Cyber Security Essentials 1 1
Cyber Security Essentials 1 1
UNIT 1: Security roles and security controls : information security roles, security
control and framework
types, threat actor types and attack Vectors, Threat Intelligence Sources.
Performing security assessments : assess organizational security with network
reconnaissance
tools, security concerns with general vulnerability types, vulnerability scanning
techniques,
penetration testing concepts
Social engineering and malware : social engineering techniques, indicators of
malware-based
attacks
• Security roles and security
controls : information security
roles, security control and
framework types, threat actor
types and attack Vectors, Threat
Intelligence Sources.
Principles of Information Security
• The fundamental principles (tenets) of
information security are confidentiality,
integrity, and availability.
• Every element of an information security
program (and every security control put in
place by an entity) should be designed to
achieve one or more of these principles.
• Together, they are called the CIA Triad.
• Confidentiality measures are designed to
protect against unauthorized disclosure of
information.
• The objective of the confidentiality principle is
to ensure that private information remains
private and that it can only be viewed or
accessed by individuals who need that
information in order to complete their job
duties.
• Integrity involves protection from
unauthorized modifications (e.g., add, delete,
or change) of data.
• The principle of integrity is designed to ensure
that data can be trusted to be accurate and
that it has not been inappropriately modified.
• Availability is protecting the functionality of
support systems and ensuring data is fully
available at the point in time (or period
requirements) when it is needed by its users.
• The objective of availability is to ensure that
data is available to be used when it is needed
to make decisions.
• Effectively executing all three tenets of the Security
Triad creates an ideal outcome from an information
security perspective.
– Attack surface
• Points where an attacker can discover/exploit vulnerabilities in a
network or application
– Vectors
• Direct access
• Removable media
• Email
• Remote and wireless
• Supply chain
• Web and social media
• Cloud
Threat Intelligence Sources
• Threat Intelligence: Digital technologies lie at the heart of
nearly every industry today.
• The automation and greater connectedness they afford have
revolutionized the world’s economic and cultural institutions —
but they’ve also brought risk in the form of cyberattacks.
• Threat intelligence is knowledge that allows you to
prevent or mitigate those attacks.
• Rooted in data, threat intelligence provides context — like who
is attacking you, what their motivation and capabilities are, and
what indicators of compromise in your systems to look for —
that helps you make informed decisions about your security.
• Threat intelligence is evidence-based
knowledge, including context, mechanisms,
indicators, implications and action-oriented
advice about an existing or emerging menace
or hazard to assets.
• Threat Intelligence Sources:
– Threat Intelligence Feeds
– subscription-based threat intelligence platforms
• Performing security assessments :
assess organizational security with
network reconnaissance tools,
security concerns with general
vulnerability types, vulnerability
scanning techniques, penetration
testing concepts
• assess organizational security with network
reconnaissance tools:
• ipconfig/ifconfig/ip, ping,
• and arp: The arp command displays and
modifies the Internet-to-adapter address
translation tables.
• route and tracert/traceroute
• pathping/mtr
• Pathping: provides statistics for latency and
packet loss along a route over a longer
measuring period. pathping is a Windows tool;
the equivalent on Linux is mtr.
• IP Scanners: An IP scanner performs host
discovery and identifies how the hosts are
connected together in an internetwork.
• and Nmap: The Nmap Security Scanner (nmap.org) is
one of the most popular open-source IP scanners.
Nmap can use diverse methods of host discovery, some
of which can operate stealthily and serve to defeat
security mechanisms such as firewalls and intrusion
detection. The tool is open-source software with
packages for most versions of Windows, Linux, and
macOS. It can be operated with a command line or via a
GUI (Zenmap).
• If a host is detected, Nmap performs a port scan against
that host to determine which services it is running.
• Service Discovery: Having identified active IP hosts
on the network and gained an idea of the network
topology, the next step in network reconnaissance
is to work out which operating systems are in use,
which network services each host is running, and,
if possible, which application software is
underpinning those services. This process is
described as service discovery.
• and Nmap
• Netstat: show the state of TCP/UDP ports on
the local machine.
"human hacking"
since it targets human weaknesses
rather than flaws in technical or digital
systems.
1. Malware
2. Phishing
3. Man-in-the-Middle (MitM) Attacks
4. Denial-of-Service (DOS) Attack
5. SQL Injections
6. Zero-day Exploit
7. Password Attack
8. Cross-site Scripting
9. Rootkits
10. Internet of Things (IoT) Attacks
1. Malware
• A botnet is a network of infected computers
that can be controlled remotely and forced to
send spam, spread malware, or stage DDoS
attacks — without the consent of the device
owners.
• A botnet is a group of computers linked
together with malware and controlled by the
botnet creator, known as a bot herder. Bot
herders infect computers to form botnets,
which they control as a group to initiate wide-
scale cyberattacks, send spam, and conduct
phishing campaigns.
2. Phishing
3. Man-in-the-Middle (MitM) Attacks
4. Denial-of-Service (DOS) Attack
5. SQL Injections
6. Zero-day Exploit
7. Password Attack
• Dictionary attack
• Brute force
• Man In The Middle
8. Cross-site Scripting
9. Rootkits
• Rootkits are installed inside legitimate
software, where they can gain remote control
and administration-level access over a system.
The attacker then uses the rootkit to steal
passwords, keys, credentials, and retrieve
critical data.
10. Internet of Things (IoT) Attacks
• IoT attacks are becoming more popular due to
the rapid growth of IoT devices and (in
general) low priority given to embedded
security in these devices and their operating
systems.
• ADDITIONAL READING
IS STRONGLY
RECOMMENDED
References
• https://www.ibm.com/topics/social-engineeri
ng
• https://www.kaspersky.co.in/resource-center/
threats/how-to-avoid-social-engineering-attac
ks
• https://us.norton.com/internetsecurity-emerg
ing-threats-what-is-social-engineering.html
• https://www.upguard.com/blog/social-engine
ering
• https://www.barracuda.com/glossary/social-e
ngineering