Cyber Security Presentation
Cyber Security Presentation
Cyber Security Presentation
Compiled info
1
Objective
2
Layout
Cyber Concepts
Cyber Threats
Cyber Attacks
Cyber Defense
Establishing Cyber Labs
Learning Resources
3
A Brief History of the World
4
Cyber Age & Cyber war
6
What is Cyberspace?
8
The Aim of Cyber Attacks
9
Cyber Weapons and Attacks real situation
10
Cyber Weapon Design
Classical Weapon Architecture
A missile is comprised of three basic elements.
• Delivery vehicle (rocket engine), followed by
• Navigations system (to get to the target) and
• Payload (component to cause damage)
11
Cyber Weapon Design
Cyber Weapon – Delivery Vehicle
Numerous ways to deliver cyber weapons to targets
▪ USB
▪ Emails with malicious code embedded or attached
▪ Web sites having malicious links & downloads
▪ Manual delivery (via Hacking) to place malicious
payload on a target computer, system or network
▪ Counterfeit hardware, software
▪ Electronics components to deliver cyber weapons
12
Cyber Weapon Design
Cyber Weapon – Navigation System
System vulnerabilities are primary navigation systems in
cyber weapons to allow malicious payload to reach a
specific point inside a computer, system or network.
▪ Vulnerabilities provide entry points for the
payload
▪ Security exposures allow exploitation/
compromise of system integrity
▪ Exploitations allow unauthorized remote access
and control over the system
13
Cyber Weapon Design
Cyber Weapon – Payload
Cyber weapon payload (explosive) can be a program:
▪ To copy information off of the computer and send
it to an external source
▪ To erase/alter information stored on the system
▪ To allow remote access/Control so that
computer can be controlled/directed over the
internet
“Bot/botnet” is an example to allow remote use of
computer by an unauthorized individual/org
14
Cyber Weapons Economics
16
Cyber Threats
17
Who is vulnerable?
Financial institutions and banks
Internet service providers
Pharmaceutical companies
Government and defense agencies
Contractors to various government agencies
Multinational corporations
ANYONE ON THE NETWORK
18
Common Cyber Threats 19
• Key Loggers
• Social Engineering • Hacking
• Insider Threats • Malicious code
• Vendors & Employees • Weak Algos
• DoS
• Access Controls
• Natural Disasters
Most Common Insider Threats
Personal Gain
Modifying or stealing confidential/sensitive information
Business Advantage / Traitor
Theft of trade secrets or customer information
To share with a foreign government or organization
Sabotage of an organization’s data systems or network
20
Malware
21
Worm
Automatic propagation without human assistance
An independent program; doesn’t need a host document
Propagates using computer networks
It harms open network connections, consume bandwidth
Virus
Human-assisted propagation (e.g., open email
attachment)
Virus damages a local machine only
22
Backdoors
Hidden feature or command in a program
Allows unwanted actions
Allow unauthorized access to your system
Logic bomb
Starts when a specific event occurs
It releases a virus, worm or other code to attack a
system
23
Trojan
A user/administrator installs by being misled into
thinking that it only performs wanted functionality
However, the program also contains hidden
functionality, which the user does not want.
24
Rats
Remote Access Trojans
Lets the criminal view, change, monitor, record or
control your computer through internet
Find your files, view, copy or delete them
Create popups, capture video, audio and send to
criminals
Record typing and send information to other computer
Run or end a program, process or connection on your
computer
Use your PC as part of a Zombie Army or Bot
25
Rootkit
A Stealth program to maintain persistent and
undetectable presence on the machine
Modifies the host OS to hide its process from being
visible in the list of processes
26
Spyware
Spies on the user to collect info and display popup
ads based on that collected info
Change configuration of your computer
Slows down the computer to make it non-functional
It makes use of the memory used by background
processes to keep a close watch on users
27
Adware
Software that display banners and popup ads on the
computer
Can be harmful or harmless
Adware can contain Spyware
Adware gathers information on what the user
searches the Web for, and report third-party
28
29
Spam
Junk or unwanted email
How to reduce spam
Delete junk email without opening
them
Don’t reply to them
Don’t give personal info in an email or instant message
Don’t buy anything or give charity promoted through
spam
30
Phishing
Attackers send fake request as if from a bank, or
other institution asking for personal information
You click on a link in the email
It takes you to a fake website imitating the institution
If you give personal info, it results in Identity Theft
31
Social Engineering
Use of social tricks or psychology to gain access to
secured systems
Trick people into revealing passwords and other
information
Hacker calls a company pretending to be an employee
in order to learn secrets about an internal network
32
“Amateurs hack systems, professionals hack people. They
(professional hackers) play on security flaws in people,
not in systems.”
Bruce Schneier
(Living Legend in Cyber security)
33
Global Cyber Attacks
34
Stuxnet Worm
• June 2010
Attacks
SCADA
system using
Siemens
Control SW
Step 7
1000 nuclear
centrifuges
Over 60,000
computers
“The Hunt for the kill switch”, Adee 2008, IEEE SPECTRUM
38
Denial of Service
A kill switch is any manipulation of the chip's software or hardware
that would cause the chip to die outright--to shut off an F-35's
missile-launching electronics, for example.
Depending on the adversary's degree of sophistication, a kill switch
might be controlled to go off at a set time, under certain
circumstances, or at random. As an example of the latter, Stanford
electrical engineering professor Fabian Pease muses, ”I'd nick the
[chip's] copper wiring.” The fault, almost impossible to detect,
would make the chip fail early, due to electromigration: as current
flowed through the wire, eventually the metal atoms would migrate
and form voids, and the wire would break. ”If the chip goes into a
defense satellite, where it's supposed to work for 15 years but fails
after six months, you have a very expensive, inoperative satellite,”
Pease says.
“The Hunt for the kill switch”, Adee 2008, IEEE SPECTRUM
39
Denial of Service
Trojans may affect service by exhausting scarce resources
such as bandwidth, computation, and battery power and
note that physical effects that disable or alter the
configuration of a device could be temporary or
permanent.
40
Leak Information
E. H. Spafford
Associate Professor
Dept of Computer Science
Purdue University
42
Cyber Defence
(From system to network)
43
PLANNING
Plato
44
“My access to Motorola, Nokia, ATT, Sun depended
upon the willingness of people to bypass policies
and procedures that were in place for years
before I compromised them successfully.”
Kevin Mitnick
(A great hacker of our times)
45
What is “Security”
“Security” is the quality or state of being secure
to be free from danger.
Types of Security
Physical security
Protects the physical items, objects or areas of an
organization from unauthorized access and misuse
Personal security
Protects the individual or group of individuals who are
authorized to access the organization and its operations
Operations security
Protects the details of a particular operation or series of
activities
46
What is “Security”
Communications security
Protects the organization’s communications media,
technology, and content
Network security
Protects the networking components, connections, and
contents
Information Security
Protects the information and its critical elements,
including the systems and hardware that use, store, or
transmit that information
47
Why an organization needs Security
48
Security and Accessibility
Security should balance
protection and availability
Security Access
Two
Extremes
49
Cyber Security
50
Cyber/Information Security
– Security is not about the People alone
51
Cyber Security Services
Confidentiality
Integrity
Authentication
Digital Signature
Non-Repudiation
Availability
52
Establishing Cyber Security Labs
53
Labs of Cyber Security
54
Network Security Lab
55
A Computer Network
56
Computer Network components
57
Computer Network Components and
Devices
Network Interface Card (NIC)
Hub
Switches
Router
Modem
Cables and connectors
Software
Servers
58
Security Components
Confidentiality: Need access control, Cryptography,
Existence of data
Integrity: No change, content, source, prevention
mechanisms, detection mechanisms
Availability: Denial of service attacks,
Confidentiality, Integrity and Availability (CIA)
59
Threats
Disclosure, alteration, and denial (DAD)
Disclosure or unauthorized access: snooping, passive
wiretapping,
Deception or acceptance of false data: active
wiretapping (data modified), man-in-the-middle attack,
Masquerading or spoofing (impersonation), repudiation of
origin (denying sending), denial of receipt
Disruption or prevention of correct operation
Usurpation or unauthorized control of some part of
a system: Delay, Infinite delay ⇒ Denial of service
60
Security Policy
Statement of what is and what is not allowed
Security Mechanism: Method, tool or procedure for
enforcing a security policy
61
Elements of Network Security Policy
1. Purchasing guidelines: Required security features
2. Privacy Policy: files, emails, keystrokes
3. Access Policy: Connecting to external systems,
installing new software
4. Accountability Policy: Responsibilities of
users/staff/management.Audit capability.
5. Authentication Policy: password policy
6. Availability statement: redundancy and recovery
issues
7. Maintenance Policy: Remote maintenance? How?
8.Violations Reporting Policy: What and to whom?
9. Supporting Information: Contact information,
handling outside
62
Security Issues
Goals: Prevention, Detection, Recovery
Assurance: Assurance requires detailed specs of desired/ undesired
behavior, analysis of design of hardware/software, and arguments or
proofs that the implementation, operating procedures, and maintenance
procedures work.
Operational Issues: Benefits of protection vs. cost of
designing/implementing/using the mechanisms
Risk Analysis: Likelihood of potential threats
Laws: Sys Admins can't read user's file without permission.
Customs: DNA samples for authentication, SSN as passwords
Organizational Priorities: Security not important until an incident
People Problems: Insider attacks
63
Steps in Cracking a Network
Information Gathering: Public sources/tools.
Port Scanning: Find open TCP ports.
Network Enumeration: Map the network. Servers
and workstations. Routers, switches, firewalls.
Gaining Access: Keeping root/administrator access
Modifying: Using access and modifying information
Leaving a backdoor: To return at a later date.
Covering tracks
64
Hacker Categories
Hacker - Cleaver programmer
Cracker - Illegal hacker
Script Kiddies - Starting hacker. May not target a
specific system. Rely on tools written by others.
White Hat Hackers - Good guys.Very knowledgeable.
Hired to find a vulnerability in a network. Write own
software.
Black Hat Hackers - Bad guys. Desire to cause harm to
a specific system. Write own software.
Cyber terrorists - Motivated by political, religious, or
philosophical agenda.
65
Types of Attacks
Denial of Service (DoS): Flooding with traffic/requests
Buffer Overflows: Error in system programs. Allows
hacker to insert his code in to a program.
Malware
Brute Force: Try all passwords.
Port Scanning:
⇒ Disable unnecessary services and close ports
Network Mapping
66
Security Mechanisms
Encipherment
Digital Signature
Access Control
Data Integrity
Authentication Exchange
Traffic Padding
Routing Control
Notarization
67
Honey Pots
Trap set for a potential system cracker
All the services are simulated
Honey pot raises alert allowing administrator to
investigate
68
Network Security Audit
1. Pre-Audit Contact: Study security policy
2. Initial Meeting: Discuss scopes and objectives of audit
3. Risk Assessment: Find vulnerabilities.
4. Physical security Audit: locked doors, etc.
5. Network Configuration Audit: What devices are on the network?
6. Penetration testing: attempts to crack the security
7. Backup recovery audit: Simulates a disaster to check recovery
procedures
8. Employee audit: Passive monitoring of employee activities to verify
policy enforcement
9. Reporting: Preparation of Audit Report and presentation to the
management.
69
Activities performed in the Network
Lab
Penetration Analysis / Testing Exercises
Intrusion Detection / Handling Exercises
Cyberwarfare related Projects
70
Tools for Network Monitoring and
Analysis
Tool Name Description
WireShark A network protocol analyser and capture utility, captured data can easily
be sent to another application for analysis or filtered
within WireShark itself
Pandora FMS To keep an eye on your servers applications and communications. . It can
be configured to create alerts based on specific events and send
notifications to administrators
Angry IP Angry IP scanner scans IP addresses and ports finding live hosts and
Scanner providing you with information about them
Microsoft It is used to capture packet data to analyze network traffic. It has support
Network for over three hundred public and Microsoft propriety protocols as well
Monitor as a wireless monitor mode.
