0% found this document useful (0 votes)
0 views14 pages

unitt 01 cyber

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 14

Cybersecurity Incidents

Cybersecurity incidents refer to events or activities that pose a threat to the


security of an information system or network. The key aim is to understand the
nature of these incidents, their potential impact, and how organizations can
respond effectively.
Common Types of Cybersecurity Incidents:
1. Data Breaches:
o A data breach occurs when unauthorized individuals or entities gain
access to confidential or sensitive data.
o Example: Hackers stealing personal information, financial details,
or intellectual property from an organization’s database.
o Impact: Loss of customer trust, legal consequences, financial
penalties, and reputational damage.
2. Malware Attacks:
o Malware refers to malicious software designed to damage or disrupt
systems, steal information, or gain unauthorized access to
resources.
o Types of Malware:

 Viruses: Self-replicating programs that spread to other


systems.
 Ransomware: Encrypts files or locks access to systems,
demanding a ransom for decryption.
 Trojans: Disguised as legitimate software but contain
harmful actions.
 Spyware: Monitors and collects sensitive user information
without consent.
o Impact: Data loss, system downtime, financial loss, and privacy
violations.
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS):
o DoS attacks aim to overwhelm a server or network with traffic,
making it unavailable to legitimate users.
o DDoS attacks involve multiple systems (often hijacked) to launch
coordinated traffic to overwhelm the target.
o Impact: Service outages, loss of revenue, and damage to brand
reputation.
4. Phishing:
o Phishing attacks involve sending fraudulent communications (often
emails) that appear to come from a trusted source, aiming to steal
sensitive information like passwords, account numbers, or financial
details.
o Spear Phishing: A targeted attempt where attackers customize
the message for a specific individual or organization.
o Impact: Compromised credentials, unauthorized access to
accounts, financial loss, or data leaks.
5. Insider Threats:
o Insider threats occur when an individual with authorized access
(e.g., employees, contractors) intentionally or unintentionally
causes harm to the organization's systems or data.
o Types:

 Malicious Insiders: Employees who intentionally sabotage,


steal, or leak data.
 Negligent Insiders: Employees who accidentally expose
data or cause a security vulnerability due to carelessness.
o Impact: Data theft, sabotage, regulatory penalties, and loss of
intellectual property.
6. Advanced Persistent Threats (APTs):
o APTs are prolonged and targeted attacks where the attacker gains
continuous access to a network for espionage or strategic
objectives.
o Characteristics: High-level sophistication, patience, and stealth.

