Cyber Security Process

iNTRODUCTION

Attacker attacks the victim throw vulnerabilities to cause threats, so:

  1. Threat is any potential occurrence, malicious or otherwise, that could harm an asset. In other words, a threat is any bad thing that can happen to your assets.

  2. Vulnerability is a weakness that makes a threat possible.

  3. Attack is an action that exploits a vulnerability or enacts a threat.

  4. Asset: A resource of value such as the data in a database or on the file system, or a system resource

  5. Countermeasure. A safeguard that addresses a threat and mitigates risk

What Is OWASP?


The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security. One of OWASP’s core principles is that all of their materials be freely available and easily accessible on their website, making it possible for anyone to improve their own web application security. The materials they offer include documentation, tools, videos, and forums. Perhaps their best-known project is the OWASP Top 10.

sECURITY rEQUIREMENTS

This section is to determine how security requirements can be detected.

As we mention in the opposite graph:

  1. Generate abuse cases from Use cases

  2. Risk assessment

  3. Risk based security test

  4. Penetration testing

  5. Feedback

Top 10 Vulnerabilities

The OWASP Top 10 is a regularly-updated report outlining security concerns for web application security, focusing on the 10 most critical risks. The report is put together by a team of security experts from all over the world. OWASP refers to the Top 10 as an ‘awareness document’ and they recommend that all companies incorporate the report into their processes in order to minimize and/or mitigate security risks.

  1. Injection

  2. Broken Authentication

  3. XXE: XML External entities

  4. Sensitive data exposure

  5. Security Misconfiguration

  6. In-Secure deserialization

  7. Broken Access control

  8. Cross-site scripting

  9. Insufficient Logging and monitoring

  10. Using components with known vulnerabilities

Cyber Security Layers

  1. Mission Critical Assets

  2. Data Security

  3. Application Security

  4. End point Security

  5. Network Security

  6. Perimeter Security

  7. Human Layer

sECURITY aCRONYM

  1. Fixation : It’s an attack that hacker can steal your session ID and use it in executing http requests

  2. XSS : Cross site scripting

  3. CSRF: Cross-Site Request forgery is an attack where a malicious site sends a request to a vulnerable site where the user is currently logged in.

  4. Hijacking : To steal something from the client or the server

  5. Brute-Force: Attacker trying many passwords or passphrases with the hope of eventually guessing correctly. Can be resolved by delaying the repetitive trials and block the incoming IPs from IIS

  6. Tampering: Means attacker trails for changing the parameters values in order to do something

  7. Sniffing : It’s the act of monitoring traffic on the network for data such as plaintext passwords or configuration information. With a simple packet sniffer, an attacker can easily read all plaintext traffic. Also, attackers can crack packets encrypted by lightweight hashing algorithms and can decipher the payload that you considered to be safe. The sniffing of packets requires a packet sniffer in the path of the server/client communication. SSL is the key countermeasure. The attacker place packet-sniffing tool on the network to monitor the traffic.


Core Procedures

  1. Front End Security

  2. Communication Security

  3. Backend Security

  4. Database Security

  5. Infrastructure security

Procedure In Depth

Video Library