<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Cyvally]]></title><description><![CDATA[Cyvally is a blog offering interesting content on everything cybersecurity, with practical tutorials, best practices, and career guidance for beginners and prof]]></description><link>https://cyvally.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1735990002570/5ef6393a-d1ac-4c8b-bd72-13b812ea2121.gif</url><title>Cyvally</title><link>https://cyvally.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 07 Apr 2026 20:11:25 GMT</lastBuildDate><atom:link href="https://cyvally.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[What is API Security?]]></title><description><![CDATA[I recently discovered that generations before Gen Y had their own official names, too. For the longest time, I assumed the naming trend began with Gen Y, the Millennials, then continued with Gen Z, and now Gen Alpha. But like everything else in histo...]]></description><link>https://cyvally.com/fundamentals-of-api-security</link><guid isPermaLink="true">https://cyvally.com/fundamentals-of-api-security</guid><category><![CDATA[APIs]]></category><category><![CDATA[api security]]></category><category><![CDATA[api security best practices]]></category><category><![CDATA[OWASP Top 10 vulnerabilities]]></category><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sun, 23 Nov 2025 21:10:14 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1763932000373/a40db35e-11e3-4484-8a5d-5f9e86f7af9e.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong><em>I recently discovered that generations before Gen Y had their own official names, too. For the longest time, I assumed the naming trend began with Gen Y, the Millennials, then continued with Gen Z, and now Gen Alpha. But like everything else in history, people had been labeling generations long before the digital age.</em></strong></p>
<p><strong><em>What interests me, though, is how differently each group relates to technology. Millennials are widely seen as the generation that adapted to technology. Gen Z grew up with technology as a constant, almost like a second language. And Gen Alpha? They are growing up fully immersed in a world where AI, touchscreens, and digital ecosystems aren’t innovations; they’re just the normal way life works.</em></strong></p>
<p><strong><em>But today's discussion is really about Gen Z.</em></strong></p>
<p><strong><em>The first time I heard Vandana Verma Sehgal say, “APIs are like Gen Z,” it stopped me. Immediately, my mind went to all the bold, unfiltered, and sometimes hilarious comments employers make about Gen Z on Twitter. You know the ones, calling them audacious, direct, uncompromising, and allergic to nonsense.</em></strong></p>
<p><strong><em>But the moment she explained her analogy, it made perfect sense. APIs and Gen Z genuinely share more similarities than you would expect. They’re fast. They’re expressive. They expect clarity. They don’t like ambiguity. And they absolutely will not tolerate friction.</em></strong></p>
<p><strong><em>And just like Gen Z, APIs never hide; they communicate openly through clear responses, detailed errors, and transparent documentation. Everything is meant to be visible and discoverable. Yet in the same breath, APIs can overshare too, exposing more data than intended, revealing internal details, or exposing sensitive information when not properly secured, exactly the way people joke about Gen Z oversharing their thoughts and lives online.</em></strong></p>
<p><strong><em>The comparison was so accurate that I couldn’t help but laugh and agree. There isn’t much difference between these two super forces.</em></strong></p>
<p><strong><em>And that’s exactly what I’m about to show you.</em></strong>  </p>
<p>In this blog post, we’ll explore the fundamentals of API security, what it is, why it matters, and the essential best practices every developer, business, and security professional must apply to protect data and system integrity and stay secure in an increasingly API-driven world.</p>
<h2 id="heading-apis-and-api-security-what-they-are-and-why-they-matter"><strong>APIs and API Security: What They Are and Why They Matter</strong></h2>
<h3 id="heading-what-is-an-api">What is an API?</h3>
<p>API is an acronym for Application Programming Interface. Let’s break it down:</p>
<ul>
<li><p>An application is a software program that performs a specified function.</p>
</li>
<li><p>Programming is the process of writing instructions that tell software how to work.</p>
</li>
<li><p>Interfaces are agreements that define how two applications communicate.</p>
</li>
</ul>
<p>Putting it together, an API is a software intermediary that allows different applications, services, systems, and databases to communicate and exchange data efficiently.</p>
<h3 id="heading-what-is-api-security"><strong>What is API Security?</strong></h3>
<p>API security is the process of protecting APIs’ integrity from attacks, data breaches, unauthorized access, and other security risks. It addresses techniques, methods, measures, best practices, protocols, and solutions for detecting, understanding, and mitigating the unique vulnerabilities and risks associated with both your APIs and the third-party APIs you rely on.</p>
<h3 id="heading-why-api-security-matters">Why API Security Matters</h3>
<p>APIs are the heart that makes modern applications operate. They power web apps, mobile apps, cloud services, and the connections between systems. Insecure APIs can result in severe consequences, including:</p>
<ul>
<li><p>Data breaches and exposure of sensitive information.</p>
</li>
<li><p>Unauthorized access to critical systems</p>
</li>
<li><p>Service disruptions and financial loss</p>
</li>
<li><p>Reputational damage</p>
</li>
</ul>
<p>In short, API security is important because APIs handle sensitive data and critical functions in modern apps. Protecting them helps organizations maintain trust, compliance, and operational integrity.</p>
<h2 id="heading-owasp-api-security-top-10">OWASP API Security Top 10</h2>
<h3 id="heading-001-broken-object-level-authorizationbola">001: Broken Object Level Authorization(BOLA)</h3>
<p><strong>What it is:</strong> An authorization flaw vulnerability occurs when an API permits a user to access the data of another user without adequately verifying if the user is allowed to do so.</p>
<p><strong>How to prevent it</strong>: Always enforce and continuously test authorization controls across all endpoints, and verify users have permission to access or alter objects before processing requests.</p>
<h3 id="heading-002-broken-authentication">002: Broken authentication</h3>
<p><strong>What it is:</strong> This vulnerability arises from a poor or improperly implemented API authentication method. This gives attackers an opportunity to take control of user accounts, access their sensitive data, or carry out actions on their behalf.</p>
<p><strong>How to prevent it</strong>: Implement strong authentication mechanisms, such as multi-factor authentication (MFA).</p>
<h3 id="heading-003-broken-object-property-level-authorization">003: Broken Object Property Level Authorization</h3>
<p><strong>What it is:</strong> This vulnerability happens when an API fails to implement proper access control for particular elements of an object, resulting in the disclosure or manipulation of sensitive data. The issue stems from two flaws: mass assignment (when APIs modify object properties without verifying user authorization) and excessive data exposure.</p>
<p><strong>c</strong>Use allow lists (whitelists) for fields so that users can only modify specific, permitted properties. Apply data minimization to return only the minimum amount of information.</p>
<h3 id="heading-004-unrestricted-resource-consumption"><strong>004: Unrestricted Resource Consumption</strong></h3>
<p>What it is: This vulnerability exists when an API permits users to consume excessive amounts of system resources (CPU, memory, and bandwidth) without any restrictions. It can result in slow performance, system crashing, and to initiation of denial-of-service (DoS) attacks</p>
<p>How to prevent it: How to Avoid It: Implement rate limiting to restrict the number of requests that an IP or user can make in a particular period of time. Monitor API performance to detect anomalous consumption spikes.</p>
<h3 id="heading-005-broken-function-level-authorization"><strong>005: Broken function-level authorization</strong></h3>
<p>What it is: The API lacks proper authorization checks at the function or operation level, allowing users to access authorized functionality. Authorization issues are commonly created by complex access control policies and ambiguous responsibilities, allowing attackers to access resources and administrative powers of other users.</p>
<p>How to prevent it: Implement role-based access control and test all endpoints to identify any permission gaps or unauthorized access.</p>
<h3 id="heading-006-unrestricted-access-to-sensitive-business-flows">006: Unrestricted Access to Sensitive Business Flows</h3>
<p>What it is: This vulnerability arises when attackers study the business model of an API, identify key business flows, and automate access to them, which could be destructive to the business at large.</p>
<p>How to prevent it: Think like an attacker when identifying threats, and implement authorization rules to limit the creation of resources.</p>
<h3 id="heading-007server-side-request-forgery-ssrf">007:Server Side Request Forgery (SSRF)</h3>
<p>What it is: This vulnerability occurs when an API accepts a link from a user without validating it. When the server tries to navigate to this link, it forces it to visit endpoints it should not, potentially allowing access to internal systems.</p>
<p>How to prevent it: Validate and sanitize all input, and implement network segmentation and firewall rules</p>
<h3 id="heading-008-security-misconfiguration">008: Security Misconfiguration</h3>
<p>What it is: This vulnerability occurs when a system, application, or network is not configured securely. Incorrect or flawed security settings might reveal gaps that attackers can exploit.</p>
<p>How to prevent it: Regularly audit your systems to find misconfigurations and vulnerabilities, and keep all software patched and updated to fix security issues.</p>
<h3 id="heading-009-improper-inventory-management">009: <strong>Improper Inventory Management</strong></h3>
<p>What it is: You can't protect APIs you don't know exist. Without effective tracking, some APIs may exist without your team's knowledge; they are known as zombie or shadow APIs.</p>
<p>How to prevent it: Because APIs typically have a large number of endpoints, keep up-to-date documentation and an inventory of them. Manual tracking can be burdensome, so adopt automated tools to maintain and secure hidden APIs. Make API documentation visible only to authorized users.</p>
<h3 id="heading-010-unsafe-consumption-of-apis">010: Unsafe Consumption of APIs</h3>
<p>What it is: This vulnerability exists when you use third-party APIs that you simply do not fully control. Even if your own API is secure, relying on external APIs might be risky since attackers may target the connected services.</p>
<p>How to prevent it: To eliminate security risks, maintain an inventory of all third-party APIs, encrypt all communications, validate all supplied data, and enable error handling.</p>
]]></content:encoded></item><item><title><![CDATA[Understanding Threat Actors and Their Motivations]]></title><description><![CDATA[Seen the film Extraction? Cyvally chooses a cyber action thriller, so you may be thinking Why Cyvally is linking an action thriller film genre to cyber security. Anyway, that’s one of the perks of being a cybersecurity enthusiast: everything gets you...]]></description><link>https://cyvally.com/threat-actors-and-motivations</link><guid isPermaLink="true">https://cyvally.com/threat-actors-and-motivations</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Wed, 21 Aug 2024 22:18:14 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737301999163/63445676-89c3-4441-9a55-60fb1c2872b1.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Seen the film Extraction?</strong> Cyvally chooses a cyber action thriller, so you may be thinking Why Cyvally is linking an action thriller film genre to cyber security. Anyway, that’s one of the perks of being a cybersecurity enthusiast: everything gets your hearts beat loud for the passion. Now, get back to the movie, the movie, <strong>Amir Asif serves as the threat actor,</strong> a violent crime lord aiming to expand his criminal empire. Amir Asif kidnaps Ovi Mahajan Jr.<strong>(The Asset)</strong>, in order to further his plan of ascertaining control over Ovi Mahajan Sr. <strong>(Intent/Motivation)</strong>. With this evil purpose, Amir Asif creates various methods to achieve his goal and power by using the armed rebel groups, ambushes, and violent means.Now, remember Nik Khan and her team? They gather information from multiple <strong>intelligence sources</strong> to assist Tyler in rescuing Ovi Mahajan Jr. They use informants with connections to criminal groups, and get insider knowledge that helped them understood the motivations, strategies, and vulnerabilities of the threat actors. They also used surveillance devices and cameras to collect real-time information, to understand the threat actors’ movements, operations, and identify hidden patterns. Unfortunately, Nik Khan and her team suffer losses due to insufficient research. Tyler Rake, <strong>our cybersecurity hero</strong> is helped in the successful support of the asset by a valuable information from the Nik Khan, our colleague. In Extraction 2, you will witness it that not only does Tyler survives, but also that he overcomes the mission.</p>
<p><strong>Back to the real deal!!!</strong><br />In this post, we will look at different Threat Actors, Vectors, and Intelligence Sources.</p>
<p><strong>Sit Back and enjoy the Ride!!!</strong></p>
<h1 id="heading-basic-terms"><strong>Basic Terms</strong></h1>
<p><strong>Vulnerability:</strong> is a weakness that, when exploited, can result in a security breach.</p>
<p><strong>Threat</strong>: the possibility of someone or something exploiting a vulnerability and breaching security. It can be purposeful or unintentional.</p>
<p><strong>Risk:</strong> the possibility and impact of a threat actor exploiting a vulnerability is known as risk.</p>
<p><strong>Risk = Likelihood × Impact</strong></p>
<p><strong>Threat actor:</strong> the person or entity that poses a potential threat to the security of systems, networks, or data.</p>
<p><strong>Capability:</strong> is the ability of a threat actor to create fresh exploit methodologies and tools</p>
<h1 id="heading-various-actors-and-threats"><strong>Various Actors and Threats</strong></h1>
<p><strong>Nation-state actors:</strong> include entities or groups that are supported by the government that exploit cyberspace for their wealth, military, or political objectives. Control of intelligence gathering is a primary aim of state actors for spying and strategic gain. It is commonly an Advanced Persistent Threat (APT), as They are long-lasting and are designed to gain persistent access to networks or systems for data theft or espionage.</p>
<p><strong>Script kiddies/Unskilled:</strong> Individuals with little or no technical skills who conduct attacks using already existing hacking tools and scripts. They may not have a specified target or any other objective that makes sense besides grabbing attention or showcasing their technical skills.</p>
<p><strong>Hacktivists:</strong> threat actors that are motivated by a belief in the social or political causes. They pursue the objective of exposing the existing corrupt layers, propagating the most preferred ideologies, or destabilizing them, these individuals may hit organizations or governments</p>
<p><strong>Insider Threats:</strong> type of threat actor within an organization that has authorized access to the system and results in intentional or unintentional misuse of their privileges.</p>
<p><strong>Organized crime:</strong> involves professional criminals, motivated by money, who are usually external entities and highly sophisticated, with a structured organization and supported by substantial capital to fund their efforts.</p>
<p><strong>Shadow IT:</strong> this is the use of unapproved technology or applications within a company that is not under the control of IT departments</p>
<p><strong>Criminal syndicates:</strong> threat actor that engages in computer fraud and hacking for Financial gain. The complexity of prosecuting is heightened by the possibility that a criminal syndicate operates online from countries other than those of its victim.  </p>
<p><strong>Competitors:</strong> competitors can try to get unlawful access to confidential information, trade secrets, or sensitive data.</p>
<p><strong>Hackers:</strong> An individual with the knowledge to access computer systems by unauthorized methods.</p>
<ul>
<li><p><strong>Authorized/ white hat:</strong> a hacker working for a security consultancy or conducting authorized penetration testing.</p>
</li>
<li><p><strong>Unauthorized/ black hat</strong>: a malicious hacker acting without authorization.</p>
</li>
<li><p><strong>Semi-authorized/Gray hat:</strong> a hacker with limited authorization. They have no hostile motive, and might look for security holes, but won't take advantage of it. They are paid for discovering the vulnerabilities (like a bug bounty).</p>
</li>
</ul>
<h1 id="heading-attributes-of-actors"><strong>Attributes of Actors</strong></h1>
<p><strong>Internal/external</strong>: External actors may be referred to as intruders that may be hackers, criminal gangs, or state sponsors while internal actors are employees, contractors, or any external partner with legitimate access to the organization's systems.</p>
<p><strong>Level of sophistication/capability</strong>: This attribute captures the technical awareness and capacity of a threat actor.</p>
<p><strong>Resources/funding</strong>: The power that actors have as well as the amount of money that they can lay their hands on greatly defines their capabilities and the operational level of their activities. Cybercriminals such as state-sponsored actors and organized crime groups often have several advantages such as financial backing, access to modern technologies, as well as knowledge obtained from relevant fields.</p>
<p><strong>Intent/motivation:</strong> This is the aim that an attacker has in place once they decide to launch an attack.</p>
<h1 id="heading-attack-vectors"><strong>Attack Vectors</strong></h1>
<p>The attack vector is how threat actors can infiltrate the system.  </p>
<p><strong>Direct access:</strong> It is having physical access/control of a system, which enables an attacker to directly compromise its target. e.g. corrupting the configuration of the hardware, or attempting to use a boot disk to install a virus.  </p>
<p><strong>Wireless:</strong> This entails establishing unauthorized control by exploiting loopholes in wireless networks or devices. e.g. Wi-Fi eavesdropping, spoofing, or brute-forcing of passwords for wireless networks.  </p>
<p><strong>Email:</strong> entails sending a malicious file attachment through email.  </p>
<p><strong>Supply chain:</strong> involves targeting the hardware or software supply chain to introduce infected components into networks or systems. This might involve intrusive modifications or creating backdoors   </p>
<p><strong>Social media:</strong> involves using social media platforms to promote malicious content, conduct social engineering attacks on people or organizations, or obtain information against them.  </p>
<p><strong>Removable media:</strong> entails the introduction of malware or the extraction of data from systems using external storage media. Attackers may send infected removable media to their target PCs or use auto-run options to run malicious malware.  </p>
<p><strong>Cloud: entails using infrastructure or cloud-based service vulnerabilities to their advantage. E.g.</strong> breaking into cloud accounts without authorization, stealing data, or taking advantage of vulnerabilities in cloud-based apps.</p>
<h1 id="heading-attack-motivations"><strong>Attack Motivations</strong></h1>
<p><strong>Data exfiltration:</strong> Data Exfiltration involves the unauthorized transfer of data from a computer, often conducted by nation-states, organized crime, insiders, and unskilled attackers for espionage, financial gain, or opportunistic purposes.</p>
<p><strong>Espionage:</strong> involves nation-states and organized crime groups, it is the act of spying on nations, persons, or organizations to obtain sensitive information for strategic or competitive advantage.</p>
<p><strong>Service disruption</strong>: Service disruption occurs when actors such as hacktivists, nation-states, and inexperienced attackers attempt to interrupt the services of organizations to cause havoc, make political criticism, or demand ransom.</p>
<p><strong>Blackmail:</strong> Blackmail occurs when actors, such as organized crime groups and insider threats gather sensitive or incriminating information and use it to extort money or accomplish personal gain by threatening to reveal the information unless demands are granted</p>
<p><strong>Financial gain:</strong> This is commonly achieved by organized crime to exploit cyber attacks, such as ransomware and banking trojans, to make money by collecting financial information and gaining access to victims' bank accounts.</p>
<p><strong>Philosophical/political beliefs:</strong> Hacktivists, nation-states, and sometimes inexperienced attackers carry out cyberattacks motivated by their intellectual or political ideas.</p>
<p><strong>Ethical:</strong> Ethical hackers (white-hats) do permitted security testing to improve and strengthen corporate defenses, driven by a desire to improve security rather than engage in malicious behavior.</p>
<p><strong>Revenge:</strong> Insider threats, hacktivists, and nation-states launch revenge-driven cyber attacks against entities they believe have mistreated them, seeking payback.</p>
<p><strong>Disruption/chaos:</strong> Nation-states, hacktivists, and inexperienced attackers seek disruption and disorder that cause instabilities, distribute malware, or target vital systems.</p>
<p><strong>War:</strong> Nation-states utilize cyber warfare to disrupt or damage a rival country's infrastructure, economy, or security, to compromise national security, and to cause economic hardship</p>
<h1 id="heading-threat-intelligence-sources"><strong>Threat intelligence sources</strong></h1>
<p>Cyber Threat Intelligence (CTI) is the process of gathering, analyzing, and disseminating data concerning new threats and their sources. Professionals can improve their comprehension of attacks and successfully reduce risks by actively participating in CTI. The following are sources of gathering information.  </p>
<p><strong>Open-source intelligence (OSINT):</strong> information obtained from publicly available sources, such as news articles, social media, and forums.  </p>
<p><strong>Closed/proprietary:</strong> Intelligence is obtained from private enterprises, security vendors, or government authorities. Extensive threat research is conducted and collated, and the results are made available as a paid subscription.  </p>
<p><strong>Vulnerability Databases:</strong> Vulnerability databases contain information on known software and system weaknesses and on the hardware ones too. There is a list known as the Common Vulnerabilities and Exposures (CVE) that has been developed as a common list for the development of specific identifiers. The United States Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) support the U. S National Vulnerability Database (NVD), which provides CVE, its details, patch, and its severity, besides other data.  </p>
<p><strong>Public/private information-sharing centers:</strong> promote the exchange of threat intelligence between organizations, government institutions, and security professionals. Participants share useful ideas, threat indicators, and mitigation techniques. an example is the Cyber Threat Alliance(CTA)   </p>
<p><strong>Dark Web:</strong> This is like a mysterious part of the World Wide Web that contains illicit business. To that end, it can help to establish threat intelligence by tracking activity in underground forums, markets, and even communication channels of cybercriminals.  </p>
<p><strong>Indicators of compromise:</strong> A reference to an indication that an asset or network is compromised or has been hacked or is being hacked. These can be IP addresses, domain names; the hash values of files that might have been infected; or behavioral activity identified during an attack.  </p>
<p><strong>Automated Indicator Sharing (AIS):</strong> AIS frameworks automate the sharing of important threat data or information between organizations. AIS is based on the STIX and TAXII standards and protocols. </p>
<ul>
<li><p><strong>Structured Threat Information eXpression (STIX):</strong> is a standardized language for describing cyber threat information, it includes motivations, abilities, capabilities, and response information. it describes standard terminology for IoCs and ways of indicating relationships between them</p>
</li>
<li><p><strong>TrustedAutomated eXchange of Intelligence Information (TAXII):</strong> protocol provides a means for transmitting CTI data between servers and clients.</p>
</li>
</ul>
<p><strong>Predictive analysis:</strong> forecasts potential future threats using historical data, statistical modeling, and machine learning algorithms. It enables enterprises to predict and defend against emerging threats.  </p>
<p><strong>Threat maps:</strong> are graphical displays that indicate the geographical distribution and levels of cyber threats experienced in different countries internationally. They help in mapping out the high-risk zones and in interpreting the new risk sight. This option focused on constructing an animated map that would depict the threat sources in near real-time. is an animation of a graph depicting the source, target, and the different kinds of attacks identified by a particular CTI platform  </p>
<p><strong>File/code repositories:</strong> Signatures of known malware code are stored in a file/code repository. The code samples are taken from live customer systems and (in the case of public repositories) files uploaded by subscribers</p>
<h1 id="heading-research-sources"><strong>Research sources</strong></h1>
<p><strong>Vendor websites:</strong> The official websites of technology vendors contain product information such as release notes, security advisories, and patches. This helps researchers to stay up to date on the newest vulnerabilities and patches for a specific technology.  </p>
<p><strong>Vulnerability feeds: these are data sources with</strong> information about newly identified vulnerabilities in software, systems, or networks. An example is CVE data feeds that provide descriptions, severity ratings(CVSS), and mitigation solutions for vulnerabilities that have been detected.  </p>
<p><strong>Conferences:</strong> Various institutions host and sponsor security conferences, which allow for presentations on the most recent threats and technologies.  </p>
<p><strong>Academic journals:</strong> Academic researchers and non-profit trade groups and associations, such as the IEEE, publish their findings in journals as papers. These papers are often available only through subscription.  </p>
<p><strong>Request for Comments (RFC):</strong> when a new technology is accepted as a web standard, it is published as an RFC by the W3C. They give technical information, standards, and best practices for new technologies  </p>
<p><strong>Local industry groups:</strong> Professional associations and user groups, for example, bring together professionals working in the field.  They host events, webinars, and forums where participants can discuss industry challenges and share experiences  </p>
<p><strong>Social media:</strong> Twitter and LinkedIn are other common media used in sharing of cybersecurity knowledge. Whenever researchers or any professionals or related organizations obtain new information or publish new research results, they announce it on these platforms.  </p>
<p><strong>Threat feeds:</strong> Threat feeds are sources of information on current cyber threats, IOCs, malware signatures, or malicious behavior patterns. These feeds collect information from a variety of sources, including security companies, security research teams, and threat intelligence systems to get Signatures and pattern-matching rules to identify specific threat  </p>
<p><strong>Adversary tactics, techniques, and procedures (TTP):</strong> Historical cyber-attacks and adversary acts are examined using TTPs.TTPs divide behaviors into three categories: campaign strategy and approach (tactics), generalized attack vectors (techniques), and particular intrusion tools and methods (procedures).</p>
<blockquote>
<p><strong><em>“We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever.”</em></strong> </p>
<p><strong><cite>Dr. Larry Ponemon</cite></strong></p>
</blockquote>
<p><strong>5.6 Review Questions</strong></p>
]]></content:encoded></item><item><title><![CDATA[Cryptographic Solutions]]></title><description><![CDATA[I believe it is safe to claim that our moms were among the early adopters of encryption, with their "coded" ways of interacting with their children, ensuring their messages, particularly warnings, can only be understood by you. This can be achieved b...]]></description><link>https://cyvally.com/cryptographic-solutions</link><guid isPermaLink="true">https://cyvally.com/cryptographic-solutions</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Mon, 19 Aug 2024 12:23:26 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737302451018/a31c17ab-ae1f-4527-be74-8473b7940639.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[
<p></p><p>I believe it is safe to claim that our moms were among the early adopters of encryption, with their <strong>"coded"</strong> ways of interacting with their children, ensuring their messages, particularly warnings, can only be understood by you. This can be achieved by winking the eyes, giving some type of facial expression, and so on. A wonderful scenario in which a visitor gives me a gift, my mother's <strong>"type of look or laughter</strong>" serves as a disguised communication, instructing me to gracefully decline the offer. At this time, she would persuade me to accept the gift, saying, "Timi, take it" before going on to tell the guest, "She's just a shy person!" Despite her prodding, my response should be firmly "No, thanks," as I discreetly hunt for the nearest exit to leave the situation.</p>
<p></p>


<p></p><p>In this analogy, my mother’s laughter/type of look and her words represent the encrypted message. To an outsider, it may seem like a lighthearted interaction, but for me, it carries a clear directive that only I understand. Similarly, encryption works by encoding information so that only those with the correct key or understanding can access the original message.<br /><br /><strong>In this post, we will be discussing different cryptographic solutions. Stay Tuned!!!</strong></p>
<p></p>

<p></p><p>First, what is cryptography?<br /><br />Cryptography is the use of mathematical techniques to encrypt and decrypt information, transforming data for the purpose of preventing unauthorized access and ensuring only the intended recipient can read it.</p>
<p></p>

<p></p><p><strong>Public key infrastructure (PKI)</strong></p>
<p></p>

<p></p><p><strong>Public Key Infrastructure (PKI)</strong> is a framework for managing digital keys and certificates to ensure secure and reliable digital communications.<br />It includes the hardware, software, procedures, and policies required to generate, distribute, use, store, and revoke digital certificates and public keys.</p>
<p></p>

<p></p><p><strong>Simply put, PKI is the technology used to authenticate users and devices in the digital world.</strong></p>
<p></p>

<p></p><p><strong>Why do we need PKI?</strong></p>
<p></p>

<p></p><p>PKI is needed to protect sensitive information, such as financial transactions, from unauthorized access, verify identities by functioning as a digital passport to prevent fraud and impersonation, encrypt data to keep communications confidential and unaltered, ensure compliance with data security regulations, and support secure e-commerce and the Internet of Things (IoT) by providing necessary tools for digital signatures and encryption.</p>
<p></p>

<p></p><p><br /><strong>Now, let us go over the key components of PKI</strong></p>
<p></p>

<p></p><p><strong>Public key: </strong>This is an openly distributed cryptographic key, It is used to validate digital signatures and encrypt information so that only the designated recipient may decrypt it using their private key. </p>
<p></p>

<p></p><p><strong>Private key: </strong>A private key is a secret cryptographic key only known to the owner. The matching public key can be used to decrypt data or create digital signatures. It is kept confidential to maintain the integrity and security of digital communications.</p>
<p></p>

<p></p><p><strong>Key escrow:</strong> This is a security measure where cryptographic keys are stored with a trusted third party. This approach makes it possible to recover keys in the event of a loss, ensuring that access to digital signatures or encrypted data can be regained as needed.</p>
<p></p>

<p></p><p>So we've been hearing the word Cryptography Key and don't seem to understand what it means.</p>
<p></p>

<p></p><p>A key is a string of characters used to change data presentation to make it seem random. It locks (encrypts) data, just like a real key, so that only the appropriate key can unlock (decrypt) it.</p>
<p></p>

<p></p><p><strong>Encryption</strong></p>
<p></p>

<p></p><p>Encryption is a data security technology that uses a cryptographic algorithm to convert readable data, or "plaintext," into an encoded format called "ciphertext." It ensures that data remains unreadable to unauthorized users and can only be accessed or processed after being decrypted with a specific cryptographic key.</p>
<p></p>

<p></p><p><strong>Why do we need encryption?</strong></p>
<p></p>

<p></p><p>Encryption helps prevent data breaches whether the data is in transit or at rest (e.g., if a corporate device is lost or stolen and its hard drive is properly encrypted, the data will remain secure), it prevents malicious behavior like on-path attacks, ensures compliance with regulatory standards like HIPAA, NDPR, and GDPR, and provides authentication to verify legitimate entities. Encryption ensures that no one can read communications or data at rest except the intended recipient or the rightful data owner.</p>
<p></p>

<p></p><p>Ever heard of the different states of data? Let's go over them, shall we?</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Data at rest:</strong> This is data in storage, that is not being accessed(in use) or transferred(in motion)</li>
</p>

<p><li><strong>Data in motion:</strong> is data moving between systems or locations</li>
</p>

<p><li><strong>Data in use</strong>: This is data that is being accessed, modified, processed, and read by a system</li>
</p></ul>
<p></p>

<p></p><p><strong>Now, let us go over the 6 levels of encryption which answer to protecting data at rest</strong></p>
<p></p>

<p></p><p><strong>Full-disk: </strong>Full-disk encryption (FDE) secures data at rest by encrypting the entire physical storage device, including SSDs and hard disks, while protecting its metadata. It ensures that all data on the storage device is encrypted. BitLocker and FileVault are two examples of solutions that use FDE. it ensures that data on servers, PCs, and laptops remains secure even if the device is stolen.</p>
<p></p>

<p></p><p><strong>Partition:</strong> This is encryption of specific partitions of a disk instead of the whole disk, permitting selective encryption of some partitions while leaving others unencrypted. it is useful to protect sensitive data in a partition.</p>
<p></p>

<p></p><p><strong>File: </strong>This level of encryption is achieved with third-party programs or Microsoft's EFS (Encrypting File System), which encrypts individual files or folders without compromising the security of the system's other data.</p>
<p></p>

<p></p><p><strong>Volume:</strong> Volume encryption secures an entire logical volume or virtual disk, which is commonly used in virtual machines or storage devices, by encrypting certain files or directories within that volume.</p>
<p></p>

<p></p><p><strong>Database:</strong> Database encryption uses symmetric keys to provide transparent encryption, protecting sensitive data by encrypting the entire database. It can also be applied at the column, row, or table levels to protect data from transmission and unauthorized access.</p>
<p></p>

<p></p><p><strong>Record:</strong> Record encryption uses different symmetric keys to encrypt each column within a database or file, providing greater protection. </p>
<p></p>

<p></p><p>we aren't neglecting encryption methods for data in motion, are we? let's go over them</p>
<p></p>

<p></p><p>Transport/communication Encrption: This type of encryption secures data as it travels across networks. here are key transport encryption methods/Protocols:</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>SSL (Secure Sockets Layer) and TLS (Transport Layer Security):</strong> encrypt data to secure network communications, such as web browsing (HTTPS) and email, with TLS being the updated, more secure successor to the outdated SSL.</li>
</p>

<p><li><strong>IPSec (Internet Protocol Security)</strong>: secures IP communications by authenticating and encrypting data packets at the network layer, commonly used in VPNs to protect data sent over the internet.</li>
</p>

<p><li><strong>VPN(Virtual Private Network)</strong>: VPNs create a secure, encrypted connection over the internet to protect all transmitted data and are used for secure remote access and privacy, with client-based VPNs using SSL/TLS and site-to-site VPNs using IPsec</li>
</p></ul>
<p></p>

