Cryptography (part 2.1)

Video Activity

This lesson covers cryptographic tools and explains how cryptography is used to protect confidentiality, integrity and authenticity. Companies was to prevent unauthorized disclosure of information. This lesson discusses threats to confidentiality, the greatest of which is social engineering, which is all about impersonation. To fight breaking confi...

Start your free 3-day trial and become one of the 3 million Cybersecurity professionals advancing their career goals
Sign up with
OR

Already have an account? Sign In »

Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15
Video Description

This lesson covers cryptographic tools and explains how cryptography is used to protect confidentiality, integrity and authenticity. Companies was to prevent unauthorized disclosure of information. This lesson discusses threats to confidentiality, the greatest of which is social engineering, which is all about impersonation. To fight breaking confidentiality, companies can use separation of duties, meaning very specific roles and they only possess the knowledge to fulfill those roles.

Video Transcription
00:04
So we're gonna begin with the topic of cryptographic tools, and we really have to start with a basic understanding of cryptography. So what I'd like to do is go over some sort of basic and essential elements just to make sure that we build and build that we're all starting off from the same point. So with cryptography,
00:23
you'll notice
00:24
Ah, we're gonna talk about, of course, how cryptography is used to protect confidentiality, integrity and authenticity, confidentiality, integrity and authenticity. And as a matter of fact, when I talk about cryptography, I take that a step further. And I actually usually talk about
00:43
privacy, also known as confidentiality.
00:47
We certainly talk about integrity
00:49
and authenticity,
00:51
but I also like to add to that,
00:55
and I think it's important idea. Non repudiation.
00:59
Okay, So in talking about each of these privacy, integrity, authenticity and non repudiation,
01:07
when we talk about privacy and confidentiality, our main goal is to make sure we prevent unauthorized disclosure of information. We want to keep secrets secrets, so jot that down,
01:19
prevent unauthorized disclosure.
01:23
It's a good definition for confidentiality.
01:26
Now, when we talk about confidentiality and what are the threats because we always look at this in terms of threats and vulnerabilities, and then down the line, we'd want to talk about mitigating strategies. So with privacy and confidentiality, there really three main threats that we have to consider. We have to consider
01:45
social engineering,
01:48
and right now that's the greatest threat to confidentiality anywhere. Social engineering and social engineering is all about impersonation on one of the things that that, you know, you'll see, is that we, as technical people, tend to think in terms of technical solutions and technical ideas and technical attacks.
02:07
But the idea behind social engineering, why am I going to spend two hours trying to brute force the password when I can walk up to somebody's desk? Introduce myself? Is Kelly from the help desk? And I can say, Hey, we're pushing out some new patches on systems. If you don't mind, let me have access to your system for a couple of minutes.
02:24
Go grab a cup of coffee. By the time you get back, I'll be done.
02:29
And I'll tell you I do some social engineering pen tests on the side, and that's successful somewhere around 75% of the time. Social engineering is all about acting authoritatively. It's all about being convincing, and what you'll find is most people want to be helpful. So if you come in and hey, we've got to take care of this
02:47
a little sense of urgency. We've got to do this right away. It can't wait till lunchtime. I'm sorry to bother you, but
02:53
give me 10 minutes on your system on. And that's just one of many different social engineering attempts. We've all seen the phishing emails, the Nigerian prints wanting us to cash checks. I was looking at one yesterday. Ah, that was talking about
03:10
from the government. I was guaranteed a rebate for my taxes or tax refund.
03:15
And all I had to do was send this small amount to cover the processing fee to this address. You know, social engineering. We could go on and on and on on with. And one of the things that I find when I do consulting consulting with organizations is I find that many companies have a very robust technical pin testing program,
03:34
but they're not pin testing social engineering.
03:37
So if you think about a social engineering attack, what might a pen test for social engineering look like,
03:44
well, might be me calling different extensions, trying to solicit information. And I'll guarantee you, if I call enough people, I'm going to get the information that I want.
03:53
But it could be other things, like just I said, You know somebody from the help desk or purporting to be from the help desk? Let me see if I can get you to leave your computer without logging off. Ah, can I get one of your employees to open up an unsigned email or an attachment within an email that's not digitally signed?
04:12
And the answer is, of course, yes to that most times.
04:15
