SlideShare a Scribd company logo
Introduction of
Ethical Hacking
Chapter 1: Introduction to Ethical Hacking
Technology Brief
Information Security 0verview
The methods and processes to protect information and
information systems from unauthorized access, the disclosure of
information, usage or modification. Information security ensures
the confidentiality, integrity, and availability. An organization
without security policies and appropriate security rules are at
great risk, and the confidential information and data related to
that organization are not secure in the absence of these security
policies.
An organization along with well-defined security policies and
procedures helps in protecting the assets of that organization from
unauthorized access and disclosures. In the modern world, with
the latest technologies and platforms, millions of users interacting
with each other every minute.
These sixty seconds can be vulnerable and costly to the private
and public organizations due to the presence of various types of
old and modern threats all over the world. Public internet is the
most common and rapid option for spreading threats all over the
world. Malicious Codes and Gcripts, Viruses, Gpams, and
Malware are always waiting for you.
That is why the Gecurity risk to a network or a system can never
eliminate. It is always a great challenge to implement a security
policy that is effective and beneficial to the organization instead of
the application of an unnecessary security implementation which
can waste the resources and create a loophole for threats.
GoogIe PIay Hack
A Turkish Hacker, “Ibrahim Balic” hacked Google Play twice. He conceded
the responsibility of the Google Play attack. It was not his first attempt; he
acclaimed that he was behind the Apple's Developer site attack. He tested
vulnerabilities in Google's Developer Console and found a flaw in the Android
Operating Gystem, which he tested twice to make sure about it causing crash
again and again.
The Home Depot Data Breach
Theft of information from payment cards, like credit cards is common
nowadays. In ZO14, Home Depot's Point of Gale Gystems were compromised.
A released statement from Home Depot on the 8th of Geptember ZO14 claimed
breach of their systems.
Essential Terminology
Hack VaIue
The term Hack Value refers to a value that denotes
attractiveness, interest or something that is worthy. Value
describes the targets' level of attraction to the hacker.
Zero-Day Attack
Zero-Day Attacks referrs to threats and vulnerabilities that
can exploit the victim before the developer identify or
address and release any patch for that vulnerability.
Vulnerability
The vulnerability refers to a weak point, loophole or a
cause in any system or network which can be helpful and
utilized by the attackers to go through it. Any vulnerability
can be an entry point for them to reach the target.
Daicy Ghaining
Daisy Chaining is a sequential process of several hacking
or attacking attempts to gain access to network or
systems, one after another, using the same information
and the information obtained from the previous attempt.
Payload
The payload referrs to the actual section of information or
data in a frame as opposed to automatically generated
metadata. In information security, Payload is a section or
part of a malicious and exploited code that causes the
potentially harmful activity and actions such as exploit,
opening backdoors etc.
Bot
The bots are software that is used to control the target
remotely and to execute predefined tasks. The bots are
also known as for Internet Bot or Web Robot. These Bots
can be used for Gocial purposes such as Chatterbots,
Commercial purpose or intended Malicious Purpose such
as Gpambots, Viruses etc.
Elements of Information Security
Confidentiality
We want to make sure that our secret and sensitive data is
secure. Confidentiality means that only authorized
persons can work with and see our infrastructure's digital
resources. It also implies that unauthorized persons
should not have any access to the data..
Integrity
We do not want our data to be accessible or manipulated
by unauthorized persons. Data integrity ensures that only
authorized parties can modify data.
CIA Risk Control
Confidentiality
Loss of privacy.
Unauthorized
access to
information.
Identity theft.
Encryption.
Authentication.
Access Control
Integrity
Information is no longer
reliable or accurate.
Fraud.
Maker/Checker.
Quality Assurance.
Audit Logs
Availability
Business disruption. Loss of
customer's confidence.
Loss of revenue.
Business continuity.
Plans and test.
Backup storage.
Gufficient capacity.
security
concepts.
Table 1-01: Risk and Its Protection by Implementing CIA
Authenticity
Authentication is the process which identifies the user, or device to
grant privileges, access and certain rules and policies. Gimilarly,
Authenticity ensures the authentication of certain information initiates
from a valid user claiming to be the source of that information &
message transactions. The process of authentication through the
combined function of identities and passwords can achieve
Authenticity.
Figure 1-1 Elementc of Information
Cegurity
Non-Repudiation
Nonrepudiation is one of the Information Assurance (IA) pillar which
guarantees the information transmission & receiving between the
sender and receiver via different techniques such as digital signatures
and encryption. Non-repudiation is the assurance the communication
and its authenticity, so the sender cannot deny from what he sent.
Gimilarly, the receiver cannot deny from receiving. Digital contracts,
signatures and email messages use Nonrepudiation techniques.
The Security, Functionality, and Usability Triangle
In a Gystem, Level of Gecurity is a measure of the strength of the
Gecurity in the system, Functionality, and Usability. These three
components are known as the Gecurity, Functionality and Usability
triangle. Consider a ball in this triangle, if the ball is centered, it means
all three components are stronger, on the other hand, if the ball is
closer to security, it means the system is consuming more resources
for security and feature and function of the system and Usability
requires attention. A secure system must provide strong protection
along with offering all services and features and usability to the user.
Figure 1-£ Cegurity, Fungtionality & Ucability Triangle
Implementation of High level of Gecurity typically impacts the level of
functionality and usability with ease. The system becomes nonuser-
friendly with a decrease in performance. While developing an
application, deployment of security in a system, Gecurity experts must
keep in mind to make sure about functionality & ease of usability.
These three components of a triangle must be balanced.
Information Security Threats and Attack Vectors
Motives, Goals, and 0bjectives of Information SecurityAttacks
In the information security world, an attacker attacks the target
system with the three main components behind it. "Motive or
Objective" of an attack makes an attacker focus on attacking a
particular system. Another major component is "Method" that is
used by an attacker to gain access to a target system.
Vulnerability also helps the attacker to fulfill his intentions. These
three components are the major blocks on which an attack
depends.
Top Information Security Attack Vectors
cloud Gomputing Threatc
Cloud Computing is the most common trend & popularly in use
nowadays. It does not mean that threats to cloud computing or
cloud security are fewer. Mostly, the same issues as in
traditionally hosted environments also exist in the cloud
computing. It is very important to secure Cloud computing to
protect services and important data
.
Characteristics Description
Objectives Motive or Goal of threat
Timeliness Time spend in probing & accessing the target
Resources Level of Knowledge & tools
Risk tolerance tolerance to remain undetected
Gkills & Methods Tools & Techniques used throughout the
event
Actions Precise Action of threat
Attack origination points Number of origination points
Numbers involved in
attack
Number of Internal & External Gystem
involved
Knowledge Gource Discern information regarding threats
Characteristics of APT
Criteria are:
Incider Attack
An insider attack is the type of attack that is performed on
a system, within a corporate network, by a trusted person.
Trusted User is termed as Insider because Insider has
privileges and it is authorized to access the network
resources.
