introduction of ethical hacking


Scodenetworkinstitute1115

Uploaded on Aug 16, 2022

Category Education

Ethical hacking is becoming more popular with the rise of the internet and other tech-fueled society. SCODE Network offers Ethical hacking training courses with live projects by an expert trainer.

Category Education

Comments

                     

introduction of ethical hacking

Introduction of Ethical Hacking Chapter 1: Introduction to Ethical Hacking Technology Brief Information Security 0verview The methods and processes to protect information and information systems from unauthorized access, the disclosure of information, usage or modification. Information security ensures the confidentiality, integrity, and availability. An organization without security policies and appropriate security rules are at great risk, and the confidential information and data related to that organization are not secure in the absence of these security policies. An organization along with well-defined security policies and procedures helps in protecting the assets of that organization from unauthorized access and disclosures. In the modern world, with the latest technologies and platforms, millions of users interacting with each other every minute. These sixty seconds can be vulnerable and costly to the private and public organizations due to the presence of various types of old and modern threats all over the world. Public internet is the most common and rapid option for spreading threats all over the world. Malicious Codes and Gcripts, Viruses, Gpams, and Malware are always waiting for you. That is why the Gecurity risk to a network or a system can never eliminate. It is always a great challenge to implement a security policy that is effective and beneficial to the organization instead of the application of an unnecessary security implementation which can waste the resources and create a loophole for threats. GoogIe PIay Hack A Turkish Hacker, “Ibrahim Balic” hacked Google Play twice. He conceded the responsibility of the Google Play attack. It was not his first attempt; he acclaimed that he was behind the Apple's Developer site attack. He tested vulnerabilities in Google's Developer Console and found a flaw in the Android Operating Gystem, which he tested twice to make sure about it causing crash again and again. The Home Depot Data Breach Theft of information from payment cards, like credit cards is common nowadays. In ZO14, Home Depot's Point of Gale Gystems were compromised. A released statement from Home Depot on the 8th of Geptember ZO14 claimed breach of their systems. Essential Terminology Hack VaIue The term Hack Value refers to a value that denotes attractiveness, interest or something that is worthy. Value describes the targets' level of attraction to the hacker. Zero-Day Attack Zero-Day Attacks referrs to threats and vulnerabilities that can exploit the victim before the developer identify or address and release any patch for that vulnerability. Vulnerability The vulnerability refers to a weak point, loophole or a cause in any system or network which can be helpful and utilized by the attackers to go through it. Any vulnerability can be an entry point for them to reach the target. Daicy Ghaining Daisy Chaining is a sequential process of several hacking or attacking attempts to gain access to network or systems, one after another, using the same information and the information obtained from the previous attempt. Payload The payload referrs to the actual section of information or data in a frame as opposed to automatically generated metadata. In information security, Payload is a section or part of a malicious and exploited code that causes the potentially harmful activity and actions such as exploit, opening backdoors etc. Bot The bots are software that is used to control the target remotely and to execute predefined tasks. The bots are also known as for Internet Bot or Web Robot. These Bots can be used for Gocial purposes such as Chatterbots, Commercial purpose or intended Malicious Purpose such as Gpambots, Viruses etc. Elements of Information Security Confidentiality We want to make sure that our secret and sensitive data is secure. Confidentiality means that only authorized persons can work with and see our infrastructure's digital resources. It also implies that unauthorized persons should not have any access to the data.. Integrity We do not want our data to be accessible or manipulated by unauthorized persons. Data integrity ensures that only authorized parties can modify data. security concepts. CIA Risk Control Loss of privacy. Unauthorized access to Encryption. Confidentiality information. Authentication. Access Identity theft. Control Maker/Checker. Quality Information is no longer reliable Integrity Assurance. or accurate. Fraud. Audit Logs Business continuity. Business disruption. Loss of Plans and test. Backup Availability customer's confidence. Loss of storage. Gufficient revenue. capacity. Table 1-01: Risk and Its Protection by Implementing CIA Authenticity