Computer Security: 1 Vulnerabilities
Computer Security: 1 Vulnerabilities
Computer security is security applied to computing devices such as computers and smartphones, as well as
computer networks such as private and public networks,
including the whole Internet. The eld covers all the
processes and mechanisms by which digital equipment,
information and services are protected from unintended
or unauthorized access, change or destruction, and is
of growing importance due to the increasing reliance of
computer systems in most societies.[1] It includes physical
security to prevent theft of equipment and information
security to protect the data on that equipment. It is sometimes referred to as cyber security or IT security.
Those terms generally do not refer to physical security,
but a common belief among computer security experts is
that a physical security breach is one of the worst kinds
security breaches as it generally allows full access to both
data and equipment.
undetected. A special form of asymmetric encryption attacks, known as kleptographic attack, resists to be useful
to the reverse engineer even after it is detected and analyzed.
Vulnerabilities
1 VULNERABILITIES
ers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive
times to cause the victim account to be locked, or they
may overload the capabilities of a machine or network
and block all users at once. These types of attack are, in
practice, dicult to prevent, because the behaviour of
whole networks needs to be analyzed, not just the behaviour of small pieces of code. Distributed denial of
service (DDoS) attacks, where a large number of compromised hosts (commonly referred to as "zombie computers", used as part of a botnet with, for example, a worm,
trojan horse, or backdoor exploit to control them) are
used to ood a target system with network requests, thus
attempting to render it unusable through resource exhaustion, are common. Another technique to exhaust victim
resources is through the use of an attack amplier, where
the attacker takes advantage of poorly designed protocols
on third-party machines, such as NTP or DNS, in order to
instruct these hosts to launch the ood. Some vulnerabilities in applications or operating systems can be exploited
to make the computer or application malfunction or crash
to create a denial-of-service.
1.3
Direct-access attacks
1.4 Eavesdropping
Eavesdropping is the act of surreptitiously listening to a
private conversation, typically between hosts on a network. For instance, programs such as Carnivore and
NarusInsight have been used by the FBI and NSA to
eavesdrop on the systems of internet service providers.
Even machines that operate as a closed system (i.e., with
no contact to the outside world) can be eavesdropped
upon via monitoring the faint electro-magnetic transmissions generated by the hardware; TEMPEST is a specication by the NSA referring to these attacks.
1.5 Spoong
Spoong of user identity describes a situation in which
one person or program successfully masquerades as another by falsifying data.
1.6 Tampering
Tampering describes an intentional modication of products in a way that would make them harmful to the consumer.
1.7 Repudiation
Repudiation describes a situation where the authenticity
of a signature is being challenged.
Privilege escalation describes a situation where an atAn unauthorized user gaining physical access to a com- tacker gains elevated privileges or access to resources that
puter (or part thereof) can perform many functions or were once restricted to him.
install dierent types of devices to compromise security, including operating system modications, software
worms, keyloggers, and covert listening devices. The at- 1.10 Exploits
tacker can also easily download large quantities of data
onto backup media, like CD-R/DVD-R or portable de- Main article: Exploit (computer security)
vices such as ash drives, digital cameras or digital audio
players. Another common technique is to boot an oper- An exploit is a software tool designed to take advantage
ating system contained on a CD-ROM or other bootable of a aw in a computer system. This frequently includes
media and read the data from the harddrive(s) this way. gaining control of a computer system, allowing privilege
The only way to prevent this is to encrypt the storage me- escalation, or creating a denial of service attack. The
dia and store the key separate from the system. Direct- code from exploits is frequently reused in trojan horses
access attacks are the only type of threat to air gapped and computer viruses. In some cases, a vulnerability can
computers in most cases.
lie in certain programs processing of a specic le type,
2.2
such as a non-executable media le. Some security web and caused panic and confusion in the past. Controlling
sites maintain lists of currently known unpatched vulner- aircraft over oceans is especially dangerous because radar
abilities found in common programs.
surveillance only extends 175 to 225 miles oshore. Beyond the radars sight controllers must rely on periodic
radio communications with a third party.
