You will build an understanding of the vulnerability management process. You’ll learn about common vulnerabilities and develop an attacker mindset by examining the ways vulnerabilities can become threats to asset security if they are exploited.
Learning Objectives
- Differentiate between vulnerabilities and threats.
- Describe the defense in depth strategy.
- Explain how common vulnerability exposures are identified by MITRE.
- Explain how vulnerability assessments are used to assess potential risk.
- Analyze an attack surface.
- Develop an attacker mindset to recognize threats.
- Flaws in the system
- Identify system vulnerabilities
- Video: Vulnerability assessments
- Reading: Approaches to vulnerability scanning
- Reading: The importance of updates
- Video: Omad: My learning journey into cybersecurity
- Reading: Penetration testing
- Practice Quiz: Test your knowledge: Identify system vulnerabilities
- Practice Quiz: Portfolio Activity: Analyze a vulnerable system for a small business
- Reading: Portfolio Activity Exemplar: Analyze a vulnerable system for a small business
- Cyber attacker mindset
- Video: Protect all entry points
- Reading: Approach cybersecurity with an attacker mindset
- Reading: Types of threat actors
- Video: Niru: Adopt an attacker mindset
- Video: Pathways through defenses
- Practice Quiz: Self-reflection: Approach cybersecurity with an attacker mindset
- Reading: Fortify against brute force cyber attacks
- Password policy
- Key takeaways
- Review: Vulnerabilities in systems
Flaws in the system
Video: Welcome to module 3
We’ve reached the halfway point in our cybersecurity journey, covering foundational concepts like assets, threats, and vulnerabilities. We explored:
- Asset protection: Understanding the range of assets security professionals safeguard and the importance of information security.
- Vulnerability management: Gaining an awareness of vulnerabilities and their crucial role in security.
- Defense in depth: Applying a layered approach to minimize vulnerabilities and prevent attacks.
- CVE list: Learning about online resources for documented vulnerabilities and their identification.
- Attack surfaces: Understanding the areas cybercriminals target and how security teams protect them.
- Attacker mindset: Developing an attacker’s perspective to identify and thwart potential threats.
Equipped with this knowledge, we’re ready to delve deeper into vulnerability management and expand our security expertise. Get ready for exciting explorations and challenges! Are you as enthusiastic as I am? Let’s continue our journey!
Wow! We’ve covered a lot together! It’s hard to believe we’ve reached
the midpoint of this course. I hope you’re getting a clearer
picture of this exciting field and all the opportunities it has to offer. And most importantly,
I hope you’re having fun doing it. We’ve come a long ways
from where we started. When we began our journey together,
we were introduced to the three building blocks of every security program:
assets, threats, and vulnerabilities. We focused a lot on assets early on and the wide range of things security
professionals work to protect. We then turned our attention to
a core component of asset security, protecting assets. You learned about the importance
of guarding sensitive information. You also learned about some security
controls that protect information from being lost or stolen. On the next part of our journey, we’re going to turn our
focus to vulnerabilities. Every asset we protect has
a series of vulnerabilities, or flaws, that we need to be aware of. Staying informed of these things is
a critical part of protecting people and organizations from harm. In this next part of the course, you’ll gain an understanding of
the vulnerability management process. First, you’ll explore a common approach
to vulnerability management: the defense and depth model. Then, you will learn about how
vulnerabilities are documented in online libraries like the CVE list. We’ll discuss the attack surfaces
security teams protect. And lastly, you’ll expand your attacker
mindset by exploring the common attack vectors cybercriminals try to exploit. Security analysts play an important
role in identifying and correcting vulnerabilities in systems. I know I’m excited to keep exploring, are you? Then let’s go!
Video: Vulnerability management
Main Points:
- Every asset has vulnerabilities that can be exploited by threats.
- Exploits are methods for taking advantage of vulnerabilities.
- Vulnerability management is a four-step process: identifying vulnerabilities, considering potential exploits, preparing defenses, and evaluating those defenses.
- This process is cyclical and ongoing, as new vulnerabilities are constantly discovered.
- Zero-day exploits are previously unknown vulnerabilities that pose significant danger due to the lack of preparation time.
- Identifying vulnerabilities is the most crucial step in vulnerability management.
Key Takeaways:
- Security teams prioritize finding and addressing vulnerabilities to protect assets.
- Vulnerability management involves a continuous cycle of identification, mitigation, and assessment.
- Zero-day vulnerabilities pose a significant challenge due to their unexpected nature.
- Identifying vulnerabilities is critical for proactively preventing threats and ensuring asset security.
Additional Notes:
- The analogy of protecting a document highlights the importance of understanding vulnerabilities and their potential exploits.
- Burglaries exemplify how vulnerability management principles apply in real-world scenarios.
- Cybersecurity teams benefit from diversity in perspectives to identify and respond to vulnerabilities.
- Staying informed about new vulnerabilities and zero-day exploits is crucial for effective security measures.
Conclusion:
Vulnerability management plays a central role in cybersecurity by proactively identifying and mitigating vulnerabilities before they can be exploited. Understanding this process and its importance is fundamental for individuals and organizations to protect their assets from threats. The next session will delve deeper into the critical first step of identifying vulnerabilities.
Introduction:
Vulnerability management is a crucial aspect of cybersecurity, aiming to identify, assess, and remediate vulnerabilities in systems and applications before they can be exploited by attackers. This tutorial provides a comprehensive overview of vulnerability management, covering its key principles, processes, and tools.
What is a Vulnerability?
A vulnerability is a weakness or flaw in a system or application that can be exploited by an attacker to gain unauthorized access, disrupt operations, or steal data. Vulnerabilities can arise from various factors, including software bugs, misconfigurations, and outdated software.
Why is Vulnerability Management Important?
Vulnerability management is essential for several reasons:
- Reduces risk of attacks: By identifying and addressing vulnerabilities, organizations reduce the attack surface and make it more difficult for attackers to exploit their systems.
- Protects critical assets: Vulnerability management helps protect sensitive information and critical assets from unauthorized access and data breaches.
- Minimizes damage from attacks: Even if an attack occurs, effective vulnerability management can minimize the damage by limiting the impact of the exploited vulnerability.
- Improves compliance: Many regulations require organizations to implement a vulnerability management program to meet compliance standards.
The Vulnerability Management Process:
Vulnerability management typically involves a four-step cyclic process:
1. Identify vulnerabilities:
- Scanning tools: Automated tools scan systems and applications for known vulnerabilities.
- Penetration testing: Simulating real-world attacks to identify unknown vulnerabilities.
- Manual review: Security professionals manually reviewing code and configurations.
2. Assess vulnerabilities:
- Severity: Analyzing the potential impact of a vulnerability if exploited.
- Exploitability: Evaluating the likelihood of a vulnerability being exploited.
- Priority: Ranking vulnerabilities based on their severity and exploitability.
3. Remediate vulnerabilities:
- Patching: Applying software updates to fix known vulnerabilities.
- Configuration changes: Modifying system and application configurations to mitigate vulnerabilities.
- Workarounds: Implementing temporary solutions until permanent fixes are available.
4. Report and review:
- Documenting findings and remediation activities.
- Reporting vulnerabilities to stakeholders.
- Regularly reviewing the effectiveness of the vulnerability management program.
Vulnerability Management Tools:
A variety of tools are available to support different stages of the vulnerability management process:
- Vulnerability scanners: Identify and categorize known vulnerabilities.
- Penetration testing tools: Simulate real-world attacks and identify unknown vulnerabilities.
- Patch management tools: Automate the process of applying software updates.
- Configuration management tools: Automate configuration changes and ensure consistent security settings.
Best Practices for Vulnerability Management:
- Establish a vulnerability management policy: Define roles, responsibilities, and procedures for vulnerability management.
- Prioritize vulnerabilities based on risk: Focus on addressing the most critical vulnerabilities first.
- Automate as much as possible: Automate scanning, patching, and configuration management to improve efficiency.
- Integrate vulnerability management with other security processes: Share information and collaborate between different security teams.
- Continuously monitor and improve: Regularly review the effectiveness of the vulnerability management program and make adjustments as needed.
Conclusion:
Vulnerability management is an essential practice in protecting organizations from cyberattacks. By implementing a comprehensive vulnerability management program, organizations can significantly reduce their risk of security incidents and ensure the confidentiality, integrity, and availability of their critical assets.
Additional Resources:
- Open Web Application Security Project (OWASP): https://owasp.org/
- SANS Institute: https://www.sans.org/
- National Institute of Standards and Technology (NIST): https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0
Please note: This is a general overview of vulnerability management. Specific tools and processes may vary depending on the organization and its security requirements.
For every asset that needs protecting,
there are dozens of vulnerabilities. Finding those vulnerabilities and fixing them before they become a problem
is the key to keep an asset safe. We’ve already covered what
a vulnerability is. Recall that a vulnerability is a weakness
that can be exploited by a threat. That word, can,
is an important part of this description. Why is that? Let’s explore that
together to find out more. Imagine I handed you an important
document and asked you to keep it safe. How would you do that? Some of you might first think about
locking it up in a safe place. Behind this is the understanding that,
because documents can be easily moved, they are vulnerable to theft. When other vulnerabilities come to mind,
like how paper burns easily or doesn’t resist water,
you might add other protections. Similar to this example,
security teams plan to protect assets according to their vulnerabilities
and how they can be exploited. In security, an exploit is a way of taking
advantage of a vulnerability. Besides finding vulnerabilities,
security planning relies a lot on thinking of exploits. For example, there are
burglars out there who want to cause harm. Homes have vulnerable systems that
can be exploited by a burglar. An example are the windows.
Glass is vulnerable to being broken. A burglar can exploit this vulnerability
by using a rock to break the window. Thinking of this vulnerability and exploit
ahead of time allows us to plan ahead. We can have an alarm system in place to scare
the burglar away and alert the police. Security teams spend a lot of
time finding vulnerabilities and thinking of how they can be exploited. They do this with the process
known as vulnerability management. Vulnerability management is the process
of finding and patching vulnerabilities. Vulnerability management
helps keep assets safe. It’s a method of stopping threats
before they can become a problem. Vulnerability management
is a four step process. The first step is to
identify vulnerabilities. The next step is to consider potential
exploits of those vulnerabilities. Third is to prepare defenses
against threats. And finally, the fourth step is to
evaluate those defenses. When the last step ends,
the process starts again. Vulnerability management
happens in a cycle. It’s a regular part of
what security teams do because there are always new
vulnerabilities to be concerned about. This is exactly why a diverse
set of perspectives is useful! Having a wide range of backgrounds and experiences only strengthens security
teams and their ability to find exploits. However, even large and diverse security
teams can’t keep track of everything. New vulnerabilities
are constantly being discovered. These are known as zero-day exploits. A zero-day is an exploit
that was previously unknown. The term zero-day refers to the fact that
the exploit is happening in real time with zero days to fix it. These kind of exploits are dangerous. They represent threats that
haven’t been planned for yet. For example, we can anticipate the possibility of
a burglar breaking into our home. We can plan for this type of threat
by having defenses in place, like locks on the doors and windows. A zero-day exploit would be
something totally unexpected, like the lock on the door
falling off from intense heat. Zero-day exploits are things that
don’t normally come to mind. For example, this might be a new form
of spyware infecting a popular website. When zero-day exploits happen, they can leave assets even more
vulnerable to threats than they already are. Vulnerability management is the process of
finding vulnerabilities and fixing their exploits. That’s why the process is
performed regularly at most organizations. Perhaps the most important step of the
process is identifying vulnerabilities. We’ll explore this step in more
details next time we get together. I’ll meet you again then!
Which of the following are steps in the vulnerability management process? Select three answers.
Consider potential exploits, Prepare defenses against threats, Identify vulnerabilities
Vulnerability management is a four-step process that includes the following steps: identify vulnerabilities, consider potential exploits, prepare defenses against threats, and evaluate those defenses.
Video: Defense in depth strategy
Main Points:
- Defense in depth is a security model resembling a layered castle defense.
- Each layer acts as a barrier, mitigating the risk of an attack succeeding.
- In cybersecurity, information is protected using a five-layer defense in depth model:
- Perimeter: User authentication and access control (firewalls, passwords)
- Network: Authorization and network segmentation (firewalls, intrusion detection systems)
- Endpoint: Device protection (anti-virus, endpoint security)
- Application: Interface and application security (multi-factor authentication, code reviews)
- Data: Data protection and classification (encryption, data loss prevention)
- Each layer utilizes various security controls to safeguard information as it travels through the network.
- Many businesses design their security systems based on the defense in depth model.
Key Takeaways:
- Layered defense significantly reduces the likelihood of successful attacks.
- Different layers address different vulnerabilities and threats.
- Each layer plays a crucial role in protecting sensitive information.
- Understanding the defense in depth model provides insights into organizational security practices.
Additional Notes:
- The castle analogy effectively illustrates the layered defense concept.
- Each layer implements distinct security controls tailored to its specific function.
- The model helps visualize how information flows through various security barriers.
- Organizations can choose and customize security controls within each layer.
Conclusion:
Defense in depth is a powerful security paradigm that employs multiple layers of defenses to minimize risks and ensure the integrity of critical assets. Understanding this concept is essential for both individuals and organizations to effectively protect themselves from cyber threats.