<p></p><p>we have discussed what encryption is, its use, and different methods of encrypting the different states of data, now let's discuss the 2 different types of encryption</p>
<p></p>

<p></p><p><strong>Asymmetric/ Private Key Encryption:</strong> uses a single key for both encryption and decryption, is faster and has less computation overhead, but requires secure key distribution and lacks non-repudiation</p>
<p></p>

<p></p><p><strong>Symmetric/Public Key Encryption: </strong>uses different keys (public and private) or encryption and decryption, where the public key can be shared freely and the private key remains secret, it is slower with more computational overhead than symmetric encryption.<br /><br /></p>
<p></p>

<p></p><p><strong>When choosing an encryption method, several key factors should be considered</strong></p>
<p></p>

<p></p><p><strong>Key exchange:</strong> Securely sharing encryption keys is important, especially over insecure mediums. This can be done through out-of-band methods like using a telephone or courier for physical transfer, or in-band methods such as asymmetric encryption to transmit symmetric session keys. Real-time encryption demands fast, ephemeral keys, which must be carefully managed. Key exchange protocols such as Diffie-Hellman and Elliptic-Curve Diffie-Hellman (ECDH) enable secure key agreements.</p>
<p></p>

<p></p><p>Algorithms: An encryption algorithm is the mechanism used to change data into ciphertext. An algorithm will use the encryption key to alter the data predictably so that even though the encrypted data will appear random, it can be turned back into plaintext by using the decryption key. </p>
<p></p>

<p></p><p>Key length: Key length, measured in bits, determines the security of encryption algorithms, with longer keys offering stronger protection, especially against brute force attacks; symmetric encryption commonly uses 128 bits or a little higher, while asymmetric encryption employs much larger keys of 3,072 bits or larger.</p>
<p></p>

<p></p><p>Some common symmetric encryption algorithms include:</p>
<p></p>

<p></p><p><strong>DES (Data Encryption Standard)</strong>: Uses a 64-bit key (56 effective bits) to encrypt data in 64-bit blocks.</p>
<p></p>

<p></p><p><strong>AES (Advanced Encryption Standard)</strong>: Replaced DES and 3DES and supports 128, 192, or 256-bit keys and block sizes, and used for sensitive unclassified information.</p>
<p></p>

<p></p><p><strong>Blowfish</strong>: has key sizes from 32 to 448 bits, developed as a DES replacement but not widely adopted</p>
<p></p>

<p></p><p>Some common asymmetric encryption algorithms include:</p>
<p></p>

<p></p><p><strong>Diffie-Hellman</strong>: Used for secure key exchange and distribution over insecure channels, therefore it is commonly used in VPNs (IPSec).</p>
<p></p>

<p></p><p><strong>RSA (Rivest-Shamir-Adleman)</strong>: used in multi-factor authentication and Digital signatures. it works off the factorization of the product of two large prime numbers</p>
<p></p>

<p></p><p><strong>Elliptic Curve Cryptography (ECC)</strong>: Efficient and secure, based on elliptical curve mathematics, used in mobile and low-power devices.</p>
<p></p>

<p></p><p><strong>Different Tools for Encryption</strong></p>
<p></p>

<p></p><p><strong>Trusted Platform Module (TPM): </strong>is a hardware-based security component designed for the secure storage of keys, passwords, and other sensitive data. It performs encryption and digital signing, features versatile memory for securely storing BitLocker keys and hardware configuration information, and is commonly used in BitLocker drive encryption for Windows devices while also offering protection against dictionary attacks.</p>
<p></p>

<p></p><p><strong>Hardware security module (HSM): </strong>is a physical device designed to protect, store, and manage digital keys, it performs encryption and decryption while ensuring key security and regulatory compliance, often used in mission-critical scenarios like financial transactions and large environments with clusters and redundant power.</p>
<p></p>

<p></p><p><strong>Key management system:</strong> is a centralized solution for managing the entire lifecycle of cryptographic keys, including their creation, storage, rotation, and destruction, ensuring efficient and secure key handling to protect data and prevent unauthorized access, while automating key management tasks and integrating with various systems to enforce encryption policies.</p>
<p></p>

<p></p><p><strong>Secure Enclave:</strong> is an isolated coprocessor within a device that handles sensitive data and operations securely by providing extensive security features such as real-time memory encryption, monitoring system boot process, and root cryptographic keys, while being isolated from the main processor to protect sensitive data and prevent unauthorized access to devices.</p>
<p></p>

<p></p><p><strong>Obfuscation</strong></p>
<p></p>

<p></p><p>Obfuscation is the process of making data difficult to read or analyze by concealing it in plain sight or hiding it within other mediums.</p>
<p></p>

<p></p><p><br /><strong>Let us go over different obfuscation methods</strong></p>
<p></p>

<p></p><p><strong>Steganography:</strong> involves hiding data within other media such as images, audio, or video to make the message invisible but present, techniques include embedding messages in TCP packets, images, or modifying digital audio and video files, and is often used with encryption to enhance security while being challenging to detect due to its obscurity.</p>
<p></p>

<p></p><p><strong>Tokenization: </strong>involves replacing sensitive data with non-sensitive placeholders. Unlike encryption and hashing, tokenization does not mathematically link the original data to the token, lowering the risk of sensitive data exposure during transactions. It is commonly used in payment systems and credit card processing to protect actual card details and meet security standards.</p>
<p></p>

<p></p><p><strong>Data masking:</strong> is the process of masquerading original data to conceal sensitive information while keeping its authenticity and usability. It is widely used in testing environments, particularly for software development. Data masking is common in sectors that handle personal information, where it covers sensitive data such as credit card digits and social security numbers.</p>
<p></p>

<p></p><p><strong>Hashing</strong></p>
<p></p>

<p></p><p>Hashing is the process of converting data into a fixed-size string of characters known as a hash value or digest, which is then used to verify data integrity and assure security. Strong and widely used algorithms include SHA256, while MD5, despite being less secure, is still employed for compatibility.</p>
<p></p>

<p></p><p>Hashing is a one-way function, so the original data cannot be recovered from the hash. It is used for securely storing passwords and ensuring the integrity of downloaded data or files. A hash can also be used as a digital signature to ensure authenticity, non-repudiation, and integrity.</p>
<p></p>

<p></p><p>A hash function generates a unique digest for every input. A collision happens when two separate inputs provide the same hash value. MD5 is known to cause collisions and is not recommended for use in secure applications.</p>
<p></p>

<p></p><p><strong>Salting</strong></p>
<p></p>

<p></p><p>Salting is a security technique that adds random data (salt) to passwords before hashing, which guarantees that even identical passwords create different hash values and defend against attacks such as rainbow tables and brute-force attacks.</p>
<p></p>

<p></p><p><strong>Digital Signatures</strong></p>
<p></p>

<p></p><p>Digital signatures use a hash digest encrypted with a private key to authenticate the sender, verify the message's integrity, and ensure non-repudiation, with the recipient decrypting the signature with the sender's public key to confirm that the message was not altered and that the signature is genuine.</p>
<p></p>

<p></p><p><strong>Key stretching</strong></p>
<p></p>

<p></p><p>Key stretching is a technique that strengthens a weaker key by generating longer, more secure keys (at least 128 bits), thereby increasing the time required to crack the key, and is utilized in systems such as Wi-Fi Protected Access, Wi-Fi Protected Access version 2, and Pretty Good Privacy</p>
<p></p>

<p></p><p><strong>Blockchain</strong></p>
<p></p>

<p></p><p>Blockchain is a distributed ledger that tracks transactions through a shared immutable ledger, with each block containing the previous block's hash, a timestamp, and hashes of individual transactions, ensuring trust, transparency, and chronological order. It is widely used in cryptocurrencies such as Bitcoin and for payment processing, digital identification, supply chain monitoring, and digital voting.</p>
<p></p>

<p></p><p><strong>Open public ledger</strong></p>
<p></p>

<p></p><p>A public ledger is a secure and anonymous record-keeping system that protects users' identities, tracks cryptocurrency balances, and records all legitimate transactions inside a network.</p>
<p></p>

<p></p><p><strong>Digital Certificates</strong></p>
<p></p>

<p></p><p>Digital certificates are digitally signed electronic documents that link a public key to a user's identity and are used across individuals, servers, workstations, and devices. They follow the X.509 standard and include details such as the certificate holder's name, public key, serial number, version, signature algorithm, issuer, and extensions, with trust established through Certificate Authorities in a PKI system or a Web of Trust, and can be created through operating system or third-party options.<br /><br /></p>
<p></p>

<p></p><p><strong>let us go over the concepts of issuing digital certificates</strong></p>
<p></p>

<p></p><p><strong>Certificate authorities:</strong> A Certificate Authority (CA) is a trusted third party that issues digital certificates, verifies certificate requestors' identities, and links their identities to a public key, with the certificate containing the CA's information and digital signature; this trust model ensures that certificates can be relied on for secure connections to websites and other entities as long as the CA is trusted, allowing for real-time verification of authenticity.</p>
<p></p>

<p></p><p><strong>Certificate revocation lists (CRLs):</strong> Certificate Authorities (CAs) maintain a Certificate Revocation List (CRL), which consists of certificates that have been revoked before their expiration date, therefore preventing the use of compromised or outdated certificates; it is frequently updated with new revocations.</p>
<p></p>

<p></p><p><strong>Online Certificate Status Protocol (OCSP): </strong>OCSP (Online Certificate Status Protocol) is used to check the real-time status of a digital certificate, enabling clients to query an OCSP responder for certificate validity rather than downloading a CRL, which is more efficient; OCSP stapling improves this by having the certificate holder regularly retrieve the OCSP status from the CA and include it in the SSL/TLS handshake, improving performance and reducing the load on CA servers.</p>
<p></p>

<p></p><p><strong>The root of trust: </strong>The root of trust is the highest level of trust in a certificate validation hierarchy, established through a root certificate issued by trusted third-party providers like Verisign or Google It may include various components such as hardware security modules (HSMs), secure enclaves, and certificate authorities, ensuring trust in IT security.</p>
<p></p>

<p></p><p><strong>Certificate signing request (CSR)generation:</strong> A Certificate Signing Request (CSR) is a unit of encoded text containing information about the entity requesting the certificate, including their public key, which is sent to a Certificate Authority (CA) for validation and signing, while the requester retains control of the private key; the CA verifies the request, confirms ownership details, and returns the signed certificate to the applicant.</p>
<p></p>

<p></p><p><strong>let us go over some Types of Digital Certificates</strong></p>
<p></p>

<p></p><p><strong>Self-signed:</strong> Self-signed certificates are digital certificates signed by the same entity whose identity they validate; they provide encryption but lack third-party trust and are used for internal purposes or testing; for more general internal use, organizations can build their own CA, issue self-signed certificates, and install the CA certificate on all devices to create a trusted internal certification chain.</p>
<p></p>

<p></p><p><strong>Third-party</strong>: Third-party certificate authorities (CAs) are built into browsers and systems, enabling you to obtain a web certificate that will be widely trusted. These CAs are in charge of verifying the certificate request, including confirming the certificate owner's identity, making them the preferred choice for public-facing websites due to their high credibility and recognition.</p>
<p></p>

<p></p><p><strong>Wildcard</strong>: A wildcard certificate secures several subdomains with a single certificate, making maintenance easier and less expensive; nevertheless, if the wildcard certificate is compromised, all related subdomains are affected. likewise, the Subject Alternative Name (SAN) extension in X.509 certificates can list several domain names or subdomains, whereas a wildcard domain certificate covers all subdomains under a specific domain, such as *.cyvally.com.<br /></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><strong>If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.</strong></p>
<p></p>

<p></p><p>~<em>Kahlil Gibran</em></p>
</blockquote>
<p></p>

<p></p><p><strong>Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><p></p>
<p></p>
]]></content:encoded></item><item><title><![CDATA[Ports, Protocols, Purpose, and Encrypted Alternatives]]></title><description><![CDATA[My first time boarding the yellow buses in Lagos State wasn't a funny one. I took a bus from Lekki Phase 1 to Ajah. As a Yoruba girl who had stayed in Port Harcourt and was just arriving in Lagos, my first instinct wasn't to use the popular "owa" to ...]]></description><link>https://cyvally.com/ports-protocols-purpose</link><guid isPermaLink="true">https://cyvally.com/ports-protocols-purpose</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Mon, 17 Jun 2024 15:25:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737303926984/0ab75120-1b6b-4776-82ac-9559bf04997a.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[
<p></p><p></p>
<p></p>

<p></p><p><strong>My first time boarding the yellow buses in Lagos State wasn't a funny one. I took a bus from Lekki Phase 1 to Ajah. As a Yoruba girl who had stayed in Port Harcourt and was just arriving in Lagos, my first instinct wasn't to use the popular "owa" to indicate that I wanted to get off. Using the word "highlight" wasn't an option either, as Twitter stories had taught me that people might look at me strangely. So, I used the usual "dropping" word, as I was used to in Port Harcourt, and the drivers there clearly understood. Ladies and gentlemen, the driver carried me past my destination. The other passengers told me I should have used "owa" and mentioned the exact destination. Trust me, I have learned my lesson.</strong></p>
<p></p>

<p></p><p><strong>In this story, "ports" are like bus stops, specific locations where you need to signal your intention to stop. Just as different bus stops have specific names ("Lekki Phase 1," "Ajah"), ports have specific numbers (like 80, and 21). The "protocols" are the methods of communication, how you signal to the driver. In Port Harcourt, I used "dropping," similar to how protocols like HTTP or FTP have specific ways to communicate. In Lagos, the expected protocol was "owa + exact destination," just as HTTP and FTP, respectively.</strong></p>
<p></p>

<p></p><p><strong>What's your own way of communicating with conductors or drivers to stop you at your destination?</strong></p>
<p></p>

<p></p><p>In this post, we will look into what Ports and Protocols are, the Purposes of common ports and their Encrypted Alternatives</p>
<p></p>

<p></p><p><strong>Let's Get Right Into It!!!</strong></p>
<p></p>

<p></p><p><strong>What are Ports/ Port Numbers?</strong></p>
<p></p>

<p></p><p>A port, often known as a port number, is a number allocated to identify a connection endpoint and route data to a service. Ports guarantee that when data arrives on a device, it is sent to the right service/protocol.</p>
<p></p>

<p></p><p>Port numbers range from 0 to 65535, with 0-1023 being well-known.</p>
<p></p>

<p></p><p><strong>What are Protocols?</strong></p>
<p></p>

<p></p><p>A protocol is a way for computers or devices connected to a network to communicate with one another. It outlines the rules or procedures for transmitting data.</p>
<p></p>

<p></p><p>Simply put, they are the common language that computers speak.</p>
<p></p>

<p></p><p>Now, let's go through common port numbers, protocols, and their encrypted/ secure alternatives.</p>
<p></p>

<p></p><div class="wp-block-group"><p></p>
<p></p><figure><table><tbody><tr><td><strong>Port Number</strong></td><td><strong>Protocol</strong></td><td><strong>Protocol Type</strong></td><td><strong>Purpose</strong></td><td><strong>Secure Alternative Port Number</strong></td><td><strong>Secure Alternative Protocol</strong></td></tr><tr><td>Port 20/21﻿</td><td>FTP (File Transfer Protocol)</td><td>TCP</td><td>Transfer files between client and server(where port 20 is for data connection, and port 21 is used for control connection)</td><td>Port 989/990</td><td>FTPS(FileFile Transfer Protocol Secure) </td></tr><tr><td>﻿Port 23</td><td>﻿Telnet</td><td>﻿TCP</td><td>﻿Remote login and command execution</td><td>﻿Port 22</td><td>﻿SSH(Secure Shell)</td></tr><tr><td>﻿Port 25</td><td>﻿SMTP (Simple Mail Transfer Protocol)</td><td>﻿TCP</td><td>﻿Sending emails</td><td>﻿Port 465</td><td>﻿SMTPS (Simple Mail Transfer Protocol Secure)</td></tr><tr><td>﻿Port 53</td><td>﻿DNS (Domain Name System)</td><td>﻿TCP/UDP</td><td>﻿Resolve domain names to IP addresses</td><td>﻿DoH- Port 443<br />DoT- Port 853</td><td>﻿DNS over HTTPS (DoH) or DNS over TLS (DoT)</td></tr><tr><td>﻿Port 67/68</td><td>﻿DHCP (Dynamic Host Configuration Protocol)</td><td>﻿UDP</td><td>﻿Assign IP addresses to devices on a network</td><td>﻿N/A</td><td>﻿N/A</td></tr><tr><td>Port 69</td><td>TFTP (Trivial File Transfer Protocol)</td><td>UDP</td><td>Simple, unsecure file transfers</td><td>N/A<br /></td><td>N/A</td></tr><tr><td>﻿Port 80</td><td>﻿HTTP (Hypertext Transfer Protocol)</td><td>﻿TCP</td><td>﻿Transmitting web pages on the internet</td><td>﻿Port 443</td><td>HTTPS(Hypertext transfer protocol secure) </td></tr><tr><td>﻿Port 110</td><td>﻿POP3 (Post Office Protocol)</td><td>﻿TCP</td><td>﻿Retrieve and manage emails from a mail server</td><td>﻿Port 995</td><td>POP3S(Post Office Protocol version 3)/ POP3 over TLS</td></tr><tr><td>Port 123</td><td>NTP (Network Time Protocol)</td><td>UDP</td><td>Synchronize clocks over a network</td><td>N/A</td><td>N/A</td></tr><tr><td>Port 137</td><td>NetBIOS Name Service</td><td>UDP</td><td>Name resolution in a LAN</td><td>N/A</td><td>N/A</td></tr><tr><td>﻿Port 143</td><td>﻿IMAP (Internet Message Access Protocol)</td><td>﻿TCP</td><td>﻿Retrieve and manage emails from a mail server</td><td>﻿Port 993</td><td>﻿IMAPS </td></tr><tr><td>﻿Port 161/162</td><td>﻿SNMP (Simple Network Management Protocol)</td><td>﻿UDP</td><td>﻿Network management and monitoring</td><td>﻿Port 161/162</td><td>﻿SNMPv3 (it uses its encryption methods)</td></tr><tr><td>Port 389</td><td>LDAP (Lightweight Directory Access Protocol)</td><td>TCP/UDP</td><td>Directory services</td><td>Port 636</td><td>LDAPS</td></tr><tr><td>﻿Port 445</td><td>﻿SMB (Server Message Block)</td><td>﻿TCP</td><td>﻿File and printer sharing</td><td>﻿Varies</td><td>﻿SMB over SSL/TLS</td></tr><tr><td>Port 514</td><td>Syslog</td><td>UDP</td><td>System logging</td><td>Port 6514</td><td>Syslog over TLS </td></tr><tr><td>﻿Port 3306</td><td>﻿MySQL</td><td>﻿TCP</td><td>﻿Database services</td><td>﻿Uses the same port</td><td>﻿MySQL over SSL/TLS</td></tr><tr><td>﻿Port 3389</td><td>﻿RDP (Remote Desktop Protocol)</td><td>﻿TCP</td><td>﻿Remote desktop access,  where it provides a user with a graphical interface to connect to another computer over a network.</td><td>﻿Uses the same port</td><td>﻿RDP over SSL/TLS </td></tr><tr><td>﻿Port 5060</td><td>﻿SIP (Session Initiation Protocol)</td><td>TCP/UDP</td><td>﻿Voice over IP (VoIP)</td><td>﻿Port 5061</td><td>﻿SIPS </td></tr></tbody></table><figcaption>Common port numbers, protocols, and their encrypted/ secure alternatives</figcaption></figure>
<p></p>

<p></p><p><strong>Conclusions</strong></p>
</div>
<p></p>

<p></p><p>Knowing the ports and protocols in your networks is one of the first steps in identifying potential vulnerabilities and understanding how to secure your systems.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><strong>If one does not know to which port one is sailing, no wind is favourable.</strong></p>
<p></p>

<p></p><p><strong>~Seneca the Younger</strong></p>
</blockquote>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><strong>To reach a port, we must sail - sail, not tie at anchor - sail, not drift.</strong></p>
<p></p>

<p></p><p><strong>~Franklin D. Roosevelt</strong></p>
</blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>

]]></content:encoded></item><item><title><![CDATA[Change Management Processes]]></title><description><![CDATA[During my previous role as a Network Performance Optimization (NPO) engineer, in my first month on the job, I received a serious warning from my line manager during one of our training sessions. He emphasized the importance of getting official approv...]]></description><link>https://cyvally.com/change-management-processes</link><guid isPermaLink="true">https://cyvally.com/change-management-processes</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sun, 11 Feb 2024 18:06:36 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737304059166/30db94ae-25ca-4273-951f-1aa21b6f40b0.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[
<p></p><p><strong>During my previous role as a Network Performance Optimization (NPO) engineer, in my first month on the job, I received a serious warning from my line manager during one of our training sessions. He emphasized the importance of getting official approval before implementing any optimizations or changes to keep the network running smoothly. Understanding the potential impact of changes, especially in the Radio Network Controller (RNC), where an optimization could inadvertently cause regional degradation and job losses. I learned that our client's primary Key Performance Indicator (KPI) was 100% availability, although optimization is to achieve this goal, getting change approval is most important, which required thorough justification and readiness for any potential side effects by my team. Achieving optimal network performance was a notable accomplishment that NPO engineers, like my friend Rex, celebrated passionately when ranked among the top performers</strong>. <strong>However, adherence to the rule of obtaining change approval before implementation is a major factor used in deciding the ranks.</strong><br /></p>
<p></p>


<p></p><p>In this post, we will look into the concept of change management, explore its impact on business processes related to security operations, discuss the technical implications of changes, and examine the essential elements of effective documentation.<br /><br /><strong>Grab your favorite drink; you're going to enjoy this!</strong></p>
<p></p>

<p></p><p><strong>What is Change Management?</strong></p>
<p></p>

<p></p><p>Change management is the formal process to make changes to systems, processes, goals and technologies. It ensures that these changes are implemented successfully while minimizing disruption to business operations.<br />Examples of changes that businesses may implement are application patches, software upgrades, Firewall Configuration Updates and Vulnerability Remediation</p>
<p></p>

<p></p><p><strong>Business Processes Impacting Security Operation</strong></p>
<p></p>

<p></p><p>Business processes have a great impact on security operations, determining how controls are managed in an organization. <strong><mark>Let us go over some business processes impacting security operations:</mark></strong></p>
<p></p>

<p></p><p><strong>Approval Process:</strong> security changes are evaluated and authorized by key stakeholders (Change Advisory/Control Board) before execution, hence promoting uniformity and adherence to organizational standards.</p>
<p></p>

<p></p><p><strong>Ownership:</strong> The change owner is the individual who needs to make a change. The owner controls the change process and tests the system to ensure that the change is executed effectively and has no negative impact on the organization.</p>
<p></p>

<p></p><p><strong>Stakeholders</strong>: individuals or groups with an interest in the proposed change, as they will be affected by its implementation and play a role in its evaluation and execution.</p>
<p></p>

<p></p><p><strong>Impact analysis: </strong>often referred to as Business Impact Analysis(BIA) helps mitigate risks and focus on recovery efforts by evaluating the potential impact of proposed change.</p>
<p></p>

<p></p><p><strong>Test results:</strong> entail conducting test both before and after implementing changes to confirm the desired outcomes and identify areas needing further adjustments. A sandbox test, conducted in an isolated environment, is a common pre-production test that does not impact live systems.</p>
<p></p>

<p></p><p><strong>Backout plan:</strong> strategy for rolling back to original configurations to limit the impact of failed security changes, thereby minimizing disruptions to business operations.</p>
<p></p>

<p></p><p><strong>Maintenance window:</strong> scheduled time to implement security changes without notably impacting operations. This is decided after understanding business busy/peak hours.</p>
<p></p>

<p></p><p><strong>Standard Operating Procedure(SOP): </strong>documented step-by-step procedures for implementing a change in order to promote consistency and efficiency in security operations.</p>
<p></p>

<p></p><p><strong>Technical Implications of Changes</strong></p>
<p></p>

<p></p><p><mark><strong>These are possible implications that changes to systems, software, or configurations may have on an business operations.</strong></mark></p>
<p></p>

<p></p><p><strong>Allow lists/deny lists:</strong> are list that dictate which applications are permitted or blocked from operating in your organization. When applying changes, review these lists to ensure that only the right applications are allowed, as they are ones that can be assessed.</p>
<p></p>

<p></p><p><strong>Restricted activities:</strong> only implement changes outlined within the change control document's scope. In instances where adjustments are necessary, a documented change control process should be in place to ensure clarity and avoid confusion among all stakeholders.</p>
<p></p>

<p></p><p><strong>Downtime:</strong> Applying changes might cause service disruptions which could lower productivity and perhaps cost the business financially. You can minimize downtime events by having secondary system in place to provide availability for the period of change implementation. You can also send out notices to those who may be impacted should there by a downtime.</p>
<p></p>

<p></p><p><strong>Service restart:</strong> some changes may require service restarts and have the potential to disrupt services, resulting in backlogs or data loss.</p>
<p></p>

<p></p><p><strong>Application restart</strong>: just like service restart, applications may also need to be restarted in response to changes thereby interfering with accessibility or performance</p>
<p></p>

<p></p><p><strong>Legacy applications:</strong> Legacy applications are older software still in use due to their critical importance to the organization, despite the availability of newer alternatives, yet they lack support and are less flexible, making them more sensitive to change, where even minor alterations can lead to system crashes.</p>
<p></p>

<p></p><p><strong>Dependencies:</strong> Before implementing changes, it is essential to map dependencies as interconnected systems create dependencies in which changes in a single domain impact others, requiring careful evaluation to ensure that all dependencies are addressed, avoiding disruptions or compatibility issues in systems or software.</p>
<p></p>

<p></p><p><strong>Documentation</strong></p>
<p></p>

<p></p><p>Change documentation is the practice of documenting any changes in any area of an organization's operations. It entails recording the reasons for the change, the precise adjustments made, the people or groups in charge of putting it into practice, and any related effects or considerations. <mark><strong>Let's go over the elements of proper documentation</strong></mark></p>
<p></p>

<p></p><p><strong>Updating diagrams:</strong> Regularly examining and modifying diagrams (network diagrams, system architecture diagrams, and process flowcharts) to accurately reflect the current state of systems, configurations, and interdependencies. This helps stakeholders in better decision-making, troubleshooting, and planning.</p>
<p></p>

<p></p><p><strong>Updating policies/procedures: </strong>Organizational policies, processes, and documentation standards should be constantly reviewed, updated, and documented to ensure that they meet changing business needs, standards and industry best practices.</p>
<p></p>

<p></p><p><strong>Version control</strong></p>
<p></p>

<p></p><p>Version control is a system for tracking and managing changes to files, documents, software code, and other digital assets. It enables multiple users to work together on projects by providing means for tracking changes, reverting to prior versions, and managing continuous edits. </p>
<p></p>

<p></p><p>It keep track of modifications, allowing users to determine who made what changes, when, and why. This improves teamwork by assuring consistency, reducing conflicts, and promoting collaboration in software development and other collaborative environments, which are foundational to the principles of DevOps.<br /><br /><strong>END!!!</strong></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p>"If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow."</p>
<cite><strong>Philip Crosby</strong></cite></blockquote>
<p></p>

<p></p><p><strong>Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>

]]></content:encoded></item><item><title><![CDATA[Fundamental Security Concepts]]></title><description><![CDATA[Ever kept an electronic journal to jot down your innermost thoughts and secrets? Let's connect this to the CIANA Pentagon:


C- Confidentiality- To maintain its privacy, you'll encrypt it and store it on a platform with strong access controls.


