CyberSecurity Fundamentals

Ace your homework & exams now with Quizwiz!

CIA Triad: Availability

- Guranteeing reliable access to data for authorized users -Tools and Technniques: Redundancy, Failover Systems, DDoS protection

Risk Managemet

- involves the policies procedures and technology used by an organization to control threats to protect assets -process of identifying, analyzing and mitigating potential threats to IT systems and data -Goal protect organizational assets, ensure data integrity, and maintain availability while maximizing business value

Quantitative risk Assessment

-A risk assessment approach that involves numerical, measurable, and often statistical data Key features -Based on numerical data -uses objective metrics -allows for precise comparisons and calculations

Hash Functions Properties

-Deterministic: The same input will always produce the same output -Fixed Output Length: The length of the output is fixed regardless of the input's length Efficiency: Computation of the hash value is fast and efficient Pre-image Resistance: Given a hash value, it should be computationally infeasible to find the original input value Collision Resistance: It should be computationally infeasible to find two different inputs that produce the same output hash Second pre-image resistance: Given an input, in should be computationally infeasible to find a different input with the same hash output Avalanche Effect: A small change to the input should produce such a drastic change in output that the new hash appears uncorrelated with the old hash

Technical controls examples

-Encryption -Firewalls -Intrusion Detection Systems(IDS) and Intrusion Prevention System (IPS) -Multi-factor Authentication (MFA) -Security Patches and updates -Access controls (username, passwords, etc) -Log management systems -Antivirus software

CIA Triad: Integrity

-Ensuring data is accurate and unchanged from its original state -Tools and Techniques: Hashing, Digital signatures, Checksums

Asymmetric Keys (public and private keys)

-In assymetric key Cryptography, two keys are used: a public key and a private key -The public key is used for encrypton, and the private key must be kept secret. -Examples of asymmetric key algorithms include RSA (Rivest-Shamir-Adleman) and EC (Elliptic Curve Cryptography)

Symmetric key

-In symmetric-key cryptography, the same key is used for both encryption and decryption -Both the sender and the receiver must have the key, and they must keep it secret from everyone else. Ex of symmetric key algorithms include AES (Advanced encryption standard) and DES (Data Encryption standard)

Payment Card Industry Data Security Standards (PCI DSS)

-Original members of the PCI Security Standards Council -American Express, Discover Financial Services,Mastercard, Visa -Standards for processing credit card transactions -country Club Rules (all of the original members that came together set up the rules

Social Engineering Life Cycle: Extract

-Phase where the attacker gets the desired information or action from the target Methods: Manipulation, pressure, invoking authority or urgency Examples: Getting the target to click a link, divulge a password, transfer money Goal: Fulfill the objective of the attack

Social Engineering Life Cycle:Research

-Phase where the attackers gathers as much information as possible about the target Methods: Online research, dumpster diving, eavesdropping, etc Goal: Understand the target, find vulnerabilities and plan the attack

CIA Triad: Confidentiality

-Preventing unauthorized disclosure of data - Tools and techniques: Encryption, access Controls, Two-Factor Authentication

Operational Controls: Examples

-Security awareness training sessions -configuration management -backup and recovery procedures -Malware scanning and eradication -Physical security (like security guards, access controls for restricted areas) -media handling and disposal(secure destruction of paper records) -Incident handling procedures

NIST vs ISO

-Select a Framework and Controls that are consistent with the Security Team's capability and organization's maturity -Simpler Security Frameworks make greater sense for smaller less experienced security teams - Security frameworks like the NIST CST and control catalogs are easier and faster to implement - Larger teams at a higher level of capbility maturity potentially have the caacity and abilitiy to adopt more detailed security and control frameworks including ISO27001 andISO 27002

Symmetric Cryptography Usage

-Symmetric key cryptography is often used in conjunction with asymmetric cryptography. For example in secure communications, asymmetric cryptography may be used to exchange a symmetric key securely, which is then used to encrypt the actual data transmission -Symmetric key cryptography plays a crucial role in securing communications and data, especially in scenarios where performance and efficiency are critical.

