Cyber Security Section 1.1 Notes
Cyber Security Section 1.1 Notes
In regards to information
security, computers, and IT networks, modern day security challenges include the following:
Challenge
Description
Sophisticated attacks are complex, making them difficult to detect and thwart.
Sophisticated attacks:
Sophisticat
ion of
attacks
Proliferatio
n of attack
software
A wide variety of attack tools are available on the Internet, allowing anyone
with a moderate level of technical knowledge to download the tools and run
an attack.
Scale and
velocity of
attacks
A vulnerability is a weakness that allows a threat to be carried out, such as a USB port that is enabled on
the server hosting the database or a server room door that is frequently left ajar.
An exploit is a procedure or product that takes advantage of a vulnerability to carry out a threat, such as
when a disgruntled employee waits for the server room door to be left ajar, copies the database to a thumb
drive, and then sells it.
Types of threat agents include the following:
Typ
e
Em
ploy
ee
Description
Employees can be the most overlooked, yet most dangerous threat agent because
they have greater access to information assets than anyone on the outside trying to
break in. Employees are also known as internal threats. Employees can:
Become disgruntled with their employer
Be bribed by a competitor
Be an unintentional participant in an attack
Spies can be employed in corporate espionage to obtain information about
competitors for commercial purposes. Spies are typically deployed in the following
scenarios:
Spy
A spy applies for a job with a commercial competitor and then exploits internal
vulnerabilities to steal information and return it to their client.
A spy attacks an organization from the outside by exploiting external vulnerabilities
and then returns the information to their client.
In general, a hacker is any threat agent who uses their technical knowledge to bypass
security mechanisms to exploit a vulnerability to access information. Hacker
subcategories include the following:
Hac
ker
Script kiddies download and run attacks available on the Internet, but generally are
not technically savvy enough to create their own attacking code or script.
Cybercriminals usually seek to exploit security vulnerabilities for some kind of
financial reward or revenge.
Cyber terrorists generally use the Internet to carry out terrorist activities, such as
disrupting network-dependent institutions.
Step
Description
Reconnaissance is the process of gathering information about an organization,
including:
Reconnaiss
ance
Breach
Escalate
privileges
Stage
Exploit
Stealing information
Denying services
Crashing systems
Modifying/Altering information
Item
Description
Layering
Principle
of least
The principle of least privilege states that users or groups are given only the
access they need to do their job and nothing more. When assigning privileges,
privilege
be aware that it is often easier to give a user more access when they need it
than to take away privileges that have already been granted.
Variety
Randomn
ess
Simplicit
y
Security measures should provide protection, but not be so complex that you do
not understand and use them.