Sunday, February 12, 2012

C|EH Notes: Top Security Challenges

Essential Terminologies:
  • Hack Value: It is the notion among hackers that something is worth doing or is interesting.
  • Target of Evaluation: An IT system, product, or component that is identified/subjected to a required security evaluation.
  • Attack: An assault on the system security derived from an intelligent threat.  An attack is any action violating security.
  • Threat: an action or event that might compromise security.  A threat is a potential violation of security.
Security Challenges:
  • Compliance to government laws and regulations.
  • Evolution of technology focused on ease of use.
  • Increased number of network-based applications.
  • Increasing complexity of computer infrastructure administration and management.
  • It is difficult to centralize security in a distributed computing environment.
  • Direct impact of security breach on corporate asset base and goodwill.
Top Security Challenges:
  1. Increase in sophisticated cyber criminals.
  2. Data leakage, malicious insiders, and remote workers.
  3. Mobile security, adaptive authentication, and social media strategies.
  4. Cyber security workforce.
  5. Exploited vulnerabilities, operationalizing security.
  6. Critical infrastructure protection.
  7. Balancing sharing with privacy requirements.
  8. Identity access strategies and lifecycle.
List of Security Risks:
  1. Trojans/Info Stealing/Keyloggers
  2. Fast Flux Botnets
  3. Data Loss/Breaches
  4. Internal Threats
  5. Organized Cyber Crime
  6. Phishing/Social Engineering
  7. New emerging viruses
  8. Cyber Espionage
  9. Zero-Day Exploits
  10. Web 2.0 Threats
  11. Phishing attacks
  12. Identity black market
  13. Cyber-extortion
  14. Transportable data (USB, laptops, backup tapes)
  15. "Zombie" networks
  16. Exploits in new technology
  17. Outsourcing projects
  18. Social networking
  19. Business interruption
  20. Virtualization and cloud Computing
Application Security Attacks:
  • Phishing
  • Session hijacking
  • Man-in-the-middle attack
  • The Web Parameter Tampering attack - is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products.
  • Directory traversal attacks - the goal of this attack is to order an application to access a computer file that is not intended to be accessible. This attack exploits a lack of security (the software is acting exactly as it is supposed to) as opposed to exploiting a bug in the code.  Also known as the ../ (dot dot slash) attack.
    • Canonicalization (c14n) - a process for converting data that has more than one possible representation into a "standard", "normal", or canonical form.
Vulnerability Research Websites:

No comments:

Post a Comment