Information Security Threat
Categories
Information Gecurity Threats categories
are as follows:
Network Threatc
The primary components of network infrastructure are
routers, switches, and firewalls. These devices not only
perform routing and other network operations, but they
also control and protect the running applications, servers,
and devices from attacks and intrusions. The poorly
configured device offers intruder to exploit. Common
vulnerabilities on the network include using default
installation settings, open access controls, Weak
encryption & Passwords, and devices lacking the latest
security patches. Top network level threats include:
Information
gathering Gniffing
& Eavesdropping
Gpoofing
Gession hijacking
Man-in-the-Middle
Attack DNG & ARP
Poisoning
Password-based
Attacks Denial-of-
Gervices Attacks
Compromised Key
Attacks Firewall &
IDG Attacks
Hoct Threatc
Host threats are focused on system software; Applications are built
or running over this software such as Windows ZOOO, .NET
Framework, GQL Gerver, and others. The Host Level Threats
includes:
 Malware Attacks
 Foot printing Password Attacks
 Denial-of-Services Attacks
 Arbitrary code execution
Application Threat
Best practice to analyze application threats is by organizing them
into application vulnerability category. Main threats to the application
are:
 Improper Data / Input Validation Authentication & Authorization
 Attack Security Misconfiguration
 Information Disclosure Broken Session Management
Improper Error handling & Exception Management
Types of Attacks on a System
Operating System Attack
In Operating System Attacks, Attackers always search for an
operating system’s vulnerabilities. If they found any vulnerability in
an Operating System, they exploit to attack against the operating
system. Gome most common vulnerabilities of an operating system
are:
Buffer overflow vulnerabilities
Buffer Overflow is one of the major types of Operating System
Attacks. It is related to software exploitation attacks. In Buffer
overflow, when a -
program or application does not have well-defined boundaries
such as restrictions or pre-defined functional area regarding
the capacity of data it can handle or the type of data can be
inputted.
 Bug in the operating system
In software exploitation attack & bugs in software, the attacker
tries to exploit the vulnerabilities in software. This vulnerability
might be a mistake by the developer while developing the
program code. Attackers can discover these mistakes, use them
to gain access to the system.
 Unpatched operating system
Unpatched Operating System allows malicious activities, or could
not completely block malicious traffic into a system. Successful
intrusion can impact severely in the form of compromising
sensitive information, data loss and disruption of regular
operation.
 Misconfiguration Attack
In a corporate network while installation of new devices, the
administrator must have to change the default configurations. If
devices are left upon default configuration, using default
credentials, any user who does not have the privileges to access
the device but has connectivity can access the device.
 Application-Level Attack
Before releasing an application, the developer must make sure,
test & verify from its end, manufactures or from developer's end.
In an application-level attack, a hacker can use:
Buffer overflow Active content Cross-site script
Shrink Wrap Code Attack
Shrink Wrap code attack is the type of attack in which hacker uses the
shrink wrap code method for gaining access to a system. In this type of
attack, hacker exploits holes in unpatched Operating systems, poorly
configured software and application. To understand shrink wrap
vulnerabilities, consider an operating system has a bug in its original
software version. The vendor may have released the update, but it is the
most critical time between the release of a patch by vendor till client's
systems updates.
Information Warfare
Information warfare is a concept of warfare, to get involved in the warfare of
information to gain the most of information. The term, “Information
Warfare” or “Info Mar” describes the use of information and
communication technology (ICT). The major reason or focus of this
information war is to get a competitive advantage over the opponent or
enemy. The following is the classification of Information warfare into two
classes: -
1. Defensive InformationWarfare
Defensive Information warfare term is used to refer to all defensive
actions that are taken to defend from attacks to steal information and
information-based processes. Defensive Information ware fare areas
are: -
Prevention
Deterrence
Indication & Warning
Detection
Emergency Preparedness
Response
Hacking Concepts, Types, and Phases
Hacker
Hacker is the one who is smart enough to steal the information
such as Business data, personal data, financial information, credit
card information, username & Password from the system he is
unauthorized to get this information by taking unauthorized
control over that system using different techniques and tools.
Hacking
The Term "Hacking" in information security refers to exploiting the
vulnerabilities in a system, compromising the security to gain
unauthorized command and control over the system resources
The following are the five phases of hacking: -
1. Reconnaissance
Z. Gcanning
s. Gaining Access
4. Maintaining Access
5. Clearing Tracks
Reconnaissance
Reconnaissance is an initial preparing phase for the attacker to get
ready for an attack by gathering the information about the target
before launching an attack using different tools and techniques.
Gathering of information about the target makes it easier for an
attacker, even on a large scale. Gimilarly, in large scale, it helps to
identify the target range.
Scanning
Gcanning phase is a pre-attack phase. In this phase, attacker scans
the network by information acquired during the initial phase of
reconnaissance. Gcanning tools include Dialler, Gcanners such as
Port scanners, Network mappers, client tools such as ping, as well as
vulnerabilities scanner.
Gaining Access
Gaining access phase of hacking is the point where the hacker gets
the control over an operating system, application or computer
network. Control gained by the attacker defines the access level such
as operating system level, application level or network level access.
Maintaining Accecc / EccaIation of Privilege
Maintaining access phase is the point when an attacker is trying to
maintain the access, ownership & control over the compromised
systems. Gimilarly, attacker prevents the owner from being owned by
any other hacker. They use Backdoorc, Rootkitc or Trojanc to
retain their ownership. In this phase, an attacker may steal
information by uploading the information to the remote server,
download any file on the resident system, and manipulate the data
and configuration. To compromise other systems, the attacker uses
this compromised system to launch attacks.
Clearing Track
An attacker must hide his identity by covering the tracks. Covering
tracks are those activities which are carried out to hide the malicious
activities. Covering track is most required for an attacker to fulfill
their intentions by continuing the access to the compromised
system, remain undetected & gain what they want, remain unnoticed
and wipe all evidence that indicates his identity. To manipulate the
identity and evidence, the attacker overwrites the system,
application, and other related logs to avoid suspicion.
Ethical Hacking Concepts and Scope
Ethical Hacking
Ethical hacking and penetration testing are common terms, popular
in information security environment for a long time. Increase in
cybercrimes and hacking create a great challenge for security
experts and analyst and regulations over the last decade. It is a
popular war between hackers and security professionals.
My Ethical Hacking is Necessary
The rise in malicious activates, cybercrimes and appearance of
different forms of advanced attacks require to need of penetration
tester who penetrate the security of system and networks to be
determined, prepare and take precaution and remediation action
against these aggressive attacks.
These aggressive and advanced attacks include: -
 Denial-of-Services Attacks
 Manipulation of data
 Identity Theft Vandalism
 Credit Card theft Piracy
 Theft of Services
Increase in these type of attacks, hacking cases, and cyber-attacks,
because of increase of use of online transaction and online services
in the last decade.
Scope and Limitations of Ethical Hacking
Ethical Hacking is an important and crucial component of risk
assessment, auditing, counter frauds. Ethical hacking is widely
used as penetration testing to identify the vulnerabilities, risk,
and highlight the holes to take remedial actions against
attacks. However, there is also some limitations where ethical
hacking is not enough, or just through ethical hacking, the
issue could not resolve. An organization must first know what it
is looking for before hiring an external pentester. It helps focus
the goals to achieve and save time.
Phases of Ethical Hacking
Ethical Hacking is the combination of the following phases: -
1. Footprinting & Reconnaissance
2.. Gcanning
3. Enumeration
4. Gystem Hacking
5. Escalation of Privileges
6. Covering Tracks
Skills of an Ethical Hacker
A skilled, ethical hacker has a set of technical and non-
technical skills.
TechnicaI SkiIIc
1. Ethical Hacker has in-depth knowledge of almost all operating
systems, including all popular, widely- used operating systems such
as Windows, Linux, Unix, and Macintosh.