Social Engineering Life Cycle: Hook

-The engagement Phase where the attacker makes the first contact with the target Techniques: Phishing emails, pretext phone calls, baiting with incentives Goal: Get the target's attention and intiate interaction -Build and foster the relationship/impersonation -Scare target/consequences/intimidation -Motivate/give target a reason to act

Choosing Hash Functions

-When selecting a hash function for cryptographic purposes, it's crucial to choose one that has been vetted for collision resistance, such as those in the SHA-2 or SHA-3 families -Understand the Birthday Paradox and Birthday attack to understand the probability of collisions and security implications

Hash Functions

A hash function is a mathematical function that takes an input or message and returns a fixed-size string of bytes. The output, typically a digest, is unique to each unique input

Risk Register

A list of risks associated with a system or an entire infrastructure, a part of risk management.

Qualitivative Risk Assessment

A risk assessment approach that involves subjective judmgent based on non-numerical information Key features -Based on descriptions, categorizations, and expert opinions -Typically uses scales like "low-Medium-High" -involves more subjective interpretation

Asymmetric Cryptography Advantages and Disadvantages

Advantages -Security: It's extremely difficult to derive the private key from the public key, which enhances security -Non-repudiation: The creation of digital signatures ensures the origin and integrity of messages, providing non-repudiation -Key distribution: public keys can be freely shared, eliminating the key distribution problem associated with symmetric cryptography Disadvantages -Performance: Asymmetric cryptography is computationally intensive and significantly slower than symmetric cryptography. It's often impractical for encrypting large amounts of data key Management: Users need to manage their key pairs securely, and public keys need to be distributed in a trustworthy manner

Symmetric Cryptography Advantages and disadvantages

Advantages: -Efficiency: Symmetric key cryptography is generally faster and less computationally intensive than asymmetric cryptography. This makes it suitable for encrypting large amounts of data or for use in environments with limited computational resources -Simplicity: The use of a single key simplifies the process compared to schemes that require multiple keys. Disadvantages: Key Distribution Problem: Securely distributing and managing the secret key among parties is a significant challenge. If the key is intercepted during exchange, the security of the communication is compromised Scalability: In a network of n users, if each pair of users requires a unique secret key, the total number of keys required is n(n-1)/2, This makes symmetric key cryptography less scalable for a large number of users Lack of Authentication: Symmetric Key cryptography alone does not provide authentication or non-repudiation

Management Controls

Also sometimes referred to as Administrative Controls -purpose --These are the strategies, policies, procedures, and guidelines an organization establishes for overall direction and oversight of cybersecurity -They dictate the how-to at a high level and ensure that procedures and policies are in place to manage the security of the organization

Unsecured Apis

Application programming interfaces unsecured on network or internet

Risk management: Risk analysis

Assessing the potential impact and probability of identified risk

The Birthday Paradox

Based on probability with 23 people 50% chance 2 will have same birthday in the context of hash functions, the birthday paradox is used to explain the probability of collision occurances -A collision in a hash function occurs when two different inputs produce the same hash output -The paradox heps to understand that collisions are more likely than one might expect

Asymmetric Cryptography basic principle

Basic Principle:term-81 - Encryption: A message can be encrypted with the recipient's public key. Only the corresponding private key can decrypt this message -Decryption: the recipient users their private key to decrypt the message Key Pair: - Public key: This key is shared openly and can be distributed to anyone. It is used to encrypt messages intended for the key owner to verify signatures -Private Key: This key is kept secret is never shared. It is used to decrypt messages or to create digital signatures

Countering the Insider Threat

Challengers: Insiders have legitimate access, making malicious activities harder to detect -Can exploit trust and bypass standard defenses -Knowledge of internal systems and practices Mitigation Strategies: -Regular audits of user activity. -Strong access control (principle of least privilege) -Employee training and awareness programs -Anomaly detection systems

