Domain 2, Security Plus
Domain 2, Security Plus
Domain 2, Security Plus
Understanding Vulnerabilities:
1: Vulnerabilities Impact:
Before we explore vulnerabilities in detail, let's spend some time reviewing the goals
of cybersecurity and the types of risk that can occur in an organization.
When we think of the goals of information security, we often use a model known as
the CIA triad shown here. The CIA triad highlights the three most important
functions that information security performs in an enterprise.
- Confidentiality,
- Integrity,
- Availability.
We also use the term "data exfiltration" to describe the act of removing sensitive
data from an organization's systems and networks.
Availability, ensuring that authorized individuals can gain access to information when
they need it. If users can't access important business records or systems, that lack of
availability may have a profound impact on the business.
We can categorize the potential impact of a security incident using the same
categories that businesses generally use to describe any type of risk.
Financial risk is, as the name implies, the risk of monetary damage to the
organization. This might include the cost of restoring damaged equipment and data,
conducting an incident response investigation, or notifying individuals that their data
was stolen and that they are now vulnerable to identity theft.
Strategic risk is the risk that an organization will become less effective in meeting its
major goals and objectives as the result of a breach. Suppose that you experience a
security incident where one employee loses a laptop that contained new product
development plans.
This incident may pose strategic risk to the organization in two different ways:
- First, if the organization doesn't have another copy of those plans, they may be
unable to bring the new product to market or may suffer significant product
development delays.
- Second, if competitors gain hold of those plans, they may be able to bring
competing products to market more quickly or even beat the organization to
market gaining first mover advantage.
Operational risk is the risk to the organization's ability to carry out its day-to-day
functions. Operational risks may slow down business processes, delay delivery of
customer orders, or require the implementation of time-consuming manual
workarounds to normally automated practices.
Compliance risk occurs when a security breach causes an organization to run afoul of
legal or regulatory requirements. For example, the Health Insurance Portability and
Accountability Act, HIPAA requires that healthcare providers and other covered
entities protect the confidentiality, integrity, and availability of protected health
information. If a hospital loses patient medical records, they run afoul of HIPAA
requirements and are subject to sanctions and fines from the US Department of Health
and Human Services.
Administrators need to understand how security issues arising in the supply chain can
impact their organizations.
One of the most important vendor-related issues that security professionals need to
monitor is the end-of-life announcements made by vendors about products used within
the organization.
Let's talk about three common phrases used to describe how vendors end support for
products, but you should recognize that these terms may be used differently by
different vendors.
2. Next, the end of support announcement provides a date that the vendor will
discontinue some level of support. This announcement may be the actual end of all
support for the product, or it may be the date that the vendor will stop correcting
non-security issues or providing minor enhancements.
Organizations are left in a position where they're running unsupported systems and
applications and exposing themselves to significant risk. You should stay current on
the support status of all products used in your organization by monitoring vendor
announcements.
This risk is compounded if the vendor's system is integrated with other components of
your operating environment. Vendors may use embedded systems as components of
their products that are not visible to you as the end customer.
For example, a digital sign system may run on a version of the Linux operating
system that is completely hidden from end users. If a vulnerability arises in that Linux
version, the digital sign system may be open to attack. In these cases, customers of the
end product typically do not have access to upgrade the embedded systems but must
rely on vendors to provide the needed security updates.
Cloud Scenario: If you depend upon vendors to supply your organization with cloud
services, the risk profile changes. The vendor becomes responsible for managing
many risks on your behalf, and you must have confidence that the vendor is living up
to that responsibility. You also need to ensure that you're confident the vendor will
remain an ongoing viable business concern. If you use vendors for data
storage, consider the risks associated with the vendor being unable to provide you
with access to your data at some point in the future.
Solution: You may wish to mitigate this risk by keeping backups in a secondary
operating environment that's independent of your primary vendor. The use of vendors
is unavoidable in modern IT environments. Cybersecurity professionals must
monitor these vendor relationships to ensure that the relationships don't jeopardize the
security of their own environments.
As you analyze your supply chain for vulnerabilities, be sure that you look at the
many different types of suppliers and vendors in your environment.
One common mistake that IT staff make is taking a system directly from a
manufacturer and installing it on their network without modifying the default
configuration. This is especially dangerous in the case of devices that contain
embedded computers but are not commonly managed as part of the enterprise IT
infrastructure. These include copiers, building controllers, research equipment, and
other devices that come directly from vendors. The default configurations on these
devices may contain misconfigured firewalls with open ports and services, open
permissions, guest accounts, default passwords, unsecured route accounts, or other
serious security issues. IT staff should always verify the security of devices before
connecting them to the network. System application and device configurations vary
widely and can often be very complicated. Systems that are misconfigured or
configured with weak security settings can be serious problems. Small errors can lead
to significant security flaws that may allow an attacker to gain complete control of the
device.
Administrators must also carefully manage encryption keys to ensure that they
don't fall into the wrong hands. If a private key becomes known to a third party, that
person can impersonate the keys legitimate owner, eavesdropping on
communications, engaging in false communications, and creating false digital
signatures.
Along those same lines, organizations must protect the issuance and use of digital
certificates, ensuring that they have strong certificate management processes in
place to prevent the issuance of false certificates and protect the secret keys
associated with digital certificates.
Patch management ensures that systems and applications receive all of the security
updates provided by manufacturers to correct known vulnerabilities.
