wk5 - Final

00:14:04
https://www.youtube.com/watch?v=VSKJvLj4la4

Résumé

TLDRPrezentarea discută despre aspectele fundamentale ale controlului accesului, subliniind importanța kernel-ului ca interfață între aplicații și hardware. Se prezintă diverse metode de atac, cum ar fi atacurile prin inginerie socială și spoofing-ul DNS, și se discută despre cum Active Directory oferă un control granular asupra accesului utilizatorilor. De asemenea, se face o distincție între grupuri de lucru și Active Directory, reliefând avantajele sistemelor centralizate. Prevenirea atacurilor cibernetice este abordată prin utilizarea de parole puternice și firewalls-uri. Monitorizarea sistemului și identificarea vulnerabilităților sunt discutate ca parte esențială a sarcinilor unui administrator de sistem.

A retenir

  • 🔒 Controlul accesului este esențial pentru securitate.
  • 💻 Kernel-ul leagă aplicațiile de hardware.
  • 📁 Active Directory oferă control granular.
  • 👥 Grupurile de lucru sunt peer-to-peer.
  • ⚠️ Ingineria socială poate compromite parolele.
  • 🔑 Parolele puternice reduc riscurile.
  • 🌐 Firewall-urile protejează rețeaua.
  • 📊 Monitorizarea sistemului este crucială.
  • 🏴‍☠️ DNS spoofing este o tehnică de atac.
  • 🔍 Identificarea vulnerabilităților este o sarcină continuă.

Chronologie

  • 00:00:00 - 00:05:00

    Prezentarea discută despre controlul accesului, explicând rolul kernel-ului în legătura dintre stratul aplicației și stratul CPU-ului, evidențiind pericolele care pot apărea din utilizarea parolelor slabe, cum ar fi cele din lista RockYou. Se subliniază importanța autentificării în două etape pentru a proteja procesele user-owned și a preveni atacurile prin inginerie socială sau spoofing DNS. De asemenea, sunt explicate conceptele de Workgroup și Active Directory, accentuând diferențele cheie în gestionarea controlului accesului și scalabilitatea acestor structuri.

  • 00:05:00 - 00:14:04

    În continuare, se abordează suprafețele de atac Windows și măsurile de mitigare. Discuția include criptarea datelor și a comunicațiilor, utilizarea controlului accesului prin parole, autentificare și firewall-uri. De asemenea, se adâncește subiectul monitorizării sistemelor, stabilind obiective de securitate, compararea performanței cu o bază de referință și identificarea vulnerabilităților. Se menționează importanța monitorizării log-urilor și a analizării adreselor IP pentru a detecta activitățile suspecte.

Carte mentale

Vidéo Q&R

  • Ce este controlul accesului?

    Controlul accesului se referă la metodele de securitate utilizate pentru a restricționa accesul la resursele unui sistem.

  • Ce este un kernel?

    Kernel-ul este componenta centrală a unui sistem de operare care leagă aplicațiile de hardware.

  • Ce este Active Directory?

    Active Directory este un serviciu de gestionare a identităților utilizat pentru a controla accesul utilizatorilor la resurse într-o rețea.

  • Ce este un atac prin inginerie socială?

    Un atac prin inginerie socială implică manipularea utilizatorilor pentru a obține informații sensibile.

  • Cum poate fi prevenit un atac cibernetic?

    Prin utilizarea de parole puternice, autentificarea cu doi factori și firewalls-uri.

  • Care este diferența dintre grupuri de lucru și Active Directory?

    Grupurile de lucru sunt rețele de tip peer-to-peer, în timp ce Active Directory este un sistem centralizat de control al accesului.

  • Ce rol joacă un firewall într-un sistem?

    Firewall-urile protejează sistemul prin restricționarea accesului neautorizat la rețea.

  • Ce înseamnă 'Duel' în securitate?

