This post is a summary of all the chapters I studied for the Security+ 601 exam. These chapters helped me pass the exam successfully. However, since the Security+ 601 version is now deprecated and replaced by the 701 version, I’ve decided to remove the previous individual posts and keep this single summary to reflect the key terms.
Part I: Threats, Attacks and Vulnerabilities
1.1 Social Engineering Techniques
Social engineering attacks involve manipulating individuals to gain unauthorized access to sensitive information or perform specific actions. Attackers exploit human psychology, trust, and vulnerability to deceive their targets. These attacks succeed by taking advantage of human trust and helpfulness, as people are naturally inclined to assist others. Additionally, the success of social engineering attacks stems from people’s preference to avoid confrontation and trouble, making them susceptible to intimidation tactics. These attacks combine technical elements with psychological manipulation.
Phishing: Phishing refers to the fraudulent practice of tricking individuals into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity in electronic communication.
Smishing: Smishing is a form of phishing that specifically targets individuals through SMS messages or text-based communication, using similar deceptive tactics to steal personal information.
Vishing: Vishing involves the use of voice communication, such as phone calls or VoIP services, to deceive individuals into divulging confidential information.
Spam: Spam refers to unsolicited and bulk electronic messages, typically sent via email, with the intention of advertising or spreading malicious content.
Spam over Instant Messaging (SPIM): SPIM is a variation of spam that targets instant messaging platforms, aiming to flood users with unwanted messages.
Spear Phishing: Spear phishing is a targeted phishing technique where attackers tailor their fraudulent messages to specific individuals or organizations to increase the chances of success.
Dumpster Diving: Dumpster diving involves physically rummaging through discarded materials, such as paper documents or electronic devices, to extract sensitive information.
Shoulder Surfing: Shoulder surfing refers to the act of observing someone’s sensitive information, such as passwords or PINs, by directly looking over their shoulder or using video surveillance.
Pharming: Pharming is a method used by attackers to redirect users to fake websites that mimic legitimate ones, aiming to collect sensitive information.
Tailgating: Tailgating involves an unauthorized person following an authorized individual to gain physical access to a restricted area or system.
Eliciting Information: Eliciting information refers to the process of extracting sensitive or confidential details from individuals through various social engineering techniques.
Whaling: Whaling is a type of phishing attack that specifically targets high-profile individuals or executives within an organization to gain access to sensitive information.
Prepending: Prepending is a technique used in spam emails where attackers add irrelevant or random text to the subject line or body to bypass spam filters.
Identity Fraud: Identity fraud occurs when someone uses another person’s personal information, such as their name or financial details, without their consent for illegal purposes.
Invoice Scams: Invoice scams involve fraudsters manipulating invoices or payment requests to deceive individuals or organizations into making payments to fraudulent accounts.
Credential Harvesting: Credential harvesting refers to the act of collecting usernames, passwords, or other authentication credentials to gain unauthorized access to systems or accounts.
Reconnaissance: Reconnaissance involves gathering information about potential targets, such as an organization’s infrastructure or employees, to plan and execute cyber attacks more effectively.
Hoax: A hoax is a deceptive act or message intended to trick individuals into believing something false or misleading, often circulated through various communication channels.
Impersonation: Impersonation occurs when an attacker poses as a legitimate person or entity to deceive others and gain unauthorized access or extract sensitive information.
Third-Party Authorization: Third-party authorization involves granting permissions or access rights to external entities or contractors, which can introduce security risks if not properly managed.
Contractors/Outside Parties: Contractors or outside parties refer to individuals or organizations that are not directly employed by an organization but have access to its systems or resources.
Online Attacks: Online attacks encompass various techniques and methods used by attackers to compromise systems, steal data, or disrupt services over the internet.
Watering Hole Attack: A watering hole attack is a technique where attackers compromise websites frequented by a specific target group, exploiting their trust to deliver malware or gather information.
Typosquatting: Typosquatting involves registering domain names similar to legitimate ones but with slight misspellings or variations, aiming to trick users into visiting malicious websites.
Pretexting: Pretexting is a social engineering technique where attackers create a false pretext or scenario to deceive individuals and manipulate them into revealing sensitive information.
Influence Campaigns: Influence campaigns refer to coordinated efforts, often utilizing social media platforms, to shape public opinion, spread propaganda, or manipulate people’s beliefs and behaviors.
Principles (Reasons for Effectiveness):
- Authority: People tend to comply with requests from perceived figures of authority.
- Intimidation: Creating fear or using threats to manipulate individuals.
- Consensus: People are more likely to follow the crowd or conform to social norms.
- Scarcity: Creating a sense of limited availability or urgency to encourage action.
- Familiarity: Exploiting familiarity or trust in known entities or brands.
- Trust: Building trust with individuals to deceive them more effectively.
- Urgency: Creating a sense of immediate need or time pressure to prompt quick actions.
Defending against social engineering attacks requires a multi-layered approach that includes strong policies, employee training, vigilance, multiple layers of defense, and public awareness campaigns. By implementing clear guidelines, educating employees about attack techniques, maintaining vigilance, and reinforcing security practices, organizations can significantly reduce the risk of falling victim to social engineering attacks.
It’s important to remember that social engineering attacks are constantly evolving, so organizations must stay proactive in their defense strategies and adapt to new tactics as they emerge.
1.2 Type of Attack Indicators
Malware: Malicious software designed to harm or exploit computer systems.
Ransomware: A type of malware that encrypts files on a victim’s computer and demands a ransom for their release.
Trojans: Malware disguised as legitimate software that tricks users into installing it, allowing attackers to gain unauthorized access to the system.
Worms: Self-replicating malware that spreads across networks without human intervention.
Potentially Unwanted Programs (PUPs): Software that may not be explicitly malicious but can negatively impact system performance or user experience.
Fileless Viruses: Malware that resides in computer memory rather than on disk, making it difficult to detect and remove.
Command and Control (C&C): The infrastructure used by attackers to communicate with and control compromised systems.
Bots: Automated software programs that perform tasks over the internet, often used for malicious purposes.
Crypto-malware: Malware that aims to exploit or compromise cryptocurrencies and related technologies.
Logic Bombs: Code inserted into a system that triggers a malicious action based on specific conditions or events.
Spyware: Malware designed to secretly monitor and gather information about a user’s activities.
Keyloggers: Software or hardware that captures keystrokes on a compromised system, often used to steal sensitive information such as passwords.
Remote-Access Trojans (RATs): Malware that provides attackers with unauthorized remote access to a compromised system.
Rootkit: Malicious software that provides unauthorized access and control over a computer system while hiding its presence.
Backdoors: Hidden entry points in software or systems that allow unauthorized access.
Password Attacks: Techniques used to gain unauthorized access to systems by exploiting weaknesses in password security.
Spraying: A password-guessing technique where a few commonly used passwords are attempted against multiple user accounts.
Dictionary: A password-guessing technique that involves trying words from a dictionary as potential passwords.
Brute Force: A password-guessing technique that systematically tries every possible combination until the correct password is found. Certainly, here are shorter definitions:
Online Brute-force Attack: An attack in real-time, trying various combinations on an active login or authentication system.
Offline Brute-force Attack: Attackers with a password hash,se automated tools to guess the password. Offline attacks have no limit on the number of trials.
Rainbow Tables: Precomputed tables used to speed up password cracking by mapping hash values to their corresponding passwords.
Plaintext/Unencrypted: Data that is not encrypted and is easily readable.
Physical Attacks: Attacks that exploit physical vulnerabilities in systems or devices.
Malicious Universal Serial Bus (USB) Cable: USB cables designed to perform unauthorized actions when connected to a system.
Malicious Flash Drives: USB flash drives loaded with malware to compromise systems when inserted.
Card Cloning: The unauthorized duplication of credit or debit card information for fraudulent purposes.
Skimming: The unauthorized capturing of credit or debit card information using devices placed on payment terminals.
Adversarial Artificial Intelligence: The use of AI techniques to create or exploit vulnerabilities in AI systems.
Tainted Training Data for Machine Learning (ML): The use of manipulated or biased data during the training phase of ML models.
Security of Machine Learning Algorithms: Techniques and methods used to protect ML models from attacks.
Supply-Chain Attacks: Attacks that exploit vulnerabilities in the software supply chain to compromise systems.
Cloud-Based vs. On-Premises Attacks: Attacks targeting cloud-based services or on-premises infrastructure.
Cryptographic Attacks: Techniques used to exploit weaknesses in cryptographic systems.
Birthday Attack: A cryptographic attack that exploits the probability of collisions in hashing algorithms.
Collision Attack: A cryptographic attack that finds two different inputs producing the same hash output.
Downgrade: An attack that forces a system or protocol to use an older or less secure version, exposing vulnerabilities.
1.3 Application Attack Indicators
Privilege Escalation: The act of gaining higher access privileges on a system than originally intended, often exploited by attackers to perform unauthorized actions.
Cross-Site Scripting (XSS): A web application vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Injection Attacks: Attacks that exploit vulnerabilities in input validation to insert malicious code into applications or databases.
Structured Query Language (SQL): A language used to interact with databases, commonly targeted in injection attacks.
Dynamic-Link Library (DLL): Shared libraries in Windows systems that can be manipulated by attackers to load malicious code.
Lightweight Directory Access Protocol (LDAP): A protocol used to access and modify directory services, often targeted for unauthorized access.
Extensible Markup Language (XML): A markup language commonly used in web services, susceptible to injection and parsing attacks.
Pointer/Object Dereference: An attack that exploits memory pointers or object references to gain unauthorized access to data or execute malicious code.
Directory Traversal: An attack that exploits file path manipulation to access files and directories outside the intended scope.
Buffer Overflow: An attack that overwhelms a program’s buffer, causing it to write data beyond its allocated space and potentially execute arbitrary code.
Race Condition: An issue that occurs when the outcome of a program depends on the timing of events, often exploited to gain unauthorized access.
- Time of Check/Time of Use (TOCTOU): An attack that exploits a time gap between the checking and usage of a resource, leading to unauthorized actions.
Improper Error Handling: A vulnerability where error messages reveal sensitive information, aiding attackers in their exploits.
Improper Input Handling: A vulnerability that arises from inadequate validation and handling of user inputs, leading to exploitation.
Replay Attacks: Attacks where intercepted data is replayed to perform unauthorized actions.
- Session Replay: A specific form of replay attack targeting session data to impersonate a legitimate user.
Integer Overflow: A vulnerability that occurs when an integer value exceeds its maximum limit, leading to unexpected behavior.
Request Forgery: An attack where unauthorized requests are made on behalf of a user without their knowledge.
Server-Side Request Forgery (SSRF): A specific type of request forgery that targets the server’s internal resources.
Cross-Site Request Forgery (CSRF): An attack where a user is tricked into unknowingly submitting requests to a different website.
Application Programming Interface (API) Attacks: Various threats targeting APIs used in web and mobile applications.
Resource Exhaustion: Attacks that aim to overwhelm a system’s resources, causing unavailability to legitimate users.
Memory Leak: A software issue where memory resources are not properly released, leading to performance degradation.
Secure Sockets Layer (SSL) Stripping: An attack that downgrades secure HTTPS connections to unencrypted HTTP, facilitating eavesdropping.
Driver Manipulation: Tampering with device drivers to gain unauthorized access or introduce vulnerabilities.
Shimming: A technique to modify or extend software behavior without altering its original source code.
Refactoring: The process of improving code structure and quality without changing its external behavior.
Pass the Hash: A technique where attackers reuse captured hashed passwords to gain unauthorized access.
1.4 Network Attack Indicators
Wireless:
Evil Twin: A rogue wireless access point that mimics a legitimate network to deceive users.
Rogue Access Point: Unauthorized access point added to a network, potentially for malicious purposes.
Bluesnarfing: Unauthorized access to a Bluetooth-enabled device to steal data.
Bluejacking: Sending unsolicited messages to Bluetooth devices.
Disassociation: Forcing a wireless device to disconnect from a network.
Jamming: Deliberate or unintentional interference to disrupt wireless communications.
Radio Frequency Identification (RFID): Technology using radio waves to identify and track objects.
Near Field Communication (NFC): Enables short-range wireless data exchange between devices.
Initialization Vector (IV): A random value used in encryption algorithms to prevent repetition.
On-path Attack: Intercepting and altering network traffic between two parties.
Layer 2 Attacks: Targeting vulnerabilities in the data link layer of the OSI model.
Address Resolution Protocol (ARP) Poisoning: Manipulating ARP tables to redirect network traffic.
Media Access Control (MAC) Flooding: Overloading a switch’s MAC table to cause a denial of service.
MAC Cloning: Impersonating a device by using its MAC address.
Domain Name System (DNS): Translates domain names into IP addresses.
Domain Hijacking: Unauthorized takeover of a domain name’s administrative control.
DNS Poisoning: Manipulating DNS caches to redirect users to malicious sites.
Universal Resource Locator (URL) Redirection: Redirecting web pages from one URL to another.
Domain Reputation: The trustworthiness and credibility of a domain on the internet.
Distributed Denial-of-Service (DDoS): Overwhelming a target with traffic from multiple sources.
Network-Based DDoS Attacks: Overwhelm a target’s network infrastructure, causing service disruptions using multiple compromised devices or botnets.
Application-Level DDoS Attacks: Target applications and services to exhaust server resources by exploiting vulnerabilities in the application layer, often challenging to detect.
Operational Technology (OT): Specifically disrupt critical industrial systems, exploiting vulnerabilities in software and hardware, potentially using IoT devices to pose safety and operational risks.
Malicious Code and Script Execution: Using harmful code and scripts for unauthorized actions.
PowerShell: A scripting language and shell for Windows automation. (install malware, escalate privileges, or perform reconnaissance on the compromised system.)
Python: A versatile programming language also used for malicious purposes. (creating malicious web scraping scripts, developing ransomware, writing keyloggers).
Bash: The default command-line shell on Unix-based systems. (automate tasks during the exploitation phase, exploit system vulnerabilities or perform actions on compromised systems)
Macros: Sequences of code, including keystrokes and shortcuts, used for automation but also exploited by attackers. (creating macros to automate malicious actions, such as launching unauthorized processes or manipulating system settings).
Visual Basic for Applications (VBA): Scripting language within Microsoft Office, abused by attackers in macros. (developing macros that steal sensitive data, creating macros to launch phishing attacks, using macros to send spam emails and infect other users).
1.5 Threat Actors, Vectors, and Intelligence Sources
- Actors and Threats:
- Advanced Persistent Threats (APTs): Highly sophisticated and persistent cyber threats often associated with nation-state actors targeting specific organizations or countries.
- Insider Threats: Security risks arising from individuals within an organization who misuse their access to cause harm or leak sensitive data.
- State Actors: Threat actors sponsored or supported by governments, engaging in cyber espionage, cyber warfare, or strategic cyber operations.
- Hacktivists: Cyber attackers motivated by political or social causes, using hacking to advocate for their beliefs or disrupt organizations.
- Script Kiddies: Inexperienced hackers who use basic, pre-made tools to conduct low-skilled attacks for fun or recognition.
