Cisco - CyberOps Associate - Module 01 - The Danger

Arthur Salmon
10 Jan 202127:35

Summary

TLDRThis video course introduces the Cyber Ops Associate Version One, focusing on skills and knowledge for security analysts at security operations centers. It covers the Cisco 200-201 certification, exploring the fundamentals of cybersecurity operations. The course delves into threat actors, their motivations, and the potential impact of cyber threats. It discusses the anatomy of cyber attacks, the kill chain, and the importance of protecting sensitive information like PII, PHI, and PSI. The course also touches on the growing concerns of ransomware and targeted attacks on critical infrastructure, highlighting the evolving nature of cyber threats.

Takeaways

  • 🔒 The course aims to prepare learners for the Cisco 200-201 certification, focusing on cybersecurity operations fundamentals.
  • 🌐 The script discusses the dangers to networks, including war stories and the impact of threats, emphasizing potential rather than direct impact.
  • 📡 The 'evil twin' attack is highlighted as a common method where hackers set up rogue Wi-Fi networks to intercept data.
  • 💸 Ransomware is a growing concern, with companies either paying ransoms or losing data, depending on their ability to survive without the compromised data.
  • 🏭 The script addresses the vulnerability of key infrastructure to cyber attacks, such as power plants and water systems.
  • 🔍 The 'kill chain' model of cyber attacks is introduced, detailing the steps from reconnaissance to obfuscation.
  • 🔑 The script explains the anatomy of a seven-phase cyber attack, including reconnaissance, weaponization, delivery, exploitation, command and control, internal reconnaissance, and maintaining access.
  • 👨‍💼 Four main types of threat actors are identified: cyber criminals, hacktivists, state-sponsored attackers, and insider threats.
  • 💼 The purposes of hacking are varied, including financial gain, protest, espionage, and sabotage.
  • 🏢 The importance of protecting Personally Identifiable Information (PII), Protected Health Information (PHI), and Personal Security Information (PSI) is emphasized due to their value and sensitivity.
  • 🚨 The consequences of data breaches can be severe, leading to loss of competitive advantage, legal violations, and erosion of trust in the affected organization.

Q & A

  • What is the main goal of the Cisco 200-201 certification course?

    -The main goal of the Cisco 200-201 certification course is to prepare learners for understanding the Cisco cyber security operation fundamentals, known as CBROPS.

  • What are the potential consequences of connecting to a rogue wireless network, also known as an 'evil twin'?

    -Connecting to an evil twin network can lead to all of your online activities being monitored and sensitive data, including HTTPS sessions, being stripped of encryption and made readable to the attacker.

  • What is ransomware and how does it impact a company?

    -Ransomware is a type of malware that encrypts a company's data and demands a ransom for its release. It can significantly impact a company by disrupting operations, potentially leading to data loss, and forcing the company to decide whether to pay the ransom or risk losing access to critical data.

  • How can targeted attacks on key infrastructure, such as power plants and water systems, affect a city or region?

    -Targeted attacks on key infrastructure can lead to severe disruptions in essential services, potentially causing water shortages, power outages, and other critical failures that can endanger public safety and the economy of a city or region.

  • What is the 'kill chain' and how does it relate to cyber attacks?

    -The 'kill chain' is a model that describes the stages of a cyber attack, which typically includes reconnaissance, weaponization, delivery, exploitation, command and control, internal reconnaissance, and maintaining access. Understanding this chain helps in developing strategies to prevent or mitigate cyber attacks.

  • What are the four main types of threat actors mentioned in the script?

    -The four main types of threat actors mentioned are cyber criminals, hacktivists, state-sponsored attackers, and insider threats.

  • Why might a hacker target an organization for financial gain?

    -A hacker might target an organization for financial gain to access sensitive information such as banking details or medical records, which can be sold or used to extort money from the organization or individuals.

  • What is the significance of PII, PHI, and PSI in the context of cyber security?

    -PII (Personally Identifiable Information), PHI (Protected Health Information), and PSI (Personally Security Information) are types of data that are often targeted by cybercriminals. Protecting these is crucial as their compromise can lead to identity theft, financial fraud, and loss of trust in the organization holding the data.

  • How can the compromise of PII, PHI, or PSI impact an organization's competitive advantage?

    -The compromise of PII, PHI, or PSI can lead to a loss of competitive advantage by damaging the organization's reputation, leading to loss of customer trust, potential legal penalties, and the potential for competitors to gain an edge through the theft of intellectual property.

  • What are some of the motivations behind hacktivism and how does it manifest?

    -Hacktivism is motivated by ideological differences, where hackers use their skills to publicly protest against perceived injustices. This can manifest through activities such as leaking sensitive information, defacing websites, or launching DDoS attacks to disrupt services of organizations that the hacktivist opposes.