And if you followed any of the security breaches Ah, that have been in the news. There was a security company Ah, you may be familiar with. I'm not in the name, any names, but they had a huge compromise, and this is a vendor of the onetime password products. You've probably seen the little key fobs with the password that changes every 60 seconds,
04:34
and that's a token device so that you can authenticate along with the password.
04:40
So this organization had a huge compromise. Ah, that essentially led Attackers to disclose Ah predict are to determine predictably what those passwords would be. So it's a big, big compromise in the way that that attack became successful.
04:57
A targeted email sent to three people within the entire organization. This is a company that has thousands of employees. That email was simply sent to three people, and that's called spear fishing. And that would be testable that term. A targeted phishing attempts.
05:13
Um, it was also called wailing because what happened was the email was targeted to senior management,
05:20
and I know that seems interesting because you would kind of think it a security organization. Surely Senior management is onboard and is knowledgeable, and surely senior management wouldn't make the silly mistakes that we wouldn't even expect their inv users to make. And sometimes, unfortunately, that's not the case. Sometimes the folks at the very heart
05:41
top of the of the food chain, so to speak within a company,
05:45
have the greatest and highest level of permissions. And when it comes down to it, if I signed the check, I'm gonna dictate what permissions I have on the network. So, Tom, sometimes you have these folks that are very high up in an organization that demand full X access,
06:00
even though that might not be a requirement for their job, and they may not have the skill set to get that. So at any rate, this spear phishing whaling attack was sent to three people that essentially consigned It contained an unsigned document,
06:16
and what's interesting about that is the technology work.
06:19
The company spam filter, or male filter took that email and moved it over to the junk mail folder.
06:28
So one of the things we'll talk about in this class is technical solutions or not enough, because in that company the technology did exactly what it was supposed to.
06:36
However,
06:38
one of the senior managers went to their junk mail folder, saw that email said, Oh, that looks interesting. Pulled it back, opened up the attachment the backdoor software was installed, and that gave the attacker foothold on the network.
06:53
One of the things again we'll talk about is you can put all the technical controls in place that you want.
07:00
There's not a single control you can put in place that somebody can't bypass.
07:04
And that's just a fact. It doesn't matter, you know. We'll talk about physical security very briefly we'll talk about an eight foot fence to deter determined intruders.
07:15
And then I always like to say, But what height fence will prevent
07:18
an intruder?
07:19
And the answer. That question is, there's no height fits that will prevent an intruder.
07:24
You got a 15 foot fence. I've got a 16 foot ladder.
07:28
Or if it's a high enough value target
07:30
we've seen with high value Ah, assets. We've seen Attackers tunnel in. We've seen Attackers coming from the sky. Now, again, this is not your normal type of attack. But if the value of the asset is great enough, that's exactly what's gonna happen.
07:46
So technical controls air Not enough physical controls or not enough
07:50
administrative controls, which would be policies and procedures. Those aren't enough either. So the idea is layering layer defense, defense and them. We want physical controls. We want door locks. Absolutely. We want technical controls. We want male filters and encryption and all those good things.
08:11
We also want administrative controls where we train our people
08:15
where we emphasize principle of Lise privilege need to know and those ideas and ideally, when we have that layering of defense, we don't necessarily talk in terms of preventing determined intruders. But we can certainly delay them long enough so that, ideally, they would be detected. So,
08:35
you know, going back to confidentiality. Social engineering and technical controls do very little
08:41
against social engineering.
08:43
So what would be the solution? Separation of duties so very important and along with separation of duties, the idea of need to know
08:54
so confidentiality. You know, you'll find if you do any sort of social engineering pen testing. If you experiment around with that, you'll find that many people will give you information. That's critical. But the idea about separation is Jude of Judy's. I can't get somebody to give me the password to the server
09:13
because that's not their job, and they don't know that information.
09:16
So by using separation of duties, we make sure that people have very distinct, very well defined roles and on Lee the knowledge to complete those roles. So that helps me enforce confidentiality.
09:28
We train our people as a matter of fact, with social engineering the first time someone fails a social engineering pen test they ought to immediately be retrained
09:39
doesn't mean they have to go through a 40 hour social engineering class But it does mean that there is an immediate address off a failure on their part there retrained. And then the 2nd 3rd time. You know, we really have to start looking at administrative action, whether it's riding up employees,
