Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
From CIA to APT

From CIA to APT

An Introduction to Cyber Security
by Amoroso and Amoroso 2017 179 pages
3.7
88 ratings
Listen
2 minutes
Try Full Access for 3 Days
Unlock listening & more!
Continue

Key Takeaways

1. Cyber Security's Core Mission: Protecting Confidentiality, Integrity, and Availability

Cyber security is all about reducing the risk of attacks to computers, networks, or software.

Defining the mission. Cyber security fundamentally aims to reduce the risk of malicious attacks against digital assets. These attacks target three primary aspects, collectively known as the CIA model: Confidentiality, Integrity, and Availability. Understanding these core threats is crucial for any effective defense strategy.

Confidentiality threats involve unauthorized disclosure of sensitive information.

  • Example: The 2016 John Podesta email leak, where poor password management led to embarrassing information being posted on WikiLeaks, impacting a presidential campaign.
    Integrity threats involve the unauthorized modification or corruption of data or systems.
  • Example: The Sony Pictures attack, where hackers corrupted administrative software on tens of thousands of computers, rendering them useless, and also exposed embarrassing emails.
    Availability threats involve intentionally blocking legitimate access to systems or services.
  • Example: Distributed Denial of Service (DDOS) attacks in 2012 that overwhelmed banking websites, preventing customers from accessing their accounts.

Beyond the CIA. While the CIA model covers most cyber threats, some experts suggest fraud as a fourth category, where services are stolen without payment. Regardless, the core objective remains to protect assets from these damaging conditions, requiring more than just common sense solutions.

2. The Fundamental Imbalance: Offense Always Leads Defense

The offense must only find only one successful path to the target asset, whereas the defense must prevent all such paths.

Asymmetric warfare. A profound and often overlooked reality in cyber security is the inherent advantage of the offense. Attackers only need to discover a single vulnerability or successful path to compromise a system, while defenders must secure every conceivable entry point. This fundamental asymmetry explains why cyber offense is, and likely always will be, ahead of defense.

Hacking methods. Cyber attacks generally follow two patterns:

  • Brute force: Automated, relentless attempts to break in, like trying every possible password combination.
  • Heuristic: Relies on human cleverness and insight to find shortcuts, like exploiting a known software bug or social engineering.
    More complex attacks combine these, forming "hacking campaigns" or "Advanced Persistent Threats" (APTs) when conducted by nation states over long periods.

Attribution challenges. Identifying the source of an attack is incredibly difficult due to the Internet's design, which allows for IP address spoofing and multi-hop hacking through intermediary systems. This makes tracing attacks back to their origin nearly impossible for law enforcement without extensive legal permissions across multiple jurisdictions. Despite these challenges, malicious actors are broadly categorized into:

  • Hackers: White, black, and grey hats with varying motivations.
  • Cyber Criminals: Driven by financial gain, often using the Dark Web to sell stolen data.
  • Cyber Terrorists: Politically or philosophically motivated, aiming for disruption.
  • Nation States: Highly capable, military-funded groups targeting intellectual property or critical infrastructure.

3. Malware: The Ubiquitous Tool of Cyber Attacks

Malware is written by malicious individuals who seek to intentionally cause bad things to happen to target assets.

Malicious software. Malware, a portmanteau of "malicious software," is the primary tool used in cyber attacks. It exploits two key properties of modern computing: the ability of computers to download and execute software from various sources, and the trust placed in that software to access local resources. This allows malware to operate silently, often without user knowledge.

Types of malware:

  • Trojan horse: Software that appears legitimate but contains hidden, malicious functions (trap doors). Ken Thompson famously noted that the only way to avoid them is to write all your own software, which is impractical.
  • Spyware: A type of Trojan horse that secretly collects user information, like location data, and sends it to attackers.
  • Worm: Self-propagating malware that can spread rapidly from one system to another across networks, often bringing down entire systems.

Exploiting trust. Unlike trusted applications that request permissions, malware bypasses these checks, directly accessing and manipulating system resources. This fundamental breach of trust underscores the difficulty in securing systems, as users are often forced to rely on the integrity of software developers. Open-source software offers a partial solution by allowing public code review, but it's not a universal fix.