o Example: Nation-state actors targeting government agencies,


critical infrastructure, or corporations to steal sensitive information
or disrupt operations.
o Impact: Prolonged data theft, espionage, intellectual property loss,
and significant damage to national security or corporate strategies.
7. SQL Injection:
o SQL injection is a code injection attack that exploits vulnerabilities
in web applications by inserting malicious SQL statements into input
fields.
o Impact: Unauthorized access to databases, data theft, and
corruption of information.
8. Cross-Site Scripting (XSS):
o XSS attacks allow attackers to inject malicious scripts into websites
or applications, which are then executed by the browser of users
who visit the compromised site.
Threat actors
Threat actors are individuals or groups that intentionally attempt to compromise
the confidentiality, integrity, or availability of an organization’s information or
assets through malicious activities. These actors can have various motivations,
techniques, and skill levels. Here's a more detailed breakdown:
Types of Threat Actors:
1. Hackers:
o White Hat Hackers: Ethical hackers who identify vulnerabilities to
help organizations secure their systems (often as part of a
penetration testing team).
o Black Hat Hackers: Malicious individuals who exploit vulnerabilities
for personal gain or to cause harm (e.g., financial theft, data
breaches).
o Gray Hat Hackers: Individuals who may occasionally break the law
but do not have malicious intent or do so without exploiting the
vulnerabilities for personal gain. They often report their findings to
organizations or publish them.
2. Cybercriminals:
o These are individuals or organized groups that engage in criminal
activities like identity theft, fraud, data theft, ransomware attacks,
and more. Cybercriminals are primarily motivated by financial gain.
3. Nation-State Actors:
o These are groups or individuals backed by a nation-state, often
conducting cyber espionage, cyber warfare, or cyber sabotage.
Their targets could include government agencies, critical
infrastructure, or corporate entities.
o Advanced Persistent Threats (APTs): These are sophisticated, long-
term campaigns often attributed to nation-state actors. APTs focus
on stealth and persistence to infiltrate systems and extract
sensitive information.
4. Hacktivists:
o Hacktivists use hacking techniques to promote political or social
causes. They typically target organizations or government entities
they disagree with to disrupt services, expose sensitive information,
or raise awareness of their cause.
o Example: Attacks like DDoS (Distributed Denial of Service) or
website defacement are common methods used by hacktivists.
5. Insiders:
o Malicious Insiders: Employees, contractors, or business partners
who intentionally misuse their access to the organization's systems
or data for personal or financial gain. They might sell sensitive data
or sabotage systems.
o Unintentional Insiders: Individuals who unknowingly contribute to
security breaches by falling victim to phishing scams, downloading
malicious attachments, or making errors that expose sensitive
information.
6. Script Kiddies:
o Individuals, often inexperienced, who use pre-written hacking tools
or scripts to launch attacks. They usually lack deep technical skills
but can still cause significant damage if the tools they use are
powerful enough.
7. Cyber Terrorists:
o Cyber terrorists seek to use the internet or networks to cause
widespread fear or harm, often targeting critical infrastructure like
power grids, healthcare systems, or transportation systems. Their
goal is often to disrupt society on a large scale rather than gain
financial rewards.
Motivation of Threat Actors:
Threat actors can be driven by several factors, including:
 Financial Gain: Theft of data, intellectual property, or directly through
ransomware, fraud, or extortion.
 Political or Social Ideology: Hacktivism or cyber warfare carried out for
political or social causes.
 Revenge: Disgruntled employees or individuals seeking to harm an
organization or its reputation.
 Intellectual Property Theft: Corporate espionage or stealing proprietary
technology or information.
 Espionage: Obtaining state secrets or classified information to benefit a
nation-state or organization.
 Challenge or Recognition: Some threat actors (like hackers) may be
motivated by the challenge or desire for recognition in the cyber
community.
Techniques and Tools Used by Threat Actors:
Threat actors employ various methods and tools to achieve their objectives,
including:
 Social Engineering: Manipulating individuals into divulging confidential
information (e.g., phishing, spear-phishing, baiting).
 Malware: Software designed to damage or exploit systems, such as
viruses, worms, Trojans, ransomware, and spyware.
 Exploiting Vulnerabilities: Finding and exploiting weaknesses in systems,
networks, or software (e.g., zero-day exploits).
 Brute Force Attacks: Using automated tools to guess passwords or
encryption keys.
 Distributed Denial-of-Service (DDoS) Attacks: Overloading a system with
traffic to make it unavailable.
 SQL Injection: Inserting malicious SQL queries into a web application's
database to manipulate data or steal information.
 Man-in-the-Middle (MitM) Attacks: Intercepting and possibly altering
communication between two parties without their knowledge.
Common Targets of Threat Actors:
 Government Agencies: These can be targets of cyber espionage or attacks
aimed at destabilizing or stealing sensitive information.
 Financial Institutions: Banks, payment processors, and other financial
entities are prime targets for financial gain through fraud, data theft, or
ransomware.
 Healthcare Organizations: Health data is valuable, making hospitals and
healthcare providers targets for ransomware, data breaches, and theft.
 Critical Infrastructure: Power grids, transportation systems, and water
supply systems can be targeted for disruption, potentially causing
significant societal damage.
 Large Corporations: Businesses, particularly those with valuable
intellectual property or customer data, are frequent targets of corporate
espionage or data breaches.
Mitigating the Risks from Threat Actors:
Organizations can take several steps to reduce the impact of threat actors:
 Network Security: Implementing firewalls, intrusion detection/prevention
systems, and encryption can help protect sensitive data and prevent
unauthorized access.
 Employee Training: Educating staff about phishing, social engineering
tactics, and security best practices can reduce the likelihood of successful
attacks.
 Regular Patching: Keeping systems and software up to date with the latest
security patches helps close vulnerabilities that threat actors might
exploit.
 Access Control: Limiting access to sensitive systems and data to only
those who absolutely need it can reduce insider threats and minimize
damage if an account is compromised.
 Incident Response Planning: Having a solid plan for responding to
incidents can minimize the damage caused by an attack and help
organizations recover more quickly.
 Monitoring and Detection: Continuous monitoring of networks and systems
can help detect unusual activity and provide early warning of potential
attacks.

