Chapter 1 - Study Guide
Confidentiality occurs that unauthorized individuals are not able to gain access to sensitive information. Cyber security professionals develop and implement security controls, including firewalls, access control lists, and encryption to prevent unauthorized access to information attackers may seek to understand. Undermine confidentiality controls achieve one of their goals to unauthorized disclosure of sensitive information. Integrity ensures that there are no unauthorized modifications in information or systems, either internationally or unintentionally integrity controls such as hashing. And integrity monitoring solutions to seek to enforce these requirements. Integrity threats may come from attackers seeking the alteration of information without authorization or non malice sources such as power spikes causing the corruption of information. Availability ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them available. Controls such as fault tolerance, clustering and backup seek ensure the legitimate users may gain access needed simply similar. The integrity threats availability threats may come either from attackers seeking the disruption of access of non malicious sources such as fire destroying a data center that contains valuable information or services. Cybersecurity and analysis often first to these three goals known as. The CIA trained Traid when preforming their work. They often characterize risk attacks and security controls as meeting one or more of three CIA trial goals when describing them.
Data Breech Risks
Security incidents occur when an organization and stealing sensitive information as a result of accidental activity, such employee leaving an encrypted laptop in the back of a ride-share, or as a result of a natural activity such as an earthquake destroying a data center.
Security professionals are responsible for understanding these risks and implementing controlled designs to manage those risks. To an acceptable level. To do so, they must first understand the effects that a breach might have on organization and impact it might have on ongoing basis.
So let's switch it up to make it interesting. One of the most important ways to block someone on the network is by using ACL's Access control lists (ACL) have a lot of uses on Cisco routers.
. Classifying and organizing traffic for quality of service—You can use an ACL to categorize and prioritize your traffic with
Quality of Service
(QoS).
. Filtering routing updates—ACLs can be used with routing protocols to control what networks are advertised.
.
Defining interesting traffic for dial-on-demand routing (DDR)—ACLs can be used to configure what traffic will dial a remote router when using
Integrated Services Digital Network (ISDN).
.
Network Address Translation (NAT—ACLs are used to identify inside local addresses when configuring NAT.
Watch this Video to get some more further information. http://s804283110.onlinehome.us/ACLROUTESUM
A global ransomware attack has hit thousands of servers running the VMware ESxi hypervisor, with many more servers expected to be affected, according to national cybersecurity agencies and security experts around the world.
The DAD Triad
Early in this chapter, we introduced the CIA Triad used to describe the three main goals of cyber security, confidentiality, integrity and availability. This model explains the three key threats to cybersecurity efforts, disclosure, alteration, and denial. Each of these three threats maps directly to one of the main goals of cyber security.
The CIA and DAD triads are very useful tools for cyber security planning and risk analysis whenever you find yourself. Task with the broad goal of assessing the Security Council used to protect an asset or the threat to an organization. You can turn to a CIA or dad triads for diet guidance. X threats to organization website you may apply a DAD triad. In your analysis, does the website contain sensitive information that would damage organization disclosure? To unauthorized individuals. If an attacker was able to modify information contained on the website, would this unauthorized alteration cause financial, reputational, or operational damage to the organization?
That's just one example of using the DAD tried to inform a risk management. You can use the CIA and DAD models in almost any situation to serve as a helpful starting point for a more detailed risk analysis.
If an attacker were able to modify information contained on the website, would this author’s unauthorized altercation cause financial, reputational, or operational damage to the organization? Does the website perform mission critical activities that could damage the business significantly? When attacked they were able to disrupt the site. That's just one example of using the DAD triad to inform risk assessment. You can use CIA and DAD models in almost any situation to serve as a helpful starting point for a more detailed risk analysis?
The impact of security includes maybe wide-ranging depending upon the nature of the Internet and type of organization affected. We can catalyze the potential impact of the security Internet using the same category categories that businesses generally used to describe any type of risk. Financial, reputational, strategic, operational, and compliance. Let's explore each of these risk categories in greater detail.
Implementing security controls
As an organization and our analysis is risk environment, technical and business leaders determined level of protection required to preserve the confidentiality, integrity and availability of their information and systems. They expressed these requirements for writing the control objectives that the organization wishes to achieve. These control objectives are statements of a desired security state, but they do not by themselves actually carry out security activities. Security controls are specific measures that fulfill the security objective of an organization.