  • How can IoT devices become a gateway for threat actors to enter a network?

    -IoT devices can become a gateway for threat actors because they are often connected to the internet but not always updated with the latest security patches. This makes them vulnerable to exploitation, potentially allowing attackers to gain access to the network through these devices.

Outlines

00:00

🔒 Introduction to Cyber Ops Associate Course

The video introduces the Cyber Ops Associate course, designed to equip security analysts with the skills needed for a Security Operations Center. It aims to prepare viewers for the Cisco 200-201 certification, focusing on cybersecurity fundamentals. The course begins with an exploration of network dangers, including war stories and the concept of threat actors and their motivations. The discussion also covers the potential impact of threats, emphasizing the importance of mitigation strategies to prevent realized harm. An example of a 'war story' is the 'evil twin' attack, where hackers set up rogue Wi-Fi networks to intercept and monitor user data, highlighting the need for vigilance when connecting to public networks.

05:02

💡 The Anatomy of a Cyber Attack

This section delves into the anatomy of a cyber attack, using the 'kill chain' model to illustrate the stages of an attack. The model includes reconnaissance, attack, expansion, and obfuscation. However, a more detailed seven-phase model is also discussed, which further breaks down the attack phase into weaponization and delivery. The summary explains how threat actors use this model to plan and execute cyber attacks, with examples ranging from ransomware affecting businesses to targeted attacks on critical infrastructure like power plants and water systems. The narrative underscores the vulnerability of infrastructure and the potential consequences of successful cyber attacks.

10:03

🚀 Advanced Cyber Attack Strategies

The paragraph discusses advanced strategies in cyber attacks, detailing the steps from weaponization to delivery and exploitation. It explains how attackers craft exploits targeting specific vulnerabilities and deliver them through various means like phishing emails or infected websites. The narrative then moves to the command and control phase, where the malware communicates with the attacker to receive further instructions. The subsequent steps of internal reconnaissance and maintaining a presence within the compromised network are also covered, emphasizing how attackers aim to stay undetected and build bot networks for further actions.

15:04

🌐 Threat Actors and their Motivations

This section identifies and explains the different types of threat actors, including cyber criminals, hacktivists, state-sponsored attackers, and insider threats. It discusses the motivations behind their actions, such as financial gain, ideological protests, or espionage. The summary also touches on the evolving nature of threat actors, with the inclusion of amateurs who, despite their lack of advanced skills, can still pose significant threats by using readily available tools and scripts.

20:07

🏥 The Impact of Cyber Threats on Information and Infrastructure

The focus of this paragraph is on the impact of cyber threats, particularly on personal identifiable information (PII), protected health information (PHI), and personal security information (PSI). It discusses how the theft or breach of this information can lead to identity theft, financial fraud, and a loss of competitive advantage for organizations. The narrative also extends to the broader implications for national security and political stability, highlighting the far-reaching consequences of cyber attacks on both private and public sectors.

25:08

🌐 The Role of IoT in Cybersecurity Threats

This section discusses the role of the Internet of Things (IoT) in cybersecurity threats, explaining how unsecured IoT devices can serve as entry points for threat actors into networks. The summary emphasizes the importance of understanding and securing IoT devices to prevent them from becoming vulnerabilities in the network. It also touches on the concept of labs researching IoT application vulnerabilities, suggesting a proactive approach to identifying and mitigating these risks.

🏛️ The Broader Implications of Cyber Threats

The final paragraph summarizes the key points discussed in the module, including the roles of threat actors, the importance of understanding IoT vulnerabilities, and the types of information that are often targeted in cyber attacks. It reiterates the significance of the kill chain structure in understanding how cyber attacks unfold and the need for comprehensive strategies to mitigate these threats. The summary concludes by inviting questions or concerns, indicating an interactive approach to learning about cybersecurity.

Mindmap

Keywords

💡Cyber Ops Associate

The term 'Cyber Ops Associate' refers to an entry-level security analyst working in a security operations center. The video course is designed to equip individuals with the necessary skills and knowledge to handle the tasks and responsibilities associated with this role. The course aims to prepare learners for the Cisco 200-201 certification, which focuses on understanding the fundamentals of Cisco's cybersecurity operations. The relevance of this term is central to the video's theme, as it sets the stage for the type of professional the course is intended to train.

💡Threat Actors

In the context of the video, 'Threat Actors' are individuals or groups that pose a risk to cybersecurity by attempting to breach security measures for various motives. The video discusses the different types of threat actors, including cyber criminals, hacktivists, state-sponsored attackers, and insider threats. Understanding threat actors is crucial for cybersecurity professionals as it helps in anticipating and mitigating potential attacks, which is a key focus of the video's educational content.