Authentication is the process which identifies the user, or device to grant privileges, access and certain rules and policies. Gimilarly, Authenticity ensures the authentication of certain information initiates from a valid user claiming to be the source of that information & message transactions. The process of authentication through the combined function of identities and passwords can achieve Authenticity. Figure 1-1 Elementc of Information Cegurity Non-Repudiation Nonrepudiation is one of the Information Assurance (IA) pillar which guarantees the information transmission & receiving between the sender and receiver via different techniques such as digital signatures and encryption. Non-repudiation is the assurance the communication and its authenticity, so the sender cannot deny from what he sent. Gimilarly, the receiver cannot deny from receiving. Digital contracts, signatures and email messages use Nonrepudiation techniques. The Security, Functionality, and Usability Triangle In a Gystem, Level of Gecurity is a measure of the strength of the Gecurity in the system, Functionality, and Usability. These three components are known as the Gecurity, Functionality and Usability triangle. Consider a ball in this triangle, if the ball is centered, it means all three components are stronger, on the other hand, if the ball is closer to security, it means the system is consuming more resources for security and feature and function of the system and Usability requires attention. A secure system must provide strong protection along with offering all services and features and usability to the user. Figure 1-£ Cegurity, Fungtionality & Ucability Triangle Implementation of High level of Gecurity typically impacts the level of functionality and usability with ease. The system becomes nonuser-friendly with a decrease in performance. While developing an application, deployment of security in a system, Gecurity experts must keep in mind to make sure about functionality & ease of usability. These three components of a triangle must be balanced. Information Security Threats and Attack Vectors Motives, Goals, and 0bjectives of Information Security Attacks In the information security world, an attacker attacks the target system with the three main components behind it. "Motive or Objective" of an attack makes an attacker focus on attacking a particular system. Another major component is "Method" that is used by an attacker to gain access to a target system. Vulnerability also helps the attacker to fulfill his intentions. These three components are the major blocks on which an attack depends. Top Information Security Attack Vectors cloud Gomputing Threatc Cloud Computing is the most common trend & popularly in use nowadays. It does not mean that threats to cloud computing or cloud security are fewer. Mostly, the same issues as in traditionally hosted environments also exist in the cloud computing. It is very important to secure Cloud computing to protect services and important data . Characteristics of APT Criteria are: Characteristics Description Objectives Motive or Goal of threat Timeliness Time spend in probing & accessing the target Resources Level of Knowledge & tools Risk tolerance tolerance to remain undetected Gkills & Methods Tools & Techniques used throughout the event Actions Precise Action of threat Attack origination points Number of origination points Numbers involved in Number of Internal & External Gystem attack involved Knowledge Gource Discern information regarding threats Incider Attack An insider attack is the type of attack that is performed on a system, within a corporate network, by a trusted person. Trusted User is termed as Insider because Insider has privileges and it is authorized to access the network resources. Information Security Threat Categories Information Gecurity Threats categories are as follows: Network Threatc The primary components of network infrastructure are routers, switches, and firewalls. These devices not only perform routing and other network operations, but they also control and protect the running applications, servers, and devices from attacks and intrusions. The poorly configured device offers intruder to exploit. Common vulnerabilities on the network include using default installation settings, open access controls, Weak encryption & Passwords, and devices lacking the latest security patches. Top network level threats include: Information gathering Gniffing & Eavesdropping Gpoofing Gession hijacking Man-in-the-Middle Attack DNG & ARP Poisoning Password- based Attacks Denial- of-Gervices Attacks Compromised Key Attacks Firewall & IDG Attacks Hoct Threatc Host threats are focused on system software; Applications are built or running over this software such as Windows ZOOO, .NET Framework, GQL Gerver, and others. The Host Level Threats includes:  Malware Attacks  Foot printing Password Attacks  Denial-of-Services Attacks  Arbitrary code execution Application Threat Best practice to analyze application threats is by organizing them into application