4. Layered Defenses: The Imperative of Defense in Depth

The best cyber security architectures are based on a design approach called defense in depth.

Multi-layered protection. Defense in depth is a critical architectural principle, advocating for multiple, diverse, and complementary security layers rather than relying on a single strong defense. If one layer fails or is bypassed, another layer is there to pick up the slack, significantly reducing overall risk.

Complementary controls. Instead of simply duplicating a single control (e.g., two passwords), effective defense in depth uses different types of safeguards. For example, combining a password with a firewall means that even if a password is guessed, the attacker still faces firewall rules. The entire cyber security industry is organized around providing these diverse solutions.

The AAA model. A popular framework for defense in depth includes three core layers:

  • Authentication: Verifies who you are (e.g., passwords, biometrics).
  • Access Control: Ensures only authorized individuals or groups can access specific resources (e.g., encryption, firewalls).
  • Audit: Collects and processes logs of activity to detect evidence of malicious behavior.
    These layers, combined with functional, procedural, and policy-based safeguards, form a robust cyber security architecture, aiming to make systems "idiot-proof" through technology.

5. Encryption: The Foundation of Secure Digital Trust

Cryptography involves secret writing between two or more people so that others looking in cannot decipher what’s being said or shared.

Secret communication. Encryption, the oldest security concept, is the process of scrambling information (plaintext) into an unreadable format (ciphertext) using an algorithm and a secret key. Decryption reverses this process. A cryptosystem comprises these algorithms, keys, plaintext, and ciphertext.

Symmetric encryption. In conventional symmetric encryption, the same secret key is used for both encryption and decryption. This method ensures:

  • Authentication: If Alice and Bob share a secret key, Bob can authenticate Alice's identity if she sends a message he can decrypt.
  • Secrecy: Unauthorized observers (Eve) cannot read messages exchanged between Alice and Bob if they don't have the shared key.
    While effective, symmetric encryption faces a significant challenge in large groups: managing and distributing unique keys for every pair of communicators becomes an administrative bottleneck.

Public key cryptography. Pioneers Whitfield Diffie and Martin Hellman revolutionized cryptography by introducing public key encryption. Each user generates a pair of keys: a public key (shared widely) and a secret key (kept private).

  • Secrecy: Anyone can encrypt a message using a recipient's public key, but only the recipient can decrypt it with their secret key.
  • Authentication (Digital Signature): A sender can encrypt a message with their secret key, proving their identity, as only they possess that key.
    The Diffie-Hellman Key Exchange further allows public key cryptography to securely exchange a symmetric key for bulk data encryption, earning them the Turing Award for this groundbreaking contribution that underpins secure e-commerce.

6. Perimeter Defenses: The Evolving Battleground Against APTs

The perimeter is intended to separate an enterprise from external threats.

The protective wall. Perimeter defenses are the traditional "protective wall" around an enterprise, positioned where it connects to external networks like the Internet. They comprise functional controls such as firewalls, Intrusion Prevention Systems (IPS), anti-malware, and logging, all feeding into a Security Information and Event Management (SIEM) system.

Perimeter components:

  • Firewall: Filters network traffic based on security policies.
  • IPS: Detects and potentially mitigates attacks in real-time.
  • Anti-Malware: Scans traffic for malicious software.
  • Logging: Records security-relevant events for analysis.
    While effective for delineating internal ("private") from external, modern enterprises often have multiple, complex perimeters with varying rules, making consistent policy management a challenge.

APTs exploit porosity. The increasing complexity and porosity of perimeters, driven by mobile devices, cloud services, and remote access, have made them less effective against sophisticated attacks. Advanced Persistent Threats (APTs) exploit this by:

  • Perimeter Compromise: Often via spear phishing (targeted emails) to install Remote Access Tools (RATs).
  • Lateral Traversal: Moving within the compromised network to find valuable data (e.g., scanning, exploiting Active Directory).
  • Exfiltration: Stealing data out through another porous gateway.
    APTs can persist for months or years, highlighting weak security monitoring and the need to question the assumption of internal trust.