2. These ethical hackers are skilled at networking, basic and detailed
concepts, technologies, and exploring capabilities of hardware and
software.
3. Ethical hackers must have a strong command over security areas,
related issues, and technical domains.
4. They must have detailed knowledge of older, advanced, sophisticated
attacks.
Non-TechnicaI SkiIIc
1. Learning ability
2. Problem-solving skills
3. Communication skills
4. Committed to security policies
5. Awareness of laws, standards, and regulations.
Mind Map
Information Security Controls
Information Assurance (IA)
Information Assurance, in short, known as IA, depends upon the
components that are Integrity, Availability, Confidentiality, and
Authenticity. With the combination of these components, assurance of
information and information systems are ensured and protected during the
processes, usage, storage, and communication. These components are
defined earlier in this chapter.
Apart from these components, some methods and processes also help in
the achievement of information assurance such as: -
 Policies and Processes.
 Network Authentication.
 User Authentication.
 Network Vulnerabilities.
 Identifying problems and resources.
Implementation of a plan for identified requirements. Application of
information assurance control.
Information Security Management Program
Information Security Management programs are the programs that are
specially designed to focus on reducing the risk and vulnerabilities towards
information security environment to train the organization and users to
work in the less vulnerable state. The Information Security Management is
a combined management solution to achieve the required level of
information security using well-defined security policies, processes of
classification, reporting, and management and standards. The diagram on
the next page shows the EC-Council defined Information Security
Management Framework: -
Threat Modeling
Threat Modeling is the process or approach to identify, diagnose, and
assist the threats and vulnerabilities of the system. It is an approach
to risk management which dedicatedly focuses on analyzing the
system security and application security against security objectives.
This identification of threats and risks helps to focus and take action
on an event to achieve the goals. Capturing data of an organization,
implementing identification and assessment processes over the
captured information to analyze the information that can impact the
security of an application. Application overview includes the
identification process of an application to determine the trust
boundaries and data flow.
Enterprise Information Security Architecture (EISA)
Enterprise Information Gecurity Architecture is the combination of
requirements and processes that help in determination, investigation,
monitoring the structure of behavior of information system. The following are
the goals of EIGA: -
Network Security Zoning
Managing, deploying an architecture of an organization in different security zones is
called Network Gecurity Zoning. These security zones are the set of network devices
having a specific security level. Different security zones may have a similar or
different security level. Defining different security zones with their security levels
helps in monitoring and controlling of inbound and outbound traffic across the
network.
Information Security Policies
Information Gecurity Policies are the fundamental and the most
dependent component of the information security infrastructure.
Fundamental security requirements, conditions, rules are
configured to be enforced in an information security policy to
secure the organization's resources. These policies cover the
outlines of management, administration and security requirements
within an information security architecture.
The basic goals and objectives of the Information Gecurity Policies
are: - Cover Gecurity requirements and conditions of the
organization Protect organizations resources
• Eliminate legal liabilities
• Minimize the wastage of resources
• Prevent against unauthorized access
/ modification
• Minimize the risk
• Information Assurance
Types of Security Policies
The different types of security policies are as follows: -
1. Promiscuouspolicy
2. Permissive policy
3. Prudent policy
4. ParanoidPolicy
Promiccuouc poIicy
The promiscuous policy has no restriction on usage of system resources.
Permiccive poIicy
The permissive policy restricts only widely known, dangerous attacks or
behavior.
Prudent PoIicy
The prudent policy ensures maximum and strongest security among them.
However, it allows known, necessary risks, blocking all other service but
individually enabled services. Every event is log in prudent policy.
Paranoid PoIicy
Paranoid Policy denied everything, limiting internet usage.
Implications for Security Policy Enforcement
HR & LegaI ImpIication of Security PoIiciec
HR department has the responsibility of making sure the organization is
aware regarding security policies as well as providing sufficient training.
Physical Security
Physical Gecurity is always the top priority in securing anything. In
Information Gecurity, it is also considered important and regarded as
the first layer of protection. Physical security includes protection
against human-made attacks such as theft, damage, unauthorized
physical access as well as environmental impacts such as rain, dust,
power failure and fire.
Incident Management
Incident Response Management is the procedure and method of handling an
incident that occurs. This incident may be any specific violation of any
condition, policies, or else. Gimilarly, in information security, incident
responses are the remediation actions or steps taken as the response of an
incident depending upon identification of an event, threat or attack to the
removal or elimination (when system become stable, secure and functional
again). Incident response management defines the roles and responsibilities
of penetration testers, users or employees of an organization. Additionally,
incident response management defines actions required when a system is
facing a threat to its confidentiality, integrity, authenticity, availability depending
upon the threat level. Initially, the important thing to remember is when a
system is dealing with an attack, it requires sophisticated, dedicated
troubleshooting by an expert.
Incident Management Process
Incident Response Management processes include: -
1. Preparation for IncidentResponse
2. Detection and Analysis of Incident Response
3. Classification of an incident and its prioritization
4. Notification and Announcements
5. Containment
6. Forensic Investigation of an incident
7. Eradication and Recovery
8. Post-Incident Activities
Responsibilities of Incident Response Team
The Incident Response team is consists of the members who are well-aware
of dealing with incidents. This Response team is consists of trained officials
who are expert in collecting the information and secure all evidence of an
attack from the incident system. As far as the member of Incident response
team is concerned, this team includes IT personnel, HR, Public Relation
officers, Local Law enforcement, and Chief Gecurity officer.
introduction of ethical hacking. ppt
Vulnerability Assessment
Vulnerability assessment is the procedure of examination,
identification, and analysis of system or application abilities
including security processes running on a system to withstand any
threat. Through vulnerability assessment, you can identify
weaknesses and threat to a system, scope a vulnerability, estimate
the requirement and effectiveness of any additional security layer.
Types of Vulnerability Assessment
The following are the types of vulnerability assessment:
1. ActiveAssessment
Z. Passive Assessment
s. Host-based Assessment
4. Internal Assessment
5. External Assessment
6. Network Assessment
7. Wireless Network Assessment
8. Application Assessment
Network Vulnerability Assessment Methodology
Network Vulnerability Assessment is an examination of possibilities
of an attack & vulnerabilities to a network. The following are the
phases of Vulnerability Assessment:
1. Acquisition
2. Identification
3. Analyzing
4. Evaluation
5. Generating Reports
Acquisition
The acquisition phase compares and review previously- identified
vulnerabilities, laws, and procedures that are related to network
vulnerability assessment.
Identification
In the Identification phase, interaction with customers, employees,
administration or other people that are involved in designing the network
architecture to gather the technical information.
Analyzing
Analyzing phase reviews, the gathered, collected information in the form of
a collection of documentation or one-to-one interaction. Analyzing phase is
basically: -
 Review information.
 Analyzing previously identified vulnerabilities results.
 Risk Assessment.
 Vulnerability and Risk Analysis.
 Evaluation of the effectiveness of existing security policies.
Evaluation
Evaluation-:
Evaluation phase includes: -
 Inspection of Identified Vulnerabilities.
 Identification of flaws, gaps in existing & required Security.
 Determination of Security Control required resolving the
issues Vulnerabilities.
 Identify modification and Upgrades.
Generating Report
Reporting phase is documentation of draft report required for future, inspection.
This report helps identify vulnerabilities in the acquisition phase. Audit and
Penetration also require these previously collected reports. When any
modification in security mechanism is required, these reports help to design
security infrastructure. Central Databases usually holds these reports. Reports
contain: -
• Task did by each member of the team.
