Cyber Security Introduction - Cyber Security Basics
Cyber Security Introduction - Cyber Security Basics
Cyber Security Introduction - Cyber Security Basics
CHAPTER 1
Introduction to Cyber Security
Cyber Security Introduction - Cyber Security Basics:
Cyber security is the most concerned matter as cyber threats and attacks are overgrowing.
Attackers are now using more sophisticated techniques to target the systems. Individuals, small-
scale businesses or large organization, are all being impacted. So, all these firms whether IT or
non-IT firms have understood the importance of Cyber Security and focusing on adopting all
possible measures to deal with cyber threats.
OR
Cyber security is the body of technologies, processes, and practices designed to protect networks,
computers, programs and data from attack, damage or unauthorized access.
The term cyber security refers to techniques and practices designed to protect digital data.
OR
Cyber security is the protection of Internet-connected systems, including hardware, software, and
data from cyber-attacks.
Cyber is related to the technology which contains systems, network and programs or data.
Whereas security related to the protection which includes systems security, network security
and application and information security.
1
INTRODUCTION TO CYBER-SECURITY
In addition to financial damage suffered by the business, a data breach can also inflict untold
reputational damage.
Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using
more sophisticated ways to initiate cyber-attacks.
Regulations such as GDPR are forcing organizations into taking better care of the personal
data they hold.
Because of the above reasons, cyber security has become an important part of the business and
the focus now is on developing appropriate response plans that minimize the damage in the event
of a cyber-attack.
But an organization or an individual can develop a proper response plan only when he has a good
grip on cyber security fundamentals.
It also means trying to keep the identity of authorized parties involved in sharing and holding
data private and anonymous.
Data encryption
Two-factor authentication
Biometric verification
Security tokens
2
INTRODUCTION TO CYBER-SECURITY
Integrity
Integrity refers to protecting information from being modified by unauthorized parties.
Cryptographic checksums
Data backups
Availability
Availability is making sure that authorized parties are able to access the information when
needed.
Implementing firewalls
Data redundancy
1) Web-based attacks
2) System-based attacks
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important web-
based attacks are as follows_
3
INTRODUCTION TO CYBER-SECURITY
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the
application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS
resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the
attacker’s computer or any other computer. The DNS spoofing attacks can go on for a long
period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create cookies
to store the state and user sessions. By stealing the cookies, an attacker can have access to all of
the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy
entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial-and-error method. This attack generates a large number of
guesses and validates them to obtain actual data like user password and personal identification
number. This attack may be used by criminals to crack encrypted data, or by security, analysts to
test an organization's network security.
6. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users. It
accomplishes this by flooding the target with traffic or sending it information that triggers a
crash. It uses the single system and single internet connection to attack a server.
4
INTRODUCTION TO CYBER-SECURITY
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is measured
in bit per second.
Application layer attacks- Its goal is to crash the web server and is measured in request per
second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a web
server to deliver web pages for which he is not authorized to browse.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network.
1. Virus
It is a type of malicious software program that spread throughout the computer files without the
knowledge of a user. It is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed. It can also execute
instructions that cause harm to the system.
5
INTRODUCTION TO CYBER-SECURITY
2. Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers. It works same as the computer virus. Worms often originate from email attachments
that appear to be from trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It appears
to be a normal application but when opened/executed some malicious code will run in the
background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or other
purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they receive
specific input. Common examples of bot’s program are the crawler, chatroom bots, and
malicious bots.
The 7 layers of cyber security should center on the mission critical assets you are seeking to
protect.
2: Data Security – Data security controls protect the storage and transfer of data.
4: Endpoint Security – Endpoint security controls protect the connection between devices and
the network.
5: Network Security – Network security controls protect an organization’s network and prevent
unauthorized access of the network.
6
INTRODUCTION TO CYBER-SECURITY
6: Perimeter Security – Perimeter security controls include both the physical and digital
security methodologies that protect the business overall.
7: The Human Layer – Humans are the weakest link in any cyber security posture. Human
security controls include phishing simulations and access management controls that protect
mission critical assets from a wide variety of human threats, including cyber criminals, malicious
insiders, and negligent users.
