http://www.digitalattackmap.com/
https://cybermap.kaspersky.com/
http://map.norsecorp.com/#/
Refer to Security Lab Page for completed labs.
Introduction
This week is an introduction to Security of Information Systems, some key terminology. Looking at the different areas of IT we want to secure.
Lab session:
- Introduce the Laboratory environment.
- Familiarise ourselves with some CLI utilities to search out network identities
Tasks:
- Familiarise yourself with the Forums, reference websites and course outline.
- Browse through the Safari catalogue under the "Security" category.
CLI utilities A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface,[1] and character user interface (CUI), is a means of interacting with acomputer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).
The CLI was the primary means of interaction with most computer systems until the introduction of the video display terminal in the mid-1960s, and continued to be used throughout the 1970s and 1980s onOpenVMS, Unix systems and personal computer systems including MS-DOS, CP/M and Apple DOS. The interface is usually implemented with a command line shell, which is a program that accepts commands as text input and converts commands to appropriate operating system functions.
Command-line interfaces to computer operating systems are less widely used by casual computer users, who favor graphical user interfaces.
Alternatives to the command line include, but are not limited to text user interface menus (see IBM AIX SMIT for example), keyboard shortcuts, and various other desktop metaphors centered on the pointer(usually controlled with a mouse). Examples of this include the Windows versions 1, 2, 3, 3.1, and 3.11 (an OS shell that runs in DOS), DosShell, and Mouse Systems PowerPanel.
Command-line interfaces are often preferred by more advanced computer users, as they often provide a more concise and powerful means to control a program or operating system. Programs with command-line interfaces are generally easier to automate via scripting.
Command line interfaces for software other than operating systems include a number of programming languages such as Tcl/Tk, PHP and others, as well as utilities such as the compression utilities WinZip and UltimateZip, and some FTP and ssh/telnet clients.
Threats, Attacks and Intrusions
Appraise access, modification, DoS and repudiation attacks.
Lesson:
- Discussion on attacks and types of attacks in IS.
Lab session:
- Investigate the concept of vulnerabilities and the relation to attacks.
CIA Triad (confidentiality, integrity and availability)
Availability, confidentiality, integrity, accountability
Lesson:
- Discussion on the concepts of Availability, Confidentiality, Integrity and Accountability.
Lab session:
- Evaluating WiFI security
Risk Assessment
Identify & measure organisational risks
Lesson:
- Discussion on Identifying and measuring risks to an organisational.
Lab session:
- Discusson on the DRP, BCP and security policies.
Tasks:
- Prepare material for Lab 3:Week 6
Security Policies, Standards & Procedures
Define & deploy security policies.
Lesson:
- Discussion on compiling, defining and deploying security policies.
- Designing a Disaster recovery plan.
Lab session:
- Investigate system recovery software.
Tasks:
- Install and evaluate DriveImage XML - http://www.runtime.org/driveimage-xml.htm.
- Prepare material for Lab 4:Week 8
Administrative and Technical Security
Discriminate between administrative & technical security, facilitate the security process.
Lesson:
- Can you discriminate between administrative and technical security and facilitate the security process?
Lab session:
- Experiment with some password cracking using commonly available tools
- Breaking into protected files.
Security auditing
Lesson:
- Appraise policy adherence using audits. Awareness training
Lab session:
- Investigation into cryptographic techniques.
Tasks:
- Install and evaluate GNU Privacy Guard - http://www.gnupg.org/
Hacking and Malware
Evaluate hacker techniques, malicious code (viruses, Trojan, worms)
Lesson:
- This week we evaluate different hacker techniques and malicious code including viruses, Trojans, and Worms.
Lab session:
- Install and configure and evaluate Antivirus software.
Tasks:
- Prepare material for Lab 2:Week 4
Firewalling
Firewall types and configurations.
Lesson:
- Investigation into firewall types and configurations
Lab session:
- Evaluation of firewall software.
Tasks:
- Install and evaluate an pfSense - http://www.pfsense.org/
Virtual private networking
Evaluate types of VPNs systems and techniques
Lesson:
- Discussion on VPN schematics - IPsec vs SSL
- Discussion on network proxy systems - Squid caching proxy & Delegate
- This week we evaluate different types of VPN systems and techniques.
Lab session:
- Install and configure VPN and proxy software
Tasks:
- Install and evaluate OpenVPN - http://openvpn.net/index.php/open-source.html
- Install and evaluate Delegate proxy - http://www.delegate.org/delegate/
Digital Keys and Certificates
Public and private key encryption. Digital signature and the trust systems
Lesson:
- Discussion on public and private key encryption.
- Discussion on Digital signature and the trust systems.
Lab session:
- Install and configure openVPN using certificates generated with openSSL.
Tasks:
- Install and evaluate an openSSL - http://www.openssl.org/
Intrusion Detection
Explore types of intrusion detection systems. Management vs prevention
Lesson:
- Exploration into types of intrusion detection systems.
Lab session:
- Investigate IDS software tools.
Tasks:
- Install and evaluate an Backtrack or Kali Linux
Web Application Security
E-Commerce services. Client-side, Server-side, Application & Database security
Lesson:
- Discussion on web application security.
- Discussion on SQL injection.
Wireless Security
Wireless Technology and Security
Lesson:
- Discussion on wireless technology and surrounding security issues
No comments:
Post a Comment