You are on page 1of 140

Defensive Security

Concepts
+ Journey into Defensive
Security Security Concepts
+ Understanding the CIA Triad
+ Defense-In-Depth Strategy
+ Understanding Security Tools
+ Importance of Access Control
Course Overview
Models
+ CVSS Terms & Scoring
System
+ Data Visibility
+ 5-tuple Approach
The Importance of Cyber
Security in Today's World
Introduction to Defensive Security Concepts
Cyber Threats Overview

● Malware: WannaCry outbreak in 2017 that infected hundreds of


thousands of computers across 150 countries.

● Phishing: Google Docs phishing scam in 2017 tricked people into


granting access to their email and contacts.

● Man In The Middle attacks: In 2013, Belgacom, a Belgian telecom


company, was targeted by a sophisticated MiTM, where attackers
redirected employees to malicious websites mirroring legitimate ones,
thereby intercepting and monitoring company data.
Cyber Threats Overview

● Advanced Persistent Threats (APTs): The SolarWinds hack was a


sophisticated APT where nation-state actors used a supply chain attack
to compromise numerous government agencies and corporations,
remaining undetected for months.

● Cryptojacking: In 2018, cybercriminals breached Tesla's cloud


environment to mine cryptocurrency, staying undetected by disguising
the mining activity as regular traffic.
Cyber Threats Overview

● AI-Driven Attacks: Although not a specific attack, deepfake technology


represents a significant evolution in AI-driven threats. This technology
can create convincing fake audio and video content, potentially causing
misinformation, identity theft, and social engineering attacks.
Impact of Cyber Attacks on Businesses

● Financial Losses
○ Regulatory Fines
○ Breach Remediation Costs
○ Loss of Business

● Reputation Damage
○ Loss of Trust
○ Negative Media Attention
○ Damage to Brand Image
Impact of Cyber Attacks on Businesses

● Downtime
○ Disrupted Operations
○ Loss of Productivity:
○ Delayed Service Delivery
Real World Examples of High Profile Cyber Attacks

● Equifax Data Breach


○ Breach year: 2017
○ Data of 147 million people exposed
○ Out of pocket costs reaching $1.4 billion
○ Significant damage to Equifax's reputation and consumer trust

● Uber Data Breach


○ Breach year: 2016, disclosed in 2017
○ 57 million users' and drivers' data affected
○ Uber paid $100,000 to hackers to delete data and stay silent
○ $148 million fine for covering up the breach
○ Major reputational damage due to concealment of the breach
Real World Examples of High Profile Cyber Attacks

● Marriott International Data Breach


○ Breach year: 2018
○ Data of 500 million guests affected
○ Exposed information included names, phone numbers, email
addresses, passport numbers, and potentially credit card
information
○ Marriott faced regulatory fines, including a proposed £99 million fine
under GDPR
○ Significant loss of trust among customers and stakeholders

● Facebook Data Scandals


○ Scandal year: 2018 (Cambridge Analytica scandal)
○ Data of up to 87 million users was harvested without their consent
○ Facebook's market value dropped by about $119 billion within days
following the scandal
Real World Examples of High Profile Cyber Attacks

● NotPetya Attack on Maersk


○ Attack year: 2017
○ Global shipping operations disrupted for two weeks
○ Forced Maersk to reinstall its entire infrastructure: 4,000 servers,
45,000 PCs, and 2,500 applications
○ Financial impact of about $300 million
Increasing Digitization and the Growing Need for Cybersecurity

● Growth in Digital Transactions


● Internet of Things (IoT) Expansion
● Rise of Artificial Intelligence (AI) and Machine Learning (ML)
Increasing Digitization and the Growing Need for Cybersecurity

● Adoption of Cloud Services


● Remote Work and Learning
● Supply Chain Digitization
● Increased Dependency on Digital Infrastructure
Future Threats and Challenges

● Sophistication of Cyber Attacks


● Artificial Intelligence (AI) and Machine
Learning (ML) Threats
● Quantum Computing Challenges
● Internet of Things (IoT) Security
● Supply Chain Attacks
● Cloud Security
● 5G and Network Security
● Data Privacy Regulations
● Cybersecurity Skills Gap
Introduction to Security
Terms and Concepts
Introduction to Defensive Security Concepts
Key Security Terms

Threat: A potential for violation of security, which exists when there is a


circumstance, capability, action, or event that could breach security and cause
harm.
Vulnerability: A weakness in a system or its design that can be exploited by
a threat.
Risk: The potential for loss, damage, or destruction from a threat exploiting a
vulnerability.
Attack: An action that exploits a vulnerability when threat capabilities meet
threat events.
Exploit: A technique used to take advantage of a vulnerability to perform an
attack.
Types of Cyber Attackers
Term Definition Examples

Individuals with limited technical skills who


Examples: Using DDoS tools,
Script Kiddies use pre-written scripts or tools for basic cyber
defacing websites
attacks.

Individuals or groups using hacking techniques


Hacktivist for political or ideological reasons to promote Examples: Anonymous, Lizard Squad
their agenda.

Individuals or organized groups engaging in


Examples: Ransomware gangs,
Cybercriminals illegal activities for financial gain or personal
phishing scammers
motives.