💡Evil Twin

An 'Evil Twin' is a type of cyber attack where a hacker sets up a rogue wireless network that mimics a legitimate one, such as a café's Wi-Fi. The video uses the example of connecting to what appears to be a Starbucks Wi-Fi, which could actually be a malicious network set up to intercept data. This concept is important as it illustrates a real-world scenario that cybersecurity professionals must be aware of to protect users from such threats.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands a ransom for its release. The video discusses how ransomware has evolved and the dilemma faced by organizations when deciding whether to pay the ransom or not. This keyword is significant as it highlights a prevalent and damaging form of cyber attack that security analysts must be equipped to handle or prevent.

💡Key Infrastructure

The term 'Key Infrastructure' refers to critical systems such as power grids, water supply systems, and transportation networks that are essential for the functioning of a society. The video emphasizes the vulnerability of these systems to cyber attacks, which can have severe real-world consequences. Understanding the importance of securing key infrastructure is vital for cybersecurity professionals as it underscores the broader impact of their work beyond just individual organizations.

💡Kill Chain

The 'Kill Chain' is a model used to describe the stages of a cyber attack, from reconnaissance to maintaining access within a compromised system. The video explains this concept in detail, highlighting the various phases such as weaponization, delivery, and obfuscation. This model is crucial for understanding the video's theme as it provides a framework for how cybersecurity professionals can identify and disrupt cyber attacks.

💡IoT (Internet of Things)

IoT refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity that enables them to collect and exchange data. The video points out that these devices, if not properly updated, can become a gateway for threat actors to enter a network. IoT is a key concept in the video as it represents a growing area of concern for cybersecurity due to the increasing number of connected devices.

💡PII (Personally Identifiable Information)

PII stands for Personally Identifiable Information, which includes data that can be used to identify an individual, such as name, address, phone number, and social security number. The video discusses the importance of protecting PII from cyber threats, as its unauthorized use can lead to identity theft and other crimes. This keyword is integral to the video's message as it emphasizes the personal and financial risks associated with data breaches.

💡PHI (Protected Health Information)

PHI, or Protected Health Information, refers to a subset of PII that relates to an individual's health, including medical records and treatment history. The video mentions that breaches of PHI can have serious implications for both individuals and healthcare organizations. Understanding PHI is important in the context of the video as it highlights the sensitivity and legal protections surrounding health-related data.

💡PSI (Personally Security Information)

PSI, or Personally Security Information, encompasses user names, passwords, and security question answers that can be used to authenticate an individual's identity. The video stresses the importance of safeguarding PSI to prevent unauthorized access to personal and corporate accounts. This keyword is relevant to the video's theme as it underscores the need for robust authentication and access control measures in cybersecurity.

Highlights

Introduction to the Cyber Ops Associate course, covering skills and knowledge for security analysts.

Preparation for the Cisco 200-201 certification focusing on cyber security operations fundamentals.

Exploration of the dangers to networks, including basic war stories and threat actor motivations.

Discussion on the potential impact of threats and the importance of mitigation strategies.

Example of an 'evil twin' attack, where hackers set up rogue Wi-Fi networks to intercept data.

Risks associated with connecting to public Wi-Fi and the potential for SSL stripping.

The growing concern of ransomware and its impact on companies and infrastructure.

Case studies on ransomware attacks, including negotiations with threat actors.

The significance of targeted attacks on key infrastructure such as power and water systems.

Analysis of the Stuxnet worm and its impact on non-networked systems.

The anatomy of a cyber attack, including the four-step process of reconnaissance, attack, expansion, and obfuscation.

Detailed breakdown of a seven-phase cyber attack model, from reconnaissance to maintain and obfuscate.

The role of threat actors in security incidents and their various motivations.

Different types of threat actors, including cyber criminals, hacktivists, state-sponsored attackers, and insider threats.

The purpose behind hacking, ranging from financial gain to industrial espionage.

The importance of protecting Personally Identifiable Information (PII), Protected Health Information (PHI), and Personal Security Information (PSI).

The consequences of data breaches, including loss of competitive advantage and trust.

The impact of cyber attacks on national security and the potential for disruption of essential services.

Summary of the module, covering threat actors, IoT vulnerabilities, and the importance of information protection.

