Unit 1 - The Understanding of Cyber Security and Online Threats
Overview
Assessor's guide to interpreting the criteria
General Information
RQF general description for Level 2 qualifications
- Achievement at RQF level 2 (EQF Level 3) reflects the ability to select and use relevant knowledge, ideas, skills and procedures to complete well-defined tasks and address straightforward problems. It includes taking responsibility for completing tasks and procedures and exercising autonomy and judgement subject to overall direction or guidance.
-
Use understanding of facts, procedures and ideas to complete well-defined tasks and address straightforward problems. Interpret relevant information and ideas. Be aware of the types of information that are relevant to the area of study or work.
-
Complete well-defined, generally routine tasks and address straightforward problems. Select and use relevant skills and procedures. Identify, gather and use relevant information to inform actions. Identify how effective actions have been.
-
Take responsibility for completing tasks and procedures subject to direction or guidance as needed.
Requirements
-
Standards must be confirmed by a trained Gold Level Assessor or higher.
-
Assessors must at a minimum record assessment judgements as entries in the on-line mark book on the INGOTs.org certification site.
-
The work in the unit is recommended in order for candidates to have covered enough depth and breadth in the topic to successfully carry out their controlled assessment and take the external exam.
-
When the candidate has covered as much of ths material as necessary to complete the controlled assessment element, they may be introduced to the topic
-
This unit should take an average level 2 learner 35 hours of work to complete.
Assessment Method
Understanding of these learning objectives will be demonstrated through answering questions related to key ideas and concepts in the terminal examination as well as practical application of their understanding through the controlled assessment.
Expansion of the assessment criteria
1. Understand the range and variety of cyber threats
1.1 I can explain the basic nature of a cyber threat
Learners should be able to explain a cyber threat using examples
Additional information and guidance
There is a great deal of debate about what cyber threats are and the range and extent of the threats. At the very simplest level it is something that is facilitated through computer networks, the networks carry traffic through “cyberspace”. So any threat delivered by computers to other computers is a cyber threat. The threats can also range in the extent of their damage. Some cyber threats are just a nuisance as they may disrupt a website or push pop up messages at you while browsing. Other threats are for more serious, such as the disruption of a country’s key infrastructure as happened to Iran in 2010. The more computers come online and carry out vital functions, the more attractive they are to criminals who want to use access to those computers or networks of computers to cause problems or extort money.
Learners should be able to write their own understanding of some of these threats and the impact they have in order to show they have a good feel for their nature. Various events and their explanation can help with the overall understanding.
1.2 I can can list some of the more common threats
Learners should be able to list a number of basic threats
Additional information and guidance
Most of the threats to computers and systems are well documented and there is always some issue in the news related to cybercrime.
Learners should be able to make a list of a number of the most commonly occurring threats, such as:
- Fraud and financial crime
- Terrorist related
- Extortion
- Warfare
- Viruses/malware
- Denial of Service
- Spam, phishing etc
- Obscenity
- Harassment/trolling/bullying
- Trafficking
1.3 I can explain the main features of threats to individuals
Learners should be able to explain how some of the above threats affect their victims
Additional information and guidance
The type of threat used will determine how much damage it causes to individuals and the nature of the damage. In the case of cyberbullying that occurs at schools, it is generally focused on one or two people and the damage is psychological as the victims feel oppressed and frightened to interact with others. There are documented cases where this has lead to suicide. With crimes related to fraud or extortion the damage is both psychological and financial. Psychological because the people affected no longer feel safe online and feel violated. The financial costs will vary depending on the ability of the attacked person to pay. In addition the reputational damage a company may suffer has a direct impact on the earnings, share price and volume of customers as happened during the TalkTalk breach. Some threats to individuals cause them little or no direct harm at all. The use of botnets is an example here. The end users have little or no idea that their computer is part of a huge network of other computers that are being used to attack other networks. The end user might notice an increase in Internet traffic, but probably not enough to realise they are infected. In 2010 a Spanish team found 13 million computers being used as part of a botnet.
1.4 I can explain the main features of threats to companies
Learners should be able to explain some company based threats.
Additional information and guidance
As companies have significantly more resources and wealth, the nature and scale of the attacks is significant. To some extent, the cost to these companies is not born by one person, so the emotional and psychological damage may be less, though someone will always be held accountable for the damage.