Individuals or groups conducting cyber attacks


Examples: APT groups, Stuxnet,
State-Sponsored Attackers on behalf of a nation-state or government
Fancy Bear
entity.
Security Concepts
● Defense-in-Depth: A layered
approach to security that uses multiple
defensive strategies to slow down an
attacker.
● Least Privilege: The principle that
users should be given the minimum
levels of access necessary to complete
their job functions.
● Zero Trust: A security concept that
advocates for not trusting any entity
inside or outside an organization's
perimeter by default.
Importance of a Security Mindset

● Proactive Not Reactive: Thinking ahead and preparing for potential


threats rather than just reacting to incidents.
● Holistic Approach: Understanding that security isn't just about
technology, but also people and processes.
● Continuous Learning: Recognizing that the threat landscape is always
changing and requires continuous learning and adaptation.
● Risk Management: Assessing and managing risk is central to a security
mindset.
Defining Confidentiality,
Integrity, and Availability
in the CIA Triad
Understanding the CIA Triad
Defining the CIA Triad

● Confidentiality: Ensuring that information is accessible only to those


authorized to have access.
● Integrity: Safeguarding the accuracy and completeness of information
and processing methods.
● Availability: Ensuring that authorized users have reliable and timely
access to information.
Importance of Each CIA Pillar in Different Scenarios

● Confidentiality

Scenario: A healthcare provider must keep patient records confidential to comply with laws
and maintain trust.

● Integrity

Scenario: A bank must ensure the integrity of transaction data to prevent fraud and maintain
accurate account balances.

● Availability

Scenario: An e-commerce site must ensure high availability, especially during peak shopping
periods, to maintain customer satisfaction and sales.
Balancing the CIA Triad

The three elements of the CIA Triad often need to be balanced according to
the needs of the organization and specific scenarios.

Example: A public website might prioritize availability over confidentiality,


while a system handling sensitive financial data might prioritize
confidentiality and integrity.

Maintaining a balance often requires careful risk management and an


understanding of the value of the data and the requirements of users and
stakeholders.
Impact of Compromising the CIA Triad

● Compromising Confidentiality: May lead to data breaches, identity


theft, loss of privacy, legal consequences, and damage to reputation.
● Compromising Integrity: Can result in incorrect data, misleading
information, flawed decision-making, and in certain industries, potential
for harm or loss of life (e.g., aviation, healthcare).
● Compromising Availability: May cause service disruptions, loss of
productivity, financial loss due to downtime, and damage to customer
trust and reputation.
Practical Examples of the CIA Triad in Cybersecurity

Confidentiality

1. Use of encryption in secure communication protocols like HTTPS and


SSH
2. Implementation of access controls to restrict unauthorized access to data
Integrity
1. Checksums and cryptographic hashes to validate the integrity of data
during transmission
2. Digital signatures to ensure the integrity of messages and verify the
sender
Practical Examples of the CIA Triad in Cybersecurity

Availability

1. Redundant infrastructure to ensure service continuity during an outage


2. Load balancing to distribute network or application traffic across a
number of servers to maintain service availability
The Role and Importance
of the CIA Triad
Understanding the CIA Triad
Case Studies of Breaches Affecting the CIA Triad

Confidentiality

Equifax breach (2017): Sensitive data of over 147 million people were
exposed, violating confidentiality due to poor security measures.

Integrity
Stuxnet (2010): Altered the operation of centrifuges in Iran's nuclear
program, impacting data and process integrity.
Availability

Dyn attack (2016): A massive DDoS attack on the DNS provider Dyn
caused major websites to become unavailable, disrupting the
availability component.
Guiding Cybersecurity Policies with the CIA Triad

The CIA Triad guides organizations in the development and implementation of cybersecurity
policies:

Confidentiality: Policies related to data classification, access controls, encryption

Integrity: Policies related to data validation, error checking, backup and restore

Availability: Policies related to system maintenance, redundancy, disaster recovery


planning

These policies help in preventing, detecting, and responding to cyber threats effectively.
Linking the CIA Triad to Compliance and Regulations

● The principles of the CIA Triad are often incorporated in regulatory


compliance standards:
○ HIPAA (Healthcare): Confidentiality and integrity of patient data
○ PCI DSS (Payment Card Industry): Confidentiality and integrity of
cardholder data
○ ISO 27001 (Information Security Management): Includes principles
of confidentiality, integrity, and availability
○ GDPR (General Data Protection Regulation): Confidentiality and
integrity of personal data
Introduction to Defense-
in-Depth Strategy
Defense In Depth Strategy
The Castle & Cybersecurity
Introduction to Defense-in-Depth Strategy

● Defense-in-Depth: A strategic approach to cybersecurity in which


multiple layers of security controls are placed throughout an information
technology (IT) system.
● Multi-layered approach: Rather than relying on a single security
measure, multiple security measures are implemented, each providing
backup for the others in case one fails.
Importance and Benefits of Defense-in-Depth

● Reduces the likelihood of a single point of failure in the security


architecture.
● Slows down an attacker, potentially giving the organization time to
detect and respond to the attack.
● Provides a comprehensive and holistic approach to cybersecurity.
Layered Security Measures:
Physical, Technical, and Administrative Controls

● Physical Controls: Measures taken to protect the organization's people,


property, and physical infrastructure.
● Technical Controls: Security measures implemented through
technology.
● Administrative Controls: Policies and procedures implemented by the
organization to manage and monitor its cybersecurity operations.
Defense-in-Depth and the CIA Triad

Defense-in-Depth is a strategy that can help to protect the Confidentiality,


Integrity, and Availability (CIA) of an organization's information.

Confidentiality: Each layer of defense can help to protect information


from unauthorized access.

Integrity: Multiple layers of security can help to protect against data


tampering.

