Unit 1
Unit 1
UNIT 1
What is Cyber Security???
• Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious
attacks. It's also known as information technology security or electronic information security.
• Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and
availability of computer systems, networks and data, against cyber-attacks or unauthorized access. The main purpose of cyber security
is to protect all organizational assets from both external and internal threats as well as disruptions caused due to natural disasters.
• Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
• Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the
data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.
• Mobile Security
• Mobile security refers to protecting both organizational and personal information stored on mobile devices like cell phones, laptops,
tablets, etc. from various threats such as unauthorized access, device loss or theft, malware, etc.
• Identity Management and Data Security: Identity management includes frameworks, processes, and activities that enables
authentication and authorization of legitimate individuals to information systems within an organization. Data security involves
implementing strong information storage mechanisms that ensure security of data at rest and in transit.
• Information security protects the integrity and privacy of data, both in storage and in transit.
• Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when
accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.
• Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that
causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to
return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to
operate without certain resources.
• End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an
otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in
unidentified USB drives, and various other important lessons is vital for the security of any organization.
• The threats countered by cyber-security are
three-fold:
• 1. Cybercrime includes single actors or groups
targeting systems for financial gain or to cause
disruption.
• 2. Cyber-attack often involves politically motivated
information gathering. A cyber-attack is a deliberate
attempt by external or internal threats or attackers to
exploit and compromise the confidentiality, integrity
and availability of information systems of a target
organization or individual(s). Cyber-attackers use
illegal methods, tools and approaches to cause
damages and disruptions or gain unauthorized access
to computers, devices, networks, applications and
databases.
• 3. Cyberterrorism is intended to undermine electronic
systems to cause panic or fear.
What’s the difference between a
cyber-attack and a security breach?
• A cyber-attack is not exactly the same as a security
breach. A cyber-attack as discussed above is
an attempt to compromise the security of a system.
Attackers try to exploit the confidentially, integrity or
availability of a software or network by using various
kinds of cyber-attacks as outlined in the above section.
• Security breach on the other hand is a successful
event or incident in which a cyber-attack results in a
compromise of sensitive information, unauthorized
access to IT systems or disruption of services.
11 top cyber security best practices to
1.
prevent a breach
Conduct cyber security training and awareness
A strong cyber security strategy would not be successful if the employees are not educated on topics of cyber security, company policies
and incidence reporting. Even the best technical defenses may fall apart when employees make unintentional or intentional malicious
actions resulting in a costly security breach. Educating employees and raising awareness of company policies and security best practices
through seminars, classes, online courses is the best way to reduce negligence and the potential of a security violation.
2. Perform risk assessments
Organizations should perform a formal risk assessment to identify all valuable assets and prioritize them based on the impact caused
by an asset when its compromised. This will help organizations decide how to best spend their resources on securing each valuable
asset.
3. Ensure vulnerability management and software patch management/updates
It is crucial for organizational IT teams to perform identification, classification, remediation, and mitigation of vulnerabilities within all
software and networks that it uses, to reduce threats against their IT systems. Furthermore, security researchers and attackers identify
new vulnerabilities within various software every now and then which are reported back to the software vendors or released to the
public. These vulnerabilities are often exploited by malware and cyber attackers. Software vendors periodically release updates which
patch and mitigate these vulnerabilities. Therefore, keeping IT systems up-to-date helps protect organizational assets.
4. Use the principle of least privilege
The principle of least privilege dictates that both software and personnel should be allotted the least amount of permissions necessary
to perform their duties. This helps limits the damage of a successful security breach as user accounts/software having lower
permissions would not be able to impact valuable assets that require a higher-level set of permissions. Also, two-factor authentication
should be used for all high-level user accounts that have unrestricted permissions.
5. Enforce secure password storage and policies
Organizations should enforce the use of strong passwords that adhere to industry recommended standards for all employees. They should
also be forced to be periodically changed to help protect from compromised passwords. Furthermore, password storage should follow
industry best practices of using salts and strong hashing algorithms.
6. Implement a robust business continuity and incidence response (BC-IR) plan
Having a solid BC-IR plans and policies in place will help an organization effectively respond to cyber-attacks and security breaches while
ensuring critical business systems remain online.
7. Perform periodic security reviews
Having all software and networks go through periodic security reviews helps in identifying
security issues early on and in a safe environment. Security reviews include application and
network penetration testing, source code reviews, architecture design reviews, red team
assessments, etc. Once security vulnerabilities are found, organizations should prioritize and
mitigate them as soon as possible.
8. Backup data
Backing up all data periodically will increase redundancy and will make sure all sensitive data is not
lost or comprised after a security breach. Attacks such as injections and ransomware, compromise
the integrity and availability of data. Backups can help protect in such cases.
9. Use encryption for data at rest and in transit
All sensitive information should be stored and transferred using strong encryption algorithms.
Encrypting data ensures confidentiality. Effective key management and rotation policies should
also be put in place. All web applications/software should employ the use of SSL/TLS.
10. Design software and networks with security in mind
When creating applications, writing software, architecting networks, always design them with security
in place. Bear in mind that the cost of refactoring software and adding security measures later on
is far greater than building in security from the start. Security designed application help reduce
the threats and ensure that when software/networks fail, they fail safe.
11. Implement strong input validation and industry standards in secure coding
Strong input validation is often the first line of defense against various types of injection attacks.
Software and applications are designed to accept user input which opens it up to attacks and here
is where strong input validation helps filter out malicious input payloads that the application
would process. Furthermore, secure coding standards should be used when writing software as
these helps avoid most of the prevalent vulnerabilities outlined in OWASP and CVE.
Information as an asset
• Definition of information: ‘Information is a message, usually in the form of a document or an audible or
visible communication’.
• In other words, information is an entity which has identifiable and communicable attributes.
• It is important to remember, however, that information that is communicated has both the intention of
the sender and the expectations of the receiver to take into account. As such, it cannot be viewed as an
independent entity.
• What is an Information Asset?
• An Information Asset is organized Information that is valuable and easily accessible to those who need it.
Information Assets comprise a wide range of corporate product, service and process information.
• In information security, computer security and network security, an asset is any data, device, or other
component of the environment that supports information-related activities.
• Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications
and support systems) and confidential information. Assets should be protected from illicit access, use,
disclosure, alteration, destruction, and/or theft, resulting in loss to the organization
• In raw form- Information may be nonarchived product data, uncaptured customer information, a partially
documented Engineering process or unshared corporate intellectual property. In typical day-to-day
business activity, products are designed, services are sold, customers are supported and the necessary
Information moves in a more or less efficient fashion to facilitate these actions.
• Ten Characteristics of an Information Asset
• An Information Asset is any organized documentation or data incorporated into a
communication structure that empowers the organization to have a better chance of
reaching its goals.
• An Information Asset is created by organizing Information to resolve an important
issue in the organization.
• An Information Asset may exist entirely within a single department or may be spread
across the entire organization.
• An Information Asset may be part of an Enterprise Application or may be entirely
separate.
• An Information Asset may be an organized and maintained data archive.
• An Information Asset may be as simple as a monthly updated spreadsheet on a
shared network drive or as complex as a development project ROI dashboard
updated on a weekly basis.
• An Information Asset increases in value according to the number of people able to
make gainful use of the Information.
• An Information Asset increases in value according to the amount of information it
aggregates.
• An Information Asset increases in value according to the amount of analysis it
performs converting low level Information into more refined Information.
• An Information Asset is maintained by people working in a consistent and
cooperative manner.
What is Information Security?
• Information Security is not only about securing
information from unauthorized access.
• Information Security is basically the practice of
preventing unauthorized access, use, disclosure,
disruption, modification, inspection, recording or
destruction of information.
• Information can be physical or electronic one.
Information can be anything like Your details or
we can say your profile on social media, your data
in mobile phone, your biometrics etc.
• Thus Information Security spans so many research
areas like Cryptography, Mobile Computing, Cyber
Forensics, Online Social Media etc.
• Information Security programs are build around 3 objectives,
commonly known as CIA – Confidentiality, Integrity, Availability.
• Confidentiality – means information is not disclosed to
unauthorized individuals, entities and process. For example if we
say I have a password for my Gmail account but someone saw
while I was doing a login into Gmail account. In that case my
password has been compromised and Confidentiality has been
breached.
• Integrity – means maintaining accuracy and completeness of data.
This means data cannot be edited in an unauthorized way. For
example, a hacker may intercept data and modify it before
sending it on to the intended recipient. Another example of a
failure of integrity is when you try to connect to a website and a
malicious attacker between you and the website redirects your
traffic to a different website. In this case, the site you are directed
to is not genuine.
• Availability – means information must be available when needed.
Denial of service attack is one of the factor that can hamper the
availability of information.
• Availability is one of the three basic functions of security management that are
present in all systems. Availability is the assertion that a computer system is
available or accessible by an authorized user whenever it is needed. Systems have
high order of availability to ensures that the system operates as expected when
needed. Availability provides building of fault tolerance system in the products.
There are mainly two threats to availability of the system which are as follows:
• 1. Denial of Service 2. Loss of Data Processing Capabilities
• The above two facets of availability are explained as following below:
1. Denial of Service:
Denial of Service specifies to actions that lock up computing services in a way that
the authorized users is unable to use the system whenever needed.
• In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host connected
to the Internet. Denial of service is typically accomplished by flooding the targeted
machine or resource with superfluous requests in an attempt to overload systems
and prevent some or all legitimate requests from being fulfilled.
• 2. Loss of Data Processing Capabilities:
The loss of data processing capabilities are generally caused by the natural disasters
or human actions is perhaps more common.
• Contingency planning is the measure to counter such type of losses, which helps in
minimizing the time for that a data processing capability remains unavailable.
Contingency planning provides an alternative means of processing which involves
business resumption planning, alternative site processing or simply disaster recovery
planning thereby ensures data availability.
• Confidentiality, integrity and availability, also known
as the CIA triad, is a model designed to guide policies
for information security within an organization.
• The model is also sometimes referred to as the AIC
triad (availability, integrity and confidentiality) to
avoid confusion with the Central Intelligence Agency.
The elements of the triad are considered the three
most crucial components of security.
• In this context, confidentiality is a set of rules that
limits access to information, integrity is the assurance
that the information is trustworthy and accurate,
and availability is a guarantee of reliable access to the
information by authorized people.
• Confidentiality
• Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality
are designed to prevent sensitive information from reaching the wrong people while making sure
that authorized people can access it. It is common for data to be categorized according to the
amount and type of damage that could be done should it fall into unintended hands. More or less
stringent measures can then be implemented according to those categories.
• Sometimes safeguarding data confidentiality involves special training for those privy to sensitive
documents. Such training would typically include security risks that could threaten this
information. Training can help familiarize authorized people with risk factors and how to guard
against them. Further aspects of training may include strong passwords and password-related
best practices and information about social engineering methods, to prevent users from bending
data-handling rules with good intentions and potentially disastrous results.
• A good example of methods used to ensure confidentiality is an account number or routing
number when banking online. Data encryption is a common method of ensuring confidentiality.
User IDs and passwords constitute a standard procedure; two-factor authentication is becoming
the norm. Other options include biometric verification and security tokens. In addition, users can
take precautions to minimize the number of places where the information appears and the
number of times it is actually transmitted to complete a required transaction. Extra measures
might be taken in the case of extremely sensitive documents, such as storing only on air
gapped computers, disconnected storage devices or, for highly sensitive information, in hard
copy form only.
• A failure to maintain confidentiality means that someone who shouldn't have access has managed
to get access to private information. Through intentional behavior or by accident, a failure in
confidentiality can cause some serious devastation.
• Some measures to keep your information confidential are:
✔ Encryption
✔ Password
✔ Two-factor authentication
✔ Bio-metric
• Integrity
• Integrity involves maintaining the consistency, accuracy, and trustworthiness of data
over its entire life cycle.
• Data must not be changed in transit, and steps must be taken to ensure that data
cannot be altered by unauthorized people (for example, in a breach of
confidentiality). These measures include file permissions and user access controls.
Version control may be used to prevent erroneous changes or accidental deletion by
authorized users from becoming a problem. In addition, some means must be in
place to detect any changes in data that might occur as a result of
non-human-caused events such as an electromagnetic pulse (EMP) or server crash.
• Some data might include checksums, even cryptographic checksums, for verification
of integrity. Backups or redundancies must be available to restore the affected data
to its correct state.
• Integrity, in the world of information security means maintaining the accuracy, and
completeness of data. It is about protecting data from being modified or misused by
an unauthorized party. Integrity involves maintaining the consistency and
trustworthiness of data over its entire life cycle. Data must not be changed in transit,
and precautionary steps must be taken to ensure that data cannot be altered by
unauthorized people.
• For example, in a breach of integrity, a hacker may seize data and modify it before
sending it on to the intended recipient.
• Measures to maintain the integrity of information include:
✔ Encryption
✔ User Access Controls
✔ Version Control
✔ Backups
• Availability
• Availability is best ensured by rigorously maintaining all hardware, performing hardware repairs immediately when needed
and maintaining a correctly functioning operating system environment that is free of software conflicts. It’s also important
to keep current with all necessary system upgrades. Providing adequate communication bandwidth and preventing the
occurrence of bottlenecks are equally important. Redundancy, failover, RAID even high-availability clusters can mitigate
serious consequences when hardware issues do occur. Fast and adaptive disaster recovery is essential for the worst-case
scenarios; that capacity is reliant on the existence of a comprehensive disaster recovery plan (DRP). Safeguards against data
loss or interruptions in connections must include unpredictable events such as natural disasters and fire. To prevent data
loss from such occurrences, a backup copy may be stored in a geographically-isolated location, perhaps even in a fireproof,
waterproof safe. Extra security equipment or software such as firewalls and proxy servers can guard against downtime and
unreachable data blocked by malicious denial-of-service (DoS) attacks and network intrusions.
• Availability means that information is accessible to authorized users. It is basically an assurance that your system and data
are accessible by authorized users whenever it’s needed. Similar to confidentiality and integrity, availability also holds a
great value.
• Availability of information refers to ensuring that authorized parties are able to access the information when needed. You
might have been thinking of how you can ensure data availability? Well, Backup is the key.
• Your information is more vulnerable to availability threats than the other two components in the CIA model. Making regular
off-site backups can limit the damage caused to the hard drives by natural disasters. Information only has value if the right
people can access it at the right times.
• Your information is more vulnerable to availability threats than the other two components in the CIA model. Making regular
off-site backups can limit the damage caused to the hard drives by natural disasters. Information only has value if the right
people can access it at the right times.
• Measures to mitigate threats to availability include:
✔ Off-site backups (Off-site backup is a method of backing up data to a remote server or to media that is transported off site.
The two most common forms of off-site backup are cloud backup and tape backup. During cloud backup, also referred to
as online backup, a copy of the data is sent over a network to an off-site server.)
✔ Disaster recovery
✔ Redundancy
✔ Proper monitoring
✔ Environmental controls
✔ Virtualization (Virtualization is the process of creating a software-based, or virtual, representation of something, such as
virtual applications, servers, storage and networks. It is the single most effective way to reduce IT expenses while boosting
efficiency and agility for all size businesses.)
✔ Server clustering (Server clustering refers to a group of servers working together on one system to provide users with higher
availability. These clusters are used to reduce downtime and outages by allowing another server to take over in the event of
an outage. )
✔ Continuity of operations planning
• Authentication is the process of recognizing a
user’s identity. It is the mechanism of associating
an incoming request with a set of identifying
credentials. The credentials provided are
compared to those on a file in a database of the
authorized user’s information on a local operating
system or within an authentication server.
Three categories in which someone may be
authenticated are: something the user knows,
something the user is, and something the user
has.
• Confidentiality means that data, objects and resources
are protected from unauthorized viewing and other
access.
• Integrity means that data is protected from
unauthorized changes to ensure that it is reliable and
correct.
• Availability means that authorized users have access
to the systems and the resources they need.
• Nonrepudiation is the assurance that someone cannot
deny something. Typically, nonrepudiation refers to
the ability to ensure that a party to a contract or a
communication cannot deny the authenticity of their
signature on a document or the sending of a message
that they originated.
• Apart from this there is one more principle that governs information security
programs. This is Non repudiation.
• Non repudiation – means one party cannot deny receiving a message or a
transaction nor can the other party deny sending a message or a transaction. For
example in cryptography it is sufficient to show that message matches the digital
signature signed with sender’s private key and that sender could have a sent a
message and nobody else could have altered it in transit. Data Integrity and
Authenticity are pre-requisites for Non repudiation.
• Authenticity – means verifying that users are who they say they are and that each
input arriving at destination is from a trusted source. This principle if followed
guarantees the valid and genuine message received from a trusted source through a
valid transmission.
• Accountability – means that it should be possible to trace actions of an entity
uniquely to that entity. For example : Not every employee should be allowed to do
changes in other employees data. For this there is a separate department in an
organization that is responsible for making such changes and when they receive
request for a change then that letter must be signed by higher authority for example
Director of college and person that is allotted that change will be able to do change
after verifying his bio metrics, thus timestamp with the user(doing changes) details
get recorded. Thus we can say if a change goes like this then it will be possible to
trace the actions uniquely to an entity.
Need Of Information Security
• Information system means to consider available countermeasures or controls stimulated through uncovered
vulnerabilities and identify an area where more work is needed. The purpose of data security management is to
make sure business continuity and scale back business injury by preventing and minimising the impact of security
incidents. The basic principle of Information Security is:
• Confidentially
• Authentiacation
• Non-Repudiation
• Intergrity
So, Computer security can be defined as controls that are put in place to provide confidentiality,
integrity, and availability for all components of computer systems.
Components of computer system:
The components of a computer system that needs to be protected are:
• Hardware, the physical part of the computer, like the system memory and disk drive
• Firmware, permanent software that is etched into a hardware device’s nonvolatile memory and is
mostly invisible to the user (Firmware is a software program or set of instructions programmed
on a hardware device. It provides the necessary instructions for how the device communicates
with the other computer hardware.)
• Software, the programming that offers services, like operating system, word processor, internet
browser to the user (Software is a set of instructions, data or programs used to operate
computers and execute specific tasks)
Why is Computer Security Important?
In this digital era, we all want to keep our computers and our personal information secure and
hence computer security is important to keep our personal information protected.
It is also important to maintain our computer security and its overall health by preventing viruses
and malware which would impact on the system performance.
Computer Security Practices
Computer security threats are becoming relentlessly inventive these days. There is much need for
one to arm oneself with information and resources to safeguard against these complex and
growing computer security threats and stay safe online.
Some preventive steps you can take include:
❑ Secure your computer physically by:
❑ Installing reliable, reputable security and anti-virus software
❑ Activating your firewall, because a firewall acts as a security guard between the internet and your local
area network
❑ Stay up-to-date on the latest software and news surrounding your devices and perform software
updates as soon as they become available
❑ Avoid clicking on email attachments unless you know the source
❑ Change passwords regularly, using a unique combination of numbers, letters and case types
❑ Use the internet with caution and ignore pop-ups, drive-by downloads while surfing
❑ Taking the time to research the basic aspects of computer security and educate yourself on
evolving cyber-threats
❑ Perform daily full system scans and create a periodic system backup schedule to ensure your data
is retrievable should something happen to your computer.