Security control category categories
Now let's look at some practical examples of threats seen on a network referencing to Cyber Security.
Hi, I have some work I'm working on in packet tracer and I need to find the best type of network threat I can simulate and 'attack' my network with and demonstrate how to prevent it from happening again. what is the best threat I can show on packet trace.
In this question they are talking about a
DOS attack of some kind, been a while since I used PT but I'm sure you can send a 10000 pings consecutively from various PC's/Servers to a given network device and see what's dropped in the simulation tab. Unfortunately I don't think PT can do this.
The new CML I pretty sure can, or EVE/GNS. This could not be accomplished in Packet Tracer which does not have the same values as a simulator, still researching. Working on a different topology. To be continued: This will be another topology using security to configure ACL's.
Note: These controls, categories, and types are unique to comp Tia. If you've already studied the similar categories as part of your preparation for another security exam, be sure to study these carefully when answering exam questions.
Security control types
CompTIA also divides security into types based on the desired effects. The types of security control include the following.
Exploring Compensating control
The payment card industry data security standard. PCI DSS includes one of the most formal compensating control processes in use today. It set out three criteria that must be met for compensating control to be satisfactory.
For example, an organization might find it need to run an outdated version of an operating system on a Pacific machine, because software necessary to run the business will only function on that operating system version. Most security policies would prohibit using the outdated operating system because it might be susceptible to security vulnerabilities. The organization could choose to run this system. On a isolated network with either very little or no access to other systems as compensating controls. General idea is that the compensating control finds alternate means to achieve objectives when the organization cannot meet the original control requirements. Although PCI DSS offers a very formal process. For compensating controls.
The use of compensating controls is a carbon strategy of many different organizations. Even though it's not subject to PCI DSS. Compensating controls. Balance the fact that it simply isn't possible to implement every required security control in every circumstance. For desire to manage risks to the greatest feasible degree.
In many cases, organizations adopt compensating controls to address a temporary exemption to a security requirement. In those cases, the organization should also develop remuneration. Plans designed to bring the organization back into compliance with the letter and intent of the original control.
Data Protection
Security professionals spend significant amounts of their time focusing. On the protection of sensitive data, we serve as stewards and guardians, protecting the confidentiality. And trickery and availability of the sensitive data created by organizations and entrusted to us by our customers and other stakeholders.
As we think through the data protection techniques, it's helpful to consider the three states where data might exist.
Data Encryption
Encryption technology uses mathematical algorithms protect information from prying eyes. Both while it is in. Friends over network and while it besides on systems encrypt data is unintelligible to anyone who does not have access to appropriate decryption key. Making it safe for store transmit encrypted data over otherwise insecure means.
Data Loss Prevention,
Data loss prevention (DLP) systems help organizations enforce information handling policies and procedures to prevent data and loss and theft. They search systems restore or sensitive information that might be unsecured and monitor network traffic for potential attempts to remove sensitive information from the organizations. They can act quickly to block the transmission before damage is done and alert admission to the attempt breach.
DLP systems work in two different environments:
Host-based DLP uses software that agent installed on systems that search those systems for the presence of sensitive information. These searchers often turn up Social Security numbers, credit card numbers and other sensitive information and most unlikely places!
Detecting the presence store sensitive information allows security. Professionals to take prompt actions to either remove or secure it with encryption. Taking the time to secure remove information may pay handsome rewards down the road if device is lost or compromised.
Host based DLP can also monitor system configuration and user actions lock it undesirable actions. For example, some organizations use host based DLP to block users from accessing USB based removal media. Devices that may use to carry information. Out of the organizations Secure Environment Network based DLP systems are dedicated devices that sit on a network and monitor output network traffic, watching for any transmission that contains unencrypted sensitive information. They can then block those transmissions for Benton to unsecured loss of sensitive information. Do you play? Systems may simply block traffic that violates the organizations policy, or in some cases they may automatically apply encryption to that content. These automatic encryptions are commonly used for DLP systems that focus on e-mail.
DP Systems also have two mechanisms of actions.
Data Minimization
Data minimization technology seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis. The best way to achieve data minimization is to simply destroy the data when it's no longer necessary to meet our original business purpose.
If we can't completely remove the data from the data center. You can often transmit it. Into a format where the original census information is de-identified. The de-identification process removes from the ability to link data back to an individual, reducing its sensitivity.