Guarding against DoS/DDoS attacks

Challenges: -Volume and intensity of attacks -Variety of attack vectors (eg volumetrc, protocol, application layer attacks -ever-evolving tactics Defense Strategies -Employ DDoS protection services -implement traffic filtering and rate limiting -Redundant infrastructure and scalability -Monitor, detect, and respond to unusual traffic patterns swiftley

Risk management: Risk monitoring

Continuous observation of the risk environment. Adjusting strategies based on changes in the landscape or organization's risk appetitie

Social Engineering

Defense Against Social Engineering: -Training and awareness Cultivate a skeptical and informated workforce -Technical measures: Anti-phishing tools, secure communication channels, multi-factor authentication -Verification protocols: Always double-check before sharing sensitive information -Reporting: encourage employees to report suspicious interactions -Cultural shift Creating a culture of security mindfulness

Asymmetric Cryptography

Definition: Asymmetric cryptography, also known as public key cryptography, is a cryptographic system that uses a pair of keys: a public key and a private key. These keys are mathematically related but it is computationally infeasible to derive one from the other

DevSecOps Security

Definition: Ensures the confidentiality, integrity, and availability of applications and data - Role: Continuous security training, vulnerability assessments, and security awareness among developers

DevSecOps Development

Definition: Focusing on software development, including writing code, testing, and deploying applications DevSecOps role: implementing code-level security measures, such as secure coding practices and regular code reviews

Cyber Organized Crime

Definition: Groups that coordinate and conduct illegal activities in the digital space for financial gain. Characterstics: Highly structured, specialized roles, long-term goals Activities: Cyber extortion, money laundering, fraud, trafficking, and more Examples: Cybercrime rings involved in global ransomware attacks

DevSecOps Operations

Definition: Manages IT infrastructure, including deployment, maintenance, and monitoring Role: Automated deployments, infrastructure as code, and real-time monitoring for security incidents

Symmetric Cryptography

Definition: Symmetric key cryptography, also known as secret key cryptography, is a type of cryptography in which the same key is used for both encryption and decryption processes

Social Engineering

Definition: The pyschological manipulation of individuals to divulge confidential information or perform certain actions Highlights -Humans can often be the weakest link in security -Even the best technical defenses can be bypassed through human manipulation

The Insider Threat

Definition: Threats posed by individuals who have insider information concerning an organization's security practices, data, and computer system Types of insiders: current or former employees, contractors, business partners motivation: Financial gain, revenge, ideology, coercion, negligence ex: data leakage, intentional system sabotage, theft of intellectual property

Risk management: Risk treatment/response

Determining appropriate strategies: Avoidance, Mitigation, transfer, or acceptance. Implementing controls or changes to address risks.

Symmetric Cryptography Basic principles

Encryption: The plaintext(original data) is converted into ciphertext(encrypted data) using a cryptographic algorithm ad a secret key Decryption: The ciphertext is converted back into plaintext using the same cryptographic algorithm and the same secret key Key Sharing -both the sender and the receiver must have access to the secret key, and this key must be exchanges securely between the before communication begins

FERPA

Family Educational Rights and Privacy Act Protects the privacy of student educational records Health records maintained by an educational instution related to a student

Vulnerabilities

Faults or weakness that can be exploited -Interanl control flaws, system procedure flaws, information systems flaws two categories -Technical vulnerabilities ---Flaws in hardware/software -Human vulnerabilities --Employee errors, policy and procedures

Use Cases Quantative Risk Assessment

Financial Risk: Calculating potential financial losses using historical data Infrastructure Risk: Evaluating the probability of system failure based on pervious failure rates Market Risk: Forecasting potential market fluctuations based on statistical analysis

Framework and Standards

Framework: a set of principles that set guidelines Standard: an agreed level of requirements that contain specific requirements and metrics why follow: Assist in managing and reducing overall risks - allow organization to prioritize security planning and budgeting -assists with compliance and audit requirements -typically contain best practices and universally applicable

FERPA and HIPAA difference

HIPAA protects patient health information in healthcare settings FERPA covers medical/health records at educational institutions When a student health records fall under FERPA, they are excluded from HIPAA's Privacy Rule.