Before identifying specific dangers to modern data systems, it is crucial to understand the
distinction between cyber threats and vulnerabilities.
Cyber threats are security incidents or circumstances with the potential to have a negativee
outcome for your network or other data management systems.
Examples of common types of security threats include phishing attacks that result in the
installation of malware that infects your data, failure of a staff member to follow data protection
protocols that cause a data breach, or even a tornado that takes down your company’s data
headquarters, disrupting access.
Vulnerabilities are the gaps or weaknesses in a system that make threats possible and tempt
threat actors to exploit them.
Types of vulnerabilities in network security include but are not limited to SQL injections, server
misconfigurations, cross-site scripting, and transmitting sensitive data in a nonencrypted plain
text format.
When threat probability is multiplied by the potential loss that may result, cyber security experts,
refer to this as a risk.
CIA Triad
The CIA Triad is actually a security model that has been developed to help people think about
various parts of IT security.
7
INTRODUCTION TO CYBER-SECURITY
Confidentiality
It's crucial in today's world for people to protect their sensitive, private information from
unauthorized access.
Protecting confidentiality is dependent on being able to define and enforce certain access levels
for information.
In some cases, doing this involves separating information into various collections that are
organized by who needs access to the information and how sensitive that information actually is
- i.e., the amount of damage suffered if the confidentiality was breached.
Some of the most common means used to manage confidentiality include access control lists,
volume and file encryption, and Unix file permissions.
Integrity
Data integrity is what the "I" in CIA Triad stands for.
This is an essential component of the CIA Triad and designed to protect data from deletion or
modification from any unauthorized party, and it ensures that when an authorized person makes
a change that should not have been made the damage can be reversed.
Availability
This is the final component of the CIA Triad and refers to the actual availability of your data.
Authentication mechanisms, access channels and systems all have to work properly for the
information they protect and ensure it's available when it is needed.
Understanding the CIA triad,The CIA Triad is all about information. While this is considered the
core factor of the majority of IT security, it promotes a limited view of the security that ignores
other important factors.
For example, even though availability may serve to make sure you don't lose access to resources
needed to provide information when it is needed, thinking about information security in itself
doesn't guarantee that someone else hasn't used your hardware resources without authorization.
It's important to understand what the CIA Triad is, how it is used to plan and also to implement a
quality security policy while understanding the various principles behind it. It's also important to
understand the limitations it presents. When you are informed, you can utilize the CIA Triad for
what it has to offer and avoid the consequences that may come along by not understanding it.
8
INTRODUCTION TO CYBER-SECURITY
One of the most problematic elements of cybersecurity is the evolving nature of security risks.
As new technologies emerge, and as technology is used in new or different ways, new attack
avenues are developed. Keeping up with these frequent changes and advances in attacks, as well
as updating practices to protect against them, can be challenging. Issues include ensuring all
elements of cybersecurity are continually updated to protect against potential vulnerabilities.
This can be especially difficult for smaller organizations without the staff or in-house resources.
Additionally, organizations can gather a lot of potential data on individuals who use one or more
of their services. With more data being collected, the likelihood of a cybercriminal who wants to
steal personally identifiable information (PII) is another concern. For example, an organization
that stores PII in the cloud may be subject to a ransomware attack. Organizations should do what
they can to prevent a cloud breach.
For example: An employee’s desktop computer, laptop or company phone would be considered
an asset, as would applications on those devices. Likewise, critical infrastructure, such as servers
and support systems, are assets. An organization’s most common assets are information assets.
These are things such as databases and physical files – i.e., the sensitivedata that you storee.
9
INTRODUCTION TO CYBER-SECURITY
Motive of Attackers
The categories of cyber-attackers enable us to better understand the attackers' motivations and
the actions they take. As shown in Figure, operational cyber security risks arise from three types
of actions: a) inadvertent actions (generally by insiders) that are taken without malicious or
harmful intent; ii) deliberate actions (by insiders or outsiders) that are taken intentionally and are
meant to do harm; and iii) inaction (generally by insiders), such as a failure to act in a given
situation, either because of a lack of appropriate skills, knowledge, guidance, or availability of
the correct person to take action Of primary concern here are deliberate actions, of which there
are three categories of motivation.