In the realm of cybersecurity, defense in depth (DID) is a fundamental strategy for protecting valuable information and systems. Imagine a medieval castle with its layered defenses, including moats, walls, and archers. Each layer adds another obstacle for attackers, making it significantly harder to breach the castle’s inner sanctum. Similarly, DID implements multiple security measures across various layers to create a robust and resilient defense against cyber threats.
Why Defense in Depth?
- Reduces Vulnerability Surface: DID helps minimize the attack surface by employing multiple layers of security, making it more difficult for attackers to find and exploit vulnerabilities.
- Minimizes Damage: Even if one layer is breached, the remaining layers can still impede the attacker’s progress, potentially containing the damage and limiting the impact on critical assets.
- Improves Resilience: By having multiple layers of defense, the overall security posture is more resilient against attacks. If one layer fails, the others can still provide protection and buy time for further response.
- Flexibility and Scalability: DID allows for a flexible and scalable security approach. Organizations can customize the layers and their respective security controls based on their specific needs and risk profile.
The Five Layers of Defense in Depth:
- Perimeter Security: This layer focuses on securing the outer edges of the network and preventing unauthorized access. Examples of controls include firewalls, intrusion detection/prevention systems (IDS/IPS), and access control lists (ACLs).
- Network Security: This layer safeguards internal network communications and prevents lateral movement within the network. Security controls include network segmentation, virtual private networks (VPNs), and network monitoring tools.
- Endpoint Security: This layer protects individual devices like laptops, desktops, and servers from malware, vulnerabilities, and unauthorized access. Examples of controls include anti-virus software, endpoint detection and response (EDR) solutions, and application whitelisting.
- Application Security: This layer focuses on securing applications and mitigating vulnerabilities within the code itself. Security controls include secure coding practices, vulnerability scanning, and penetration testing.
- Data Security: This layer protects sensitive data at rest and in transit. Examples of controls include data encryption, data loss prevention (DLP) solutions, and access controls for sensitive data repositories.
Implementation and Best Practices:
- Identify Critical Assets: Identify the most valuable and sensitive assets requiring the highest level of protection.
- Choose Appropriate Controls: Select suitable security controls for each layer based on risk assessment and specific security needs.
- Focus on Least Privilege: Implement the principle of least privilege, providing users with minimal access rights necessary for their tasks.
- Continuously Monitor and Evaluate: Regularly monitor security logs, conduct vulnerability assessments, and update security controls proactively.
- Incident Response Planning: Develop a comprehensive incident response plan to address potential security breaches effectively and efficiently.
Benefits of Defense in Depth:
- Enhanced Security Posture: DID provides a holistic and layered approach to security, significantly improving the overall security posture of an organization.
- Reduced Risk of Attacks: The multiple layers of defense make it more difficult for attackers to succeed, reducing the likelihood of successful cyberattacks.
- Improved Compliance: DID can help organizations comply with various security regulations and standards.
- Faster Incident Response: The layered approach can help isolate and contain security incidents quickly, minimizing potential damage.
Conclusion:
Defense in depth is a vital strategy for implementing comprehensive and effective cybersecurity. By employing multiple layers of security controls and focusing on continuous improvement, organizations can significantly reduce their risk of cyberattacks and ensure the protection of their valuable assets. Understanding and implementing DID is crucial for anyone involved in cybersecurity, whether individuals protecting their personal devices or organizations safeguarding critical infrastructure.
Which of the following is a layered approach to vulnerability management that reduces risk?
Defense in depth
Defense in depth is a layered approach to vulnerability management that reduces risk. It’s a security approach that protects assets by surrounding them with multiple layers of protection.
A layered defense is
difficult to penetrate. When one barrier fails, another takes its place
to stop an attack. Defense in depth is a security model that
makes use of this concept. It’s a layered approach to vulnerability management
that reduces risk. Defense in depth is
commonly referred to as the castle approach because it resembles the layered
defenses of a castle. In the Middle Ages, these structures were very
difficult to penetrate. They featured
different defenses, each unique in its design, that posed different challenges
for attackers. For example, a
water-filled barrier called a moat usually formed a circle around the castle,
preventing threats like large groups of attackers from
reaching the castle walls. The few soldiers that made
it past the first layer of defense were then faced with a new challenge,
giant stone walls. A vulnerability of
these structures were that they could be climbed. If attackers tried exploiting
that weakness, guess what? They were met with
another layer of defense, watch towers, filled
with defenders ready to shoot arrows and
keep them from climbing! Each level of defense of these medieval structures
minimized the risk of attacks by identifying
vulnerabilities and implementing a security control
should one system fail. Defense in depth works
in a similar way. The defense in depth concept can be used to
protect any asset. It’s mainly used in
cybersecurity to protect information using a
five layer design. Each layer features a number
of security controls that protect information as it travels in and out of the model. The first layer of defense in depth is the perimeter layer. This layer includes
some technologies that we’ve already explored, like usernames and passwords. Mainly, this is a user authentication layer
that filters external access. Its function is to
only allow access to trusted partners to reach
the next layer of defense. Second, the network
layer is more closely aligned
with authorization. The network layer is made up of other technologies like
network firewalls and others. Next, is the endpoint layer. Endpoints refer to the devices that have access on a network. They could be devices
like a laptop, desktop, or a server. Some examples of
technologies that protect these devices are
anti-virus software. After that, we get to
the application layer. This includes all the interfaces that are used to interact
with technology. At this layer,
security measures are programmed as part
of an application. One common example is
multi-factor authentication. You may be familiar
with having to enter both your password
and a code sent by SMS. This is part of the
application layer of defense. And finally, the fifth layer of
defense is the data layer. At this layer, we’ve arrived at the critical data that
must be protected, like personally
identifiable information. One security control
that is important here in this final layer of defense
is asset classification. Like I mentioned earlier, information passes in
and out of each of these five layers whenever
it’s exchanged over a network. There are many more security
controls aside from the few that I mentioned that are part of the defense in depth model. A lot of businesses design their security systems using
the defense in-depth model. Understanding this
framework hopefully gives you a better sense of how an organization’s
security controls work together to protect
important assets.
Video: Common vulnerabilities and exposures
Main Points:
- Vulnerability libraries:
- Online resources for sharing and documenting vulnerabilities and exposures.
- Examples include CVE list and NIST National Vulnerabilities Database.
- Vulnerability vs. exposure:
- Vulnerability: Weakness of a system.
- Exposure: Mistake that can be exploited by a threat.
- CVE list:
- Public library of known vulnerabilities and exposures.
- Created by MITRE Corporation in 1999.
- Purpose: Standardized identification and categorization of vulnerabilities.
- Reporting process involves independent researchers, technology vendors, and ethical hackers.
- Strict review process by CVE Numbering Authorities (CNAs) before assigning IDs.
- CVEs must meet specific criteria: independent issue, security risk potential, supporting evidence, single codebase affected.
- CVSS:
- Common Vulnerability Scoring System.
- Measurement system for severity of vulnerabilities.
- Used by security teams to prioritize fixes and determine patch urgency.
- Base score ranges from 0-10 (low risk to critical risk).
- Benefits of vulnerability libraries:
- Help organizations prioritize security fixes.
- Provide information on vulnerability severity and risk.
- Offer diverse perspectives and recommendations.
Key Takeaways:
- Online libraries play a crucial role in vulnerability management.
- CVE list and CVSS are valuable resources for security professionals.
- Understanding vulnerabilities and exposures is essential for effective security.
- Collaboration within the cybersecurity community is vital for improved protection.
Additional Notes:
- CVE list and CVSS are constantly evolving to address new vulnerabilities.
- Security teams should stay informed about updates and adapt their strategies accordingly.
- Participating in vulnerability reporting and research contributes to a safer online environment.
Conclusion:
Vulnerability libraries like the CVE list and the NIST National Vulnerabilities Database are essential tools for security professionals. These resources provide valuable information about vulnerabilities, their severity, and mitigation strategies. By leveraging these libraries and participating in the broader cybersecurity community, organizations can effectively manage vulnerabilities and protect their assets from potential threats.
Every connected device and software program carries vulnerabilities, making them susceptible to cyberattacks. These vulnerabilities can be exploited by attackers to gain unauthorized access, steal sensitive information, or disrupt operations. Therefore, understanding and managing vulnerabilities is crucial for any organization or individual concerned about cybersecurity.
What are Common Vulnerabilities and Exposures (CVEs)?
Common Vulnerabilities and Exposures (CVEs) are a standardized way to identify and track publicly known vulnerabilities. They are maintained by MITRE Corporation, a non-profit organization that focuses on national security and public safety.
Each CVE is assigned a unique identifier and a detailed description, including:
- Vulnerability type: Describes the nature of the vulnerability (e.g., buffer overflow, SQL injection)
- Affected products: Lists the software or hardware products affected by the vulnerability
- Severity score: Uses the Common Vulnerability Scoring System (CVSS) to assess the potential impact of the vulnerability (0-10 scale)
- Public disclosure date: Date when the vulnerability was publicly disclosed
- References: Links to additional information about the vulnerability and its mitigation
Why are CVEs important?
CVEs are important for several reasons:
- Standardization: Provides a common language for discussing vulnerabilities across different organizations and tools.
- Information sharing: Enables researchers, vendors, and security teams to share information about vulnerabilities and coordinate mitigation efforts.
- Risk assessment: Helps organizations prioritize vulnerabilities based on their severity and potential impact.
- Patching and remediation: Provides a reference point for identifying affected systems and applying necessary patches or other mitigation measures.
How are CVEs used?
CVEs are used by various stakeholders in the cybersecurity ecosystem:
- Security teams: Use CVEs to identify vulnerabilities in their systems, prioritize patching efforts, and track the effectiveness of their vulnerability management program.
- Software vendors: Use CVEs to track vulnerabilities in their products and develop patches or other mitigation measures.
- Researchers: Use CVEs to track emerging threats and develop new security tools and techniques.
- Individuals: Use CVEs to understand the risks associated with the software they use and take steps to protect themselves from cyberattacks.
Where can I find more information about CVEs?
The official CVE website is the primary source for information about CVEs: https://cve.mitre.org/
Additional resources:
- National Institute of Standards and Technology (NIST) National Vulnerability Database: https://nvd.nist.gov/
- Open Web Application Security Project (OWASP) Top 10: https://owasp.org/www-project-top-ten/
- SANS Institute Internet Storm Center: https://isc.sans.edu/
How to stay informed about CVEs?
- Subscribe to CVE feeds or newsletters.
- Follow security researchers and organizations on social media.
- Attend security conferences and workshops.
- Regularly update your software and operating systems.
Conclusion:
Understanding and managing CVEs is an essential part of any comprehensive cybersecurity strategy. By using available resources and staying informed about emerging threats, individuals and organizations can minimize the risk of cyberattacks and protect their valuable assets.
Which of the following criteria need to be met before qualifying for a CVE® ID? Select three answers.
- Vulnerabilities must be recognized as a potential security risk.
- Vulnerabilities must only affect one codebase.
- Vulnerabilities must be submitted with supporting evidence.
Vulnerabilities must only affect a single codebase, be submitted with supporting evidence, and be recognized as potential security risks to qualify for a CVE® ID. They must also be independent of other issues.
We’ve discussed before that
security is a team effort. Did you know the group extends well beyond a single
security team? Protecting information
is a global effort! When it comes to
vulnerabilities, there are actually
online public libraries. Individuals and
organizations use them to share and document common
vulnerabilities and exposures. We’ve been focusing a
lot on vulnerabilities. Exposures are similar, but
they have a key difference. While a vulnerability is
a weakness of a system, an exposure is a mistake that can be exploited
by a threat. For example, imagine you’re asked to protect an
important document. Documents are vulnerable
to being misplaced. If you laid the document
down near an open window, it could be exposed
to being blown away. One of the most
popular libraries of vulnerabilities and
exposures is the CVE list. The common vulnerabilities and exposures list, or CVE list, is an openly
accessible dictionary of known vulnerabilities
and exposures. It is a popular resource. Many organizations
use a CVE list to find ways to improve
their defenses. The CVE list was
originally created by MITRE corporation in 1999. MITRE is a collection of non-profit research and
development centers. They’re sponsored by
the US government. Their focus is on improving security technologies
around the world. The main purpose of
the CVE list is to offer a standard
way of identifying and categorizing known
vulnerabilities and exposures. Most CVEs in the list are reported by independent
researchers, technology vendors,
and ethical hackers, but anyone can report one. Before a CVE can make
it onto the CVE list, it first goes through a
strict review process by a CVE Numbering
Authority, or CNA. A CNA is an organization
that volunteers to analyze and distribute
information on eligible CVEs. All of these groups have an established record of
researching vulnerabilities and demonstrating security
advisory capabilities. When a vulnerability or
exposure is reported to them, a rigorous testing
process takes place. The CVE list tests
four criteria that a vulnerability must have
before it’s assigned an ID. First, it must be
independent of other issues. In other words, the
vulnerability should be able to be fixed without having
to fix something else. Second, it must be recognized as a potential security risk
by whoever reports it. Third, the vulnerability must be submitted with
supporting evidence. And finally, the reported
vulnerability can only affect one codebase, or in other words, only
one program’s source code. For instance, the
desktop version of Chrome may be vulnerable, but the Android
application may not be. If the reported flaw passes
all of these tests, it is assigned a CVE ID. Vulnerabilities added
to the CVE list are often reviewed by other online
vulnerability databases. These organizations
put them through additional tests to reveal how significant the flaws are and to determine what kind of
threat they pose. One of the most popular is the NIST National
Vulnerabilities Database. The NIST National
Vulnerabilities Database uses what’s known as the common
vulnerability scoring system, or CVSS, which is a measurement system that scores the severity of a vulnerability. Security teams use
CVSS as a way of calculating the impact
a vulnerability could have on a system. They also use them
to determine how quickly a vulnerability
should be patched. The NIST National
Vulnerabilities Database provides a base score of CVEs
on a scale of 0-10. Base scores reflect the moment a vulnerability is evaluated, so they don’t change over time. In general, a CVSS that scores below a 4.0 is considered
to be low risk and doesn’t require
immediate attention. However, anything above a
9.0 is considered to be a critical risk to company assets that should
be addressed right away. Security teams commonly
use the CVE list and CVSS scores as part of their vulnerability
management strategy. These references
provide recommendations for prioritizing security fixes, like installing software
updates before patches. Libraries like the CVE list, help organizations
answer questions. Is a vulnerability
dangerous to our business? If so, how soon
should we address it? These online libraries
bring together diverse perspectives
from across the world. Contributing to this
effort is one of my favorite parts of
working in this field. Keep gaining experience, and I hope you’ll
participate too!