An alternative to deidentified data is transforming it into a format where the original information can't be received. This process is called data and. Use dictation and we have several tools at our disposal to assist with it:
Although it is impossible to retrieve the original value directly from the hash. There's one major flaw to this approach. If someone has a list of possibility values for a field, they can conduct something called a rainbow table attack. In this attack, the attacker computes the hashes of those candidates with values and then check to see if those hashes exist in our data file.
For example, imagine that we have a file listed all students at our colleges who have failed courses. We have their student ID. If they're taxed that has a list of students, they can compare the hash values of all student's ID's and then check to see which hashes drivers are on the list. For this reason, hashing should. Only be used with caution.
Summary
Cybersecurity professional responsible for ensuring and confidential integrity and availability of information systems maintained by their organizations. Confidentially ensures that unauthorized individuals are not able to gain access to sensitive information. Integrity ensures that there are no unauthorized modifications to information or systems. Either intentionally or unintentionally the information systems are ready to meet the needs of legitimate users at the time those users request them together. These are three goals are known as CIA triad together as
As cyber security analyst seeks to protect the organization, they. Evaluate risk. The CIA triad. This includes the design and implementation of appropriate measures of security control drawn from material operations and technical control categories. These controls should also be varied in type, including a mixture of prevention, detecting, correction, deterrent, physical and compensation controls.
Exam Essentials
The three objectives of cybersecurity are confidential are, Integrity and availability confidentially. Confidentiality ensures that the unauthorized individuals are not able to gain access to sensitive information. Integrity ensures that there are no unauthorized modifications the informational systems either intentionally or unintentionally available ensures that information and systems are ready to meet the needs of literally the users at the time those users request them.
Security controls may be categorized based on mechanisms of actions and their intent. Controls are grouped into categories of managerial, operational and technical based on the way they achieve these objectives. They are divided into these the types of preventive detective correction. Current compensation and physical based on their intended purpose.
Data breaches have significant and device impacts on organizations. When and organization suffers a data breach resulting in data loss often results in both direct and indirect damages. The organization suffers immediate financial repercussions due to cost associated with incident response. As well as long term financial consequences because we are This reputational damage. Reputational damage may be difficult to quantify, but it also may have a lasting impact. In some cases, organizations may suffer. Operation damage if they experience availability damages, preventing them from accessing their own information.
Data must be protected in transit, at rest, and in use. Attackers may tempt to. He's drop. On network transmissions containing sensitive information, this information is highly vulnerable when trans transit unless protected by encrypted encryption technology attackers also. Attack is also my attempt to breach data storage, stealing data at rest. Encryption serves to protect stored data as well as data in transit. Data is also vulnerable while in use on a system, it should be protected during data processing activities.
Data loss prevention system blocked data exfiltration attempts. DLT technology enforces information handling policies to prevent data loss and theft. DLP systems may function. At the host level, using software agents to search systems for the presence of sensitive information. They may also work at network level, watching for transmission and unencrypted sensitive. Information. DLP Systems Direct system sentence sensitive information and using pattern matching technology and or digital water making.
Data minimization reduces risk of reducing the amount of sensitive data that we maintain.
In cases where we cannot simply discard unnecessary information, we can protect information through the de-identification, we can protect information through de-identification and data obfuscation. The tools used to achieve these goals include hashing, tokenization and the masking of sensitive fields.
Quiz Review Questions & Answers
Is this a Risk or Threat The answer is a Risk. Vulnerability. Risk = Threat × Vulnerability
2.Incorporate even more information into their decision-making process, including contextual information about users, applications, and business p. processes. They are state-of-the-art in network protection. Term -Next-generation firewalls (NGFWs). The answer is TURE.
3. NAC solutions use dedicated appliances that sit in between devices and the resources that they wish to access. They deny or limit network access to devices that do not pass the NAC authentication process.
Term In-Band vs. Out-of-Band Answer is True
4.is the cornerstone of any information security program. XXX must take the time to thoroughly understand their own technology environments and the external threats that jeopardize their information security. Term Cyber-security risk analysis. Answer is True.
5. This occur when individuals doing their routine work mistakenly perform an action that undermines security. For example, a system administrator might accidentally delete a critical disk volume, causing a loss of availability. Term Structural threats. Answer is False (This is an Accidental threats)
6. This occur when natural or man-made disasters occur that are outside the control of the organization. These might include fires, flooding, severe storms, power failures, or widespread telecommunications disruptions.
