Cyber Security Full Notes
Cyber Security Full Notes
1. Lifecycle Phases:
Identification:
Recognizing and classifying information assets that need protection. This includes identifying sensitive data,
critical systems, and potential vulnerabilities.
Assessment:
Evaluating the identified assets and their associated risks. This involves analyzing potential threats and
vulnerabilities to determine the likelihood and impact of a security breach.
Design:
Developing security controls and mechanisms to mitigate identified risks. This includes designing security
architectures, implementing access controls, and choosing appropriate security technologies.
Implementation:
Deploying the designed security controls and integrating them into the system.
Protection:
Ensuring the ongoing protection of information assets through various security measures, including access
control, data encryption, and incident response planning.
Monitoring:
Continuously monitoring the security posture of the system to detect and respond to potential threats. This
includes analyzing logs, conducting security audits, and implementing intrusion detection systems.
2. Key Principles:
Confidentiality: Protecting information from unauthorized disclosure.
Integrity: Ensuring the accuracy and completeness of information.
Availability: Ensuring that authorized users have timely and reliable access to information and resources
when needed.
Authentication: Verifying the identity of users and systems.
Non-repudiation: Ensuring that the origin of a communication or transaction cannot be denied.
3. Importance of Lifecycle Management:
Early Security Integration:
Incorporating security early in the lifecycle helps prevent vulnerabilities and reduces the cost of remediation
later on.
Comprehensive Security:
Addresses security across all phases of the system development lifecycle, leading to a more robust and
resilient system.
Proactive Approach:
Shifts the focus from reactive security to a proactive approach, enabling organizations to anticipate and
mitigate potential threats.
Topic-2
Life cycle management landscape
1. Identification:
Discovering assets: Identifying all systems, software, and potential vulnerabilities within the
organization.
Understanding the threat landscape: Recognizing the evolving environment of cyber threats, attack
methods, and attack vectors.
Risk Assessment: Evaluating the potential impact and likelihood of different threats.
2. Protection:
Implementing security controls: Employing measures to protect systems and data from
cyberattacks.
Access control: Managing who has access to what resources and ensuring appropriate permissions.
Data security: Implementing measures to protect sensitive information.
Secure configurations: Hardening systems and applications to minimize attack surfaces.
3. Detection:
Monitoring systems: Continuously monitoring for suspicious activity and potential breaches.
Vulnerability scanning: Regularly scanning systems for known vulnerabilities.
Intrusion detection systems: Utilizing tools to detect unauthorized access or malicious activity.
4. Response:
Incident response planning: Developing and implementing plans to respond to security incidents.
Containment: Isolating affected systems to prevent further damage.
Eradication: Removing the cause of the incident (e.g., malware).
5. Recovery:
Restoring systems: Bringing affected systems back to a normal operational state.
Data recovery: Restoring lost or damaged data.
Post-incident analysis: Learning from the incident to improve security posture.
Restoring systems: Bringing affected systems back to a normal operational state.
Data recovery: Restoring lost or damaged data.
Post-incident analysis: Learning from the incident to improve security posture.
Security Architecture Processes in Cyber Security
Security architecture in cyber security is the process of designing, implementing, and maintaining the security
of information systems and networks. It involves creating a comprehensive framework that integrates
security principles, policies, and technologies to protect an organization's assets from cyber threats. This
framework addresses various aspects, including network security, application security, data security, and
physical security.
Security Architecture Processes:
The security architecture process typically involves several key phases:
1. 1. Assessment and Planning:
This initial phase focuses on understanding the organization's business objectives, risk tolerance,
and existing security posture. It involves identifying critical assets, potential threats, and
vulnerabilities.
2. 2. Design and Development:
Based on the assessment, security architects design the overall security architecture, specifying
security controls, policies, and procedures. This phase includes defining security requirements for
various components, such as network infrastructure, applications, and data storage.
3. 3. Implementation and Integration:
The designed security architecture is then implemented, integrating various security tools and
technologies. This involves configuring firewalls, intrusion detection systems, access controls, and
other security mechanisms.