Methods & tools used.
• Findings. Recommendation.
• Collected information from different phases.
Mind Map
Penetration Testing
Technology 0verview
In the Ethical Hacking environment, the most common term that often uses is
"pentecter." Pentesters are the penetration tester that has permission to hack a
system by owner. Penetration testing is the process of hacking a system with
the permission from the owner of that system, to evaluate security, Hack Value,
Target of Evaluation (TOE), attacks, exploits, zero-day vulnerability & other
components such as threats, vulnerabilities, and daisy chaining.
Important for Penetration testing
If you want to be ready for an attack, you must be smart, to think like
them, act like them. Hackers are skilled, having detailed information
of hardware's, software, networking and other related information.
The need and importance of penetration testing, in the modern
world where variously advanced threat such as Denial-of-service,
Identity theft, theft of services, stealing information is common,
system penetration ensure to counter the attack from malicious
threat by anticipating methods. Some other major advantages and
need for penetration testing is to uncover the vulnerabilities in
systems and security deployments in the same way an attacker
gains access: -
 To identify the threats and vulnerabilities to organizations assets.
 To provide a comprehensive assessment of policies, procedures,
design, and architecture.
 To set remediation actions to secure them before they are used by a
hacker to breach security.
 To identify what an attacker can access to steal.
 To identify what information can be theft and its use.
 To test and validate the security protection & identify the need for any
additional protection layer.
 Modification andup-gradation of currently deployment security
architecture.
 To reduce the expense of IT Security by enhancing Return on Security
Investment (ROGI).
Types of Penetration Testing
Three types of Penetration testing are important to be
differentiated because a penetration tester may have asked to
perform any of them.
Black boxing is designed to demonstrate an emulated
situation as an attacker in countering an attack.
Gray box
Gray box, is a type of penetration testing in which the pentester
has very limited prior knowledge of the system or any information
of targets such as IP addresses, Operating system or network
information in very limited. Gary boxing is designed to
demonstrate an emulated situation as an insider might have this
information and to counter an attack as the pentester has basic,
limited information regarding target.
White box
The white box is a type of penetration testing in which the
pentester has complete knowledge of system and information of
the target. This type of penetration is done by internal security
teams or security audits teams to perform auditing.
Phases of Penetration Testing
Penetration testing is a three-phase process.
1- Pre-Attack Phase
2-Attack Phase
3- Post-Attack Phase
BIack Box
The black box is a type of penetration testing in which the
pentester is blind testing or double-blind testing, i.e. provided
with no prior knowledge of the system or any information of
the target.
Security Testing Methodology
There are some methodological approaches to be adopted for security
or penetration testing. Industry-leading Penetration Testing
Methodologies are: -
• Open Web Application Gecurity Project (OWAGP)
• Open Gource Gecurity Testing Methodology Manual
(OGGTMM)
• Information Gystems Gecurity Assessment Framework
(IGAF)
• EC-Council Licensed Penetration Tester (LPT)
Methodology
Mind Map
Information Security Laws and Standards
Payment Card Industry Data Security Standard (PCI-DSS)
Payment Card Industry Data Security Standard (PCI-DGG) is a global
information security standard by “PGI Security Standard Council,”
available for organizations to develop, enhance and assess security
standards for handling cardholder information and security standard for
payment account security.
Founding members of this council are: -
 American Express, Discover Financial Services
 JCB International
 MasterCard
 Visa Inc.
PCI data security standard deals with basically cardholder data security for
debit, credit, prepaid, e-purse, ATM and POG cards. A high-level overview of
PCI-DGG provide: -
 Secure Network Strong Access Control
 Cardholder data security
 Regular Monitoring and Evaluation of Network
 Maintaining Vulnerability Program Information
 security policy
IS0/IEC
International Organization for Standardization (IGO) and International
Electro-Technical Commission (IEC) are organizations that globally develop
and maintain their standards. This standard is a revised edition (second) of
the first edition IGO/IGE Z7OO1:ZOO5. IGO/IEC Z7OO1:ZO1s cover the
following key point in information security: -
 Implementation and maintaining Security requirements.
 Information security management processes.
 Assurance of Cost-effective risk management.
Title Majors
Title I Public company accounting oversight board
Title II Auditor independence
Title III Corporate responsibility
Title IV Enhanced financial disclosures
Title V Analyst conflicts of interest
Title VI Commission resources and authority
Title VII Gtudies and reports
Title VIII Corporate and criminal fraud accountability
Title IX White-collar crime penalty enhancements
• Status of Information Security Management
• Activities. Compliant with laws.
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA) was passed in
1PP6 by Congress. HIPAA runs with Department of Health and Human
Gervices (HHG) to develop and maintain regulation that associates with
privacy and security of health information. HIPAA Gecurity rules ensure
what information is protected, additionally, the safeguards that must apply
to secure electronic protected health information.
The major domains in information security where HIPAA is developing and
maintain standards and regulations are: -
• Electronic Transaction and Code Gets
• Standards Privacy Rules
• Security Rules
• national Identifier Requirements
• Enforcement Rules
Sarbanes 0xley Act (S0X)
Garbanes Oxley Act (GOX) key requirements or provisions organizes in the
form of 11 titles which are as follows: -
Title X Corporate tax returns
Title XI Corporate fraud and accountability
Some other regulatory bodies are offering the standards that are being
deployed worldwide including Digital Millennium Copyright Act (DMCA) and
Federal Information Gecurity Management Act (FIGMA). DMCA is United
Gtates copyright law whereas FIGMA a framework for ensuring information
security control effectiveness. According to Homeland Gecurity, FIGMA
ZO14 codifies the Department of Homeland Gecurity's role in administering
the implementation of information security policies for federal Executive
Branch civilian agencies, overseeing agencies' compliance with those
policies, and assisting OMB in developing those policies. The legislation
provides the Department authority to develop and oversee the
implementation of binding operational directives to other agencies, in
coordination and consistent with OMB policies and practices. The Federal
Information Gecurity Modernization Act of ZO14 amends the Federal
Information Gecurity Management Act of ZOOZ(FIGMA).
