Cyber Security - Module 3: Protection Mechanisms, Attacks, and Security Services
1. 4 Pillars of Security: Deter, Prevent, Detect, Respond
- Deterrence: Warns attackers using signs and policies.
- Prevention: Blocks access (firewalls, biometrics).
- Detection: Alerts on suspicious activity (IDS).
- Response: Actions after breach (lock accounts, block IPs).
2. Introduction to Network Security
- Protects users, data, devices in a network.
- More complex than single computer security.
3. Protection of Network Resources
- Hardware: Routers, switches, firewalls.
- Software: OS, apps, servers, databases.
4. Core Security Services (CIA + 2)
- Access Control: Controls resource access.
- Authentication: Verifies identity.
- Confidentiality: Encryption to protect data.
- Integrity: Hashing ensures unchanged data.
- Non-repudiation: Digital signatures prove actions.
5. Network-Based Attacks
- DoS/DDoS: Overload servers.
- MITM: Intercept communications.
- IP/DNS Spoofing: Fake identity or site.
- SQLi, XSS: Code injection into apps.
- Sniffing, Brute Force, Zero-Day, Insider threats.
6. Active vs Passive Attacks
- Active: Modifies data (e.g., DoS, SQLi).
- Passive: Observes data (e.g., sniffing).
7. Phishing & Types
- Email, Spear, Whaling, Vishing, Smishing, Clone, Pharming, BEC.
8. Tailgating
- Follows someone into secure area.
- Prevention: Mantraps, smart cards.
9. 802.11 Wi-Fi Authentication & Encryption
- Phases: Discovery -> Auth -> Key Derivation -> Encrypted Comms.
- WPA3: Strong encryption, mutual auth.