    Duel se referă la un proces de autentificare bazat pe două verificări distincte.

  • Ce este spoofing DNS?

    Spoofing DNS este o tehnică prin care un atacator falsifică informațiile DNS pentru a redirecționa utilizatorii.

  • Cum se monitorizează un sistem pentru vulnerabilități?

    Prin stabilirea unui comportament normal ca bază și compararea cu informațiile de performanță.

Voir plus de résumés vidéo

Accédez instantanément à des résumés vidéo gratuits sur YouTube grâce à l'IA !
Sous-titres
en
Défilement automatique:
  • 00:00:00
    okay we can take a look at the next
  • 00:00:02
    slide access control but before we do
  • 00:00:05
    there is a slide that precedes this Cel
  • 00:00:08
    mode now go to this YouTube video and it
  • 00:00:11
    has a very learned individual that goes
  • 00:00:14
    in the details into details about the
  • 00:00:17
    kernel mode and I do recommend everyone
  • 00:00:21
    watch it and let's take a look at Access
  • 00:00:23
    Control now with this Access Control let
  • 00:00:26
    me get the drawing tool we can actually
  • 00:00:28
    put the you know what the drawing tool
  • 00:00:31
    is like wasn't working correctly there
  • 00:00:33
    but okay so we can take the application
  • 00:00:35
    layer and then we have everything that
  • 00:00:39
    it goes on on the bottom layer such as
  • 00:00:42
    the CPU and I can just I can just uh put
  • 00:00:45
    in CPU just just to just to abbreviate
  • 00:00:48
    everything and the thing that holds
  • 00:00:51
    everything together the layer that
  • 00:00:53
    connects everything is the kernel so the
  • 00:00:55
    kernel is going to connect to the
  • 00:00:57
    application layer and the kernel is
  • 00:01:00
    going to connect to the CPU layer and
  • 00:01:02
    this is all based on the drawing and
  • 00:01:04
    this the kernel CPU memory and devices
  • 00:01:08
    so the devices would be all the
  • 00:01:10
    peripherals so the way I want you to
  • 00:01:12
    look at this slide is look at all these
  • 00:01:14
    possible things that can go wrong such
  • 00:01:17
    as you know John which can utilize the
  • 00:01:22
    rocku rocku is a text file you can
  • 00:01:25
    Google it that's been going around for
  • 00:01:28
    like the last 20 years it has all the
  • 00:01:30
    typical passwords if you have ever seen
  • 00:01:32
    the movie or the show The Office Michael
  • 00:01:35
    the manager his password I think was
  • 00:01:37
    password 123 or it was like 1
  • 00:01:41
    2345 I recall that there was U somebody
  • 00:01:45
    that that was a network manager and and
  • 00:01:47
    of course Michael was afraid that he was
  • 00:01:49
    some sort of a terrorist or or something
  • 00:01:52
    like that anyways we recall that it was
  • 00:01:55
    actually Michael that jeopardized the
  • 00:01:57
    networking or jeopardized everyone's
  • 00:01:58
    Network because it's password was easy
  • 00:02:00
    to guess I think it was as I said 1 2 3
  • 00:02:03
    4 5 that being said that would have been
  • 00:02:04
    one of the passwords that was in the
  • 00:02:07
    Rock You Tech so this program called
  • 00:02:10
    John actually references anything you
  • 00:02:13
    ask it to but it's generally going to be
  • 00:02:16
    referencing a file and Rocky was one of
  • 00:02:18
    those files that was out there that had
  • 00:02:21
    like literally every easy to guess
  • 00:02:23
    password that was out there L literally
  • 00:02:25
    had thousands of entries so John could
  • 00:02:28
    actually utilize a Brute Force attack to
  • 00:02:32
    get to this to get to this the whole
  • 00:02:34
    point of it is that you're trying to you
  • 00:02:36
    know invade one of those user owned
  • 00:02:40
    processes to try to get to the kernel
  • 00:02:42