Computer crime refers to any crime that involves a comMain article: Social engineering (security)
puter and a network.[3]
See also: Category:Cryptographic attacks
Vulnerable areas
Computer security is critical in almost any technologydriven industry which operates on computer systems. The
issues of computer based systems and addressing their
countless vulnerabilities are an integral part of maintaining an operational industry.[4]
2.1
Aviation
The aviation industry is especially important when analyzing computer security because the involved risks include human life, expensive equipment, cargo, and transportation infrastructure. Security can be compromised
by hardware and software malpractice, human error, and
faulty operating environments. Threats that exploit computer vulnerabilities can stem from sabotage, espionage,
industrial competition, terrorist attack, mechanical malfunction, and human error.[5]
The consequences of a successful deliberate or inadvertent misuse of a computer system in the aviation industry
range from loss of condentiality to loss of system integrity, which may lead to more serious concerns such
as exltration (data theft or loss), network and air trac
control outages, which in turn can lead to airport closures,
loss of aircraft, loss of passenger life. Military systems
that control munitions can pose an even greater risk.
A proper attack does not need to be very high tech or well
funded; for a power outage at an airport alone can cause
repercussions worldwide.[6] One of the easiest and, arguably, the most dicult to trace security vulnerabilities
is achievable by transmitting unauthorized communications over specic radio frequencies. These transmissions
may spoof air trac controllers or simply disrupt communications altogether. These incidents are very common, having altered ight courses of commercial aircraft
Financial
breaches
cost
of
There are numerous ways to protect computers, including utilizing security-aware design techniques, building
Serious nancial damage has been caused by security on secure operating systems and installing hardware debreaches, but because there is no standard model for es- vices designed to protect the computer systems.
timating the cost of an incident, the only data available is
In general, a countermeasure is a measure or action taken
that which is made public by the organizations involved.
to counter or oset another one. In computer security
Several computer security consulting rms produce esa countermeasure is dened as an action, device, procetimates of total worldwide losses attributable to virus and
dure, or technique that reduces a threat, a vulnerability,
worm attacks and to hostile digital acts in general. The
or an attack by eliminating or preventing it, by minimiz2003 loss estimates by these rms range from $13 billion
ing the harm it can cause, or by discovering and reporting
(worms and viruses only) to $226 billion (for all forms of
it so that corrective action can be taken.[11][12] An altercovert attacks). The reliability of these estimates is ofnate meaning of countermeasure from the InfosecToday
ten challenged; the underlying methodology is basically
glossary[13] is:
anecdotal.[9]
Insecurities in operating systems have led to a massive
The deployment of a set of security services to
black market for rogue software. An attacker can use a
protect against a security threat.
security hole to install software that tricks the user into
buying a product. At that point, an aliate program pays
the aliate responsible for generating that installation 4.1 Security and systems design
about $30. The software is sold for between $50 and $75
Although there are many aspects to take into considerper license.[10]
ation when designing a computer system, security can
prove to be very important. According to Symantec, in
3.1 Reasons
2010, 94 percent of organizations polled expect to implement security improvements to their computer sysThere are many similarities (yet many fundamental dif- tems, with 42 percent claiming cyber security as their top
ferences) between computer and physical security. Just risk.[14]
like real-world security, the motivations for breaches of
At the same time, many organizations are improving secomputer security vary between attackers, sometimes
curity and many types of cyber criminals are nding ways
called hackers or crackers. Some are thrill-seekers or
to continue their activities. Almost every type of cyber atvandals (the kind often responsible for defacing web
tack is on the rise. In 2009 respondents to the CSI Comsites); similarly, some web site defacements are done to
puter Crime and Security Survey admitted that malware
make political statements. However, some attackers are
infections, denial-of-service attacks, password sning,
highly skilled and motivated with the goal of compromisand web site defacements were signicantly higher than
ing computers for nancial gain or espionage. An exin the previous two years.[15]
ample of the latter is Markus Hess (more diligent than
skilled), who spied for the KGB and was ultimately caught
because of the eorts of Cliord Stoll, who wrote a mem- 4.2 Security measures
oir, The Cuckoos Egg, about his experiences.
For those seeking to prevent security breaches, the rst
step is usually to attempt to identify what might motivate
an attack on the system, how much the continued operation and information security of the system are worth, and
who might be motivated to breach it. The precautions required for a home personal computer are very dierent
for those of banks' Internet banking systems, and dierent again for a classied military network. Other com-
4.3
Reducing vulnerabilities
5
yet another jurisdiction. If they successfully breach
security, they are often able to delete logs to cover
their tracks.
The sheer number of attempted attacks is so large
that organisations cannot spend time pursuing each
attacker (a typical home user with a permanent (e.g.,
cable modem) connection will be attacked at least
several times per day, so more attractive targets
could be presumed to see many more). Note however, that most of the sheer bulk of these attacks
are made by automated vulnerability scanners and
computer worms.