Mind Map

More Related Content

PDF
Ethical hacking and social engineering
PDF
Module 3-cyber security
PPTX
GETTING STARTED WITH THE ETHICAL HACKING.pptx
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PPTX
Ashar Shaikh A-84 SEMINAR.pptx
DOCX
Ethical Hacking
PPT
Introduction To Ethical Hacking
PPTX
Website security
Ethical hacking and social engineering
Module 3-cyber security
GETTING STARTED WITH THE ETHICAL HACKING.pptx
Top Cyber Security Interview Questions and Answers 2022.pdf
Ashar Shaikh A-84 SEMINAR.pptx
Ethical Hacking
Introduction To Ethical Hacking
Website security

Similar to introduction of ethical hacking. ppt (20)

PDF
BASICS OF ETHICAL HACKING
PDF
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
PPTX
chapitre 1 introduction to ethical hakcing.pptx
PPTX
Introduction to cyber security
PPTX
ppt on securities.pptx
PPTX
Module 1Introduction to cyber security.pptx
PPTX
Ethical Hacking.pptx
PPTX
What is Ethical Hacking?.pptx
PDF
Introduction to cyber security i
PDF
IT Security.pdf
PDF
Exploring the Seven Key Attributes of Security Testing.pdf
PDF
module 1 Cyber Security Concepts
PPT
Information Technology Security Basics
PDF
Cybersecurity Interview Questions and Answers.pdf
PDF
An Overview of Cyber Security_ Risks, Threats, and Solutions.pdf
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
DOCX
CCS354-NETWORK SECURITY-network-security notes
PPTX
Cyber Security in detail PPT BY HIMANXU.pptx
BASICS OF ETHICAL HACKING
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
chapitre 1 introduction to ethical hakcing.pptx
Introduction to cyber security
ppt on securities.pptx
Module 1Introduction to cyber security.pptx
Ethical Hacking.pptx
What is Ethical Hacking?.pptx
Introduction to cyber security i
IT Security.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
module 1 Cyber Security Concepts
Information Technology Security Basics
Cybersecurity Interview Questions and Answers.pdf
An Overview of Cyber Security_ Risks, Threats, and Solutions.pdf
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
CCS354-NETWORK SECURITY-network-security notes
Cyber Security in detail PPT BY HIMANXU.pptx

More from Scode Network Institute (8)

PDF
What is Computer network
PPTX
digital marketing ppt.pptx
PDF
What is a Computer Network
PPTX
introduction of ethical hacking. (ppt)
PDF
python course ppt pdf
PDF
cyber_security_syllabus .pdf | scode network institute
PDF
Certified_Ethical_Hacker_Training ppt.pdf
PPTX
python ppt | Python Course In Ghaziabad | Scode Network Institute
What is Computer network
digital marketing ppt.pptx
What is a Computer Network
introduction of ethical hacking. (ppt)
python course ppt pdf
cyber_security_syllabus .pdf | scode network institute
Certified_Ethical_Hacker_Training ppt.pdf
python ppt | Python Course In Ghaziabad | Scode Network Institute

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Lesson notes of climatology university.
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Classroom Observation Tools for Teachers
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Insiders guide to clinical Medicine.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharma ospi slides which help in ospi learning
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
TR - Agricultural Crops Production NC III.pdf
Lesson notes of climatology university.
Microbial disease of the cardiovascular and lymphatic systems
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Renaissance Architecture: A Journey from Faith to Humanism
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Classroom Observation Tools for Teachers
Module 4: Burden of Disease Tutorial Slides S2 2025
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Insiders guide to clinical Medicine.pdf
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Sports Quiz easy sports quiz sports quiz
Microbial diseases, their pathogenesis and prophylaxis
Pharma ospi slides which help in ospi learning
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
O7-L3 Supply Chain Operations - ICLT Program
PPH.pptx obstetrics and gynecology in nursing
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

introduction of ethical hacking. ppt

  • 2. Chapter 1: Introduction to Ethical Hacking Technology Brief Information Security 0verview The methods and processes to protect information and information systems from unauthorized access, the disclosure of information, usage or modification. Information security ensures the confidentiality, integrity, and availability. An organization without security policies and appropriate security rules are at great risk, and the confidential information and data related to that organization are not secure in the absence of these security policies. An organization along with well-defined security policies and procedures helps in protecting the assets of that organization from unauthorized access and disclosures. In the modern world, with the latest technologies and platforms, millions of users interacting with each other every minute. These sixty seconds can be vulnerable and costly to the private and public organizations due to the presence of various types of old and modern threats all over the world. Public internet is the most common and rapid option for spreading threats all over the world. Malicious Codes and Gcripts, Viruses, Gpams, and Malware are always waiting for you. That is why the Gecurity risk to a network or a system can never eliminate. It is always a great challenge to implement a security policy that is effective and beneficial to the organization instead of the application of an unnecessary security implementation which can waste the resources and create a loophole for threats.
  • 3. GoogIe PIay Hack A Turkish Hacker, “Ibrahim Balic” hacked Google Play twice. He conceded the responsibility of the Google Play attack. It was not his first attempt; he acclaimed that he was behind the Apple's Developer site attack. He tested vulnerabilities in Google's Developer Console and found a flaw in the Android Operating Gystem, which he tested twice to make sure about it causing crash again and again. The Home Depot Data Breach Theft of information from payment cards, like credit cards is common nowadays. In ZO14, Home Depot's Point of Gale Gystems were compromised. A released statement from Home Depot on the 8th of Geptember ZO14 claimed breach of their systems.
  • 4. Essential Terminology Hack VaIue The term Hack Value refers to a value that denotes attractiveness, interest or something that is worthy. Value describes the targets' level of attraction to the hacker. Zero-Day Attack Zero-Day Attacks referrs to threats and vulnerabilities that can exploit the victim before the developer identify or address and release any patch for that vulnerability. Vulnerability The vulnerability refers to a weak point, loophole or a cause in any system or network which can be helpful and utilized by the attackers to go through it. Any vulnerability can be an entry point for them to reach the target. Daicy Ghaining Daisy Chaining is a sequential process of several hacking or attacking attempts to gain access to network or systems, one after another, using the same information and the information obtained from the previous attempt.
  • 5. Payload The payload referrs to the actual section of information or data in a frame as opposed to automatically generated metadata. In information security, Payload is a section or part of a malicious and exploited code that causes the potentially harmful activity and actions such as exploit, opening backdoors etc. Bot The bots are software that is used to control the target remotely and to execute predefined tasks. The bots are also known as for Internet Bot or Web Robot. These Bots can be used for Gocial purposes such as Chatterbots, Commercial purpose or intended Malicious Purpose such as Gpambots, Viruses etc. Elements of Information Security Confidentiality We want to make sure that our secret and sensitive data is secure. Confidentiality means that only authorized persons can work with and see our infrastructure's digital resources. It also implies that unauthorized persons should not have any access to the data.. Integrity We do not want our data to be accessible or manipulated by unauthorized persons. Data integrity ensures that only authorized parties can modify data.
  • 6. CIA Risk Control Confidentiality Loss of privacy. Unauthorized access to information. Identity theft. Encryption. Authentication. Access Control Integrity Information is no longer reliable or accurate. Fraud. Maker/Checker. Quality Assurance. Audit Logs Availability Business disruption. Loss of customer's confidence. Loss of revenue. Business continuity. Plans and test. Backup storage. Gufficient capacity. security concepts. Table 1-01: Risk and Its Protection by Implementing CIA Authenticity Authentication is the process which identifies the user, or device to grant privileges, access and certain rules and policies. Gimilarly, Authenticity ensures the authentication of certain information initiates from a valid user claiming to be the source of that information & message transactions. The process of authentication through the combined function of identities and passwords can achieve Authenticity. Figure 1-1 Elementc of Information Cegurity Non-Repudiation
  • 7. Nonrepudiation is one of the Information Assurance (IA) pillar which guarantees the information transmission & receiving between the sender and receiver via different techniques such as digital signatures and encryption. Non-repudiation is the assurance the communication and its authenticity, so the sender cannot deny from what he sent. Gimilarly, the receiver cannot deny from receiving. Digital contracts, signatures and email messages use Nonrepudiation techniques. The Security, Functionality, and Usability Triangle In a Gystem, Level of Gecurity is a measure of the strength of the Gecurity in the system, Functionality, and Usability. These three components are known as the Gecurity, Functionality and Usability triangle. Consider a ball in this triangle, if the ball is centered, it means all three components are stronger, on the other hand, if the ball is closer to security, it means the system is consuming more resources for security and feature and function of the system and Usability requires attention. A secure system must provide strong protection along with offering all services and features and usability to the user. Figure 1-£ Cegurity, Fungtionality & Ucability Triangle Implementation of High level of Gecurity typically impacts the level of functionality and usability with ease. The system becomes nonuser- friendly with a decrease in performance. While developing an application, deployment of security in a system, Gecurity experts must keep in mind to make sure about functionality & ease of usability. These three components of a triangle must be balanced.