Hash Function Operations

Hashing:The process of applying the hash function to input data. Hash Value or Digest: The output of the hash function Hash Vertification: Comparing a computed hash value against a known hash value to check data integrity Security concerns -The security of a hash function is paramount, especially in cryptographic and security applications. Weaknesses in hash functions can lead to vulnerabilities such as collision attacks where two different inputs produce the same hash outpt

HIPAA

Health Insurance Portability and Accountabilty act of 1996 -protects the privacy and security of individuals' health information -cybersecurity is important for HIPAA --Rising cyber threats in healthcare --Personal Health information PHI is valuable on the black market --Ensures trust between patients and healthcare providers protects PHI protected Health information -HIPAA covers doctorsm clinics, dentists, health insurance companies, HMOS and more

Risk management: Cycle

Identify -> Analyze - > Prioritize -> treat/respond -> monitor -> identify

NIST Five functions

Identify Function: assists in developing an organizational understanding of managing cybersecurity risk to systems, people, assets, data, and capabilities Protection function:Supports the ability to limit or contain the impact of potential cybersecurity events and outline safeguards for delivery of critical services Detect Function: defines the appropriate activities to identify the occurrence of a cbersecurity event in a timely manner Respond Function: Includes appropriate activities to take action regarding a detected cybersecurity incident to minimize impact Recover Function: The Recover Function identifies appropriate activities to maintain plans for resilience and to restore services impaired during cybersecurity incidents

Nation State Sponsored attacks

Implications -Erosion of trust in global digital systems -Potential for escalation into physical conflict -Economic and infrastructure vulnerability Countermeasures -International cooperation and cyber treaties -Robust national cyber defense capabilities -threat intelligence sharing and collective defense

Inherent Risk vs Residual Risk vs Control Risk

Inherent Risk -Amount of risk before any measures are taken Residual Risk -Amount of Risk that remains after measures/controls are implemented Control Risk -Effectiveness of measures over time

Man-in-the-Middle Attack

Intercepting Digital Conversations Definition: Unauthorized interception of communication between two systems Execution: Wi-Fi eavesdropping, session hijacking Goal: Data theft, eavesdropping, session tampering Countering MiTM -use encrypted connections(HTTPS, VPSN) -Avoid Publics Wi-Fi or Use VPN -Certificate validations

ISO

International Organization for Standardization - 27k information security standards -31k enterprise risk management 14 control domains

Mass Privacy laws and regulations

Law/Statue Chapter 93 Security breaches Regulation: 201 CMR 17.00: standards for the protection of personal information of residents of the commonwealth In short, 201 CMR 17.00 is a law that helps to protect your privacy. If you live in Massachusetts, you have the right to know what personal information businesses have about you and to have it corrected or deleted. You also have the right to give your consent before your personal information is used or disclosed for certain purposes. Laws are less extensive than california laws

CyberSecurity Controls

Managerial Controls, Operation Controls, Technical Controls

NIST

National institute of Standards and Technology -part of the department of Commerce -NIST is non regulatory Different Frameworks - Cybersecurity Framework(CSF) - Risk Management Framework(RMF) - Federal Information Processing Standards (FIPS) - Special Publication

Control Riks

Objective: Implement measures to manage amdn mitigate identified risks Approaches: -Avoidance: Not engaging in activities or processes that lead to the risk -Reduction: Implementing safeguards -Transfer: Buying insurance or outsourcing risky activities -Acceptance: Recognizing the risk and preparing contingencies