Availability: A multi-layered defense can help to ensure system uptime


and data accessibility.
Layers of Defense-in-Depth Strategy

● Perimeter: The first line of defense, focusing on firewall deployment,


intrusion detection systems (IDS), and intrusion prevention systems (IPS)
to manage and control network traffic.
● Network: Includes segregating the network into zones to control access,
network-level antivirus protection, and using security features provided
by switches and routers.
Layers of Defense-in-Depth Strategy

● Host: Targets devices using anti-malware, local firewalls, host-based


IDS.
● Application: Secure applications using firewalls, secure coding.
● Data: Utilize encryption, access controls, and DLP to safeguard data.
Strategies and Tools in Defense-in-Depth

● Perimeter: Firewalls, VPNs, IDS/IPS


● Network: Network segmentation, Internal firewalls, Network Access
Control (NAC)
● Host: Antivirus software, Host-based IDS, Patch management
● Application: Web Application Firewalls (WAF), Secure coding practices,
Application Patch Management
● Data: Encryption, Access controls, DLP tools
Role of Redundancy and Diversity in Defense-in-Depth

● Redundancy: Ensures that multiple security measures are in place so if


one fails or is compromised, others are still operational to protect the
system.

● Diversity: Using a variety of security tools and approaches reduces the


likelihood that one vulnerability can be exploited to bypass the entire
system.
Understanding the Principles of
Defense-in-Depth Strategy
Defense In Depth Strategy
Principles of Defense-in-Depth

● Principle of Least Privilege: Each user and process should have the
minimum permissions necessary to perform their function.
● Separation of Duties: Divide responsibilities among multiple individuals
or systems to prevent fraud and errors.
● Fail-Safe Defaults: Base access decisions on permission rather than
exclusion.
Case Study of Defense-in-Depth Strategy

Company A: Major data breach prompted company action.

1. Implemented defense-in-depth strategy:


2. Upgraded perimeter with advanced firewalls, IDS/IPS.
3. Segmented internal network.
4. Added host-based security measures.
5. Adopted secure coding practices.
6. Enforced strict data security policies.
Case Study of Defense-in-Depth Strategy

Company B: A smaller business with limited resources:

1. Chose versatile, multi-function security tools (like Unified Threat


Management systems).
2. Conducted regular security awareness training.
3. Used secure cloud services for data security.
4. Effective cybersecurity strategy despite resource constraints.
Applying Defense-in-Depth
Strategy in Real-world Scenarios
Defense In Depth Strategy
Implementing Defense-in-Depth: Practical Steps

1. Perform a Risk Assessment


2. Define Your Security Perimeter
3. Layer Your Defenses
4. Apply Security Policies
5. Educate Employees
Tailoring Defense-in-Depth to Specific Needs

● Understand the Business


● Know Your Data
● Regulatory Compliance
● Threat Landscape
Monitoring and Updating Your Defense-in-Depth Strategy

● Regular Auditing: Identify vulnerabilities and evaluate controls


regularly.
● Update Security Measures: Regularly patch security tools for new
vulnerabilities.
● Incident Response: Have a tested Incident Response Plan (IRP) ready.
● Continual Improvement: Adjust strategy for new threats and
technology advancements.
Understanding the
Importance of Security
Tools
Introduction to Security Toolset Architecture
Overview of Security Tools

● Data Loss Prevention (DLP)


● Web Application Firewall (WAF)
● Virtual Private Network (VPN)
● Malware Analysis Tools
Overview of Security Tools

● Firewalls
● Intrusion Detection Systems (IDS)/Intrusion Prevention
Systems (IPS)
● Antivirus
● Security Information and Event Management (SIEM)
Role of Security Tools in Cybersecurity

● Regular Auditing
● Update Security Measures
● Incident Response
● Continual Improvement
Role of Security Tools in Cybersecurity

● Proactive Threat
Hunting
● Layered Defense
● Automation
● Compliance
A Detailed Overview of
the Security Toolset
Architecture
Introduction to Security Toolset Architecture
The Importance of Managing Security Tools Effectively

● Security tools need to be regularly updated to respond to


new threats and vulnerabilities.
● Regular auditing of these tools helps ensure they are
working optimally and protects against internal and
external threats.
● Effective management includes training staff in their use
and maintenance.
● Centralized management can improve coordination and
responsiveness.
Limitations and Challenges of Security Tools

● Layered security is essential, no single tool suffices.


● False positives waste resources; false negatives may
miss breaches.
● Regular updates and tuning enhance tool
effectiveness.
● Proper setup, monitoring, and management are crucial.
● Managing multiple tools can be resource-intensive
and complex.
Role of Automation and AI in Coordinating Tools

● Automation:
○ Automated responses to common events can
speed up response times and reduce manual
effort. Automated tasks can also be used to
keep security tools up-to-date with the latest
signatures and threat intelligence.
● AI:
○ Machine learning can be used to correlate
events across different tools and identify
unusual patterns that may indicate a threat.
○ AI can also be used to identify and respond to
threats in real time.
Role of Automation and AI in Coordinating Tools

Here are some additional benefits of using automation and AI in coordinating


security tools:

● Increased efficiency: Automating tasks and reducing manual effort.