- Remember that you need to patch many different components of your operating
environment. Operating system patches often get the most attention, but don't
forget to patch applications and the firmware of devices used throughout your
environment. A single unpatched device can provide the open gateway that an
attacker needs to establish a foothold on your network.
4: Architecture Vulnerabilities:
- One recipe for disaster is designing the system first and then trying to bolt on
security after the fact.
When you're considering the security of a system, don't just look at the technical
architecture and design.
- You also need to think about the business processes and people surrounding the
design as well.
- This means that they get turned on when they're new and necessary, but they
often don't get disconnected from the network when they're no longer
useful. This can result in serious system security issues, especially when those
assets are undocumented because nobody is patching and maintaining
them from a security perspective, leaving them as open holes in the
organization's network security.
Finally, make sure that you are very careful about the use of legacy hardware and
firmware in your organization. Using unsupported systems in your environment can
expose you to uncorrectable security vulnerabilities.
Malware:
Definition: Malicious software that infects systems and performs harmful actions like
stealing information or disrupting normal usage.
Components:
Propagation Mechanism: Method of spreading between systems.
Payload: Malicious action performed, which can include data theft, encryption for ransom,
or monitoring keystrokes.
Types of Malwares:
Viruses: Spreads through user actions (e.g., opening email attachments, clicking malicious
links, or inserting infected USB drives).
- Does not spread unless facilitated by a user.
- Protection includes user education.
Worms: Spread autonomously, without user intervention.
- Exploit vulnerabilities to infect systems, then use them as a base to continue spreading
across networks.
- Defense includes keeping systems up to date with security patches.
Trojan Horses: Appear to be legitimate software but hide a malicious payload.
- Once installed, perform expected actions while causing harm in the background.
Remote Access Trojans (RATs): Special type providing hackers remote control over
infected systems.
- Application control limits system software to pre-approved titles/versions.
Malware Payloads:
Definition: Malware has a propagation mechanism (how it spreads) and a payload (malicious
content delivered to infected systems).
Types of Malware Payloads:
Spyware:
Function: Gathers information without user consent and sends it to the malware author.
- Purpose: Identity theft, financial account access, or espionage.
Techniques:
- Keystroke Loggers: Record keystrokes and may monitor specific websites for sensitive
credentials.
- Web Browsing Monitoring: Observes browsing activity for targeted ads or user behavior
analysis.
- System File Searches: Searches hard drives/cloud storage for sensitive data like Social
Security numbers.
- Delivery Method: Often bundled with other software via click-through installers that trick
users or don't obtain explicit permission (bloatware).
Ransomware:
Function: Blocks legitimate use of computer/data until a ransom is paid, typically by
encrypting files. Examples:
WannaCry (2017): Exploited Windows vulnerability EternalBlue; encrypted valuable files
and demanded ransom for decryption keys.
- LockBit: An ongoing ransomware strain.
- CryptoLocker: Early ransomware that earned over $27 million via Bitcoin ransoms.
- Challenge: Deciding whether to pay the ransom, as a survey showed over 40% of
infected users pay.
- Impact: Users lose access to critical files (e.g., documents, CAD drawings) unless the
ransom is paid.
Crypto Malware:
Function: Takes over computing resources to mine cryptocurrencies, generating revenue for
the malware author.
Difference from Ransomware:
- Ransomware uses encryption to demand ransom.
- Crypto malware exploits computing resources for cryptocurrency mining.
Prevention Measures:
1. Anti-Malware Software: Install and keep updated.
2. Security Patches: Apply promptly.
3. End-User Education: Teach the risks and methods of malware infection.
Logic Bombs:
Definition: Malware that executes a malicious action when certain conditions are met (e.g., a
specific date/time, file modifications, or API call results).
Examples:
Hypothetical: A programmer embeds a logic bomb in a payroll system to check if they are
still employed; if not, it triggers malicious actions.
Real-world:
- 2003: A logic bomb affected multiple government systems in South Korea.
- 1989: The "Friday the 13th" logic bomb activated on systems when the date matched
the criteria.
Risk Mitigation: Requires vigilance beyond standard anti-malware measures, including
changing default passwords, disabling unused accounts, and monitoring for security
vulnerabilities.
Security Practices:
Regular Updates: Ensuring systems and applications are up-to-date to avoid known
vulnerabilities.
Password Management: Routine changes and avoidance of default settings.
Monitoring: Keeping abreast of security news related to potential backdoors and logic bombs
in commonly used software.
Fileless Viruses:
Definition: Avoid detection by not writing data to disk; they operate entirely within the
system's memory.
Infection Methods:
- Early Example: Microsoft Office macro viruses operating within Office scripting.
- Modern Techniques: Execute as JavaScript downloaded from websites, or utilize
persistent mechanisms like modifying the Windows registry to reload on system
reboot.
- Persistence: Achieved without traditional file creation, often through registry
modifications that trigger memory reloading after system restarts.
Lifecycle:
1. Infection of multiple systems globally.
2. Systems become bots and may spread the infection further.
3. Bots connect to a C&C network to receive instructions.
4. Execution of commands such as spam distribution or DDoS attacks.
Security Measures: Security professionals need to understand botnet mechanics, monitor for
signs on their networks, and counteract potential threats.
Security Concerns:
- Scripts can be exploited to create backdoors, modify file permissions, or execute
other malicious actions.
- Importance of controlling script execution on devices to prevent unauthorized
activities.
Preparation for Security Exams: Familiarity with scripting languages and their common
uses, understanding the potential for misuse, and recognizing secure scripting practices.