Law enforcement ocers are often unfamiliar with
information technology, and so lack the skills and
interest in pursuing attackers. There are also budgetary constraints. It has been argued that the high
cost of technology, such as DNA testing, and improved forensics mean less money for other kinds of
law enforcement, so the overall rate of criminals not
getting dealt with goes up as the cost of the technology increases. In addition, the identication of attackers across a network may require logs from various points in the network and in many countries, the
release of these records to law enforcement (with
the exception of being voluntarily surrendered by a
network administrator or a system administrator) requires a search warrant and, depending on the circumstances, the legal proceedings required can be
drawn out to the point where the records are either
regularly destroyed, or the information is no longer
relevant.
4.4
Security by design
4.7
USB dongles are typically used in software licensing schemes to unlock software capabilities,[21] but
they can also be seen as a way to prevent unauthorized access to a computer or other devices software. The dongle, or key, essentially creates a secure encrypted tunnel between the software application and the key. The principle is that an encryption scheme on the dongle, such as Advanced Encryption Standard (AES) provides a stronger measure of security, since it is harder to hack and replicate the dongle than to simply copy the native software to another machine and use it. Another security application for dongles is to use them for accessing web-based content such as cloud software or
Virtual Private Networks (VPNs).[22] In addition, a
USB dongle can be congured to lock or unlock a
computer.[23]
Trusted platform modules (TPMs) secure devices
by integrating cryptographic capabilities onto access devices, through the use of microprocessors, or
so-called computers-on-a-chip. TPMs used in conjunction with server-side software oer a way to detect and authenticate hardware devices, preventing
unauthorized network and data access.[24]
Computer case intrusion detection refers to a pushbutton switch which is triggered when a computer
case is opened. The rmware or BIOS is programmed to show an alert to the operator when the
computer is booted up the next time.
Systems designed with such methodology represent the
state of the art of computer security although products
Drive locks are essentially software tools to encrypt using such security are not widely known. In sharp conhard drives, making them inaccessible to thieves.[25] trast to most kinds of software, they meet specications
Tools exist specically for encrypting external drives with veriable certainty comparable to specications for
size, weight and power. Secure operating systems deas well.[26]
signed this way are used primarily to protect national security information, military secrets, and the data of in Disabling USB ports is a security option for pre- ternational nancial institutions. These are very powerventing unauthorized and malicious access to an ful security tools and very few secure operating systems
otherwise secure computer. Infected USB don- have been certied at the highest level (Orange Book Agles connected to a network from a computer in- 1) to operate over the range of Top Secret to unclasside the rewall are considered by Network World sied (including Honeywell SCOMP, USAF SACDIN,
as the most common hardware threat facing com- NSA Blacker and Boeing MLS LAN). The assurance of
puter networks.[27]
security depends not only on the soundness of the design
strategy, but also on the assurance of correctness of the
Mobile-enabled access devices are growing in pop- implementation, and therefore there are degrees of seularity due to the ubiquitous nature of cell phones. curity strength dened for COMPUSEC. The Common
Built-in capabilities such as Bluetooth, the newer Criteria quanties security strength of products in terms
Bluetooth low energy (LE), Near eld communica- of two components, security functionality and assurance
tion (NFC) on non-iOS devices and biometric val- level (such as EAL levels), and these are specied in a
idation such as thumb print readers, as well as QR Protection Prole for requirements and a Security Target
code reader software designed for mobile devices, for product descriptions. None of these ultra-high assuroer new, secure ways for mobile phones to con- ance secure general purpose operating systems have been
nect to access control systems. These control sys- produced for decades or certied under Common Critetems provide computer security and can also be used ria.
for controlling access to secure buildings.[28]
gests the system has the right security functions that are
implemented robustly enough to protect DoD and DoE
classied information. Medium assurance suggests it can
protect less valuable information, such as income tax information. Secure operating systems designed to meet
medium robustness levels of security functionality and
assurance have seen wider use within both government
and commercial markets. Medium robust systems may
provide the same security functions as high assurance secure operating systems but do so at a lower assurance level
(such as Common Criteria levels EAL4 or EAL5). Lower
levels mean we can be less certain that the security functions are implemented awlessly, and therefore less dependable. These systems are found in use on web servers,
guards, database servers, and management hosts and are
used not only to protect the data stored on these systems
but also to provide a high level of protection for network
connections and routing services.
tially causing system instability when that location is referenced again. This is called dangling pointer, and the
rst known exploit for this particular problem was presented in July 2007. Before this publication the problem
was known but considered to be academic and not practically exploitable.[30]
4.8
Secure coding
5.5
9
launched by Israel and the United States[37][38][39][40] although neither has publicly acknowledged this.