● Improved accuracy: Identifying and responding to threats more quickly
and accurately.
● Reduced costs: Automating tasks and reducing the need for manual
labor.
Communication and Coordination Among Security Tools

Solutions for Effective Integration of Security Tools

● Adopting standard protocols: Using common protocols can improve


compatibility between tools.
● Leveraging Security Orchestration, Automation, and Response
(SOAR) solutions: These platforms can integrate different security tools
to improve their collective effectiveness.
● Regular audits and updates: To maintain integration, regular audits and
updates are necessary. This ensures that changes or updates to one tool
do not disrupt its communication with others.
Integration and
Coordination of Security
Tools
Introduction to Security Toolset Architecture
Integration of Security Tools in a Network

Each security tool has a unique role in safeguarding your


network:

1. Firewalls: The first line of defense at the network


perimeter.
2. IDS/IPS: Monitors for malicious activities at crucial
junctions.
3. SIEM Solutions: Gathers and analyzes security
logs from various sources.
4. DLP Tools: Oversees data flow, preventing
unauthorized data transmission.
Communication and Coordination Among Security Tools

Cybersecurity tools are designed to serve specific functions, and they can
achieve more when working together.

● The integration of these tools is crucial for comprehensive threat


detection, analysis, and response.
● Example: An IDS that picks up on a suspicious activity can work with a
firewall to block the source IP, while also informing the SIEM system to
correlate the event with other data.
Communication and Coordination Among Security Tools

Benefits of Communication and Coordination Among Security Tools

● Reduces response time: The ability of tools to communicate and trigger


responses can significantly reduce the time taken to respond to threats.
● Provides a comprehensive view: When all tools communicate
effectively, security teams get a holistic view of the security posture.
● Reduces false positives: When one tool can verify its findings with
another, it reduces the chance of false positives.
Communication and Coordination Among Security Tools

Challenges in Integration of Security Tools

● Complexity: Each tool can have its own


unique set of protocols for communication
and coordination.
● Compatibility: Not all tools are designed to
interact with each other.
● Maintenance: Ensuring ongoing
communication and coordination can require
regular updates and checks.
Role of Central Management and Reporting in Security Architecture

● Central management:
Unified security view, policy
standardization, efficient
incident response.
● SIEM reporting: Real-time
alerts, trend analysis, assists
in compliance reporting.
● Importance of visibility:
Centralized management
aids in efficient threat
detection and understanding
security posture.
The Need for Scalability and Flexibility in Security Toolset Architecture

Scaling Security Architecture: Needs to be able to adapt to increased


traffic, devices, and evolving information types.

Flexibility: Must adapt to changing threat landscape, tech environment, and


business needs with new tools and policy modifications.

Cloud Security Tools: Offer scalability and flexibility but introduce new
security considerations.
Strategies for Effective Integration of Security Tools

● Identify Requirements: Understand the security needs of your organization


and select the tools that can effectively meet these requirements.
● Plan the Integration: Determine how the selected tools will be
interconnected and how they will share data and events.
● Test the Integration: Conduct thorough testing to ensure that the integrated
tools function as expected and that there are no conflicts.
● Example:
○ An organization might integrate their IDS/IPS with their firewall so that when the
IDS/IPS detects a threat, the firewall can automatically block the source IP
address.
Importance of Interoperability and Standards in Integration

● Standards: Utilize industry standards like Syslog for log management,


STIX/TAXII for threat information sharing, to ensure different tools can
communicate effectively.
● Interoperability: Choose tools that are known to work well together and
have documented interfaces.
● Example:
○ An organization might choose to use a SIEM solution that supports the
syslog standard to ensure it can collect logs from all their security tools.
Challenges in Managing and Maintaining Integrated Tools

● Complexity: Integrating and managing multiple tools can be complex


and require skilled staff.
● Updates: Keeping all tools up-to-date and ensuring they still function
correctly after updates can be a challenge.
● False Positives: Coordinating responses to events across multiple tools
can lead to false positives if not managed carefully.
The Importance of Access
Control in Cybersecurity
Access Control Models
What is Access Control and Why it Matters

● Definition: Access control is the selective


restriction of access to a place or other
resource. In cybersecurity, it determines
who or what can view or use resources in
a computing environment.
● Importance: It is critical in maintaining
the security of confidential, private, and
proprietary information, and preventing
unauthorized access.
● Example: A password-protected system
or an encrypted email service are both
forms of access control.
Linking Access Control to the CIA Triad

● Confidentiality: Access control preserves confidentiality by ensuring


that only authorized individuals can access sensitive data.
● Integrity: It maintains data integrity by preventing unauthorized
individuals from altering data.
● Availability: By preventing unauthorized access that could disrupt
systems, access control helps to ensure the availability of data and
resources.
Types of Access Controls: Physical and Logical

Physical access controls

● Locks: Basic control requiring a


key for access.
● Card Readers: Advanced
controls granting access to
specific users.
● Biometric Scanners: Uses
physical traits like fingerprints or
face scans for secure access.
● Security Guards: Patrol facilities
to prevent unauthorized access
Types of Access Controls: Physical and Logical

Logical access controls

● Passwords: Most common, requires a secret


combination of characters.
● Multi-factor Authentication (MFA): Needs two
or more pieces of evidence for access
(password, mobile code, fingerprint scan).
● Role-based Access Control (RBAC): Grants
different access levels based on organizational
role.
● Access Control Lists (ACLs): Lists specifying
user or group access to specific files or folders.
Role of Access Control in Compliance and Regulations

Regulation Access Control Measures Description

U.S. regulation requiring protection of confidential health


HIPAA User authentication, role-based access control, auditing information by implementing strong access controls and

regular audits.

Standard ensuring that all organizations that handle


PCI DSS Strong passwords, multi-factor authentication, access control lists cardholder information maintain a secure environment,

including strong access controls.

U.S. law requiring accurate financial reports, ensured by


SOX User authentication, role-based access control, auditing
strong access controls and audit trails.

