Cyber Security Fundamentals - VT
Cyber Security Fundamentals - VT
Cyber Security Fundamentals - VT
Fundamentals
Naresh Singh, CIISA
Contact 9412000939, 01202755168
Mail at
nareshsingh17@gmail.com,nareshsingh@bsnl.co.in
Tweet @naresh3913
AGENDA
• Introduction
• Broadways of Cyber Security Classification & Types of
Hackers
• Information security concepts in cyber network
• Terminology in cyber security
• Common entry points for cyber attacks
• VAPT (Ethical Hacking Phases): Urgently required to
secure information i.e. avoiding cyber attacks
• Security Audit
• Cyber Security: Risk and Vulnerabilities
• Review Questions
Introduction
Cyber Security has become the most essential
discipline in the current high technology information
systems era as there is always a lot of scope for
unauthorized access of information or resources
(Technically Hacking), as all these information
systems are always not independent and are
connected in a public network or private network
with every possible vulnerability from malicious
attackers out there in the cyber world(a digital
network either wired or wireless connected to all
PCs, laptops, Mobiles, TABs etc..).
Introduction
Network
Security
System
Security
Types of Hackers
White
Hats
Hackers
Gray Black
Hats Hats
Information Security Concepts
Integrity
• Information can be corrupted when it is available on an insecure network. When
information is modified in unexpected ways, the result is known as loss of integrity.
Availability
• Information can be erased or become inaccessible, resulting in loss of availability. This
means that people who are authorized to get information cannot get what they need.
Terminology in Cyber Security:
Threat:
• Breach of security is termed as Threat.
Exploit:
• An exploit is the identification of a security bug or
loophole in the cyber system that allows the hacker to
enter the system to access various kinds of sensitive
information.
• Remote Exploit
• Local Exploit
Terminology in Cyber Security:
Vulnerability:
• It is a software bug or logical error or implementation flaw that
causes damage or unexpected event to the cyber system.
Attack:
• An Attack occurs if there is a vulnerability in the System. Ethical
Hackers should identify these vulnerabilities and rectify them
for avoiding attacks
Types of Attacks
Passive
Spoof Active
Phishing
Attacks Distributed
Close in Insider
Denial-of-Service(DoS)
DoS stands for Denial-of –Service and this
attacking technique uses the bandwidth
available for the client or even a server so that
the server becomes overloaded or unavailable
to the client.There are two types of DoS
attacks :
• Attacks sent by a hacker to a single target system (Simple
DoS).
• Attacks sent by many hackers to a single target
(Distributed DoS or DDoS).
A DoS may result in :
1. Overloaded Network traffic, thus preventing
actual or genuine traffic
2. Access break between connected systems
3. Targeting a particular user from accessing a
service.
4. Break service to a particular system.
• This is the most dangerous attack that doesn’t require any
complicated tools to break a service. DoS tools should not be
used and hence not included.
DDoS consists of Three Parts :
1). Master/handler
2). Slave/secondary
victim/zombie/agent/BOT/BOTNET
3). Victim/primary victim
• The master is the attack launcher. A slave is a host
that is compromised by and controlled by the master.
The victim is the target system. The master directs
the slaves to launch the attack on the victim system
Phishing Attacks
Common
Remote Entry Local
Network Points for Network
Attack
Stolen
Equipment
Reconnaissa
nce
Covering
Tracks 5 Phases Scanning
of Ethical
hacking
Maintaining Gaining
Access Access
Phase-1: Reconnaissance: It is a process of
gathering the information and trying to access
the resources.
Passive reconnaissance:
• It involves gathering information about a
potential target without notice. This is
commonly in the form of searching internet for
valuable information about a particular
organization or individual. Social Engineering or
Dumpster Driving come under this category.
Other methods like sniffing the network using
various sniffers is also a passive reconnaissance.
Active reconnaissance:
• This is a slightly risky operation that involves
probing the actual ip address range, particular
host information or even servers information
being present in the network indicating the
existence of hacker, sometimes leading to
suspicion or even tracking the attacker. Active
Reconnaissance discovers the OS version,
installed software and other network
information that is useful for detecting
vulnerabilities from the hacker’s point of view.
Phase-2: Scanning: This phase involves
taking the information from phase-1 and
identifying vulnerabilities using suitable tools
like
• Port Scanners
• ICMP Scanners
• Ping Sweeps
• Network Mappers
• SNMP Sweepers
• Vulnerability Scanners
Phase3: Gaining Access :
• This phase is the starting point for real
ethical hacking. The loopholes detected in
the previous two phases are exploited here
for gaining access to the system. This
attack is possible now from either a LAN or
a public network or sometimes even
offline. Some examples of this phase are
mainly MITM Attacks like DoS, DDoS, ARP
Sniffing and Session Hijacking.
Phase-4: Maintaining Access:
• Once the network access is obtained, the hackers
maintain this access for subsequent exploitation
or attacks. Hardening process is also employed
sometimes to block access to other hackers or
even security professionals within the
organization by using various backdoor entry
tools, rootkits and Trojans. Once the system is
under the control of a hacker, he can use it for
further attacks. Such a system owned by the
hacker is termed as a zombie system.
Phase 5: Covering Tracks:
• The hackers try to hide their presence after
completing above phases so that the
security personnel may not be able to
identify their existence. They try to remove
all the traces of their attacks like
modification of log files, removal of IDS
Alarms which include techniques like
steganography, usage of tunneling
protocols etc..
Security Audits:
These are the essential audits required for ensuring
cyber security within an organizational framework.
The following steps are to be followed for conducting
Security Audits :
• Requirements are to be gathered from the client(organization) for
conducting security tests.
• Making Agreement with the Client for running these tests.
• Organize a team for ethical hacking with schedule of tasks
• Implement various tests
• Analyze the test results and prepare a security report on this.
• Submitting security flaws as a report to the client.
Sequence of Security Audit
Initial client
meeting
Agreement with
client
Security
Evaluation Plan
Report and
Documentation
Present Report
Findings
Questions and Answers
1. Which of the following statements best describes a white-hat
hacker?
• A) 443 B) 50 C) 80 D) 120
Q&A
Question Answers
Empowered