Session Overview
Introduction to fundamental concepts and practices in cybersecurity.
Definition
Practice of protecting systems, networks, and data from attacks.
Importance
Ensures trust in digital interactions.
Essential for sectors like online banking and e-commerce.
Cybersecurity
Concentrates on digital threats.
Information Security
Encompasses both physical and digital information protection.
IT Security
Focus on protecting technical infrastructure and networks.
Confidentiality
Ensures data is accessible only to authorized users.
Integrity
Protects the accuracy and reliability of data.
Availability
Ensures access to information and resources when needed.
Definition
Sensitive information should only be accessible to authorized individuals.
Methods
Encryption methods (e.g., AES, RSA).
Access controls (passwords, biometrics).
Definition
Protects data from unauthorized modification.
Methods
Hashing (e.g., SHA-256).
Digital signatures for data verification.
Functionality
Generates a fixed-size output (hash value) from input data.
Modifications to the original data result in different hash values, indicating tampering.
Common Algorithms
SHA-256, SHA-3, MD5 (less secure).
Verification
Hashes need to be verifiable on both sender and receiver ends.
Purpose
Validates the sender's identity and ensures data integrity.
Implementation
Uses Public Key Infrastructure (PKI) with certificates from trusted Certificate Authorities (CAs).
Purpose
Restricts who can modify or delete data.
Methods
Role-Based Access Control (RBAC).
Attribute-Based Access Control (ABAC).
Principle of Least Privilege (PoLP)
Ensures individuals have only the access necessary for their job functions.
Functionality
Records system changes and actions to maintain an audit trail.
Maintaining Logs
Use tools like Splunk or ELK stack for tamper-proof logs.
Regular reviews for anomalies to detect unauthorized actions.
Purpose
Tracks changes to files and systems to prevent issues.
Tools
Git, SVN, enterprise version control systems.
Process
Implement code reviews and approvals for every change.
Functionality
Automated tools detect unexpected changes in files or systems.
Examples
Tools like Tripwire or OSSEC.
Setup Alerts
Notify administrators about changes in critical system files.
Functionality
Maintains copies of data for recovery purposes.
Backup Strategies
Regular incremental and full backups.
Store backups securely offsite and test restoration processes regularly.
Purpose
Ensures data integrity during transfer.
Protocols
Use TLS, HTTPS, or SFTP for encryption.
Verify Data
Utilize checksums or hashes during transmission.
Functionality
Use multiple systems to mitigate inconsistency risks.
Implementation
Deploy redundant databases or systems.
Utilize quorum-based mechanisms for distributed systems.
Staff Education
Employees must be educated on maintaining integrity and avoiding errors.
Regular Updates
Keep systems updated and patched regularly.
Integrity Checks
Perform integrity checks during audits and penetration testing.
Definition
Ensures systems are accessible when needed.
Methods
Utilize backups and redundancy strategies.
Maintain disaster recovery plans to restore operations promptly.
Implementation Steps
Deploy backup servers and storage for redundancy.
Set up automatic failover systems to switch to a backup during outages.
Use load balancers to balance traffic across multiple servers.
Definition
Mitigation strategies to prevent overwhelming systems with traffic.
Implementation Steps
Utilize DDoS protection services such as Cloudflare or AWS Shield.
Configure rate-limiting and traffic filtering at the network level.
Deploy IDS/IPS systems for additional monitoring and protection.
Purpose
Keeping systems updated and optimized helps prevent failures.
Implementation Steps
Apply patches for operating systems, applications, and hardware.
Conduct routine hardware and software maintenance checks.
Utilize monitoring tools like Nagios or SolarWinds to oversee system health.
Purpose
Ensure data and services can be restored post-failure or cyber-attack.
Implementation Steps
Carry out regular backups, both incremental and full.
Test and validate disaster recovery plans thoroughly to ensure swift restoration.
Store backups in secure, geographically diverse locations.
Definition
Designing systems to minimize downtime while maximizing uptime.
Implementation Steps
Create high-availability clusters that can auto-restart or replace failed components.
Utilize RAID technologies for storage redundancy.
Ensure systems are designed to avoid single points of failure.
Definition
Systems must be capable of handling increased load or demand efficiently.
Implementation Steps
Implement cloud services that offer auto-scaling functionalities (e.g., AWS, Azure).
Actively monitor resource usage to adjust capacity proactively.
Employ containerized architectures like Kubernetes or Docker for enhanced flexibility.
Definition
Protecting network connections to ensure ongoing service availability.
Implementation Steps
Utilize multiple ISPs to guarantee redundancy in service.
Implement strong firewall and VPN solutions for secure access.
Segment networks to isolate failures and minimize impact effectively.
Definition
Limiting and monitoring access to resources helps avoid disruptions.
Implementation Steps
Employ role-based or attribute-based access control.