Transcripts

play00:00

welcome and in this video course we are

play00:02

looking

play00:03

at the cyber ops associate version one

play00:06

course

play00:07

this course is going to cover the skills

play00:09

and knowledge

play00:10

needed for successfully handling the

play00:12

tasks and duties responsibilities

play00:15

of an associate level security analyst

play00:18

working at a security operations center

play00:20

the goal of this video series is to help

play00:22

prepare learners

play00:24

for the cisco 200-201

play00:27

certification that's focusing on

play00:29

understanding the cisco

play00:31

cyber security operation fundamentals

play00:34

course

play00:35

known as c b r o p

play00:38

s

play00:41

welcome module one the dangers to the

play00:44

network

play00:46

so we're going to be looking at why we

play00:48

have to do this some basic war stories

play00:51

we're going to be looking at threat

play00:52

actors and what they are that includes

play00:55

the motivations kind of why they're

play00:57

doing specific

play00:58

things and we're going to look at the

play01:00

threat impact

play01:02

and again threat impact we're looking at

play01:04

potential impact

play01:06

not always direct impact

play01:09

because keep in mind the goal is to

play01:11

mitigate

play01:12

the threats so that they're not actually

play01:15

realized

play01:16

that's why we discuss things in

play01:18

potential

play01:19

as opposed to actually occurring

play01:23

so first off some basic war stories

play01:27

one of the fun ones is this hijacked

play01:29

people

play01:30

and essentially hackers can set up rogue

play01:34

wireless networks for example you're at

play01:36

starbucks you connect to the wi-fi

play01:39

are you really connecting to the

play01:40

starbucks wi-fi or are you connecting to

play01:43

a rogue wireless network that is

play01:46

mimicking

play01:47

starbucks wi-fi so

play01:51

this is actually known as an evil twin

play01:54

and this is actually fairly simple to do

play01:57

you have a lot of networking devices on

play02:01

the market today that do this so

play02:04

when we're talking technical ability it

play02:07

used to be

play02:08

a little higher to do these types of

play02:10

attacks but not necessarily

play02:12

so it's the purpose of an evil twin well

play02:15

if you actually connect to an evil twin

play02:18

instead of the original network

play02:20

and again you probably won't even

play02:21

realize it's an evil twin

play02:24

everything that you do can be monitored

play02:26

could be stripped

play02:27

so even https sessions can have the

play02:31

encryption

play02:32

stripped from the data so they can be

play02:35

readable

play02:36

so we have to be extremely careful what

play02:39

we

play02:39

are doing now granted not all instances

play02:43

of

play02:43

ssl can be stripped a lot of them can

play02:47

not all of them so you have to be a

play02:49

little more careful

play02:50

when you're at starbucks maybe not check

play02:52

your banking maybe not

play02:53

check specific financial uh

play02:58

backing up options you're on facebook

play03:02

so i'd be concerned with that because if

play03:05

someone

play03:06

is actually able to gain access to my

play03:08

social media

play03:09

would that cause an issue and if the

play03:11

answer is yes you probably don't want to

play03:13

be checking that with open wi-fi

play03:16

so another danger is ransomed companies

play03:21

so it is a growing concern

play03:24

when you have companies that are lured

play03:27

to

play03:27

open attachments to have infections

play03:32

that will hold their devices ransom

play03:35

typically called ransomware and

play03:38

essentially it will encrypt everything

play03:40

and it will force the user or the

play03:43

business to pay a ransom

play03:45

it's really interesting because

play03:47

ransomware has been around for a number

play03:49

of years

play03:51

and we're starting to see more and more

play03:53

concern

play03:54

with ransomware and we're also seeing

play03:59

ransomware kind of shift a few years ago

play04:02

60 minutes did a great special on a

play04:05

small

play04:06

county i think in oklahoma that had

play04:09

ransomware

play04:11

the ransom was 10 grand the mayor was

play04:14

like we can't afford that we could pay

play04:15

you five

play04:16

grand the ransomware group was like okay

play04:19

they took five grand unlocked everything

play04:21

and moved forward

play04:24

because somebody some money was better

play04:25

than no money in that

play04:27

situation however in that same 60 minute

play04:31

episode a larger city had a

play04:34

2 million dollar ransom they had the

play04:38

money

play04:38

but they refused to pay it because if

play04:41

they paid it

play04:42

then it would promote individuals to

play04:44

keep doing this

play04:46

so the large city was like no we're not

play04:48

going to pay it and they

play04:49

lost data for years

play04:52

they lost security camera footage they

play04:55

lost

play04:56

dash cam footage from police i mean they

play04:58

lost a lot of information

play05:01

so with ransomware some companies are

play05:04

paying some companies are not paying

play05:06

it really just depends on can you

play05:09

survive

play05:10

without that data or can you survive

play05:14

with paying the ransom

play05:16

and those are things that are growing in

