Podcast
Questions and Answers
Which of the following is NOT a type of attack that systems and networks are vulnerable to?
Which of the following is NOT a type of attack that systems and networks are vulnerable to?
- Infrastructure attacks
- Informational attacks
- Economic attacks (correct)
- Denial of Service attacks
Network security is less of a challenge as more important information is stored in multiple places within systems and networks.
Network security is less of a challenge as more important information is stored in multiple places within systems and networks.
False (B)
Which of the following best describes the primary goal of reconnaissance in a hacking methodology?
Which of the following best describes the primary goal of reconnaissance in a hacking methodology?
- Removing or modifying critical system files
- Actively scanning for open ports and services
- Exploiting system vulnerabilities
- Passively gathering information about the target system/network (correct)
Which type of hacker engages in activities only with the permission of the asset owner?
Which type of hacker engages in activities only with the permission of the asset owner?
Which of the following is the opposite of ensuring data confidentiality?
Which of the following is the opposite of ensuring data confidentiality?
Firewalls can stop all external attacks.
Firewalls can stop all external attacks.
What is the primary purpose of an Intrusion Detection System (IDS)?
What is the primary purpose of an Intrusion Detection System (IDS)?
Approximately what percentage of network attacks are estimated to originate from internal sources?
Approximately what percentage of network attacks are estimated to originate from internal sources?
What does DDoS stand for?
What does DDoS stand for?
Taking down the Internet by attacking (root) _____ servers is a high impact attack.
Taking down the Internet by attacking (root) _____ servers is a high impact attack.
Which of the following is NOT typically considered a layer of security control?
Which of the following is NOT typically considered a layer of security control?
Match the security layer with its corresponding example:
Match the security layer with its corresponding example:
The Swiss Cheese Model implies that a single layer of robust security is sufficient to protect against all attacks.
The Swiss Cheese Model implies that a single layer of robust security is sufficient to protect against all attacks.
Convert the binary number 101 to decimal.
Convert the binary number 101 to decimal.
The IP address 63.171.234.171 is an example of a _____ Decimal Notation.
The IP address 63.171.234.171 is an example of a _____ Decimal Notation.
Linux is a different and quite powerful OS that evolved from which operating system?
Linux is a different and quite powerful OS that evolved from which operating system?
Kali Linux is a general-purpose operating system suitable for everyday tasks.
Kali Linux is a general-purpose operating system suitable for everyday tasks.
Which of the following interface types are offered by Kali LInux?
Which of the following interface types are offered by Kali LInux?
The open-source version of Linux is generally ______.
The open-source version of Linux is generally ______.
Which of the following directories in Linux contains configuration files?
Which of the following directories in Linux contains configuration files?
The /root directory is where user files are stored in Linux.
The /root directory is where user files are stored in Linux.
Which Linux command is used to list the contents of a directory?
Which Linux command is used to list the contents of a directory?
What is the pwd
command used for in Linux?
What is the pwd
command used for in Linux?
The ______
command is used to change the current directory in Linux.
The ______
command is used to change the current directory in Linux.
Which of the following is NOT a use case for running Kali Linux from a Live CD/DVD?
Which of the following is NOT a use case for running Kali Linux from a Live CD/DVD?
Using Kali Linux in a Virtual Machine (VM) requires paying a licensing fee.
Using Kali Linux in a Virtual Machine (VM) requires paying a licensing fee.
Match the Linux directory with its function
Match the Linux directory with its function
In the context of ethical hacking, what is penetration testing primarily used for?
In the context of ethical hacking, what is penetration testing primarily used for?
In black-box testing for ethical hacking, complete knowledge about the system under test is provided to ethical hackers.
In black-box testing for ethical hacking, complete knowledge about the system under test is provided to ethical hackers.
What is the primary purpose of using multi-layer security?
What is the primary purpose of using multi-layer security?
In the common hacking methodology, covering tracks to avoid alerting anyone to activities is called ______.
In the common hacking methodology, covering tracks to avoid alerting anyone to activities is called ______.
What was hacking primarily focused on during the 1960s-1970s?
What was hacking primarily focused on during the 1960s-1970s?
Investing in ethical hacking to test weaknesses in a network or system is not worthwhile.
Investing in ethical hacking to test weaknesses in a network or system is not worthwhile.
Name the common Hacking Methodology steps in order.
Name the common Hacking Methodology steps in order.
Flashcards
Network Vulnerabilities
Network Vulnerabilities
Systems and networks are susceptible to external and internal attacks, informational attacks, DoS/DDoS attacks, and infrastructure attacks.