Reading: The OWASP Top 10
Reading
To prepare for future risks, security professionals need to stay informed. Previously, you learned about the CVE® list, an openly accessible dictionary of known vulnerabilities and exposures. The CVE® list is an important source of information that the global security community uses to share information with each other.
In this reading, you’ll learn about another important resource that security professionals reference, the Open Web Application Security Project, recently renamed Open Worldwide Application Security Project® (OWASP). You’ll learn about OWASP’s role in the global security community and how companies use this resource to focus their efforts.
What is OWASP?
OWASP is a nonprofit foundation that works to improve the security of software. OWASP is an open platform that security professionals from around the world use to share information, tools, and events that are focused on securing the web.
The OWASP Top 10
One of OWASP’s most valuable resources is the OWASP Top 10. The organization has published this list since 2003 as a way to spread awareness of the web’s most targeted vulnerabilities. The Top 10 mainly applies to new or custom made software. Many of the world’s largest organizations reference the OWASP Top 10 during application development to help ensure their programs address common security mistakes.
Pro tip: OWASP’s Top 10 is updated every few years as technologies evolve. Rankings are based on how often the vulnerabilities are discovered and the level of risk they present.
Note: Auditors also use the OWASP Top 10 as one point of reference when checking for regulatory compliance.
Common vulnerabilities
Businesses often make critical security decisions based on the vulnerabilities listed in the OWASP Top 10. This resource influences how businesses design new software that will be on their network, unlike the CVE® list, which helps them identify improvements to existing programs. These are the most regularly listed vulnerabilities that appear in their rankings to know about:
Broken access control
Access controls limit what users can do in a web application. For example, a blog might allow visitors to post comments on a recent article but restricts them from deleting the article entirely. Failures in these mechanisms can lead to unauthorized information disclosure, modification, or destruction. They can also give someone unauthorized access to other business applications.
Cryptographic failures
Information is one of the most important assets businesses need to protect. Privacy laws such as General Data Protection Regulation (GDPR) require sensitive data to be protected by effective encryption methods. Vulnerabilities can occur when businesses fail to encrypt things like personally identifiable information (PII). For example, if a web application uses a weak hashing algorithm, like MD5, it’s more at risk of suffering a data breach.
Injection
Injection occurs when malicious code is inserted into a vulnerable application. Although the app appears to work normally, it does things that it wasn’t intended to do. Injection attacks can give threat actors a backdoor into an organization’s information system. A common target is a website’s login form. When these forms are vulnerable to injection, attackers can insert malicious code that gives them access to modify or steal user credentials.
Insecure design
Applications should be designed in such a way that makes them resilient to attack. When they aren’t, they’re much more vulnerable to threats like injection attacks or malware infections. Insecure design refers to a wide range of missing or poorly implemented security controls that should have been programmed into an application when it was being developed.
Security misconfiguration
Misconfigurations occur when security settings aren’t properly set or maintained. Companies use a variety of different interconnected systems. Mistakes often happen when those systems aren’t properly set up or audited. A common example is when businesses deploy equipment, like a network server, using default settings. This can lead businesses to use settings that fail to address the organization’s security objectives.
Vulnerable and outdated components
Vulnerable and outdated components is a category that mainly relates to application development. Instead of coding everything from scratch, most developers use open-source libraries to complete their projects faster and easier. This publicly available software is maintained by communities of programmers on a volunteer basis. Applications that use vulnerable components that have not been maintained are at greater risk of being exploited by threat actors.
Identification and authentication failures
Identification is the keyword in this vulnerability category. When applications fail to recognize who should have access and what they’re authorized to do, it can lead to serious problems. For example, a home Wi-Fi router normally uses a simple login form to keep unwanted guests off the network. If this defense fails, an attacker can invade the homeowner’s privacy.
Software and data integrity failures
Software and data integrity failures are instances when updates or patches are inadequately reviewed before implementation. Attackers might exploit these weaknesses to deliver malicious software. When that occurs, there can be serious downstream effects. Third parties are likely to become infected if a single system is compromised, an event known as a supply chain attack.
A famous example of a supply chain attack is the SolarWinds cyber attack (2020) where hackers injected malicious code into software updates that the company unknowingly released to their customers.
Security logging and monitoring failures
In security, it’s important to be able to log and trace back events. Having a record of events like user login attempts is critical to finding and fixing problems. Sufficient monitoring and incident response is equally important.
Server-side request forgery
Companies have public and private information stored on web servers. When you use a hyperlink or click a button on a website, a request is sent to a server that should validate who you are, fetch the appropriate data, and then return it to you.
Server-side request forgeries (SSRFs) are when attackers manipulate the normal operations of a server to read or update other resources on that server. These are possible when an application on the server is vulnerable. Malicious code can be carried by the vulnerable app to the host server that will fetch unauthorized data.
Key takeaways
Staying informed and maintaining awareness about the latest cybersecurity trends can be a useful way to help defend against attacks and prepare for future risks in your security career. OWASP’s Top 10 is a useful resource where you can learn more about these vulnerabilities.
Reading: Open source intelligence
Reading
Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding weaknesses. But, there are other ways to identify vulnerabilities and threats.
In this reading, you’ll learn about open-source intelligence, commonly known as OSINT. OSINT is the collection and analysis of information from publicly available sources to generate usable intelligence. It’s commonly used to support cybersecurity activities, like identifying potential threats and vulnerabilities. You’ll learn why open-source intelligence is gathered and how it can improve cybersecurity. You’ll also learn about commonly used resources and tools for gathering information and intelligence.
Information vs intelligence
The terms intelligence and information are often used interchangeably, making it easy to mix them up. Both are important aspects of cybersecurity that differ in their focus and objectives.
Information refers to the collection of raw data or facts about a specific subject. Intelligence, on the other hand, refers to the analysis of information to produce knowledge or insights that can be used to support decision-making.
For example, new information might be released about an update to the operating system (OS) that’s installed on your organization’s workstations. Later, you might find that new cyber threats have been linked to this new update by researching multiple cybersecurity news resources. The analysis of this information can be used as intelligence to guide your organization’s decision about installing the OS updates on employee workstations.
In other words, intelligence is derived from information through the process of analysis, interpretation, and integration. Gathering information and intelligence are both important aspects of cybersecurity.
Intelligence improves decision-making
Businesses often use information to gain insights into the behavior of their customers. Insights, or intelligence, can then be used to improve their decision making. In security, open-source information is used in a similar way to gain insights into threats and vulnerabilities that can pose risks to an organization.
OSINT plays a significant role in information security (InfoSec), which is the practice of keeping data in all states away from unauthorized users.
For example, a company’s InfoSec team is responsible for protecting their network from potential threats. They might utilize OSINT to monitor online forums and hacker communities for discussions about emerging vulnerabilities. If they come across a forum post discussing a newly discovered weakness in a popular software that the company uses, the team can quickly assess the risk, prioritize patching efforts, and implement necessary safeguards to prevent an attack.
Here are some of the ways OSINT can be used to generate intelligence:
- To provide insights into cyber attacks
- To detect potential data exposures
- To evaluate existing defenses
- To identify unknown vulnerabilities
Collecting intelligence is sometimes part of the vulnerability management process. Security teams might use OSINT to develop profiles of potential targets and make data driven decisions on improving their defenses.
OSINT tools
There’s an enormous amount of open-source information online. Finding relevant information that can be used to gather intelligence is a challenge. Information can be gathered from a variety of sources, such as search engines, social media, discussion boards, blogs, and more. Several tools also exist that can be used in your intelligence gathering process. Here are just a few examples of tools that you can explore:
- VirusTotal is a service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content.
- MITRE ATT&CK® is a knowledge base of adversary tactics and techniques based on real-world observations.
- OSINT Framework is a web-based interface where you can find OSINT tools for almost any kind of source or platform.
- Have I been Pwned is a tool that can be used to search for breached email accounts.
There are numerous other OSINT tools that can be used to find specific types of information. Remember, information can be gathered from a variety of sources. Ultimately, it’s your responsibility to thoroughly research any available information that’s relevant to the problem you’re trying to solve.
Key takeaways
Gathering information and intelligence are important aspects of cybersecurity. OSINT is used to make evidence-based decisions that can be used to prevent attacks. There’s so much information available, which is why it’s important for security professionals to be skilled with searching for information. Having familiarity with popular OSINT tools and resources will make your research easier when gathering information and collecting intelligence.
Practice Quiz: Test your knowledge: Flaws in the system
Which of the following are steps in the vulnerability management process. Select two answers.
Identify vulnerabilities, Prepare defenses against threats
Vulnerability management is an internal process that includes identifying vulnerabilities and preparing defenses against threats.
An organization is attacked by a vulnerability that was previously unknown. What is this exploit an example of?
A zero-day
A zero-day refers to an exploit that was previously unknown.
Which layer of the defense in depth strategy is a user authentication layer that mainly filters external access?
Perimeter
The perimeter layer consists of authentication technologies that let verified users in.
A security researcher reports a new vulnerability to the CVE® list. Which of the following criteria must the vulnerability meet before it receives a CVE® ID? Select two answers.
The submission must have supporting evidence. It must be independently fixable.
Criteria that must be met are that vulnerabilities should be independently fixable and must have supporting evidence.
Identify system vulnerabilities
Video: Vulnerability assessments
This video explains the process of vulnerability assessments in cybersecurity.
Key points:
- Vulnerability assessments are internal reviews of an organization’s security systems.
- They identify weaknesses and prioritize them for remediation based on risk.
- The four steps of a vulnerability assessment are:
- Identification: Identifying vulnerabilities using scanning tools and manual testing.
- Vulnerability analysis: Testing identified vulnerabilities to understand their root cause.
- Risk assessment: Assigning severity scores to vulnerabilities based on impact and likelihood.
- Remediation: Fixing vulnerabilities based on their risk scores.
- Organizations perform vulnerability assessments regularly to identify and address security issues before attackers exploit them.
Benefits:
- Proactive identification and mitigation of security vulnerabilities.
- Improved security posture and reduced risk of attack.
- Prioritization of resources to address the most critical vulnerabilities.
- Compliance with regulatory standards.
Overall:
Vulnerability assessments are a critical component of any effective cybersecurity strategy. By regularly identifying and addressing vulnerabilities, organizations can significantly reduce their risk of attack.
Introduction
In today’s digital world, where cyber threats are constantly evolving, organizations need a robust cybersecurity strategy to protect their valuable assets. Vulnerability assessments are a critical component of this strategy, helping identify and address weaknesses in systems before attackers can exploit them.
What are Vulnerability Assessments?
A vulnerability assessment is a systematic process for identifying, classifying, and prioritizing security weaknesses in an organization’s IT infrastructure. This process typically involves:
- Asset discovery: Identifying all hardware, software, and data assets within the organization’s IT environment.
- Vulnerability scanning: Using automated tools to scan for known vulnerabilities in these assets.
- Manual testing: Performing manual security testing to identify vulnerabilities that are not detected by automated tools.
- Vulnerability analysis: Evaluating the severity and risk of identified vulnerabilities based on factors such as exploitability, impact, and likelihood of occurrence.
- Reporting and remediation: Reporting the findings of the vulnerability assessment to stakeholders and developing a plan to remediate identified vulnerabilities.
Benefits of Vulnerability Assessments
Vulnerability assessments offer several benefits for organizations, including:
- Improved security posture: By identifying and addressing security weaknesses, organizations can significantly reduce their risk of attack.
- Compliance with regulations: Many industries have regulations that require organizations to conduct regular vulnerability assessments.
- Cost savings: Addressing vulnerabilities proactively can help organizations avoid the costs associated with data breaches and other cyberattacks.
- Enhanced business continuity: Minimizing downtime and disruption caused by cyberattacks.