- Criminal Syndicates: Organized cybercrime groups motivated by financial gain, involved in various cyber attacks and fraud.
- Hackers: Broad term referring to individuals with technical skills who gain unauthorized access to computer systems for different purposes.
- Shadow IT: Use of unapproved software, applications, or services within an organization, potentially introducing security vulnerabilities.
- Competitors: Threat actors attempting to gain a competitive edge by stealing intellectual property or sensitive business information.
- Attributes of Actors:
- Internal/External: Differentiating threat actors based on whether they are employees within the organization (internal) or outside adversaries (external).
- Level of Sophistication/Capability: Assessing the technical expertise and resources of threat actors, ranging from low-skilled to advanced.
- Resources/Funding: Considering the financial backing and technical resources available to threat actors, impacting the scale and complexity of attacks.
- Intent/Motivation: Understanding the underlying objectives driving threat actors, such as financial gain, espionage, or ideological motives.
- Vectors:
- Direct Access: Unauthorized access to systems or data, either physically or remotely, without intermediaries or restrictions.
- Wireless: Exploiting vulnerabilities in wireless networks or devices to gain unauthorized access or intercept communications.
- E-mail: Cyberattacks launched through malicious emails, often involving phishing or malware-laden attachments.
- Supply Chain: Targeting the software or hardware supply chain to compromise products before reaching end-users.
- Social Media: Using social media platforms for cyber attacks or gathering information for social engineering tactics.
- Removable Media: Exploiting vulnerabilities through USB drives or other portable storage devices to introduce malware.
- Cloud: Cyber attacks on cloud-based services, targeting misconfigurations or vulnerabilities in cloud platforms.
- Threat Intelligence Sources:
- Open Source Intelligence (OSINT): Gathering information from publicly available sources like social media and websites.
- Closed/Proprietary: Paid sources of threat intelligence offered by cybersecurity companies, providing exclusive insights.
- Vulnerability Databases: Cataloging known software vulnerabilities, facilitating patch management and risk assessment.
- Public/Private Information Sharing Centers: Collaborative platforms for exchanging cybersecurity threat intelligence among organizations.
- Dark Web: Monitoring illegal activities and discussions on the dark web to identify potential risks and leaked data.
- Indicators of Compromise: Artifacts or evidence of a cyber attack, such as IP addresses and file hashes, aiding detection and response.
- Automated Indicator Sharing (AIS): Automated sharing of threat intelligence in real-time, enabling quick response to emerging threats. * Structured Threat Information Expression (STIX) / Trusted Automated Exchange of Intelligence Information (TAXII): Standards for sharing structured threat intelligence data and facilitating interoperability.
- Predictive Analysis: Using historical data and machine learning to forecast potential cyber threats and vulnerabilities.
- Threat Maps: Visualizing real-time cyber threats and attacks to gain situational awareness on a global scale.
- File/Code Repositories: Analyzing malware samples and malicious code found in code repositories to understand attack techniques.
Research Sources:
- Vendor Websites: Online platforms providing information about products, services, and solutions offered by companies.
- Vulnerability Feeds: Real-time updates on newly discovered security vulnerabilities in software and systems.
- Conferences: Events where experts present their latest research and advancements in various fields, including cybersecurity.
- Academic Journals: Peer-reviewed publications featuring in-depth research articles written by subject matter experts.
- Requests for Comment (RFCs): Formal documents describing internet standards, protocols, and technical specifications.
- Local Industry Groups: Organizations facilitating networking and knowledge sharing within specific industries or regions.
- Threat Feeds: Updates on known and emerging cyber threats, including malware signatures and indicators of compromise.
- Adversary Tactics, Techniques, and Procedures (TTPs): Methods used by threat actors during cyberattacks, aiding in defense strategies.
1.6 Vulnerabilities
Cloud-based vs. On-premises Vulnerabilities: Comparison of security weaknesses in cloud-based environments (off-site data centers) and on-premises setups (local infrastructure), affecting data privacy and access controls.
Zero Day: A newly discovered software vulnerability that is unknown to the vendor, giving attackers a head start for exploitation before a patch is available.
Weak Configurations: Insecure settings in software, networks, or applications, leading to vulnerabilities and unauthorized access.
Open Permissions: Unrestricted access privileges granted to users or systems, making data and resources susceptible to unauthorized changes or leaks.
Unsecure Root Accounts: Vulnerabilities arising from improperly secured administrative accounts, allowing unauthorized access and control over critical systems.
Errors: Security issues caused by mistakes in code, configurations, or operations, enabling exploitation and system compromise.
Weak Encryption: Inadequate encryption methods or key management, exposing sensitive data to unauthorized decryption.
Unsecure Protocols: Use of insecure communication protocols, potentially exposing data to interception or tampering.
Default Settings: Vulnerabilities that arise from leaving software or systems with default configurations, often lacking necessary security measures.
Open Ports and Services: Exposed network ports and services without proper access controls, providing entry points for attackers.
Third-Party Risks: Potential dangers arising from involvement with external entities, such as vendors and suppliers, impacting an organization’s security.
Vendor Management: Risks related to managing and securing relationships with external vendors, whose actions may impact an organization’s security.
System Integration: Challenges and vulnerabilities associated with seamlessly incorporating external vendors’ goods or services into an organization’s existing systems.
Lack of Vendor Support: Risks arising from insufficient technical assistance, updates, or maintenance provided by vendors for their products or services.
Supply Chain: Vulnerabilities stemming from weaknesses in the supply chain, potentially leading to the compromise of products or services.
Outsourced Code Development: Security concerns when relying on external developers to create code or applications, which may contain hidden vulnerabilities.
Data Storage: Risks associated with storing sensitive data, including improper access controls and inadequate encryption.
Improper or Weak Patch Management: Issues arising from the improper or delayed application of software updates, leaving systems exposed to known vulnerabilities.
Firmware: Vulnerabilities within firmware, low-level software integral to hardware devices, which can be exploited to gain unauthorized access.
Operating System (OS): Security weaknesses in the core software that manages computer hardware and software resources.
Applications: Vulnerabilities within software applications that can be exploited to compromise data or systems.
Legacy Platforms: Challenges and risks associated with using outdated technology or software systems that may lack modern security features.
impacts
Data Loss: Unintended loss of digital information, resulting in the inability to access or retrieve data.
Data Breaches: Unauthorized access, disclosure, or theft of sensitive data, potentially leading to financial and reputational damage.
Data Exfiltration: Unauthorized extraction or transfer of sensitive information from an organization’s network to external locations.
Identity Theft: Fraudulent acquisition and use of someone’s personal information for financial gain or criminal purposes.
Financial: Identity theft focused on the misuse of personal information for fraudulent financial activities.
Reputation: Identity theft targeting the victim’s reputation by spreading false and damaging information online.
Availability Loss: Disruption or unavailability of critical systems or services, impacting business operations and customer experience.
1.7 Security Assessments
- Threat Hunting: Proactive search for cyber threats and suspicious activities within an organization’s network to identify and mitigate potential risks.
- Intelligence Fusion: Combining and analyzing multiple sources of threat intelligence to gain a comprehensive understanding of cyber threats and adversaries.
- Threat Feeds: Real-time streams of threat intelligence data containing indicators of compromise (IOCs) and other actionable information.
- Advisories and Bulletins: Official communications from cybersecurity organizations or vendors providing information about known vulnerabilities, threats, and recommended actions.
- Maneuver: Techniques used to adapt and respond to cyber threats during incident response and threat mitigation.
- Vulnerability Scans: Automated assessments of systems and networks to identify potential security weaknesses and vulnerabilities.
- False Positives: Incorrect identification of non-malicious activities or benign files as malicious during security scanning or analysis.
- False Negatives: Failure to detect actual malicious activities or threats during security scanning or analysis.
- Log Reviews: Examining log data to identify security events, anomalies, or indicators of compromise.
- Credentialed vs. Non-Credentialed: Distinguishing between scanning methods that require login credentials for deeper assessment and those that do not.
- Intrusive vs. Non-Intrusive: Differentiating between scanning techniques that actively probe systems and those that do not disrupt normal operations.
- Application: Scanning for vulnerabilities specific to software applications.
- Web Application: Focusing on security assessments for web-based applications and services.
- Network: Assessing vulnerabilities within the network infrastructure and devices.
- Common Vulnerabilities and Exposures (CVE) / Common Vulnerability Scoring System (CVSS): Standardized identifiers for known vulnerabilities and a scoring system to assess their severity.
- Configuration Review: Evaluating system configurations to ensure security best practices are followed.
- Syslog / Security Information and Event Management (SIEM): Collecting and analyzing log data for security event detection and incident response.
- Review Reports: Analyzing SIEM reports to identify security incidents and trends.
- Packet Capture: Capturing and analyzing network traffic to investigate security incidents.
- Data Inputs: Collecting various data sources to feed into SIEM for comprehensive security monitoring.
- User Behavior Analysis: Identifying abnormal user behavior patterns that may indicate security threats or insider threats.
- Sentiment Analysis: Analyzing user-generated content to gauge public sentiment and potential security risks.
- Security Monitoring: Continuous surveillance and analysis of security-related events and activities.
- Log Aggregation: Collecting and storing log data from multiple sources for centralized analysis.
- Log Collectors: Devices or systems responsible for gathering log data from various sources for further processing.
- Security Orchestration, Automation, and Response (SOAR): Integration of security tools and automation to streamline incident response and threat mitigation processes.
1.8 Penetration Testing
- Penetration Testing: Simulated attacks to assess system security.
- Known Environment: Familiar system or network for testing.
- Unknown Environment: Unfamiliar system or network for testing.
- Partially Known Environment: Partially familiar system or network for testing.
- Rules of Engagement: Guidelines for conducting security assessments.
- Lateral Movement: Moving horizontally within a network after breach.
- Privilege Escalation: Gaining higher access rights on a system.
- Persistence: Maintaining access and control after breach.
- Cleanup: Removing traces of a cyberattack.
- Bug Bounty: Rewarding ethical hackers for finding vulnerabilities.
- Pivoting: Using a compromised system to access others.
- Passive and Active Reconnaissance: Gathering info passively or interactively.
- Drones: Unmanned Aerial Vehicles (UAVs) for various applications.
- War Flying: Using drones for aerial war driving (Wi-Fi scanning).
- War Driving: Searching for Wi-Fi networks while driving.
- Footprinting: Gathering info about a target from public sources.
- OSINT: Open Source Intelligence; collecting info from public sources.
- Exercise Types: Various cybersecurity practice scenarios.
- Red Team: Simulating cyber threats to test defenses.
- Blue Team: Defending against simulated cyber attacks.
- White Team: Facilitating and overseeing cybersecurity exercises.
- Purple Team: Combining Red and Blue Teams for collaboration.
Part II Architecture and Design
2.1 Enterprise Security Architecture
Configuration Management: The process of managing and controlling changes to hardware, software, and documentation to maintain system integrity and consistency.
Diagrams: Visual representations of system architecture, processes, or data flows to aid in understanding and communication.
Baseline Configuration: A predefined standard configuration used as a reference point for system changes and comparisons.
Standard Naming Conventions: Consistent and structured rules for naming files, resources, or objects within a system to improve organization and clarity.
Internet Protocol (IP) Schema: A plan or design for assigning IP addresses and subnetting in a network to ensure efficient data routing.
Data Sovereignty: The concept that data is subject to the laws and regulations of the country in which it is stored or processed.
Data Protection: Measures and practices to safeguard sensitive data from unauthorized access, disclosure, or loss.
Data Loss Prevention (DLP): Technologies and strategies to prevent unauthorized data leakage or loss from an organization.
Masking: Concealing sensitive data by replacing it with fictitious or anonymized information while preserving its format.
Encryption: Using algorithms and keys to convert data into unreadable form to protect it from unauthorized access.
At Rest: Data encryption applied to data stored in databases or on storage devices.
In Transit/Motion: Data encryption applied to data transmitted over networks.
In Processing: Data encryption applied to data being actively used or processed by applications.
Tokenization: Replacing sensitive data with randomly generated tokens to enhance security while maintaining functionality.
Rights Management: Enforcing permissions and restrictions on data access and usage to control data handling.
Geographical Considerations: Factors to consider in data management and security, including data sovereignty, cross-border data transfers, and network infrastructure.
Response and Recovery Controls: Strategies and procedures for detecting, responding to, and recovering from cybersecurity incidents.
SSL/TLS Inspection: The practice of decrypting and inspecting encrypted network traffic to detect potential threats.
Hashing: Cryptographic process of converting data into fixed-size, unique hash values for data integrity and verification.
API Considerations: Factors to address when designing and managing Application Programming Interfaces (APIs) to ensure security and usability.
Site Resiliency: Planning and strategies for ensuring business continuity in the event of a disaster or outage.
Hot Sites: Fully operational duplicate data centers ready to take over during a disaster.
Warm Sites: Partially operational secondary facilities with essential infrastructure for disaster recovery.
Cold Sites: Backup facilities lacking operational IT infrastructure, suitable for disaster recovery on a more extended timeline.
Deception and Disruption: Cybersecurity strategies involving the use of decoys and false information to mislead and deter attackers.
Honeypots: Decoy systems designed to attract attackers and gather intelligence on their tactics.
Honeyfiles: Fake files or data used to lure attackers into accessing them.
Honeynets: Networks of honeypots simulating real network environments to study attacker behavior.
Fake Telemetry: Transmitting false information or signals to confuse attackers and disrupt their activities.
DNS Sinkhole: Redirecting malicious traffic to a controlled environment for monitoring and analysis.
2.2 Virtualization and Cloud Security
Cloud Models: Different service models for delivering cloud computing resources and applications to users.
Infrastructure as a Service (IaaS): Cloud service model providing virtualized computing resources over the internet.
Platform as a Service (PaaS): Cloud service model offering a platform and development environment for building and deploying applications.
Software as a Service (SaaS): Cloud service model delivering software applications over the internet on a subscription basis.
Anything as a Service (XaaS): An inclusive term covering various cloud services delivered over the internet.
Level of Control in the Hosting Models: Different levels of control and ownership in cloud deployment models.
Public: Cloud services provided to the general public over the internet.
Community: Cloud services shared among organizations with common interests or requirements.
Private: Cloud infrastructure dedicated to a single organization, hosted on-premises or by a third-party.
Hybrid: Cloud deployment combining public and private cloud environments for data and application sharing.
Cloud Service Providers: Companies offering cloud computing services and resources to users.
Managed Service Provider (MSP) / Managed Security Service Provider (MSSP): Companies providing outsourced management and security services for IT and cloud environments.
On-Premises vs. Off-Premises: Comparison between resources located on-site and resources hosted in remote data centers.
Fog Computing: Extending cloud computing capabilities to the edge of the network, closer to the data source.
Edge Computing: Processing data near the data source or end-users to reduce latency and bandwidth usage.
Thin Client: Computing device dependent on a central server or cloud infrastructure for processing and storage.
Containers: Lightweight, portable units bundling applications and their dependencies for easy deployment and scalability.
Microservices/API: Architecture organizing applications as independent services that communicate via APIs.
