Itsp 3C Lesson Summary 1 5
Itsp 3C Lesson Summary 1 5
Lesson Proper for Week 1 server malfunction, physical theft and unpatched endpoints.
What is Information Security? While paper-based businesses still exist, the ever-increasing reliance on
information systems has cause information security to become a key
Information security or infosec is concerned with protecting information from consideration in cybersecurity risk management and raise a need for dedicated
unauthorized access. It's part of information risk management and involves IT security specialists.
preventing or reducing the probability of unauthorized access, use, disclosure,
disruption, deletion, corruption, modification, inspect, or recording. These information technology security professionals are concerned with data
security, application security, network security, computer security, physical
If a security incident does occur, information security professionals are involved security and data loss prevention.
with reducing the negative impact of the incident. Note information can be
electronic or physical, tangible or intangible. Understand that data, applications, and computers are spreading far beyond
what is traditionally thought of as a computer. Smartphones, tablets and other
While the primary focus of any information security program is protecting the mobile devices are as much of a computer as a server or mainframe and are
confidentiality, integrity and availability (the CIA triad) of information, maintaining susceptible to malicious cyber attacks that can facilitate access to sensitive
organizational productivity is often an important consideration information, critical information, or information assets.
This has led the information security industry to specific best-practice standards This, paired with the increasing amount of data breaches, has led for increased
in the following areas: demand for sophisticated data protection planning and growing demand
for cybersecurity professionals (especially in healthcare) to understand
Information security policies, information security.
Password strength A growing number of information security certifications are available and
Access controls employers often prefer employees with certification that validates knowledge of
Multi-factor authentication best practices.
Antivirus software, firewalls There are broad certifications like the Certified Information Systems Security
Cryptography Professional (CISSP), and specific ones that cover information assurance,
Legal liability
network security, security testing, business auditing, business continuity
planning, security testing, incident response planning, identity theft, risk
Security awareness assessments, intrusion detection systems, security breaches, and all other
Information security is achieved through a structured risk management security measures.
process that:
Common roles that required expertise in information management include IT
Identifies information, related assets and the threats, vulnerability and chief security officer (CSO), chief information security officer (CISO), security
impact of unauthorized access engineer, information security analyst, security systems administrator and IT
Evaluates risks security consultant.
Makes decisions about how to address or treat risks i.e. avoid, What are information security threats?
mitigate, share or accept
When mitigated, selects, designs and implements security controls Threats can come in many forms including software attacks, identity theft,
Monitors activities and makes adjustments to address any new
sabotage, physical theft and information extortion:
issues, changes, or improvements
Types of InfoSec Software attacks on information security include viruses, malware,
worms, ransomware like WannaCry, trojan horses or any malicious
Application security codes that impact the availability of information.
There are many ways to protect against cyber attacks but the number one threat
Cryptography to any organization are its users or internal employees who are susceptible to
social engineering or phishing. This is why cybersecurity awareness training
Encrypting data in transit and data at rest helps ensure data confidentiality and should be integrated into information security management programs.
integrity. Digital signatures are commonly used in cryptography to validate the
authenticity of data. Cryptography and encryption has become increasingly The following free resources can be used for cyber threat awareness training in
important. A good example of cryptography use is the Advanced Encryption the workplace:
Standard (AES). The AES is a symmetric key algorithm used to protect classified
government information. What is a cyber threat?
What is a data breach?
Infrastructure security What is social engineering?
Infrastructure security deals with the protection of internal and extranet networks, What are phishing attacks?
labs, data centers, servers, desktops, and mobile devices. What is clickjacking?
What is typosquatting?
Incident response What is a DDoS attack?
What is Ransomware-as-a-Service (RaaS)?
Incident response is the function that monitors for and investigates potentially How do you respond to information security threats?
malicious behavior.
When a threat has been identified you have a choice:
In preparation for breaches, IT staff should have an incident response plan for
containing the threat and restoring the network. In addition, the plan should Reduce or mitigate the risk by implementing safeguards or
create a system to preserve evidence for forensic analysis and potential countermeasures to eliminate or reduce threats and vulnerabilities
prosecution. This data can help prevent further breaches and help staff discover Assign or transfer the risk to another entity or organization by
the attacker. purchasing insurance or outsourcing
Accept the risk when the cost of the countermeasure is more than the
Vulnerability management possible cost of loss due to a vulnerability or cyber attack
Vulnerability management is the process of scanning an environment for weak With the introduction of the General Data Protection Regulation (GDPR) by
points (such as unpatched software) and prioritizing remediation based on risk. the European Parliament and Council in 2016, the need to respond to information
security breaches has become a regulatory requirement for any business
In many networks, businesses are constantly adding applications, users, operating within the EU. Companies are now required to:
infrastructure, and so on. For this reason, it is important to constantly scan the
network for potential vulnerabilities. Finding a vulnerability in advance can save Provide data breach notifications
your businesses the catastrophic costs of a breach.
