1.1 Cyber Security

Week 1 Day 1 - Introduction and Cyber Threats

Last Update Unknown

Cyber Security

Malware: Software with malicious intent

Virus: Malware where the program attaches itself to another file in order to infect a computer.

Worm: A small program that exploits a network security weakness to replicate itself through computer networks.

Trojan: A program that hides in or masquerades as desirable software, such as utility or game.

Ransomware: A type of malicious software designed to block access to a computer system until a sum of money is paid.

Vulnerability: Weakness

Threat: Event/activity which could potentially exploit vulnerability

Risk: Likelihood of attack / consequences


CIA

Confidentiality

  • Prevents unauthorised access/disclosure of sensitive information
  • e.g. Eavesdropping on communications channels/theft of passwords from server via web attack. Theft of cred’s via phishing malware.


Integrity

  • Prevents unauthorised modification of information
  • e.g. Attacks using cracked passwords to login to systems and change data/software integrity


Availability

  • Prevents loss of authorised access to assets
  • e.g. DoS attacks against servers/communications links.

Top 10 Security Vulnerabilities


Network Models


Attack Types

Reconnaissance Methods

Eavesdropping - Packet Sniffing

A hacker intercepts, deletes or modifies data that is transmitted between two devices. Relies on unsecured network communications to access data in transit between devices.


Wireshark Packet Sniffing/Analysis

The practice of gathering, collecting and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. 

Wireshark can be used to analyse these traffic captures through various tools and filters.


Social Engineering

Use social methods to deceive users to get information or do something they wouldn't normally do

Very difficult to defend against


Phishing

The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.


Host Discovery/Network Sweeping

Send packets to entire network address range and the active machines will reply.

Use tools such as nmap and Nessus to scan target host for open services on well known ports


Mitigation

  • Encrypt sensitive traffic
  • A switched network, with VLANs, helps segment traffic and can help prevent eavesdropping
  • Firewalls and Intrusion detection systems can monitor and block unwanted reconnaissance traffic
  • Employees should be educated on a regular basis about the dangers of social engineering
  • Employees should be educated about thinking about links/email attachments before clicking
  • Email sand boxing and link/attachment content filtering/analysis

Access Attacks

Online Password Guessing

Attack password authentication online by attempting to login and actually authenticate with the service by 'guessing passwords'. Many attempts are carried out until the authentication succeeds. Services may lock out or disable the account after a threshold is reached to try and combat this.


Offline Password Cracking

The attacker has access to the encrypted material or a password hash and can try key combinations without the risk of discovery or interference.


IP Spoofing

The act of falsifying the content in the source IP header, usually with randomised numbers, either to mask the sender's identity or to launch a reflected DDoS attack. It can also be used to pretend to be another user.


Man-in-the-Middle

Hijack a conversation to gain access to resources, steal data masquerading as a server or deliver malicious software masquerading as a download site or scraped web page.


Mitigation

  • Always use strong passwords
  • Disable accounts after a certain number of unsuccessful login attempts
  • Enforce regular password changing
  • Trust model should be created in such a way that the systems inside the firewall do not trust systems outside, or on a DMZ network
  • Use encrypted VPNs for sensitive communications
  • Patch systems regularly
  • Application layer inspection by Firewalls and Intrusion Detection systems
  • Device hardening - remove unneeded services/commands

Denial of Service Attacks

SYN Flood

Attacker sends a flood of TCP packets with the SYN flag set - from a single attacking machine


Distributed DoS

Involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.


Reflection / Amplification DoS Attacks

Intermediate devices are used to reflect and amplify the attack traffic (reflectors)

UDP-based network protocols


Mitigation

  • Firewalls, Routers & Switches can be configured to monitor and block traffic above certain rate-based thresholds
  • Directed broadcasts and similar should not be allowed on network devices
  • Online service providers such as CloudFlare have worldwide large data centres which can absorb DDoS attacks
  • Be aware that some DDoS attacks can not be mitigated against! If attacker sends 15Gbps of traffic to your 10Gbps connection...
  • Bring down botnets - remove c&c servers
  • Google Project Shield - New DoS protection

Malicious Software

Malware 

Software with malicious intent, and typically performs actions the user did not intend



Viruses

Malicious parasitic code

  • Executable code attached / inserted into another program / file
  • User interaction to replicate / spread


Worms

Self-contained / replicating malware

  • Typically no user interaction needed
  • Scan for other systems to infect


Trojan Horses

Entire applications written to look like something else such as an application, but contain malicious code

  • Doesn't replicate


Rootkits

  • Typically low level malware replacing system files
  • Typically allows remote access to system


Ransomware

Used to extort money from users to unlock / decrypt files

  • Deny access to system
  • Encrypts files on the victim machine/device


Mitigation

Defend against known vulnerabilities

  • Defend Perimeters mitigating spread, using Firewalls/Network Intrusion Detection/Proxies
  • Antivirus use/Signature updating
  • Patch Systems OS and Software
  • Content filtering to identify/remove known malware from network traffic
  • Digital Signatures can authenticate active code


Defend against known/unknown attacks

  • Monitor Integrity of Systems – Host-based Intrusion Detection by comparing against a baseline. It can detect for files being added/changed
  • Monitor Integrity of Network Traffic using Network Intrusion Detection (Advanced Anomaly-based detection – changes to normal traffic)
  • Harden Devices and Systems by removing unwanted services/applications to reduce the attack surface
  • Separation of Services to defend against trust attacks

Attacks by Network Model Layer


Security Policy

Security Policies are important to protect the organisation, its assets, and people and detail what must be done to protect those assets.


People have to perform tasks and make decisions regarding information and assets which are at risk. Policy should help reduce risk while also minimising user liability.


Antivirus

Virus detection software checks files against a database of known viruses.

Computer users must regularly update the database on their system so that files are checked against all known viruses.

If an infected file cannot be deleted, it will be quarantined (kept in a separate area of the hard disk where it can’t infect other files).