Unit-1-part2
Unit-1-part2
software, and information from cyber dangers. The training is utilized by people and
ventures to defend against unapproved access to the servers and other electronic
systems.
Various elements of cyber security are given below:
Application Security
Information Security
Network Security
Disaster Recovery Planning
Operational Security
End-user Security
Authenticity – means verifying that users are who they say they are and that each
input arriving at destination is from a trusted source.This principle if followed
guarantees the valid and genuine message received from a trusted source through
a valid transmission. For example if take above example sender sends the message
along with digital signature which was generated using the hash value of message
and private key. Now at the receiver side this digital signature is decrypted using
the public key generating a hash value and message is again hashed to generate the
hash value. If the 2 value matches then it is known as valid transmission with the
authentic or we say genuine message received at the recipient side
Accountability – means that it should be possible to trace actions of an entity
uniquely to that entity. For example as we discussed in Integrity section Not every
employee should be allowed to do changes in other employees data. For this there
is a separate department in an organization that is responsible for making such
changes and when they receive request for a change then that letter must be signed
by higher authority for example Director of college and person that is allotted that
change will be able to do change after verifying his bio metrics, thus timestamp
with the user(doing changes) details get recorded. Thus we can say if a change
goes like this then it will be possible to trace the actions uniquely to an entity.
Cybersecurity to protect
Information security is for information
Scope anything in the cyber
irrespective of the realm.
realm.
Cybersecurity strikes
Information security strikes against
against Cyber crimes,
Attacks unauthorized access, disclosure
cyber frauds, and law
modification, and disruption.
enforcement.
destruction of digital
information
Relies on a variety of
Uses a range of technologies, including
technologies, such as
encryption, access controls, and data loss
Technologies firewalls, antivirus
prevention tools
software, and intrusion
detection systems
Requires specialized
knowledge of computer Requires knowledge of risk management,
Skills systems and networks, as compliance, legal and regulatory issues,
required well as programming and as well as technical knowledge
software development
skills
S.
No. Parameters Network Security Cyber Security
It is a subset of information
It is a subset of cyber security.
3. Hierarchy security.
It secures the data traveling across the It deals with the protection of
6. Security network by terminals. the data resting.
These two are connected with each other, but not the same. A vulnerability is any
weakness or flaw in a software system. But not all vulnerabilities can be exploited
to deliver malware into a computer system. For example, if your other security
system prevents outside interference, i.e., someone can do nothing with it. In other
words, an exploit is what occurs when cybercriminals take an advantage of the
vulnerability without your permission and even knowledge.
Types of Exploits
New exploits are discovered every day. Exploits are divided into known and
unknown exploits, according to whether someone is patched the vulnerability.
Known exploits are the ones, which have been already explored and patched by developers.
All known exploits you can find and try in the Exploit Database. It’s an archive of exploits
and vulnerable software. This is a resource for penetration testers, and vulnerability
researchers, where they can find the needed information thanks to an easy navigating system.
You should not confuse it with the CVE list. The CVE (Common Vulnerabilities and
Exposures) is the list of all known vulnerabilities and exposures. Exploit databases are used to
test CVEs.
After the vulnerability was publicly announced, software developers push out patches via
security updates. It’s critical to update your system as soon as possible. There was a situation
with WannaCry and NotPetya. Both attacks were made after Microsoft has already patched the
vulnerability. These attacks were able to cause billions of dollars in damage.
Unknown exploits or Zero-Day exploits are created by cybercriminals as soon as they have
found a vulnerability. They use this exploit to attack the victims on the same day as the
vulnerability was discovered. When a Zero-Day attack happens, developers have no time to
patch it. They need some time to update the software and meanwhile, all users are in danger.
Databases also can be exploited as average software. It’s crucial to keep it updated and patched,
as far as databases contain a lot of sensitive information and private data about your customers,
employees, and business.
Some examples of what cybercriminals can do:
Delete and modify all available data;
Destroy data and even backups;
Use data to keeping track of business operations;
Elevate privileges with forgotten default accounts;
Attack other systems on the same network.
There are numerous tools and methods available to identify vulnerabilities and potential
avenues of exploitation. These tools and methods are essential for organizations and individuals
to proactively protect their systems and data from cyber threats.
There are several ways to find vulnerabilities and exploits in a system. Here are a few methods:
Scanning: Automated tools are used to scan the target system for known vulnerabilities.
Identifying Weaknesses: The assessment identifies security weaknesses and provides a
prioritized list of vulnerabilities.
No Exploitation: Vulnerability assessment does not involve actively exploiting
vulnerabilities; it focuses on identification and reporting.
Remediation Recommendations: The assessment results typically include
recommendations for remediation and mitigation.
API vulnerability assessment is conducted to identify and mitigate potential security risks in
APIs. This process identifies vulnerabilities and weaknesses in the API’s design,
implementation, and deployment. The goal is to ensure that the API is secure, reliable, and
resilient to attacks.
These assessments typically involve scanning the host system for known vulnerabilities, such
as missing security patches or outdated software. Host-based vulnerability assessments can
be performed using both automated and manual methods.
Deauthentication attacks
Misconfiguration of wireless routers
Session reuse
Unauthorized wireless devices
4. Physical Penetration Testing
If a threat actor has physical access to a server room or other sensitive facility, they can
potentially compromise the entire network, which can have devastating effects on business,
customers, and partnerships. Physical penetration testing can help secure an organization’s
physical assets from threats such as social engineering, tailgating, and badge cloning.
Physical penetration testing finds weaknesses in physical controls such as locks, doors,
cameras, or sensors, and allows the organization to quickly remediate defects.
The goal is to identify vulnerable individuals, groups, or processes, and to develop pathways
for improving security awareness.
Static analysis extracts source code and metadata and performs reverse engineering to
identify weaknesses in application code.
Dynamic analysis finds application vulnerabilities while the application is running on
a device or server.
9. Red Team Penetration Testing
Red team penetration is an advanced testing technique based on military training exercises.
It uses an adversarial approach, allowing organizations to challenge their security
policies, processes, and plans. Blue teaming, or “defensive security,” involves detecting and
withstanding red team attacks and real-life adversaries.
Red teaming combines physical, digital, and social contexts to simulate a comprehensive real-
life attack scenario, making it distinct from standard penetration testing. It encompasses tasks
related to the various types of penetration testing. While a standard pentest aims to identify as
many vulnerabilities as possible in a set timeframe, it is typically limited by artificial
restrictions such as the task scope.