European regulation focusing on protecting personal data


and privacy, requiring user consent for data collection and
GDPR User consent, data minimization, data security
minimum data collection necessary for the task.
Understanding DAC,
MAC, and RBAC Models
Access Control Models
Definitions of DAC, MAC, and RBA

● Discretionary Access Control (DAC): This model


allows owners of the data or resource to control who
can access it. Access is usually granted or denied based
on user identity.
● Mandatory Access Control (MAC): This model
restricts access based on the sensitivity (labels or
classification) of the information and the user's security
clearance.
● Role-Based Access Control (RBAC): This model
grants access based on the role of the user within an
organization. Users are granted permissions based on
their job function.
Comparison of DAC, MAC, and RBA

● Flexibility: DAC offers owner control, may result in accidental access;


MAC is stricter, no owner-defined access.
● Use Cases: MAC for highly sensitive environments; DAC in operating
systems like Windows, Unix; RBAC in business with defined roles.
● Management: RBAC easier to manage at scale, no need for individual
user permissions.
Practical Examples of DAC, MAC, and RBAC

● DAC: A user setting permissions for a file on their desktop, determining


which other users can access it.
● MAC: A military system where access to documents is restricted based
on the classification level of the document and the security clearance of
the user.
● RBAC: An HR system where managers have access to all personnel
files, but individual employees can only access their own file.
Choosing the Right Model

● Model Choice: Depends on system or organizational needs.


● DAC: Flexible but management-intensive.
● MAC: High security but less flexible.
● RBAC: Balance between security and manageability.
● Combination: Often used, e.g., MAC for system-level, DAC for user-
level objects.
Implementing and
Managing Access
Controls
Access Control Models
Steps for Implementing Access Control in an Organization

1. Identify Protection Needs: Determine required data protection and


access needs.
2. Establish Policies: Formulate policies specifying user access rules.
3. Set Controls: Arrange permissions via firewalls, IAM system, etc.
4. User Training: Educate users on policies and secure access procedures.
Role of Identity and Access Management (IAM) in Access Control

● IAM systems manage the identities of users, their roles, and their access
rights.
● They can automate many aspects of access control, such as provisioning
new users, de-provisioning users who leave the organization, and
managing access rights.
● IAM systems can also provide a central place to audit and review access
rights.
Importance of Regular Audits and Reviews

● Regular audits can identify any misconfigurations or policy violations that


could lead to unauthorized access.
● Reviews of access rights can identify any rights that are no longer
needed (principle of least privilege) and any users who have left the
organization but still have access rights.
● Many regulations require regular audits and reviews of access rights.
Challenges in Managing Access Control and How to Overcome Them

● Managing access rights can be complex, especially in large


organizations. IAM systems can help manage this complexity.
● Keeping up with changes in user roles and responsibilities can be
challenging. Regular reviews of access rights and automated de-
provisioning can help.
● There can be resistance to access control policies from users. Clear
communication about the importance of these policies and training can
help overcome this.
Understanding the CVSS
Framework
Common Vulnerability Scoring System (CVSS)
Introduction to the Common Vulnerability Scoring System (CVSS)

● CVSS is an open industry standard for assessing the severity of


computer system security vulnerabilities.
● It provides an objective measure to help organizations prioritize their
responses to security incidents.
● Developed by FIRST.org, it is widely adopted in vulnerability databases,
security products, and services.
CVSS Structure: Base Score

● The Base Score represents the inherent aspects of a vulnerability that


are constant over time and user environments.
● It is derived from three metric groups:
a. Exploitability (how a vulnerability can be exploited)
b. Impact (how a vulnerability impacts an IT asset)
c. Scope (whether a vulnerability can affect resources beyond its
security scope).
● It ranges from 0 to 10, with 10 being the most severe.
CVSS Structure: Temporal and Environmental Scores

● Temporal Score reflects the characteristics of a vulnerability that change


over time but not among user environments, such as the current state of
exploit techniques or the availability of patches.
● Environmental Score represents the characteristics of a vulnerability that
are relevant and unique to a particular user's environment. It allows the
user to customize the severity score, based on the importance of the
affected IT asset to their organization.
● Both scores are optional and also range from 0 to 10.
Use Cases for CVSS in Vulnerability Management

● Prioritizing Vulnerabilities: By ranking vulnerabilities based on their


CVSS scores, organizations can address the most severe ones first.
● Risk Assessment: The CVSS score, especially the Environmental Score,
can help organizations assess the risk that a particular vulnerability
poses to their specific environment.
● Compliance: Some regulations and standards refer to CVSS scores
when specifying how quickly vulnerabilities need to be addressed.
CVSS Metrics and Their Meanings

● Exploitability Metrics: Outlines Attack Vector, Attack Complexity,


Privileges Required, and User Interaction.
● Impact Metrics: Covers Confidentiality, Integrity, and Availability
impacts post exploitation.
● Scope: Depicts how a vulnerability affects resources beyond its security
perimeter.
Introduction to CVSS
Terms and Scoring
System
Common Vulnerability Scoring System (CVSS)
How to Calculate a CVSS Score

● A CVSS score is calculated by first determining the Base Score using the
Exploitability and Impact metrics.
● The Temporal Score is then calculated by multiplying the Base Score by
the values for the Exploitability, Remediation Level, and Report
Confidence metrics.
● The Environmental Score is calculated by adjusting the Temporal score
based on the modified impact and exploitability metrics specific to the
user's environment.

CVSS Score = Base Score × Temporal Score × Environmental Score


How to Calculate a CVSS Score

● A CVSS score is calculated by first determining the Base Score using the
Exploitability and Impact metrics.

