Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 1. Cybersecurity and the Security Operations Center - Coggle…
Chapter 1. Cybersecurity and the Security Operations Center
The danger
War stories
Hijacked People
While in a coffee shop, Alice connected to a
"rogue" wireless hotspot
, Alice logged onto her bank's website. A hacker
hijacked
her session and gained access to her bank accounts.
🎥
Check out the hack of the big lcd screen at Utrecht Central Station, in the Netherlands!
Ransomed companies
Bob works in the finance department and he received an email with information related to some earnings in a PDF file, he didn't know about this and he opened the file because he was curious. The file was a
ransomware
(a type of malicious software) and it gather all the information in the computer and encrypted it, the hacker was asking for a ransom to decrypt the data.
🎥
Ransomware - Anatomy of an Attack
, See how an effective ransomware attack comes together. This is why today's enterprises require effective security.
Targeted Nations
Experts believe that some "malicious software" (
malware
) are so sophisticated that only one nation could develop them, targeting other nations to attack their vulnerable infrastructure, e.g. water system
Stuxnet worm
was a malicious which infected USB drives
It was designed to infiltrate Windows operating systems and then target Step 7 software.
Step 7 was developed for programmable logic controllers (PLCs). Stuxnet targeted a specific PLCs that controls the centrifuges in nuclear facilities. The worm was transmitted from the infected USB drives into the PLCs and eventually damaged many of these centrifuges.
Lab – Installing the CyberOps Workstation Virtual Machine
Import the OVA in your visualization program:
http://static-course-assets.s3.amazonaws.com/CyberOps/cyberops_workstation.ova
(during this process and if you are using VirtualBox make sure to check the "
Reinitialize the MAC address of all network cards
")
Once you import the OVA, then start the virtual machine. If you get a box, clic
k Change Network Settings
and set your Bridged Adapter. Click the dropdown list next the Name and choose your network adapter (will vary for each computer).
Note: If your network is
not configured with DHCP
services, click Change Network Settings and select
NAT
in the Attached to dropdown box. The network settings can also be access via Settings in the Oracle VirtualBox Manager or in the virtual machine menu, select
Devices > Network >Network Settings
. You may need to disable and enable the network adapter for the change to take effect
Username
: analyst
Password
: cyberops
Threat actors
Amateurs
Also known as
script kiddies
, have little or no skill. They often use existing tools or instructions found on the Internet to launch attacks. Some are just curious, while others try to demonstrate their skills by causing harm. Even though they are using basic tools, the results can still be devastating.
Hacktivists
hackers who protest against a variety of
political and social ideas.
Hacktivists publicly protest against organizations or governments by posting articles and videos, leaking sensitive information, and disrupting web services with illegitimate traffic in distributed denial of service (
DDoS
) attacks.
Motivation
Financial Gain
: Much of the hacking activity that consistently threatens our security is motivated by financial gain. These cybercriminals want to gain access to our bank accounts, personal data, and anything else they can leverage to generate cash flow.
Trade Secrets and Global Politics
Nation states are:
-hacking other countries
-interfering with internal politics
-interested in using cyberspace for industrial espionage.
The theft of intellectual property can give a country a significant advantage in international trade.
How Secure is the Internet of Things?
The IoT helps individuals connect things to improve their quality of life. For example, many people are now using connected wearable devices to track their fitness activities.
Many devices on the Internet are not updated with the latest
firmware
. Some older devices were not even developed to be updated with patches. These two situations create opportunity for threat actors and security risks for the owners of these devices.
In October 2016, a DDoS attack against the domain name provider
Dyn
took down many popular websites.
The attack came from a large number of webcams, DVRs, routers, and other IoT devices that had been compromised by malicious software.
These devices formed a “
botnet
” that was controlled by hackers. This botnet was used to create an enormous DDoS attack that disabled essential Internet services
Full article:
https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/
Hacker
: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term. See also: cracker. (
RFC 193
)
DefiniciĂłn de la RAE
: Persona con grandes habilidades en el manejo de computadoras que investiga un sistema informático para avisar de los fallos y desarrollar técnicas de mejora.
Types
Gray hat hacker
: find vulnerabilities without permission but create reports to alert companies about it
White hat hackers
: they find and exploit vulnerabilities with prior permission
Black hat hackers
: exploit vulnerabilities WITHOUT permission and to obtain a benefit
Threat impact
Lost Competitive Advantage
Companies are worried about corporate espionage in cyberspace. An additional major concern is the loss of trust that comes when a company is unable to protect its customers’ personal data. The loss of competitive advantage may come from this
loss of trust
rather than another company or country stealing trade secrets.