Appoint a data-protection officer
Require user consent for data processing
Anonymize data for privacy
This makes a comprehensive incident handling plan and comprehensive data What is a risk assessment?
leak detection a requirement for most global businesses.
Cyber risk assessments are defined by NIST as risks assessments are used to
To support efficient remediation efforts a clear incident response plan needs to identify, estimate, and prioritize risk to organizational operations, organizational
be designed and readily accessible by all security staff. assets, individuals, other organizations, and the Nation, resulting from the
operation and use of information systems.
Learn how to create a reliable disaster recovery plan.
At a high level a cyber risk assessment involves a data audit that answers:
How do you define information security?
There are many ways to define information security but both the National Institute
What data do we collect?
of Standards and Technology (NIST) and the National Information Assurance (IA) How and where are we storing this data?
Glossary define information security as "the protection of information and How do we protect and document the data?
information systems from unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide confidentiality, integrity, and How long do we keep data?
availability." Who has access internally and externally to the data?
How does information security fit in with information risk management? What Does Privacy Mean?
Privacy is the ability to keep certain data and information about yourself exclusive
Information risk management is the process of identifying vulnerabilities and to you and control who and what has access to it.
threats to information resources used by an organization and what if any Think of privacy as owning a smartphone—unencrypted and without a password.
countermeasures should be taken to reduce risk to an acceptable level based on Everyone around you knows who the phone belongs to, but they don’t know
the value of the information value to the organization. what’s on it. If someone goes through your phone without permission, it’s an
invasion of privacy, even if they don't use it to hurt or blackmail you.
There are two main considerations with any risk management process:
When it comes to online privacy, it’s a matter of how much personal information
you can keep to yourself when browsing the internet or using software on any of
1. The process of risk management is ongoing and iterative in nature, it
your devices.
must be repeated indefinitely as new threats and vulnerabilities
Invasion of privacy, in itself, doesn’t cause direct harm to you as an individual.
emerge
But in 1948, the United Nations declared privacy a human right, making some
types of privacy invasions illegal in some countries.
2. The choice of countermeasures or controls used must strike a
balance between productivity, cost, effectiveness, and the information
When to Prioritize Privacy
value of the asset being protected
Make privacy your priority when using apps or services that have access to your
Risk analysis and evaluation have innate limitations because when security personal information such as full name, email address, phone number, location,
etc.
incidents occur, they emerge in context and can come from unpredictable or
unexpected threats like poorly configured S3 buckets or external attackers. You should optimize your experience for privacy when using social media
platforms and apps, messaging and emailing services, and browsers.
The likelihood that a threat will use a vulnerability to cause harm creates risk. In What Does Anonymity Mean?
the context of information security, the impact is loss of confidentiality, integrity, To be anonymous is to hide or conceal your identity, but not your actions. You
or availability or all other possible losses (e.g reputational and financial can be anonymous in the physical world by covering your face and fingerprints.
damages). Note: It's not possible to identify nor mitigate all risks. This remaining In the digital world, you can be anonymous by preventing online entities from
risk is called residual risk. collecting or storing data that could be used to identify you.
Anonymity is important for freedom of speech and particularly for whistleblowers.
What is a threat? That's especially true in areas of the world where having certain viewpoints and
opinions could endanger your safety or put your career and future at risk.
A threat is anything (incidental or deliberate) that could cause potential harm, Anonymity also often overlaps with privacy, allowing you to browse the internet
loss or exposure to an information asset. without worrying about tracking logs. These record your every move and
use collected information to build a profile about you or include you in studies and
What is a vulnerability? statistics you didn’t consent to.
A vulnerability is a weakness or exploit that could cause harm, loss or exposure When to Prioritize Anonymity
to an information asset. Online anonymity is a case-by-case need. Generally, you’d want to be
anonymous anytime you’re doing something you wouldn't want to be traced back
What is risk? to you or your online personas.
It’s important when discussing sensitive topics; whether it’s asking for advice on
Risk is the likelihood that an event could cause harm, loss or exposure to an online forums, expressing fringe political views, or exposing a public person or
information asset. commercial entity's misconduct.
Information Security threats can be many like Software attacks, theft of Social media attacks – In this cyber criminals identify and infect a cluster of
intellectual property, identity theft, theft of equipment or information, sabotage, websites that persons of a particular organisation visit, to steal information.
and information extortion.
Mobile Malware –There is a saying when there is a connectivity to Internet there
Threat can be anything that can take advantage of a vulnerability to breach will be danger to Security. Same goes to Mobile phones where gaming
security and negatively alter, erase, harm object or objects of interest. applications are designed to lure customer to download the game and
unintentionally they will install malware or virus in the device.
Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many
users believe that malware, virus, worms, bots are all same things. But they are Outdated Security Software – With new threats emerging everyday, updation in
not same, only similarity is that they all are malicious software that behave security software is a pre requisite to have a fully secured environment.
differently.
Corporate data on personal devices – These days every organization follows a
Malware is a combination of 2 terms- Malicious and Software. So Malware rule BYOD. BYOD means Bring your own device like Laptops, Tablets to the
basically means malicious software that can be an intrusive program code or a workplace. Clearly BYOD pose a serious threat to security of data but due to
anything that is designed to perform malicious operations on system. Malware productivity issues organizations are arguing to adopt this.
can be divided in 2 categories:
Social Engineering – is the art of manipulating people so that they give up their
1. Infection Methods confidential information like bank account details, password etc. These criminals
2. Malware Actions can trick you into giving your private and confidential information or they will gain
your trust to get access to your computer to install a malicious software- that will
Malware on the basis of Infection Method are following: give them control of your computer. For example email or message from your
friend, that was probably not sent by your friend. Criminal can access your
Virus – They have the ability to replicate themselves by hooking them to the friends device and then by accessing the contact list he can send infected email
program on the host computer like songs, videos etc and then they travel all over and message to all contacts. Since the message/ email is from a known person
the Internet. The Creeper Virus was first detected on ARPANET. Examples recipient will definitely check the link or attachment in the message, thus
include File Virus, Macro Virus, Boot Sector Virus, Stealth Virus etc. unintentionally infecting the computer.
Worms – Worms are also self replicating in nature but they don’t hook Web threats definition
themselves to the program on host computer. Biggest difference between virus
and worms is that worms are network aware. They can easily travel from one Web-based threats, or online threats, are a category of cybersecurity risks that
computer to another if network is available and on the target machine they will may cause an undesirable event or action via the internet.
not do much harm, they will for example consume hard disk space thus slowing
down the computer. Web threats are made possible by end-user vulnerabilities, web service
developers/operators, or web services themselves. Regardless of intent or
Trojan – The Concept of Trojan is completely different from the viruses and cause, the consequences of a web threat may damage both individuals and
worms. The name Trojan derived from the ‘Trojan Horse’ tale in Greek organizations.
mythology, which explains how the Greeks were able to enter the fortified city of
Troy by hiding their soldiers in a big wooden horse given to the Trojans as a gift. This term typically applies to — but is not limited to — network-based threats in
The Trojans were very fond of horses and trusted the gift blindly. In the night, the the following categories:
soldiers emerged and attacked the city from the inside.
Private network threats - impact sub-networks connected to the wider global
Their purpose is to conceal themselves inside the software that seem legitimate internet. Typical examples can include home Wi-Fi or ethernet networks,
and when that software is executed they will do their task of either stealing corporate intranets, and national intranets.
information or any other purpose for which they are designed. Host threats - impact specific network host devices. The term host often refers to
They often provide backdoor gateway for malicious programs or malevolent corporate endpoints and personal devices, such as mobile phones, tablets, and
users to enter your system and steal your valuable data without your knowledge traditional computers.
and permission. Examples include FTP Trojans, Proxy Trojans, Remote Access Web server threats - impact dedicated hardware and software that serve web
Trojans etc. infrastructure and services.
What are web threats? Users are affected when they engage with malicious URLs, downloads, or
provide sensitive info to websites and message senders. This engagement may
Internet-based threats expose people and computer systems to harm online. A also trigger infection and spread of web threats to other users and networks. It’s
broad scope of dangers fits into this category, including well-known threats like not uncommon for innocent users to unknowingly become threat agents
phishing and computer viruses. However, other threats, like offline data theft, can themselves.
also be considered part of this group.
Web threats are not limited to online activity but ultimately involve the internet at How to spot web threats
some stage for inflicted harm. While not all web threats are created deliberately, Despite the unending scope of web-based dangers, it is possible to spot some
many are intended — or have the potential — to cause: general traits of web threats. However, spotting a web threat requires a vigilant
eye to catch subtle details.
Some web threats are clearly of concern to web infrastructure hardware, such as
Access denial. Prevention of entry to a computer and/or network services. water and heat. While those are easier to spot, others require careful attention.
Access acquisition. Unauthorized or unwanted entry into a private computer Any time you are browsing websites and receiving digital messages are when
and/or network services. you should be most cautious.
Unauthorized or unwanted use of computer and/or network services. Here are some tips to guide you:
Exposing private data without permission, such as photos, account credentials,
and sensitive government information.
Unauthorized or undesired changes to a computer and/or network services. Grammar: Malicious actors may not always carefully craft their messages or web
content when assembling an attack. Look for typos, odd punctuation, and
In recent years, the landscape of web threats has grown significantly. unusual phrasing.