09:58
putting them on an improvement plan, whatever that might be.
10:01
Hey, so, social engineering, because it is a social issue, it's not really gonna have a technical control. It's gonna have more of an administrative control. And that right now is our greatest threat to confidentiality
10:13
Now.
10:15
Second threat to confidentiality
10:16
Media Reuse
10:20
a media reuse, whether it's reusing the same hard drive to store sensitive information, whether it's using a thumb drive. And I know a lot of organizations sort of band thumb drives. They're not very welcoming most corporate environments, but they're still other types of removable media that we allow.
10:37
You know, we allow Devi ours and rewriteable DVDs.
10:41
We allow, um, other storage devices that might be plug in play, so whatever our media is, and I know we're not really in the days where we're talking about using floppies any longer, but you know any type of removable media
10:56
when we re use that media we run the risk of leaving remnants behind.
11:01
Um, for example, when I first got into I t. And this was about 20 years ago, I started out as a hardware cognition
11:09
and one of the things that I would do to get better working with Hardware's. I go around from yard sale, the yard sale or ham radio shows, and I would pick up computers, get him really cheap on this was about at the time of 3 86 computers for 86 computers.
11:26
So I take those home I take him apart. I'd put him back together, usually with
11:31
mostly the same number of pieces that I started with, Um, and one of the things that shocked me time after time after time, I'll ask you this. I just come up with an idea. If I bought maybe somewhere around 10 to 15 computers over the course to three years,
11:48
how many computers do you really think were cleansed
11:52
of remnants of data,
11:52
as in how many of those computers that I purchased had been wiped clean?
11:58
And you probably know the answer to that. And that's exactly zero. And that's very, very common, you know, if you purchase a computer if you go online and somebody's got a computer for sale on Craigslist. This letter, the other chances are very good that they may have deleted some sensitive files, but they rarely rarely sanitized the disc
12:18
media re use. People don't
12:20
think about it, But when you take media regardless of what it ISS and you use it for a different purpose, you must wipe that, Dr.
12:28
Now, when I talk about wiping the drive, there's different soft. They're different software applications that will do this for you. Sometimes you'll hear, hear people refer to it as sanitizing or zero izing. So basically what's happening is you get this little program that's just gonna overwrite to the disk over and over and over and over. And that's a testable idea,
12:48
because a lot of times people feel like, oh, I've deleted the files
12:52
and you guys know being technical people when you delete a file, you're not deleting the file, which you're deleting is the pointer to the file. That file still exists in your hard driving. This is easy to find is anything.
13:05
Deleting a file will never be a correct answer on this test you'll always have to go a step further.
13:11
Formatting a Dr will never be a solution on this exam. Formatting is such an easy to reverse process that even if you format a hard drive
13:22
within five minutes, I can restore it to its original state and pull most of the data. Really, the way that you ensure all that is gone destroyed the drive.
13:33
That's always the best solution. If you have confidential information, don't reuse the drive. And really, if we are talking about hard drives today, there's no excuse not to do that hard. Tribes are so cheap today compared to what they were 10 years ago or 20 years ago. You know, you usedto have to pay
13:52
$500 for 10 Meg hard drive.
13:56
Now you get a two gigabyte hard drive for 60 bucks, so there's no reason not to physically destroy a hard drive. If it has sensitive information, watch for the questions on the exam because they will specify whether or not you want to reuse the drive or not.
14:11
So if you're gonna reuse the drive, obviously physical destruction is not gonna work.
14:16
If it's magnetic media,
14:20
de grousing is another very successful method. But let me stress to you Dig. Housing is on Lee. A process for magnetic media, which you're doing is you're exposing that magnetic drive to a very strong magnet. You're wiping out the cylinders, the heads and sectors that air creating this part of a low level format.
14:37
So, yeah, that's a decent step towards getting rid of the data.
14:41
The best solution, though, is gonna be physical destruction.
14:46
So if you're gonna want to reuse the hard drive zero ization or deke housing, if your top priority is getting rid of remnants, then that's gonna be physical destruction. And I will mention I've heard students say things like, Yeah, we put a nail through our hard drive
15:01
That's not sufficient. I mean, that might render the hard drive inoperable. You know, for somebody that's just a common user. But when we talk about destruction, I mean shredding. I meet incineration. That's really the only way you're gonna get that assurance.
15:18
Okay, So media reuse a huge threat. The confidentiality destroy your media. If the data is that since
Up Next
CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By