CS2p NeedForSecurity
CS2p NeedForSecurity
Cyber Security
The Need for Security
Learning Objectives
2
Singaporeans lost more than $500,000
to cybercrime last year: security
report
Published Nov 24, 2015, 12:00 pm SGT
The Strait Times, SPH Website
http://www.straitstimes.com/singapore/singaporeans-lost-more-than-500000-to-
cybercrime-says-security-report
3
Introduction
4
Business Needs First
5
Protecting the Functionality of an
Organization
Management (general and IT) is responsible for
facilitating security program
Implementing information security is more a
management issue than technology
Information security should be addressed in terms of
business impact and the cost of business interruption.
6
Protecting Data That Organizations
Collect and Use
When an organization loses its data, it also loses its
record of transactions and ability to deliver value to
customers.
A critical aspect of information security is to protect
data in transmission, in processing, and at rest
(storage)
7
Enabling the Safe Operation of
Applications
Organization needs an environment that safeguard the
operation of applications
Management must continue to oversee infrastructure
once in placenot relegate to IT department.
8
Safeguarding Technology Assets in
Organizations
Secure infrastructure hardware must be appropriate to
the size and scope of the organisation
Additional security services may be needed as the
organization grows.
More robust solutions should replace security
programs when the organization has outgrown its
capacity
9
Threats
Threat: a potential risk to an assets loss of value
Management must be informed about the various
threats to an organizations people, applications, data,
and information systems.
Overall security is improving, so is the number of
potential hackers
The 20102011 CSI/FBI survey found
67.1 percent of organizations had malware infections.
11 percent indicated system penetration by an outsider.
10
11
12
13
Intellectual Property Breach
Intellectual property (IP) refers to the creation,
ownership, and control of original ideas as well as the
representation of those ideas
Software privacy is the most common IP breaches
Two watchdog organizations investigate software
abuse:
Software & Information Industry Association (SIIA)
Business Software Alliance (BSA)
The Intellectual Property Office of Singapore (IPOS)
14
Quality of Service (1)
15
Quality of Service (2)
Internet service issues
Internet service provider (ISP) failures can adversely
affect the availability of information.
Outsourced Web hosting provider is responsible for all
Internet services as well as for the hardware and Web site
operating system software.
Communications and other service provider issues
Other utility services affect organizations: telephone,
water, wastewater, trash pickup.
Loss of these services can affect organizations ability to
function.
16
Quality of Service (3)
Power irregularities
Commonplace
Lead to fluctuations such as power excesses, power
shortages, and power losses
Sensitive electronic equipment vulnerable to and easily
damaged/destroyed by fluctuations
Controls can be applied to manage power quality.
17
Espionage or Trespass (1)
Unauthorized access of protected information
Competitive intelligence (legal) versus industrial
espionage (illegal)
Shoulder surfing can occur anywhere a person accesses
confidential information.
Controls let trespassers know they are encroaching on
organizations system
Hackers use skill, guile, or fraud to bypass such controls
18
19
Espionage or Trespass (2)
Expert hacker
Develops software scripts and program exploits
A master of many skills, especially in programming
Create attack software (malware) and share with others
Unskilled hacker (script kiddies)
Many more unskilled hackers than expert hackers
Use expertly written software to exploit a system
Do not usually fully understand the systems they hack
20
21
Espionage or Trespass (3)
Other terms for system rule breakers:
Cracker: cracks or removes software protection
designed to prevent unauthorized duplication
Phreaker: hacks the public telephone system to make
free calls or disrupt services
Password attacks
Cracking
Brute force
Dictionary
Rainbow tables
Social engineering
22
23
Forces of Nature
24
Human Error or Failure (1)
Acts performed by employees without malicious intent
or in ignorance
Causes:
Inexperience
Improper training
Incorrect assumptions
Hence employees are potentially one of the greatest
threats to an organizations data.
25
Human Error or Failure (2)
Potential damages
Revelation of classified data
Entry of erroneous data
Accidental data deletion or modification
Data storage in unprotected areas
Failure to protect information
Can be prevented with training, ongoing awareness
activities, and controls.
Social engineering uses social skills (trickery) to
convince people to reveal access credentials or other
valuable information to an attacker.