Session replay: In this type of attack, a hacker steals an authorized user’s log in information by
stealing the session ID. The intruder gains access and the ability to do anything the authorized
user can do on the website.
Message modification: In this attack, an intruder alters packet header addresses to direct a
message to a different destination or modify the data on a target machine.
In a denial of service (DoS) attack, users are deprived of access to a network or web resource.
This is generally accomplished by overwhelming the target with more traffic than it can handle.
10
INTRODUCTION TO CYBER-SECURITY
For the attack to be useful, the traffic must not be encrypted. Any unencrypted information, such
as a password sent in response to an HTTP request, may be retrieved by the attacker.
Traffic analysis: the attacker looks at the metadata transmitted in traffic in order to deduce
information relating to the exchange and the participating entities, e.g., the form of the
exchanged traffic (rate, duration, etc.). In the cases where encrypted data are used, traffic
analysis can also lead to attacks by cryptanalysis, whereby the attacker may obtain information
or succeed in unencrypting the traffic.
Software Attacks: Malicious code (sometimes called malware) is a type of software designed to
take over or damage a computer user's operating system, without the user's knowledge or
approval. It can be very difficult to remove and very damaging.
Hardware Attacks:
Common hardware attacks include:
Backdoor creation; the presence of hidden methods for bypassing normal computer
authentication systems
11
INTRODUCTION TO CYBER-SECURITY
CHAPTER 2
Cyberspace And the Law & Cyber Forensics
CYBERSPACE
Cyberspace can be defined as an intricate environment that involves interactions between people,
software, and services. It is maintained by the worldwide distribution of information and
communication technology devices and networks.
With the benefits carried by the technological advancements, the cyberspace today has become a
common pool used by citizens, businesses, critical information infrastructure, military and
governments in a fashion that makes it hard to induce clear boundaries among these different
groups. The cyberspace is anticipated to become even more complex in the upcoming years, with
the increase in networks and devices connected to it.
REGULATIONS
There are five predominant laws to cover when it comes to cybersecurity:
Information Technology Act, 2000 The Indian cyber laws are governed by the Information
Technology Act, penned down back in 2000. The principal impetus of this Act is to offer reliable
legal inclusiveness to eCommerce, facilitating registration of real-time records with the
Government.
But with the cyber attackers getting sneakier, topped by the human tendency to misuse
technology, a series of amendments followed.
The ITA, enacted by the Parliament of India, highlights the grievous punishments and penalties
safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA has
been enhanced to encompass all the latest communication devices.
The IT Act is the salient one, guiding the entire Indian legislation to govern cybercrimes
rigorously:
Applicable to people who damage the computer systems without permission from the owner.
The owner can fully claim compensation for the entire damage in such cases.
12
INTRODUCTION TO CYBER-SECURITY
This section scrutinizes the identity thefts related to imposter digital signatures, hacking
passwords, or other distinctive identification features. If proven guilty, imprisonment of three
years might also be backed by Rs.1 lakh fine.
This section was inserted on-demand, focusing on punishing cheaters doing impersonation
using computer resources.
The corporate stakeholders refer to the Companies Act of 2013 as the legal obligation necessary
for the refinement of daily operations. The directives of this Act cement all the required techno-
legal compliances, putting the less compliant companies in a legal fix.
The Companies Act 2013 vested powers in the hands of the SFIO (Serious Frauds Investigation
Office) to prosecute Indian companies and their directors. Also, post the notification of the
Companies Inspection, Investment, and Inquiry Rules, 2014, SFIOs has become even more
proactive and stern in this regard.
The legislature ensured that all the regulatory compliances are well-covered, including cyber
forensics, e-discovery, and cybersecurity diligence. The Companies (Management and
Administration) Rules, 2014 prescribes strict guidelines confirming the cybersecurity obligations
and responsibilities upon the company directors and leaders.