Some illustrative examples of dierent types of computer 5.5 Global surveillance disclosures
security breaches are given below.
Main article: Global surveillance disclosures (2013
present)
5.1
5.3
In early 2007, American apparel and home goods company TJX announced that it was the victim of an
unauthorized computer systems intrusion[34] and that
the hackers had accessed a system that stored data on
credit card, debit card, check, and merchandise return
transactions.[35]
5.4
Stuxnet attack
10
which to prosecute.[52][53] This is mainly caused by the government intervention would aect their ability to infact that many countries have their own regulations re- novate eciently.
garding cyber crimes. Authorship attribution for cyber
crimes and cyber attacks has become a major problem
for international law enforcement agencies.[54]
7.1 Publicprivate cooperation
"[Computer viruses] switch from one country to another,
from one jurisdiction to another moving around the
world, using the fact that we don't have the capability to
globally police operations like this. So the Internet is as
if someone [had] given free plane tickets to all the online criminals of the world.[52] (Mikko Hyppnen) Use
of dynamic DNS, fast ux and bullet proof servers have
added own complexities to this situation.[55]
Businesses are eager to expand to less developed countries due to the low cost of labor, says White et al.
(2012). However, these countries are the ones with the 8 Actions and teams in the US
least amount of Internet safety measures, and the Internet Service Providers are not so focused on implementing 8.1 Cybersecurity Act of 2010
those safety measures (2010). Instead, they are putting
their main focus on expanding their business, which exThe Cybersecurity Act of 2010 - S. 773 (full text) was
poses them to an increase in criminal activity.[56]
introduced rst in the Senate on April 1, 2009 by SenaIn response to the growing problem of cyber crime, the tor Jay Rockefeller (D-WV), Senator Evan Bayh (D-IN),
European Commission established the European Cyber- Senator Barbara Mikulski (D-MD), Senator Bill Nelson
crime Centre (EC3).[57] The EC3 eectively opened on (D-FL), and Senator Olympia Snowe (R-ME). The re1 January 2013 and will be the focal point in the EUs vised version was approved on March 24, 2009.
ght against cyber crime, contributing to faster reaction The main objective of the bill is to increase collaboration
to online crimes. It will support member states and the between the public and the private sector on the issue of
EUs institutions in building an operational and analytical cybersecurity. But also
capacity for investigations, as well as cooperation with
international partners.[58]
to ensure the continued free ow of commerce
within the United States and with its global
trading partners through secure cyber communications, to provide for the continued devel7 Government
opment and exploitation of the Internet and intranet communications for such purposes, to
The role of the government is to make regulations to force
provide for the development of a cadre of
companies and organizations to protect their system, ininformation technology specialists to improve
frastructure and information from any cyber attacks, but
and maintain eective cybersecurity defenses
also to protect its own national infrastructure such as the
against disruption, and for other purposes.[8]
national power-grid.
The question of whether the government should intervene
or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by
denition, the cyberspace is a virtual space free of any
government intervention. Where everyone agree that an
improvement on cybersecurity is more than vital, is the
government the best actor to solve this issue? Many government ocials and experts think that the government
should step in and that there is a crucial need for regulation, mainly due to the failure of the private sector to solve
eciently the cybersecurity problem. R. Clarke said during a panel discussion at the RSA Security Conference
in San Francisco, he believes that the industry only responds when you threaten regulation. If industry doesn't
respond (to the threat), you have to follow through.[59]
On the other hand, executives from the private sector
agree that improvements are necessary but think that the
The act also wants to instate new higher standards, processes, technologies and protocols to ensure the security
of the critical infrastructure.
8.6
Military agencies
end-user protection worldwide. It also directs the President to give priority for assistance to improve legal, judicial, and enforcement capabilities with respect to cybercrime to countries with low information and communications technology levels of development or utilization in
their critical infrastructure, telecommunications systems,
and nancial industries[61] as well as to develop an action
plan and an annual compliance assessment for countries
of cyber concern.[61]
8.3
8.4
11
http://www.onguardonline.gov/ : The mission of
this website is to provide practical tips from the federal government and the technology industry to help
the end user be on guard against internet fraud, secure their computers, and protect their private personal information.
http://csrc.nist.gov/ : The Computer Security Division (Computer Security Resource Center) of the
National Institute of Standards and Technology. Its
mission is to provide assistance, guidelines, specications, minimum information security requirements...
