Notes Cybersecurity
Notes Cybersecurity
Cybersecurity ( also known as security ) is the practice of ensuring confidentiality, integrity. And
availability of information by protecting networks, devices, people, and data from unauthorized access or
criminal exploitation. (imp.)
-security framework are guidelines used for building planes to help mitigate risks and threats to data
and privacy.
-security controls are safeguards designed to reduce specific security risks. They are used with security
frameworks to establish a strong security posture.
-security posture is an organization’s ability to manage its defense of critical assets and data and react
to change. A strong security posture leads to lower risk for the organization.
-threat actor or malicious attacker, is any person or group who presents a security risk. This risk can
relate to computers, applications, networks, and data.
An internal threat can be a current or former employee, an external vendor, or a trusted partner who
poses a security risk. At times, an internal is accidental. For example, an employee who accidentally
clicks on a malicious email link would be considered an accidental threat. Other times, the internal
threat actor intentionally engages in risky activities, such as unauthorized data access.
-Network security is the practice of keeping on organization’s network infrastructure secure from
unauthorized access. This include data, services, systems, and devices that are stored in an
organization’s network.
-Cloud security is the process of ensuring that assets stored in the cloud are properly configured, or set
up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of
a collection of servers of computers that store resources and data in remote physical locations known as
data centers that can be accessed via the internet. Cloud security is growing subfield of cybersecurity
that specifically focuses on the protection of data, applications, and infrastructure in the cloud.
-programming is a process that can be used to create a specific set of instructions for a computer to
execute tasks.
Notes from the video : ^Transferable skills > skills from other areas that can apply to different careers.
> Communication : As a cybersecurity analyst, you will need to communicate and collaborate with
others. Understanding others’ questions or concern and communicating information clearly to
individuals with technical and non-technical knowledge will help you mitigates security issues quickly.
> Collaboration
> Analysis
> Problem solving : one of your main tasks as cybersecurity analyst will be to proactivity
^Technical skills > skills require knowledge of specific tools, procedure, and policies.
> programming language
> security information and event management (SIEM) tools
> intrusion detection system (IDS)
> threat landscape knowledge
> incident response
Collaboration : means working with stakeholders and the other team members. Security analysts
often use this skill when responding to an active threat. They’ll work with other when blocking
unauthorized access and ensuring any compromised system are restored.
Using SIEM tools : When security analysts need to review vulnerabilities, they conduct a
periodic security audit. This is a review of an organization’s records, activities, and related
documents. During audits, Security Information and Event Management (SIEM) tools help
analysts better understand security threats, risks, and vulnerabilities. identifying
Cloud security : the process of ensuring that assets stored in the cloud are properly configured and
access to those assets is limited to authorized users.
Internal threats : a current or former employee, external vendor, or trusted partner who poses a security
risk.
network security : the practice of keeping an organization’s network infrastructure secure from
unauthorized access.
personally identifiable information PII : any information used to infer an individual’s identity.
security posture : an organization’s ability to manage its defense of critical assets and data and react to
change.
sensitive personally identifiable information SPII : a specific type of PII that falls under stricter
handling guidelines.
technical skills : skills that require knowledge of specific tools, procedures, and policies.
ex: -Automating tasks with programming.
-applying computer forensics.
if the someone outside of an organization attempts to gain access to its private information. What type
of threat does called → external threats.
Phishing : is the use of digital communications to trick people into revealing sensitive data or deploying
malicious software.
Malware : is software designed to harm device or networks. There are many types of malware. The
primary purpose of malware is to obtain money, or in some case, an intelligence advantage that can be
used against a person, an organization, or a territory.
The common type of malware attacks :
Viruses : malicious code written to interfere with computer operation ad cause damage to data and
software. A virus needs to be initiated by user i.e. threat actor, who transmits virus via a malicious
attachment or file download. When someone opens the malicious attachment or download, the virus
hides itself in other files in the now infected system. When the infected file are opened, it allow the virus
to insert its own code to damage and/or destroy data in the system.
worms : malware that can duplicated and spread itself across system on its own. In contrast to a virus, a
worm does not need to be downloaded by a user. Instead, it self-replicates and spreads from an already
infected computer to other devices on the same network.
ransomware : a malicious attack where threat actors encrypt an organization’s data and demand
payment to restore access.
Spyware : malware that’s used to gather and sell information without consent. Spyware can be used to
access devices. This allows threat actors to collect personal data, such as private email, text, voice and
image recordings, and locations.
Social engineering : is a manipulation technique that exploits human error to gain private information,
access, or valuables. Human error is usually a result of trusting someone without question. It’s the
mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to
exploit as many people as possible.
The common type of social engineering attacks :
Social media phishing : a threat actor collects detailed information about their target from social media
sites. Then, they initiate an attack.
Watering hole attack : a threat actor attacks a website frequently visited by specific group of users.
USB baiting : a threat actor strategically leaves a malware USB stick for an employee to find and install,
to unknowingly infect a network.
Physical social engineering : a threat actor impersonate a employee, customer, or vendor to obtain
unauthorized access to physical location.