Technologies like smart devices and high-speed mobile networks have allowed URLs: Harmful links can be masked under decoy anchor text — the visible text
for an always-connected vector of malware, fraud, and other complications. Also, that’s displayed. You can hover over a link to inspect its true destination.
web adoption in areas like communications and productivity via the Internet of Poor quality images: The use of low-resolution or unofficial images may indicate
Things (IoT) has outpaced user security awareness. a malicious webpage or message.
As we continue to rely more on the web for daily living, it will keep exponentially
rising as an attractive attack option for malicious parties. Convenience and a lack Types of web security threats
of caution around web use are among the top concerns that continue to pose As mentioned previously, web threats typically include human and technical
new risks to privacy and security. manipulation in order to attack. Be aware there tends to be overlap between web
While targets are typically computer-based, human victims ultimately experience threats, and some may occur simultaneously. Some of the most common web
the lasting effects of a web threat. threats may include the following.
A spear-phishing attack led to the breach of numerous celebrity iCloud accounts. Ransomware is a flavor of malware that encrypts your hard drive's files
This breach ultimately resulted in the unauthorized leak of countless private and demands a payment, usually in Bitcoin, in exchange for the decryption
photos from these accounts. key. Several high-profile malware outbreaks of the last few years, such
as Petya, are ransomware. Without the decryption key, it's mathematically
While the attacker was eventually located and prosecuted, the victims are still impossible for victims to regain access to their files. So-called scareware is
suffering from their intimate photos being made public — without their a sort of shadow version of ransomware; it claims to have taken control of
permission. This has become one of the most well-known phishing attacks of the your computer and demands a ransom, but actually is just using tricks like
decade. browser redirect loops to make it seem as if it's done more damage than it
really has, and unlike ransomware can be relatively easily disabled.
How to protect yourself against web threats Cryptojacking is another way attackers can force you to supply them with
Bitcoin—only it works without you necessarily knowing. The crypto mining
Most threats are successful due to two main weaknesses: malware infects your computer and uses your CPU cycles to mine
Bitcoin for your attacker's profit. The mining software may run in the
Human error background on your operating system or even as JavaScript in a browser
Technical error window.
Full protection from web threats means you will need to find ways to cover these
weak points. Malvertising is the use of legitimate ads or ad networks to covertly deliver
malware to unsuspecting users’ computers. For example, a cybercriminal
General tips to follow for both end-users and web service providers include: might pay to place an ad on a legitimate website. When a user clicks on the
ad, code in the ad either redirects them to a malicious website or installs
Always create backups: All valuable data should be copied and stored safely to malware on their computer. In some cases, the malware embedded in an
prevent data loss in case of an incident. Websites, device drives, and even web ad might execute automatically without any action from the user, a
servers can be backed up. technique referred to as a “drive-by download.”
Enable multi-factor authentication (MFA): MFA allows for additional layers of
user authentication on top of traditional passwords. Organizations should enable
this protection for users, while end-users should be sure to make use of it. Any specific piece of malware has both a means of infection and a behavioral
Scan for malware: Regular scans for infections will keep your computer devices category. So, for instance, WannaCry is a ransomware worm. And a particular
secured. Personal devices can all be covered through an antivirus piece of malware might have different forms with different attack vectors: for
solution like Kaspersky Total Security. Enterprise endpoint machines and instance, the Emotet banking malware has been spotted in the wild as both
computer networks should use this protection as well. a trojan and a worm.
Keep all tools, software, and OS up to date: Computer systems are more A look at the Center for Internet Security's top 10 malware offenders for June of
vulnerable when they’ve been unpatched against undiscovered holes in their 2018 gives you a good sense of the types of malware out there. By far the most
programming. Software developers regularly probe for weaknesses and issue common infection vector is via spam email, which tricks users into activating the
updates for this purpose. Protect yourself by downloading these updates. malware, Trojan-style. WannaCry and Emotet are the most prevalent malware on
Service providers like website owners and server operators are where true the list, but many others, including NanoCore and Gh0st, are what's
comprehensive security starts. These parties will need to take precautions for called Remote Access Trojans or RATs—essentially, rootkits that propagate like
better protection. They can do this by: Trojans. Cryptocurrency malware like CoinMiner rounds out the list.
Monitoring web traffic to gauge for normal volumes and patterns. How to prevent malware
Implementing firewalls to filter and restrict unpermitted web connections. With spam and phishing email being the primary vector by which malware infects
Network infrastructure distribution to decentralize data and services. This computers, the best way to prevent malware is make sure your email systems
includes aspects like backups for various resources and geo server rotations. are locked down tight—and your users know how to spot danger.
Internal probing to investigate for unpatched vulnerabilities. This might, for We recommend a combination of carefully checking attached documents and
example, involve self-attacking with SQL injection attack tools. restricting potentially dangerous user behavior—as well as just familiarizing your
Proper security configuration for access rights and session management. users with common phishing scams so that their common sense can kick in.