Term Accidental threats. Answer is False. (This is an environmental threats).
7.This in the world of cybersecurity is an outside force that may exploit a vulnerability. Term Threat Answer is True.
8. This occurs when equipment, software, or environmental controls fail due to the exhaustion of resources (such as running out of gas), exceeding their operational capability (such as operating in extreme heat), or simply failing.
due to age. Answer is environmental threat.
9. They are specialized firewalls designed to protect against XXX application attacks, such as SQL
injection and cross-site scripting.
Answer is Web application firewalls (WAFs)
10. may use agents running on devices
To obtain configuration information from the device. Devices that fail to meet minimum security standards, such as having incorrectly configured host firewalls, outdated virus definitions, or missing patches, may be either completely denied network access or placed on a special quarantine network where they are granted only the limited access required to update the system's security.
Answer is System Health (NAC Control)
11.
The technical work of the penetration test begins during the XXXX phase when attackers conduct reconnaissance and gather as much information as possible about the targeted network, systems, users, and applications. This may include conducting reviews of publicly available material, performing port scans of systems, using network vulnerability scanners and web application testers to probe for vulnerabilities, and performing other information gathering. Answer is Pentesting Discovery Phase 2
12 NAC Solution that requires that the device requesting access to the network run special software designed to communicate with the NAC service. XXXX approaches to NAC conduct authentication in the web browser and do not require special software. Answer is Agent-Based vs. Agentless
13.Limiting network access to authorized individuals and ensuring that systems accessing the organization's network meet basic security requirements. Example 802.1X. Answer is Network Access Control (NAC) Objectives.
14. This feed false information to malicious software that works its way onto the enterprise network. When a compromised system attempts to obtain information from an XXX server about its command-and-control server, the XXX server detects the suspicious request and, instead of responding with the correct answer, responds with the IP address of an XXX system designed to detect and remediate the botnet-infected system. Answer is DNS sinkholes
15. Users may be assigned to particular network segments based on their XXX in the organization. For example, a college might assign faculty and staff to an administrative network that may access administrative systems while assigning students to an academic network that does not allow such access. Answer is Role (NAC Control).
16.Users may be granted or denied access to network resources based on their physical XXX. For example, access to the datacenter network may be limited to systems physically present in the datacenter. Answer is Location (NAC Control).
17. Go beyond XXX and maintain information about the state of each connection passing through the firewall.
Answer is Stateful inspection firewalls.
18. Are systems, devices, software, and settings that work to enforce confidentiality, integrity, and/or availability requirements. Answer is technical controls.
19. Users may be authorized to access the network only during specific time periods, such as during business hours.
Answer is Time of Day (NAC Control.
20.Risk acceptance, risk avoidance, risk mitigation, and risk transference, to reduce the likelihood and impact of risks identified during risk assessments. Answer
Lert's now review the Summary Section in the Book - Today's Security Professional
1. What are Cybersecurity professionals responsible for? Cyber security is responsible for ensuring confidentiality, integrity and availability of information systems in their organization.
2. What does Confidentiality ensure? Confidentiality ensures that unauthorized are not able to gain access to sensitive information.
3. Tell me what does Integrity ensure? Integrity ensures that there are no unauthorized modifications to information or systems.
4. What are the three goals called in Cyber Security. Name them not just the initials?
Exam Essentials Review:
What are the security controls may be categorized based on the mechanisms of actions and their intent controls or group. Into categories of managerial, operational and technical based. On the way they achieve their objectives, they are divided into types of preventives, detective, correction, deterrent, compensation and physical based on their intended purpose.
Now the Cisco Learning Center has a course that I am registered in: See link attached:
https://skillsforall.com/launch?id=7662b32f-0a49-4d7a-b881-498eb3be42cc
Review:
Traditional data is typically generated and maintained by all organizations, big and small. It includes the following:
Internet of Things (IoT) and Big Data
Scroll down to find out more about the different elements of each dimension.
It’s obvious that cybercriminals are becoming more sophisticated in their pursuit of valuable personal data. But they also pose a huge threat to organizational data.
Select Next to find out more.
The security measures used to protect data."
What Do You Think?
