Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security Fundamentals (Data Breaches (Target : 70 million customers…
Cyber Security Fundamentals
C.I.A Model
Confidentiality
: Keeping the data safe from outside reads
Encryption
Availability
: Making data accessible to certain group of people or subjects
Integrity
: Keeping the data in its original form without any changes whether willingly or maliciously
Hashing
Achieved by
Procedures
Products
People
Rising Cybersecurity Threats
Ransomeware
: computing devices are locked and encrypted. Usually thru a clicked link, or installed malware. Users are threatened that if they do not pay, the files will start being deleted.
IBM study
: 4000 ransomeware attacks were unleashed each day of 2016. That is more than 4 times than 2015
Integrity
: Sabotaging data is also being hailed as a major source of cybersecurity problems in 2017
Vulnerabilities
Example of hack of toilet flushing system in Japan
Bug Bounty Program
: reward hackers for finding and fixing security issues (United Airlines)
Example hack of Hospital's wired refrigerators with Blood Tests
Example of hack of baby monitor
Penetration Testers
: identify and exploit vulnerabilities
Personal Security
Dyn
: service provider was attacked by DDoS
was brought down by 100,000 DVRs, security cameras, webcams, thermostats, refrigerators, coffee makers, and other IoT devices in homes across the world. These devices were hijacked through malware and were instructed to attack
Dyn's
servers.
Default username and password, un-updated software, or flaws in the software
#
Intelligence
: links previous attacks on current attacks
Who are the hackers?
Someone who thinks outside the box, is technologically inclined. Finds unconventional solutions to problems. Focusing on what is important.
"
Cracker
" original term for malicious hacker
Identified by their Hat colors
Black Hat Hacker
: Malicious hacker or Cracker
White Hat Hacker
: does what black hat hacker does, breaking into companies and systems with permissions in order to exploit vulnerabilities
Gray Hat Hacker
: somewhere in the middle of White and Black Hat Hackers
Script kiddies
: inexperienced crackers, who use scripts and programs developed by others.
Positions
Security Researcher
: finding vulnerabilities anywhere
Penetration Tester
: finding vulnerabilities within certain company
Security Architect
: building systems and processes to establish cyber security presence.
FBI
defined the motivation of individuals who commit espionage against the country with the acronym
MICE
Ideology
Compromise or Coercion
Money
Ego or Extortion
According to researcher
Max Kilger
, hackers motivations are based on MEECES
Entertainment
Cause
Ego
Entrance
Money
Status
Data Breaches
Target
: 70 million customers affected. Breach started when credentials were stolen from their HVAC company.
(Year 2013)
Chase
: 83 million customers affected. Breach started because JP Morgan's Security Team did not upgrade the server with two-factor authentication.
(Year 2014)
Home Depot
: 56 million customers affected. Like Target, breach started when credentials were stolen from 3rd party vendor. Unpatched Windows systems were the other cause.
Sony
: confidential data from Sony Pictures, including personal information of employees and their families, salary information and unreleased films were released.
OPM - Office of Personnel Management
: 25 millions users affected. Security clearance information as well as fingerprints. Secret Agents even if they changed their names were now no longer safe.
(Year 2015)
LastPass
: a password management service
Kaspersky
: cybersecurity and anti-virus provider
Hacking Team
: company that sells hacking tools to governments and law enforcement
Excellus Blue Cross Blue Shield
: had 10.5 million affected customers.
Ukraine Power Grid
: first attack started when workers clicked on attachment enabling macros in Microsoft Word document
MySpace
: exposed info of 427 million users
Gmail, Yahoo and Hotmail
: dumps of emails affected 273 million users
LinkedIn
: 117 million users.
Interesting FACT! Mark Zuckerberg
: his Twitter and Pinterest were hacked because his password for his accounts were the same as the one revealed in LinkedIn breach
Yahoo
: announced 500 million users were hacked and later announced 1 billion users were affected . Greatest hack of all the time
AAA Model
Authentication
: requires proof. Something you know like a password. Something you have like a key fob. Something you are like a biometrics.
Key Fob
Biometrics
Password
Combining any of these is called
Multi-Factor Authentication
2FA - Two Factor Authentication
- Examples would be Gmail, Yahoo, etc. When they ask you to enter code from your phone, in addition to your password.
NIST
: National Institute of Standards and Technology : denounced 2FA with SMS. They stated that it should be deprecated due to that SMS can be redirected. It recommended to use Google Authenticator or similar tools.
Authorization
: permissions and accesses after user logs in
Principle of Least Privilege
Accounting
: keeping track of who is doing what. For instance,
Employee B
is checking
Employee A's
actions while the
Employee B
is on vacation. Checks and Balances. Examining Log Entries.
Security vs Availability
: needs to be balanced. Like a scale. If one side goes down, other side goes up.
Threat Agents
Protecting Assets
Logical Software
Physical Hardware
Data
Information
Employees
Company Trade Secrets
Vulnerability
Exploit
MS08-067
: famous exploit from 2008 that allows hackers to gain access to Windows XP or Windows Server 2003
Risk
Probability of an Impact
Consequence
What can be done?
Transfer
Mitigate
Cybersecurity Insurance
Accept