  • 8. Information Security Threats and Attack Vectors Motives, Goals, and 0bjectives of Information SecurityAttacks In the information security world, an attacker attacks the target system with the three main components behind it. "Motive or Objective" of an attack makes an attacker focus on attacking a particular system. Another major component is "Method" that is used by an attacker to gain access to a target system. Vulnerability also helps the attacker to fulfill his intentions. These three components are the major blocks on which an attack depends. Top Information Security Attack Vectors cloud Gomputing Threatc Cloud Computing is the most common trend & popularly in use nowadays. It does not mean that threats to cloud computing or cloud security are fewer. Mostly, the same issues as in traditionally hosted environments also exist in the cloud computing. It is very important to secure Cloud computing to protect services and important data
  • 9. .
  • 10. Characteristics Description Objectives Motive or Goal of threat Timeliness Time spend in probing & accessing the target Resources Level of Knowledge & tools Risk tolerance tolerance to remain undetected Gkills & Methods Tools & Techniques used throughout the event Actions Precise Action of threat Attack origination points Number of origination points Numbers involved in attack Number of Internal & External Gystem involved Knowledge Gource Discern information regarding threats Characteristics of APT Criteria are:
  • 11. Incider Attack An insider attack is the type of attack that is performed on a system, within a corporate network, by a trusted person. Trusted User is termed as Insider because Insider has privileges and it is authorized to access the network resources.
  • 12. Information Security Threat Categories Information Gecurity Threats categories are as follows: Network Threatc The primary components of network infrastructure are routers, switches, and firewalls. These devices not only perform routing and other network operations, but they also control and protect the running applications, servers, and devices from attacks and intrusions. The poorly configured device offers intruder to exploit. Common vulnerabilities on the network include using default installation settings, open access controls, Weak encryption & Passwords, and devices lacking the latest security patches. Top network level threats include: Information gathering Gniffing & Eavesdropping Gpoofing Gession hijacking Man-in-the-Middle Attack DNG & ARP Poisoning Password-based Attacks Denial-of- Gervices Attacks Compromised Key Attacks Firewall & IDG Attacks
  • 13. Hoct Threatc Host threats are focused on system software; Applications are built or running over this software such as Windows ZOOO, .NET Framework, GQL Gerver, and others. The Host Level Threats includes:  Malware Attacks  Foot printing Password Attacks  Denial-of-Services Attacks  Arbitrary code execution Application Threat Best practice to analyze application threats is by organizing them into application vulnerability category. Main threats to the application are:  Improper Data / Input Validation Authentication & Authorization  Attack Security Misconfiguration  Information Disclosure Broken Session Management Improper Error handling & Exception Management Types of Attacks on a System Operating System Attack In Operating System Attacks, Attackers always search for an operating system’s vulnerabilities. If they found any vulnerability in an Operating System, they exploit to attack against the operating system. Gome most common vulnerabilities of an operating system are: Buffer overflow vulnerabilities Buffer Overflow is one of the major types of Operating System Attacks. It is related to software exploitation attacks. In Buffer overflow, when a -
  • 14. program or application does not have well-defined boundaries such as restrictions or pre-defined functional area regarding the capacity of data it can handle or the type of data can be inputted.  Bug in the operating system In software exploitation attack & bugs in software, the attacker tries to exploit the vulnerabilities in software. This vulnerability might be a mistake by the developer while developing the program code. Attackers can discover these mistakes, use them to gain access to the system.  Unpatched operating system Unpatched Operating System allows malicious activities, or could not completely block malicious traffic into a system. Successful intrusion can impact severely in the form of compromising sensitive information, data loss and disruption of regular operation.  Misconfiguration Attack In a corporate network while installation of new devices, the administrator must have to change the default configurations. If devices are left upon default configuration, using default credentials, any user who does not have the privileges to access the device but has connectivity can access the device.  Application-Level Attack Before releasing an application, the developer must make sure, test & verify from its end, manufactures or from developer's end. In an application-level attack, a hacker can use: Buffer overflow Active content Cross-site script
  • 15. Shrink Wrap Code Attack Shrink Wrap code attack is the type of attack in which hacker uses the shrink wrap code method for gaining access to a system. In this type of attack, hacker exploits holes in unpatched Operating systems, poorly configured software and application. To understand shrink wrap vulnerabilities, consider an operating system has a bug in its original software version. The vendor may have released the update, but it is the most critical time between the release of a patch by vendor till client's systems updates. Information Warfare Information warfare is a concept of warfare, to get involved in the warfare of information to gain the most of information. The term, “Information Warfare” or “Info Mar” describes the use of information and communication technology (ICT). The major reason or focus of this information war is to get a competitive advantage over the opponent or enemy. The following is the classification of Information warfare into two classes: - 1. Defensive InformationWarfare Defensive Information warfare term is used to refer to all defensive actions that are taken to defend from attacks to steal information and information-based processes. Defensive Information ware fare areas are: - Prevention Deterrence Indication & Warning Detection Emergency Preparedness Response
  • 16. Hacking Concepts, Types, and Phases Hacker Hacker is the one who is smart enough to steal the information such as Business data, personal data, financial information, credit card information, username & Password from the system he is unauthorized to get this information by taking unauthorized control over that system using different techniques and tools. Hacking The Term "Hacking" in information security refers to exploiting the vulnerabilities in a system, compromising the security to gain unauthorized command and control over the system resources
  • 17. The following are the five phases of hacking: - 1. Reconnaissance Z. Gcanning s. Gaining Access 4. Maintaining Access 5. Clearing Tracks Reconnaissance Reconnaissance is an initial preparing phase for the attacker to get ready for an attack by gathering the information about the target before launching an attack using different tools and techniques. Gathering of information about the target makes it easier for an attacker, even on a large scale. Gimilarly, in large scale, it helps to identify the target range. Scanning Gcanning phase is a pre-attack phase. In this phase, attacker scans the network by information acquired during the initial phase of reconnaissance. Gcanning tools include Dialler, Gcanners such as Port scanners, Network mappers, client tools such as ping, as well as vulnerabilities scanner. Gaining Access Gaining access phase of hacking is the point where the hacker gets the control over an operating system, application or computer network. Control gained by the attacker defines the access level such as operating system level, application level or network level access.
  • 18. Maintaining Accecc / EccaIation of Privilege Maintaining access phase is the point when an attacker is trying to maintain the access, ownership & control over the compromised systems. Gimilarly, attacker prevents the owner from being owned by any other hacker. They use Backdoorc, Rootkitc or Trojanc to retain their ownership. In this phase, an attacker may steal information by uploading the information to the remote server, download any file on the resident system, and manipulate the data and configuration. To compromise other systems, the attacker uses this compromised system to launch attacks. Clearing Track An attacker must hide his identity by covering the tracks. Covering tracks are those activities which are carried out to hide the malicious activities. Covering track is most required for an attacker to fulfill their intentions by continuing the access to the compromised system, remain undetected & gain what they want, remain unnoticed and wipe all evidence that indicates his identity. To manipulate the identity and evidence, the attacker overwrites the system, application, and other related logs to avoid suspicion.
