Summary

This document appears to be a study guide for a Western Governors University (WGU) course, likely focused on information security concepts. It covers various security models, attack types, risk management, and incident response.

Full Transcript

What was on the OA: Fundamentals of Information Security CIA Triad Parkerian Hexad Attack Types Threat Vulnerability Authentication Mutual Authentication Risk Management Process Incident Response Process Key Concepts, Identification, and Authorization Authorization Least Privilege Access Control...

What was on the OA: Fundamentals of Information Security CIA Triad Parkerian Hexad Attack Types Threat Vulnerability Authentication Mutual Authentication Risk Management Process Incident Response Process Key Concepts, Identification, and Authorization Authorization Least Privilege Access Control Access Control Models Network ACL Accountability Intrusion Detection (IDS) Intrusion Prevention (IPS) Auditing Auditing, Cryptography, and Legal Issues Symmetric and Asymmetric Encryption Symmetric and Assymetric Key Algorithms Hash Functions Keyless Cryptography Digital Signature Certificates Secure Socket Layer (SSL) Transport Layer Security (TLS) IPsec and SSL VPN Protecting data at rest/motion/use DDos Man-in-the-middle attacks FISMA, FERPA, HIPPA, HITECH, SOX, GLBA, PCI DSS, COPPA Compliance Operations and Human Element Study Phishing Tailgating Brute Force Physical and Network Security Physical Threats Defense-in-depth Raid NIDS/HIDS Network Segmentation Firewalls VPN Packet Filtering Stateful Firewall Deep Packet Inspection Proxy Servers DMZ Port Scanners -​ Nmap Packet Sniffers -​ Wireshark -​ Tcpdump Honeypots Burp Suite Operating System and Application Security OS Hardening Nessus Buffer Overflows Race Conditions SQL Injections Cross-Site Scripting Fuzzers Tips/Advice: When you’re applying CIA to situations, remember: Confidentiality - WHO can access the data Integrity - keeping data UNALTERED Availability - for ones AUTHORIZED to ACCESS data when needed Attack types and their effect: Interception is the ONLY attack that affects on confidentiality. Interruption, modification, and fabrication affects integrity and availability because most of the time they’re impacting data. An easy trick to memorize the laws and regulations: FISMA - the FI stands for “federal information” FERPA - the E stands for “educational” HIPPA - the HI stands for “health insurance” HITECH - TECH means “technology” PCI DSS - the C stands for “credit card” COPPA - the CO stands for “children online” SOX - rhymes with “stocks”, so think of finance GLBA - this is the only one you would have to memorize ​ There’s gonna be questions where they give you a scenario and you have to identify what type of security it is (application, network, physical, or operating systems). ​ Understand the difference between each network tools and their functions (Nessus, WireShark, Burp Suite, Fuzzers, Honeypots, NMAP). ​ Know your definitions, but the OA heavily relies on applying the concepts to real-life situations. When you’re taking the OA, analyze and break down the question. Understand what they’re really trying to ask you. Notes Fundamentals of Info Security CIA Triad Confidential - allowing only those authorized to access the data requested Integrity - keeping data unaltered in an unauthorized manner and reliable Availability - the ability for those authorized to access data when needed Parkerian Hexad Confidentiality - allowing only those authorized to access the data requested Integrity - keeping data unaltered without detection Availability - the ability to access data when needed Possession - physical deposition of the media on which the data is stored Authenticity - allows us to talk about the proper attribution as to the owner or creator of the data in question Utility - how useful the data is to us Attack Types Interception - an attacker has access to data, applications, or environment Interruption - attacks cause our assets to become unusable or unavailable Modification - attacks involve tampering with our asset Fabrication - attacks that create false information Threat - something that has potential to cause harm Vulnerability - weaknesses that can be used to harm us Authentication - verifying that a person is who they claim to be Something you know: username, password, PIN Something you have: ID badge, swipe card, OTP Something you are: fingerprint, Iris, Retina scan Somewhere you are: geolocation Something you do: handwriting, typing, walking Mutual authentication - both parties in a transaction to authenticate each other -​ Has digital certificates -​ Prevents man in the middle attacks -​ The man in the middle is where the attacker inserts themselves into the traffic flow -​ Ex. Both the PC and server authenticate each other before data is sent in either direction Risk management process 1.