Network Security Challenge
Network Security Challenge
As more information is stored in multiple systems and networks, the convenience and accessibility also increase the risk of access by unauthorized users.
Reconnaissance
Reconnaissance
Passively acquiring information about the intended system or network before an attack.
Scanning
Scanning
Signup and view all the flashcards
Infiltration and Escalation
Infiltration and Escalation
Signup and view all the flashcards
Exfiltration
Exfiltration
Signup and view all the flashcards
Access Extension
Access Extension
Signup and view all the flashcards
Assault
Assault
Signup and view all the flashcards
Obfuscation
Obfuscation
Signup and view all the flashcards
Ethical Hackers
Ethical Hackers
Signup and view all the flashcards
Amateur Hackers
Amateur Hackers
Signup and view all the flashcards
Criminal Hackers
Criminal Hackers
Signup and view all the flashcards
Ideologue Hackers
Ideologue Hackers
Signup and view all the flashcards
Penetration Testing
Penetration Testing
Signup and view all the flashcards
Black-Box Testing
Black-Box Testing
Signup and view all the flashcards
White-Box Testing
White-Box Testing
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS)
Signup and view all the flashcards
Technical Controls
Technical Controls
Signup and view all the flashcards
Administrative Controls
Administrative Controls
Signup and view all the flashcards
Physical Controls
Physical Controls
Signup and view all the flashcards
Multi-Layer Security
Multi-Layer Security
Signup and view all the flashcards
Data Protection Layers
Data Protection Layers
Signup and view all the flashcards
Dotted Decimal Notation
Dotted Decimal Notation
Signup and view all the flashcards
Linux
Linux
Signup and view all the flashcards
Kali Linux
Kali Linux
Signup and view all the flashcards
Linux Interface
Linux Interface
Signup and view all the flashcards
Linux Root Directory
Linux Root Directory
Signup and view all the flashcards
Linux /bin Directory
Linux /bin Directory
Signup and view all the flashcards
Linux /boot Directory
Linux /boot Directory
Signup and view all the flashcards
Common Linux Command
Common Linux Command
Signup and view all the flashcards
Linux Live Environment
Linux Live Environment
Signup and view all the flashcards
Study Notes
- This lecture introduces hackers, network attacks, and the basics of Linux
Systems and Network Security
- Systems and networks are vulnerable to a variety of attacks
- External vs Internal attacks
- Informational attacks involve stealing, modifying, and/or deleting data or holding it for ransom
- Denial of Service and Distributed Denial of Service attacks
- Infrastructure attacks
Network Security Challenge
- Network security is challenged because more important information is stored in multiple places in systems and networks on the Internet
- Convenience increases access to information for unauthorized users
Who are the hackers, why they do it and how?
- The lecture explains the different types of hackers, their motivations, and methods
Common Hacking Methodology
- Reconnaissance: Passively acquiring information about the intended system/network
- Scanning: Actively gathering information about the intended system/network
- Infiltration and escalation: Exploiting vulnerabilities
- Exfiltration: Accessing protected resources and data
- Access extension: Creating ways to support "future access"
- Assault: Removing/modifying critical files
- Obfuscation: Covering tracks to avoid detection
Hackers: Different Types
- "Good people": Information security professionals use hacking to uncover vulnerabilities
- Amateurs: Entry-level hackers using simple tools
- Criminals: Use malicious software and devices in criminal activities for financial gain
- Ideologues: Hack to achieve ideological or political goals
- Justifications include victimless crime, the Robin Hood ideal, national pride, educational value, or curiosity
Ethical Hacking
- Ethical hackers (white-hat hackers) engage in activities only with permission of the asset owner
- Penetration testing: structured, methodical means of investigating, identifying, attacking, and reporting on a system's strengths and vulnerabilities
- Black-box testing provides no knowledge of the system to ethical hackers
Why Ethical Hacking?
- To ensure confidentiality, integrity, and availability
- Confidentiality: only authorized subjects can access data (opposite of Disclosure)
- Integrity: only authorized subjects can modify data (opposite of Alteration)
- Availability: Info and resources available on demand to authorized subjects (opposite to Disruption)
Network Attacks
- The lecture explains the different types of Network Attacks
History of Systems/Networks Hacking
- 1960s-1970s: Hacking targeted mainframe computers that were not remotely accessible
- 1980s: PCs became widespread and worms and viruses became more common
- 1990s: Web attacks increased
- 2000s: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
- 2010s-2020s: Highly sophisticated tools used by groups of hackers, criminals, organizations, and foreign governments
Fundamental Question: Sources of Network Attacks?