I-In...]]></description><link>https://cyvally.com/fundamental-security-concepts</link><guid isPermaLink="true">https://cyvally.com/fundamental-security-concepts</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Fri, 09 Feb 2024 12:07:31 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737304151519/c98cc051-7adc-4695-9ad0-f652d1e484d2.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[
<p></p><p><strong>Ever kept an electronic journal to jot down your innermost thoughts and secrets? Let's connect this to the CIANA Pentagon:</strong></p>
<p></p>

<p></p><p><strong>C- Confidentiality- To maintain its privacy, you'll encrypt it and store it on a platform with strong access controls.</strong></p>
<p></p>

<p></p><p><strong>I-Integrity- you can apply cryptographic hash functions to ensure that the content remains unchanged and unaltered.</strong></p>
<p></p>

<p></p><p><strong>A- Availability- you consider creating regular backups. having a soft copy stored in the cloud or another secure location.</strong></p>
<p></p>

<p></p><p><strong>N-Non-repudiation- you digitally sign each entry, so you cannot later refute it. The digital signature serves as a unique seal that verifies your authorship.</strong></p>
<p></p>

<p></p><p><strong>A-Authentication- To access the electronic diary, a strong authentication mechanism is in place where only you, with the right credentials, can unlock and modify the content</strong></p>
<p></p>


<p></p><p>In this post, we will explore several fundamental security concepts such as the CIA Triad, which later extended to CIANA Pentagon, the triple A's, and others.</p>
<p></p>

<p></p><p><strong>JUMP ON THIS RIDE!!!</strong></p>
<p></p>

<p></p><p><strong>CIA TRIAD</strong></p>
<p></p>

<p></p><p>The CIA Triad is fundamental to IT security. Everything we do in cybersecurity focuses on achieving CIA. Let's discuss the CIA in detail.</p>
<p></p>

<p></p><p><strong>Confidentiality:</strong> the principle that ensures information can be accessed by <strong>only</strong> those with authorization. Let's discuss some security measures to ensure confidentiality</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Encryption</strong>: It converts plain text into ciphertext, securing information from unauthorized access by rendering it unreadable to outsiders.</li>
</p>

<p><li><strong>Access control:</strong> it restricts access to confidential information, allowing only authorized individuals to view it. This can involve password restrictions, two-factor authentication, and role-based access control.</li>
</p></ul>
<p></p>

<p></p><p><strong>Integrity:</strong> the principle that ensures information is reliable and accurate and that modification cannot occur without detection. Let's discuss some security measures to ensure integrity</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Hashing:</strong> this is the process of converting data into a fixed-length string of characters that cannot be changed back to its original form. Integrity is ensured by verifying the received data's hash value against the hash value of the original data, allowing detection of any alterations or modification.</li>
</p>

<p><li><strong>Digital Signatures</strong>: are used to validate the authenticity of electronic documents and ensure they have not been altered. Cryptographic procedures are used to generate digital signatures, which can be used to validate the signer’s identity. </li>
</p>

<p><li><strong>Digital certificates</strong>: are electronic papers that are used to validate the identification of individuals, companies, or devices as well as to enable secure internet communication.</li>
</p></ul>
<p></p>

<p></p><p><strong>Availability:</strong> the principle that information is accessible to authorized users at all times. Let's discuss some security measures to ensure availability</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Redundancy: </strong>refers to the process of duplicating important components or systems to guarantee their availability in the event of a malfunction.</li>
</p>

<p><li><strong>Patching</strong>: is the process of updating software to fix vulnerabilities and ensure system stability by reducing the risk of exploitation and downtime.</li>
</p>

<p><li><strong>Backups:</strong> are copies of important information or system configurations that can be used to restore the original information or configurations in the event of a breakdown or loss. In the event of an interruption, they guarantee that critical data and systems can be quickly restored.</li>
</p></ul>
<p></p>

<p></p><p>TO READ UP ON MORE SECURITY MEASURES<kbd>- <a href="https://cyvally.com/2023/03/26/cybersec-base006-what-is-the-cia-triadconfidentiality-integrity-availability/"><strong>CIA TRIAD</strong></a></kbd></p>
<p></p>

<p></p><p><strong>Non-repudiation</strong></p>
<p></p>

<p></p><p>Before diving into what Non-repudiation is, ever heard of the CIANA pentagon?</p>
<p></p>

<p></p><p>CIANA pentagon is an extension of the CIA Triad, its stands for Confidentiality, Integrity, Availability, Non-Repudiation and Authentication. </p>
<p></p>

<p></p><p><strong>Non-repudiation</strong>: is a principle that proves that an event or action took place and cannot be denied by those involved. Non-repudiation is essential for authenticating by proving the source of the message, preserving integrity, and establishing accountability in digital processes. Digital signature is used to ensure Non-repudiation</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Scenario: </strong>A digital signature uses asymmetric cryptography, which consists of two keys: a public key and a private key. The sender(Gabriel) uses his private key to generate a unique digital signature for the communication. The recipient(Lola) verifies the signature using Gabriel's public key. The private key is only known to Gabriel and the public key is openly distributed so Lola can authenticate that the message was truly signed by Gabriel. Because the private key is necessary to generate the signature and only Gabriel has it, he cannot deny sending the message, ensuring non-repudiation.</li>
</p></ul>
<p></p>

<p></p><p><strong>AAA Framework/The Triple A's</strong></p>
<p></p>

<p></p><p>This framework begins with identification, which is who you assert to be, the most frequent example is your username.</p>
<p></p>

<p></p><p><strong>Authentication:</strong> A security measure that verifies users and entities are who they say they are. Password is an example</p>
<p></p>

<p></p><p><strong>Authorization:</strong> refers to the rights and privileges given to users or entities upon their authentication. Permissions and privileges are granted based on roles, policies, or attributes.</p>
<p></p>

<p></p><p><strong>Accounting:</strong> a security measure that guarantees accurate tracking and recording of every user action throughout  their operations</p>
<p></p>

<p></p><p><strong>Gap Analysis</strong></p>
<p></p>

<p></p><p>Gap analysis is a method used to evaluate the variance between an organization's current performance and its desired objectives. In simpler terms, it assesses the difference between our current security status and our desired security goals. Before beginning a gap analysis, it is important to have clear goals in mind. Standards like NIST or ISO/IEC 27001 help to set a baseline for achieving the intended results. A gap analysis is an effective technique for organizations looking to improve their security posture. The following are steps involved in conducting a gap analysis</p>
<p></p>

<p></p><ul><p></p>
<p><li>Define Goals and Objectives</li>
</p>

<p><li>Identify Current Security State</li>
</p>

<p><li>Compare the current state to the desired state to identify any gaps</li>
</p>

<p><li>Develop a detailed action plan to bridge the gap</li>
</p>

<p><li>Carry out the action plan by executing the suggested solutions.</li>
</p>

<p><li>Regularly track and assess progress to close the gaps.</li>
</p></ul>
<p></p>

<p></p><p><strong>Zero Trust</strong></p>
<p></p>

<p></p><p>The Zero Trust concept is "never trust, always verify." This means all devices, users, systems, or transactions in the company's network are not automatically trusted. Rather, it demands constant identification and security posture verification, irrespective of their location, origin, or point of network entrance. The control plane and Data plane are needed for a zero-trust architecture</p>
<p></p>

<p></p><p><strong>Control Plane:</strong> This is the framework and factors in charge of creating, overseeing, and implementing the policies governing user and system access in an organization. it manages the actions taking place in the data plane.  The key elements/technologies of the control plane are</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Adaptive identity:</strong> refers to verifying a user's identity and implementing security measures according to the authentication they have provided. An example of factors used is the user's device and location.</li>
</p>

<p><li><strong>Threat scope reduction:</strong> refers to limiting users' access to only what's needed to get their job done to strengthen the overall security against cyber threats by reducing the attack surface of the network and improving resilience against malicious acts.</li>
</p>

<p><li><strong>Policy-driven access control: </strong>involves creating, overseeing, and implementing user access policies per their roles and responsibilities. It is adaptive identity + established policies</li>
</p>

<p><li><strong>Policy Administrator:</strong> Communicate with policy enforcement point on whether to allow or deny access</li>
</p>

<p><li><strong>Policy Engine: </strong>compares the access request against its established policies.</li>
</p></ul>
<p></p>

<p></p><p><br /><strong>Data Plane:</strong> This component of network devices executes the actual security processes, such as packet forwarding and filtering. Examples include switches and routers.</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Implicit Trust Zones:</strong> These are network areas where trust is automatically assumed, based on predetermined security policies.</li>
</p>

<p><li><strong>Subject/System:</strong> These are anything that interact with the network, like users, devices, or applications.</li>
</p>

<p><li><strong>Policy Enforcement Point:</strong> This is the technology in charge of enforcing access controls and security policies. As data packets move over the network, it intercepts them, examines them based on predetermined policies, and decides whether to allow, deny or modify them. </li>
</p></ul>
<p></p>

<p></p><p><strong>Physical security</strong></p>
<p></p>

<p></p><p>Physical security refers to controls in place to secure physical assets, resources, and personnel from illegal access, theft, damage, or harm. Let us go over some examples of these controls</p>
<p></p>

<p></p><p><strong>Bollards: </strong>Short post or object for directing or preventing vehicle access.</p>
<p></p>

<p></p><p><strong>Access control vestibule:</strong> Electronically controlled double door system that only permits one door to open at a time</p>
<p></p>

<p></p><p><strong>Fencing:</strong> physical barriers that define limits and restrict entry to a particular area.</p>
<p></p>

<p></p><p><strong>Video surveillance: </strong>deploying recording devices and cameras to observe and record visual data in real-time.</p>
<p></p>

<p></p><p><strong>Security guard:</strong> Persons with the necessary training who are in charge of patrolling, keeping an eye on, and ensuring security in a specific area.</p>
<p></p>

<p></p><p><strong>Access badge:</strong> Personalized identity cards or badges provided to authorized persons to allow regulated access.</p>
<p></p>

<p></p><p><strong>Lighting:</strong> lighting to improve visibility and deter criminal activity.</p>
<p></p>

<p></p><p><strong>Sensors:</strong> devices that are capable of sensing and responding to environmental variations or external triggers, there are 4 categories of sensors</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Infrared: </strong>detect infrared radiation generated by objects, which allows them to detect temperature changes or movement(but in a smaller area). They are widely used in motion detectors. </li>
</p>

<p><li><strong>Pressure</strong>: detects force changes, it is activated whenever the sensor implanted in the floor or a mat detects a certain minimum weight.</li>
</p>

<p><li><strong>Microwave</strong>: emit microwave signals and analyze the reflections to detect motion in a larger area </li>
</p>

<p><li><strong>Ultrasonic</strong>: measures ultrasonic wave reflections to detect motion and collision, it is commonly used in parking areas and robotic application</li>
</p></ul>
<p></p>

<p></p><p><strong>Deception and disruption technology</strong></p>
<p></p>

<p></p><p>Cyber strategies such as deception and disruption are used to counter advanced threats. These strategies involve using deceptive components (SUCH AS THE ONES WE WILL BE DISCUSSING BELOW) to expose threat actors. Deception entails deploying decoy assets to entice attackers and makes it simpler to spot intrusions and regulate normal behavior.</p>
<p></p>

<p></p><p><strong>Honeypot: </strong>a server that is created to mimic a real server but contains fake data instead of actual data. it is used to entice attackers to reveal and analyze their strategies.</p>
<p></p>

<p></p><p><strong>Honeynet:</strong> it is a collection of honeypots</p>
<p></p>

<p></p><p><strong>Honeyfile:</strong> it is a file that is made to appear to be a genuine file on a server, but the information it contains is false. The data can be monitored for access and can contain triggers to notify DLP solutions, acting as a trap for intruders. A common example is a password.txt file that the bad guys will believe is real, opening this file will trigger an alert.</p>
<p></p>

<p></p><p><strong>Honeytoken:</strong> it is fake data added to Honeynet to detect and alert on unauthorized access</p>
<p></p>

<p></p><p><strong>END!!!</strong></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p>Many things in life can be safely ignored but ignoring Cybersecurity Safe Practices is an open invitation for disaster.</p>
<cite><strong>JC Hunter</strong></cite></blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>


</div>

]]></content:encoded></item><item><title><![CDATA[Security Controls]]></title><description><![CDATA[Action movie fans like myself will enjoy this: Marvel agents go on a quest to find a vital document locked within a safe in a building. The heroes were faced with series of difficulties, each emphasizing a different security control put in place by t...]]></description><link>https://cyvally.com/types-of-security-controls</link><guid isPermaLink="true">https://cyvally.com/types-of-security-controls</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sat, 27 Jan 2024 12:29:17 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737304353851/aeb839df-9e1c-4930-98be-c3287bfb1cd5.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[
<p></p><p><strong>Action movie fans like myself will enjoy this: Marvel agents go on a quest to find a vital document locked within a safe in a building. The heroes were faced with series of difficulties, each emphasizing a different security control put in place by the Villian. The first obstacle is manipulating an electronic gate(Technical Control) of the building with sophisticated hacking tools to gain access. Next are wild guard dogs(Physical Control) which the team used their firearms on. When the team gets to the safe's room, they find a tripwire, a security device managed with strategic precision. Contact with this wire will instantly sound an alert; this feature is managed by managerial control. Operational control is demonstrated by the last barrier of security, an identification mechanism at the impenetrable safe where fingerprint scans, retinal recognition, and voice authentication become the key to unlocking the safe</strong></p>
<p></p>

<p></p><p>In this post, you will learn about the different types of security controls</p>
<p></p>

<p></p><p><strong>WALK WITH ME!!!</strong></p>
<p></p>


<p></p><p><strong>WHAT ARE SECURITY CONTROLS</strong></p>
<p></p>

<p></p><p>I appreciate the NIST definition of security controls, which states, <em><strong>"A countermeasure prescribed for an information system or an organization, designed to protect</strong> <strong>the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements."</strong></em> This definition highlights that we not only need security controls to ensure the CIA of information but to also align security measures or countermeasures with specific objectives and standards set forth for information protection.</p>
<p></p>

<p></p><p><strong><mark>HAVEN'T HEARD ABOUT CIA TRIAD?</mark></strong><br /><strong><mark>CYVALLY GAT YOU <a href="https://cyvally.com/2023/03/26/cybersec-base006-what-is-the-cia-triadconfidentiality-integrity-availability/">WHAT IS CIA?</a></mark></strong></p>
<p></p>

<p></p><p><strong>CATEGORIES OF SECURITY CONTROLS</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Technical: </strong>refer to the use of technology for risk management and reduction</li>
</p></ul>
<p></p>

<p></p><p>Examples include antivirus software, intrusion detection systems, access controls, encryption, and firewalls.</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Managerial: </strong>Often referred to as administrative controls, concentrate on planning, policies, and procedures to manage security risk. </li>
</p></ul>
<p></p>

<p></p><p>Examples are incident response plans, security awareness training, risk assessments, and security policies.</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Operational:</strong> includes day to day procedures and actions that enhance security.</li>
</p></ul>
<p></p>

<p></p><p>Examples include incident reporting, change management, backup processes, and user authentication.</p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Physical:</strong> are measures that prevent unauthorized physical access to assets.</li>
</p></ul>
<p></p>

<p></p><p>Examples include locks, security cameras, biometric access controls, and environmental controls (such as fire suppression systems).</p>
<p></p>

<p></p><p><strong>TYPES OF SECURITY CONTROLS</strong></p>
<p></p>

<p></p><p><strong>Preventive:</strong> measures to stop security incidents before they happen. Examples are access controls, encryption, IPS  and firewalls.</p>
<p></p>

<p></p><p><strong>Deterrent:</strong> measures to discourage potential attackers making their effort less tempting to continue. Examples include noticeable surveillance cameras, security patrols, and warning signs.</p>
<p></p>

<p></p><p><strong>Detective:</strong> measures to identify and alert as security incident happens. Examples include log monitoring, security audits, and IDS.</p>
<p></p>

<p></p><p><strong>Corrective:</strong> measures to mitigate the impact of security incidents and return systems to normal operation. examples are recovery techniques, system backups, and incident response plans.</p>
<p></p>

<p></p><p><strong>Compensating:</strong> measures that offer substitute protections. Multi-factor authentication is an example.</p>
<p></p>

<p></p><p><strong>Directive:</strong> Guide behavior and actions to ensure compliance with security policies. Examples include awareness and training programs, safety policies and procedures.</p>
<p></p>

<p></p><p>To provide a multi-layered defense against a range of threats, it is frequently necessary to combine several control types and categories for better effectiveness.</p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p>“Technology trust is a good thing, but control is a better one.”</p>
<cite><strong>Stephane Nappo</strong></cite></blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>REVIEW QUESTIONS</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>