The Vulnerability Assessment Process
The vulnerability assessment process typically involves the following steps:
1. Planning and Scoping:
- Define the scope of the assessment, including which systems and applications will be assessed.
- Identify the stakeholders who will be involved in the process.
- Develop a timeline and budget for the assessment.
2. Asset Discovery:
- Identify all hardware, software, and data assets within the organization’s IT environment.
- Create an inventory of assets, including their location, configuration, and ownership.
- Update the inventory regularly to reflect changes in the IT environment.
3. Vulnerability Scanning:
- Use automated tools to scan for known vulnerabilities in identified assets.
- Configure tools to scan for specific vulnerabilities relevant to the organization’s risk profile.
- Regularly update vulnerability scanning tools to ensure they detect the latest threats.
4. Manual Testing:
- Perform manual security testing to identify vulnerabilities that are not detected by automated tools.
- Focus on high-risk systems and applications.
- Document the results of manual testing.
5. Vulnerability Analysis:
- Evaluate the severity and risk of identified vulnerabilities.
- Consider factors such as exploitability, impact, and likelihood of occurrence.
- Assign a risk score to each vulnerability to prioritize remediation efforts.
6. Reporting and Remediation:
- Report the findings of the vulnerability assessment to stakeholders.
- Develop a plan to remediate identified vulnerabilities.
- Prioritize remediation efforts based on the risk scores assigned to vulnerabilities.
- Regularly monitor and update the vulnerability assessment process to ensure its effectiveness.
Tools and Resources
Several tools and resources are available to help organizations conduct vulnerability assessments, including:
- Vulnerability scanning tools: Nessus, OpenVAS, Qualys
- Manual testing tools: Burp Suite, OWASP ZAP
- Vulnerability databases: CVE, NVD
Best Practices for Vulnerability Assessments
Here are some best practices for conducting vulnerability assessments:
- Perform vulnerability assessments regularly.
- Automate as much of the process as possible.
- Prioritize the remediation of high-risk vulnerabilities.
- Integrate vulnerability assessments into your overall security program.
- Develop a culture of security within your organization.
By following these best practices, organizations can conduct effective vulnerability assessments that help them identify and address security weaknesses before attackers can exploit them.
Conclusion
Vulnerability assessments are a critical component of any effective cybersecurity strategy. By regularly identifying and addressing security weaknesses, organizations can significantly reduce their risk of attack and protect their valuable assets.
Additional Resources:
- SANS Institute: http://bok.ahima.org/doc?oid=25313
- Open Web Application Security Project (OWASP): https://owasp.org/
- National Institute of Standards and Technology (NIST): https://www.nist.gov/cybersecurity
Which of the following steps may be part of a vulnerability assessment? Select three answers.
Remediation, Identification, Risk assessment
A vulnerability assessment may include identification, risk assessment, and remediation. It may also include vulnerability analysis. During a risk assessment, a score is assigned to each vulnerability based on its likelihood and severity.
Our exploration of the
vulnerability management process so far has been focused
on a couple of topics. We’ve discussed how
vulnerabilities influence the
design of defenses. We’ve also talked about how common vulnerabilities
are shared. A topic we’re yet to cover is how vulnerabilities are
found in the first place. Weaknesses and
flaws are generally found during a
vulnerability assessment. A vulnerability assessment is the internal review process of an organization’s
security systems. These assessments work
similar to the process of identifying and categorizing
vulnerabilities on the CVE list. The main difference is the organization’s
security team performs, evaluates, scores, and
fixes them on their own. Security analysts play a key role throughout
this process. Overall, the goal of a vulnerability assessment is to identify weak points
and prevent attacks. They’re also how security
teams determine whether their security controls
meet regulatory standards. Organizations perform
vulnerability assessments a lot. Because companies
have so many assets to protect, security teams sometimes need to
select which area to focus on through
vulnerability assessments. Once they decide
what to focus on, vulnerability assessments
typically follow a four-step process. The first step is
identification. Here, scanning tools and manual testing are used
to find vulnerabilities. During the identification step, the goal is to understand the current state of
a security system, like taking a picture of it. A large number of findings usually appear after
identification. The next step of the process
is vulnerability analysis. During this step, each of the vulnerabilities that
were identified are tested. By being a digital
detective, the goal of vulnerability analysis is to find the source of the problem. The third step of the
process is risk assessment. During this step of the process, a score is assigned to
each vulnerability. This score is assigned
based on two factors: how severe the impact would
be if the vulnerability were to be exploited and the
likelihood of this happening. Vulnerabilities uncovered during the first two steps
of this process often outnumber the people
available to fix them. Risk assessments are a way
of prioritizing resources to handle the vulnerabilities
that need to be addressed based on their score. The fourth and final step of vulnerability assessment
is remediation. It’s during this step that
the vulnerabilities that can impact the
organization are addressed. Remediation occurs depending on the severity score assigned during the risk assessment step. This part of the
process is normally a joint effort between
the security staff and IT teams to come up with
the best approach to fixing the vulnerabilities
that were uncovered earlier. Examples of remediation
steps might include things like enforcing
new security procedures, updating operating systems, or implementing system patches. Vulnerability
assessments are great for identifying the
flaws of a system. Most organizations use them to search for problems
before they happen. But how do we know
where to search? When we get together again, we’ll explore how companies
figure this out.
Reading: Approaches to vulnerability scanning
Reading
Previously, you learned about a vulnerability assessment, which is the internal review process of an organization’s security systems. An organization performs vulnerability assessments to identify weaknesses and prevent attacks. Vulnerability scanning tools are commonly used to simulate threats by finding vulnerabilities in an attack surface. They also help security teams take proactive steps towards implementing their remediation strategy.
Vulnerability scanners are important tools that you’ll likely use in the field. In this reading, you’ll explore how vulnerability scanners work and the types of scans they can perform.
What is a vulnerability scanner?
A vulnerability scanner is software that automatically compares known vulnerabilities and exposures against the technologies on the network. In general, these tools scan systems to find misconfigurations or programming flaws.
Scanning tools are used to analyze each of the five attack surfaces that you learned about in the video about the defense in depth strategy:
- Perimeter layer, like authentication systems that validate user access
- Network layer, which is made up of technologies like network firewalls and others
- Endpoint layer, which describes devices on a network, like laptops, desktops, or servers
- Application layer, which involves the software that users interact with
- Data layer, which includes any information that’s stored, in transit, or in use
When a scan of any layer begins, the scanning tool compares the findings against databases of security threats. At the end of the scan, the tool flags any vulnerabilities that it finds and adds them to its reference database. Each scan adds more information to the database, helping the tool be more accurate in its analysis.
Note: Vulnerability databases are also routinely updated by the company that designed the scanning software.
Performing scans
Vulnerability scanners are meant to be non-intrusive. Meaning, they don’t break or take advantage of a system like an attacker would. Instead, they simply scan a surface and alert you to any potentially unlocked doors in your systems.
Note: While vulnerability scanners are non-intrusive, there are instances when a scan can inadvertently cause issues, like crash a system.
There are a few different ways that these tools are used to scan a surface. Each approach corresponds to the pathway a threat actor might take. Next, you can explore each type of scan to get a clearer picture of this.
External vs. internal
External and internal scans simulate an attacker’s approach.
External scans test the perimeter layer outside of the internal network. They analyze outward facing systems, like websites and firewalls. These kinds of scans can uncover vulnerable things like vulnerable network ports or servers.
Internal scans start from the opposite end by examining an organization’s internal systems. For example, this type of scan might analyze application software for weaknesses in how it handles user input.
Authenticated vs. unauthenticated
Authenticated and unauthenticated scans simulate whether or not a user has access to a system.
Authenticated scans might test a system by logging in with a real user account or even with an admin account. These service accounts are used to check for vulnerabilities, like broken access controls.
Unauthenticated scans simulate external threat actors that do not have access to your business resources. For example, a scan might analyze file shares within the organization that are used to house internal-only documents. Unauthenticated users should receive “access denied” results if they tried opening these files. However, a vulnerability would be identified if you were able to access a file.
Limited vs. comprehensive
Limited and comprehensive scans focus on particular devices that are accessed by internal and external users.
Limited scans analyze particular devices on a network, like searching for misconfigurations on a firewall.
Comprehensive scans analyze all devices connected to a network. This includes operating systems, user databases, and more.
Pro tip: Discovery scanning should be done prior to limited or comprehensive scans. Discovery scanning is used to get an idea of the computers, devices, and open ports that are on a network.
Key takeaways
Finding vulnerabilities requires thinking of all possibilities. Vulnerability scans vary depending on the surfaces that an organization is evaluating. Usually, seasoned security professionals lead the effort of configuring and performing these types of scans to create a profile of a company’s security posture. However, analysts also play an important role in the process. The results of a vulnerability scan often lead to renewed compliance efforts, procedural changes, and system patching. Understanding the objectives of common types of vulnerability scans will help you participate in these proactive security exercises whenever possible.
Tip: To explore vulnerability scanner software commonly used in the cybersecurity industry, in your preferred browser enter search terms similar to “popular vulnerability scanner software” and/or “open source vulnerability scanner software used in cybersecurity”.
Reading: The importance of updates
Reading
At some point in time, you may have wondered, “Why do my devices constantly need updating?” For consumers, updates provide improvements to performance, stability, and even new features! But from a security standpoint, they serve a specific purpose. Updates allow organizations to address security vulnerabilities that can place their users, devices, and networks at risk.
In a video, you learned that updates fit into every security team’s remediation strategy. They usually take place after a vulnerability assessment, which is the internal review process of an organization’s security systems. In this reading, you’ll learn what updates do, how they’re delivered, and why they’re important to cybersecurity.
Patching gaps in security
An outdated computer is a lot like a house with unlocked doors. Malicious actors use these gaps in security the same way, to gain unauthorized access. Software updates are similar to locking the doors to keep them out.
A patch update is a software and operating system update that addresses security vulnerabilities within a program or product. Patches usually contain bug fixes that address common security vulnerabilities and exposures.
Note: Ideally, patches address common vulnerabilities and exposures before malicious hackers find them. However, patches are sometimes developed as a result of a zero-day, which is an exploit that was previously unknown.
Common update strategies
When software updates become available, clients and users have two installation options:
- Manual updates
- Automatic updates
As you’ll learn, each strategy has both benefits and disadvantages.
Manual updates
A manual deployment strategy relies on IT departments or users obtaining updates from the developers. Home office or small business environments might require you to find, download, and install updates yourself. In enterprise settings, the process is usually handled with a configuration management tool. These tools offer a range of options to deploy updates, like to all clients on your network or a select group of users.
Advantage: An advantage of manual update deployment strategies is control. That can be useful if software updates are not thoroughly tested by developers, leading to instability issues.
Disadvantage: A drawback to manual update deployments is that critical updates can be forgotten or disregarded entirely.
Automatic updates
An automatic deployment strategy takes the opposite approach. With this option, finding, downloading, and installing updates can be done by the system or application.
Pro tip: The Cybersecurity and Infrastructure Security Agency (CISA) recommends using automatic options whenever they’re available.
Certain permissions need to be enabled by users or IT groups before updates can be installed, or pushed, when they’re available. It is up to the developers to adequately test their patches before release.
Advantage: An advantage to automatic updates is that the deployment process is simplified. It also keeps systems and software current with the latest, critical patches.
Disadvantage: A drawback to automatic updates is that instability issues can occur if the patches were not thoroughly tested by the vendor. This can result in performance problems and a poor user experience.
End-of-life software
Sometimes updates are not available for a certain type of software known as end-of-life (EOL) software. All software has a lifecycle. It begins when it’s produced and ends when a newer version is released. At that point, developers must allocate resources to the newer versions, which leads to EOL software. While the older software is still useful, the manufacturer no longer supports it.
Note: Patches and updates are very different from upgrades. Upgrades refer to completely new versions of hardware or software that can be purchased.
CISA recommends discontinuing the use of EOL software because it poses an unfixable risk to systems. But, this recommendation is not always followed. Replacing EOL technology can be costly for businesses and individual users.
The risks that EOL software presents continues to grow as more connected devices enter the marketplace. For example, there are billions of Internet of Things (IoT) devices, like smart light bulbs, connected to home and work networks. In some business settings, all an attacker needs is a single unpatched device to gain access to the network and cause problems.
Key takeaways
Updating software and patching vulnerabilities is an important practice that everyone should participate in. Unfortunately, that’s not always the case. Many of the biggest cyber attacks in the world might have been prevented if systems were kept updated. One example is the WannaCry attack of 2017. The attack affected computers in more than 150 countries and caused an estimated $4 billion dollars in damages. Researchers have since found that WannaCry could have been prevented if the infected systems were up-to-date with a security patch that was made available months before the attack. Keeping software updated requires effort. However, the benefits they provide make them worthwhile.
Video: Omad: My learning journey into cybersecurity
Unexpected career change:
- Omad initially worked at a prison and then a sheriff’s office.
- He found a Google residency program and applied on a whim.
- Despite having no formal tech background, he impressed the interviewers with his transferable skills and mindset.
Importance of transferable skills:
- Career changers bring valuable experiences and perspectives to the tech industry.
- Skills like risk assessment and problem-solving are essential for cybersecurity.
- Hiring managers look for these skills in addition to technical knowledge.
Advice for aspiring cybersecurity professionals:
- Don’t be afraid to pursue a career change.