    and ultimately get to the bottom layer
  • 00:02:45
    the peripherals the CPU and the and all
  • 00:02:47
    the RAM and everything another way to do
  • 00:02:50
    it is through social engineering and
  • 00:02:52
    then of course DNS spoofing and
  • 00:02:54
    hijacking and of course the one of the
  • 00:02:57
    remedies is to make sure that that your
  • 00:03:00
    that your account is US uses duel to
  • 00:03:04
    help protect it duel helps you define
  • 00:03:08
    you know it helps you Define identity
  • 00:03:12
    your to make sure that your identity is
  • 00:03:15
    is basically Yours by two things what
  • 00:03:18
    you have and what you are for example uh
  • 00:03:20
    you can have like an email that they
  • 00:03:23
    they email you a particular password to
  • 00:03:26
    or your cell phone that's been
  • 00:03:28
    pre-assigned and they can text you a
  • 00:03:31
    password on your cell phone and that's
  • 00:03:34
    that's a the Dual algorithm is something
  • 00:03:38
    that adds another layer of protection to
  • 00:03:42
    make sure that uh you weren't for
  • 00:03:45
    example social engineered now let's take
  • 00:03:47
    a look at and let me get out of get out
  • 00:03:50
    get out of here let's take a look at the
  • 00:03:52
    work groups and active
  • 00:03:54
    directory work group is a series of
  • 00:03:58
    independent PCS utilizing peer-to-peer
  • 00:04:01
    so for example in one land meaning
  • 00:04:04
    connected by a local switch you can have
  • 00:04:07
    a PC
  • 00:04:08
    laptop printer and a couple more PCS as
  • 00:04:12
    I said on the same land and this
  • 00:04:15
    supports individually attached storage
  • 00:04:19
    an example of a good work group in Linux
  • 00:04:21
    is Samba and then of course with Windows
  • 00:04:25
    you can hook up work groups there and
  • 00:04:28
    the scalability is very very low only 10
  • 00:04:31
    to 20 devices the whole point of a work
  • 00:04:34
    group is you can have printers and PCs
  • 00:04:38
    that or excuse me you can have printers
  • 00:04:40
    and fax machines and all a work group is
  • 00:04:44
    there to do is to potentially share
  • 00:04:47
    those uh the printer and file servers to
  • 00:04:51
    other people uh the other the other
  • 00:04:54
    aspect is active directory which is a
  • 00:04:58
    type of domain control controller an
  • 00:05:00
    active directory is actually a database
  • 00:05:04
    that you can have granular control so
  • 00:05:08
    for example if you have a user here I'll
  • 00:05:11
    represent that with a box and here you
  • 00:05:14
    can have a him the user connected to the
  • 00:05:17
    internet and on the Internet is is maybe
  • 00:05:20
    Facebook and you can manipulate the
  • 00:05:24
    packets going in and out of Facebook
  • 00:05:26
    such that you can have granular control
  • 00:05:29
    so for example your firewall can be set
  • 00:05:32
    up to maybe filter particular types of
  • 00:05:38
    traffic like low latency type traffic in
  • 00:05:42
    which it would block instant messages on
  • 00:05:45
    Facebook and ads so in other words the
  • 00:05:49
    worker or the I'm going to say client
  • 00:05:53
    can get on your company sponsored
  • 00:05:55
    Network he can get to his Facebook so he
  • 00:05:58
    can stay connected socially but you're
  • 00:06:00
    not going to allow him to engage in
  • 00:06:03
    instant messaging and you're going to be
  • 00:06:05
    able to prevent the ads because for the
  • 00:06:07
    sole purpose not necessarily of
  • 00:06:08
    controlling Behavior but for the sole
  • 00:06:11
    purpose of saving your company's
  • 00:06:13
    bandwidth because all of those instant
  • 00:06:15
    messages all those little ads eat up