The 8 CISSP domains : Certified Information System Security Professional qualification is one the most
respected certification in the information security industry, demonstrating an advanced knowledge of
cyber security 8 CISSP domains
[Link] and risk management [Link] Security [Link] Architecture and engineering
[Link] and network security [Link] and access management [Link] assessment and
testing [Link] operations [Link] developing security.
Attack types :
• Brute force.
• Rainbows table
Password attacks fall under the communication and network security domain.
Physical attack : is a security incident that affects not only digitals but also physical environments
where the incident is deployed. Some forms of physical attacks are :
Adversarial artificial intelligence : is a technique that manipulates artificial intelligence and machine
learning technology to conduct attacks ore efficiently. Adversarial artificial intelligence falls under both
the communication and network security and the identity and access management domains.
Cryptographic attack : a affects secure forms of communication between a sender and intended
recipient. Attacks are :
• Birthday
• Collision
• Downgrade
Cryptographic attack fall under the communication and network security domain.
Understand attackers : as a reminder a threat actor is any or group who presents a security risk.
Advanced persistent threats : (APTs) have significant expertise accessing an organization’s network
without authorization. APTs tend to research their targets e.g. large corporations or government
entities in advance and can remain undetected for an extended period of time. Their intention and
motivations can include :
• Damaging critical infrastructure, such as the power grid and natural resources
Insider threats
Insider threats abuse their authorized access to obtain data that may harm an organization. Their
intentions and motivations can include:
• Sabotage
• Corruption
• Espionage
• Unauthorized data access or leaks
Hacktivists
Hacktivists are threat actors that are driven by a political agenda. They abuse digital technology to
accomplish their goals, which may include:
• Demonstrations
• Propaganda
• Social change campaigns
• Fame
A hacker is any person who uses computers to gain access to computer systems, networks, or data.
They can be beginner or advanced technology professionals who use their skills for a variety of reasons.
There are three main categories of hackers:
• Authorized hackers are also called ethical hackers. They follow a code of ethics and adhere to
the law to conduct organizational risk evaluations. They are motivated to safeguard people and
organizations from malicious threat actors.
• Semi-authorized hackers are considered researchers. They search for vulnerabilities but don’t
take advantage of the vulnerabilities they find.
• Unauthorized hackers are also called unethical hackers. They are malicious threat actors who do
not follow or respect the law. Their goal is to collect and sell confidential data for financial
gain.
Note: There are multiple hacker types that fall into one or more of these three categories.
New and unskilled threat actors have various goals, including:
• To learn and enhance their hacking skills
• To seek revenge
• To exploit security weaknesses by using existing malware, programming scripts, and other
tactics
Other types of hackers are not motivated by any particular agenda other than completing the job they
were contracted to do. These types of hackers can be considered unethical or ethical hackers. They have
been known to work on both illegal and legal tasks for pay.
There are also hackers who consider themselves vigilantes. Their main goal is to protect the world from
unethical hackers.
Questions :
1- What is term for software hat is deigned to harm devices or networks : malware
2- What is historical event used a malware attachment to steal user information and passwords :
LoveLetter attack.
3- Is a manipulation technique that exploits human error to gain private information, access, or
valuables : Social engineering
4- A security professional is asked to teach employees how to avoid inadvertently revealing
sensitive data. What type of training should they conduct : Training about social engineering
5- A security professional is researching compliance and the law in order to define security goals.
Which domains does this scenario describe : security and risk management
6- Domains involve securing digital and physical assets, as well as managing the storage,
maintenance, retention, and destruction of data : asset security
7- A security professional receives an alert that an unknown device has connected o their
organization’s internal network. They follow policies and procedures to quickly stop the
potential threat : security operation
Controls, framework, and compliance
(CIA) triad : is a model that helps inform how organization consider risk when setting up systems and
security policies. -> Confidentiality, integrity, and availability
Security framework: are guideline used for building plans to help mitigate risks and threats to data and
privacy. They have four core components :
1. Identifying and documenting security goals
2. Setting guidelines to achieve security goals
3. Implementing strong security processes
4. Monitoring and communicating results
Compliance is the process of adhering to internal standards and external regulations.
NIST the national institute of standards and technology is U.S based agency that develops multiple
voluntary compliance frameworks that organization worldwide can use to help manage risk. The more
aligned an organization is with compliance, the lower the risk.
Ex: CSF cybersecurity framework and the NIST risk management framework RMF
The Federal Energy Regulatory Commission - North American Electric Reliability Corporation
(FERC-NERC)
FERC-NERC is a regulation that applies to organizations that work with electricity or that are involved
with the U.S. and North American power grid. These types of organizations have an obligation to
prepare for, mitigate, and report any potential security incident that can negatively affect the power
grid. They are also legally required to adhere to the Critical Infrastructure Protection (CIP) Reliability
Standards defined by the FERC.
The Federal Risk and Authorization Management Program (FedRAMP®)
FedRAMP is a U.S. federal government program that standardizes security assessment, authorization,
monitoring, and handling of cloud services and product offerings. Its purpose is to provide consistency
across the government sector and third-party cloud providers.
Center for Internet Security (CIS®)
CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to
safeguard systems and networks against attacks. Its purpose is to help organizations establish a better
plan of defense. CIS also provides actionable controls that security professionals may follow if a security
incident occurs.