- Cybersecurity is a challenging and rewarding field.
- Transferable skills are just as important as technical expertise.
Overall message:
- Omad’s story demonstrates that anyone can succeed in cybersecurity with the right mindset and skills.
- Don’t underestimate the value of your life experiences and transferable skills.
- Take a chance and pursue your passion!
[MUSIC] My name is Omad, I’m a corporate
operations engineer at Google. All I do is solve problems. Googlers have problems, they need somebody
to talk to, they usually talk to us. If you asked me at 18 years
old where I’d be now, I would have never told you I’d be
working as a security engineer. I would have told you I’d be working
in a prison or I’d be working as a police officer in some township and
just working a regular 9 to 5 shift. After high school,
I went on to work at Trenton State Prison, which is the only maximum
security prison in New Jersey. It was very stressful, but at the same
time it’s what I wanted to do at the time, or at least, that’s what I thought
I wanted to do at that time. Five years after becoming
a correction officer, I took the test again to
be a sheriff’s officer. And on the last day of that academy,
I decided this wasn’t for me. I was tired of being on my face doing
pushups, I was tired of being yelled at. I went home and I did what everybody
else would do, do a Google search. And I saw one for Google and
it was a residency program, it was at the top of the list and
I applied to it as a joke. I even told my friends at the time,
I’m just going to apply this, I’m not going to get in. I had no reference, no connections,
I knew nobody that worked at Google. And within a couple of days a recruiter
reached out to me, she said, “I think you’re a great fit,
you’re a career changer. I like your application, I like your
resume, I think you’d be a great fit.” All the interviewers liked my background,
they liked that I was self taught. A lot of interviewers were
able to relate to me. They said, “Hey, I did the same thing.” From there, I was offered the job and
I started my career. When I was in orientation, somebody right next to me was actually
the valedictorian of Princeton. Here I am with no college degree,
no exposure, no work experience, and I’m in the same company. For career changers, what you have that other people
don’t have is a different mindset. You’re coming from experience outside of
the technical space that you can transfer into the technical space. Don’t forget that we all have skillsets
that can help you in the field. That’s what employers are looking for, that’s what hiring
managers are looking for. One thing I learned as a correction
officer is how to assess risk. Every situation is different, just
like the security space. Every risk is different. Every vulnerability is
different. Every threat is different. You can teach somebody tech, but you can’t teach them a life
of skills outside of tech. If I were to go back and tell my 18 year
old self one piece of advice, it would be, don’t be scared, do it. A career in cybersecurity is very fun. It’s very interesting. It will work your brain. It changed my life,
it’ll change yours as well.
Reading: Penetration testing
Reading
An effective security plan relies on regular testing to find an organization’s weaknesses. Previously, you learned that vulnerability assessments, the internal review process of an organization’s security systems, are used to design defense strategies based on system weaknesses. In this reading, you’ll learn how security teams evaluate the effectiveness of their defenses using penetration testing.
Penetration testing
A penetration test, or pen test, is a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. The simulated attack in a pen test involves using the same tools and techniques as malicious actors in order to mimic a real life attack. Since a pen test is an authorized attack, it is considered to be a form of ethical hacking. Unlike a vulnerability assessment that finds weaknesses in a system’s security, a pen test exploits those weaknesses to determine the potential consequences if the system breaks or gets broken into by a threat actor.
For example, the cybersecurity team at a financial company might simulate an attack on their banking app to determine if there are weaknesses that would allow an attacker to steal customer information or illegally transfer funds. If the pen test uncovers misconfigurations, the team can address them and improve the overall security of the app.
Note: Organizations that are regulated by PCI DSS, HIPAA, or GDPR must routinely perform penetration testing to maintain compliance standards.
Learning from varied perspectives
These authorized attacks are performed by pen testers who are skilled in programming and network architecture. Depending on their objectives, organizations might use a few different approaches to penetration testing:
- Red team tests simulate attacks to identify vulnerabilities in systems, networks, or applications.
- Blue team tests focus on defense and incident response to validate an organization’s existing security systems.
- Purple team tests are collaborative, focusing on improving the security posture of the organization by combining elements of red and blue team exercises.
Red team tests are commonly performed by independent pen testers who are hired to evaluate internal systems. Although, cybersecurity teams may also have their own pen testing experts. Regardless of the approach, penetration testers must make an important decision before simulating an attack: How much access and information do I need?
Penetration testing strategies
There are three common penetration testing strategies:
- Open-box testing is when the tester has the same privileged access that an internal developer would have—information like system architecture, data flow, and network diagrams. This strategy goes by several different names, including internal, full knowledge, white-box, and clear-box penetration testing.
- Closed-box testing is when the tester has little to no access to internal systems—similar to a malicious hacker. This strategy is sometimes referred to as external, black-box, or zero knowledge penetration testing.
- Partial knowledge testing is when the tester has limited access and knowledge of an internal system—for example, a customer service representative. This strategy is also known as gray-box testing.
Closed box testers tend to produce the most accurate simulations of a real-world attack. Nevertheless, each strategy produces valuable results by demonstrating how an attacker might infiltrate a system and what information they could access.
Becoming a penetration tester
Penetration testers are in-demand in the fast growing field of cybersecurity. All of the skills you’re learning in this program can help you advance towards a career in pen testing:
- Network and application security
- Experience with operating systems, like Linux
- Vulnerability analysis and threat modeling
- Detection and response tools
- Programming languages, like Python and BASH
- Communication skills
Programming skills are very helpful in penetration testing because it’s often performed on software and IT systems. With enough practice and dedication, cybersecurity professionals at any level can develop the skills needed to be a pen tester.
Bug bounty programs
Organization’s commonly run bug bounty programs which offer freelance pen testers financial rewards for finding and reporting vulnerabilities in their products. Bug bounties are great opportunities for amateur security professionals to participate and grow their skills.
Pro tip: HackerOne is a community of ethical hackers where you can find active bug bounties to participate in.
Key takeaways
A major risk for organizations is malicious hackers breaking into their systems. Penetration testing is another way for organizations to secure their systems. Security teams use these simulated attacks to get a clearer picture of weaknesses in their defenses. There’s a growing need for specialized security professionals in this field. Even if you start out assisting with these activities, there’s plenty of opportunities to grow and learn the skills to be a pen tester.
Practice Quiz: Test your knowledge: Identify system vulnerabilities
Fill in the blank: A vulnerability ____ refers to the internal review process of an organization’s security systems.
assessment
A vulnerability assessment is an internal review process of an organization’s security systems.
What are the goals of a vulnerability assessment? Select two answers.
To reduce overall threat exposure, To identify existing weaknesses
The goals of a vulnerability assessment are to identify existing weaknesses and reduce overall threat exposure.
Which of the following remediation examples might be implemented after a vulnerability scan? Select two answers.
Installing software updates and patches, Training employees to follow new security procedures
Examples of remediations that might be performed after a vulnerability scan include training employees on new procedures and installing software updates and patches.
What are two types of vulnerability scans? Select two answers.
Limited or comprehensive, Authenticated or unauthenticated
Authenticated or unauthenticated and limited or comprehensive are two types of vulnerability scans. Internal and external is another common type of vulnerability scanning.
Practice Quiz: Portfolio Activity: Analyze a vulnerable system for a small business
Reading: Portfolio Activity Exemplar: Analyze a vulnerable system for a small business
Reading
Completed Exemplar
To review the exemplar for this course item, click the following link and select Use Template.
Link to exemplar: Vulnerability assessment report
Assessment of Exemplar
Compare the exemplar to your completed activity. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that your vulnerability assessment report includes each of the following elements: an explanation of the purpose of the assessment, a completed risk assessment table, an explanation of your approach to quantifying risk, and details of your remediation strategy that address the system’s vulnerabilities.
The exemplar uses details from the given scenario and includes the following:
- 3-5 sentences describing the reasons for conducting the security analysis in the Purpose section
- A completed Risk Assessment section
- 3-5 sentences explaining the reasoning for the identified risks in the Approach section
- 3-5 sentences summarizing a remediation and/or mitigation strategy in the Remediation section
Overview
The exemplar report contains a Purpose section that is an explanation of the information system that’s being assessed—a publicly accessible database server. This statement describes the business function of the system. It also makes clear the reason for conducting the analysis.
The Risk Assessment section of the exemplar contains a completed table. The risk assessment identifies potential threat sources and threat events that could negatively impact the business. Both were determined by asking questions such as:
- Is the threat relevant to this system?
- Is the threat internal or external?
- What is the threat actor’s intent?
- What are the threat actors’ technical capabilities?
The risk of each threat is quantified by multiplying its likelihood of occurring with the severity of its impact on the business. Then, an overall risk score is calculated that demonstrates to stakeholders both the seriousness of the risks to the database and how resources should be prioritized to address the most critical risks.
Note: The number of rows in a risk assessment table can vary depending on the complexity and scope of the assessment.
The Approach section of the exemplar is a statement following the risk assessment that explains why and how specific threats were evaluated.
Lastly, a plan for securing the vulnerable database server was outlined in the Remediation section of the report.
Key takeaways
It’s crucial for security analysts to develop risk assessment and reporting skills. These skills will enable you to identify potential risk within an organization’s systems and escalate that information to the appropriate channels. This activity is intended as an opportunity for you to practice analyzing the risks of a vulnerable system. You can add this document to your cybersecurity portfolio. However, all systems have vulnerabilities. As such, you’re encouraged to continue practicing these skills by applying them to other systems that are discussed in the program.
Cyber attacker mindset
Video: Protect all entry points
Key Points:
- Attack surface: All potential vulnerabilities that attackers can exploit.
- Physical attack surface: People, devices, accessible from both inside and outside.
- Digital attack surface: Everything connected online, including cloud data.
- Security hardening: Strengthening systems to reduce vulnerabilities and attack surface.
- Challenges: Expanding digital attack surface due to cloud computing.
Key Takeaways:
- Understanding your attack surface is crucial for effective security.
- Physical attack surface needs “obstacles” like security policies and access controls.
- Digital attack surface is harder to harden due to cloud usage and remote access.
- Increased attack points require new approaches and resources for security teams.
Next: Exploring the challenges of securing a larger and more complex attack surface.
In the ever-evolving landscape of cyber threats, securing every entry point is paramount. Hackers constantly seek vulnerabilities, and your organization’s digital perimeter needs to be a fortress. This tutorial will equip you with strategies and best practices to protect all entry points and proactively prevent attacks.
Understanding the Entry Points:
Think of your organization’s cybersecurity as a castle. Every gate, window, and secret passage represents an entry point for attackers. These entry points can be physical (devices, servers) or digital (applications, networks). Here are some common ones:
- Network: The gateway to your internal systems. Hackers can exploit vulnerabilities in routers, firewalls, and network protocols.
- Applications: Web applications, mobile apps, and internal software can have vulnerabilities that attackers can exploit to gain access to data or systems.
- Endpoints: Devices like laptops, smartphones, and servers can be infected with malware or compromised through social engineering.
- Cloud: Cloud services and storage can introduce new entry points if not properly secured.
- Physical Security: Unlocked doors, unsecured devices, and social engineering can allow unauthorized access to physical assets and sensitive information.
Building Your Cybersecurity Defense:
Now that you understand the entry points, let’s explore strategies to protect them:
1. Network Security:
- Firewalls: Implement strong firewalls to filter incoming and outgoing traffic.
- Intrusion Detection and Prevention Systems (IDS/IPS): Monitor network traffic for suspicious activity and block potential attacks.
- Vulnerability Management: Regularly scan your network for vulnerabilities and patch them promptly.
- Network Segmentation: Divide your network into smaller segments to limit the impact of a breach.
2. Application Security:
- Secure coding practices: Develop and maintain applications with security in mind.
- Input validation: Sanitize user input to prevent SQL injection and other attacks.
- Regularly update applications: Apply security patches as soon as they become available.
- Penetration testing: Simulate attacks to identify and address vulnerabilities.
3. Endpoint Security:
- Antivirus and anti-malware software: Install and update security software on all devices.
- Endpoint Detection and Response (EDR): Monitor endpoints for suspicious activity and respond to threats quickly.
- Data encryption: Encrypt sensitive data at rest and in transit.
- Strong password policies: Enforce strong passwords and multi-factor authentication.
4. Cloud Security:
- Choose reliable cloud providers: Select providers with strong security practices and compliance certifications.
- Use cloud security services: Leverage cloud-based security tools and services like encryption and access control.
- Monitor and manage your cloud environment: Regularly monitor your cloud infrastructure for suspicious activity.
- Securely configure cloud resources: Configure your cloud resources according to security best practices.
5. Physical Security:
- Implement access controls: Restrict physical access to sensitive areas and equipment.
- Secure devices: Lock down devices and implement password protection.
- Train employees: Train employees on cybersecurity awareness and best practices.
- Be vigilant: Monitor physical security for suspicious activity and potential breaches.
Remember:
- Security is an ongoing process: Continuously monitor and update your security measures.
- Stay informed: Keep up with the latest cyber threats and vulnerabilities.
- Test and practice: Regularly test your incident response plan and conduct security drills.
- Build a culture of security: Make security a priority throughout your organization.
