2.1.1 - SOCIAL ENGINEERING
Social Engineering: threats against human factors in the technology environment
goal: get an authorized user to give information or access to an unauthorized person
methods: deception and trickery
indication humans are targets:
recon and gaining access
techniques of social engineering: baiting, shoulder surfing, piggybacking/tailgating, infor written in workspace, dumpster diving, pretexting, scareware
protection against social engineering:
1. Piggybacking → security guards/gates/turnstiles
2. Shoulder Surfing → shield the screen or keypad
3. Dumpster Diving→ shred discarded documents
4. Scareware → use malware scanner
5. Baiting
6. Info written in workspace
7. Pretexting - all types
8. Phishing - all types
2.2.1 - PHISHING
Phishing: use of bogus emails and websites to trick you into supplying confidential or personal information
a con used in a majority of cyber attacks
receive an email that appears to come from a reputable organization
email includes a link to the website
following the website connects to a replica of the real website → information entered can then be stolen
how to spot a phishing email:
misspellings or incorrect grammar
The sender and email address don’t match
The URL doesn’t match the text of link
types of phishing:
spear-phishing: email scam targeted towards a specific individual, organization, or business
whaling: describes an email scam targeted to high-value individuals
smishing: text message used for phishing (SMS)
vishing: phone calls or voice messages for phishing
difference between phishing and spam: phishing targets for personal information through malicious links and generally states a “deadline” for urgency; spam is a mass email sent for unsolicited advertisements and is not urgent
2.2.2 - OSINT
OSINT tools provide a simple, powerful way to gather publicly available information about people/companies — tied to phishing
OSINT: Open Source Intelligence Tools: multi-methods methodology for collecting, analyzing, and making decisions about data accessible in publicly available sources to be used in an intelligence context
any information gathered from free, public sources about an individual or organization
legal access: zillow, social media, etc.
3.1.1 - SYSTEM VULNERABILITIES
Vulnerability: a security flaw, glitch, or weakness found in software code that could be exploited by an attacker
found in technology products including operating systems, software applications, and hardware devices
CVE Database
Common Vulnerabilities and Exposure (CVE): a database of known vulnerabilities in all types of digital products
provides: an easy way to share data about product issues, a common baseline for comparing products, and a source for ways to mitigate the impact of the vulnerability
mitigate: minimize the risk
when a vulnerability is found, it is given a CVE identifier number and is added to the CVE
includes CVE #, details, how to mitigate, and the score of severity
Vulnerabilities Exploited
Explot: specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access
vulnerability is the opening, exploit takes advantage of the opening and attacks
code can be patched to close the vulnerability opening
only computers updated with the patch code with be secure
3.1.2 and 3.1.3 - SYSTEM HARDENING
Hardening: the process of limiting potential weaknesses that make systems vulnerable to cyber attacks
solution: use benchmarks - lists of recommended configuration settings
Steps to Harden a System
updates - automatic or managed by enterprise
update/patch: tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications
hotfix: patch for a very specific issue - not automatic
critical: fix bug affecting OS functionality
security: fixes a vulnerability in OS code to stop exploits
Windows Defender security center items
UAC (user account control)
under security and maintenance
BEST protection against malware
set local security policies
Password Account Policies
Length = how many characters
Complexity = what characters are used
Age = when it needs to be reset
History = no reuse
Account Lockout Policies
Threshold = how many bad tries
Duration = how long locked out
Reset counter time = same as duration
Audit Policy - what actions you keep track of on the system
Who logged into the device and when?
User Rights Assignments - what type of user is allowed to take certain actions with the PC
Who can log on from Network?
Who can shut down the system?
Security Options - what restrictions are put on settings or user actions.
Prevent users from installing device drivers
disable unnecessary services
Least Privilege Principle: best practice is to provide each user with the minimum system access needed to perform their necessary tasks
Backup: static snapshot of data
3-2-1 rule:
3 copies of the data
2 copies stored on different devices
1 copy offsite or in the cloud
redundancy: several copies
system image: backup that includes operating system and configuration settings
3.2.1 - THREAT MODELING AND IOT
Threat Modeling: structured process through which we identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to protect systems or software
Internet of Things (IOT): Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
aka smart devices
Four IOT Vulnerabilities:
Nest Baby Monitor - a man accessed the baby monitor, shouted curse words and threatened parents.
Jeep Hack - researchers we able to remotely take total control of a Jeep SUV. They could make it speed up, slow down and could steer it off the road.
Medtronic Insulin pump - researchers proved that the remote access feature on the insulin pump can be hacked to alter the delivery of insulin. Insulin doses could be stopped or overdosed, both potentially lethal to diabetics.
Mirai Botnet (aka Dyn attack) October 2016 - at the time this was the largest DDoS attack ever launched - almost took down the internet.
Shodan: a search engine that gathers information about all Internet-connected devices.
Securing IOT Devices:
Change the default username for the admin account.
Create a unique, strong password for the admin account.
DON’T connect IOT devices to the Internet unless necessary.
Use a firewall on your home router.
Try searching your IP address in Shodan.