General Data Protection Regulation (GDPR)
GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U.
residents’ data and their right to privacy in and out of E.U. territory. For example, if an organization is
not being transparent about the data they are holding about an E.U. citizen and why they are holding
that data, this is an infringement that can result in a fine to the organization. Additionally, if a breach
occurs and an E.U. citizen’s data is compromised, they must be informed. The affected organization has
72 hours to notify the E.U. citizen about the breach.
Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS is an international security standard meant to ensure that organizations storing, accepting,
processing, and transmitting credit card information do so in a secure environment. The objective of
this compliance standard is to reduce credit card fraud.
The Health Insurance Portability and Accountability Act (HIPAA)
HIPAA is a U.S. federal law established in 1996 to protect patients' health information. This law
prohibits patient information from being shared without their consent. It is governed by three rules:
1. Privacy
2. Security
3. Breach notification
Organizations that store patient data have a legal obligation to inform patients of a breach because if
patients' Protected Health Information (PHI) is exposed, it can lead to identity theft and insurance
fraud. PHI relates to the past, present, or future physical or mental health or condition of an individual,
whether it’s a plan of care or payments for care. Along with understanding HIPAA as a law, security
professionals also need to be familiar with the Health Information Trust Alliance (HITRUST®), which
is a security framework and assurance program that helps institutions meet HIPAA compliance.
International Organization for Standardization (ISO)
ISO was created to establish international standards related to technology, manufacturing, and
management across borders. It helps organizations improve their processes and procedures for staff
retention, planning, waste, and services.
System and Organizations Controls (SOC type 1, SOC type 2)
The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed
this standard. The SOC1 and SOC2 are a series of reports that focus on an organization's user access
policies at different organizational levels such as:
• Associate
• Supervisor
• Manager
• Executive
• Vendor
• Others
They are used to assess an organization’s financial compliance and levels of risk. They also cover
confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these
areas can lead to fraud.
Pro tip: There are a number of regulations that are frequently revised. You are encouraged to keep
up-to-date with changes and explore more frameworks, controls, and compliance. Two suggestions to
research: the Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act.
United States Presidential Executive Order 14028
On May 12, 2021, President Joe Biden released an executive order related to improving the nation’s
cybersecurity to remediate the increase in threat actor activity. Remediation efforts are directed toward
federal agencies and third parties with ties to U.S.
Confidentiality means that only authorized users can access specific assets or data. Confidentiality as it
relates to professional ethics means that there needs to be a high level of respect for privacy to safeguard
private assets and data.
Privacy protection means safeguarding personal information from unauthorized use. (PII) personally
identifiable information data is any information used to infer an individual’s identity, like their name and
phone number. (SPII) sensitive personally identifiable information data is specific type PII that falls
under stricter handling guidelines, including social security numbers and credit card numbers. To
effectively safeguard PII and SPII data, security professionals hold an ethical obligation to secure
private information, identify security vulnerabilities, manage organizational risks, and align security
with business goals.
Laws are rules that are recognized by a community and enforced by governing entity.
Security Information and Event Management (SIEM) tool : An application that collects and analyzes
log data to monitor critical activities in an organization.
Network protocol analyzer (packet sniffers) : A network protocol analyzer, also known as a packet
sniffers, is a tool designed to capture and analyze data traffic in a network. This means that tool keeps a
record of all the data that a computer within an organization’s network encounter.
Playbooks : A playbooks is manual that provides details about any operational action, such as how to
respond to security incident. Organization usually have multiple playbooks documenting processes and
procedures for their teams to follow. Playbooks vary from one organization to the next, but they all
have a similar purpose:
To guide analysts through a series of steps to complete specific security-related tasks.
Dashboard : Application that collect and analyzes log data to monitor an organization’s critical
activities.
Programming : used to create a specific set of instructions for a computer to execute tasks.
Structured Query Language (SQL) : A programming language used to create, interact with, and request
information from a database.
Database : An organized collection of information or data.
Intrusion detection system : (IDS) is an application that monitor system activity and alerts on possible
intrusion. The system scans and analyzes network packets, which carry small amounts of data through a
network. The small amount of data makes the detection process easier for an IDS to identify potential
threats to sensitive data. Other occurrence an IDS might detect can include theft and unauthorized
access.
Encryption : makes data unreadable and difficult to decode for an unauthorized user; its main goal is to
ensure confidentiality of private data. Encryption is the process of converting data from a readable
format to a cryptographically encoded format.
Penetration testing : also called pen testing, is the act of participating in simulating attack that helps
identity vulnerabilities in system, networks, websites, applications, and processes. It is a thorough risk
assessment that can evaluate and identify external and internal threats as well as weaknesses.
NOTE 2
Information security :
• Incident response
• Vulnerability management
• Application security
• Cloud security
• Infrastructure security
As an example a security team may need to alter how personally identifiable information (PII) is treated.
Principles :
• Threat modeling
• Least privilege
• Defense in depth
• Fail security separation of duties
• Keep its simple
• Zero trust
• Trust but verify
An example of managing data is the use of a security information and event management (SIEM) tool to
monitor for flags related to unusual login or user activity that could indicate a threat actor is attempting
to access private data.