vulnerability category. Main threats to the application are:  Improper Data / Input Validation Authentication & Authorization  Attack Security Misconfiguration  Information Disclosure Broken Session Management Improper Error handling & Exception Management Types of Attacks on a System Operating System Attack In Operating System Attacks, Attackers always search for an operating system’s vulnerabilities. If they found any vulnerability in an Operating System, they exploit to attack against the operating system. Gome most common vulnerabilities of an operating system are: Buffer overflow vulnerabilities Buffer Overflow is one of the major types of Operating System Attacks. It is related to software exploitation attacks. In Buffer overflow, when a -   program or application does not have well-defined boundaries such as restrictions or pre-defined functional area regarding the capacity of data it can handle or the type of data can be inputted.  Bug in the operating system In software exploitation attack & bugs in software, the attacker tries to exploit the vulnerabilities in software. This vulnerability might be a mistake by the developer while developing the program code. Attackers can discover these mistakes, use them to gain access to the system.  Unpatched operating system Unpatched Operating System allows malicious activities, or could not completely block malicious traffic into a system. Successful intrusion can impact severely in the form of compromising sensitive information, data loss and disruption of regular operation.  Misconfiguration Attack In a corporate network while installation of new devices, the administrator must have to change the default configurations. If devices are left upon default configuration, using default credentials, any user who does not have the privileges to access the device but has connectivity can access the device.  Application-Level Attack Before releasing an application, the developer must make sure, test & verify from its end, manufactures or from developer's end. In an application-level attack, a hacker can use: Buffer overflow Active content Cross-site script Shrink Wrap Code Attack Shrink Wrap code attack is the type of attack in which hacker uses the shrink wrap code method for gaining access to a system. In this type of attack, hacker exploits holes in unpatched Operating systems, poorly configured software and application. To understand shrink wrap vulnerabilities, consider an operating system has a bug in its original software version. The vendor may have released the update, but it is the most critical time between the release of a patch by vendor till client's systems updates. Information Warfare Information warfare is a concept of warfare, to get involved in the warfare of information to gain the most of information. The term, “Information Warfare” or “Info Mar” describes the use of information and communication technology (ICT). The major reason or focus of this information war is to get a competitive advantage over the opponent or enemy. The following is the classification of Information warfare into two classes: - 1. Defensive Information Warfare Defensive Information warfare term is used to refer to all defensive actions that are taken to defend from attacks to steal information and information- based processes. Defensive Information ware fare areas are: - Prevention Deterrence Indication & Warning Detection Emergency Preparedness Response Hacking Concepts, Types, and Phases Hacker Hacker is the one who is smart enough to steal the information such as Business data, personal data, financial information, credit card information, username & Password from the system he is unauthorized to get this information by taking unauthorized control over that system using different techniques and tools. Hacking The Term "Hacking" in information security refers to exploiting the vulnerabilities in a system, compromising the security to gain unauthorized command and control over the system resources The following are the five phases of hacking: - 1. Reconnaissance Z. Gcanning s. Gaining Access 4. Maintaining Access 5. Clearing Tracks Reconnaissance Reconnaissance is an initial preparing phase for the attacker to get ready for an attack by gathering the information about the target before launching an attack using different tools and techniques. Gathering of information about the target makes it easier for an attacker, even on a large scale. Gimilarly, in large scale, it helps to identify the target range. Scanning Gcanning phase is a pre-attack phase. In this phase, attacker scans the network by information acquired during the initial phase of reconnaissance. Gcanning tools include Dialler, Gcanners such as Port scanners, Network mappers, client tools such as ping, as well as vulnerabilities scanner. Gaining Access Gaining access phase of hacking is the point where the hacker gets the control over an operating system, application or computer network. Control gained by the attacker defines the access level such as operating system level, application