Network security attacks


Network security attacks are malicious attempts to compromise or disrupt
systems, networks, or data. Key types of attacks include:
1. Denial of Service (DoS) / Distributed DoS (DDoS): Overloading a system to
make it unavailable to legitimate users.
2. Man-in-the-Middle (MitM): Intercepting and potentially altering
communications between two parties.
3. Phishing: Tricking individuals into providing sensitive information via
fraudulent emails or websites.
4. Ransomware: Malware that encrypts data and demands ransom for
decryption.
5. SQL Injection: Inserting malicious code into a database query to gain
unauthorized access or manipulate data.
6. Cross-Site Scripting (XSS): Injecting malicious scripts into web applications
to target users.
7. Privilege Escalation: Gaining higher access levels, like administrator rights,
on a system.
8. Port Scanning & Network Sniffing: Scanning for open ports and
intercepting network traffic to gather sensitive data.
9. Zero-Day Exploits: Attacks that exploit unknown vulnerabilities before the
vendor can release a fix.
10.DNS Spoofing: Redirecting traffic to fraudulent websites by corrupting DNS
records.
11.Credential Stuffing: Using stolen login credentials to access other accounts
where users reuse passwords.
To defend against these attacks, organizations need strong security measures
like encryption, access controls, regular patching, employee training, and
advanced monitoring systems.

Security Operations Center (SOC)


A Security Operations Center (SOC) is a centralized facility or team within an
organization that is responsible for monitoring, detecting, responding to, and
preventing security incidents or cyberattacks. The SOC plays a critical role in
ensuring the security and integrity of an organization's network, systems, and
data.
Key Functions of a SOC:
1. Continuous Monitoring:
The SOC provides 24/7 surveillance of an organization's IT infrastructure,
networks, and systems to detect any suspicious activity or potential
threats. This monitoring involves analyzing logs, network traffic, and
system behaviors for signs of cyberattacks or anomalies.
2. Incident Detection and Response:
When a potential security incident is detected, the SOC team investigates,
analyzes, and responds to the threat. This may involve containing the
threat, preventing further damage, and recovering from the incident. The
SOC follows defined protocols for incident management and escalation.
3. Threat Intelligence:
The SOC collects and analyzes information about current and emerging
cyber threats, including tactics, techniques, and procedures (TTPs) used by
threat actors. This helps the team stay informed and anticipate new types
of attacks, improving prevention and response strategies.
4. Vulnerability Management:
The SOC helps identify and address security vulnerabilities within systems
and applications. This includes managing regular patching and updates, as
well as conducting vulnerability assessments and penetration testing to
find weaknesses before attackers do.
5. Forensics and Investigation:
After an incident, the SOC is responsible for conducting thorough
investigations to understand how the breach occurred, what damage was
done, and how to prevent similar incidents in the future. Digital forensics
tools are often used to analyze compromised systems and gather evidence
for legal purposes.
6. Security Event Management (SIEM):
The SOC often relies on Security Information and Event Management
(SIEM) systems to collect and analyze data from various sources like
firewalls, intrusion detection systems, and other security tools. SIEM helps
aggregate data, detect threats, and provide actionable insights for SOC
analysts.
7. Compliance and Reporting:
The SOC ensures that the organization adheres to relevant security
standards, regulations, and compliance requirements (e.g., GDPR, HIPAA,
PCI DSS). The team prepares reports on security incidents, risk
assessments, and overall security posture for internal stakeholders and
regulatory bodies.
Key Components of a SOC:
 People: Skilled cybersecurity professionals, including SOC analysts,
incident responders, threat hunters, and SOC managers.
 Processes: Defined procedures for handling incidents, conducting
investigations, and ensuring continuous improvement of security
measures.
 Technology: Tools and platforms like SIEM, intrusion detection systems
(IDS), firewalls, endpoint protection, and threat intelligence feeds.
SOC Tiers or Levels:
SOC teams are often organized into different levels or tiers based on the
complexity of the tasks they handle:
 Tier 1 (Alert Monitoring): Analysts monitor alerts generated by security
tools and respond to basic incidents. They handle routine security events
and escalate more complex issues to higher-tier analysts.
 Tier 2 (Incident Response and Analysis): Analysts perform deeper analysis
of security incidents, determine their impact, and recommend appropriate
responses. They handle more complex issues that require in-depth
technical knowledge.
 Tier 3 (Advanced Threat Hunting and Forensics): Experts who conduct
proactive threat hunting, investigate sophisticated or unknown threats,
and conduct digital forensics and deep dives into attacks.
Importance of a SOC:
 Proactive Threat Detection: SOCs provide real-time monitoring, enabling
early detection and swift response to potential security threats before they
escalate.
 Improved Incident Response: With a dedicated team in place,
organizations can quickly and effectively respond to incidents, minimizing
damage and recovery time.
 Regulatory Compliance: SOCs help organizations stay compliant with
security standards and regulations by ensuring proper data protection and
reporting.
 Cost Savings: Early detection of threats and timely incident response can
reduce the cost of data breaches, system downtime, and damage to the
organization's reputation.