]]></content:encoded></item><item><title><![CDATA[DevOps Shell]]></title><description><![CDATA[Welcome to DevOps Shell!
I am super excited to introduce the "DevOps Shell" page, a dedicated space aimed at providing you with valuable insights and expertise in the dynamic world of DevOps. Whether you're a seasoned professional or a newbie eager t...]]></description><link>https://cyvally.com/devops-shell</link><guid isPermaLink="true">https://cyvally.com/devops-shell</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Fri, 19 Jan 2024 08:07:35 GMT</pubDate><content:encoded><![CDATA[<p><strong>Welcome to DevOps Shell!</strong></p>
<p>I am super excited to introduce the <strong>"DevOps Shell"</strong> page, a dedicated space aimed at providing you with valuable insights and expertise in the dynamic world of DevOps. Whether you're a seasoned professional or a newbie eager to delve into this space of tech, DevOps Shell has you covered.</p>
<p><img src="https://cyvally.wordpress.com/wp-content/uploads/2024/01/cyvally-2-1.png?w=333" alt class="image--center mx-auto" /></p>
<p>DevOps Shell is organized by topics, ensuring accessibility to resources tailored to your specific needs. From fundamental concepts to advanced techniques, you'll find a diverse range of articles and tutorials that cater to various skill levels. Expect articles ranging from introductory courses covering fundamental concepts to in-depth explorations of specialized topics. My goal is to provide you with the most recent information and skills required to survive in today's dynamic DevOps landscape.</p>
<p>I will be collaborating with industry experts who bring invaluable knowledge to deliver top-tier DevOps content, helping you navigate the awesomeness of automation, break down silos, and faster deployments of your applications.</p>
<p>In addition to informative articles, DevOps Shell will provide insights into industry-recognized certifications. As someone certified in DevOps Foundation (DOFD) by the DevOps Institute, I bring a wealth of knowledge and experience to the posts on this page. I believe in sharing not only theoretical concepts but also real-world applications of DevOps principles.</p>
<p>Whether you're a seasoned professional or a beginner in the world of DevOps, I invite you to explore the wealth of resources available on DevOps Shell. Thank you for visiting, and I look forward to helping you navigate and excel in the exciting field of DevOps.</p>
]]></content:encoded></item><item><title><![CDATA[Sec+ 008:penetration testing Techniques]]></title><description><![CDATA[When I ask cybersecurity newbies about their preferred domain, most responses tend to lean significantly toward the role of a Pentester or red teamer. Following that, I delve deeper by inquiring why they are interested in red teaming, and I've receiv...]]></description><link>https://cyvally.com/sec-008penetration-testing-techniques</link><guid isPermaLink="true">https://cyvally.com/sec-008penetration-testing-techniques</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Fri, 18 Aug 2023 10:04:51 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1739910710527/3a3da9f8-cbd4-409d-b933-2f596d9dcb6a.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>When I ask cybersecurity newbies about their preferred domain, most responses tend to lean significantly toward the role of a Pentester or red teamer. Following that, I delve deeper by inquiring why they are interested in red teaming, and I've received lots of beautiful responses. This objective is one of the most interesting in the CompTIA Security+ certification curriculum. I am confident that you, my esteemed readers, will not only find it interesting but will also anticipate its significance as you progress on your cybersecurity path. Allow me to conclude this motivational piece with the statement: "Just as red teamers conduct proactive attacks to identify weaknesses, the blue teamers create better defensive mechanisms, and the GRC team intervenes to ensure that the remediation mechanism aligns with relevant compliance requirements." The orchestrated dance between these specialist teams ensures that our digital landscapes stay protected and resilient.</strong></p>
<p>We learned about automated vulnerability scanning in our last post, but it does not assess what a highly proficient threat actor would be capable of. Penetration testing is an assessment that uses strategies and procedures to simulate intruders. Understanding the underlying notion of pentesting is critical regardless of the team you belong.</p>
<p>In this post, you will learn about different penetration testing concepts, the passive and active ways of performing reconnaissance and exercise types  </p>
<p><strong>STAY TUNED!!!</strong></p>
<h2 id="heading-penetration-testing-concepts"><strong>Penetration Testing Concepts</strong></h2>
<p>A penetration test simulates an attack on a system in order to evaluate security. A pentest includes procedures such as threat verification, security control bypass, active control testing, and vulnerability exploitation. It is frequently referred to as ethical hacking. Pentesters acquire initial access, then try to expand it. There are other test variations, including blind tests (where the attacker is unaware of the system) and double-blind testing (where the staff is unaware of the test). The following are different penetration testing concepts:</p>
<p><strong>Known Environment:</strong> An assessment where the pentester has a full disclosure and total access to the target. It is also known as a White box.</p>
<p><strong>Unknown Environment:</strong> An assessment where the pentester has no information regarding the target. it is also called black box. Pentest is performed from an external viewpoint without having any knowledge of the internal operations.</p>
<p><strong>Partially Known Environment</strong>: An assessment that replicates an insider attacker who is only partially familiar with the target. it is also called Gray box</p>
<p><strong>Rules of Engagement:</strong> These are rules and guidelines set for the penetration test's scope and purpose. They specify the pentester's rights and obligations, making it easier to make sure the test is carried out securely and within the legal limits.</p>
<p><strong>Lateral movement:</strong> This means moving from system to system after acquiring initial access in order to investigate and exploit other systems. It helps to determine how far an attacker might go in a compromised environment.</p>
<p><strong>Privilege escalation:</strong> It is the process of getting additional account privileges. Pentesters put the system's defenses to the test by attempting to elevate privileges above what an initial intrusion would allow.</p>
<p><strong>Persistence:</strong> This is the ability to continue to exist after a system restart or a network disconnect. This indicates that the attacker can and will return to the network, using good techniques and several accounts so that their reentry will not be noticeable.</p>
<p><strong>Cleanup:</strong> For a threat actor, this entails getting rid of any trace of the attack, or any evidence that might link them to it. For the pentester, this stage calls for the removal of any backdoors or tools and verification that the system is not any less secure than it was before the engagement.</p>
<p><strong>Bug bounty:</strong> Several organizations have bug bounty programs where they compensate/reward people who responsibly report security flaws. This could be a tactic used during pentesting to entice ethical hackers to discover and report vulnerabilities.</p>
<p><strong>Pivot:</strong> It entails using a hacked system as a launching pad to attack other systems on a network.</p>
<h2 id="heading-passive-and-active-reconnaissance"><strong>Passive and Active Reconnaissance</strong></h2>
<p>Reconnaissance is gathering information about the target, it can be passive or active.<br />Passive reconnaissance entails gathering data without directly interacting with the target system, so avoiding discovery or trigging an alert. Active entails directly interacting with the target system or network to acquire information and find vulnerabilities. such as performing a port check to identify any open ports or gaining physical access to premises. The following are different ways of gathering information:</p>
<p><strong>Drones:</strong> A flying machine without a human pilot inside.</p>
<p><strong>War flying:</strong> Drones can be used by pen testers for "war flying," which is a technique for approaching and capturing wireless network signals, allowing them to record network traffic.</p>
<p><strong>War driving:</strong> This entails driving around with devices capable of detecting and recording wireless networks.</p>
<p><strong>Footprinting:</strong> This is the first step in gathering live information about a network. This method is used by pen testers to gather information about computer systems, the relationships between them, and occasionally user data. Specifically, network sniffing and scanning technologies are used to achieve this.</p>
<p><strong>OSINT:</strong> it is the use of publicly available information sources to obtain knowledge about a system.</p>
<h2 id="heading-exercise-types"><strong>Exercise Types</strong></h2>
<p><strong>Red-team:</strong> They are the attacking/offensive team that attempts to enter the target by playing the attacking role.</p>
<p><strong>Blue-team:</strong> They are the defensive team that operates by monitoring and alerting controls to detect and stop the infiltration.</p>
<p><strong>White-team:</strong> They are the panel of judges that does not belong to any team. They determine scores and rules in an exercise.</p>
<p><strong>Purple-team:</strong> it is the combination of the red team and blue team player. Red team member assist your blue team in understanding the moves from the attacker's point of view.</p>
<blockquote>
<p>Pentesting is not a technique, it's a skill. A technique is obtained through knowledge, A skill is obtained through practice.</p>
<p><cite>Rafay Baloch</cite></p>
</blockquote>
<p><strong>Review Questions</strong></p>
]]></content:encoded></item><item><title><![CDATA[Sec+ 004: Network Attacks Indicators]]></title><description><![CDATA[My mum once told me that in the olden days, it was a common practice for people to communicate with their potential spouses through intermediaries (called "Alarina" in the Yoruba Language) before getting married.The role of the Alarina, or intermedia...]]></description><link>https://cyvally.com/trashed-4</link><guid isPermaLink="true">https://cyvally.com/trashed-4</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Thu, 17 Aug 2023 22:01:13 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1739911810079/33c8cd8d-efad-4ee9-a8c0-b945cf22b290.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My mum once told me that in the olden days, it was a common practice for people to communicate with their potential spouses through intermediaries (called "<strong>Alarina</strong>" in the Yoruba Language) before getting married.<br />The role of the Alarina, or intermediary, was not to prevent the man from approaching the lady directly, but rather to provide consultation and deeper understanding. The man would contact a trusted friend who would eventually become the Alarina, not out of shyness or fear, but to gain insights into the lady and her family. The Alarina, who knew the lady and her family well, acted as an intermediary between the two families, fostering communication and understanding in the marriage process.<br /><strong>My question is, were people not scared that the Alarina could manipulate the information to create misunderstandings and misinterpretations, thereby disrupting the relationship?</strong></p>
<p>The story of "Alarina" as a middleman between potential spouses raises concerns about the possibility of manipulation and disruptions in the communication process. Now, let's take this to the digital world, <strong>EVER HEARD OF THE MAN-IN-THE-MIDDLE ATTACK?</strong> it is an attack that involves interception and manipulation of communication between two entities. leading to unauthorized actions. Although both scenarios involve intermediaries who have the power to influence the flow of information, raising concerns about the trustworthiness and integrity of the communication process, Alarina's role is based on trust and consultation, a man-in-the-middle attack is an act of <strong>deception and malicious intent.</strong></p>
<p>In this post, you will learn about the indicators of network attacks. These indicators provide details about the nature of the attack, what is happening, and the required countermeasures.</p>
<p><strong>Stay plugged!!!</strong></p>
<h2 id="heading-41-wireless-attack-types"><strong>4.1</strong> <strong>Wireless Attack Types</strong></h2>
<p>Wireless networking technology is widely utilized, with several protocols and techniques available to connect users to networks without the use of physical wires. Wireless networking, like any other software system, is vulnerable to hacker efforts. Let's look at the types of wireless attacks:</p>
<p><strong>Evil twin</strong></p>
<ul>
<li><p>An evil twin involves a rogue WAP masquerading as a legitimate one</p>
</li>
<li><p>It may share the same name (SSID) as the real one</p>
</li>
<li><p>This attack involves an attacker using their own AP that looks like a stronger connection.</p>
</li>
<li><p>The attacker has the ability to intercept network traffic from users who connect to the malicious access point, potentially gaining access to private data.</p>
</li>
</ul>
<p><strong>Rogue access point</strong></p>
<ul>
<li><p>This is an unauthorized access point that is installed with malicious intent or not.</p>
</li>
<li><p>Attackers can set up rogue access points to create backdoor, eavesdrop on network traffic, launch man-in-the-middle attacks, or gain unauthorized access to the network.</p>
</li>
<li><p>Ensure that you periodically survey the site to detect rogue WAPs</p>
</li>
<li><p>Use 802.1X (Network Access Control) to mandate authentication for all connections</p>
</li>
</ul>
<p><strong>Bluesnarfing</strong></p>
<ul>
<li>An attack where an attacker uses a Bluetooth connection to obtain <strong>unauthorized access</strong> to data on a target device</li>
</ul>
<p><strong>Bluejacking</strong></p>
<ul>
<li>It involves <strong>sending</strong> unsolicited(SPAM) text (or picture/video) message or vCard (contact details) to Bluetooth-enabled devices.</li>
</ul>
<p><strong>Disassociation Attack</strong></p>
<ul>
<li><p>Disassociation attacks are attempts to disconnect a host from the wireless access point and the wireless network.</p>
</li>
<li><p>A disassociation attack sends spoofed frames by taking advantage of the lack of encryption in management frame communication.</p>
</li>
<li><p>Attackers can prevent genuine users from connecting to the network by delivering fake disassociation signals, which results in denial-of-service (DoS) problems.</p>
</li>
<li><p>It can be mitigated by configuring Management Frame Protection (MFP/802.11w) , both on clients and WAP</p>
</li>
</ul>
<p><strong>Jamming</strong></p>
<ul>
<li><p>An attack in which radio waves interferes with 802.11 wireless signals.</p>
</li>
<li><p>it can result from installing a WAP with a stronger signal</p>
</li>
<li><p>To detect the source of interference, use a spectrum analyzer</p>
</li>
<li><p>To mitigate, locate and disable the malicious radio source or boost the signal on the legitimate source.</p>
</li>
</ul>
<p><strong>Radio frequency identification (RFID)</strong> <strong>Attack</strong></p>
<ul>
<li><p>RFID is used on anything that requires tracking; such as access badges</p>
</li>
<li><p>Attackers might take advantage of flaws in RFID technology to intercept or alter information being sent between RFID tags and readers, thereby obtaining access or tampering with the data.</p>
</li>
<li><p>Skimming(unauthorized capture of information from RFID tags) is a good example of RFID Attack.</p>
</li>
</ul>
<p><strong>Near-field communication (NFC)</strong></p>
<ul>
<li><p>NFC is a 2-way (peer to peer) radio communications system that enables contactless payments across very short distances.</p>
</li>
<li><p>it is a high-frequency subset of RFID</p>
</li>
<li><p>NFC is mainly used for contactless point-of-sale transactions. Customers enter their credit card details into a mobile wallet app to set up a payment service. Instead of transmitting the actual credit card data, the app sends a one-time token that the merchant links to the correct client account.</p>
</li>
<li><p>Attackers can perform Remote capture, frequency jamming that will lead to a DoS attack</p>
</li>
</ul>
<p><strong>Initialization vector (IV)</strong></p>
<ul>
<li><p>IV is a random value used in cryptographic algorithms, particularly in wireless encryption protocols like WEP (Wired Equivalent Privacy)</p>
</li>
<li><p>IV is a type of nonce (generated once) and used at the beginning of a connection. its primary aim is to prevent replay attack</p>
</li>
<li><p>IV-related attacks take advantage of weaknesses in the creation or maintenance of the IV, giving attackers access to wireless networks and the ability to decrypt encrypted data.</p>
</li>
</ul>
<h2 id="heading-42-on-path-attackman-in-the-middle-attackman-in-the-browser-attack"><strong>4.2 On-path attack/Man-in-the-Middle attack/Man-in-the-Browser Attack</strong></h2>
<ul>
<li><p>This is a type of eavesdropping where an attacker establishes a separate link between two victims and steals information</p>
</li>
<li><p>The threat actor positions themselves between two hosts and intercepts, watches and broadcasts all of their communication</p>
</li>
<li><p>In Man-in-the-Browser attack, a malware attack installs a trojan element on the target machine. This trojan can act as a proxy and modifies the browser's behavior by utilizing browser helper objects or extensions.</p>
</li>
<li><p>On-path attacks can be defeated using mutual authentication, where both hosts exchange secure credentials.</p>
</li>
</ul>
<h2 id="heading-43-layer-2-attacks"><strong>4.3 Layer 2 attacks</strong></h2>
<p>Local addressing decisions are made at Layer 2 of a network. Switches and MAC address operate at this layer. Here are types of Layer 2 attacks</p>
<p><strong>Address Resolution Protocol (ARP) poisoning</strong></p>
<ul>
<li><p>ARP matches IP addresses to MAC addresses on a local network</p>
</li>
<li><p>An attacker uses ARP poisoning to deliver fake ARP packets to a target computer, forcing it to link wrong MAC addresses with specific IP addresses</p>
</li>
<li><p>All traffic destined for remote networks will be sent to the attacker</p>
</li>
<li><p>The attacker can use a man-in-the-middle attack by monitoring the communications and then sending them to the router, or by changing the packets before transferring them or DOS attack by not forwarding the packets.</p>
</li>
</ul>
<p><strong>Media access control (MAC) flooding</strong></p>
<ul>
<li><p>This is an attack on the switch</p>
</li>
<li><p>The MAC address table is used by the switch to decide which port to utilize to forward unicast traffic to the correct destination.</p>
</li>
<li><p>It involves an attacker exhausting the switch's memory capacity by flooding it with a high number of false MAC addresses.</p>
</li>
<li><p>Overwhelming the table result to the switch to abandon MAC-based forwarding and flood unicast traffic out of all ports, effectively acting as a hub. This leads to the attacker eavesdropping on network traffic</p>
</li>
</ul>
<p><strong>MAC cloning/MAC address spoofing</strong></p>
<ul>
<li><p>This involves an attacker forging the network interface card's (NIC) factory-assigned MAC address in order to impersonate another device on a network.</p>
</li>
<li><p>The manufacturer assigns a unique MAC address to each network interface. An attacker can trick network switches and routers into associating their own device with the cloned MAC address by cloning the MAC address of another device.</p>
</li>
<li><p>It can be used to bypass MAC address filtering</p>
</li>
</ul>
<h2 id="heading-44-domain-name-system-dns-attack-types"><strong>4.4 Domain name system (DNS) Attack Types</strong></h2>
<p>The Domain Name System (DNS) of port 53, resolves Fully Qualified Domain Name (FQDNs) to IP addresses. It makes use of a distributed database system to store information about domains and hosts within those domains. </p>
<p><strong>Domain hijacking/Brandjacking</strong></p>
<ul>
<li><p>This is the unauthorized takeover of a domain name by compromising the domain registrar or DNS (Domain Name System) credentials.</p>
</li>
<li><p>The attacker gets control of the domain name and can modify its DNS records, routing traffic intended for the genuine domain to a different website</p>
</li>
<li><p>The whois command can be used to check up domain registration information in order to detect misuse.</p>
</li>
</ul>
<p><strong>DNS poisoning</strong></p>
<ul>
<li><p>Also called DNS cache poisoning or DNS spoofing</p>
</li>
<li><p>It corrupts the DNS cache by inserting fake DNS information into it, forwarding a domain name to an IP address of the attacker's choice and redirecting visitors to malicious websites.</p>
</li>
<li><p>it can also be achieved via Man in the middle attack.</p>
</li>
</ul>
<p><strong>Uniform Resource Locator (URL) redirection</strong></p>
<ul>
<li><p>A uniform resource locator (URL) is an address for website pages and files.</p>
</li>
<li><p>URL redirection is the use of HTTP redirecting to open a page other than the one requested by the user.</p>
</li>
<li><p>Malicious actors might utilize the URL redirection mechanism to redirect users to phishing websites.</p>
</li>
<li><p>Types of URL redirection is Typosquatting/brandjacking</p>
</li>
</ul>
<p><strong>Domain reputation</strong></p>
<ul>
<li><p>This is the assessment of a domain's integrity and reputation</p>
</li>
<li><p>If your domain, website, or email servers have been compromised, they are likely to be exploited for malware distribution. Monitor your site via <a target="_blank" href="http://talosintelligence.com/reputation_center">talosintelligence.com/reputation_center</a> to detect misuse early.</p>
</li>
</ul>
<p><strong>DNS Security</strong></p>
<ul>
<li><p>Local DNS servers should only allow recursive requests from authenticated local hosts and not from the Internet on a private network.</p>
</li>
<li><p>Establish access control techniques on the server to prevent a malicious user from manually modifying records.</p>
</li>
<li><p>Clients should also be limited to using authorized resolvers for name resolution.</p>
</li>
<li><p>Implement DNS Security Extensions (DNSSEC) to provide a validation mechanism for DNS answers, which helps to mitigate spoofing and poisoning attacks.</p>
</li>
<li><p>To prevent Footprinting, Implement Access Control List to block zone transfers to unapproved hosts or domains, preventing an external server from learning about the private network architecture.</p>
</li>
</ul>
<p><strong>NOTE:</strong> DNS footprinting is the process of acquiring information about a private network by utilizing its DNS server to make a zone transfer (all the records in a domain) to a rogue DNS server or by querying the DNS service with a tool like nslookup or dig.</p>
<h2 id="heading-45-distributed-denial-of-service-ddos"><strong>4.5 Distributed denial-of-service (DDoS)</strong></h2>
<p>DOS attacks impair resource availability, whereas DDOS attacks flood a service with traffic from several infected hosts. DDOS attack can be mitigated by high availability services and stateful firewalls. ACLs, blackholes or sinkhole can also be used to mitigate against a DDoS attacks with blackholes being preferred to preserve processing resources. Although Legitimate traffic is dropped with DDoS packets in if sinkhole or blackhole is implemented.</p>
<p><strong>Sinkhole refers to the process of transferring flooding traffic to a different network for investigation allowing the source to be identified and filtering rules to be applied.</strong></p>
<p><strong>While A blackhole is a network segment that is inaccessible to the rest of the network. The blackhole method is preferable since it reduces the impact of the attack on the ISP's other customers.</strong></p>
<ul>
<li><strong>Network:</strong> DoS attack in which the attacker makes multiple SYN requests to a target server in the hope of using enough resources to prevent legitimate traffic from being sent.</li>
</ul>
<ul>
<li><strong>Application:</strong> DoS attack that targets vulnerabilities in the headers and payloads of application protocols  or resource-intensive activities within web applications or servers.</li>
</ul>
<ul>
<li><strong>Operational technology (OT)</strong>: OT network is established between embedded systems devices and their controllers. DDoS attacks against vital infrastructure, such as industrial control systems (ICS), Supervisory Control and Data Acquisition(SCADA)systems</li>
</ul>
<h2 id="heading-46-malicious-code-or-script-execution"><strong>4.6 Malicious code or script execution</strong></h2>
<p>Scripting promote speed, accuracy, reproducibility, and portability, it can be used for good intent as well as for bad intent. The following are different programming languages or scripting environments:</p>
<p><strong>PowerShell:</strong> is a command-line interface and scripting language based on <a target="_blank" href="http://the.NET">the.NET</a> Framework. It is a primary way for executing Windows administrative tasks.</p>
<p><strong>Python:</strong> it is a high-level programming language popular for automation. It can be used for data theft, network scanning, or the creation of botnets.</p>
<p><strong>Bash:</strong> It is a Unix-like command shell and scripting language. It can be used to perform privilege escalation, data exfiltration, or creating backdoors.</p>
<p><strong>Macros</strong>: are short pieces of code that are inserted within documents, such as Microsoft Office files, to automate repetitive activities.</p>
<p><strong>Visual Basic for Applications (VBA):</strong>Programming languages used in Office document automation to construct macros and <a target="_blank" href="http://scripting.Microsoft">scripting.Microsoft</a> Office use the Visual Basic for Applications (VBA) programming language, whereas PDF documents employ JavaScript. ALT+F11 can be used to inspect Microsoft Office document macros.</p>
<blockquote>
<p><strong><em>“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”</em></strong> </p>
<p><strong><cite>Stephane Nappo</cite></strong></p>
</blockquote>
]]></content:encoded></item><item><title><![CDATA[Sec+ 007: Security Assessments Techniques]]></title><description><![CDATA[Hello Cyvally Readers, Let's add some excitement to our day, shall we? Today's post is tailored around vulnerability assessment, and I will introduce you to some hands-on practicals/labs. Links to these labs will be provided after the review question...]]></description><link>https://cyvally.com/trashed-2</link><guid isPermaLink="true">https://cyvally.com/trashed-2</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Thu, 17 Aug 2023 21:58:29 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1739913790919/29b374ee-02f0-411d-b02d-29d1580684ae.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Hello Cyvally Readers, Let's add some excitement to our day, shall we? Today's post is tailored around vulnerability assessment, and I will introduce you to some hands-on practicals/labs. Links to these labs will be provided after the review questions in this post.</strong></p>
<p><strong>I understand that many of my readers are entry-level professionals and might find the labs a bit challenging. However, if you encounter any difficulties, don't hesitate to reach out to me in the comments section of this post or through my social media direct messages. I'll be more than happy to guide you. I strongly encourage you to complete all the content on the</strong> <a target="_blank" href="https://cyvally.com/category/cybersec-base/"><strong>CyberSecBase page</strong></a> <strong>and review the previous posts on the</strong> <a target="_blank" href="https://cyvally.com/category/sec/"><strong>Sec+ page</strong></a><strong>. This will help you to better understand the vulnerability assessment scope and get the idea around the labs. Yes,</strong> <strong>this may be challenging, but trust me, it will be fun too. You won't just gain theoretical knowledge about vulnerability assessment, but also practical skills. I believe this will renew your passion for cybersecurity. I will love to know how engaging you find these practicals, so please remember to share your comments. Your feedback will help decide to add more hands-on activities in the future or not.</strong> <strong>THANK YOU</strong></p>
<p>To assess anything, you should compare it to a standard to determine how well it aligns. This standard is your organization's security policy, and should comply with external regulations. Threat hunting, penetration testing, and vulnerability assessment are three important security assessments. Threat hunting identifies hidden risks, penetration testing simulates actual attacks and scanners are used in vulnerability assessments to compare system configurations to the baseline.</p>
<p><strong>In this post, you will learn about threat hunting, vulnerability scanning, and syslog/SIEM/SOAR technologies.</strong></p>
<h2 id="heading-basic-terms"><strong>Basic Terms</strong></h2>
<p><strong>IOCs (Indicators of Compromise</strong>): these are pieces of evidence that point to a network or system that has been infected or compromised by a threat actor. IP addresses, domain names, file hashes, URLs, registry keys, and suspicious activity patterns are a few examples.</p>
<p><strong>TTP (Tactics, Techniques, and Procedures):</strong> are methods, strategies, and actions used by threat actors to achieve their objectives during a cyber attack.</p>
<h2 id="heading-threat-hunting"><strong>Threat hunting</strong></h2>
<p>Threat hunting is an assessment that looks for TTPs in a system or network using information from threat intelligence. It entails looking for cyberthreats that avoid being noticed by the organization's defenses. Using tools like Threat Intelligence and IOCs, threat hunters may determine the actions an attacker must take and the traces they leave behind. The following techniques are used in threat hunting:</p>
<p><strong>Intelligence Fusion:</strong> Threat hunting uses a threat's capabilities, motives, and resources as the foundation for understanding threats in the environment. Through security information and event management (SIEM) and threat analytics platforms, the intelligence fusion approach updates analytics platforms with TTP and IoC threat data feeds.</p>
<p><strong>Threat Feeds:</strong> Threat feeds are information about adversaries collected from both internal and external sources. Threat details gathered internally, such as findings from incident responses, help in recognizing threats within your environment. Tools like Structured Threat Information eXpression (STIX) are used in the transfer of information from external sources.</p>
<p><strong>Advisories and Bulletins:</strong> Threat hunting requires clear objectives and sufficient resources, often driven by hypotheses about potential threats. Security advisories that identify new TTPs or vulnerabilities are a good place to start when looking for threats. external threat feeds come from respected sources such as security vendors and industry associations.</p>
<p><strong>Maneuver:</strong> This involves defenders and threat actors employing deceptive and counterattacking tactics to gain an advantage. It represents a sophisticated adversary's method to network navigation. Threat hunting strengthens defenses against lateral movement by countering attacker lateral movement through network infrastructure monitoring and analysis.</p>
<h2 id="heading-vulnerability-scans"><strong>Vulnerability Scans</strong></h2>
<p>Vulnerability scanning is the process of examining services on systems for known vulnerabilities in software using signatures and scripts. Scanners, such as Tenable Nessus or OpenVAS, check network hosts for vulnerabilities and compare results to templates and lists of vulnerabilities. These scanners group vulnerabilities, give impact alerts, and offer remedies. The following concept contribute to accuracy, thoroughness, and effectiveness of a vulnerability scan:</p>
<p>False positives: A false positive is something that a scanner incorrectly identifies as a vulnerability. It takes time and effort to investigate the problem and ignoring the scans entirely may result in more serious issues.</p>
<p>False negatives: These are potential vulnerabilities that go undetected by a scan. it can be reduced by regularly performing additional scans and by employing scanners from many vendors.</p>
<p>Log reviews: The validation procedure for vulnerability reports can be improved by reviewing relevant system and network logs. Log reviews might reveal security events, policy violations, and other unusual circumstances that call for additional investigation.</p>
<p>Credentialed vs. non-credentialed: There are two methods for vulnerability scan with credentials and without credentials. Non-credentialed scans provide an outsider's perspective assessment of services for possible vulnerabilities, but they lack in-depth information. Credentialed scans, on the other hand, demand login information and offer more thorough, accurate risk information. They entail extra steps and expose configuration errors, providing details on potential insider attacks.</p>
<ul>
<li><p>Intrusive vs. non-intrusive:There are two types of vulnerability scans: intrusive and non-intrusive. Non-intrusive scans, which only partially comprehensively identify vulnerabilities, analyze intercepted network traffic or passive reconnaissance methods without direct engagement. Although passive scanning, like the Zeek Network Security Monitor, has no effect on the network, it might not catch every vulnerability. On the other side, intrusive scans are active and actively explore target devices, increasing the likelihood of system breakdowns. Intrusive scans try to take advantage of vulnerabilities to show that they exist, which could result in disruptions.</p>
</li>
<li><p>Application: applications that process data and act as user interfaces are frequently targeted by attackers. A vulnerability scan measures an application's resistance to attacks.</p>
</li>
<li><p>Web application: web applications provide convenience but also increase the risk of unauthorized access. Vulnerability scans assesses the security of web applications .vulnerability of web app is mostly due to improper input validation</p>
</li>
<li><p>Network: Users and computing systems are connected through the network, which facilitates data exchange. The network is used by vulnerability scanners to access connected systems. To map and enumerate systems, scans typically cover the whole network.</p>
</li>
<li><p>Common Vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS): Known software vulnerabilities are included in the CVE, which includes each vulnerability's ID, description, and reference. Vulnerability scanners that identify software versions and related vulnerabilities are built on this foundation. Using a scale from 0 to 10, the Common Vulnerability Scoring System (CVSS) evaluates the severity of vulnerability risk. In addition to other factors, CVSS takes into account exploit complexity, user engagement, and permission requirements. The combination of CVE and CVSS offers insightful information about possible risks related to certain software systems.</p>
</li>
</ul>
<ul>
<li>Configuration review:  incorrect configurations make systems more vulnerable and may even bypass security controls. Verifying configurations is important for vulnerability assessments, It is advised to perform routine automatic configuration reviews. Resources for measuring and validating configurations are provided by protocols and standards like the  Common Configuration Enumeration (CCE) and Common Platform Enumeration (CPE) guides, part of NIST's National Vulnerability Database (NVD)</li>
</ul>
<h2 id="heading-syslogsecurity-information-and-event-management-siem">Syslog/Security information and event management (SIEM)</h2>
<p>security controls generate log data and alerts, posing a risk. SIEM technologies aggregate data from various sources and analyze real-time security alerts from network hardware and applications. A protocol for Linux systems called Syslog aggregates logs and delivers them to a server, improving security by segregating problem reports from other logs. Through aggregation, enrichment, and pattern matching for incident response, SIEM transforms raw syslog data into insights that can be used for incident response. The following are concepts that are essential</p>
<ul>
<li><p>Review reports: An alert or a report are the two main output formats from a SIEM. These are predetermined conditions that, in accordance with the system's rules, cause a certain information output. Then, these reports can be examined to establish whether an incident actually occurred or if it was a false alarm.</p>
</li>
<li><p>Packet capture:Network sensors and NetFlow sources collect information that allows for comprehensive frame inspection and compiled statistics on bandwidth and protocol utilization. Continuous packet captures have been a popular security technology that let experts successfully monitor different network segments. you can replay traffic, assisting investigations. While advantageous, this strategy necessitates large storage and requires careful placement and length consideration for optimal use..</p>
</li>
<li><p>Data inputs:SIEM systems collect a variety of data inputs from multiple systems. Despite the fact that contemporary networks produce a large amount of log data, SIEM focuses on locating critical information to support particular decisions. Collecting everything costs money and results in pointless reports. Instead, specifying desired outputs and tracking the required inputs from firewalls, network appliances, and important servers are what make SIEM effective. Unused data sources are eliminated as SIEM develops, and more sources are incorporated. The SIEM is fine-tuned by security specialists to meet issues and risks unique to a given environment.</p>
</li>
<li><p>User behavior analysis: By contrasting them with a baseline, a User and Entity Behavior Analytics (UEBA) solution can spot undesirable behaviors. This software monitors user account activity across platforms and cloud services, including embedded hardware, machine accounts, and other services. Due to the baseline complexity and minimization of false positives, UEBA mainly relies on AI and machine learning. SIEMs apply rules to data to identify certain patterns, typically for server and network events. Modern SIEMs keep an eye out for irregularities by using user behavioral analysis breakthroughs. For instance, analysis is triggered by changes in known user patterns. Microsoft's Advanced Threat Analytics is one example.</p>
</li>
<li><p>Sentiment analysis:It is a challenging undertaking to create an AI/ML algorithm that can describe or classify intentions expressed in natural language sentences. Recognizing intent presents a significant difficulty for behavior analytics powered by machine learning. Though advancements are being made in this field, which is frequently referred to as sentiment analysis or emotion AI, the complexity derives from a machine's difficulty in understanding context and meaning in natural language. Sentiment analysis is frequently used to track brand-related events on social media, such as identifying dissatisfied customers. Sentiment analysis assists in gathering threat intelligence in security situations to anticipate and identify potential internal or external threats before they develop into attacks. This method looks for patterns in data that reflect human emotions, viewpoints, or attitudes.</p>
</li>
<li><p>Security monitoring: Data is gathered and analyzed as part of security monitoring in order to spot illegal changes or suspicious activity in connected systems and networks. Setting up alert triggers based on predetermined behaviors is required for this. SIEM devices first focused on data collection before moving on to event data management. Security orchestration, automation, and response (SOAR) systems, which completely automate security procedures, are used in the current stage. Without automated solutions like SIEM and SOAR, security monitoring would be impossible given the complexity of modern IT systems, businesses, attacks, and behavioral patterns.</p>
</li>
<li><p>Log aggregation:The technique of integrating logs from several systems allows for the peaceful coexistence of various forms. This generates a more complete picture of the system's state than could be obtained from a single data source. Key fields are parsed, altered, and extracted throughout this aggregation process, which is frequently governed by rules or lookups. The goal is to transform various data sources into a format that can be searched and used for particular purposes. This standardized approach encourages reliability and searchability. Using regular expressions for parsing and mapping data to standard fields, SIEM software with connectors interprets and accounts for data from diverse systems. Log aggregation also synchronizes time zones for a single timeline.</p>
</li>
<li><p>Log collectors: a network appliance that acquires log and/or status information from other network systems. The purpose of log collectors is to collect data from various independent sources and input it into a single source, such as a SIEM. The formats of different sources may vary, but log collectors can synchronize these many field elements into a comprehensive data stream.</p>
</li>
</ul>
<h2 id="heading-security-orchestration-automation-and-response-soar">Security orchestration, automation, and response (SOAR)</h2>
<p>The goal of security orchestration, automation, and response (SOAR) is to address the issue of the volume of warnings outpacing the capacity of analysts to respond. A SOAR can be used as a stand-alone technology or combined with a SIEM, also known as a next-generation SIEM. In order to automate and offer data enrichment for the workflows that support incident response and threat hunting, SOAR first scans the organization's repository of security and threat information, analyzes it using machine learning and deep learning techniques, and then uses that data. Integrated platforms throughout the enterprise's SOAR systems gather data and alerts, bringing them together in one area where automated reactions may subsequently address threats and weaknesses.</p>
<blockquote>
<p><strong>Security is always excessive until it’s not enough.</strong></p>
<p><em><cite>Robbie Sinclair</cite></em></p>
</blockquote>
<p>Review Questions</p>
<p>Links to the Labs</p>
<ol>
<li><p><a target="_blank" href="https://elearning.securityblue.team/home/courses/free-courses/introduction-to-vulnerability-management#description"><strong>Vulnerability Management</strong></a></p>
</li>
<li><p><a target="_blank" href="https://tryhackme.com/room/rpnessusredux"><strong>Nessus Tool</strong></a></p>
</li>
<li><p><a target="_blank" href="https://tryhackme.com/room/openvas"><strong>OpenVAS Tool</strong></a></p>
</li>
</ol>
]]></content:encoded></item><item><title><![CDATA[Sec+ 006:Security concerns with various types of vulnerabilities.]]></title><description><![CDATA[We hear about companies falling victim to cyberattacks, resulting in severe damage to their reputation. As customers, we are influenced by such incidents and may choose to discontinue using their services. However, this issue extends beyond the realm...]]></description><link>https://cyvally.com/sec-006security-concerns-with-various-types-of-vulnerabilities</link><guid isPermaLink="true">https://cyvally.com/sec-006security-concerns-with-various-types-of-vulnerabilities</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Thu, 03 Aug 2023 10:29:46 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1740240736072/5d0c9673-2f25-4839-b69d-b3f6aa67a488.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>We hear about companies falling victim to cyberattacks, resulting in severe damage to their reputation. As customers, we are influenced by such incidents and may choose to discontinue using their services. However, this issue extends beyond the realm of cybersecurity. For example, as a user of Twitter (now referred to as X), I've observed cases where Gen Z (as people of my generation are fondly called) publicly call out brands that fail to meet our expectations. These instances often gain traction and visibility on the trend table, leading others to boycott the brand. This phenomenon is not limited to Gen Z, as older generations also learn about such news through platforms like WhatsApp, which can tarnish the brand's image even if personal information or money isn't directly impacted.</strong></p>
<p><strong>Now, imagine the repercussions a company faces after suffering an attack that results in significant consequences, such as those listed below. The impact on their reputation would be even more severe.</strong></p>
<p>As technology exists and evolves, so do its vulnerabilities. Identifying these weak points and managing your organization's security is important. To conduct a successful security assessment, you must understand the vulnerabilities that affect information systems and networks and prioritize remediation based on their potential impacts <strong>(YOU CAN'T REMEDIATE WHAT YOU DON'T UNDERSTAND)</strong>. It is not all about choosing the right tools <strong>(yes, there are hundreds of tools out there)</strong> but understanding the consequences of vulnerabilities to focus on critical areas.</p>
<p><strong>In this post, we will explore the various types and impacts of vulnerabilities.</strong></p>
<p><strong>STAY TUNED!!!</strong></p>
<h2 id="heading-61-cloud-based-vs-on-premises-vulnerabilities"><strong>6.1</strong> <strong>Cloud-based vs. on-premises vulnerabilities</strong></h2>
<p><strong>FIRST, WHAT IS CLOUD COMPUTING?</strong></p>
<p>Cloud Computing is the on-demand delivery of IT resources over the internet. The computing environment and their security concerns includes</p>
<p><strong>Cloud-Based:</strong> These are services, resources, and applications hosted and provided over the internet by third-party cloud service providers, such as AWS, Microsoft Azure, and Google Cloud Platform (GCP). Vulnerabilities in this environment include data breaches, data loss, shared resources due to multi-tenancy, and insider threats from cloud providers.</p>
<p><strong>On-premises:</strong> These are services, resources, and applications hosted and managed within an organization's own physical data centers, providing the organization with full control over its data, software, and hardware. Vulnerabilities in this environment include unauthorized physical access, insider threats from within the organization, lack of monitoring, and delayed response to breaches.</p>
<h2 id="heading-62-zero-day"><strong>6.2</strong> <strong>Zero-day</strong></h2>
<p>A zero-day vulnerability is a security flaw discovered by attackers but remains unknown to the software vendor and has no patch. Compensating controls, such as containment measures can me used to mitigate against the risk of zero-day. These controls aim to limit the vulnerability's impact until an official fix or patch is made available.</p>
<h2 id="heading-63-weak-configurations"><strong>6.3</strong> <strong>Weak configurations</strong></h2>
<p>Poor configuration management could be a sign that the company isn't strictly controlling and documenting its assets. Misconfiguration provides attackers with entry points and opportunities to elevate privileges, allowing them to gain control over critical components and potentially compromising the entire enterprise. The following are examples of weak configurations that an organization must avoid and check their systems against:</p>
<p><strong>Open permissions:</strong> Permissions specify the types of activities that can be performed on an object within a system. When access rights for user groups are not correctly distinguished, open permissions occur. This leads to an unauthorized person accessing sensitive data or modifying critical settings. ENSURE THAT YOUR PERMISSIONS ARE SECURE.</p>
<p><strong>Unsecure root accounts:</strong> The root account, also known as the superuser or Administrator account, has unrestricted system access and poses a serious security risk. Unsecure root accounts give threat actors unlimited access to the system. To reduce risks, implement least privilege management and permission rules to limit the superuser account. Disable direct login to the root account and implement access control vault.</p>
<p><strong>Errors:</strong> Applications that are not properly configured can expose error messages that can be advantageous to attackers. To reduce this risk, practice secure coding, avoid disclosure of sensitive information, and ensure that programs trap errors and generate appropriate log files for better security.</p>
<p><strong>Weak encryption:</strong> Encryption algorithms protect data at rest and in transit, requiring a decryption key for access. Weak encryption vulnerabilities allow unauthorized access to data. Weak encryption vulnerabilities arise from simple password-generated keys, known algorithm weaknesses, and insecure key distribution. For example, all versions of SSL are now considered deprecated, therefore, TLS should be used. Also, AES (Advanced Encryption Standard) is the strongest encryption algorithm advised to be used.</p>
<p><strong>Unsecure protocols:</strong> Unsecure protocols transfer data in cleartext without encryption, leaving it vulnerable to interception and modification. Without encryption, there is no secure way to authenticate endpoints, allowing attackers to perform man-in-the-middle attacks. Examples of unsecure protocols are Telnet, FTP, SMTP, IMAP, HTTP, and their alternatives are SSH, SFTP, IMAPS, HTTPS.</p>
<p><strong>Default settings:</strong> Default settings may enable unsecure interfaces, leaving devices vulnerable to compromise and allowing attackers to move through the network undetected. To ensure a secure environment, organizations should customize settings to their specific needs and create a well-defined default configuration baseline.</p>
<p><strong>Open ports and services:</strong> To access a service, its port must be open. However, having unnecessary open ports can create potential pathways for unauthorized users to exploit. To ensure security, it's important to control the open ports and services on a system through auditing and disable any unnecessary services that run with elevated privileges.</p>
<h2 id="heading-64-third-party-risks"><strong>6.4 Third-party risks</strong></h2>
<p>Third-party risk refers to potential risks and vulnerabilities arising from involving external entities, like vendors, suppliers, or contractors, in an organization's operations. Reliance on third-party services exposes organizations to security, operational, financial, and compliance risks.</p>
<p><strong>Vendor management</strong>: This involves identifying needs and finding vendors that align with business goals.</p>
<ul>
<li><p><strong>System integration:</strong> System integration links components and services from different vendors, with the main risk being a lack of expertise in overseeing the project and excessive trust in the third-party integrator.</p>
</li>
<li><p><strong>Lack of vendor support:</strong> This may occur when manufacturers stop providing assistance for products(This may be due to the product reaching its End of Life), leaving organizations vulnerable. Compensating controls become crucial in such cases.</p>
</li>
</ul>
<p><strong>Supply chain</strong>: It involves interconnected components and vendors in an organization's IT infrastructure. When using third-party hardware or software, maintaining local security controls is vital to mitigate risks.</p>
<p><strong>Outsourced code development:</strong> This can be a security concern due to lack of control, potential data exposure, and quality assurance issues. Mitigation includes clear security requirements and regular assessments.</p>
<p><strong>Data storage:</strong> Data storage, being distributed throughout an organization, requires proper access controls and security measures to prevent risks, such as data manipulation leading to disruptions in operations. Implementing a consistent data storage policy and checklist helps secure data from becoming vulnerabilities in the system.</p>
<h2 id="heading-65-improper-or-weak-patch-management"><strong>6.5 Improper or Weak Patch Management</strong></h2>
<p>Weak patch management leaves systems exposed to potential exploits. Implement centralized patch management with an update server, thorough testing, and efficient deployment.</p>
<p><strong>Firmware</strong>: Firmware vulnerabilities include weaknesses in BIOS/UEFI and device firmware that controls the boot process for PCs, as well as bugs in device firmware like network cards and disk controllers. Exploits can be hard to detect due to high privilege access.</p>
<p><strong>Operating System</strong>: OS vulnerabilities, like in the kernel or shared library, can lead to privilege escalation. Promptly apply monthly and on-demand patches.</p>
<p><strong>Application:</strong> Application vulnerabilities run with user permissions. Limit permissions and timely patches from manufacturers to protect against known vulnerabilities.</p>
<h2 id="heading-66-legacy-platforms"><strong>6.6 Legacy platforms</strong></h2>
<p>Legacy platforms are systems that are no longer supported with security patches by their developers or vendors, making them unpatchable. These systems are highly likely to have vulnerabilities and need to be protected using security controls other than patching, such as isolating them in networks inaccessible to attackers physically. The risks associated with legacy platforms must be weighed against the costs of change when considering their use in an organization.</p>
<h2 id="heading-67-impacts"><strong>6.7 Impacts</strong></h2>
<p><strong>Data loss</strong> occurs when information becomes inaccessible, either permanently or temporarily.</p>
<p><strong>Data breaches</strong> occur when sensitive data is viewed, moved, modified, or deleted without authority. A privacy breach occurs when personal data is not gathered, maintained, or processed in accordance with applicable laws or regulations.</p>
<p><strong>Data exfiltration</strong> involves the methods and tools used by an attacker to transfer data from the victim's systems to an external network or media without authorization.</p>
<p><strong>Identity theft</strong> is a breach in privacy where the threat actor illegally uses the sensitive information obtained or sells the data to other malicious actors.</p>
<p><strong>Financial losse</strong>s are incurred due to damages, fines, and loss of business.</p>
<p><strong>Reputation loss</strong> occurs when an organization loses its integrity, good name, and customers' trust.</p>
<p><strong>Availability loss</strong> occurs when a company's systems are brought down, or when the organization experiences downtime due to malicious disaster events, leading to a loss of revenue and customers.</p>
<p><strong>END.</strong></p>
<blockquote>
<p><strong>There are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it.</strong></p>
<p><em><cite>Ted Schlein</cite></em></p>
</blockquote>
<p><strong>Review Questions</strong></p>
]]></content:encoded></item><item><title><![CDATA[Sec+ 004: Network Attacks Indicators]]></title><description><![CDATA[My mum once told me that in the olden days, it was a common practice for people to communicate with their potential spouses through intermediaries (called "Alarina" in the Yoruba Language) before getting married.The role of the Alarina, or intermedia...]]></description><link>https://cyvally.com/sec-004-network-attacks-indicators</link><guid isPermaLink="true">https://cyvally.com/sec-004-network-attacks-indicators</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Mon, 19 Jun 2023 12:32:00 GMT</pubDate><content:encoded><![CDATA[
<p></p><p>My mum once told me that in the olden days, it was a common practice for people to communicate with their potential spouses through intermediaries (called "<strong>Alarina</strong>" in the Yoruba Language) before getting married.<br />The role of the Alarina, or intermediary, was not to prevent the man from approaching the lady directly, but rather to provide consultation and deeper understanding. The man would contact a trusted friend who would eventually become the Alarina, not out of shyness or fear, but to gain insights into the lady and her family. The Alarina, who knew the lady and her family well, acted as an intermediary between the two families, fostering communication and understanding in the marriage process.<br /><strong>My question is, were people not scared that the Alarina could manipulate the information to create misunderstandings and misinterpretations, thereby disrupting the relationship?</strong></p>
<p></p>

<p></p><p>The story of "Alarina" as a middleman between potential spouses raises concerns about the possibility of manipulation and disruptions in the communication process. Now, let's take this to the digital world,<strong> EVER HEARD OF THE MAN-IN-THE-MIDDLE ATTACK?</strong> it is an attack that involves interception and manipulation of communication between two entities. leading to unauthorized actions. Although both scenarios involve intermediaries who have the power to influence the flow of information, raising concerns about the trustworthiness and integrity of the communication process, Alarina's role is based on trust and consultation, a man-in-the-middle attack is an act of <strong>deception and malicious intent.</strong></p>
<p></p>

<p></p><p>In this post, you will learn about the indicators of network attacks. These indicators provide details about the nature of the attack, what is happening, and the required countermeasures.<br /></p>
<p></p>

<p></p><p><strong>Stay plugged!!!</strong></p>
<p></p>

<p></p><p><strong>4.1</strong> <strong>Wireless Attack Types</strong></p>
<p></p>

<p></p><p>Wireless networking technology is widely utilized, with several protocols and techniques available to connect users to networks without the use of physical wires. Wireless networking, like any other software system, is vulnerable to hacker efforts. Let's look at the types of wireless attacks:</p>
<p></p>

<p></p><p><strong>Evil twin</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An evil twin involves a rogue WAP masquerading as a legitimate one</li>
</p>

<p><li>It may share the same name (SSID) as the real one</li>
</p>

<p><li>This attack involves an attacker using their own AP that looks like a stronger connection.</li>
</p>

<p><li>The attacker has the ability to intercept network traffic from users who connect to the malicious access point, potentially gaining access to private data.</li>
</p></ul>
<p></p>

<p></p><p><strong>Rogue access point</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is an unauthorized access point that is installed with malicious intent or not.</li>
</p>

<p><li>Attackers can set up rogue access points to create backdoor, eavesdrop on network traffic, launch man-in-the-middle attacks, or gain unauthorized access to the network.</li>
</p>

<p><li>Ensure that you periodically survey the site to detect rogue WAPs</li>
</p>

<p><li>Use 802.1X (Network Access Control) to mandate authentication for all connections</li>
</p></ul>
<p></p>

<p></p><p><strong>Bluesnarfing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An attack where an attacker uses a Bluetooth connection to obtain<strong> unauthorized access</strong> to data on a target device</li>
</p></ul>
<p></p>

<p></p><p><strong>Bluejacking</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>It involves <strong>sending</strong> unsolicited(SPAM) text (or picture/video) message or vCard (contact details) to Bluetooth-enabled devices.</li>
</p></ul>
<p></p>

<p></p><p><strong>Disassociation Attack</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Disassociation attacks are attempts to disconnect a host from the wireless access point and the wireless network.</li>
</p>

<p><li>A disassociation attack sends spoofed frames by taking advantage of the lack of encryption in management frame communication.</li>
</p>

<p><li>Attackers can prevent genuine users from connecting to the network by delivering fake disassociation signals, which results in denial-of-service (DoS) problems.</li>
</p>

<p><li>It can be mitigated by configuring Management Frame Protection (MFP/802.11w) , both on clients and WAP</li>
</p></ul>
<p></p>

<p></p><p><strong>Jamming</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An attack in which radio waves interferes with 802.11 wireless signals.</li>
</p>

<p><li>it can result from installing a WAP with a stronger signal</li>
</p>

<p><li>To detect the source of interference, use a spectrum analyzer</li>
</p>

<p><li>To mitigate, locate and disable the malicious radio source or boost the signal on the legitimate source.</li>
</p></ul>
<p></p>

<p></p><p><strong>Radio frequency identification (RFID)</strong> <strong>Attack</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>RFID is used on anything that requires tracking; such as access badges</li>
</p>

<p><li>Attackers might take advantage of flaws in RFID technology to intercept or alter information being sent between RFID tags and readers, thereby obtaining access or tampering with the data.</li>
</p>

