msc-computer-science-notes

MSC Cyber Security Threats Lesson Notes

Overview

Module Weekly Outcomes (WLOs)

At the end of specific units, you will be able to:

Week 1 Learning Outcomes

Week 2 Learning Outcomes

Week 3 Learning Outcomes

Week 4 Learning Outcomes

Week 5 Learning Outcomes

Week 6 Learning Outcomes

Week 7 Learning Outcomes

WEEK 1

Main Topics

Sub titles:

Definitions

Terminology

Threats and Risks

Risk Modelling and Assessment

Working with BS7799-3 and ISO/IEC 27001

Activity 1 : Establishing context

Why do this?

</br>alt text</br>

Activity 2: Establishing the ISMS boundary

Activity 3: Identifying consequences

WEEK 2

Main Topics

Sub titles:

Human factors

The Web—User Side

Browser Attacks

Authentication

Activities

2-factor authentication (2FA)

Trust in the site

Protecting Web Sites Against Change

Malicious Web Content

Protecting Against Malicious Web Pages

Google’s “site:” search operator

Other web flaws

Cross-Site Scripting

SQL Injection

Dot-Dot-Slash

Server-Side Include

Social Engineering and attacks on the wetware

Fake Email

Fake Email Messages as Spam

Phishing

SPF (Sender Policy Framework)

DKIM (Domain Keys Identified Mail)

DMARC (Domain-based Message Authentication Reporting and Conformance)

</br>alt text</br> </br>alt text</br>

WEEK 3

Main Topics

Sub titles:

*

Networks and networked services

Network Transmission Media

Protocol Layers

Addressing and Routing

Attacks on networks and networked services

Threats to Network Communications

Interception: Eavesdropping and Wiretapping

Modification, Fabrication: Data Corruption

Modification Attacks in General

Interruption: Loss of Service

Port Scanning

Wireless Network Security

Vulnerabilities in Wireless Networks

Failed Countermeasure: WEP (Wired Equivalent Privacy)

Stronger Protocol Suite: WPA (WiFi Protected Access)

Attacks on WPA

Denial of Service

How Service Is Denied

Flooding Attacks in Detail

Network Flooding Caused by Malicious Code

</br>alt text</br>

</br>alt text</br>

</br>alt text</br>

Denial of Service by Addressing Failures

Traffic Redirection

DNS Attacks

Physical Disconnection

Distributed Denial-of-Service

Scripted Denial-of-Service Attacks

Bots

Botnets

Malicious Autonomous Mobile Agents

Cryptography in Network Security

Network Encryption

</br>alt text</br>

Browser Encryption

</br>alt text</br> </br>alt text</br>

Onion Routing

IP Security Protocol Suite (IPsec)

Virtual Private Networks

</br>alt text</br> </br>alt text</br>

System Architecture

Firewalls

Design of Firewalls:

Types of Firewalls

</br>alt text</br>

Comparison of Firewall Types

</br>alt text</br>

Intrusion Detection and Prevention Systems

Types of IDSs

Intrusion Prevention Systems

Intrusion Response

Goals for Intrusion Detection Systems:

IDS Strengths and Limitations

Network Management

Management to Ensure Service

Security Information and Event Management (SIEM)

Discussion: Port scanning

Tripwire

WEEK 4

Main Topics

Sub titles:

*

Encryption

Cryptography

Problems Addressed by Encryption

Terminology

Encryption Keys

DES: The Data Encryption Standard

AES: Advanced Encryption System

Public Key Cryptography

</br>alt text</br>

Public Key Cryptography to Exchange Secret Keys

Symmetric and Asymmetric encryption

GPG/PGP email encryption

Activity: SSL/TLS certificates

Step 1 : Establish yourself as a certification authority

Step 2 : Creating a server certificate.

Https

WEEK 5

Main Topics

Sub titles:

*

Intro

Security Requirements of Databases

Reliability and Integrity

Database Disclosure

Sensitive Data:

Types of Disclosures:

Preventing Disclosure: Data Suppression and Modification

Security Versus Precision

Exercises : SQL

Inferences

Complex queries

Discusions

Cloud storage

Cloud Computing Concepts

Risk Analysis while Moving Cloud

Cloud Security Tools and Techniques

Cloud Application Security

Cloud Identity Management

Security Assertion Markup Language (SAML)

OAuth

OAuth for Authentication (OpenID Connect)

Securing IaaS

Summary Cloud

WEEK 7

Main Topics

Sub titles:

*

Returning to risk assessment

Estimating & accepting risk

Estimating

</br>alt text</br> </br>alt text</br> </br>alt text</br> </br>alt text</br>

Accepting risk

7.4.1 Activity: Risk acceptance criteria

</br>alt text</br> </br>alt text</br> </br>alt text</br>

Activity: Model response

Scenario risk assessment

SUMMARY

Risk Assasment

OWASP Risk Rating Methodology

Step 1: Identifying a Risk Step 2: Factors for Estimating Likelihood Step 3: Factors for Estimating Impact Step 4: Determining Severity of the Risk Step 5: Deciding What to Fix Step 6: Customizing Your Risk Rating Model

1) Establishing the context

identfying threats

2) Establishing the ISMS boundary

3) Identifying consequences