Security features of the Windows & Linux operating


system
Both Windows and Linux operating systems come with a variety of built-in
security features to protect against threats, such as malware, unauthorized
access, and data breaches. Below is a comparison of the security features in
both operating systems:
Windows Security Features
1. Windows Defender Antivirus
o Function: Provides real-time protection against malware, viruses,
and other malicious software.
o Features: Includes automatic scanning, virus and threat protection,
and cloud-delivered protection.
o Role: Helps prevent malware from compromising the system.

2. BitLocker
o Function: Full disk encryption tool to protect data on the computer
in case of physical theft or unauthorized access.
o Features: Encrypts the entire hard drive, ensuring that unauthorized
users cannot read the data without the encryption key.
o Role: Protects sensitive data on laptops and other portable devices.

3. User Account Control (UAC)


o Function: Limits application privileges to prevent unauthorized
changes to the system.
o Features: Prompts the user for permission before allowing software
to make system-level changes.
o Role: Mitigates the impact of malware by preventing unauthorized
modifications.
4. Windows Firewall
o Function: Filters inbound and outbound traffic to protect the system
from unauthorized access.
o Features: Can block or allow specific applications or services based
on configured rules.
o Role: Prevents unauthorized network connections and can protect
against certain network-based attacks.
5. Windows Defender SmartScreen
o Function: Protects against phishing attacks and malware by blocking
potentially malicious websites and files.
o Features: Analyzes files and websites against a database of known
threats.
o Role: Prevents accidental downloads or visits to harmful websites.

6. Security Auditing & Event Logs


o Function: Tracks events related to system security, such as login
attempts, file access, and configuration changes.
o Features: Provides detailed logs that help administrators identify
suspicious activities.
o Role: Facilitates detection and investigation of security incidents.

7. Windows Hello & Credential Manager


o Function: Provides biometric authentication options (facial
recognition, fingerprint) and securely stores login credentials.
o Features: Allows passwordless login using facial recognition or
fingerprints, and manages stored credentials securely.
o Role: Enhances authentication security and prevents unauthorized
access.

Linux Security Features


1. SELinux (Security-Enhanced Linux)
o Function: A security module that enforces mandatory access control
(MAC) policies, providing more granular control over system
resources.
o Features: Uses predefined security policies to restrict access based
on roles and privileges.
o Role: Enhances security by ensuring that applications and users can
only perform actions necessary for their operation.
2. AppArmor
o Function: Another MAC security tool, similar to SELinux, that
restricts the behavior of programs using security profiles.
o Features: Defines what files, networks, and resources a program can
access, offering a security sandbox for applications.
o Role: Provides an additional layer of protection by confining
applications to a predefined set of actions.
3. iptables
o Function: A command-line firewall tool used to configure packet
filtering and network traffic rules.
o Features: Allows for fine-grained control over incoming and outgoing
network traffic, based on various criteria (e.g., IP addresses, ports,
protocols).
o Role: Protects against unauthorized network access and can block
malicious traffic.
4. AppArmor and SELinux Contexts
o Function: Define specific security policies for applications or users
that restrict access to resources.
o Features: Enforces permissions that limit applications to specific
files, network ports, and more.
o Role: Prevents exploits by confining applications to safe operating
environments.
5. Linux Permissions and Access Control
o Function: Controls access to files and directories using file system
permissions (read, write, execute) for users, groups, and others.
o Features: Each file and directory has an associated owner, group,
and permissions setting, which determines who can access or
modify it.
o Role: Restricts access to critical files and helps prevent
unauthorized access.
6. Password and Authentication Mechanisms
o Function: Linux supports strong password policies, two-factor
authentication (2FA), and SSH keys for remote login.
o Features: Requires strong passwords, the use of PAM (Pluggable
Authentication Modules), and allows SSH key authentication for
secure remote access.
o Role: Enhances system login security and prevents unauthorized
remote access.
7. Auditd (Audit Daemon)
o Function: Provides logging of system events, including user activity,
file accesses, and security-related events.
o Features: Can be configured to monitor specific system activities
and generate detailed audit logs.
o Role: Enables forensic analysis and helps track and investigate any
security incidents.