- Network attacks can come from various points of entry, including servers, databases, routers, websites
Get a Firewall?
- Firewalls alone cannot stop all external attacks
Intrusion Detection System and Intrusion Prevention System
- Getting an Intrusion Detection System, or better, an Intrusion Prevention System, helps protect against network attacks
Problem With Network Attacks
- About 50% of attacks are internal
- Keep the firewall and find ways to stop internal attacks
Operation of a DDoS Attack
- A DDoS attack involves malicious traffic from attacker computers overwhelming a target server, causing a service offline outage
Future High Impact Attacks
- Taking down the entire Internet by targeting root DNS servers
- Interrupting the multi-country power grid by attacking computer-based control systems
- Controlling nuclear weapons of multiple countries
- Stealing financial information of 8 billion people
- Blocking global telephone/cellphone/satellite networks
Solutions Against Attacks
- Analyze the potential impact of major attacks
- Prioritize the systems and networks to protect
- Identify the vulnerabilities of systems and networks that can be used by attackers in the future
- Devise a plan to address these vulnerabilities
- Fix these vulnerabilities
- Monitor infrastructure and intervene as necessary
Possible Controls or Layers
- Organizations to protect themselves can use:
- Technical: Firewalls, proxies, intrusion detection and prevention systems, biometric authentication
- Administrative: Policies and procedures (like password)
- Physical Security: Locks, gates, cameras, guards, fences
Multi-Layer Security
- Makes it difficult for hackers to succeed (cyber-breach)
- Examples:
- Layer 1: Firewalls to filter external attacks
- Layer 2: Access Control for databases
- Layer 3: Encryption of data
Swiss Cheese Model
- Illustrates multiple layers of defense where attacks can be blocked by different security layers
Binary to Decimal
- Details how to convert the binary number 10110011 to the decimal number 179
32 bits IP address to Dotted Decimal Notation
- Example: The 1st Octet 00111111, 2nd Octet 10101011, 3rd Octet 11101010, 4th Octet 10101011 converts to 63.171.234.171 in Dotted Decimal Notation
Linux Operating System
- The lecture introduces the basics of Linux Operating System
Linux
- Many tools available for IS security professionals
- Some for Windows Operating Systems but more for Linux
- Linux, evolved from Unix, is a different and quite powerful OS
- Kali is a specialized Linux distribution
- Portfolio of tools
- A complete operating system offering both Graphical User Interface (GUI) and Command Line Interface (CLI)
- Open source (generally free, but corporate versions that require support are not free)
Kali Linux
- Built on Debian distribution
- Designed for hacking or penetrating target networks and systems
- Used for testing and assessments
- Needs to know:
- Interface (GUI, but lot with Command Line Interface)
- Directory and files (e.g. /dev/hda1/file)
- Commands (e.g. $ls -a)
Vital Directories
- /: root
- /bin: means binary (executable files)
- /boot: files to boot up Kali
- /dev: devices
- /etc: configuration files
- /home: user files
- /lib: library files (shared code)
- /usr: useful folders
- /var: system variables (print, mail, process)
Common Linux Commands
- ls (list)
- pwd (print working directory)
- cd (change directory)
- mkdir (make a directory)
- rmdir (remove directory)
- rm (remove or delete all)
- cp (copy)
- mv (move)
Live CDs/DVDs
- Kali Linux can be saved on a CD or DVD and run the system from there
- No need to install it on a computer
- Fully functional Operating System like if it were on the hard drive
- Used for:
- Testing
- Guest account
- Repairing
- Resetting passwords
- Penetration testing
Virtual Machines
- Linux provides IS security professionals with a valuable set of tools as a Virtual Machine (VM)
- Kali is primarily used as a VM
- Linux can be run without installing it on a computer or boot from a CD/DVD
- No fee to pay
- Multiple VMs possible for different things
Things to think about
- If all network attacks are internal, what should be done?
- If all network attacks are external, what should be done?
- If the sources of attack aren't known, what should be done?
- Is it worth investing in Ethical Hacking to test weaknesses in a network/system?
- What role does education play in making a network secure?
- What are the advantages of learning Linux?
Reading Assignment
- O'Reilly Books: Fundamentals of Linux (Oliver Pelz)
- Chapter 3: The Linux File System
- Chapter 4: Working with Command Line
Lab 1: Creating and Securing User Accounts
- Register & pay at infoseclearning.com
- Complete Lab 1 before the next lecture
- You have 1 whole week to finish it!
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.