<p><li>Skimming(unauthorized capture of information from RFID tags) is a good example of RFID Attack.</li>
</p></ul>
<p></p>

<p></p><p><strong>Near-field communication (NFC)</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>NFC is a 2-way (peer to peer) radio communications system that enables contactless payments across very short distances.</li>
</p>

<p><li>it is a high-frequency subset of RFID</li>
</p>

<p><li>NFC is mainly used for contactless point-of-sale transactions. Customers enter their credit card details into a mobile wallet app to set up a payment service. Instead of transmitting the actual credit card data, the app sends a one-time token that the merchant links to the correct client account.</li>
</p>

<p><li>Attackers can perform Remote capture, frequency jamming that will lead to a DoS attack</li>
</p></ul>
<p></p>

<p></p><p><strong>Initialization vector (IV)</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>IV is a random value used in cryptographic algorithms, particularly in wireless encryption protocols like WEP (Wired Equivalent Privacy)</li>
</p>

<p><li>IV is a type of nonce (generated once) and used at the beginning of a connection. its primary aim is to prevent replay attack</li>
</p>

<p><li>IV-related attacks take advantage of weaknesses in the creation or maintenance of the IV, giving attackers access to wireless networks and the ability to decrypt encrypted data.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>4.2 On-path attack/Man-in-the-Middle attack/Man-in-the-Browser Attack</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is a type of eavesdropping where an attacker establishes a separate link between two victims and steals information</li>
</p>

<p><li>The threat actor positions themselves between two hosts and  intercepts, watches and broadcasts all of their communication</li>
</p>

<p><li>In Man-in-the-Browser attack, a malware attack installs a trojan element on the target machine. This trojan can act as a proxy and modifies the browser's behavior by utilizing browser helper objects or extensions.</li>
</p>

<p><li>On-path attacks can be defeated using mutual authentication, where both hosts exchange secure credentials.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>4.3 Layer 2 attacks</strong></p>
<p></p>

<p></p><p>Local addressing decisions are made at Layer 2 of a network. Switches and MAC address operate at this layer. Here are types of Layer 2 attacks</p>
<p></p>

<p></p><p><strong>Address Resolution Protocol (ARP) poisoning</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>ARP matches IP addresses to MAC addresses on a local network</li>
</p>

<p><li>An attacker uses ARP poisoning to deliver fake ARP packets to a target computer, forcing it to link wrong MAC addresses with specific IP addresses</li>
</p>

<p><li>All traffic destined for remote networks will be sent to the attacker</li>
</p>

<p><li>The attacker can use a man-in-the-middle attack by monitoring the communications and then sending them to the router, or by changing the packets before transferring them or DOS attack by not forwarding the packets.</li>
</p></ul>
<p></p>

<p></p><p><strong>Media access control (MAC) flooding</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is an attack on the switch</li>
</p>

<p><li>The MAC address table is used by the switch to decide which port to utilize to forward unicast traffic to the correct destination.</li>
</p>

<p><li>It involves an attacker exhausting the switch's memory capacity by flooding it with a high number of false MAC addresses.</li>
</p>

<p><li>Overwhelming the table result to the switch to abandon MAC-based forwarding and flood unicast traffic out of all ports, effectively acting as a hub. This leads to the attacker eavesdropping on network traffic</li>
</p></ul>
<p></p>

<p></p><p><strong>MAC cloning/MAC address spoofing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This involves an attacker forging the network interface card's (NIC) factory-assigned MAC address in order to impersonate another device on a network.</li>
</p>

<p><li>The manufacturer assigns a unique MAC address to each network interface. An attacker can trick network switches and routers into associating their own device with the cloned MAC address by cloning the MAC address of another device.</li>
</p>

<p><li>It can be used to bypass MAC address filtering</li>
</p></ul>
<p></p>

<p></p><p><strong>4.4 Domain name system (DNS) Attack Types</strong></p>
<p></p>

<p></p><p>The Domain Name System (DNS) of port 53, resolves Fully Qualified Domain Name (FQDNs) to IP addresses. It makes use of a distributed database system to store information about domains and hosts within those domains. </p>
<p></p>

<p></p><p><strong>Domain hijacking/Brandjacking</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is the unauthorized takeover of a domain name by compromising the domain registrar or DNS (Domain Name System) credentials.</li>
</p>

<p><li>The attacker gets control of the domain name and can modify its DNS records, routing traffic intended for the genuine domain to a different website</li>
</p>

<p><li>The whois command can be used to check up domain registration information in order to detect misuse.</li>
</p></ul>
<p></p>

<p></p><p><strong>DNS poisoning</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Also called DNS cache poisoning or DNS spoofing</li>
</p>

<p><li>It corrupts the DNS cache by inserting fake DNS information into it, forwarding a domain name to an IP address of the attacker's choice and redirecting visitors to malicious websites.</li>
</p>

<p><li>it can also be achieved via Man in the middle attack.</li>
</p></ul>
<p></p>

<p></p><p><strong>Uniform Resource Locator (URL) redirection</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>A uniform resource locator (URL) is an address for website pages and files.</li>
</p>

<p><li>URL redirection is the use of HTTP redirecting to open a page other than the one requested by the user.</li>
</p>

<p><li>Malicious actors might utilize the URL redirection mechanism to redirect users to phishing websites.</li>
</p>

<p><li>Types of URL redirection is Typosquatting/brandjacking</li>
</p></ul>
<p></p>

<p></p><p><strong>Domain reputation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is the assessment of a domain's integrity and reputation</li>
</p>

<p><li>If your domain, website, or email servers have been compromised, they are likely to be exploited for malware distribution. Monitor your site via talosintelligence.com/reputation_center to detect misuse early.</li>
</p></ul>
<p></p>

<p></p><p><strong>DNS Security</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Local DNS servers should only allow recursive requests from authenticated local hosts and not from the Internet on a private network.</li>
</p>

<p><li>Establish access control techniques on the server to prevent a malicious user from manually modifying records.</li>
</p>

<p><li>Clients should also be limited to using authorized resolvers for name resolution.</li>
</p>

<p><li>Implement DNS Security Extensions (DNSSEC) to provide a validation mechanism for DNS answers, which helps to mitigate spoofing and poisoning attacks.</li>
</p>

<p><li>To prevent Footprinting, Implement Access Control List to block zone transfers to unapproved hosts or domains, preventing an external server from learning about the private network architecture.</li>
</p></ul>
<p></p>

<p></p><p><strong>NOTE: </strong>DNS footprinting is the process of acquiring information about a private network by utilizing its DNS server to make a zone transfer (all the records in a domain) to a rogue DNS server or by querying the DNS service with a tool like nslookup or dig.</p>
<p></p>

<p></p><p><strong>4.5 Distributed denial-of-service (DDoS)</strong> </p>
<p></p>

<p></p><p>DOS attacks impair resource availability, whereas DDOS attacks flood a service with traffic from several infected hosts. DDOS attack can be mitigated by high availability services and stateful firewalls. ACLs, blackholes or sinkhole can also be used to mitigate against a DDoS attacks with blackholes being preferred to preserve processing resources. Although Legitimate traffic is dropped with DDoS packets in if sinkhole or blackhole is implemented.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Sinkhole refers to the process of transferring flooding traffic to a different network for investigation allowing the source to be identified and filtering rules to be applied.</strong> </p>
<p></p>

<p></p><p><strong>While A blackhole is a network segment that is inaccessible to the rest of the network. The blackhole method is preferable since it reduces the impact of the attack on the ISP's other customers. </strong></p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Network:</strong> DoS attack in which the attacker makes multiple SYN requests to a target server in the hope of using enough resources to prevent legitimate traffic from being sent.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Application: </strong>DoS attack that targets vulnerabilities in the headers and payloads of application protocols  or resource-intensive activities within web applications or servers.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Operational technology (OT)</strong>: OT network is established between embedded systems devices and their controllers. DDoS attacks against vital infrastructure, such as industrial control systems (ICS), Supervisory Control and Data Acquisition(SCADA)systems</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>4.6 Malicious code or script execution</strong></p>
<p></p>

<p></p><p>Scripting promote speed, accuracy, reproducibility, and portability, it can be used for good intent as well as for bad intent. The following are different programming languages or scripting environments: </p>
<p></p>

<p></p><p><strong>PowerShell:</strong> is a command-line interface and scripting language based on the.NET Framework. It is a primary way for executing Windows administrative tasks.</p>
<p></p>

<p></p><p><strong>Python:</strong> it is a high-level programming language popular for automation. It can be used for data theft, network scanning, or the creation of botnets.</p>
<p></p>

<p></p><p><strong>Bash:</strong> It is a Unix-like command shell and scripting language. It can be used to perform privilege escalation, data exfiltration, or creating backdoors.</p>
<p></p>

<p></p><p><strong>Macros</strong>: are short pieces of code that are inserted within documents, such as Microsoft Office files, to automate repetitive activities.</p>
<p></p>

<p></p><p><strong>Visual Basic for Applications (VBA):</strong>Programming languages used in Office document automation to construct macros and scripting.Microsoft Office use the Visual Basic for Applications (VBA) programming language, whereas PDF documents employ JavaScript. ALT+F11 can be used to inspect Microsoft Office document macros.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><em><strong>“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” </strong></em></p>
<cite><strong>Stephane Nappo</strong></cite></blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>4.7 Review Question</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>

]]></content:encoded></item><item><title><![CDATA[Sec+ 003: Application Attack Indicators]]></title><description><![CDATA[Threat actors can enter the network or move about it by using attacks to execute arbitrary code on trusted hosts. An attacker can easily progress to breaching data assets or triggering a denial of service against critical servers with adequate privil...]]></description><link>https://cyvally.com/sec-003-application-attack-indicatorstrashed</link><guid isPermaLink="true">https://cyvally.com/sec-003-application-attack-indicatorstrashed</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sat, 10 Jun 2023 23:35:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1739914060321/1668f434-52f0-4271-ac09-e4acdea26a7b.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[
<p></p><p></p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Threat actors can enter the network or move about it by using attacks to execute arbitrary code on trusted hosts. An attacker can easily progress to breaching data assets or triggering a denial of service against critical servers with adequate privileges and access. </p>
<p></p>

<p></p><p>Most application attacks aim to achieve arbitrary code execution, which involves exploiting vulnerabilities to allow an attacker (or threat actor) to execute their own code. When the code is transmitted from one machine to another, it is known as remote code execution, enabling the attacker to send and execute code from a remote host on a target host that is vulnerable to such exploits.</p>
<p></p>

<p></p><p><br />In today's post, we will look at potential application attack indicators to help in recognize the presence of a current or future attack on software applications. Examining odd network traffic, anomalous system activity, unusual user actions, security alerts, and known attack patterns are all part of this. Individuals can more effectively notice and respond to application threats if these indications are successfully examined.</p>
<p></p>

<p></p><p>#1: Privilege escalation</p>
<p></p>

<p></p><p>Privilege escalation is the process by which an attacker elevates their privileges from a lower level (such as a regular user) to a higher level (such as an administrator or root) in order to gain increased/higher access and control within a system, network, or application.</p>
<p></p>

<p></p><p>Privilege escalation can occur in an operating system or other application </p>
<p></p>

<p></p><p>Types of privilege escalation:</p>
<p></p>

<p></p><p>Vertical Privilege Escalation: An attacker attempts to elevate their privileges inside the same user hierarchy. A user with limited privileges, for example, attempts to get administrative access to the same system.</p>
<p></p>

<p></p><p>Horizontal Privilege Escalation: In this case, the attacker attempts to achieve the same level of privileges as another system user. This often occurs when a flaw permits impersonation or session hijacking, allowing the attacker to obtain access to another user's account or session.</p>
<p></p>

<p></p><p>Lateral Privilege Escalation: Obtaining privileges in another system or environment within a network. Once an attacker has gained access to one system, they will exploit weaknesses to gain access to other interconnected systems.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement security measures such as strong access controls, least privilege principles(giving users just the privileges they need)</li>
</p>

<p><li>Updated anti-virus/anti-malware software to Block known vulnerabilities</li>
</p>

<p><li>Employ defense-in-depth strategies to limit the impact of successful attacks.</li>
</p>

<p><li>Data Execution Prevention<br />– Only data in executable areas can run</li>
</p>

<p><li>Perform regular software patching, monitoring and auditing of user activities</li>
</p>

<p><li>Implement Data Execution Prevention (DEP) prevents the execution of malicious code by designating specific memory regions as non-executable(i.e. Only data in executable areas can run)</li>
</p>

<p><li>Implement Address space layout randomization(ASLR) to Prevent a buffer overrun at a known memory address</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Cross-site scripting</p>
<p></p>

<p></p><p>Cross-site scripting (XSS) is one of the most common web attack<br />methodologies. The cause of the vulnerability is weak user input validation.<br />If input is not validated properly, an attacker can include a script in their<br />input and have it rendered as part of the web process. </p>
<p></p>

<p></p><p>cross-site because of browser security flaws<br />– Information from one site could be shared with another</p>
<p></p>

<p></p><p>Takes advantage of the trust a user has for a site</p>
<p></p>

<p></p><p>TYPES OF XSS</p>
<p></p>

<p></p><p>Non-persistent XSS attack The injected script is not persisted or<br />stored but rather is immediately executed and passed back via the web<br />server.</p>
<p></p>

<p></p><ul><p></p>
<p><li>Persistent XSS attack The script is permanently stored on the web<br />server or some back-end storage. This allows the script to be used<br />against others who log in to the system. No specific target</li>
</p>

<p><li>DOM-based XSS attack The script is executed in the browser via the<br />Document Object Model (DOM) process as opposed to the web<br />server.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>CONTROL</strong></p>
<p></p>

<p></p><p>Controls to defend against XSS attacks include the use of anti-XSS<br />libraries to strip scripts from the input sequences. Various other ways to<br />mitigate XSS attacks include limiting the types of uploads, screening the size<br />of uploads, and whitelisting inputs. However, attempting to remove scripts<br />from inputs can be a tricky task. Well-designed anti-XSS input library<br />functions have proven to be the best defense. Cross-site scripting<br />vulnerabilities are easily tested for and should be a part of the test plan for<br />every application. Testing a variety of encoded and unencoded inputs for<br />scripting vulnerability is an essential test element</p>
<p></p>

<p></p><p>Input validation is helpful at preventing XSS attacks.</p>
<p></p>

<p></p><p>Input validation, also commonly known as data validation, is the<br />structured and proper testing of any input that is supplied by an application or<br />user. Input validation prevents improperly formed (malformed) data from<br />entering a system.</p>
<p></p>

<p></p><p>Protecting against XSS</p>
<p></p>

<p></p><ul><p></p>
<p><li>Be careful when clicking untrusted links<br />– Never blindly click in your email inbox. Never.</li>
</p>

<p><li>Consider disabling JavaScript<br />– Or control with an extension<br />– This offers limited protection</li>
</p>

<p><li>Keep your browser and applications updated<br />– Avoid the nasty browser vulnerabilities</li>
</p>

<p><li>Validate input<br />– Don’t allow users to add their own scripts to an<br />input field</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Injections</p>
<p></p>

<p></p><p>User input without input validation results in an opportunity for an attacker to<br />craft input to create specific events that occur when the input is parsed and<br />used by an application</p>
<p></p>

<p></p><p>Types of injection attacks</p>
<p></p>

<p></p><p>Structured query language (SQL)</p>
<p></p>

<p></p><p>Structured Query Language (SQL) injection attacks<br />involve the manipulation of input, resulting in a SQL statement that is<br />different from the statement the designer intended</p>
<p></p>

<p></p><p>A SQL injection attack is a form of code injection aimed at any SQL-based<br />database, regardless of vendor. An example of this type of attack is where the<br />function takes the user-provided inputs for username and password and<br />substitutes them in a <strong>where</strong> clause of a SQL statement with the express<br />purpose of changing the <strong>where</strong> clause into one that gives a false answer to<br />the query</p>
<p></p>

<p></p><p>The addition of the or clause, with an always true statement and the<br />beginning of a comment line to block the trailing single quote, alters the SQL<br />statement to one in which the where clause is rendered inoperable. If the<br />where clause is altered to return all records, this can result in a data breach.</p>
<p></p>

<p></p><p>control</p>
<p></p>

<p></p><p>Stored procedures are precompiled methods implemented within a<br />database engine. Stored procedures act as a secure coding mechanism<br />because they isolate user input from the actual SQL statements being<br />executed. This is the primary defense mechanism against SQL injection<br />attacks—in other words, separation of user input from the SQL statements.<br />User-supplied input data is essential in interactive applications that use<br />databases; these types of applications allow the user to define the specificity<br />of search, match, and so on</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Dynamic-link library (DLL)</p>
<p></p>

<p></p><p>DLL injection is a vulnerability that allows the malware to take advantage of the operating system's ability to attach one process to another. Attackers inject a malicious DLL into a legitimate process, potentially causing program instability and sensitive data spillage. This method makes use of dynamic-link library (DLL) technology, which provides functionality to a program via library routines that are linked at runtime. DLLs, for example, are loaded at runtime in Microsoft Office, and putting a malicious DLL in the relevant directory or via a registry entry can bring new destructive functionality.</p>
<p></p>

<p></p><p>A Dynamic-Link Library is a Windows library that contains both code and data. Inject a DLL into an application and have it run a program that runs as part of the target process.</p>
<p></p>

<p></p><p>Lightweight Directory Access Protocol (LDAP)</p>
<p></p>

<p></p><p>LDAP-based systems are also subject to injection attacks. When an<br />application constructs an LDAP request based on user input, a failure to<br />validate the input can lead to a bad LDAP request. Just as SQL injection can<br />be used to execute arbitrary commands in a database, LDAP injection can do<br />the same in a directory system. Something as simple as a wildcard character<br />(*) in a search box can return results that would normally be beyond the<br />scope of a query. Proper input validation is important before a request is<br />passed to an LDAP engine.</p>
<p></p>

<p></p><p>Extensible Markup Language (XML)</p>
<p></p>

<p></p><p>XML can be tampered with via injection as well. XML injections can be<br />used to manipulate an XML-based system. Because XML is nearly<br />ubiquitous in the web application world, this form of attack has a wide range<br />of targets. XML that is maliciously altered can affect changes in<br />configurations, changes in data streams, changes in outputs—all from the<br />injection</p>
<p></p>

<p></p><p>#: Pointer/object dereference</p>
<p></p>

<p></p><p>Pointer dereference is a software vulnerability that occurs when code tries to access memory through a pointer but the pointer itself is null. Pointers in C/C++ programming store memory addresses. Dereferencing a pointer entails reading or writing data to the memory address to which it points. If the pointer is null or invalid (which can happen as a result of malicious intervention), a null pointer dereference exception occurs, resulting in a process crash. </p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>programmers should include logic statements that ensure that a pointer is not null before using it.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Directory traversal</p>
<p></p>

<p></p><p>A directory traversal attack is when an attacker uses special inputs to<br />circumvent the directory tree structure of the filesystem. Adding encoded<br />symbols for “../..” in an unvalidated input box can result in the parser<br />resolving the encoding to the traversal code, bypassing many detection<br />elements, and passing the input to the filesystem. The program then executes<br />the commands in a different location than designed. When combined with a<br />command injection, the input can result in the execution of code in an<br />unauthorized manner. Classified as input validation errors, these can be<br />difficult to detect without doing code walkthroughs and specifically looking<br />for them.</p>
<p></p>

<p></p><p>Directory traversals can be masked by using the encoding of input<br />streams. If the security check is done before the string is decoded by the<br />system parser, then recognition of the attack form may be impaired.</p>
<p></p>

<p></p><p># Buffer overflows</p>
<p></p>

<p></p><p>A buffer is a section of memory reserved by the application to store expected data. Buffer overflows occur when data exceeds a target buffer's capacity, damaging adjacent memory. This can cause system crashes or allow attackers to run unauthorized code. Consider a program that expects a username of maximum of 15 characters but receives a string of 100 characters.. If not handled properly, this can result in a buffer overflow.</p>
<p></p>

<p></p><p>In a buffer overflow attack, the attacker deliberately sends data that exceeds the buffer's intended capacity.<br /><br /><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Perform bounds checking by Implementing correct input length validation, for example, by using safe library functions for inputs.</li>
</p>

<p><li> Adhere to secure programming practices.</li>
</p></ul>
<p></p>

<p></p><p>#: Race conditions</p>
<p></p>

<p></p><p>A race condition is a software vulnerability that happens when certain events do not take place in the sequence and at the right times as intended by the developer and the expected result of execution processes depends on them. The idea of several inputs trying to impact the output first is referred to as a "race condition." This flaw can appear in distributed or multithreaded programs where appropriate program operation depends on the order or timing of processes or threads.</p>
<p></p>

<p></p><p><strong>Time of check/time of use</strong></p>
<p></p>

<p></p><p>When there is a delay between when an application examines a resource and when it actually uses it. This inconsistency creates the possibility for modifications to happen between the check and use stages, which could compromise the application's integrity or security.</p>
<p></p>

<p></p><p>For instance, an attacker might modify or delete a temporary file generated by an application to store a value for later use if they have access to the system between the time the file is created and the time it is utilized.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Design data structures or objects to be immutable, which means they cannot be updated after being created.</li>
</p>

<p><li>Implement Synchronization mechanisms like locks, semaphores, or mutexes control access to shared resources, ensuring atomic execution of critical code sections and preventing concurrent conflicts.</li>
</p>

<p><li>Incorporate time stamp verification techniques to validate the consistency and integrity of resources</li>
</p>

<p><li>Implement thorough input validation</li>
</p>

<p><li>Access Control and Permissions</li>
</p></ul>
<p></p>

<p></p><p>#: Error handling</p>
<p></p>

<p></p><p>Application security depends on secure handling of errors and exceptions, as they are inevitable in every application. Attackers can exploit error management procedures to gain access to sensitive data by intentionally triggering errors.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Record error details in a secure log file that is protected by access control</li>
</p>

<p><li>Avoid echoing error information to users</li>
</p>

<p><li>Error messages shouldn't divulge configuration or platform information that could help attackers, like disclosing database server information on an error page for a web application.</li>
</p></ul>
<p></p>

<p></p><p># Improper input handling</p>
<p></p>

<p></p><p>To avoid application attacks, proper input handling is crucial in software development. Attackers frequently take advantage of inadequate input validation by sending erroneous or malicious data to vulnerable processes. This can lead to SQL injections, buffer overflows, denial of service, etc</p>
<p></p>

<p></p><p><br /><br /><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement strong input validation procedures that verify the desired input data's format, type, and length. Techniques like input sanitization, whitelisting, and blacklisting can be used in this regard.</li>
</p>

<p><li>When interacting with databases, use parameterized queries or prepared statements to fend off SQL injection threats. By doing this, it is made sure that user input is handled more like data than like executable code.</li>
</p>

<p><li>Perform Regular software updates and patching</li>
</p>

<p><li>Regular security testing, including code reviews and penetration testing, should be carried out in order to identify and fix any possible vulnerabilities in the input handling logic.</li>
</p></ul>
<p></p>

<p></p><p>Replay attack</p>
<p></p>

<p></p><p>Replay attacks work against applications by attempting to re-create the<br />conditions that existed the first time the sequence of events occurred. If an<br />attacker can record a series of packets and then replay them, what was valid<br />before may well be valid again. An example of this would be repeating the<br />previous set of transactions, like getting paid twice or successfully passing a<br />security check at a login event.</p>
<p></p>

<p></p><p>Session replays</p>
<p></p>

<p></p><p>When a user connects to a system via the web, the connection forms a<br />“session” in the respect that the various elements that are transmitted back<br />and forth form a conversation between the client and the server. A session<br />replay event is the re-creation of this interaction after it has occurred.</p>
<p></p>

<p></p><p>#: Integer overflow</p>
<p></p>

<p></p><p>Integers (whole integers) are data types defined with fixed lower and upper bounds. An integer overflow attack occurs when a computed result is too large to fit in the allocated storage space, resulting in a crash or data corruption, as well as a buffer overflow. This can cause a positive number to become negative (for example, transforming a bank debit to a credit).</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement proper input validation and perform appropriate checks to prevent integer overflow vulnerabilities.</li>
</p></ul>
<p></p>

<p></p><p>Request forgeries</p>
<p></p>

<p></p><p>Request forgery is a class of attack where a user performs a state-changing<br />action on behalf of another user, typically without their knowledge. It is like<br />having someone else add information to your web responses. These attacks<br />utilize the behavioral characteristics of web-based protocols and browsers,<br />and they occur because of client-side issues but they can be seen on both the<br />server side and the client side.</p>
<p></p>

<p></p><p>Server-side: </p>
<p></p>

<p></p><p>Server-side request forgery is when an attacker sends requests to the serverside application to make HTTP requests to an arbitrary domain of the<br />attacker’s choosing. These attacks exploit the trust relationship between the<br />server and the target, forcing the vulnerable application to perform<br />unauthorized actions. The typical trust relationships exploited are those that<br />exist in relation to the server itself, or in relation to other back-end systems<br />within the same organization. Common attacks include having the server<br />attack itself or attack another server in the organization.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Cross-site: </p>
<p></p>

<p></p><p>Cross-site request forgery (XSRF) attacks utilize unintended behaviors that<br />are proper in defined use but are performed under circumstances outside the<br />authorized use. This is an example of a “confused deputy” problem, a class<br />of problems where one entity mistakenly performs an action on behalf of<br />another. An XSRF attack relies upon several conditions to be effective. It is<br />performed against sites that have an authenticated user and exploits the site’s<br />trust in a previous authentication event. Then, by tricking a user’s browser<br />into sending an HTTP request to the target site, the trust is exploited. Assume<br />your bank allows you to log in and perform financial transactions but does<br />not validate the authentication for each subsequent transaction. If a user is<br />logged in and has not closed their browser, then an action in another browser<br />tab could send a hidden request to the bank, resulting in a transaction that<br />appears to be authorized but in fact was not done by the user.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>Many different mitigation techniques can be employed, from limiting<br />authentication times, to cookie expiration, to managing specific elements of a<br />web page (for example, header checking). The strongest method is the use of<br />random XSRF tokens in form submissions. Subsequent requests cannot work<br />because a token was not set in advance. Testing for XSRF takes a bit more<br />planning than for other injection-type attacks, but this, too, can be<br />accomplished as part of the design process</p>
<p></p>

<p></p><p>#: Application programming interface (API) attacks</p>
<p></p>

<p></p><p>APIs are used to feed data to an application. It is used in web apps and cloud services to enable consumers to automate services. if the API is not secure, threat actors can simply exploit it to compromise the web application's services and data. It is critical to utilize an API exclusively via an encrypted channel (HTTPS).</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Always use encrypted communication protocols, such as HTTPS and employ TLS/SSL certificates to establish secure connections.</li>
</p>

<p><li>Implement Input Validation and Sanitization to validate and filter user input so that only expected and safe data is allowed.</li>
</p>

<p><li>Ensure that strong authentication mechanisms, such as secure tokens or OAuth, are in place to authenticate API users' identities and approve their access to specified resources.</li>
</p>

<p><li>For API keys and other sensitive information, use safe storage and management techniques. Use secure key storage options instead of hardcoding secrets into the code.</li>
</p>

<p><li>Implement proper Error Handling techniques and Message Obfuscation to avoid exposing sensitive information</li>
</p>

<p><li>Implement rate-limiting and throttling mechanisms to prevent excessive API requests from a single source, protecting against Denial of Service (DoS) attacks. Set appropriate limits based on expected usage patterns.</li>
</p></ul>
<p></p>

<p></p><p>#: Resource exhaustion</p>
<p></p>

<p></p><p>Resource exhaustion occurs when a system lacks the necessary resources to function properly, including capacity and memory. Attacks exploiting this vulnerability aim to deplete these resources, similar to race conditions, leading to system crashes and disruption of services. Examples include overwhelming a system with TCP SYN requests or exhausting program memory. These attacks can impact customer-facing systems and disrupt essential services. Resource exhaustion attacks target CPU time, memory, disk capacity, and network utilization, causing systems to become unresponsive or fill up state tables.<br /><br /><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement measures such as resource monitoring, limitation, load balancing, rate limiting, intelligent resource allocation, secure coding practices, and attack detection and response</li>
</p></ul>
<p></p>

<p></p><p>#: Memory leak</p>
<p></p>

<p></p><p>Memory management is the process of controlling and coordinating computer memory, allocating it to variables, and reclaiming it when it is no longer required. Memory leaks, a software vulnerability in which allocated memory is not released once it is no longer in use. This can lead to increased resource use over time, potentially causing system instability. A memory leak happens when a process fails to relinquish memory, resulting in ongoing memory depletion and possible system crashes.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement proper resource deallocation, utilize automated memory management mechanisms, conduct code reviews and testing, employ memory leak detection tools, follow best practices and coding standards, and continuously monitor and optimize memory usage.</li>
</p></ul>
<p></p>

<p></p><p>Secure Sockets Layer (SSL) stripping</p>
<p></p>

<p></p><p>Secure sockets layer (SSL) stripping is a man in the middle attack against all<br />SSL and early versions of TLS connections. The attack is performed<br />anywhere a man in the middle attack can happen, which makes wireless<br />hotspots a prime location. The attack works by intercepting the initial<br />connection request for HTTPS, redirecting it to an HTTP site, and then<br />mediating in the middle. The reason the attack works is because the<br />beginning of an SSL or TLS (v1.0 or v1.1) handshake is vulnerable to attack.<br />The main defense is technical: only use TLS 1.2 or 1.3, as these versions<br />have protections against the specific attack method.</p>
<p></p>

<p></p><p>Driver manipulation</p>
<p></p>

<p></p><p>Drivers are pieces of software that sit between the operating system and a<br />peripheral device. In one respect, drivers are a part of the OS, as an<br />extension. In another respect, drivers are code that is not part of the OS and<br />are developed by firms other than the OS developer. Driver manipulation is<br />an attack on a system by changing drivers, thus changing the behavior of the<br />system. Drivers may not be as protected as other parts of the core system, yet<br />they join it when invoked. This has led to drivers being signed and<br />significantly tightening up the environment of drivers and ancillary programs.</p>
<p></p>

<p></p><p>Shimming</p>
<p></p>

<p></p><p>A shim is an additional code that is placed between an application driver and the operating system to enable functionality that would otherwise be unavailable. It allows modifications between different OS versions without altering the original driver code, giving it flexibility and portability. Shimming can be exploited by malicious code to change the functionality of a driver without altering the driver itself.</p>
<p></p>

<p></p><p>Refactoring</p>
<p></p>

<p></p><p>Refactoring is the practice of restructuring application code in order to improve its design and performance while retaining its original functionality. It can be used to improve code or to deal with certain scenarios. However, attackers can use refactoring to introduce illegal functionality to a driver while still allowing it to work normally. it is a Metamorphic malware that can appear different each time</p>
<p></p>

<p></p><p>#: Pass the hash</p>
<p></p>

<p></p><p>The pass-the-hash attack is an attack in which the attacker takes hashed user credentials and uses them to authenticate on the same network or other systems without knowing the original password. This technique makes use of hashed passwords rather than plaintext passwords for authentication.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Enforce strong password policies</li>
</p>

<p><li>Implement the principle of least privilege to limit user permissions.</li>
</p>

<p><li>Implement network segmentation to isolate critical systems.</li>
</p>

<p><li>Minimize credential exposure and use centralized authentication.</li>
</p>

<p><li>Use multi-factor authentication (MFA) for an additional layer of security.</li>
</p>

<p><li>Implement privileged access management (PAM) solutions for secure management of privileged accounts.</li>
</p>

<p><li>Provide regular security awareness training to educate users and administrators.</li>
</p>