There are daily examples of threats to companies in the news for learners to analyse and explain. An example of a recent UK one was the attack on the telephone and Internet company TalkTalk in 2016.
http://www.bbc.co.uk/news/uk-34611857
The attack of their system and the subsequent bad publicity caused their shares to drop 10%. This amounted to a loss of £60 million. Companies can not afford to lose their reputation in the public domain so will often pay money to cyber criminals just to make sure it never hits the news. This means they are more likely to suffer fraud and extortion attacks as a result.
Learners can give some examples of threats to companies and say why they are specifically bad for companies compared to individuals.
1.5 I can summarise the variety of threats for an audience
Learners should be able to demonstrate their understanding by presenting their findings
Additional information and guidance
To demonstrate their clear understanding of the types of threats and the problems they cause to individuals and companies or society, learners should produce a short presentation. This can take several forms: as a leaflet for people to read, perhaps as a leaflet in the library, a presentation using presentation software, a multimedia display, an advert or drama or a blog post to name a few. This process will help learners summarise the main points and show some clarity of understanding.
2.Analyse and detail the types of threat currently in operation
2.1 I can describe the motivations of people behind threats
Learners should be able to demonstrate they understand what motivates people to attack systems
Additional information and guidance
The type of target combined with the vector of the attack will likely be a guide to what the motivation is by the person or group the attack. Increasingly, there are coordinated attacks that are on an international scale. In early 2017 it was commented that the state of Russia may have been involved in trying to alter the outcome of the US Presidential elections. The motivation here is a complex one.
The outcome of Donald Trump winning the election was presumably seen as favourable to the Russian state operatives. In some cases, the motivation is greed of some sort. When criminals engage in malicious cyber activity into commercial retailers or other large organisations in order to blackmail them, they just want to get money. The threat to companies is so great that they will invariably pay large amounts in order to avoid disruption to their services or damage to their reputation. The gambling industry is a good example of this. If the criminals can
hide their location, it makes it easier for them to break in without being traced back to their origin.
Learners need to describe in their own words what sort of motivations they have found in their research, or what their own interpretation of the motivations is. Much of the motivation will be emotion based: greed, despair, frustration, excitement, revenge, etc.
This can be defined but learning about the types of threat actors who carry out attacks as below:
Attacker | Level of Skill | Motivation | Example Victim | Potential Impact |
---|---|---|---|---|
Advanced Persistent Threat (APT) / Nation State Actor |
Very High | Ideology | Military Secrets |
Very High |
Industrial Espionage |
High | Profit / disruption |
Competitors | High |
Organised Cybercrime |
High-Medium | Money | Banking or bank customers |
High to Med |
Hacktivist | Varies | Ideology | Causes not in line with their views i.e. large corporations |
Med - High |
Insider Threat |
Med to Low (typically) |
Revenge | Own Company |
Very High |
Script Kiddies |
Low | Curiosity / respect of peers |
Minecraft servers |
Low |
Some terms for learners to research are:
- The Activist
- The Getaway
- The Insider
- The Mule
- The Nation State Actor
- The Professional
2.2 I can analyse the main threats in terms of the mechanisms they use
Learners should be able to research and comment on some of the ways threats are carried out
Additional information and guidance
One of the easiest ways for cyber criminals to get into a company’s system is through the general decency of human nature which they shamelessly exploit. This is known as social engineering. There are many cases where criminals will phone up various junior people in a company and pretend to be someone from the IT department and try to get access by tricking people out of their own login details. If people can get into an organisation physically, they can then pretend to be someone such as a computer maintenance technician and trick people out of their logins. Once they have these logins they can then begin to penetrate other aspects of the system.
Other mechanisms of attack will be:
- DDoS (Distributed Denial of Service
- CPM (Cross Platform malware)
- Phishing
- Spearphishing
- Waterhole attack
- XSS Cross site scripting
- SQL Injection attack
Learners can research and define these types of attack and keep a note of them in terms of what they might be able to do to stop or prevent them.