Infrastructure as Code: Managing and provisioning IT infrastructure using code, improving automation and consistency.
Software-Defined Networking (SDN): Separating network control and data plane functions for more flexible and dynamic network management.
Software-Defined Visibility (SDV): Not a widely recognized term, possibly related to software-defined approaches for network visibility.
Serverless Architecture: Cloud computing model where cloud providers manage infrastructure, allowing developers to focus on code.
Services Integration: Connecting and combining different services and systems to work together seamlessly.
Resource Policies: Rules and permissions controlling access to cloud resources and data.
Transit Gateway: Networking construct simplifying connectivity between multiple VPCs and networks in cloud environments.
Virtualization: Technology creating virtual versions of computing resources, optimizing resource utilization and flexibility.
Virtual machine (VM):
Virtual Machine (VM) Sprawl Avoidance: Strategies to prevent uncontrolled proliferation of virtual machines in a virtualized environment.
VM Escape Protection: Security measures to prevent unauthorized access to the hypervisor layer from within a virtual machine.
2.3 Secure Application Development, Deployment, and Automation Concepts
Environment: The specific context or setting in which a software application or system operates, such as development, test, staging, or production environments.
Development: The phase of the software development lifecycle where code is written, tested, and debugged to create a new software application or feature.
Test: The phase of the software development lifecycle where the application is thoroughly tested to identify and fix defects before deployment.
Staging: An environment where the software is tested in a production-like setup before being deployed to the actual production environment.
Production: The live and operational environment where the software application is made available to end-users or customers.
Quality Assurance (QA): A systematic process to ensure that the software application meets specified quality standards and requirements, involving testing and defect reporting.
Provisioning and Deprovisioning: The process of granting and revoking user access and resources in an IT environment, respectively.
Integrity Measurement: A security feature that ensures the integrity of software components during the boot-up process to protect against unauthorized modifications.
Secure Coding Techniques: Best practices used during software development to create more robust and secure applications, minimizing vulnerabilities and exploitable weaknesses.
Normalization: A database design technique to organize data into structured and efficient tables, reducing redundancy and ensuring data integrity.
Stored Procedures: Precompiled database code that can be called by applications to perform specific tasks on the database.
Obfuscation/Camouflage: Techniques to make source code difficult to understand or disguise sensitive information, reducing reverse engineering and data exposure risks.
Code Reuse and Dead Code: Reusing trusted code and removing unused code to reduce vulnerabilities and improve software maintainability.
Server-Side vs. Client-Side Execution and Validation: Distinguishing between performing critical operations on the server-side for security and validation and optional tasks on the client-side for user experience.
Memory Management: Managing computer memory to prevent vulnerabilities like buffer overflows and ensure efficient resource utilization.
Use of Third-Party Libraries and Software Development Kits (SDKs): Leveraging external libraries and SDKs to enhance application functionality, requiring careful selection and maintenance.
Data Exposure: Protecting sensitive data from unintended access or exposure.
Open Web Application Security Project (OWASP): A non-profit organization providing resources and guidelines to improve web application security.
Software Diversity: Introducing variability in software components to enhance system resilience against attacks.
Compilers: Tools that translate source code into machine-readable binaries.
Binaries: Executable files generated from source code, containing machine-readable instructions.
Automation/Scripting: Automating tasks or processes using scripts or code to improve efficiency and reduce human errors.
Automated Courses of Action: Predefined automated responses to specific events or conditions, often used in incident response.
Continuous Monitoring: Real-time or near real-time observation and assessment of system security and performance.
Continuous Validation: Continuously verifying and validating software throughout its development lifecycle.
Continuous Integration: Frequently integrating code changes from multiple developers into a shared repository, automatically testing the code.
Continuous Delivery: Automating the deployment of tested and validated code to production or staging environments.
Continuous Deployment: Automatically deploying validated code changes to production without manual intervention.
Elasticity: A system’s ability to automatically scale resources up or down based on demand.
Scalability: A system’s capability to handle increasing workloads and grow in size or capacity.
Version Control: Tracking changes to software code over time using systems like Git, facilitating collaboration and code management.
2.4 Authentication and Authorization
Chapter Review
Authentication Methods: Various techniques used to verify the identity of users, systems, or devices for secure access to resources, including biometrics, smart cards, and passwords.
Directory Services: Systems that centrally manage and store user identities and attributes, such as usernames, passwords, and permissions.
Federation: Establishing trust between identity providers to enable users from one organization to access resources in another without separate accounts.
Attestation: Verifying the integrity and security of a device or platform before granting access to protected resources.
Technologies: Technical approaches and protocols used in authentication, such as encryption, digital certificates, and one-time passwords.
Smart Card Authentication: Using physical cards with embedded chips to securely store digital credentials for user identification.
Biometrics: Using unique physical or behavioral traits, like fingerprints, iris patterns, and voice, for user identification.
Fingerprint: Biometric method analyzing unique patterns on a person’s fingertips for authentication.
Retina: Biometric method scanning the blood vessel patterns at the back of a person’s eye for identification.
Iris: Biometric method analyzing the unique patterns in the colored part of a person’s eye for user verification.
Facial: Biometric method using facial features to verify a user’s identity.
Voice: Biometric method analyzing vocal characteristics to authenticate a user.
Vein: Biometric method using vein patterns, typically on the palm or finger, for identification.
Gait Analysis: Behavioral biometric method analyzing a person’s walking pattern for user identification.
Efficacy Rates: Metrics measuring the accuracy and performance of a biometric system.
False Acceptance: Occurs when a biometric system incorrectly identifies an unauthorized user as authorized.
False Rejection: Occurs when a biometric system incorrectly rejects an authorized user.
Crossover Error Rate: A specific point where the False Acceptance Rate and False Rejection Rate are equal, indicating the balance of a biometric system’s performance.
Multifactor Authentication (MFA) Factors and Attributes: A security process requiring users to provide multiple identification elements (factors) during authentication, including something they know, have, and are.
Factors: The different types of identification elements used in MFA, such as passwords, smart cards, and biometrics.
Attributes: Characteristics associated with each MFA factor, like password policies, unique identifiers, and biometric data.
Authentication, Authorization, and Accounting (AAA): A framework for managing user access, controlling permissions, and tracking user activities in computer systems and networks.
Cloud vs. On-premises Requirements: Contrasting considerations for deploying applications and data in cloud environments versus on-site infrastructure, including scalability, security, and cost management.
2.5 Authentication and Authorization
Redundancy: Having duplicate components or systems in place to provide backup or failover in case of a primary component’s failure.
Geographic Dispersal: Spreading components or data across different physical locations to protect against regional failures or disasters.
Disk: A physical storage device, such as a hard disk drive (HDD) or solid-state drive (SSD), used to store data in a computer or server.
Network: A system of interconnected devices and computers that enables communication and data exchange.
Power: Electrical energy that powers and supplies electricity to devices and infrastructure.
Replication: Creating identical copies of data, applications, or systems for redundancy or backup purposes.
Storage Area Network (SAN): A high-speed network that provides block-level access to storage devices like disk arrays or storage servers.
VM (Virtual Machine): A software emulation of a physical computer that allows multiple operating systems and applications to run on a single machine.
On-premises vs. Cloud: Comparison of hosting IT infrastructure locally (on-premises) or using remote cloud services.
Backup Types: Different methods of creating data backups to protect against data loss.
Full: A complete backup of all data and files in a system at a specific point in time.
Incremental: Capturing only the data that has changed since the last backup.
Snapshot: A point-in-time copy of data used for backup or testing purposes.
Differential: Capturing all data changes since the last full backup.
Tape: Storing backup data on magnetic tape cartridges.
Copy: A duplicate of original data created separately from regular backups.
Network Attached Storage (NAS): Storing backup data on network-attached storage devices.
Cloud: Storing backup data on remote cloud servers provided by third-party vendors.
Image: An exact copy of an entire system, including the operating system and applications.
Online vs. Offline: Performing backups while systems are active (online) or shut down (offline).
Distance Considerations: Taking into account the geographical separation between primary and backup data locations.
Nonpersistence: Changes made to a system or application during its runtime are not preserved after shutdown or restart.
Revert to Known State: Restoring a system to a predefined stable configuration.
Last Known-Good Configuration: Booting a computer using a previously saved functional configuration.
Live Boot Media: Bootable media containing an operating system that runs without installation on a computer.
High Availability: Design principle to ensure continuous system operation and minimal downtime.
Scalability: A system’s ability to handle increased workload or demand effectively.
Restoration Order: Sequence for restoring data and systems after a disruption or disaster.
Diversity: Inclusion of various individuals, perspectives, and cultures to create an inclusive environment.
Technologies: A wide variety of tools, platforms, and solutions used within an organization’s IT infrastructure.
Vendors: Multiple suppliers or service providers engaged to fulfill different business needs.
Crypto (Cryptocurrencies): Diverse digital currencies beyond Bitcoin, each with unique features and uses.
Controls: Various security measures and strategies implemented to protect data and assets from cyber threats.
2.6 Cybersecurity Resilience
Embedded Systems
- Specialized computer systems for dedicated tasks
- Integrated into devices with size, power, and real-time constraints
- Components: hardware, firmware, sensors, actuators
- Found in various domains like consumer electronics, automotive, medical devices
Raspberry Pi
- Credit-card-sized single-board computer
- Promotes computer science education
- Used for prototyping, coding experiments, basic computing
- Affordability, versatility, potential for positive/negative projects
Field Programmable Gate Arrays (FPGAs)
- Versatile digital chips for custom tech doodads
- Moldable even after manufacturing
- Connects tiny building blocks for various functions
- Preferred for inventors and tech explorers
Arduino
- Open-source electronics platform
- Hardware and software for prototyping
- Popular among hobbyists, students, professionals
- Facilitates experimentation with electronics
SCADA / ICS
SCADA
- Real-time monitoring and control of industrial processes
- Involves data collection, HMI, remote control, alarming
- Stores historical data for analysis
ICS
- Encompasses SCADA, PLCs, DCS, sensors, networks, security
- Manages and automates industrial operations
- Ensures reliability and safety in critical processes
Facilities
- Physical locations for operations
- Includes factories, power plants, warehouses
- SCADA and ICS used for efficiency and safety
IoT
- Network of interconnected devices, objects, systems
- Equipped with sensors, processors, connectivity
- Enhances functionality, gathers data, enables communication
Specialized Systems
Medical Systems
- Technology setups in healthcare
- EHR systems, medical imaging, patient monitoring
- Efficiently manage patient data, diagnose conditions
Vehicle Systems
- Technology in automobiles and transportation
- ECUs, infotainment, ADAS for safety
- Integrates IoT and advanced sensors
Aircraft Systems
- Technology setups in aviation
- Avionics, flight control, navigation
- Incorporates IoT and sensors for efficiency
Smart Meters
- Devices measuring and monitoring energy consumption
- Communicate data remotely
- Enhance billing accuracy, real-time monitoring
VoIP
- Voice communication over the internet
- Converts voice signals into data packets
- Cost-effective, flexible for voice and video calls
HVAC
- Heating, Ventilation, Air Conditioning systems
- IoT integration for remote monitoring, control
- Improves comfort, energy efficiency
Drones
- Unmanned aerial vehicles for various purposes
- Equipped with sensors, cameras, IoT technology
- Used in photography, surveillance, search and rescue
MFPs
- Multifunction Printers combine office functionalities
- Printing, scanning, copying, sometimes faxing
- Connect to networks, enable printing from various devices
RTOSs
- Real-time Operating Systems for critical tasks
- Used in industrial automation, automotive control
- Ensure tasks are executed within specific time constraints
Communication Considerations
5G
- Fifth generation wireless communication technology
- Faster data speeds, lower latency, connects many devices
- Powers advanced applications like autonomous vehicles
Narrow-Band Radio
- Radio communication with narrow frequency range
- Low power consumption, transmits small data over long distances
- Suitable for remote monitoring, IoT devices
Baseband Radio
- Original frequency range for data transmission
- Unprocessed digital signal in modern communication
- Modulated for transmission over a carrier frequency
SIM Cards
- Subscriber Identity Module cards in mobile devices
- Identify and authenticate subscribers on a cellular network
- Store phone number, contacts, authentication keys
Zigbee
- Wireless communication for short-range, low-power applications
- Creates mesh networks for extended coverage
- Used in home automation, IoT devices
Constraints
- Power: Limitations on electrical power for devices
- Compute: Processing capabilities limitation in devices or systems
- Network: Limitations in network connectivity for devices
- Cryptographic Functions: Computational resources limitation for encryption and decryption
- Inability to Patch: Situations where devices can’t easily receive software updates
- Authentication: Difficulties in verifying the identity of users or devices
- Range: Distance over which a device can effectively communicate
- Cost: Financial limitations in designing, producing, maintaining devices
- Implied Trust: Assumption of trust in the network or connected devices without verification
2.7 Embedded and Specialized Systems
Bollards/Barricades
- Physical barriers for access control
- Bollards prevent vehicle access
- Barricades are temporary for events or emergencies
Access Control Vestibules
- Enclosed spaces at building entry points
- Enhance security with double doors
- Prevent unauthorized entry, control access
Badges
- ID cards worn for identification
- Display name, photo, role, access
- Identify authorized personnel, restrict access
Alarms
- Audible/visual alerts for security breaches
- Include fire, intrusion, panic alarms
- Ensure immediate response for safety
Signage
- Visual messages conveying information
- Indicate restricted areas, exits, safety procedures
- Guide individuals in facilities
Cameras
- Capture visual information for surveillance
- Essential for monitoring and data collection
- Provide insights into various environments
CCTV
- Surveillance system with cameras and monitors
- Intended for private use
- Limited viewing within a closed system
Industrial Camouflage
- Design and materials to blend structures
- Minimize visual impact in industrial settings
Personnel
- Individuals contributing to organizations
- Involve various roles, responsibilities, tasks
Guards
- Maintain security and surveillance
- Monitor entrances, perform patrols
- Respond to breaches or emergencies
Robot Sentries
- Automated devices with sensors and cameras
- Monitor and secure areas autonomously
- Send alerts to human operators
Reception
- Area where visitors are received and guided
- Receptionists manage tasks for security and hospitality
Two-Person Integrity/Control
- Security practice requiring two individuals
- Perform certain tasks together for accountability
- Prevents unauthorized access to sensitive areas
Locks
- Mechanisms for securing doors, gates, etc.
