SYO-701 Threats and Mitigating Threats Flashcards
Reasons for Vulnerable Systems
Weak configurations:
- Open permissions
- Unsecure root accounts
- Errors
- Weak encryption
- Unsecure protocols
- Default settings
- Open ports and services
Third-Party Risks:
- Vendor Management
- Supply chain
- Outsourced code development
- Data storage
Improper patch management:
- Firmware
- Operating system (OS)
- Applications
Impact of Vulnerabilities
Data loss
Data breaches
Data exfiltration
Identity theft
Financial loss
Reputational damage
Availability loss
Common security issues (Misconfiguration, Application issues)
Misconfiguration:
Unencrypted credentials/clear text
Logs and event anomalies
Permissions issues
Access violations
Certificate issues
Misconfigured devices
Application issues:
Unauthorised software
Baseline deviation
Licence compliance violation
Asset management
Authentication issues
Application whitelisting
Application whitelisting is configuring a system for a list of approved software that is allowed to be used on the system. If someone tries to install or run an application not on the list, they will receive an error message stating that the application is not authorized. You can use AppLocker in Windows to create a list of applications that are authorized to run on the
system
Unified Threat Management
A UTM is a device that combines a number of security functions such as a firewall, IDS/IPS, gateway antivirus and gateway anti-spam, content filtering, and data loss prevention, to name a few built-in security technologies. UTM systems output an array of information, such as alerts to suspicious traffic, reports on the number of viruses and spam messages blocked, and summaries of the number of content filter violations.
Data Loss Prevention
DLP is a solution that prevent users from being able to send sensitive information outside the company. When a user tries to copy data to a USB drive, they may receive an error message from the DLP solution stating they do not have permissions, or if a user attempts to send an e-mail that contains sensitive information blocked by DLP, the user will typically receive an e-mail stating that the content was not sent due to DLP violation
Data execution prevention
DEP is a feature that can be enabled to prevent application code from
executing in areas of memory used to store data (known as data pages). With DEP, blocks of memory not used for executing a program are flagged as nonexecutable pages by the system so that malicious software does not run in that block of memory.
Cloud-based Vulnerabilities
Open ports
Authentication methods
Conditional access policies
Too many privileges
Privilege Escalation
Privilege escalation is when a hacker finds a flaw in the operating system, or in a piece of software installed on the system, that, when exploited, elevates the hacker’s privileges from normal user capabilities to administrative access. Once the hacker has gained administrative access to the system, they can make whatever changes they want to the system, including planting a back door for future access
vertical and horizontal privilege escalation, and privilege de-escalation
Executable virus
Older viruses were executable viruses, where the virus was attached to an executable file but was not activated until you ran the file. This virus was typically spread from system to system by the user sharing files via floppy disks, flash drives, or a network drive.
Boot Sector Virus
Is a serious virus that attacks the boot sector code and overwrites it. The boot sector is the first sector on the disk and contains operating system loader code that starts the boot sequence. When a boot sector virus overwrites this sector, it prevents the system from booting from the infected disk
Macro VIrus
A macro virus is code that is written using a macro language that performs a malicious action such as deleting files or e-mailing everyone in your address book. The macro is usually created in a file and then triggered automatically when someone opens the file.
Logic Bomb Virus
A logic bomb is a type of virus that is planted on the system by you
installing a piece of software that contains the logic bomb. The software application you installed acts as it is supposed to until a certain event, such as a specific date, occurs. When you run the software, it always checks for
that specific date, and if the software is run on that date, it performs its malicious act. This is a common method disgruntled employees have used
Worm Virus
The worm virus is a
scary virus type because it has the unique characteristic of being able to replicate itself without needing a user to activate it. Worm viruses can
replicate themselves in a number of ways:
- Network Protocols
- Flash Drives
Trojan Virus
A Trojan virus is a program that a user is tricked into installing because it appears to do something useful, but in reality, it is a virus that infects the system. The Trojan virus typically modifies the system by opening a TCP/IP port on the system, which allows the hacker to connect to the system and take control of it
Rootkit
A rootkit is software installed on a system by a hacker that is typically
hidden from the administrator and gives the hacker privileged access to the system. There are five major types:
- Application level (i.e trojan virus)
- Library level
- Kernel level
- Virtualised
Botnet
A botnet is a collection of systems that have been compromised by a hacker and that are then used to help perform other types of attacks. The systems that are under the control of the hacker in a botnet are known as zombie systems, or bots, because they have no mind of their own and will do what the hacker commands
Remote Access Trojan
A RAT is malicious software that the user typically
