xx(xT(KhTibehAb HrglaeaeeCctnok Atrec Sprtno S Cooear)pctyurity)

Review from Module 8

Review: Operations and Monitoring Foundations  

Key Module 8 Ideas

Why This Matters in Module 9

Security operations depend on reliable telemetry and disciplined operational processes.

Learning Outcomes

Learning Outcomes  

After completing this module, you will be able to:

1 Security Foundations

1.1 Core Principles and Controls

This section introduces core security principles, governance terms, and foundational controls used in enterprise environments.

9.1 Security Terminology: The CIA Triad  

The Holy Trinity of Security

xCxIxAConvIntaAeifigldraeibntityliitaylity

Audits & Compliance  

Security Audits

Why audit? To find broken locks before thieves do.

Regulatory Compliance (The Law)

x□□□xAFUPgeirsaneertctwAhSalcLnolceoResvepyulslses

This audit compliance diagram visualizes the security checklist approach: a clipboard with three checkboxes covers Firewall Rules, User Access, and Patch Levels. Agent Snoopy (the auditor) examines the document and draws a green arrow pointing to each checkbox. This represents the systematic verification process that audits conduct: walking through documented infrastructure, verifying each setting matches policy, and checking patches are current. The presence of a checklist and auditor (not just hoping security is good) emphasizes the "verify, don’t trust" principle central to external audits and compliance verification.

Encryption: Locking the Data  

Symmetric (Private Key)

"The House Key"

Asymmetric (Public Key)

"The Mailbox"

SxxxSAxPPYyasurommybivumemliatseKmcehateeSlKrrytoeeirtythciecLock,keeptheKey.

Vulnerability and Exploit Types  

Definitions

Zero-Day Attack

A vulnerability the vendor doesn’t know about yet.

FVxZeiulrreno-w(NDaoayllPEatxpchl)oit

This zero-day vulnerability diagram shows the critical danger: a Firewall (gray box) has an unpatched vulnerability (red box marked "No Patch") in its application layer. A cat-shaped attacker (symbolizing a sophisticated exploiter) arrows toward this vulnerability with an "ultra thick alertred" line labeled "Zero-Day Exploit." Because the vulnerability has no patch, the firewall cannot defend itself. This illustrates why unpatched vulnerabilities—especially day-zero flaws unknown to vendors—require immediate compensating controls or isolation, as technically sound defenses (the firewall) offer no protection against unknown exploits.

Defense Tool: Honeypots and Deception  

What is a Honeypot?

A "Trap Server" designed to look juicy to hackers.

Common Tools

Canary: A device that chirps (alerts) when accessed. Cowrie: A fake SSH terminal that logs the hacker’s commands.

xRxH(xIAxAeoFagntlalnkotaerDeyereckt!BpDdsotaHtae)re

2 Threats and Risk Assessment

2.1 DoS, Botnets, and Malware

Threat analysis identifies disruptive and malicious behaviors so teams can prioritize controls and response readiness.

9.2 Threat Types and Assessment  

The Attacker Hierarchy

The Insider Threat

Current or former employees.

IxIxxEFDnnxiitsitrereedeerwcrrnaltn(allAaTr(BccluBloes Nstlockseeckstd)ewd)ork

This insider threat diagram illustrates the asymmetry of internal versus external threats: a dashed box marks the Internal Network boundary with an insider user and server inside. A firewall blocks the external attacker (cat) from reaching the server (red arrow labeled "Firewall Blocks"). However, the insider (trusted employee icon) can reach the server directly via an orange arrow labeled "Direct Access," bypassing the firewall entirely. This visualization explains why insider threats are particularly dangerous: traditional perimeter security cannot defend against trusted users with legitimate access who have gone rogue or clicked a phishing link.

Denial of Service (DoS) vs. Distributed DoS (DDoS)  

The "Traffic Jam" Analogy

Goal

To attack Availability. The server isn’t hacked, it’s just overwhelmed.

xVxxxBxicottinmet(TrafficJam)

This DDoS botnet attack diagram shows the command-and-control structure: a Master (hacker) sends dashed commands to multiple Bot agents (compromised devices), which simultaneously execute the attack. Three thick red arrows labeled "Attack" flow from the bots to the target server. Unlike a simple DoS (one attacker), a DDoS distributes traffic across hundreds of compromised devices, making it harder to block the attacker’s IP address. The dashed versus solid arrows show the distinction between the hidden command channel (dashed) and the visible attack traffic (solid red), representing how botnets hide attacker identity while multiplying attack volume.

Botnets: The Zombie Army  

Who are the Zombies?

Often insecure IoT (Internet of Things) devices:

Structure

1.

Herder: The criminal.

2.

C&C: Server giving orders.

3.

Zombies: The infected devices.

xCxxxH&aCckeSderCvaermeras

This botnet zombie army diagram shows the scale of IoT compromise: a Command-and-Control server (cloud icon, top) issues dashed red commands to multiple zombie devices (hacked camera icons with semi-transparent appearance, showing they’re under attacker control). Three green status dots below each camera indicate they’re infected and listening to the C&C. The three camera icons are typical targets: smart cameras, smart bulbs, or connected devices with weak passwords. Unlike traditional servers, IoT devices rarely receive timely security updates, making them attractive for long-term botnet recruitment.