❑ Apart from these, there are many ways you can protect your computer system. Aspects such as
encryption and computer cleaners can assist in protecting your computers and its files.
Internet Security
• Internet security is a branch of computer security which comprises
various security measures exercised for ensuring the security of
transactions done online.
• In the process, the internet security prevents attacks targeted at
browsers, network, operating systems, and other applications.
• Today, businesses and governments are more concerned about
safeguarding from Cyber attacks and malware programs that
originate from the internet.
• The main aim of Internet security is to set up precise rules and
regulations that can deflect attacks that arise from the Internet.
• Internet security relies on particular resources and criteria for
safeguarding the data that is communicated or transferred online.
• In today's digital landscape, many of our daily activities rely on the
internet.
• Various forms of communication, entertainment, and financial and
work-related tasks are accomplished online.
• This means that tons of data and sensitive information are
constantly being shared over the internet.
• The internet is mostly private and secure, but it can also be an
insecure channel for exchanging information.
• With a high risk of intrusion by hackers and cybercriminals,
internet security is a top priority for individuals and businesses
alike.
• Internet security is a branch of computer security that deals
specifically with internet-based threats.
• These include hacking, where unauthorized users gain access to
computer systems, email accounts or websites; viruses and other
malicious software (malware), which can damage data or make
systems vulnerable to other threats; and identity theft, where
hackers steal personal details such as credit card numbers and
bank account information. You can protect yourself from these
threats with strong internet security.
Malware and Anti-Malware
• Malware, meaning malicious software, includes
viruses, worms and Trojans.
• Install and use anti-malware internet protection
applications to protect your computer.
Internet Security: Firewalls
• Think of a firewall as a filter consisting of a device or
array of devices that allow or deny access to a
network. Firewalls, which can be hardware or software
devices, prevent sensitive information from being
uncovered and stolen from networks and also prevent
dangerous information — such as malicious code —
from being planted on networks. Firewalls apply a
specific set of rules to all information coming in or
going out of networks to determine whether it's
dangerous or benign.
• Browser Choice
• Browsers can have security flaws, which allow hackers and cyber-criminals to attack computers
and networks. You must choose a secure browser and keep it updated with new security patches
the developer releases. One example of a dangerously insecure browser is Microsoft's Internet
Explorer 6 (IE6). Although it's now largely out of use, IE6 has so many security flaws that even
Microsoft wants to stop people from using it.
• Email Security
• Electronic mail (email) offers many potential vulnerabilities. It's often used to send sensitive
information, which then becomes vulnerable to theft, and is also used to distribute malware. A
solid email security strategy includes both anti-malware applications and good practice by users,
such as not sending sensitive information via unsecured email and not opening suspicious
messages.
• Denial-of-Service Attack
• Denial of service (DoS) attacks are performed against computer resources such as websites. The
aim of a DoS attack is to make a resource unavailable to users. One example is when a website is
so overwhelmed by repeated communications requests that it cannot keep up with the demand.
When multiple systems are involved, it becomes a distributed denial of service attack (DDoS).
Methods for protecting against such attacks include firewalls and systems such as "clean pipes," in
which website traffic is routed through a proxy server (A proxy server is a computer on the web
that redirects your web browsing activity) that drops bad traffic, allowing only genuine requests.
• Social Engineering
• The strongest firewall and high security anti-virus suite won't protect your system if you give away
sensitive information such as passwords or security questions. Social engineering uses tricks to
make you hand over information to criminals.
• An example is phishing, in which an email appears to come from a reputable organization such as
a bank, tricking the recipient into entering their personal details. The phisher can then collect and
use them to log in to the victim's account. If you want excellent internet security, it's important to
remain aware of social engineering.
• Internet security requires a combination of several products and
technologies to properly safeguard data. It's important to consider several
types of internet security strategies when taking proper measures to help
keep your network secure. These tactics can include:
• Browser selection: Each browser has its own security measures in place,
but some can have serious flaws that allow hackers and cybercriminals to
exploit and invade. Ensure that you're using a secure browser to reduce
the risk of compromising your computer or network.
• Multi-factor authentication (MFA): MFA is a method of controlling
computer access by requiring several separate pieces of evidence to an
authentication mechanism. Websites and email accounts can be made
more secure by requiring at least two factors of authentication by a user.
• Email security: Email creates a wave of opportunity for viruses, worms,
Trojans, and other unwanted programs. Establishing a multi-layered and
comprehensive email security strategy will help significantly reduce
exposure to emerging threats. Email messages can also be protected by
using cryptography, such as signing an email, encrypting the body of an
email message, and encrypting the communication between mail servers.
• Firewalls: Firewalls act as filters that protect devices by allowing or
denying access to a network. By applying a specific set of rules to identify
if something is safe or harmful, firewalls can prevent sensitive information
from being stolen and keep malevolent code from being embedded onto
networks.
• Proxy Server
• A proxy server is a computer on the web that redirects your web browsing activity. Here's what that means.
• Normally, when you type in a website name (Amazon.com or any other), your Internet Service Provider (ISP) makes
the request for you and connects you with the destination—and reveals your real IP address, as mentioned before.
• When you use a proxy your online requests get rerouted.
• While using a proxy, your Internet request goes from your computer to your ISP as usual, but then gets sent to the
proxy server, and then to the website/destination. Along the way, the proxy uses the IP address you chose in your
setup, masking your real IP address.
Why you might want to use a proxy.
• Here why some people turn to using a proxy—and why you might be interested as well.
• A school or local library blocks access to certain websites and a student wants to get around that.
• You want to look at something online that interests you...but you would prefer it couldn't be traced back to your IP
address and your location.
• You're traveling abroad and the technology set up in the country you're in prevents you from connecting to a
website back home.
• You want to post comments on websites but you do not want your IP address to be identified or your identity
tracked down.
• Your employer blocks access to social media or other sites and you'd like to bypass those restrictions.
• Why you might not want to use one
• You should keep in mind that your employer, your ISP and other networks might object to your using a proxy. Just
because you can do it, doesn't mean you should. And in some cases, websites will blacklist IP addresses they suspect
or know are from a proxy.
Malware
• The term malware is a contraction of malicious software. Put simply, malware is any piece of
software that was written with the intent of damaging devices, stealing data, and generally
causing a mess. Viruses, Trojans, spyware, and ransomware are among the different kinds of
malware.
• Malware is often created by teams of hackers: usually, they’re just looking to make money, either
by spreading the malware themselves or selling it to the highest bidder on the Dark Web (the
portion of the Internet that is intentionally hidden from search engines, uses masked IP
addresses, and is accessible only with a special web browser).
• However, there can be other reasons for creating malware too — it can be used as a tool for
protest, a way to test security, or even as weapons of war between governments.
• Malware is the collective name for a number of malicious software variants, including
viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists
of code developed by cyberattackers, designed to cause extensive damage to data and systems or
to gain unauthorized access to a network.
• Malware is typically delivered in the form of a link or file over email and requires the user to
click on the link or open the file to execute the malware.
• Though varied in type and capabilities, malware usually has one of the following objectives:
❖ Provide remote control for an attacker to use an infected machine.
❖ Send spam from the infected machine to unsuspecting targets.
❖ Investigate the infected user’s local network.
❖ Steal sensitive data.
Malware is an inclusive term for all types of malicious software, such as:
• How to protect against malware
• When it comes to malware, prevention is better than a cure.
Fortunately, there are some common sense, easy behaviors that
minimize your chances of running into any nasty software.
• Don’t trust strangers online! “Social engineering”, which can
include strange emails, abrupt alerts, fake profiles, and
curiosity-tickling offers, are the #1 method of delivering malware.
If you don’t know exactly what it is, don’t click on it.
• Double-check your downloads! From pirating sites to official
storefronts, malware is often lurking just around the corner. So
before downloading, always double-check that the provider is
trustworthy by carefully reading reviews and comments.
• Get an ad-blocker! Malvertising – where hackers use infected
banners or pop-up ads to infect your device – is on the rise. You
can’t know which ads are bad: so it’s safer to just block them all
with a reliable ad-blocker.
• Careful where you browse! Malware can be found anywhere, but
it’s most common in websites with poor backend security, like
small, local websites. If you stick to large, reputable sites, you
severely reduce your risk of encountering malware.
VIRUS
• Programs that copy themselves throughout a
computer or network.
• Viruses piggyback on existing programs and
can only be activated when a user opens the
program.
• At their worst, viruses can corrupt or delete
data, use the user’s email to spread, or erase
everything on a hard disk.
• a computer virus is “malware attached to another
program (such as a document), which can replicate
and spread after an initial execution on a target
system where human interaction is required. Many
viruses are harmful and can destroy data, slow down
system resources, and log keystrokes.”
• Most computer viruses target systems running
Microsoft Windows. Macs, on the other hand, enjoy a
reputation as virus-proof super machines.
• In reality, Macs are not inherently safer. There
are more Windows users in the world than Mac
users and cybercriminals simply choose to write
viruses for the operating system (OS) with the largest
amount of potential victims.
• The easiest way to differentiate computer viruses from other
forms of malware is to think about viruses in biological terms.
• Take the flu virus, for example. The flu requires some kind of
interaction between two people—like a hand shake, a kiss, or
touching something an infected person touched. Once the flu
virus gets inside a person’s system it attaches to healthy human
cells, using those cells to create more viral cells.
A computer virus works in much the same way:
• A computer virus requires a host program.
• A computer virus requires user action to transmit from one system
to another.
• A computer virus attaches bits of its own malicious code to other
files or replaces files outright with copies of itself.
• It’s that second virus trait that tends to confuse people. Viruses
can’t spread without some sort of action from a user, like opening
up an infected Word document. Worms, on the other hand, are
able to spread across systems and networks on their own, making
them much more prevalent and dangerous
How does a computer virus find me?
Even if you’re careful, you can pick up computer viruses through normal Web activities
like:
• Sharing music, files, or photos with other users
• Visiting an infected website
• Opening spam email or an email attachment
• Downloading free games, toolbars, media players and other system utilities
• Installing mainstream software applications without thoroughly reading license
agreements
What does a computer virus do?
• Some computer viruses are programmed to harm your computer by damaging
programs, deleting files, or reformatting the hard drive.
• Others simply replicate themselves or flood a network with traffic, making it
impossible to perform any internet activity.
• Even less harmful computer viruses can significantly disrupt your system’s
performance, sapping computer memory and causing frequent computer crashes.
What are the symptoms of a computer virus?
Your computer may be infected if you recognize any of these malware symptoms:
• Slow computer performance
• Erratic computer behavior
• Unexplained data loss
• Frequent computer crashes
How to protect against computer viruses
Take these steps to safeguard your PC with the best computer virus protection:
✔ Use antivirus protection and a firewall
✔ Get antispyware software
✔ Always keep your antivirus protection and antispyware software up-to-date
✔ Update your operating system regularly
✔ Increase your browser security settings
✔ Avoid questionable Web sites
✔ Only download software from sites you trust.
✔ Carefully evaluate free software and file-sharing applications before downloading them.
✔ Don't open messages from unknown senders
✔ Immediately delete messages you suspect to be spam
❖ An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet
traffic in and out of your computer and hide your PC from online scammers looking for easy
targets.
❖ Products like Webroot Internet Security Complete and Webroot Antivirus provide complete
protection from the two most dangerous threats on the Internet – spyware and computer viruses.
They thwart threats before they can enter your computer, stand guard at every possible entrance
of your computer and fend off any computer virus that tries to open, even the most damaging
and devious strains.
❖ While free antivirus downloads are available, they just can't offer the computer virus help you
need to keep up with the continuous onslaught of new strains.
❖ Previously undetected forms of polymorphic malware can often do the most damage, so it’s
critical to have up-to-the-minute, guaranteed antivirus protection.
❖ EXAMPLES???????????? (I LOVE U, MELISSA, CODE RED)
Worms
• Worms are a self-replicating type of malware (and a type of
virus) that enter networks by exploiting vulnerabilities,
moving quickly from one computer to another.
• Because of this, worms can propagate themselves and
spread very quickly – not only locally, but have the potential
to disrupt systems worldwide.
• Unlike a typical virus, worms don’t attach to a file or
program.
• Instead, they slither and enter computers through a
vulnerability in the network, self-replicating and spreading
before you’re able to remove the worm.
• But by then, they’ll already have consumed all the
bandwidth of the network, interrupting and arresting large
network and web servers.
• Definition: A computer worm is a malicious, self-replicating software program (popularly termed
as 'malware') which affects the functions of software and hardware programs.
Description: It fits the description of a computer virus in many ways. For example, it can also
self-replicate itself and spread across networks. That is why worms are often referred to as viruses
also.
• But computer worms are different from computer viruses in certain aspects.
• First, unlike viruses which need to cling on to files (host files) before they can diffuse themselves
inside a computer, worms exist as separate entities or standalone software.
• They do not need host files or programs.
• Secondly, unlike viruses, worms do not alter files but reside in active memory and duplicate
themselves.
• Worms use parts of the operating system that are automatic and usually invisible to the user.
• Their existence in the system becomes apparent only when their uncontrolled replication
consumes system resources, slowing or halting other tasks in the process.
• In order to spread, worms either exploit the vulnerability of the target system or use some kind
of social engineering method to trick users into executing them.
• Once they enter a system, they take advantage of file-transport or information-transport features
in the system that allows them to travel unaided.
• A computer worm called 'Stuxnet worm’ turned heads the world over recently when it attacked
the nuclear facilities of Iran. This worm reportedly destroyed roughly a fifth of Iran's nuclear
centrifuges by causing them to spin out of control by increasing the pressure on the spinning
centrifuges, while displaying that everything was under control. It managed this feat by replaying
the plant's protection system values in the control room while the attack was happening.
What damage can computer worms cause?
• It depends on the type of computer worm and the desires
of its creator. Some worms are used to spread other types
of malware for cybercrime like corporate espionage and
others are used to highlight particular
security vulnerabilities but do no real damage (minus
network congestion).
• Many of the first computer worms were proofs of concept
designed to do nothing more than infect computers and
reproduce themselves in the background. Often the only
way to identify an infection was when a worm made too
many copies of itself and caused the system to slow.
• But with time, worms are becoming a means to an end,
often carrying a payload that aims to steal sensitive data or
cause a data breach.
• It's common to use the worm to gain initial access to a
system and then use privilege escalation to gain further
access to a system.
How do computer worms spread?
1. Email
One of the most common ways for computer worms to spread is via email spam. In years gone by,
worms could hide in the main text of an email, but as modern email clients caught on and began
blocking direct embedding circa 2010, the risk for this type of attack is fairly low.
While embedded worms may be things of the past, email attachments remain popular hiding spots for
worms. What may appear to be a benign work document or personal photo can, in fact, be hiding
malicious code, waiting to be released when you click a link or open said attachment. Once a
machine has been infected, the worm may replicate itself by emailing itself to everyone in your
address book or automatically replying to emails in your inbox.
2. Operating system vulnerabilities
Every operating system has its vulnerabilities (yes, even macOS) and some worms are specifically
coded to take advantage of these weak points. Perhaps the most infamous example is Conficker, a
worm first identified in 2008 which exploited a vulnerability in a network service present in many
versions of Windows, including Windows 2000, Windows XP, Windows Vista, Windows Server
2003, Windows Server 2008, and Windows Server 2008 R2 Beta and Windows 7 Beta. At its peak,
Conficker infected as many as 15 million computers.
3. Instant messaging
Worms can take on similarly deceptive forms in instant messaging software and take advantage of
users who are probably not on high alert when using such services.
In the past, instant messaging software such as mIRC, MSN Messenger, Yahoo IM and ICQ proved to
be exceptionally fertile breeding grounds for worms. In today’s digital landscape, modern chat
systems are just as vulnerable, with Facebook Messenger a common infection point for worms
such as Dorkbot, which spreads via an executable file disguised as a JPG image.
• 4. Smartphones
• Globally, there were about 2.8 billion active
smartphones being used at the end of
2016, according to data collated by market
intelligence firm Newzoo. With these figures
in mind, it should come as little surprise that
worm creators are increasingly turning their
attention to mobile devices.
Trojans
• A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can
take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict
some other harmful action on your data or network.
• A Trojan acts like a bona fide application or file to trick you. It seeks to deceive you into loading
and executing the malware on your device. Once installed, a Trojan can perform the action it was
designed for.
• A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses
can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so,
Trojan malware and Trojan virus are often used interchangeably.
• It is a type of computer software that is camouflaged in the form of regular software such as
utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes
problems like killing background system processes, deleting hard drive data and corrupting file
allocation systems.
• A Trojan Horse or Trojan is a malware type which covertly attaches itself to a benign application
to perform atrocious actions after activation such as spying on you, gathering data, creating
backdoor access, disrupting performance etc. For sending the gathered information Trojan
connects themselves to the remote server also known as Command and Control server.
• Trojans outspread themselves through user interaction. No self replication and no self
reproduction by infecting files are the properties of Trojan.
• Trojans gain entry to the system through malicious email attachments, social engineering, and
execution of malicious files and so on.
• Trojans can take form of a backdoor which creates a channel to the remote server.
Some of the common actions that Trojans take are:
• Creating backdoors: Trojans typically make changes to your security system so that
other malware or even a hacker can get in. This is usually the first step in creating a
botnet.
• Spying: Some Trojans are essentially spyware designed to wait until you access your
online accounts or enter your credit card details, and then send your passwords and
other data back to their master.
• Turning your computer into a zombie: Sometimes, a hacker isn't interested in you,
but just wants to use your computer as a slave in a network under their control.
• Sending costly SMS messages: Even smartphones get Trojans, and a common way
for criminals to make money is by making your phone send costly SMS messages to
premium numbers.
What does a Trojan look like?
• Well, that’s just it: Trojans can look like just about anything. The computer game you
downloaded from a strange website. The "free" MP3 by that band you secretly like.
Even an advertisement might try to install something on your computer.
• Some Trojans are specifically designed to trick you into using them. They can use
misleading language or try to convince you they are a legitimate app. This is why it’s
so important to watch out for unsafe websites and never download things carelessly.
Ransomware
• Ransomware is malicious software that infects your computer and displays
messages demanding a fee to be paid in order for your system to work again. This
class of malware is a criminal moneymaking scheme that can be installed through
deceptive links in an email message, instant message or website.
• There are a number of vectors ransomware can take to access a computer. One of
the most common delivery systems is phishing spam — attachments that come to
the victim in an email, masquerading as a file they should trust. Once they're
downloaded and opened, they can take over the victim's computer, especially if they
have built-in social engineering tools that trick users into allowing administrative
access.
• There are several things the malware might do once it’s taken over the victim's
computer, but by far the most common action is to encrypt some or all of the user's
files. If you want the technical details, the Infosec Institute has a great in-depth look
at how several flavors of ransomware encrypt files.
• But the most important thing to know is that at the end of the process, the files
cannot be decrypted without a mathematical key known only by the attacker. The
user is presented with a message explaining that their files are now are now
inaccessible and will only be decrypted if the victim sends an untraceable Bitcoin
payment (Digital money that's instant, private, and free from bank fees OR Bitcoin is
a digital or virtual currency created in 2009 that uses peer-to-peer technology to
facilitate instant payments.) to the attacker.
• Types of ransomware
• Ransomware attacks can be deployed in different forms. Some variants may be more harmful
than others, but they all have one thing in common: a ransom. Here are seven common types of
ransomware.