Phishing : exploits humans error to acquire sensitive data and private information. It is one method of
social engineering.
Risk management
A primary goal of organizations is to protect assets. An asset is an item perceived as having value to an
organization. Assets can be digital or physical. Examples of digital assets include the personal
information of employees, clients, or vendors, such as:
• Social Security Numbers (SSNs), or unique national identification numbers assigned to
individuals
• Dates of birth
• Bank account numbers
• Mailing addresses
Examples of physical assets include:
• Payment kiosks
• Servers
• Desktop computers
• Office spaces
Some common strategies used to manage risks include:
• Acceptance: Accepting a risk to avoid disrupting business continuity
• Avoidance: Creating a plan to avoid the risk altogether
• Transference: Transferring risk to a third party to manage
• Mitigation: Lessening the impact of a known risk
Threats
A threat is any circumstance or event that can negatively impact assets. As an entry-level security
analyst, your job is to help defend the organization’s assets from inside and outside threats. Therefore,
understanding common types of threats is important to an analyst’s daily work. As a reminder, common
threats include:
• Insider threats: Staff members or vendors abuse their authorized access to obtain data that may
harm an organization.
• Advanced persistent threats (APTs): A threat actor maintains unauthorized access to a
system for an extended period of time.
Risks
A risk is anything that can impact the confidentiality, integrity, or availability of an asset. A basic
formula for determining the level of risk is that risk equals the likelihood of a threat. One way to think
about this is that a risk is being late to work and threats are traffic, an accident, a flat tire, etc.
There are different factors that can affect the likelihood of a risk to an organization’s assets, including:
• External risk: Anything outside the organization that has the potential to harm organizational
assets, such as threat actors attempting to gain access to private information
• Internal risk: A current or former employee, vendor, or trusted partner who poses a security
risk
• Legacy systems: Old systems that might not be accounted for or updated, but can still impact
assets, such as workstations or old mainframe systems. For example, an organization might
have an old vending machine that takes credit card payments or a workstation that is still
connected to the legacy accounting system.
• Multiparty risk: Outsourcing work to third-party vendors can give them access to intellectual
property, such as trade secrets, software designs, and inventions.
• Software compliance/licensing: Software that is not updated or in compliance, or patches that
are not installed in a timely manner
Vulnerabilities
A vulnerability is a weakness that can be exploited by a threat. Therefore, organizations need to
regularly inspect for vulnerabilities within their systems. Some vulnerabilities include:
• ProxyLogon: A pre-authenticated vulnerability that affects the Microsoft Exchange server.
This means a threat actor can complete a user authentication process to deploy malicious code
from a remote location.
• ZeroLogon: A vulnerability in Microsoft’s Netlogon authentication protocol. An authentication
protocol is a way to verify a person's identity. Netlogon is a service that ensures a user’s identity
before allowing access to a website's location.
• Log4Shell: Allows attackers to run Java code on someone else’s computer or leak sensitive
information. It does this by enabling a remote attacker to take control of devices connected to
the internet and run malicious code.
• PetitPotam: Affects Windows New Technology Local Area Network (LAN) Manager
(NTLM). It is a theft technique that allows a LAN-based attacker to initiate an authentication
request.
• Security logging and monitoring failures: Insufficient logging and monitoring capabilities
that result in attackers exploiting vulnerabilities without the organization knowing it
• Server-side request forgery: Allows attackers to manipulate a server-side application into
accessing and updating backend resources. It can also allow threat actors to steal data.
As an entry-level security analyst, you might work in vulnerability management, which is monitoring a
system to identify and mitigate vulnerabilities. Although patches and updates may exist, if they are not
applied, intrusions can still occur. For this reason, constant monitoring is important. The sooner an
organization identifies a vulnerability and addresses it by patching it or updating their systems, the
sooner it can be mitigated, reducing the organization’s exposure to the vulnerability.
Frameworks and controls
Security frameworks are guidelines used for building plans to help mitigate risk and threats to
data and privacy. Frameworks support organizations’ ability to adhere to compliance laws and
regulations. For example, the healthcare industry uses frameworks to comply with the United
States’ Health Insurance Portability and Accountability Act (HIPAA), which requires that
medical professionals keep patient information safe.
Security controls are safeguards designed to reduce specific security risks. Security controls
are the measures organizations use to lower risk and threats to data and privacy. For example, a
control that can be used alongside frameworks to ensure a hospital remains compliant with
HIPAA is requiring that patients use multi-factor authentication (MFA) to access their medical
records. Using a measure like MFA to validate someone’s identity is one way to help mitigate
potential risks and threats to private data.
Controls
Controls are used alongside frameworks to reduce the possibility and impact of a security threat,
risk, or vulnerability. Controls can be physical, technical, and administrative and are typically
used to prevent, detect, or correct security issues.