  • 19. Ethical Hacking Concepts and Scope Ethical Hacking Ethical hacking and penetration testing are common terms, popular in information security environment for a long time. Increase in cybercrimes and hacking create a great challenge for security experts and analyst and regulations over the last decade. It is a popular war between hackers and security professionals. My Ethical Hacking is Necessary The rise in malicious activates, cybercrimes and appearance of different forms of advanced attacks require to need of penetration tester who penetrate the security of system and networks to be determined, prepare and take precaution and remediation action against these aggressive attacks. These aggressive and advanced attacks include: -  Denial-of-Services Attacks  Manipulation of data  Identity Theft Vandalism  Credit Card theft Piracy  Theft of Services Increase in these type of attacks, hacking cases, and cyber-attacks, because of increase of use of online transaction and online services in the last decade.
  • 20. Scope and Limitations of Ethical Hacking Ethical Hacking is an important and crucial component of risk assessment, auditing, counter frauds. Ethical hacking is widely used as penetration testing to identify the vulnerabilities, risk, and highlight the holes to take remedial actions against attacks. However, there is also some limitations where ethical hacking is not enough, or just through ethical hacking, the issue could not resolve. An organization must first know what it is looking for before hiring an external pentester. It helps focus the goals to achieve and save time. Phases of Ethical Hacking Ethical Hacking is the combination of the following phases: - 1. Footprinting & Reconnaissance 2.. Gcanning 3. Enumeration 4. Gystem Hacking 5. Escalation of Privileges 6. Covering Tracks Skills of an Ethical Hacker A skilled, ethical hacker has a set of technical and non- technical skills.
  • 21. TechnicaI SkiIIc 1. Ethical Hacker has in-depth knowledge of almost all operating systems, including all popular, widely- used operating systems such as Windows, Linux, Unix, and Macintosh. 2. These ethical hackers are skilled at networking, basic and detailed concepts, technologies, and exploring capabilities of hardware and software. 3. Ethical hackers must have a strong command over security areas, related issues, and technical domains. 4. They must have detailed knowledge of older, advanced, sophisticated attacks. Non-TechnicaI SkiIIc 1. Learning ability 2. Problem-solving skills 3. Communication skills 4. Committed to security policies 5. Awareness of laws, standards, and regulations. Mind Map
  • 22. Information Security Controls Information Assurance (IA) Information Assurance, in short, known as IA, depends upon the components that are Integrity, Availability, Confidentiality, and Authenticity. With the combination of these components, assurance of information and information systems are ensured and protected during the processes, usage, storage, and communication. These components are defined earlier in this chapter. Apart from these components, some methods and processes also help in the achievement of information assurance such as: -  Policies and Processes.  Network Authentication.  User Authentication.  Network Vulnerabilities.  Identifying problems and resources. Implementation of a plan for identified requirements. Application of information assurance control. Information Security Management Program Information Security Management programs are the programs that are specially designed to focus on reducing the risk and vulnerabilities towards information security environment to train the organization and users to work in the less vulnerable state. The Information Security Management is a combined management solution to achieve the required level of information security using well-defined security policies, processes of classification, reporting, and management and standards. The diagram on the next page shows the EC-Council defined Information Security Management Framework: -
  • 23. Threat Modeling Threat Modeling is the process or approach to identify, diagnose, and assist the threats and vulnerabilities of the system. It is an approach to risk management which dedicatedly focuses on analyzing the system security and application security against security objectives. This identification of threats and risks helps to focus and take action on an event to achieve the goals. Capturing data of an organization, implementing identification and assessment processes over the captured information to analyze the information that can impact the security of an application. Application overview includes the identification process of an application to determine the trust boundaries and data flow.
  • 24. Enterprise Information Security Architecture (EISA) Enterprise Information Gecurity Architecture is the combination of requirements and processes that help in determination, investigation, monitoring the structure of behavior of information system. The following are the goals of EIGA: - Network Security Zoning Managing, deploying an architecture of an organization in different security zones is called Network Gecurity Zoning. These security zones are the set of network devices having a specific security level. Different security zones may have a similar or different security level. Defining different security zones with their security levels helps in monitoring and controlling of inbound and outbound traffic across the network.
  • 25. Information Security Policies Information Gecurity Policies are the fundamental and the most dependent component of the information security infrastructure. Fundamental security requirements, conditions, rules are configured to be enforced in an information security policy to secure the organization's resources. These policies cover the outlines of management, administration and security requirements within an information security architecture.
  • 26. The basic goals and objectives of the Information Gecurity Policies are: - Cover Gecurity requirements and conditions of the organization Protect organizations resources • Eliminate legal liabilities • Minimize the wastage of resources • Prevent against unauthorized access / modification • Minimize the risk • Information Assurance
  • 27. Types of Security Policies The different types of security policies are as follows: - 1. Promiscuouspolicy 2. Permissive policy 3. Prudent policy 4. ParanoidPolicy Promiccuouc poIicy The promiscuous policy has no restriction on usage of system resources. Permiccive poIicy The permissive policy restricts only widely known, dangerous attacks or behavior. Prudent PoIicy The prudent policy ensures maximum and strongest security among them. However, it allows known, necessary risks, blocking all other service but individually enabled services. Every event is log in prudent policy. Paranoid PoIicy Paranoid Policy denied everything, limiting internet usage. Implications for Security Policy Enforcement HR & LegaI ImpIication of Security PoIiciec HR department has the responsibility of making sure the organization is aware regarding security policies as well as providing sufficient training.
  • 28. Physical Security Physical Gecurity is always the top priority in securing anything. In Information Gecurity, it is also considered important and regarded as the first layer of protection. Physical security includes protection against human-made attacks such as theft, damage, unauthorized physical access as well as environmental impacts such as rain, dust, power failure and fire.
  • 29. Incident Management Incident Response Management is the procedure and method of handling an incident that occurs. This incident may be any specific violation of any condition, policies, or else. Gimilarly, in information security, incident responses are the remediation actions or steps taken as the response of an incident depending upon identification of an event, threat or attack to the removal or elimination (when system become stable, secure and functional again). Incident response management defines the roles and responsibilities of penetration testers, users or employees of an organization. Additionally, incident response management defines actions required when a system is facing a threat to its confidentiality, integrity, authenticity, availability depending upon the threat level. Initially, the important thing to remember is when a system is dealing with an attack, it requires sophisticated, dedicated troubleshooting by an expert. Incident Management Process Incident Response Management processes include: - 1. Preparation for IncidentResponse 2. Detection and Analysis of Incident Response 3. Classification of an incident and its prioritization 4. Notification and Announcements 5. Containment 6. Forensic Investigation of an incident 7. Eradication and Recovery 8. Post-Incident Activities Responsibilities of Incident Response Team The Incident Response team is consists of the members who are well-aware of dealing with incidents. This Response team is consists of trained officials who are expert in collecting the information and secure all evidence of an attack from the incident system. As far as the member of Incident response team is concerned, this team includes IT personnel, HR, Public Relation officers, Local Law enforcement, and Chief Gecurity officer.
