SEC+ preparation #3


Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes data. Real professional.
You can purchase Security+ SY0-701 boot camp here
Data Loss Prevention (DLP)
Agent based DLP uses software agents.
- Agent scans the system and looks if there’s sensitive information. If yes, it gives a message and encrypts it. If the data is stolen, it is safe because it is encrypted.
Agentless DLP (network based)
- Dedicated devices that sit in the network. Kind of like IDS (Intrusion detection system). But dedicated devices are used only for scanning the files.
Data minimization
Reducing risk by reducing the sensitive information
Simplest way is to destroy data that is not needed anymore
Hashing
Tokenization - information has a token, token is unique and that token is linked to for example DB (data-base) where all information is stored. For example if the system gets hacked, attacker gets only the token.
Masking - it’s kind of taking data and putting random info in it. For example as bank cards - XXXXXXXXXXXX1234 (only last numbers are visible, so it is masking)
Access Restrictions
Geographic restrictions - we can allow reaching the data only from a certain region
Permission restrictions
Segmentation and Isolation
Segment our networks and give access to only those people that really need it.
We can Isolate networks. For example by using switches we can create VLAN in organization.
Cybersecurity Threats
Over 80% of successful attacks includes a step of social engineering.
Classifying Cybersecurity Threats
Internal vs External
- Sometimes internal is even more important, because workers have access and they can do stuff.
Level of sophistication/Capability
Resource/Funding
- All things are hackable given enough resource, time and skill.
Intent/Motivation
Threat actors
APT - advanced persistent threat
Unskilled attackers - “script kitties”. People who run scripts and if a script fails, they quit because they don’t know how to adapt it to their situation.
Hacktivists - Anonymous
Nation-State Attackers - APT
Insider threat - that employee who wants to take you down. To get “even” with you.
Competitors - companies hiring hackers to steal information from competitors
Attacker motivations
Data exfiltration - credit card numbers, confidential information. Quick money way.
Espionage - trying find out what other people are up to
Service disruption - DoS attack or DDoS attack.
Blackmail - sometimes people knock down websites and then ask for a payment to let your website run back online again
Financial gain - self explanatory
Philosophical/political belief
Ethical - they feel that your activity is unethical
Revenge -
Disruption/chaos -
War - like in Ukraine. Cyber war happens all of the time
Subscribe to my newsletter
Read articles from Jonas Satkauskas directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