R&D[66]
On May 12, 2011, the White House sent Congress a proposed cybersecurity law designed to force companies to
do more to fend o cyberattacks, a threat that has been In October 2009, the Department of Homeland Security
reinforced by recent reports about vulnerabilities in sys- opened the National Cybersecurity and Communications
Integration Center. The center brings together governtems used in power and water utilities.[64]
ment organizations responsible for protecting computer
Executive order 13636 Improving Critical Infrastructure networks and networked infrastructure.[67]
Cybersecurity was signed February 12, 2013.
8.5
Government initiatives
8.6.2 FBI
The third priority of the Federal Bureau of InvestigaThe government put together several dierent websites to tion(FBI) is to:
inform, share and analyze information. Those websites
are targeted to dierent audiences":
Protect the United States against cyber-based attacks and high-technology crimes[68]
the government itself: states, cities, counties
the public sector
12
9 INTERNATIONAL ACTIONS
8.7 FCC
The U.S. Federal Communications Commission's role in
cyber security is to strengthen the protection of critical
communications infrastructure, to assist in maintaining
the reliability of networks during disasters, to aid in swift
recovery after, and to ensure that rst responders have
access to eective communications services.[75]
USCYBERCOM
The United States Strategic Command (USSTRATCOM) is one of the nine Unied Combatant Commands
of the United States Department of Defense (DoD). The
Command, including components, employs more than
9 International actions
A lot of dierent teams and organisations exists, mixing
private and public members. Here are some examples:
The Forum of Incident Response and Security Teams (FIRST) is the global association of
CSIRTs.[77] The US-CERT, AT&T, Apple, Cisco,
McAfee, Microsoft are all members of this international team.[78]
The Council of Europe helps protect societies
worldwide from the threat of cybercrime through
the Convention on Cybercrime and its Protocol
9.2
South Korea
13
9.3 India
9.1
9.1.1
Germany
Berlin starts National Cyber Defense Initiative
On June 16, 2011, the German Minister for Home Affairs, ocially opened the new German NCAZ (National Center for Cyber Defense) Nationales CyberAbwehrzentrum, which is located in Bonn. The NCAZ
closely cooperates with BSI (Federal Oce for Information Security) Bundesamt fr Sicherheit in der Informationstechnik, BKA (Federal Police Organisation)
Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt fr den Militrischen Abschirmdienst and other national organisations in Germany
taking care of national security aspects. According to
the Minister the primary task of the new organisation
founded on February 23, 2011, is to detect and prevent
attacks against the national infrastructure and mentioned
incidents like Stuxnet.
India has no specic law for dealing with cyber security related issues.[83] Some provisions for cyber security
have been incorporated into rules framed under the Information Technology Act 2000 but they are grossly insucient. Further, the National Cyber Security Policy
2013 has remained ineective and non-implementable
until now.[84] The cyber security trends and developments
in India 2013 have listed the shortcomings of Indian cyber
security policy in general and Indian cyber security initiatives in particular.[85] Indian cyber security policy has
also failed to protect civil liberties of Indians including
privacy rights.[86] Civil liberties protection in cyberspace
has been blatantly ignored by Indian government and esurveillance projects have been kept intact by the Narendra Modi government.[87] As a result Indian cyber security eorts are inadequate and not up to the mark. There
is also no legal obligation for cyber security breach disclosures in India as well.[88]
However, the Indian Companies Act 2013 has introduced
cyber law[89] and cyber security obligations[90] on the part
of Indian directors. Cyber security obligations for ecommerce business in India have also been recognised
14
11
recently.[91]
9.4
Canada
10 National teams
Here are the main computer emergency response teams
around the world. Every country have their own team to
protect network security. February 27, 2014, the Chinese
network security and information technology leadership
team is established. The leadership team will focus on national security and long-term development, co-ordination
of major issues related to network security and information technology economic, political, cultural, social, and
military and other elds of research to develop network
security and information technology strategy, planning
and major macroeconomic policy promote national network security and information technology law, and constantly enhance security capabilities.