PAIN - Four pillars of CyberSecurity

Privacy - protecting information Authentication-Determining if you are who you say you are Integrity- Knowing that something (data) wasn't altered n Non-repudiation- A party can't deny they said or received a message - Can also include Authentication and Integrity

Pros and cons of Quantative Risk Assessment

Pros: -Clear metrics for comparison -Can provide a return on investment(ROI) estimation -offers probabilistic outcomes Cons: -Requires specific and accurate data -can be time-consuming -Might oversimplify complex issues

Pros and Cons of Qualitative Risk Assessment

Pros: -Useful when data is scarce or hard to quantify -Faster and more intuitive -facilitates discussion on ambiguous or emerging risks Cons: -Lacks precision -Can be influenced by biases -May not be as robust for decision-making

Operational Controls:

Purpose: These controls are mechanisms and procedures that are primarily implemented and executed by people. They often become standard operations for employees and are put in place to address operational aspects of cybersecurity Cybersecurity training

Cybersecurity Operational Groups: Security Operations Center (SOC)

Purpose: A dedicated facility where security professionals monitor, assess, and defend computer systems, networks, and data from cyber threats. Functions include incident detection, response and continuous monitoring teams - Red Team: mimics real world cyber attacks to find vulnerabilities before hackers do -blue Team: defends against both real and simulated cyber attacks, they identify and patch vulnerabilities, monitor networks, and respond to incidents -Purple Team: Collaborative effort betweenRed and Blue teams. The goal is to ensure that defenses are continuously improved by integrating the strengths of both attack Red and Defense Blue activities

CyberSecurity Operational Groups: DevSecOps

Purpose: DevSecOps promotes a collaborative mindset among the development, security, andd operations teams, ensuring that security measures are embedded in the pipeline from the very beginning Benefits of DevSecOps - Faster detection and response to security threats -reduced vulnerability exposure -Enhanced colllaboration among teams -Improved compliance and governance

Cybersecurity Operational groups: Incident Response

Purpose: Incident response teams are specialized groups that handle and respond to security incidents, ensuring timely mitigation and recovery Teams - Cyber Incident Response Team(CIRT) focuses on responded to cyber incidents, related specifically to cyber threats like hacks, malware, or phishing attacks -Computer security incident Response team(CSIRT) A dedicated service or a group of experts that respond to computer security-related incidents. Their scope may cover an entire organization or be specific to a particular entity -Computer Emergency response Team(CERT) Typically handles a broader spectrum of emergencies, including network breaches, data breaches, and catastrophic events, some CERTs operate on a national level, providing cybersecurity and incident response guidance to the public and private sectors.

Technical Controls

Purpose: These controls are the hardware and software mechanisms used to protect systems and data. They provide automated protection from unauthorized access or misuse, facilitate detection, and support security requirements via technology.

Risk management: Risk Prioritization

Ranking risks based on their potential impact and liklihood. Helps allocate resources effectively

Risk Management: Risk Identification

Recognizing potential threats and vulnerabilities

use cases-Qualitative Risk Assessment

Reputational Risk: Gauging the potential damage to reputation from a negative event Strategic Risk: Evaluating potential challenges to long-term business strategies. Emerging Risks: discussing new risks for which there is limited historical data

Social Engineering Life Cycle

Research Hook Extract Exit

Risk posture and risk appetite

Risk Posture: Overall defenses against attacks Risk Appetite: How much risk you are willing to accept

Examples of Cryptographic Hash Functions

SHA-256 (Secure hash Algorithm 256) part of the SHA-2 family widely used and provides a 256 bit long hash v alue SHA-3: The latest member of the Secure Hash Algorithm afmily, providing the same hash lengths as SHA-2 MD5(Message Digest Algorithm 5) Produces a 128 bit hash value, but is no longer considered secure against collision attacks SHA-1: Produces a 160 bit hash value, but is also no longer considered secure agaisnt collision attacks