BaseScore = ((0.6*Impact) + (0.4*Exploitability) - 1.5)*f(Impact)


Sample CVSS Base Score Calculation:
Exploitability: 2
Impact: 7
Scope: 0
To calculate the CVSS Base Score, we use the following formula:
(0.6 * Impact) + (0.4 * Exploitability) - 1.5 * (1 - Scope)
In our sample case, the calculation would be:
(0.6 * 7) + (0.4 * 2) - 1.5 * (1 - 0)
(4.2) + (0.8) - 0
The final CVSS Base Score would be 5.0.
Interpreting CVSS Scores

● A higher score represents a greater severity.


● Scores 0.0-3.9 are considered Low severity, 4.0-6.9 as Medium, 7.0-8.9
as High, and 9.0-10.0 as Critical.
● It's important to remember that the scores are relative, not absolute.
They are meant to help prioritize responses, not dictate them.
Using CVSS Scores in Decision Making

● CVSS scores assist in setting remediation priorities


● Consider factors such as asset value, threat environment, and
remediation cost and effects
● Regulatory requirements also influence decisions
● High CVSS scores do not always signify high risk, and low scores cannot
be overlooked
Applying CVSS in
Vulnerability
Management
Common Vulnerability Scoring System (CVSS)
Role of CVSS in prioritizing vulnerability remediation

● CVSS scores range from 0


(no impact) to 10 (critical
impact), aiding in assessing
severity of vulnerabilities
● Example: A hypothetical
Windows OS vulnerability
with CVSS score of 9.8
would be prioritized due to its
critical impact
Real-world Examples of CVSS Application

● CVSS scores help assess


risk in real-world
scenarios, such as the
"Heartbleed"
vulnerability
● Despite its medium CVSS
score of 5.0, Heartbleed's
potential to leak sensitive
server information led to
high remediation priority
Limitations of CVSS and Complementary Tools and Approaches

● CVSS does not account for


an organization's specific
environment or the business
criticality of affected
systems
● Example: A high CVSS score
vulnerability might pose low
risk if it pertains to an
unused system feature
● Other risk metrics and threat
intelligence can supplement
CVSS to better address
organizational context
Importance of Regular Vulnerability Scanning and Patch Management

● Regular vulnerability scanning identifies new vulnerabilities, helping


maintain cyber hygiene
● Tools like Nessus output vulnerability lists with CVSS scores for
patching prioritization
● Regular patch management reduces opportunities for attackers to exploit
known vulnerabilities
The Importance of Data
Visibility in Cybersecurity
Data Visibility for Detection
Definition of Data Visibility and Its Importance in Cybersecurity

● Data visibility refers to the ability to track and analyze all data moving
through an organization's network.
● Helps identify patterns and anomalies that might indicate a cyber threat.
● Enables proactive cybersecurity by identifying potential issues before
they become threats.
● Example: A sudden increase in data transfer could be an indicator of a
data breach in progress.
Role of Data Visibility in Threat Detection and Incident Response

● Allows real-time threat detection by monitoring data flows for signs of


malicious activity.
● Facilitates incident response by providing the information needed to
investigate and respond to security events.
● Crucial in creating a complete forensic picture following a breach.
● Example: Detecting an anomalous data transfer to an external server
could help stop data exfiltration in real-time.
Challenges in Achieving Data Visibility: Volume, Variety, Velocity of Data

● The vast volume of data in modern networks can make complete


visibility a challenge.
● Variety of data types and sources adds to the complexity of gaining full
visibility.
● The velocity at which data moves within and across networks can make
it hard to track in real time.
● Example: Cloud adoption and the use of IoT devices have significantly
increased these challenges.
Importance of Context in Data Visibility

● Context allows organizations to understand not just what is happening,


but why it might be happening.
● Contextual information can help differentiate between false positives
and real threats.
● Can guide appropriate responses based on the significance of the data
involved.
● Example: An unusual data transfer may be normal end-of-month activity,
or a breach depending on the context.
Tools and Techniques for Data Visibility:
Log Aggregation, SIEM, Network Monitoring

● Log aggregation collects data from different sources, enabling


centralized analysis.
● SIEM (Security Information and Event Management) tools centralize,
analyze, and report on security data.
● Network monitoring tools track network traffic for abnormal patterns.
● Example: Log aggregation can collate firewall logs and server logs,
giving a broader view of network activity.
Strategies for Data
Visibility
Data Visibility for Detection
Role of Data Analysis and Visualization in Enhancing Visibility

● Data analysis helps identify patterns and anomalies that might signal
security issues.
● Visualization tools turn raw data into visual reports, aiding
understanding and decision-making.
● Both provide context, making threat detection more accurate and
efficient.
● Example: A visual dashboard of data traffic can help quickly spot sudden
spikes in network activity.
Importance of Well-defined Data Policies and Practices

● Consistency: Well-defined data policies and practices ensure that data is


consistently managed and categorized, making it easier to track and monitor.

● Compliance: Clear data policies help organizations comply with data protection
regulations and industry standards, reducing the risk of non-compliance penalties.

● Data Classification: Policies define how data should be classified based on


sensitivity, allowing for more precise visibility into critical data.

● Access Control: Policies specify who can access, modify, or share data, contributing
to controlled data flows and better visibility into user actions.