play05:18

concern and they're

play05:20

not an easy answer it's not as cut and

play05:23

dry as

play05:24

don't pay because you will keep

play05:27

encouraging this

play05:28

if you don't have your data can you

play05:30

operate simple as that

play05:34

another huge issue is these targeted

play05:39

nations so when we look at key

play05:41

infrastructure

play05:43

power water the other key infrastructure

play05:48

transit all of this

play05:51

should have a certain level of security

play05:54

but the question is

play05:55

do they power plants after you've

play05:58

already been

play05:59

shown that they can be taken down with

play06:02

malware

play06:03

we've seen that malware such as uh

play06:06

stuxnetworm

play06:08

which was introduced to a non-networked

play06:11

or

play06:12

it was introduced to a power plant or

play06:14

power grid

play06:15

through a usb device that then

play06:17

ultimately led

play06:19

to the crash of a power plant

play06:22

basically the software was designed to

play06:25

jump from machine to machine

play06:27

until it reached a programmable logic

play06:30

controller a plc and from the plc

play06:34

it took down very specific critical

play06:37

systems for that power plant

play06:40

however you see the same thing in water

play06:43

where i come from in northern california

play06:48

we've actually seen that our water pumps

play06:50

are susceptible to ransomware attacks

play06:54

and people may think well what's the big

play06:56

deal if we turn off a water pump here or

play06:59

there

play07:00

well in some large cities the water

play07:03

pumps control

play07:06

fresh water to everyone's homes

play07:09

so if you can imagine a city like la or

play07:12

las vegas

play07:13

having water pumps turned off or reduced

play07:17

how quickly would the water dry up in

play07:19

those cities

play07:21

in la i think rough estimates were five

play07:25

days

play07:26

in vegas rough estimates were if key

play07:29

water systems were compromised less than

play07:32

three days

play07:35

granted these issues have been addressed

play07:37

by dhs

play07:39

and recent audits but

play07:43

before those audits those two large

play07:46

cities

play07:46

were critical i mean that water pump

play07:49

could have accidentally

play07:51

killed you know hundreds of thousands of

play07:53

people

play07:54

if they were infected so key

play07:57

infrastructure is

play07:58

definitely being targeted and we've seen

play08:02

that because our

play08:04

infrastructure is very vulnerable

play08:07

not just the water system not just power

play08:09

grid not just

play08:10

infrastructure like roadways train

play08:13

systems

play08:14

transit systems all of those are being

play08:17

targeted

play08:18

for disruption

play08:22

so in our course we do actually have

play08:25

a video discussing the anatomy of an

play08:28

attack

play08:29

and essentially this is what's known as

play08:33

a kill chain

play08:36

so the kill chain can be broken down in

play08:38

a few different steps

play08:40

in a very basic model we have a

play08:42

four-step process for

play08:44

a cyber attack reconnaissance attack

play08:48

expansion obfuscation

play08:51

basically you do some recon you figure

play08:54

out where you can attack them you attack

play08:56

them

play08:56

and you expand once you have attacked

play08:59

and gained access

play09:01

once you have expanded you can start

play09:03

obfuscating what you're doing

play09:05

hide your tracks that is the general

play09:09

agreed-upon anatomy however we can dive

play09:13

a lot deeper in those types of

play09:15

attacks than just four steps

play09:19

that is the general model that most

play09:21

organizations use

play09:23

however there have been a lot more

play09:25

research done in

play09:27

a seven phase attack instead

play09:30

reconnaissance is always going to be the

play09:32

beginning

play09:35

except here we take the attack phase and

play09:37

we break it down to two additional

play09:38

phases

play09:39

weaponization and delivery essentially

play09:43

you do the reconnaissance you figure out

play09:45

what is what

play09:46

how things are are associated how things

play09:48

are

play09:49

vulnerable what systems there are what

play09:52

operating systems there are

play09:53

and you can weaponize that information

play09:56

if you know they are running

play09:58

a unpatched version of windows server

play10:01

2012

play10:02

well you can weaponize that information

play10:04

you can craft an

play10:05

exploit that will be able to exploit

play10:08

that system

play10:10

the third step again that after

play10:12

weaponization is that delivery

play10:15

now that you know what exploit to run

play10:17

you can figure out ways to deliver that

play10:20

exploit to

play10:21

that target the

play10:24

delivery could be an email could be

play10:26

infecting a website

play10:28

could be sending a phishing could be

play10:31

social engineering it could be as simple

play10:32

as

play10:33

calling a secretary and saying that

play10:36

you're your boss's boss

play10:37

and that you need her to look at an

play10:39

email again that's going to be more of a

play10:41

phishing email

play10:42

but you can deliver the

play10:46

malware in multiple ways so after you've

play10:49

done the delivery

play10:51

the exploitation portion will uh

play10:54