Asymmetric Cryptography Usage

Secure Communication: Asymmetric cryptography can be used to establish a secure channel over an insecure medium (ex the internet) Often it's used to exchange a symmetric key, which is then used for the bulk of encryption of data Digital Signatures: it's used to create and verify digital signatures, ensuring the authenticity and integrity of data Public key Infrastructure (PKI) Its the foundation of PKI, which establishes trust through digital certificates and certificate authorities (CA)

Cybersecurity operational groups

Security Operations Center (SOC) - Teams(Red/Blue/Purple) Incident response -Cyber incident response team (CIRT) - Computer security incident response team (CSIRT) -Computer emergency response team (CERT) DevSecOps -Development, Security, and Operations

Management Controls: Examples

Security Policies and procedures -Risk management processes -Training and awareness programs -Personnel Security(background checks, job rotation etc.) -Incident Response Plans -Business Continuity and Disaster Recovery plans Vendor management processes -Security audits and reviews

California Consumer privacy ACT CCPA and California Privacy Rights Act (CPRA)

Strongest state privacy rights and regulations in the United States The CCPA creates six rights for consumers 1. The right to know what personal info is beinng collected 2.The right to deleted personal information collected from the consumer 3. The right to opt out of the sale of PI 4. The right to opt in to the sale of personal information 5. The right to non-discriminatory treatment 6. The right to initiate a private cause of action for data breaches CPRA adds two additonal rights 7. right to correct inaccurate personal information 8. The right to limit use and disclosure of sensitive personal information

Digital Crime Syndicate

Tactics - Advanced Persistent Threats -sophisticated malware and ransomware campaigns -multi-layered phishing and fraud schemes Impacts: -Massive financial losses globally -Compromise of critical infrastructure -Loss of public and private data Protection measures -Collaborative global cybersecurity efforts -Advanced threat detection systems -Public awareness and education

CIA TRIAD

The CIA triad represents the three fundamental objectives of information security purpose: To protect sensitive data from unauthorized access and modifications while ensuring it's available when needed.

Social Engineering Life Cycle: Exit

The conclusion phase where the attacker breaks off contact without arousing suspicion Tactics: Erasing traces, creating diversions, ensuring no immediate realization of the scam Goal: Leave without being detected or traced

Safe-harbor state

a Safe-harbor state allows for encrypted data to "walk out the door" A safe-harbor state for encrypted data is a state that has laws that protect businesses from liability if their encrypted data is breached. This means that businesses can encrypt their data with confidence, knowing that they will not be held responsible for a breach if it does occur. Massachussetts is not a safe-harbor state, California is

Multi-Factor authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

Social Engineering Red flags and awareness

common signs of social engineering attempts -Urgency or time pressure -Unusual requests or offers -Inconsistencies in details -Requests for sensitive information -Importance of always verifiying the authenticity of suspicious or unexpected communications

Dos/DDOS

definition DoS(denial of Service):Overwhelming a single target with data or requests DDoS(Distributed Denial of Service): Using multiple compromised systems to flood a target Objective: Disrupt services, cause downtime, divert attention from other attacks comon methods: Traffic flooding, exploiting vulnerabilities, resource exhaustion ex: Major website outages, online service disruptions

Nation State Sponsored attacks

definition: Cyber operations backed or conducted by national governments to achieve strategic, military, or political objectives characteristics: Highly sophisticated, persistent, and well-funded motivations: Espionage, geopolitical leverage, infrastructure sabotage, influence operations ex: Stuxnet(targeting Iranian nuclear facilities


Related study sets

Management: Chapter 6 (Organizational Strategy)

View Set

Government Vocabulary - Unit 1 Chapter 6

View Set

GNB NF, GPB, Mycobacterium, Anaerobes updated 4-25-21

View Set

High-Risk Intrapartum Practice Questions

View Set

Business Statistics: Describing Data

View Set

NCLEX-RN Review - Test 7 - The Client with Biliary Tract Disorders

View Set

med term chapter 10 urinary system

View Set