7 - Cyber Systems Flashcards
Standard Computer Capabilities and Characteristics
– Four
- Speed
- Accuracy
- Diligence
- Versatility
Computer Speed
– Limits
– Comparison
- Fastest possible = Speed of Light
- Limited by algorithm efficiency
- Thousands of times faster than humans
Computer Accuracy
- High accuracy
- Errors due to human error/inaccurate data
Computer Diligence
- Computers don’t suffer fatigue, lapse in concentration, etc. regardless of number of calculations
Computer Versatility
- Perform multiple tasks at once w/ multi-processing
- Perform various types of tasks
Workstation
– Other names
– Types
- Personal computer/client workstation
- Two Types
– Thin Client
– Thick Client
Thin Client
- Software or computer relying on another computer to do most of the work
- Acts as interface connecting to network server doing the actual processing
Thick Client
- Functions independent of the server
- May pull some data from server or run without being connected at all
Server
- Computer managing shared resources for other network systems
- Common Types
– Application
– Catalog
– Database
– DHCP
– File
– Mail
– Proxy
– Web
Vulnerability
- Weakness in a computer system that is open to exploitation
Threat
- Possible danger that may take advantage of a vulnerability
- Could be an individual, an event, etc.
Risk
- Likelihood that a threat will take advantage of a vulnerability
Virus
- Code that spreads from one computer to another by attaching itself to other files
Worms
- Code that spreads from one computer to another on its own
- Does not attach to another file
Logic Bombs
- Code that sits dormant on a target computer until it’s triggered by a specific event
- Ex: Specific date/time or starting specific process
Spyware
- Stealthily installed malicious software
- Intended to track/report data defined by author from a target system
Adware
- Software that automatically displays or downloads ads
- “Not all malicious”
Rootkits
- Code intended to take full or partial control of a system at low levels
Botnets
- Collection of software robots run by a C2 program, controlled by a person
Common Vulnerability Causes
- Configuration / Familiarity
- Implementation
- Design
Configuration / Familiarity (Vulnerability Cause)
-
Misconfigured system/app
– Ex: bad firewall rules - Using well-known software increases probability of vulnerability/exploit
– Ex: Default PW from application user manual
Implementation (Vulnerability Cause)
-
Lack of input validation
– Program assumes all user input is safe, allowing attacks such as XSS or SQL injection
Design (Vulnerability Cause)
- Inherent in a protocol, application, or architecture
– Ex: Using Telnet or FTP to administer a network
Unstructured Threat
- “Script Kiddy”
-
Unfocused attack often by individuals w/ limited skills
– “Unfocused” - system isn’t specifically targeted
Structured Threat
- “CWO”
- Focused attack by individual(s) w/ high skills against specific system
- Tend to be motivated by specific cause
– Money, politics, etc.
Internal Threat
- Originate from individuals who have/had authorized access
– Disgruntled/opportunistic employee
External Threat
- Originate outside the organization, often through the internet
Common Vulnerability and Exposure (CVE)
- Developed by MITRE in 1999
– Non-profit research and dev organization -
List of vulnerabilities, each containing:
– ID number
– Description
– At least one public reference - ID format: CVE-YYYY-NNNN
U.S. National Vulnerability Database (NVD)
- Launched by NIST in 2005
- Vulnerability database built upon and sychronized w/ CVE
- Provides Common Vulnerability Scoring System (CVSS)
Exploit Database
- Maintained by Offensive Security
- Archive of exploits, shellcode, and security papers
Motherboard
- Main electronic circuit board housing other sub-components
– CPU
– Chipsets
– Bus
– System Clock
– Expansion Slots
– BIOS
– CMOS
CPU
- Brain of computer
- Controls number of simultaneous tasks and task completion speed
Chipsets
- Circuitry responsible for managing specific hardware components
Bus
- Controls speed at which data is transferred between hardware components
System Clock
- Synchronizes and controls timing of computer ops
Expansion Slots
- Small plastic slots used to install additional devices such as video or network cards
- 1-6 in long x 1/2 in wide
BIOS
- Translates processor requests into instructions
- Executes POST
CMOS
- Contains computer’s inventory list and advanced setup options
- Stores data read by BIOS
Memory
2 Types
- Random Access Memory (RAM)
– Volatile
– Temporary data storage which may be quickly accessed by CPU - Read Only Memory (ROM)
– Non-volatile
– Stores programs the same way RAM does, but once the data is stored it cannot be changed (hence, read only)
– Stores frequently used instructions and data, often for things such as BIOS
