MODULE 18 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards
Defense-in-Depth Assets, Vulnerabilities, Threats Cybersecurity analysts must prepare for any type of attack.
It is their job to secure the assets of the organization’s network. To do this, cybersecurity analysts must first identify:
Cybersecurity analysts must prepare for any type of attack. It is their job to secure the assets of the organization’s network. To do this, cybersecurity analysts must first identify:
– Assets
– Vulnerabilities
– Threats
Cybersecurity analysts must prepare for any type of attack. It is their job to secure the assets of the organization’s network. To do this, cybersecurity analysts must first identify:
– Assets
– Vulnerabilities
– Threats
Assets :
Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
Cybersecurity analysts must prepare for any type of attack. It is their job to secure the assets of the organization’s network. To do this, cybersecurity analysts must first identify:
– Assets
– Vulnerabilities
– Threats
Vulnerabilities :
A weakness in a system or its design that could be exploited by a threat actor.
Cybersecurity analysts must prepare for any type of attack. It is their job to secure the assets of the organization’s network. To do this, cybersecurity analysts must first identify:
– Assets
– Vulnerabilities
– Threats
Threats :
Any potential danger to an asset.
Identify Assets As an organization grows, so do its assets. Consider the number of assets a large organization would have to protect.
It may also acquire other assets through mergers with other companies.
The result is that many organizations only have a general idea of the assets that need to be protected.
The collection of all the devices and information owned or managed by the organization are assets.
The assets constitute the attack surface that threat actors could target.
These assets must be inventoried and assessed for the level of protection needed to thwart potential attacks.
The collection of all the devices and information owned or managed by the organization are assets.
The assets constitute the attack surface that threat actors could target.
These assets must be inventoried and assessed for the level of protection needed to thwart potential attacks.
Asset management consists of inventorying all assets, and then developing and implementing policies and procedures to protect them.
This task can be daunting considering many organizations must protect internal users and resources, mobile workers, and cloud-based and virtual services.
Asset management consists of inventorying all assets, and then developing and implementing policies and procedures to protect them.
This task can be daunting considering many organizations must protect internal users and resources, mobile workers, and cloud-based and virtual services.
Further, organizations need to identify where critical information assets are stored, and how access is gained to that information.
Information assets vary, as do the threats against them. For example, a retail business may store customer credit card information.
An engineering firm will store competition-sensitive designs and software.
A bank will store customer data, account information, and other sensitive financial information.
Each of these assets can attract different threat actors who have different skill levels and motivations.
Identify Vulnerabilities
Threat identification provides an organization with a list of likely threats for a particular environment.
When identifying threats, it is important to ask several questions:
What are the possible vulnerabilities of a system?
Who may want to exploit those vulnerabilities to access specific information assets?
What are the consequences if system vulnerabilities are exploited and assets are lost?
https://snipboard.io/oLD8wy.jpg
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Internal system compromise :
The attacker uses the exposed e-banking servers to break into an internal bank system.
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Stolen customer data :
An attacker steals the personal and financial data of bank customers from the customer database.
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Phony transactions from an external server :
An attacker alters the code of the e-banking application and makes transactions by impersonating a legitimate user.
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Phony transactions using a stolen customer PIN or smart card :
An attacker steals the identity of a customer and completes malicious transactions from the compromised account.
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Insider attack on the system :
A bank employee finds a flaw in the system from which to mount an attack.
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Data input errors :
A user inputs incorrect data or makes incorrect transaction requests.
The threat identification for an e-banking system would include:
– Internal system compromise
– Stolen customer data
– Phony transactions from an external server
– Phony transactions using a stolen customer PIN or smart card
– Insider attack on the system
– Data input errors
– Data center destruction
Data center destruction :
A cataclysmic event severely damages or destroys the data center.
Identifying vulnerabilities on a network requires an understanding of the important applications that are used, as well as the different vulnerabilities of that application and hardware.
This can require a significant amount of research on the part of the network administrator.
Identifying vulnerabilities on a network requires an understanding of the important applications that are used, as well as the different vulnerabilities of that application and hardware.
This can require a significant amount of research on the part of the network administrator.
Identifying vulnerabilities on a network requires an understanding of the important applications that are used, as well as the different vulnerabilities of that application and hardware.
This can require a significant amount of research on the part of the network administrator.
Identify Threats Organizations must use a defense-in-depth approach to identify threats and secure vulnerable assets.
This approach uses multiple layers of security at the network edge, within the network, and on network endpoints.
For an example, refer to the figure.
Defense-in-Depth Approach :
https://snipboard.io/aqoHrd.jpg
For an example, refer to the figure.
Defense-in-Depth Approach :
https://snipboard.io/aqoHrd.jpg
The figure displays a simple topology of a defense-in-depth approach:
– Edge router
– Firewall
– Internal router
Edge router :
The first line of defense is known as an edge router (R1 in the figure).
The edge router has a set of rules specifying which traffic it allows or denies.
It passes all connections that are intended for the internal LAN to the firewall.