  • 31. Vulnerability Assessment Vulnerability assessment is the procedure of examination, identification, and analysis of system or application abilities including security processes running on a system to withstand any threat. Through vulnerability assessment, you can identify weaknesses and threat to a system, scope a vulnerability, estimate the requirement and effectiveness of any additional security layer. Types of Vulnerability Assessment The following are the types of vulnerability assessment: 1. ActiveAssessment Z. Passive Assessment s. Host-based Assessment 4. Internal Assessment 5. External Assessment 6. Network Assessment 7. Wireless Network Assessment 8. Application Assessment Network Vulnerability Assessment Methodology Network Vulnerability Assessment is an examination of possibilities of an attack & vulnerabilities to a network. The following are the phases of Vulnerability Assessment: 1. Acquisition 2. Identification 3. Analyzing 4. Evaluation 5. Generating Reports
  • 32. Acquisition The acquisition phase compares and review previously- identified vulnerabilities, laws, and procedures that are related to network vulnerability assessment. Identification In the Identification phase, interaction with customers, employees, administration or other people that are involved in designing the network architecture to gather the technical information. Analyzing Analyzing phase reviews, the gathered, collected information in the form of a collection of documentation or one-to-one interaction. Analyzing phase is basically: -  Review information.  Analyzing previously identified vulnerabilities results.  Risk Assessment.  Vulnerability and Risk Analysis.  Evaluation of the effectiveness of existing security policies. Evaluation
  • 33. Evaluation-: Evaluation phase includes: -  Inspection of Identified Vulnerabilities.  Identification of flaws, gaps in existing & required Security.  Determination of Security Control required resolving the issues Vulnerabilities.  Identify modification and Upgrades. Generating Report Reporting phase is documentation of draft report required for future, inspection. This report helps identify vulnerabilities in the acquisition phase. Audit and Penetration also require these previously collected reports. When any modification in security mechanism is required, these reports help to design security infrastructure. Central Databases usually holds these reports. Reports contain: - • Task did by each member of the team. Methods & tools used. • Findings. Recommendation. • Collected information from different phases.
  • 35. Penetration Testing Technology 0verview In the Ethical Hacking environment, the most common term that often uses is "pentecter." Pentesters are the penetration tester that has permission to hack a system by owner. Penetration testing is the process of hacking a system with the permission from the owner of that system, to evaluate security, Hack Value, Target of Evaluation (TOE), attacks, exploits, zero-day vulnerability & other components such as threats, vulnerabilities, and daisy chaining. Important for Penetration testing If you want to be ready for an attack, you must be smart, to think like them, act like them. Hackers are skilled, having detailed information of hardware's, software, networking and other related information. The need and importance of penetration testing, in the modern world where variously advanced threat such as Denial-of-service, Identity theft, theft of services, stealing information is common, system penetration ensure to counter the attack from malicious threat by anticipating methods. Some other major advantages and need for penetration testing is to uncover the vulnerabilities in systems and security deployments in the same way an attacker gains access: -
  • 36.  To identify the threats and vulnerabilities to organizations assets.  To provide a comprehensive assessment of policies, procedures, design, and architecture.  To set remediation actions to secure them before they are used by a hacker to breach security.  To identify what an attacker can access to steal.  To identify what information can be theft and its use.  To test and validate the security protection & identify the need for any additional protection layer.  Modification andup-gradation of currently deployment security architecture.  To reduce the expense of IT Security by enhancing Return on Security Investment (ROGI). Types of Penetration Testing Three types of Penetration testing are important to be differentiated because a penetration tester may have asked to perform any of them.
  • 37. Black boxing is designed to demonstrate an emulated situation as an attacker in countering an attack. Gray box Gray box, is a type of penetration testing in which the pentester has very limited prior knowledge of the system or any information of targets such as IP addresses, Operating system or network information in very limited. Gary boxing is designed to demonstrate an emulated situation as an insider might have this information and to counter an attack as the pentester has basic, limited information regarding target. White box The white box is a type of penetration testing in which the pentester has complete knowledge of system and information of the target. This type of penetration is done by internal security teams or security audits teams to perform auditing. Phases of Penetration Testing Penetration testing is a three-phase process. 1- Pre-Attack Phase 2-Attack Phase 3- Post-Attack Phase BIack Box The black box is a type of penetration testing in which the pentester is blind testing or double-blind testing, i.e. provided with no prior knowledge of the system or any information of the target.
  • 38. Security Testing Methodology There are some methodological approaches to be adopted for security or penetration testing. Industry-leading Penetration Testing Methodologies are: - • Open Web Application Gecurity Project (OWAGP) • Open Gource Gecurity Testing Methodology Manual (OGGTMM) • Information Gystems Gecurity Assessment Framework (IGAF) • EC-Council Licensed Penetration Tester (LPT) Methodology
  • 40. Information Security Laws and Standards Payment Card Industry Data Security Standard (PCI-DSS) Payment Card Industry Data Security Standard (PCI-DGG) is a global information security standard by “PGI Security Standard Council,” available for organizations to develop, enhance and assess security standards for handling cardholder information and security standard for payment account security. Founding members of this council are: -  American Express, Discover Financial Services  JCB International  MasterCard  Visa Inc. PCI data security standard deals with basically cardholder data security for debit, credit, prepaid, e-purse, ATM and POG cards. A high-level overview of PCI-DGG provide: -  Secure Network Strong Access Control  Cardholder data security  Regular Monitoring and Evaluation of Network  Maintaining Vulnerability Program Information  security policy IS0/IEC International Organization for Standardization (IGO) and International Electro-Technical Commission (IEC) are organizations that globally develop and maintain their standards. This standard is a revised edition (second) of the first edition IGO/IGE Z7OO1:ZOO5. IGO/IEC Z7OO1:ZO1s cover the following key point in information security: -  Implementation and maintaining Security requirements.  Information security management processes.  Assurance of Cost-effective risk management.
  • 41. Title Majors Title I Public company accounting oversight board Title II Auditor independence Title III Corporate responsibility Title IV Enhanced financial disclosures Title V Analyst conflicts of interest Title VI Commission resources and authority Title VII Gtudies and reports Title VIII Corporate and criminal fraud accountability Title IX White-collar crime penalty enhancements • Status of Information Security Management • Activities. Compliant with laws. Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) was passed in 1PP6 by Congress. HIPAA runs with Department of Health and Human Gervices (HHG) to develop and maintain regulation that associates with privacy and security of health information. HIPAA Gecurity rules ensure what information is protected, additionally, the safeguards that must apply to secure electronic protected health information. The major domains in information security where HIPAA is developing and maintain standards and regulations are: - • Electronic Transaction and Code Gets • Standards Privacy Rules • Security Rules • national Identifier Requirements • Enforcement Rules Sarbanes 0xley Act (S0X) Garbanes Oxley Act (GOX) key requirements or provisions organizes in the form of 11 titles which are as follows: -
  • 42. Title X Corporate tax returns Title XI Corporate fraud and accountability Some other regulatory bodies are offering the standards that are being deployed worldwide including Digital Millennium Copyright Act (DMCA) and Federal Information Gecurity Management Act (FIGMA). DMCA is United Gtates copyright law whereas FIGMA a framework for ensuring information security control effectiveness. According to Homeland Gecurity, FIGMA ZO14 codifies the Department of Homeland Gecurity's role in administering the implementation of information security policies for federal Executive Branch civilian agencies, overseeing agencies' compliance with those policies, and assisting OMB in developing those policies. The legislation provides the Department authority to develop and oversee the implementation of binding operational directives to other agencies, in coordination and consistent with OMB policies and practices. The Federal Information Gecurity Modernization Act of ZO14 amends the Federal Information Gecurity Management Act of ZOOZ(FIGMA). Mind Map