Module 2
Module 2
Step 1:
Step 2:
Top Patterns Web Applications, Miscellaneous Errors and Everything Else represent 81% of
breaches
Threat Actors External (64%), Internal (35%), Partner (2%), Multiple (1%) (breaches)
Data Compromised Personal (77%), Other (35%), Credentials (35%), Bank (32%) (breaches)
Top Controls Implement a Security Awareness and Training Program (CSC17), Boundary
Defense (CSC 12), Secure Configurations (CSC 5, CSC 11)
Personally identifiable
Data Credit ratings
information
Hackers
Phishing
State-sponsore Script kiddies Hacktivists Cyber terrorists Inside threats
scammers
d hackers
Misconfiguration in applications
Identify doors/windows Get ready the tools to Search through the house Run through
that can be broken into break into the house for valuables exit route
Go to master bedroom
(highest chance of having
valuables like cash and
jewelries)
● Kali Linux
○ Open-source penetration testing toolbox
○ Loaded with hundreds of hacking software
○ Used by both white hat and black hat hackers
Attackers probe for a Build a deliverable Sending the weaponised Executing code on
weakness. This might include payload using an exploit and bundle to the victim the victim's
harvesting login credentials of a back-door. - for example, malicious system.
information useful in an attack. link in an e-mail.
Installing malware Creating a channel Attacker remotely carries Pull data out of the
on the target where the attacker can out its intended goal. target system(s)
asset. control a system
remotely.
● Go to www.linkedin.com
● Can you find your co-workers?
● Can you find who are the top management?
● Can you find colleagues that you have not met before?
● bobmister@bank.com
● misterbob@bank.com
● bm@bank.com
● Go to www.facebook.com
● Can you find your co-workers and friends?
● Can you find who are the top management?
● Can you find colleagues that you have not met before?
● Do you know more about their personal lives now?
https://www.exploit-db.com/google-hacking-database
(Facebook, LinkedIn,
Privatise Privatise your publicly available information Google, etc.)
Regularly update
Do not click on
all your computers
links from
and mobile
unverified senders
devices
● Regularly update all your computers, mobile devices and Internet-connected devices
● Updates address not just new features and functions, but also security holes
● There is a time gap between the exposed vulnerability and the ability
of the software vendor to update with newer and more secure code
http://www.techerator.com/2009/10/preventing-viruses-part-1-email-viruses
/
Exploit a software
weakness inside a
computer or phone
Attacks both
operating system and
software
● Hackers can search for exploit availability to target against vulnerable services
● Exploit-db.com
● SearchSploit in Kali Linux
● Target against specific application and/or operating system
Actions on Ex-filtratio
Recon Weaponise Deliver Exploit Install C&C
Target n
•Attackers probe •Build a •Sending the •Executing code •Installing •Creating a •Attacker •Pull data out of
for a weakness. deliverable weaponised on the victim's malware on the channel where remotely carries the target
This might payload using bundle to the system. target asset. the attacker can out its intended system(s)
include an exploit and victim- for control a system goal.
harvesting login a back-door. example, a remotely.
credentials of malicious link in
information an e-mail.
useful in an
attack.
App-aware Firewall
Endpoint Malware Protection Secure Password Data Execution Trust Zones
Exploitation
Host-Based Intrusion Detection System Patch Management Prevention Inter-zone Network Intrusion Detection
System
App-aware Firewall
Security Information and Event Privilege Separation
Router Access Control Trust Zones
Installation Management (SIEM) Strong Passwords
Lists Inter-zone Network Intrusion Detection
Host-Based Intrusion Detection System Two-Factor Authentication
System
Command & Network Intrusion Detection System Firewall Access Control Lists Host-Based Intrusion Domain Name Trust Zones
Tarpit
Control Host-Based Intrusion Detection System Network Segmentation Prevention System System Redirect Domain Name System Sinkholes
https://www.researchgate.net/figure/Hierarchical-Datacenter-Architecture_fig9_322324205
© 2022 Vertical Institute
As-a-service model
● Software as a service
● Platform as a service
● Infrastructure as a service
1. Written in code
2. Uploaded to a computer
3. Users access the computer
4. Computer runs code
5. Computer responses with results
Planning
Maintenance Analysis
Testing &
Design
Integration
Implementation
Signature based
Behaviour based
Pros Cons
• Able to detect quickly • Hackers can update file type and the
malicious software is no longer detected
• For example, changing to <open open
notepad>
For example, a malicious file is executed in the sandbox. If the file tries to delete or
encrypt other files, it is an indication of attack.
https://purplesec.us/intrusion-detection-vs-intrusion-prevention-systems/
Inject malicious
code into
application Rule 1
Rule 2
Rule 3
…
Regular access
https://gbhackers.com/security-information-and-event-management-siem-a-detail
ed-explanation/
https://www.plutora.com/blog/what-staging-environment-how-get-it-right
© 2022 Vertical Institute
Backups
● Saving data into a separate repository for safeguard and future recovery
● Highly common practice in most large enterprises, financial institutions and banks
● Need to comply with regulatory requirements
]
What is a security architecture?
Security architecture is a unified security design that addresses the necessities and
potential risks involved in a certain scenario or environment. It also specifies when and
where to apply security controls. The design process is generally reproducible.
“Know the enemy and know yourself in a hundred battles you will never be in peril.
When you are ignorant of the enemy but know yourself, your chances of winning or losing
are equal. If ignorant both of your enemy and of yourself, you are certain in every battle to be
in peril.” – Sun Tzu
Identify security pinpoint security threats quantify threat and prioritise remediation
requirements, and potential vulnerabilities, vulnerability criticality, and methods.
● Identify Assets
● Create an Architecture Overview
● Decompose the Application
● Identify the Threats
● Document the Threats
● Rate the Threats
● Spoofing
● Tampering
○ Unauthorized modifications
● Repudiation
● Information disclosure
● Denial of service
● Elevation of privilege
threats ●
fire and lightning
System failure
○ Hardware issues, power
outages
● Human error
○ Accidental deletion, incorrect
logic, misconfiguration of
security settings
You are a security analyst working in a bank and has been tasked to work on
threat modelling against the bank’s new website before its launch date in 3 months
time.
● Identify threats to the bank’s new website
● Identify threat paths
● Map to STRIDE
● Provide countermeasures option
● Less than 100 words
A. Recon
B. Weaponize
C. Deliver
A. Recon
B. Weaponize
C. Deliver
A. Computer as a target
B. Computer as a tool to launch attacks
C. Online harassment
D. Computer harvestor
A. Computer as a target
B. Computer as a tool to launch attacks
C. Online harassment
D. Computer harvestor
A. Weaponization
B. Delivery
C. Ex-filtration
A. Weaponization
B. Delivery
C. Ex-filtration
A. Minutes
B. Hours
C. Weeks
D. Months
A. Minutes
B. Hours
C. Weeks
D. Months
https://terminal.cyberskillslesson.com/