Hard Drives
- Stores changing data in relatively permanent form
- Most popular drives today are SCSI, SAS, and SATA
Operating System
- Significant impact on overall performance
- Ex:
– Windows
– Red Hat
– Solaris
Distributed System Architectures (2)
- Client-Server Model (Centralized Environment)
- Peer-to-Peer Model (Decentralized Environment
Client-Server Model
- Smart clients contact server for data, then format/display it for user
- Permanent changes at the client are committed back to the server
Peer-to-Peer Model
- No special machines providing a service or managing network resources
- All responsibilities divided among all machines
- Peers can be both clients and servers
CIA Triad
- Confidentiality - Protect data from being accessed by unauthorized parties
- Integrity - Ensure data authenticity
- Availability - Ensure data accessibility for authorized users
Enforce System Policies/Procedures
- Policy Statement
– Outlines a plan for the user security component - Standards
– Defines how to measure the level of adherence to the policy - Guidelines
– Recommendations or best practices for how to meet the policy standard - Procedures
– Step-by-step instructions that detail how to implement the components of the policy
Four A’s
- Authentication
– Uniquely ID’ing a particular individual/entity - Authorization
– Determining what rights/privileges a particular entity has - Access Control
– Determining and assigning privileges to resources, data, etc. - Auditing or Accounting
– Tracking & recording system activities / resource access
System Hardening
- Eliminate as many security risks as possible
– Disable unnecessary services/accounts
– Protect management interfaces/apps
– Password protection
Vulnerability Management
-
Ongoing, comprehensive process or program that aims at managing an organization’s vulnerabilities in a holistic and continuous manner
– Asset Management - devices
– Software Management - software
– Vulnerability Assessment - continuous vuln scans/remediation
– Patch Management - obtaining, evaluating, testing, deploying new patches
– Change Management - approving/executing change to assure CIA
Due Care
- Describes how individuals should use/maintain organization-issued hardware/software
- Includes both using equipment safely and in an approved manner
Due Diligence
- Investigating/researching all issues and options relating to a particular subject
- Ensure security policies/practices are effective
- Ensure no violation of laws, statutes, or human rights
Due Process
- Organization does not assume an individual is guilty w/o due process
Operations Continuity Plan
Defines how an org will maintain normal day-to-day ops during disruption or crisis
Disaster Recovery Plan
- Defines how people and resources will be protected in the case of a natural or man-made disaster
Benefits of Websites
- Reduces communication costs
- Enhances communication and coordination
- Accelerates the distribution of knowledge
- Improves customer service and customer satisfaction
Database Capabilities and Benefits
- Improved data sharing
- Improved data security
- Effective data integration
- DBMS minimize data inconsistency
- Better access to data
- Increase in productivity of end user
- Quick decision making
10 Most Critical Security Risks
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
Injection
- Untrusted data sent to an interpreter as part of command or query
- Tricks interpreter into accessing data w/o proper authorization
Broken Authentication
- Assuming another user’s identity temporarily or permanently
Sensitive Data Exposure
- Lack of encryption for data at rest or in transit
XML External Entities (XXE)
- Older or poorly configured XML
- Ability to upload hostile XML content, exploiting vulnerable code or dependencies
Broken Access Control
- Exploitation of access control
- Failing to enforce authenticated user restrictions
Security Misconfiguration
- Exploiting Default configurations or unpatched flaws
Cross-Site Scripting (XSS)
- Insufficient input validation
- Attacker able to add malicious content to a website; content executed on other victim’s browser
Insecure Deserialization
- Existing data structures used but content changed
- Serialization used for persistence/caching
Using Components w/ Known Vulnerabilities
- Using preconfigured client/server-side components
- Not understsanding component patch state
Insufficient Logging/Monitoring
- Not validating logging and monitoring capabilities
Website Components
- Web Page
- Web Content
- Websites
- Web Browser
- Web Application
- Browser Engine
Web Page
- Computer file suitable for the world wide web / a web browser
- Two types
– Static - Flat/stationary page
– Dynamic - Controlled by Application Server processing server-side scripts and Client Web Browser processing client-side scripts