SlideShare a Scribd company logo
1 of 14
Download to read offline
Cyber Security [105713] – Notes
Module 4
Cyber Security Vulnerabilities& Safe Guards: Internet Security, Cloud Computing &Security, Social
Network sites security, Cyber Security Vulnerabilities-Overview, vulnerabilities in software, System
administration, Complex Network Architectures, Open Access to Organizational Data, Weak
Authentication, Authorization, Unprotected Broadband communications, Poor Cyber Security
Awareness. Cyber Security Safeguards- Overview, Access control, IT Audit, Authentication. Open Web
Application Security Project (OWASP), Web Site Audit and Vulnerabilities assessment. Open Source/ Free/
Trial Tools: WinAudit, Zap proxy (OWASP), burp suite, DVWA kit.
Cyber Security Vulnerabilities & Safe Guards:
Cybersecurity vulnerabilities are weaknesses in computer systems, networks, or software that can be
exploited by attackers to gain unauthorized access, steal data, or cause damage. Some common
vulnerabilities and safeguards to protect against them are:
Weak Passwords: Weak passwords are a major vulnerability that can be exploited by attackers to gain
unauthorized access. Safeguards include using strong passwords, implementing password policies, and
enabling two-factor authentication.
Outdated Software: Outdated software is another vulnerability that can be exploited by attackers.
Safeguards include applying software updates and patches regularly and implementing a vulnerability
management program.
Phishing Attacks: Phishing attacks are social engineering attacks that trick users into disclosing sensitive
information such as passwords or credit card numbers. Safeguards include training employees to recognize
and report phishing attempts and implementing spam filters.
Malware: Malware is malicious software that can damage systems, steal data, or cause other harm.
Safeguards include using anti-virus and anti-malware software, implementing firewalls, and regularly
scanning systems for malware.
Insider Threats: Insider threats are attacks by employees or contractors who have authorized access to
systems and data. Safeguards include implementing access controls and monitoring systems for suspicious
activity.
Data Breaches: Data breaches are incidents where sensitive information such as customer data or financial
information is stolen. Safeguards include encrypting sensitive data, implementing data loss prevention
controls, and regularly backing up data.
IoT Security: IoT (Internet of Things) devices are a growing security concern due to their lack of security
features. Safeguards include implementing device security controls such as strong passwords and
encryption, and regularly updating firmware.
Cybersecurity vulnerabilities can be mitigated through a combination of technical controls, employee
training, and best practices such as regularly applying updates and patches, implementing access controls,
and encrypting sensitive data.
Internet Security:
Internet security refers to the practice of protecting computer systems, networks, and user data from
unauthorized access, theft, damage, or disruption. Some common Internet security threats and safeguards
are:
Malware: Malware is malicious software that can damage systems, steal data, or cause other harm.
Safeguards include using anti-virus and anti-malware software, implementing firewalls, and regularly
scanning systems for malware.
Phishing Attacks: Phishing attacks are social engineering attacks that trick users into disclosing sensitive
information such as passwords or credit card numbers. Safeguards include training employees to recognize
and report phishing attempts and implementing spam filters.
Password Attacks: Password attacks involve guessing or cracking passwords to gain unauthorized access to
systems or data. Safeguards include using strong passwords, implementing password policies, and enabling
two-factor authentication.
Denial of Service (DoS) Attacks: DoS attacks involve overwhelming a system or network with traffic to cause
it to crash or become unavailable. Safeguards include implementing firewalls and intrusion prevention
systems, and regularly monitoring network traffic.
Man-in-the-Middle (MitM) Attacks: MitM attacks involve intercepting and altering communications
between two parties. Safeguards include using encryption, implementing secure protocols such as HTTPS,
and verifying the identity of communication partners.
Unpatched Software: Unpatched software is another vulnerability that can be exploited by attackers.
Safeguards include applying software updates and patches regularly and implementing a vulnerability
management program.
IoT Security: IoT (Internet of Things) devices are a growing security concern due to their lack of security
features. Safeguards include implementing device security controls such as strong passwords and
encryption, and regularly updating firmware.
Internet security threats are varied and constantly evolving. To protect against these threats, organizations
and individuals should implement a range of technical and non-technical safeguards such as using strong
passwords, implementing encryption, regularly updating software, and training employees to recognize and
report potential threats.
Cloud Computing & Security:
Cloud computing is a model of delivering computing services over the internet, including storage, processing
power, and applications. While cloud computing provides many benefits such as scalability and cost-
efficiency, it also presents several security challenges. Some common security challenges and safeguards
for cloud computing are:
Data Security: Cloud computing involves storing data on remote servers, which increases the risk of data
breaches. Safeguards include implementing access controls, using encryption to protect data in transit and
at rest, and regularly backing up data.
Identity and Access Management: Identity and access management (IAM) is important to ensure that only
authorized users have access to cloud resources. Safeguards include implementing strong authentication
and authorization mechanisms, enforcing password policies, and using multi-factor authentication.
Compliance: Organizations must ensure that cloud providers comply with relevant regulations such as
GDPR, HIPAA, or PCI DSS. Safeguards include conducting regular audits and assessments, and implementing
strict data handling policies.
Shared Responsibility: Cloud security is a shared responsibility between the cloud provider and the
customer. Safeguards include understanding the shared responsibilities and implementing appropriate
controls and processes.
Third-Party Services: Cloud computing often involves the use of third-party services such as APIs, which can
pose security risks. Safeguards include conducting risk assessments, implementing security controls such as
encryption and access controls, and regularly monitoring third-party services.
Malicious Insiders: Cloud providers may be vulnerable to attacks by malicious insiders, such as employees
or contractors. Safeguards include implementing access controls and monitoring systems for suspicious
activity.
Disaster Recovery: In the event of a disaster or outage, cloud providers must have a plan in place to restore
services and data. Safeguards include implementing disaster recovery plans, regularly testing backup and
recovery processes, and ensuring data redundancy.
In cloud computing provides many benefits, but it also presents several security challenges. Organizations
must understand these challenges and implement appropriate safeguards to protect their data and
resources. This includes implementing strong identity and access management controls, using encryption,
regularly monitoring third-party services, and having disaster recovery plans in place.
Social Network sites Security:
Social network sites (SNS) are online platforms that enable users to create personal profiles, connect with
others, and share information. SNS security is important because of the sensitive personal information
shared on these platforms. Here are some common SNS security threats and safeguards:
Privacy Settings: Social network sites should have privacy settings that allow users to control who can view
their personal information and posts. Users should review and adjust their privacy settings to ensure that
they are sharing only what they want with the right people.
Phishing Attacks: Phishing attacks are a common social engineering tactic where attackers trick users into
giving away their login credentials. Users should be cautious of suspicious links and emails that ask for
personal information and should never share their login credentials with anyone.
Malware: Social network sites can be used as a platform to spread malware, such as viruses and worms, to
other users. Users should be cautious of clicking on suspicious links or downloading files from untrusted
sources.
Cyberbullying: Cyberbullying is a form of harassment that occurs on social network sites. SNS should have
policies in place to address cyberbullying and users should report any instances of bullying to the platform's
administrators.
Impersonation: Impersonation is a common tactic used by attackers to gain access to personal information.
Users should be cautious of accepting friend requests from strangers and should verify the identity of the
person they are connecting with.
Third-Party Apps: Third-party apps can access personal information on social network sites. Users should
be cautious of which apps they grant access to their personal information and should regularly review and
revoke access to apps that they no longer use or trust.
Two-Factor Authentication: Social network sites should offer two-factor authentication as an extra layer of
security. Two-factor authentication requires users to provide a second form of authentication, such as a
verification code sent to their phone, in addition to their password.
In social network sites can be a security risk due to the sensitive personal information shared on these
platforms. To protect against these threats, users should be cautious of suspicious links and emails, review
and adjust their privacy settings, and regularly review and revoke access to third-party apps.
Social network sites should also have policies in place to address cyberbullying and should offer two- factor
authentication as an extra layer of security.
Cyber Security Vulnerabilities-Overview:
Cybersecurity vulnerabilities are weaknesses in a system, device, or software that can be exploited by an
attacker to compromise the confidentiality, integrity, or availability of the system. There are many types of
cybersecurity vulnerabilities, and they can vary in severity and impact. Here are some common types of
cybersecurity vulnerabilities:
Software Vulnerabilities: Software vulnerabilities are errors or weaknesses in code that can be exploited by
attackers to gain unauthorized access to a system. These vulnerabilities can be introduced during the
development process or discovered after the software has been released.
Network Vulnerabilities: Network vulnerabilities are weaknesses in a network that can be exploited by
attackers to gain access to sensitive information or launch attacks against other systems on the network.
These vulnerabilities can include unsecured ports, outdated protocols, or weak authentication mechanisms.
Social Engineering: Social engineering is the use of psychological manipulation to trick people into revealing
sensitive information or performing actions that could compromise security. Examples of social engineering
