CTI12318 - Infosec Notes

docx

School

Full Sail University *

*We aren’t endorsed by this school

Course

CTI2318

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

11

Uploaded by LieutenantResolve13271

Report
Intro to Infosec Notes Week 1 Lecture Notes To understand and apply encryption standards to protect data. To identify and apply network security concepts. To secure OS against unauthorized programs and users. To identify and apply risk-management strategies and regulatory compliance requirements related to information security. Be cautious of using ChatGPT – Professor will know. Security 501 is what the course is based on but 601 is the most recent. End of class presentation Security Issues 10-minute keynote/PowerPoint presentation Select one of 10 topics in FSO. Presentation should cover: o Overview of the issue o Why it is important to cloud security. o Compensating controls for the issue (Defense in Depth) o Risk to organizations from the issue Lab 1 – User Security Going to be creating a strong and weak password. Lab 2 – Patch, Harden, Protect CIS Controls and CIS Benchmarks 1.1 – In the News – Phishing $3M Mattel Phishing Scam Phishing email claimed to be new executive needing a bill to China paid. Mattel had controls requiring two signoffs that were poorly implemented. The only reason they recovered the money was a hall conversation and a bank holiday. How does this impact information security? $3M is a lot of money. What should be done? Double check the sign-off policy. How could you protect your system? Multi-faceted problem. Education and technology measures that can be implemented. 1.2 – CIA and Defense in Depth Confidentiality, Integrity, and Availability
Intro to Infosec Notes The framework of the mindset required to practice information security as a whole. Defense in Depth Creating layered security o If one control fails another may stop the attack o “Belt and Suspenders” o Fail safe v Fail Open o Mixture of controls Preventative – preventing an action from occurring. Detective – detecting an action occurring. Corrective – correcting an action that occurred. o Physical, Logical, Administrative Locks on doors, security cameras Fingerprint readers, passwords, 2FA Rules Castles and Moats Traditional networks are systems are not defended any different than castles.
Intro to Infosec Notes Your most important assets are in the middle. You surround them with as many protections as you can. How does this change with Software Defined Networks? What happens when one fails? 1.3 – Passwords Creating Passwords Complexity Length History Age haveibeenpwned.com – check if your email/password has been compromised! Pass phrase (sentences) Choose a random sentence, not lyrics. Hackers probably won’t guess it. Length is more important than complexity. Spaces are considered to be special characters. Hashing One-way mathematical function that takes clear text and rewords/redoes it as unreadable data. Salting Will add a little more complexity. Cracking The process of trying to figure out the password. Password Managers Create strong passwords. Create unique passwords. Securely store passwords. Passwords are encrypted. Keep a password history. Prevent password reuse. If not using one, you probably should. Pain to set up, though. LastPass, KeyPass, OnePass Will change your passwords for you if you need to. Maybe don’t use the correct information for security questions. Can use the password manager notes section for this. 1.4 – Online Safety and Phishing Awareness Online Safety User behavior is the #1 risk. o Phishing, malware, and unauthorized downloads by trusted users o Shared passwords o Data leakage
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Intro to Infosec Notes o User awareness o Policies Privacy Badger – extension for blocking tracking, etc. Ghostery uBlock Origin Phishing Awareness The most dangerous threat All email cannot be blocked. Well crafted phishing attempts are nearly impossible to detect. Things to look out for: o Sense of urgency o Behavior outside the norm o Issue requiring “secrecy.” o Links or procedures outside SOP 1.8 – In the News – IoT IoT Botnet causes internet outage. o In October 2016 Dyn was targeted by a botnet that disrupted numerous top Internet destinations. How does this impact security? What should be done? How could you protect your system? 1.9 – Controls and Techniques You will never know everything that needs to be secured. The best way to understand controls is to start with a baseline. Many organizations have reliable resources that can guide you to create security baselines: o OWASP Top 10 – Top 10 most found vulnerabilities in a web-based application. o DISA STIGS – Guides on how to harden operating systems made by the Department of Defense. o SANS Checklists – SANS is a large educational institute. o Common Criteria 1.10 – Data Security Security Concepts OS Hardening o Why harden? o What is hardening? Concept of making yourself harder to attack. For example – removing or uninstalling features that come preinstalled that are not actually needed. Lockout, Wipe, Tracking, Encryption o The device was stolen, now what? o Remote lockout, remote wipe, if encryption is available then use it.