Examples of physical controls:
• Gates, fences, and locks
• Security guards
• Closed-circuit television (CCTV), surveillance cameras, and motion detectors
• Access cards or badges to enter office spaces
Examples of technical controls:
• Firewalls
• MFA
• Antivirus software
Examples of administrative controls:
• Separation of duties
• Authorization
• Asset classification
Note 3
he TCP/IP model
The TCP/IP model is a framework used to visualize how data is organized and transmitted
across a network. This model helps network engineers and network security analysts
conceptualize processes on the network and communicate where disruptions or security threats
occur.
The TCP/IP model has four layers: the network access layer, internet layer, transport layer, and
application layer. When troubleshooting issues on the network, security professionals can
analyze which layers were impacted by an attack based on what processes were involved in an
incident.
Internet layer
The internet layer, sometimes referred to as the network layer, is responsible for ensuring the
delivery to the destination host, which potentially resides on a different network. It ensures IP
addresses are attached to data packets to indicate the location of the sender and receiver. The
internet layer also determines which protocol is responsible for delivering the data packets and
ensures the delivery to the destination host. Here are some of the common protocols that operate
at the internet layer:
• Internet Protocol (IP). IP sends the data packets to the correct destination and relies on
the Transmission Control Protocol/User Datagram Protocol (TCP/UDP) to deliver them to the
corresponding service. IP packets allow communication between two networks. They are routed
from the sending network to the receiving network. TCP in particular retransmits any data that is
lost or corrupt.
• Internet Control Message Protocol (ICMP). The ICMP shares error information and
status updates of data packets. This is useful for detecting and troubleshooting network errors.
The ICMP reports information about packets that were dropped or that disappeared in transit,
issues with network connectivity, and packets redirected to other routers.
Transport layer
The transport layer is responsible for delivering data between two systems or networks and
includes protocols to control the flow of traffic across a network. TCP and UDP are the two
transport protocols that occur at this layer.
Transmission Control Protocol
The Transmission Control Protocol (TCP) is an internet communication protocol that allows
two devices to form a connection and stream data. It ensures that data is reliably transmitted to
the destination service. TCP contains the port number of the intended destination service, which
resides in the TCP header of a TCP/IP packet.
Application layer
The application layer in the TCP/IP model is similar to the application, presentation, and session
layers of the OSI model. The application layer is responsible for making network requests or
responding to requests. This layer defines which internet services and applications any user can
access. Protocols in the application layer determine how the data packets will interact with
receiving devices. Some common protocols used on this layer are:
• Hypertext transfer protocol (HTTP)
• Simple mail transfer protocol (SMTP)
• Secure shell (SSH)
• File transfer protocol (FTP)
• Domain name system (DNS)
Application layer protocols rely on underlying layers to transfer the data across the network.
The OSI model is a standardized concept that describes the seven layers computers use to
communicate and send data over the network. Network and security professionals often use this
model to communicate with each other about potential sources of problems or security threats when
they occur.
Communication protocols :
govern the exchange of information in network transmission. They dictate how the data is
transmitted between devices and the timing of the communication. They also include methods to
recover data lost in transit. Here are a few of them.
• Transmission Control Protocol (TCP) is an internet communication protocol that
allows two devices to form a connection and stream data. TCP uses a three-way handshake
process. First, the device sends a synchronize (SYN) request to a server. Then the server
responds with a SYN/ACK packet to acknowledge receipt of the device's request. Once the
server receives the final ACK packet from the device, a TCP connection is established. In the
TCP/IP model, TCP occurs at the transport layer.
• User Datagram Protocol (UDP) is a connectionless protocol that does not establish a
connection between devices before a transmission. This makes it less reliable than TCP. But it
also means that it works well for transmissions that need to get to their destination quickly. For
example, one use of UDP is for sending DNS requests to local DNS servers. In the TCP/IP
model, UDP occurs at the transport layer.
• Hypertext Transfer Protocol (HTTP) is an application layer protocol that provides a
method of communication between clients and website servers. HTTP uses port 80. HTTP is
considered insecure, so it is being replaced on most websites by a secure version, called HTTPS
that uses encryption from SSL/TLS for communication. However, there are still many websites
that use the insecure HTTP protocol. In the TCP/IP model, HTTP occurs at the application layer.
• Domain Name System (DNS) is a protocol that translates internet domain names into
IP addresses. When a client computer wishes to access a website domain using their internet
browser, a query is sent to a dedicated DNS server. The DNS server then looks up the IP address
that corresponds to the website domain. DNS normally uses UDP on port 53. However, if the
DNS reply to a request is large, it will switch to using the TCP protocol. In the TCP/IP model,
DNS occurs at the application layer.
Management Protocols
The next category of network protocols is management protocols. Management protocols are
used for monitoring and managing activity on a network. They include protocols for error
reporting and optimizing performance on the network.
• Simple Network Management Protocol (SNMP) is a network protocol used for
monitoring and managing devices on a network. SNMP can reset a password on a network
device or change its baseline configuration. It can also send requests to network devices for a
report on how much of the network’s bandwidth is being used up. In the TCP/IP model, SNMP
occurs at the application layer.
• Internet Control Message Protocol (ICMP) is an internet protocol used by devices to
tell each other about data transmission errors across the network. ICMP is used by a receiving
device to send a report to the sending device about the data transmission. ICMP is commonly
used as a quick way to troubleshoot network connectivity and latency by issuing the “ping”
command on a Linux operating system. In the TCP/IP model, ICMP occurs at the internet layer.