Malware: Virus vs. Worm  

Virus (Needs a Driver)

Like a car that needs a driver, a Virus needs **YOU** to start it.

Worm (Self-Driving)

A Worm is a **self-driving car**.

xInxNxxJuNfeeemetcdpwtessord"CAkFiluCleictoa.ek"mbxaleetically!

Malware: Trojans & Ransomware  

Trojan Horse (The Trick)

Named after the Greek myth. It looks like a gift, but contains soldiers (malware).

Ransomware (The Kidnapper)

It doesn’t steal data; it locks it.

xFxHxFPriiaeeddleyGeE5annBmIcrTe.nsyCexidpteeed!

Case Study: The Zombie Accountants  

Scenario: 2:00 AM Alert

Agent Snoopy’s pager buzzes. The KibbleCorp webstore has crashed.

He checks the network dashboard:

Detective Questions:

1.

Why did the malware likely spread as a Worm instead of a Virus?

2.

The computers are acting as a group. What is this "Army" called?

3.

Is the attack trying to steal data or stop the business?

xIt’san insidejob!

Case Study Solution: The Zombie Accountants  

Snoopy’s Analysis

1.

Propagation: It must be a Worm because it spread automatically while no one was using the computers.

2.

The Army: They are a Botnet (Robot Network) of Zombies.

3.

Goal: This is a DDoS (Distributed Denial of Service). The goal is to overwhelm the webstore (Availability), not steal data (Confidentiality).

xxxAxWxPceucobllusttnohtireengnet(Zwoormkbpielus)g!

3 Spoofing and On-Path Attacks

3.1 Identity and Traffic Manipulation

This section examines identity and traffic manipulation attacks such as spoofing, poisoning, and interception techniques.

9.3 Spoofing: The Fake Return Address  

What is Spoofing?

Falsifying data to gain an illegitimate advantage.

Why does this work?

The Internet (IP) is like the Mail System. It delivers to the Destination. It rarely checks if the Sender is telling the truth!

xRTFFAeorila:orelol VmwwIPic:aled:ti 1l!6m9 (.62.T.61ru.668st.e1d.1IP)

On-Path Attacks (The "Middle Man")  

Concept: Passing Notes

Imagine Lucy passes a note to Linus in class.

This is an **On-Path** (formerly Man-in-the-Middle) attack.

Tools

Wireshark (to listen) and Ettercap (to intercept).

xxNxOHGoneor-lomPlodaatblPhyeaAtthtacker

ARP Poisoning: The Roll Call Lie  

The Vulnerability

ARP is the protocol that finds MAC addresses ("Who has IP 10.1.1.1?").

The Result

The Hacker Cat tells your computer "I am the Router." Your computer believes him and sends all your internet traffic to the Cat.

xVxRxHAR"I"IicoaRoaatiutckPutmmmeererTrRVCab=ouicatlCttie:aermt!"!"

Tool Spotlight: MAC Spoofing  

Changing Plates

Your MAC address is burned into the hardware, but software can override it.

Why do it?

1.

To bypass MAC Filtering (Access Control Lists).

2.

To hide the device manufacturer (OUI) so hackers don’t know what you are using.

Lookslike
xMRSxayeaponLloewa:f:p A 1PtoA1Cp:B:2!B2:C:3C3

VLAN Hopping (Double Tagging)  

The Hidden Suitcase

How do you sneak a forbidden item past a checkpoint?

DVVDSaLLowtAAuiaNNbtcleh21Ts00atrgipgesdoFutraemre

Case Study: The Coffee Shop Interception  

Scenario: Free Wi-Fi Danger

Agent Snoopy is at the "KibbleKafe." He connects to the open Wi-Fi to check his bank.

The Hacker Cat is sitting in the corner. Suddenly, Snoopy’s browser warns:

"Certificate Error: The identity of bank.com cannot be verified."

Snoopy realizes his traffic is being detoured through the Cat’s laptop.

Detective Questions:

1.

What Layer 2 protocol is the Hacker Cat abusing to redirect the traffic?

2.

What is the Hacker Cat’s position called (sitting between Snoopy and the Router)?

3.

Why did Snoopy see a Certificate Error (HTTPS)?

xExvilGrin

Case Study Solution: The Coffee Shop Interception  

Analysis

1.

Protocol: ARP. The Cat used ARP Poisoning to tell Snoopy "I am the Router."

2.

Position: On-Path (Man-in-the-Middle).

3.

Error: The Cat tried to read encrypted (HTTPS) traffic. Since he doesn’t have the Bank’s private key, he used a fake certificate. Snoopy’s browser detected the fake.

xxxTTTrarahffiffiecc"MiddleMan"

4 Rogue Services and Infrastructure Attacks

4.1 Rogue DHCP, DNS, and Access Points

Rogue infrastructure services can redirect or intercept traffic; this section covers common patterns and mitigations.