2.3 I can describe how the features of threats make them operate
Learners should be able to describe the threats they have researched
Additional information and guidance
Learners need to describe how the items in 2.2 function and show they understand some of the main ways they are used. Each one works in a different way and has different delivery mechanisms as well as outcomes. A DDoS attack, for example, will cause the system to go slow or stop and this will cause the customers some annoyance and disruption which will damage the company’s reputation. There is a real danger companies that lose their reputation will soon go out of business, so the company will do anything to prevent this and will often pay ransoms to hackers to stop the DDoS attacks. If the DDoS attack is designed to stop a company altogether, then they will not care about payment or financial incentives and will just try to destroy a company.
Alternatively, a phishing attack relies on the poor training of internal personal and the gullibility of staff. The delivery is usually via an email that delivers a file with a payload that can infect a system or by enticing a victim to click on a malicious link. It only works if someone clicks on the link to activate the code.
The level of phishing attacks is increasing significantly as the following graphic from Wikipedia shows.
This only shows the ones reported, so it is likely even higher than this suggests.
2.4 I can describe how attacks on companies are designed to work
Learners should be able to describe in their own words what attacks are expected to achieve
Additional information and guidance
This criterion is related to others in this unit in that the activities of the company and perhaps the motivation of the attacker will determine the reason and design behind the attacks. Security aware companies may employ a professional to run a simulated attack on their systems. These hackers are known as white hats who work within the law and only with prior authorisation. Some hackers conduct attacks might to bring attention to the company’s lack of good security. If they are not authorised to do so they are breaking the law however their motivation is not malicious. These are known as grey hat hackers. . At the other extreme the attack will be to extort money from a company. These are known as black hat hackers. The “hats” come from traditional cowboy movies where typically the sheriff has a white hat and the “baddie” has a black hat.
The way the attacks work will therefore vary and understanding the motivation is key. In most cases the attacks are designed to steal information or gain some level of control or deeper access to the network. If the attackers can get in with some nominal rights, these may then be escalated and different parts of the network a weaknesses exploit or security misconfiguration can be identified.
In describing the form of attack, learners should pick one as an example, perhaps from the press, and explain how it worked and some of the stages. Some of the detail may not be revealed for other security reasons, but they should be able to convey some sense of which type of attack could have achieved a given effect.
2.5 I can describe threats in terms of their hierarchy of damage
Learners should be able to describe some damage caused by different threats
Additional information and guidance
Some of the detail on this criterion may be addressed in other criteria above, but will need fleshing out somewhat. One of the aspects here is that damage may not necessarily be the most obvious one, such as physical damage to a computing network.
Some of the real damage might occur to the well-being of the employees. As with a burglary that occurs on a home, it is the thought that someone came in to your house and looked around and took something. As with other criteria here, there is a scale of damage that can be described. Some companies that suffer the theft of customer data may lose so many customers that they have to close down, this is clearly significant for the company itself. Other companies may lose a percentage of their income, as was the case with TalkTalk who had a breach of customer data and were fined heavily by the Information Commissioner's Office (ICO). Some attacks may not have a clearly defined financial impact , such as the leak of information from the US government.
Learners can cite a number of examples from their own research to show the range and scale of different attacks with some of their own commentary on the damage, implied or otherwise. Learners may also be taught industry standard metrics used to asses the risk and impact of a vulnerability. The most frequently used of which is the Common Vulnerability and Scoring System CVSS.
https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator
It is not anticipated that learners will develop an in depth understanding of the system however a basic understanding will allow them to quantify in numeric terms the risk associated with a vulnerability which for example may be used remotely, without authentication and requires little skill which would achieve total compromise of a system VS a vulnerability which is complex, requires skill and only gains limited access.
3.Evaluate the impact of threats on various individuals and organisations
3.1 I can evaluate the impact on the economy of cyber threats
Learners should be able to offer some basic evaluations of cyber threats
Additional information and guidance
How much money is lost from the economy because of cyber crime? Can we really know as many companies may not report the attacks because it will impact on their image and their image is everything. Is it possible to give a value to the threats? The UK government commissioned a report in May 2016 which showed some of the financial costs of security breaches.
https://www.gov.uk/government/uploads/system/uploads/attachment_data/fil...
The following infographic from this report shows some of the range of financial damage.
Using this information, we can see that there is an average cost of £36,500. If there are something like 1,000 large companies, though there will be considerably more, this means a loss of £36.5 million.