By implementing these strategies and remaining vigilant, you can effectively protect all entry points and build a robust cybersecurity posture. Remember, your organization’s security is only as strong as its weakest point. By proactively addressing all entry points, you can create a formidable defense against cyberattacks and safeguard your valuable data and assets.
Additional Resources:
- National Institute of Standards and Technology (NIST) Cybersecurity Framework: https://www.nist.gov/cyberframework
- Open Web Application Security Project (OWASP) Top 10: https://owasp.org/www-project-top-ten/
- SANS Institute: https://www.sans.org/information-security/
I hope this tutorial provides a valuable starting point for protecting your organization from cyber threats. By taking these steps and staying informed, you can build a secure and resilient digital environment.
There’s a wide range of vulnerabilities
and systems that need to be found. Assessing those weaknesses
is a time-consuming process. To position themselves
ahead of threats and make the most of their limited resources,
companies start by understanding the environment surrounding
their operations. An important part of this is getting
a sense of their attack surface. An attack surface is all the potential
vulnerabilities that a threat actor could exploit. Analyzing the attack surface is usually
the first thing security teams do. For example, imagine being part of
a security team of an old castle. Your team would need to decide how
to allocate resources to defenses. Giant walls, stone towers, and wooden gates are a few common security
controls of these structures. While these are all designed to protect
the assets inside from attacks, they don’t exactly account for
all the possibilities. What if the castle were near the ocean? If it were, these defenses would be
vulnerable to long range attacks by ship. A proper understanding of the attack
surface would mean your security team equipped the castle with catapults that
could deal with these kinds of threats. Modern organizations need to concern
themselves with both a physical and digital attack surface. The physical attack surface is made
up of people and their devices. This surface can be attacked
from both inside and outside the organization,
which makes it unique. For example, let’s consider an unattended laptop
in a public space, like a coffee shop. The person responsible for it walked away while sensitive company
information was visible on the screen. This information is vulnerable
to external threats, like a business competitor, who can easily
record the information and exploit it. An internal threat of this attack surface,
on the other hand, is often angry employees. These employees might share
an organization’s private information on purpose. In general, the physical attack surface
should be filled with obstacles that deter attacks from happening. We call this process security hardening. Security hardening is the process
of strengthening a system to reduce its vulnerabilities and
attack surface. In other words, hardening is the act of minimizing the attack surface
by limiting its points of entry. We do this a lot in security because
the smaller the attack surface, the easier it is to protect. In fact, some security controls
that we’ve explored previously, like organization policies and
access controls, are common ways that organizations harden their
physical attack surface. The digital attack surface
is a bit tougher to harden. The digital attack surface includes
everything that’s beyond our organization’s firewall. In other words, it includes anything
that connects to an organization online. In the past, organizations stored
their data in a single location. This mainly consisted of servers
that were managed on-site. Accessing the information stored on
those servers required connecting to the network the workplace managed. These days, information is accessed outside
of an organization’s network because it’s stored in the cloud. Information can be accessed
from anywhere in the world. A person can be in one part of the world,
fly to another place, and continue working. All while outside
of their organization’s network. Cloud computing has essentially
expanded the digital attack surface. Quicker access to information is
something we all benefit from, but it comes with a cost. Organizations of all sizes are under
more pressure to defend against threats coming from different entry points. When we get together next time, we’ll
explore why this is such a challenge.
Which of the following is an example of an organization's digital attack surface?
The organization’s website
The organization’s website is an example of its digital attack surface. An attack surface refers to all the potential vulnerabilities that a threat actor could exploit. The digital attack surface consists of everything that’s connected to an organization’s network.
Reading: Approach cybersecurity with an attacker mindset
Reading
Cybersecurity is a continuously changing field. It’s a fast-paced environment where new threats and innovative technologies can disrupt your plans at a moment’s notice. As a security professional, it’s up to you to be prepared by anticipating change.
This all starts with identifying vulnerabilities. In a video, you learned about the importance of vulnerability assessments, the internal review process of an organization’s security systems. In this reading, you will learn how you can use the findings of a vulnerability assessment proactively by analyzing them from the perspective of an attacker.
Being prepared for anything
Having a plan should things go wrong is important. But how do you figure out what to plan for? In this field, teams often conduct simulations of things that can go wrong as part of their vulnerability management strategy. One way this is done is by applying an attacker mindset to the weaknesses they discover.
Applying an attacker mindset is a lot like conducting an experiment. It’s about causing problems in a controlled environment and evaluating the outcome to gain insights. Adopting an attacker mindset is a beneficial skill in security because it offers a different perspective about the challenges you’re trying to solve. The insights you gain can be valuable when it’s time to establish a security plan or modify an existing one.
Simulating threats
One method of applying an attacker mindset is using attack simulations. These activities are normally performed in one of two ways: proactively and reactively. Both approaches share a common goal, which is to make systems safer.
- Proactive simulations assume the role of an attacker by exploiting vulnerabilities and breaking through defenses. This is sometimes called a red team exercise.
- Reactive simulations assume the role of a defender responding to an attack. This is sometimes called a blue team exercise.
Each kind of simulation is a team effort that you might be involved with as an analyst.
Proactive teams tend to spend more time planning their attacks than performing them. If you find yourself engaged in one of these exercises, your team will likely deploy a range of tactics. For example, they might persuade staff into disclosing their login credentials using fictitious emails to evaluate security awareness at the company.
On the other hand, reactive teams dedicate their efforts to gathering information about the assets they’re protecting. This is commonly done with the assistance of vulnerability scanning tools.
Scanning for trouble
You might recall that a vulnerability scanner is software that automatically compares existing common vulnerabilities and exposures against the technologies on the network. Vulnerability scanners are frequently used in the field. Security teams employ a variety of scanning techniques to uncover weaknesses in their defenses. Reactive simulations often rely on the results of a scan to weigh the risks and determine ways to remediate a problem.
For example, a team conducting a reactive simulation might perform an external vulnerability scan of their network. The entire exercise might follow the steps you learned in a video about vulnerability assessments:
- Identification: A vulnerable server is flagged because it’s running an outdated operating system (OS).
- Vulnerability analysis: Research is done on the outdated OS and its vulnerabilities.
- Risk assessment: After doing your due diligence, the severity of each vulnerability is scored and the impact of not fixing it is evaluated.
- Remediation: Finally, the information that you’ve gathered can be used to address the issue.
During an activity like this, you’ll often produce a report of your findings. These can be brought to the attention of service providers or your supervisors. Clearly communicating the results of these exercises to others is an important skill to develop as a security professional.
Finding innovative solutions
Many security controls that you’ve learned about were created as a reactive response to risks. That’s because criminals are continually looking for ways to bypass existing defenses. Effectively applying an attacker mindset will require you to stay knowledgeable of security trends and emerging technologies.
Pro tip: Resources like NISTs National Vulnerability Database (NVD) can help you remain current on common vulnerabilities.
Key takeaways
Vulnerability assessments are an important part of security risk planning. As an analyst, you’ll likely participate in proactive and reactive simulations of these activities. Preparing yourself by researching common vulnerabilities only goes so far. It’s equally important that you stay informed about new technologies to be able to think with an innovative mindset.
Reading: Types of threat actors
Reading
Anticipating attacks is an important skill you’ll need to be an effective security professional. Developing this skill requires you to have an open and flexible mindset about where attacks can come from. Previously, you learned about attack surfaces, which are all the potential vulnerabilities that a threat actor could exploit.
Networks, servers, devices, and staff are examples of attack surfaces that can be exploited. Security teams of all sizes regularly find themselves defending these surfaces due to the expanding digital landscape. The key to defending any of them is to limit access to them.
In this reading, you’ll learn more about threat actors and the types of risks they pose. You’ll also explore the most common features of an attack surface that threat actors can exploit.
Threat actors
A threat actor is any person or group who presents a security risk. This broad definition refers to people inside and outside an organization. It also includes individuals who intentionally pose a threat, and those that accidentally put assets at risk. That’s a wide range of people!
Threat actors are normally divided into five categories based on their motivations:
- Competitors refers to rival companies who pose a threat because they might benefit from leaked information.
- State actors are government intelligence agencies.
- Criminal syndicates refer to organized groups of people who make money from criminal activity.
- Insider threats can be any individual who has or had authorized access to an organization’s resources. This includes employees who accidentally compromise assets or individuals who purposefully put them at risk for their own benefit.
- Shadow IT refers to individuals who use technologies that lack IT governance. A common example is when an employee uses their personal email to send work-related communications.
In the digital attack surface, these threat actors often gain unauthorized access by hacking into systems. By definition, a hacker is any person who uses computers to gain access to computer systems, networks, or data. Similar to the term threat actor, hacker is also an umbrella term. When used alone, the term fails to capture a threat actor’s intentions.
Types of hackers
Because the formal definition of a hacker is broad, the term can be a bit ambiguous. In security, it applies to three types of individuals based on their intent:
- Unauthorized hackers
- Authorized, or ethical, hackers
- Semi-authorized hackers
An unauthorized hacker, or unethical hacker, is an individual who uses their programming skills to commit crimes. Unauthorized hackers are also known as malicious hackers. Skill level ranges widely among this category of hacker. For example, there are hackers with limited skills who can’t write their own malicious software, sometimes called script kiddies. Unauthorized hackers like this carry out attacks using pre-written code that they obtain from other, more skilled hackers.
Authorized, or ethical, hackers refer to individuals who use their programming skills to improve an organization’s overall security. These include internal members of a security team who are concerned with testing and evaluating systems to secure the attack surface. They also include external security vendors and freelance hackers that some companies incentivize to find and report vulnerabilities, a practice called bug bounty programs.
Semi-authorized hackers typically refer to individuals who might violate ethical standards, but are not considered malicious. For example, a hacktivist is a person who might use their skills to achieve a political goal. One might exploit security vulnerabilities of a public utility company to spread awareness of their existence. The intentions of these types of threat actors is often to expose security risks that should be addressed before a malicious hacker finds them.
Advanced persistent threats
Many malicious hackers find their way into a system, cause trouble, and then leave. But on some occasions, threat actors stick around. These kinds of events are known as advanced persistent threats, or APTs.
An advanced persistent threat (APT) refers to instances when a threat actor maintains unauthorized access to a system for an extended period of time. The term is mostly associated with nation states and state-sponsored actors. Typically, an APT is concerned with surveilling a target to gather information. They then use the intel to manipulate government, defense, financial, and telecom services.
Just because the term is associated with state actors does not mean that private businesses are safe from APTs. These kinds of threat actors are stealthy because hacking into another government agency or utility is costly and time consuming. APTs will often target private organizations first as a step towards gaining access to larger entities.
Access points
Each threat actor has a unique motivation for targeting an organization’s assets. Keeping them out takes more than knowing their intentions and capabilities. It’s also important to recognize the types of attack vectors they’ll use.
For the most part, threat actors gain access through one of these attack vector categories:
- Direct access, referring to instances when they have physical access to a system
- Removable media, which includes portable hardware, like USB flash drives
- Social media platforms that are used for communication and content sharing
- Email, including both personal and business accounts
- Wireless networks on premises
- Cloud services usually provided by third-party organizations
- Supply chains like third-party vendors that can present a backdoor into systems
Any of these attack vectors can provide access to a system. Recognizing a threat actor’s intentions can help you determine which access points they might target and what ultimate goals they could have. For example, remote workers are more likely to present a threat via email than a direct access threat.
Key takeaways
Defending an attack surface starts with thinking like a threat actor. As a security professional, it’s important to understand why someone would pose a threat to organizational assets. This includes recognizing that every threat actor isn’t intentionally out to cause harm.
It’s equally important to recognize the ways in which a threat actor might gain access to a system. Matching intentions with attack vectors is an invaluable skill as you continue to develop an attacker mindset.
Video: Niru: Adopt an attacker mindset
Niru, the leader of Google’s red team, explains the role of the red team in simulating attacks on Google to test and improve security measures. The red team acts as adversaries, challenging the blue team responsible for security controls and incident response. Niru emphasizes the importance of thinking like an attacker, a mindset cultivated since childhood through gaming and questioning standard approaches. Threat modeling, a key aspect of security work, involves challenging assumptions and viewing systems from an attacker’s perspective. Thinking like an attacker helps build defensive code and resilient systems, crucial for protecting data and people. Niru advises seeking insights from others, participating in activities like Capture The Flag (CTF), and engaging in cybersecurity to contribute to securing online systems amid the growing reliance on digital platforms.
Cybersecurity is a constant battle of wits. Defenders build walls, attackers find ways to climb them. To stay ahead of the curve, security professionals need to think like their adversaries – to adopt an attacker mindset. This tutorial will equip you with the tools and techniques to see systems through the eyes of a hacker, strengthening your defenses and making you a more effective security champion.
Step 1: Understand the Attacker’s Motivation
Before you can think like an attacker, you need to understand their why. What drives them to break into systems? Common motivations include:
- Financial gain: Stealing data, hijacking resources, or demanding ransom.
- Espionage: Gathering intelligence for governments, competitors, or other malicious actors.
- Disruption and vandalism: Causing chaos, damaging systems, or making a statement.
- Personal challenge: Testing their skills and proving their abilities.
Step 2: Master the Attacker’s Toolbox
Attackers have a vast arsenal of tools and techniques at their disposal. Familiarize yourself with the most common ones:
- Social engineering: Tricking users into revealing sensitive information or granting access.