happen the exploit has been delivered it

play10:57

needs to be executed without being

play10:59

detected

play11:01

so that's why phishing emails are

play11:03

becoming more popular

play11:05

most organizations still lack decent

play11:08

phishing user training some

play11:11

organizations are actually doing

play11:13

proper training but most are not so

play11:16

after the exploit has

play11:18

ran we have a command and control that's

play11:21

phase

play11:22

five essentially once the exploit has

play11:26

been

play11:26

executed the exploit should then

play11:29

communicate with the threat actor to

play11:32

figure out what to do next to download

play11:35

newer versions of malware

play11:37

to run certain scripts or

play11:40

to expand or lots of other

play11:43

options and that is done through a

play11:45

command and control

play11:47

server once that

play11:50

actually occurs phase six will be

play11:53

internal

play11:54

reconnaissance again we're doing

play11:56

reconnaissance again

play11:58

they may start looking to see

play12:01

what is internal what networks are

play12:03

available what workstations are

play12:05

available

play12:07

in order to move lateral through the

play12:09

organization

play12:11

you need to have a decent map of the

play12:13

infrastructure

play12:14

how to the different devices connect to

play12:17

one another

play12:18

are there networks inside of networks

play12:20

are there systems inside systems

play12:22

we're not quite sure so that's where

play12:24

that internal reconnaissance has to take

play12:26

place

play12:27

are there internal security measures

play12:31

is there an ips is there an ids

play12:34

is there a network for iot or plc-based

play12:38

devices not quite sure that's why

play12:41

that reconnaissance is so important

play12:45

the last step is maintain and obfuscate

play12:50

hide your track and stay as long as

play12:52

possible

play12:53

the deeper you dig inside the network

play12:58

the harder it is for them to

play13:01

remove you or find you things like being

play13:04

able to install

play13:05

root kits in very specific files

play13:09

is a great way for things not to be able

play13:12

to detect you

play13:14

also with root kits we could uh

play13:17

have a slave of computers

play13:21

slaves zombies can actually slowly build

play13:25

a

play13:25

bot network or a bot kit

play13:29

bots or bot network is just a bunch of

play13:31

slave computers

play13:33

that can do whatever the command and

play13:35

control server says

play13:37

these are all ways that a cyber attack

play13:41

can move forward and again this is not a

play13:45

complete list like this kill chain is

play13:48

ever evolving ever changing

play13:50

because these steps are always being

play13:53

modified and refined

play13:54

for easier attack ability

play13:59

so the important part is why do hackers

play14:01

do this

play14:03

gain information gain data

play14:06

because they're mad at a company there's

play14:08

a huge

play14:09

list it could be that you're being paid

play14:11

to do this for some reason

play14:14

the reason hackers do what they do is a

play14:17

pretty long

play14:18

list a threat actor is typically defined

play14:22

as a malicious actor also known as a

play14:25

threat actor

play14:27

that is an entity that is partially or

play14:30

wholly responsible for a security

play14:32

incident that

play14:33

impacts or has the potential to impact

play14:37

an organization's security

play14:40

oftentimes threat actors come in four

play14:43

main flavors

play14:44

they are going to be cyber criminal like

play14:46

hackers

play14:48

hacktivists state-sponsored attackers

play14:51

or possible insider threats those are

play14:54

the main four

play14:55

types of threat actors that is not a

play14:58

complete list that's just the main

play15:01

i did this before going to the next

play15:03

slide because

play15:05

as information as days go by

play15:08

everything changes cisco defines

play15:12

five major groups hacktivists

play15:15

organized crime hackers state sponsors

play15:19

terrorist groups but they're also now

play15:22

including

play15:24

amateurs so amateurs are going to be

play15:27

anyone that

play15:28

doesn't have any real skill that is able

play15:30

to compromise security like a script

play15:32

kitty

play15:36

so kind of what are their purposes

play15:39

again amateurs script kitties they use

play15:41

built-in tools

play15:43

and they have basic understanding how to

play15:45

do things

play15:46

so they can still be pretty dang

play15:48

devastating to a business

play15:50

even though their skill level is

play15:51

relatively low

play15:53

hacktivists are hackers who publicly

play15:56

protest against

play15:57

a reason and they use that

play16:00

ideological difference and they're

play16:04

actually targeting individuals opposed

play16:06

to that difference

play16:08

they could be posting articles videos

play16:11

leaking information

play16:14

for example just an example let's say

play16:17

that i'm against cosmetics that use

play16:20

animal testing i'm targeting a company

play16:23

that says they don't

play16:25

uh use animals but i know they do

play16:27

because i broke into their server

play16:29

and i have video footage showing them

play16:30

using animals for

play16:32

testing i post their video

play16:35

internal videos online that would be an