Fiddler Fiddler captures HTTP between computers and the Internet to help with
debugging, to see incoming and outgoing data including encrypted HTTPS
traffic, allowing you to test your website performance or the security of
your web applications
Network Network Miner is classed as a network forensics analysis tool and is used
Miner
71 to capture packets it then extract files and images from that data allowing
you to reconstructed his actions.
Tools for Network Monitoring & Analysis
(Cont’d)
Tool Name Description
Capsa free Another tool for monitoring troubleshooting and analyzing network
traffic is Capsa free, not only does it have over 300 protocols and the
ability to create and customize them but its dashboard also allows to see
a summary of traffic stays TCP UDP conversations and packet analysis.
Total Network Total Network Monitor watches over your host and services, notifying
Monitor you when something requires your attention it colorful interface lets you
see what's wrong at a glance
xirrus xirrus wifi inspector manages connections locate devices detect rogue
wifi inspector access point and has connection speed quality tests
zenoss core Zenoss core keeps an eye on the application's servers, storage,
networking and virtualization to give performance and availability stats. It
also has an advance notification system.
GFI LanGuard GFI LanGuard allows to automate the detection, downloading, and
deployment of missing patches for all computers and devices, and fix
vulnerabilities before they can be exploited
72
Open Source Tools
Tool name URL
DNS Checker https://dnschecker.org/network-tools.php
➢ Domain DNS Validation
➢ Reverse DNS Lookup
➢ DNS Lookup
➢ NS Lookup
➢ MX Lookup
➢ Flush DNS
IP Tools ➢ What is my IP Address
➢ IP location Lookup
➢ Trace Email
➢ IP Blacklist Checker
➢ IP to decimal Converter
➢ Resolve IP to Hostname
➢ Lookup IP Whois
➢ IPv4 to IPv6
Developer Tools ➢ Password Generator
➢ HTTP Header Check
➢ Check Website OS
➢ MD5 and Base64 Generator
Network Tools ➢ TCP and UDP Port Scanner
➢ MAC Address Loopup
➢ ASN Whois lookup 73
Forensic Investigation/ Malware
Analysis Lab
74
Digital Forensics
A branch of CS pertaining law based method for
investigation.
Collection and analysis of the digital data
Categories
Computer Forensics
Cyber Forensics
Digitized Document
Software Forensics
75
Digital Forensic Process
76
Forensic Investigation Plan
Incident and Investigation review
Determine the intent and scope of investigation
Determine legal restrictions
Determine the limits of the investigator’s authority
Determine what the client wants from the investigation
Determine resource availability
Determine the escalation procedures
Determine liaison and reporting requirements
Document known facts and initial incident time-line
Determine facts of the incident
77
Forensic Investigation Plan (cont ...)
Identification and Preservation
Incident scene security
Evidence identification
Photograph the incident scene
Search Warrant processing
78
Forensic Investigation Plan (cont ...)
Data Collection
Process incident scene and collect physical evidence
Seize physical computer evidence
Process incident scene for digital evidence
Collect data from live system
Collect special content data
Review Forensic Workstation and Procedures
Collect data/hard drives from powered-down system
Review forensic documentation
Review collected evidence for anomalies
Review collected evidence for prospective leads
79
Forensic Investigation Plan (cont ...)
Examination
Before proceeding to examination
Create appropriate number of evidence back-ups
Identify any deleted partitions or unused disk space
Retrieve time zone settings
Determine OS
Retrieve user profile information (names, login accounts
details, etc.)
Use certified forensic work media and hard drives
Process forensic image working copy
Create digital evidence processing file structure on work
media
Process raw digital evidence
80
Forensic Investigation Plan (cont ...)
Examination (Cont’d)
Physical data extraction and logical file separation
Extract allocated data
Extract unallocated data
Extract swap space (Unix)
Process memory dumps or images
81
Forensic Investigation Plan (cont ...)