- Phishing and malware: Luring victims into downloading malicious software or clicking on harmful links.
- Vulnerability scanning and exploitation: Identifying and exploiting weaknesses in software and systems.
- Password cracking and brute-forcing: Guessing or forcefully decrypting passwords to gain access.
- Network reconnaissance and enumeration: Mapping out systems and identifying potential targets.
Step 3: Think Like a Hacker, Not a Defender
Shift your perspective from building walls to finding cracks. Ask yourself:
- What are the weakest points in our systems?
- What assumptions are we making about our security posture?
- What valuable data or resources could attackers steal or disrupt?
- What are the most likely attack vectors and attack paths?
- How can we exploit social engineering vulnerabilities within our organization?
Step 4: Practice Makes Perfect: Hone Your Skills
Engage in ethical hacking exercises and competitions (CTFs) to test and refine your attacker mindset. This can involve:
- Penetration testing: Simulating real-world attacks to find and fix vulnerabilities.
- Bug bounties: Participating in programs where companies pay for discovered vulnerabilities.
- Hackathons and CTFs: Working with others to solve hacking challenges and learn new techniques.
Step 5: Share Your Knowledge, Build a Community
Cybersecurity is a collaborative effort. Share your attacker insights with your team, contribute to open-source security projects, and mentor others. By fostering a community of ethical hackers, you can collectively raise the bar for security across the industry.
Remember: Adopting an attacker mindset is not about condoning malicious activities. It’s about understanding the enemy, anticipating their moves, and proactively strengthening your defenses. By thinking like a hacker, you can become a more effective security professional, protecting your organization and its valuable assets from real-world threats.
Additional Resources:
- SANS Institute: https://www.sans.org/
- Offensive Security: https://www.offsec.com/
- MIT OpenCourseware: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/
- OWASP Top 10: https://owasp.org/www-project-top-ten/
By following these steps and engaging with the resources provided, you can develop a strong attacker mindset and become a valuable asset in any cybersecurity team. Remember, the more you understand the attackers, the better equipped you are to defend against them. So, go out there, hack ethically, and help make the digital world a safer place.
[MUSIC] Hi, I’m Niru, and
I lead the red team at Google. The red team at Google simulates attackers
that are trying to hack into Google. They function as a sparring partner for
the blue team, that is, the teams that build security controls, detection
pipelines, or respond to incidents. So we help test all of those
by simulating adversaries. So we hack into Google to make
it harder to hack into Google. So it’s like, hey,
we found these issues with your system, now here are some recommendations we have,
and how can we help you fix this? Thinking like an attacker is approaching
a problem like an adversary. I generally have a predisposition
to think like an attacker. [LAUGH]. It started when I was a kid and
I used to play video games, and I used to ask, oh, do I have to beat
the game in the way it’s intended? Do I have to get the objective
in the standard path? Looking at a system and
asking the question, can I break into it? How do I break into it? What is likely to fail? If it fails, what does that give me? It’s about taking apart systems and
trying to understand it. Threat modeling is integral to almost
anything a security professional does. It’s about challenging assumptions. It’s about approaching things
from a different perspective. Rather than looking at the system from
the perspective of a developer who is thinking about, how do I build the system
in a way that works for people? You’re putting on the hat of an attacker
and saying, if I looked at the system, how would I break into it? It’s important for all security
professionals to think like an attacker because you code more defensively,
you build things more defensively, and you break things more offensively. And what that means is you’re building
in this resilience into the system, and you’re building in all these safeguards
that are going to help protect the data, the systems, and the people. In order to build my attacker mindset, what I did is I would go
pick people’s brains. What that means is I can
grab time with them and say, hey, how do you approach the system? What are the assumptions you’re making? How do you build out the security
safeguards that you’re thinking about? My advice for people who are trying
to build their own attacker mindset is go talk to people,
be it in local meetups, in conferences, find yourself a CTF group and
play these competitions with them. See how each person in the team approaches
certain things and solves for it. Almost everything we do on a daily basis
is online these days, like banking is online, grocery shopping is online,
the electricity grid, the water supplies. All of this has happened in
a short span of time, and now people are taking a step back and
say, what does that mean for us? And cybersecurity folks are the ones who
help make sure these systems are locked down and
protected against these adversaries. If you’re inquisitive, if you like taking
things apart, if you like solving things, if you want to help make things secure,
you should join cybersecurity.
Video: Pathways through defenses
Key Points:
- Cloud computing increases attack vectors (exploitable pathways) for organizations.
- Attack vectors are used by both malicious hackers and unintentional insiders (e.g., social media leaks).
- Security teams need an “attacker mindset” to identify and defend against attack vectors.
- Attacker mindset involves:
- Identifying targets
- Determining access methods
- Evaluating exploitable vectors
- Finding attack tools and methods
Defense Strategies:
- Educate users about vulnerabilities.
- Apply the principle of least privilege.
- Use appropriate security controls and tools.
- Build a diverse security team.
Overall:
- Understanding attack vectors and adopting an attacker mindset are crucial for proactive defense.
- Combining user education, proper access control, efficient security tools, and diverse expertise strengthens your organization’s security posture.
Remember:
- Stay informed about the latest threats and vulnerabilities.
This summary captures the main points of the text and highlights the key takeaways for effective attack vector defense.
Fill in the blank: ____ refer to the pathways attackers use to penetrate security defenses.
Attack vectors
Attack vectors refer to the pathways attackers use to penetrate security defenses. Threat actors use attack vectors to exploit vulnerabilities and exposures.
To defend against attacks, organizations need
to have more than just the understanding of the growing digital
landscape around them. Positioning themselves ahead
of a cyber threat also takes understanding the type of attacks that can be
used against them. Last time, we began
exploring how the cloud has expanded the digital
attack surface that organizations protect. As a result, cloud
computing has led to an increase in the number
attack vectors available. Attack vectors refer
to the pathways attackers use to penetrate
security defenses. Like the doors and
windows of a home, these pathways are
the exploitable features of an attack surface. One example of an attack
vector would be social media. Another would be removable
media, like a USB drive. Most people outside of
security assume that cyber criminals
are the only ones out there exploiting
attack vectors. While attack vectors are used by malicious hackers to
steal information, other groups use them too. For example, employees occasionally exploit attack
vectors unintentionally. This happens a lot with
social media platforms. Sometimes, employees post
sensitive company news that shouldn’t have been shared. At times, this same kind of thing
happens on purpose. Social media platforms are also vectors that
disgruntled employees use to intentionally share confidential information
that can harm the company. We all treat attack vectors as critical risks to
asset security. Attackers typically
put forth a lot of effort planning their attacks
before carrying them out. It’s up to us as security
professionals to put an even greater amount of
effort into stopping them. Security teams do
this by thinking of each vector with an
attacker mindset. This starts with a
simple question, “how would we exploit
this vector?” We then go through a
step-by-step process to answer our question. First, when practicing
an attacker mindset, we identify a target. This could be specific
information, a system, a person, a group, or the organization itself. Next, we determine how the
target can be accessed. What information is
available that an attacker might take advantage of
to reach the target? Based on that information, the third step is to evaluate the attack vectors that can
be exploited to gain entry. And finally, we find the tools
and methods of attack. What will the attackers
use to carry this out? Along the way, practicing an attacker mindset
provides valuable insight into the best security
controls to implement and the vulnerabilities
that need to be monitored. Every organization
has a long list of attack vectors to defend. While there are a lot of
ways to protect them, there are a few common
rules for doing this. One key to defending
attack vectors is educating users about
security vulnerabilities. These efforts are usually
tied to an event. For example, advising them about a new phishing exploit that is targeting users in
the organization. Another rule is applying the principle of
least privilege. We’ve explored least privilege
earlier in this section. It’s the idea that
access rights should be limited to what’s required
to perform a task. Like we previously explored, this practice closes
multiple security holes inside an organization’s
attack surface. Next, using the right
security controls and tools can go a long way towards
defending attack vectors. Even the most
knowledgeable employees make security mistakes, like accidentally clicking on a malicious link in an email. Having the right
security tools in place, like antivirus software, helps to defend
attack vectors more efficiently and reduce
the risk of human error. Last but not least, is building a diverse
security team. This is one of the best
ways to reduce the risk of attack vectors and
prevent future attacks. Your own unique perspective can greatly improve the
security team’s ability to apply an attacker’s
mindset and stay one step ahead of
potential threats. Keeping yourself informed is always important in this field. You’re already off
to a great start, so keep up the good work!
Practice Quiz: Self-reflection: Approach cybersecurity with an attacker mindset
Reading: Fortify against brute force cyber attacks
Reading
Usernames and passwords are one of the most common and important security controls in use today. They’re like the door lock that organizations use to restrict access to their networks, services, and data. But a major issue with relying on login credentials as a critical line of defense is that they’re vulnerable to being stolen and guessed by attackers.
In a video, you learned that brute force attacks are a trial-and-error process of discovering private information. In this reading, you’ll learn about the many tactics and tools used by threat actors to perform brute force attacks. You’ll also learn prevention strategies that organizations can use to defend against them.
A matter of trial and error
One way of opening a closed lock is trying as many combinations as possible. Threat actors sometimes use similar tactics to gain access to an application or a network.
Attackers use a variety of tactics to find their way into a system:
- Simple brute force attacks are an approach in which attackers guess a user’s login credentials. They might do this by entering any combination of username and password that they can think of until they find the one that works.
- Dictionary attacks are a similar technique except in these instances attackers use a list of commonly used credentials to access a system. This list is similar to matching a definition to a word in a dictionary.
- Reverse brute force attacks are similar to dictionary attacks, except they start with a single credential and try it in various systems until a match is found.
- Credential stuffing is a tactic in which attackers use stolen login credentials from previous data breaches to access user accounts at another organization. A specialized type of credential stuffing is called pass the hash. These attacks reuse stolen, unsalted hashed credentials to trick an authentication system into creating a new authenticated user session on the network.
Note: Besides access credentials, encrypted information can sometimes be brute forced using a technique known as exhaustive key search.
Each of these methods involve a lot of guess work. Brute forcing your way into a system can be a tedious and time consuming process—especially when it’s done manually. That’s why threat actors often use tools to conduct their attacks.
Tools of the trade
There are so many combinations that can be used to create a single set of login credentials. The number of characters, letters, and numbers that can be mixed together is truly incredible. When done manually, it could take someone years to try every possible combination.
Instead of dedicating the time to do this, attackers often use software to do the guess work for them. These are some common brute forcing tools:
- Aircrack-ng
- Hashcat
- John the Ripper
- Ophcrack
- THC Hydra
Sometimes, security professionals use these tools to test and analyze their own systems. They each serve different purposes. For example, you might use Aircrack-ng to test a Wi-Fi network for vulnerabilities to brute force attack.
Prevention measures
Organizations defend against brute force attacks with a combination of technical and managerial controls. Each make cracking defense systems through brute force less likely:
- Hashing and salting
- Multi-factor authentication (MFA)
- CAPTCHA
- Password policies
Technologies, like multi-factor authentication (MFA), reinforce each login attempt by requiring a second or third form of identification. Other important tools are CAPTCHA and effective password policies.
Hashing and salting
Hashing converts information into a unique value that can then be used to determine its integrity. Salting is an additional safeguard that’s used to strengthen hash functions. It works by adding random characters to data, like passwords. This increases the length and complexity of hash values, making them harder to brute force and less susceptible to dictionary attacks.
Multi-factor authentication (MFA)
Multi-factor authentication (MFA) is a security measure that requires a user to verify their identity in two or more ways to access a system or network. MFA is a layered approach to protecting information. MFA limits the chances of brute force attacks because unauthorized users are unlikely to meet each authentication requirement even if one credential becomes compromised.
CAPTCHA
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It is known as a challenge-response authentication system. CAPTCHA asks users to complete a simple test that proves they are human and not software that’s trying to brute force a password.
Here are common CAPTCHA examples:
There are two types of CAPTCHA tests. One scrambles and distorts a randomly generated sequence of letters and/or numbers and asks users to enter them into a text box. The other test asks users to match images to a randomly generated word. You’ve likely had to pass a CAPTCHA test when accessing a web service that contains sensitive information, like an online bank account.
Password policy
Organizations use these managerial controls to standardize good password practices across their business. For example, one of these policies might require users to create passwords that are at least 8 characters long and feature a letter, number, and symbol. Other common requirements can include password lockout policies. For example, a password lockout can limit the number of login attempts before access to an account is suspended and require users to create new, unique passwords after a certain amount of time.
The purpose of each of these requirements is to create more possible password combinations. This lengthens the amount of time it takes an attacker to find one that will work. The National Institute of Standards and Technology (NIST) Special Publication 800-63B provides detailed guidance that organizations can reference when creating their own password policies.
Key takeaways
Brute force attacks are simple yet reliable ways to gain unauthorized access to systems. Generally, the stronger a password is, the more resilient it is to being cracked. As a security professional, you might find yourself using the tools described above to test the security of your organization’s systems. Recognizing the tactics and tools used to conduct a brute force attack is the first step towards stopping attackers.
Practice Quiz: Activity: Identify the attack vectors of a USB drive
Reading: Activity Exemplar: Identify the attack vectors of a USB drive
Reading
Completed Exemplar
To review the exemplar for this course item, click the link and select Use Template.