26
Social Engineering (1)
People are the weakest link. You can have the best
technology; firewalls, intrusion-detection systems,
biometric devices ... and somebody can call an
unsuspecting employee.Kevin Mitnick
Advance-fee fraud: indicates recipient is due money and
small advance fee/personal banking information required
to facilitate transfer
Phishing: attempt to gain personal/confidential information;
apparent legitimate communication hides embedded code
that redirects user to third-party site
27
Social Engineering (2)
28
Social Engineering
The Key is Manipulation
29
Example: Social Engineering in NTU
30
Information Extortion
31
Sabotage or Vandalism
Range from petty vandalism, web site defacing to
organized sabotage.
Web site defacing can erode consumer confidence,
diminishing organizations sales, net worth, and
reputation.
Threat of hacktivist or cyberactivist operations is rising.
Cyberterrorism/Cyberwarfare is a much more sinister
form of hacking
32
33
Software Attacks (1)
Malicious software (malware) is used to overwhelm
the processing capabilities of a system or to gain
access to protected systems
Software attacks occur when an individual or a
group designs and deploys malwares to attack a
system.
34
Software Attacks (2)
Malwares include the viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal
information
Virus: Code segments that attach to existing program
and take control of access to the targeted computer.
Worms: Replicate themselves until they completely fill
available resources such as memory and hard drive
space.
Trojan horses: Disguised as helpful, interesting, or
necessary pieces of software
35
Virus - overview
A program that piggybacks on other executable
programs
Not structured to exist by itself
When the host program is executed, the virus code
also executes and performs its action
Typically, actions may be
Spreading itself to other programs or disks
Delete files
Cause systems to become unusable
36
3 ways for viruses to get into your
computer
1. On contaminated media (floppy, USB drive, or CDROM)
2. Through email and peer-to-peer sites
3. Part of another program
37
Types of viruses
Armored virus
Companion virus
Macro virus
Multipartite virus
Phage virus
Polymorphic virus
Retrovirus
Stealth virus
38
Armored Virus
39
Companion Virus
40
Macro Virus
41
Multipartite Virus
42
Phage Virus
43
Polymorphic Virus
44
Retrovirus
45
Stealth Virus
46
Virus Transmission
47
Worm
48
Trojan Horse
49
50
New Table
51
Melissa: both virus and worm
The worm part enabled it to travel from system to
system.
The virus part replicated itself on local systems and
did the damage.
Creator-author, David Smith, was sentenced to 20
months in prison and fined $5,000 for releasing it.
52
Logic Bomb
53
Software Attacks (3)
54
Software Attacks (4)
Denial-of-service (DoS): An attacker sends a large
number of connection or information requests to a
target.
The target system becomes overloaded and cannot
respond to legitimate requests for service.
It may result in system crash or inability to perform
ordinary functions.
Distributed denial-of-service (DDoS): A coordinated
stream of requests is launched against a target from
many locations simultaneously.
Code Red and Nimda viruses caused extensive damage
to businesses worldwide by causing DoS attacks that
caused over $3 billion in damages.
55
56
Software Attacks (5)
Mail bombing (also a DoS): An attacker routes large
quantities of e-mail to target to overwhelm the receiver.
Spam (unsolicited commercial e-mail): It is considered
more a nuisance than an attack, though is emerging as
a vector for some attacks.
Packet sniffer: It monitors data traveling over network; it
can be used both for legitimate management purposes
and for stealing information from a network.
Spoofing: A technique used to gain unauthorized
access; intruder assumes a trusted IP address.
57
58
Software Attacks (6)
59
60
Technical Hardware Failures or Errors
Occur when a manufacturer distributes equipment
containing a known or unknown flaw.
Can cause the system to perform outside of expected
parameters, resulting in unreliable service or lack of
availability.
Some errors are terminal and some are intermittent.
CPU failure
Mean time between failure measures the amount of
time between hardware failures.
61
Technical Software Failures or Errors
Large quantities of computer code are written,
debugged, published, and sold before all bugs are
detected and resolved.
Combinations of certain software and hardware can
reveal new software bugs.