- Include biometric, electronic, physical, cable locks
- Vary in security levels
USB Data Blocker
- Prevents data exchange via USB ports
- Allows safe charging without data theft
- Useful in public charging stations
Lighting
- Illumination for deterrence and visibility
- Enhances surveillance and reduces accidents
- Key aspect of security measures
Fencing
- Barriers made of metal or wood
- Deter unauthorized entry, enhance security
- Physical boundary for protection
Fire Suppression
- Systems to detect and suppress fires
- Use water, chemicals, gases to control or extinguish
- Minimize damage to property and life
Sensors
- Detect and measure physical properties
- Include motion, noise, proximity, moisture sensors
- Used for security and monitoring
Drones
- Unmanned aerial vehicles for surveillance
- Operated without a human pilot on board
- Monitor large areas and reach difficult locations
Visitor Logs
- Records of individuals entering a location
- Track and manage access
- Provide a record of visits
Faraday Cages
- Enclosures blocking electromagnetic fields
- Prevent unauthorized electromagnetic interference
- Shield electronic equipment
Air Gap
- Physically isolates a computer or network
- No direct connection to external networks
- Prevents cyberattacks or data breaches
Screened Subnet
- Segmented part of a network protected by a firewall
- Isolates sensitive systems, controls traffic
- Provides an additional layer of security
Protected Cable Distribution
- Secure routing and management of cables
- Prevents physical tampering, unauthorized access
- Ensures integrity of data transmissions
Secure Areas
- Designated spaces with enhanced security
- Restrict access to protect sensitive information
- Include vaults, safes, hot and cold aisles
Secure Data Destruction
- Methods to permanently remove sensitive data
- Burning, shredding, pulping, pulverizing, degaussing, purging
- Third-party solutions for compliance with standards
2.8 Physical Security Controls
Fundamental Concepts:
- Digital Signatures:
- Verify authenticity and integrity.
- Unique digital “signature” for content.
- Key Management:
- Key Length:
- Longer lengths enhance security.
- Key Stretching:
- Improves password/key security.
- Salting:
- Adds random value for password security.
- Hashing:
- Converts data to fixed-size hash for integrity.
- Key Length:
- Secure Communication:
- Key Exchange:
- Securely exchange encryption keys.
- Ephemeral Keys:
- Temporary keys for sessions.
- Key Exchange:
- Advanced Cryptographic Methods:
- Elliptic Curve Cryptography (ECC):
- Strong security with short key lengths.
- Perfect Forward Secrecy (PFS):
- Ensures security even if key is compromised.
- Quantum Cryptography:
- Leverages quantum mechanics for secure communication.
- Post-Quantum Era:
- Preparing for quantum computers’ impact.
- Elliptic Curve Cryptography (ECC):
- Modes of Operation:
- Define how block ciphers encrypt data.
- Include Authenticated and Unauthenticated modes.
- Blockchain:
- Distributed, tamper-resistant ledger.
- Secures transactions using cryptographic techniques.
- Cipher Suites:
- Combinations for securing network communications.
- Stream and Block ciphers.
- Symmetric vs. Asymmetric Cryptography:
- Single key for Symmetric; key pair for Asymmetric.
- Other Cryptographic Concepts:
- Lightweight Cryptography, Steganography, Homomorphic Encryption.
Common Use Cases:
- Low-Power Devices, Low-Latency Operations, High-Resiliency Systems:
- Tailored cryptographic techniques for different scenarios.
- Support for:
- Confidentiality, Integrity, Obfuscation, Authentication, Nonrepudiation.
Limitations:
- Challenges:
- Speed, Size, Weak Keys, Time, Longevity, Predictability, Reuse, Entropy.
- Considerations:
- Computational Overhead, Resource vs. Security Constraints, Weak/Deprecated Algorithms.
2.9 Cryptographic Concepts
Protocols
Domain Name System (DNS): Translates domain names into IP addresses.
Domain Name System Security Extensions (DNSSEC): Enhances DNS security by adding protection against attacks and ensuring authentic and reliable DNS data.
Secure Shell (SSH): Provides secure remote access, authentication, encryption, and secure file transfers over networks.
Secure/Multipurpose Internet Mail Extensions (S/MIME): Adds encryption and digital signatures to email messages for confidentiality and authenticity.
Secure Real-time Transport Protocol (SRTP): Securely transmits audio and video over IP networks using encryption and authentication.
Lightweight Directory Access Protocol over SSL (LDAPS): A secure version of LDAP, protecting directory access with SSL/TLS encryption.
File Transfer Protocol, Secure (FTPS): Secure version of FTP, adding encryption using SSL/TLS for secure file transfers.
SSH File Transfer Protocol (SFTP): Securely transfers and manages files using SSH for encryption and authentication.
Simple Network Management Protocol, Version 3 (SNMPv3): Manages network devices securely, addressing security concerns in earlier versions.
Hypertext Transfer Protocol over SSL/TLS (HTTPS): Secures web communication with encryption and authentication using SSL/TLS.
Internet Protocol Security (IPSec): Secures IP network traffic with authentication, encryption, and integrity checks.
Authentication header (AH)/Encapsulating Security Payloads (ESP): AH provides authentication, and ESP adds encryption in IPSec.
Tunnel/transport: Tunnel encrypts the entire packet, while transport encrypts only the payload in IPSec.
Post Office Protocol / Internet Message Access Protocol (POP/IMAP): Protocols for retrieving email; POP downloads emails, while IMAP synchronizes them across devices.
Use Cases
Voice and Video: Securely transmit audio and video content over IP networks using SRTP.
Time Synchronization: Achieve synchronized time across devices using NTP, while considering potential security risks.
E-mail and Web: Use HTTPS for secure web connections and consider S/MIME for securing email.
File Transfer: Securely transfer files using SFTP or FTPS for confidentiality and integrity.
Directory Services: Use secure LDAP or LDAPS for managing directory information and logon data.
Remote Access: Securely access networks and systems remotely using VPN, IPSec, or SSH.
Domain Name Resolution: Ensure secure DNS operations and protect against attacks using DNSSEC.
Routing and Switching: Manage network devices and data with SNMPv3 and prioritize SSH over Telnet.
Network Address Allocation: Manage IP address allocation using SNMPv3, DHCP, and proper design.
Subscription Services: Manage data flows using LDAP and adopt subscription models like SaaS for software access.
Part III Implementation
3.1 Secure Protocols
Protocols
Domain Name System (DNS): Translates domain names into IP addresses.
Domain Name System Security Extensions (DNSSEC): Enhances DNS security by adding protection against attacks and ensuring authentic and reliable DNS data.
Secure Shell (SSH): Provides secure remote access, authentication, encryption, and secure file transfers over networks.
Secure/Multipurpose Internet Mail Extensions (S/MIME): Adds encryption and digital signatures to email messages for confidentiality and authenticity.
Secure Real-time Transport Protocol (SRTP): Securely transmits audio and video over IP networks using encryption and authentication.
Lightweight Directory Access Protocol over SSL (LDAPS): A secure version of LDAP, protecting directory access with SSL/TLS encryption.
File Transfer Protocol, Secure (FTPS): Secure version of FTP, adding encryption using SSL/TLS for secure file transfers.
SSH File Transfer Protocol (SFTP): Securely transfers and manages files using SSH for encryption and authentication.
Simple Network Management Protocol, Version 3 (SNMPv3): Manages network devices securely, addressing security concerns in earlier versions.
Hypertext Transfer Protocol over SSL/TLS (HTTPS): Secures web communication with encryption and authentication using SSL/TLS.
Internet Protocol Security (IPSec): Secures IP network traffic with authentication, encryption, and integrity checks.
Authentication header (AH)/Encapsulating Security Payloads (ESP): AH provides authentication, and ESP adds encryption in IPSec.
Tunnel/transport: Tunnel encrypts the entire packet, while transport encrypts only the payload in IPSec.
Post Office Protocol / Internet Message Access Protocol (POP/IMAP): Protocols for retrieving email; POP downloads emails, while IMAP synchronizes them across devices.
Use Cases
Voice and Video: Securely transmit audio and video content over IP networks using SRTP.
Time Synchronization: Achieve synchronized time across devices using NTP, while considering potential security risks.
E-mail and Web: Use HTTPS for secure web connections and consider S/MIME for securing email.
File Transfer: Securely transfer files using SFTP or FTPS for confidentiality and integrity.
Directory Services: Use secure LDAP or LDAPS for managing directory information and logon data.
Remote Access: Securely access networks and systems remotely using VPN, IPSec, or SSH.
Domain Name Resolution: Ensure secure DNS operations and protect against attacks using DNSSEC.
Routing and Switching: Manage network devices and data with SNMPv3 and prioritize SSH over Telnet.
Network Address Allocation: Manage IP address allocation using SNMPv3, DHCP, and proper design.
Subscription Services: Manage data flows using LDAP and adopt subscription models like SaaS for software access.
3.2 Host and Application Security
Endpoint Protection: A set of security measures aimed at safeguarding endpoints, such as computers and devices, from cyber threats and unauthorized access.
Antivirus: Software designed to detect, prevent, and remove viruses and other malicious software from computer systems and devices.
Anti-Malware: Software that provides protection against a wide range of malicious software, including spyware, adware, and Trojans, in addition to viruses.
Endpoint Detection and Response (EDR): Advanced security tools that monitor endpoints for suspicious activities and potential threats, offering real-time analysis and incident response.
DLP: Data Loss Prevention solutions that monitor data flows to prevent unauthorized access, sharing, or leakage of sensitive information.
Next-Generation Firewall (NGFW): Advanced firewall systems that provide intrusion prevention and deep packet inspection capabilities beyond traditional firewalls.
Host-based Intrusion Detection System (HIDS): Security system that monitors activities on a single host for signs of unauthorized or malicious behavior.
Host-based Intrusion Prevention System (HIPS): Building on HIDS, it actively prevents unauthorized activities on a host by taking immediate actions to block or restrict them.
Host-based Firewall: Software-based firewall that controls incoming and outgoing network traffic on an individual device or endpoint.
Boot integrity
Boot Security/Unified Extensible Firmware Interface (UEFI): Modern firmware interface that supports secure boot mechanisms, preventing unauthorized code execution during startup.
Measured Boot: Security feature that records the integrity measurements of boot components to identify unauthorized alterations.
Boot Attestation: Process of verifying and attesting to the integrity of the secure boot process, generating a trusted report or evidence.
Database
Tokenization: Method for protecting sensitive data by replacing it with unique tokens.
Salting: Security practice in password storage that adds a random value to each password before hashing to prevent quick password cracking.
Hashing: Process of transforming input data into a fixed-length string of characters, commonly used for data integrity and password storage.
Application security
Input Validations: Checks to ensure that data entered by users is correct and safe, preventing various attacks that exploit vulnerabilities in application input fields.
Secure Cookies: Enhance the security of web applications by protecting sensitive information stored in cookies.
Hypertext Transfer Protocol (HTTP) Headers: Play a vital role in enhancing the security of web applications, defining policies and enforcing secure communication.
Code Signing: Process of digitally signing software to verify authenticity and integrity, establishing trust in the source of the code.
Allow List: Enumerates approved elements or actions deemed safe for the application, minimizing potential entry points for malicious inputs or actions.
Block List/Deny List: Identifies disallowed entities or inputs considered potentially harmful for the application, reducing the attack surface.
Secure Coding Practices: Guidelines for writing code that prioritizes security, helping to avoid common vulnerabilities.
Static Code Analysis: Tools that review source code without execution, identifying potential vulnerabilities and code quality issues.
Dynamic Code Analysis: Tools that test applications during runtime, uncovering vulnerabilities that may not be apparent during static analysis.
Fuzzing: Technique that involves bombarding an application with unexpected inputs to identify vulnerabilities or unexpected behavior.
Hardening
Open Ports and Services: Network access points and software functionalities that allow data to pass through a network.
Registry: Windows hierarchical database that stores configuration settings, requiring security measures to prevent unauthorized changes.
Disk Encryption: Protects data at rest by encrypting the entire disk or specific partitions.
OS Hardening: Configuring the operating system to minimize security risks by implementing security controls and patches.
Patch Management: Regularly updating software to address known vulnerabilities and improve security.
Third-Party Updates: Updating third-party software integrated into various systems to maintain a secure environment.
Auto-Update: Mechanisms that enable software to automatically receive security updates.
Self-encrypting drive (SED)/ full-disk encryption (FDE)
- Opal: Standard for self-encrypting drives (SEDs) that provides a consistent method to manage and use hardware-based encryption for data protection.
Hardware Root of Trust: Establishes a secure foundation for a system using trusted hardware components.
Trusted Platform Module (TPM): Hardware-based security module that stores cryptographic keys and ensures the integrity of the system.
Sandboxing: Security mechanism that isolates applications within a controlled environment to limit the impact of malicious code.
3.3 Secure Network Design
- Load Balancing
- Active/Active
- Involves distributing incoming network traffic across multiple servers actively handling requests simultaneously.
- Improves resource utilization, performance, and fault tolerance.
- If one server fails, remaining active servers continue processing requests.
- Active/Passive
- Employs one active server handling traffic while another remains in standby mode.
- Passive server takes over if the active server fails, enhancing high availability.
- Active/Active
- Scheduling
- Load balancers use algorithms to distribute incoming requests among backend servers.
- Algorithms include Round Robin (equally distributing requests), Least Connections (sending traffic to the server with the fewest active connections), and Weighted Round Robin (assigning servers different weights based on capacities).
- Virtual IP
- A Virtual IP is an IP address assigned to a load balancer serving as the entry point for incoming traffic.
- Requests to the Virtual IP are forwarded to appropriate backend servers, simplifying server management.
- Persistence
- Ensures user sessions are directed to the same backend server throughout their interaction with an application.
- Crucial for maintaining application functionality relying on session data, preventing interruptions caused by session switches between servers.
- Network Segmentation
- Virtual Local Area Network (VLAN)
- Logical division of a physical network into isolated networks.
- Enhances network management and security by isolating traffic and grouping devices.
- Screened Subnet (DMZ)
- Network segment between internal and external networks.
- Houses publicly accessible services, adding an extra layer of security.
- Virtual Local Area Network (VLAN)
- East-West Traffic
- Refers to data flowing between servers within the same network segment.
- Proper network segmentation and monitoring are vital to contain potential threats within specific segments.
- Extranet
- A controlled private network allowing specific external entities secure access to certain resources over the internet.
- Provides a secure collaboration platform and maintains confidentiality.
- Intranet
- A private network within an organization enabling employees to share information, collaborate, and access resources.
- Accessible only to authorized personnel, providing a controlled environment for communication and content sharing.
- Zero Trust
- Security philosophy challenging the traditional approach of trusting entities within the network perimeter.
- No user or device is inherently trusted, and access is granted on a “need-to-know” basis.
- Virtual Private Network (VPN)
- Always On
- Ensures devices maintain a secure VPN connection at all times, enhancing security.
- Split Tunnel vs. Full Tunnel
- Split tunneling sends corporate traffic through the VPN, improving performance but exposing to risks.
- Full tunneling routes all traffic through the VPN, enhancing security but potentially affecting internet access speed.
- Remote Access vs. Site-to-Site
- Remote access for individual users; site-to-site for entire networks connecting branch offices to a central location.
- IPSec
- Suite of protocols securing internet communications.
- Provides authentication, data integrity, and encryption for data transmitted between devices.
- SSL/TLS
- Cryptographic protocols securing data transmitted over networks.
- HTML5
- VPNs enabling remote access to internal resources using web browsers without dedicated client software.
- Layer 2 Tunneling Protocol (L2TP)
- Protocol creating VPN tunnels, often with IPSec, for secure data transmission.