  • 00:06:18
    bandwidth uh PCS in the active directory
  • 00:06:23
    directory and you know as I said domain
  • 00:06:26
    controller so I'll put DC here for in
  • 00:06:30
    controllers they are controlled by the
  • 00:06:33
    network administrator so you this would
  • 00:06:36
    be the client server type Network so the
  • 00:06:40
    control is centralized now with work
  • 00:06:43
    groups it is not client server it's
  • 00:06:45
    peer-to-peer so you have an individual I
  • 00:06:50
    guess decision about whether or not you
  • 00:06:51
    want to join in the group active
  • 00:06:53
    directory everyone is naturally part of
  • 00:06:57
    the group and although you should be in
  • 00:07:00
    the same land the scalability of actor
  • 00:07:02
    directory is such that it can scale
  • 00:07:05
    different autonomous systems completely
  • 00:07:08
    different IP addresses and when you when
  • 00:07:12
    you do that that's called a federation
  • 00:07:15
    so the scalability of domain controllers
  • 00:07:18
    and active directory is very high
  • 00:07:21
    another interesting fact about active
  • 00:07:24
    directory is the fact that you can
  • 00:07:28
    anyone
  • 00:07:30
    within the domain that the active
  • 00:07:32
    directory is connected to uh the
  • 00:07:34
    administrator can log into anybody's
  • 00:07:38
    computer when they are connected to
  • 00:07:40
    active directory so that is yet another
  • 00:07:43
    plus let's look at the next slide
  • 00:07:46
    Windows attack surfaces and mitigation
  • 00:07:49
    so a better way to look at this is here
  • 00:07:54
    where is the drawing tool right here
  • 00:07:56
    draw and we have our asset right here
  • 00:08:00
    whatever whatever it is and maybe it has
  • 00:08:03
    some IP so we start from the inside out
  • 00:08:08
    the data that resides on it I'll just
  • 00:08:11
    say it's a bunch of ones and zeros one
  • 00:08:14
    we'll just say 101 that is going to be
  • 00:08:18
    encrypted as it resides in this storage
  • 00:08:22
    and every piece of communication going
  • 00:08:25
    in or out will also be encrypted I'll
  • 00:08:29
    just say en NC for encrypted that makes
  • 00:08:33
    that makes doubly sure that even if
  • 00:08:36
    anybody EES drops on this data with wire
  • 00:08:39
    shark and you know they can because we
  • 00:08:41
    did a prior lab they're going to get a
  • 00:08:43
    bunch of garbage now to even leg have
  • 00:08:48
    legit you know access to whatever this
  • 00:08:52
    IP is this intellectual property it's
  • 00:08:54
    going to have access control so you're
  • 00:08:57
    going to have usernames and passwords
  • 00:09:00
    and you're going to have authentication
  • 00:09:03
    services that or authentication servers
  • 00:09:07
    uh outside of the chain of communication
  • 00:09:11
    that are is going to be doubly protected
  • 00:09:15
    as well and even Above This everything
  • 00:09:19
    will be protected by a firewall a
  • 00:09:22
    firewall is a specialized appliance that
  • 00:09:27
    uh that applies little rules to ensure
  • 00:09:30
    and basically it it will impose Access
  • 00:09:34
    Control lists to Ure that if you belong
  • 00:09:38
    here you can join in but if you don't
  • 00:09:42
    belong here then you cannot come in and
  • 00:09:46
    this occurs at the packet level and this
  • 00:09:49
    occurs inside the packet so we're
  • 00:09:52
    looking at quality of service issues so
  • 00:09:56
    if it won't necessarily be completely
  • 00:09:58
    filled filtered but it'll be as it may
  • 00:10:01
    be assigned a uh a priority such that if
  • 00:10:05
    there's a tie with a packet with a lower
  • 00:10:09
    priority your packet will win an example
  • 00:10:12
