[go: up one dir, main page]

0% found this document useful (0 votes)
46 views32 pages

Week2 2023

The document discusses security threats, attacks, and the motivations of threat actors. It provides examples of security incidents like hackers hijacking bank sessions and ransomware encrypting corporate data. It also discusses different types of attackers like script kiddies, cybercriminals, and hacktivists. The document outlines passive attacks like eavesdropping and active attacks like masquerading, replay attacks, and distributed denial of service attacks. It also identifies seven domains of a typical IT infrastructure that need to be secured.

Uploaded by

Sajith Ihsan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views32 pages

Week2 2023

The document discusses security threats, attacks, and the motivations of threat actors. It provides examples of security incidents like hackers hijacking bank sessions and ransomware encrypting corporate data. It also discusses different types of attackers like script kiddies, cybercriminals, and hacktivists. The document outlines passive attacks like eavesdropping and active attacks like masquerading, replay attacks, and distributed denial of service attacks. It also identifies seven domains of a typical IT infrastructure that need to be secured.

Uploaded by

Sajith Ihsan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

CritiX

Security Operations and Assurance

Alireza Esfahani, Lecturer in Cyber Security

BSc, MSc, PhD, PG Cert, FHEA, MIEEE, MECSO

University of West London

1
Week 2
Security Threats and Attacks

CP70044E @2023 2
CP70044E @2023 3
Today’s agenda

• Examples of cybersecurity incidents.


• The motivations of the threat actors behind specific
security incidents.
• Security Attacks vs Threats
• Seven domains of an IT infrastructure

CP70044E @2023 4
Cybersecurity and the Security Operations Centre
• Different people commit cybercrime for different reasons.
• Security Operations Centres work to combat cybercrime.
• People prepare for work in a Security Operations Centre (SOC) by
earning certifications, seeking formal education, and by using
employment services to gain internship experience and jobs.

CP70044E @2023 5
Examples

CP70044E @2023 6
War Stories – Hijacked People
• A hacker set up an open “rogue” wireless
hotspot posing as a legitimate wireless
network.
• A customer logged onto her bank’s website.
• The hacker hijacked her session.
• The hacker gained access to her bank
accounts.

CP70044E @2023 7
War Stories – Ransomed Companies
• An employee receive an email from his CEO,
containing an attached PDF.
• Ransomware is installed on the employee’s
computer.
• Ransomware gathers and encrypts corporate
data.
• The attackers hold the company’s data
for ransom until they are paid.

CP70044E @2023 8
War Stories – Targeted Nations
• Stuxnet Worm
➢ Infiltrated Windows operating systems.
➢ Targeted Step 7 software that controls
programmable logic controllers (PLCs)
to damage the centrifuges in nuclear
facilities.
➢ Transmitted from the infected USB
drives into the PLCs eventually
damaging many centrifuges
http://www.zerodaysfilm.com/

CP70044E @2023 9
Attackers and Their Tools

CP70044E @2023 10
Threat,Vulnerability, and Risk
• Threat
➢ Potential danger to an asset such as data or the network.
• Vulnerability and Attack Surface
➢ Weakness in a system or its design that could be exploited
by a threat.
➢ Attack surface describes different points where an
attacker could get into a system and could get to the data
(Example – operating system without security patches)
• Exploit
➢ Mechanism used to leverage a vulnerability to compromise
an asset.
➢ Remote – works over the network.
➢ Local – threat actor has user or administrative access to
the end system.
• Risk
➢ Likelihood that a threat will exploit a vulnerability of an
asset and result in an undesirable consequence.
CP70044E @2023 11
Threat
─ Anything that has the potential (may or may not yet happen) to
cause serious harm to the information systems.
o Natural: flood, earthquake, storm, etc.
o Human-induced:
▪ software attacks (e.g. virus, phishing, Trojan)
▪ theft of intellectual property
▪ identity theft (e.g. social engineering)
▪ theft of equipment or information (e.g. mobile device stolen)
▪ sabotage (e.g. destruction of an organization's website)
▪ information extortion (e.g. ransom ware)

CP70044E @2023 12
Vulnerability and Attack
─ Attack, on the other hand, is a deliberate action taken to
exploit vulnerabilities and compromise the security of a
system, network, or data. It involves active and intentional
efforts to breach confidentiality, integrity, or availability.