​ Identify Asset - identifying and categorizing assets that we’re protecting 2.​ Identify Threats - identify threats 3.​ Assess Vulnerabilities - look for impacts 4.​ Assess Risk - asses the risk overall 5.​ Mitigate Risk - ensure that a given type of threat is accounted for Incident response process 1.​ Preparation - the activities that we can perform, in advance of the incident itself, in order to better enable us to handle it. 2.​ Detection and Analysis (Identification) - detect the occurrence of an issue and decide whether or not it is actually an incident, so that we can respond appropriately to it. 3.​ Containment - involves taking steps to ensure that the situation does not cause any more damage than it already has, or to at least lessen any ongoing harm. 4.​ Eradication - attempt to remove the effects of the issue from our environment. 5.​ Recovery - restoring devices or data to pre-incident state (rebuilding systems, reloading applications, backup media, etc.) 6.​ Post-incident activity - determine specifically what happened, why it happened, and what we can do to keep it from happening again. (postmortem). Key Concepts, Identification, Authorization Authorization - what the user can access, modify, and delete Least Privilege - giving the bare minimum level of access it needs to perform its job/functionality Acess Control -​ Allowing - lets us give a particular party access to a given source -​ Denying - opposite of gaining access -​ Limiting - allowing some access to our resource, only up to a certain point -​ Revoking - takes access away from former user Access Control LIst - info about what kind of access certain parties are allowed to have to a given system. -​ Read, write, execute Network ACL - filter access rules for incoming and outgoing network transactions, such as Internet Protocol (IP) addresses, Media Access Control (MAC) addresses, and ports. Access Control Models Discretionary (DAC) - owner of resources determines who gets access and what level Mandatory (MAC) - separate group or individual (from owner) has the authority to set access to resources Rule-based - allows access according to a set of rules defined by the system administrator Role-based (RBAC) - functions access controls set by an authority responsible for doing so, rather than by the owner of the resource Attribute-based (ABAC) - based on attributes, such as of a person, resource, or an environment Accountability - refers to making sure that a person is responsible for their actions. It provides us with the means to trace activities in our environment back to their source. -​ Depends on identification, authentication, and access control being present so that we can know who a given transaction is associated with, and what permissions were used to allow them to carry it out. Nonrepudiation - a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action Intrusion detection (IDSes) - monitors and reports malicious events Intrusion prevention (IPSes) - takes actions when malicious events occur Auditing - the examination and review of an organization's records to ensure accountability through technical means. Penetration testing - mimicking, as closely as possible, the techniques an actual attack would use Auditing, Cyrptography, and Legal Issues Cryptography - the practice of keeping information secure through the use of codes and ciphers Symmetric cryptography - encryption that uses a single key to encrypt and decrypt a message (aka the private key cryptography) Block Cipher - takes a predetermined number of bits, known as a block, in the plaintext message and encrypts that block Stream Cipher - encrypts each bit in the plaintext message, 1 bit at a time Symmetric Key Algorithms DES - a block cipher based on symmetric key cryptography and uses a 56-bit key. Not that secured any more. 3DES - DES used to encrypt each block three times, each with a different key AES - uses three different ciphers: one with a 128-bit key, one with a 192-bit key, and one with a 256-bit key, all having a block length of 128 bits Asymmetric cyrptography - a public key and a private key. The public key is used to encrypt data sent from the sender to the receiver and is shared with everyone. Private keys are used to decrypt data that arrives at the receiving end and are very carefully guarded by the receive (aka the public key cryptography) Asymmetric Key Algorithms -​ Secure Sockets Layer (RSA) - SSL, to secure transactions like web and e-mail traffic -​ Elliptic Curve Cryptography (ECC) - can secure all browser connections to the Web servers -​ Pretty Good Privacy (PGP) - securing messages and files -​ Transport Layer Security (TLS) SSL (Secure Socket Layer) and TLS (Transport Layer