<p><li>Keep systems and software up to date with the latest patches.</li>
</p>

<p><li>Monitor for suspicious activities and use security tools for detection.</li>
</p></ul>
<p></p>
]]></content:encoded></item><item><title><![CDATA[Sec+ #003: Application Attack Indicators]]></title><description><![CDATA[Dear Cyvally Readers,I am sure you are expecting a storyline to begin introducing the different types of application attacks. However, I decided to spice things up today by providing us with a short scenario to explain each application attack. I have...]]></description><link>https://cyvally.com/sec-003-application-attack-indicators-2</link><guid isPermaLink="true">https://cyvally.com/sec-003-application-attack-indicators-2</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sat, 10 Jun 2023 23:19:34 GMT</pubDate><content:encoded><![CDATA[
<p></p><p><strong>Dear Cyvally Readers,<br />I am sure you are expecting a storyline to begin introducing the different types of application attacks. However, I decided to spice things up today by providing us with a short scenario to explain each application attack. I have heard a lot of people complaining that this objective of the CompTIA sec+ is boring and they find it challenging, so I'm hoping this method will help to make the concepts clearer, relatable, and easily understandable. also, I will appreciate your feedback, as it will assist me in updating the content depending on your comment and suggestions. On this note, make sure to return to each post to ensure you are up to date with the latest info. I appreciate your continued support.<br />CYVALLY READERS ARE THE BEST!!!</strong></p>
<p></p>

<p></p><p><strong>Stay in the loop!!!</strong></p>
<p></p>

<p></p><p>As a Cybersecurity Professional, you will frequently encounter the term threat actors, who use code execution attacks to break into networks on hosts, resulting in major issues such as data asset breaches, denial of service attacks, and exploitation of privileges and access. <strong>YOU DON'T WANT THESE ISSUES, DO YOU?</strong></p>
<p></p>

<p></p><p><strong>HEARD ABOUT ARBITRARY CODE EXECUTION AND REMOTE CODE EXECUTION?</strong></p>
<p></p>

<p></p><p>you can deduce each word from its name; the word arbitrary means "random." ACE indicates a threat actor exploiting a vulnerability and executing random code on the target system. RCE indicates an attacker executing code on a remote target.</p>
<p></p>

<p></p><p>In this post, you will learn about application attack indicators to help identify present or future attacks on applications. By thoroughly investigating these indicators, you and I will be able to detect and respond to application attacks <strong>SOMEDAY. I HOPE YOU'RE EXCITED, AS I AM</strong>.</p>
<p></p>

<p></p><p><strong>#1: Privilege escalation</strong></p>
<p></p>

<p></p><p>The term <strong>"escalation"</strong> refers to the process of making something bigger or more serious. Privilege escalation occurs when an attacker upgrades their access level from user to administrator/root, they get greater control over a system, network, or application.</p>
<p></p>

<p></p><p><strong>SCENARIO</strong>: Assume Harry, an attacker carried out a phishing attack <strong>(I ASSUME YOU UNDERSTAND WHAT A PHISHING ATTACK IS)</strong> that allowed him to obtain unauthorized access to ABC's company network. Beginning as a regular user, he discovers and exploits a weakness in the system that allows him to increase his privileges as he gains access to the admin account<strong>( OUCH!!!, YOU PROBABLY KNOW THE END TO THIS STORY</strong></p>
<p></p>

<p></p><p>There are two types of privilege escalation attacks, vertical and horizontal. Vertical occurs when an attacker attempts to elevate their privileges to a higher level than their initial access while horizontal occurs when an attacker aims to attain the same level of privileges as initial account.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement strong access controls and least privilege principles</li>
</p>

<p><li>Update anti-virus/anti-malware software to block known vulnerabilities</li>
</p>

<p><li>Employ defense-in-depth strategies to limit the impact of successful attacks.</li>
</p>

<p><li>Perform regular software patching, monitoring and auditing of user activities</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>#2: Cross-site scripting</strong></p>
<p></p>

<p></p><p>Cross-Site Scripting (XSS) is a web security vulnerability where attackers inject malicious scripts into web pages. This occurs due to weak user input validation. When a victim visits the compromised page, the injected script executes in their browser, allowing attackers to steal data or perform unauthorized actions.</p>
<p></p>

<p></p><p><strong>Scenario</strong>: In an online forum, an attacker named Linda identifies a vulnerability in the comment section. Exploiting this vulnerability, Linda injects malicious code, such as <code><strong>&lt;script&gt;alert('XSS')&lt;/script&gt;</strong></code>, into the search field. When the user clicks on the "enter" button, the injected script executes, potentially causing harm or displaying unwanted content.</p>
<p></p>

<p></p><p><strong>TIP: Notice &lt;script&gt; was used to indicate it is a XSS code</strong></p>
<p></p>

<p></p><p>There are 3 types of XSS attacks; </p>
<p></p>

<p></p><p><strong>Reflected/non-persistent XSS</strong>: occurs when the malicious script is provided over the web server without being stored or persistent.(it is due to server-side flaw)<br /><strong>Persistent XSS</strong>: when website's database stores the script permanently.(due to server-side flaw)<br /><strong>DOM-based XSS</strong>: occurs due to flaw in the client-side code.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement input validation, output encoding and content security policies.</li>
</p>

<p><li>Mitigation measures such as limiting types  &amp; sizes of file uploads and whitelisting inputs.</li>
</p>

<p><li>Use a well-designed anti-XSS input library functions</li>
</p>

<p><li>Regularly perform Vulnerability testing for XSS vulnerabilities for every application.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>#3: Injections Types</strong></p>
<p></p>

<p></p><p><strong>Structured query language (SQL)</strong>: is a vulnerability that allows an attacker to tamper with database queries made by an application. It allows an attacker to the read and modify sensitive data from the database(Insert/Update/Delete). Proper input validation, parameterized queries, and regular software updates are required to prevent SQL Injection. </p>
<p></p>

<p></p><p><strong>' or 1=1--</strong></p>
<p></p>

<p></p><p>The string <code>' or 1=1--</code> is a common SQL Injection payload. It can be used to bypass authentication by manipulating the SQL query executed by the application. The <code>1=1</code> condition is always true, allowing unauthorized access to the system or retrieval of sensitive information from the database.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>DLL Injection:</strong> A Dynamic-Link Library is a Windows library that allows sharing of code with other programs to perform specific tasks. DLL injection is a vulnerability where arbitrary code is executed into another process's address space by forcing it to load a foreign DLL. keep antivirus software up-to-date to prevent DLL Injection. </p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Lightweight Directory Access Protocol Injection:</strong>  is an application attack that targets web-based applications by manipulating LDAP statements, usually generated from user input. LDAP is used for reading and writing network directory databases. An attacker can exploit either unauthenticated access or vulnerabilities in a client application to inject arbitrary LDAP queries. This can lead to unauthorized activities such as creating or deleting accounts, as well as modifying authorizations and privileges. Proper input validation and encoding prevents LDAP Injection.</p>
<p></p>

<p></p><p><strong>Extensible Markup Language Injection</strong>: XML is a markup language that allows you to define any data with rules. XML Injection is a type of attack that manipulates or compromises the logic of an XML application or service. Proper input validation prevents XML Injection.</p>
<p></p>

<p></p><p><strong>#4: Pointer/object dereference</strong></p>
<p></p>

<p></p><p>Pointer dereference is a vulnerability that occurs when code attempts to access memory through a pointer, but the pointer itself is null or points to an invalid memory location. Pointers in languages like C/C++ store memory addresses, and dereferencing a pointer involves reading from or writing to the memory location it points to.</p>
<p></p>

<p></p><p><strong>Scenario</strong>: An attacker named Nick took advantage of a weakness in a banking application to exploit a null pointer assignment. Nick causes a null pointer dereference error during account retrieval by giving a null value as the account pointer, resulting in a bank service crash and Nick gaining unauthorized access to sensitive data. </p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Programmers should include logic statements that ensure that a pointer is not null before using it.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>#5: Directory Traversal</strong> <strong>Attack</strong></p>
<p></p>

<p></p><p>A directory traversal attack occurs when an attacker gains access to files or folders outside the intended scope of an application. This attack exploits the improper handling of user input used to construct file paths or directory references. By manipulating the input, the attacker can deceive the application into accessing unauthorized files or folders.<br /></p>
<p></p>

<p></p><p><strong>Scenario</strong>: For instance, a certain application allows users to download files by providing the file name in the URL, an attacker inserts "../" sequences to access files beyond the app's designated download folder and browse through the directory tree<strong>(INSERT <em>HEARTBREAK</em> EMOJI)</strong> this led to disclosure of confidential data, unauthorized access, or even remote code execution.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement proper input validation and sanitization</li>
</p>

<p><li>Implement secure coding practices and employ web application firewalls</li>
</p></ul>
<p></p>

<p></p><p><strong>#6: Buffer overflows</strong></p>
<p></p>

<p></p><p>A buffer overflow occurs when data surpasses the capacity of a target buffer, causing damage to adjacent memory. This can lead to system crashes or enable attackers to execute unauthorized code. During a buffer overflow attack, the attacker intentionally sends data that exceeds the intended capacity of the buffer.</p>
<p></p>

<p></p><p><strong>Scenario:</strong> For example, a program that expects a maximum of 15 characters for a username but receives a string of 100 characters can experience a buffer overflow if not handled correctly.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Perform bounds checking by Implementing correct input length validation, for example, by using safe library functions for inputs.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Note:</strong> Bounds checking is a programming security approach that validates and enforces the right boundaries of arrays or buffers.</p>
<p></p>

<p></p><p><strong>#7: Race conditions</strong></p>
<p></p>

<p></p><p>A race condition is a vulnerability that occurs when the outcome of a program depends on the sequence and timing of events. It refers to the situation where multiple operations are performed at same time. Race conditions can be found in distributed or multithreaded programs.</p>
<p></p>

<p></p><p><strong>Scenario</strong>:  Jossy and Presh are both attempting to book the last remaining seat for an Infosec.Live event. Before booking the seat, each checks the value of "availableSeats" to ensure there is still a seat available. However, due to a race condition, both Jossy and Presh read the value of "availableSeats" simultaneously and mistakenly determine that there is still one seat available. Consequently, both proceed to book the seat at the same time.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Time of check/time of use</strong>: is a vulnerability that arises when there is a time gap between when a resource is checked and when it is actually used, allowing for potential modifications or compromises to occur during that interval. </p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Design data structures or objects to be immutable, which means they cannot be updated after being created.</li>
</p>

<p><li>Use thread synchronization where a part of the program can only execute one thread at a time</li>
</p>

<p><li>Incorporate time stamp verification techniques to validate the consistency and integrity of resources.</li>
</p></ul>
<p></p>

<p></p><p><strong>#8: Improper Error handling</strong></p>
<p></p>

<p></p><p>Errors are inevitable in every application and so should be handling properly. Attackers can exploit error management procedures to gain access to sensitive data by intentionally triggering errors.</p>
<p></p>

<p></p><p><strong>Scenario: </strong>An attacker exploits a weakness in the authentication process by submitting a specifically designed username that causes an error. This forces the application to display a generic error message, revealing the existence of the username in the system. Although the password is incorrect, this information allows the attacker to launch further attacks, such as password brute-forcing.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Record error details in a secure log file that is protected by access control</li>
</p>

<p><li>Avoid echoing error information to users</li>
</p>

<p><li>Error messages shouldn't divulge configuration or platform information that could help attackers, like disclosing database server information on an error page for a web application.</li>
</p></ul>
<p></p>

<p></p><p><strong>#9: Improper input handling</strong></p>
<p></p>

<p></p><p>Attackers often exploit insufficient input validation by sending malicious data to vulnerable processes. This can result in various security vulnerabilities such as SQL injections, buffer overflows, and denial of service attacks.</p>
<p></p>

<p></p><p><strong>Scenario:</strong> An attacker named Alex uses SQL injection to modify the database of an online shopping application with a flawed search feature. By inputting a devised search query, the application executes it without adequate validation, allowing the injected SQL code to run. Alex can then use the poor input processing vulnerability to access sensitive data, change prices, or remove the entire product catalog.</p>
<p></p>

<p></p><p><br /><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement strong input validation procedures that verify the desired input data's format, type, and length. such as input sanitization, whitelisting, and blacklisting </li>
</p>

<p><li>Perform Regular software updates and patching</li>
</p>

<p><li>Regular security testing, including code reviews and penetration testing, should be carried out in order to identify and fix any possible vulnerabilities in the input handling logic.</li>
</p></ul>
<p></p>

<p></p><p><strong>#10:  Replay attack</strong></p>
<p></p>

<p></p><p>Replay attack involves intercepting and reusing authentication data to establish a session. The goal of replay attacks is to recreate the conditions of a previous event. If an attacker can record a series of packets, they can easily replay them, potentially making previously legitimate actions valid again. </p>
<p></p>

<p></p><p><strong>Scenario:</strong> an attacker captures and records a user's payment transaction, and then replays it multiple times. This deceives the system into processing duplicate payments, allowing the attacker to gain unauthorized benefits.</p>
<p></p>

<p></p><p><strong>Session replays</strong>: When a user establishes a web connection to a system, the connection creates a "session" in the sense that the different data sent back and forth create an interaction between the client and the server. The recreation of this interaction after it has already taken place is known as a session replay.</p>
<p></p>

<p></p><p><strong>Scenerio:</strong> a legitimate user, Baron, securely logs into an online banking application and performs transactions. Meanwhile, a malicious attacker named Adam captures the session data, including the session identifier and authentication token. Even after Baron logs out, Adam replays the captured session data to the banking application's server. The server, unaware of the replayed session, validates the data and grants unauthorized access to Baron's account. </p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement appropriate security measures such as secure cookie handling, strong session management</li>
</p>

<p><li>Use Secure Communication Channels</li>
</p>

<p><li>Implement timestamps or nonce (unique numbers or strings) in the authentication process.</li>
</p>

<p><li>Use session tokens or tokens with one-time use to authenticate and authorize users.</li>
</p></ul>
<p></p>

<p></p><p><strong>#11: Integer overflow</strong></p>
<p></p>

<p></p><p>Integers (whole numbers) are data types defined with fixed lower and upper bounds. An integer overflow attack occurs when a computed result is too large to fit in the allocated storage space, resulting in a crash or data corruption, as well as a buffer overflow. </p>
<p></p>

<p></p><p><strong>Scenario:</strong> For Instance, positive number becoming negative such as transferring money from one account (the debit account) to another account (the credit account)<strong>(NO WONDER WE HATE DEBIT ALERT)</strong></p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement proper input validation and perform appropriate checks to prevent integer overflow vulnerabilities.</li>
</p></ul>
<p></p>

<p></p><p><strong>#12: Request Forgeries Types</strong></p>
<p></p>

<p></p><p><strong>Server-side request forgery (SSRF):</strong> SSRF occurs when an attacker manipulates a server-side application to send HTTP requests to a domain chosen by the attacker. This attack exploits the trust relationship between the server and the target, leading the vulnerable application to perform unauthorized actions. SSRF commonly targets the server itself or other back-end systems within the organizations</p>
<p></p>

<p></p><p><strong>Cross-site request forgery (XSRF)</strong>: CSRF occurs when an attacker manipulates a user's browser to execute undesirable actions on another website without the user's knowledge or consent. This is accomplished by taking advantage of the trust that websites have in the user's browser. </p>
<p></p>

<p></p><p><strong>Scenario</strong>: In a CSRF attack, an attacker can exploit a bank's lack of authentication checks for each transaction. If a user is logged in and their browser remains open, the attacker can send a hidden request from another tab, making it appear as if the user initiated the transaction when, in reality, they did not. This allows the attacker to perform unauthorized financial activities on the user's behalf.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Limiting authentication times and managing cookie expiration</li>
</p>

<p><li>Testing for CSRF attacks should be part of the design process.</li>
</p>

<p><li>checking the origin of requests and enforcing strict access control measures.</li>
</p></ul>
<p></p>

<p></p><p><strong>#13: Application programming interface (API) attacks</strong></p>
<p></p>

<p></p><p>APIs are used to provide/feed data to an application. They are commonly used in web apps and cloud services to enable consumers to automate tasks. If an API is not secure, threat actors can easily exploit it to compromise the web application's services and data. Therefore, it is critical to ensure that the API is accessed exclusively through an encrypted channel (HTTPS).</p>
<p></p>

<p></p><p><strong>Scenario: </strong>An online shopping platform has an insecure API endpoint for fetching product details. An attacker named Mike exploits this vulnerability by sending unauthorized requests to the API. Using a script, Mike retrieves sensitive information, including product prices, customer reviews, and inventory status.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use HTTPS and TLS/SSL certificates for secure communication.</li>
</p>

<p><li>Implement input validation and sanitization to ensure only safe data is accepted.</li>
</p>

<p><li>Employ strong authentication mechanisms like secure tokens or OAuth.</li>
</p>

<p><li>Store and manage API keys and sensitive information securely.</li>
</p>

<p><li>Implement proper error handling and message obfuscation to protect sensitive data.</li>
</p>

<p><li>Apply rate-limiting and throttling to prevent excessive API requests and potential DoS attacks.</li>
</p></ul>
<p></p>

<p></p><p><strong>#14: Resource exhaustion</strong></p>
<p></p>

<p></p><p>Resource exhaustion happens when a system lacks sufficient resources like capacity and memory, leading to system crashes and service disruption. Attackers exploit this vulnerability to deplete resources, causing system overload. </p>
<p></p>

<p></p><p><strong>Scenerio: </strong>by overwhelming a system with TCP SYN requests or exhausting program memory which affect customer-facing systems and essential services. They target CPU time, memory, disk capacity, and network utilization, rendering systems unresponsive or filling up state tables.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement measures such as resource monitoring, limitation, load balancing, rate limiting, intelligent resource allocation, secure coding practices, and attack detection and response</li>
</p></ul>
<p></p>

<p></p><p><strong>#15: Memory leak</strong></p>
<p></p>

<p></p><p>Memory management is the process of controlling and coordinating computer memory, allocating it to variables, and reclaiming it when it is no longer required. Memory leaks occur when allocated memory is not released once it is no longer in use. This can result in increased resource usage over time, potentially causing system instability. </p>
<p></p>

<p></p><p><strong>Scenario: </strong>A web-based app allows users to upload photographs, but a code issue prevents the allotted memory from being released once the images have been processed and stored. Memory accumulates without being released as users submit more photographs, resulting in a memory leak. As memory utilization increases, the application's resources are depleted, resulting in system instability or crashes.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement proper resource deallocation</li>
</p>

<p><li>Utilize automated memory management mechanisms</li>
</p>

<p><li>Conduct code reviews and testing.</li>
</p></ul>
<p></p>

<p></p><p><strong>#16 : Secure Sockets Layer (SSL) stripping(HTTP downgrade)</strong></p>
<p></p>

<p></p><p>SSL stripping is a man-in-the-middle attack against all SSL and early versions of TLS connections where an attacker downgrades a secure HTTPS connection to an insecure HTTP connection. By intercepting the traffic, the attacker can manipulate and read or modify the transmitted data. The reason the attack works is because the beginning of an SSL or TLS (v1.0 or v1.1) handshake is vulnerable to attack.<br /></p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Only use TLS 1.2 or 1.3 version</li>
</p>

<p><li>Enforce HTTPS connections</li>
</p>

<p><li>Educate users about secure connections</li>
</p></ul>
<p></p>

<p></p><p><strong>#17: Driver manipulation</strong></p>
<p></p>

<p></p><p><br />Drivers act as a bridge between the operating system and peripheral devices. Drivers may have less protection compared to other core system components but are still integral to its functioning. </p>
<p></p>

<p></p><p><strong>Shimming</strong>: A shim is an additional code that is placed between an application driver and the operating system to enable functionality that would otherwise be unavailable. It allows modifications between different OS versions without altering the original driver code, giving it flexibility and portability. Shimming can be exploited by malicious code to change the functionality of a driver without altering the driver itself.</p>
<p></p>

<p></p><p><strong>Refactoring</strong>: the practice of restructuring application code in order to improve its design and performance while retaining its original functionality. It can be used to improve code or to deal with certain scenarios. However, attackers can use refactoring to introduce illegal functionality to a driver while still allowing it to work normally. it is a Metamorphic malware that can appear different each time</p>
<p></p>

<p></p><p><strong>#18: Pass The Hash</strong></p>
<p></p>

<p></p><p>This is an attack in which the attacker takes hashed user credentials and uses them to authenticate on the same network or other systems without knowing the original password. This technique makes use of hashed passwords rather than plaintext passwords for authentication.</p>
<p></p>

<p></p><p><strong>Mitigation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Enforce strong password policies and implement the principle of least privilege </li>
</p>

<p><li>Implement network segmentation to isolate critical systems.</li>
</p>

<p><li>Minimize credential exposure and use centralized authentication.</li>
</p>

<p><li>Use multi-factor authentication (MFA) for an additional layer of security.</li>
</p>

<p><li>Implement privileged access management (PAM) solutions for secure management of privileged accounts.</li>
</p>

<p><li>Provide regular security awareness training to educate users and administrators.</li>
</p>

<p><li>Keep systems and software up to date with the latest patches.</li>
</p>

<p><li>Monitor for suspicious activities and use security tools for detection.</li>
</p></ul>
<p></p>

<p></p><blockquote><p></p>
<p></p><p></p>
</blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><strong>Time is what determines security. With enough time nothing is unhackable.</strong></p>
<cite><em><strong>Aniekee Tochukwu Ezekiel</strong></em></cite></blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>

]]></content:encoded></item><item><title><![CDATA[Sec+ 002: Types of Attacks|Malware, Password, Physical, AI, Supply-chain, Cloud-based vs. on-premises, Cryptographic Attacks]]></title><description><![CDATA[Ella was a diligent student who devoted most of her time to her studies. One day, she got an email with an appealing subject line: "Exclusive Study Tips!" She clicked on the email without hesitation since she was eager to learn new techniques to thri...]]></description><link>https://cyvally.com/sec-002-types-of-attacks</link><guid isPermaLink="true">https://cyvally.com/sec-002-types-of-attacks</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Mon, 29 May 2023 08:53:35 GMT</pubDate><content:encoded><![CDATA[
<p></p><p></p>
<p></p>

<p></p><p><strong>Ella was a diligent student who devoted most of her time to her studies. One day, she got an email with an appealing subject line: "Exclusive Study Tips!" She clicked on the email without hesitation since she was eager to learn new techniques to thrive academically. Ella had no idea she had stepped into a trap. The seemingly harmless email had concealed virus that quickly penetrated her computer and wreaked havoc on her files. Ella became terrified as she realized the repercussions of her rash click. She learned a vital lesson about risks of malware lurking in unexpected places with a heavy heart. She became a diligent defender of her digital assets from then on, always double-checking before clicking and arming herself with dependable antivirus software.</strong></p>
<p></p>

<p></p><p><strong>STAY TUNED!!!</strong></p>
<p></p>

<p></p><p><strong>1.1 What is a Malware?</strong></p>
<p></p>

<p></p><p>Malware, an abbreviation for "malicious software," is any software or code designed specifically to disrupt, damage, or gain unauthorized access to computer systems(for example by creating backdoors), networks, or devices. </p>
<p></p>

<p></p><p>It can manifest itself in a variety of ways and have implications, such as data theft, financial loss, system breakdowns, and unauthorized control. </p>
<p></p>

<p></p><p>It is frequently installed without the knowledge of authorized users.</p>
<p></p>

<p></p><p><strong>1.1.1 Types of Malware</strong></p>
<p></p>

<p></p><p>Each type of malware has distinct traits and goals, making it a continuing struggle for individuals and businesses to protect their digital environments. The types of Malware includes:</p>
<p></p>

<p></p><p><strong>#1: Virus</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Virus is malware that can <strong>replicate</strong> itself; it requires a user to run an application.</li>
</p>

<p><li>It attaches to legitimate applications or files and spread by infecting other files or systems.</li>
</p></ul>
<p></p>

<p></p><p><strong>TYPES</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li><strong>Macro Virus:</strong> Targets applications that use macros, such as Microsoft Office</li>
</p>

<p><li><strong>Boot Sector Virus: </strong>Infect the boot sector of storage devices(Such as hard drives or floppy disks) </li>
</p>

<p><li><strong>Multipartite Virus:</strong> Infect both files and the boot sector.</li>
</p>

<p><li><strong>Program Virus: </strong>Affects executable files or programs; it is a component of the application.</li>
</p>

<p><li><strong>Script Virus:</strong>  Preys on script files created scripting languages. It is browser- and operating system-based.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use Antivirus Software and Keep Software Updated</li>
</p>

<p><li>Regularly Back Up Your Data</li>
</p></ul>
<p></p>

<p></p><p><strong>#2: Ransomware</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Ransomware is a type of attack that <strong>encrypts files</strong> on a system, rendering them inaccessible until a ransom payment is made, either permanently as a denial of service or temporarily, giving rise to its name.</li>
</p>

<p><li> It can drastically disrupt business operations and result in financial loss.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Back up your important files on a regular basis to an offline or cloud storage location.</li>
</p>

<p><li>Use strong security measures, such as behavior-based detection, to detect and prevent ransomware attacks.</li>
</p>

<p><li>Enable security software's ransomware-specific capabilities, such as ransomware file protection.</li>
</p>

<p><li>Keep Everything up-to-date(Operating System, software, antivirus/antimalware signatures)</li>
</p></ul>
<p></p>

<p></p><p><strong>#3: Trojans</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Trojans are malware that <strong>masquerades</strong> as genuine applications or files. </li>
</p>

<p><li> This form of malware does not ask for permission to install and is purposefully designed to run without detection but it must be "brought inside" the system by an authorized user.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Be cautious when downloading and installing software and when opening email attachments.</li>
</p>

<p><li>Update your system and programs with the most recent security fixes.</li>
</p>

<p><li>Use trustworthy antivirus software with Trojan detection and removal capabilities.</li>
</p></ul>
<p></p>

<p></p><p><strong>#4: Worms</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Worms are <strong>self- replicating</strong> programs that spread fast <strong>without the user's authorization or intervention</strong> by hiding within the executable code of another process. </li>
</p>

<p><li>They are programs designed to infiltrate networks and computer systems, utilize the network as their transmission medium, potentially consuming network bandwidth and causing system slowdowns.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Keep your operating system and software up to date with the most recent security patches.</li>
</p>

<p><li>To prevent unwanted access to network devices, use strong and unique passwords.</li>
</p>

<p><li>To prevent worms from spreading throughout your network, use network segmentation and firewall setups.</li>
</p>

<p><li>Implement Firewalls and IDS/IPS</li>
</p></ul>
<p></p>

<p></p><p><strong>#5: Potentially unwanted programs (PUPs)</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>PUPs are Software that are <strong>not wanted</strong>, not chosen or desired by the user and Often installed along with other software</li>
</p>

<p><li>They can exhibit undesirable traits such as slowing down your PC, bombarding you with annoying ads, adding toolbars that consume browsing space, and collecting personal information.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Before installing software, be cautious and read the terms and conditions.</li>
</p>

<p><li>Review and uninstall unwanted or questionable applications on a regular basis.</li>
</p>

<p><li>Utilize anti-virus software with PUP detection and eradication capabilities</li>
</p></ul>
<p></p>

<p></p><p><strong>#6: Fileless virus</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Fileless virus is a <strong>Stealth virus</strong> that employ various techniques to conceal their presence and activities from antivirus software; therefore, it is difficult to identify.</li>
</p>

<p><li>it is malware that functions entirely in memory, never touching the filesystem.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use behavior-based detection algorithms to detect and prevent fileless malware.</li>
</p>

<p><li>Keep your operating system and programs up to date to reduce the chances of fileless malware exploiting vulnerabilities.</li>
</p>

<p><li>Install security systems capable of detecting and responding to memory-based attacks.</li>
</p></ul>
<p></p>

<p></p><p><strong>#7: Command and control</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>C&amp;C involves infected systems, known as bots or zombies, connecting with an <strong>attacker-controlled</strong> central server. </li>
</p>

<p><li>The command and control server functions as a command and control center, allowing the attacker to remotely manipulate infected devices, issue commands, receive data, and coordinate harmful activities.  </li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use network monitoring tools to detect and prevent communication between infected systems and C&amp;C servers.</li>
</p>

<p><li>Install intrusion detection and prevention systems to detect and prevent C&amp;C traffic.</li>
</p>

<p><li>Use security systems with C&amp;C detection capabilities.</li>
</p></ul>
<p></p>

<p></p><p><strong>#8: Bots</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>A bot is a piece of software that performs a task while being <strong>controlled by another program</strong>. </li>
</p>

<p><li>A botnet (combining "bot" and "network") is a group of bots that are controlled across the network. </li>
</p>

<p><li>Botnets are networks of infected computers, commonly referred to as bots or zombies, and operate under the command and control (C&amp;C) of a centralized server and are frequently utilized for coordinated attacks like distributed denial-of-service (DDoS) attacks or the dissemination of spam emails.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>To remove bots, scan and clean affected systems on a regular basis.</li>
</p>

<p><li>Use IDS/IPS to detect and prevent bot-related activity.</li>
</p>

<p><li>Keep your antivirus and antimalware software updated, along with regularly applying patches and updates to your operating system and applications.</li>
</p></ul>
<p></p>

<p></p><p><strong>#9: Cryptomalware</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Crypto-malware, a class of ransomware, encompasses one type that aims to <strong>encrypt data</strong> files on fixed, removable, and network drives, while another type <strong>hijacks the host's resources</strong> for cryptocurrency mining, known as crypto-mining or cryptojacking.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Back up your crucial files on a regular basis to an offline or cloud storage location.</li>
</p>

<p><li>Use powerful anti-malware solutions that include ransomware protection features.</li>
</p>

<p><li>When opening email attachments and visiting questionable websites, use caution.</li>
</p></ul>
<p></p>

<p></p><p><strong>#10: Logic bombs</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>logic bombs are harmful software that is <strong>installed on purpose</strong>, usually by an authorized user.</li>
</p>

<p><li>Logic bombs, which are pieces of code that lie dormant until triggered by an event or specific date to execute their malicious payload, are challenging to detect as they are often installed by authorized users, particularly administrators responsible for security.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>To discover and block logic bombs, use renowned security software that includes behavior-based detection.</li>
</p>

<p><li>Implement separation of duties </li>
</p>

<p><li>Scan systems on a regular basis for malicious programs and irregularities in system behavior.</li>
</p>

<p><li>To reduce the risk of unauthorized code execution, implement rigorous access controls and user privilege management.</li>
</p>

<p><li>Maintain an active backup program </li>
</p></ul>
<p></p>

<p></p><p><strong>#11: Spyware</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Spyware is software that "spies" on users by monitoring, recording, and reporting on their activities.</li>
</p>

<p><li>Spyware discreetly collects information on a user's activity, such as browsing habits, keystrokes and login passwords. </li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Have and updated anti-virus / anti-malware</li>
</p>

<p><li>Have and perform regular backups</li>
</p>

<p><li>Perform regular security scan</li>
</p></ul>
<p></p>

<p></p><p><strong>#12: Adware</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li> Adwares are software that shows excessive and unwanted adverts on a user's machine.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use Ad Blockers and Regularly Clear Browser Cache and Cookies</li>
</p>

<p><li>When installing new software, read the license agreements</li>
</p>

<p><li>To prevent pop-up windows and the acquisition of unneeded personal information, change the privacy settings in your online browsers and programs.</li>
</p></ul>
<p></p>

<p></p><p><strong>#13: Keyloggers</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is a piece of software that records every keystrokes entered by a user. </li>
</p>

<p><li>Keyloggers are not always evil; for example, Microsoft Word might be considered a keylogger.  </li>
</p>

<p><li>Keyloggers are used by hackers to steal passwords and other sensitive information, allowing them to utilize these secrets to behave as the user without the user's consent.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Consider using a virtual keyboard or keystroke encryption software</li>
</p>

<p><li>Install reputable antivirus and antimalware software on your devices and keep them updated. These security tools can detect and block keyloggers from infecting your system. </li>
</p>

<p><li>Regularly scan your computer for malware to ensure early detection and removal.</li>
</p></ul>
<p></p>

<p></p><p><strong>#14: Remote access Trojan (RAT)</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>RAT provides unauthorized remote access and control over a victim's computer or network</li>
</p>

