Uploaded by Mbuso Mbuso

LESSON 1

advertisement
LESSON 1
COMPARING SECURITY ROLES AND SECURITY CONTROLS
-
Security is an organizational process that include analyzing requirements, setting up
organizational security systems, hardening them, monitoring them, responding to attacks
in progress, and deterring attackers.
COMPARE AND CONTRAST INFORMATION ECURITY ROLES
-
Information security (or infosec) refers to the protection of data resources from
unauthorized access, attack, theft, or damage.
Data may be vulnerable because of the way it is stored, the way it is transferred, or
processed
The system used to store data must demonstrate the properties of security
Secure information has 4 properties called (CIA Triad)
-
-
Confidentiality
Means that some certain information needs to be known by certain people.
Integrity
Means that the data is stored and transferred as intended and that any modification is
authorized.
Availability
Means that information is accessible to those authorized to view or modify it.
Cybersecurity Framework
Within the goal of ensuring information security, cybersecurity refers specifically to provisioning
secure processing of hardware and software.
Information security and cyber security tasks can be classified as five functions:
- Identify
Develop security policies and capabilities. Evaluate/determine risks, threats, and
vulnerabilities and recommend security controls/strategy to mitigate them.
- Protect
Procure/develop, install, operate, and decommission IT hardware and software assets
with security as an embedded requirement of every stage of this operations life cycle
- Detect
Perform ongoing, proactive monitoring to ensure that controls are effective and capable
of protecting against new threats.
- Respond
Identify, analyze, contain, and eradicate
LESSON 2
Lesson Introduction
In order to make an effective security assessment, you should be able to explain strategies for
both defense and attack.
LESSON 3
Performing security assessments
-
Security assessments refers to a process and tools that evaluate the attack surface.
The purpose of the security assessment is for deploying, enhancing, or reconfiguring
security controls to mitigate risks.
TOPIC 3A
Assess organizational security with network reconnaissance tool
Reconnaissance
- Is a type of assessment activity that maps the potential attack surface by identifying the
nodes and connection that makes up the network
- You’ll often need to run scans using both command-line interface and GUI topology
discovery tools
- You should also understand how tools can be used to operate backdoor connection to a
host and to covertly exfiltrate data.
Ipconfig, ping, and arp
-
The process of doing the mapping on the attack surface is referred to as network
reconnaissance and discovery.
Reconnaissance techniques are used by threat actors, but they are also used by security
professionals to test their own security systems, as part of security assessment and
ongoing monitoring.
-
Topology discovery ( or “footprinting”) means scanning for hosts, IP ranges, and routes
between netowrks to map out the structure of the target network.
-
Topology discovery can also be used to build an asset database and to identify nonauthorized hosts (rogue system detection) or network configuration errors.
The following tools report the IP configuration and test connectivity on the local network segment
or subnet
Ipconfig - shows the configuration assigned to network interface(s) in windows, including the hardware
or Media Access Control (MAC) address, IPv4 and IPv6 addresses, default gateway, and whether the
address is static or assigned by DHCP.
- If the address is DHCP assigned, the output also shows the address of the DHCP server that
provided the lease.
Ifconfig – show the configuration assigned to network interface(s) in Linux
ping – probe a host a particular IP address or host name using Internet Control Message Protocol (ICMP).
- You can use ping for a simple script to perform a sweep of all the IP addresses in a subnet. The
following example will scan the 10.1.0.0/24 subnet from a windows machine:
For /1 %i in (1,1,255) do @ ping –n 1 –w 100 10.1.0.%i | find /i “reply”
TOPIC 3D
Explain Penetration Testing Concepts
Vulnerability Scanning does not determine what a threat actor might be able to achieve.
Penetration Testing is a type of assessment that use known tactics and techniques to attempt
intrusions (Actions). Devising, planning and leading is a specialized security role.
Penetration test
– often shortened to pen test. Penetration test uses authorized hacking techniques to discover
exploitable weaknesses in the target’s security system. Pen test is also referred to as
Ethicalhacking. You can perform security checks or penetration test by referring to one of these
techniques. Verify a threat exist, Bypass security controls, Actively test security controls,
and exploits vulnerabilities.

Verify threat exists – use surveillance, social engineering, network scanners, and
vulnerability assessment tools to identify a vector by which vulnerabilities that could be
exploited.
Networking and computer surveillance is the process of monitoring the computer systems by
keeping an eye on the activities done on the computers or data being transferred over the
network(such as internet).

Bypass security controls – to bypass security controls, this where we look for the easy
way to break into the system.
Example: If the network is protected by the firewall, it is possible to gain physical access to a
computer in the building and run malware from a USB stick?


Actively test security controls – Review security controls by checking configuration
weaknesses and errors such as weak passwords or software vulnerabilities.
Exploit vulnerabilities – Here a security expert proves that a system has some
weaknesses, by exploiting it to gain access to data or install back-door.
Rules of Engagement
Security controls might be done by employees or may be done by a third party or a by
consultant. Rules of Engagement provide details on what activity needs to be done and what is
permitted under that activity and what is prohibited. A pen test should have a scope to follow
while doing it.
Attack Profile
Attacks comes in different forms. You may need or wish to perform your network scan from the
external part of your network or from the inside (External and Insider Threats).
Attack Profiling is the method used to determine actions of an attacker, sharing threat
Intelligence and preparing necessary tools for the exploits that might happen in future.

Blackbox (or unknown environment) – This is where a consultant is given no privileged
information about the network and its security systems. Blackbox I
Threat intelligence – Threat intelligence (Information) refers to the information that has been
found, analyzed, interpreted to provide necessary ideas on how to act or make a decision based
on the system insecurities.
LESSON 5
Summarizing Basic Cryptographic Concepts
A cryptographic system encode data in such a way that only authorized person can decode it.
Compare and Contrast Cryptographic Ciphers
-
A cipher is a particular operation or process made to encode or decode data.
Cryptographic systems use symmetric and asymmetric cipher types to encode or
decode data.
As well as these cipher types, one-way hash function have an important role to play in
many security controls.
The one-way hash function cipher type plays an important role in many security
controls.
Cryptographic concepts
-
Cryptography (literally meaning “secret writing”).
Cryptography is the art of protecting or keeping data secure by encoding it.
This stands in opposition to the concept of security through obscurity. Security through
obscurity means keeping something a secret by hiding it.
The concept Security through obscurity states that a system can stay secure if the
vulnerabilities of a system are kept as a secret or hidden.
An attacker can exploit the system if h or she does not know the weaknesses. The flipped
side is that what if the vulnerabilities are exposed, it is no longer secure.
Security through obscurity is considered as high risk strategy on any sort of computer
network.
The following terminology is used to discuss cryptography:




Plaintext (or cleartext) – an unencrypted message
Ciphertext - is an encrypted message
Cipher – is the process used to encrypt and decrypt a message.
Cryptanalist – is the art of cracking cryptographic systems
In discussing cryptography and attacks against encryption systems, it is customary
to use a cast of characters to describe different actors involved in the process of an
attack. The main characters are:
Alice – The sender of a signature message
Bob – The intended recipient of the message
Mallory – a malicious attacker attempting to subvert (destroy or damage) the message in some
way.
There are three main types of algorithm with different roles to play in the assurance of security
properties confidentiality, integrity, availability, and non-repudiation. These types are hashing
algorithms and two types of encryption ciphers: symmetric and asymmetric.
Hashing Algorithms
Download