attacks include phishing, pretexting, and baiting.
Insider Threats: Insider threats are threats to an organization's security that come from within. This can
include employees, contractors, or partners who have access to sensitive information or systems and use
that access for malicious purposes.
Physical Vulnerabilities: Physical vulnerabilities refer to weaknesses in the physical security of a system or
device that can be exploited by attackers. Examples of physical vulnerabilities include unsecured doors,
unprotected server rooms, and unsecured laptops or mobile devices.
IoT Vulnerabilities: IoT vulnerabilities are weaknesses in internet-connected devices that can be exploited
by attackers to gain access to sensitive information or control of the device. These vulnerabilities can include
weak passwords, unsecured firmware, and unpatched software.
In cybersecurity vulnerabilities can take many forms and can vary in severity and impact. Software
vulnerabilities, network vulnerabilities, social engineering, insider threats, physical vulnerabilities, and IoT
vulnerabilities are all examples of cybersecurity vulnerabilities that organizations need to be aware of and
take steps to mitigate.
Vulnerabilities in software-
Software vulnerabilities are errors or weaknesses in code that can be exploited by attackers to gain
unauthorized access to a system or sensitive information. There are many types of software vulnerabilities,
and they can vary in severity and impact. Here are some common types of software vulnerabilities:
Buffer Overflow: Buffer overflow occurs when a program tries to store more data in a buffer (a temporary
storage area in memory) than it was designed to hold. Attackers can exploit buffer overflow vulnerabilities
to execute arbitrary code or crash the program.
SQL Injection: SQL injection occurs when an attacker injects malicious SQL code into a web application's
input fields. This can allow the attacker to access or modify sensitive data in the application's database.
Cross-Site Scripting (XSS): Cross-site scripting occurs when an attacker injects malicious code into a web
page viewed by other users. This can allow the attacker to steal sensitive information or perform actions on
behalf of the user.
Cross-Site Request Forgery (CSRF): Cross-site request forgery occurs when an attacker tricks a user into
unknowingly executing an action on a web application. This can allow the attacker to perform unauthorized
actions on the user's behalf.
Path Traversal: Path traversal occurs when an attacker exploits a vulnerability in a web application's input
validation to access files outside of the application's intended directory. This can allow the attacker to access
sensitive system files or execute arbitrary code.
Authentication Bypass: Authentication bypass occurs when an attacker exploits a vulnerability in an
application's authentication mechanism to gain access to a system or application without valid credentials.
Software vulnerabilities can take many forms and can vary in severity and impact. Buffer overflow, SQL
injection, cross-site scripting, cross-site request forgery, path traversal, and authentication bypass are all
examples of software vulnerabilities that organizations need to be aware of and take steps to mitigate.
Regular software updates, code review, and input validation are some of the ways to address software
vulnerabilities.
System Administration-
System administration refers to the management and maintenance of computer systems and networks.
System administrators are responsible for ensuring that the systems and networks are running smoothly
and securely, and for addressing any issues that arise.
Some of the key tasks involved in system administration include:
Installing and configuring hardware and software: System administrators are responsible for installing and
configuring hardware and software components, including servers, networking equipment, and operating
systems.
Maintaining system security: System administrators are responsible for maintaining system security by
implementing and managing firewalls, intrusion detection and prevention systems, and other security
measures.
Performing backups and disaster recovery: System administrators are responsible for performing regular
backups of data and for ensuring that disaster recovery plans are in place in case of a system failure or other
disaster.
Monitoring system performance: System administrators monitor system performance and resource
utilization, and make adjustments as needed to ensure optimal system performance.
Troubleshooting and problem resolution: System administrators are responsible for troubleshooting and
resolving any issues that arise, including hardware failures, software glitches, and network connectivity
problems.
Managing user accounts and permissions: System administrators manage user accounts and permissions,
including creating new accounts, managing access to resources, and revoking access when necessary.
System administration is a critical function in ensuring the smooth operation and security of computer
systems and networks. It requires a strong technical background, attention to detail, and the ability to
troubleshoot and resolve issues quickly and efficiently.
Complex Network Architectures-
Complex network architectures refer to network designs that are composed of multiple interconnected
components, often spanning across different physical locations, that work together to provide various
network services and applications. These architectures typically involve a combination of hardware and
software components, protocols, and security mechanisms.
Some examples of complex network architectures include:
Campus Networks: These are large-scale networks that cover multiple buildings within a campus or
enterprise environment. They often require advanced routing and switching technologies, as well as high-
speed connectivity to support data-intensive applications.
Wide Area Networks (WANs): These are networks that span across multiple geographic locations, often
connecting remote offices, data centers, and cloud services. WANs typically require advanced routing and
security technologies to ensure reliable connectivity and protect against cyber threats.
Cloud Networks: These are networks that are designed to support cloud-based services and applications,
often leveraging virtualization technologies and software-defined networking (SDN) principles. Cloud
networks require advanced security measures to protect against unauthorized access and data breaches.
Industrial Networks: These are networks that are designed to support industrial applications, such as
manufacturing, energy, and transportation. They often require specialized hardware and software
components, as well as advanced security mechanisms to protect against cyber-attacks.
Internet of Things (IoT) Networks: These are networks that are designed to support connected devices,
sensors, and other IoT endpoints. IoT networks require advanced security measures to protect against
cyber-attacks and data breaches.
Complex network architectures require careful planning, design, and implementation to ensure reliable
connectivity, performance, and security. Network administrators and engineers must have a deep
understanding of the various technologies and protocols involved, as well as the ability to troubleshoot and
resolve issues quickly and efficiently.
Open access to Organizational Data
Open access to organizational data refers to the practice of making company data available to anyone within
the organization, without requiring special permissions or access controls. This can include data such as
financial reports, sales figures, customer data, and other information that is critical to the operation of the
business.
The benefits of open access to organizational data include:
Improved collaboration and communication: When employees have access to the same data, it can
facilitate better communication and collaboration between teams, as everyone is working from the same
information.
Increased transparency: Open access to organizational data can increase transparency within the
organization, as employees have visibility into the company's performance, goals, and challenges.
Faster decision-making: When data is easily accessible, employees can make decisions more quickly and
confidently, as they have access to the most up-to-date information.
Empowerment of employees: Open access to data can empower employees to take ownership of their
work and make data-driven decisions, rather than relying on managers or higher-ups to provide them with
information.
However, there are also some potential risks associated with open access to organizational data. These
include:
Data breaches: Without proper security measures in place, open access to data can make the organization
more vulnerable to data breaches and cyber-attacks.
Misuse of data: Employees may misuse data for personal gain or other unauthorized purposes, such as
accessing confidential customer information.
Loss of control: Open access to data can lead to a loss of control over who has access to sensitive
information, which can be particularly problematic in industries with strict regulatory requirements.
To mitigate these risks, organizations should implement robust security measures, such as access controls
and data encryption, and establish clear policies and guidelines around data access and use.
Additionally, regular training and education for employees can help to ensure that everyone understands
the importance of data security and how to protect sensitive information.
Weak Authentication-
Weak authentication refers to any authentication mechanism that can be easily bypassed, compromised, or
otherwise defeated, allowing unauthorized access to an application, system, or network. Common examples
of weak authentication include:
Password-based authentication: Passwords are often weak because users choose easily guessable
passwords, use the same password for multiple accounts, or fail to change their password regularly.
Single-factor authentication: Authentication that relies on a single factor, such as a password or a biometric,
is vulnerable to attacks like phishing or social engineering.
Default or weak credentials: Many devices and systems come with default or weak credentials that are
easily guessable or easily found online.
Lack of two-factor authentication: Two-factor authentication, which requires a second factor in addition to
a password, is an effective way to strengthen authentication and reduce the risk of account compromise.
The risks of weak authentication are significant and can include unauthorized access to sensitive data, theft
of credentials, and system or network compromise. To mitigate the risks of weak authentication,
organizations should implement stronger authentication mechanisms, such as two-factor authentication,
and ensure that passwords are complex, unique, and changed regularly. Additionally, organizations should
regularly test their authentication mechanisms for vulnerabilities and educate users on best practices for
protecting their credentials.
Authorization-
Authorization is the process of determining whether a user or application has the necessary permissions
and privileges to access a particular resource or perform a particular action within a system or network.
Authorization typically involves the use of access control mechanisms, such as permissions, roles, and
policies, to ensure that only authorized users are able to access sensitive data and perform critical functions.
