CEH-v13 Module01Section01 - Information Security Overview (Introduction to Ethical Hacking)
CEH-v13 module01Section01 - Information Security Overview
▪ Elements
of Information Security
▪
Information Security Attacks: Motives, Goals, and Objectives
o Motives (Goals)
o Tactics, Techniques, and Procedures (TTPs)
o Vulnerability
▪ Classification
of Attacks
▪ Information
Warfare
Module 01 - Section 01:
1. Information Security
overview
Elements of Information Security
Information security (InfoSec) focuses on safeguarding data from
unauthorized access, alteration, and destruction. Information security is the
practice of protecting information by mitigating information risks. It is part
of information risk management. It typically involves preventing or reducing
the probability of unauthorized or inappropriate access to data or the unlawful
use, disclosure, disruption, deletion, corruption, modification, inspection,
recording, or devaluation of information. It also involves actions intended to
reduce the adverse impacts of such incidents.
Its key elements are:
1. Confidentiality: Ensuring only authorized individuals access sensitive
information.
2. Integrity: Maintaining the accuracy and consistency of data by preventing
unauthorized changes.
3. Availability: Ensuring that information and systems are accessible when
needed by authorized users.
These principles help protect data from threats and ensure its safe handling
across networks and systems.
■ Information security Attacks: Motives, Goals, Objectives
Information security attacks refer to any actions that compromise the
confidentiality, integrity, or availability of information or systems. These
attacks are driven by various motives, with specific goals and objectives.
Here's an overview:
1. Motives
Motives behind information security attacks can vary widely, and they include:
Financial Gain: Attackers may seek to steal money, extort funds (e.g., through
ransomware), or steal sensitive financial data (e.g., credit card numbers,
banking details).
Espionage: This involves stealing sensitive information from organizations,
governments, or individuals, often for political or competitive advantage.
Political or Ideological: Hacktivism involves attacking systems to promote a
political or ideological agenda, sometimes with the intent to disrupt or
embarrass governments, corporations, or groups.
Revenge or Malice: Disgruntled employees or individuals may seek to damage the
reputation of an organization or individual due to personal grievances.
Intellectual Challenge: Some attackers are motivated by the desire to test
their skills or prove their abilities by breaching secure systems.
Terrorism: Cyberterrorists seek to disrupt critical infrastructure or cause
widespread fear and damage.
2. Goals
The goals of an information security attack typically align with the attacker's
motive. Common goals include:
Data Theft: Stealing sensitive data, such as personal identifiable information
(PII), intellectual property, financial records, or trade secrets.
Disruption of Services: Denial-of-service (DoS) and distributed
denial-of-service (DDoS) attacks aim to make systems or services unavailable,
disrupting normal business operations.
System Control: Gaining unauthorized access to systems to control, manipulate,
or use them for malicious purposes, such as launching further attacks.
Reputation Damage: Sabotaging the reputation of an individual or organization
by leaking confidential information or defacing websites.
Financial Extortion: Demanding ransom payments through ransomware attacks,
where data is encrypted or systems are locked until the victim pays.
Sabotage: Disrupting or damaging critical infrastructure (e.g., power grids,
hospitals, or transport systems) to cause widespread harm.
3. Objectives
Attackers often pursue specific objectives to achieve their broader goals:
Exploitation of Vulnerabilities: Attackers search for weak points in systems,
software, or human behavior (social engineering) to exploit them.
Access Privilege Escalation: After initial access, attackers often attempt to
gain higher-level access to expand control within the system.
Data Exfiltration: The process of transferring stolen data from the victim's
network to the attacker's control.
System Disruption: Attacks designed to degrade system performance, crash
applications, or make services unavailable.
Covering Tracks: Attackers often take steps to avoid detection and ensure they
remain undetected for as long as possible, such as by deleting logs or using
encryption.
Monetization: Turning stolen data or control over systems into financial
profit, whether through selling data on the dark web or demanding ransoms.
■ Classification of Attacks
Attacks in the context of cybersecurity can be classified into various types
based on the target, technique, or intent. Below are some common categories of
attacks:
1. Network-Based Attacks
These attacks focus on disrupting or gaining unauthorized access to a network.
Distributed Denial of Service (DDoS): Overwhelms a network with traffic to make
services unavailable.
Man-in-the-Middle (MITM): The attacker intercepts communication between two
parties without their knowledge.
Packet Sniffing: Capturing and analyzing packets transmitted over the network.
2. System-Based Attacks
Attacks that directly target the computer or server systems.
Malware: Malicious software such as viruses, worms, trojans, and ransomware
that can damage or control a system.
Rootkits: Hidden software that gives the attacker privileged access to a
system.
Backdoors: Creating a hidden entry point to access a system later.
3. Application-Based Attacks
These attacks exploit vulnerabilities in software applications.
SQL Injection: Injecting malicious SQL code into a database query to extract or
manipulate data.
Cross-Site Scripting (XSS): Injecting malicious scripts into web applications
viewed by other users.
Buffer Overflow: Overloading a program's buffer to execute arbitrary code.