7. Destructive Attacks: The Most Lethal and Emerging Threat

More recently, however, new forms of cyber-attack have begun to emerge that corrupt or degrade a computing resource.

Beyond disclosure. While cyber security has historically focused on data disclosure and denial of service, a more lethal threat has emerged: destructive attacks. These attacks aim to corrupt, degrade, or permanently destroy computing resources, potentially bringing an organization to its knees.

Types of destructive attacks:

  • Ransomware: Encrypts data and demands payment (usually Bitcoin) for its release, offering a recoverable form of destruction.
  • Permanent Destruction: Targets critical system components like BIOS (Basic Input/Output System) firmware, rendering hardware unusable and data non-recoverable.
    Destructive attacks often mimic the patterns of APTs, making them difficult to stop, but with far more severe consequences as they directly impede business operations.

Critical infrastructure risk. The most significant concern is the potential for destructive attacks against essential services and national critical infrastructure.

  • Examples: Banking and finance, telecommunications, emergency services, transportation, power grids, and nuclear power plants.
    Such attacks could lead to massive societal disruption, loss of safety, and even loss of life. Solutions involve increasing data resiliency through robust backup mechanisms and preventing changes to critical system software.

8. Security Analytics: Leveraging Data to Detect Anomalies

This method of protection involves gathering security-related information into stored repositories, and then running algorithms on the data to detect anomalies.

Intelligent defense. Security analytics is a modern protection method that involves collecting vast amounts of security-related data into repositories, often a Security Information and Event Management (SIEM) system, and then applying algorithms to detect anomalies and potential attacks. Human analysts, known as cyber hunters, guide this process.

Two main methods:

  • Pattern Matching: Compares observed data against known attack signatures (similar to anti-malware). While useful, signatures can be bypassed by variants.
  • Behavioral Profiling: More advanced, it establishes a baseline of "normal" behavior and then identifies deviations. This is particularly effective against unknown or evolving threats.

Behavioral profiling steps:

  • Baselining: Creates a profile of normal system or application behavior.
  • Observing: Continuously collects real-time information on current behaviors.
  • Correlating: Compares observed behaviors against the baselined profiles to identify anomalies.
  • Learning: Feeds back whether previous correlations led to useful responses, improving future detection.
    This "management by exception" approach allows for the discovery of attack indicators without needing pre-defined signatures, making it a powerful tool in the evolving threat landscape.

9. DDOS: Overwhelming Networks with Distributed Attacks

When a denial of service attack involves a botnet with many distributed endpoint sources, we refer to the attack as a distributed denial of service or DDOS.

Capacity overload. Distributed Denial of Service (DDOS) attacks aim to overwhelm a target's network connection capacity, making services unavailable to legitimate users. These attacks leverage botnets—networks of compromised computers—to launch coordinated, high-volume traffic.

Reflection and amplification. DDOS attacks often combine two techniques:

  • Reflection: Malicious actors spoof the target's IP address and send requests to legitimate services (e.g., DNS servers).
  • Amplification: These services respond with much larger data packets, which are then directed to the spoofed target, multiplying the attack volume.
    A botnet of just 10,000 members, each generating 1 Mbps, can easily overwhelm a common 10 Gbps enterprise gateway, highlighting the immense disruptive potential.

IoT's role. The proliferation of poorly secured Internet of Things (IoT) devices (billions globally) presents a frightening prospect for future DDOS attacks. If these devices are efficiently harnessed into botnets, they could generate attacks of unprecedented scale, posing a severe threat to critical infrastructure.

Mitigation strategies. The primary defense against DDOS involves upstream filtering by Internet Service Providers (ISPs) or managed security providers. This involves:

  • Real-time Detection: ISPs identify anomalous traffic patterns indicative of a DDOS attack.
  • Traffic Rerouting: Malicious traffic is diverted to "scrubbing" centers equipped with specialized firewalls.
  • Scrubbing: These firewalls use heuristics (e.g., similar payloads, common timing) to differentiate legitimate traffic from attack traffic, allowing clean traffic to reach the target.
    While generally effective, this solution faces scalability challenges against multiple, simultaneous, large-scale attacks.

