Computer Security
·Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
·These cyberattacks are usually aimed at, accessing, changing, or destroying ssensitive information; extorting money from users; or interrupting normal business processes.
Cybersecurity aims to protect individuals' and organizations' systems, applications, computing devices, sensitive data and financial assets against simple and annoying computer viruses, sophisticated and costly ransomware attacks, and everything in between.
Types of Cyberattacks
A cyber attack is any type of offensive action that targets computerinformation systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems.
When software connects to a network, it establishes a pathway into the underlying operating system. Allowing unrestricted program access can create security vulnerabilities, potentially enabling attackers to breach and
manipulate the protective code guarding sensitive information.
Denial-of-Service (DoS) and Distributed Denial-of-
Service (DDoS) Attacks
A denial-of-service attack overwhelms a
system’s resources so that it cannot respond
to service requests.
A DDoS attack is also an attack on system’s
resources, but it is launched from a large
number of other host machines that are
infected by malicious software controlled by
the attacker.
Another purpose of a DoS attack can be to
take a system offline so that a different kind
of attack can be launched. One common
example is session hijacking.
Man-in-the-Middle (MitM) Attack
A MitM attack occurs when a hacker inserts
itself between the communications of a client
and a server. Here are some common types of
man-in-the-middle attacks:
• Session hijacking – In this type of MitMattack, an attacker hijacks a session between a trusted client and network server. The attacking computer substitutes its IP address for the trusted client while the server continues the session, believing it iscommunicating with the client.
Drive-by Attack
Drive-by download attacks are a common method of spreading malware. Hackers look for insecure websites and plant a malicious script into HTTP or PHP code on one of the pages.
This script might install malware directly onto the computer of someone who visits the site, or it might re-direct the victim to a site controlled by the hackers. Drive-by downloads can happen when visiting a website or viewing an email message or a pop-up window.
Unlike many other types of cyber security attacks, a drive-by doesn’t rely on a user to do anything to actively enable the attack — you don’t have to click a download button or open a malicious email attachment to become infected
Password attack
Because passwords are the most commonly used mechanism to authenticate users to an information system, obtaining passwords is a common and effective attack approach. Access to a person’s password can be obtained by looking around the person’s desk, ‘‘sniffing’’ the connection to the network to acquire unencrypted passwords, using social engineering, gaining access to a password database or outright guessing. The last approach can be done in either a random or systematic manner:
Brute-force password guessing means using a random approach by trying different passwords and hoping that one work.
Birthday Attack
Birthday attacks are made against hash algorithms that are used to verify the integrity of a message, software or digital signature. A message processed by a hash function produces a message digest (MD) of fixed length, independent of the length of the input message; this MD uniquely characterizes the message.
The birthday attack refers to the probability of finding two random messages that generate the same MD when processed by a hash function. If an attacker calculates same MD for his message as the user has, he can safely replace the user’s message with his, and the receiver will not be able to detect the replacement even if he compares MDs.
Events That Changed Cybersecurity
1970’s - The First Computer Virus
• A self-replicating program called “Creeper” was created by Bob Thomas, which infected the
ARPANET.
• This lead to the creation of the first antivirus program dubbed, “Reaper.”
1976 - 2006 – The Largest Insider Attack
• For 30 years, Greg Chung of Boeing stole $2 billion worth of aerospace documents and gave them to China.
• The malicious intent to supply china with military and spacecraft Intel was not a threat just to the company, but the entire country. (USA)
2013 - The Snowden Effect
• Edward Snowden, a former CIA employee, leaked classified information from the National Security Agency. Many were divided by what Snowden did, and lost trust in the government.
2013-2014 – Largest Data Breach
• A group of hackers hacked Yahoo, compromising the personal information of over 3 billion users. Yahoo failed to report this until 2016, and faced multiple lawsuits.
2017 - The First Ransomworm
• WannaCry, a ransomware, targeted computers that ran the Microsoft Windows OS and demanded ransom payments in Bitcoin.
• In just one day, the ransomware infected over 230,000 computers in over 150 countries.
2017 – NotPetya Ransomware Attack
• The NotPetya virus, another ransomware, targeted Microsoft Windows computers, infecting over 12,500 computers. It wiped data from energy firms, banks, government offices, and airports. NotPetya didn’t only encrypt data, but prevented computers from working altogether.
2017 - The Largest Credit Card Attack
• Equifax, a credit bureau, failed to patch a vulnerability that compromised the data of over 143 million Americans. The hackers had access to over 210,000 consumer credit cards.
Cyber Kill Chain
Reconnaissance
- harvesting employee email addresses and
credentials, probing the network in search
of vulnerabilities
Passive Reconnaissance
- in attempt to gain information
about targeted computers and
networks without actively
engaging with the systems (e.g.,
Social Media, Google...)
Active Reconnaissance
- computer attack in which an
intruder
engages with the
targeted system to gather
information about vulnerabilities
(e.g., NMAP, Port Scanning,
Vulnerabilities Scanners)
Weaponization
- coupling the exploit with a backdoor to
create deliverable payload
Delivery
- delivering the weaponized bundle to the
victim through email, web, USB, or cloud
Exploitation
- exploiting a vulnerability to execute code
on the victim’s system
Installation
- installing malware on the asset
Command and Control - established a command channel to an
external server for remote manipulation
Actions on Objective- for example, data exfiltration, ransomware
deployment or corporate espionage
SOC (Security Operations Center)
Security Operations Center
- an in-house or outsourced team of IT
security professionals that monitors an
organization’s entire IT infrastructure,
24/7, to detect cybersecurity events
Security Posture
- status of organization’s readiness to
protect its assets
SOC Activities and Responsibilities
| Preparation, planning and prevention
- prioritizes readiness, strategizing, and
proactive measures; initiates its efforts
with asset inventory
| Monitoring, detection and response
-
monitors the entire extended IT
infrastructure 24/7/365 for signs of known
exploits and for any suspicious activity
| Recovery, refinement and compliance
- ensures all applications, systems, and
security tools and processes comply with
data privacy regulations
SOC Team Members
Incident Responder - identifies and responds to security
incidents
Forensic Investigator - conducts in-depth forensic analysis of
security incidents
Compliance Auditor - ensures that the organization complies
with relevant industry, national, and
global privacy and security regulations
Security Analyst
- monitors the network, systems, and logs
for signs of security breaches and
suspicious activities
Security Engineer
-
manages and
maintains security
technologies and infrastructure
Threat Hunter
- proactively seeks out potential threats
and vulnerabilities within the
organization’s infrastructure
SOC Manager
- oversees the entire SOC team and
operations
SOC Operator
- monitors security alerts and events in
real-time
Malware Analyst
- specializes in analyzing and dissecting
malware
Security Awareness Trainer
- educates employees and staff on security
best practices and policies