Users should protect themselves by doing the following: When it comes to more technical preventative measures, there are a number of
steps you can take, including keeping all your systems patched and updated,
Scan downloads for malware. keeping an inventory of hardware so you know what you need to protect, and
Vet links before clicking, only clicking links if you are positive the destination is performing continuous vulnerability assessments on your infrastructure. When it
safe and trusted. comes to ransomware attacks in particular, one way to be prepared is to always
Make strong, secure passwords, and avoid duplicates. Use a secure Password make backups of your files, ensuring that you'll never need to pay a ransom to
Manager to help manage all of your accounts and passwords. get them back if your hard drive is encrypted.
Throttle login attempts by triggering account lockdown after a limited number of
tries. Malware protection
Look out for phishing red flags in texts, email, and other communications. Antivirus software is the most widely known product in the category of malware
protection products; despite "virus" being in the name, most offerings take on all
forms of malware. While high-end security pros dismiss it as obsolete, it's still the
Lesson Proper for Week 4 backbone of basic anti-malware defense. Today's best antivirus software is from
vendors Kaspersky Lab, Symantec and Trend Micro, according to recent tests by
Malware definition
AV-TEST.
Malware, short for malicious software, is a blanket term for viruses, worms,
When it comes to more advanced corporate networks, endpoint security offerings
trojans and other harmful computer programs hackers use to wreak destruction
provide defense in depth against malware. They provide not only the signature-
and gain access to sensitive information. As Microsoft puts it, "[malware] is a
based malware detection that you expect from antivirus, but anti-spyware,
catch-all term to refer to any software designed to cause damage to a single
personal firewall, application control and other styles of host intrusion prevention.
computer, server, or computer network." In other words, software is identified as
Gartner offers a list of its top picks in this space, which include products from
malware based on its intended use, rather than a particular technique or
Cylance, CrowdStrike, and Carbon Black.
technology used to build it.
This means that the question of, say, what the difference is between malware
How to detect malware
and a virus misses the point a bit: a virus is a type of malware, so all viruses are
It's fully possible—and perhaps even likely—that your system will be infected by
malware (but not every piece of malware is a virus).
malware at some point despite your best efforts. How can you tell for
sure? CSO columnist Roger Grimes has written a deep dive into how to diagnose
Types of malware
your PC for potential malware that you might find helpful.
There are a number of different ways of categorizing malware; the first is by how
When you get to the level of corporate IT, there are also more advanced visibility
the malicious software spreads. You've probably heard the words virus,
tools you can use to see what's going on in your networks and detect malware
trojan, and worm used interchangeably, but as Symantec explains, they describe
infections. Most forms of malware use the network to either spread or send
three subtly different ways malware can infect target computers:
information back to their controllers, so network traffic contains signals of
malware infection that you might otherwise miss; there are a wide range of
A worm is a standalone piece of malicious software that reproduces itself
network monitoring tools out there, with prices ranging from a few dollars to a few
thousand. There are also SIEM tools, which evolved from log management
and spreads from computer to computer. programs; these tools analyze logs from various computers and appliances
A virus is a piece of computer code that inserts itself within the code of across your infrastructure looking for signs of problems, including malware
infection. SIEM vendors range from industry stalwarts like IBM and HP Enterprise
another standalone program, then forces that program to take malicious
to smaller specialists like Splunk and Alien Vault.
action and spread itself.
A trojan is a program that cannot reproduce itself but masquerades as Malware removal
something the user wants and tricks them into activating it so it can do its How to remove malware once you're infected is in fact the million dollar question.
Malware removal is a tricky business, and the method can vary depending on the
damage and spread.
type you're dealing with. CSO has information on how to remove or otherwise
recover from rootkits, ransomware, and cryptojacking. We also have a guide
Malware can also be installed on a computer "manually" by the attackers to auditing your Windows registry to figure out how to move forward.
themselves, either by gaining physical access to the computer or using privilege If you're looking for tools for cleansing your system, Tech Radar has a
escalation to gain remote administrator access. good roundup of free offerings, which contains some familiar names from the
Another way to categorize malware is by what it does once it has successfully antivirus world along with newcomers like Malwarebytes.