4. 4. Monitoring and Maintenance:
The security architecture needs to be continuously monitored and maintained to ensure its
effectiveness. This includes regular audits, vulnerability assessments, and incident response
planning.
Security Architecture Tools:
A wide range of tools are used in security architecture to implement and manage security
controls. Some common categories of tools include:
Network Security Tools:
Firewalls: Control network traffic based on predefined rules, preventing unauthorized access.
Intrusion Detection/Prevention Systems (IDS/IPS): Monitor network traffic for malicious activity and
block or alert on suspicious behavior.
VPNs: Secure remote access to the network using encryption and authentication.
Application Security Tools:
Web Application Firewalls (WAFs): Protect web applications from common attacks like SQL injection
and cross-site scripting.
Static/Dynamic Application Security Testing (SAST/DAST): Identify vulnerabilities in application code
during development and testing.
Identity and Access Management (IAM): Manage user access to applications and data, ensuring only
authorized individuals can access resources.
Data Security Tools:
Encryption: Protect sensitive data at rest and in transit, making it unreadable to unauthorized parties.
Data Loss Prevention (DLP): Prevent sensitive data from leaving the organization's control.
Physical Security Tools:
Surveillance Systems: Monitor physical access to facilities and sensitive areas.
Access Control Systems: Control physical access to buildings and resources.
Security architecture tools in cyber security encompass a broad range of technologies and
practices designed to protect information systems and data from threats. These tools range
from foundational elements like firewalls and intrusion detection systems to more
advanced solutions like zero-trust architectures and security information and event
management (SIEM) systems.
These tools and practices are essential for building a comprehensive and robust cyber
security architecture that can effectively protect against evolving threats
Incident Response
Responsive Capabilities
Containment
Eradication
Recovery
1) Preparation
2) Detection
3) Analysis
File metadata analysis: Checking the creation, modification, and access times of
files to understand user and attacker activity.
4) Containment
This is the most critical stage of incident response. The strategy for
containing an incident is based on the intelligence and indicators of
compromise gathered during the analysis phase. The security team should
focus on taking risk-mitigating actions to prevent further impact and
damage to the organization.
Coordinated Shutdown: Once identifying the compromised systems perform
a coordinated shutdown of these devices. The IR team should be instructed
to ensure proper timing.
5) Eradication
6) Recovery
Develop a near-term remediation strategy and roadmap
Focus on resuming normal business operations
Develop a long-term risk mitigation strategy
Document the incident to improve the IR plan and update security measures
to avoid such incidents in future
Incident Categories
Malicious Attacks
Malware and Ransomware:
Involves viruses, worms, or other malicious software that infiltrates systems,
potentially to encrypt data and demand ransom.
Phishing and Social Engineering:
Attempts to trick users into revealing sensitive information or clicking malicious links,
often through deceptive emails or messages.
Protection Technologies
Firewalls:
These control network traffic, blocking or allowing it based on predefined security
rules.
Intrusion Prevention Systems (IPS) / Intrusion Detection Systems (IDS) :
IPS technologies analyze network traffic to detect and stop malicious actions, such as
unauthorized access or malware.
Endpoint Security (EPP/EDR):
Endpoint Protection Platform (EPP): Provides initial protection by scanning files for
known threats.
Endpoint Detection and Remediation (EDR): Offers active, continuous monitoring to
detect and respond to advanced threats like ransomware and fileless malware.
IoT Security:
Technologies to secure Internet of Things (IoT) devices, which often have limited built-
in security.
To secure IoT devices with limited built-in security, implement technologies such
as robust encryption for data protection, strong authentication with multi-factor
authentication (MFA), network security solutions like network segmentation and
firewalls, firmware and patch management for updates, access control systems to
manage permissions, and continuous monitoring with intrusion detection systems to
identify and respond to threats.
Components of IAM
1. Authentication:
Verifying that a user is who they claim to be, often using multi-factor authentication
(MFA).
2. Authorization:
Determining what a user is allowed to do after they've been authenticated, by
assigning them specific roles and permissions.
3. Administration:
The ongoing management of user identities, including the creation, modification, and
deletion of user accounts and their associated data.