level or network level access. Maintaining Accecc / EccaIation of Privilege Maintaining access phase is the point when an attacker is trying to maintain the access, ownership & control over the compromised systems. Gimilarly, attacker prevents the owner from being owned by any other hacker. They use Backdoorc, Rootkitc or Trojanc to retain their ownership. In this phase, an attacker may steal information by uploading the information to the remote server, download any file on the resident system, and manipulate the data and configuration. To compromise other systems, the attacker uses this compromised system to launch attacks. Clearing Track An attacker must hide his identity by covering the tracks. Covering tracks are those activities which are carried out to hide the malicious activities. Covering track is most required for an attacker to fulfill their intentions by continuing the access to the compromised system, remain undetected & gain what they want, remain unnoticed and wipe all evidence that indicates his identity. To manipulate the identity and evidence, the attacker overwrites the system, application, and other related logs to avoid suspicion. Ethical Hacking Concepts and Scope Ethical Hacking Ethical hacking and penetration testing are common terms, popular in information security environment for a long time. Increase in cybercrimes and hacking create a great challenge for security experts and analyst and regulations over the last decade. It is a popular war between hackers and security professionals. My Ethical Hacking is Necessary The rise in malicious activates, cybercrimes and appearance of different forms of advanced attacks require to need of penetration tester who penetrate the security of system and networks to be determined, prepare and take precaution and remediation action against these aggressive attacks. These aggressive and advanced attacks include: -  Denial-of-Services Attacks  Manipulation of data  Identity Theft Vandalism  Credit Card theft Piracy  Theft of Services Increase in these type of attacks, hacking cases, and cyber-attacks, because of increase of use of online transaction and online services in the last decade. Scope and Limitations of Ethical Hacking Ethical Hacking is an important and crucial component of risk assessment, auditing, counter frauds. Ethical hacking is widely used as penetration testing to identify the vulnerabilities, risk, and highlight the holes to take remedial actions against attacks. However, there is also some limitations where ethical hacking is not enough, or just through ethical hacking, the issue could not resolve. An organization must first know what it is looking for before hiring an external pentester. It helps focus the goals to achieve and save time. Phases of Ethical Hacking Ethical Hacking is the combination of the following phases: - 1. Footprinting & Reconnaissance 2.. Gcanning 3. Enumeration 4. Gystem Hacking 5. Escalation of Privileges 6. Covering Tracks Skills of an Ethical Hacker A skilled, ethical hacker has a set of technical and non-technical skills. TechnicaI SkiIIc 1. Ethical Hacker has in-depth knowledge of almost all operating systems, including all popular, widely- used operating systems such as Windows, Linux, Unix, and Macintosh. 2. These ethical hackers are skilled at networking, basic and detailed concepts, technologies, and exploring capabilities of hardware and software. 3. Ethical hackers must have a strong command over security areas, related issues, and technical domains. 4. They must have detailed knowledge of older, advanced, sophisticated attacks. Non-TechnicaI SkiIIc 1. Learning ability 2. Problem-solving skills 3. Communication skills 4. Committed to security policies 5. Awareness of laws, standards, and regulations. Mind Map Information Security Controls Information Assurance (IA) Information Assurance, in short, known as IA, depends upon the components that are Integrity, Availability, Confidentiality, and Authenticity. With the combination of these components, assurance of information and information systems are ensured and protected during the processes, usage, storage, and communication. These components are defined earlier in this chapter. Apart from these components, some methods and processes also help in the achievement of information assurance such as: -  Policies and Processes.  Network Authentication.  User Authentication.  Network Vulnerabilities.  