Authorization is a critical component of any security framework, as it helps to prevent unauthorized access
to sensitive data and systems, and ensures that users are only able to perform actions that are within the
scope of their role or responsibility. Without proper authorization controls, an attacker could potentially
gain unauthorized access to a system, steal sensitive data, or carry out other malicious activities.
Common authorization mechanisms include:
Role-based access control (RBAC): RBAC is a widely used access control model that grants permissions to
users based on their roles within an organization.
Attribute-based access control (ABAC): ABAC is a more granular access control model that uses attributes,
such as user location or device type, to determine access permissions.
Rule-based access control (RBAC): RBAC is an access control model that grants permissions based on a set
of predefined rules.
Mandatory access control (MAC): MAC is an access control model that uses labels or tags to restrict access
to data or systems based on a predefined security policy.
To implement effective authorization controls, organizations should perform a thorough analysis of their
system and data access requirements, and develop a comprehensive access control policy that outlines the
permissions and privileges that users and applications should have. This policy should be regularly reviewed
and updated to ensure that it remains effective in the face of evolving threats and changing business
requirements. Additionally, organizations should implement strong authentication mechanisms to ensure
that only authorized users are able to access sensitive data and systems.
Unprotected Broadband-
Unprotected broadband to broadband connections that are not secured or protected by appropriate
security measures. This can leave the network vulnerable to a range of attacks, including malware infections,
phishing attacks, and unauthorized access.
Common examples of unprotected broadband include:
Default or weak passwords: Many broadband devices come with default or weak passwords that are easily
guessable or found online. This makes it easy for attackers to gain access to the network.
Unsecured Wi-Fi: Wi-Fi networks that are not secured with appropriate encryption, such as WPA2, can be
easily compromised by attackers who are within range of the network.
Lack of security updates: Failure to install security updates and patches can leave devices and systems
vulnerable to known security vulnerabilities.
Lack of firewalls: Firewalls are an important component of network security, as they help to prevent
unauthorized access to the network and block malicious traffic.
The risks of unprotected broadband are significant, and can include theft of sensitive data, system
compromise, and identity theft. To protect against these risks, organizations should take steps to secure
their broadband connections, including:
Changing default passwords: Users should always change default passwords on broadband devices and
ensure that they use strong, complex passwords.
Using appropriate encryption: Wi-Fi networks should be secured with WPA2 encryption or higher to
prevent unauthorized access.
Installing security updates: Organizations should ensure that all devices and systems on the network are
kept up to date with the latest security updates and patches.
Implementing firewalls: Firewalls should be used to restrict access to the network and prevent
unauthorized traffic from entering the network.
By implementing these security measures, organizations can help to mitigate the risks of unprotected
broadband and protect their sensitive data and systems from attack.
Communications Security-
Communications security, also known as COMSEC, refers to the measures taken to protect the
confidentiality, integrity, and availability of communications systems and networks. It encompasses a range
of technologies and practices designed to prevent unauthorized access to communications, ensure the
privacy of communications, and prevent the interception or tampering of communications.
Common examples of communications security measures include:
Encryption: Encryption is the process of encoding messages or data to prevent unauthorized access.
Communications can be encrypted using a range of algorithms and technologies, such as Advanced
Encryption Standard (AES) and Transport Layer Security (TLS).
Access controls: Access controls are used to restrict access to communications systems and networks to
authorized users only. This can include the use of passwords, two-factor authentication, and other identity
verification mechanisms.
Firewalls: Firewalls are used to filter network traffic and prevent unauthorized access to communications
systems and networks.
Intrusion detection and prevention: Intrusion detection and prevention systems are used to detect and
block unauthorized access to communications systems and networks.
Physical security: Physical security measures, such as locked server rooms and secure storage for devices
and equipment, are also important for protecting communications systems and networks.
Communications security is important for a range of organizations and industries, including military and
government agencies, financial institutions, and healthcare providers. It helps to protect sensitive
information, prevent data breaches, and ensure the integrity and availability of critical communications
systems and networks
Poor Cyber Security Awareness-
Poor cybersecurity awareness refers to a lack of knowledge, understanding, and best practices when it
comes to protecting digital assets, devices, and online activities from cyber threats. It can lead to individuals
and organizations being more vulnerable to cyber-attacks, data breaches, and other types of cybercrime.
Some common examples of poor cybersecurity awareness include:
Weak passwords: Many people still use weak passwords or reuse the same password across multiple
accounts, making it easy for cybercriminals to gain access to sensitive information.
Lack of software updates: Failure to update software and security patches can leave devices and systems
vulnerable to known security vulnerabilities.
Phishing attacks: Phishing is a common tactic used by cybercriminals to trick people into divulging sensitive
information or clicking on malicious links. A lack of awareness of what to look for in phishing emails can
make individuals more susceptible to these attacks.
Public Wi-Fi: Using public Wi-Fi networks without proper precautions, such as a virtual private network
(VPN), can make devices vulnerable to hacking and cyber-attacks.
Social engineering: Cybercriminals can use social engineering tactics to manipulate people into divulging
sensitive information or performing actions that can compromise security. A lack of awareness of these
tactics can make individuals more susceptible to these attacks.
Cybersecurity awareness involves educating individuals and organizations about best practices for
protecting digital assets, identifying potential cyber threats, and responding to cyber incidents. This can
involve training sessions, workshops, and ongoing communication about cybersecurity issues and best
practices. It is essential to make cybersecurity awareness a priority to protect against cyber threats and
minimize the risk of cyber-attacks and data breaches.
Cyber Security Safeguards-Overview-
Cybersecurity safeguards are measures that organizations and individuals can take to protect their digital
assets, devices, and online activities from cyber threats. These safeguards are designed to reduce the risk
of cyber-attacks, data breaches, and other types of cybercrime.
Some common cybersecurity safeguards include:
Strong passwords: Using strong, unique passwords for each account and changing them regularly can help
prevent unauthorized access.
Multi-factor authentication (MFA): MFA adds an extra layer of security by requiring users to provide two
or more forms of identification, such as a password and a fingerprint or facial recognition.
Encryption: Encryption can help protect sensitive data by converting it into a code that can only be
deciphered by someone with the proper key.
Regular software updates: Keeping software and security patches up to date can help prevent known
vulnerabilities from being exploited.
Virtual private networks (VPNs): VPNs can help protect online activities and communications by encrypting
internet traffic and masking the user's IP address.
Employee training: Educating employees about cybersecurity risks and best practices can help prevent
human error and increase overall cybersecurity awareness.
Incident response plan: Having an incident response plan in place can help organizations respond quickly
and effectively to a cyber-attack or data breach.
Implementing these safeguards can help protect against cyber threats and minimize the risk of cyber-
attacks and data breaches. It is essential to regularly review and update cybersecurity measures to keep up
with evolving threats and ensure the ongoing protection of digital assets and online activities.
Access control-
Access control is a fundamental aspect of cybersecurity that involves managing who has access to what
digital assets within an organization. It is the process of granting or denying users access to specific resources
based on their identity, role, and level of authorization.
There are several access control mechanisms, including:
Role-based access control (RBAC): RBAC is a widely used access control model that grants access based on
a user's role within an organization. Access is defined by a set of permissions or privileges that are associated
with the user's role.
Attribute-based access control (ABAC): ABAC is a more flexible access control model that grants access
based on a user's attributes, such as their job function, location, or security clearance level.
Mandatory access control (MAC): MAC is a strict access control model that assigns security labels to
resources and users. Access is granted or denied based on these security labels, which are determined by a
security policy.
Discretionary access control (DAC): DAC is a more flexible access control model that allows users to control
access to their resources. Users can grant or deny access to their resources to other users or groups.
Access control is an essential component of cybersecurity because it helps prevent unauthorized access to
digital assets, thereby reducing the risk of cyber-attacks, data breaches, and other security incidents.
Organizations should implement access control mechanisms that are appropriate for their needs and
regularly review and update their access control policies to ensure ongoing protection against evolving
cybersecurity threats.
IT Audit-
IT audit is the process of evaluating an organization's information technology infrastructure, policies, and
procedures to ensure they are secure, efficient, and effective. The purpose of IT audits is to identify potential
security risks and weaknesses in an organization's IT systems and provide recommendations for
improvement.
The main objectives of IT audits include:
Assessing the effectiveness of an organization's IT controls and processes. Evaluating the security and
reliability of an organization's IT systems.
Ensuring compliance with relevant laws, regulations, and industry standards. Identifying areas of
improvement and making recommendations for enhancements.
IT audits can be conducted internally by an organization's own IT staff or externally by a third-party auditor.
IT audit procedures typically involve reviewing documentation, interviewing personnel, and conducting