4. Auditing/Reporting:
Tracking and logging user activity, which provides visibility into who is accessing what
and when, and helps in detecting suspicious behavior.
IAM is Important in Cybersecurity
Prevents Unauthorized Access:
IAM safeguards sensitive data and systems by ensuring that only authorized personnel,
devices, and applications have access to them.
Reduces Data Breaches:
By limiting access to critical resources, IAM significantly lowers the risk of
cyberattacks, such as those targeting user credentials through phishing.
Enhances User Experience:
IAM solutions can provide a single sign-on (SSO) experience, allowing users to access
multiple applications with one set of credentials, thereby improving efficiency.
Supports Remote Work and Cloud Adoption:
IAM is essential for managing access in today's dispersed work environments and
cloud-based systems.
Configuration management:
Threat detection and monitoring involve continuously observing network traffic, systems, and user
behavior to identify signs of malicious activity and potential breaches. This proactive approach uses
various tools, such as Intrusion Detection Systems (IDS), behavioral analytics, and Machine Learning
(ML)/Artificial Intelligence (AI), to detect anomalies and known threats, enabling organizations to respond
quickly and mitigate damage. The goal is to protect sensitive data, maintain system integrity, and ensure
business continuity by minimizing the impact of cyberattacks.
Continuous Monitoring: Real-time surveillance of network traffic, system logs, and endpoint activities
to detect suspicious patterns or unauthorized access.
Threat Intelligence: Gathering and analyzing information about known threats and vulnerabilities to
inform security measures and identify potential risks.
Behavioral Analysis: Scrutinizing user and system behavior for deviations from normal patterns, which
can indicate a threat like a compromised account or malware.
Anomaly Detection: Using AI and ML to identify unusual activities that don't fit established security
signatures, helping detect emerging threats.
Automated Tools: Implementing systems like Security Information and Event Management
(SIEM) and eXtended Detection and Response (XDR) to collect, analyze, and correlate security data
from various sources.
Why it's Important
Early Detection: Allows organizations to identify threats before they can cause significant damage, such
as data breaches, financial loss, or reputational damage.
Risk Mitigation: Enables rapid response and containment, minimizing the impact of a successful attack
and preventing escalation.
Proactive Defense: Shifts an organization from a reactive stance to a proactive one, anticipating and
neutralizing threats before they become incidents.
Enhanced Resilience: Helps maintain system integrity, protect critical assets, and ensure the
continuous operation of business functions.
Security logs record events within a system for later analysis, while security alerts are real-time
notifications triggered by those logs or other detection tools when suspicious activities are identified,
acting as an alarm system to signal potential threats like unauthorized access, malware, or system
vulnerabilities. Together, logging and alerting provide vital visibility for cybersecurity teams to monitor,
investigate, and respond to threats, helping to prevent breaches before they cause serious damage.
Records of Events:Security logs are detailed records of events occurring on systems, applications,
networks, and devices.
Types of Information:They capture security-relevant events such as successful and failed login
attempts, file changes, access to sensitive resources, system errors, and changes to system
configurations.
Purpose:Logs provide a digital trail for cybersecurity analysts to review, analyze, and use for incident
investigation, forensics, and understanding security posture.
Examples:A log might record an IP address, the time of an event, the user involved, and the action
performed.
Monitoring tools for threat detection and evaluation include Security Information and Event Management
(SIEM) systems, Endpoint Detection and Response (EDR) solutions, Network Detection and Response
(NDR) tools, Web Application Firewalls (WAFs), and Threat Intelligence Platforms (TIPs). These tools
collect data, identify threats using techniques like anomaly and behavior analysis, and often provide
centralized monitoring, automated responses, and alerts to help organizations evaluate and mitigate
security risks.
Security Information and Event Management (SIEM): SIEM tools ingest and analyze security logs
from various sources to provide centralized monitoring and detect suspicious patterns or anomalies
across an organization's IT environment.
Endpoint Detection and Response (EDR): EDR solutions focus on monitoring endpoints (like
computers and servers) for signs of malicious activity, such as malware, by providing continuous
monitoring and automated responses.