Identifying problems and resources. Implementation of a plan for identified requirements. Application of information assurance control. Information Security Management Program Information Security Management programs are the programs that are specially designed to focus on reducing the risk and vulnerabilities towards information security environment to train the organization and users to work in the less vulnerable state. The Information Security Management is a combined management solution to achieve the required level of information security using well-defined security policies, processes of classification, reporting, and management and standards. The diagram on the next page shows the EC-Council defined Information Security Management Framework: - Threat Modeling Threat Modeling is the process or approach to identify, diagnose, and assist the threats and vulnerabilities of the system. It is an approach to risk management which dedicatedly focuses on analyzing the system security and application security against security objectives. This identification of threats and risks helps to focus and take action on an event to achieve the goals. Capturing data of an organization, implementing identification and assessment processes over the captured information to analyze the information that can impact the security of an application. Application overview includes the identification process of an application to determine the trust boundaries and data flow. Enterprise Information Security Architecture (EISA) Enterprise Information Gecurity Architecture is the combination of requirements and processes that help in determination, investigation, monitoring the structure of behavior of information system. The following are the goals of EIGA: - Network Security Zoning Managing, deploying an architecture of an organization in different security zones is called Network Gecurity Zoning. These security zones are the set of network devices having a specific security level. Different security zones may have a similar or different security level. Defining different security zones with their security levels helps in monitoring and controlling of inbound and outbound traffic across the network. Information Security Policies Information Gecurity Policies are the fundamental and the most dependent component of the information security infrastructure. Fundamental security requirements, conditions, rules are configured to be enforced in an information security policy to secure the organization's resources. These policies cover the outlines of management, administration and security requirements within an information security architecture. The basic goals and objectives of the Information Gecurity Policies are: - Cover Gecurity requirements and conditions of the organization Protect organizations resources • Eliminate legal liabilities • Minimize the wastage of resources • Prevent against unauthorized access / modification • Minimize the risk • Information Assurance Types of Security Policies The different types of security policies are as follows: - 1. Promiscuous policy 2. Permissive policy 3. Prudent policy 4. Paranoid Policy Promiccuouc poIicy The promiscuous policy has no restriction on usage of system resources. Permiccive poIicy The permissive policy restricts only widely known, dangerous attacks or behavior. Prudent PoIicy The prudent policy ensures maximum and strongest security among them. However, it allows known, necessary risks, blocking all other service but individually enabled services. Every event is log in prudent policy. Paranoid PoIicy Paranoid Policy denied everything, limiting internet usage. Implications for Security Policy Enforcement HR & LegaI ImpIication of Security PoIiciec HR department has the responsibility of making sure the organization is aware regarding security policies as well as providing sufficient training. Physical Security Physical Gecurity is always the top priority in securing anything. In Information Gecurity, it is also considered important and regarded as the first layer of protection. Physical security includes protection against human-made attacks such as theft, damage, unauthorized physical access as well as environmental impacts such as rain, dust, power failure and fire. Incident Management Incident Response Management is the procedure and method of handling an incident that occurs. This incident may be any specific violation of any condition, policies, or else. Gimilarly, in information security, incident responses are the remediation actions or steps taken as the response of an incident depending upon identification of an event, threat or attack to the removal or elimination (when system become stable, secure and functional again). Incident response management defines the roles and responsibilities of penetration testers, users or employees of an organization. Additionally, incident response management defines actions required when a system is facing a threat to its confidentiality, integrity, authenticity, availability depending upon the threat level. Initially, the important thing to remember is when a system is dealing with an attack, it requires sophisticated, dedicated troubleshooting by an expert. Incident Management Process Incident Response Management processes include: - 1. Preparation for Incident Response 2. Detection and Analysis of Incident Response 3. Classification of an incident and its prioritization 4. Notification and Announcements 5. Containment 6. Forensic Investigation of an incident 7. Eradication and Recovery 8. Post-Incident Activities Responsibilities of Incident Response Team The Incident Response team is consists of the members who are well-aware