Enterprise Security Fundamentals Flashcards
Introduction to Cybersecurity
Cybersecurity Landscape - App Development Security
Adopt secure app development practices
Cybersecurity Landscape - Skill gap
IT staff must be trained in information security processes
Cybersecurity Landscape - Technology lag
Always run the most recent versions of OS and apps
Cybersecurity Landscape - Availability and sophistication of attack tools
Automated exploit tools are easy to procure and use
Cybersecurity Landscape - Asymmetry of attack and defense
Resources required to secure an organization exceed the resources required for an attacker to perform an intrusion
Cybersecurity Landscape - Monetization of Malware
Coin Mining attacks
Cybersecurity Landscape - Internet of Things
Distributed DoS attacks on IoT devices
Cybersecurity Landscape - Increasing regulation
An increased number of jurisdictions to introduce legislation and regulation mandating the security controls that should be present over certain types of data hosted in organizational information systems.
Assume Compromise Philosophy
An organization should build and maintain its security posture based on the idea that their information
systems have already been compromised.
The information security teams should focus on detecting and responding to suspicious activity rather
than simply preventing intrusion.
Cost of a Breach - Proportional security
Security spend should be proportional to the value of assets being protected
Cost of a Breach - Breach Investigation
The organization will have a clear picture of how the breach occurred, how long the intruder was present and the steps needed to make sure those attacks will not work in the future
Cost of a Breach - Systems rehabilitation
Remediate the vulnerabilities that allowed the attacker to compromise the system and any modifications he/she may have made to the system. In many cases the only way to ensure that a system is rehabilitated is to deploy it again from the beginning and then address the vulnerabilities that allowed the attacker to gain access.
Cost of a Breach - Reputational damage
When customers lose faith in an organization’s ability to protect their information, they are less likely to interact with that organization.
Cost of a Breach - Destruction of assets
Some malware works by reconfiguring hardware to work beyond its safe specification. For example, overclocking a processor until it overheats and fails. Other malware erases data on target systems or renders them inoperable. In some cases, the malware is deployed deliberately, destroying sensitive systems either to inflict financial damage or as a way of forcing the target organization’s information systems to become inoperative.
Cost of a Breach - Compliance costs
Depending on the type of breach that occurs and the type of industry the target organization is in, there may be fines that must be paid to specific authorities as well as investigations and reports that must be generated, all of which cost money and other organizational resources.
Red Team vs Blue Team exercises
Red team simulates the attack while the blue team simulates the response to the attack.
Goal: to determine if vulnerabilities are present in the existing security configuration as well as to train
organizational staff how to detect and respond to attacks.
Attacker’s objective - Persist Presence
Reliable remote access via a back door to the organization’s systems
Attacker’s objective - Hackstortion
When an attacker compromises a target’s network and then requests payment for a specific action to be taken. This action might be for the attackers to destroy sensitive data they exfiltrated rather than exposing that data to the public.
Attacker’s objective - Ransomware
Encrypts files and sometimes entire systems so that they are inaccessible unless a special decryption key is provided. The attackers will provide a decryption key that can be used to recover the encrypted systems for a fee, usually in a cryptocurrency like BitCoin.
Attacker’s objective - Other
Steal data;
Coin miners;
Destroy systems.
Red Team Kill Chain - Reconnaissance
To determine whether a target is worth attacking, the objectives of an attack, and the characteristics of the target
Red Team Kill Chain - Weaponization
Creating, or selecting existing, remote access malware
Red Team Kill Chain - Delivery
Having the target of the attack execute the malware on the information systems infrastructure. Some attacks require user intervention for the remote code to execute; other attack types can be performed remotely.
Red Team Kill Chain - Exploitation
The attacker’s malware code successfully triggers, leveraging the targeted vulnerability
Red Team Kill Chain - Installation
The original malware code is leveraged to deploy an access point, also known as a back door, through which the attacker can access the compromised beachhead system