<p><li>It is guided by an operator to cause much more long-term damage.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Keep anti-virus/anti-malware signatures and software updated</li>
</p>

<p><li>Always have a backup</li>
</p>

<p><li>Employ Network Segmentation to contain the impact of a RAT and prevent it from spreading to other parts of the network.</li>
</p>

<p><li>Don’t run unknown software</li>
</p></ul>
<p></p>

<p></p><p><strong>#15: Rootkit</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Rootkits are a type of malware that is expressly designed to alter the operation of the <strong>operating system</strong> in some way to allow for nonstandard functionality.</li>
</p>

<p><li>Rootkits are classified into five types: firmware, virtual, kernel, library, and application level.</li>
</p>

<p><li>It is named after the "root" account, which has full administrative privileges on Unix-like systems.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use Rootkit Detection Tools and Perform Full System Scans</li>
</p>

<p><li>When a rootkit is discovered, it must be removed and cleaned up or reimage the machine using a previously obtained clean system image rather than attempting to establish the depth and breadth of the damage and attempting to repair individual files.</li>
</p>

<p><li>Perform Secure boot with UEFI</li>
</p></ul>
<p></p>

<p></p><p><strong>#16: Backdoor </strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>A backdoor is a concealed entry point placed into a system or software application that provides illegal remote access and control. </li>
</p>

<p><li>It allows attackers to bypass standard authentication procedures and gain privileged access to a compromised system. </li>
</p>

<p><li>Developers may intentionally incorporate backdoors for legitimate purposes like system management or troubleshooting, making them challenging to detect and remove due to their hidden nature and evasion of security measures.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Perform regular Security Assessments, Auditing and Monitoring</li>
</p>

<p><li>Use strong, unique passwords, Implement multi-factor authentication (MFA).</li>
</p>

<p><li>Limit User Privilege</li>
</p>

<p><li>Train employees about the risks of social engineering and other methods used to introduce backdoors. Encourage them to be vigilant and report any suspicious activity.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>1.2 Types of Password Attacks</strong></p>
<p></p>

<p></p><p>When a user selects a password, a cryptographic function such as MD5 or SHA is employed to generate a hash of the password. This means that no one (including the system administrator) should be able to decrypt the plaintext of the password from the hash.</p>
<p></p>

<p></p><p><strong>#1: Password Spraying</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Password spraying is a type of attack in which a small number of regularly used passwords are systematically tried over a large number of accounts, taking the opposite approach to brute force.</li>
</p>

<p><li>When designated number of passwords are used to target an account, if none of them succeed, the attacker continues on to the next account without triggering account lockouts, alarms, or notifications.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Implement strong password policies, encourage or enforce multi-factor authentication (MFA), set up account lockout policies, educate users about secure password practices, and deploy IDS/IPS.</li>
</p></ul>
<p></p>

<p></p><p><strong>#2: Dictionary</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>A dictionary attack is a type of password attack in which an attacker attempts a large number of words or phrases from a dictionary as potential passwords in order to gain unauthorized access to a system or account.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>To defend against dictionary attacks, strong and unique passwords, along with multi-factor authentication, should be used.</li>
</p></ul>
<p></p>

<p></p><p><strong>#3: Brute force</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Bruteforce is a type of password attack that Tries every possible password combination until a hash is matched in order to gain unauthorized access to a single account.</li>
</p>

<p><li>it can be online or offline</li>
</p></ul>
<p></p>

<p></p><p><strong>Online</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An online password attack involves the threat actor directly interacting(in real time) with the authentication service, such as a web login form or VPN gateway, by submitting passwords either from a database of known passwords or through offline cracking; this type of attack is slow and can be identified in audit logs by patterns of repeated failed logon attempts followed by a successful logon, or successful logons occurring at unusual times or locations.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>System response times, bandwidth restrictions, and security measures in place may be able to reduce the effectiveness of such attacks</li>
</p>

<p><li>Organizations can establish strong password rules, account lockouts, limiting rate of logons, intrusion detection systems, and encourage user education on password security and multi-factor authentication to guard against online brute force assaults.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Offline</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An offline attack occurs when an attacker acquires a database of password hashes and uses a password cracker to decrypt them without interacting with the authentication mechanism. The only indication of such an attack, aside from potential account misuse in case of success, is a file system audit log that records the unauthorized account accessing these files.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Organizations should use strong encryption algorithms, salt password hashes, and use key stretching techniques to protect against offline brute force attacks.</li>
</p>

<p><li> Users should adhere to established practices for password security, such as creating strong, one-of-a-kind passwords, and setting up multi-factor authentication.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>#4: Rainbow table</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Rainbow tables are hash values or precomputed tables connected with passwords. </li>
</p>

<p><li>Hashes are saved and an attacker can search/lookup to find passwords</li>
</p>

<p><li>passwords can be found faster</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Salted hashes are the best defense against rainbow tables because the inclusion of a salt value raises the difficulty of the problem by making the precomputing process unreplicable across computers.</li>
</p>

<p><li> A salt is simply a random collection of characters used to lengthen the item being hashed, effectively making rainbow tables too large to compute.</li>
</p></ul>
<p></p>

<p></p><p><strong>#5: Plaintext/unencrypted</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Password storage or a network authentication technique that doesn't use encryption are both targets of a plaintext/unencrypted attack. PAP, fundamental HTTP/FTP authentication, and Telnet are a few examples.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Use of these unencrypted protocols should be restricted. </li>
</p>

<p><li>Never store a password to an unsecured file.</li>
</p></ul>
<p></p>

<p></p><p><strong>1.3 Types of Physical attacks</strong></p>
<p></p>

<p></p><p>Physical attacks are physical attempts to obtain illegal access or compromise systems. These attacks target physical infrastructure or devices rather than software or network weaknesses. The types of physical attacks includes:</p>
<p></p>

<p></p><p><strong>#1: Malicious Universal Serial Bus (USB) cable</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>It appears to be a typical USB cable, however, it contains additional electronics. It is recognized as a HID (Human Interface Device) by an operating system. </li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>PROTECTION</strong>:  Don't just plug in any USB cable; always use trusted hardware.</p>
<p></p>

<p></p><p><strong>#2: Malicious flash drive</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Malicious flash drives have capabilities that can pose security risks if connected to a computer. They can act as a HID/Keyboard to execute commands, load malware in documents, be configured as boot devices for infecting the computer upon reboot, redirect or modify internet traffic requests, and function as wireless gateways. </li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>PROTECTION</strong>: To mitigate these risks, it is crucial to never connect untrusted USB devices to a computer. This precaution helps protect against potential malicious activities associated with flash drive capabilities.</p>
<p></p>

<p></p><p><strong>#3: Card cloning</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>This is Physically copying a smart card to duplicate it.</li>
</p>

<p><li>Making one or more duplicates of an existing card. A card that has been lost or stolen and has no cryptographic protections can be physically replicated. </li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>PROTECTION:</strong> Card loss should be notified as soon as possible so that the card can be canceled and a new one issued.</p>
<p></p>

<p></p><p><strong>#4: Skimming</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Skimming devices are physical devices designed to intercept credit card information. These devices are attached to credit card readers and steal data from the card before sending it on to the legal reader. Skimmers can collect all of the information from the card's magnetic strip as well as the PIN being entered, allowing a clone to be created.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION</strong>: Be vigilant with ATMs and payment terminals, Use secure payment methods, Protect your PIN, and Educate yourself and stay informed.</p>
<p></p>

<p></p><p><strong>1.4 Adversarial artificial intelligence (AI)</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Attackers can leverage artificial intelligence (AI) to identify security system vulnerabilities and exploit attack vectors, and they may also utilize AI to evade detection by security mechanisms, enabling the execution of attacks like phishing.</li>
</p></ul>
<p></p>

<p></p><p><strong>Tainted training data for machine learning (ML):</strong> Machine learning (ML) is a method to artificial intelligence (AI) that entails training a detection model using sample data. One of its shortcomings is its dependency on a training data set. The quality of the training data has a significant impact on the ML model's performance. Attackers can abuse machine learning systems by tainting the training data. </p>
<p></p>

<p></p><p><strong>PROTECTION</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>preserve an ML algorithm's parameters to maintain its effectiveness and security.</li>
</p></ul>
<p></p>

<p></p><p><strong>1.5 Supply-chain attacks</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>The network of vendors that provides the materials for something to be built is referred to as a supply chain. .</li>
</p>

<p><li>Supply-chain attacks compromise systems and obtain unauthorized access by targeting the software or hardware supply chain. </li>
</p>

<p><li>Attackers take advantage of flaws in trusted third-party suppliers or components to introduce malicious malware or backdoors into goods. These compromised products are subsequently distributed to targets, allowing the attackers to exploit them unnoticed.</li>
</p>

<p><li>Supply-chain attacks are difficult to detect and resist because they prey on faith in reliable providers.</li>
</p></ul>
<p></p>

<p></p><p><strong>PROTECTION </strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Organizations must establish strong security measures such as supplier verification, safe development procedures, and continuing supply chain monitoring.</li>
</p></ul>
<p></p>

<p></p><p><strong>1.6</strong> <strong>Cloud-based vs. on-premises attacks</strong></p>
<p></p>

<p></p><p><strong>Cloud-based attacks </strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Flaws in cloud infrastructure and services are used to target vulnerabilities in cloud computing environments. </li>
</p>

<p><li>Data is stored in a secure environment; there is no physical access to the data center; third-party access to the data is possible.</li>
</p>

<p><li>Cloud providers handle large-scale security; automated signature and security upgrades</li>
</p>

<p><li>There is minimal downtime, extensive fault tolerance, and round-the-clock monitoring</li>
</p>

<p><li>There is scalable security choices and security deployments are achieved with a single click</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>On-premises attacks</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>It occurs within the physical infrastructure of a company and target internal systems and network infrastructure.  </li>
</p>

<p><li>You can customize your security posture since you have complete control when everything is in-house.</li>
</p>

<p><li>Your local team ensures uptime and availability, and system checks can be performed at any time. </li>
</p>

<p><li>Security changes can be time-consuming, requiring new equipment, settings, and additional expenditures.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>1.7 Types of Cryptographic attacks</strong></p>
<p></p>

<p></p><p><strong>Birthday</strong>: The purpose of a birthday attack is to take advantage of collisions in hash algorithms. It is an attack that takes use of flaws in the mathematical formulas used to encrypt passwords and the likelihood that different password inputs will result in the same encrypted output.</p>
<p></p>

<p></p><p><strong>Collision</strong>: A collision attack occurs when two different inputs result in the identical output of the hash function.</p>
<p></p>

<p></p><p><strong>Downgrade</strong>: the use of a cryptographic attack to force a computer system to switch from using encrypted messages to plaintext messages by taking advantage of the requirement for backward compatibility. By demanding that the server use a lower specification protocol with weaker ciphers and key lengths, a downgrade attack can be used to facilitate a man-in-the-middle attack. </p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><strong>“My message for companies that think they haven’t been attacked is: “You’re not looking hard enough”</strong></p>
<cite><em><strong>James Snook</strong></em></cite></blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>1.8 Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>

]]></content:encoded></item><item><title><![CDATA[Sec+ #001: Different types of Social Engineering Techniques]]></title><description><![CDATA[Marvin’s Phone rings and he picks it up. Hello?


Scammer: Good afternoon Mr. Marvin, this is Kelvin from the security department of your bank. We've observed some suspicious behavior on your account and need your help right away to remedy the proble...]]></description><link>https://cyvally.com/sec-001-different-types-of-social-engineering-techniques</link><guid isPermaLink="true">https://cyvally.com/sec-001-different-types-of-social-engineering-techniques</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sun, 21 May 2023 12:44:07 GMT</pubDate><content:encoded><![CDATA[
<p></p><p><em><strong>Marvin’s Phone rings and he picks it up. Hello?</strong></em></p>
<p></p>

<p></p><p><strong>Scammer:</strong> Good afternoon Mr. Marvin, this is Kelvin from the security department of your bank. We've observed some suspicious behavior on your account and need your help right away to remedy the problem. </p>
<p></p>

<p></p><p><strong>Marvin:</strong> Oh, you're serious? What kind of activity are we discussing?</p>
<p></p>

<p></p><p><strong>Scammer:</strong> Mr. Marvin, we suspect unauthorized access to your account. Many of our valued customers have faced similar issues recently, but we were able to resolve them by generating a One-Time Password (OTP) to validate their account ownership. It will be delivered to your phone, and I will guide you through the steps. </p>
<p></p>

<p></p><p><strong>Marvin:</strong> Okay, Just let me know what I need to do.</p>
<p></p>

<p></p><p><strong>Scammer: </strong>Please provide the OTP just sent to your phone.</p>
<p></p>

<p></p><p><strong><em>Marvin provides the OTP to the scammer(caller)</em></strong></p>
<p></p>

<p></p><p><strong>Scammer:</strong> You've done an excellent job. For security reasons, we must now check a few additional details. Please confirm your birth date and the last four digits Debit Card. </p>
<p></p>

<p></p><p><strong>Marvin: </strong>Sure, my birth date is (<em>provides details</em>), and the final four digits of my Debit Card are(<em>provides details</em>). </p>
<p></p>

<p></p><p><strong>Scammer:</strong> Thank you so much. Your account has been secured, and we thank you for your assistance. Is there anything else I can do for you today? </p>
<p></p>

<p></p><p><strong>Marvin: </strong>No, Thank you.</p>
<p></p>

<p></p><p>Marvin hangs up, unaware of the scammer's deception. Days later, he checks his bank account and discovers that it has been fully drained. In this terrible scenario, Marvin falls prey to the social engineering fraud, unintentionally providing the scammer with his OTP and personal information. His discovery comes too late, as his bank account has been fully wiped. OUCH!!!</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Sit back, relax, and sip your favorite drink as I take you on a delightful adventure!!!</strong></p>
<p></p>

<p></p><p><strong>1.1</strong> <strong>What is Social Engineering?</strong></p>
<p></p>

<p></p><p>The term "<strong>social engineering</strong>" refers to a variety of strategies used to "<strong>compel</strong>" people into disclosing information or acting on behalf of a threat actor. Social engineering is a type of attack that primarily targets Humans. It frequently involves some type of social connection and capitalizes on positive characteristics such as a willingness to help others. It's also known as "<strong>hacking the human</strong>"</p>
<p></p>

<p></p><p><strong>1.2 Social Engineering Techniques</strong></p>
<p></p>

<p></p><p>Social engineering attacks can take many different forms and can be carried out everywhere there is human interaction. The most popular types of social engineering techniques are as follows.</p>
<p></p>

<p></p><p><strong>#1:</strong> <strong>Phishing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Phishing involves deceiving victims into disclosing sensitive information through the fraudulent use of email.</li>
</p>

<p><li>It often poses as a reliable source, such as a reputable organization, to obtain personal information.</li>
</p>

<p><li>This technique combines social engineering with spoofing to create the appearance of a legitimate entity to manipulate the target.</li>
</p>

<p><li><strong>NEVER CLICK A LINK IN AN EMAIL</strong>; rather, go directly to the website</li>
</p></ul>
<p></p>

<p></p><p><strong>#2: Smishing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Smishing, a phishing variant, uses SMS text messages to trick victims into disclosing critical information.  </li>
</p>

<p><li>The attack starts with an SMS message that directs the user to a URL that acts as a platform for multiple attack vectors, including potentially malware-infected content.</li>
</p></ul>
<p></p>

<p></p><p><strong>#3: Vishing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Vishing includes manipulating human relationships via phone calls or IP-based voice messaging services (VoIP) to collect sensitive information.</li>
</p>

<p><li>The channel for this approach, also known as voice phishing, is voice communication technology.</li>
</p></ul>
<p></p>

<p></p><p><strong>#4: Spam</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Spams are unsolicited emails, sometimes known as junk email. </li>
</p>

<p><li>Spam is a social engineering approach that involves delivering unsolicited and false messages to recipients to manipulate them.</li>
</p>

<p><li>Its goal is to dupe people into acting or disclosing critical information. </li>
</p>

<p><li>Spammers take advantage of human vulnerabilities by mimicking reputable sources and employing psychological techniques</li>
</p></ul>
<p></p>

<p></p><p><strong>#5: SPIM </strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>SPIM, often known as spam via instant messaging, involves the unsolicited distribution of deceptive and unwanted messages via instant messaging platforms. </li>
</p>

<p><li>These messages frequently include malicious links or attempts to collect personal information.</li>
</p></ul>
<p></p>

<p></p><p><strong>#6: Spear phishing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Spear phishing is a word used to describe a phishing attempt that targets a specific person or group of people who have a common trait.</li>
</p>

<p><li>It is a type of phishing that uses email or the internet to target specific persons.</li>
</p>

<p><li>It is a phishing scam in which the attacker possesses information that makes a certain victim more likely to be fooled by the attack. </li>
</p>

<p><li>Targeted phishing messages, customized to individual users and incorporating inside information, enhance the attack's credibility.</li>
</p></ul>
<p></p>

<p></p><p><strong>#7: Dumpster diving</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Dumpster diving involves sorting through discarded or disposed materials from an organization or individual to find valuable papers or possibly sensitive information.</li>
</p>

<p><li>It is the technique of searching through trash or abandoned removable media for usable data that can be abused during a penetration attempt.</li>
</p></ul>
<p></p>

<p></p><p><strong>#8: Shoulder surfing</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Shoulder surfing is a technique to watch someone enter in their sensitive information such as password or PIN and then steal it. </li>
</p>

<p><li>Despite the name, the attacker may not even need to be close to the target, they could utilize CCTV or powerful binoculars to view the victim directly from a distance.</li>
</p>

<p><li>Use privacy filters to prevent shoulder surfing</li>
</p></ul>
<p></p>

<p></p><p><strong>#9: Pharming</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Pharming is a type of impersonation attack in which customers are directed from a legitimate website to a fake website with a similar appearance. </li>
</p>

<p><li>Pharming can be accomplished through two methods: poisoning DNS servers or exploiting vulnerabilities in clients.</li>
</p>

<p><li>Pharming, unlike other forms of social engineering, utilizes a passive method that manipulates the victim's computer's DNS process, resulting in users being redirected from legitimate websites to malicious ones.</li>
</p></ul>
<p></p>

<p></p><p><strong>#10: Tailgating</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Tailgating, also known as piggybacking, is a social engineering technique that involves closely following an authorized individual to gain unauthorized access to a secure area. </li>
</p>

<p><li>The attacker uses this approach to take advantage of someone who has properly opened a door or passed through a checkpoint using their access card or PIN.</li>
</p></ul>
<p></p>

<p></p><p><strong>#11: Eliciting information</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Elicitation of information is a technique of social engineering that entails influencing people to reveal sensitive information. </li>
</p>

<p><li>It necessitates the development of trust, the establishment of rapport, and the utilization of human psychology.</li>
</p>

<p><li>Often Performed via vishing</li>
</p></ul>
<p></p>

<p></p><p><strong>#12: Whaling</strong></p>
<p></p>

<p></p><p><em>Studies show that "The blue whale (Balaenoptera musculus) holds the title for being the largest animal on Earth"</em></p>
<p></p>

<p></p><ul><p></p>
<p><li>Whaling, also known as CEO spear phishing, is a type of phishing that specifically targets senior executives or rich individuals. </li>
</p>

<p><li>It is aimed primarily at upper-level management inside a firm, such as CEOs and other high-profile persons deemed "big fish" targets.</li>
</p></ul>
<p></p>

<p></p><p><strong>#13: Prepending</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Prepending is a social engineering method in which an attacker inserts specified characters or phrases into the beginning of a website's URL to fool users.</li>
</p>

<p><li>The attacker's goal in changing the URL is to establish a false sense of confidence and deceive victims into disclosing sensitive information. </li>
</p>

<p><li>In the case of cyvally.com, for example, an attacker may establish a malicious URL such as "login.cyvally.com" to trick users into submitting their credentials. </li>
</p>

<p><li>To defend themselves from social engineering attempts, users must be cautious and validate the entire URL.</li>
</p></ul>
<p></p>

<p></p><p><strong>#14: Identity fraud</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Identity theft is a type of impersonation in which an attacker creates or unlawfully obtains and uses another person's personal information. </li>
</p>

<p><li>It makes use of certain details from a person's identification. </li>
</p>

<p><li>Credential databases (<a href="https://haveibeenpwned.com/" target="_blank">haveibeenpwned.com</a>) allow individuals to check if their personal information, such as email addresses or usernames, has been compromised in data breaches.</li>
</p></ul>
<p></p>

<p></p><p><strong>#15: Invoice scams</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An invoice scam, also referred to as invoice fraud or business email compromise, tricks individuals or organizations into making false payments or disclosing sensitive financial information.</li>
</p>

<p><li>Attackers create fake invoices or mimic legitimate payment requests to deceive victims into transferring funds to their own accounts.</li>
</p>

<p><li>To protect against invoice scams, it is crucial to establish robust verification systems and educate staff about the risks associated with fraudulent payment requests.</li>
</p></ul>
<p></p>

<p></p><p><strong>#16: Credential harvesting</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Credential harvesting is a social engineering technique used to obtain sensitive user credentials, such as usernames and passwords. </li>
</p>

<p><li>The credentials obtained are valuable for unauthorized account access and can lead to identity theft and financial crime. </li>
</p>

<p><li>To protect against credential harvesting, verify the legality of requests, use strong passwords and multi-factor authentication, keep software up to date, and educate users about the risk involved with this technique</li>
</p></ul>
<p></p>

<p></p><p><strong>#17: Reconnaissance</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Reconnaissance refers to gathering information regarding a target to uncover vulnerabilities and prepare effective attacks.</li>
</p>

<p><li>To get important information, attackers employ a variety of techniques such as open-source intelligence, other social engineering techniques, and physical surveillance.</li>
</p>

<p><li>Reconnaissance assists attackers in creating profiles of their targets, understanding their behavioral patterns, and developing specialized social engineering strategies.</li>
</p></ul>
<p></p>

<p></p><p><strong>#18: Hoax</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>It is a threat that doesn't genuinely exist</li>
</p>

<p><li>Hoax refers to a deceptive scheme intended to manipulate individuals for personal gain. </li>
</p>

<p><li>Social engineers employ hoaxes to distribute false information, invent scenarios, or fool targets to elicit specific behaviors or obtain sensitive information.</li>
</p>

<p><li>To avoid falling prey to social engineering hoaxes, it is vital to use critical thinking, and skepticism, and verify information sources.</li>
</p></ul>
<p></p>

<p></p><p><strong>#19: Impersonation</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Impersonation entails claiming to be someone else, usually a trustworthy entity, to deceive and manipulate people for personal gain.</li>
</p>

<p><li>To gain the target's trust, social engineers adopt the identity or persona of a colleague, authority figure, or trusted organization.</li>
</p></ul>
<p></p>

<p></p><p><strong>#20: Watering hole attack</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Watering hole attack occurs when an attacker identifies specific groups or organizations, learns which websites they visit, and injects malicious code into those websites. </li>
</p>

<p><li>It is another passive strategy in which the threat actor does not have to risk direct communication with the target.</li>
</p>

<p><li>To prevent, Apply Defense-in-depth mechanism, Firewalls and IPS, Anti-virus/Anti-malware</li>
</p></ul>
<p></p>

<p></p><p><strong>#21: Typosquatting</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Typosquatting, also known as URL hijacking in which an attacker registers a domain name with a frequent misspelling of an existing domain so that when a user enters a URL into a browser, they are directed to the attacker's website.</li>
</p>

<p><li>This means that the threat actor registers a domain name that is extremely close to a legitimate one.</li>
</p>

<p><li>For instance, "cyvally.com" could be used as a typosquatting domain for "cyvalley.com."</li>
</p></ul>
<p></p>

<p></p><p><strong>#22: Pretexting</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>Pretexting is a social engineering method that entails fabricating a fictitious scenario or identity to fool others and obtain sensitive information from them.</li>
</p>

<p><li>To acquire the target's trust and persuade them to disclose confidential data, attackers employ elaborate stories or mimic trusted persons.</li>
</p></ul>
<p></p>

<p></p><p><strong>#23: Influence campaigns</strong></p>
<p></p>

<p></p><ul><p></p>
<p><li>An influence campaign is a well-planned effort by a highly capable institution, such as a nation-state or terrorist organization, to influence public opinion on a certain topic. </li>
</p>

<p><li>These campaigns frequently employ a mix of tactics, such as espionage, disinformation, hacking, and the exploitation of social media platforms. </li>
</p>

<p><li>The goal is to change people's perceptions and impact public debate in support of the campaign's goals.</li>
</p></ul>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>1.3 Principles (reasons for effectiveness)</strong> <strong>of Social Engineering</strong></p>
<p></p>

<p></p><p>Social engineering is a popular and successful malevolent technique. Because it takes advantage of basic human trust, social engineering has shown to be a particularly effective means of persuading individuals to perform behaviors they would not otherwise perform. Social engineering attacks must adhere to one or more of the following principles to be effective. Using the scenario above, Principles of Social Engineering are: </p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>Authority</strong>: This is using a position of power or competence to acquire the target's trust and compliance. </p>
<p></p>

<p></p><p>Using the idea of authority, the scammer appears as a representative from Marvin's bank's security department. The scammer obtains Marvin's trust and cooperation by claiming to have the competence and power to remedy the alleged issue.</p>
<p></p>

<p></p><p><strong>Intimidation</strong>: This is the use of fear or threats to pressure the target into doing specific tasks or disclosing sensitive information. </p>
<p></p>

<p></p><p>By highlighting unusual activity on Marvin's account, the scammer generates a sense of urgency and fear. This intimidating strategy is intended to make Marvin more receptive to the scammer's instructions without questioning them.</p>
<p></p>

<p></p><p><strong>Consensus</strong>: This is influencing the target by evidence that others have already taken the desired action. </p>
<p></p>

<p></p><p>The scammer achieves consensus by telling Marvin that his help is required to remedy the security issue. By insinuating that other customers have also been affected, the fraudster hopes to make Marvin believe that his actions are consistent with those of others.</p>
<p></p>

<p></p><p><strong>Scarcity</strong>: This is in order to motivate prompt compliance and create a sense of limited supply or urgency.</p>
<p></p>

<p></p><p> By emphasizing the necessity for fast action, the scammer creates a sense of scarcity. The scammer instills anxiety in Marvin by claiming that his account is at jeopardy and demands the One-Time Password (OTP) without delay, prompting Marvin to supply the needed information swiftly.</p>
<p></p>

<p></p><p><strong>Familiarity</strong>: Creating a connection or relationship with the target through the use of shared experiences or personal information. </p>
<p></p>

<p></p><p>The scammer addresses Marvin by name, bringing a personal touch to the interaction. The scammer seeks to establish a connection and build confidence in this manner, making Marvin more inclined to agree with the scammer's requests.</p>
<p></p>

<p></p><p><strong>Trust</strong>: Deception and manipulation are used to instill trust and reliance in the attacker. </p>
<p></p>

<p></p><p>The scammer earns Marvin's trust by impersonating a bank official, exhibiting knowledge of Marvin's personal information, and assuring him that the activities are required for account protection. Because of this trust, the scammer is able to obtain crucial information from Marvin without raising suspicions.</p>
<p></p>

<p></p><p><strong>Urgency</strong>: Creating a time-sensitive situation that forces the target to respond fast and without careful thought. </p>
<p></p>

<p></p><p>The scammer instills a sense of urgency by claiming that quick action is required to remedy the purported security threat. The scammer puts pressure on Marvin to supply the sought information immediately by emphasizing the need for collaboration and prompt response.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p>These principles of social engineering collectively contribute to the success of the scam, as Marvin falls victim to the deception and unknowingly provides the scammer with the necessary information to drain his bank account. It serves as a reminder of the importance of being vigilant and cautious when dealing with requests for personal information, especially in situations involving authority, urgency, and unfamiliar or unexpected interactions.</p>
<p></p>

<p></p><p></p>
<p></p>

<p></p><blockquote><p></p>
<p></p><p><strong>"Social engineering is a dance of trust and deceit, where the attacker leads and the victim follows, unaware of the dangerous steps they are taking." </strong></p>
<cite><em><strong>- Brian Krebs</strong></em></cite></blockquote>
<p></p>

<p></p><p></p>
<p></p>

<p></p><p><strong>1.4</strong> <strong>Review Questions</strong></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><p></p>
<p></p>

<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><div class="wp-block-jetpack-contact-form">
<p></p>




</div>


<p></p><p></p>
<p></p>
]]></content:encoded></item><item><title><![CDATA[Cybersec Base #008:Careers in Cybersecurity| Required skills and Certifications]]></title><description><![CDATA[Jack had grown up watching movies and TV shows that portrayed hackers and cybersecurity professionals as dark, enigmatic people wearing hoods and tapping furiously on computers in darkly lit rooms. These pictures stayed with him throughout the years,...]]></description><link>https://cyvally.com/cyberbase-008careers-in-cybersecurity-required-skills-and-certifications</link><guid isPermaLink="true">https://cyvally.com/cyberbase-008careers-in-cybersecurity-required-skills-and-certifications</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sun, 30 Apr 2023 20:06:45 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1740241732593/db7e8cff-f740-42a9-985a-ddd9b811defc.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Jack had grown up watching movies and TV shows that portrayed hackers and cybersecurity professionals as dark, enigmatic people wearing hoods and tapping furiously on computers in darkly lit rooms. These pictures stayed with him throughout the years, and when he first heard of cybersecurity as a career choice, he couldn't help but think of those Hollywood depictions. Jack started to think that maybe he didn't have what it takes to be a cybersecurity professional. He didn't have a hoodie and certainly didn't know millions of commands. He began to doubt himself and his abilities. But one day, he came upon an article on Cyvally about cybersecurity career path. He learned there that cybersecurity is more than just hacking and typing quickly on a computer. It is about understanding how computer systems work, discovering weaknesses and dangers, devising countermeasures and implementing policies, processes and controls. Jack was inspired by their efforts to make the world a safer place for everyone. He recognized that to be a great cybersecurity Professional, he didn't have to wear a hoodie or write millions of commands. He just needed to be passionate, curious, and willing to learn.</strong></p>
<p><strong>Are you a "Jack"?</strong></p>
<p><strong>In this post, I discussed different careers in cybersecurity, required skills and certifications</strong></p>
<p><strong>Sit Back &amp; Enjoy the Rid</strong>e<strong>!!!</strong></p>
<h2 id="heading-different-teamaspects-in-cybersecurity"><strong>Different Team/Aspects in Cybersecurity</strong></h2>
<p><a target="_blank" href="https://cyvally.com/2023/03/09/cybersec-base-002/">Cybersecurity</a> is broken down into 3 teams; namely Offensive, Defensive and GRC Security</p>
<ul>
<li><p><strong>Offensive Security</strong>: you must have heard of the phrase "To beat a hacker, you need to behave like one". The technique of deliberately attacking and exploiting computer systems and networks in order to test their defenses and identify vulnerabilities is referred to as offensive security. It is also called the <strong>Red Team</strong></p>
</li>
<li><p><strong>Defensive security</strong>: refers to protecting computer systems and networks against attack by detecting and mitigating vulnerabilities and putting in place controls to prevent or detect unwanted access or activity. It is also called the <strong>Blue Team</strong></p>
</li>
<li><p><strong>GRC Security</strong>: The use of governance, risk management, and compliance (GRC) concepts to ensure the security of an organization's information and technological assets is referred to as GRC security. It entails putting in place <a target="_blank" href="https://cyvally.com/2023/03/10/cybersec-base-003/">policies, processes, and technology</a> to manage risk, stay in compliance with rules and standards, and ensuring that the organization's security goals are in line with its broader objectives</p>
</li>
</ul>
<h2 id="heading-red-team"><strong>Red Team</strong></h2>
<p>To test an organization's security defenses, a red team is a group of ethical hackers or security specialists that simulates cyberattacks on the organization's systems. The red team's objective is to help the organization strengthen its security posture by identifying vulnerabilities and flaws that may be exploited by an actual attacker.</p>
<h3 id="heading-required-skillsexpertise"><strong>Required Skills/Expertise</strong></h3>
<ul>
<li><p>Knowledge of computer systems and networks</p>
</li>
<li><p>Knowledge of hacking tools and techniques</p>
</li>
<li><p>Programming skills</p>
</li>
<li><p>Knowledge of social engineering techniques</p>
</li>
<li><p>Penetration testing skills</p>
</li>
<li><p>Communication and reporting skills</p>
</li>
<li><p>Critical thinking and problem-solving skills</p>
</li>
<li><p>Understanding of industry standards and regulations</p>
</li>
<li><p>Interpersonal skills</p>
</li>
<li><p>Continuous learning</p>
</li>
</ul>
<h3 id="heading-certifications-requiredneeded-in-red-teaming"><strong>Certifications Required/Needed in Red Teaming</strong></h3>
<p><strong>-</strong></p>
<table><tbody><tr><td><p><strong>Entry/Intermediate Level</strong></p></td><td><p><strong>Expert Level</strong></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/network"><strong>CompTIA Network+</strong></a></p></td><td><p><a target="_self" href="https://www.offsec.com/courses/pen-200/"><strong>Offensive Security Certified Professional (OSCP)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/security"><strong>CompTIA Security+</strong></a></p></td><td><p><a target="_self" href="https://www.offsec.com/courses/exp-401/"><strong>Offensive Security Exploitation Expert (OSEE)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/linux"><strong>CompTIA Linux+</strong></a></p></td><td><p><a target="_self" href="https://www.offsec.com/ctp-osce/"><strong>Offensive Security Certified Expert (OSCE)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/pentest"><strong>CompTIA PenTest+</strong></a></p></td><td><p><a target="_self" href="https://firebrand.training/ae/courses/iacrb/certified-red-team-operations-professional-certification"><strong>Certified Red Team Operations Professional (CRTOP)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://ine.com/learning/certifications/internal/elearnsecurity-junior-penetration-tester-cert"><strong>eLearnSecurity Junior Penetration Tester (eJPT)</strong></a></p></td><td><p><a target="_self" href="https://www.giac.org/certifications/web-application-penetration-tester-gwapt/"><strong>GIAC Web Application Penetration Tester (GWAPT)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/"><strong>Certified Ethical Hacker (CEH)</strong></a></p></td><td><p><a target="_self" href="https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn/"><strong>GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.credential.net/group/140735"><strong>Certified Red Team Professional (CRTP)</strong></a></p></td><td><p><a target="_self" href="https://www.isc2.org/Certifications/CISSP"><strong>Certified Information Systems Security Professional (CISSP)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://certifications.tcm-sec.com/pnpt/"><strong>Practical Network Penetration Tester (PNPT)</strong></a></p></td><td><p></p></td></tr><tr><td><p><a target="_self" href="https://www.giac.org/certifications/penetration-tester-gpen/"><strong>GIAC Penetration Tester (GPEN)</strong></a></p></td><td><p></p></td></tr><tr><td><p><a target="_self" href="https://www.eccouncil.org/train-certify/ceh-master/"><strong>EC-Council Certified Ethical Hacker Master (C|EH Master)</strong></a></p></td><td><p></p></td></tr></tbody></table>

