Print Friendly, PDF & Email

Cybersecurity Tutorial

Cybersecurity tutorial walks you through the steps and procedures of implementing Cybersecurity. This tutorial is a general guideline for Cybersecurity presenting an overview to all aspects of cybersecurity.

The Lifecycle of An Attack

Attack strategies have evolved since the old days, instead of a direct attack towards a valuable server or asset, the attackers take their time to perform multi-layer process that mixes exploits, malware, and evasion into an uncompleted corresponding network attack. For instance, an attack usually starts with tempting a person to open an infected link. The resulting page distantly manipulates the individual, obtains source access on the user’s computer, and downloads malware to the user’s computer in the background. Such malware later behaves as a control point within the network, enabling the attacker to expand the attack by discovering other resources in the internal network, rising opportunities on the infected machine, and/or creating unauthorized administrative accounts.

cybersecurity tutorial

The essence is that in place of malware and network manipulates being independent controls as they were previously, they are now combined into a developing process. Moreover, malware or an exploit is not the final step unto itself, but allows the next step of an escalating complex attack plan. Malware, which is adjusted to inhibit identification, offers a distinct attacker with a mechanism of persistence, and the network allows the malware to adjust and responds to the environment it has affected. Main elements of the progressive attack strategy compromises of infection, persistence, communication, command, and control.

  1. Cyber Infection

Infection often has a social aspect, such as getting users to click on a bad link in a phishing e-mail, luring them to a social networking site, or sending them to a web page with an infected image, for instance.

It is crucial to comprehend how really malware and exploits have become so combined in the sophisticated attack lifecycle. Exploits targeted vulnerabilities on servers that were directly directed. Most exploits nowadays are applied to break a planned system to affect it with malware: an exploit is run, resulting in a buffer overflow, allowing the attacker to receive shell access. With shell access, the attacker can provide almost any payload. The first step would be to exploit the target, then bring the malware in the background across the use or link that is now exposed. This is considered as a drive-by-download and is different from the most usual delivery systems for complicated malware today.

  1. Cyber Persistence

Once a target system is under attack, the attacker requires certifying persistence, which is the flexibility or survivability of his position in the network. In order to do that, rootkits and bootkits are usually implemented on the affected machines. A rootkit is defined as malware that offers authorized access to a computer. A bootkit is considered as a kernel-mode variant of a rootkit, normally applied to attack computers that are secured by full-disk encryption.

Backdoors allow an attacker to detour normal verification protocols to obtain admission to a compromised system. Backdoors are sometimes implemented as failover in case other malware is identified and eliminated from the system.

Finally, anti-AV malware can be established to deactivate any legally installed antivirus software on the compromised machine, thus inhibiting automatic identification and elimination of malware that is consequently mounted by the attacker. Many anti-AV programs operate by corrupting the Master Boot Record (MBR) of a target machine.

  1. Communication

Communication is essential to an effective APT. In other words, if you can’t interact, then organizing a long-term complicated attack is almost impossible. Attackers must be able to interact with other being-attacked systems or controllers to make command and control possible, and to get out the stolen information from a target mechanism or network. Attack communications must be sneaky and not elevate any wariness on the network. This traffic is normally obscured or latent across techniques that include:

  • Encryption with SSL, SSH (Secure Shell), or some other custom application.
  • Circumvention through proxies, remote desktop access tools, or by channeling applications throughout other legit applications or procedures.
  • Port evasion by the use of network anonymizers or port hopping to channel over open ports.
  • Fast Flux (or Dynamic DNS) to proxy within several infected hosts, redirect traffic, and make it extremely difficult for scientific teams to discover where the traffic is truly heading.
  1. Command and Control

Command and control ensure that the attack is under control, manageable, and updateable. Such is often achieved via normal applications including webmail, social media, P2P networks, blogs, and message boards. Command-and-control traffic doesn’t project or increase suspicion, but is encrypted and regularly applies backdoors and proxies.

The Central Role of Malware

Attack techniques have grown and malware now has a great impact on a primary role in the cybercriminal’s armory and in the lifecycle of an attack. Attackers have established new techniques for bringing in malware, hiding malware communications (with encryption), and inhibiting traditional signature-based identification.

Key Security Points

  • Communication is the most vital requirement to an attack.
  • The framework, more than the functionality, is the threat
  • Threats present across multiple disciplines, so must be the security
  • Security must expand outside the boundaries

Malware Main Characteristics

  • Dispersed and flaw-resistant
  • Multifunctional
  • Insistent and smart

Threats to the Enterprise

  • Targeted intrusions
  • Distributed denial-of-service attack (DDoS)
  • Botnets

Malware Delivery Applications

  • File transfer apps
  • Instant messaging
  • Webmail
  • Social media platforms
  • Micro-blogging
  • Workflow and collaboration applications

Tricks to Hide

  • Nonstandard ports and port hopping
  • SSL encryption
  • Tunneling
  • Proxies
  • Anonymizers and circumventors
  • Encoding and obfuscation

Ineffective Conventional Network Controls

  • Firewalls
  • Intrusion prevention
  • Proxies

Implementing Next-Generation Firewalls

  • Reducing the attack surface
  • Controlling advanced malware-enabling applications
  • Actively testing unknown files
  • Preventing application of circumventors
  • Investigating any unknown traffic

Smart Protective Policies

  • Application controls
  • User controls
  • Network controls
  • Endpoint controls

Best Practices for Controlling Advanced Persistent Threat (APTs)

  1. Making sure of the visibility
  2. Limiting high-risk applications
  3. Selectively decrypting and reviewing SSL traffic
  4. Blocking URLs famous to host malware and exploits
  5. Implementing drive-by-download protection
  6. Blocking known exploits and malware
  7. Restricting traffic for usual applications to default ports
  8. Examining network and application events in context
  9. Investigating the unknowns

How Can You Learn More About Cybersecurity?

TONEX offers a range of various hands-on training course in the field of cybersecurity:

Industrial Control System and SCADA Cybersecurity Training

Critical Infrastructure Protection (CIP) NERC Training

Cryptography Training

Cyber Security certificate- Part 1 Vulnerabilities and Risk Management

Cybersecurity Systems Engineering Training

Cybersecurity Test and Evaluation (T&E) Training

Electric Grid Cyberseucrity Master Certification

Fundamentals of Malwares And Protection Against Malware Training

Fundamentals of Threats And Risk Management Training

Hardware Security Training By TONEX

ICS Cybersecurity Training

Information Security and Risk Management Training

Introduction to Hacking Training

Introduction to Secure Software Engineering Training

Network Security Training

Smart Grid Cybersecurity Training

Software Security Training

Software Testing Training

Threat Simulation and Modeling Training

Usable Security Fundamental Training

Web Security Training

Cybersecurity Tutorial

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.