Cybersecurity Fundamentals: Laws, Regulations, and Testing Methodologies
Cybersecurity Fundamentals
International Laws and Regulations
European Council Convention on Cyber Crime
This convention aims to standardize computer crime laws across the European Union.
Organization for Economic CO-Operation and Development (OECD)
The OECD creates policies to promote sustainable economic growth, including those related to cybersecurity.
Council Directive on Data Protection
Established in 1995, this directive outlines data protection measures based on OECD guidelines.
US Laws and Regulations
1973 US Code of Fair Information Practices
Developed by the health and education sectors, this code addresses record-keeping, privacy, prevention, correction, and maintenance of information.
18 USC Section 1029 Fraud and Related Activity in Connection with Access Devices
This law criminalizes unauthorized access to accounts and possession of unauthorized devices, including software for generating credit card numbers and cloning cellphones.
18 USC Section 1030 Computer Fraud and Abuse Act
This act focuses on computer security, extortion, viruses, worms, and other computer crimes.
18 USC Section 2510 Electronic Communication Privacy Act
This act limits unauthorized access to electronic communications.
Cyber Security Enhancement Act of 2002
This act provides for life sentences for cybercrimes causing bodily harm and supplements the Patriot Act.
1996 U.S. Kennedy-Kasselbaum Health Insurance Portability and Accountability Act (HIPPA)
HIPPA mandates healthcare professionals to ensure the integrity and confidentiality of individually identifiable electronic health information.
2000 Graham-Leach-Bliley Act (GBA)
Similar to HIPPA, the GBA applies to financial institutions and their handling of sensitive data.
2001 USA Patriot Act
This act allows for enhanced surveillance procedures, making it easier for law enforcement to intercept computer crimes and conduct penetration testing on US government systems.
2002 Federal Information Security Management Act (FISMA)
FISMA mandates better security access controls for federal infrastructure and broadens the USA Patriot Act’s provisions on testing federal networks.
2003 Sarbanes-Oxley Act (SOX)
SOX requires CEOs and CFOs of SEC-reporting companies to provide written reports on their internal systems.
Testing Methodologies
OSSTMM (Open Source Security Testing Methodology Manual)
OSSTMM defines key concepts like scope, channel, index, and vector to guide security assessments. It offers various testing approaches, including blind, double-blind, gray box, and tandem testing. The framework is adaptable and aligns with industry regulations.
ISSAF (Information Systems Security Assessment Framework)
ISSAF is a process-oriented framework with four phases: planning, assessment, treatment, and accreditation. It assesses controls against vulnerabilities and addresses key areas of information security.
OWASP (Open Web Application Security Project)
OWASP focuses on web application vulnerabilities and testing at the OSI level. It provides coding principles and guidance for addressing high-risk problems.
WASC-TC (Web Application Security Consortium Threat Classification)
WASC-TC identifies risks through testing and classification, including enumeration, development, and taxonomy cross-referencing.
Information Gathering
Information gathering involves various sources, such as company websites, public filings, newsgroups, user group meetings, dumpster diving, and social engineering.
Vulnerability Scanners
Several vulnerability scanners are available, including NESSUS, SAINT, SARA, ISS, and NetRecon, each with its own features and capabilities.
Accessing a Website
The process of accessing a website involves DNS resolution, socket creation, and HTTP requests.
Web Vulnerabilities and Tools
Tools like Brutus, NetCat, ISS Xploit, and CleanIISlog can be used to exploit web vulnerabilities and erase logs.
Windows Password Hashes
Windows password hashes are stored in the SAM file and can be extracted using tools like pwddmp2 or DLL injection.
LanMan and NTLM
LanMan is an older, less secure password hashing algorithm, while NTLM, introduced with Windows NT, is significantly stronger.
Viruses and Worms
Several notable viruses and worms include Chernobyl, I Love You, Melissa, Bugbear, MyDoom, W32/Klez, Blaster, SQL Slammer, and Sasser, each with its own characteristics and methods of infection.
WEP Encryption
WEP uses the RC4 encryption algorithm but has known vulnerabilities due to incorrect implementation of initialization vectors.