Monitor user activity and system performance to detect anomalies.
Quickly identify and respond to unauthorized access attempts in real-time.
Definition
Preparing for and responding effectively to disruptions.
Implementation Steps
Develop and regularly test incident response plans.
Train staff on how to handle various cybersecurity incidents effectively.
Establish communication protocols for informing stakeholders during outages.
Definition
Protecting physical infrastructure from environmental hazards.
Implementation Steps
Ensure data centers have backup power sources such as UPS or generators.
Maintain appropriate cooling and humidity levels for sensitive hardware.
Utilize fire suppression systems and flood protection mechanisms.
Continuous Monitoring
Monitor systems 24/7 to identify and address security issues promptly.
Implement SLAs
Define uptime requirements and availability expectations through service level agreements.
Regular Audits
Conduct periodic audits to ensure compliance with established availability standards.
Description of Incident
Hackers accessed Target’s network through a third-party vendor.
Impact on the CIA Triad
Confidentiality: Sensitive data was exposed and stolen.
Integrity: Customer trust in Target's systems suffered significantly.
Availability: Disruption of services during recovery efforts compromised system access.
Summary
Key points covered: Cybersecurity importance, definition, and the CIA Triad principles.
Example Scenario
Consider how a new employee's accidental sharing of a confidential database over email might be managed using CIA Triad principles.
Definition of Security Attacks
Deliberate attempts to breach the confidentiality, integrity, or availability of information systems.
Key Objectives
Exploit vulnerabilities, disrupt operations, and steal sensitive information.
Definition
Fraudulent attempts to acquire sensitive information by masquerading as a trusted entity.
Examples
Fake emails requesting credentials or including malicious links.
Mitigation Strategies
Educate users on identifying phishing attempts.
Deploy email filtering and anti-phishing technologies.
Definition
Malicious software intended to disrupt, damage, or gain unauthorized access to systems.
Types
Viruses, worms, Trojans, ransomware.
Mitigation Strategies
Keep antivirus and anti-malware tools updated.
Regularly patch systems and conduct software updates.
Definition
Overwhelm systems with excessive traffic, rendering them unavailable to legitimate users.
Examples and Mitigation
Utilize DDoS protection services and rate-limiting strategies at the network level.
Implement intrusion detection and prevention systems.
Definition
Intercepting and altering communication between two parties.
Examples
Eavesdropping on unsecured Wi-Fi networks.
Mitigation Strategies
Use encryption methods like HTTPS and VPNs.
Implement strong authentication methods.
Definition
Exploiting vulnerabilities in databases through malicious SQL code.
Examples
Extracting sensitive data via crafted SQL queries.
Mitigation Strategies
Use input validation and parameterized queries.
Employ web application firewalls (WAFs).
Definition
Attempts to compromise user passwords to gain unauthorized system access.
Types
Brute force, dictionary attacks, credential stuffing.
Mitigation Strategies
Enforce strong password policies and implement multi-factor authentication (MFA).
Definition
Threats originating from individuals within an organization.
Examples
Disgruntled employees leaking sensitive data.
Mitigation Strategies
Monitor user activity and enforce role-based access limitations.
Definition
Exploiting vulnerabilities unknown to the vendor or the public.
Examples
Attacks performed before software patches are available.
Mitigation Strategies
Utilize threat intelligence tools and maintain regular updates of systems.
Security Awareness Training
Regularly conduct training sessions to educate users about identified threats.
Multi-Layered Security
Implement multiple security measures to safeguard systems.
Continuous Monitoring
Monitor user activities for signs of unusual behavior.
Regular Vulnerability Assessments
Conduct vulnerability assessments and penetration tests to identify potential risks.
Key Takeaway
Understanding and mitigating security threats is vital for protecting sensitive data and information systems.
Importance
Financial institutions handle sensitive data such as account details and transactions.
Consequences of Cyberattacks
Financial loss, reputational damage, and legal ramifications.
Real-World Example
2016 Bangladesh Bank heist where $81 million was stolen due to cybersecurity lapses.
Key Challenges
Increasing sophistication of cyber threats, insider risks, complex IT infrastructures, and stringent compliance regulations.
Types of Threats
Phishing targeting bank customers, malware/ransomware attacks, and DDoS attacks disrupting banking services.
Examples
2020 DDoS attacks on New Zealand’s stock exchange, 2019 Capital One breach exposing 106 million records, and 2021 Colonial Pipeline ransomware attack.
Frameworks
Governance-Risk-Compliance (GRC), NIST cybersecurity framework, ISO/IEC 27001, and strategic planning mechanisms.
Contingency Planning
Important part of the cybersecurity management approach.
Encryption - Protect data in transit and at rest.
Two-Factor Authentication - Enhance user access security.
Network Monitoring - Detect anomalies in real-time.
Incident Response Plans - Mitigate breach impacts.