▪ malware infections
▪ phishing scams
▪ distributed denial of service (DDoS)

CP70044E @2023 13
Hacker vs. Threat Actor
• White Hat Hackers
➢ Ethical hackers who use their programming skills for good, ethical, and legal
purposes.
➢ Perform penetration tests to discover vulnerabilities and report to developers
before exploitation
• Gray Hat Hackers
➢ Commit crimes and do unethical things but not for personal gain or to cause
damage.
➢ May compromise network and then disclose the problem so the organization
can fix the problem.
• Black Hat Hackers
➢ Unethical criminals who violate security for personal gain, or for malicious
reasons, such as attacking networks.
• Note: Threat actors is a term used to describe grey and black hat hackers.
CP70044E @2023 14
Evolution of Threat Actors
• Script Kiddies • Cybercriminals
Hacking started in the 1960s with phone freaking

➢ Inexperienced hackers running ➢ Black hats stealing billions of


existing tools and exploits, to dollars from consumers and
cause harm, but typically not for businesses.
profit. • Hacktivists
• State-Sponsored ➢ Grey hats who rally and protest
➢ White or black hats who steal political and social ideas.
government secrets, gather ➢ Post articles and videos to leak
intelligence, and sabotage sensitive information.
networks. ➢ Vulnerability Broker
➢ Targets are foreign governments, ➢ Discover exploits and report
terrorist groups, and corporations. them to vendors, sometimes for
prizes or rewards.
CP70044E @2023 15
Security Attacks- Types
─ Passive
➢ Passive attacks encompass actions like eavesdropping or monitoring data
transmissions, aiming to acquire the information being transmitted.

─ Active
➢ Active attacks involve the manipulation of a data stream or the
generation of a false stream.

CP70044E @2023 16
Passive Attacks
─ Release of message contents
➢ We aim to protect sensitive or
confidential information in phone
calls, emails, and file transfers from
being accessed by unauthorized
parties. Source: Cryptography and Network Security
William Stallings

─ Traffic Analysis
➢ In a traffic analysis attack, the
eavesdropper studies network data
to figure out locations, spot
communicating devices, and monitor
message frequency and length.

CP70044E @2023 17
Active Attacks
─ Masquerade
➢ A masquerade occurs when
one entity pretends to be
someone else.

Source: Cryptography and Network Security


William Stallings

─ Replay
➢ A replay attack, sometimes
called a repeat or playback
attack, is a network security
tactic in which valid data
transmission is wrongfully
duplicated or delayed.
CP70044E @2023 18
Active Attacks-contd’
─ Modification
➢ Message modification refers to
the alteration of a portion of a
legitimate message or the
manipulation of message timing,
order, or content to create an
unauthorized impact.
Source: Cryptography and Network Security
William Stallings

─ Denial of Service (DoS)


➢ Denial of service disrupts or
hinders the regular utilization or
administration of communication
facilities.

CP70044E @2023 19
Active Attacks-contd’
─ Distributed Denial of Service
(DoS)
➢ DDoS attacks happen when many
devices, often controlled by
hackers, all send a lot of data to a
target at the same time, causing it
to be overwhelmed with traffic.

https://bunny.net/academy/network/what-are-distributed-denial-of-service-ddos-attacks/

CP70044E @2023 20
Domains of a typical IT infrastructure

─ Seven domains

Source: Fundamentals of Information Systems Security

CP70044E @2023 21
Domains of a typical IT infrastructure
• User domain
‒ Roles and tasks: AUP (Acceptable User Policy) defines what
users are allowed and not allowed to do with organisational-
owned IT assets.
‒ Responsibilities: employees
‒ Accountabilities: HR to check employee background