tests of IT systems and controls.
The types of IT audits can include:
Compliance audits: Ensure that an organization is complying with relevant laws, regulations, and industry
standards.
Security audits: Assess the security of an organization's IT infrastructure and systems.
Performance audits: Evaluate the efficiency and effectiveness of an organization's IT systems and processes.
Risk assessment audits: Identify potential risks and vulnerabilities in an organization's IT systems and
provide recommendations for mitigation.
IT audits are essential for ensuring that an organization's IT systems and infrastructure are secure, efficient,
and effective. By identifying potential risks and weaknesses, IT audits can help organizations improve their
IT controls and processes, reduce the risk of cyber-attacks, and protect their sensitive data.
Authentication:
Authentication is the process of verifying the identity of a user or entity accessing a system or application.
In other words, it ensures that the user or entity is who they claim to be. Authentication is typically the first
line of defense in protecting systems and data from unauthorized access and cyber- attacks.
There are several methods of authentication, including:
Password-based authentication: The most common form of authentication, where a user enters a
username and password to access a system or application.
Multi-factor authentication (MFA): Requires users to provide multiple forms of authentication, such as a
password and a one-time code sent to their mobile device, to access a system or application.
Biometric authentication: Uses unique biological characteristics, such as fingerprints, facial recognition, or
iris scans, to authenticate a user.
Smart card authentication: Uses a physical card with an embedded microchip that contains the user's
authentication credentials.
Certificate-based authentication: Uses digital certificates to verify the identity of a user or entity.
Effective authentication is critical for ensuring the security of systems and data. By using strong
authentication methods, organizations can reduce the risk of unauthorized access and cyber-attacks. It is
important for organizations to choose authentication methods that are appropriate for their specific needs
and requirements.
Open Web Application Security Project (OWASP):
The Open Web Application Security Project (OWASP) is a nonprofit organization focused on improving the
security of software and web applications. The organization provides information, tools, and resources to
help developers and organizations build more secure applications.
OWASP is best known for its "Top Ten" list of web application security risks, which is updated every few
years to reflect the changing threat landscape. The current OWASP Top Ten list includes:
Injection flaws
Broken authentication and session management Cross-site scripting (XSS)
Broken access controls Security misconfigurations Insecure cryptographic storage Insufficient input
validation
Improperly configured security controls Insecure communication between components
Poorly designed or implemented security controls
OWASP also provides a range of resources and tools to help developers and organizations improve the
security of their applications. These resources include:
OWASP Top Ten project OWASP Cheat Sheet Series OWASP Zed Attack Proxy (ZAP)
OWASP Application Security Verification Standard (ASVS) OWASP Mobile Security Project
OWASP Internet of Things (IoT) Project
Web site Audit and Vulnerabilities assessment-
Web site audit and vulnerability assessment are important steps in ensuring the security of a website. A
website audit involves reviewing the website's design, functionality, and performance to identify any
potential security risks. Vulnerability assessment involves analyzing the website's code and system
configuration to identify potential vulnerabilities that could be exploited by attackers.
Here are some steps to conduct a website audit and vulnerability assessment:
Identify the scope: Determine the areas of the website that will be audited and assessed.
Gather information: Collect information about the website, including its purpose, design, functionality, and
technology stack.
Identify potential security risks: Look for potential security risks such as insecure authentication,
authorization, and data validation, lack of encryption, and outdated software.
Conduct vulnerability scanning: Use automated tools to scan the website for known vulnerabilities and
security weaknesses.
Manual testing: Conduct manual testing to identify any potential vulnerabilities that may have been missed
by automated tools.
Review server and network configurations: Review the website's server and network configurations to
identify any misconfigurations that could lead to security risks.
Analyze the results: Analyze the results of the audit and vulnerability assessment to identify areas of
improvement.
Provide recommendations: Provide recommendations on how to address the identified vulnerabilities and
improve the website's overall security posture.
Implement fixes: Implement the recommended fixes and retest to ensure that the identified vulnerabilities
have been addressed.
By conducting regular website audits and vulnerability assessments, website owners and developers can
better protect their website and the data it contains from cyber-attacks and security breaches.
Open Source/Free/Trial Tools:
Win Audit:
WinAudit is a free, open-source software tool that can be used to audit and assess the configuration of a
Windows-based computer. The software is designed to collect information about the computer's hardware
and software components, including details about the operating system, installed applications, and system
settings.
WinAudit can be used to generate reports on a wide range of system information, including:
System information: This includes details about the computer's BIOS, motherboard, processor, memory,
and other hardware components.
Operating system information: This includes details about the operating system version, patches, and
installed software.
Application information: This includes details about the software applications installed on the computer,
including the version number and installation path.
Network information: This includes details about the computer's network configuration, including IP
address, subnet mask, and gateway settings.
User information: This includes details about the user accounts configured on the computer, including their
login names and access privileges.
Win Audit can be run from a command prompt or launched using a graphical user interface. The tool is
commonly used by IT professionals, system administrators, and security analysts to perform system
audits and vulnerability assessments, and to identify potential security risks that may be present on a
Windows-based computer.
Zap proxy (OWASP)-
ZAP (short for Zed Attack Proxy) is an open-source web application security testing tool developed by
OWASP (Open Web Application Security Project). It is designed to help software developers and security
professionals identify and prevent security vulnerabilities in web applications.
ZAP is a proxy server that sits between a web browser and a web application. It intercepts and analyzes all
traffic between the browser and the application, allowing it to identify and report security vulnerabilities.
Some of the key features of ZAP include:
Active scanning: ZAP can actively scan web applications for vulnerabilities, including common vulnerabilities
such as SQL injection and cross-site scripting (XSS).
Passive scanning: ZAP can also passively scan web applications for vulnerabilities, identifying potential
vulnerabilities by analyzing requests and responses between the browser and application.
Spidering: ZAP includes a spidering feature that allows it to crawl a web application and identify all
accessible pages and resources.
Fuzzing: ZAP can be used to perform fuzz testing, which involves sending a large number of random inputs
to a web application to identify potential vulnerabilities.
Authentication and session management testing: ZAP can be used to test authentication and session
management mechanisms in web applications.
Reporting: ZAP can generate detailed reports of vulnerabilities identified during testing, including
recommendations for remediation.
ZAP is a powerful tool that can be used to identify a wide range of security vulnerabilities in web
applications. However, it should be used by experienced security professionals who understand web
application security testing methodologies and best practices.
Burp suite-
Burp Suite is a popular web application security testing tool developed by PortSwigger. It is widely used by
security professionals and penetration testers to identify and exploit security vulnerabilities in web
applications.
Burp Suite has a wide range of features, including:
Intercepting proxy: Burp Suite acts as an intercepting proxy between the user's browser and the target web
application. This allows users to inspect and modify HTTP requests and responses, and to test the
application's security mechanisms.
Scanner: Burp Suite includes an automated vulnerability scanner that can identify a wide range of security
vulnerabilities, including SQL injection, cross-site scripting (XSS), and file inclusion vulnerabilities.
Intruder: The Intruder feature allows users to perform brute-force attacks and fuzz testing on web
applications, to identify vulnerabilities such as weak authentication mechanisms.
Repeater: The Repeater feature allows users to repeat and modify individual HTTP requests, to test the
application's response to specific inputs.
Sequencer: The Sequencer feature analyzes the randomness of tokens and other inputs used by the
application, to identify weaknesses in cryptographic mechanisms.
Spider: The Spider feature allows users to crawl the target web application, identifying all accessible pages
and resources.
Reporting: Burp Suite can generate detailed reports of vulnerabilities identified during testing, including
recommendations for remediation.
Burp Suite is a powerful and versatile tool that can be used to identify a wide range of security vulnerabilities
in web applications. However, it should be used by experienced security professionals who understand web
application security testing methodologies and best practices.
DVWA kit-
DVWA (Damn Vulnerable Web Application) is a deliberately vulnerable web application that is designed to
be used for testing and educational purposes. It can be used to practice web application penetration testing
and to learn about common security vulnerabilities.
The DVWA kit contains a pre-configured virtual machine (VM) that can be used to run the application, along
with a set of exercises that are designed to highlight common web application vulnerabilities such as SQL
injection, cross-site scripting (XSS), and command injection.
The DVWA kit can be downloaded and installed on a local machine or can be run in a virtual environment
such as Virtual Box. Once installed, users can navigate to the DVWA web interface and begin testing the
application by attempting to exploit the vulnerabilities identified in the exercises.
The DVWA kit is a valuable tool for individuals looking to gain practical experience in web application
security testing, as it provides a safe and controlled environment in which to practice. However, it should
be used responsibly and ethically, and users should ensure that they have permission to test the application
before doing so.