10.1 Europe
CSIRTs in Europe collaborate in the TERENA task
force TF-CSIRT. TERENA's Trusted Introducer service
provides an accreditation and certication scheme for
CSIRTs in Europe. A full list of known CSIRTs in Europe is available from the Trusted Introducer website.
CERT Brazil, member of FIRST (Forum for InciPublic Safety Canadas Canadian Cyber Incident Redent Response and Security Teams)
sponse Centre (CCIRC) is responsible for mitigating and
responding to threats to Canadas critical infrastructure
CARNet CERT, Croatia, member of FIRST
and cyber systems. The CCIRC provides support to
AE CERT, United Arab Emirates
mitigate cyber threats, technical support to respond and
recover from targeted cyber attacks, and provides on SingCERT, Singapore
line tools for members of Canadas critical infrastruc[98]
ture sectors. The CCIRC posts regular cyber security
CERT-LEXSI, France, Canada, Singapore
bulletins on the Public Safety Canada website.[99] The
CCIRC also operates an online reporting tool where individuals and organizations can report a cyber incident.[100]
11 The cyber security job market
Canadas Cyber Security Strategy is part of a larger, integrated approach to critical infrastructure protection, and
[105]
eld of IT concerned
functions as a counterpart document to the National Strat- Cyber Security is a fast-growing
[95]
with
reducing
organizations
risk
of
hack or data breach.
egy and Action Plan for Critical Infrastructure.
Commercial, government and non-governmental all emOn September 27, 2010, Public Safety Canada part- ploy cybersecurity professional, but the use of the term
nered with STOP.THINK.CONNECT, a coalition of cybersecurity is government job descriptions is more
non-prot, private sector, and government organizations prevalent than in non-government job descriptions, in
dedicated to informing the general public on how to pro- part due to government cybersecurity initiatives (as optect themselves online.[101] On February 4, 2014, the posed to corporations IT security initiatives) and the
Government of Canada launched the Cyber Security Co- establishment of government institutions like the US Cyoperation Program.[102] The program is a $1.5 million ber Command and the UK Defence Cyber Operations
ve-year initiative aimed at improving Canadas cyber Group.[106]
systems through grants and contributions to projects in
support of this objective.[103] Public Safety Canada aims Typical cybersecurity job titles and descriptions
[107]
to begin an evaluation of Canadas Cyber Security Strat- include:
egy in early 2015.[95] Public Safety Canada administers
and routinely updates the GetCyberSafe portal for Cana- Security Analyst Analyzes and assesses vulnerabilities
dian citizens, and carries out Cyber Security Awareness
in the infrastructure (software, hardware, networks),
Month during October.[104]
investigates available tools and countermeasures to
15
remedy the detected vulnerabilities, and recommends solutions and best practices. Analyzes and
assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions.
Tests for compliance with security policies and procedures. May assist in the creation, implementation,
and/or management of security solutions.
Security Engineer
Performs security monitoring, security and data/logs
analysis, and forensic analysis, to detect security
incidents, and mounts incident response. Investigates and utilizes new technologies and processes
to enhance security capabilities and implement improvements. May also review code or perform other
security engineering methodologies.
Security Architect
Designs a security system or major components of a security system, and may head a security design team
building a new security system.
Security Administrator
Installs and manages organization-wide security systems. May also take on some of the tasks of a security analyst in smaller organizations.
Chief Information Security Ocer
A high-level management position responsible for the
entire information security division/sta. The position may include hands-on technical work.
Security Consultant/Specialist/Intelligence
Broad titles that encompass any one or all of the other
roles/titles, tasked with protecting computers, networks, software, data, and/or information systems
against viruses, worms, spyware, malware, intrusion
detection, unauthorized access, denial-of-service attacks, and an ever increasing list of attacks by hackers acting as individuals or as part of organized
crime or foreign governments.
Student programs are also available to people interested
in beginning a career in cybersecurity.[108][109] Meanwhile, a exible and eective option for information
security professionals of all experience levels to
keep studying is online security training, including
webcasts.[110][111][112]
12
Terminology
The following terms used with regards to engineering secure systems are explained below.
16
12
aected the primary site include having had a
primary site in World Trade Center I and the
recovery site in 7 World Trade Center, both of
which were destroyed in the 9/11 attack, and
having ones primary site and recovery site in
the same coastal region, which leads to both
being vulnerable to hurricane damage (for example, primary site in New Orleans and recovery site in Jeerson Parish, both of which
were hit by Hurricane Katrina in 2005). The
backup media should be moved between the
geographic sites in a secure manner, in order
to prevent them from being stolen.