GDPR - Data privacy regulations within the EU impose heavy penalties for non-compliance.
GLBA - US regulations for safeguarding customer information in financial institutions.
Local Guidelines - RBI Cybersecurity frameworks for Indian banks.
Essentials
Risk assessments, audits, data protection compliance, and obligation for breach reporting.
Discussion
The influence of global regulations on cybersecurity practices in multinational banks.
Incident Description
A financial institution faced ransomware encryption of sensitive data, leading to ransom paid and damage to trust.
Discussion Questions
Possible prevention methods and applicable regulations.
Event Overview
Exploitation of vulnerabilities in SWIFT payment system led to $81 million theft.
Failures Identified
Weak authentication measures and lack of transaction monitoring.
Lessons to Implement
Importance of robust two-factor authentication and continuous transaction monitoring.
Overall Summary
Cybersecurity is crucial for financial systems. Compliance with regulations is essential to avoid consequences, and proactive measures are vital for continuous improvement.
Multifactor Authentication
Combining various authentication methods enhances security.
Two Forms of Authentication
Requires strong and unique credentials, yet may increase user burden.
Methods including passwords, biometrics, and authentication tokens.
Security is not guaranteed by simply using various factors; understanding threats is vital.
Protecting Resources
Access control limits who can access and how. Proper policies inform ability to identify secure vs. open accesses.
Mechanics
Mechanically implemented access control involves defining permissions per user and resource.
Developing Security Policies
Organizations must establish control frameworks before enforcing access rules.
Goals
Validate every access attempt, enforce least privilege for subjects, and determine proper usage of each request.
Administrators need to verify and audit access control issues regularly.
Appropriate monitoring helps assess user access rights over time.
Definition
Fineness in permissions allowing for specific detailing in rights allocation.
Functionality
Systems track access actions to maintain records of all performed actions.
Helps identify misuse and assist in responding to incidents.
Objective
Restrict potential user harm while maintaining necessary accessibility.
Managing users’ privileges to minimize possible exploitation.
Utilization
Biometrics use physical traits for secure authentication, less susceptible to loss or forgery.
Advantages
Unique and hard to replicate traits enhance security.
Failures and Acceptance Rates
False positives and negatives challenge user reliability.
Definition
Leverages physical tokens, such as access cards or computer chips, to grant access. Widely utilized in various applications.
Description
Streamlines user authentication across multiple systems through single sign-on procedures, enhancing usability without sacrificing security.
Definitions
Identification and authentication are vital for confirming authorized access.
Knowledge - Something the user knows (e.g., password, PIN).
Possession - Something the user has (e.g., ID badge).
Inherence - Something the user is (e.g., biometric data).
Password Tips
Use complex passwords, avoid dictionary words, change regularly, and keep passwords secure.
Issues like password fatigue and vulnerability to multiple attack vectors necessitate implementing layered security solutions.
Systems Design
Operate on established policies that define the user-object relation in accessing resources.
Limitations
OS struggle to enforce fine-grained access controls leading to permission loopholes.
Introduction
System for verifying every access to resources, maintaining rigorous security measures.
Directory Models
Use of a directory for access control can lead to complexity in large systems and complications in permission revocation.
Definition
Represents access rights in a structured table format, detailing subject-object relationships.
Advantages
Efficiently manages shared resources while delivering explicit access permissions.
Key Features
Default permissions, flexibility with wildcards, and centralized access management.
Objective
Control resource access, ensuring protections for sensitive data in organizations.
Characteristics
Managed through strict procedures, often in legacy systems and business workflows.
Definition
Granting permissions based on roles within the organization rather than individual user settings.
Definition
Occurs when data exceeds buffer limits, exploitable for unauthorized memory access.
Stack-Based Overflow - Manipulates function return addresses within the stack.
Heap-Based Overflow - Attacks dynamic memory allocation.
Results in unauthorized access execution, escalated privileges, system crashes, or DoS incidents.
Key incidents that exploited buffer overflows include the Morris worm and Heartbleed attack.
Implement code safety measures such as bounds checking and utilizing safe coding practices.
Definition
Processes for securing data through encryption, ensuring confidentiality, integrity, and authenticity.
Types
Symmetric - Single key for both encryption & decryption operations.
Asymmetric - Public/private key pair for enhanced security.
Definition
The study of breaking encryption methods to reveal hidden data or assess cryptographic strengths.
Definition
The effort required to successfully break an encryption system. Security is measured against this factor.
Methods
Incorporate intelligent strategies rather than pure brute-force to breach encryption.
Best Practices
Continually update cryptographic methods to counter advances in cyber threats.
Definition
Gaps between checks and actual usage creating potential security weaknesses.
Identification
Recognize potential vulnerabilities in systems assessing time gaps between authorization and access actions.
Summary
The importance of understanding and addressing TOCTTOU vulnerabilities within security frameworks.