Process Refined Digital Evidence
Categorize files
Construct mismatch file list
Collect and document hidden data
Create and document investigative leads
Analysis
Temporal analysis
Relational analysis
Functional analysis
Evidence analysis
82
Forensic Investigation Plan (cont ...)
Presentation
Organize forensic documentation
Develop Forensic Presentation
Create Forensic Report
83
Lab Environment
Ample space for case discussion among investigators
Controlled atmospheric temperature
Proper lighting with life safety measures
Security and surveillance
Workstations/laptops/computer for forensic & non-forensic
activities
Cables
DD (IDE, SCSI, SATA), Mother Board cables, LAN cables, USB
Devices
Additional hard drives , RAMs, USB drives , backup storage SAN,
Laptop HDD connectors , SCSI cards, network cards, VGA/HDMI
connectors, monitors, power supplies , keyboards mouse, laptop
charger, batteries, RW-CD/DVD
Forensic tools
84
Lab Environment (cont …)
Licensed applications software
MS-Office, Adobe, CorelDraw, Data Bases Software and
Operating System CDs like Win7,Vista, 8, 10, Server 200X ,
Password cracking tools, write blocker software and
hardware
Computer seizure power supply
UPS
Safe locker
Storage shelves
Printer, phones
Log Book
Reference study material
Internet connectivity
85
Open Source data recovery tools
ITEM NOc DESCRIPTION
1 Pandora Recovery
2 Recuva
4 Recover My Files
5 GetDataBack
6 eSupport UndeletePlus
7 Pro-discovery
8 Safetools
9 Cofee
10 Data Recovery
86
Commercial software for Forensic
Lab
ITEM NO. DESCRIPTION
1 AccessData
2 FTK
5 OfficeRecovery Ultimate,
6 EasyRecovery and
88
Determining Floor Plans for
Computer Forensics Labs
89
Determining Floor Plans for
Computer Forensics Labs (continued)
90
Determining Floor Plans for Computer
Forensics Labs (continued)
91
Malware Analysis Lab
92
Malware Analysis Process (cont…)
Malware Analysis Techniques
Surface Analysis
Behavioral Analysis
Code Analysis
Static Code Analysis
Dynamic Code Analysis
Volatile memory Analysis
93
Architecture of Malware Analysis Lab
Allocate physical or virtual systems for the analysis
lab
94
Architecture of Malware Analysis Lab
95
Tools for Malware Analysis
BgInfo TCPView
MD5sums Hfind
PSfile WinHex
RootkitRevealer Reverse Engineering
Nmap Compiler
Winalysis ProcDump 32
Strings Windbg
Debugview Livekd
96
Approaches to Malware Analysis
Process-driven Approach
Goal-driven Approach
Hybrid approach
97
Process-driven approach
98
Goal-driven approach
99
Malware Analysis Reporting
Summary of the analysis
Identification
Characteristic
Dependencies
Behavioral and code analysis findings
Supporting figures
Incident recommendations
Repeatable process
Create Mindmaps
100
Other Requirements
Trainings
Certifications
Seminars/Conferences
101
Cryptology Lab
102
Terminology
Alice – Sender of the message
Bob – Receiver
Eve – Eavesdropper or unintended party
Plaintext – Message to be sent
Ciphertext – Coded message
Encryption – Coding of message
Decryption – Decoding the message
Cryptology – Science of study of ciphers
Cryptography – Science (or art) of encrypted
communication between Alice and Bob, such that even if Eve
intercepts the ciphertext, she won’t be able to make any sense
of it.
Cryptosystem – A term given to the system which turns a
plaintext into ciphertext and back.
103
Cryptographic Lab
Cryptology is divided into
1) Cryptography
2) Cryptanalysis
Cryptography
deals with the creation of ciphers and cryptosystems.
Cryptanalysis
deals with the breaking of ciphers and cryptosystems.
Cryptanalysis can be done by various approaches or
attacks like brute force, chosen plaintext and man in the
middle attack.
Web-based cryptanalysis tools are also available that
can break the cryptosystems, teach about network security
and test the cryptosystems in general.