13
INTRODUCTION TO CYBER-SECURITY
NIST Compliance the Cybersecurity Framework (NCFS), authorized by the National Institute of
Standards and Technology (NIST), offers a harmonized approach to cybersecurity as the most
reliable global certifying body.
NIST Cybersecurity Framework encompasses all required guidelines, standards, and best
practices to manage the cyber-related risks responsibly. This framework is prioritized on
flexibility and cost-effectiveness.
VISION
To build a secure and resilient cyberspace for citizens, business, and government and also to
protect anyone from intervening in user's privacy.
MISSION
To protect information and information infrastructure in cyberspace, build capabilities to prevent
and respond to cyber threat, reduce vulnerabilities and minimize damage from cyber incidents
through a combination of institutional structures, people, processes, technology, and cooperation.
14
INTRODUCTION TO CYBER-SECURITY
OBJECTIVE
Ministry of Communications and Information Technology (India) define objectives as
follows:
To create a secure cyber ecosystem in the country, generate adequate trust and
confidence in IT system and transactions in cyberspace and thereby enhance adoption of
IT in all sectors of the economy.
To create an assurance framework for the design of security policies and enabling
actions for compliance to global security standards and best practices by way of
conformity assessment (Product, process, technology & people).
To enhance and create National and Sectoral level 24X7 mechanism for obtaining strategic
information regarding threats to ICT infrastructure, creating scenarios for response, resolution
and crisis management through effective predictive, preventive, protective response and recovery
actions.
15
INTRODUCTION TO CYBER-SECURITY
CHAPTER 3
INTRODUCTION: CYBER FORENSICS
CYBER FORENSICS:
Computer forensics is the application of investigation and analysis techniques to gather and
preserve evidence.
Forensic examiners typically analyze data from personal computers, laptops, personal digital
assistants, cell phones, servers, tapes, and any other type of media. This process can involve
anything from breaking encryption, to executing search warrants with a law enforcement team,
to recovering and analyzing files from hard drives that will be critical evidence in the most
serious civil and criminal cases.
The forensic examination of computers, and data storage media, is a complicated and highly
specialized process. The results of forensic examinations are compiled and included in reports. In
many cases, examiners testify to their findings, where their skills and abilities are put to ultimate
scrutiny.
DIGITAL FORENSICS:
Digital Forensics is defined as the process of preservation, identification, extraction, and
documentation of computer evidence which can be used by the court of law. It is a science of
finding evidence from digital media like a computer, mobile phone, server, or network. It
provides the forensic team with the best techniques and tools to solve complicated digital related
cases.
Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital
evidence residing on various types of electronic devices.
Digital forensic science is a branch of forensic science that focuses on the recovery and
investigation of material found in digital devices related to cybercrime.
16
INTRODUCTION TO CYBER-SECURITY
Legal challenges
Resource Challenges
In an effort to fight e-crime and to collect relevant digital evidence for all crimes, law
enforcement agencies are incorporating the collection and analysis of digital evidence, also
known as computer forensics, into their infrastructure. Law enforcement agencies are challenged
by the need to train officers to collect digital evidence and keep up with rapidly evolving
technologies such as computer operating systems.
Header Analysis – Meta data in the e-mail message in the form of control information i.e.,
envelope and headers including headers in the message body contain information about the
sender and/or the path along which the message has traversed. Some of these may be spoofed
to conceal the identity of the sender. A detailed analysis of these headers and their correlation
is performed in header analysis.
17
INTRODUCTION TO CYBER-SECURITY
Bait Tactics – In bait tactic investigation an e-mail with http: tag having image source at
some computer monitored by the investigators is send to the sender of e-mail under
investigation containing real (genuine) e-mail address. When the e-mail is opened, a log
entry containing the IP address of the recipient (sender of the e-mail under investigation) is
recorded on the http server hosting the image and thus sender is tracked. However, if the
recipient (sender of the e-mail under investigation) is using a proxy server then IP address of
the proxy server is recorded. The log on proxy server can be used to track the sender of the e-
mail under investigation. If the proxy server’s log is unavailable due to some reason, then
investigators may send the tactic e-mail containing a) Embedded Java Applet that runs on
receiver’s computer or b) HTML page with Active X Object. Both aiming to extract IP
address of the receiver’s computer and e-mail it to the investigators.