Malware examples
infected its victim's computers. There are a wide range of potential attack
techniques used by malware: We've already discussed some of the current malware threats looming large
today. But there is a long, storied history of malware, dating back to infected
floppy disks swapped by Apple II hobbyists in the 1980s and the Morris
Spyware is defined by Webroot Cybersecurity as "malware used for the
Worm spreading across Unix machines in 1988. Some of the other high-profile
malware attacks have included:
purpose of secretly gathering data on an unsuspecting user." In essence,
it spies on your behavior as you use your computer, and on the data you
send and receive, usually with the purpose of sending that information to a
ILOVEYOU, a worm that spread like wildfire in 2000 and did more than $15
2- Physical Security:
This layer of security is always an important for many people, and they regularly
billion in damage provide facilities through which they can establish physical security to protect
SQL Slammer, which ground internet traffic to a halt within minutes of its information, in the real world, if you have a valuable object, such as money,
first rapid spread in 2003 jewelry, documents, etc., you maintain this layer of security as fully as possible,
for example, if you leave that valuable object in a safe place, or give it to
Conficker, a worm that exploited unpatched flaws in Windows and someone who you trust, you are not worried about protecting them.
leveraged a variety of attack vectors – from injecting malicious code to The same thing is also true for computers, generally, physical security is defined
phishing emails – to ultimately crack passwords and hijack Windows as the protection of hardware and software components, networks, and data from
devices into a botnet. natural physical conditions and events, which may cause serious damage to an
organization and the information contained in them, in other words, physical
Zeus, a late '00s keylogger Trojan that targeted banking information security includes all measures to protect all hardware, information and software
CryptoLocker, the first widespread ransomware attack, whose code keeps
available against theft, natural disasters, etc., in order to achieve this kind of
security, you must pay attention to some tips which help you keep your
getting repurposed in similar malware projects information safe.
Stuxnet, an extremely sophisticated worm that infected computers
worldwide but only did real damage in one place: the Iranian nuclear facility There may be different tips about the ways of establishing this layer
of security which are different from each other, to establish this layer of security,
at Natanz, where it destroyed uranium-enriching centrifuges, the mission it
you may choose a safe room with CCTV cameras, or restrict the access of
was built for by U.S. and Israeli intelligence agencies different people to this room, which can also help you in protecting important
information and other solutions that exists to ensure you that physical security is
Malware trends set up properly, it should also be noted that different there are different threats for
You can count on cyber criminals to follow the money. They will target victims this section, including, abnormal weather conditions, pouring coffee on the
depending on likelihood of delivering their malware successfully and size of computer, people who target your information, etc., to establish security for each
potential payout. If you look at malware trends over the past few years, you will of these threats, certain principles are required.
see some fluctuation in terms of the popularity of certain types of malware and
who the most common victims are—all driven by what the criminals believe will 3- Secure Networks and Systems:
have the biggest ROI. This layer of security is very widespread, which includes all measures,
Recent research reports indicate some interesting shifts in malware tactics and equipment, etc., which cause the security of the system and the network to be
targets. Cryptominers, which had surpassed ransomware as the most common integrated,m and prevent any threatening factors from entering your system, and
type of malware, are falling out of favor due to the decline in cryptocurrency ultimately provide security for you.
values. Ransomware is becoming more targeted, moving away from a shotgun
approach. Network security has 3 types, which we are going to discuss in the
following.
Malware attacks on businesses spike
Businesses saw a 79 percent increase in the amount of malware they dealt with · Physical Network Security:
in 2018 over 2017, according to the Malwarebytes Labs State of Malware Report This type of network security control is to protect information and prevent illegal
2019. “What we usually see year-end or quarterly end is that there has been access to the system.
some sort of increase or large amounts of detections on the consumer side,”
says Adam Kujawa, director of Malwarebytes Labs. “On the business side it · Technical Network Security:
might slowly grow, but certainly nothing like we’ve seen this last six months.” By This type is so important and protects all the data that is in the computer,
comparison, consumer detections decreased by 3 percent over the same period. including the one that is being transferred from the computer or the data that is
“We’ve observed that there is a significant push by cyber criminals to move away entering the computer, in order to establish the security of this layer, you must
from consumers and put their really heavy stuff against businesses instead,” pay attention to many points.
Kujawa adds.
That “really heavy stuff” comes largely in the form of older consumer-focused · Administrative Network Security:
malware that’s “been weaponized” to become a bigger, more versatile threat for As you know, the behaviors of users who have access to information, cannot be
business. Kujawa cites Emotet as one of the most significant. “It’s a nasty little controlled, and you must provide facilities in advance, so that you can prevent
information stealing Trojan that also installs additional malware, spreads laterally, any event that affects the security structure of the network, one of the things that
and acts as its own spam sender. Once it infects a system, it starts sending email can be done in this section, is restricting people's access to all information, which
and tries to infect other people.” is an effective way to prevent a series of unfortunate events.