• Crypto malware. This form of ransomware can cause a lot of damage because it encrypts things
like your files, folders, and hard-drives. One of the most familiar examples is the destructive 2017
WannaCry ransomware attack. It targeted thousands of computer systems around the world that
were running Windows OS and spread itself within corporate networks globally. Victims were
asked to pay ransom in Bitcoin to retrieve their data.
• Lockers. Locker-ransomware is known for infecting your operating system to completely lock you
out of your computer or devices, making it impossible to access any of your files or applications.
This type of ransomware is most often Android-based.
• Scareware. Scareware is fake software that acts like an antivirus or a cleaning tool. Scareware
often claims to have found issues on your computer, demanding money to resolve the problems.
Some types of scareware lock your computer. Others flood your screen with annoying alerts and
pop-up messages.
• Doxware. Commonly referred to as leakware or extortionware, doxware threatens to publish your
stolen information online if you don’t pay the ransom. As more people store sensitive files and
personal photos on their computers, it’s understandable that some people panic and pay the
ransom when their files have been hijacked.
• Mac ransomware. Mac operating systems were infiltrated by their first ransomware in 2016.
Known as KeRanger, this malicious software infected Apple user systems through an app called
Transmission, which was able to encrypt its victims’ files after being launched.
• Ransomware on mobile devices. Ransomware began infiltrating mobile devices on a larger scale
in 2014. What happens? Mobile ransomware often is delivered via a malicious app, which leaves a
message on your device that says it has been locked due to illegal activity.
• Who are the targets of ransomware attacks?
• Ransomware can spread across the Internet without specific targets. But
the nature of this file-encrypting malware means that cybercriminals also
are able to choose their targets. This targeting ability enables
cybercriminals to go after those who can — and are more likely to — pay
larger ransoms.
• Here are four target groups and how each may be impacted.
• Groups that are perceived as having smaller security teams. Universities
fall into this category because they often have less security along with a
high level of file-sharing.
• Organizations that can and will pay quickly. Government agencies, banks,
medical facilities, and similar groups constitute this group, because they
need immediate access to their files — and may be willing to pay quickly
to get them.
• Firms that hold sensitive data. Law firms and similar organizations may be
targeted, because cybercriminals bank on the legal controversies that
could ensue if the data being held for ransom is leaked.
• Businesses in the Western markets. Cybercriminals go for the bigger
payouts, which means targeting corporate entities. Part of this involves
focusing on the United Kingdom, the United States, and Canada due to
greater wealth and personal-computer use.
Dos and don’ts of ransomware
• Ransomware is a profitable market for cybercriminals and can be difficult to stop. Prevention is the most important
aspect of protecting your personal data. To deter cybercriminals and help protect yourself from a ransomware
attack, keep in mind these eight dos and don’ts.
• 1. Do use security software. To help protect your data, install and use a trusted security suite that offers more than
just antivirus features. For instance, Norton 360 With LifeLock Select can help detect and protect against threats to
your identity and your devices, including your mobile phones.
• 2. Do keep your security software up to date. New ransomware variants continue to appear, so having up-to-date
internet security software will help protect you against cyberattacks.
• 3. Do update your operating system and other software. Software updates frequently include patches for newly
discovered security vulnerabilities that could be exploited by ransomware attackers.
• 4. Don’t automatically open email attachments. Email is one of the main methods for delivering ransomware. Avoid
opening emails and attachments from unfamiliar or untrusted sources. Phishing spam in particular can fool you into
clicking on a legitimate-looking link in an email that actually contains malicious code. The malware then prevents
you from accessing your data, holds that data hostage, and demands ransom.
• 5. Do be wary of any email attachment that advises you to enable macros to view its content. Once enabled,
macro malware can infect multiple files. Unless you are absolutely sure the email is genuine and from a trusted
source, delete the email.
• 6. Do back up important data to an external hard drive. Attackers can gain leverage over their victims by encrypting
valuable files and making them inaccessible. If the victim has backup copies, the cybercriminal loses some
advantage. Backup files allow victims to restore their files once the infection has been cleaned up. Ensure that
backups are protected or stored offline so that attackers can’t access them.
• 7. Do use cloud services. This can help mitigate a ransomware infection, since many cloud services retain previous
versions of files, allowing you to “roll back” to the unencrypted form.
• 8. Don’t pay the ransom. Keep in mind, you may not get your files back even if you pay a ransom. A cybercriminal
could ask you to pay again and again, extorting money from you but never releasing your data.
Computer virus examples
• Sometimes to understand what something is, we have to examine what it isn’t. Keeping that in mind, let’s play: Is It a Virus?
• In the Is It a Virus game we’re going to take a look at examples of things people on the Internet commonly believe to be a virus and
explain why it is or isn’t. What fun!
• Is a Trojan a virus? Trojans can be viruses. A Trojan is a computer program pretending to be something it’s not for the purposes of
sneaking onto your computer and delivering some sort of malware. To put it another way, if a virus disguises itself then it’s a Trojan. A
Trojan could be a seemingly benign file downloaded off the web or a Word doc attached to an email. Think that movie you downloaded
from your favorite P2P sharing site is safe? What about that “important” tax document from your accountant? Think twice, because
they could contain a virus.
• Is a worm a virus? Worms are not viruses, though the terms are sometimes used interchangeably. Even worse, the terms are
sometimes used together in a strange and contradictory word salad; i.e. a “worm virus malware.” It’s either a worm or a virus, but it
can’t be both, because worms and viruses refer to two similar but different threats. As mentioned earlier, a virus needs a host system
to replicate and some sort of action from a user to spread from one system to the next. A worm, conversely, doesn’t need a host
system and is capable of spreading across a network and any systems connected to the network without user action. Once on a system,
worms are known to drop malware (often ransomware) or open a backdoor.
• Is ransomware a virus? Ransomware can be a virus. Does the virus prevent victims from accessing their system or personal files and
demands ransom payment in order to regain access à la ransomware? If so, then it’s a ransomware virus. In fact, the very first
ransomware was a virus (more on that later). Nowadays, most ransomware comes as a result of computer worm, capable of spreading
from one system to the next and across networks without user action (e.g. WannaCry).
• Is a rootkit a virus? Rootkits are not viruses. A rootkit is a software package designed to give attackers “root” access or admin access to
a given system. Crucially, rootkits cannot self-replicate and don’t spread across systems.
• Is a software bug a virus? Software bugs are not viruses. Even though we sometimes refer to a biological virus as a “bug” (e.g. “I caught
a stomach bug”), software bugs and viruses are not the same thing. A software bug refers to a flaw or mistake in the computer code
that a given software program is made up of. Software bugs can cause programs to behave in ways the software manufacturer never
intended. The Y2K bug famously caused programs to display the wrong date, because the programs could only manage dates through
the year 1999. After 1999 the year rolled over like the odometer on an old car to 1900. While the Y2K bug was relatively harmless, some
software bugs can pose a serious threat to consumers. Cybercriminals can take advantage of bugs in order to gain unauthorized access
to a system for the purposes of dropping malware, stealing private information, or opening up a backdoor. This is known as an exploit.
DDOS Attack
• A distributed denial-of-service (DDoS) attack is a malicious
attempt to disrupt normal traffic of a targeted server, service or
network by overwhelming the target or its surrounding
infrastructure with a flood of Internet traffic.
• In 2015 and 2016, a criminal group called the Armada Collective
repeatedly extorted banks, web host providers, and others in this
way.
• in 2016, Dyn, a major domain name system provider — or DNS —
was hit with a massive DDoS attack that took down major
websites and services, including AirBnB, CNN, Netflix, PayPal,
Spotify, Visa, Amazon, The New York Times, Reddit, and GitHub.
• The gaming industry has also been a target of DDoS attacks, along
with software and media companies.
• DDoS attacks are sometimes done to divert the attention of the
target organization. While the target organization focuses on the
DDoS attack, the cybercriminal may pursue a primary motivation
such as installing malicious software or stealing data.
Social Engg.
• Social engineering is the term used for a broad range of malicious
activities accomplished through human interactions. It uses psychological
manipulation to trick users into making security mistakes or giving away
sensitive information.
• Social engineering attacks happen in one or more steps. A perpetrator first
investigates the intended victim to gather necessary background
information, such as potential points of entry and weak security protocols,
needed to proceed with the attack.
• Then, the attacker moves to gain the victim’s trust and provide stimuli for
subsequent actions that break security practices, such as revealing
sensitive information or granting access to critical resources.
• What makes social engineering especially dangerous is that it relies on
human error, rather than vulnerabilities in software and operating
systems.
• Mistakes made by legitimate users are much less predictable, making
them harder to identify and thwart than a malware-based intrusion.
How Does Social Engineering Happen?
• Social engineering happens because of the human instinct of trust. Cybercriminals
have learned that a carefully worded email, voicemail, or text message can convince
people to transfer money, provide confidential information, or download a file that
installs malware on the company network.
Consider this example of spear phishing that convinced an employee to transfer
$500,000 to a foreign investor:
• Thanks to careful spear phishing research, the cybercriminal knows the company
CEO is traveling.
• An email is sent to a company employee that looks like it came from the CEO. There
is a slight discrepancy in the email address – but the spelling of the CEO’s name is
correct.
• In the email, the employee is asked to help the CEO out by transferring $500,000 to
a new foreign investor. The email uses urgent yet friendly language, convincing the
employee that he will be helping both the CEO and the company.
• The email stresses that the CEO would do this transfer herself but since she is
travelling, she can’t make the fund transfer in time to secure the foreign investment
partnership.
• Without verifying the details, the employee decides to act. He truly believes that he
is helping the CEO, the company, and his colleagues by complying with the email
request.
• A few days later, the victimized employee, CEO, and company colleagues realize they
have been a victim of a social engineering attack and have lost $500,000.
• Examples of Social Engineering Attacks
• Savvy cybercriminals know that social engineering works best when focussing on human emotion and risk. Taking
advantage of human emotion is much easier than hacking a network or looking for security vulnerabilities.
• These examples of social engineering emphasize how emotion is used to commit cyber attacks:
Fear
• You receive a voicemail that says you’re under investigation for tax fraud and that you must call immediately to
prevent arrest and criminal investigation. This social engineering attack happens during tax season when people are
already stressed about their taxes. Cybercriminals prey on the stress and anxiety that comes with filing taxes and use
these fear emotions to trick people into complying with the voicemail.
Greed
• Imagine if you could simply transfer $10 to an investor and see this grow into $10,000 without any effort on your
behalf? Cybercriminals use the basic human emotions of trust and greed to convince victims that they really can get
something for nothing. A carefully worded baiting email tells victims to provide their bank account information and
the funds will be transferred the same day.
Curiosity
• Cybercriminals pay attention to events capturing a lot of news coverage and then take advantage of human curiosity
to trick social engineering victims into acting. For example, after the second Boeing MAX8 plane crash,
cybercriminals sent emails with attachments that claimed to include leaked data about the crash. In reality, the
attachment installed a version of the Hworm RAT on the victim’s computer.
Helpfulness
• Humans want to trust and help one another. After doing research into a company, cybercriminals target two or
three employees in the company with an email that looks like it comes from the targeted individuals’ manager. The
email asks them to send the manager the password for the accounting database – stressing that the manager needs
it to make sure everyone gets paid on time. The email tone is urgent, tricking the victims into believing that they are
helping out their manager by acting quickly.
Urgency
• You receive an email from customer support at an online shopping website that you frequently buy from telling you
that they need to confirm your credit card information to protect your account. The email language urges you to
respond quickly to ensure that your credit card information isn’t stolen by criminals. Without thinking twice and
because you trust the online store, you send not only your credit card information but also your mailing address and
phone number. A few days later, you receive a call from your credit card company telling you that your credit card
has been stolen and used for thousands of dollars of fraudulent purchases.
Social engineering attack techniques
• Social engineering attacks come in many different forms and can be performed anywhere where human interaction
is involved. The following are the five most common forms of digital social engineering assaults.
• Baiting
• As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They lure users into a
trap that steals their personal information or inflicts their systems with malware.
• The most reviled form of baiting uses physical media to disperse malware. For example, attackers leave the
bait—typically malware-infected flash drives—in conspicuous areas where potential victims are certain to see them
(e.g., bathrooms, elevators, the parking lot of a targeted company). The bait has an authentic look to it, such as a
label presenting it as the company’s payroll list.
• Victims pick up the bait out of curiosity and insert it into a work or home computer, resulting in automatic malware
installation on the system.
• Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of baiting consist of
enticing ads that lead to malicious sites or that encourage users to download a malware-infected application.
• Scareware
• Scareware involves victims being bombarded with false alarms and fictitious threats. Users are deceived to think
their system is infected with malware, prompting them to install software that has no real benefit (other than for
the perpetrator) or is malware itself. Scareware is also referred to as deception software, rogue scanner software
and fraudware.
• A common scareware example is the legitimate-looking popup banners appearing in your browser while surfing the
web, displaying such text such as, “Your computer may be infected with harmful spyware programs.” It either offers
to install the tool (often malware-infected) for you, or will direct you to a malicious site where your computer
becomes infected.
• Scareware is also distributed via spam email that doles out bogus warnings, or makes offers for users to buy
worthless/harmful services.
• Pretexting
• Here an attacker obtains information through a series of cleverly crafted lies. The scam is often initiated by a
perpetrator pretending to need sensitive information from a victim so as to perform a critical task.
• The attacker usually starts by establishing trust with their victim by impersonating co-workers, police, bank and tax
officials, or other persons who have right-to-know authority. The pretexter asks questions that are ostensibly
required to confirm the victim’s identity, through which they gather important personal data.
• All sorts of pertinent information and records is gathered using this scam, such as social security numbers, personal
addresses and phone numbers, phone records, staff vacation dates, bank records and even security information
related to a physical plant.
• Phishing
• As one of the most popular social engineering attack types, phishing scams are email and text message campaigns
aimed at creating a sense of urgency, curiosity or fear in victims. It then prods them into revealing sensitive
information, clicking on links to malicious websites, or opening attachments that contain malware.
• An example is an email sent to users of an online service that alerts them of a policy violation requiring immediate
action on their part, such as a required password change. It includes a link to an illegitimate website—nearly
identical in appearance to its legitimate version—prompting the unsuspecting user to enter their current credentials
and new password. Upon form submittal the information is sent to the attacker.
• Given that identical, or near-identical, messages are sent to all users in phishing campaigns, detecting and blocking
them are much easier for mail servers having access to threat sharing platforms.
• Spear phishing
• This is a more targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises.
They then tailor their messages based on characteristics, job positions, and contacts belonging to their victims to
make their attack less conspicuous. Spear phishing requires much more effort on behalf of the perpetrator and may
take weeks and months to pull off. They’re much harder to detect and have better success rates if done skillfully.
• A spear phishing scenario might involve an attacker who, in impersonating an organization’s IT consultant, sends an
email to one or more employees. It’s worded and signed exactly as the consultant normally does, thereby deceiving
recipients into thinking it’s an authentic message. The message prompts recipients to change their password and
provides them with a link that redirects them to a malicious page where the attacker now captures their credentials.
Social engineering prevention
• Social engineers manipulate human feelings, such as curiosity or fear, to carry out schemes and
draw victims into their traps. Therefore, be wary whenever you feel alarmed by an email,
attracted to an offer displayed on a website, or when you come across stray digital media lying
about. Being alert can help you protect yourself against most social engineering attacks taking
place in the digital realm.
Moreover, the following tips can help improve your vigilance in relation to social engineering hacks.
• Don’t open emails and attachments from suspicious sources – If you don’t know the sender in
question, you don’t need to answer an email. Even if you do know them and are suspicious about
their message, cross-check and confirm the news from other sources, such as via telephone or
directly from a service provider’s site. Remember that email addresses are spoofed all of the time;
even an email purportedly coming from a trusted source may have actually been initiated by an
attacker.
• Use multifactor authentication – One of the most valuable pieces of information attackers seek
are user credentials. Using multifactor authentication helps ensure your account’s protection in
the event of system compromise. (Multi-factor authentication is an authentication method in
which a computer user is granted access only after successfully presenting two or more pieces of
evidence to an authentication mechanism: knowledge, possession, and inherence.)
• Be wary of tempting offers – If an offer sounds too enticing, think twice before accepting it as fact.
Googling the topic can help you quickly determine whether you’re dealing with a legitimate offer
or a trap.
• Keep your antivirus/antimalware software updated – Make sure automatic updates are engaged,
or make it a habit to download the latest signatures first thing each day. Periodically check to
make sure that the updates have been applied, and scan your system for possible infections.
Man in the Middle attack
• What Is a Man-in-the-Middle Attack?
• A man-in-the-middle attack is a type of cyberattack where a malicious
actor inserts him/herself into a conversation between two parties,
impersonates both parties and gains access to information that the two
parties were trying to send to each other. A man-in-the-middle attack
allows a malicious actor to intercept, send and receive data meant for
someone else, or not meant to be sent at all, without either outside party
knowing until it is too late. Man-in-the-middle attacks can be abbreviated
in many ways, including MITM, MitM, MiM or MIM.
Key Concepts of a Man-in-the-Middle Attack
• Man-in-the-middle is a type of eavesdropping attack that occurs when a
malicious actor inserts himself as a relay/proxy into a communication
session between people or systems.
• A MITM attack exploits the real-time processing of transactions,
conversations or transfer of other data.
• Man-in-the-middle attacks allow attackers to intercept, send and receive
data never meant to be for them without either outside party knowing
until it is too late.
• In the image above, you will notice that the
attacker inserted him/herself in-between the
flow of traffic between client and server. Now
that the attacker has intruded into the
communication between the two endpoints,
he/she can inject false information and
intercept the data transferred between them.
• Below is another example of what might
happen once the man in the middle has
inserted him/herself.
• The hacker is impersonating both sides of the
conversation to gain access to funds. This example
holds true for a conversation with a client and
server as well as person-to-person conversations.
In the example above, the attacker intercepts a
public key and with that can transpose his own
credentials to trick the people on either end into
believing they are talking to one another securely.
• Man in the middle attack prevention
• Blocking MITM attacks requires several practical steps on the part of
users, as well as a combination of encryption and verification methods for
applications.
• For users, this means:
• Avoiding WiFi connections that aren’t password protected.
• Paying attention to browser notifications reporting a website as being
unsecured.
• Immediately logging out of a secure application when it’s not in use.
• Not using public networks (e.g., coffee shops, hotels) when conducting
sensitive transactions.
• For website operators, secure communication protocols, including TLS and
HTTPS, help mitigate spoofing attacks by robustly encrypting and
authenticating transmitted data. Doing so prevents the interception of site
traffic and blocks the decryption of sensitive data, such as authentication
tokens.
• It is considered best practice for applications to use SSL/TLS to secure
every page of their site and not just the pages that require users to log in.
Doing so helps decreases the chance of an attacker stealing session
cookies from a user browsing on an unsecured section of a website while
logged in.’
Security Services
• Authentication: assures recipient that the message is from the
source that it claims to be from.
• Access Control: controls who can have access to resource under
what condition
• Availability: available to authorized entities for 24/7.
• Confidentiality: information is not made available to unauthorized
individual
• Integrity: assurance that the message is unaltered
• Non-Repudiation: protection against denial of sending or
receiving in the communication
AUTHENTICATION
• The assurance that the communicating entity is the one that it claims to be.