of dealing with incidents. This Response team is consists of trained officials who are expert in collecting the information and secure all evidence of an attack from the incident system. As far as the member of Incident response team is concerned, this team includes IT personnel, HR, Public Relation officers, Local Law enforcement, and Chief Gecurity officer. Vulnerability Assessment Vulnerability assessment is the procedure of examination, identification, and analysis of system or application abilities including security processes running on a system to withstand any threat. Through vulnerability assessment, you can identify weaknesses and threat to a system, scope a vulnerability, estimate the requirement and effectiveness of any additional security layer. Types of Vulnerability Assessment The following are the types of vulnerability assessment: 1. Active Assessment Z. Passive Assessment s. Host-based Assessment 4. Internal Assessment 5. External Assessment 6. Network Assessment 7. Wireless Network Assessment 8. Application Assessment Network Vulnerability Assessment Methodology Network Vulnerability Assessment is an examination of possibilities of an attack & vulnerabilities to a network. The following are the phases of Vulnerability Assessment: 1. Acquisition 2. Identification 3. Analyzing 9. Evaluation 10.Generating Reports Acquisition The acquisition phase compares and review previously- identified vulnerabilities, laws, and procedures that are related to network vulnerability assessment. Identification In the Identification phase, interaction with customers, employees, administration or other people that are involved in designing the network architecture to gather the technical information. Analyzing Analyzing phase reviews, the gathered, collected information in the form of a collection of documentation or one-to-one interaction. Analyzing phase is basically: -  Review information.  Analyzing previously identified vulnerabilities results.  Risk Assessment.  Vulnerability and Risk Analysis.  Evaluation of the effectiveness of existing security policies. Evaluation Evaluation-: Evaluation phase includes: -  Inspection of Identified Vulnerabilities.  Identification of flaws, gaps in existing & required Security.  Determination of Security Control required resolving the issues Vulnerabilities.  Identify modification and Upgrades. Generating Report Reporting phase is documentation of draft report required for future, inspection. This report helps identify vulnerabilities in the acquisition phase. Audit and Penetration also require these previously collected reports. When any modification in security mechanism is required, these reports help to design security infrastructure. Central Databases usually holds these reports. Reports contain: - • Task did by each member of the team. Methods & tools used. • Findings. Recommendation. • Collected information from different phases. Mind Map Penetration Testing Technology 0verview In the Ethical Hacking environment, the most common term that often uses is "pentecter." Pentesters are the penetration tester that has permission to hack a system by owner. Penetration testing is the process of hacking a system with the permission from the owner of that system, to evaluate security, Hack Value, Target of Evaluation (TOE), attacks, exploits, zero-day vulnerability & other components such as threats, vulnerabilities, and daisy chaining. Important for Penetration testing If you want to be ready for an attack, you must be smart, to think like them, act like them. Hackers are skilled, having detailed information of hardware's, software, networking and other related information. The need and importance of penetration testing, in the modern world where variously advanced threat such as Denial-of-service, Identity theft, theft of services, stealing information is common, system penetration ensure to counter the attack from malicious threat by anticipating methods. Some other major advantages and need for penetration testing is to uncover the vulnerabilities in systems and security deployments in the same way an attacker gains access: -  To identify the threats and vulnerabilities to organizations assets.  To provide a comprehensive assessment of policies, procedures, design, and architecture.  To set remediation actions to secure them before they are used by a hacker to breach security.  To identify what an attacker can access to steal.  To identify what information can be theft and its use.  To test and validate the security protection & identify the need for any additional protection layer.  Modification and up-gradation of currently deployment security architecture.  