● Data Retention: Defined retention policies ensure data is retained for the necessary
time, improving historical data visibility.
The Role of Machine Learning in Data Analysis

● Machine Learning (ML) can automate data analysis, improving


efficiency and effectiveness.
● ML can learn from past incidents to predict and detect future threats.
● Adaptive ML models can evolve with the changing cybersecurity
landscape.
● Example: ML can detect a complex phishing attack by recognizing
patterns missed by traditional systems.
Case Studies of Data
Visibility in Action
Data Visibility for Detection
Real-world Examples of Organizations Achieving Improved Data Visibility

Capital One Data Breach (2019)


● Incident: In 2019, Capital One faced a
massive data breach affecting 100+ million
customers.
● Response: Capital One responded by:
● Cloud-Based Tool: Deploying a cloud-
based data discovery tool for proactive data
monitoring.
● Training: Conducting comprehensive data
security training.
● Access Control: Strengthening access
controls to prevent unauthorized access
Real-world Examples of Organizations Achieving Improved Data Visibility

● JPMorgan (2014 Data Breach):


● Significant breach exposed personal data of
millions.
● Spear phishing campaign revealed
vulnerabilities.
● Early Detection: Improved threat detection.
● Proactive Mitigation: Enabled risk
assessment.
● Compliance: Ensured regulatory adherence.
● Holistic Security: Enhanced posture overview.
● Incident Response: Faster response to
incidents.
Impact of Data Visibility on Cybersecurity Posture

● By achieving improved data visibility, organizations experienced several


benefits to their cybersecurity posture.
● Enhanced visibility enabled quicker threat detection, allowing for timely
incident response and mitigation.
● Organizations gained a better understanding of their risk landscape,
enabling proactive measures to prevent security incidents.
● Increased data visibility enhanced compliance efforts by ensuring
sensitive data was properly protected.
Lessons Learned from These Case Studies

● The case studies highlight several valuable lessons regarding the


impact of data visibility in cybersecurity.
● Organizations should prioritize establishing centralized logging
mechanisms to consolidate and analyze security events effectively.
● Real-time visibility into data movements and potential vulnerabilities is
critical for proactive threat mitigation.
● Implementing data loss prevention measures and continuous
monitoring helps maintain strong data protection.
● Regular review and assessment of data visibility strategies are
necessary to adapt to evolving threats and technological advancements.
Unpacking the 5-tuple
Approach for Host
Isolation
5-tuple Approach to Isolate a Compromised Host
Explanation of the 5-tuple

● The 5-tuple consists of five essential components that uniquely identify a


network communication flow.
● Source IP: The IP address of the sender or the originator of the network
traffic.
● Destination IP: The IP address of the receiver or the intended recipient of the
network traffic.
● Source Port: The port number used by the sender's device for the
communication.
● Destination Port: The port number used by the receiver's device for the
communication.
● Protocol: The network protocol governing the communication, such as TCP
or UDP.
Use of 5-tuple in Network Traffic Analysis

● The 5-tuple approach is widely used in network traffic analysis to


understand and classify network flows.
● By analyzing the 5-tuple information, security analysts can identify
patterns, anomalies, and potential security threats.
● It helps in tracking communication between different endpoints,
detecting malicious activities, and monitoring network performance.
● Network traffic analysis based on the 5-tuple enables deep visibility into
network behavior and helps in incident response.
Benefits and Limitations of the 5-tuple Approach

● Benefits:
○ Provides a concise and comprehensive representation of network
communication flows.
○ Enables efficient analysis and classification of network traffic.
○ Facilitates the identification of patterns and anomalies for detecting security
threats.
● Limitations:
○ Limited visibility into the payload or content of network traffic.
○ Inability to provide context-specific information about the purpose or nature
of communication.
○ Requires additional methods or tools to analyze encrypted or encapsulated
traffic.
Using the 5-tuple
Approach
5-tuple Approach to Isolate a Compromised Host
Practical Steps to Use 5-tuple Data in Incident Response

● Collect and analyze 5-tuple data from network devices, firewalls, and
IDS/IPS systems.
● Identify the compromised host by examining the source and destination
IP addresses, ports, and protocols involved in the suspicious network
traffic.
● Isolate the compromised host from the network to prevent further
damage and potential lateral movement.
● Preserve the 5-tuple data as evidence for further investigation and
analysis.
Case Study of a Breach Investigation Using the 5-tuple Approach

Equifax Data Breach (2017):


Scope: Exposed personal data of 147+ million Americans.
Cause: Vulnerability in Equifax's web application firewall (WAF).
Attack Exploitation: Attackers exploited WAF misconfiguration.
Tracking Method: Utilized the 5-tuple approach for connection
tracking.
Obfuscation Techniques: Employed IP address spoofing to conceal
their tracks.
Security Analysts' Response: Analyzed 5-tuple data to identify
patterns and anomalies.
Outcome: Led to the identification of attackers and their infrastructure.
Disruption: Enabled disruption of attackers' operations.
Combining 5-tuple Data with Other Indicators of Compromise

● Benefits of Combining Data:


○ Enables correlation of network traffic patterns with known IoCs.
○ Facilitates identification of abnormal activities associated with compromised
hosts.
● Use Cases:
○ Combining 5-tuple data with IoCs to detect and investigate network
intrusions, malware infections, or unauthorized access attempts.
● Tools and Technologies:
○ Security information and event management (SIEM) systems, network traffic
analysis solutions, and threat intelligence platforms.
Overview of Rule-based,
Behavioral, and Statistical
Detection Methods
Rule-based, Behavioral, and Statistical Detection
Behavioral Detection Method