Peer Entity Authentication
• Used in association with a logical connection to provide confidence in the identity of the entities connected.
Data Origin Authentication
• In a connectionless transfer, provides assurance that the source of received data is as claimed.
ACCESS CONTROL
• The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can
occur, and what those accessing the resource are allowed to do).
DATA CONFIDENTIALITY
• The protection of data from unauthorized disclosure.
Connection Confidentiality
• The protection of all user data on a connection.
Connectionless Confidentiality
• The protection of all user data in a single data block
Selective-Field Confidentiality
• The confidentiality of selected fields within the user data on a connection or in a single data block.
Traffic Flow Confidentiality
• The protection of the information that might be derived from observation of traffic flows.
DATA INTEGRITY
• The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay).
• Connection Integrity with Recovery
• Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data
sequence, with recovery attempted.
• Connection Integrity without Recovery
• As above, but provides only detection without recovery.
• Selective-Field Connection Integrity
• Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of
whether the selected fields have been modified, inserted, deleted, or replayed.
• Connectionless Integrity
• Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form
of replay detection may be provided.
• Selective-Field Connectionless Integrity
• Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields
have been modified.
NONREPUDIATION
• Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication.
Nonrepudiation, Origin
• Proof that the message was sent by the specified party.
Nonrepudiation, Destination
• Proof that the message was received by the specified party.
Spywares
• Spyware is a type of malicious software -- or malware -- that is installed on a
computing device without the end user's knowledge. It invades the device, steals
sensitive information and internet usage data, and relays it to advertisers, data firms
or external users. Any software can be classified as spyware if it is downloaded
without the user's authorization. Spyware is controversial because, even when it is
installed for relatively innocuous reasons, it can violate the end user's privacy and
has the potential to be abused.
• Spyware is one of the most common threats to internet users. Once installed, it
monitors internet activity, tracks login credentials and spies on sensitive
information. The primary goal of spyware is usually to obtain credit card numbers,
banking information and passwords.
• Spyware can be difficult to detect; often, the first indication a user has that a
computing device has been infected with spyware is a noticeable reduction in
processor or network connection speeds and -- in the case of mobile devices -- data
usage and battery life. Antispyware tools can be used to prevent or remove spyware.
Antispyware tools can either provide real-time protection by scanning network data
and blocking malicious data, or they can detect and remove spyware already on a
system by executing scans.
How spyware works
Antispyware tools
• When choosing an antispyware tool, it is important to know that some only perform when the
scan is manually started, while others are continuously running and monitoring computer activity
to ensure spyware can't record the user's information. Furthermore, users should apply caution
when downloading antispyware tools. Reviews can be read to determine which tools are safest,
and it is recommended that the user only download tools from reputable sites.
• Some antispyware tools include the following:
• Malwarebytes is an antimalware/spyware tool that can remove spyware from
Windows, macOS, Android and iOS. Malwarebytes can scan through registry files,
running programs, hard drives and individual files. Once a spyware program is
detected, a user can quarantine and delete it. However, users can't set up automatic
scanning schedules.
• Trend Micro HouseCall is another antispyware tool that doesn't require user
installation. Because it doesn't require installation, HouseCall uses minimal
processor and memory resources, as well as disk space. However, like
Malwarebytes, users cannot set automatic scans.
• Windows Defender is an antimalware Microsoft product included in the Windows
10 OS under Windows Defender Security Center. The software is a lightweight
antimalware tool that protects against threats such as spyware, adware and
viruses. Windows Defender includes multiple features, such as Application Guard,
Exploit Guard, Advanced Threat Protection and Analytics. Windows Defender users
can set automatic Quick and Full scans, as well as set alerts for low, medium, high
and severe priority items.
• How to remove spyware
• In order to remove spyware, device users must first identify that the spyware exists
in their system. There are several symptoms to look for that can signify the presence
of an attack. They include the following:
• The device runs at a much slower speed than normal.
• The device consistently crashes unexpectedly.
• Pop-up ads appear whether the user is online or offline.
• The device starts running out of hard drive space.
• If it is determined that spyware has infected the system, then the user should
perform the following steps:
• Disconnect the internet connection.
• Check the device's programs list to see if the unwanted software is listed. If it is,
choose to remove it from the device. After uninstalling the program, reboot the
entire system.
• If the above step does not work, then run a scan of the system using reputable
antivirus The scan will find suspicious programs and ask the user to either clean,
quarantine or delete the software.
• The user can also download a virus removal tool or antispyware tool and allow it to
run through the system.
• If none of the above steps work, then the user will have to access the device's hard
drive in safe mode. However, this requires a tool that will enable the user to access
the spyware folders and manually delete them. While this sounds complicated, the
process should only take a few minutes.
Spyware examples
• The best-known examples of spyware are the following:
• Zlob -- or Zlob Trojan -- downloads itself onto a computer and records
keystrokes, as well as search and browsing history.
• Gator -- commonly found in file sharing software -- monitors victims' web
surfing habits in order to present them with better targeted ads.
• TIBS Dialer disconnects the user's computer from a local phone line and
instead connects it to a toll number that is designed for accessing
pornographic websites.
• CoolWebSearch takes advantage of security vulnerabilities found in the
Internet Explorer web browser in order to take control, change settings
and send browsing information to its authors.
• Internet Optimizer -- more popular in the days of dial-up connections --
initially promises to increase internet speeds but instead replaces all error
and login pages with ads.
• In addition, spy apps have been designed for smartphone users that allow
different people to track the phone user's activity. While most were
created with the intent of letting parents monitor their child's phone use,
their abilities have been grossly abused. These apps act as mobile spyware
and allow external users to access the phone's microphone and camera to
view the surroundings, listen in on phone calls and access the phone's GPS
location, passwords and mobile apps. Some popular spy apps include
Spyera, FlexiSPY and TheOneSpy.
UNIT 2
Securing PC
• Keeping your PC secure is critical to protecting the
personal, business, and financial information it
contains. Fortunately, securing your computer is easy
if you take the proper precautions.
• Using secure passwords and verification processes will
make it more difficult for another person or program
to impersonate you and access your information.
• Using protective software will make it harder for a
hacker, virus, or malicious software to penetrate your
PC. In addition to protective programs, using
encryptions and safe practices will help keep your data
secure when you’re using the Internet.
Source: https://www.wikihow.com/Secure-Your-PC
Method 1: Encrypting Your Data
Method 2: Setting up Secure
Password Protection
Method 3: Using Protective Software
• 1. Install antivirus software to protect your PC. Antivirus software is a security
utility designed to keep your PC safe against viruses, spyware, malware, and other
online threats. Quality antivirus software needs to be purchased and installed onto
your PC.Popular antivirus software include Avast, AVG, McAfee, and Symantec.
• Set your software setting to automatically scan for viruses and malware so you can
keep your PC clear of them.
• Many programs can also block ads and spam from websites to keep your PC safer
while you’re browsing the internet.
2. Enable your firewall to filter information from the internet. A firewall is a program
that monitors information coming through the internet connection to your PC to
block harmful programs. Go to your PC’s control panel and open up the “System and
Security” menu. Click on the Windows Firewall shortcut and make sure it’s turned
on. Your built-in Windows firewall is just as good as any antivirus program’s firewall.
• Make sure you’re connected to the internet when you turn your firewall on so it
connects.
• If you can’t find the shortcut, type in “firewall” in the search bar of the System and
Security menu.
• 3. Clean up your PC using malware-removal
products.
• Firewalls and antivirus software are designed to
prevent your computer from becoming infected,
but they can’t remove viruses or malware once
they infect your computer. Use an anti-malware
program to clean up your system after an attack
or infection. Download the software and run
periodic scans to check for harmful programs.
• Popular malware-removal products include
Spybot Search & Destroy and Malwarebytes
Anti-Malware.
• Schedule regular scans to check for spyware,
malware, and viruses.
Method 4: Following Safe Practices
8 easy steps to secure your computer
• 1. Keep up with system and software security updates
• While software and security updates can often seem like an annoyance, it really is important to
stay on top of them. Aside from adding extra features, they often cover security holes. This means
the provider of the operating system (OS) or software has found vulnerabilities which give hackers
the opportunity to compromise the program or even your entire computer.
• Typically if an update is available for your OS, you’ll get a notification. You can often opt to update
immediately or set it to run at a later time. While it can be inconvenient to stop what you’re doing
for half an hour for an update to take place, it’s often best to just get it done out of the way.
• It’s not just your OS that should be kept up-to-date. All software that you run on your computer
could potentially have flaws. When updates are available, you might see a popup when you open
the software.
• Even though they are usually a good thing, it’s prudent to be wary of updates. Sometimes
software companies will offer pre-release versions to try. These may be unstable and should be
used at your own risk. Even with stable release versions, you may want to wait a day or two in
case there are any obvious bugs. Just remember to go back to it when you’re ready.
• Another thing to watch out for is a fake update. These might be used by hackers to persuade you
to click a link or enter credentials. You can avoid falling prey to these by doing a little research into
the latest updates from the software company. Simply search for the latest version to see if the
alert you received makes sense. Alternatively, you can plug the popup text in a search engine to
find out if it’s a known scam.
• 2. Have your wits about you
• It should go without saying, being suspicious is one of the best things you can do to keep your
computer secure. Admittedly, with hacker techniques becoming increasingly sophisticated, it can
be difficult to tell when you’re under attack. All it takes is one email open or link click and your
computer could be compromised.
• Make sure you have your wits about you and think twice about opening or clicking on anything
that doesn’t look legit. Don’t rely on spam filters to always catch sketchy emails. Criminals are
constantly trying to outsmart these settings and now and again they’ll get through.
• 3. Enable a firewall
• A firewall acts as a barrier between your computer or network and the internet. It effectively
closes the computer ports that prevent communication with your device. This protects your
computer by stopping threats from entering the system and spreading between devices. It can
also help prevent your data leaving your computer.
• If your computer ports are open, anything coming into them could be processed. This is bad if it’s
a malicious program sent by a hacker. While it’s possible to close ports manually, a firewall acts as
a simple defence to close all ports. The firewall will open the ports only to trusted applications
and external devices on an as needed basis.
• If your operating system comes with a firewall (e.g. Windows XP onward), you can simply enable
the built-in firewall. In Windows, this can be found by navigating to Control
Panel>System and Security. You might choose to install an additional firewall as an extra layer of
defense or if your OS doesn’t already have one. A couple of free options
are Comodo and TinyWall. Antivirus software often comes with a built-in firewall too.
• The firewalls discussed above are software firewalls. There is a second type known as a hardware
firewall. While these can be purchased separately, they often come built into home routers. It
could just be a simple case of checking if yours is turned on.
• 4. Adjust your browser settings
• Most browsers have options that enable you to adjust the level of privacy and security while you
browse. These can help lower the risk of malware infections reaching your computer and
malicious hackers attacking your device. Some browsers even enable you to tell websites not to
track your movements by blocking cookies.
• However, many of the options are disabled by default, so you could unwittingly be exposing far
more than you need to each time you browse. Thankfully, it should only take a few minutes to go
into your browser settings and make the necessary adjustments. Chrome, Firefox, Safari,
and Edge all provide detailed instructions to help. While using these browsers you can add an
additional layer of protection by installing an anti-tracking browser extension
like Disconnect or uBlock Origin.
• On the topic of browsers, you should choose yours carefully. The ones mentioned above are
generally considered safe. But since updates and patches occur all the time, you never know when
a new hole could appear and how big it will be. If you want more privacy, you can consider
steering away from traditional options and look at privacy-focused alternatives like Epic Privacy
Browser, Comodo Dragon, or Tor Browser.
• 5. Install antivirus and anti spyware software
• Any machine connected to the internet is inherently vulnerable to viruses and other threats,
including malware, ransomware, and Trojan attacks. An antivirus software isn’t a completely
foolproof option but it can definitely help. There are free options out there, but they’re limited,
and besides, the paid programs won’t set you back a whole lot. Bitdefender, is a popular option
that I recommend. For alternatives take a look at this data backed comparison of antivirus.
• Spyware is a specific type of malware that is designed to secretly infect a computer. It then sits in
the system, gathers information, and sends it to a third party. The information is typically of a
sensitive nature, such as credentials or banking information. This can ultimately lead to identity
theft, a multi-billion dollar industry.
• In the spyware category, you have adware (often causing popups), Trojans (posing as a harmless
software), and system monitors (such as keyloggers), all of which pose a pretty serious threat.
Other forms of spyware like tracking cookies are typically harmless alebit annoying. Thankfully,
many antivirus programs have anti spyware built in, but there are some dedicated solutions.
• If spyware has found its way onto your computer, then it’s very possible you can remove it. There
are a ton of options for spyware removal, including many free offerings and some paid single use
tools.
• 6. Password protect your software and lock your device
• Most web-connected software that you install on your system requires login credentials. The
most important thing here is not to use the same password across all applications. This makes it
far too easy for someone to hack into all of your accounts and possibly steal your identity.
• If you’re having trouble remembering a whole bunch of passwords, then you could try a password
manager. This will keep all of your passwords safe and you only have to remember one. A
password can be combined with an email or SMS as part of a two-step verification (2SV) method
for extra security. 2SV usually kicks in when you log into a website or app from a new or
unrecognized device requiring you to verify your identity with a PIN code.
• While many security steps relate to intangible threats, there is always the possibility that
someone could get their hands on your actual computer. A simple line of defence here is to have
a strong computer password to at least make it more difficult for them to enter.
• Other forms of verification include biometric methods like a fingerprint or retina scan. Alternative
physical verification methods might involve key cards and fobs, such as those offered by Yubico.
Any of these can be combined with each other and/or a password as part of a two-step
authentication (2FA) process.
• If you’re concerned about someone actually walking away with your computer, another option is
a physical lock. This is an ideal solution for laptops but can also be used on home or work
computers. Kensington locks and other similar brands are small locks that insert into a special
hole in the device. Some require a physical key while others work using a code.
There are solutions for tablets, although these tend to be more cumbersome and more suitable
for things like point-of-sale.
• 7. Encrypt your data
• Whether your computer houses your life’s work or a load of files with sentimental value like
photos and videos, it’s likely worth protecting that information. One way to ensure it doesn’t fall
into the wrong hands is to encrypt your data. Encrypted data will require resources to decrypt it;
this alone might be enough to deter a hacker from pursuing action.
• There are a plethora of tools out there to help you encrypt things like online traffic and accounts,
communication, and files stored on your computer. For full disk encryption, some popular tools
are VeraCrypt and BitLocker. You can find separate tools to help you encrypt your mobile device,
with various apps available for both Android and iOS.
• 8. Use a VPN
• A Virtual Private Network (VPN) is an excellent way to step up your
security, especially when browsing online. While using a VPN, all of your
internet traffic is encrypted and tunneled through an intermediary server
in a separate location. This masks your IP, replacing it with a different one,
so that your ISP can no longer monitor your activity.
• What’s more, you can typically choose the server location based on your
needs, such as getting the fastest speeds or unblocking geo-locked
content. Additionally, a VPN can help you browse securely while using
open wifi networks and access censored material (e.g. Facebook in China).
• When it comes to choosing a provider, there are some okay free offerings
out there, but monthly rates for paid services can be pretty low, even as
little at $3 per month. The free ones are typically limited in features but
can be good for getting a feel for what’s available. Some paid options have
free trial periods for the full service and most offer generous money-back
guarantee periods.
• No matter what you store on your computer, it’s simply prudent to
protect its content from criminals and snoopers. Although nothing is ever
completely secure, following the steps above will provide most people
with ample protection and safeguard their data.
Securing Smart Phone
• https://devyanibajadeja.wordpress.com/electronic-mail-smtp-popimap-and-mime/
Email Tracing
• EmailTracer is a tool to track email sender’s identity. It analyzes the email
header and gives the complete details of the sender like IP address, which
is key point to find the culprit and the route followed by the mail, the Mail
Server, details of Service Provider etc. EmailTracer traces up to Internet
Service Provider level only. Further tracing can be done with the help of
ISP and law enforcement agencies. The message-id will be useful for
analyzing the mail logs at ISP.
• What email provider do you use?
• To find the IP address of a received email you're curious about, open the
email and look for the header details. How you find that email's header
depends on the email program you use. Do you use Gmail or Yahoo?
Hotmail or Outlook?
• For example, if you're a Gmail user, here are the steps you'd take:
• Open the message you want to view
• Click the down arrow next to the "Reply" link
• Select "Show Original" to open a new window with the full headers
• The first thing you do when you hear that email notification is
check the sender, right? It is the quickest way to figure out who
the email is from, as well as the likely content.
Why Trace An Email Address?
• Before learning how to trace an email address, let's consider why
you would do it in the first place.
• In this day and age, malicious emails are all too frequent. Scams,
spam, malware, and phishing emails are a common inbox sight. If
you trace an email back to its source, you have a slight chance of
discovering who (or where!) the email comes from.
• In other cases, you can trace the origin of an email to block a
persistent source of spam or abusive content, permanently
removing it from your inbox; server administrators trace emails
for the same reason.
• How To Trace An Email Address
• You can trace an email address to its sender by looking at the full email header. The
email header contains routing information and email metadata---information you
don't normally care about. But that information is vital to tracing the source of the
email.
• Most email clients don't display the full email header as standard because it is full of
technical data and somewhat useless to an untrained eye. However, most email
clients do offer a way of checking out the full email header. You just need to know
where to look, as well as what you're looking at.
• Gmail Full Email Header: Open your Gmail account, then open the email you want
to trace. Select the drop-down menu in the top-right corner, then Show
original from the menu.
• Outlook Full Email Header: Double-click the email you want to trace, the head
to File > Properties. The information appears in the internet headers
• Apple Mail Full Email Header: Open the email you wish to trace, then head to View
> Message > Raw Source.
• 3 Free Tools To Trace Emails And IP Addresses
• Of course, there are some handy tools out there
that automate this process for you. It is handy to
learn about full email headers and their contents,
but sometimes you need quick information.
• Check out the following header analyzers:
• GSuite Toolbox Messageheader
• MX Toolbox Email Header Analyzer
• IP-Address Email Header Trace(email header
analyzer + IP address tracer)
• What Is an Email Header
• Each email you receive comes with headers. The headers contain
information about the routing of the message and the originating
Internet Protocol address of the message. Not all electronic
messeges you receive will allow you to track them back to the
originating point and depending on how you send messages
determines whether or not they can trace an email address back
to you. The headers don't contain any personal information. At
most, the results of the trace will show you the origination IP and
the computer name that sent the email. After viewing the trace
information, the initiating IP can be looked up to determine from
where the message was sent. IP address location information
DOES NOT contain your street name, house number, or phone
number. The trace will most likely determine the city and the ISP
the sender used.
• NOTE: EMAIL TRACKING and EMAIL TRACING are Different
• Email tracking is a method for monitoring the delivery of email
messages to the intended recipient. Most tracking technologies
use some form of digitally time-stamped record to reveal the
exact time and date that an email was received or opened, as well
the IP address of the recipient.
• https://www.youtube.com/watch?v=3XqJ3l4tpuU
Secure Download
• The Secure Download Manager (SDM) is a program for downloading files
securely from a web store. When you download software from a web
store that uses the SDM, you will be prompted to download and install the
SDM to your computer. The SDM provides for secure, effective and
efficient file downloads, especially for files that are too large for some
browsers to download. You receive the software that you ordered safely
and completely.