More Related Content

Similar to Module 4.pdf

Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approachIdexcel Technologies
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfasiyahanif9977
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europeroxanaaleena
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfNikhil Khunteta
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfNeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
Presentation1 A.pptx
Presentation1 A.pptxPresentation1 A.pptx
Presentation1 A.pptxRabinBidari
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 

Similar to Module 4.pdf (20)

Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europe
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Presentation1 A.pptx
Presentation1 A.pptxPresentation1 A.pptx
Presentation1 A.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 

More from Sitamarhi Institute of Technology

More from Sitamarhi Institute of Technology (20)

Project Front_Page.pdf
Project Front_Page.pdfProject Front_Page.pdf
Project Front_Page.pdf
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 7.pdf
Module 7.pdfModule 7.pdf
Module 7.pdf
 
Module 2.pdf
Module 2.pdfModule 2.pdf
Module 2.pdf
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
short notes bio
short notes bioshort notes bio
short notes bio
 
Photosynthesis.pptx
Photosynthesis.pptxPhotosynthesis.pptx
Photosynthesis.pptx
 
Concept of Allele.pptx
Concept of Allele.pptxConcept of Allele.pptx
Concept of Allele.pptx
 
Genetics.pptx
Genetics.pptxGenetics.pptx
Genetics.pptx
 
8m Biology.pdf
8m Biology.pdf8m Biology.pdf
8m Biology.pdf
 
Module 5.pptx
Module 5.pptxModule 5.pptx
Module 5.pptx
 
Mendel’s experiment.pptx
Mendel’s experiment.pptxMendel’s experiment.pptx
Mendel’s experiment.pptx
 
microbiology.pptx
microbiology.pptxmicrobiology.pptx
microbiology.pptx
 
BIOLOGY 7sem.pdf
BIOLOGY 7sem.pdfBIOLOGY 7sem.pdf
BIOLOGY 7sem.pdf
 
Heirarchy of life forms and classification.pptx
Heirarchy of life forms and classification.pptxHeirarchy of life forms and classification.pptx
Heirarchy of life forms and classification.pptx
 
Amino acids and proteins.pptx
Amino acids and proteins.pptxAmino acids and proteins.pptx
Amino acids and proteins.pptx
 
BIO.docx
BIO.docxBIO.docx
BIO.docx
 
clasification based on celluarity.pptx
clasification based on celluarity.pptxclasification based on celluarity.pptx
clasification based on celluarity.pptx
 
Science vs engineering.pptx
Science vs engineering.pptxScience vs engineering.pptx
Science vs engineering.pptx
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