Link to exemplar: Parking lot USB exercise
Assessment of Exemplar
Compare the exemplar to your completed activity. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that your activity analyzes the types of information that can be found on a USB drive, how they can be exploited by a threat actor, and the types of attacks that can be hidden on these devices.
The completed exemplar addresses the following criteria:
- 2-3 sentences about the types of information stored on the USB drive
- 2-3 sentences about how the information could be used against the owner and/or organization
- 3-4 sentences analyzing the risks of USB baiting attacks
Next, review the exemplar components:
Contents: The contents of the USB drive contain files that appear to belong to a specific person. It contains a mixture of personal and business-related information that should not be stored in the same place.
Attacker mindset: Any information that an attacker obtains can be used against someone. Information on a USB drive should be encrypted regardless of whether it’s personal or work-related.
Risk analysis: It’s unsafe to plug an unfamiliar USB drive into your computer because of the wide range of attacks that can be hidden on them. Promoting employee awareness of USB baiting attacks is a managerial control that can reduce the risks of a negative event. Routinely scanning for viruses is an example of an operational control that can be implemented. And disabling Autoplay on all PCs is a technical precaution that can be taken.
Practice Quiz: Test your knowledge: Cyber attacker mindset
What is the difference between an attack vector and an attack surface?
An attack vector refers to the pathways attackers use to penetrate security defenses; an attack surface refers to all the vulnerabilities of an asset that can be exploited.
What are examples of security hardening? Select three answers.
Hashing all user passwords, Keeping systems patched and updated, Disabling unused network ports
Disabling unused network ports, hashing all user passwords, and keeping systems patched and updated are examples of security hardening.
Which steps are applied when using an attacker mindset? Select three answers.
Identify a target, Evaluate a target’s attack vectors, Determine how a target can be accessed
Identifying a target, determining how they can be accessed, and evaluating their attack vectors are steps that are applied when using an attacker mindset.
How can businesses reduce the number of attack vectors they must defend? Select three answers.
- By implementing security controls that protect information
- By controlling access and authorization to assets
- By educating users so they can participate in preventing attacks
Business can reduce the number of attack vectors they have by controlling access and authorization to assets, implementing security controls that protect information, and educating users so they can participate in preventing attacks.
Review: Vulnerabilities in systems
Video: Wrap-up
This section focused on the complex landscape of digital security and vulnerabilities. We covered:
- Vulnerability Management Process: Understanding the defense-in-depth model and its layers for stronger security.
- CVE List: Learning about this resource for identifying and cataloging vulnerabilities.
- Attack Surfaces: Discussing both physical and digital surfaces, including the challenges of cloud security.
- Common Attack Vectors: Exploring how attackers exploit security gaps, adopting an attacker’s mindset.
- Future Topics: Expanding on specific types of attacks, malware techniques, and how security teams defend against them.
This section equipped you with valuable knowledge about vulnerabilities and the attacker mindset. The next session will delve deeper into specific attack strategies and security team countermeasures.
Remember, you’ve done a fantastic job! Keep learning and stay vigilant in the ever-evolving world of cybersecurity.
Here we are at the end of this section! Can
you believe it? I had so much fun exploring
the world of vulnerabilities. I hope you felt the same. More importantly, I hope
you got a better sense of how complex a landscape
the digital world is. This environment is filled
with gaps that attackers can use to gain unauthorized
access to assets, making it a challenge to defend. We’ve explored a lot of
information this time around, so let’s quickly recap
what we’ve covered. You learned about the
vulnerability management process, starting with the
defense-in-depth model. You learned about the layers of this security framework and how each of them work together to build a stronger defense. You then learned
about the CVE list that’s used to find
cataloged vulnerabilities. This is a great addition to your growing security toolbox. After that, you learned of the attack surfaces that
businesses protect. We discussed physical
and digital surfaces and the challenges of
defending the cloud. We finished up by exploring
common attack vectors, where you learned
how security teams use an attacker mindset to identify the security gaps that cyber criminals
try to exploit. Every one of the vulnerabilities
that we’ve discussed so far is faced with
a number of threats. When we get back together, we’re going to expand
our attacker mindset even further by exploring specific
type of attacks that cybercriminals
commonly use. We’ll look at things like
malware and the techniques attackers use to compromise
defense systems. By exploring how these
tools and tactics work, you’ll gain a clearer
understanding of the threats they pose. We’ll then wrap up by
investigating how security teams stop these threats from damaging our
organizations’ operations, their reputation, and
most importantly, their customers and employees. You’ve done a fantastic
job getting to this point. When you’re ready, let’s
finish the journey together. I’m looking forward to
being back with you again.
Reading: Glossary terms from module 3
Terms and definitions from Course 5, Module 3
Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized access to a system for an extended period of time
Attack surface: All the potential vulnerabilities that a threat actor could exploit
Attack tree: A diagram that maps threats to assets
Attack vector: The pathways attackers use to penetrate security defenses
Bug bounty: Programs that encourage freelance hackers to find and report vulnerabilities
Common Vulnerabilities and Exposures (CVE®) list: An openly accessible dictionary of known vulnerabilities and exposures
Common Vulnerability Scoring System (CVSS): A measurement system that scores the severity of a vulnerability
CVE Numbering Authority (CNA): An organization that volunteers to analyze and distribute information on eligible CVEs
Defense in depth: A layered approach to vulnerability management that reduces risk
Exploit: A way of taking advantage of a vulnerability
Exposure: A mistake that can be exploited by a threat
Hacker: Any person who uses computers to gain access to computer systems, networks, or data
MITRE: A collection of non-profit research and development centers
Security hardening: The process of strengthening a system to reduce its vulnerability and attack surface
Threat actor: Any person or group who presents a security risk
Vulnerability: A weakness that can be exploited by a threat
Vulnerability assessment: The internal review process of a company’s security systems
Vulnerability management: The process of finding and patching vulnerabilities
Vulnerability scanner: Software that automatically compares existing common vulnerabilities and exposures against the technologies on the network
Zero-day: An exploit that was previously unknown
Quiz: Module 3 challenge
An application has broken access controls that fail to restrict any user from creating new accounts. This allows anyone to add new accounts with full admin privileges.
The application’s broken access controls are an example of what?
A vulnerability
AI
The correct answer is vulnerability.
Here’s why:
- Security control: This refers to a measure or mechanism implemented to protect systems and data from threats. In this case, the application lacks a proper access control mechanism, making it a vulnerability.
- Threat: This refers to a potential danger or malicious actor that could exploit a vulnerability. The broken access control doesn’t represent a threat itself, but it can be exploited by attackers to gain unauthorized access.
- Vulnerability: This refers to a weakness or flaw in a system that can be exploited by a threat. The broken access control is a weakness in the application that allows unauthorized users to gain admin privileges.
- Exploit: This refers to a specific technique or method used to take advantage of a vulnerability. While the broken access control enables attackers to create admin accounts, it’s not the specific technique they would use.
Therefore, the broken access control is a vulnerability, as it exposes a weakness in the application’s security that can be exploited for malicious purposes.
What security strategy uses a layered approach to prevent attackers from gaining access to sensitive data?
Defense in depth
Which layer of the defense in depth model relates to user devices that have accessed a network?
Endpoint.
AI
The layer of the defense in depth model that relates to user devices that have accessed a network is Endpoint.
Here’s why:
- Endpoint: This layer specifically refers to the devices that connect to a network, including laptops, desktops, mobile devices, and servers. User devices are the entry point for potential threats, and endpoint security focuses on protecting these devices from malware, unauthorized access, and other vulnerabilities.
- Application: This layer focuses on the security of applications running within the network, such as web servers, databases, and productivity software. While user devices can be used to access applications, the application layer itself is a separate entity.
- Data: This layer focuses on protecting the confidentiality, integrity, and availability of data stored within the network. User devices may store and access data, but the data layer is concerned with the security of the data itself, regardless of its location.
- Perimeter: This layer focuses on security measures at the network’s outer boundary, such as firewalls and intrusion detection systems. While user devices may enter and exit the network through the perimeter, the perimeter layer itself is concerned with monitoring and controlling traffic flow.
Therefore, the endpoint layer directly relates to user devices that have accessed a network, making it the most relevant choice in the context of the defense in depth model.
Which of the following are criteria that a vulnerability must meet to qualify for a CVE® ID? Select all that apply.
- It must be submitted with supporting evidence.
- It must be independent of other issues.
- It must be recognized as a potential security risk.
- It can only affect one codebase.
What is the purpose of vulnerability management? Select three answers.
- To identify exposures to internal and external threats
- To review an organization’s internal security systems
- To uncover vulnerabilities and reduce their exploitation
What is the main goal of performing a vulnerability assessment?
To identify weaknesses and prevent attacks
Fill in the blank: All the potential vulnerabilities that a threat actor could exploit is called an attack _____.
surface
Fill in the blank: An attack _____ refers to the pathways attackers use to penetrate security defenses.
vector
A security team is performing a vulnerability assessment on a banking app that is about to be released. Their objective is to identify the tools and methods that an attacker might use.
Which steps of an attacker mindset should the team perform to figure this out? Select three answers.
Identify a target. Evaluate attack vectors that can be exploited. Determine how the target can be accessed.
Consider the following scenario:
You are working as a security professional for a school district. An application developer with the school district created an app that connects students to educational resources. You’ve been assigned to evaluate the security of the app.
Using an attacker mindset, which of the following steps would you take to evaluate the application? Select two answers.
What is the main purpose of the CVE® list?
An organization’s firewall is configured to allow traffic only from authorized IP addresses. Which layer of the defense in depth model is the firewall associated with?
Network
AI
The firewall in this scenario is associated with the Network layer of the defense in depth model.
Here’s why:
- Network: This layer focuses on securing the network perimeter and controlling traffic flow. Firewalls are key components of network security, acting as gatekeepers that filter incoming and outgoing traffic based on pre-defined rules and access control policies. In this case, the firewall is configured to allow traffic only from authorized IP addresses, fulfilling a crucial role in securing the network perimeter.
- Data: While firewalls can indirectly protect data by restricting access to systems storing data, their primary function is securing the network itself. Data security involves additional layers of protection, such as encryption and access control mechanisms, that operate within the network and on specific data stores.
- Application: Firewalls typically operate at a lower level than individual applications, focusing on overall network traffic flow. While some application-specific firewalls exist, the scenario described doesn’t involve restricting traffic based on specific applications.
- Endpoint: Endpoints like user devices are not directly involved in the functionality of the firewall. While firewalls can be used to control traffic to and from endpoints, they operate at the network level and are not considered endpoint security measures.
Therefore, based on its role in controlling network traffic and securing the perimeter, the firewall aligns most closely with the Network layer of the defense in depth model.
Fill in the blank: According to the CVE® list, a vulnerability with a score of _____ or above is considered to be a critical risk to company assets that should be addressed right away.
9
A security team is conducting a periodic vulnerability assessment on their security procedures. Their objective is to review gaps in their current procedures that could lead to a data breach. After identifying and analyzing current procedures, the team conducts a risk assessment.
What is the purpose of performing a risk assessment?
To score vulnerabilities based on their severity and impact
AI
You’ve got it! The purpose of performing a risk assessment in this scenario is to score vulnerabilities based on their severity and impact.
Here’s why the other options are not as accurate:
- To adjust current security procedures: While the risk assessment findings might inform the need for adjustments, the primary purpose is not to directly modify procedures. It’s to prioritize vulnerabilities and guide remediation efforts.
- To fix vulnerabilities that have been identified: Fixing vulnerabilities is a separate step that comes after the risk assessment. The assessment helps determine which vulnerabilities need to be addressed first based on their potential impact.
- To simulate attacks that could be performed against each vulnerability: Penetration testing or vulnerability exploitation might be used in conjunction with a risk assessment, but the primary purpose of the assessment is to analyze the identified vulnerabilities and assign them a risk score.
Therefore, the risk assessment’s main objective is to evaluate the vulnerabilities identified during the vulnerability assessment, assigning them scores based on their severity (likelihood of exploitation) and impact (potential damage caused). This information helps the security team prioritize remediation efforts and focus on the most critical vulnerabilities first.
Remember, a risk assessment is a crucial step in the vulnerability management process, allowing the security team to make informed decisions about how to best protect their systems and data.
Which of the following are types of attack surfaces? Select three answers.
Cloud servers, Computer workstations, Network routers
A project manager at a utility company receives a suspicious email that contains a file attachment. They open the attachment and it installs malicious software on their laptop.
What are the attack vectors used in this situation? Select two answers.
The suspicious email, The file attachment
What is not a step of practicing an attacker mindset?
Identify ways to fix existing vulnerabilities.
Consider the following scenario:
A cloud service provider has misconfigured a cloud drive. They’ve forgotten to change the default sharing permissions. This allows all of their customers to access any data that is stored on the drive.
This misconfigured cloud drive is an example of what?
A vulnerability
What is the main purpose of the CVE® list?
To share a standard way of identifying and categorizing known vulnerabilities and exposures
What are ways to protect an organization from common attack vectors? Select three answers.
- By educating employees about security vulnerabilities
- By keeping software and systems updated
- By implementing effective password policies