Features
• Resumes unfinished or interrupted downloads from where they left off
• Simple installation wizard
• Multiple files can be downloaded at the same time
• You decide when to download
• Easily handles large files (larger than 2 GB)
• Ensures your files are secure by using encrypted data
• Easy downloading with one click
• Scared that you might download the virus that's
going to destroy your computer? Wondering
whether the file you're downloading is safe or
not?
Secure Apps
• What is Application Security???
• Application security is the discipline of processes, tools
and practices aiming to protect applications from
threats throughout the entire application lifecycle.
Cyber criminals are organized, specialized, and
motivated to find and exploit vulnerabilities in
enterprise applications to steal data, intellectual
property, and sensitive information. Application
security can help organizations protect all kinds of
applications (such as legacy, desktop, web, mobile,
micro services) used by internal and external
stakeholders including customers, business partners
and employees.
• What is application security?
• Application security describes security measures at the application level
that aim to prevent data or code within the app from being stolen or
hijacked. It encompasses the security considerations that happen during
application development and design, but it also involves systems and
approaches to protect apps after they get deployed.
• Application security may include hardware, software, and procedures that
identify or minimize security vulnerabilities. A router that prevents anyone
from viewing a computer’s IP address from the Internet is a form of
hardware application security. But security measures at the application
level are also typically built into the software, such as an application
firewall that strictly defines what activities are allowed and prohibited.
Procedures can entail things like an application security routine that
includes protocols such as regular testing.
• Application security definition
• Application security is the process of developing, adding, and testing
security features within applications to prevent security vulnerabilities
against threats such as unauthorized access and modification.
Why application security is important
• Application security is important because today’s applications are often available over various networks and
connected to the cloud, increasing vulnerabilities to security threats and breaches. There is increasing pressure and
incentive to not only ensure security at the network level but also within applications themselves. One reason for
this is because hackers are going after apps with their attacks more today than in the past. Application security
testing can reveal weaknesses at the application level, helping to prevent these attacks.
• Worth noting: Dark web website addresses end with .onion instead of the surface web’s .com,
.org, or .gov, for example.
• What’s on the dark web?
• The dark web operates with a high degree of anonymity. It hosts harmless activities and content,
as well as criminal ones.
• For instance, one dark web website might provide complex riddles. Another might be a kind of
book club that makes eBooks look more professional. Yet another might offer a forum for people
who believe free speech is threatened.
• But the dark web is better known for dark content — meaning, illegal and sometimes disturbing
content. For instance, here’s a sample of illegal things you can find on the dark web.
• Stolen information. When there’s been a data breach, there’s a chance the accessed information
— from Social Security numbers to bank card numbers — will end up for sale on the dark web.
You can also buy things like log-in credentials, hacked Netflix accounts, and more.
• Illicit substances. Illegal drugs — and prescription drugs — are peddled on the dark web. You
might also find toxic chemicals that can cause other types of damage.
• Disturbing and dangerous items and services. It can get ugly fast. Things like gore,
murderers-for-hire, human trafficking, child pornography, body parts, counterfeit goods, and guns
for sale can be found on the dark web.
• In short, you can buy just about anything you can imagine — including things you’d probably be
better off not imagining.
• What makes it possible to do business on the dark web? Financial transactions use Bitcoin, the
cryptocurrency that helps assure buyers and sellers anonymity.
Is the dark web safe?
• The dark web may be safe in some cases — think, legitimate content —
but not in others.
• Here are a few safety issues to consider.
• Criminal element. There’s a chance you will find websites run by criminals.
Beyond selling illegal goods and services, they may seek to exploit you and
steal from you.
• Breaking the law. You can be prosecuted for things you do on the dark
web. It’s important to behave in an appropriate and legal manner.
• Suspicious links. If you click on any links, you may be taken to material you
might not want to see. It’s also possible that clicking a link or downloading
a file could infect your device with malware.
• Law enforcement. Law enforcement officials operate on the dark web to
catch people engaged in criminal activity. Like others on the dark web, law
enforcement can do their work under a cloak of anonymity.
• If you decide to venture to the dark web, it’s smart to be selective about
the websites you access.
Accessing the dark web with Tor browser
• Getting to the dark web is actually a lot easier than you
might think. All you have to do is download a dark web
browser, like the Tor browser.
• Once you install a dark web browser on your device, it
functions just like a regular browser: type in a URL, and off
you go.
•
Virtual Private Network (VPN)
• A VPN, or virtual private network, is a secure tunnel
between your device and the internet. VPNs protect
your online traffic from snooping, interference, and
censorship.
• A virtual private network (VPN) gives you online
privacy and anonymity by creating a private network
from a public internet connection.
• VPNs mask your internet protocol (IP) address so your
online actions are virtually untraceable.
• Most important, VPN services establish secure and
encrypted connections to provide greater privacy than
even a secured Wi-Fi hotspot.
• A VPN (virtual private network) is the easiest and
most effective way for people to protect their
internet traffic and hide their identities online. As
you connect to a secure VPN server, your internet
traffic goes through an encrypted tunnel that
nobody can see into, including hackers,
governments, and your internet service provider.
• Consumers use VPNs to keep their online activity
private and ensure access to sites and services
that might otherwise be restricted.
• Companies use VPNs to connect far-flung
employees as if they were all using the same local
network at a central office, but with fewer
benefits for individuals than a personal VPN.
Why do you need a VPN service?
• Surfing the web or transacting on an unsecured Wi-Fi network
means you could be exposing your private information and
browsing habits. That’s why a virtual private network, better
known as a VPN, should be a must for anyone concerned about
their online security and privacy.
• Think about all the times you’ve been on the go, reading emails
while in line at the coffee shop, or checking your bank account
while waiting at the doctor’s office. Unless you were logged into a
private Wi-Fi network that requires a password, any data
transmitted during your online session could be vulnerable to
eavesdropping by strangers using the same network.
• The encryption and anonymity that a VPN provides helps protect
your online activities: sending emails, shopping online, or paying
bills. VPNs also help keep your web browsing anonymous.
• Benefits and advantages of VPN
• Change your location
• Using a VPN changes your IP address, the unique number that identifies
you and your location in the world. With a new IP address, you can browse
the internet as if you were in the UK, Germany, Canada, Japan, or virtually
any country, if the VPN service has servers there.
• Protect your privacy
• Changing your IP address with a VPN helps hide your identity from
websites, apps, and services that want to track you. Good VPNs also hide
your activity from your internet provider, mobile carrier, and anyone else
who may be listening, thanks to a layer of strong encryption.
• Increase your security
• Using a VPN protects you from hacking in many forms, including packet
sniffing, rogue Wi-Fi networks, and man-in-the-middle attacks. Travelers,
remote workers, and all kinds of on-the-go individuals use a VPN
whenever they’re on an untrusted network like free public Wi-Fi.
• Unblock websites
• If you’re in a part of the world that restricts access to Google, Wikipedia,
YouTube, or other sites and services, using a VPN will let you regain access
to the free internet. You can also use a VPN to break through firewalls on
school or office networks.
• When should I use a VPN?
• If privacy is important to you, you should use a VPN every time you connect to the internet. A VPN app runs in the
background of your device so it won’t get in the way while you use other apps, stream content, and browse the
internet. And you’ll have peace of mind knowing your privacy is always protected.
• But here are some situations in which a VPN is especially useful:
• While traveling
• Exploring the world doesn’t mean you have to change the way you use the internet. A VPN lets you use the internet
as if you were still in your home country, no matter how far you travel.
• While streaming
• Using a VPN lets you watch movies and TV on streaming services like Netflix, Hulu, Amazon, and HBO with freedom
from ISP throttling or blocking by your ISP or local Wi-Fi network.
• While on public Wi-Fi
• Public Wi-Fi hotspots like those in cafes, airports, and parks are common hunting grounds for cybercriminals. Using a
VPN on your devices stops hackers in their tracks.
• While gaming
• Using a VPN unlocks games, maps, skins, and other add-ons that might be restricted on your network. It also shields
you from DDoS attacks and reduces ping and overall lag.
• While torrenting
• P2P file sharing usually means that strangers can see your IP address and possibly track your downloads. A VPN
hides your IP address, letting you torrent safely and anonymously.
• While shopping
• Some online stores show different prices to people in different countries. With a VPN, you can find the best deals in
the world no matter where you’re shopping from.
How does a VPN work?
• To understand how a VPN works, it helps to first understand how your internet connection works without one.
• Without a VPN
• When you access a website without a VPN, you are being connected to that site through your internet service
provider, or ISP. The ISP assigns you a unique IP address that can be used to identify you to the website. Because
your ISP is handling and directing all your traffic, it can see which websites you visit. And your activity can be linked
to you by that unique IP address.
• With a VPN
• When you connect to the internet with a VPN, the VPN app on your device (also called a VPN client) establishes a
secure connection with a VPN server. Your traffic still passes through your ISP, but your ISP can no longer read it or
see its final destination. The websites you visit can no longer see your original IP address, only the IP address of the
VPN server, which is shared by many other users and changes regularly.
Here are several key concepts related to VPN that will help you understand how a VPN works and the benefits it provides:
• Proxying
• The VPN server acts like a proxy, or stand-in, for your web activity: Instead of your real IP address and location,
websites you visit will only see the IP address and location of the VPN server.
• This makes you more anonymous on the internet.
• Authentication
• Establishing a secure connection is a tricky problem solved by clever mathematics in a process called authentication.
• Once authenticated, the VPN client and VPN server can be sure they are talking to each other and no one else.
• Tunneling
• VPNs also protect the connection between client and server with tunneling and encryption.
• Tunneling is a process by which each data packet is encapsulated inside another data packet. This makes it harder
for third parties to read in transit.
• Encryption
• Data inside the tunnel is also encrypted in such a way that only the intended recipient can decrypt it. This keeps the
contents of your internet traffic completely hidden, even from your internet service provider.
• VPN protocols
• VPN protocols are the methods by which your device
connects to the VPN server. Some protocols are better
for speed, some are better for security, and some simply
work better under certain network conditions.
• ExpressVPN automatically chooses the best protocol for
your network, but you can also choose one manually.
• Popular VPN protocols in use today include:
• Lightway
• OpenVPN
• IKEv2
• L2TP / IPsec
• PPTP
• WireGuard*
• SSTP**
• Types of VPN
• Commercial VPN
• A commercial VPN, also called a personal VPN or a consumer VPN,
is a private service offered directly to individuals, usually for a fee.
• ExpressVPN is such a VPN service because it directly caters to the
privacy needs of its customers.
• Corporate VPN
• A corporate VPN, also called a business VPN, allows an
organization’s remote employees to connect securely to the
internet as if they were physically present in the office.
• Unlike commercial VPNs, however, corporate VPNs are meant to
protect the privacy of the company and not necessarily the
individual.
• Self-setup VPN
• Some tech experts and DIY hobbyists choose to set up their own
VPN using their own equipment.
• Self-setup VPNs, however, do not provide the protection of shared
IP addresses, server locations in multiple countries, or many other
features enjoyed by commercial VPN users.
• Alternatives to VPN
• A VPN isn’t the only tool that can increase your privacy, security, and/or
freedom online.
• Tor
• Tor (short for The Onion Router) is a free network of servers, or “nodes,”
that randomly route internet traffic between each other in order to
obfuscate the origin of the data.
• Using Tor can significantly increase your anonymity, and using Tor in
conjunction with a VPN creates the best possible protection from
surveillance.
• The biggest drawback of Tor, however, is speed. Because your traffic is
relayed through several hops, you will probably find it inconvenient to
stream, download, or torrent with Tor.
• Proxy services
• A proxy server is any intermediary between your device and the internet.
Unlike a VPN, however, most “proxy services” you’ll find are quite slow
and don’t offer any privacy or security benefits.
• So-called “free proxy services” are especially dangerous, as many will find
other ways to monetize your data, like selling it to third parties.
• Neither Tor nor a proxy service can replace the benefits of a VPN. A
trustworthy VPN is still the best privacy solution for most people.
Proxy Server
• What’s a Proxy Server?
• A proxy server acts as a gateway between you and the internet. It’s an intermediary
server separating end users from the websites they browse. Proxy servers provide
varying levels of functionality, security, and privacy depending on your use case,
needs, or company policy.
• If you’re using a proxy server, internet traffic flows through the proxy server on its
way to the address you requested. The request then comes back through that same
proxy server (there are exceptions to this rule), and then the proxy server forwards
the data received from the website to you.
• If that’s all it does, why bother with a proxy server? Why not just go straight from to
the website and back?
• Modern proxy servers do much more than forwarding web requests, all in the name
of data security and network performance. Proxy servers act as a firewall and web
filter, provide shared network connections, and cache data to speed up common
requests. A good proxy server keeps users and the internal network protected from
the bad stuff that lives out in the wild internet. Lastly, proxy servers can provide a
high level of privacy.
• How Does a Proxy Server Operate?
• Every computer on the internet needs to have a unique Internet
Protocol (IP) Address. Think of this IP address as your computer’s
street address. Just as the post office knows to deliver your mail to
your street address, the internet knows how to send the correct
data to the correct computer by the IP address.
• A proxy server is basically a computer on the internet with its own
IP address that your computer knows. When you send a web
request, your request goes to the proxy server first. The proxy
server then makes your web request on your behalf, collects the
response from the web server, and forwards you the web page
data so you can see the page in your browser.
• When the proxy server forwards your web requests, it can make
changes to the data you send and still get you the information that
you expect to see. A proxy server can change your IP address, so
the web server doesn’t know exactly where you are in the world.
It can encrypt your data, so your data is unreadable in transit. And
lastly, a proxy server can block access to certain web pages, based
on IP address.
• Why Should You Use a Proxy Server?
• There are several reasons organizations and individuals use a proxy server.
• To control internet usage of employees and children: Organizations and parents set up proxy
servers to control and monitor how their employees or kids use the internet. Most organizations
don’t want you looking at specific websites on company time, and they can configure the proxy
server to deny access to specific sites, instead redirecting you with a nice note asking you to
refrain from looking at said sites on the company network. They can also monitor and log all web
requests, so even though they might not block the site, they know how much time you spend
cyberloafing.
• Bandwidth savings and improved speeds: Organizations can also get better overall network
performance with a good proxy server. Proxy servers can cache (save a copy of the website
locally) popular websites – so when you ask for www.varonis.com, the proxy server will check to
see if it has the most recent copy of the site, and then send you the saved copy. What this means
is that when hundreds of people hit www.varonis.com at the same time from the same proxy
server, the proxy server only sends one request to varonis.com. This saves bandwidth for the
company and improves the network performance.
• Privacy benefits: Individuals and organizations alike use proxy servers to browse the internet
more privately. Some proxy servers will change the IP address and other identifying information
the web request contains. This means the destination server doesn’t know who actually made the
original request, which helps keeps your personal information and browsing habits more private.
• Improved security: Proxy servers provide security benefits on top of the privacy benefits. You can
configure your proxy server to encrypt your web requests to keep prying eyes from reading your
transactions. You can also prevent known malware sites from any access through the proxy
server. Additionally, organizations can couple their proxy server with a Virtual Private Network
(VPN), so remote users always access the internet through the company proxy. A VPN is a direct
connection to the company network that companies provide to external or remote users. By using
a VPN, the company can control and verify that their users have access to the resources (email,
internal data) they need, while also providing a secure connection for the user to protect the
company data.
• Get access to blocked resources: Proxy servers
allow users to circumvent content restrictions
imposed by companies or governments. Is the
local sportsball team’s game blacked out online?
Log into a proxy server on the other side of the
country and watch from there. The proxy server
makes it look like you are in California, but you
actually live in North Carolina. Several
governments around the world closely monitor
and restrict access to the internet, and proxy
servers offer their citizens access to an
uncensored internet.
• Proxy Server Risks
• You do need to be cautious when you choose a proxy server: a few common risks
can negate any of the potential benefits:
• Free proxy server risks
– You know the old saying “you get what you pay for?” Well, using one of the many free
proxy server services can be quite risky, even the services using ad-based revenue models.
– Free usually means they aren’t investing heavily in backend hardware or encryption. You’ll
likely see performance issues and potential data security issues. If you ever find a
completely “free” proxy server, tread very carefully. Some of those are just looking to steal
your credit card numbers.
• Browsing history log
– The proxy server has your original IP address and web request information possibly
unencrypted, saved locally. Make sure to check if your proxy server logs and saves that data
– and what kind of retention or law enforcement cooperation policies they follow.
– If you expect to use a proxy server for privacy, but the vendor is just logging and selling your
data you might not be receiving the expected value for the service.
• No encryption
– If you use a proxy server without encryption, you might as well not use a proxy server. No
encryption means you are sending your requests as plain text. Anyone who is listening will
be able to pull usernames and passwords and account information really easily. Make sure
whatever proxy server you use provides full encryption capability.
UNIT 3
What is Cloud
• The cloud is a virtual space that exists on the
internet. It is a storage space where people
can place their digital resources such as
software, applications and files. So in
simplified terms, we can say that the cloud is
a virtual storage space on the internet.
• A lot of people do get the cloud mixed up with
the internet. However, the cloud is only one
part of the internet and not the whole thing.
• "The cloud" refers to servers that are accessed over the Internet, and the
software and databases that run on those servers. Cloud servers are
located in data centers all over the world. By using cloud computing, users
and companies don't have to manage physical servers themselves or run
software applications on their own machines.
• The cloud enables users to access the same files and applications from
almost any device, because the computing and storage takes place on
servers in a data center, instead of locally on the user device. This is why a
user can log into their Instagram account on a new phone after their old
phone breaks and still find their old account in place, with all their photos,
videos, and conversation history. It works the same way with cloud email
providers like Gmail or Microsoft Office 365, and with cloud storage
providers like Dropbox or Google Drive.
• For businesses, switching to cloud computing removes some IT costs and
overhead: for instance, they no longer need to update and maintain their
own servers, as the cloud vendor they are using will do that. This
especially makes an impact for small businesses that may not have been
able to afford their own internal infrastructure but can outsource their
infrastructure needs affordably via the cloud. The cloud can also make it
easier for companies to operate internationally, because employees and
customers can access the same files and applications from any location.
• The technologies that work behind the cloud
computing platform to make it flexible,
reliable and usable are:
1) Virtualization
2) Service-Oriented Architecture (SOA)
3) Grid Computing
4) Utility Computing
• 1) Virtualization
• Virtualization is the "creation of a virtual (rather than actual) version of
something, such as a server, a desktop, a storage device, an operating
system or network resources".
• Virtualization is a technique that allows sharing of one physical instance of
an application or resource between multiple customers or organization.
• The main use of this technology is to provide the applications with
standard versions to their cloud users.
For example, if the latest version of application is released then cloud
provider should provide the latest version to their users.
• With virtualization, software called a hypervisor sits on top of physical
hardware and abstracts the machine's resources, which are then made
available to virtual environments called virtual machines. These resources
can be raw processing power, storage, or cloud-based applications
containing all the runtime code and resources required to deploy it.
• Types of Virtualization
• Following are types of virtualization:
1.Application Virtualization:
Application virtualization helps a user to have a remote access of an application from a server. The
server stores all personal information and other characteristics of the application but can still run
on a local workstation through internet. Example of this would be a user who needs to run two
different versions of the same software. Technologies that use application virtualization are
hosted applications and packaged applications.