Intro to Infosec Notes Endpoint Protection – AV, HIDS, HIPS o Why so many agents (agent fatigue)? o Defense in depth. o The endpoints are the new perimeter. Virtualization o Guest Breakout o Shared Resources Physical, Logical, Administrative Data Security Permissions – AAA and CIA o Authentication, Authorization, and Accounting o Confidentiality, Integrity, Availability Storage – Hashing, Sharding, Parameterization o “It’s in the cloud, so it’s safe.” o Breaking up data into smaller pieces and assigning a number to them. SANS – LUNS, Permissions, Access o Keeping the data separated o SANS – Storage Area Networks o LUNS – Logical Units Encryption o Compliance, GDPR o HIPAA, SOX, GLBA TPM o Secure Element o iOS o Trusted Platform Model BitLocker o Comes already on Windows 11 and macOS. 1.11 – Alternate Environments Internet of Things o IP Cameras o Toys Embedded Firewalls Mobile o iOS/Android Vehicles Game Systems SCADA o Automated and connectivity of things that were never designed to be on the internet.
Intro to Infosec Notes Week 2 Lecture Notes Presentation Security Issues 10 min presentation Select one of ten topics in FSO. Presentation should cover: o Overview of the issue o Why it is important to cloud security. o Compensating controls for the issue (defense in depth) o Risk to organizations from the issue Brief question and answer session, 15% of grade 2.1 – In the News – Ransomware NotPetya Ransomware in 2017 – Most Devastating in History $10B in total damages says White House assessment. Nation-state weapons unleashed on the internet – unexpected consequences. Forced Maersk to reinstall 4k servers and 45k PC’s. How does this impact security? What should be done? How could you protect your system? Back ups End-point protection Understand what you’re clicking on
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Intro to Infosec Notes 2.2 – Vulnerability, Threat, Exploit Many use the term vulnerability, threat, and exploit interchangeably but they are not the same: o Vulnerability – a flaw that allows for unintended actions. Unpatched software, misconfiguration, balancing of applications, misconfiguration with access control, etc. o Threat – threat actor, the thing or person attacking the vulnerability. o Exploit – the method by which a threat leverages a vulnerability. You need to have all three for a breach to occur. 2.3 – Malware Types The term virus or worm is often outdated. Malware is a common term related to the advanced threats we see today. Malware today is often multi-level using a series of different attack methods to function. Some common malware types are: o Adware – “malvertising” – malicious payload attached to ads, websites, etc. o Spyware – malicious code sole purpose is to spy. Affect camera, microphone. Keylogger. o Trojan – modern day virus. Piggybacks itself on legitimate software. o Rootkits – probably the most powerful. System level access. APT – advanced persistent threats. o Ransomware – malware that can encrypt a variety of data on a machine and hold for ransom. The goal of ransomware is a money grab, not to affect the machine really. Surprisingly have good customer service. They do hold their end of the bargain. o Botnets – kind of like a zombie network. Used to perpetuate DDoS attacks. Slave machines to some sort of command in control. 2.4 – Vulnerabilities Vulnerabilities are flaws and many groups have attempted to create common lists of flaws. By organizing commonly known vulnerabilities organizations can test for the vulnerabilities. Many organizations created reliable sources for reporting and understanding vulnerabilities: o US-CERT – United States Computer Emergency Response Team / Readiness Team – Notifies the public about current threats. o MITRE CVE – Common Vulnerability and Exposures List CVSS – Vulnerability Scoring System o NIST NVD – National Organization – NIST 853 – document outlining framework. National Vulnerability Database. o SANS Internet Storm Center - o IT-ISAC – Information Sharing and Analysis – Organizations that come together with purpose of sharing info. 2.5 – Social Engineering Social Engineering, Detection, and Testing You cannot stop social engineering.