● Definition: Behavioral detection focuses on analyzing the behavior of


users, processes, or systems to identify deviations from normal patterns.
● Characteristics: It establishes a baseline of normal behavior and
identifies anomalies or deviations that may indicate malicious activity.
● Use Cases: Behavioral detection is effective in identifying insider threats,
zero-day attacks, or abnormal system activities.
● Example: An intrusion detection system (IDS) monitoring network traffic
for unusual behaviors or unauthorized access is an example of
behavioral detection.
Statistical Detection Method

● Definition: Statistical detection method analyzes data patterns using


statistical models to identify anomalies.
● Characteristics:
○ Relies on statistical algorithms and machine learning.
○ Identifies deviations from expected behavior.
○ Detects unknown or emerging threats based on statistical anomalies.
● Use Cases:
○ Identifying anomalies in network traffic.
○ Detecting unusual user behavior.
○ Monitoring system logs for deviations.
● Example: Analyzing network traffic for unusual spikes or communication
patterns.
Use Cases and Examples for Each Method

Detection Method Use Case Example

An antivirus software detecting a

Rule-based Detection Identifying known malware known virus signature and quarantining

the infected file

An employee accessing sensitive data

outside of their normal working hours


Behavioral Detection Detecting insider threats
or attempting unauthorized file

transfers

Analyzing network traffic patterns to

detect a sudden increase in data


Statistical Detection Identifying anomalous network traffic
exfiltration or unusual communication

between hosts
Tools and Technologies That Use These Methods

● Rule-based Detection Method:


● Tools: Antivirus software, Intrusion Detection and Prevention Systems
(IDPS), signature-based network firewalls.
● Behavioral Detection Method:
● Tools: User and Entity Behavior Analytics (UEBA), anomaly detection
systems, endpoint detection and response (EDR) solutions.
● Statistical Detection Method:
● Tools: Machine learning algorithms, data analytics platforms, statistical
anomaly detection tools.
Rule-based Detection Method

● Definition: Rule-based detection relies on predefined rules or signatures


to identify known patterns of malicious activity.
● Characteristics: It matches specific patterns or behaviors against a set of
predefined rules to determine if an event or behavior is malicious.
● Use Cases: Rule-based detection is commonly used to identify known
malware, phishing emails, or specific network attack patterns.
● Example: An antivirus software scanning files for known virus signatures
is an example of rule-based detection.
Implementing Different
Detection Methods
Rule-based, Behavioral, and Statistical Detection
How to Choose and Implement Appropriate Detection Methods

● Assessing Requirements: Evaluate the specific security needs and risks


of the organization to determine the most suitable detection methods.
● Understanding Detection Methods: Gain an understanding of the
strengths, limitations, and capabilities of different detection methods,
such as rule-based, behavioral, and statistical approaches.
● Aligning with Goals: Choose detection methods that align with the
organization's security goals, compliance requirements, and risk
tolerance.
● Implementation Steps: Plan and execute the deployment of the
selected detection methods, ensuring proper configuration and
integration with existing security infrastructure.
Importance of Tuning and Maintaining Detection Systems

● Continuous Monitoring: Regularly monitor the performance and


effectiveness of detection systems to ensure optimal functioning.
● Tuning for Accuracy: Fine-tune detection systems to minimize false
positives and increase the accuracy of identifying genuine threats.
● Adapting to Changes: Keep detection systems up-to-date by
incorporating new threat intelligence, updating signatures/rules, and
adjusting behavioral baselines.
● Regular Testing: Conduct periodic testing and validation of detection
systems to verify their efficacy and identify any gaps or weaknesses.
Role of False Positives and Negatives in Detection

● False Positives: Manage and minimize disruptions caused by incorrect


threat identifications.
● False Negatives: Implement strategies to reduce missed or undetected
threats.
● Balancing Act: Find a balance between false positives and negatives
based on risk tolerance.
● Continuous Improvement: Review and refine methods based on
analysis for accuracy.
Comparing Detection Approaches:
Rule-based, Behavioral, and
Statistical Methods
Rule-based, Behavioral, and Statistical Detection
Strengths and Weaknesses
of Rule-based, Behavioral, and Statistical Methods

● Rule-based Detection:
○ Strengths: Effective in identifying known threats and specific patterns.
○ Weaknesses: Limited in detecting unknown or zero-day attacks.
● Behavioral Detection:
○ Strengths: Capable of detecting abnormal behaviors and insider threats.
○ Weaknesses: May generate false positives or miss sophisticated attacks.
● Statistical Detection:
○ Strengths: Able to identify anomalies and unknown threats.
○ Weaknesses: Requires historical data for accurate baseline creation.
Situations Where Each Method is Most Effective

● Rule-based Detection:
○ Use Cases: Ideal for detecting known malware, phishing attempts, or specific
attack patterns.
● Behavioral Detection:
○ Use Cases: Effective in identifying insider threats, zero-day attacks, or
abnormal system behaviors.
● Statistical Detection:
○ Use Cases: Suitable for detecting anomalies in network traffic, identifying
new or unknown threats.
How To Use These Methods
in a Complementary Manner for Enhanced Security

● Rule-based and Behavioral Detection:


○ Combining rule-based and behavioral approaches provides a broader range
of threat coverage.
○ Rule-based methods can detect known threats, while behavioral methods
identify unknown or suspicious activities.
● Statistical Detection with Rule-based or Behavioral:
○ Statistical methods can augment rule-based or behavioral detection by
identifying anomalies that may not fit known patterns.
● Comprehensive Defense Strategy:
○ Leveraging all three methods in a layered defense approach enhances
overall security posture.
Comparing and Contrasting the Three Detection Methods

You might also like