Security Protocols
Security protocols are network protocols that ensure that data is sent and received securely across
a network. Security protocols use encryption algorithms to protect data in transit. Below are
some common security protocols.
• Hypertext Transfer Protocol Secure (HTTPS) is a network protocol that provides a
secure method of communication between clients and website servers. HTTPS is a secure
version of HTTP that uses secure sockets layer/transport layer security (SSL/TLS) encryption on
all transmissions so that malicious actors cannot read the information contained. HTTPS uses
port 443. In the TCP/IP model, HTTPS occurs at the application layer.
• Secure File Transfer Protocol (SFTP) is a secure protocol used to transfer files from
one device to another over a network. SFTP uses secure shell (SSH), typically through TCP port
22. SSH uses Advanced Encryption Standard (AES) and other types of encryption to ensure that
unintended recipients cannot intercept the transmissions. In the TCP/IP model, SFTP occurs at
the application layer. SFTP is used often with cloud storage. Every time a user uploads or
downloads a file from cloud storage, the file is transferred using the SFTP protocol.
Note: The encryption protocols mentioned do not conceal the source or destination IP address of
network traffic. This means a malicious actor can still learn some basic information about the
network traffic if they intercept it.
Wi-Fi
This section of the course also introduced various wireless security protocols, including WEP,
WPA, WPA2, and WPA3. WPA3 encrypts traffic with the Advanced Encryption Standard
(AES) cipher as it travels from your device to the wireless access point. WPA2 and WPA3 offer
two modes: personal and enterprise. Personal mode is best suited for home networks while
enterprise mode is generally utilized for business networks and applications.
Proxy servers
A proxy server is another way to add security to your private network. Proxy servers utilize
network address translation (NAT) to serve as a barrier between clients on the network and
external threats. Forward proxies handle queries from internal clients when they access resources
external to the network. Reverse proxies function opposite of forward proxies; they handle
requests from external systems to services on the internal network. Some proxy servers can also
be configured with rules, like a firewall. For example, you can create filters to block websites
identified as containing malware.
Backdoor attacks
A backdoor attack is another type of attack you will need to be aware of as a security analyst.
An organization may have a lot of security measures in place, including cameras, biometric scans
and access codes to keep employees from entering and exiting without being seen. However, an
employee might work around the security measures by finding a backdoor to the building that is
not as heavily monitored, allowing them to sneak out for the afternoon without being seen.
In cybersecurity, backdoors are weaknesses intentionally left by programmers or system and
network administrators that bypass normal access control mechanisms. Backdoors are intended
to help programmers conduct troubleshooting or administrative tasks. However, backdoors can
also be installed by attackers after they’ve compromised an organization to ensure they have
persistent access.
Once the hacker has entered an insecure network through a backdoor, they can cause extensive
damage: installing malware, performing a denial of service (DoS) attack, stealing private
information or changing other security settings that leaves the system vulnerable to other attacks.
A DoS attack is an attack that targets a network or server and floods it with network traffic.
Interpreting output
tcpdump prints the output of the command as the sniffed packets in the command line, and
optionally to a log file, after a command is executed. The output of a packet capture contains many
pieces of important information about the network traffic.
Some information you receive from a packet capture includes:
• Timestamp: The output begins with the timestamp, formatted as hours, minutes, seconds,
and fractions of a second.
• Source IP: The packet’s origin is provided by its source IP address.
• Source port: This port number is where the packet originated.
• Destination IP: The destination IP address is where the packet is being transmitted to.
• Destination port: This port number is where the packet is being transmitted to.
Note: By default, tcpdump will attempt to resolve host addresses to hostnames. It'll also replace port
numbers with commonly associated services that use these ports.
Common uses
tcpdump and other network protocol analyzers are commonly used to capture and view network
communications and to collect statistics about the network, such as troubleshooting network
performance issues. They can also be used to:
• Establish a baseline for network traffic patterns and network utilization metrics.
• Detect and identify malicious traffic
• Create customized alerts to send the right notifications when network issues or security
threats arise.
• Locate unauthorized instant messaging (IM), traffic, or wireless access points.
However, attackers can also use network protocol analyzers maliciously to gain information about a
specific network. For example, attackers can capture data packets that contain sensitive information,
such as account usernames and passwords. As a cybersecurity analyst, It’s important to understand
the purpose and uses of network protocol analyzers.
Assessing vulnerabilities
Before a brute force attack or other cybersecurity incident occurs, companies can run a series of
tests on their network or web applications to assess vulnerabilities. Analysts can use virtual
machines and sandboxes to test suspicious files, check for vulnerabilities before an event occurs,
or to simulate a cybersecurity incident.
Virtual machines (VMs)
Virtual machines (VMs) are software versions of physical computers. VMs provide an additional
layer of security for an organization because they can be used to run code in an isolated
environment, preventing malicious code from affecting the rest of the computer or system. VMs
can also be deleted and replaced by a pristine image after testing malware.
