SlideShare a Scribd company logo
5
Most read
6
Most read
7
Most read
1
The 7 Layers of Cyber Security
& Vulnerabilities
Module 8
Module 8 Agenda
➢Finish Module 7 Activity 2
➢The 7 Layers of Cyber Security
➢Malware
➢Vulnerabilities
2
Copyright 2021 Iowa State University
Module 7 Activity 2
- Each team, take about 10 to 20 minutes to finish up
Module 7 Activity 2
Copyright 2021 Iowa State University 3
The 7 Layers of
Cyber Security
Copyright 2021 Iowa State University 4
The 7 Layers of Cyber Security
1. Mission Critical Assets
- This is the data that is being protected. Any asset an organization
cannot function without (computers, software and data).
1. Data Security
- Protecting your systems at this level would entail establishing
reliable backups to save data, encryption of your data, and other
policies such as Two-Factor Authentication (usernames &
passwords).
1. Application Security
- The testing and adding of application features to prevent and patch
vulnerabilities.
- Routine updating of applications and software to not leave any
system open to an old exploit.
1. Endpoint Security
- Protects the connection between the network and its devices
- We can implement endpoint security through the use of antivirus
software, web content filtering, and application controls.
Copyright 2021 Iowa State University 5
The 7 Layers of Cyber
Security
5. Network Security
- At this layer, we are concerned with the breadth of access a user has
within a network. It would be dangerous to grant every employee
root access.
- We need to provide people with the minimum amount of “user
privilege” possible for them to do their job and nothing more.
6. Perimeter Security
- Prevents suspicious activity from entering the network by protecting
the gateway with firewalls, data encryption, anti-virus software.
- Monitors and secures devices that transmit data outside of the walls
of your network.
7. The Human Layer
- Being aware of human threats like spamming, phishing, and any
other clever form of social engineering.
Copyright 2021 Iowa State University 6
The 7 Layers of Cyber
Security
Copyright 2021 Iowa State University 7
Malware
Copyright 2021 Iowa State University 8
Malware
Malware: Malicious Software. Malicious code scripts, files,
or programs that aim to deceive, manipulate or spy on the
target user without their knowledge.
• Malware comes in different forms, and not limited to
- Worms, Trojan Horses, Viruses, Keyloggers, Scareware
Another way to define malware is to know that malware is any
software that compromises confidentiality, integrity, and
availability of your computers.
- Confidentiality: No unauthorized reading
- Integrity: No unauthorized writing
- Availability: System are accessible, ready to use
Copyright 2021 Iowa State University 9
Malware
Malware Propagation Methods:
• Worms
- Worms are able to self-replicate, without the need for human
interaction.
• Computer Viruses
- Requires a human to spread. Usually hidden and embedded within
an application or other software.
• Social Engineering
- Also referred to as “human hacking”, involves taking advantage of
the human element to gain access to unauthorized systems.
• Malicious Websites
- Sometimes trustworthy websites can contain dangerous content.
• Trojan Horses
- A malicious function contained within a seemingly benign product.
Copyright 2021 Iowa State University 10
Malware
Malware Vessels:
• Removable Media (USB flash-drives)
• Internet Downloads
• E-mail Attachments
• Corrupt Files
• An unsuspecting user
Modern cyber attacks will implement a variety of these methods and
those mentioned on the previous slide to successfully infiltrate the target.
11
Malware
Copyright 2021 Iowa State University 12
Video: Varieties of Malware by
IowaCyber
https://www.youtube.com/watch?v=pFETP9CAJj4
Malware
Malware Triggers:
Triggers are the mechanism that activates the “core” or
payload of malware. Examples of triggers include but are
not limited to:
• Time
• System configuration settings
• Existence of certain files or folders
• Current software version
• A specific human user action
• Failure to comply with ransomware demands
13
Malware
Malware Payloads:
A payload could be considered malware’s purpose. What is
it setting out to accomplish? Examples include:
• Destruction of data
• Data encryption
• Spy on the target
• Bring down a website by keeping people from accessing it,
through a denial of service attack
• Cause real-world harm, in the case of attacking hospitals
• Install a backdoor
• Zombify your computer
14
Vulnerabilities
Copyright 2021 Iowa State University 15
Vulnerabilities
By using some of the propagation methods previously
described, hackers can intrude and embed malware
through vulnerabilities.
● Vulnerabilities are weaknesses within a computer
system that compromise systems under attack. They can
occur throughout the system’s. . .
- Design
- Implementation
- Configuration
Copyright 2021 Iowa State University 16
Vulnerabilities
● Design Vulnerability: flaws in the design of the
computer or software that bypass security.
● Implementation Vulnerability: errors within
implemented software. (installed improperly)
● Configuration Vulnerability: user configures the
system incorrectly or uses defaults. (not changing
default password/using weak passwords)
Copyright 2021 Iowa State University 17
Vulnerabilities
How to check for vulnerabilities?
Penetration testing (Pen test):
● Simulated cyber attack against a computer system to
check for vulnerabilities (test run)
● Provides insight on weak parts of a system that need to
be patched up
● Used to ensure that a system is secure and reliable
● Allows for vulnerabilities to be detected and fixed
before the system is compromised by attackers
Copyright 2021 Iowa State University 18
Vulnerabilities
Steps of a pen test (Optional video)
Copyright 2021 Iowa State University 19
https://youtu.be/b7jW9X9UqiY
Vulnerabilities
● As we learned in the video, passive reconnaissance is
the first active step of a pen test.
● Passive reconnaissance is the action of acquiring and
analyzing as much publicly available information as
possible without interacting in any way with the target.
○ This gives the attacker the opportunity to identify
potentially vulnerable and misconfigured systems for
physical attacks. Additionally, it could potentially
provide sensitive information that might allow for
impersonation, exploitation, or blackmail.
You will be practicing passive reconnaissance in Activity 1
Copyright 2021 Iowa State University 20
To Do
● Have Module 7 Activity 1 Completed
● Complete Module 8 Activity 1
● Complete Module 8 Activity 2
21
Copyright 2021 Iowa State University
End of Module 8!
What questions do you have?
Next Module Topic:
Web Vulnerabilities
22
Copyright 2021 Iowa State University
Questions?
Contact Innovate-IT support staff!
email:
innovate_it@iastate.edu
Your school’s IP-Range can be found at:
http://www.it-adventures.org/ip-ranges/
23