Server Investigation – In this investigation, copies of delivered e-mails and server logs are
investigated to identify source of an e-mail message. E-mails purged from the clients
(senders or receivers) whose recovery is impossible may be requested from servers (Proxy or
ISP) as most of them store a copy of all e-mails after their deliveries. Further, logs
maintained by servers can be studied to trace the address of the computer responsible for
making the e-mail transaction. However, servers store the copies of e-mail and server logs
only for some limited periods and some may not co-operate with the investigators. Further,
SMTP servers which store data like credit card number and other data pertaining to owner of
a mailbox can be used to identify person behind an e-mail address.
Software Embedded Identifiers – Some information about the creator of e-mail, attached
files or documents may be included with the message by the e-mail software used by the
sender for composing e-mail. This information may be included in the form of custom
headers or in the form of MIME content as a Transport Neutral Encapsulation Format
(TNEF). Investigating the e-mail for these details may reveal some vital information about
the sender’s e-mail preferences and options that could help client-side evidence gathering.
The investigation can reveal PST file names, Windows logon username, MAC address, etc.
of the client computer used to send message.
18
INTRODUCTION TO CYBER-SECURITY
CHAPTER 4
CYBERCRIMES: MOBILE AND WIRELESS
INTRODUCTION
Why should mobile devices be protected? Every day, mobile devices are lost, stolen, and
infected. Mobile devices can store important business and personal information, and are often be
used to access University systems, email, banking Proliferation of mobile and wireless devices:
People hunched over their smartphones or tablets in cafes, airports, supermarkets and
even at bus stops, seemingly oblivious to anything or anyone around them.
They play games, download email, go shopping or check their bank balances on the go.
They might even access corporate networks and pull up a document or two on their mobile
gadgets Today, incredible advances are being made for mobile devices. The trend is for smaller
devices and more processing power. A few years ago, the choice was between a wireless phone
and a simple PDA. Now the buyers have a choice between high-end PDAs with integrated
wireless modems and small phones with wireless Web-browsing capabilities. A long list of
options is available to the mobile users. A simple hand-held mobile device provides enough
computing power to run small applications, play games and music, and make voice calls. A key
driver for the growth of mobile technology is the rapid growth of business solutions into hand-
held devices. As the term "mobile device" includes many products. We first provide a clear
distinction among the key terms: mobile computing, wireless computing and hand-held devices.
Figure below helps us understand how these terms are related. Let us understand the concept of
mobile computing and the various types of devices.
Mobile computing is "taking a computer and all necessary files and software out into the field."
Many types of mobile computers have been introduced since 1990s.
2. Tablet PC: It lacks a keyboard, is shaped like a slate or a paper notebook and has features of a
touchscreen with a stylus and handwriting recognition software. Tablets may not be best suited
for applications requiring a physical keyboard for typing, but are otherwise capable of carrying
out most tasks that an ordinary laptop would be able to perform.
19
INTRODUCTION TO CYBER-SECURITY
3. Internet tablet: It is the Internet appliance in tablet form. Unlike a Tablet PC, the Internet
tablet does not have much computing power and its applications suite is limited. Also, it cannot
replace a general-purpose computer. The Internet tablets typically feature an MP3 and video
player, a Web browser, a chat application and a picture viewer.
8. Fly Fusion Pentos computer: It is a computing device with the size and shape of a pen. It
functions as a writing utensil, MP3 player, language translator, digital storage device and
calculator.
Trends in Mobility:
Mobile computing is moving into a new era, third generation (3G), which promises greater
variety in applications and have highly improved usability as well as speedier networking.
"iPhone" from Apple and Google-led "Android" phones are the best examples of this trend and
there are plenty of other developments that point in this direction. This smart mobile technology
is rapidly gaining popularity and the attackers (hackers and crackers) are among its biggest fans.
It is worth noting the trends in mobile computing; this will help readers to readers to realize the
seriousness of cybersecurity issues in the mobile computing domain. Figure below shows the
different types of mobility and their implications.
20
INTRODUCTION TO CYBER-SECURITY
As the number of mobile device users increases, two challenges are presented: one at the device
level called "micro challenges" and another at the organizational level called "macro challenges”.
Some well-known technical challenges in mobile security are: managing the registry settings and
configurations, authentication service security, cryptography security, Lightweight Directory
Access Protocol (LDAP) security, remote access server (RAS) security, media player control
security, networking application program interface (API), security etc.
In addition to synchronizing with a PC, ActiveSync can synchronize directly with the Microsoft
exchange server so that the users can keep their E-Mails, calendar, notes and contacts updated
wirelessly when they are away from their PCs. In this context, registry setting becomes an
important issue given the ease with which various applications allow a free flow of information.
Organizations can, however, reduce the risk that confidential information will be accessed from
lost or stolen mobile devices through the following steps:
Determine whether the employees in the organization need to use mobile computing devices
at all, based on their risks and benefits within the organization, industry and regulatory
environment.
Implement additional security technologies, as appropriate to fit both the organization and
the types of devices used. Most (and perhaps all) mobile computing devices will need to have
their native security augmented with such tools as strong encryption, device passwords and
physical locks. Biometrics techniques can be used for authentication and encryption and have
great potential to eliminate the challenges associated with passwords.
Standardize the mobile computing devices and the associated security tools being used with
21
INTRODUCTION TO CYBER-SECURITY
them. As a matter of fundamental principle, security deteriorates quickly as the tools and
devices used become increasingly disparate.
Develop a specific framework for using mobile computing devices, including types of
information that can be stored on them.
Centralize management of your mobile computing devices. Maintain an inventory so that you
know who is using what kinds of devices.,
Establish patching procedures for software on mobile devices. This can often be simplified
by integrating patching with syncing or patch management with the centralized.
Provide education and awareness training to personnel using mobile devices. People cannot be
expected to appropriately secure their information if they have not been told how.
22
INTRODUCTION TO CYBER-SECURITY
CHAPTER 5
A SURVEY OF INSIDER ATTACK DETECTION RESEARCH
23
INTRODUCTION TO CYBER-SECURITY
The two hypotheses modelled were the null hypothesis, which assumed that the observed
transitions probabilities stem from the historical transition matrix, and the alternative hypothesis
which assumed that they were generated from a Dirichlet distribution. A hybrid multi-step
Markov method similar to the one introduced by Ju and Verdi is also used.
The fourth method used, called the compression method, was based on the premise that test data
appended to historical training data compressed more readily when the test data stemmed from
the very same user rather than from a masquerade, and was implemented through the UNIX tool
“compress” which implements a modified Lempel-Ziv algorithm. IPAM (Incremental
Probabilistic Action Modelling), another method applied on the same dataset, and introduced by
Davidson and Hirsch was also based on one-step command transition probabilities estimated
from the training data. The probabilities were continuously updated following an exponential
decay scheme with the arrival of a new command.
The sequence-match approach was presented by Lane and Bradley. For each new command, a
similarity measure is computed between the 10 most recent commands and a user’s historical
profile. A user’s profile consisted of command sequences of length 10 that the user had
previously used.
The similarity measure was a count of the number of matches in a command-by-command
comparison of 2 command sequences with a greater weight assigned to adjacent matches. This
similarity measure was computed for the test data sequence paired with each command sequence
in the profile. Maxibon and Townsend applied a naïve Bayes classifier, which had been widely
used in text classification tasks, to the same data set.
Maxibon provided a thorough and detailed investigation of classification errors of the classifier
in a separate paper, highlighting why some masquerade victims were more vulnerable than
others, and why some masquerades were more successful than others.
Killough and Maxibon also investigated a shortcoming of the naïve Bayes classifier when
dealing with NBSCs. The semi-global alignment method presented by Cull et al. is a motific ton
of the Smith-Waterman local alignment algorithm.
It uses a scoring system that rewards the alignment of commands in a test segment, but does not
necessary idly penalize the misalignment of large portions of the signature of the user. Another
approach called a self-consistent naïve Bayes classifier is proposed by Yung and applied on the
same data set. This method was a combination of the naïve Bayes classifier and the EM-
algorithm.
The self-consistent naïve Bayes classifier is not forced to make a binary decision for each new
block of commands, i.e., a decision whether the block is a masquerade block or not. Rather, it
assigns a score that indicates the probability that the block is a masquerade block.
Moreover, this classifier can change scores of earlier blocks as well as later blocks of commands.
Oka et al. had the intuition that the dynamic behaviour of a user appearing in a sequence could
be captured by correlating not only connected events, but also events that were not adjacent to
each other, while appearing within a certain distance (non-connected events).
24
INTRODUCTION TO CYBER-SECURITY
With that intuition they developed the layered networks approach based on the Eigen Co-
occurrence Matrix (ECM). The ECM method extracts the causal relationships embedded in
sequences of commands, where a co-occurrence means the relationship between every two
commands within an interval of sequences of data.
This type of relationship cannot be represented by frequency histograms nor through n-grams.
The estimated accuracy of the classification methods which are all based on a two-class
supervised training methodology whereby data is labelled as self or non-self.
The Scholar data used is a mixture of command sequences from different users. The classifiers
produced in these studies essentially identify a specific user from a set of known users who
provided training data. Furthermore, mixing data from multiple users to train classifiers to detect
masquerades is complicated and fraught with problems.
Besides potential privacy threats, requiring the mixture of data from multiple users requires
substantial retraining of classifiers as users join and leave an organization.
25
INTRODUCTION TO CYBER-SECURITY
potential of handling mixtures of traces from several users (this will occur when several users are
colluding) by using mixtures of Markov chains. The technique which has an unobserved or
hidden component can be compared to Hidden Markov Models (HMMs). The training algorithm
for HMMs runs in time, where n is the number of states in the HMM and m is the size of the
trace, whereas, the training time for Markov chains. So, the authors’ approach was less
computationally-expensive than HMMs.
Honeypots
Honeypots are information system resources designed to attract malicious users. Honeypots have
been widely deployed in De-Militarized Zones (DMZ) to trap attempts by external attackers to
penetrate an organization’s network. Their typical use is for early warning and slowing down or
stopping automated attacks from external sources, and for capturing new exploits and gathering
information on new threats emerging from outside the organization. These trap-based defences
are also useful for the insider threat.
Spitzer presented several ways to adapt the use of honeypots to the insider attack detection
problem. Since insiders probably know what information, they are after, and in many cases,
where that information is to be found, and possibly how to access it, he recommends implanting
honeytokens with perceived value in the network or in the intranet search engine. A honeytoken
is “information that the user is not authorized to have or information that is inappropriate”. This
information can then direct the insider to the more advanced honeypot that can be used to discern
whether the insider intention was malicious or not, a decision that may be determined by
inspecting the insider’s interaction with the honeypot.
In order to reach such interaction that will be used to gather information, it is important to ensure
that the honeypot looks realistic to the insider. Humans have a keen sense of suspicion, and
hence the grand challenge for honeypots or any trap-based defines is believability, while
preventing poisoning of operational systems.
Honeypots suffer from some shortcomings. First, the inside attacker may not ever use or interact
with the honeypot or honeytoken, especially if their identity is known or discovered by the
insider. Moreover, if an attacker discovers a honeypot, he/she can possibly inject bogus or false
information to complicate detection.
Procedure
Naive Bayes operates by learning a model of normal behaviour (legitimate user) from self-
training data and a model of abnormal behaviour (masquerade) from nonself training data. It uses
these models to calculate an anomaly score on testdata (in this case, a single block of test data),
and uses that score to decide whether to raise an alarm.
For each synthetic data set, the steps in the procedure for running naive Bayes were as follows.
Configure naive Bayes. Set the naive Bayes “pseudo count” parameter to 0.01 (for
consistency with prior work ). Set the block size to 10, and the alphabet size to 122 (for
consistency with the data set).
26
INTRODUCTION TO CYBER-SECURITY
Train on self and nonself data. Train the naive Bayes classifier on self-data; establish a
model of normal behaviour. Train on the nonself data to establish a model of abnormal
behaviour.
Compute anomaly threshold. Compute the anomaly threshold by 5- fold cross validation.
Details of how cross validation works can be found in an earlier paper .
Score the test block. Run the detector on the test block, and observe the anomaly score
that naive Bayes assigns to the block.
Decision. Decide whether or not the test block was detected by comparing the anomaly
score with the threshold.
Security Analysis
The security analysis considers attackers whose ultimate goal is to forge Attribute Authority
signatures. To accomplish this goal, attackers need to obtain the Attribute Authority’s private
key and/or to take control of the Certificate Engine system, without being detected. Threshold
cryptography guarantees that the private key cannot be reconstructed if fewer than half of the
private key shares are disclosed.
The remainder of this section focuses on how the crypto-engine approach makes the attack
substantially more difficult than on a system implemented endtiredly in software. An attacker
can succeed by hardware-level intrusion if he/she has physical access to the replica node.
Hardware-Level Intrusion. Our analysis is based on the attack categories identicfeed in [11]:
physical attack, read-back attack, and side-channel attack.
A physical attack aims at uncovering the FPGA design by opening up the FPGA package and
probing (undocumented) points inside the chip without damaging the device. Due to increasing
FPGA complexity, this attack can be achieved only with advanced inspection methods (e.g.,
Focused Ion Beam), which are quite costly and are probably possible only for large organizations
(e.g., intelligence services). A read-back attack accesses/reads the FPGA configuration file from
the FPGA chip (using the read-back functionality generally available on the FPGA device for
debugging purposes), after which the attacker reverse-engineers the obtained bitstream. To
prevent the read-back attack, most manufacturers provide the option of disabling the read-back
functionality. Moreover, even though theoretically to interpret and/or to modify the bit-stream of
an FPGA, major vendors (e.g., Xilinx, Acted) maintain that it is virtually impossible.
The irregular row and pattern of the hierarchical interconnection network exacerbates the
inherent complexity of the reverse-engineering process. A side-channel attack exploits
unintentional information leakage sources (e.g., power consumption, timing electromagnetic
radiations) in the implementation. At present, little work has investigated the feasibility of such
attacks against FPGAs. Nevertheless, attacks using power consumption and specific to RSA are
27
INTRODUCTION TO CYBER-SECURITY
known in the literature. For instance, Simple Power Analysis and Differential Power Analysis
exploit the fact that a straightforward implementation of the Right-to-Left Binary Algorithm
(widely used in RSA hardware circuits, including our RSA Processor) has power consumption
that changes in time with the bit-sequence of the RSA key (thus, monitoring the FPGA power
consumption allows discovering the RSA key). Simple countermeasures can be found. In our
case, power attacks are more difficult to launch, since multiple RSA Processors operate
concurrently and asynchronously, effectively masking the information that can be revealed by
the overall FPGA power consumption. We note that hardware-implemented cryptographic co-
processor engines limit the types of secure computations that the user can perform to only the
implemented cryptographic routines.
28
INTRODUCTION TO CYBER-SECURITY
CONCLUCION
Organizations are finding themselves under the pressure of being forced to react quickly to the
dynamically increasing number of cybersecurity threats. Since the attackers have been using an
attack life cycle, organizations have also been forced to come up with a vulnerability
management life cycle. The vulnerability management life cycle is designed to counter the
efforts made by the attackers in the quickest and most effective way. This chapter has discussed
the vulnerability management life cycle in terms of the vulnerability management strategy. It has
gone through the steps of asset inventory creation, the management of information flow, the
assessment of risks, assessment of vulnerabilities, reporting and remediation, and finally the
planning of the appropriate responses. It has explained the importance of each step in the
vulnerability management phase and how each should be carried out.
29
INTRODUCTION TO CYBER-SECURITY
REFERENCES
WIKIPEDIA
GEEKS FOR GEEKS
SLIDE SHARE
YOUTUBE
LOCAL BOOKS(CYBER SECURITY AND DEPP DIVE)
30