- Always On
- DNS (Domain Name System)
- Critical internet protocol translating human-readable domain names into IP addresses.
- Functions as a decentralized database, enabling users to access websites using familiar domain names.
- Network Access Control (NAC)
- Agent and Agentless
- Solutions enforcing security policies by controlling devices’ access to the network.
- Some require agents for monitoring and enforcing policies; agentless relies on network-based mechanisms.
- Agent and Agentless
- Out-of-Band Management
- Involves managing and configuring network devices through a separate, dedicated network connection.
- Critical for maintaining network infrastructure availability and reliability during main network issues or downtime.
- Port Security
- Broadcast Storm Prevention
- Mechanisms preventing broadcast storms by limiting MAC addresses on a port or disabling broadcast frames.
- Bridge Protocol Data Unit (BPDU) Guard
- Feature preventing unauthorized switches from connecting to network ports.
- Loop Prevention
- Mechanisms like the Spanning Tree Protocol preventing network loops.
- Dynamic Host Configuration Protocol (DHCP) Snooping
- Verifies legitimacy of DHCP servers, preventing rogue servers from assigning incorrect IP addresses.
- Media Access Control (MAC) Filtering
- Restricts network access based on MAC addresses, enhancing security.
- Broadcast Storm Prevention
- Network Appliances
- Jump Servers
- Intermediary systems for secure access and management, acting as controlled entry points.
- Proxy Servers
- Intermediaries forwarding requests and responses, providing caching, filtering, and anonymity.
- NIDS/NIPS
- Network-based Intrusion Detection System (NIDS) monitors traffic for malicious activity.
- Network-based Intrusion Prevention System (NIPS) takes immediate action to prevent threats.
- HSM
- Hardware Security Module managing encryption keys and performing cryptographic operations securely.
- TPM (Trusted Platform Module) is another example ensuring system integrity and protecting sensitive information.
- Sensors
- Devices collecting data, such as network traffic, system performance, or security events, providing real-time insights.
- Collectors
- Gather data from various sources, aggregating it for analysis and reporting.
- Aggregators
- Consolidate and process data collected by collectors, providing a unified view of network activity.
- Firewalls
- Security devices monitoring and
- Jump Servers
controlling network traffic based on predefined rules, establishing a barrier between trusted and untrusted networks.
- Access Control List (ACL)
- Defines rules determining permitted or denied network traffic based on specified criteria.
- Used to enforce security policies at various network layers, enhancing control over network access and traffic flow.
- Route Security
- Involves securing routing protocols and configurations to ensure accurate and secure network traffic direction.
- Protects against unauthorized changes that could disrupt network connectivity.
- Quality of Service (QoS)
- Mechanisms prioritizing network traffic based on defined criteria to ensure critical applications receive sufficient bandwidth and low latency.
- Enhances user experience by maintaining optimal performance for essential services.
- Implications of IPv6
- Adoption offers benefits like improved scalability and enhanced security features.
- Introduces challenges related to network configuration, security policy enforcement, and potential compatibility issues with legacy systems.
- Port Spanning/Port Mirroring
- Involves copying network traffic from one port to another for analysis, monitoring, or troubleshooting.
- Port Taps
- Physical devices intercepting and duplicating network traffic for monitoring without latency.
- Useful for detailed network analysis.
- Monitoring Services
- Continuously track network performance, security events, and parameters to identify potential issues or anomalies.
- Provide real-time insights to help administrators respond to incidents and maintain network health.
- File Integrity Monitors (FIM)
- Track changes to files and directories, creating checksums to detect unauthorized modifications.
- Generate alerts to help administrators detect unauthorized changes and potential security breaches.
3.4 Wireless Security
- Cryptographic Protocols
- Wi-Fi Protected Access 2 (WPA2)
- Security protocol for Wi-Fi networks using AES-CCMP encryption.
- Replaced WEP and WPA for enhanced security.
- Vulnerabilities like KRACK exposed potential weaknesses.
- Wi-Fi Protected Access 3 (WPA3)
- Next-gen Wi-Fi security with enhanced mechanisms.
- Introduces Simultaneous Authentication of Equals (SAE) and individualized data encryption.
- Addresses limitations of WPA2 and strengthens resilience to evolving threats.
- Counter Mode/CBC-MAC Protocol (CCMP)
- Encryption protocol in WPA2 ensuring data confidentiality and integrity.
- Combines Counter Mode (CCM) and Cipher Block Chaining Message Authentication Code (CBC-MAC).
- Prevents unauthorized access and tampering.
- Simultaneous Authentication of Equals (SAE)
- Key exchange protocol in WPA3 for a secure handshake.
- Resistant to offline dictionary attacks on weak passwords.
- Enhances security without revealing passwords.
- Wi-Fi Protected Access 2 (WPA2)
- Authentication Protocols
- Extensible Authentication Protocol (EAP)
- Framework enabling various authentication methods in network communication.
- Provides flexibility for token cards, digital certificates, or biometrics.
- Enables secure authentication across different network types.
- Protected Extensible Authentication Protocol (PEAP)
- EAP method adding TLS tunnel for secure authentication.
- Commonly used in enterprises to enhance security for wireless and remote access.
- EAP-FAST
- EAP method for faster authentication with security.
- Combines elements of EAP-TLS and EAP-TTLS.
- Useful in scenarios requiring complex user authentication.
- EAP-TLS
- EAP method using digital certificates for mutual authentication.
- Leverages TLS protocol for strong security.
- EAP-TTLS
- EAP method establishing a secure tunnel for user authentication.
- Allows various authentication mechanisms while protecting the client’s identity.
- IEEE 802.1X
- Standard for port-based network access control.
- Enhances network security by allowing only authorized devices to connect.
- Remote Authentication Dial-in User Service (RADIUS)
- Networking protocol for centralized AAA services.
- Widely used for managing user access to networks like dial-up and Wi-Fi.
- Extensible Authentication Protocol (EAP)
- Methods
- Pre-shared key (PSK) vs. Enterprise vs. Open
- Different Wi-Fi authentication methods.
- PSK requires a password, Enterprise uses complex methods, and Open networks require no authentication.
- WiFi Protected Setup (WPS)
- Network security standard simplifying secure wireless network setup.
- Connects devices to WPA- or WPA2-protected networks without passphrase entry.
- Captive Portals
- Web pages controlling access to public Wi-Fi networks.
- Users log in or agree to terms before accessing the internet.
- Pre-shared key (PSK) vs. Enterprise vs. Open
- Installation Considerations
- Site Surveys
- Assess feasibility by analyzing physical layout, obstacles, and access point placement.
- Heat Maps
- Visualize wireless signal strength for optimizing access point placement.
- WiFi Analyzers
- Tools for monitoring and analyzing Wi-Fi networks.
- Provide information on signal strength, channel congestion, and interference.
- Channel Overlaps
- Multiple access points on the same channel cause interference.
- Avoiding overlaps is crucial for reliable and high-speed wireless connectivity.
- Wireless Access Point (WAP) Placement
- Strategic placement for optimal coverage and performance.
- Considers signal strength, range, and interference.
- Controller and Access Point Security
- Measures to secure Wi-Fi network management and control.
- Includes securing access points, data encryption, and protection against threats.
- Site Surveys
3.5 Secure Mobile Solutions
Connection Methods and Receivers
- Cellular
- Enables wireless communication using cellular networks.
- Utilizes mobile devices like smartphones to connect to cellular towers.
- Supports voice and data transmission over long distances.
- Wi-Fi
- Provides wireless LAN connectivity through radio waves.
- Devices with Wi-Fi capabilities connect to access points or routers.
- Enables access to the internet and local network resources.
- Bluetooth
- Short-range wireless technology for device communication.
- Commonly used for connecting peripherals like headphones and speakers.
- NFC (Near Field Communication)
- Short-range communication for secure data exchange.
- Used in contactless payments and data sharing.
- Infrared (IR)
- Uses infrared light waves for data transmission.
- Commonly used in remote controls and device-to-device data transfer.
- USB (Universal Serial Bus)
- Allows device connection for data transfer and charging.
- Widely used for connecting peripherals and external storage.
- Point-to-Point
- Direct link between two devices for data transmission.
- Excludes other devices or networks.
- Point-to-Multipoint
- One device communicates with multiple devices simultaneously.
- Common in wireless broadcasting or streaming scenarios.
- Global Positioning System (GPS)
- Satellite-based navigation system for location and time information.
- Used for navigation, tracking, and mapping.
- RFID (Radio Frequency Identification)
- Uses electromagnetic fields to identify and track tags on objects.
- Used in inventory management, access control, and payments.
- Cellular
Mobile Device Management (MDM)
- Application Management
- Involves managing applications on mobile devices.
- Includes deployment, updates, and security policy enforcement.
- Content Management
- Controls and distributes content to mobile devices.
- Manages documents, files, and media.
- Remote Wipe
- Erases data on lost or stolen devices remotely.
- Protects sensitive information and prevents unauthorized access.
- Geofencing
- Creates virtual geographic boundaries for triggering actions.
- Triggers notifications or adjusts security settings based on location.
- Geolocation
- Determines a device’s physical location using GPS, Wi-Fi, or cellular data.
- Used for location-based services and tracking.
- Screen Locks
- Requires password, PIN, pattern, or biometric authentication for device access.
- Enhances device security against unauthorized access.
- Push Notification Services
- Delivers real-time alerts and messages to mobile devices.
- Commonly used for communication and updates from apps.
- Passwords and PINs
- Traditional authentication methods for device and app access.
- Biometrics
- Uses unique biological characteristics for user authentication.
- Includes fingerprints, facial scans, or iris patterns.
- Context-Aware Authentication
- Considers factors like location and device type for access control.
- Containerization
- Creates isolated environments for separating personal and work-related data.
- Enhances security and privacy.
- Storage Segmentation
- Divides device storage for personal and business use.
- Keeps sensitive data isolated and secure.
- Full Device Encryption
- Encrypts all data on a device’s storage for protection against unauthorized access.
- Application Management
Mobile Devices
- MicroSD Hardware Security Module (HSM)
- Tamper-resistant hardware for secure storage and cryptographic functions.
- Used for key storage and encryption on mobile devices.
- MDM/Unified Endpoint Management (UEM)
- Centralized platforms for managing mobile devices across an organization.
- Controls device provisioning, security enforcement, and application management.
- Mobile Application Management (MAM)
- Focuses on managing and securing applications on mobile devices.
- Includes app distribution, configuration, and security policies.
- SEAndroid (Security-Enhanced Android)
- Integrates security features into the Android operating system.
- Enforces mandatory access controls for enhanced security.
- MicroSD Hardware Security Module (HSM)
Enforcement and Monitoring
- Third-Party Application Stores
- Platforms for downloading apps not available on official stores.
- Carries security risks due to potential installation of malicious software.
- Rooting/Jailbreaking
- Removes software restrictions for device customization.
- Exposes devices to security risks by bypassing security mechanisms.
- Sideloading
- Installs apps from sources other than official stores.
- Introduces security vulnerabilities without proper verification.
- Custom Firmware
- Replaces the device’s operating system for increased customization.
- May compromise security by lacking important updates.
- Carrier Unlocking
- Allows devices to be used with different carriers.
- Exposes devices to security risks without carrier-specific updates.
- Firmware OTA Updates
- Wireless updates for a device’s firmware or operating system.
- Includes security patches for addressing vulnerabilities.
- Camera Use
- Monitoring to prevent unauthorized access to the device’s camera.
- SMS/Multimedia Message Service (MMS)/RCS
- Monitoring communications for detecting security threats.
- External Media
- Monitoring to prevent malware introduction via USB drives and memory cards.
- USB On-The-Go (USB OTG)
- Monitoring connections to prevent unauthorized data transfers.
- Recording Microphone
- Monitoring to prevent unauthorized audio recording.
- GPS Tagging
- Monitoring to prevent unintentional sharing of location information.
- Wi-Fi Direct/Ad Hoc
- Monitoring connections to prevent unauthorized device access.
- Tethering
- Monitoring usage to prevent unauthorized access to the device’s connection.
- Hotspot
- Monitoring usage to ensure network security and prevent unauthorized access.
- Payment Methods
- Monitoring to prevent unauthorized transactions and protect financial information.
- Third-Party Application Stores
Deployment Models
- Bring Your Own Device (BYOD)
- Allows employees to use personal devices for work tasks.
- Requires careful security management to prevent data breaches.
- Corporate-Owned, Personally Enabled (COPE)
- Organizations provide company-owned devices for work and personal use.
- Offers better security control while accommodating employee preferences.
- Choose Your Own Device (CYOD)
- Employees choose from approved devices provided by the organization.
- Balances flexibility and security by ensuring compliance.
- Corporate-Owned
- Organizations provide devices solely for work purposes.
- Provides full control over device security and management.
- Virtual Desktop Infrastructure (VDI)
- Hosts desktop environments on remote servers for secure access.
- Centralizes data and applications to reduce the risk of data loss.
- Bring Your Own Device (BYOD)
3.6 Implementing Cloud Security
Cloud Security Controls Summary
- High Availability Across Zones
- Ensures continuous operation during hardware failures or outages.
- Achieved by deploying resources across multiple availability zones.
- Redundancy and fault tolerance minimize downtime.
- Resource Policies
- Managed through Identity and Access Management (IAM) systems.
- Defines fine-grained access controls for cloud resources.
- Prevents unauthorized access and ensures the principle of least privilege.
- Secrets Management
- Addresses secure storage and management of sensitive data.
- Protects credentials (passwords, keys, tokens) from unauthorized access.
- Centralized management mitigates the risk of data breaches.
- Integration and Auditing
- Integrates cloud services with auditing and monitoring tools.
- Provides visibility into user activities and system behavior.
- Detects unusual actions, contributing to compliance with regulations.
- Storage
- Involves measures to protect data at rest and in transit.
- Encryption, access controls, and audits ensure data security.
Backup and disaster recovery strategies ensure data availability.
- Permissions
- Manages access permissions using IAM tools.
- Enforces user roles and permissions for specific storage resources.
- Encryption
- Implements robust encryption algorithms for data at rest and in transit.
- Includes key management practices for enhanced data security.
- Replication
- Ensures redundancy and availability by duplicating data.
- Contributes to data durability and high availability.
- High Availability
- Designing storage systems to minimize downtime.
- Utilizes redundant resources, load balancing, and failover mechanisms.
- Network
- Involves setting up firewalls, intrusion detection, prevention systems, and VPNs.
- Security groups and access control lists define traffic flow and rules.
Prevents unauthorized access and protects data in transit.
- Virtual Networks
- Enhances security by creating isolated virtual networks.
- Segregates workloads and reduces the attack surface.
- Public and Private Subnets
- Segments network resources into public and private subnets.
- Controls exposure of services to the internet for enhanced security.
- Segmentation
- Divides a network into isolated segments.
- Limits lateral movement for potential attackers.
- API Inspection and Integration
- Monitors and secures communication through APIs.
- Integrates security measures like authentication and encryption.
- Compute
- Involves strategies like patch management, vulnerability scanning, and trusted images.
- Access controls and user authentication prevent unauthorized access.