4. Social Engineering Attacks
These involve manipulating people to divulge confidential information.
Phishing: Sending fraudulent messages to trick users into revealing sensitive
information.
Spear Phishing: A targeted phishing attack aimed at a specific individual or
organization.
Baiting: Offering something tempting (e.g., free software) to trick users into
exposing their systems.
5. Physical Attacks
Attacks that involve physical access or tampering.
Shoulder Surfing: Observing someone’s screen or keyboard to steal information.
Hardware Keyloggers: Devices physically installed on computers to capture
keystrokes.
6. Insider Attacks
These attacks come from individuals within the organization who have access to
sensitive information.
Malicious Insider: A disgruntled employee who abuses their access to cause
damage.
Negligent Insider: An employee who unknowingly exposes systems to risk due to
poor security practices.
7. Advanced Persistent Threats (APTs)
These are long-term attacks where the attacker remains undetected for extended
periods to steal data or disrupt operations.
Espionage: Targeting an organization for data theft, often conducted by
nation-states.
Zero-Day Exploits: Attacking vulnerabilities that are unknown to the vendor,
giving no time to prepare defenses.
Each of these classifications covers a wide array of techniques and methods
used by attackers, and understanding them helps in building robust defense
mechanisms.
■ Information Warfare
Information warfare (IW) refers to the strategic use of information to gain a
competitive advantage over an adversary, typically in a conflict or competition
scenario. It involves manipulating or disrupting an opponent's information
systems, communications, and perception to influence decision-making, weaken
resistance, or cause confusion. Information warfare can occur in both military
and civilian contexts, often overlapping with cyber warfare, psychological
operations, and traditional media manipulation.
Key Elements of Information Warfare:
1. Psychological Operations (PSYOP)
The use of information to influence the attitudes, beliefs, and behaviors of
individuals, groups, or governments. This could involve propaganda,
disinformation, or psychological manipulation aimed at demoralizing or
destabilizing opponents.
Example: Using social media campaigns to spread false information during an
election.
2. Cyber Warfare
The use of digital technologies to attack or defend information systems,
networks, and data.
Example: Hacking into government databases to steal classified information or
disrupt operations.
3. Electronic Warfare (EW)
The use of the electromagnetic spectrum to intercept, disrupt, or disable enemy
communications, radar systems, and other electronic assets.
Example: Jamming an enemy's radar or communications signals to prevent them
from coordinating attacks.
4. Information Operations (IO)
Coordinated use of all forms of information to influence or disrupt adversary
decision-making processes while protecting one's own information systems.
Example: The use of both media manipulation and cyberattacks to create
confusion during a military conflict.
5. Propaganda and Disinformation
Disseminating false or misleading information to manipulate public perception
or decision-making. This can target both the enemy and one's own population.
Example: Spreading fake news through social media to influence public opinion
on a geopolitical conflict.
6. Social Media Manipulation
Using social media platforms to distribute propaganda, disinformation, or
targeted messaging campaigns. This includes creating fake accounts, bots, and
trolls to influence or disrupt discourse.
Example: Coordinating online disinformation campaigns to polarize communities
or sway elections.
7. Economic Information Warfare
Attacking financial systems, intellectual property, or economic infrastructure
to cause economic harm.
Example: Stealing trade secrets or intellectual property to gain a competitive
advantage in global markets.
8. Public Perception Management
Shaping how the public perceives a conflict, event, or organization by
controlling the narrative through media or direct communication.
Example: Governments issuing official statements or using state-controlled
media to influence public opinion during a crisis.
Tactics Used in Information Warfare:
Deception: Creating false information or hiding the truth to mislead an
adversary.
Denial of Service (DoS): Disrupting information systems so that legitimate
users cannot access services.
Hacking: Penetrating networks or databases to obtain sensitive information or
cause disruption.
Spoofing: Imitating someone or something else, such as falsifying emails or
websites, to trick targets.
Misinformation: Accidentally spreading false information.
Disinformation: Deliberately spreading false information to mislead and
confuse.
Applications of Information Warfare:
Military: Information warfare is often used in military conflicts to weaken
enemy forces by disrupting communications, command, and control.
Political: Information warfare is increasingly used in the political arena to
influence elections, control public opinion, and undermine confidence in
institutions.
Economic: Economic sabotage through cyberattacks, theft of intellectual
property, or trade disruption is another form of information warfare.
Example Scenarios:
Cyberattacks on Critical Infrastructure: Attacking power grids or financial
systems during a conflict to cripple the enemy's ability to function.
Election Interference: Using disinformation campaigns, hacking, and social
media manipulation to influence electoral outcomes.
State-Sponsored Disinformation: Governments spreading false narratives to
maintain power or discredit international rivals.
Information warfare is increasingly relevant in modern conflicts as societies
become more dependent on information technology and digital infrastructure.
Both state and non-state actors engage in it to pursue strategic advantages
across various domains.
That's all for this section.
Thank you for joining us today, and we hope you gained valuable insights into the world of Ethical Hacking. Stay safe and secure online!
0 Comments: