IT Assignment - Shreya Tripathi (MBA - 2nd Sem)
IT Assignment - Shreya Tripathi (MBA - 2nd Sem)
Today we live in a digital era where all aspects of our lives depend on the network,
computer and other electronic devices, and software applications. All critical
infrastructure such as the banking system, healthcare, financial institutions,
governments, and manufacturing industries use devices connected to the
Internet as a core part of their operations. Some of their information, such as
intellectual property, financial data, and personal data, can be sensitive for
unauthorized access or exposure that could have negative consequences. This
information gives intruders and threat actors to infiltrate them for financial gain,
extortion, political or social motives, or just vandalism.
Cyber-attack is now an international concern that hacks the system, and other
security attacks could endanger the global economy. Therefore, it is essential to
have an excellent cybersecurity strategy to protect sensitive information from high-
profile security breaches. Furthermore, as the volume of cyber-attacks grows,
companies and organizations, especially those that deal with information related to
national security, health, or financial records, need to use strong cybersecurity
measures and processes to protect their sensitive business and personal
information.
Phishing
Phishing is a type of cybercrime in which a sender seems to come from a
genuine organization like PayPal, eBay, financial institutions, or friends and co-
workers. They contact a target or targets via email, phone, or text message with a
link to persuade them to click on that links. This link will redirect them to
fraudulent websites to provide sensitive data such as personal information, banking
and credit card information, social security numbers, usernames, and passwords.
Clicking on the link will also install malware on the target devices that allow
hackers to control devices remotely.
Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error
method to guess all possible combinations until the correct information is
discovered. Cybercriminals usually use this attack to obtain personal information
about targeted passwords, login info, encryption keys, and Personal Identification
Numbers (PINS).
The following are the latest cyber threats reported by the U.K., U.S., and
Australian governments:
Romance Scams
The U.S. government found this cyber threat in February 2020. Cybercriminals
used this threat through dating sites, chat rooms, and apps. They attack people who
are seeking a new partner and duping them into giving away personal data.
Dridex Malware
It is a type of financial Trojan malware identifies by the U.S. in December
2019 that affects the public, government, infrastructure, and business worldwide. It
infects computers through phishing emails or existing malware to steal sensitive
information such as passwords, banking details, and personal data for fraudulent
transactions. The National Cyber Security Centre of the United Kingdom
encourages people to make sure their devices are patched, anti-virus is turned on
and up to date, and files are backed up to protect sensitive data against this attack.
Emotet Malware
Emotet is a type of cyber-attack that steals sensitive data and also installs other
malware on our device. The Australian Cyber Security Centre warned national
organizations about this global cyber threat in 2019.
The following are the system that can be affected by security breaches and
attacks:
1. Communication: Cyber attackers can use phone calls, emails, text
messages, and messaging apps for cyberattacks.
2. Finance: This system deals with the risk of financial information like bank
and credit card detail. This information is naturally a primary target for
cyber attackers.
3. Governments: The cybercriminal generally targets the government
institutions to get confidential public data or private citizen information.
4. Transportation: In this system, cybercriminals generally target connected
cars, traffic control systems, and smart road infrastructure.
5. Healthcare: A cybercriminal targets the healthcare system to get the
information stored at a local clinic to critical care systems at a national
hospital.
6. Education: A cybercriminals target educational institutions to get their
confidential research data and information of students and employees.
Benefits of cybersecurity
1. Confidentiality
Confidentiality is roughly equivalent to privacy and avoids the unauthorized
disclosure of information. It involves the protection of data, providing access for
those who are allowed to see it while disallowing others from learning anything
about its content. It prevents essential information from reaching the wrong people
while making sure that the right people can get it. Data encryption is a good
example to ensure confidentiality.
Encryption
Encryption is a method of transforming information to make it unreadable for
unauthorized users by using an algorithm. The transformation of data uses a secret
key (an encryption key) so that the transformed data can only be read by using
another secret key (decryption key). It protects sensitive data such as credit card
numbers by encoding and transforming data into unreadable cipher text. This
encrypted data can only be read by decrypting it. Asymmetric-key and symmetric-
key are the two primary types of encryption.
Access control
Access control defines rules and policies for limiting access to a system or to
physical or virtual resources. It is a process by which users are granted access and
certain privileges to systems, resources or information. In access control systems,
users need to present credentials before they can be granted access such as a
person's name or a computer's serial number. In physical systems, these credentials
may come in many forms, but credentials that can't be transferred provide the most
security.
Authentication
An authentication is a process that ensures and confirms a user's identity or role
that someone has. It can be done in a number of different ways, but it is usually
based on a combination of-
o something the person has (like a smart card or a radio key for storing secret
keys),
o something the person knows (like a password),
o something the person is (like a human with a fingerprint).
Authentication is the necessity of every organizations because it enables
organizations to keep their networks secure by permitting only authenticated users
to access its protected resources. These resources may include computer systems,
networks, databases, websites and other network-based applications or services.
Authorization
Authorization is a security mechanism which gives permission to do or have
something. It is used to determine a person or system is allowed access to
resources, based on an access control policy, including computer programs, files,
services, data and application features. It is normally preceded by authentication
for user identity verification. System administrators are typically assigned
permission levels covering all system and user resources. During authorization, a
system verifies an authenticated user's access rules and either grants or refuses
resource access.
Physical Security
Physical security describes measures designed to deny the unauthorized access of
IT assets like facilities, equipment, personnel, resources and other properties from
damage. It protects these assets from physical threats including theft, vandalism,
fire and natural disasters.
2. Integrity
Integrity refers to the methods for ensuring that data is real, accurate and
safeguarded from unauthorized user modification. It is the property that
information has not be altered in an unauthorized way, and that source of the
information is genuine.
Backups
Backup is the periodic archiving of data. It is a process of making copies of data or
data files to use in the event when the original data or data files are lost or
destroyed. It is also used to make copies for historical purposes, such as for
longitudinal studies, statistics or for historical records or to meet the requirements
of a data retention policy. Many applications especially in a Windows
environment, produce backup files using the .BAK file extension.
Checksums
A checksum is a numerical value used to verify the integrity of a file or a data
transfer. In other words, it is the computation of a function that maps the contents
of a file to a numerical value. They are typically used to compare two sets of data
to make sure that they are the same. A checksum function depends on the entire
contents of a file. It is designed in a way that even a small change to the input file
(such as flipping a single bit) likely to results in different output value.
3. Availability
Availability is the property in which information is accessible and modifiable in a
timely fashion by those authorized to do so. It is the guarantee of reliable and
constant access to our sensitive data by authorized people.
Physical Protections
Physical safeguard means to keep information available even in the event of
physical challenges. It ensures sensitive information and critical information
technology are housed in secure areas.
Computational redundancies
It is applied as fault tolerant against accidental faults. It protects computers and
storage devices that serve as fallbacks in the case of failures.
2. Fail-safe defaults
The Fail-safe defaults principle states that the default configuration of a system
should have a conservative protection scheme. This principle also restricts how
privileges are initialized when a subject or object is created. Whenever access,
privileges/rights, or some security-related attribute is not explicitly granted, it
should not be grant access to that object.
Example: If we will add a new user to an operating system, the default group of
the user should have fewer access rights to files and services.
3. Least Privilege
This principle states that a user should only have those privileges that need to
complete his task. Its primary function is to control the assignment of rights
granted to the user, not the identity of the user. This means that if the boss
demands root access to a UNIX system that you administer, he/she should not be
given that right unless he/she has a task that requires such level of access. If
possible, the elevated rights of a user identity should be removed as soon as those
rights are no longer needed.
4. Open Design
This principle states that the security of a mechanism should not depend on the
secrecy of its design or implementation. It suggests that complexity does not add
security. This principle is the opposite of the approach known as "security through
obscurity." This principle not only applies to information such as passwords or
cryptographic systems but also to other computer security related operations.
Example: DVD player & Content Scrambling System (CSS) protection. The CSS
is a cryptographic algorithm that protects the DVD movie disks from unauthorized
copying.
5. Complete mediation
The principle of complete mediation restricts the caching of information, which
often leads to simpler implementations of mechanisms. The idea of this principle is
that access to every object must be checked for compliance with a protection
scheme to ensure that they are allowed. As a consequence, there should be wary of
performance improvement techniques which save the details of previous
authorization checks, since the permissions can change over time.
Whenever someone tries to access an object, the system should authenticate the
access rights associated with that subject. The subject's access rights are verified
once at the initial access, and for subsequent accesses, the system assumes that the
same access rights should be accepted for that subject and object. The operating
system should mediate all and every access to an object.
Example: An online banking website should require users to sign-in again after a
certain period like we can say, twenty minutes has elapsed.
6. Separation of Privilege
This principle states that a system should grant access permission based on more
than one condition being satisfied. This principle may also be restrictive because it
limits access to system entities. Thus, before privilege is granted more than two
verification should be performed.
Example: To (change) to root, two conditions must be met-
o The user must know the root password.
o The user must be in the right group (wheel).
8. Psychological acceptability
This principle states that a security mechanism should not make the resource more
complicated to access if the security mechanisms were not present. The
psychological acceptability principle recognizes the human element in computer
security. If security-related software or computer systems are too complicated to
configure, maintain, or operate, the user will not employ the necessary security
mechanisms. For example, if a password is matched during a password change
process, the password changing program should state why it was denied rather than
giving a cryptic error message. At the same time, applications should not impart
unnecessary information that may lead to a compromise in security.
Example: When we enter a wrong password, the system should only tell us that
the user id or password was incorrect. It should not tell us that only the password
was wrong as this gives the attacker information.
9. Work Factor
This principle states that the cost of circumventing a security mechanism should be
compared with the resources of a potential attacker when designing a security
scheme. In some cases, the cost of circumventing ("known as work factor") can be
easily calculated. In other words, the work factor is a common cryptographic
measure which is used to determine the strength of a given cipher. It does not map
directly to cybersecurity, but the overall concept does apply.
Example: Suppose the number of experiments needed to try all possible four-
character passwords is 244 = 331776. If the potential attacker must try each
experimental password at a terminal, one might consider a four-character password
to be satisfactory. On the other hand, if the potential attacker could use an
astronomical computer capable of trying a million passwords per second, a four-
letter password would be a minor barrier for a potential intruder.
Archival Storage
Data archiving is the process of retaining or keeping of data at a secure place for
long-term storage. The data might be stored in safe locations so that it can be used
whenever it is required. The archive data is still essential to the organization and
may be needed for future reference. Also, data archives are indexed and have
search capabilities so that the files and parts of files can be easily located and
retrieved. The Data archival serve as a way of reducing primary storage
consumption of data and its related costs.
Data archival is different from data backup in the sense that data backups created
copies of data and used as a data recovery mechanism to restore data in the event
when it is corrupted or destroyed. On the other hand, data archives protect the
older information that is not needed in day to day operations but may have to be
accessed occasionally.
Data archives may have many different forms. It can be stored as Online, offline,
or cloud storage-
o Online data storage places archive data onto disk systems where it is readily
accessible.
o Offline data storage places archive data onto the tape or other removable
media using data archiving software. Because tape can be removed and
consumes less power than disk systems.
o Cloud storage is also another possible archive target. For example, Amazon
Glacier is designed for data archiving. Cloud storage is inexpensive, but its
costs can grow over time as more data is added to the cloud archive.
The following list of considerations will help us to improve the long-term
usefulness of our achieves-
1. Storage medium
2. Storage device
3. Revisiting old archives
4. Data usability
5. Selective archiving
6. Space considerations
7. Online vs. offline storage
Storage medium
The first thing is to what storage medium we use for archives. The archived data
will be stored for long periods of time, so we must need to choose the type of
media that will be lost as long as our retention policy dictates.
Storage device
This consideration about the storage device we are using for our archives which
will be accessible in a few years. There is no way to predict which types of storage
devices will stand the best. So, it is essential to try to pick those devices that have
the best chance of being supported over the long term.
Revisiting old archives
Since we know our archive policies and the storage mechanisms we use for
archiving data would change over time. So, we have to review our archived data at
least once a year to see that if anything needs to be migrated into a different
storage medium.
For example, about ten years ago, we used Zip drives for archival then we had
transferred all of my archives to CD. But in today’s? we store most of our archives
on DVD. Since modern DVD drives can also read CDs, so we haven't needed to
move our extremely old archives off CD onto DVD.
Data usability
In this consideration, we have seen one major problem in the real world is archived
data which is in an obsolete format.
For example, a few years ago, document files that had been archived in the early
1990s were created by an application known as PFS Write. The PFS Write file
format was supported in the late 80s and early 90s, but today, there are not any
applications that can read that files. To avoid this situation, it might be helpful to
archive not only the data but also copies the installation media for the applications
that created the data.
Selective archiving
In this consideration, we have to sure about what should be archived. That means
we will archive only a selective part of data because not all data is equally
important.
Space considerations
If our archives become huge, we must plan for the long-term retention of all our
data. If we are archiving our data to removable media, capacity planning might be
simple which makes sure that there is a free space in the vault to hold all of those
tapes, and it makes sure that there is a room in our IT budget to continue
purchasing tapes.
Online vs. offline storage
In this consideration, we have to decide whether to store our archives online (on a
dedicated archive server) or offline (on removable media). Both methods of
archival contain advantages and disadvantages. Storing of data online keeps the
data easily accessible. But keeping data online may be vulnerable to theft,
tampering, corruption, etc. Offline storage enables us to store an unlimited amount
of data, but it is not readily accessible.
Disposal of Data
Data destruction or disposal of data is the method of destroying data which is
stored on tapes, hard disks and other electronic media so that it is completely
unreadable, unusable and inaccessible for unauthorized purposes. It also ensures
that the organization retains records of data for as long as they are needed. When it
is no longer required, appropriately destroys them or disposes of that data in some
other way, for example, by transfer to an archives service.
The managed process of data disposal has some essential benefits-
o It avoids the unnecessary storage costs incurred by using office or server
space in maintaining records which is no longer needed by the organization.
o Finding and retrieving information is easier and quicker because there is less
to search.
The disposal of data usually takes place as part of the normal records management
process. There are two essential circumstances in which the destruction of data
needs to be handled as an addition to this process-
o The quantity of a legacy record requires attention.
o The functions are being transferred to another authority and disposal of data
records becomes part of the change process.
The following list of considerations will help us for the secure disposal of data-
1. Eliminate access
2. Destroy the data
3. Destroy the device
4. Keep the record of which systems have been decommissioned
5. Keep careful records
6. Eliminate potential clues
7. Keep systems secure until disposal
Eliminate access
In this consideration, we have to ensure that eliminating access account does not
have any rights to re access the disposed of data again.
3. IoT Threats
IoT stands for Internet of Things. It is a system of interrelated physical devices
which can be accessible through the internet. The connected physical devices have
a unique identifier (UID) and have the ability to transfer data over a network
without any requirements of the human-to-human or human-to-computer
interaction. The firmware and software which is running on IoT devices make
consumer and businesses highly susceptible to cyber-attacks.
When IoT things were designed, it is not considered in mind about the used in
cybersecurity and for commercial purposes. So, every organization needs to work
with cybersecurity professionals to ensure the security of their password policies,
session handling, user verification, multifactor authentication, and security
protocols to help in managing the risk.
4. AI Expansion
AI short form is Artificial intelligence. According to John McCarthy, father of
Artificial Intelligence defined AI: "The science and engineering of making
intelligent machines, especially intelligent computer programs."
It is an area of computer science which is the creation of intelligent machines that
do work and react like humans. Some of the activities related to artificial
intelligence include speech recognition, Learning, Planning, Problem-solving, etc.
The key benefits with AI into our cybersecurity strategy have the ability to protect
and defend an environment when the malicious attack begins, thus mitigating the
impact. AI take immediate action against the malicious attacks at a moment when a
threat impacts a business. IT business leaders and cybersecurity strategy teams
consider AI as a future protective control that will allow our business to stay ahead
of the cybersecurity technology curve.