TERMINOLOGY
Endpoint security software helps networks to prevent exltration (data theft) and virus infection at
network entry points made vulnerable by the prevalence of potentially infected portable computing devices, such as laptops and mobile devices, and external storage devices, such as USB drives.[115]
Firewalls are an important method for control and
security on the Internet and other networks. A network rewall can be a communications processor,
typically a router, or a dedicated server, along with
rewall software. A rewall serves as a gatekeeper
system that protects a companys intranets and other
computer networks from intrusion by providing a lter and safe transfer point for access to and from the
Internet and other networks. It screens all network
trac for proper passwords or other security codes
and only allows authorized transmission in and out
of the network. Firewalls can deter, but not completely prevent, unauthorized access (hacking) into
computer networks; they can also provide some protection from online intrusion.
Honey pots are computers that are either intentionally or unintentionally left vulnerable to attack by
crackers. They can be used to catch crackers or x
vulnerabilities.
Intrusion-detection systems can scan a network for
people that are on the network but who should not
be there or are doing things that they should not be
doing, for example trying a lot of passwords to gain
access to the network.
A microkernel is the near-minimum amount of software that can provide the mechanisms to implement
an operating system. It is used solely to provide
very low-level, very precisely dened machine code
upon which an operating system can be developed.
A simple example is the early '90s GEMSOS (Gemini Computers), which provided extremely low-level
machine code, such as segment management, atop
which an operating system could be built. The theory (in the case of segments) was thatrather
than have the operating system itself worry about
mandatory access separation by means of militarystyle labelingit is safer if a low-level, independently scrutinized module can be charged solely
with the management of individually labeled segments, be they memory segments or le system
segments or executable text segments. If software below the visibility of the operating system is
(as in this case) charged with labeling, there is no
theoretically viable means for a clever hacker to subvert the labeling scheme, since the operating system
per se does not provide mechanisms for interfering
with labeling: the operating system is, essentially,
a client (an application, arguably) atop the microkernel and, as such, subject to its restrictions.
17
Pinging The ping application can be used by potential crackers to nd if an IP address is reachable. If
a cracker nds a computer, they can try a port scan
to detect and attack services on that computer.
Social engineering awareness keeps employees
aware of the dangers of social engineering and/or
having a policy in place to prevent social engineering can reduce successful breaches of the network
and servers.
14 See also
Attack tree
CAPTCHA
CERT
CertiVox
Cloud computing security
Comparison of antivirus software
13
Scholars
Ross J. Anderson
Annie Anton
Adam Back
Daniel J. Bernstein
Stefan Brands
L. Jean Camp
Lance Cottrell
Computer insecurity
Computer security model
Content security
Countermeasure (computer)
Cyber security standards
Dancing pigs
Data loss prevention products
Data security
Dierentiated security
Lorrie Cranor
Disk encryption
Cynthia Dwork
Deborah Estrin
Fault tolerance
Joan Feigenbaum
Ian Goldberg
Sha Goldwasser
Identity management
Lawrence A. Gordon
Identity theft
Peter Gutmann
Paul Kocher
Monica S. Lam
Brian LaMacchia
Kevin Mitnick
Bruce Schneier
Dawn Song
Gene Spaord
Next-Generation Firewall
Joseph Steinberg
Open security
Moti Yung
OWASP
Rakshit Tandon
Penetration test
18
15
REFERENCES
15
References
[1] Reliance spells end of road for ICT amateurs, May 07,
2013, The Australian
[23] Lock and protect your Windows PC. TheWindowsClub.com. Retrieved 2014-03-20.
[2] http://www.evolllution.com/opinions/
cybersecurity-understanding-online-threat/
[24] James Greene (2012). Intel Trusted Execution Technology: White Paper (PDF). Intel Corporation. Retrieved
2013-12-18.
[3] Moore, R. (2005) Cybercrime: Investigating HighTechnology Computer Crime, Cleveland, Mississippi:
Anderson Publishing.
[4] J. C. Willemssen, FAA Computer Security. GAO/TAIMD-00-330. Presented at Committee on Science,
House of Representatives, 2000.
[5] P. G. Neumann, Computer Security in Aviation, presented at International Conference on Aviation Safety and
Security in the 21st Century, White House Commission
on Safety and Security, 1997.
[6] J. Zellan, Aviation Security. Hauppauge, NY: Nova Science, 2003, pp. 6570.