Monitoring and incident response identify and mitigate potential threats.
- Security Groups
- Define inbound and outbound traffic rules for instances.
- Configured effectively to control communication and enhance security.
- Dynamic Resource Allocation
- Adjusts computing resources based on demand for optimal performance.
- Monitors resource allocation dynamically to identify security anomalies.
- Instance Awareness
- Involves tracking and managing virtual machines and containers effectively.
- Regular updates and monitoring contribute to a secure computing environment.
- Virtual Private Cloud (VPC) Endpoint
- Enables secure communication between a VPC and supported services.
- Enhances security by reducing exposure to external threats.
- Container Security
- Involves measures for safeguarding containerized applications.
- Includes container image security, runtime protection, and orchestrator security.
Solutions
- Cloud Access Security Broker (CASB)
- Acts as an intermediary between users and cloud services.
- Provides features like data encryption, access controls, and threat detection.
- Application Security
- Focuses on identifying and mitigating vulnerabilities in cloud applications.
- Performs automated scans and protects against attacks like XSS and SQL injection.
- Next-Generation Secure Web Gateway (SWG)
- Protects users and devices from web-based threats.
- Uses URL filtering, malware scanning, and content inspection.
- Firewall Considerations in a Cloud Environment
- Configures firewalls to control traffic between cloud resources and external networks.
Utilizes security groups, network access control lists, and stateful firewalls.
- Cost
- Considers setup costs and ongoing operational expenses.
- Optimizes rule configurations to manage costs while maintaining security.
- Need for Segmentation
- Critical for enhancing firewall effectiveness.
- Divides the network into segments with distinct security controls.
- Open Systems Interconnection (OSI) Layers
- Understanding OSI layers for effective firewall configuration.
- Tailors security controls to specific types of traffic.
- Cloud Access Security Broker (CASB)
Cloud-Native Controls vs. Third-Party Solutions
- Cloud service providers offer native security controls.
- Third-party solutions offer specialized features and customization options.
- Organizations often use a combination for a comprehensive security posture.
3.7 Identity and Account Management Controls
Summary of Identity and Account Management
Identity
- Identity Provider (IdP)
- Trusted source managing user identities and credentials.
- Enables single sign-on (SSO) across multiple applications.
- Utilizes protocols like SAML and OpenID Connect for secure authentication.
- Attributes
- Pieces of information associated with an identity.
- Includes name, email, role, and group memberships.
- Crucial for determining access privileges and authorization levels.
- Certificates
- Digital documents with a public key, identity information, and a digital signature.
- Used for establishing trust in secure communications.
- SSL/TLS certificates encrypt data in transit for confidentiality and integrity.
- Tokens
- Small pieces of data generated during authentication.
- Represent user identity and granted access rights.
- Used in OAuth and OpenID Connect for authentication and authorization.
- SSH Keys
- Cryptographic key pairs for secure communication via SSH.
- Private key on the user’s device, public key on the server.
- More secure than password-based authentication.
- Smart Cards
- Physical devices storing identity credentials and cryptographic keys.
- Often used in two-factor authentication (2FA).
- Microprocessor chip securely stores and processes data.
Account Types
- User Account
- Represents an individual user within a system.
- Associated with a unique identity (username or email).
- Used for authentication and authorization.
- Shared and Generic Accounts/Credentials
- Shared accounts used by multiple users for a single account or system.
- Generic accounts like “admin” or “guest” shared for specific purposes.
- Pose security risks and require careful management.
- Guest Accounts
- Provide temporary access for non-permanent individuals.
- Used for visitors, contractors, or temporary workers.
- Restricted permissions to limit access.
- Service Accounts
- Used by applications, services, or automated processes.
- Access resources and perform tasks on behalf of the system.
- Assigned least privileges necessary for intended functions.
Account Policies
- Password Complexity
- Requires strong passwords with a mix of characters.
- Reduces the risk of easily guessed or cracked passwords.
- Password History
- Prevents users from reusing previous passwords.
- Encourages creating new and unique passwords.
- Password Reuse
- Restricts the reuse of the same password within a specified period.
- Minimizes the risk of users reverting to old passwords.
- Network Location
- Controls access based on the user’s network location.
- Specifies allowed IP addresses or network ranges.
- Geofencing
- Uses geographic boundaries to control access.
- Restricts access to resources within defined geographic regions.
- Geotagging
- Attaches geographic metadata to data or devices.
- Tracks location for auditing and security purposes.
- Geolocation
- Uses real-time location data for access decisions.
- Useful for enforcing access rules based on physical location.
- Time-based Logins
- Specifies time windows for user authentication.
- Enforces access only during authorized working hours.
- Access Policies
- Define resources a user or account can access and actions they can perform.
- Ensures the principle of least privilege.
- Account Permissions
- Specify the level of access a user or account has.
- Includes reading, writing, deleting, and modifying resources.
- Account Audits
- Monitor and log user activities for detection of unusual behavior.
- Identifies security incidents, policy violations, or unauthorized access.
- Impossible Travel Time/Risky Login
- Analyzes login attempts to detect implausible geographic transitions.
- Indicates compromised accounts or unauthorized access.
- Lockout
- Automatically disables an account after a certain number of failed login attempts.
- Prevents brute-force attacks and unauthorized access attempts.
- Disablement
- Ensures proper disablement of accounts for inactive users or departures.
- Prevents exploitation of inactive accounts and maintains security hygiene.
3.8 Implement Authentication and Authorization
Summary of Authentication and Access Control
Authentication Methods
- Password Keys
- Authentication using passwords.
- Requires secure management practices and policies.
- Password Vaults
- Secure repositories for storing and managing passwords.
- Centralized location to reduce password-related vulnerabilities.
- Trusted Platform Module (TPM)
- Hardware component for cryptographic functions and secure storage.
- Enhances security by protecting sensitive information and ensuring secure boot processes.
- Hardware Security Module (HSM)
- Dedicated hardware device for cryptographic key management.
- Provides a high level of security for key operations.
- Knowledge-based Authentication
- Relies on user-specific information for authentication.
- Vulnerable to social engineering attacks.
Authentication Protocols
- Extensible Authentication Protocol (EAP)
- Framework for various authentication methods in wireless networks.
- Offers flexibility while ensuring security.
- Challenge-Handshake Authentication Protocol (CHAP)
- Authentication protocol for point-to-point connections.
- Involves a challenge-response mechanism.
- Password Authentication Protocol (PAP)
- Simple authentication protocol transmitting passwords in clear text.
- Considered insecure and avoided in favor of more secure methods.
- 802.1X
- Network access control standard for authenticating devices.
- Commonly used in Wi-Fi networks to ensure authorized access.
- Remote Authentication Dial-in User Service (RADIUS)
- Protocol for centralized authentication, authorization, and accounting.
- Manages user authentication from a single point.
- Single Sign-On (SSO)
- Allows users to access multiple services with a single set of credentials.
- Eliminates the need for repeated logins.
- Security Assertion Markup Language (SAML)
- XML-based standard for exchanging authentication and authorization data.
- Facilitates single sign-on across different domains.
- Terminal Access Controller Access Control System Plus (TACACS+)
- Protocol for centralized authentication and authorization in network devices.
- Manages access control and user privileges.
- OAuth
- Authorization framework for third-party access to user resources.
- Commonly used for granting access to APIs and services.
- OpenID
- Open standard for single sign-on and identity authentication.
- Enables logging in to multiple websites with a single set of credentials.
- Kerberos
- Network authentication protocol using tickets for identity verification.
- Provides secure authentication in distributed environments.
Access Control Schemes
- Attribute-Based Access Control (ABAC)
- Determines access based on attributes associated with users, resources, and environment.
- Offers fine-grained control and dynamic access decisions.
- Role-Based Access Control (RBAC)
- Assigns access rights based on predefined roles.
- Access granted based on associated permissions.
- Rule-Based Access Control
- Enforces access based on rules defined by system administrators.
- Allows for complex access decisions based on specific conditions.
- Mandatory Access Control (MAC)
- Enforces access based on security labels or classifications.
- Commonly used in highly secure environments for strict data protection.
- Discretionary Access Control (DAC)
- Grants control to the resource owner for determining access.
- Owner decides who can access and their level of access.
- Conditional Access
- Policies determine access based on specific conditions or criteria.
- Allows adaptation of access controls based on dynamic factors.
- Privileged Access Management (PAM)
- Controls and monitors access to privileged accounts and systems.
- Ensures strict security protocols for elevated privileges.
- File System Permissions
- Define who can access and modify files and directories.
- Include read, write, and execute permissions for different user groups.
3.9 Public Key Infrastructure
Summary of Public Key Infrastructure (PKI) Concepts
Key Management
- Key Management
- Involves generating, storing, distributing, and maintaining cryptographic keys.
- Ensures confidentiality, integrity, and availability of encrypted data and digital signatures.
- Includes practices like key generation using strong algorithms, secure key storage, and regular key rotation.
Certificate Authorities (CA) and Components
- Certificate Authority (CA)
- Trusted entity responsible for issuing digital certificates.
- Digitally signs certificates to establish trust and verify their authenticity.
- Intermediate CA
- Subordinate to a root CA in a PKI hierarchy.
- Enhances security by allowing delegation of certificate issuance while keeping the root CA secure.
- Registration Authority (RA)
- Verifies the identity of certificate applicants.
- Performs identity checks and forwards certificate requests to the CA for issuance.
- Certificate Revocation List (CRL)
- Periodically published list by a CA.
- Contains information about revoked certificates to prevent their unauthorized use.
- Certificate Attributes
- Pieces of information associated with a digital certificate.
- Includes details such as the certificate holder’s name, organization, and expiration date.
- Online Certificate Status Protocol (OCSP)
- Protocol for real-time checking of a certificate’s revocation status.
- Provides an alternative to relying solely on periodically published CRLs.
- Certificate Signing Request (CSR)
- Message submitted to a CA by a certificate applicant.
- Includes the applicant’s public key and identifying information for certificate creation.
Certificate Types
- Wildcard Certificates
- SSL/TLS certificates that cover a domain and its subdomains.
- Simplifies certificate management for organizations with multiple subdomains.
- Code-Signing Certificates
- Used to digitally sign software applications and files.
- Verifies the integrity and authenticity of signed applications.
- Self-Signed Certificates
- Certificates signed by their own private keys.
- Typically used for internal testing or development environments.
- Machine/Computer Certificates
- Authenticate and secure communications between devices and servers.
- Installed on servers, routers, and network devices.
- E-mail Certificates (S/MIME)
- Used to secure email communications.
- Enable encryption and digital signing of email content.
- User Certificates
- Issued to individuals for authentication, digital signatures, and secure communications.
- Fundamental for establishing user identity.
- Root Certificates
- Foundational certificates in a PKI hierarchy.
- Self-signed certificates serving as trust anchors for the entire PKI.
- Domain Validation Certificates
- SSL/TLS certificates verifying domain ownership.
- Require minimal validation for encryption in data transmission.
- Extended Validation Certificates
- Provide a higher level of identity verification.
- Display the organization’s name in the browser’s address bar for increased trust.
Certificate Formats
- Distinguished Encoding Rules (DER)
- Binary encoding format for certificates and X.509-related data.
- Efficient for storage and transmission.
- Privacy-Enhanced Mail (PEM)
- Encodes certificates, private keys, and cryptographic data using Base64.
- Widely used for storing and sharing certificates.
- Personal Information Exchange (PFX)
- Format for storing private keys, certificates, and related data in a password-protected file.
- Commonly used in Windows environments.
- CER
- Standard format for storing certificates.
- Contains either DER-encoded or Base64-encoded data.
- P12 (PKCS#12)
- Format for storing private keys, certificates, and related data in a password-protected file.
- Commonly used across various platforms.
- P7B
- Format for storing certificates and chain certificates.
- Does not include private keys and is often used in Windows-based systems.
Concepts
- Online vs. Offline CA
- Online CA is accessible for certificate tasks, while offline CA is disconnected for enhanced security.
- Offline CAs are often used for root CAs to minimize the risk of compromise.
- Stapling
- Certificate stapling improves OCSP checks by including a signed OCSP response with SSL/TLS certificates.
- Enhances efficiency in verifying certificate revocation status.
- Pinning
- Certificate pinning associates a specific public key or certificate with a domain to prevent man-in-the-middle attacks.
- Reduces the risk of accepting fraudulent certificates.
- Trust Model
- Defines how trust is established within a PKI.
- Includes a trust anchor (root certificate) and a chain of trust from root to end-entity certificates.
- Key Escrow
- Involves storing encryption keys with a trusted third party.
- Ensures access to encrypted data in case of key loss, but raises privacy and security concerns.
- Certificate Chaining
- Links multiple certificates to form a chain of trust.
- Each certificate is signed by the next in the chain, establishing trust from the root to end-entity certificates.
Part IV Operations and Incident Response
4.1 Tools/Assess Organizational Security
- Tracert (Windows) / traceroute (Linux/Unix)
- Trace the route taken by packets between a user’s device and a destination server.
- Provides information about each intermediate hop, aiding in diagnosing network connectivity issues.
DNS Query Tools
- Nslookup (Windows) / dig (Linux/Unix)
- Query DNS servers for domain information, including IP addresses and name servers.
- Provides details about DNS-related records for a domain.
IP Configuration Tools
- Ipconfig (Windows) / ifconfig (Linux/Unix)
- View and manage IP configuration settings of a device.
- Displays information about IP addresses, subnet masks, gateways, and network interfaces.
Network Scanning Tools
- Nmap
- Powerful network scanning tool for discovering devices, services, and assessing network security.
- Performs host discovery, port scanning, version detection, and OS fingerprinting.
Network Connectivity Tools
- Ping / Pathping (Windows)
- Ping measures round-trip time for packets, while pathping traces the route and measures latency at each hop.
- Diagnose network connectivity and latency issues.
- Hping
- Command-line packet crafting and network scanning tool.
- Allows users to send custom packets to target hosts, aiding in network analysis and testing.
Network Information Tools
- Netstat
- Displays active network connections, listening ports, and other network-related statistics.
- Helps diagnose network problems and monitor network activity.
- Netcat
- Versatile networking utility for establishing connections, transferring data, and port scanning.
- Used for network troubleshooting and testing.
IP Scanning Tools
- IP Scanners (e.g., Angry IP Scanner, Advanced IP Scanner)
- Scan a range of IP addresses to identify active devices on a network.
- Helps administrators manage network inventory.
- ARP (Address Resolution Protocol)
- Resolves IP addresses to MAC addresses on a local network.
- Displays and manipulates the ARP cache, showing associations between IPs and MACs.
Routing Tools
- Route
- Displays and configures routing tables on a device.
- Shows the paths packets take to reach specific destinations.
Web-related Tools
- Curl
- Command-line tool for transferring data using various protocols, including HTTP, HTTPS, and FTP.
- Used for fetching web pages, testing APIs, and performing network-related tasks.
- TheHarvester
- Tool for passive information gathering, collecting data from public sources.
- Gathers information about a target organization from search engines and social media.
- Sn1per
- Automated tool for reconnaissance and vulnerability scanning.