VMs are useful when investigating potentially infected machines or running malware in a
constrained environment. Using a VM may prevent damage to your system in the event its tools
are used improperly. VMs also give you the ability to revert to a previous state. However, there
are still some risks involved with VMs. There’s still a small risk that a malicious program can
escape virtualization and access the host machine.
You can test and explore applications easily with VMs, and it’s easy to switch between different
VMs from your computer. This can also help in streamlining many security tasks.
Sandbox environments
A sandbox is a type of testing environment that allows you to execute software or programs
separate from your network. They are commonly used for testing patches, identifying and
addressing bugs, or detecting cybersecurity vulnerabilities. Sandboxes can also be used to
evaluate suspicious software, evaluate files containing malicious code, and simulate attack
scenarios.
Sandboxes can be stand-alone physical computers that are not connected to a network; however,
it is often more time- and cost-effective to use software or cloud-based virtual machines as
sandbox environments. Note that some malware authors know how to write code to detect if the
malware is executed in a VM or sandbox environment. Attackers can program their malware to
behave as harmless software when run inside these types of testing environments.
Prevention measures
Some common measures organizations use to prevent brute force attacks and similar attacks
from occurring include:
• Salting and hashing: Hashing converts information into a unique value that can then be
used to determine its integrity. It is a one-way function, meaning it is impossible to decrypt and
obtain the original text. Salting adds random characters to hashed passwords. This increases the
length and complexity of hash values, making them more secure.
• Multi-factor authentication (MFA) and two-factor authentication (2FA): MFA is
a security measure which requires a user to verify their identity in two or more ways to access a
system or network. This verification happens using a combination of authentication factors: a
username and password, fingerprints, facial recognition, or a one-time password (OTP) sent to a
phone number or email. 2FA is similar to MFA, except it uses only two forms of verification.
• CAPTCHA and reCAPTCHA: CAPTCHA stands for Completely Automated Public
Turing test to tell Computers and Humans Apart. It asks users to complete a simple test that
proves they are human. This helps prevent software from trying to brute force a password.
reCAPTCHA is a free CAPTCHA service from Google that helps protect websites from bots and
malicious software.
• Password policies: Organizations use password policies to standardize good password
practices throughout the business. Policies can include guidelines on how complex a password
should be, how often users need to update passwords, whether passwords can be reused or not,
and if there are limits to how many times a user can attempt to log in before their account is
suspended.
When combined with a firewall, an IDS adds another layer of defense. The IDS is placed behind the
firewall and before entering the LAN, which allows the IDS to analyze data streams after network
traffic that is disallowed by the firewall has been filtered out. This is done to reduce noise in IDS
alerts, also referred to as false positives.
The IPS (like an IDS) sits behind the firewall in the network architecture. This offers a high level of
security because risky data streams are disrupted before they even reach sensitive parts of the
network. However, one potential limitation is that it is inline: If it breaks, the connection between the
private network and the internet breaks. Another limitation of IPS is the possibility of false positives,
which can result in legitimate traffic getting dropped.
Splunk is another common SIEM tool. Splunk offers different SIEM tool options: Splunk Enterprise
and Splunk Cloud. Both options include detailed dashboards which help security professionals to
review and analyze an organization's data. There are also other similar SIEM tools available, and it's
important for security professionals to research the different tools to determine which one is most
beneficial to the organization.
A SIEM tool doesn’t replace the expertise of security analysts, or of the network- and
system-hardening activities covered in this course, but they’re used in combination with other
security methods. Security analysts often work in a Security Operations Center (SOC) where they
can monitor the activity across the network. They can then use their expertise and experience to
determine how to respond to the information on the dashboard and decide when the events meet the
criteria to be escalated to oversight.
Key takeaways
Devices / Tools Advantages Disadvantages
A firewall allows
or blocks traffic A firewall is only able to filter packets based on information provided i
Firewall
based on a set of header of the packets.
rules.
An IDS detects and
alerts admins about
An IDS can only scan for known attacks or obvious anomalies; new and sophisticated
Intrusion Detection System (IDS) possible intrusions,
might not be caught. It doesn’t actually stop the incoming traffic.
attacks, and other
malicious traffic.
An IPS monitors
system activity for
Intrusion Prevention System An IPS is an inline appliance. If it fails, the connection between the private network a
intrusions and
(IPS) internet breaks. It might detect false positives and block legitimate traffic.
anomalies and takes
action to stop them.
A SIEM tool collects
and analyzes log data
from multiple network
Security Information and Event A SIEM tool only reports on possible security issues. It does not take any actions to st
machines. It aggregates
Management (SIEM) prevent suspicious events.
security events for
monitoring in a central
dashboard.
Each of these devices or tools cost money to purchase, install, and maintain. An organization might
need to hire additional personnel to monitor the security tools, as in the case of a SIEM.
Decision-makers are tasked with selecting the appropriate level of security based on cost and risk to
the organization. You will learn more about choosing levels of security later in the course.
Cloud security considerations
Many organizations choose to use cloud services because of the ease of deployment, speed of
deployment, cost savings, and scalability of these options. Cloud computing presents unique
security challenges that cybersecurity analysts need to be aware of.
