Security Fundamentals
06/01/2021
As the threat landscape evolves, cybersecurity needs emerge and are considered as a continuous effort to enable better protection, detection, and mitigation of attacks. This course, CSOL500 introduced basic concepts and terminologies of cybersecurity. It also has enlightened students on the latest cyber threat landscape and enabled us to better understand the granular details of the most recent breaches, types of attacks, and remediation.
Artifacts
As part of Cyber Security Foundation journey, we did research on many security areas which include threat categorization, vulnerability assessment, encryption policy for an enterprise class organization. I prefer to provide details on these artifacts because of their key critical nature and relevance as we moved to digital era. 1) Threats and VulnerabilitiesDigital Transformation ?
We know digitization is the 19 trillion-dollar opportunity and we are seeing an exponential growth in online devices from 15B today to an expected 500B by 2030.Today's rapidly evolving business models are reflected in trends like mobility and BYOD.New business models are driving opportunity and competitive advantage for companies. Countries and companies are bringing all their business processes online.
Who is the most beneficiary of Digital Shift ?
The industry that's benefiting the most from digitization is the hacking industry. And it's big business. It's estimated to be anywhere from half a trillion to a trillion dollars a year. And as a result, the actors in this business have changed. These are nation states, hactivist, and organized crime syndicates. These active adversaries are highly organized, they're well financed, and they're extremely patient. They know exactly the target they're after. They know what data inside of that target they're after. They know who's likely to have access to that data, they know some likes and dislikes of the people they're targeting, and they even know the defenses that the organization is deploying to stop them. This is the world of advanced persistent threats. Custom threats built just for the target. And it's the collision between the opportunity of digitization and the rise of industrialized hacking that's causing new challenges for our customers.
Threat Analysis
There seems to be a never-ending series of cyber threats striking on organizations these days. From ransomware to crypto-mining to state nexus threat actors, it feels like every day a new group is labeled or malware family is discovered. Keeping up with these threats can be daunting-until we consider what it takes to defend against them.
According to Rapid7, when a criminal is trying to hack an organization, they won't re-invent the wheel;They'll draw upon common types of hacking techniques that are known to be highly effective, such as malware, phishing, or cross-site scripting (XSS). Whether you're trying to make sense of the latest data breach headline in the news or analyzing an incident in your own organization, it helps to understand the different ways an attacker might try to cause harm. Here's an overview of some of the most common types of attacks seen today.
- Malware
- Phishing
- SQL Injection
- Cross-Site Scripting
- Denial-of-Service
- Session Hijack and Man-in-the-Middle
Vulnerability Assessment
A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.A vulnerability assessment process that is intended to identify threats and the risks they pose typically involves the use of automated testing tools, such as network security scanners, whose results are listed in a vulnerability assessment report.
Some of the different types of vulnerability assessment scans include the following:
- Network-based scans are used to identify possible network security attacks. This type of scan can also detect vulnerable systems on wired or wireless networks.
- Host-based scans are used to locate and identify vulnerabilities in servers, workstations or other network hosts. This type of scan usually examines ports and services that may also be visible to network-based scans, but it offers greater visibility into the configuration settings and patch history of scanned systems.
- Wireless network scans of an organization's Wi-Fi networks usually focus on points of attack in the wireless network infrastructure. In addition to identifying rogue access points, a wireless network scan can also validate that a company's network is securely configured.
- Application scans can be used to test websites in order to detect known software vulnerabilities and erroneous configurations in network or web applications.
- Database scans can be used to identify the weak points in a database so as to prevent malicious attacks, such as SQL injection attacks.
Common Types of Cyber Security Attacks
Vulnerability Assessment (Vulnerability Analysis)
Cisco Talos - Threat Intelligence 2) Encryption
There are numerous cryptographic algorithms have been developed and used in many different protocols and functions. Cryptography is by no means static. Steady advances in computing and the science of cryptanalysis have made it necessary to adopt newer, stronger algorithms and larger key sizes. Older algorithms are supported in current products to ensure backward compatibility and interoperability. However, some older algorithms and key sizes no longer provide adequate protection from modern threats and should be replaced. Cryptography can provide confidentiality, integrity, authentication, and nonrepudiation for communications in public networks, storage, and more. Some real-world applications include protocols and technologies such as VPN networks, HTTPS web transactions, and management through SSH.
Over the years, some cryptographic algorithms have been deprecated, "broken," attacked, or proven to be insecure. There have been research publications that compromise or affect the perceived security of almost all algorithms by using reduced step attacks or others such as known plaintext, bit flip, and more. Additionally, advances in computing reduce the cost of information processing and data storage to retain effective security. Because of Moore's law and a similar empirical law for storage costs, symmetric cryptographic keys must grow by 1 bit every 18 months. For an encryption system to have a useful shelf life and securely interoperate with other devices throughout its life span, the system should provide security for 10 or more years into the future. The use of good cryptography is more important now than ever before because of the very real threat of well-funded and knowledgeable attackers.
Cryptographic algorithms, in general, are divided into the following categories:
- Symmetric key algorithms: These algorithms share the same key for encryption and decryption. Examples include Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES).
- Public key algorithms: These algorithms use different, mathematically related keys for encryption and decryption. Examples include Digital Signature Algorithm (DSA) and the Rivest-Shamir-Adleman (RSA) algorithm.
- Elliptic curve algorithms: These algorithms function over points that belong to elliptic curves. Examples include Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA).
- Hash: These algorithms provide a constant-sized output for any input and their most important property is irreversibility.
Next Generation of Encryption
Arora, M. (2012, June 5th) How secure is AES against brute force attacks
Brekle, Katherine (2017, Jan 19) Encryption - What would it take to crack it Reflection
Cyber Security Foundation course offers great insight on various artifacts; however, in my opinion, a) Threat & Vulnerabilities and b) encryption are very much relevant in today's digital world. Their importance is undeniable, where we have breaches due to vulnerabilities, and malware is the vehicle.
- Threat and Vulnerabilities
A broader and better understanding of cybersecurity ethics is therefore essential to promoting and protecting human flourishing in an increasingly networked society.
- Encryption