A concerned customer has forwarded on what they believe to be a fraudulent email. It looks as if it has been sent by @Apollo but something appears a little 'phish-y.'
Dear Mrs. Appolo, as precautionary measures we restricted access to your account until you validate has been changed event further irregular activity. You'll be unable to access your account until this issue has been resolved. To fix security info, click below to reactivate your account. http://123contactform.com/contact-form-@polo.234.45674.html
Take a look at the email. Which of the following indicates that it is in fact a phishing email? Don’t forget, you have a chance to earn valuable defender points if you answer this correctly.
Select four correct answers, then Submit.
Customer name
The language, spelling and grammar
Graphics
Link URL
Email address
The one's in red is the correct answer.
This for Real?
Yes, phishing is very common and often works. For example, in August 2020, elite gaming brand Razer experienced a data breach which exposed the personal information of approximately 100,000 customers.
A security consultant discovered that a cloud cluster (a group of linked servers providing data storage, databases, networking, and software through the Internet), was misconfigured and exposed a segment of Razer’s infrastructure to the public Internet, resulting in a data leak.
It took Razer more than three weeks to secure the cloud instance from public access, during which time cybercriminals had access to customer information that could have been used in social engineering and fraud attacks, like the one you uncovered just now. Organizations therefore need to take a proactive approach to cloud security to ensure that sensitive data is secured.
Data Security Breaches
The implications of a data security breach are severe, but they are becoming all too common.
The Persirai botnet
In 2017, an Internet of Things (IoT) botnet, Persirai, targeted over 1,000 different models of Internet Protocol (IP) cameras, accessing open ports to inject a command that forced the cameras to connect to a site which installed malware on them. Once the malware was downloaded and executed, it deleted itself and was therefore able to run in memory to avoid detection.
Over 122,000 of these cameras from several different manufacturers were hijacked and used to carry out distributed denial-of-service (DDoS) attacks, without the knowledge of their owners. A DDoS attack occurs when multiple devices infected with malware flood the resources of a targeted system.
The IoT is connecting more and more devices, creating more opportunities for cybercriminals to attack.
Equifax Inc.
In September 2017, Equifax, a consumer credit reporting agency in the United States, publicly announced a data breach event: Attackers had been able to exploit a vulnerability in its web application software to gain access to the sensitive personal data of millions of customers.
In response to this breach, Equifax established a dedicated website that allowed Equifax customers to determine if their information was compromised. However, instead of using a subdomain of equifax.com, the company set up a new domain name, which allowed cybercriminals to create unauthorized websites with similar names. These websites were used to try and trick customers into providing personal information.
Attackers could use this information to assume a customer’s identity. In such cases, it would be very difficult for the customer to prove otherwise, given that the hacker is also privy to their personal information.
If you are ever faced with a similar situation, quickly verify if your information was compromised, so that you can minimize the impact. Keep in mind that, in a time of crisis, you may be tricked into using unauthorized websites.
Always be vigilant when providing personally identifiable information over the Internet. Check your credit reports regularly and immediately report any false information, such as applications for credit that you did not initiate or purchases on your credit cards that you did not make.
Consequences of a Security Breach
Reputational Damages:
A security breach can have a negative long-term impact on an organization’s reputation that has taken years to build. Customers, particularly those who have been adversely affected by the breach, will need to be notified and may seek compensation and/or turn to a reliable and secure competitor. Employees may also choose to leave in light of a scandal.
Depending on the severity of a breach, it can take a long time to repair an organization’s reputation.
Vandalism
A hacker or hacking group may vandalize an organization’s website by posting untrue information. They might even just make a few minor edits to your organization’s phone number or address, which can be trickier to detect.
In either case, online vandalism can portray unprofessionalism and have a negative impact on your organization’s reputation and credibility.
Thief
A data breach often involves an incident where sensitive personal data has been stolen. Cybercriminals can make this information public or exploit it to steal an individual’s money and/or identity.
Loss of revenue
The financial impact of a security breach can be devastating. For example, hackers can take down an organization’s website, preventing it from doing business online. A loss of customer information may impede company growth and expansion. It may demand further investment in an organization’s security infrastructure. And let’s not forget that organizations may face large fines or penalties if they do not protect online data.
Damaged intellectual properties
Cybercriminals are constantly finding new ways to attack and, eventually, they will succeed.