Security) - encryption protocols that are used to secure the transmission of data over a network. They provide secure communications by allowing two applications to authenticate each other and by negotiating a secure, encrypted connection. Hash Functions - create a largely unique and fixed-length hash value based on the original message (input/output) -​ Hashes provide integrity, but not confidentiality. It can't un-hash a message. -​ Hashes are very useful when distributing files or sending communications, as the hash can be sent with the message so that the receiver can verify its integrity Keyless cryptography - a method of encrypting data that does not use a key. Instead, it uses mathematical algorithms to secure the information (hash functions) Digital Signatures - ensure that the message was legitimately sent by the expected party, and to prevent the sender from denying that he or she sent the message, known as nonrepudiation Certificates - link a public key to a particular individual and are often used as a form of electronic identification for that particular person IPsec (Internet Protocol Security) and SSL VPN (Secure Sockets Layer Virtual Private Network) - technologies that can be used to secure the connection between two devices. They can be used to establish a secure, encrypted tunnel between devices, which can be used to protect data in motion. Protecting data at rest - data is at rest when it is on a storage device -​ Data protection is done by encryption Protecting data in motion - data is in motion when it is on a actively transporting over a network -​ SSL VPN and TLS are often used to protect information sent over networks and over the Internet Protecting data in use - data is in use when a user is accessing the data -​ Hardest to protect, encryption is limited DDOS - a type of cyber attack where an attacker floods a website or network with so much traffic that it becomes unavailable to legitimate users. Man-in-the-middle attacks - a type of cyber attack where an attacker intercepts a communication between two parties and can read, alter, or inject new information into the communication Laws and Regulations Federal Information Security Modernization Act (FISMA) - protects the information, operations, and assets in the federal government Family Educational Rights and Priacy Act (FERPA) - protects the privacy of students and their parents, regulating educational records, including educational information, personally identifiable information, and directory information. Health Insurance Rights and Priacy Act (HIPAA) - health care organizations to protect the confidentiality and integrity of personal health information HITECH (Health Information Technology for Economic and Clinical Health) - to promote and expand the adoption of health information technology, especially the ues of electronic health records by healthcare providers Sarbanes-Oxley Act (SOX) - for trade companies to maintain accurate financial records and disclose financial information in a timely manner Gramm-Leach-Biley Act (GLBA) - protects the privacy of their customers’ non-public personal information Payment Card Industry Data Security Standard (PCI DSS) - companies that process credit card payments must protect its information Childrens’ Online Privacy Protection Act (COPPA) - sets rules on data collection for children under 13 to protect their online privacy. Compliance - conforming to a rule, such as specification, policy, standard or law -​ Regulatory compliance - organizational goal to comply with relevant laws and regulations -​ Industry compliance - regulations or standards usually not mandated by law, it is designed for specific industries (e.g. PCI DSS) Operations and Human Element Study Pretexting - when we assume the guise of a manager, customer reporter, or even a co-worker’s family member Phishing - an attack by convincing the potential victim to click on a link in an e-mail, which steals the victim’s personal information and installs viruses Tailgating - an unauthorized person attempts to enter a secure area by following someone who is authorized Brute Force - an attack by submitting password attempts until eventually guessed correctly Physical and Network Security Physical Threats -​ Extreme temperature -​ Gases -​ Liquids -​ Living organism -​ Projectiles -​ Movement -​ Energy anomalies -​ People -​ Toxins -​ Smoke and fire Defense in-depth - using a variety of security measures that will still achieve a successful defense should one or more of the defensive measures fail RAID - data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both Intrusive detection system (IDS) - monitor the networks, hosts, or applications to which they are connected for unauthorized activity Network intrusion detection system (NIDS) - a type of IDS