Understanding File Permissions


Linux file permissions are crucial for system security and management. Here's a
quick overview to help you understand how they work.

The Triad of Permissions


In Linux, every file and directory has a set of permissions that determines who
can do what with them. These permissions are divided into three categories:
 Read (r): Allows reading the contents of a file or listing the contents of a
directory.
 Write (w): Allows modifying a file or directory.
 Execute (x): Allows executing a file (if it's a script or a program) or
accessing a directory and its contents.
Who Gets What?
Permissions are assigned to three types of users:
 Owner: The user who owns the file.
 Group: A set of users who share the same permissions.
 Others: Everyone else.
The Permission String
Permissions are represented as a string of ten characters, like this:
-rwxr-xr--. Let's break it down:
 The first character indicates the type of file (- for a regular file, d for a
directory).
 The next three characters (rwx) are the owner's permissions.
 The following three (r-x) are the group's permissions.
 The last three (r--) are for others.
Example: Decoding Permissions
Consider a file with the following permissions:
-rwxr-xr--
 The owner can read, write, and execute (rwx).
 The group can read and execute (r-x).
 Others can only read (r--).
Changing Permissions: The 'chmod' Command
You can change file permissions using the chmod command. There are two
ways to do this: symbolic mode and numeric mode.
Symbolic Mode
In symbolic mode, you use letters to represent permissions and operators to add
or remove them.
User Types
 u: User (file owner)
 g: Group (file's group)
 o: Others (everyone else)
 a: All (user, group, and others)
Operations
 +: Add a permission
 -: Remove a permission
 =: Set exact permissions, removing others
Permission Types
 r: Read
 w: Write
 x: Execute
Examples of Symbolic Mode
Add execute permission for the user:
chmod u+x file.txt
Remove write permission for the group:
chmod g-w file.txt
Setting Exact (=) Permissions. Set read and write for the user, read for the group,
and no permissions for others:
chmod u=rw,g=r,o= file.txt
Combining Multiple Changes. Add read permission for group and others,
remove execute for the user:
chmod g+r,o+r,u-x file.txt
Numeric Mode
In numeric mode, you use a three-digit number to set permissions. Each digit
represents a set of permissions:
 Read (r) = 4
 Write (w) = 2
 Execute (x) = 1
Add these values to get the desired permissions. For example, 755 means:
 Owner: rwx (4+2+1 = 7)
 Group: r-x (4+0+1 = 5)
 Others: r-x (4+0+1 = 5)
chmod 755 file.txt
Example: Setting Permissions
Imagine you have a script run.sh that you want to make executable by everyone:
chmod 755 run.sh
Now everyone can run the script, but only you can modify it.
Linux File System Structure
The Linux file system is hierarchical, meaning it uses a tree-like structure
starting from the root directory (/). Below the root directory, directories are
organized in a logical way. Some of the key directories in the Linux file system
include:
 /: The root directory, the top-most directory in the hierarchy.
 /bin: Essential system binaries (executable files) needed for basic system
functionality.
 /home: Contains user directories (e.g., /home/user1 for user1).
 /etc: Configuration files for system-wide settings.
 /var: Variable data like log files, temporary files, and mail.
 /tmp: Temporary files used by the system.
 /usr: User-related programs and data (e.g., applications, libraries).
 /lib: Libraries needed by system binaries.
 /dev: Device files representing hardware devices like hard drives, printers,
etc.
 /proc: Virtual file system that provides information about running
processes and system status.
 /mnt: Mount point for temporary file systems or external drives.
 /media: Mount point for removable devices like USB drives.

You might also like