Emotet has been around since 2014 and targeted mainly consumers. Originally,
it infected a computer looking for an individual’s financial or credit card In general, in this layer of security , you can do the following:
information to steal. Since then, it’s picked up new capabilities inspired by or · Network Access Control
borrowed from other successful malware like Wannacry or EternalBlue. “Now it’s · Antivirus and Antimalware Software
become much more modular and we see it able to use these exploits to traverse · Firewall Protection
through a corporate network whereas before they were limited to a single · Virtual Private Networks
endpoint,” says Kujawa. “Even if it’s a small network in a small business, it’s
more juicy than infecting Grandma.” 4- Vulnerability Programs:
Lateral movement of malware is increasing, according to the Global Threat Despite the spread of cyber attacks and loss of information which they cause,
Report: The Year of the Next-Gen Cyberattack from Carbon Black. Nearly 60 and the daily progress of hackers, security layers have received more attention
percent of malware attacks on business are now designed to move laterally from users, and they try to study and search in this field to have control over each
across a network. layer and implement all the necessary strategies to protect their information,
One reason for the spike in malware attacks on business might be the hackers are constantly scrutinizing the weaknesses of a system and use these
EU’s General Data Privacy Regulation (GDPR). Kujawa believes it’s possible that weak points to attack the system and its information, so they get their desired
attackers stepped up business attacks thinking that it would be harder to steal results through them.
personal and other data after the regulation went into effect. That combined with In this layer of security, you must pay more attention to the vulnerabilities of a
the decline of cryptocurrency values and stepped up defenses against system, all of these weak points have to be identified through various tools, then
ransomware turned attackers to what worked in the past. “They always [go back you should try to do your best to solve the problem because that weak points
to what works],” he says. “Cyber crime is cyclical. It always comes back around.” must be strengthened in order to increase security in general, so you
can improve your system security by paying attention to all points.
Cryptomining attacks decline
The Malwarebyte Labs report has seen a shift away from cryptomining starting in 5- Strong Access Control Measures:
the second quarter of 2018, due largely to the decline in cryptocurrency values. This layer of security has a great impact on establishing security in general, and
Still, the number of cryptomining detections increased for the year by 7 percent. all the actions that are taken in this layer, ultimately, are aimed at controlling
Instead, cyber criminals are turning to information stealing malware like Emotet to people's access to information, to achieve this goal, various solutions can be
turn a profit. “Overall, it seems as though criminals have reached the consensus taken, including the solution of setting passwords which are hard to be guessed,
that sometimes stealing is better than mining,” the report stated. which should include more than 8 characters, so it is hard for people to guess
this password, as a result they cannot access your information easily.
Ransomware becoming more targeted This layer of security contains the following 3 types:
Kujawa notes that small and medium-sized businesses (SMBs) are becoming · Discretionary Access Control (DAC)
more popular targets. He attributes this to the likelihood of being paid for · Managed Access Control (MAC)
ransomware attacks—SMBs often can’t afford the downtime and see paying · Role-Based Access Control (RBAC)
ransom as the fastest way to recover. They also often softer targets than larger
businesses. 6- Protect and Backup Data:
Ransomware detections actually declined by 26 percent worldwide in 2018, This layer of security helps you to have no worries about the stored information,
according to the Malwarebytes report. However, ransomware detections at and it is constantly recommended in this layer to provide backup information, so
businesses rose by 28 percent. Industries most often targeted were consulting, that in case of unexpected events, your information won’t be damaged and will
education, manufacturing and retail. Kujawa believes criminals focus on these be protected as much as possible, there are a number of ways you can get help
industries because of opportunity and likelihood of ransoms being paid. from them in order to implement this layer properly, including keeping information
in a safe place other than the current information system that helps you maintain
7 LAYERS OF SECURITY your information safe. It should be noted that it is necessary to establish the
Security is an important factor for people all over the world due to the existence security for the information from which you have made a backup.
of important information which may be stored on the computer or any other
system, so you have to provide different facilities to protect this information and 7- Monitor and Test Your Systems:
not allow others to access it, in the world of computers, security has many In this layer, you should review all the actions you have taken and examine all
details, and to understand each of them, at the beginning, you need to be fully the aspects, so that you can identify the possible dangers that threaten your
aware of the computer in general, so that you can maintain the security of your information and system, in general, the system monitoring process helps you
site better, security has 7 layers, which we will discuss in the following. solve these problems and does not allow a problem to occur, which causes
damage to your system or loss of your information.
1- Information Security Policies: To implement this layer, there are various tools which will help you achieve your
One of the main layers of information security is Information Security Policies, goal, some of which we are going to mention in the following section.
which gives users the assurance that you give a value to their information and do · SolarWinds Server and Application Monitor
your best to protect them, the security plans for people who want to protect · NinjaRMM
information must be prearranged and should have a step-by-step process to · PRTG - OpManager by ManageEngine
strengthen the security of your site. · OpenNMS
In general, information security policies reflect the thoughts of the media and · WhatsUp Gold
show all their efforts to protect information, through this layer of security , · OpenNMS
information can be secured against all existing threats.
This layer of security has 3 main types that we will mention in the
following:
- Organizational (or Master) Policy
- System-specific Policy
- Issue-specific Policy
manage who has access to the information they need in your workspace.