9.4 Rogue Devices and Evil Twins  

Rogue Devices

Unauthorized hardware plugged into the network.

The Evil Twin (Wi-Fi)

The "Fake Starbucks" Attack.

xCxCxxStWororroeappnk-W-WgeriierFFSiiig(R(Fneaaakel!l))

Rogue DHCP Servers  

The Danger

If an attacker plugs in a router, it might start handing out IP addresses.

The "Race" Condition

Clients accept the first DHCP OFFER they receive.

xCxRxROOWleoFFiieagFFnnluEEntDeRRerBHDsroCH(S(FeaPCloatsdcPwstta)!)hestsGDatISeCwaOyV!ER

Defending with DHCP Snooping  

The Solution: DHCP Snooping

A security feature on switches that acts like a Club Bouncer.

Trust Boundaries

If an OFFER packet comes from an Untrusted port, the switch drops it.

xxTxxXOruFstFeEdRPDorrtopped!

DNS Attacks: Poisoning the Phonebook  

Concept: The Phonebook

DNS turns Names (google.com) into Numbers (8.8.8.8).

DNS Poisoning

"Changing the entry in the book."

Dkb←xxDNibaniaSbkFlsle.cak.coeFaCommNka→uec→m#h6be1.6er0..!1.6.1.65

5 Human-Centered Threats

5.1 Social Engineering and Credential Attacks

Human-targeted attacks remain a primary risk vector, requiring awareness, verification processes, and credential hardening.

9.5 Social Engineering: Hacking the Human  

Phishing (The Bait)

Sending fraudulent messages to trick users.

Other Variants

xLxSeognind?er: "ITDept"

Physical Social Engineering  

Techniques

SxExTemacpilulgaroyteeereDoor

Principles of Influence  

Why does it work?

Attackers exploit human psychology ("Hacking the Human").

Stop. Look.  Think.

Password Attacks  

Brute Force

Trying every possible combination (aaaa, aaab...).

Dictionary Attack

Using a list of common words (dictionary).

a...
b...
xcSxWF..loa.owrstdlist

Tool Spotlight: John the Ripper & Salting  

John the Ripper (JtR)

A tool used to test password strength by trying to crack them.

Defense: Salting

"Adding Spice to the Recipe."

L1o23ad4e56d3(uhsaersh1)es...
pSasessswioorndco(muspeler2t)ed.

Case Study: Intern Ike and the "CEO"  

Scenario: 4:55 PM on a Friday

Intern Ike at KibbleCorp receives an email:

"From: ceo@kibble-corp.net (Notice the .net!) Subject: URGENT WIRE TRANSFER I am stuck in a meeting. Wire $5,000 to this vendor immediately. If this isn’t done by 5:00 PM, it will be your fault. Do it now!"

Questions:

1.

What specific type of social engineering is this?

2.

Which "Principles of Influence" are being used?

3.

What should Ike do?

x!

Case Study Solution: Intern Ike  

Snoopy’s Advice

1.

Type: Whaling (impersonating a big fish/exec) or Spear Phishing.

2.

Principles:

3.

Action: Verify Out-of-Band. Do not reply to the email. Call the CEO’s assistant or walk to their office. Report to Snoopy immediately.

6 Mitigation and Security Operations

6.1 Analysis, Defense in Depth, and Next Steps

The final section synthesizes offensive/defensive perspectives and maps them to layered mitigations and operational response.

Recap: Offensive vs. Defensive  

The Attacker (Red Team)

The Defender (Blue Team)

xxSecurity is a Balance

Analyzing the Attack with Wireshark  

Red Flags

W16666xFi0..6.6.6.6oure1..6.6.6.6nsh1.6.6.6.6da.5→→→→trk→h1111e-80000SYC.8.1.1.1.1Nap.8.1.1.1.1t.8.5.5.5.5Fur:::::loin D T T T TogNCCCCd!oSPPPPnESSSSSttaYYYYhnNNNN0dardQuery

Defense in Depth: Mitigation Strategies  

LFPoirockeliswci,aes Clls,a, Tm Erenairacnsryin,pg Gt,uio Aanurd,ds Sitnsooping
PTAPSRhedreofuycmvtwleshienasinntrfociperach&hlaysHumlicaaardnlawsca.ceress.rules.

No Single Solution

A firewall won’t stop a user from holding the door open for a hacker. You need all three layers (Defense in Depth).

9.6 Additional Resources  

Vulnerability Databases

Learning Tools

Readthedocs
xKxbehanfcoorkewerlthseedod!ge is Power

Module Summary

Module 9.0 Summary  

Key Concepts:

Security Operations:

Conclusion

This module covered network security concepts: the CIA Triad and AAA framework, common threats (DoS, malware, social engineering), spoofing attacks (MAC, IP, ARP, DNS), rogue devices and password cracking, and Defense in Depth strategies. You learned how to analyze attacks using Wireshark and implement layered security controls. This concludes the network fundamentals series—you are now equipped with foundational knowledge to secure, monitor, and operate enterprise networks.

Questions?  

xMAinsysiqounestionAsc?complished!