that attempts to detect malicious network activities—for example, port scans and DoS attacks—by constantly monitoring network traffic. -​ Anti-threat software is installed only at specific points such as servers that interface between the outside environment and the network segment to be protected. Host Intrusion detection system (HIDS) - A software-based application that runs on a local host computer that can detect an attack as it occurs. -​ Anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet Network segmentation - dividing a network into multiple smaller networks (subnet) Firewalls - controls access to a network and the traffic that flows into and out of our networks, naturally creating network segmentation when installed Virtual Private Network (VPN) - the use of private networks to provide a solution for sending sensitive traffic over unsecure networks Firewalls and DMZs Packet filtering - a technique by firewall to allow/block certain types of network traffic based on the IP, port, and protocol being used. Stateful firewall - keeps track of the connection state and will only allow traffic that is part of a new or already established connection -​ A firewall that can watch packets and monitor the traffic from a given connection Deep packet inspection - analyzing the actual content of the traffic that is flowing through them. Proxy servers - provides a layer of security serving as a choke point, allowing us to filter and inspect traffic for attacks or undesirable content DMZ - a layer of protection that separates a device from the rest of a network and used to host public facing services such as websites. Network Tools Port Scanners - Port scanners are a software-based utility. They are a security tool designed to search a network host for open ports on a TCP/IP-based network. -​ Nmap - network mapper, used to scan ports, search for hosts on the network, and other operations Packet Sniffers - a technique used by attackers to intercept and read network traffic. Essentially, it allows an attacker to see the data that is being sent over a network. -​ Wireshark - graphical interface tool for packet analyzer capable of capturing and analyzing network traffic -​ Tcpdump - this command-line packet sniffing tool runs on Linux and UNIX operating systems Honeypots - detects, monitor, amd sometimes tamper with the activities and vulnerabilities of an attacker Operating System and Application Security OS Hardening 1.​ Remove unnecessary software 2.​ Removing or turning off unessential services 3.​ Making alternations to common accounts 4.​ Applying the principle of least privilege 5.​ Applying software updates in a timely manner 6.​ Making use of logging and auditing functions Nessus - Vulnerability Assessment Tools, a tool that can be used for port scanning, which is a way to check for open ports on a system. It helps identify any potential vulnerabilities that could be exploited by an attacker. Buffer overflows - a vulnerability that occurs when we do not properly store the size of the data input into our applications, causing the program to crash and an attacker to take advantage Race conditions - a vulnerability that occurs when multiple processes or multiple threads are accessing and modifying shared resources -​ Can be very difficult to detect in existing software, as they are hard to reproduce SQL injections - a type of cyber attack where an attacker injects malicious code into a website's database through a web form. -​ Server-side attack -​ OS hardening is the process of making an operating system more secure by removing unnecessary features and tightening security settings. -​ Nessus is a tool that can be used for port scanning, which is a way to check for open ports on a system. Cross-Site Scripting (XSS) - an attack carried out by placing code in the form of a scripting language into a Web page, or other media, that is interpreted by a client browser, including Adobe Flash animation and some types of video files Web Application Analysis Tools - perform the same general set of tasks and will search for common flaws such as XSS or SQL injection flaws, as well as improperly set permissions, extraneous files, outdated software versions, and many more such items -​ Ex: Nikto and Wikto and Burp Suite Fuzzers - a tool that can be used to test the security of a system by sending it unexpected input. The goal of using a fuzzer is to find vulnerabilities or weaknesses in a system by causing it to crash or behave in unexpected ways. BinScope Binary Analyzer - a tool developed by Microsoft to examine source code for general good practices Nikto/Wikto - checks for many common server-side vulnerabilities, and creates an index of all the files and directories it can see on the target Web server

Use Quizgecko on...
Browser
Browser