More Related Content

PPTX
INTRODUCTION CB start Cyber Security.pptx
PPT
Information Technology Security Basics
PPT
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
PDF
Chapter 8
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
PPTX
Chapter 5.pptx
PDF
l_02sec.pdf
INTRODUCTION CB start Cyber Security.pptx
Information Technology Security Basics
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Chapter 8
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Chapter 5.pptx
l_02sec.pdf

Similar to The 7 layers of cybersecurity and vulnerabilities (20)

PPTX
Computer-Security.pptx
PPTX
Internet worm-case-study
PPT
Internet worms definitions and strategies to avoid it.
PPTX
Application security
PPT
Chapter1 intro network_security_sunorganised
DOCX
Information security questions
PDF
Presentation about security i.t.
PDF
Presentation about security I.T.
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PDF
How To Defeat Advanced Malware. New Tools for Protection and Forensics
PPTX
LIS3353 SP12 Week 9
PDF
PDF
Cscu module 03 protecting systems using antiviruses
PPTX
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
PPT
Security Of Information Assets and why it matters.ppt
PPT
IT-Security Awareness and Training session
PDF
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
PPT
IT-Security-20210426203847.ppt
PPT
IT-Security-20210426203847.ppt
PPT
IT-Security-20210426203847.ppt
Computer-Security.pptx
Internet worm-case-study
Internet worms definitions and strategies to avoid it.
Application security
Chapter1 intro network_security_sunorganised
Information security questions
Presentation about security i.t.
Presentation about security I.T.
RRB JE Stage 2 Computer and Applications Questions Part 5
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
LIS3353 SP12 Week 9
Cscu module 03 protecting systems using antiviruses
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Security Of Information Assets and why it matters.ppt
IT-Security Awareness and Training session
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
IT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
Ad

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Lesson notes of climatology university.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Complications of Minimal Access Surgery at WLH
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
master seminar digital applications in india
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Cell Structure & Organelles in detailed.
GDM (1) (1).pptx small presentation for students
Final Presentation General Medicine 03-08-2024.pptx
Lesson notes of climatology university.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Complications of Minimal Access Surgery at WLH
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Computing-Curriculum for Schools in Ghana
202450812 BayCHI UCSC-SV 20250812 v17.pptx
RMMM.pdf make it easy to upload and study
Chinmaya Tiranga quiz Grand Finale.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Yogi Goddess Pres Conference Studio Updates
Orientation - ARALprogram of Deped to the Parents.pptx
master seminar digital applications in india
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Weekly quiz Compilation Jan -July 25.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Ad