Network Detection and Response (NDR): NDR tools monitor network traffic to detect threats and
anomalies that may not be visible to other tools, providing deep visibility into network communications.
Web Application Firewalls (WAFs): WAFs are specifically designed to protect web applications by
monitoring and filtering HTTP traffic between a web application and the internet, blocking malicious
requests.
Threat Intelligence Platforms (TIPs): TIPs collect and analyze threat data from various sources to
provide actionable intelligence about current and emerging threats, helping organizations understand the
threat landscape and prioritize responses.
Vulnerability Scanners: Tools like Nessus perform comprehensive vulnerability scans to identify
weaknesses in systems and applications that attackers could exploit.
AI and Machine Learning (ML): Many modern threat detection tools leverage AI and ML to analyze vast
amounts of data, identify subtle anomalies, reduce false positives, and even predict future threats.
How They Work Together
These tools work in concert to create a layered security approach:
1. Data Collection: Tools like SIEM, EDR, and NDR collect logs and telemetry from network devices,
endpoints, and applications.
2. Threat Identification: SIEM and EDR solutions use event correlation, anomaly detection, and AI/ML to
identify patterns and potential indicators of compromise.
3. Context and Enrichment: TIPs and advanced SIEMs enrich alerts with external threat intelligence,
helping to validate threats and prioritize response.
4. Automated Response: Some tools can automatically respond to threats, such as quarantining an
infected endpoint or blocking malicious traffic, reducing response times.
5. Alerting: All tools generate alerts to notify security teams of detected threats, providing information about
severity and recommended actions.
Network Traffic Analysis (NTA) is a broad process of monitoring, capturing, and analyzing network data to
detect security threats, troubleshoot issues, and optimize performance, while Packet Capture Analysis is
a specific NTA method that involves capturing actual data packets for in-depth examination of network
conversations and behaviors. Packet captures provide a granular view essential for deep investigation,
whereas NTA often uses flow data or logs for broader, scalable monitoring of network activity.
Purpose: To ensure network security, identify performance bottlenecks, detect anomalies, and
facilitate network forensics.
Methods:
Packet Analysis: Capturing and inspecting individual packets, also known as packet sniffing.
Flow Analysis: Analyzing flow records (like NetFlow, sFlow) generated by network devices, which
summarize network connections.
Log Analysis: Collecting and examining logs from network devices, servers, and applications.
Tools: NTA solutions often use machine learning and behavioral analysis to compare real-time
traffic against a baseline of normal behavior.
Packet Capture Analysis
This is a specific type of network analysis focused on obtaining and examining raw data packets.
Process: Intercepting data packets as they travel across the network, storing them, and then analyzing
them using specialized tools.
Purpose:
Troubleshooting: Diagnosing network problems such as packet loss, congestion, and connectivity
issues.
Security: Identifying security threats by detecting suspicious content, intrusion attempts, and data
leakage.
Forensics: Performing detailed forensic network analysis to understand specific network events.
Tools: Wireshark, tcpdump, and other packet analyzers are used to decode and interpret the
captured packet data.
Unit-V
What is a Backdoor?
A backdoor is a secret entry point into a system that circumvents standard security measures,
such as passwords and encryption.
They are often used to maintain persistent, unauthorized access to a system after an initial
compromise.
Backdoors can also be created intentionally by developers for remote diagnostics and
troubleshooting, but they can be misused by attackers if discovered.
Malicious Use: Attackers install backdoors to steal sensitive data, install additional malware
(like ransomware or spyware), perform website defacement, and launch Distributed Denial of
Service (DDoS) attacks.
Unintentional Creation: Backdoors can also result from security weaknesses in software or
hardware.
The Dangers of Backdoors
Undetected Persistence: Backdoors can remain undetected for long periods, giving attackers
extended access to a system.
System Manipulation: Once a backdoor is established, attackers can issue commands,
update malware, and gain high-level (root) access to the system.
Broad Impact: Backdoors can threaten the confidentiality, integrity, and authenticity of
information systems, with potential use in critical infrastructure like power systems.