Intro to Infosec Notes Frank Abignale – Bank Drop Box – Catch Me if You Can movie – loose documentary. Detection and education are the best defenses. Prevention is nearly impossible. Detection is Defense in Depth, AAA, and Anomalies Testing can be done many ways: o Awareness campaigns o Vulnerability scanning o Code Review (Static, Fuzzing, and Dynamic) o Penetration testing 2.6 – Attack Types XSS / CSRF – Cross-Site Scripting – vulnerabilities exist in applications. Man-in-the-Middle – Networking attack. Wi-Fi Pineapple – intercepts all device traffic. Brute Force – Keep trying to guess username/password – keep trying until you get in. DDoS – Command in control leveraging a botnet – Overflow service. Spam Phishing – email, vishing – voice fishing, smishing – SMS attacks Insider – Leaks Password URL Hijacking Watering Hole – attacking a frequently visited website. SQL Injection – application attack – instead of putting in a username or password, puts in a SQL command. Input parameters. Zero Day – didn’t know that vulnerability/exploit existed until that day. APT – Advanced Persistent Threats – worst of the worst. Malicious payload keeps itself on that entity or application. Stays no matter what. 2.10 – In the News – Two-Factor Authentication JP Morgan forgot two-factor authentication. o In December of 2014, JP Morgan suffered a data breach losing 83 million customer records. o Breach occurred because a server on one of their networks was reconfigured without the need for 2FA. How does this impact security? What should be done? o Constant vulnerability scans, checks and balances, etc. 2.11 – Authentication Services Radius – internal network. Kerberos LDAP – directory protocol SAML – language of configuring single sign on. Security and Markup Language. OAuth – open standard PKI SSO
Intro to Infosec Notes Which service is right for your systems? Why these services? 2.12 – AAA SaaS – Software as a Service - something like Gmail. PaaS – Platform as a Service – something like GoDaddy. 2.13 – Controls Separation of Duties (permission creep) – role-based access control. Permissions are limited based on their duties. Mandatoy Vacation Two-Man Rule ACLs RBAC, Mandatory, Discretionary – Classification Time of Day Geofencing Why are these controls important in a multi-tenant environment? 2.14 – Authentication Types Something you are Something you have Something you know Somewhere you are
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Intro to Infosec Notes Week 3 Lecture Notes 3.1 – In the News – Baby Monitors Baby Monitors on the Internet In December of 2016 the search engine Shodan.io can discover and connect to unsecured baby monitors connected to the internet. Some of these monitors allow people to talk to the babies through the monitor. How does this impact security? What should be done? How can you protect your system? 3.2 – Network Security Technologies Firewalls – kind of like a traffic cop. Blocking traffic that isn’t allowed to get in and communicate with your devices. Load Balancers – technology that balances the load. IPS/IDS – IDS came out in early 2000s. Intrusion detection/prevention system. More robust traffic management. “Next gen firewall” – analyze the traffic as it comes in, look for malicious payloads or malformed packets. VPN – virtual private network. Proxies – filter, analyze the traffic, malware analysis. WAF – Web Application Firewall. Does same as regular firewall but with web applications. Spam Filters – email protection, intercept email traffic, etc. Which one is the most important? Trick question. Depends on the environment. How does this relate to Defense-in-Depth? Deploy one or all of these technologies. Layer a variety of defenses on your network’s infrastructure. 3.3 – OSI Model Open Systems Interconnection Model APSTNDP – All People Seem To Need Data Processing TCP/IP – graphic on the right Why is understanding the OSI model important to security?
Intro to Infosec Notes Can you map specific technologies to the OSI model? Data link layer – a switch Network – Router, firewalls Transport – VPN Session, presentation, application – web browser o TCP Handshake, Session – ping to make sure the web server is available o Presentation – visuals, what you see on your browser – is there encrpytion? http – unencrpyted, https – encrypted o Application – network process 3.4 – Cloud There is no cloud – it’s just someone else’s computer. PaaS, SaaS, IaaS o PaaS – Platforms as a Service – blue host, godaddy o SaaS – Software as a Service - gmail o IaaS – Infrastructure as a Service Types o Private – limited in scope to the corp. o Hybrid – some assets you maintain internally, the rest by provider. o Public – obvious o Community -