• 2.Network Virtualization:
The ability to run multiple virtual networks with each has a separate control and data plan. It
co-exists together on top of one physical network. It can be managed by individual parties that
potentially confidential to each other.
Network virtualization provides a facility to create and provision virtual networks—logical
switches, routers, firewalls, load balancer, Virtual Private Network (VPN), and workload security
within days or even in weeks.
• 3.Desktop Virtualization:
Desktop virtualization allows the users’ OS to be remotely stored on a server in the data center.It
allows the user to access their desktop virtually, from any location by different machine. Users
who wants specific operating systems other than Windows Server will need to have a virtual
desktop.Main benefits of desktop virtualization are user mobility,portability, easy management of
software installation, updates and patches.
• 4.Storage Virtualization:
Storage virtualization is an array of servers that are managed by a virtual storage system. The
servers aren’t aware of exactly where their data is stored, and instead function more like worker
bees in a hive. It makes managing storage from multiple sources to be managed and utilized as a
single repository. storage virtualization software maintains smooth operations, consistent
performance and a continuous suite of advanced functions despite changes, break down and
differences in the underlying equipment.
• 2) Service-Oriented Architecture (SOA)
• SOA is an application framework which takes
everyday business applications and divides
them into separate business functions and
processes called Services. Service-Oriented
Architecture (SOA) allows organizations to
access on-demand cloud-based computing
solutions according to the change of business
needs. It can work without or with cloud
computing. The advantages of using SOA is
that it is easy to maintain, platform
independent, and highly scalable.
• Service Provider and Service consumer are the
two major roles within SOA.
• Applications of Service-Oriented Architecture
• There are the following applications of
Service-Oriented Architecture -
• It is used in the healthcare industry.
• It is used to create many mobile applications
and games.
• In the air force, SOA infrastructure is used to
deploy situational awareness systems.
• 3) Grid Computing
• Grid computing is the structure of distributed computing, in which a group of computer resources
from various locations are connected to each other to obtain a common objective.
• The computer resources are different and geographically spread.
• Grid system are designed for sharing of resources through distributed and large-scale cluster
computing.
• Grid computing breaks the composite tasks into smaller pieces, that are distributed to CPUs and
consist in the grid. Grid computing is also known as distributed computing. It is a processor
architecture that combines various different computing resources from multiple locations to
achieve a common goal. In grid computing, the grid is connected by parallel nodes to form a
computer cluster. These computer clusters are in different sizes and can run on any operating
system.
• Grid computing contains the following three types of machines -
• Control Node: It is a group of server which administrates the whole network.
• Provider: It is a computer which contributes its resources in the network resource pool.
• User: It is a computer which uses the resources on the network.
• Mainly, grid computing is used in the ATMs, back-end infrastructures, and marketing research.
•
• At least one computer, usually a server, which handles all the
administrative duties for the system. Many people refer to this kind
of computer as a control node. Other application and Web servers (both
physical and virtual) provide specific services to the system.
• A network of computers running special grid computing network
software. These computers act both as a point of interface for the user
and as the resources the system will tap into for different applications.
Grid computing systems can either include several computers of the same
make running on the same operating system (called a homogeneous
system) or a hodgepodge of different computers running on every
operating system imaginable (a heterogeneous system). The network can
be anything from a hardwired system where every computer connects to
the system with physical wires to an open system where computers
connect with each other over the Internet.
• A collection of computer software called middleware. The purpose of
middleware is to allow different computers to run a process or application
across the entire network of machines. Middleware is the workhorse of
the grid computing system. Without it, communication across the system
would be impossible. Like software in general, there's no single format for
middleware.
• Grid computing systems work on the principle of pooled resources. Let's say you and
a couple of friends decide to go on a camping trip. You own a large tent, so you've
volunteered to share it with the others. One of your friends offers to bring food and
another says he'll drive the whole group up in his SUV. Once on the trip, the three of
you share your knowledge and skills to make the trip fun and comfortable. If you had
made the trip on your own, you would need more time to assemble the resources
you'd need and you probably would have had to work a lot harder on the trip itself.
• A grid computing system uses that same concept: share the load across
multiple computers to complete tasks more efficiently and quickly.
• Central processing unit (CPU): A CPU is a microprocessor that performs
mathematical operations and directs data to different memory locations. Computers
can have more than one CPU.
• Memory: In general, a computer's memory is a kind of temporary electronic storage.
Memory keeps relevant data close at hand for the microprocessor. Without
memory, the microprocessor would have to search and retrieve data from a more
permanent storage device such as a hard disk drive.
• Storage: In grid computing terms, storage refers to permanent data storage devices
like hard disk drives or databases.
• Normally, a computer can only operate within the limitations of its own resources.
There's an upper limit to how fast it can complete an operation or how much
information it can store. Most computers are upgradeable, which means it's possible
to add more power or capacity to a single computer, but that's still just an
incremental increase in performance.
• Grid computing systems link computer resources together in a way that lets
someone use one computer to access and leverage the collected power of all the
computers in the system. To the individual user, it's as if the user's computer has
transformed into a supercomputer.
• 4) Utility Computing
• Utility computing is based on Pay-per-Use model.
• It provides computational resources on demand as a metered service.
• All the managed IT services, Grid computing, cloud computing are based on the concept of grid computing.
• Utility computing is the most trending IT service model. It provides on-demand computing resources (computation,
storage, and programming services via API) and infrastructure based on the pay per use method. It minimizes the
associated costs and maximizes the efficient use of resources. The advantage of utility computing is that it reduced
the IT cost, provides greater flexibility, and easier to manage.
• Large organizations such as Google and Amazon established their own utility services for computing storage and
application.
•
Components of Utility Computing
• The few components that included in the package of utility computing is computer hardware component, software
applications, internet access, and cloud systems.
• The computer hardware such as monitors, input devices, servers, CPU and network cables.
• The browsing software and web servers provide internet access.
• The software applications that execute the huge amount of computer mandatory programs such as communication
tools, mailbox, report generation, CRM and other project and process-oriented applications and everything that lies
in between the client, company and the end-users. The experts from the industries call this process as software as a
service.
• What is Cloud Security?
• Cloud computing is the delivery of hosted
services, including software, hardware, and
storage, over the Internet. The benefits of rapid
deployment, flexibility, low up-front costs, and
scalability, have made cloud computing virtually
universal among organizations of all sizes, often as
part of a hybrid/multi-cloud infrastructure
architecture.
• Cloud security refers to the technologies, policies,
controls, and services that protect cloud data,
applications, and infrastructure from threats.
• Cloud security is the protection of data stored
online via cloud computing platforms from
theft, leakage, and deletion. Methods of
providing cloud security include firewalls,
penetration testing, obfuscation, tokenization,
virtual private networks (VPN), and avoiding
public internet connections. Cloud security is a
form of cybersecurity.
• Cloud security is a set of control-based safeguards and technology
protection designed to protect resources stored online from
leakage, theft, or data loss.
• Protection encompasses cloud infrastructure, applications, and
data from threats. Security applications operate as software in the
cloud using a Software as a Service (SaaS) model.
• Topics that fall under the umbrella of security in the cloud include:
❑ Data center security
❑ Access control
❑ Threat prevention
❑ Threat detection
❑ Threat mitigation
❑ Redundancy
❑ Legal compliance
❑ Security policy
• How Do You Manage Security in the Cloud?
• Cloud service providers use a combination of methods to protect your data.
• Firewalls are a mainstay of cloud architecture. Firewalls protect the perimeter of your network
security and your end-users. Firewalls also safeguard traffic between different apps stored in the
cloud.
• Access controls protect data by allowing you to set access lists for different assets. For instance,
you might allow specific employees application access, while restricting others. A general rule is to
provide employees’ access to only the tools they need to do their job. By maintaining strict access
control, you can keep critical documents from malicious insiders or hackers with stolen
credentials.
• Cloud providers take steps to protect data that’s in transit. Data Security methods include virtual
private networks, encryption, or masking. Virtual private networks (VPNs) allow remote
employees to connect to corporate networks. VPNs accommodate tablets and smartphones for
remote access.
• Data masking encrypts identifiable information, such as names. This maintains data integrity by
keeping important information private. With data masking, a medical company can share data
without violating HIPAA laws, for example.
• Threat intelligence spots security threats and ranks them in order of importance. This feature
helps you protect mission-critical assets from threats.
• Disaster recovery is key to security since it helps you recover data that are lost or stolen.
• While not a security component per se, your cloud services provider may need to comply with
data storage regulations. Some countries require that data must be stored within their country. If
your country has this requirement, you need to verify that a cloud provider has data centers in
your country.
• What are the Benefits of a Cloud Security
System?
• Now that you understand how cloud computing
security operates, explore the ways it benefits
your business.
• Cloud-based security systems benefit your
business through:
• Protecting your business from threats
• Guarding against internal threats
• Preventing data loss
• Top threats to systems
include malware, ransomware, and DDos.
• Malware and Ransomware Breaches
• Malware poses a severe threat to businesses.
• Over 90 percent of malware comes via email. It is often so convincing that employees download
malware without realizing it. Once downloaded, the malicious software installs itself on your
network, where it may steal files or damage content.
• Ransomware is a form of malware that hijacks your data and demands a financial ransom.
Companies wind up paying the ransom because they need their data back.
• Data redundancy provided by the cloud offers an alternative to paying ransom for your data. You
can get back what was stolen with minimal service interruption.
• Many cloud data security solutions identify malware and ransomware. Firewalls, spam filters, and
identity management help with this. This keeps malicious email out of employee inboxes.
• DDoS Protection
• In a DDoS or distributed denial of service attack, your system is flooded with requests. Your
website becomes slow to load until it crashes when the number of requests is too much to
handle.
• DDoS attacks come with serious side effects. Every minute your website is inaccessible, you lose
money.
• Half of the companies that suffer DDoS attacks lose $10,000 to $100,000. Many businesses suffer
from reputation damage when customers lose faith in the brand. If confidential customer data is
lost in a DDoS attack, you could face legal challenges.
• Given the severity of these side effects, it’s no wonder that some companies close after DDoS
attacks. Consider that one recent DDoS attack lasted for 12 days and you sense the importance of
protection.
• Cloud security services actively monitor the cloud to identify and defend against attacks. By
alerting your cloud provider of the attack in real-time, they can take steps to secure your systems.
• Threat Detection
• Security for cloud computing provides advanced threat detection using endpoint scanning for
threats at the device level. Endpoint scanning increases security for devices that access your
network.
Security Issues of Smart Phones
• http://publications.lib.chalmers.se/records/fulltext/128680.pdf
• Smartphones are more at risk in certain areas — hotels, coffee
shops, airports, cars, trains, etc. And home Wi-Fi connections can
be potential risk areas if users don't properly secure them. An
attacker could easily access confidential personally identifiable
information (PII) and data, such as:
❖ Personal or professional data (emails, documents, contacts,
calendar, call history, SMS, MMS).
❖ User identification and passwords (to emails, social networks,
etc.).
❖ Mobile applications that record PII.
❖ Geolocation data about the smartphone user.
❖ READ:
https://www.kaspersky.co.in/resource-center/threats/top-seven-
mobile-security-threats-smart-phones-tablets-and-mobile-interne
t-devices-what-the-future-has-in-store (IMPORTANT)
10 major risks for smartphone users:
✔ Data leakage resulting from device loss or theft.
✔ Unintentional disclosure of data.
✔ Attacks on decommissioned smartphones.
✔ Phishing attacks.
✔ Spyware attacks.
✔ Network spoofing attacks.
✔ Surveillance attacks.
✔ Diallerware attacks: an attacker steals money from the
user by means of malware that makes hidden use of
premium short message services or numbers.
✔ Financial malware attacks.
✔ Network congestion.
Here are various measures that can help reduce the risks associated with mobile devices:
Encrypt mobile devices.
Regularly update mobile devices' applications and operating systems.
Set strong passwords. Each personal identification number (PIN) should be at least eight digits
long because a four-digit PIN can be easily broken. Alphanumeric passwords should be at least
eight characters long and shouldn't use common names or words. An easy way to help create a
memorable password is to use a favorite sentence. For example, you can create a password from
"The ACFE is reducing business fraud worldwide and inspiring public confidence." Use the first
letters of each word and replace "a" and "i" with "@" and "1," respectively. Following this
method, the password would be: "t@1rbfw@1pc."
Also avoid using a password that you've used for another account (a Yahoo! or Google email
account, for example). Change your passwords (to access your phone and your various accounts)
after a trip, especially if you used it in high-risk areas such as public hotspots in hotels, coffee
shops and airports.
Here are a few more steps to better protect smartphones:
Consider deactivating smartphone functionalities such as Siri on iPhone, "Ok Google" on Android
or Cortana on Windows Phone as they could be used to gain PII or control over your phone or
computer.
Activate an immediate automatic lock of your smartphone screen when you're not using it.
Deactivate any smartphone features that display messages on a locked screen.
Don't ignore error messages about the validity of certificates, for example, when you try
connecting to a Wi-Fi hotspot. You should always ensure that the website you're visiting or the
hotspot you're connecting to is legitimate. They could be malicious Wi-Fi connections pretending
to be legitimate hotspots. Hackers can plan and deliver these attacks at a relatively low cost.
• Staying diligent helps decrease risk
• Smartphone antivirus protection applications can provide a
false sense of security because their effectiveness varies
greatly. Thus, you have to be responsible to ensure the
safety of your professional and personal smartphones and
possibly those your organization supplies to its employees.
• organizations must train all employees — including
high-level employees who have access to sensitive company
information — in smartphone security.
• Your organization can conduct online training in social
engineering, smartphone specificities, malware and
passwords.
• Smartphone instructions often are outdated. Stay current
about security risks and remedies because smartphone
attack schemes are always evolving. You can do this by
checking specialized websites and blogs or by doing a
simple web search.
SMARTPHONE THREATS AND ATTACKS
• In a smartphone threat model, a malicious
user publishes malware disguised as a normal
application through an app store or website.
• Users will unintentionally download the
malware to a smartphone, which carries a
large amount of sensitive data.
• After infiltrating a smartphone, the malware
attempts to control its resources, collect data,
or redirect the smartphone to a premium
account or malicious website.
Affected services
• Malware’s impact can range from minor issues, such as
degraded performance, spam messages, and slow
operation, to more significant challenges, such as the user
not being able to receive and make phone calls or incurring
financial loss.
• The impact to any one smartphone user might be
completely different from that experienced by other
subscribers.
Jeopardized resources
Resources containing sensitive data are attractive to hackers.
Once malware finds a way into the smartphone, it will try to
gain privileges to access and control these resources.
• Threats and attacks Smartphone threats and attacks include
sniffing, spam, attacker spoofing, phishing, pharming,
vishing, and data leakage.
For various reasons, smartphones are also vulnerable to
DoS attacks:
• • Because they are based on radio communication
technology, smartphones can incur an attack in which
a jamming device is used to disrupt the
communication between the smartphone and its base
station.
• • Flooding attacks can generate hundreds of text
messages or incoming calls, thus disabling a
smartphone.
• • A battery exhaustion attack on a smartphone causes
more battery discharge than is typically necessary.
• • A malicious user could use a smartphone’s blocking
features to start a DoS attack. If a malicious user keeps
calling a smartphone from a blocked phone number,
the subscriber cannot use any of the smartphone’s
functions.
Limited battery life
• A smartphone is a resource-constrained device that is powered by
a battery with a limited life and that must be recharged when
drained. Any security solution must consider this limitation as
enhanced security cannot sacrifice battery life.
Vulnerability to theft and loss
• Among all potential security issues, loss and theft are two primary
concerns for smartphone users. Losing control of a smartphone,
even temporarily—say, by loaning it to someone—can have
catastrophic consequences. With some simple setup, a malicious
user can reprogram a smartphone’s firmware and flash memory,
physically clone the memory card, or install spyware. Some simple
techniques can help protect against smartphone theft and loss.
For example, the user can add a password or enable auto-lock.
Antitheft technology that remotely deletes sensitive data when a
smartphone leaves a secure zone is also available through
third-party applications
Multiple-entrance open system
• Smartphones are multiple-entrance open systems, and
each entrance is a potential back door for malware
access.
• Each smartphone communication channel is a
potential path for malware disguised as an application.
Because smartphones offer multiple entrances, an
attack loop can consist of many combinations, but an
attack loop cannot be formed if malware is detected,
prevented, and removed from the smartphone.
• Securing a smartphone requires using one of many
possible approaches to break the attack loop. For
example, resource control could break the attack loop
by preventing the malware from gaining access to the
smartphone’s resources to manipulate its data
DESIRED SECURITY FEATURES
• Confidentiality, integrity, and authentication are three of
the most desirable security features in a smartphone.
• Most smartphones support synchronization between the
device and a computer. This function makes it possible for
another user to access the smartphone file system. Thus, to
keep data confidential, users should employ encryption
techniques and avoid storing sensitive information in
plaintext on a smartphone.
• Integrity applies to both data and the system. App stores
should verify software integration to avoid malicious
modification. Further, smartphones should provide
mechanisms to protect system integrity. They should also
block unauthorized data access requests.
• A smartphone authentication service could protect
smartphone users against malware attacks that spoof caller
IDs and MMS.
Security issues of Smart Phones, digital
tablets and smart Devices
• When it comes to security, most mobile devices are a target waiting to be
attacked. That's pretty much the conclusion of a report to Congress on the
status of the security of mobile devices this week by watchdogs at the
Government Accountability Office.
• Combine the lack of security with the fact that mobile devices are being
targeted by cybercriminals and you have a bad situation.
• Mobile devices face an array of threats that take advantage of numerous
vulnerabilities commonly found in such devices. These vulnerabilities can
be the result of inadequate technical controls, but they can also result
from the poor security practices of consumers. Private [companies] and
relevant federal agencies have taken steps to improve the security of
mobile devices, including making certain controls available for consumers
to use if they wish and promulgating information about recommended
mobile security practices. However, security controls are not always
consistently implemented on mobile devices, and it is unclear whether
consumers are aware of the importance of enabling security controls on
their devices and adopting recommended practices.
• Problems
1. Mobile devices often do not have passwords enabled. Mobile devices often lack passwords to
authenticate users and control access to data stored on the devices. Many devices have the
technical capability to support passwords, personal identification numbers (PIN), or pattern
screen locks for authentication. Some mobile devices also include a biometric reader to scan a
fingerprint for authentication. However, anecdotal information indicates that consumers seldom
employ these mechanisms. Additionally, if users do use a password or PIN they often choose
passwords or PINs that can be easily determined or bypassed, such as 1234 or 0000. Without
passwords or PINs to lock the device, there is increased risk that stolen or lost phones'
information could be accessed by unauthorized users who could view sensitive information and
misuse mobile devices.
2. Two-factor authentication is not always used when conducting sensitive transactions on mobile
devices. According to studies, consumers generally use static passwords instead of two-factor
authentication when conducting online sensitive transactions while using mobile devices. Using
static passwords for authentication has security drawbacks: passwords can be guessed, forgotten,
written down and stolen, or eavesdropped. Two-factor authentication generally provides a higher
level of security than traditional passwords and PINs, and this higher level may be important for
sensitive transactions. Two-factor refers to an authentication system in which users are required
to authenticate using at least two different "factors" something you know, something you have,
or something you are before being granted access. Mobile devices can be used as a second factor
in some two-factor authentication schemes. The mobile device can generate pass codes, or the
codes can be sent via a text message to the phone. Without two-factor authentication, increased
risk exists that unauthorized users could gain access to sensitive information and misuse mobile
devices.