‒ Risks, threats, vulnerabilities and mitigation plans for the


user domain
o Lack of user awareness
o User apathy toward policies
o User downloads of photos, music, videos
o User destruction of systems, applications or data
o Attacks on the organization or acts of sabotage by disgruntled employees
o …
CP70044E @2023 22
Domains of a typical IT infrastructure
• Workstation domain
‒ Roles and tasks: hardening a system is the process of
ensuring that controls (e.g. user authentication, software
updates, security patches, system configurations) in place to
handle any known threats.
‒ Responsibilities: IT services
‒ Accountabilities: IT desktop manager

‒ Risks, threats, vulnerabilities and mitigation plans for the


workstation domain
o Unauthorized access to workstation, systems, applications, etc.
o Desktop OS and software vulnerabilities
o Infection of workstation by virus, malicious code, malware.
o User violation of AUP
o …
CP70044E @2023 23
Domains of a typical IT infrastructure
• LAN domain
‒ Roles and tasks: maintain the master list of user
accounts and access rights
‒ Responsibilities: LAN system admin
‒ Accountabilities: LAN manager

‒ Risks, threats, vulnerabilities and mitigation plans for


the LAN domain
o Unauthorized access to LAN, systems, applications and data.
o LAN server OS, application software vulnerabilities, etc.
o Unauthorized access by rogue users on WLAN
o Compromised confidentiality of data transmissions via WLAN
o …

CP70044E @2023 24
Domains of a typical IT infrastructure
• LAN-to-WAN domain
‒ Roles and tasks: maintain security while giving users as
much access as possible
‒ Responsibilities: Network security group
‒ Accountabilities: IT security manager

‒ Risks, threats, vulnerabilities and mitigation plans for


the LAN-to-WAN domain
o Unauthorized network probing and port scanning.
o Unauthorized access through the LAN-to-WAN domain
o IP router, firewall and network appliance software vulnerability,
configuration file errors or weaknesses
o …

CP70044E @2023 25
Domains of a typical IT infrastructure
• WAN domain
‒ Roles and tasks: allow users the most access possible
while making sure what goes in and out is safe
‒ Responsibilities: WAN group / network engineer
‒ Accountabilities: IT network manager
‒ Risks, threats, vulnerabilities and mitigation plans for
the WAN domain
o Open, public, easily accessible to anyone who wants to connect
o Vulnerable to eavesdropping, malicious attacks, DDoS, IP Spoofing
attacks, etc.
o Email of Trojans, worms, virus attacks, etc.
o …

CP70044E @2023 26
Domains of a typical IT infrastructure
• Remote Access domain
‒ Roles and tasks: allow users to remotely access IT
assets while making sure secure communication
‒ Responsibilities: WAN group / network engineer
‒ Accountabilities: IT network manager

‒ Risks, threats, vulnerabilities and mitigation plans for


the remote access domain
o Unauthorized remote access to IT systems, applications, and data
o Private data or confidential data compromised remotely
o …

CP70044E @2023 27
Domains of a typical IT infrastructure
• System/Application domain
‒ Roles and tasks: An organization’s mission-critical
applications must be secured
‒ Responsibilities: System admin
‒ Accountabilities: IT system manager

‒ Risks, threats, vulnerabilities and mitigation plans for


the system/application domain
o Unauthorized access to data centers, systems, applications
o Loss or corruption of data
o …

CP70044E @2023 28
Summary
❑ Explain the motivations of the threat actors behind specific
security incidents.
❑ Explain the potential impact of network security attacks
❑ Threat, vulnerability, risk
❑ Security Attacks
❑ IT infrastructure domains

CP70044E @2023 29
Practice Time

CP70044E @2023 30
CP70044E @2023 31
Thank you very much!

CP70044E @2023 32

You might also like