Module 4.pdf

  • 1. Cyber Security [105713] – Notes Module 4 Cyber Security Vulnerabilities& Safe Guards: Internet Security, Cloud Computing &Security, Social Network sites security, Cyber Security Vulnerabilities-Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open Access to Organizational Data, Weak Authentication, Authorization, Unprotected Broadband communications, Poor Cyber Security Awareness. Cyber Security Safeguards- Overview, Access control, IT Audit, Authentication. Open Web Application Security Project (OWASP), Web Site Audit and Vulnerabilities assessment. Open Source/ Free/ Trial Tools: WinAudit, Zap proxy (OWASP), burp suite, DVWA kit. Cyber Security Vulnerabilities & Safe Guards: Cybersecurity vulnerabilities are weaknesses in computer systems, networks, or software that can be exploited by attackers to gain unauthorized access, steal data, or cause damage. Some common vulnerabilities and safeguards to protect against them are: Weak Passwords: Weak passwords are a major vulnerability that can be exploited by attackers to gain unauthorized access. Safeguards include using strong passwords, implementing password policies, and enabling two-factor authentication. Outdated Software: Outdated software is another vulnerability that can be exploited by attackers. Safeguards include applying software updates and patches regularly and implementing a vulnerability management program. Phishing Attacks: Phishing attacks are social engineering attacks that trick users into disclosing sensitive information such as passwords or credit card numbers. Safeguards include training employees to recognize and report phishing attempts and implementing spam filters. Malware: Malware is malicious software that can damage systems, steal data, or cause other harm. Safeguards include using anti-virus and anti-malware software, implementing firewalls, and regularly scanning systems for malware. Insider Threats: Insider threats are attacks by employees or contractors who have authorized access to systems and data. Safeguards include implementing access controls and monitoring systems for suspicious activity. Data Breaches: Data breaches are incidents where sensitive information such as customer data or financial information is stolen. Safeguards include encrypting sensitive data, implementing data loss prevention controls, and regularly backing up data. IoT Security: IoT (Internet of Things) devices are a growing security concern due to their lack of security features. Safeguards include implementing device security controls such as strong passwords and encryption, and regularly updating firmware. Cybersecurity vulnerabilities can be mitigated through a combination of technical controls, employee training, and best practices such as regularly applying updates and patches, implementing access controls, and encrypting sensitive data. Internet Security: Internet security refers to the practice of protecting computer systems, networks, and user data from unauthorized access, theft, damage, or disruption. Some common Internet security threats and safeguards are:
  • 2. Malware: Malware is malicious software that can damage systems, steal data, or cause other harm. Safeguards include using anti-virus and anti-malware software, implementing firewalls, and regularly scanning systems for malware. Phishing Attacks: Phishing attacks are social engineering attacks that trick users into disclosing sensitive information such as passwords or credit card numbers. Safeguards include training employees to recognize and report phishing attempts and implementing spam filters. Password Attacks: Password attacks involve guessing or cracking passwords to gain unauthorized access to systems or data. Safeguards include using strong passwords, implementing password policies, and enabling two-factor authentication. Denial of Service (DoS) Attacks: DoS attacks involve overwhelming a system or network with traffic to cause it to crash or become unavailable. Safeguards include implementing firewalls and intrusion prevention systems, and regularly monitoring network traffic. Man-in-the-Middle (MitM) Attacks: MitM attacks involve intercepting and altering communications between two parties. Safeguards include using encryption, implementing secure protocols such as HTTPS, and verifying the identity of communication partners. Unpatched Software: Unpatched software is another vulnerability that can be exploited by attackers. Safeguards include applying software updates and patches regularly and implementing a vulnerability management program. IoT Security: IoT (Internet of Things) devices are a growing security concern due to their lack of security features. Safeguards include implementing device security controls such as strong passwords and encryption, and regularly updating firmware. Internet security threats are varied and constantly evolving. To protect against these threats, organizations and individuals should implement a range of technical and non-technical safeguards such as using strong passwords, implementing encryption, regularly updating software, and training employees to recognize and report potential threats. Cloud Computing & Security: Cloud computing is a model of delivering computing services over the internet, including storage, processing power, and applications. While cloud computing provides many benefits such as scalability and cost- efficiency, it also presents several security challenges. Some common security challenges and safeguards for cloud computing are: Data Security: Cloud computing involves storing data on remote servers, which increases the risk of data breaches. Safeguards include implementing access controls, using encryption to protect data in transit and at rest, and regularly backing up data. Identity and Access Management: Identity and access management (IAM) is important to ensure that only authorized users have access to cloud resources. Safeguards include implementing strong authentication and authorization mechanisms, enforcing password policies, and using multi-factor authentication. Compliance: Organizations must ensure that cloud providers comply with relevant regulations such as GDPR, HIPAA, or PCI DSS. Safeguards include conducting regular audits and assessments, and implementing strict data handling policies. Shared Responsibility: Cloud security is a shared responsibility between the cloud provider and the customer. Safeguards include understanding the shared responsibilities and implementing appropriate controls and processes.
  • 3. Third-Party Services: Cloud computing often involves the use of third-party services such as APIs, which can pose security risks. Safeguards include conducting risk assessments, implementing security controls such as encryption and access controls, and regularly monitoring third-party services. Malicious Insiders: Cloud providers may be vulnerable to attacks by malicious insiders, such as employees or contractors. Safeguards include implementing access controls and monitoring systems for suspicious activity. Disaster Recovery: In the event of a disaster or outage, cloud providers must have a plan in place to restore services and data. Safeguards include implementing disaster recovery plans, regularly testing backup and recovery processes, and ensuring data redundancy. In cloud computing provides many benefits, but it also presents several security challenges. Organizations must understand these challenges and implement appropriate safeguards to protect their data and resources. This includes implementing strong identity and access management controls, using encryption, regularly monitoring third-party services, and having disaster recovery plans in place. Social Network sites Security: Social network sites (SNS) are online platforms that enable users to create personal profiles, connect with others, and share information. SNS security is important because of the sensitive personal information shared on these platforms. Here are some common SNS security threats and safeguards: Privacy Settings: Social network sites should have privacy settings that allow users to control who can view their personal information and posts. Users should review and adjust their privacy settings to ensure that they are sharing only what they want with the right people. Phishing Attacks: Phishing attacks are a common social engineering tactic where attackers trick users into giving away their login credentials. Users should be cautious of suspicious links and emails that ask for personal information and should never share their login credentials with anyone. Malware: Social network sites can be used as a platform to spread malware, such as viruses and worms, to other users. Users should be cautious of clicking on suspicious links or downloading files from untrusted sources. Cyberbullying: Cyberbullying is a form of harassment that occurs on social network sites. SNS should have policies in place to address cyberbullying and users should report any instances of bullying to the platform's administrators. Impersonation: Impersonation is a common tactic used by attackers to gain access to personal information. Users should be cautious of accepting friend requests from strangers and should verify the identity of the person they are connecting with. Third-Party Apps: Third-party apps can access personal information on social network sites. Users should be cautious of which apps they grant access to their personal information and should regularly review and revoke access to apps that they no longer use or trust. Two-Factor Authentication: Social network sites should offer two-factor authentication as an extra layer of security. Two-factor authentication requires users to provide a second form of authentication, such as a verification code sent to their phone, in addition to their password. In social network sites can be a security risk due to the sensitive personal information shared on these platforms. To protect against these threats, users should be cautious of suspicious links and emails, review and adjust their privacy settings, and regularly review and revoke access to third-party apps. Social network sites should also have policies in place to address cyberbullying and should offer two- factor authentication as an extra layer of security. Cyber Security Vulnerabilities-Overview:
  • 4. Cybersecurity vulnerabilities are weaknesses in a system, device, or software that can be exploited by an attacker to compromise the confidentiality, integrity, or availability of the system. There are many types of cybersecurity vulnerabilities, and they can vary in severity and impact. Here are some common types of cybersecurity vulnerabilities: Software Vulnerabilities: Software vulnerabilities are errors or weaknesses in code that can be exploited by attackers to gain unauthorized access to a system. These vulnerabilities can be introduced during the development process or discovered after the software has been released. Network Vulnerabilities: Network vulnerabilities are weaknesses in a network that can be exploited by attackers to gain access to sensitive information or launch attacks against other systems on the network. These vulnerabilities can include unsecured ports, outdated protocols, or weak authentication mechanisms. Social Engineering: Social engineering is the use of psychological manipulation to trick people into revealing sensitive information or performing actions that could compromise security. Examples of social engineering attacks include phishing, pretexting, and baiting. Insider Threats: Insider threats are threats to an organization's security that come from within. This can include employees, contractors, or partners who have access to sensitive information or systems and use that access for malicious purposes. Physical Vulnerabilities: Physical vulnerabilities refer to weaknesses in the physical security of a system or device that can be exploited by attackers. Examples of physical vulnerabilities include unsecured doors, unprotected server rooms, and unsecured laptops or mobile devices. IoT Vulnerabilities: IoT vulnerabilities are weaknesses in internet-connected devices that can be exploited by attackers to gain access to sensitive information or control of the device. These vulnerabilities can include weak passwords, unsecured firmware, and unpatched software. In cybersecurity vulnerabilities can take many forms and can vary in severity and impact. Software vulnerabilities, network vulnerabilities, social engineering, insider threats, physical vulnerabilities, and IoT vulnerabilities are all examples of cybersecurity vulnerabilities that organizations need to be aware of and take steps to mitigate. Vulnerabilities in software- Software vulnerabilities are errors or weaknesses in code that can be exploited by attackers to gain unauthorized access to a system or sensitive information. There are many types of software vulnerabilities, and they can vary in severity and impact. Here are some common types of software vulnerabilities: Buffer Overflow: Buffer overflow occurs when a program tries to store more data in a buffer (a temporary storage area in memory) than it was designed to hold. Attackers can exploit buffer overflow vulnerabilities to execute arbitrary code or crash the program. SQL Injection: SQL injection occurs when an attacker injects malicious SQL code into a web application's input fields. This can allow the attacker to access or modify sensitive data in the application's database. Cross-Site Scripting (XSS): Cross-site scripting occurs when an attacker injects malicious code into a web page viewed by other users. This can allow the attacker to steal sensitive information or perform actions on behalf of the user. Cross-Site Request Forgery (CSRF): Cross-site request forgery occurs when an attacker tricks a user into unknowingly executing an action on a web application. This can allow the attacker to perform unauthorized actions on the user's behalf. Path Traversal: Path traversal occurs when an attacker exploits a vulnerability in a web application's input validation to access files outside of the application's intended directory. This can allow the attacker to access sensitive system files or execute arbitrary code. Authentication Bypass: Authentication bypass occurs when an attacker exploits a vulnerability in an application's authentication mechanism to gain access to a system or application without valid credentials.