• 3. Wireless transmissions are not always encrypted. Information such as e-mails sent
by a mobile device is usually not encrypted while in transit. In addition, many
applications do not encrypt the data they transmit and receive over the network,
making it easy for the data to be intercepted. For example, if an application is
transmitting data over an unencrypted WiFi network using http (rather than secure
http), the data can be easily intercepted. When a wireless transmission is not
encrypted, data can be easily intercepted.
• 4. Mobile devices may contain malware. Consumers may download applications that
contain malware. Consumers download malware unknowingly because it can be
disguised as a game, security patch, utility, or other useful application. It is difficult
for users to tell the difference between a legitimate application and one containing
malware. For example, an application could be repackaged with malware and a
consumer could inadvertently download it onto a mobile device. the data can be
easily intercepted. When a wireless transmission is not encrypted, data can be easily
intercepted by eavesdroppers, who may gain unauthorized access to sensitive
information.
• 5. Mobile devices often do not use security software. Many mobile devices do not
come preinstalled with security software to protect against malicious applications,
spyware, and malware-based attacks. Further, users do not always install security
software, in part because mobile devices often do not come preloaded with such
software. While such software may slow operations and affect battery life on some
mobile devices, without it, the risk may be increased that an attacker could
successfully distribute malware such as viruses, Trojans, spyware, and spam to lure
users into revealing passwords or other confidential information.
• 6. Operating systems may be out-of-date. Security patches or fixes for mobile devices' operating
systems are not always installed on mobile devices in a timely manner. It can take weeks to
months before security updates are provided to consumers' devices. Depending on the nature of
the vulnerability, the patching process may be complex and involve many parties. For example,
Google develops updates to fix security vulnerabilities in the Android OS, but it is up to device
manufacturers to produce a device-specific update incorporating the vulnerability fix, which can
take time if there are proprietary modifications to the device's software. Once a manufacturer
produces an update, it is up to each carrier to test it and transmit the updates to consumers'
devices. However, carriers can be delayed in providing the updates because they need time to
test whether they interfere with other aspects of the device or the software installed on it.
• In addition, mobile devices that are older than two years may not receive security updates
because manufacturers may no longer support these devices. Many manufacturers stop
supporting smartphones as soon as 12 to 18 months after their release. Such devices may face
increased risk if manufacturers do not develop patches for newly discovered vulnerabilities.
• 7. Software on mobile devices may be out-of-date. Security patches for third-party applications
are not always developed and released in a timely manner. In addition, mobile third-party
applications, including web browsers, do not always notify consumers when updates are
available. Unlike traditional web browsers, mobile browsers rarely get updates. Using outdated
software increases the risk that an attacker may exploit vulnerabilities associated with these
devices.
• 8. Mobile devices often do not limit Internet connections. Many mobile devices do not have
firewalls to limit connections. When the device is connected to a wide area network it uses
communications ports to connect with other devices and the Internet. A hacker could access the
mobile device through a port that is not secured. A firewall secures these ports and allows the
user to choose what connections he wants to allow into the mobile device. Without a firewall, the
mobile device may be open to intrusion through an unsecured communications port, and an
intruder may be able to obtain sensitive information on the device and misuse it.
• 9. Mobile devices may have unauthorized modifications. The process of modifying a mobile device
to remove its limitations so consumers can add features (known as "jailbreaking" or "rooting")
changes how security for the device is managed and could increase security risks. Jailbreaking
allows users to gain access to the operating system of a device so as to permit the installation of
unauthorized software functions and applications and/or to not be tied to a particular wireless
carrier. While some users may jailbreak or root their mobile devices specifically to install security
enhancements such as firewalls, others may simply be looking for a less expensive or easier way
to install desirable applications. In the latter case, users face increased security risks, because they
are bypassing the application vetting process established by the manufacturer and thus have less
protection against inadvertently installing malware. Further, jailbroken devices may not receive
notifications of security updates from the manufacturer and may require extra effort from the
user to maintain up-to-date software.
• 10. Connecting to an unsecured WiFi network could let an attacker access personal information
from a device, putting users at risk for data and identity theft. One type of attack that exploits the
WiFi network is known as man-in-the-middle, where an attacker inserts himself in the middle of
the communication stream and steals information.9. Communication channels may be poorly
secured. Having communication channels, such as Bluetooth communications, "open" or in
"discovery" mode (which allows the device to be seen by other Bluetooth-enabled devices so that
connections can be made) could allow an attacker to install malware through that connection, or
surreptitiously activate a microphone or camera to eavesdrop on the user. In addition, using
unsecured public wireless Internet networks or WiFi spots could allow an attacker to connect to
the device and view sensitive information.
Fight Back
• A number of ideas including:
• Enable user authentication: Devices can be configured to require passwords or PINs
to gain access. In addition, the password field can be masked to prevent it from
being observed, and the devices can activate idle-time screen locking to prevent
unauthorized access.
• Verify the authenticity of downloaded applications: Procedures can be implemented
for assessing the digital signatures of downloaded applications to ensure that they
have not been tampered with.Enable two-factor authentication for sensitive
transactions: Two-factor authentication can be used when conducting sensitive
transactions on mobile devices. Two-factor authentication provides a higher level of
security than traditional passwords. Two-factor refers to an authentication system in
which users are required to authenticate using at least two different "factors"
something you know, something you have, or something you are before being
granted access. Mobile devices themselves can be used as a second factor in some
two-factor authentication schemes used for remote access. The mobile device can
generate pass codes, or the codes can be sent via a text message to the phone.
Two-factor authentication may be important when sensitive transactions occur, such
as for mobile banking or conducting financial transactions.
• Install antimalware capability: Antimalware protection can be installed to protect
against malicious applications, viruses, spyware, infected secure digital cards, b and
malware-based attacks. In addition, such capabilities can protect against unwanted
(spam) voice messages, text messages, and e-mail attachments.
• Install a firewall: A personal firewall can protect against unauthorized connections by intercepting both incoming
and outgoing connection attempts and blocking or permitting them based on a list of rules.
• Install security updates: Software updates can be automatically transferred from the manufacturer or carrier directly
to a mobile device. Procedures can be implemented to ensure these updates are transmitted promptly.
• Remotely disable lost or stolen devices: Remote disabling is a feature for lost or stolen devices that either locks the
device or completely erases its contents remotely. Locked devices can be unlocked subsequently by the user if they
are recovered.
• Enable encryption for data stored on device or memory card: File encryption protects sensitive data stored on
mobile devices and memory cards. Devices can have built-in encryption capabilities or use commercially available
encryption tools.
• Enable whitelisting: Whitelisting is a software control that permits only known safe applications to execute
commands.
• Establish a mobile device security policy: Security policies define the rules, principles, and practices that determine
how an organization treats mobile devices, whether they are issued by the organization or owned by individuals.
Policies should cover areas such as roles and responsibilities, infrastructure security, device security, and security
assessments. By establishing policies that address these areas, agencies can create a framework for applying
practices, tools, and training to help support the security of wireless networks.
• Provide mobile device security training: Training employees in an organization's mobile security policies can help to
ensure that mobile devices are configured, operated, and used in a secure and appropriate manner.
• Establish a deployment plan: Following a well-designed deployment plan helps to ensure that security objectives are
met.
• Perform risk assessments: Risk analysis identifies vulnerabilities and threats, enumerates potential attacks, assesses
their likelihood of success, and estimates the potential damage from successful attacks on mobile devices.
• Perform configuration control and management: Configuration management ensures that mobile devices are
protected against the introduction of improper modifications before, during, and after deployment.
SOCIAL NETWORKING SAFETY
• Social networking is a method of communication with people through online
platforms such as Facebook, LinkedIn, and Twitter. Over the years, social networking
has become an important part of life for both adults and teens. The popularity is due
to the ability of meeting the needs and interests of a vast majority of people.
• For teens it is a way to socialize with friends, by sharing the latest events, photos and
videos. Adults use social platforms for the same reason as teens, while also utilizing
each platform in a professional manner as well. It is a valuable tool for businesses in
that it allows them to interact with like-minded professionals, customers and other
businesses.
• With all the benefits social networking offers, it is easy to overlook the risks that are
involved. Said risks include threats of criminal activity, such as, stalking, bullying,
identity theft, and hacking. Also, users may fall prey to impersonators who can cause
damage to their reputation and standing with the very people they are trying to
network with. To make the best use of social networking while avoiding the risks,
users will need to understand and follow a set of basic safety tips that are easy to
remember and highly effective.
• 1. Be Cautious of Sharing Too Much
• When utilizing a social networking website, people have the option of sharing
personal details with friends and followers. While sharing some information is okay,
other facts can reveal too much about who a person is. For the sake of personal
safety, one should never reveal their date and place of birth, home address or phone
number, as this could put them at serious risk for identity theft and fraud. In
addition, it is extremely important that a person never reveal their credit card
numbers, banking information, passwords, or social security number on any
networking site. If such information is shared it would be very easy to fall victim to
crimes ranging from stalking to identity theft.
•
• 2. Adjust Privacy Settings
• Nearly all social networking sites have pre-set or default privacy settings. People
often feel that these setting are sufficient enough and never put forth the effort to
make changes. Altering one's privacy settings can allow the account holder to block
strangers and people who are not friends with them from viewing his or her private
information. These settings also limit what information is available in search results;
for example, Facebook allows the account holder to modify their settings so only
their friends, friends and networks, specific groups, or no one can see their status,
photos, videos, likes, etc.. Privacy settings can be adjusted at any time; however, the
account holder must log in to make adjustments.
• 3. Limit Details About Work History
• On some social networking sites, such as LinkedIn, people are able to post resumes and other
information that pertains to their work history. Work related information can reveal too much
about a person's personal life and can give criminals such as hackers personal information which
may help them to hack into one's account. The information that is found on resumes can also be
used in identity theft.
•
• 4. Verify Who You're Connecting With
• There are a number of reasons why a person may put up a false account. If there is ever
uncertainty about the authenticity of an account that claims to belong to a friend, is important to
check with the individual for verification. These accounts may be setup in efforts to misrepresent
themselves as another person in order to make false statements. This may be done to embarrass
someone or to create problems that either of a legal or personal nature. False accounts may also
be set up to for the purpose of sending people to malicious sites or with the intent of committing
fraud.
•
• 5. Keep Control of Comments – Be Aware of Impersonators
• Impersonation can be a problem when it comes to comments on networking websites. Typically,
people who are misrepresented online only need to ask that the impersonator be removed. This
can be a hassle, however, networking sites are beginning to require commenter's to go through
an authentication process in which they are identified as registered users or not.
•
• 6. Don't Share Personal Details
• Microblogging websites encourage people to share in the moment activities and slices of life. For
people who enjoy this sort of social interaction, they may find that they are revealing too much
about what is happening and as a result making themselves the ideal victim for thieves and other
criminals. Because these networks are visible to practically everyone, a person should not reveal
information that alerts criminals to their whereabouts or other actions. For example, a person
should never reveal where they are vacationing, shopping, or traveling. It should also never be
revealed when they expect to leave or return home.
• 7. Check Out Your Own Account
• In order to ensure the security of one's account, it is wise to search for their profile from the prospective of
someone who is conducting a search. This step will let the account holder know what others are able to view. When
using a search engine to look for one's profile they will also be able to see if there are any false accounts set up in his
or her name.
•
• 8. Know Employer Boundaries or Acceptable Use Policies
• More and more frequently there are reports of people who have lost their jobs as a result of their activities on social
networking sites. This can easily be avoided when employees review what policies their employer has in place. These
policies may affect what a person can share in terms of pictures and/or writing. This is done to not only protect their
reputation, but to also prevent data loss or loss of intellectual property.
•
• 9. Control What Information is Shared with Outside Sources
• When a person joins a social networking site, they should understand how that site uses their private information. A
user's personal details may be shared with partners, advertisers, or other outside companies. Reading the privacy
policy of the social networking platform will explain exactly how private information is used. Unfortunately, people
do not fully read these policies before agreeing to them. The privacy terms should be rechecked in the event that a
company is sold as these policies may change.
•
• 10. Be Careful of Over-Friending
• As a member of a social networking group, it can be exciting to gain new "friends" or followers. Looking through the
network it is easy to find members with high numbers of friends, which can inspire a competitive streak in some. A
high number of friends, however, is not always positive. Some "friends" can be problematic by introducing spam into
one's timeline or some may even have criminal intentions. When accepting friends, choose people who are actual
friends.
•
• 11. Consider Forming a New Social Network
• Respected networking sites like Facebook and Twitter, are not the only social networking platforms available. The
popularity of these sites make them larger than life and attract a large assortment of people with various agendas.
However, people who are interested in interacting with a smaller, more intimate group of people should look into
joining MeetUp, Ning, or FamilyLeaf. In some cases people are able to go through MeetUp to create a niche social
network that will attract like-minded individuals within one's own community.
•
• 12. Single Sign-On: Open ID
• Using a single sign-on for multiple platforms is one way people can reduce the likelihood of their
passwords getting into the hands of identity thieves and hackers. OpenID is the most common
single sing-on to manage various accounts.
•
• 13. What Goes Online Stays Online
• When sharing information online it is important for people to realize the permanence of what
they type or download. Once information goes on the Internet, through social networking,
microblogging, etc., it is difficult, if not impossible to remove. In some instances, the information
may even be captured via screen shot and used on blogs or news sites. Depending on what was
originally submitted, the information can prove detrimental for future job prospects,
relationships, and may even leave a person vulnerable to crimes.
•
• 14. Know How to Block Unfriendly Followers
• Nearly every social networking platforms gives users a way to protect themselves from
harassment or unwanted contact. When joining a social network one should familiarize themself
with how to block another member. Once a person has been blocked, he or she will no longer
have the ability to interact with the individual who has done the blocking.
•
• 15. Keep Passwords Strong
• Security is as important for one's social network account as it is for their computer or any other
account. Creating a strong password will prevent hackers from gaining access to one's account
and using it to post spam or malicious attacks. When creating a password it is important to choose
one that consists of no less than eight characters. The characters should consist of both letters
and numbers and should be changed approximately every three months.
Here are our top 10 tips to stay safe on social media:
• Use a strong password. The longer it is, the more secure it will be.
• Use a different password for each of your social media accounts.
• Set up your security answers. This option is available for most social media sites.
• If you have social media apps on your phone, be sure to password protect your
device.
• Be selective with friend requests. If you don’t know the person, don’t accept their
request. It could be a fake account.
• Click links with caution. Social media accounts are regularly hacked. Look out for
language or content that does not sound like something your friend would post.
• Be careful about what you share. Don’t reveal sensitive personal information ie:
home address, financial information, phone number. The more you post the easier
it is to have your identity stolen.
• Become familiar with the privacy policies of the social media channels you use and
customize your privacy settings to control who sees what.
• Protect your computer by installing antivirus software to safeguard. Also ensure
that your browser, operating system, and software are kept up to date.
• Remember to log off when you’re done.
• Social networking websites likeMySpace, Facebook, Twitter, andWindows Live Spaces are services people can use to connect with
others to share information like photos, videos, and personal messages.
• As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other
criminals follow the traffic.
• Read these tips to help protect yourself when you use social networks.
• Use caution when you click links that you receive in messages from your friends on your social website. Treat links in messages on
these sites as you would links in e-mail messages.
• Know what you’ve posted about yourself. A common way that hackers break into financial or other accounts is by clicking the “Forgot
your password?” link on the account login page. To break into your account, they search for the answers to your security questions,
such as your birthday, hometown, high school class, father’s middle name, on your social networking site. If the site allows, make up
your own password questions, and don’t draw them from material anyone could find with a quick search.
• Don’t trust that a message really is from whom it says it’s from. Hackers can break into accounts and send messages that look like
they’re from your friends, but aren’t. If you suspect that a message is fraudulent, use an alternate method to contact your friend to find
out. This includes invitations to join new social networks.
• To avoid giving away e-mail addresses of your friends, do not allow social networking services to scan your e-mail address
book. When you join a new social network, you might receive an offer to enter your e-mail address and password to find out if your
contacts are on the network. The site might use this information to send e-mail messages to everyone in your contact list or even
everyone you’ve ever sent an e-mail message to with that e-mail address. Social networking sites should explain that they’re going to
do this, but some do not.
• Type the address of your social networking site directly into your browser or use your personal bookmarks. If you click a link to your
site through e-mail or another website, you might be entering your account name and password into a fake site where your personal
information could be stolen.
• Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get
information from you.
• Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy. Find out
if the site monitors content that people post. You will be providing personal information to this website, so use the same criteria that
you would to select a site where you enter your credit card.
• Assume that everything you put on a social networking site is permanent.Even if you can delete your account, anyone on the Internet
can easily print photos or text or save images and videos to a computer.
• Be careful about installing extras on your site. Many social networking sites allow you to download third-party applications that let you
do more with your personal page. Criminals sometimes use these applications to steal your personal information. To download and use
third-party applications safely, take the same safety precautions that you take with any other program or file you download from the
Web.
• Think twice before you use social networking sites at work.
• Talk to your kids about social networking.
• The four major dangers of using social networking websites are
• Over sharing information. When creating a profile page, most websites will ask for personal information such as
home addresses, birthdays, and phone numbers. Giving this information can be very dangerous and will be made
public to anyone who visits a user’s profile page, especially if privacy settings are not set correctly. Even if account
settings are set to private, users are still at risk of their accounts being hacked. If someone hacks into an account he
or she will be able to view and use the information. Sharing simple things like your favorite color can tip off a hacker
to try to see if you used that as a password on your account. The biggest threat of over sharing information is
identity theft. Identity theft is not uncommon in the world of online social networking. Online computer criminals
look to steal identities in obvious and not so obvious ways. An obvious way would be someone asking for your social
security number. A not so obvious way is luring a user to click on a link that will allow the criminal to download all of
the user’s personal information. The anonymity provided online makes it easier for computer criminals to go
undetected.
• He’s not who you think he is. Social networking sites make it very easy to pretend to be someone else. Even if an
individual may be friends with someone on the site, anyone can take control of a user’s account if he or she can
obtain the user’s password. As a result, someone who is a “Friend” can ask for money or gain personal information
that can be used to hack into other accounts. For example, you may get a message from a relative asking you for
your banking information because he or she would like to wire you some money for your birthday. You may think
you’re talking to your relative, but in fact the information is being requested by someone who has hacked into your
relative’s account.
• Location-based services. Location-based services can be one of the most dangerous features provided by social
networking sites. It exposes the profile user’s location and whereabouts. The service also has a feature that allows
users to tag who they are with at any given time. While it can be fun to share your location with friends and family, it
can also increase your vulnerability, potentially opening you up to being robbed, sexually assaulted, or worse.
Predators can use this tool to track your movements and determine when you are alone or when you are not at
home.
• Posting photos. One of the features of online social networking that many teens enjoy is the photo-sharing feature.