- Identifies potential security issues, performs port scanning, and gathers information about target systems.
- Scanless
- Web-based tool for performing port scans without using own network resources.
- Leverages external scanning services to scan target IP addresses.
- Dnsenum
- DNS enumeration tool to gather information about a domain’s DNS records.
- Identifies subdomains, performs zone transfers, and helps discover potential security risks.
Vulnerability Scanning and Analysis Tools
- Nessus
- Widely used vulnerability scanner identifying security vulnerabilities and misconfigurations.
- Provides detailed reports and remediation recommendations.
- Cuckoo
- Open-source sandbox for analyzing suspicious files and URLs.
- Runs files in an isolated environment to detect and analyze potential malware behavior.
File Manipulation Tools
- Head / Tail
- “Head” displays the beginning, while “Tail” displays the end of a text file.
- Useful for quickly inspecting large files or monitoring log files in real-time.
- Cat
- Concatenates and displays the contents of text files.
- Used for processing and manipulating text.
- Grep
- Searches patterns within text files using regular expressions.
- Flexible for finding specific strings or data in files.
- Chmod
- Modifies file permissions in Unix-like operating systems.
- Specifies read, write, and execute permissions for the owner, group, and others.
- Logger
- Adds messages to system logs, useful for creating custom log entries or tracking events.
- Often used in shell scripts to provide information about script progress.
Shell and Script Environments
- SSH (Secure Shell)
- Protocol for securely connecting to remote systems over an encrypted network.
- Enables execution of commands on remote systems and secure file transfers.
- PowerShell
- Command-line shell and scripting language by Microsoft for Windows environments.
- Automates administrative tasks and manages Windows systems.
- Python
- Popular and versatile programming language used for scripting, web development, and data analysis.
- Known for its readability and simplicity.
- OpenSSL
- Open-source library providing cryptographic functions and protocols, including SSL and TLS.
- Manages certificates, private keys, and cryptographic operations.
Packet Capture and Replay Tools
- Tcpreplay
- Tool for replaying network packet captures, useful for testing and analysis.
- Simulates network traffic patterns for evaluating network responses.
- Tcpdump
- Command-line packet analyzer capturing and displaying network packets in real-time.
- Diagnoses network issues and monitors network traffic.
- Wireshark
- Graphical packet capture and analysis tool providing a detailed view of network traffic.
- Used for network troubleshooting, protocol analysis, and security assessment.
Forensics Tools
- dd (Data Duplicator)
- Versatile tool for copying and converting data, creating disk images, and cloning drives.
- Useful for forensic tasks requiring bit-level copying of data.
- Memdump
- Captures the contents of a computer’s memory at a specific point in time.
- Essential for analyzing memory-related issues and forensic investigations.
- WinHex
- Hexadecimal editor and disk editor for analyzing and manipulating binary data.
- Used in digital forensics for examining data at the bit level.
- FTK Imager
- Tool for creating forensic images of storage media, preserving original data for analysis.
- Captures a bit-by-bit copy of storage devices.
- Autopsy
- Open-source digital forensics platform for analyzing and investigating digital evidence.
- Provides modules for data recovery, file analysis, keyword searching, and timeline generation.
Exploitation Frameworks
- Metasploit
- Comprehensive exploitation framework with exploits, payloads, and post-exploitation modules.
- Assists in identifying vulnerabilities, exploiting systems, and assessing potential attack impacts.
- BeEF (Browser Exploitation Framework)
- Framework focused on exploiting web browser vulnerabilities.
- Used for testing and demonstrating the impact of browser-based exploits.
Password Crackers
- Password Crackers
- Tools for recovering passwords from encrypted data or password hashes.
- Utilize methods such as brute force, dictionary attacks, and rainbow tables for password recovery.
Data Sanitization Tools
- Shred (Unix/Linux) / Sdelete (Windows)
- Overwrite data with random patterns or zeros to prevent data recovery.
- Essential for securely disposing of storage devices or transferring ownership.
4.2 Incident Response Policies, Processes, and Procedures
Incident Response Plans and Frameworks
Incident Response Process
- Preparation:
- Establish incident response policies, procedures, and a dedicated team.
- Define roles, responsibilities, and communication channels.
- Identify critical assets and potential threats.
- Identification:
- Detect and recognize potential security incidents.
- Monitor systems, analyze logs, and use intrusion detection systems.
- Identify unusual or suspicious activities.
- Containment:
- Prevent the incident from spreading and causing further damage.
- Isolate affected systems and disconnect from the network.
- Take immediate steps to limit the attacker’s access.
- Eradication:
- Identify the root cause of the incident.
- Take actions to remove the threat completely.
- Remove malware, close vulnerabilities, and eliminate backdoors.
- Recovery:
- Restore systems to normal operation.
- Restore data from backups.
- Ensure systems are secure, and validate that services are functioning correctly.
- Lessons Learned:
- Conduct a post-incident review.
- Analyze the incident response process.
- Evaluate what worked well and what could be improved.
Exercises
- Tabletop:
- Simulate a security incident scenario through discussions with key stakeholders.
- Discuss roles, response strategies, and decision-making processes.
- Walkthroughs:
- Review the incident response plan step by step.
- Identify potential gaps and areas for improvement.
- Simulations:
- Carry out a realistic incident scenario in a controlled environment.
- Simulate attacks, responses, and coordination among team members.
Attack Frameworks
- MITRE ATT&CK:
- Comprehensive framework outlining tactics, techniques, and procedures used by adversaries.
- Helps categorize threat behaviors to improve incident response.
- Diamond Model of Intrusion Analysis:
- Analytical framework involving Adversary, Infrastructure, Victim, and Capability.
- Aids in understanding the context of a cyber attack.
- Cyber Kill Chain:
- Model breaking down a cyber attack into seven stages.
- Includes Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives.
Stakeholder Management
- Stakeholder Management:
- Identify and engage relevant individuals and groups during an incident.
- Communicate with executives, legal teams, public relations, customers, and law enforcement.
Communication and Recovery Plans
- Communication Plan:
- Outline how information will be shared during and after an incident.
- Define communication channels, responsibilities, and messaging strategies.
- Disaster Recovery Plan:
- Focus on restoring IT systems and infrastructure after a major incident or outage.
- Outline procedures for recovering data, applications, and services.
- Business Continuity Plan:
- Ensure essential business functions can continue during and after a disruptive incident.
- Include strategies for maintaining operations, communication, and services.
- Continuity of Operation Planning (COOP):
- Plan for the continuation of critical operations during and after incidents.
- Include strategies for remote work, alternate facilities, and maintaining essential services.
Incident Response Team and Policies
- Incident Response Team:
- Comprises individuals responsible for managing and responding to security incidents.
- Roles may include incident commander, technical analysts, communication specialists, and legal advisors.
- Retention Policies:
- Define how long incident-related data and records are retained.
- Ensure preservation of relevant information for analysis, reporting, and compliance.
4.3 Investigations
SIEM Dashboards and Log Files
SIEM Dashboards
- Sensor:
- Collects data from network devices, servers, and applications.
- Integral component of a SIEM system for comprehensive data aggregation.
- Sensitivity:
- Assigns criticality levels to security events.
- Helps prioritize response efforts based on event importance.
- Trends:
- Displays patterns and anomalies in security events over time.
- Aids in proactive incident response by identifying evolving threats.
- Alerts:
- Generated by SIEM systems when specific security events occur.
- Monitored by analysts for prompt threat detection and response.
- Correlation:
- Links related security events from different sources.
- Provides a holistic view of incidents, aiding in understanding the attack chain.
Log Files
- Network:
- Records network traffic, connections, and communication patterns.
- Identifies unauthorized access attempts and abnormal network behavior.
- System:
- Logs activities on a system, including logins and configuration changes.
- Aids in identifying anomalies, malware infections, and unauthorized access.
- Application:
- Documents activities within specific applications.
- Useful for identifying vulnerabilities, errors, and abnormal usage patterns.
- Security:
- Focuses on security-related events, such as authentication attempts.
- Provides insights into potential security breaches.
- Web:
- Captures web traffic details, URLs accessed, and user interactions.
- Assists in investigating web-based attacks and unauthorized access.
- DNS:
- Records DNS queries and responses.
- Identifies domain-related threats, such as domain hijacking.
- Authentication:
- Tracks user authentication and authorization activities.
- Detects unauthorized access attempts and brute-force attacks.
- Dump Files:
- Contains memory snapshots or core dumps from crashed programs.
- Analyzed to identify vulnerabilities and potential exploits.
- VoIP and Call Managers:
- Provides information about voice calls and session details in VoIP systems.
- Helps diagnose VoIP-related issues and potential attacks.
- SIP Traffic:
- Records communication sessions in SIP-based applications.
- Aids in analyzing communication patterns and vulnerabilities.
Log Management Tools
- Syslog/Rsyslog/Syslog-ng:
- Protocols and software for collecting and forwarding log messages.
- Centralize log data for easier analysis.
- Journalctl:
- Command-line utility for querying and viewing logs from the systemd journal.
- Provides information about system events, services, and kernel messages.
- NXLog:
- Log management tool to collect, process, and forward log messages to central repositories.
- Integrates with SIEM systems for comprehensive log analysis.
Monitoring Tools
- Bandwidth Monitors:
- Track network traffic volume and patterns.
- Detect unusual spikes indicating security incidents or attacks.
- Metadata:
- Data providing information about other data.
- Includes e-mail, mobile, web, and file metadata for context in investigations.
- NetFlow/sFlow:
- Network traffic monitoring technologies.
- Collect and analyze flow data for insights into communication patterns.
- IPFIX:
- Standardizes flow data export formats in NetFlow.
- Common way to export network traffic data for analysis.
- Protocol Analyzer Output:
- Output from tools like Wireshark capturing and analyzing packet-level network traffic.
- Assists in understanding communication patterns and detecting potential attacks.
4.4 Mitigation Techniques and Controls
Reconfigured Endpoint Security Solutions and Configuration Changes
Endpoint Security Solutions
- Application Approved List:
- Defines allowed applications on endpoints.
- Prevents unauthorized or malicious software execution.
- Enhances security by permitting only trusted applications.
- Application Blocklist/Deny List:
- Identifies prohibited applications.
- Prevents known malicious or vulnerable applications from running.
- Mitigates security risks associated with specific software.
- Quarantine:
- Involves isolating compromised endpoints from the network.
- Automatic quarantine triggered on suspicious activity detection.
- Prevents the spread of threats and protects the network.
Configuration Changes
- Firewall Rules:
- Configures network firewalls to control traffic.
- Blocks unauthorized network access.
- Enhances network security by managing data flow.
- MDM (Mobile Device Management):
- Remotely manages and configures mobile devices.
- Enforces security policies and restricts device capabilities.
- Ensures compliance with organizational standards.
- DLP (Data Loss Prevention):
- Sets up policies to monitor and control sensitive data movement.
- Prevents data leaks by blocking unauthorized transfers.
- Notifies administrators of policy violations.
- Content Filter/URL Filter:
- Restricts access to specific websites or content categories.
- Prevents users from accessing malicious or inappropriate content.
- Enhances web security by controlling user access.
- Update or Revoke Certificates:
- Involves updating or revoking digital certificates.
- Ensures only authorized entities establish secure connections.
- Strengthens authentication and encryption mechanisms.
Security Measures
- Isolation:
- Separates compromised systems from the network.
- Prevents threats from spreading.
- Provides time for security assessment and mitigation.
- Containment:
- Limits the impact of a security incident.
- Involves isolating affected systems and suspending suspicious activities.
- Prevents further harm while responding to the incident.
- Segmentation:
- Divides the network into smaller segments or zones.
- Configures security controls to limit lateral movement.
- Contains the impact of security incidents and improves overall network security.
Secure Orchestration, Automation, and Response (SOAR)
- SOAR Overview:
- Cybersecurity solution for streamlined security operations.
- Integrates with security tools to collect data and automate tasks.
- Coordinates incident response for efficient management.
- Runbooks:
- Predefined procedures guiding incident responders.
- Automates specific actions for faster response.
- Enhances efficiency in incident response processes.
- Playbooks:
- Advanced automation combining multiple steps and decision points.
- Orchestrates complex incident response actions.
- Improves overall incident response speed and effectiveness.
4.5 Digital Forensics
Documentation/Evidence
- Legal Hold:
- Ensures preservation of relevant data in anticipation of litigation or investigations.
- Video Evidence:
- Recordings from surveillance cameras provide visual context for incidents.
- Admissibility:
- Criteria for evidence to be considered valid and relevant in legal proceedings.
- Chain of Custody:
- Documented history of evidence handling, demonstrating integrity and authenticity.
- Timelines of Sequence of Events:
Visualization of incident sequences for a clear understanding.
- Time Stamps:
- Represent the exact time of events for chronology establishment.
- Time Offset:
- Accounts for time differences between events in various systems.
- Tags:
- Metadata addition for organization and efficient retrieval of evidence.
- Reports:
- Document investigation findings, methodologies, and conclusions.
- Event Logs:
- Records system and application activities for analysis.
- Interviews:
- Gathering firsthand accounts and insights from relevant individuals.
Acquisition
- Order of Volatility:
- Guides the sequence of digital evidence collection to prevent data loss.
- Disk:
- Copying entire storage device contents for investigating file systems and user activities.
- Random-Access Memory (RAM):
- Collecting data from RAM for insights into running processes and network connections.
- Swap/Pagefile:
- Analyzing virtual memory files for fragments of sensitive information.
- Operating System (OS):
- Uncovering configuration settings, user profiles, and system logs.
- Device:
- Collecting data from smartphones and tablets for mobile forensics.
- Firmware:
- Analyzing embedded software in devices for vulnerabilities.
- Snapshot:
- Capturing the current state of virtual machines for analysis.
- Cache:
- Analyzing cache data for insights into user activities.
- Network:
- Capturing and analyzing network traffic for reconstructing communication patterns.
- Artifacts:
- Investigating remnants of user activities stored on a system.
On-premises vs. Cloud
- Right to Audit Clauses:
- Granting the right to examine cloud service providers’ security practices.
- Regulatory/Jurisdiction:
- Considerations of regulatory requirements and jurisdictional laws.
- Data Breach Notification Laws:
- Mandates informing affected parties about data breaches.
Integrity
- Hashing:
- Generating fixed-size strings (hash) for data integrity verification.
- Checksums:
- Numeric values for data integrity verification.
- Provenance:
- Origin and history of data for authenticity verification.
Preservation
- Preservation:
- Ensuring collected evidence remains unchanged throughout the investigation.
E-Discovery
- E-Discovery:
- Identifying, collecting, and producing electronically stored information (ESI) as evidence.
Data Recovery
- Data Recovery:
- Techniques to retrieve lost or deleted data from storage devices.
Nonrepudiation
- Nonrepudiation:
- Preventing denial of involvement in a message or transaction.
Strategic Intelligence/Counterintelligence
- Strategic Intelligence/Counterintelligence:
- Gathering information for informed decisions and protecting against unauthorized access.