  • 5. Software vulnerabilities can take many forms and can vary in severity and impact. Buffer overflow, SQL injection, cross-site scripting, cross-site request forgery, path traversal, and authentication bypass are all examples of software vulnerabilities that organizations need to be aware of and take steps to mitigate. Regular software updates, code review, and input validation are some of the ways to address software vulnerabilities. System Administration- System administration refers to the management and maintenance of computer systems and networks. System administrators are responsible for ensuring that the systems and networks are running smoothly and securely, and for addressing any issues that arise. Some of the key tasks involved in system administration include: Installing and configuring hardware and software: System administrators are responsible for installing and configuring hardware and software components, including servers, networking equipment, and operating systems. Maintaining system security: System administrators are responsible for maintaining system security by implementing and managing firewalls, intrusion detection and prevention systems, and other security measures. Performing backups and disaster recovery: System administrators are responsible for performing regular backups of data and for ensuring that disaster recovery plans are in place in case of a system failure or other disaster. Monitoring system performance: System administrators monitor system performance and resource utilization, and make adjustments as needed to ensure optimal system performance. Troubleshooting and problem resolution: System administrators are responsible for troubleshooting and resolving any issues that arise, including hardware failures, software glitches, and network connectivity problems. Managing user accounts and permissions: System administrators manage user accounts and permissions, including creating new accounts, managing access to resources, and revoking access when necessary. System administration is a critical function in ensuring the smooth operation and security of computer systems and networks. It requires a strong technical background, attention to detail, and the ability to troubleshoot and resolve issues quickly and efficiently. Complex Network Architectures- Complex network architectures refer to network designs that are composed of multiple interconnected components, often spanning across different physical locations, that work together to provide various network services and applications. These architectures typically involve a combination of hardware and software components, protocols, and security mechanisms. Some examples of complex network architectures include: Campus Networks: These are large-scale networks that cover multiple buildings within a campus or enterprise environment. They often require advanced routing and switching technologies, as well as high- speed connectivity to support data-intensive applications. Wide Area Networks (WANs): These are networks that span across multiple geographic locations, often connecting remote offices, data centers, and cloud services. WANs typically require advanced routing and security technologies to ensure reliable connectivity and protect against cyber threats.
  • 6. Cloud Networks: These are networks that are designed to support cloud-based services and applications, often leveraging virtualization technologies and software-defined networking (SDN) principles. Cloud networks require advanced security measures to protect against unauthorized access and data breaches. Industrial Networks: These are networks that are designed to support industrial applications, such as manufacturing, energy, and transportation. They often require specialized hardware and software components, as well as advanced security mechanisms to protect against cyber-attacks. Internet of Things (IoT) Networks: These are networks that are designed to support connected devices, sensors, and other IoT endpoints. IoT networks require advanced security measures to protect against cyber-attacks and data breaches. Complex network architectures require careful planning, design, and implementation to ensure reliable connectivity, performance, and security. Network administrators and engineers must have a deep understanding of the various technologies and protocols involved, as well as the ability to troubleshoot and resolve issues quickly and efficiently. Open access to Organizational Data Open access to organizational data refers to the practice of making company data available to anyone within the organization, without requiring special permissions or access controls. This can include data such as financial reports, sales figures, customer data, and other information that is critical to the operation of the business. The benefits of open access to organizational data include: Improved collaboration and communication: When employees have access to the same data, it can facilitate better communication and collaboration between teams, as everyone is working from the same information. Increased transparency: Open access to organizational data can increase transparency within the organization, as employees have visibility into the company's performance, goals, and challenges. Faster decision-making: When data is easily accessible, employees can make decisions more quickly and confidently, as they have access to the most up-to-date information. Empowerment of employees: Open access to data can empower employees to take ownership of their work and make data-driven decisions, rather than relying on managers or higher-ups to provide them with information. However, there are also some potential risks associated with open access to organizational data. These include: Data breaches: Without proper security measures in place, open access to data can make the organization more vulnerable to data breaches and cyber-attacks. Misuse of data: Employees may misuse data for personal gain or other unauthorized purposes, such as accessing confidential customer information. Loss of control: Open access to data can lead to a loss of control over who has access to sensitive information, which can be particularly problematic in industries with strict regulatory requirements. To mitigate these risks, organizations should implement robust security measures, such as access controls and data encryption, and establish clear policies and guidelines around data access and use. Additionally, regular training and education for employees can help to ensure that everyone understands the importance of data security and how to protect sensitive information. Weak Authentication-
  • 7. Weak authentication refers to any authentication mechanism that can be easily bypassed, compromised, or otherwise defeated, allowing unauthorized access to an application, system, or network. Common examples of weak authentication include: Password-based authentication: Passwords are often weak because users choose easily guessable passwords, use the same password for multiple accounts, or fail to change their password regularly. Single-factor authentication: Authentication that relies on a single factor, such as a password or a biometric, is vulnerable to attacks like phishing or social engineering. Default or weak credentials: Many devices and systems come with default or weak credentials that are easily guessable or easily found online. Lack of two-factor authentication: Two-factor authentication, which requires a second factor in addition to a password, is an effective way to strengthen authentication and reduce the risk of account compromise. The risks of weak authentication are significant and can include unauthorized access to sensitive data, theft of credentials, and system or network compromise. To mitigate the risks of weak authentication, organizations should implement stronger authentication mechanisms, such as two-factor authentication, and ensure that passwords are complex, unique, and changed regularly. Additionally, organizations should regularly test their authentication mechanisms for vulnerabilities and educate users on best practices for protecting their credentials. Authorization- Authorization is the process of determining whether a user or application has the necessary permissions and privileges to access a particular resource or perform a particular action within a system or network. Authorization typically involves the use of access control mechanisms, such as permissions, roles, and policies, to ensure that only authorized users are able to access sensitive data and perform critical functions. Authorization is a critical component of any security framework, as it helps to prevent unauthorized access to sensitive data and systems, and ensures that users are only able to perform actions that are within the scope of their role or responsibility. Without proper authorization controls, an attacker could potentially gain unauthorized access to a system, steal sensitive data, or carry out other malicious activities. Common authorization mechanisms include: Role-based access control (RBAC): RBAC is a widely used access control model that grants permissions to users based on their roles within an organization. Attribute-based access control (ABAC): ABAC is a more granular access control model that uses attributes, such as user location or device type, to determine access permissions. Rule-based access control (RBAC): RBAC is an access control model that grants permissions based on a set of predefined rules. Mandatory access control (MAC): MAC is an access control model that uses labels or tags to restrict access to data or systems based on a predefined security policy. To implement effective authorization controls, organizations should perform a thorough analysis of their system and data access requirements, and develop a comprehensive access control policy that outlines the permissions and privileges that users and applications should have. This policy should be regularly reviewed and updated to ensure that it remains effective in the face of evolving threats and changing business requirements. Additionally, organizations should implement strong authentication mechanisms to ensure that only authorized users are able to access sensitive data and systems.
  • 8. Unprotected Broadband- Unprotected broadband to broadband connections that are not secured or protected by appropriate security measures. This can leave the network vulnerable to a range of attacks, including malware infections, phishing attacks, and unauthorized access. Common examples of unprotected broadband include: Default or weak passwords: Many broadband devices come with default or weak passwords that are easily guessable or found online. This makes it easy for attackers to gain access to the network. Unsecured Wi-Fi: Wi-Fi networks that are not secured with appropriate encryption, such as WPA2, can be easily compromised by attackers who are within range of the network. Lack of security updates: Failure to install security updates and patches can leave devices and systems vulnerable to known security vulnerabilities. Lack of firewalls: Firewalls are an important component of network security, as they help to prevent unauthorized access to the network and block malicious traffic. The risks of unprotected broadband are significant, and can include theft of sensitive data, system compromise, and identity theft. To protect against these risks, organizations should take steps to secure their broadband connections, including: Changing default passwords: Users should always change default passwords on broadband devices and ensure that they use strong, complex passwords. Using appropriate encryption: Wi-Fi networks should be secured with WPA2 encryption or higher to prevent unauthorized access. Installing security updates: Organizations should ensure that all devices and systems on the network are kept up to date with the latest security updates and patches. Implementing firewalls: Firewalls should be used to restrict access to the network and prevent unauthorized traffic from entering the network. By implementing these security measures, organizations can help to mitigate the risks of unprotected broadband and protect their sensitive data and systems from attack. Communications Security- Communications security, also known as COMSEC, refers to the measures taken to protect the confidentiality, integrity, and availability of communications systems and networks. It encompasses a range of technologies and practices designed to prevent unauthorized access to communications, ensure the privacy of communications, and prevent the interception or tampering of communications. Common examples of communications security measures include: Encryption: Encryption is the process of encoding messages or data to prevent unauthorized access. Communications can be encrypted using a range of algorithms and technologies, such as Advanced Encryption Standard (AES) and Transport Layer Security (TLS). Access controls: Access controls are used to restrict access to communications systems and networks to authorized users only. This can include the use of passwords, two-factor authentication, and other identity verification mechanisms. Firewalls: Firewalls are used to filter network traffic and prevent unauthorized access to communications systems and networks.
  • 9. Intrusion detection and prevention: Intrusion detection and prevention systems are used to detect and block unauthorized access to communications systems and networks. Physical security: Physical security measures, such as locked server rooms and secure storage for devices and equipment, are also important for protecting communications systems and networks. Communications security is important for a range of organizations and industries, including military and government agencies, financial institutions, and healthcare providers. It helps to protect sensitive information, prevent data breaches, and ensure the integrity and availability of critical communications systems and networks Poor Cyber Security Awareness- Poor cybersecurity awareness refers to a lack of knowledge, understanding, and best practices when it comes to protecting digital assets, devices, and online activities from cyber threats. It can lead to individuals and organizations being more vulnerable to cyber-attacks, data breaches, and other types of cybercrime. Some common examples of poor cybersecurity awareness include: Weak passwords: Many people still use weak passwords or reuse the same password across multiple accounts, making it easy for cybercriminals to gain access to sensitive information. Lack of software updates: Failure to update software and security patches can leave devices and systems vulnerable to known security vulnerabilities. Phishing attacks: Phishing is a common tactic used by cybercriminals to trick people into divulging sensitive information or clicking on malicious links. A lack of awareness of what to look for in phishing emails can make individuals more susceptible to these attacks. Public Wi-Fi: Using public Wi-Fi networks without proper precautions, such as a virtual private network (VPN), can make devices vulnerable to hacking and cyber-attacks. Social engineering: Cybercriminals can use social engineering tactics to manipulate people into divulging sensitive information or performing actions that can compromise security. A lack of awareness of these tactics can make individuals more susceptible to these attacks. Cybersecurity awareness involves educating individuals and organizations about best practices for protecting digital assets, identifying potential cyber threats, and responding to cyber incidents. This can involve training sessions, workshops, and ongoing communication about cybersecurity issues and best practices. It is essential to make cybersecurity awareness a priority to protect against cyber threats and minimize the risk of cyber-attacks and data breaches. Cyber Security Safeguards-Overview- Cybersecurity safeguards are measures that organizations and individuals can take to protect their digital assets, devices, and online activities from cyber threats. These safeguards are designed to reduce the risk of cyber-attacks, data breaches, and other types of cybercrime. Some common cybersecurity safeguards include: Strong passwords: Using strong, unique passwords for each account and changing them regularly can help prevent unauthorized access. Multi-factor authentication (MFA): MFA adds an extra layer of security by requiring users to provide two or more forms of identification, such as a password and a fingerprint or facial recognition. Encryption: Encryption can help protect sensitive data by converting it into a code that can only be deciphered by someone with the proper key.
