Lecture 3 - 1 Data States
Lecture 3 - 1 Data States
Data States
Lecture – 2 Summary
• Data Integrity
• Integrity Mechanisms
• Availability
• Methods to Achieve Availability
• Security control categories
• Authentication & Authorization
• Attack Surface
• Attack Tree
Outline of Lecture 3 Part 1
• Data States
• Data at Rest
• Attacks & Controls
• Data in Motion
• Attacks & Controls
• Data in Use
• Attacks & Controls
Outline of Lecture 3 – Part 2
• Cryptography – Main Terms
• Evolution of Ciphers
• Caesar Cipher
• Vigenère Cipher
• Transposition and Substitution Ciphers
• One Time Pad
• Book Cipher
• Rotor Machine
5
States of Data
6
7
Data at Rest
Data that is not being accessed and is stored on a physical or
logical medium.
Examples may be files stored on fileservers, records in
databases, documents on flash drives, hard disks etc
This also involves data that is stored with high latency (low-
changing state)
.
• It is not being processed by a CPU.
8
Data at Rest
1
0
• Solution:
• IT Departments must analyze the main risks they face regarding the
management of their data at rest and select the technology or technologies
prioritizing those that will eliminate or mitigate those most likely and/or of
greatest impact to their organization
Data at Rest – Sec Controls
• Data encryption
• Backups
Data in Motion
between
used by criminals.
13
Malicious Hardware
Backdoor in Cisco Routers
• In 2013, a German paper showed that the NSA was taking advantage of certain backdoors in Cisco’s routers (Der
Spiegel).
• In 2014, a backdoor was found in Cisco’s routers, which could allow attackers to
access user credentials and issue arbitrary commands with escalated privileges.
• In 2015, a group of state-sponsored attackers started installing a malicious backdoor in the Cisco’s routers that
have the default administrative credentials.
• In 2017, Cisco, discovered a vulnerability in its own routers that allowed the CIA to remotely command over 300 of
Cisco’s switch models.
• In 2021, APT28 (the hacking arm of Russia’s GRU military intelligence agency) used infrastructure to masquerade
simple network management protocol (SNMP) access into Cisco routers worldwide
Backdoors Keep Appearing In Cisco's Routers | Tom's Hardware (tomshardware.com)
14
Data in Motion - Attack
Mirai Malware
• It selects random IPs and tries to log in through the SSH, Telnet, FTP and HTTPS ports.
15
Inside the infamous Mirai IoT Botnet: A Retrospective Analysis (cloudflare.com)
Data in Motion - Attack
Malicious Hardware: - USB port attack
• USB sticks and external hard drives can be a convenient way to move your
• The ports you plug your devices in could be leaking your personal data,
16
USB Ports Could Be Silently Leaking Your Personal Data To A Malicious Device (forbes.com)
Data in Motion - Attack
Malicious Hardware: USB port attack
• Someone could eavesdrop on that crosstalk from a USB port that's next
or internal USB hub, this sensitive information can be captured. (Dr. Yuval
Yarom)
USB Ports Could Be Silently Leaking Your Personal Data To A Malicious Device (forbes.com) 17
2
8
Malicious Hardware
Cross talk
• Crosstalk is a phenomenon by which a signal transmitted on one circuit or channel of a
transmission system creates an undesired effect in another circuit or channel.
2
9
Malicious Hardware
USB Port Attack
• The research team found that 90% of the 50 devices (both computers and
https://www.forbes.com/sites/leemathews/2017/08/15/usb-ports-could-be-silently-leaking-your-personal-data-to-a-malicious-device/?sh=5892ae691083
3
0
• HTTPS
messages
Data in Motion Protection
• Email encryption
• Provides end-to-end protection for message bodies and
attachments
• A wide variety of tools for encrypting email.
• Managed File Transfer (MFT)
• The file is uploaded to a platform and a link is generated to
download it.
• This link is sent by email or other means to the recipient who
makes the download via HTTPS.
• It is possible to set expiration dates for the link, password to
access it, etc.
Data in Motion Protection
• DLP (Data Loss Prevention)
• Able to detect whether an attempt is being made to send
confidential data outside the organization (e.g., credit card
numbers) and block the sending of such data
• They also allow for blocking copies of data to a USB drive, sending
to network drives, uploading to web or cloud applications, etc.
• Can be prone to false positives and block valid submissions that
should be allowed to pass through.
• CASB (Cloud Access Security Brokers)
• Can detect if a user tries to download sensitive data, and if he
does not comply with certain security policy.
• They apply security to a finite number of cloud applications,
usually the most well known.
Data in Motion Protection
• In-transit protection with digital rights
• Can be applied in the email to
• Encrypt the body and attachments,
• Apply usage rights leaving only the content to be viewed
• Restrict the forwarding of the email
Challenges of Data Protection in Transit
• There are an infinite number of means and channels of
communication
• These tools are normally protecting a certain channel
such as email, web downloads, etc. but it is
complicated to reach any protocol and means of
communication.
• Infinity of Cloud applications to protect
• Difficulty determining what should be protected and
what should not
3
6
Data in Use
Normally, behind the application there is a user who wants to access the data to view it,
change it, etc. In this state, the data is more vulnerable, in the sense that in order to see it,
the user must have been able to access the content decrypted (in the case that it was
encrypted).
3
7
Data in Use
• Data in use refers to data being processed by applications, as the CPU and
• Data in use, or memory, can contain sensitive data including digital certificates,
Data in Use
• An attacker with access to random access memory can parse that
memory to locate the encryption key for data at rest.
• Once they have obtained that encryption key, they can decrypt
• RAM (Random Access Memory) is volatile and cannot hold data if the computer
is switched off.
• Research shows, RAM still holds data from few seconds to few minutes
• Typically, cold boot attacks are used for retrieving encryption keys from a
https://www.sciencedirect.com/topics/computer-science/cold-boot-attack
What is a Cold Boot Attack and how can you stay safe? (thewindowsclub.com) 24
4
0
• Cold boot attack takes advantage of a known weakness in BitLocker, and a number
• Once power is removed from the RAM, the data that it holds is removed within
• The colder the RAM chips are, the longer they maintain their data.
• Spraying RAM with liquid nitrogen
Rootkit uses:
• A kernel-mode rootkit variant called a bootkit can infect startup code like
Bootkit uses:
Data in Use
Security Controls are:
• Encryption of data.
– Proprietary information,
35
End of Part 1
37