10. Modern Infrastructure: Securing Operating Systems, Virtualization, Cloud, and Mobile

The most basic concept in computer science is that underlying hardware, such as processors, memory, and input/output controllers, are managed by operating system software.

Operating system security. The operating system (OS) is the foundation of all computing, managing hardware and enforcing policies between processes and objects. Key OS security concepts include:

  • Process Separation: Ensures non-interference between different user or application processes.
  • Access Control: Mechanisms like Discretionary Access Control (DAC) and Mandatory Access Control (MAC) enforce rules on object access.
  • Audit Logs: Chronicle activity for attack detection.
    A major challenge is patching vulnerabilities, a complex lifecycle from bug detection to deployment, with zero-day vulnerabilities posing the greatest risk.

Virtualization's impact. Virtualization allows multiple operating systems (virtual machines) to run on a single physical hardware, managed by a hypervisor. This creates new security considerations:

  • VM Isolation: Hypervisors must prevent one VM from compromising others.
  • Hardware Vulnerabilities: A single hardware exploit can affect all hosted VMs.
    However, virtualization also enables powerful security solutions like "sandbox testing," where suspicious files are detonated in isolated virtual environments to prevent real system damage.

Cloud and mobile security. The shift to cloud services (e.g., AWS, Azure) and mobile devices introduces new security paradigms:

  • Cloud Security: Requires understanding how providers manage data and the use of "micro-perimeters" (shrink-wrapped security around cloud workloads) and Cloud Access Security Brokers (CASBs) in hybrid cloud architectures.
  • Mobile Security: Addresses threats to device access (authentication, lost devices), app security (permissions, malware), and underlying mobile infrastructure. Jailbreaking/rooting devices bypass security controls, increasing risk.
    These evolving infrastructures demand agile, software-defined security solutions to protect assets in increasingly distributed and dynamic environments.

Last updated:

Want to read the full book?
Listen2 mins
Now playing
From CIA to APT
0:00
-0:00
Now playing
From CIA to APT
0:00
-0:00
1x
Voice
Speed
Dan
Andrew
Michelle
Lauren
1.0×
+
200 words per minute
Queue
Home
Swipe
Library
Get App
Create a free account to unlock:
Recommendations: Personalized for you
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Ratings: Rate books & see your ratings
600,000+ readers
Try Full Access for 3 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
Read unlimited summaries. Free users get 3 per month
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 4
📜 Unlimited History
Free users are limited to 4
📥 Unlimited Downloads
Free users are limited to 1
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 26,000+ books. That's 12,000+ hours of audio!
Day 2: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 3: Your subscription begins
You'll be charged on Mar 16,
cancel anytime before.
Consume 2.8× More Books
2.8× more books Listening Reading
Our users love us
600,000+ readers
Trustpilot Rating
TrustPilot
4.6 Excellent
This site is a total game-changer. I've been flying through book summaries like never before. Highly, highly recommend.
— Dave G
Worth my money and time, and really well made. I've never seen this quality of summaries on other websites. Very helpful!
— Em
Highly recommended!! Fantastic service. Perfect for those that want a little more than a teaser but not all the intricate details of a full audio book.
— Greg M
Save 62%
Yearly
$119.88 $44.99/year/yr
$3.75/mo
Monthly
$9.99/mo
Start a 3-Day Free Trial
3 days free, then $44.99/year. Cancel anytime.
Scanner
Find a barcode to scan

We have a special gift for you
Open
38% OFF
DISCOUNT FOR YOU
$79.99
$49.99/year
only $4.16 per month
Continue
2 taps to start, super easy to cancel
Settings
General
Widget
Loading...
We have a special gift for you
Open
38% OFF
DISCOUNT FOR YOU
$79.99
$49.99/year
only $4.16 per month
Continue
2 taps to start, super easy to cancel