    of this is voice over IP VoIP which
  • 00:10:15
    stands for voice over IP if you're a
  • 00:10:17
    voice packet because it requires like
  • 00:10:20
    kind of like such care because it
  • 00:10:23
    requires low that has such high low
  • 00:10:25
    latency requirements that if the voice
  • 00:10:28
    packet
  • 00:10:29
    is ties with like an FTP packet file
  • 00:10:33
    transfer protocol The Voice packet will
  • 00:10:35
    for sure be process first because there
  • 00:10:39
    is a low latency requirement for that
  • 00:10:43
    protocol such that if there's any
  • 00:10:45
    minuscule Interruption then that call is
  • 00:10:48
    pretty much useless because of the way
  • 00:10:51
    voice packets go that being said that
  • 00:10:54
    firewall is to protect you and everyone
  • 00:10:57
    else in the system all right in terms of
  • 00:11:01
    actually installing the Windows Server
  • 00:11:04
    maintenance and actually I'm going to
  • 00:11:06
    put a line through here simply because
  • 00:11:09
    it doesn't have to be just Windows it
  • 00:11:11
    could be really any server because this
  • 00:11:14
    is a system admin class as syst system
  • 00:11:17
    admins you're going to be dealing with
  • 00:11:18
    different servers different types of
  • 00:11:20
    servers and the idea is you install the
  • 00:11:24
    operating system or app software because
  • 00:11:27
    you can take any old you know operating
  • 00:11:30
    system and install you know an
  • 00:11:32
    application on it or you can actually
  • 00:11:34
    install server software on it like for
  • 00:11:36
    example taking a Windows XP Windows 10
  • 00:11:40
    or Windows 11 and and activating the IIs
  • 00:11:44
    or installing a pat on it once you do
  • 00:11:46
    that guess what it is a web server if
  • 00:11:49
    you you so you go ahead and you install
  • 00:11:52
    the app or the operating system you
  • 00:11:55
    monitor the operation of the computer
  • 00:11:58
    system or of the app and then you make
  • 00:12:00
    any config changes to the system as
  • 00:12:04
    needed so for example if you install
  • 00:12:06
    Apache there is a log for Apache it
  • 00:12:10
    keeps track of anybody that has logged
  • 00:12:12
    in your system it keeps track of their
  • 00:12:14
    IP address so you can see if if your
  • 00:12:18
    computer was made vulnerable or
  • 00:12:19
    exploited you could see the last few
  • 00:12:22
    requests that were made you can look at
  • 00:12:24
    their IP addresses let's take a look at
  • 00:12:27
    system monitoring when it comes to
  • 00:12:29
    system monitoring you step one Define
  • 00:12:32
    security goals describe Behavior as a
  • 00:12:35
    baseline you can have sample performance
  • 00:12:38
    information and compare it with the
  • 00:12:40
    Baseline and Report any anomalies
  • 00:12:44
    finally we have the ability to identify
  • 00:12:48
    vulnerabilities so we we already went
  • 00:12:51
    over some vulnerabilities like for
  • 00:12:54
    example social engineering DNS spoofing
  • 00:12:57
    and hijacking so any a lot of servers
  • 00:13:01
    are vulnerable to some of the same
  • 00:13:04
    things so you can use some of the
  • 00:13:08
    research tools that you were provided
  • 00:13:11
    you there are websites that you can go
  • 00:13:13
    to to check out all possibilities to
  • 00:13:16
    check out the surface area
  • 00:13:19
    vulnerabilities that this object may
  • 00:13:22
    have
  • 00:13:23
    [Music]
  • 00:13:29
    wa
  • 00:13:32
    [Music]
  • 00:13:41
    [Music]
  • 00:14:02
    [Music]
Tags
  • control acces
  • kernel
  • Active Directory
  • grup de lucru
  • securitate
  • atac cibernetic
  • parole
  • firewall
  • monitorizare sistem
  • vulnerabilități