Identity access management
Identity access management (IAM) is a collection of processes and technologies that helps
organizations manage digital identities in their environment. This service also authorizes how
users can use different cloud resources. A common problem that organizations face when using
the cloud is the loose configuration of cloud user roles. An improperly configured user role
increases risk by allowing unauthorized users to have access to critical cloud operations.
Configuration
The number of available cloud services adds complexity to the network. Each service must be
carefully configured to meet security and compliance requirements. This presents a particular
challenge when organizations perform an initial migration into the cloud. When this change
occurs on their network, they must ensure that every process moved into the cloud has been
configured correctly. If network administrators and architects are not meticulous in correctly
configuring the organization’s cloud services, they could leave the network open to compromise.
Misconfigured cloud services are a common source of cloud security issues.
Attack surface
Cloud service providers (CSPs) offer numerous applications and services for organizations at a
low cost.
Every service or application on a network carries its own set of risks and vulnerabilities and
increases an organization’s overall attack surface. An increased attack surface must be
compensated for with increased security measures.
Cloud networks that utilize many services introduce lots of entry points into an organization’s
network. However, if the network is designed correctly, utilizing several services does not
introduce more entry points into an organization’s network design. These entry points can be
used to introduce malware onto the network and pose other security vulnerabilities. It is
important to note that CSPs often defer to more secure options, and have undergone more
scrutiny than a traditional on-premises network.
Zero-day attacks
Zero-day attacks are an important security consideration for organizations using cloud or
traditional on-premise network solutions. A zero day attack is an exploit that was previously
unknown. CSPs are more likely to know about a zero day attack occurring before a traditional IT
organization does. CSPs have ways of patching hypervisors and migrating workloads to other
virtual machines. These methods ensure the customers are not impacted by the attack. There are
also several tools available for patching at the operating system level that organizations can use.
Talks about compare between types of operating system like (macOS, windows, Linux).
When you boot, or turn on, your computer, either a BIOS or UEFI microchip is activated. The
Basic Input/output System (BIOS) is a microchip that contains loading instructions for the
computer and is prevalent in older systems. The Unified Extensible Firmware Interface
(UEFI) is a microchip that contains loading instructions for the computer and replaces BIOS on
more modern systems.
The BIOS and UEFI chips both perform the same function for booting the computer. BIOS was
the standard chip until 2007, when UEFI chips increased in use. Now, most new computers
include a UEFI chip. UEFI provides enhanced security features.
The BIOS or UEFI microchips contain a variety of loading instructions for the computer to
follow. For example, one of the loading instructions is to verify the health of the computer’s
hardware.
The last instruction from the BIOS or UEFI activates the bootloader. The bootloader is a
software program that boots the operating system. Once the operating system has finished
booting, your computer is ready for use.
User
The first part of the process is the user. The user initiates the process by having something they
want to accomplish on the computer. Right now, you’re a user! You’ve initiated the process of
accessing this reading.
Application
The application is the software program that users interact with to complete a task. For example,
if you want to calculate something, you would use the calculator application. If you want to write
a report, you would use a word processing application. This is the second part of the process.
Operating system
The operating system receives the user’s request from the application. It’s the operating system’s
job to interpret the request and direct its flow. In order to complete the task, the operating system
sends it on to applicable components of the hardware.
Hardware
The hardware is where all the processing is done to complete the tasks initiated by the user. For
example, when a user wants to calculate a number, the CPU figures out the answer. As another
example, when a user wants to save a file, another component of the hardware, the hard drive,
handles this task.
After the work is done by the hardware, it sends the output back through the operating system to
the application so that it can display the results to the user.
Virtualization technology
You can run multiple virtual machines using the physical hardware of a single computer. This
involves dividing the resources of the host computer to be shared across all physical and virtual
components. For example, Random Access Memory (RAM) is a hardware component used for
short-term memory. If a computer has 16GB of RAM, it can host three virtual machines so that
the physical computer and virtual machines each have 4GB of RAM. Also, each of these virtual
machines would have their own operating system and function similarly to a typical computer.
Function
These two interfaces also differ in how they function. A GUI is an interface that only allows you
to make one request at a time. However, a CLI allows you to make multiple requests at a time.
Efficiency
Some prefer the CLI because it can be used more quickly when you know how to manage this
interface. For a new user, a GUI might be more efficient because they’re easier for beginners to
navigate.
Because a CLI can accept multiple requests at one time, it’s more powerful when you need to
perform multiple tasks efficiently. For example, if you had to create multiple new files in your
system, you could quickly perform this task in a CLI. If you were using a GUI, this could take
much longer, because you have to repeat the same steps for each new file.
History file
For security analysts, using the Linux CLI is helpful because it records a history file of all the
commands and actions in the CLI. If you were using a GUI, your actions are not necessarily
saved in a history file.
For example, you might be in a situation where you’re responding to an incident using a
playbook. The playbook’s instructions require you to run a series of different commands. If you
used a CLI, you’d be able to go back to the history and ensure all of the commands were
correctly used. This could be helpful if there were issues using the playbook and you had to
review the steps you performed in the command line.
Additionally, if you suspect an attacker has compromised your system, you might be able to
trace their actions using the history file.