How to Defend Against Backdoor Attacks
Regular Auditing: Conduct routine security audits to detect any suspicious or unauthorized
files and access points on systems.
Malware Protection: Deploy advanced antivirus and anti-malware solutions to identify and
remove backdoors and other malicious software.
Strong Security Practices: Adhere to best practices like strong password policies, regular
software updates, and the use of secure remote access protocols.
Incident Response: Have a prompt and coordinated plan to contain, remove, and recover
from any detected backdoor threats to minimize damage.
Information Gathering: Using built-in auxiliary modules for scanning and reconnaissance to
collect data about the target network and systems.
o Exploits: Code that targets and takes advantage of a specific vulnerability to bypass security
measures.
o Payloads: The code that is executed on the target machine after a successful exploit. A
common example is Meterpreter, which provides advanced control over the compromised
system.
o Auxiliary: Modules that perform tasks like scanning, reconnaissance, and fuzzing that are not
directly involved in exploitation.
o Post-Exploitation (Post): Modules used after gaining initial access to a target to gather more
information, escalate privileges, or maintain persistence.
o Encoders: Tools used to obfuscate payloads to evade detection by anti-virus software and
intrusion detection systems (IDS).
o Armitage: A graphical user interface (GUI) developed to make Metasploit easier to use,
particularly for team-based red teaming.
Tools: The framework includes standalone tools, such as msfvenom for generating payloads
directly from the command line.
A Demilitarized Zone (DMZ) is a network segment that acts as a buffer between an untrusted network
(like the internet) and a trusted internal network, hosting external-facing servers to add a layer of security.
A digital signature is an electronic, encrypted stamp of authentication on digital data, created using a
private key to ensure authenticity, integrity, and non-repudiation. The two concepts are distinct: DMZs are
about network segmentation, while digital signatures are about data validation.
Purpose:To protect the internal network by isolating externally-facing servers and services that must be
accessible from the internet.
How it Works:A DMZ is a separate network, typically placed between two firewalls, that contains public-
facing servers like web, mail, or DNS servers. If an attacker compromises a server in the DMZ, they are
still blocked from the internal network by a second firewall.
Benefits:
Enhanced Security: Adds a layer of defense, preventing direct access to internal resources from the
internet.
Digital Signature
2. Encryption: The signer uses their private key to encrypt this hash.
3. Verification: The recipient uses the signer's corresponding public key to decrypt the hash. If the
decrypted hash matches a new hash generated from the received data, it confirms the data's
authenticity and integrity.
Benefits:
Authenticity: Confirms the sender's identity.
Integrity: Ensures the data has not been altered since it was signed.
Non-repudiation: Prevents the sender from denying that they sent the message or data.
System hardening is the process of securing a computer device by means of reducing its attack
and strengthening its defenses against threats and vulnerabilities. System hardening intends to
minimize security dangers and enhance the overall safety of the system. This system entails
implementing numerous security features, configurations, and pleasant practices to shield the
system from unauthorized access, malicious and cyber attacks.
• Server Hardening: Server Hardening revolves around securing the ports, facts,
permissions, and functions of a facts server. Some unusual practices for server hardening
include the usage of robust passwords, imposing multiple authentications, and disabling USB
ports.
System Hardening standards are the set of guidelines that are to be followed by all the deployed
systems governed by them. These standards may vary from organization to organization
depending on business needs, but there are certain requirements that are included in all of
them. All the hardening standards layout rules regarding the patching and updates on OS,
physical security, data encryption, access control, system backup, auditing, and monitoring.
Some of the common organizations that maintain guidelines for system hardening include:
3. Microsoft
System Hardening is a complex, but it is important to make sure system security. The technique
of hardening the system will vary from system to system relying on the device’s configuration
and the extent of complexity of the codebase. However, the quality manner to make certain a
hardened system is to utilize the standards laid out with the aid of groups like CIS, NIST, and
many others.
• Network segmentation: It is the division of a network into smaller, and more stable
segments that can be managed and monitored properly.
• Encryption: The process of encrypting records is used to save you from unauthorized
access.