Ethical Hacking C'Measure Revision
Ethical Hacking C'Measure Revision
***
Characteristics of Information
Ch01 (slide 14)
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
Physical security
To protect the physical items, objects, or areas of an organization from unauthorized access
and misuse
Personal security
To protect the individual or group of individuals who are authorized to access the organization
and its operations
Operations security
To protect the details of a particular operation or series of activities
Communication security
To protect an organizations communications media, technology, and content
Network security
To protect networking components, connections, and contents.
Common computer security Threats
Ch01 (slide 26)
Management must be informed of the various kinds of threats facing by the organization
A threat is an object, person or other entity that represents a constant danger to an asset
By examining each threat category in turn, management effectively protects its information
through policy, education and training, and technology control
Topic 2 Elements of Security
Confidentiality
Preserving authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary information
Integrity
Guarding against improper information modification or destruction,
including ensuring information nonrepudiation and authenticity
Availability
Ensuring timely and reliable access to and use of information
A non-technical kind of intrusion that relies heavily on human interaction and often involves
tricking other people to break normal security procedures
Phishing
Pretexting
Baiting
Tailgating
Quid pro quo
Diversion theft
Topic 4 Types of Hacker Attacks
Social Engineering
Organizational Attacks
Automated Attacks
Accidental Breaches in Security
Viruses
Trojan Horse
Worms
Denial of Service (DoS)
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted
actions on a web application in which they're currently authenticated. CSRF attacks specifically
target state-changing requests, not theft of data, since the attacker has no way to see the
response to the forged request. With a little help of social engineering, an attacker may trick the
users of a web application into executing actions of the attacker's choosing.
If the victim is a normal user, a successful CSRF attack can force the user to perform state
changing requests like transferring funds, changing their email address, and so forth. If the victim
is an administrative account, CSRF can compromise the entire web application.
Topic 5 Hacktivism
Common Attacks
Web Defacement SQL Injection
DoS XSS
DDoS Password Attacks
Attraction
Global visibility Anonymity possible
Low cost Not life threatening
Fun Not get thrown in jail
Distance not a factor Easy to assemble large group
Trends
Cyber-attacks often accompany regional and global conflicts, both armed and unarmed
Politically motivated cyber-attacks are increasing in volume, sophistication, and coordination
Cyber attackers are attracted to high value and high-volume targets like networks, servers, and
routers
Protest Issues
War & Conflict Capitalism
Independence Laws & Regulations
Foreign policy Taxes
Domestics politics Smoking
Nuclear weapons Child Pornography
Human rights Terrorists
Animal rights Hacker arrests
Environment Internet security
Globalization
Topic 6 Ethical Hacking
System accreditation
Risk assessment
Network auditing
Provide direction for security controls
Can help justify resource expenditure
Can provide greater insight into process and architecture
Compliance checking
Continuous monitoring
Cross-site Scripting
How its done / Countermeasures
Vulnerability Analysis Part 1 (slide 7 9)
Cross-site scripting occurs when an attacker uses a web application to send malicious code
(JavaScript)
In cross-site scripting, end user files are disclosed, Trojan horse program are installed, the user
of to some other page is redirected, and presentation of the content is modified
Disclosure of the users session cookie allows an attacker to hijack the users session & take
over the account
Web servers, application servers and web application environments are susceptible to cross-
site scripting
Stored Attack are those where the injected code is permanently stored on the target servers
Reflected Attack are those where the injected code takes another route to the victim, such as
in an email message
Countermeasures
Validate all headers, cookies, query string, form fields, and hidden fields against a rigorous
specification
Adopt a stringent security policy
Filtering script output can also defeat XSS vulnerabilities by preventing them from being
transmitted to users
Topic 8 Steps for Conducting Ethical Hacking
Steps_EthicalHacking notes
Topic 9 Computer Crimes & Implications
Computer as a target
Computer as a tool
Crimes that use computer networks or devices to advance other ends include:
Fraud / Information warfare / Phishing scam / Spam
Computer Theft
Computer Trespass
Computer Invasion of Privacy
Computer Forgery
Computer Password Disclosure
Deontology VS Utilitarianism
Deontology Utilitarianism
Principle inherent in action Outside the action
Individuals are valuable in themselves Criticized because it makes sacrifice
some people for sake of others
According to deontologists, utilitarian go wrong Concerned with total amount of happiness
when they fix on happiness as the highest
good.