The 7 layers of cybersecurity and vulnerabilities

  • 1. 1 The 7 Layers of Cyber Security & Vulnerabilities Module 8
  • 2. Module 8 Agenda ➢Finish Module 7 Activity 2 ➢The 7 Layers of Cyber Security ➢Malware ➢Vulnerabilities 2 Copyright 2021 Iowa State University
  • 3. Module 7 Activity 2 - Each team, take about 10 to 20 minutes to finish up Module 7 Activity 2 Copyright 2021 Iowa State University 3
  • 4. The 7 Layers of Cyber Security Copyright 2021 Iowa State University 4
  • 5. The 7 Layers of Cyber Security 1. Mission Critical Assets - This is the data that is being protected. Any asset an organization cannot function without (computers, software and data). 1. Data Security - Protecting your systems at this level would entail establishing reliable backups to save data, encryption of your data, and other policies such as Two-Factor Authentication (usernames & passwords). 1. Application Security - The testing and adding of application features to prevent and patch vulnerabilities. - Routine updating of applications and software to not leave any system open to an old exploit. 1. Endpoint Security - Protects the connection between the network and its devices - We can implement endpoint security through the use of antivirus software, web content filtering, and application controls. Copyright 2021 Iowa State University 5
  • 6. The 7 Layers of Cyber Security 5. Network Security - At this layer, we are concerned with the breadth of access a user has within a network. It would be dangerous to grant every employee root access. - We need to provide people with the minimum amount of “user privilege” possible for them to do their job and nothing more. 6. Perimeter Security - Prevents suspicious activity from entering the network by protecting the gateway with firewalls, data encryption, anti-virus software. - Monitors and secures devices that transmit data outside of the walls of your network. 7. The Human Layer - Being aware of human threats like spamming, phishing, and any other clever form of social engineering. Copyright 2021 Iowa State University 6
  • 7. The 7 Layers of Cyber Security Copyright 2021 Iowa State University 7
  • 8. Malware Copyright 2021 Iowa State University 8
  • 9. Malware Malware: Malicious Software. Malicious code scripts, files, or programs that aim to deceive, manipulate or spy on the target user without their knowledge. • Malware comes in different forms, and not limited to - Worms, Trojan Horses, Viruses, Keyloggers, Scareware Another way to define malware is to know that malware is any software that compromises confidentiality, integrity, and availability of your computers. - Confidentiality: No unauthorized reading - Integrity: No unauthorized writing - Availability: System are accessible, ready to use Copyright 2021 Iowa State University 9
  • 10. Malware Malware Propagation Methods: • Worms - Worms are able to self-replicate, without the need for human interaction. • Computer Viruses - Requires a human to spread. Usually hidden and embedded within an application or other software. • Social Engineering - Also referred to as “human hacking”, involves taking advantage of the human element to gain access to unauthorized systems. • Malicious Websites - Sometimes trustworthy websites can contain dangerous content. • Trojan Horses - A malicious function contained within a seemingly benign product. Copyright 2021 Iowa State University 10
  • 11. Malware Malware Vessels: • Removable Media (USB flash-drives) • Internet Downloads • E-mail Attachments • Corrupt Files • An unsuspecting user Modern cyber attacks will implement a variety of these methods and those mentioned on the previous slide to successfully infiltrate the target. 11
  • 12. Malware Copyright 2021 Iowa State University 12 Video: Varieties of Malware by IowaCyber https://www.youtube.com/watch?v=pFETP9CAJj4
  • 13. Malware Malware Triggers: Triggers are the mechanism that activates the “core” or payload of malware. Examples of triggers include but are not limited to: • Time • System configuration settings • Existence of certain files or folders • Current software version • A specific human user action • Failure to comply with ransomware demands 13
  • 14. Malware Malware Payloads: A payload could be considered malware’s purpose. What is it setting out to accomplish? Examples include: • Destruction of data • Data encryption • Spy on the target • Bring down a website by keeping people from accessing it, through a denial of service attack • Cause real-world harm, in the case of attacking hospitals • Install a backdoor • Zombify your computer 14
  • 15. Vulnerabilities Copyright 2021 Iowa State University 15
  • 16. Vulnerabilities By using some of the propagation methods previously described, hackers can intrude and embed malware through vulnerabilities. ● Vulnerabilities are weaknesses within a computer system that compromise systems under attack. They can occur throughout the system’s. . . - Design - Implementation - Configuration Copyright 2021 Iowa State University 16
  • 17. Vulnerabilities ● Design Vulnerability: flaws in the design of the computer or software that bypass security. ● Implementation Vulnerability: errors within implemented software. (installed improperly) ● Configuration Vulnerability: user configures the system incorrectly or uses defaults. (not changing default password/using weak passwords) Copyright 2021 Iowa State University 17
  • 18. Vulnerabilities How to check for vulnerabilities? Penetration testing (Pen test): ● Simulated cyber attack against a computer system to check for vulnerabilities (test run) ● Provides insight on weak parts of a system that need to be patched up ● Used to ensure that a system is secure and reliable ● Allows for vulnerabilities to be detected and fixed before the system is compromised by attackers Copyright 2021 Iowa State University 18
  • 19. Vulnerabilities Steps of a pen test (Optional video) Copyright 2021 Iowa State University 19 https://youtu.be/b7jW9X9UqiY
  • 20. Vulnerabilities ● As we learned in the video, passive reconnaissance is the first active step of a pen test. ● Passive reconnaissance is the action of acquiring and analyzing as much publicly available information as possible without interacting in any way with the target. ○ This gives the attacker the opportunity to identify potentially vulnerable and misconfigured systems for physical attacks. Additionally, it could potentially provide sensitive information that might allow for impersonation, exploitation, or blackmail. You will be practicing passive reconnaissance in Activity 1 Copyright 2021 Iowa State University 20
  • 21. To Do ● Have Module 7 Activity 1 Completed ● Complete Module 8 Activity 1 ● Complete Module 8 Activity 2 21 Copyright 2021 Iowa State University
  • 22. End of Module 8! What questions do you have? Next Module Topic: Web Vulnerabilities 22 Copyright 2021 Iowa State University
  • 23. Questions? Contact Innovate-IT support staff! email: innovate_it@iastate.edu Your school’s IP-Range can be found at: http://www.it-adventures.org/ip-ranges/ 23