PII and PHI
One of the more lucrative goals of cybercriminals is obtaining lists of PII that can then be sold on the
dark web
. The dark web can only be accessed with special software and is used by cybercriminals to shield their activities. Stolen PII can be used to create fake accounts, such as credit cards and short-term loans.
A subset of PII is
protected health information
(PHI). The medical community creates and maintains electronic medical records (EMRs) that contain PHI.
In the U.S., handling of PHI is regulated by the Health Insurance Portability and Accountability Act (
HIPAA
)
Personally identifiable information
(PII) is any information that can be used to positively identify an individual.
Name, Social security, number, Birthdate, Credit card numbers, Bank account numbers, Government, issued ID, Address information (street, email, phone numbers,
Politics and National Security
Stuxnet is a prime example of a network attack motivated by national security concerns.
Cyberwarfare
is a serious possibility. State-supported hacker warriors can cause disruption and destruction of vital services and resources within an enemy nation
Fighters in the war against cyber-crime
Becoming a Defender
Certifications
(ISC)² Information Security Certifications
(ISC)² is an international non-profit organization that offers the highly-acclaimed CISSP
CompTIA Cybersecurity Analyst Certification (CySA+)
CCNA Cyber Ops
Global Information Assurance Certification (GIAC)
Further Education
Degrees
Python Programming
Sources of Career Information
CareerBuilder.com
Indeed.com
USAJobs.gov
Linkedin
Getting Experience
Temporary Agencies
Cisco Cybersecurity Scholarship
Internships
Your First Job: Working for a call center or support desk may be your first step into gaining the experience you need to move ahead in your career.
The Modern Security Operations Center
Enterprise and Managed Security
Organization will benefit from implementing an enterprise-level SOC. The SOC can be a complete in-house solution. However, many larger organizations will outsource at least part of the SOC operations to a security solutions provider.
Cisco has a team of experts who help ensure timely and accurate incident resolution. Cisco offers a wide range of incident response, preparedness, and management capabilities:
Cisco's Safety and Physical Security Program
Cisco Tactical Operations (TacOps)
Cisco Managed Services
Cisco Computer Security Incident Response Team (CSIRT)
Cisco Product Security Incident Response Team (PSIRT)
Cisco Smart Net Total Care Service for Rapid Problem Resolution
Elements of a SOC
Security Operations Centers
provide a broad range of services, from monitoring and management, to comprehensive threat solutions and hosted security that can be customized to meet customer needs
elements
People
: The SANS Institute (www.sans.org) classifies the roles people play in a SOC into four job titles:
Tier 1 Alert Analyst
: These professionals monitor incoming alerts, verify that a true incident has occurred, and forward tickets to Tier 2, if necessary.
Tier 2 Incident Responder
: These professionals are responsible for deep investigation of incidents and advise remediation or action to be taken.
Tier 3 Subject Matter Expert (SME)/Hunter
: These professionals have expert-level skill in network, endpoint, threat intelligence, and malware reverse engineering. They are experts at tracing the processes of the malware to determine its impact and how it can be removed. They are also deeply involved in hunting for potential threats and implementing threat detection tools.
SOC Manager
: This professional manages all the resources of the SOC and serves as the point of contact for the larger organization or customer.
This course offers preparation for a certification suitable for the position of Tier 1 Alert Analyst, also known as Cybersecurity Analyst.
Processes
If a ticket cannot be resolved, the Tier 1 Analyst will forward the ticket to a Tier 2 Analyst for deeper investigation and remediation. If the Tier 2 Analyst cannot resolve the ticket, she will forward it to a Tier 3 Analyst with in-depth knowledge and threat hunting skills.
The day of a Tier 1 Analyst begins with monitoring security alert queues. A
ticketing system
is frequently used to allow analysts to select alerts from a queue to investigate.
One job of the Tier 1 Analyst might be to verify that an alert represents a true security incident. When verification is established, the incident can be forwarded to investigators or other security personnel to be acted upon, or resolved as a false alarm.
Technology
A SOC needs a security information and event management system (
SIEM
), or its equivalent
SOC technologies include one or more of the following: Event collection, correlation, and analysis, Security monitoring, Security control, Log management, Vulnerability assessment, Vulnerability tracking, Threat intelligence,
Security vs. Availability
Most enterprise networks must be up and running at all times. Security personnel understand that for the organization to accomplish its priorities, network availability must be preserved.
Each business or industry has a limited tolerance for network
downtime
.
security cannot be so strong that it interferes with the needs of employees or business functions. It is always a tradeoff between strong security and permitting efficient business functioning.
What's next after this chapter
Zero days (movie)
, it talks about the Stuxnet worm (
trailer
)
Learn about the wannacry ransomware worm:
https://www.avast.com/c-wannacry