installs without knowing it, such as by installing a game from the Internet or by running a program that was e-mailed to them. The RAT program then opens a back door for the attacker to gain access to the system remotely at a later time. The RAT malware allows the attacker to make a connection to
the system and run commands remotely on that system. If a system on a network has a RAT running, it is possible that the hacker could use that to compromise other systems, essentially creating a botnet
Potentially Unwanted Program
A PUP is software that gets
installed on your system that you do not want but was installed because it was bundled with another program that you did actually want and installed. PUPs do many annoying things, such as display ads, install toolbars, potentially slow down your computer, and may collect private information about you. To help protect against PUPs, you should be careful to watch each screen when installing software to ensure that the option to install the add-on software is disabled, and be sure to run anti-malware software
Command and Control
C&C is when an attacker compromises a system (or network of systems) and then loads malware on it. The attacker then uses a command-and control server to send commands to the systems running the malware so that the attacker can perform tasks such as retrieving sensitive data from the
systems and disrupting the functionality of the systems
Protecting against malicious software
- Use antivirus software
- Keep virus definitions up to date
- Keep a close eye on listening ports
- Keep a close eye on running processes
- Use good surfing habits
Bluesnarfing, Bluejacking, Bluebugging
Bluesnarfing:
A Bluetooth exploit that allows the hacker to connect to a Bluetooth-enabled phone and to retrieve data off the phone
Bluejacking:
The sending of unsolicited messages from one Bluetooth device to another Bluetooth device
Bluebugging:
A Bluetooth exploit that involves the hacker gaining access to the phone and leveraging its full capabilities, including making calls using the AT command set on the phone
PBX
A private branch exchange (PBX) is an advanced phone system that acts as a switch for all of the phones within the corporation. The PBX allows a company to purchase a single external line and then have multiple internal phone systems (and numbers) within the company use the PBX. Each phone in the company is given a unique number, which acts as the extension number off the external line
Embedded Systems
This includes any device connected to the network, such as a printer or smart TV, but also watch for devices that include Bluetooth technology.
- Raspberry PI
- Field-programmable gate array (FPGA)
- Arduino
SCADA/ICS
Supervisory Control and Data Acquisition (SCADA) is a special system used in industrial environments (for example, a manufacturing plant) to monitor operations. SCADA systems are used by facility managers to handle logistics related to controlling components such as HVAC, lighting,
and refrigeration units.
Industrial control system (ICS) refers generally to any system that monitors or controls industrial equipment, including SCADA
systems. These systems can be found in many types of facilities, including industrial plants, manufacturing plants, and energy plants
OS hardening
the process of removing unnecessary features of the operating system, disabling unnecessary services, and removing unnecessary accounts. The purpose of removing unnecessary features from the system is to reduce the attack surface, which comprises
the components of a system that the hacker can hack into
OS hardening steps
- Uninstall unnecessary software
- Disable unnecessary services
- Protect management interfaces and applications
- Disable unnecessary accounts
- patch management
- Password protection
- Registry hardening
- Disk encryption
Network Security Hardening
- Update firmware on all networking devices
- Port Security
- MAC limiting and Filtering
- Disable unused interfaces (ports)
- 802.1X (port-based access control protection)
- use secure management protocols
- Rogue machine detection
Tools for system hardening
- Group policies
- Security policies
- patch management
- configuring a security baseline
(file system, permissions, services running, network connections, protocols running, firewall rules, storage encryption, etc.)
Security posture and reporting
security posture:
- initial baseline configuration
- continuous security monitoring
(of vulnerabilities and misconfigurations, antimalware
protection, patch deployment, and device configurations and statistics with SNMP)
- Remediation
Reports:
- alarms
- alerts
- trends
Common mitigation strategies
- Network segmentation
- Security layers
- Application firewalls
- Manual updates
- firmware version control
- Wrappers
- Control redundancy and diversity
solutions to ensure boot integrity
- Boot Security/ Unified Extensible Firmware Interface (UEFI)
- Measured Boot
- Boot attestation
Tokenisation, Hashing, and Salting
Tokenisation:
Tokenization is when sensitive data is stored with a token service instead of with the application data with which the sensitive data is used.
Hashing:
Hashing is when data is run through a hashing algorithm to generate a hash value
Salting:
Salting involves taking a random value, adding it to the plaintext value, and then hashing the combination of the salted value + password and storing that in the database
Mobile Deployment Models
- Bring your own device (BYOD)
- Corporate-owned, personally enabled (COPE)
- Choose your own device (CYOD)
- Corporate-owned
- Virtual desktop infrastructure (VDI)
Sandboxing
Sandboxing is the process of creating separate running
environments for applications and ensuring you restrict communication between these running environments.
stages of deployment
development
test
staging
production