  • 10. Regular software updates: Keeping software and security patches up to date can help prevent known vulnerabilities from being exploited. Virtual private networks (VPNs): VPNs can help protect online activities and communications by encrypting internet traffic and masking the user's IP address. Employee training: Educating employees about cybersecurity risks and best practices can help prevent human error and increase overall cybersecurity awareness. Incident response plan: Having an incident response plan in place can help organizations respond quickly and effectively to a cyber-attack or data breach. Implementing these safeguards can help protect against cyber threats and minimize the risk of cyber- attacks and data breaches. It is essential to regularly review and update cybersecurity measures to keep up with evolving threats and ensure the ongoing protection of digital assets and online activities. Access control- Access control is a fundamental aspect of cybersecurity that involves managing who has access to what digital assets within an organization. It is the process of granting or denying users access to specific resources based on their identity, role, and level of authorization. There are several access control mechanisms, including: Role-based access control (RBAC): RBAC is a widely used access control model that grants access based on a user's role within an organization. Access is defined by a set of permissions or privileges that are associated with the user's role. Attribute-based access control (ABAC): ABAC is a more flexible access control model that grants access based on a user's attributes, such as their job function, location, or security clearance level. Mandatory access control (MAC): MAC is a strict access control model that assigns security labels to resources and users. Access is granted or denied based on these security labels, which are determined by a security policy. Discretionary access control (DAC): DAC is a more flexible access control model that allows users to control access to their resources. Users can grant or deny access to their resources to other users or groups. Access control is an essential component of cybersecurity because it helps prevent unauthorized access to digital assets, thereby reducing the risk of cyber-attacks, data breaches, and other security incidents. Organizations should implement access control mechanisms that are appropriate for their needs and regularly review and update their access control policies to ensure ongoing protection against evolving cybersecurity threats. IT Audit- IT audit is the process of evaluating an organization's information technology infrastructure, policies, and procedures to ensure they are secure, efficient, and effective. The purpose of IT audits is to identify potential security risks and weaknesses in an organization's IT systems and provide recommendations for improvement. The main objectives of IT audits include: Assessing the effectiveness of an organization's IT controls and processes. Evaluating the security and reliability of an organization's IT systems. Ensuring compliance with relevant laws, regulations, and industry standards. Identifying areas of improvement and making recommendations for enhancements.
  • 11. IT audits can be conducted internally by an organization's own IT staff or externally by a third-party auditor. IT audit procedures typically involve reviewing documentation, interviewing personnel, and conducting tests of IT systems and controls. The types of IT audits can include: Compliance audits: Ensure that an organization is complying with relevant laws, regulations, and industry standards. Security audits: Assess the security of an organization's IT infrastructure and systems. Performance audits: Evaluate the efficiency and effectiveness of an organization's IT systems and processes. Risk assessment audits: Identify potential risks and vulnerabilities in an organization's IT systems and provide recommendations for mitigation. IT audits are essential for ensuring that an organization's IT systems and infrastructure are secure, efficient, and effective. By identifying potential risks and weaknesses, IT audits can help organizations improve their IT controls and processes, reduce the risk of cyber-attacks, and protect their sensitive data. Authentication: Authentication is the process of verifying the identity of a user or entity accessing a system or application. In other words, it ensures that the user or entity is who they claim to be. Authentication is typically the first line of defense in protecting systems and data from unauthorized access and cyber- attacks. There are several methods of authentication, including: Password-based authentication: The most common form of authentication, where a user enters a username and password to access a system or application. Multi-factor authentication (MFA): Requires users to provide multiple forms of authentication, such as a password and a one-time code sent to their mobile device, to access a system or application. Biometric authentication: Uses unique biological characteristics, such as fingerprints, facial recognition, or iris scans, to authenticate a user. Smart card authentication: Uses a physical card with an embedded microchip that contains the user's authentication credentials. Certificate-based authentication: Uses digital certificates to verify the identity of a user or entity. Effective authentication is critical for ensuring the security of systems and data. By using strong authentication methods, organizations can reduce the risk of unauthorized access and cyber-attacks. It is important for organizations to choose authentication methods that are appropriate for their specific needs and requirements. Open Web Application Security Project (OWASP): The Open Web Application Security Project (OWASP) is a nonprofit organization focused on improving the security of software and web applications. The organization provides information, tools, and resources to help developers and organizations build more secure applications. OWASP is best known for its "Top Ten" list of web application security risks, which is updated every few years to reflect the changing threat landscape. The current OWASP Top Ten list includes: Injection flaws Broken authentication and session management Cross-site scripting (XSS)
  • 12. Broken access controls Security misconfigurations Insecure cryptographic storage Insufficient input validation Improperly configured security controls Insecure communication between components Poorly designed or implemented security controls OWASP also provides a range of resources and tools to help developers and organizations improve the security of their applications. These resources include: OWASP Top Ten project OWASP Cheat Sheet Series OWASP Zed Attack Proxy (ZAP) OWASP Application Security Verification Standard (ASVS) OWASP Mobile Security Project OWASP Internet of Things (IoT) Project Web site Audit and Vulnerabilities assessment- Web site audit and vulnerability assessment are important steps in ensuring the security of a website. A website audit involves reviewing the website's design, functionality, and performance to identify any potential security risks. Vulnerability assessment involves analyzing the website's code and system configuration to identify potential vulnerabilities that could be exploited by attackers. Here are some steps to conduct a website audit and vulnerability assessment: Identify the scope: Determine the areas of the website that will be audited and assessed. Gather information: Collect information about the website, including its purpose, design, functionality, and technology stack. Identify potential security risks: Look for potential security risks such as insecure authentication, authorization, and data validation, lack of encryption, and outdated software. Conduct vulnerability scanning: Use automated tools to scan the website for known vulnerabilities and security weaknesses. Manual testing: Conduct manual testing to identify any potential vulnerabilities that may have been missed by automated tools. Review server and network configurations: Review the website's server and network configurations to identify any misconfigurations that could lead to security risks. Analyze the results: Analyze the results of the audit and vulnerability assessment to identify areas of improvement. Provide recommendations: Provide recommendations on how to address the identified vulnerabilities and improve the website's overall security posture. Implement fixes: Implement the recommended fixes and retest to ensure that the identified vulnerabilities have been addressed. By conducting regular website audits and vulnerability assessments, website owners and developers can better protect their website and the data it contains from cyber-attacks and security breaches. Open Source/Free/Trial Tools: Win Audit: WinAudit is a free, open-source software tool that can be used to audit and assess the configuration of a Windows-based computer. The software is designed to collect information about the computer's hardware and software components, including details about the operating system, installed applications, and system settings.
  • 13. WinAudit can be used to generate reports on a wide range of system information, including: System information: This includes details about the computer's BIOS, motherboard, processor, memory, and other hardware components. Operating system information: This includes details about the operating system version, patches, and installed software. Application information: This includes details about the software applications installed on the computer, including the version number and installation path. Network information: This includes details about the computer's network configuration, including IP address, subnet mask, and gateway settings. User information: This includes details about the user accounts configured on the computer, including their login names and access privileges. Win Audit can be run from a command prompt or launched using a graphical user interface. The tool is commonly used by IT professionals, system administrators, and security analysts to perform system audits and vulnerability assessments, and to identify potential security risks that may be present on a Windows-based computer. Zap proxy (OWASP)- ZAP (short for Zed Attack Proxy) is an open-source web application security testing tool developed by OWASP (Open Web Application Security Project). It is designed to help software developers and security professionals identify and prevent security vulnerabilities in web applications. ZAP is a proxy server that sits between a web browser and a web application. It intercepts and analyzes all traffic between the browser and the application, allowing it to identify and report security vulnerabilities. Some of the key features of ZAP include: Active scanning: ZAP can actively scan web applications for vulnerabilities, including common vulnerabilities such as SQL injection and cross-site scripting (XSS). Passive scanning: ZAP can also passively scan web applications for vulnerabilities, identifying potential vulnerabilities by analyzing requests and responses between the browser and application. Spidering: ZAP includes a spidering feature that allows it to crawl a web application and identify all accessible pages and resources. Fuzzing: ZAP can be used to perform fuzz testing, which involves sending a large number of random inputs to a web application to identify potential vulnerabilities. Authentication and session management testing: ZAP can be used to test authentication and session management mechanisms in web applications. Reporting: ZAP can generate detailed reports of vulnerabilities identified during testing, including recommendations for remediation. ZAP is a powerful tool that can be used to identify a wide range of security vulnerabilities in web applications. However, it should be used by experienced security professionals who understand web application security testing methodologies and best practices.
  • 14. Burp suite- Burp Suite is a popular web application security testing tool developed by PortSwigger. It is widely used by security professionals and penetration testers to identify and exploit security vulnerabilities in web applications. Burp Suite has a wide range of features, including: Intercepting proxy: Burp Suite acts as an intercepting proxy between the user's browser and the target web application. This allows users to inspect and modify HTTP requests and responses, and to test the application's security mechanisms. Scanner: Burp Suite includes an automated vulnerability scanner that can identify a wide range of security vulnerabilities, including SQL injection, cross-site scripting (XSS), and file inclusion vulnerabilities. Intruder: The Intruder feature allows users to perform brute-force attacks and fuzz testing on web applications, to identify vulnerabilities such as weak authentication mechanisms. Repeater: The Repeater feature allows users to repeat and modify individual HTTP requests, to test the application's response to specific inputs. Sequencer: The Sequencer feature analyzes the randomness of tokens and other inputs used by the application, to identify weaknesses in cryptographic mechanisms. Spider: The Spider feature allows users to crawl the target web application, identifying all accessible pages and resources. Reporting: Burp Suite can generate detailed reports of vulnerabilities identified during testing, including recommendations for remediation. Burp Suite is a powerful and versatile tool that can be used to identify a wide range of security vulnerabilities in web applications. However, it should be used by experienced security professionals who understand web application security testing methodologies and best practices. DVWA kit- DVWA (Damn Vulnerable Web Application) is a deliberately vulnerable web application that is designed to be used for testing and educational purposes. It can be used to practice web application penetration testing and to learn about common security vulnerabilities. The DVWA kit contains a pre-configured virtual machine (VM) that can be used to run the application, along with a set of exercises that are designed to highlight common web application vulnerabilities such as SQL injection, cross-site scripting (XSS), and command injection. The DVWA kit can be downloaded and installed on a local machine or can be run in a virtual environment such as Virtual Box. Once installed, users can navigate to the DVWA web interface and begin testing the application by attempting to exploit the vulnerabilities identified in the exercises. The DVWA kit is a valuable tool for individuals looking to gain practical experience in web application security testing, as it provides a safe and controlled environment in which to practice. However, it should be used responsibly and ethically, and users should ensure that they have permission to test the application before doing so.