However, the Cabinet Office estimates the total amount to be £27 billion.
https://www.gov.uk/government/uploads/system/uploads/attachment_data/fil...
In April 2017, both Google and Facebook were subject to an attack of “CEO Fraud” and lost $100 million.
http://www.bbc.co.uk/news/technology-39744007
3.2 I can determine the level of threat to my home environment
Learners should be able to analyse and comment on their own security exposure.
Additional information and guidance
A quick look at any home router log file will show that your own system is under constant attack from individuals or more likely bots. Equally, you will no doubt have a full and constantly reloading spam folder. Most systems are useful for attackers to be used for DDoS attacks on other systems as there is probably little real commercial criminal value in gaining full control of home based system. The only real financial gain in this derives from attaching the device to a botnet which is subsequently rented out to other criminals. The types of threats will most likely be these attacks, but also there will be a deluge of spam, phishing and other malware attacks. If learners can show some statistics on the nature and volume of these attacks, it would be useful to compare and contrast with others in the group. The speed and reliability of Internet connections only increases these attacks.
If learners run their own email server from home, they will no doubt see similar images to the one below.
Most of the email here, as can be seen from the addresses, are from Taiwan and Hong Kong, although all purporting to be Yahoo. On this particular home broadband system, there are on average 20-30 attacks per second, that is 1.7-2.5 million per day!
3.3 I can determine the threat to a website in a safe and controlled environment
Learners should be able to analyse and comment on the threat levels to their own institution
Additional information and guidance
The network team may be sensitive to some aspects of their system’s security, but should be willing to at least discuss and explain some of the threats they have to deal with and give some examples.
Learners can then make notes on this presentation towards their own summary report for 3.5 below.
Additionally, this outcome may be supported by practical work depending on the technical capabilities of the institution and confidence of the in the instructor. The OWASP organisation maintains a list of intentionally vulnerable web applications here:
https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project
These applications may be used on a local network or on a VPN (Virtual Private Network). The Advantage to this being that the application is kept isolated on either a physical or virtual network segment. This avoids both the danger of running such an application on the public internet and the danger involved in potentially breaching the Computer Misuse Act. It should be noted that these applications should never be run on the open internet or even within a local network without segregation.
In practical terms centers may use several light computers such as Raspberry Pis connected via Ethernet to a local unmanaged router. One Pi would then be able to serve the application while other is connected and running a security distribution of Linux such as Kali would be able to test the security of the application interfacing with it via IP address. https://www.kali.org This method requires some physical hardware to be purchased.
Another option would be to virtualise both the website and the testing distribution using Virtual Box or VMware player. https://www.virtualbox.org/
https://www.vmware.com/go/downloadplayer
Both machines would then be virtualised within a “host” machine and would only connect with each other via local IP address. This method requires a host on which virtualisation software to be installed which has 4-6Gb of ram in order to run a further two “guest” machines.
A third option would be to partner with a company or use a section of the institution’s network to run the virtual systems. Connection to the system would be via an encrypted tunnel meaning that malicious traffic was not being sent in plain through the institution’s network and over the public internet.
So called “online” vulnerable applications should be avoided.
3.4 I can determine the threat to a server in a safe and controlled environment
Learners should be able to summarise threats that affect a local business
Additional information and guidance
As with the above criterion, it may be difficult for a local company to reveal some of the more sensitive side of their security processes, but should be willing to engage with a local school or college.
If engagement with a local business is not possible, assessors should extrapolate types and levels of threats from government based national data for learners to use in their reports.
Similarly to outcome 3.3 a practical element may be introduced by running an intentionally vulnerable server. The technical process to achieving this is exactly the same as the advice given in 3.3. Examples of vulnerable servers are Windows 2003 (now free) without any security patches applied and Metasploitable Linux.
http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
3.5 I can produce a presentation or report on my findings
Learners should be able to create and present their findings and recommendations
Additional information and guidance
All of the above exercises will produce broadly similar details, but also very divergent ones. The learners should be able to use their understanding of digital forensics and cyber threats to produce a report to highlight some of the issues in their area. These will vary
depending on the location of the centre and surrounding companies, but should give learners a broad overview of local cyber threats as well as data that they can scrutinise for local anomalies and patterns. The report will also be an opportunity for them to begin exploring some of the ways they can work towards addressing these threats.