play16:38

example of a hacktivist

play16:41

and they can do this so many different

play16:43

ways

play16:44

they could be hacking they could be just

play16:47

straight

play16:48

using ddos denial services to

play16:52

disrupt an organization's ability to

play16:54

function

play16:55

another thing is financial gain a lot of

play16:58

what hackers do

play16:59

is because they're getting paid it may

play17:02

not be because

play17:04

i'm philosophical against what you're

play17:07

doing

play17:08

it could just be because i'm getting

play17:10

paid to do job

play17:11

or task x and i need to make rent this

play17:15

month so i do it

play17:16

so motivated by financial gain is a huge

play17:19

part

play17:21

cyber criminals want to gain access to

play17:24

information

play17:25

banking information medical information

play17:28

things that can be

play17:29

leveraged to generate cash

play17:33

that's always a huge portion of why

play17:35

hackers hack

play17:37

is to generate funding that is not the

play17:40

only reason

play17:41

for some hackers they want to prove that

play17:44

they can do it

play17:45

for some other hackers they want to make

play17:48

money

play17:50

there is private information

play17:51

intellectual property i

play17:53

p out there trade secrets that

play17:56

should be protected at times some nation

play18:00

states may disagree with that

play18:02

intellectual property being private

play18:04

so they target and publicly announce

play18:07

what that ip is

play18:10

so again other countries could also

play18:12

interfere with political

play18:14

systems can influence other political

play18:16

systems

play18:18

they may be interested in industrial

play18:21

sabotage

play18:22

i may want to go into the wind turbine

play18:26

industry but i don't want to uh do the r

play18:29

d i maybe go to the same industry but a

play18:33

different organization

play18:34

commit in industrial espionage or cyber

play18:38

espionage

play18:39

distill their plans i make a knockoff

play18:42

version of it and sell that

play18:45

i actually don't have to spend as much

play18:46

money doing r d

play18:48

so i actually can sell my product

play18:50

cheaper

play18:52

that's a great example of espionage

play18:53

that's pretty dang common

play18:56

basically the theft of intellectual

play18:59

property

play19:00

is a huge part of why some organizations

play19:04

do commit espionage

play19:08

intellectual property is actually a

play19:11

billion dollar industry each year if i

play19:14

have

play19:15

the recipe to make product x or i've

play19:18

got the plans to make product y

play19:21

and if you can still them then you don't

play19:24

have to put as much r d

play19:26

which means you can run cheaper so

play19:30

intellectual property theft is a huge

play19:33

growing business and a huge growing

play19:35

concern

play19:36

again these are not a list of every

play19:38

reason this is just a brief

play19:39

overview of main reasons why

play19:43

individuals hack and kind of the

play19:45

different

play19:46

groups of hackers and why they hack

play19:50

so earlier we talked about iot and plcs

play19:53

well iot is also known as internet of

play19:56

things

play19:57

and these iot devices basically help

play20:00

individuals connect things to improve

play20:02

quality of life could be a smart light

play20:06

could be a smart refrigerator could be a

play20:08

smart

play20:10

garage door opener things of that nature

play20:13

these types of devices connect to the

play20:16

internet and they're not always

play20:17

updated so that is why some of them

play20:20

become a

play20:21

gateway into the network threat actors

play20:25

actually prey on these devices because

play20:28

they create opportunities

play20:30

for the threat actor to enter a network

play20:35

we have another lab researching and

play20:37

analyzing iot application

play20:38

vulnerabilities

play20:40

again labs are done in a separate video

play20:43

last major section are threat impacts

play20:46

what is the purpose of the threat how

play20:49

does it impact the organization

play20:52

so there's a key set of information that

play20:56

organizations want to protect pii

play20:59

personal identifiable

play21:02

information that's one of the big ones

play21:04

this is any information that can be used

play21:06

to positively identify an individual

play21:09

name and address name and phone number

play21:11

name and social security birth date

play21:13

credit card numbers

play21:14

things of that nature cyber criminals

play21:18

definitely try to obtain lists of pii so

play21:21

that they could uh

play21:22

steal people's identities that's one of

play21:24

the big ones

play21:25

or they can use this pii to create fake

play21:28

accounts fake bank records

play21:32

or open up legitimate bank accounts and

play21:35

then

play21:35

withdraw it or open up legitimate credit

play21:38

card lines

play21:39

and then not pay them or loans or things

play21:43

of

play21:43

that nature we also have

play21:47

protected health information phi

play21:50

and that's typically a subset of pii

play21:53

we have a growing digital system of

play21:57

medical records

play21:58

in the us and these are typically

play22:01

electronic medical records

play22:03

emr based systems the emr-based systems

play22:08

protect the phi and this is going to be