<h3 id="heading-career-paths-in-red-teaming"><strong>Career Paths in Red Teaming</strong></h3>
<p><strong>Penetration Tester/Ethical Hacker</strong> - Conducts controlled hacking attempts to detect vulnerabilities in systems and networks and makes security recommendations.</p>
<p><strong>Vulnerability Researcher</strong>/<strong>Bug Bounty Specialist:</strong> detects and exploits vulnerabilities before cyber criminals discover them, preventing widespread exploitation and assisting organizations in enhancing their security. They are compensated and recognized for reporting bugs, hence the word bug bounty..</p>
<p><strong>Malware Analyst</strong> - Examines and reverse-engineers malware to determine and comprehend determine its behavior, purpose, and origin, and then develops detection and removal procedures.</p>
<p><strong>Social Engineering Specialist</strong> - Tests an organization's sensitivity to phishing, pretexting, and other social engineering methods using social engineering methodologies.</p>
<p><strong>Wireless Security Specialist</strong> - Simulates attacks and identifies vulnerabilities to test an organization's wireless network security defenses.</p>
<p><strong>Web Application Security Specialist</strong> - Conducts simulated assaults and penetration testing to identify vulnerabilities in web applications.</p>
<p><strong>Physical Security Specialist</strong> - Evaluates the physical security defenses of an organization, such as access controls, surveillance systems, and perimeter defenses.</p>
<h2 id="heading-blue-team"><strong>Blue team</strong></h2>
<p>Blue Team monitors and respond to security problems in order to thwart cyberattacks. They are in charge of identifying and neutralizing security risks as well as creating and putting into effect security controls to fend against further attacks.</p>
<h3 id="heading-required-skillsexpertise-1"><strong>Required Skills/Expertise</strong></h3>
<ul>
<li><p>Knowledge of technologies and security approach</p>
</li>
<li><p>Incident response skills</p>
</li>
<li><p>Security monitoring skills</p>
</li>
<li><p>Knowledge of security tools and techniques</p>
</li>
<li><p>Analytical and problem-solving skills</p>
</li>
<li><p>Knowledge of threat intelligence</p>
</li>
<li><p>Risk assessment and management</p>
</li>
<li><p>Communication and reporting skills</p>
</li>
<li><p>Compliance and regulatory knowledge</p>
</li>
<li><p>Familiarity with SIEM</p>
</li>
<li><p>Continuous learning</p>
</li>
</ul>
<h3 id="heading-certifications-requiredneeded-in-blue-teaming"><strong>Certifications Required/Needed in Blue Teaming</strong></h3>
<table><tbody><tr><td><p><strong>Entry/Intermediate Level</strong></p></td><td><p><strong>Expert Level</strong></p></td></tr><tr><td><p><a target="_self" href="https://www.isc2.org/certified-in-cybersecurity"><strong>(ISC)²  Certified in Cybersecurity(CC)</strong></a></p></td><td><p><a target="_self" href="https://elearning.securityblue.team/home/certifications/blue-team-level-2#description"><strong>Security Blue Team Level 2</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/network"><strong>CompTIA Network+</strong></a></p></td><td><p><a target="_self" href="https://www.giac.org/certifications/certified-forensic-analyst-gcfa/"><strong>GIAC Certified Forensic Analyst (GCFA)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/security"><strong>CompTIA Security+</strong></a></p></td><td><p><a target="_self" href="https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/"><strong>EC-Council Certified Incident Handler (ECIH)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/cybersecurity-analyst"><strong>CompTIA Cybersecurity Analyst (CySA+)</strong></a></p></td><td><p><a target="_self" href="https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-threat-intelligence-manager/"><strong>CREST Certified Threat Intelligence Manager.</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://elearning.securityblue.team/home/certifications/blue-team-level-1#description"><strong>Security Blue Team Level 1</strong></a></p></td><td><p><a target="_self" href="https://www.comptia.org/certifications/comptia-advanced-security-practitioner"><strong>CompTIA Advanced Security Practitioner (CASP+)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.splunk.com/en_us/training/certification-track/splunk-core-certified-user.html"><strong>Splunk Core Certified User</strong></a></p></td><td><p><a target="_self" href="https://www.isc2.org/Certifications/CISSP"><strong>Certified Information Systems Security Professional (CISSP)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/"><strong>EC-Council Computer Hacking Forensics Investigator (CHFI)</strong></a></p></td><td><p></p></td></tr><tr><td><p><a target="_self" href="https://www.giac.org/certifications/certified-incident-handler-gcih/"><strong>GIAC Certified Incident Handler (GCIH)</strong></a></p></td><td><p></p></td></tr><tr><td><p><a target="_self" href="https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/cyberops-associate.html"><strong>Cisco Certified Network Associate Cyber Operations (CCNA Cyber Ops)</strong></a></p></td><td><p></p></td></tr><tr><td><p><a target="_self" href="https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-threat-intelligence-analyst/"><strong>CREST Registered Threat Intelligence Analyst</strong></a></p></td><td><p></p></td></tr></tbody></table>

<h3 id="heading-career-paths-in-blue-teaming"><strong>Career Paths in Blue Teaming</strong></h3>
<p><strong>Cybersecurity Analyst</strong> - Monitors and analyzes security events and occurrences, and responds to security threats in real time.</p>
<p><strong>Incident Responder</strong>: responds to security incidents by determining the source of the attack, containing the issue, and recovering systems and data.</p>
<p><strong>Forensic Analyst</strong> - Gathers and analyzes digital evidence connected to cyber incidents to determine the source of the attack, the offender, and the degree of the damage. and delivers results in court.</p>
<p><strong>Security Engineer</strong> – Creates and installs security systems and infrastructure to combat cyber threats.</p>
<p><strong>Network Security Specialist</strong> - Implements and maintains network security measures such as firewalls, intrusion detection and prevention systems, and VPNs.</p>
<p><strong>Endpoint Security Specialist</strong> - Installs and maintains security measures for an organization's endpoints, which include laptops, desktop computers, and mobile devices.</p>
<p><strong>Identity and Access Management (IAM) Specialist</strong> - Manages and regulates access to a company's systems and data, as well as ensuring compliance with security rules and regulations. They Create and deploys systems and processes to manage user identities, access privileges, and authentication methods in order to prevent illegal access.</p>
<p><strong>Threat Intelligence Analyst</strong> - Monitors and analyzes cyber threats and emerging security trends in order to identify potential threats and vulnerabilities ahead of time.</p>
<p><strong>Vulnerability Assessor</strong>- Detects vulnerabilities in computer networks and systems, evaluates their potential impact, and makes remedial recommendations.</p>
<p><strong>Security Architect</strong>- they focus on designing and implementing security solutions to protect against cyber threats.</p>
<h2 id="heading-governance-risk-and-compliance-grc"><strong>Governance, Risk, and Compliance (GRC).</strong></h2>
<p>GRC is a framework for managing and keeping track of a company's cybersecurity procedures and policies to make sure they adhere to legal requirements and business norms. The GRC team is in charge of creating and enforcing security policies and processes, evaluating and managing risks, and making sure that laws and regulations are being followed.</p>
<h3 id="heading-required-skillsexpertise-2"><strong>Required Skills/Expertise</strong></h3>
<ul>
<li><p>Understanding of regulatory compliance</p>
</li>
<li><p>Auditing and assessment</p>
</li>
<li><p>Governance</p>
</li>
<li><p>Risk management</p>
</li>
<li><p>Project management</p>
</li>
<li><p>Communication skills</p>
</li>
<li><p>Analytical skills</p>
</li>
<li><p>Business knowledge</p>
</li>
<li><p>Continuous learning</p>
</li>
</ul>
<h3 id="heading-certifications-requiredneeded-in-grc"><strong>Certifications Required/Needed in GRC</strong></h3>
<table><tbody><tr><td><p><strong>Entry/Intermediate Level</strong></p></td><td><p><strong>Expert Level</strong></p></td></tr><tr><td><p><a target="_self" href="https://www.isc2.org/certified-in-cybersecurity"><strong>(ISC)²  Certified in Cybersecurity(CC)</strong></a></p></td><td><p><a target="_self" href="https://www.isaca.org/credentialing/cgeit"><strong>Certified in the Governance of Enterprise IT (CGEIT)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.comptia.org/certifications/security"><strong>CompTIA Security+</strong></a></p></td><td><p><a target="_self" href="https://www.corporatecompliance.org/certification/become-certified/ccep"><strong>Certified Compliance and Ethics Professional (CCEP)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001/iso-iec-27001-lead-auditor"><strong>ISO 27001 Lead Auditor</strong></a></p></td><td><p><a target="_self" href="https://www.isaca.org/credentialing/cism"><strong>Certified Information Security Manager (CISM)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.isaca.org/credentialing/cisa"><strong>Certified Information Systems Auditor (CISA)</strong></a></p></td><td><p><a target="_self" href="https://www.theiia.org/en/certifications/crma/"><strong>Certified in Risk Management Assurance (CRMA)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.theiia.org/en/certifications/cia/"><strong>Certified Internal Auditor (CIA)</strong></a></p></td><td><p><a target="_self" href="https://sharedassessments.org/ctprp/"><strong>Certified Third Party Risk Professional (CTPRP)</strong></a></p></td></tr><tr><td><p><a target="_self" href="https://www.isaca.org/credentialing/crisc"><strong>Certified in Risk and Information Systems Control (CRISC)</strong></a></p></td><td><p><a target="_self" href="https://www.isc2.org/Certifications/CISSP"><strong>Certified Information Systems Security Professional (CISSP)</strong></a></p></td></tr></tbody></table>

<h3 id="heading-career-paths-in-grc"><strong>Career Paths in GRC</strong></h3>
<p><strong>Chief Information Security Officer (CISO)</strong> - Creates and executes an organization's entire cybersecurity strategy, as well as manages the security team.</p>
<p><strong>Risk Analyst</strong> - Conducts risk assessments to identify and prioritize potential cybersecurity threats, and creates mitigation measures.</p>
<p><strong>Policy and Standards Manager</strong> - Creates and oversees an organization's security policies and standards, as well as ensuring compliance with industry best practices and legislation.</p>
<p><strong>Cybersecurity Compliance Auditor</strong> - Ensures compliance with cybersecurity rules and industry standards, as well as managing the compliance certification process.</p>
<p><strong>Third-Party Risk Manager</strong> - Manages the cybersecurity risks associated with third-party vendors and partners, as well as ensuring they follow security rules and regulations.</p>
<p><strong>Data Protection Officer</strong> - Responsible for managing an organization's data protection policy and ensuring compliance with data privacy requirements.</p>
<p><strong>Cyber Security Trainer</strong>- Educates and instructs personnel on best practices for cybersecurity to lessen the risk of cyber attacks and data breaches. Creates and oversees cybersecurity awareness and training programs for workers to ensure they understand security rules and best practices.</p>
<p><strong>Cybersecurity Project Manager</strong>:Supervises and oversees cybersecurity projects to ensure they are completed on time, within budget, and fulfill the organization's security requirements.</p>
<blockquote>
<p><strong>Don't let your learning lead to knowledge. Let your learning lead to action</strong></p>
<p><strong><cite>Jim Rohn</cite></strong></p>
<p><strong>Never become so much of an expert that you stop gaining expertise. View life as a continuous learning experience.</strong></p>
<p><strong><em><cite>Denis Waitley</cite></em></strong></p>
</blockquote>
<p><strong>Review Question</strong></p>
<ol>
<li><p>What inspired you to seek a career in cybersecurity, and what interests you the most about the field?</p>
</li>
<li><p>Which career path of cybersecurity most interests you? And why?</p>
</li>
<li><p><strong>RESEARCH</strong>: What trends do you see in the future of cybersecurity, and how do you think they will impact the industry and job opportunities?</p>
</li>
</ol>
]]></content:encoded></item><item><title><![CDATA[Cybersec base #007: Cyber Safety Tips]]></title><description><![CDATA[Ken got an email from a company pretending to be his bank, requesting that he update his account information. Ken clicked on the link in the email without verifying the sender or the website URL and inputted his account information. He later discover...]]></description><link>https://cyvally.com/cybersec-base-007-cyber-safety-tips</link><guid isPermaLink="true">https://cyvally.com/cybersec-base-007-cyber-safety-tips</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sat, 01 Apr 2023 19:35:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1740241548702/5aecaa04-5928-44e7-a2e9-74e649f0e10b.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Ken got an email from a company pretending to be his bank, requesting that he update his account information. Ken clicked on the link in the email without verifying the sender or the website URL and inputted his account information. He later discovered it was a phishing email, and the cybercriminals had depleted his bank account. Ken discovered the significance of cybersecurity and the importance of always verifying the sender and the URL before entering any private information online.<br />DONT BE A "KEN"</strong></p>
<p>In this post, we will discuss 10 simple cyber safety tips to help you keep your personal information safe. Remember to share these tips with your employees and loved ones.</p>
<p><strong>HOLD ON TIGHT FOR THIS RIDE!!!</strong></p>
<h2 id="heading-tip-1-use-strong-passwords"><strong>TIP #1- Use Strong Passwords</strong></h2>
<p>Passwords are one of the most vulnerable points in the Internet security hierarchy. When generating a new password, keep strong password requirements in mind:</p>
<ul>
<li><p>Use at least 12 characters, but 14 or more is preferable.</p>
</li>
<li><p>A mix of capital and lowercase characters, numbers, and symbols.</p>
</li>
<li><p>Do not use a dictionary word, name of a person, character, product, or organization.</p>
</li>
<li><p>Use passwords that are different from your previous ones.</p>
</li>
<li><p>Use something distinctive that is easy for you to remember but tough for others to guess.</p>
</li>
<li><p>Ensure that you frequently change your passwords.</p>
</li>
<li><p>Never reveal your passwords to anyone, have <strong>ZERO TRUST</strong></p>
</li>
<li><p>Ensure that passwords and password hints are securely saved.</p>
</li>
<li><p>Use different emails and passwords for different accounts</p>
</li>
<li><p>Avoid using personal information in your passwords</p>
</li>
</ul>
<h2 id="heading-tip-2-set-up-two-factor-authentication"><strong>TIP #2- Set Up Two-Factor Authentication</strong></h2>
<p>Two-factor authentication stops hackers from gaining access to your accounts and personal data. It Increases your account security by adding this extra layer of protection, even if someone knows your password.</p>
<ul>
<li><p>Consider utilizing an authenticator app, such as Microsoft Authenticator, to create unique time-based codes for authentication.</p>
</li>
<li><p>Enable Two-Factor Authentication on All Your Accounts.</p>
</li>
<li><p>Keep your authentication device, such as your phone or authenticator app, secure</p>
</li>
<li><p>Once you've configured two-factor authentication, ensure sure it's operating properly. Log out of your account and then log back in using your authentication method to confirm that everything is working as it should.</p>
</li>
</ul>
<h2 id="heading-tip-3-backup-your-data"><strong>TIP #3- Backup Your Data</strong></h2>
<p>Back up your data on a regular basis to avoid data loss in the event of a security breach or ransomware attack</p>
<ul>
<li><p>Automate your backup process to ensure that your data is backed up on a regular basis without the need for manual intervention.</p>
</li>
<li><p>Select a secure backup location that is independent from your primary device, such as an external hard drive or a cloud storage service with robust encryption.</p>
</li>
<li><p>Make sure your backups are working properly by testing and confirming them on a regular basis. <strong>YOU DONT WANT TO BE CAUGHT UNAWARE</strong></p>
</li>
<li><p>Consider backing up your data in multiple locations for redundancy and security against data loss.</p>
</li>
<li><p>Identify and prioritize the most crucial data that needs to be backed up, and make sure you backup that data on a regular basis.</p>
</li>
<li><p>Regularly review and update your backup strategy to ensure that it is in line with your evolving demands and the most recent best practices for data backup.</p>
</li>
</ul>
<h2 id="heading-tip-4-take-caution-when-using-wifi"><strong>TIP #4- Take Caution When Using WiFi</strong></h2>
<p>Using public Wi-Fi exposes your online activities and sensitive information to possible attackers, who can intercept or manipulate your data, resulting in identity theft, financial loss, or other cybercrime. When using public Wi-Fi networks, it is critical to exercise caution and implement adequate security precautions.</p>
<ul>
<li><p>Do not put your reliance in public Wi-Fi security.</p>
</li>
<li><p>Connecting to unprotected public Wi-Fi networks should be avoided.</p>
</li>
<li><p>Make sure your own Wi-Fi networks are password-protected.</p>
</li>
<li><p>Create a secure password for your Wi-Fi network and allow only authorized users access.</p>
</li>
<li><p>Change your wireless password on a regular basis.</p>
</li>
</ul>
<h2 id="heading-tip-5-keep-software-and-systems-up-to-date"><strong>TIP #5- Keep Software and Systems Up to Date</strong></h2>
<p>It's crucial to install software updates for your operating system and programs. Install the most recent security updates for your devices:</p>
<ul>
<li><p>Maintaining your software and systems guarantees that you have the most recent security patches and fixes.</p>
</li>
<li><p>Install software updates as soon as possible, especially if they include crucial security changes.</p>
</li>
<li><p>Set your devices to receive automatic updates so you never miss one!</p>
</li>
</ul>
<h2 id="heading-tip-6-be-cautious-of-links"><strong>TIP #6- Be Cautious of links</strong></h2>
<p>Hackers frequently utilize links in emails to lure people into disclosing sensitive information. This frequently takes the guise of bank statements, flight tickets, password recovery emails, and other documents.</p>
<p>When a person clicks on one of these links, they are sent to a false site that appears suspiciously similar to the real thing. The site will prompt them to login or provide personal information. When a hacker obtains this information, they gain access to the user's account.</p>
<ul>
<li><p>Avoid opening emails from unfamiliar or strange senders and clicking on suspicious links. They could contain malware or phishing scams.</p>
</li>
<li><p>Keep an eye out for links in your emails.</p>
</li>
<li><p>Don't click on anything that appears suspicious.</p>
</li>
<li><p>Rather than using an email, the best bet is to go directly to a provider's website.</p>
</li>
</ul>
<h2 id="heading-tip-7-be-aware-of-social-engineering-tactics"><strong>TIP #7-Be Aware of Social Engineering Tactics</strong></h2>
<p>Social engineering is a technique used by online criminals/cyber attackers to trick people into disclosing private information or taking potentially dangerous actions. It entails the use of psychological manipulation techniques to trick, manipulate, or take advantage of people in order to access private data or systems.</p>
<p>Phishing, pretexting, baiting, and quid pro quo are examples of common social engineering techniques. Email, phone, social media, and in-person contacts are just a few of the communication methods that can be used for social engineering attacks.</p>
<h2 id="heading-tip-8-limit-personal-information-access"><strong>TIP #8- Limit Personal Information Access</strong></h2>
<p>Be cautious when sharing personal information online, and limit the information you publish on social media and and other websites.</p>
<ul>
<li><p>Avoid sharing sensitive information such as your full name, date of birth, home address, and phone number online.</p>
</li>
<li><p>Use a virtual private network (VPN) which encrypts your internet connection and hides your IP address, making it more difficult for others to track your online activities and access your personal information.</p>
</li>
</ul>
<h2 id="heading-tip-9-use-antivirus-software"><strong>TIP #9- Use Antivirus Software</strong></h2>
<ul>
<li><p>Malware, viruses, and other sorts of dangerous software can be detected and removed from your computer using antivirus software.</p>
</li>
<li><p>Install antivirus software on all of your computers and mobile devices, including laptops, desktops, cellphones, and tablets.</p>
</li>
<li><p>Maintain the antivirus software to the most recent version to ensure that it can identify and prevent the most recent threats.</p>
</li>
<li><p>Use trusted antivirus software from well-known vendors with a proven track record of detecting and stopping malware.</p>
</li>
<li><p>Disabling antivirus software, even briefly, leaves your device vulnerable to attacks.</p>
</li>
<li><p>Enable automatic updates so that the antivirus software can be updated with the most recent malware definitions.</p>
</li>
<li><p>Schedule frequent virus and malware scans for your device.</p>
</li>
</ul>
<h2 id="heading-tip-10-educate-yourself"><strong>TIP #10- Educate Yourself</strong></h2>
<p>Keep up to date on the newest cybersecurity dangers and best practices for protecting yourself and your data online.</p>
<ul>
<li><p>Read cybersecurity blogs to remain up to date on the newest threats and online safety tips.</p>
</li>
<li><p>Attend cybersecurity webinars to learn about particular cybersecurity subjects or issues.</p>
</li>
<li><p>Follow cybersecurity experts on social media to remain up to date on the newest cybersecurity news and trends.</p>
</li>
</ul>
<blockquote>
<p><strong><em>Ignorance is an enemy, even to its owner. Knowledge is a friend, even to its hater. Ignorance hates knowledge because it is too pure. Knowledge fears ignorance because it is too sure.</em></strong></p>
<p><strong><cite>Sri Chinmoy</cite></strong></p>
</blockquote>
<p>These recommendations can assist you in protecting your personal information and digital assets from cyber threats.</p>
<p><strong>1.4 Review Question</strong></p>
<ol>
<li><p>Which of the aforementioned cybersecurity safety measures have you overlooked or neglected to implement, if any?</p>
</li>
<li><p>Have you or a loved one been a victim of social engineering tactics? If so, what important lesson did you learn and how are you ensuring that you or your loved ones are no longer victims?</p>
</li>
</ol>
]]></content:encoded></item><item><title><![CDATA[Cybersec base#006- CIA Triad and its Measures]]></title><description><![CDATA[Let's take a look at this scenario.
you have a journal/diary where you record your deepest thoughts and feelings. If someone reads it without your consent, you will feel violated and certainly be angry, and will seek measures to secure it(IS THIS COR...]]></description><link>https://cyvally.com/cia-triad-and-its-measures</link><guid isPermaLink="true">https://cyvally.com/cia-triad-and-its-measures</guid><dc:creator><![CDATA[Cyvally]]></dc:creator><pubDate>Sun, 26 Mar 2023 16:10:58 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1740241352212/ae362b11-24c2-4353-b057-a240b12b2422.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Let's take a look at this scenario.</strong></p>
<p><strong>you have a journal/diary where you record your deepest thoughts and feelings. If someone reads it without your consent, you will feel violated and certainly be angry, and will seek measures to secure it(IS THIS CORRECT?). NOW LET US CONNECT THIS TO THE CIA</strong> <strong>TRIAD</strong></p>
<p><strong>C- Confidentiality- To maintain its privacy, you will put your journal in a locked drawer that only you have the key to.</strong></p>
<p><strong>I-Integrity- To maintain the accuracy of your diary and ensure that no one can delete or alter your writings without your knowledge, you will use a pen that cannot be erased.</strong></p>
<p><strong>A- Availability- You would want your diary to be available to you always, whenever you need to update it. You could make a backup copy of your diary in case your original diary is lost or stolen.</strong> <strong>This is likely a soft backup copy</strong>.</p>
<p>In this post, we will discuss the 3 elements of Cybersecurity, the CIA Triad, along with security measures to ensure each element</p>
<p><strong>Hold on for the ride!!!</strong></p>
<p>From the story above, your journal can be protected so that only you have access to your thoughts and feelings by following the simple steps listed. The same is true for information security; by implementing protections for confidentiality, integrity, and availability, sensitive data and systems can be kept secure and available to <strong>ONLY AUTHORISED USERS</strong>. Now, let's discuss the CIA in detail.</p>
<h2 id="heading-confidentiality"><strong>Confidentiality</strong></h2>
<p>Confidentiality is a principle that ensures information is kept private and not exposed to unwanted access, disclosure, or usage</p>
<h3 id="heading-security-measures-to-ensure-confidentiality"><strong>Security Measures to Ensure Confidentiality</strong></h3>
<p><strong>Encryption:</strong> This is the process of converting plain text into a ciphertext that can only be decrypted with the use of a secret key. Encrypting confidential information ensures that even if an unauthorized person has access to it, they cannot read or use it.</p>
<p><strong>Access Control:</strong> Access control techniques only permit those people who are authorized to see confidential information to have access to it. This can be via the usage of password restrictions, two-factor authentication systems, and role-based access control(RBAC).</p>
<p><strong>Physical Security:</strong> This is the process of ensuring secure access to locations where sensitive information is stored, such as data centers and servers.</p>
<p><strong>Data loss prevention (DLP):</strong> DLP solutions can help to track the movement of private data in an organization and ensure data privacy. it will alert and stop the illegal sharing of sensitive data.</p>
<p><strong>Confidentiality policy:</strong> These are procedures that employees must follow to protect confidential information.</p>
<p><strong>Secure Communication:</strong> is dependent on secure channels like Virtual Private Networks (VPN) and secure messaging platforms to maintain the confidentiality of private information before it is transmitted on the internet.</p>
<p><strong>Data retention policy:</strong> This policy will guide employees on what data to keep, for how long, and how to dispose of data that is no longer necessary. This policy helps in reducing the amount of data held by a company, making it easier to protect and manage.</p>
<p><strong>Training and Awareness:</strong> Companies might organize training sessions and awareness sessions regularly for the employees to teach them about the protection of sensitive information. Employees will be evaluated after each training session.</p>
<p><strong>Non-Disclosure Agreements(NDA):</strong> employees are required to sign it to ensure that those granted access to the data do not reveal it.</p>
<h2 id="heading-integrity"><strong>Integrity</strong></h2>
<p>Integrity ensures that information is trustworthy in the sense that it’s reliable and authentic.</p>
<h3 id="heading-security-measures-to-ensure-integrity"><strong>Security Measures to Ensure Integrity</strong></h3>
<p><strong>Hashing:</strong> this is the process of converting data into a fixed-length string of characters that cannot be changed back to its original form. Integrity can be ensured by comparing the hash value of received data to the hash value of data as it was sent to ascertain whether the data was altered.</p>
<p><strong>Digital Signatures:</strong> are used to control the digital documents' authenticity and trace if they have not been edited. Digital signatures are developed by the use of security processes that allow a signer's identity to be authenticated. The signature is a guarantee from the signer that the information was not changed in any way.</p>
<p><strong>Version Control:</strong> It is one of the software engineering disciplines that is necessary for the management of different versions of files kept in history. The system keeps a thorough history of changes, makes vital authorization before such changes are introduced, and prevents unintentional changes. A perfect example is Git</p>
<p><strong>Digital Certificates:</strong> These are electronic documents that are used to validate the identification of individuals, companies, or devices and to enable secure Internet communication. They contribute to data integrity by generating digital signatures, verifying identities, encrypting data, and depending on trusted third-party certificate authorities</p>
<p><strong>Data Validation Implementation:</strong> data validation methods are also put in place so that data is not incomplete or inaccurate, and it has allowed character. E.g., checking data format, length of fields, and checking the range of values is a part of it.</p>
<p><strong>Change management:</strong> This is essential to guarantee that changes to data and systems are permitted, recorded, and tested.</p>
<h2 id="heading-availability"><strong>Availability</strong></h2>
<p>The principle that ensures data and system accessibility to authorized users at all times is called availability or uptime.</p>
<h3 id="heading-security-measures-to-ensure-availability"><strong>Security Measures to Ensure Availability</strong></h3>
<p><strong>Redundancy:</strong> the need to duplicate the important systems/components to guarantee availability in case there is a failure.</p>
<p><strong>Business Continuity and Disaster Recovery Planning:</strong> Business continuity planning is the ability to continue delivering products or services at predefined acceptable levels following a disruptive incident. Disaster recovery is a set of policies and procedures, along with tools, that recover either the key infrastructure of technology or its systems in the aftermath of a disaster.</p>
<p><strong>Backups:</strong> These are copies of important data or system configurations that, if, for any reason, failure or loss occurs, the original data or configurations can be recovered.</p>
<p><strong>Virtualization:</strong> This is the technology that makes it possible to run a lot of virtual machines (VMs) in one device. Virtualization effectively manages availability by ensuring the availability of the core applications and services and quickly returning the VM in case of failure, in addition to offering flexible and resilient network virtualization that can be redesigned quickly in the event of a disruption.</p>
<p><strong>Monitoring and Maintenance:</strong> This measure helps to identify a potential problem before it grows into a problem that causes a major system downtime. Performance measurements, such as CPU consumption, memory usage, and disk space utilization, may be employed as an assessment that will help to detect a problem and take corrective action in due time. Regular maintenance in the form of improved software versions, security patches for regular updating, and backup copies can help to negate the onset of failures and increase stability of the system.</p>
<blockquote>
<p><strong>"Privacy, accuracy, and accessibility are the cornerstones of information management. We need to ensure that we are protecting people's privacy, while also ensuring that information is accurate and accessible to those who need it."</strong></p>
<p><em><cite>-</cite></em> <strong><em><cite>Ann Cavoukian</cite></em></strong></p>
</blockquote>
]]></content:encoded></item></channel></rss>