This feature allows you to post photos 24 hours a day. Whether it is from your computer or mobile device, posting
photos can be done in seconds. The Internet makes it easy to obtain photos and use the images in any way a person
may choose. Posting inappropriate photos that may be deemed as fun, cute, or sexy, can end up where one least
expects it. Photo tampering is a big threat when it comes to posting photos online. The use of photo editing tools
allows people to manipulate online images in any way they choose, whether it’s used for good or bad purposes.
While posting pictures and sharing them with friends can be fun, it can also be risky.
• Teaching Your Teen Three Simple Steps To Increase Safety
• Don’t give optional information-When creating a profile, you do
not need to enter all of the information that is requested. The
set-up page usually requires you to fill out basic information, such
as your name and email. Everything else is optional. Do not feel
obligated to put your address and telephone number.
• Third level of privacy- There are three levels of privacy settings to
choose from for your profile. There is “open to everyone,” “open
to friends of friends” and “friends only.” The best setting to use is
the “friends only” setting on all of your privacy choices. “Friends
only” is the strictest level of security; it only allows people that
you have accepted as a friend to view information about you.
• Accept only people you know- Accepting only people you know
and trust is a great way to ensure safety when using social
networking sites. Doing this can protect you from spammers,
pedophiles, and other people who use social networking sites to
commit crimes.
• When discussing social networking safety with your child, encourage him
or her to always use discretion when posting any type of photo, location
status, and message. Tell your teen to ask him or herself these four
questions before posting to the world:
"Think Before They Post”
• Should I share this? Will the information you share put yourself or
someone else in danger?
• Do people really need to know where I am and who I am with? - Is it a
good idea to let everyone know my exact location?
• Am I selecting friends online that I can trust? –Always keep in mind that
it's not just about what you post, but how others may use that content.
• Is the information I am sharing transparent? - Before sharing information
to the public, does your post give out too much personal information?
• Having a discussion with your teen about social networking sites can ease
some anxiety about your child’s safety. Social networking sites help us stay
connected to family and friends. However, it’s important to make sure
your child knows how to be safe while online. Encourage them to enjoy
the sites but to be safe at all times.
Privacy issues on Social Network sites
• Social media is possibly the most vital sector of the Internet, but, being open and social creates legitimate concerns
about privacy and safety. Headlines warning of online security breaches are just one reminder of the vulnerability of
all websites, including social media outlets.
• Despite these justifiable security concerns about the Web, some of the reasons a person's social media account is
compromised are self-induced. Five common mistakes that can expose an account include:
• 1. Forgetting to Log Out
• Increase the security of your social media account by always logging out when you step away from your laptop or
computer. It's best to go one step further and close down the browser you were using to view your account. If you
leave your account logged in, you set yourself up to be hacked because anyone who can get to your computer can
access your account, change the password or even post items and communicate with your friends as if they are you.
Logging out and shutting down the browser is even more important if you use a public computer.
• 2. Clicking on Enticing Ads
• Viruses and malware often find their way onto your computer through those annoying, but sometimes enticing ads.
However, on the Web, just like in real life, if an offer seems to good to be true, then it probably is. Save yourself a
potential security headache - don't click.
• 3. Connecting With Strangers
• Be careful of who you accept invitations from when building your online network. Connecting and sharing
information with people you don't know can be dangerous. If you receive friend requests from strangers, it's best to
stay away.
• Further, if you receive friend requests from people you do know, but are already connected with via the same site,
it's possible that someone has set up a fake account. Avoid accepting duplicate requests, instead checking in with
the 'real' person to see if the request is legitimate.
• You should also be careful when connecting with a celebrity's account, as scammers sometimes pose as famous
people. Make sure it is their official, legitimate account and not a stranger pretending to be them before you accept
their 'friend' invitation.
• 4. Using Third Party Apps
• Part of the appeal of social media sites are all the various games and apps. Even though a
significant number of them are safe, you do grant the app a certain level of permission
concerning your information. Make sure you know what the app is viewing and sharing
before agreeing to the terms.
• 4. Exposing Too Much Information
• Make sure you understand the level of privacy - or lack of privacy - you are agreeing to when
volunteering personal information. Do you really want an app badly enough to allow it to
announce where you are?
• Also, participating in seemingly innocent games, like posting answers to a list of 20 questions,
may actual also allow cyber-criminals gather important personal information. For example,
the question, "What is your most embarrassing moment?" is probably fine to answer, but
answering questions like, "What is your pet's name?" or "Where did you and your significant
other meet?" may expose answers you gave to security questions for legitimate sites like
Amazon or your bank.
• 5. Failing to Utilize Security Settings
• Social media sites provide you with the ability to restrict who has access to your information.
For example, Facebook (like others) lets you decide who your friends are and what content
they can view. One practice to increase your account's security is to disable most of the
options and then re-open them once you understand what the settings specifically mean to
your account.
• In reality, you probably want different types of content to be displayed to different people,
with the most being available to known friends and the least to acquaintances.
• What to Do if Your Account Is Hacked
• Regardless whether your account is compromised because the social networking site was hacked
or just your individual account was infected, you need to take several steps to resolve the issue.
• Clean Your Device
The aforementioned hack that compromised Facebook and Google was caused by malware on
users machines. In cases like this, use well-known quality malware removal software to scan your
machine. The software will contain and/or destroy known and suspicious files. You may even
consider reformatting your computer.
• Once your machine is clean, the best way to prevent it from becoming infected again is to keep
your antivirus software and browsers current. Set them to automatically install updates.
• Change Your Passwords
• Once an account has been compromised, it is best to presume all your passwords are
compromised. Some security experts advise using a different, strong password for each site.
• Get a Password Manager
• Since security is dependent on multiple strong passwords, it can become difficult to remember
them all -- although there are tricks to make it possible. Consider using a password manager to
reduce your vulnerability. You can use the program's password generator to create strong,
hard-to-break passwords and you only need to remember one password to access the manager.
• Report It
• Make sure you report the situation to the social network site. This is especially true if you have
been locked out of your account. If this happens, you may have to prove to the social networking
site the account belongs to you, but be persistent and follow through. If you don't, someone could
potentially post information as if they are you - which, at the very least, can damage your online
reputation.
• If a crime has been committed, such as banking information stolen, also report the incident to
local authorities and appropriate federal law enforcement agencies.
• Use Two-Step Verification
• If the social media site offers a two-step
verification process, use it. The added layer of
security makes it much harder for a would-be
hacker to access your account. The extra
log-in steps will save you time and headaches
in the long run.
PASSWORD HACKING
• Spamming is the sending of an unsolicited email. What this means is that you send an email,
generally an ad of some sort, to someone who has not requested to receive that information from
you.
Electronic spamming is the use of electronic messaging systems to send an unsolicited message
(spam), especially advertising, as well as sending messages repeatedly on the same site. While the
most widely recognized form of spam is email spam, the term is applied to similar abuses in other
media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, wiki spam,online classified ads spam, mobile phone messaging spam, Internet forum
spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file
sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a
menu that includes Spam in every dish. The food is stereotypically disliked/unwanted, so the word
came to be transferred by analogy.
• Spamming remains economically viable because advertisers have no operating costs beyond the
management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is
difficult to hold senders accountable for their mass mailings. Because thebarrier to entry is so low,
spammers are numerous, and the volume of unsolicited mail has become very high. In the year
2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost
productivity and fraud, are borne by the public and by Internet service providers, which have
been forced to add extra capacity to cope with the deluge. Spamming has been the subject of
legislation in many jurisdictions.
• A person who creates electronic spam is called a spammer.
Spamming In different media
• Email
• Email spam, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial
email (UCE), is the practice of sending unwanted email messages, frequently with commercial
content, in large quantities to an indiscriminate set of recipients. Spam in email started to become
a problem when the Internet was opened up to the general public in the mid-1990s. It grew
exponentially over the following years, and today composes some 80 to 85 percent of all the
e-mail in the World, by a "conservative estimate". Pressure to make email spam illegal has been
successful in some jurisdictions, but less so in others. The efforts taken by governing bodies,
security systems and email service providers seem to be helping to reduce the onslaught of email
spam. According to "2014 Internet Security Threat Report, Volume 19" published by Symantec
Corporation, spam volume dropped to 66% of all email traffic. Spammers take advantage of this
fact, and frequently outsource parts of their operations to countries where spamming will not get
them into legal trouble.
• Increasingly, e-mail spam today is sent via "zombie networks", networks of virus-
or worm-infected personal computers in homes and offices around the globe. Many modern
worms install a backdoor that allows the spammer to access the computer and use it for malicious
purposes. This complicates attempts to control the spread of spam, as in many cases the spam
does not obviously originate from the spammer.
• Instant messaging
• Instant messaging spam makes use of instant messaging systems. Although less ubiquitous than
its e-mail counterpart, according to a report from Ferris Research, 500 million spam IMs were sent
in 2003, twice the level of 2002. As instant messaging tends to not be blocked by firewalls, it is an
especially useful channel for spammers. This is very common on many instant messaging systems
such as Skype
• Newsgroup and forum
• Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of Usenet newsgroups actually
pre-dates e-mail spam. Usenet convention defines spamming as excessive multiple posting, that is, the repeated posting of a
message (or substantially similar messages). Forum spam is the creation of advertising messages on Internet forums. It is
generally done by automated spambots. Most forum spam consists of links to external sites, with the dual goals of
increasing search engine visibility in highly competitive areas such as weight loss, pharmaceuticals, gambling, pornography,
real estate or loans, and generating more traffic for these commercial websites. Some of these links contain code to track
the spambot's identity; if a sale goes through, the spammer behind the spambot works on commission.
• Mobile phone
• Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to
customers not only for the inconvenience, but also because of the fee they may be charged per text message received in
some markets. The term "SpaSMS" was coined at the adnews website Adland in 2000 to describe spam SMS. To comply with
CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end
communication with the advertiser via SMS altogether.
• Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending
SMS, and installing trojans into other's phones that send spam (common for e-mail spam) is hard
because applications normally must be downloaded from a central database.
• Social networking spam
• Facebook and Twitter are not immune to messages containing spam links. Most insidiously, spammers hack into accounts
and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain
credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it
legitimizes the spammer and allows him or her to proliferate. Twitter has studied what interest structures allow their users
to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are
broadcast to all followers of the user.
• Social spam
• Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on
business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed
to issue social spam can infiltrate these websites. Well-meaning and malicious human users can break websites' policies by
submitting profanity, insults,hate speech, and violent messages.
• Newsgroup and forum
• Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of
Usenet newsgroups actually pre-dates e-mail spam. Usenet convention defines spamming as
excessive multiple posting, that is, the repeated posting of a message (or substantially similar
messages). Forum spam is the creation of advertising messages on Internet forums. It is generally
done by automated spambots. Most forum spam consists of links to external sites, with the dual
goals of increasing search engine visibility in highly competitive areas such as weight loss,
pharmaceuticals, gambling, pornography, real estate or loans, and generating more traffic for
these commercial websites. Some of these links contain code to track the spambot's identity; if a
sale goes through, the spammer behind the spambot works on commission.
• Mobile phone
• Mobile phone spam is directed at the text messaging service of a mobile phone. This can be
especially irritating to customers not only for the inconvenience, but also because of the fee they
may be charged per text message received in some markets. The term "SpaSMS" was coined at
the adnews website Adland in 2000 to describe spam SMS. To comply with CAN-SPAM regulations
in the US, SMS messages now must provide options of HELP and STOP, the latter to end
communication with the advertiser via SMS altogether.
• Despite the high number of phone users, there has not been so much phone spam, because there
is a charge for sending SMS, and installing trojans into other's phones that send spam (common
for e-mail spam) is hard because applications normally must be downloaded from a central
database.
• Social networking spam
• Facebook and Twitter are not immune to messages containing spam links.
Most insidiously, spammers hack into accounts and send false links under
the guise of a user's trusted contacts such as friends and family. As for
Twitter, spammers gain credibility by following verified accounts such as
that of Lady Gaga; when that account owner follows the spammer back, it
legitimizes the spammer and allows him or her to proliferate. Twitter has
studied what interest structures allow their users to receive interesting
tweets and avoid spam, despite the site using the broadcast model, in
which all tweets from a user are broadcast to all followers of the user.
• Social spam
• Spreading beyond the centrally managed social networking platforms,
user-generated content increasingly appears on business, government,
and nonprofit websites worldwide. Fake accounts and comments planted
by computers programmed to issue social spam can infiltrate these
websites. Well-meaning and malicious human users can break websites'
policies by submitting profanity, insults,hate speech, and violent
messages.
Social network Account Attack
• The following are ways to hack any online account, not just social networking sites, in order of difficulty.
• Guessing Passwords (Bruteforce Attack):
• This is arguable the most common and easiest type of attack, because it can be launched against any website.
• The attacker would try to login by trying different passwords.
• There are tools/utilities that automate this process, so the attacker would just need to give said tool/utility a list of
words/passwords to try.
• Phishing Attack:
• This is when at attacker tries to obtain sensitive information (eg username, password, DoB, security questions &
answers ...etc) from the victim by posing as a legitimate entity. Phishing attacks encompasses other attack types,
such as social engineering and/or cross-site scripting attacks.
• The simplest form of phishing is cloning the targetted website and sending the URL to the victim. The unsuspecting
victim would then type in the sensitive information in the cloned website.
• Social Engineering:
• This type of attack requires some creativity and due-diligence from the attacker.
• In this type of attack, an attacker would try to get the victim to do something the victim otherwise would not be
willing to do.
• In the context of trying to hack an account, the attacker could pose as a Security Engineer/Analyst from the
website's corporate office informing you that your account has been compromised and asking you to "confirm your
identity" by asking you a series of questions for your name, DoB, username, address ...etc.
• In this context, the attacker could use email, phone, or instant massaging to carry out their attack, but in other
contexts, the attacker could even try to carry social engineering attacks out in person.
• Cross-Site Scripting Attack:
• This type of attack can be carried out against any website. The website must meet certain
conditions in order for this attack to work. Specifically, the website must not sanitize user inputs.
• Once the attacker confirms that the site is susceptible, the attacker would typically send a URL to
the victim. Upon clicking on the URL, some malicious code runs in the victim's browser that
extracts and sends sensitive information from victim to the attacker.
•
•
• Man-in-the-Middle Attack:
• This is a highly sophisticated attack and could be carried out in many different ways. Essentially,
this is when the attacker embeds themselves between the victim and the website.
• If the attacker is in the same network as the victim, then the attacker could fool the victim's
machine into thinking that the attacker's machine is the access point/router, or hacking the router
to forward all traffic to attacker's machine (ARP spoofing). Once this is established, the victim's
traffic goes through the attacker's machine before it goes to the final destination and goes
through the attacker's machine first before reaching your machine on its way back. This means
the hacker could, at the very least, passively sniff your packets or, at most, intercept your packets
and alter them before forwarding them along. This could lead to the attacker obtaining more than
just username/password, but potentially anything else that is being transmitted over the Internet.
Hacking of social network account
using password cracking
• Password cracking is one of the most enjoyable hacks for the bad guys. It fuels their sense of exploration and desire to figure out a problem. A
hacker can use low-tech methods to crack passwords. These methods include using social engineering techniques, shoulder surfing, and simply
guessing passwords from information that he knows about the user.
•
• SOCIAL ENGINEERING
• The most popular low-tech method for gathering passwords is social engineering. Social engineering takes advantage of the trusting nature of
human beings to gain information that later can be used maliciously. A common social engineering technique is simply to con people into
divulging their passwords. It sounds ridiculous, but it happens all the time.
•
• TECHNIQUES
• To obtain a password through social engineering, you just ask for it. For example, you can simply call a user and tell him that he has some
important-looking e-mails stuck in the mail queue, and you need his password to log in and free them up. This is often how hackers and rogue
insiders try to get the information!
• A common weakness that can facilitate such social engineering is when staff members’ names, phone numbers, and e-mail addresses are
posted on your company websites. Social media sites such as LinkedIn, Facebook, and Twitter can also be used against a company because
these sites can reveal employees’ names and contact information.
•
• COUNTERMEASURES
• User awareness and consistent security training are great defenses against social engineering. Security tools are a good fail-safe if they monitor
for such e-mails and web browsing at the host-level, network perimeter, or in the cloud.
• Train users to spot attacks and respond effectively. Their best response is not to give out any information and to alert the appropriate
information security manager in the organization to see whether the inquiry is legitimate and whether a response is necessary. Oh, and take
that staff directory off your website or at least remove IT staff members’ information.
• SHOULDER SURFING
• Shoulder surfing (the act of looking over someone’s shoulder to see what the person is typing) is
an effective, low-tech password hack.
• TECHNIQUES
• To mount this attack, the bad guys must be near their victims and not look obvious. They simply
collect the password by watching either the user’s keyboard or screen when the person logs in.
• An attacker with a good eye might even watch whether the user is glancing around his desk for
either a reminder of the password or the password itself. Security cameras or a webcam can even
be used for such attacks. Coffee shops and airplanes provide the ideal scenarios for shoulder
surfing.
• You can try shoulder surfing yourself. Simply walk around the office and perform random spot
checks. Go to users’ desks and ask them to log in to their computers, the network, or even their
e-mail applications. Just don’t tell them what you’re doing beforehand, or they might attempt to
hide what they’re typing or where they’re looking for their password. Just be careful doing this
and respect other people’s privacy.
• COUNTERMEASURES
• Encourage users to be aware of their surroundings and not to enter their passwords when they
suspect that someone is looking over their shoulders. Instruct users that if they suspect someone
is looking over their shoulders while they’re logging in, they should politely ask the person to look
away or, when necessary, hurl an appropriate epithet to show the offender that the user is
serious.
• It’s often easiest to just lean into the shoulder surfer’s line of sight to keep them from seeing any
typing and/or the computer screen. 3M Privacy Filters work great as well.
• INFERENCE
• Inference is simply guessing passwords from information you know about users — such as their date of birth,
favorite television show, or phone numbers. It sounds silly, but criminals often determine their victims’ passwords
simply by guessing them!
• The best defense against an inference attack is to educate users about creating secure passwords that don’t include
information that can be associated with them. Outside of certain password complexity filters, it’s often not easy to
enforce this practice with technical controls. So, you need a sound security policy and ongoing security awareness
and training to remind users of the importance of secure password creation.
• WEAK AUTHENTICATION
• External attackers and malicious insiders can obtain — or simply avoid having to use — passwords by taking
advantage of older or unsecured operating systems that don’t require passwords to log in. The same goes for a
phone or tablet that isn’t configured to use passwords.
• BYPASSING AUTHENTICATION
• On older operating systems that prompt for a password, you can press Esc on the keyboard to get right in. Okay, it’s
hard to find any Windows 9x systems these days, but the same goes for any operating system — old or new — that’s
configured to bypass the login screen.
• After you’re in, you can find other passwords stored in such places as dialup and VPN connections and screen savers.
Such passwords can be cracked very easily using Elcomsoft’s Proactive System Password Recovery tool and Cain &
Abel. These weak systems can serve as trusted machines — meaning that people assume they’re secure — and
provide good launching pads for network-based password attacks as well.
• COUNTERMEASURES
• The only true defense against weak authentication is to ensure your operating systems require a password upon
boot. To eliminate this vulnerability, at leastupgrade to Windows 7 or 8 or use the most recent versions of Linux or
one of the various flavors of UNIX, including Mac OS X.