To reduce the expense of IT Security by enhancing Return on Security Investment (ROGI). Types of Penetration Testing Three types of Penetration testing are important to be differentiated because a penetration tester may have asked to perform any of them. BIack Box The black box is a type of penetration testing in which the pentester is blind testing or double-blind testing, i.e. provided with no prior knowledge of the system or any information of the target. Black boxing is designed to demonstrate an emulated situation as an attacker in countering an attack. Gray box Gray box, is a type of penetration testing in which the pentester has very limited prior knowledge of the system or any information of targets such as IP addresses, Operating system or network information in very limited. Gary boxing is designed to demonstrate an emulated situation as an insider might have this information and to counter an attack as the pentester has basic, limited information regarding target. White box The white box is a type of penetration testing in which the pentester has complete knowledge of system and information of the target. This type of penetration is done by internal security teams or security audits teams to perform auditing. Phases of Penetration Testing Penetration testing is a three-phase process. 1- Pre-Attack Phase 2- Attack Phase 3- Post-Attack Phase Security Testing Methodology There are some methodological approaches to be adopted for security or penetration testing. Industry-leading Penetration Testing Methodologies are: - • Open Web Application Gecurity Project (OWAGP) • Open Gource Gecurity Testing Methodology Manual (OGGTMM) • Information Gystems Gecurity Assessment Framework (IGAF) • EC-Council Licensed Penetration Tester (LPT) Methodology Mind Map Information Security Laws and Standards Payment Card Industry Data Security Standard (PCI-DSS) Payment Card Industry Data Security Standard (PCI-DGG) is a global information security standard by “PGI Security Standard Council,” available for organizations to develop, enhance and assess security standards for handling cardholder information and security standard for payment account security. Founding members of this council are: -  American Express, Discover Financial Services  JCB International  MasterCard  Visa Inc. PCI data security standard deals with basically cardholder data security for debit, credit, prepaid, e-purse, ATM and POG cards. A high-level overview of PCI-DGG provide: -  Secure Network Strong Access Control  Cardholder data security  Regular Monitoring and Evaluation of Network  Maintaining Vulnerability Program Information  security policy IS0/IEC International Organization for Standardization (IGO) and International Electro- Technical Commission (IEC) are organizations that globally develop and maintain their standards. This standard is a revised edition (second) of the first edition IGO/IGE Z7OO1:ZOO5. IGO/IEC Z7OO1:ZO1s cover the following key point in information security: -  Implementation and maintaining Security requirements.  Information security management processes.  Assurance of Cost-effective risk management. • Status of Information Security Management • Activities. Compliant with laws. Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) was passed in 1PP6 by Congress. HIPAA runs with Department of Health and Human Gervices (HHG) to develop and maintain regulation that associates with privacy and security of health information. HIPAA Gecurity rules ensure what information is protected, additionally, the safeguards that must apply to secure electronic protected health information. The major domains in information security where HIPAA is developing and maintain standards and regulations are: - • Electronic Transaction and Code Gets • Standards Privacy Rules • Security Rules • national Identifier Requirements • Enforcement Rules Sarbanes 0xley Act (S0X) Garbanes Oxley Act (GOX) key requirements or provisions organizes in the form of 11 titles which are as follows: - Title Majors Title I Public company accounting oversight board Title II Auditor independence Title III Corporate responsibility Title IV Enhanced financial disclosures Title V Analyst conflicts of interest Title VI Commission resources and authority Title VII Gtudies and reports Title VIII Corporate and criminal fraud accountability Title IX White-collar crime penalty enhancements Title X Corporate tax returns Title XI Corporate fraud and accountability Some other regulatory bodies are offering the standards that are being deployed worldwide including Digital Millennium Copyright Act (DMCA) and Federal Information Gecurity Management Act (FIGMA). DMCA is United Gtates copyright law whereas FIGMA a framework for ensuring information security control effectiveness. According to Homeland Gecurity, FIGMA ZO14 codifies the Department of Homeland Gecurity's role in administering the implementation of information security policies for federal Executive Branch civilian agencies, overseeing agencies' compliance with those policies, and assisting OMB in developing those policies. The legislation provides the Department authority to develop and oversee the implementation of binding operational directives to other agencies, in coordination and consistent with OMB policies and practices. The Federal Information Gecurity Modernization Act of ZO14 amends the Federal Information Gecurity Management Act of ZOOZ (FIGMA). Mind Map