104
Cryptanalysis Tools
Brute force attack
brute force means exhausting very possibility until a
match is found. Even in classic cryptography, brute force
attack is considered time-consuming.
Chosen plaintext attack
By examining the plaintext – ciphertext pair, the
attacker can easily guess the encryption key
Man in the middle attack
105
Web based Cryptanalysis Tools
Tool name Description
CrypTool an e – learning tool explaining cryptanalysis and cryptography. CrypTool aims at making
people understand network security threats and working of cryptology. It includes
asymmetric ciphers like RSA, elliptic curve cryptography. CrypTool1 (CT1) experiments
with different algorithms and runs on Windows. It was developed in C++ language
EverCrack An open source GPL software, EverCrack deals chiefly with mono – alphabetic
substitution and transposition ciphers. It was initially developed in C language.It is
currently concentrating on online web – based applications. Now, the programming is
kernel based i.e. deciphering complex ciphers for the kernel.
Cryptol A software development firm named Galois Inc. developed Cryptol. It is a learning tool
as well as a way to analyze algorithms and implementations. Originally designed for NSA,
this tool is now used by private firms. The programming language is used for all aspects
of developing and using cryptography
AlphaPeeler AlphaPeeler is a freeware / non-commercial software product for educational and
personal use.Its development started in 1997, and AlphaPeeler 1.0 was deployed in June
1998. It includes MD5, SHA – 1, RSA key generation, RIPEMD – 16, etc
Crypto It is a software that performs various cryptanalytic functions. It can generate 14
Bench cryptographic hashes and two checksums. It can encrypt with 29 different secret key or
symmetric schemes. It can Encrypt, Decrypt, Sign, and Verify with six different public key
or asymmetric schemes
Web based Cryptanalysis Tools (Cont’d)
Tool name Description
Ganzúa Ganzúa (the Spanish word for lockpick) is a cryptanalysis tool for
monoalphabetic and polyalphabetic ciphers that can work with almost any set of
characters. It is a Java application; it may be executed on Mac OS X, Linux or
Windows.
Elcomsoft Elcomsoft Distributed Password Recovery (EPDR) installs “agents” on as many
Distributed computers as possible. These agents use brute force attack to recover the lost
Password Recovery password
Jipher Cryptanalysis tool that can be used to attack old ciphers. Additional can be used
to analyze cookies
Advanced Archive This tool supports the dictionary based attacks, plaintext attacks and the brute –
Password Recovery force attacks. It has a multilingual interface and strong AES encryption support.
Passwords for .zip, .arj , .rar & .ace extensions can be cracked
CalcChecksum CalcChecksum is a simple utility for calculating various checksums easily with a
graphical user interface
Kismet Kismet is an 802.11b network sniffer and network dissector. It is capable of
sniffing using most wireless cards, automatic network IP block detection via UDP,
ARP, and DHCP packets, and Cisco equipment lists
Web based Cryptanalysis Tools (Cont’d)
Tool name Description
Lepton’s Crack Lepton’s Crack is a generic password cracker. It is easily customizable with a simple
plugin system and allows system administrators to review the quality of the
passwords being used on their systems
Audio – Audio-entropyd reads sound from a stereo soundcard, takes the difference between
entropyd the left and right channels and feeds the result (via a secure hash) to the /dev/random
entropy pool
Crypto Bench Crypto Bench is a software that performs various cryptanalytic functions. It can
generate 14 cryptographic hashes and two checksums. It can encrypt with 29
different secret key or symmetric schemes. It can encrypt, decrypt, sign and verify
with six different public key or asymmetric schemes.
Cyber Security Learning
Resources
109
Courses and Certifications
Title Description URL
Cybrary Online library for information security domains https://www.cybrary.it
edX https://www.edx.org
Coursera https://www.coursera.org
Open online course provider
MOOC http://mooc.org/
Future Learn https://www.futurelearn.com
Udemy Global marketplace for teaching and learning https://www.udemy.com
Pluralsight Video training courses for software developers, IT https://www.pluralsight.com
administrators, and creative professionals
ITProTV eLearning offering a variety of IT courses https://www.itpro.tv
116