09 - Cybersecurity and Incident Response

Class: CYBR-405


Notes:

Module Objectives

By the end of this module, you should be able to:

Network High

07 - Inbox/Visual Aids/image-11.png505

Birth of TCP/IP

In the early 1970s, the U.S. Department of Defense funded a project through DARPA to solve this problem. Two researchers, Vint Cerf and Bob Kahn, were tasked with creating a protocol that could allow different networks to communicate with each other.

Transmission Control Protocol / Internet Protocol, or TCP/IP.

TCP/IP Continued

IP (Internet Protocol)

IP figures out where the data should go,
and TCP makes sure it actually gets there correctly.

TCP (Transmission Control Protocol)

Early Internet

image-12.png400

Defense in Depth

"An approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information. If one mechanism fails, another steps up immediately to thwart an attack. This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors".

07 - Inbox/Visual Aids/image-13.png414
Notes:

"Hackers don't break in, they log in"

1. Stolen Credentials
2. Exploited Vulnerabilities

Notes:

Weakness

  1. The "castle approach" focuses defenses on external threats.
  2. Once inside, the only thing controlling movement is easily defeatable by changing roles (RBAC).
  3. An admin (role) can easily move laterally (spread) to other systems increasing the negative impact to the organization.
  4. The volume of different applications and frequency of different vulnerabilities (i.e. backdoors) makes it challenging to keep everything patched to stay ahead of our adversaries.

Notes:

Screenshot 2026-03-16 at 9.36.01 AM.png

Indicators of Compromise

How do you know when you are sick?
Fever
Feel Bad
Coughing
Tired
Throwing up
Upset Stomach
Cold Sweats
Etc.

How do you know when you got attackerd?

Anatomy of Cyber Attack

Reconnaissance
The threat actor uses the internet, social media, or other tools to discover likely attack courses.

Weaponization
Code and other tactics, techniques, and procedures are found or developed to exploit the target's vulnerabilities.

Delivery
Weaponized code is transmitted to the target.

Exploitation & Installation
The attacker uses the tactics to dismantle internal controls in the target to avoid detection.

Command & Control
This may Include screen capture, malwere execution, or spawning new Virtual opersing eystem environments.

Execution
This can include extraction or destruction of IT and OT assets, installation of ransomware, IP theft, etc-

Cyber Kill Chain

07 - Inbox/Visual Aids/image-14.png450

Digital Forensics

Who - who are the attackers?
What - what did they take?
When - when did they get in?
Where - where did they go?
Why - why me? (why did my controls fail)
How - how did they get in?