play22:11

procedures this is

play22:13

anything medical done by an individual

play22:17

well to an individual not by the

play22:19

individual

play22:20

doctors do the actual

play22:24

procedures so pii

play22:27

phi and then we have personal security

play22:31

information

play22:32

this is another common type of pii and

play22:34

this includes

play22:35

user names passwords any security

play22:38

question

play22:39

responses or challenge responses any

play22:42

information that can

play22:43

an individual can use to pretend to be

play22:46

someone else

play22:48

these are all main areas that can be

play22:51

targeted and compromised

play22:54

so who cares if someone steals pii or

play22:57

phi or psi well all of these

play23:00

one are expected to be protected

play23:04

but individuals that have pii with

play23:08

a organization and that organization

play23:11

has the ability to leverage that pii as

play23:14

a competitive advantage

play23:16

so breach of pii or phi or psi

play23:22

can result in the organization losing

play23:24

their competitive advantage

play23:26

if you go to a hospital and you know

play23:29

that hospital

play23:30

is constantly leaking out your pai

play23:33

you're less likely to go to that

play23:34

hospital

play23:37

so the protection of the information

play23:40

about you

play23:41

is that organization's competitive

play23:43

advantage we're going to ignore the fact

play23:45

that

play23:46

certain level or expected levels of

play23:48

privacy are

play23:49

mandates like phi is protected by ferpa

play23:54

sorry purpose educational records it's

play23:57

protected by

play23:58

hipaa if you're in a school

play24:01

and your grades are not protected that's

play24:04

a violation of ferpa

play24:06

if you are dealing with financial

play24:08

information

play24:10

there are compliances guarding financial

play24:12

information

play24:13

if you are or an organization storing

play24:15

credit card information

play24:17

and there's a breach there that's a pci

play24:20

dss

play24:21

violation so

play24:24

certain types of data are protected by

play24:27

industry

play24:28

or by state and federal laws or

play24:32

country laws so any

play24:35

types of breach in that could lead to

play24:37

that loss of competitive advantage

play24:40

that means loss of intellectual property

play24:43

to a competitor again we talked about

play24:46

that earlier about industrial espionage

play24:49

and how the competitor can now

play24:52

improve their product without having to

play24:54

pay for the r d that your organization

play24:56

paid for

play24:57

other concerns are loss of trust or

play25:00

faith in that organization meaning or

play25:04

individuals no longer want to go to that

play25:06

organization so that organization

play25:08

eventually will

play25:09

fail

play25:12

other threat impacts could be political

play25:15

or

play25:15

national security it's not just

play25:18

businesses getting hacked government's

play25:20

getting hacked all the time

play25:22

in the news in the last several years

play25:25

how many federal

play25:26

organizations have had data breaches irs

play25:30

is one of the big ones but it's not the

play25:32

only one

play25:34

state supported hackers are causing

play25:37

disruptions and destruction

play25:39

over digital services in the uk

play25:43

you've actually had hackers target uk

play25:45

internet providers

play25:47

to shut down the internet and porch

play25:49

portions of the uk

play25:51

in eastern europe same thing

play25:54

when you have hackers that disagree with

play25:56

what the government's doing

play25:57

hackers take down infrastructure the

play26:00

internet has become essential

play26:02

as medium for commercial

play26:06

businesses for financial

play26:09

activities for banking for

play26:12

infrastructure

play26:13

for users for sharing of information

play26:18

all that's done through the internet so

play26:21

with a disruption of internet services

play26:25

it could actually devastate an

play26:26

organization it could devastate

play26:28

a country

play26:32

if a business loses internet it could be

play26:35

their complete cut off from the world

play26:37

they may not be able to purchase things

play26:38

or sell things or

play26:40

connect with their vendors or consumers

play26:43

if a country is cut off from the

play26:45

internet that means everyone in the

play26:47

country

play26:48

individuals consumers businesses

play26:51

government

play26:52

all cut off from the outside world and

play26:55

that definitely can destroy a country's

play26:57

economy

play26:59

another lab visualizing black cats

play27:03

so let's go ahead and summarize what we

play27:06

learned

play27:08

in this module we learned about threat

play27:11

actors how they

play27:12

function why they do what they do we've

play27:15

looked at iot we looked at different

play27:17

types of

play27:18

information pii phi psi

play27:22

and why those are areas of concern we

play27:25

talked about

play27:26

overall kill chain structure

play27:29

and that is it for this lecture if you

play27:32

have any questions or concerns

play27:34

please

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecuritySecurity AnalystThreat ActorsRansomwareEvil Twin AttacksCyber OpsCisco CertificationCybersecurity FundamentalsData BreachesInformation Security
Besoin d'un résumé en anglais ?