MyFox Twin
19
Infragard.
Retrieved 10
20
[73] CCIPS.
[74] U.S. Department of Defense, Cyber Command Fact
Sheet, May 21, 2010 http://www.stratcom.mil/factsheets/
Cyber_Command/
[75] FCC Cyber Security. FCC.
[76] Verton, Dan (January 28, 2004). DHS launches national
cyber alert system. Computerworld (IDG). Retrieved
2008-06-15.
[77] FIRST website.
[78] First members.
[79] European council.
[80] MAAWG.
[81] Kwanwoo Jun (23 September 2013). Seoul Puts a Price
on Cyberdefense. Wall Street Journal. Dow Jones &
Company, Inc. Retrieved 24 September 2013.
[82] South Korea seeks global support in cyber attack probe.
BBC Monitoring Asia Pacic. 7 March 2011.
15
REFERENCES
Public
[99] Cyber Security Bulletins. Public Safety Canada. Re[83] Cyber Security Laws In India Needed. Centre Of Extrieved 1 November 2014.
cellence For Cyber Security Research And Development In
India (CECSRDI). 9 March 2014. Retrieved 6 September [100] Report a Cyber Security Incident. Public Safety
2014.
Canada. Government of Canada. Retrieved 3 November
2014.
[84] National Cyber Security Policy Of India 2013 (NCSP
2013)". Centre Of Excellence For Cyber Security Re- [101] Government of Canada Launches Cyber Security Awaresearch And Development In India (CECSRDI). 26 Decemness Month With New Public Awareness Partnership.
ber 2013. Retrieved 6 September 2014.
Market Wired (Government of Canada). 27 September
2012. Retrieved 3 November 2014.
[85] Cyber Security Trends And Developments In India
2013. Perry4Laws Techno Legal Base (PTLB). 30 De- [102] Cyber Security Cooperation Program. Public Safety
cember 2013. Retrieved 6 September 2014.
Canada. Retrieved 1 November 2014.
[86] National Cyber Security Policy Of India Has Failed To
[103] Cyber Security Cooperation Program. Public Safety
Protect Privacy Rights In India. Centre Of Excellence For
Canada.
Cyber Security Research And Development In India (CECSRDI). 4 July 2013. Retrieved 6 September 2014.
[104] GetCyberSafe. Get Cyber Safe. Government of Canada.
Retrieved 3 November 2014.
[87] Civil Liberties Protection In Cyberspace. Human Rights
Protection In Cybersapce. 20 June 2009. Retrieved 6 [105] The Growth of Cybersecurity Jobs. Mar 2014. ReSeptember 2014.
trieved 24 April 2014.
[88] Indian Government Is Planning A Legislation Mandating [106] de Silva, Richard (11 Oct 2011). Government vs. ComStrict Cyber Security Disclosure Norms In India. Centre
merce: The Cyber Security Industry and You (Part One)".
Of Excellence For Cyber Security Research And DevelopDefence IQ. Retrieved 24 Apr 2014.
ment In India (CECSRDI). 27 March 2013. Retrieved 6
September 2014.
[107] Department of Computer Science. Retrieved April 30,
2013.
[89] Cyber Law Obligations Of Directors Of Indian Companies Under Indian Companies Act, 2013. Cyber Laws In [108] "(Information for) Students. NICCS (US National IniIndia And Technology Laws And Regulations In India. 7
tiative for Cybercareers and Studies). Retrieved 24 April
April 2014. Retrieved 6 September 2014.
2014.
[90] Cyber Security Obligations Of Directors Of Indian Com- [109] Current Job Opportunities at DHS. U.S. Department of
panies Under Indian Companies Act, 2013. Centre Of
Homeland Security. Retrieved 2013-05-05.
Excellence For Cyber Security Research And Development
In India (CECSRDI). 6 April 2014. Retrieved 6 Septem- [110] Cybersecurity Training & Exercises. U.S. Department
of Homeland Security. Retrieved 2015-01-09.
ber 2014.
[91] Cyber Security Issues Of E-Commerce Business In In- [111] Cyber Security Awareness Free Training and Webcasts.
dia. E-Retailing Laws And Regulations In India. 13 AuMS-ISAC (Multi-State Information Sharing & Analysis
gust 2014. Retrieved 6 September 2014.
Center. Retrieved 9 January 2015.
21
16
External links
22
17
17
17.1
17.2
Images
17.3
Content license
23
17.3
Content license