Part V Governance, Risk, and Compliance
5.1 Security Controls
Managerial Controls
- Security Policies:
- Define overall security strategy, responsibilities, and objectives.
- Risk Assessments:
- Evaluate potential risks and vulnerabilities to inform security decisions.
- Security Awareness Training:
- Educate employees and stakeholders about security best practices and policies.
- Security Governance:
- Establish frameworks and structures for managing and overseeing security.
Operational Controls
- Access Management:
- Implement practices to control and monitor user access to systems and data.
- Security Monitoring:
- Continuously observe systems for security events and anomalies.
- Incident Response:
- Develop and execute plans for responding to security incidents.
- Change Management:
- Control and document changes to systems and configurations to maintain security.
Technical Controls
- Firewalls:
- Enforce network security policies by monitoring and controlling incoming and outgoing traffic.
- Encryption:
- Protect sensitive data by converting it into unreadable code.
- Access Control Mechanisms:
- Restrict and manage user access to systems and resources.
- Intrusion Detection Systems (IDS):
- Monitor and analyze network or system activities for signs of malicious activities.
- Antivirus Software:
- Detect, prevent, and remove malicious software (malware) from systems.
Control Types
- Preventative Controls:
- Measures to stop security incidents, such as access restrictions and authentication mechanisms.
- Detective Controls:
- Activities like log monitoring and intrusion detection systems to identify security incidents.
- Corrective Controls:
- Actions taken in response to identified security incidents, like patching vulnerabilities.
- Deterrent Controls:
- Discourage attackers by making the target less appealing or more challenging.
- Compensating Controls:
- Provide alternative safeguards when primary controls cannot be implemented.
Physical Controls
- Locks:
- Physical mechanisms to secure doors, cabinets, and other access points.
- Access Cards:
- Provide secure access to physical facilities using card-based systems.
- Biometric Authentication:
- Use biological characteristics for identity verification.
- Surveillance Systems:
- Monitor and record activities in physical spaces for security purposes.
5.2 Regulations, Standards, and Frameworks
General Data Protection Regulation (GDPR)
- GDPR:
- Enforceable EU regulation since 2018, protecting privacy and personal data of EU citizens.
- Sets rules for collecting, processing, and storing personal data, giving individuals control.
National, Territory, or State Laws
- National, Territory, or State Laws:
- Varying laws on data protection, cybersecurity, and privacy.
- Can include data breach notifications and consumer privacy rights.
Payment Card Industry Data Security Standard (PCI DSS)
- PCI DSS:
- Security standards ensuring secure handling of credit card information.
- Crucial for businesses handling payment card transactions to prevent data breaches.
Key Frameworks
Center for Internet Security (CIS)
- CIS:
- Best practices for securing IT systems and data.
- CIS Controls offer a prioritized approach to cybersecurity.
National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) / Cybersecurity Framework (CSF)
- NIST RMF / CSF:
- RMF for managing and mitigating information security risks.
- CSF offers guidelines, standards, and best practices for improving cybersecurity posture.
International Organization for Standardization (ISO) 27001/27002/27701/31000
- ISO 27001/27002/27701/31000:
- ISO 27001 for information security management system.
- ISO 27002 provides guidance on controls.
- ISO 27701 extends to privacy management.
- ISO 31000 focuses on risk management.
SSAE SOC 2 Type I/II
- SSAE SOC 2 Type I/II:
- Type I assesses control design at a specific time.
- Type II assesses operational effectiveness over time.
Cloud Security Alliance - Cloud Control Matrix - Reference Architecture
- Cloud Security Alliance - CCM - Reference Architecture:
- Guidelines for securing cloud computing environments.
- CCM assesses cloud service security, and reference architectures offer blueprints.
Benchmarks/Secure Configuration Guides
Platform/Vendor-Specific Guides
- Web Server:
- Guides for securing web servers (e.g., Apache, Nginx, Microsoft IIS).
- Prevents unauthorized access and data breaches.
- OS (Operating System):
- Best practices for securing operating systems (e.g., Windows, Linux, macOS).
- Mitigates vulnerabilities and unauthorized access.
- Application Server:
- Focuses on securing application servers (e.g., Java EE, .NET).
- Ensures confidentiality, integrity, and availability of hosted applications.
- Network Infrastructure Devices:
- Security guides for routers, switches, firewalls.
- Recommendations for configuration to protect the network from threats.
5.3 Organizational Policies
Personnel
- Acceptable Use Policy (AUP):
- Guidelines on acceptable and unacceptable behaviors with IT resources to prevent misuse and security breaches.
- Job Rotation:
- Systematic movement of employees through different roles to prevent fraud and ensure a separation of duties.
- Mandatory Vacation Policies:
- Mandate for employees to take regular time off to uncover potential fraudulent activities.
- Separation of Duties:
- Distributing responsibilities to avoid conflicts of interest and mitigate the risk of fraud.
- Least Privilege Principle:
- Granting employees only necessary permissions to reduce the risk of unauthorized access.
- Clean Desk Policy:
- Requires employees to keep work areas free from sensitive information to prevent unauthorized access.
- Background Checks:
- Screening potential employees to verify qualifications, criminal history, and suitability.
- Nondisclosure Agreement (NDA):
- Legally binding document outlining confidentiality obligations regarding sensitive company information.
- Social Media Analysis:
- Monitoring employees’ online activities to mitigate risks associated with online behavior.
- Onboarding Policies:
- Ensuring new employees receive proper training, information, and resources for integration.
- Offboarding Policies:
- Governing the process of transitioning employees out of the organization to prevent security risks.
- User Training Policies:
- Mandating regular cybersecurity awareness and training programs for employees.
Third-Party Risk Management
- Vendor Risk Management:
- Assessment and management of security risks associated with third-party vendors.
- Supply Chain Risk Management:
- Extends risk assessment to partners involved in the production and distribution of goods and services.
- Business Partner Risk Management:
- Evaluating the security risks associated with organizations having business relationships with the company.
- Service Level Agreement (SLA):
- Outlines terms and conditions of a service provided by a third party for accountability and transparency.
- Memorandum of Understanding (MOU):
- Delineates terms of cooperation between organizations, including collaborative cybersecurity efforts.
- Measurement Systems Analysis (MSA):
- Defines methods and criteria for measuring and assessing risks consistently and accurately.
- Business Partnership Agreement (BPA):
- Outlines responsibilities, terms, and expectations of a business partnership, including cybersecurity considerations.
- End of Life (EOL) Policies:
- Addresses the retirement of products and technologies to prevent security risks.
- End of Service Life (EOSL) Policies:
- Specifies the end of service for products or technologies, ensuring awareness of security implications.
- NDA Agreements with Third Parties:
- Outlines confidentiality requirements for sensitive information shared during collaboration with external entities.
Data
- Data Classification Policies:
- Define how different types of data should be labeled and protected based on sensitivity levels.
- Data Governance Policies:
- Establish processes and responsibilities for managing and protecting data throughout its lifecycle.
- Data Retention Policies:
- Outline how long different types of data should be retained and methods for secure disposal.
Credential Policies
- Personnel Credential Policies:
- Define rules for creating and managing user accounts, passwords, and access rights.
- Third-Party Credential Policies:
- Outline how external entities should manage access credentials when interacting with the organization’s systems.
- Device Credential Policies:
- Define security measures for managing access credentials on devices, ensuring secure access.
- Service Account Credential Policies:
- Specify how service accounts used by applications and systems should be managed.
- Administrator/Root Credential Policies:
- Define security controls for managing superuser accounts with elevated privileges.
Organizational Policies
- Change Management Policies:
- Define the process for introducing and managing changes to IT systems and infrastructure.
- Change Control Policies:
- Outline procedures and controls for reviewing, approving, and implementing changes to systems and processes.
- Asset Management Policies:
- Define how the organization tracks and manages its hardware, software, and data assets throughout their lifecycle.
5.4 Risk Management
Risk Management
Risk Types
- External:
- Originates from outside the organization, e.g., cyberattacks, natural disasters, economic changes.
- Internal:
- Arises from within the organization, e.g., employee misconduct, data breaches due to negligence.
- Legacy Systems:
- Stem from outdated technologies lacking modern security features and updates.
- Multiparty:
- Emerges from complex relationships involving multiple organizations, vendors, and partners.
- IP Theft:
- Involves unauthorized access or theft of valuable proprietary information.
- Software Compliance/Licensing:
- Arises from non-compliance with software usage terms, licensing agreements, and intellectual property rights.
Risk Management Strategies
- Acceptance:
- Acknowledging a potential risk without specific mitigation actions due to low likelihood or acceptable impact.
- Avoidance:
- Steering clear of activities or situations leading to potential risks, effectively eliminating associated threats.
- Transference:
- Transferring risk and potential consequences to another entity through insurance policies or outsourcing.
- Mitigation:
- Reducing the likelihood or impact of a risk through controls, safeguards, and preventive measures.
Risk Analysis
- Risk Register:
- Document cataloging identified risks, descriptions, impacts, likelihoods, and mitigation strategies.
- Risk Matrix/Heat Map:
- Visual representation of risks based on likelihood and impact for prioritizing mitigation efforts.
- Risk Control Assessment:
- Evaluates effectiveness of existing controls in managing identified risks and suggests improvements.
- Risk Control Self-Assessment:
- Employees evaluate effectiveness of controls within their areas of responsibility.
- Risk Awareness:
- Promoting risk awareness among employees to create a culture of vigilance and responsibility.
- Inherent Risk:
- Level of risk an organization faces before implementing any risk management measures.
- Residual Risk:
- Remaining risk after implementing risk management strategies, despite mitigation efforts.
- Control Risk:
- Risk arising from deficiencies in the design or operation of internal controls.
- Risk Appetite:
- Level of risk an organization is willing to tolerate to achieve objectives while maintaining reputation and financial stability.
- Regulations That Affect Risk Posture:
- Compliance with industry regulations and legal requirements affecting risk posture and strategies.
- Risk Assessment Types:
- Various types (qualitative, quantitative, hybrid) for effective evaluation and management.
- Likelihood of Occurrence:
- Assessment of how likely a risk event is to happen based on historical data, expert judgment, or statistical analysis.
- Impact:
- Measurement of potential consequences of a risk event, including financial, operational, and reputational implications.
- Asset Value:
- Assignment of monetary value to assets for calculating potential losses from risk events.
- Single-Loss Expectancy (SLE):
- Estimated financial loss from a single occurrence of a risk event.
- Annualized Loss Expectancy (ALE):
- Quantifies expected annual financial loss due to a risk event by multiplying SLE with Annualized Rate of Occurrence (ARO).
- Annualized Rate of Occurrence (ARO):
- Estimates how often a specific risk event is likely to occur within a year.
Disasters
- Environmental:
- Natural events (earthquakes, floods, hurricanes, wildfires) disrupting business operations.
- Person-made:
- Result from intentional or accidental actions, including cyberattacks, industrial accidents, terrorism.
- Internal vs. External:
- Internal caused by factors within the organization; external from factors beyond the organization’s control.
Business Impact Analysis
- Recovery Time Objective (RTO):
- Maximum acceptable time a system can be down after a disruption before causing significant business impact.
- Recovery Point Objective (RPO):
- Maximum data loss an organization can tolerate after a disruption, indicating the point to which systems must be restored.
- Mean Time to Repair (MTTR):
- Average time taken to repair a system after a failure, influencing downtime and recovery planning.
- Mean Time Between Failures (MTBF):
- Average time between failures for a system, providing insights into its reliability.
- Functional Recovery Plans:
- Detail how critical business functions and processes can be restored after a disruption.
- Single Point of Failure:
- Component or process whose failure can lead to the failure of the entire system.
- Disaster Recovery Plan (DRP):
- Outlines procedures, strategies, and resources for recovering IT systems, data, and operations after a disaster.
- Mission-Essential Functions:
- Critical activities that must continue during disruptions to maintain essential business operations.
- Identification of Critical Systems:
- Helps prioritize resources and planning efforts for disaster recovery and continuity.
- Site Risk Assessment:
- Evaluates vulnerability of physical locations to various risks, informing disaster recovery planning.
5.5 Privacy
Organizational Consequences of Privacy Breaches
- Reputation Damage:
- Privacy breaches can result in a loss of trust from customers, clients, and the public due to perceived negligence in protecting personal information.
- Identity Theft:
- Privacy breaches can lead to stolen personal information, resulting in identity theft, financial fraud, and other forms of cybercrime.
- Fines:
- Regulatory authorities can impose significant fines on organizations that fail to protect individuals’ privacy rights and adequately secure their personal data.
- IP Theft:
- Intellectual property (IP) theft can occur when sensitive business information is exposed, leading to a loss of competitive advantage and potential legal consequences.
Notifications of Breaches
- Escalation:
- Escalation processes ensure that privacy breaches are promptly reported to relevant individuals, teams, and management for swift action.
- Public Notifications and Disclosures:
- Organizations may be required to publicly disclose privacy breaches to affected individuals, regulators, and the public, maintaining transparency.
Data Types
- Classifications:
- Data classifications help identify the sensitivity of data and determine appropriate handling, storage, and protection measures.
- Personally Identifiable Information (PII):
- PII refers to any data that can be used to identify an individual, such as names, addresses, Social Security numbers, and email addresses.
Privacy-Enhancing Technologies
- Data Minimization:
- Data minimization involves collecting and retaining only the minimum amount of personal data necessary for the intended purpose.
- Data Masking:
- Data masking replaces sensitive data with fictional or masked values, preserving data’s format while rendering it unusable for unauthorized users.
- Tokenization:
- Tokenization replaces sensitive data with unique tokens, reducing the risk associated with storing and transmitting sensitive information.
- Anonymization:
- Anonymization removes personally identifiable information from data, making it impossible to trace back to individuals.
- Pseudo-Anonymization:
- Pseudo-anonymization involves replacing identifiable information with pseudonyms to protect data privacy while retaining some level of data usability.
Roles and Responsibilities
- Data Owners:
- Data owners are individuals responsible for overseeing the accuracy, integrity, and security of specific data sets.
- Data Controller:
- Data controllers determine the purposes and means of processing personal data, ensuring compliance with privacy regulations.
- Data Processor:
- Data processors handle personal data on behalf of data controllers and must adhere to processing instructions and data protection requirements.
- Data Custodian/Steward:
- Data custodians or stewards are responsible for managing and safeguarding data according to the organization’s policies and procedures.
- Data Privacy Officer (DPO):
- The Data Privacy Officer (DPO) is responsible for ensuring the organization’s compliance with data protection laws and regulations.
Information Lifecycle
- Information Lifecycle:
- The information lifecycle encompasses the various stages of data, including creation, storage, processing, sharing, and eventual disposal.
Impact Assessment
- Privacy Impact Assessment:
- Privacy impact assessments evaluate the potential risks and impacts on privacy when collecting, processing, or storing personal data.
Terms of Agreement
- Terms of Agreement:
- Terms of agreement outline the data collection, processing, and sharing practices between organizations and data subjects.
Privacy Notice
- Privacy Notice:
- A privacy notice informs individuals about the organization’s data collection practices, including what data is collected, why it is collected, and how it will be used.