Open Web Application Security Project (OWASP) is
dedicated to helping organizations create/operate
trustworthy software and publishes a list of top security
risks.
https://www.owasp.org/index.php/Main_Page
62
Software Vulnerability
The developer creates software containing a vulnerability
The attacker finds the vulnerability before the developer finds
or fix it
Or is aware of but has neglected, e.g., due to an internal
assessment of the threat's potential damage costs being
lower than the costs of developing a fix
Or has been unable to fix it
The attacker writes/uses/distributes an exploit, eg, a virus
The developer or the public becomes aware of the exploited
vulnerability and the developer is forced to start working on a
fix, if not already working on one
The developer releases the fix (or patch)
63
Install Patches ASAP
64
65
Two kingpins of Russian
computer crime Hackers (1)
Alexey Ivanov and Vasily Gorshkov were found guilty of
breaking into U.S. corporate information systems.
They attacked through a known vulnerability in Windows
NT.
First they would steal sensitive data.
Then email company executives demanding payment in
exchange for not exposing confidential customer data or
destroying financial records.
66
Two kingpins of Russian
computer crime Hackers (2)
To carry out their attacks and extortion demands and hide their
identities, they used various Hotmail email accounts, or hacked
company accounts.
Prior to being arrested by FBI in Nov. 2000, they had:
broken into >38 companies
stolen data from 2 banks
stolen data from 300,000 credit cards from CD Universe's
Website and 15,700 credit cards from Western Union's
Website.
67
Software patches not installed (1)
68
Software patches not installed (2)
69
Vulnerability Window (1)
By one estimate, the average vulnerability window of a
zero-day exploit is about 10 months
Can be much longer, e.g., in 2008 Microsoft confirmed a
vulnerability in Internet Explorer which affected versions
released in 2001
Reverse engineering patches
By analyzing the patch just released, attackers can more
easily figure out how to exploit the underlying
vulnerability, and attack the systems that have not yet
been patched
70
Vulnerability Window (2)
71
Common failures in Software
Development (1)
Buffer overruns
Command injection
Cross-site scripting (XSS)
Failure to handle errors
Failure to protect network traffic
Failure to store and protect data securely
Failure to use cryptographically strong random numbers
72
Common failures in Software
Development (2)
Format string problems
Neglecting change control
Improper file access
Improper use of SSL
Information leakage
Integer bugs (overflows/underflows)
Race conditions
SQL injection
73
Problem areas in Software Development
74
Spyware
Definition: gathering information about a person or
organization without their knowledge
May send information to another entity without consent
May asserts control over a computer without the owner's
knowledge
4 types: system monitors (e.g., keyloggers), trojans,
adware, and tracking cookies (owners movements on the
Internet)
Spyware legally used or made by governments
Govware: Germany, Switzerland, ~ 2007
Policeware: installed to suspects computers
75
Computer and Network Surveillance
Definition: monitoring of computer activity, data stored
on a hard drive, or data being transferred over computer
networks such as the Internet, corporate networks, and
phone networks
recognize and monitor threats
maintain social stability
prevent and investigate criminal activity
Possible data analysis
Public data: Social networks, e.g., facebook, twitter
Privacy issues: Emails, SMS, GPS locations, phone calls
76
Browser Hijacking
Definition: the modification of a web browser's settings
without the user's permission
A browser hijacker may replace the existing home page,
error page, or search page with its own
Some browser hijacking can be easily reversed, while
other instances may be difficult to reverse
Various software packages exist to prevent such
modification and remove browser hijackers
Most installers will give users the opportunity to accept or
decline an offer to install a hijacker
however, declining the offer is often ignored
77
Theft
78
Antivirus Software (1)
2 common methods for virus and worm detection
Signature: a unique string of program that cannot be
found in other legitimate programs
Protected only from viruses/worms in the antivirus
signature list in their most recent virus/worm definition
update
Update your antivirus software!
Not protected from new viruses/worms (e.g., zero day
attack)
Heuristic algorithms based on common virus/worm
behaviors
False positives can be disruptive, especially in a
commercial environment
79
Antivirus Software (2)
Option of antivirus (AV) software once the AV discovers
a virus
If possible, cleaning the virus from the file without
damaging the file (ideal!)
quarantining the infected file
If impossible to clean the virus from the file without
damaging the file, deleting the file that contains the virus
(you loss the file!)
80
Backup !
81
Technological Obsolescence
82
Summary
Main aim is to ensure information stay the way they are
There is a need for security
Management must play its roles in Information Security
4 important functions of Information Security
Threats and attacks
Software and hardware threat
Forces of nature
Social engineering
Malwares: virus, worm and Trojan horses
Others
Antivirus and patch
83