• Preventive
Question #2
• You have a legacy Linux system that does not support many security
controls.
• You implement a host-based firewall to allow connections from only
specific internal IP addresses.
• Which control type are you using?
• Compensating
Change • Change Management
Management • Documentation
and Security • Version Control
Change Management
• A structured process for updating the network, devices, and software
• All change management procedures must adhere to this process
• Helps you make informed decisions to reduce unauthorized, failed,
and emergency changes
• The goal is to implement changes with minimal impact and risks
• You can assess, prioritize, and schedule changes with input from your change
advisory board
• Use change management software to help streamline the process
Authorization to proceed
Impact of Change Management on Security
• Change management minimizes the rate at which security risks occur
• Promotes standards, process improvement, reduces complexity and risk, and provides sanity
in complex environments
• Ensures that the right person can access the right information at the right time
• By creating a thoughtful and intentional plan, security practitioners can:
• Make longer-lasting changes
• Increase adoption and awareness throughout the company
• Reduce overall security risks
Technical Considerations During Change Management
• You can use allow and deny lists to set your baseline of approved applications,
operating systems, hardware, and configurations
• Use change control to formally update your baseline
• Changes during the maintenance window often require system or application
restarts and scheduled downtime
• Users might not be able to access services during the maintenance window, or might be
restricted to limited activities until the change is finalized
• You can minimize the impact by notifying users of scheduled downtime
• Changes to a system can adversely impact a dependent system
• You might not even be aware of the impact until after the fact
• It’s important to conduct tests, include all stakeholders when performing an impact analysis,
and have a backout plan ready
• Legacy systems are usually intolerant of security updates
• You will need to put compensating controls in place to protect these systems
Documentation
• You want to ensure systems are available, and any maintenance will
minimizes business impact.
• What would you use to specify a set period of time to perform
changes to an operational system?
• Scheduled downtime / maintenance window
Question #3
• RC4
• Popular stream cipher
• Used in Wi-Fi WEP
• Key length 40 – 2048 bits
• ChaCha20
• Quickly replacing RC4
• Google QUIC protocol, used in HTTPS/3
• FreeBSD arc4random random number generator
• PKZIP
• File archive/compression program that uses a proprietary stream cipher to
encrypt files
Question
ENCRYPTION DECRYPTION
y = x3 + ax + b
Symmetric vs Asymmetric Encryption
• What key do you need to encrypt something only Moo can read?
• Moo’s public key
• Hashes
Hashing • Salting
Hashing
• A function that takes data of any size or type, and creates from it a
fixed-length string of characters
• Creates a one-way “encryption”
• Does not require a key
• Does not modify the original file/data
• The values returned by a hash function are called hash values, hash
codes, digests, or simply hashes
• The slightest change to the input dramatically changes the output
• Typically used to:
• securely store passwords
• accompany files or packets to guarantee their integrity
Hashing Example
Requirements of an Effective Hashing Algorithm
• Name two file extensions that are used by certificates (public keys)
• .cer, .der
Question #7
• RSA
• Digital Signature Algorithm (DSA)
• Specific by FIPS 186-2
• Used to generate and verify digital signatures for unclassified, sensitive
applications
• Commercial online services:
• Adobe Sign
• DocuSign
Question
2 6
3
5
Certificate Authority Hierarchy
• VeriSign
• Digicert
• Godaddy
• Microsoft
• COMODO
• Norton Symantec
• Thawte
• Entrust
Implications of Implementing Your Own CA
• Many organizations implement their own internal PKI system,
including root and subordinate Certificate Authorities
• These internal CAs are typically referred to as “Enterprise CAs”
• Certificates issued by an Enterprise CA will be unknown and
therefore untrusted by the general public
• You will have to yourself distribute the certificate of your
Enterprise Root CA to all of your users, devices, and services
• Can be done automatically using various tools such as Active Directory
Group Policy
Key Escrow
• A special component of PKI
• The private key is held in escrow, or stored, by a third party
• Helps protect the private key from unauthorized access or
compromise
• The private key can be retrieved if necessary
• Keys held in escrow can also be divided into parts
• Each part is stored by a different entity
• All parts must be retrieved and put together to recreate the private key
• This reduces the risk of fraud and collusion
Example Implementations of Key Escrow
• Microsoft Active Directory
• The directory service stores a copy of the private key of every certificate
issued to domain users and devices.
• The private key can be accessed for recovery purposes by the user who
received the certificate, or an authorized administrator.
• Public Root CA
• Public Root Certification Authorities will take the private key of their self-
signed certificate and place it in special offline storage.
• The private key might even be divided into parts, with each part being
stored by a different entity.
Question
You can encrypt data in any of these states to increase confidentiality and trust
Key Stretching
• A bank insists all of its vendors must prevent data loss on stolen
laptops.
• What encryption strategy is the bank requiring?
• Encryption for data at rest
Question #2
• The first thing that must be done after acquiring a forensic disk image is to:
• Create a hash digest of the source drive and destination image file
• Ensure they are identical
• A critical step in the presentation of evidence will be to prove:
• Analysis has been performed on an identical image to the data present on the
physical media
• Neither data set has been tampered with
• The standard means of proving this is to create a cryptographic hash
(fingerprint) of the disk contents and any derivative images made from it
• When comparing hash values, you need to use the same algorithm used to
create the reference value
Forensic Disk Copy Examples
Pass-the-hash Attack
• A hacking technique that allows an attacker to authenticate without knowing the
password
• The username and password are not entered via a normal login screen
• Instead, the password hash is provided over the network using a special app
• Used when a password is too difficult to crack
• Requires the attacker to obtain the password hash ahead of time
• Hashes can be dumped from memory using tools such as:
• Mimikatz, psexec, Metasploit meterpreter, fgdump, pwdump, cachedump, etc.
Protocols that Use Asymmetric Cryptography
• SSL/TLS
• S/MIME
• PGP/GPG
• SSH
• Internet Key Exchange (IKE) for IPSEC
Secure Sockets Layer (SSL)
• Protocol that establishes a secure connection between a client and server
• Used to secure confidentiality and integrity of data transmissions over the Internet
• Particularly used by HTTPS to encrypt web traffic
• Server proves its identity to the client
• Server provides its public key to client
• Allows a client and server to:
• Authenticate each other
• Choose an encryption algorithm
• Exchange public keys
• Create a temporary session key
• Uses RSA asymmetric encryption
• Last version was SSL 3.0
• Has been replaced by TLS
• No longer considered secure
• Most modern browsers no longer support SSL
Transport Layer Security (TLS)
SSL/TLS SSL/TLS
CLIENT SERVER
Public key
OpenSSL
• System for creating asymmetric key pairs and trading public keys
• Provides authentication and cryptographic privacy
• Used for digital signing, data compression, and to encrypt/decrypt
emails, messages, files, and directories
• You can search MIT’s PGP Public Key Server
• Use information about the person such as their email address
• If someone’s public key is found, you can download it and put it on your
key ring
• PGP was sold to Symantec in 2010
• Open source replacement is GPG
SSH Key Generation
• When you store a private key in a Secure Enclave, you never actually
handle the key
• Instead, you instruct the Secure Enclave to create the key, securely
store it, and perform operations with it
• You receive only the output of these operations, such as encrypted
data or a cryptographic signature verification outcome.
• This makes it difficult for the key to become compromised
Apple Device Secure Enclave Example
Question