Manage email display
Members can find each others' email addresses in their profiles, but some people
may prefer to keep this info private. Workspace Owners and Admins can choose
if members’ email addresses are displayed in their Slack profiles.
Finally, malware protection needs to be usable. Effective antivirus software must · Select only those countermeasures that meet percuived needs as
be simple to download and install, so you don't need to be a Ph.D. in computer indentified during risk assessment and support security policy.
science in order to use it. Look for antivirus software solutions that have the
characteristics outlined above — and follow through by installing it. · Maximize structural protection: A secure room should have full height walls
and fireproof ceilings.
Robust malware protection specifically guards your finances. These tools
safeguard your account information, and can also provide password- · Minimize external access (doors): A secure room should only have one or
management tools so that frustration over forgotten passwords does not lead you two doors--they should be solid, fireproof, lockable, and observable by assigned
to skip over this essential component of protection. security staff. Doors to the secure room should never be propped open.
No protection is absolute. But a combination of personal awareness and well- · Minimize external access (windows): A secure room should not have
designed protective tools will make your computer as safe as it can be. excessively large windows. All windows should have locks.
Workspace security · Maintain locking devices responsibly: Locking doors and windows can be
an effective security strategy as long as appropriate authorities maintain the keys
Each group you add to a workspace can have vastly different permissions than and combinations responsibly. If there is a breach, each compromised lock
others. You can also copy an existing group’s permissions to save time on should be changed.
configuring them.
· Investigate options other than traditional keyhole locks for securing areas
Limit access to your workspace as is reasonable: Based on the findings from your risk assessment consider
alternative physical security strategies such as window bars, anti-theft cabling
Slack allows for transparency, and sometimes that means sharing proprietary (i.e., an alarm sounds when any piece of equipment is disconnected from the
information or sensitive details. Here are some tips to ensure only the right system), magnetic key cards, and motion detectors.
people have access to information in your workspace:
Recognize that some countermeasures are ideals and may not be feasible
if, for example, your organization is housed in an old building.
Only invite people you know
For total control, keep the default setting to only let Workspace Owners and Be prepared for fire emergencies: In an ideal world, a secure room should be
Admins send invitations to new members. If you do allow others to send protected from fire by an automatic fire-fighting system. Note that water can
damage electronic equipment, so carbon dioxide systems or halogen agents are
invites, review pending and accepted invitations periodically.
recommended. If implemented, staff must be trained to use gas masks and other
protective equipment. Manual fire fighting equipment (i.e., fire extinguishers)
Deactivate members’ accounts who no longer need access should also be readily available and staff should be properly trained in their use.
Change is constant, and people come and go. Don’t forget to deactivate a Maintain a reasonable climate within the room: A good rule of thumb is that if
member’s account when they leave. Workspace Owners on the Business+ and people are comfortable, then equipment is usually comfortable--but even if
Enterprise Grid plans can streamline deactivation with an identity provider people have gone home for the night, room temperature and humidity cannot be
using SCIM provisioning. allowed to reach extremes (i.e., it should be kept between 50 and 80 degrees
Add people from other companies to a channel Fahrenheit and 20 and 80 percent humidity). Note that it's not freezing
To work with external partners who don’t need access to all the information in temperatures that damage disks, but the condensation that forms when they
your workspace, you can use Slack Connect to invite them to channels. This lets thaw out.
you collaborate securely and productively in one centralized place, all from your Be particularly careful with non-essential materials in a secure computer
own workspaces. room: Technically, this guideline should read "no eating, drinking, or smoking
Use guest accounts and limit the channels they're invited to near computers," but it is quite probably impossible to convince staff to
Some members of your Slack workspace (like contractors, interns, or clients) implement such a regulation. Other non-essential materials that can cause
may only need access to certain channels. Guest accounts are a great way to problems in a secure environment and, therefore, should be eliminated include
curtains, reams of paper, and other flammables.
Guard Equipment: Protect Output:
Keep critical systems separate from general systems: Prioritize equipment Keep photocopiers, fax machines, and scanners in public view: These types of
based on its criticality and its role in processing sensitive information. Store it in equipment are very powerful tools for disseminating information--so powerful, in
secured areas based on those priorities. fact, that their use must be monitored.
House computer equipment wisely: Equipment should not be able to be seen or
reached from window and door openings, nor should it be housed near radiators, Assign printers to users with similar security clearances: You don't want
heating vents, air conditioners, or other duct work. Workstations that do not employees looking at sensitive financial information (e.g., staff salaries) or
routinely display sensitive information should always be stored in open, visible confidential student information (e.g., individual records) while they are waiting
spaces to prevent covert use. for their documents to print. It is better to dedicate a printer to the Director of
Protect cabling, plugs, and other wires from foot traffic: Tripping over loose wires Finance than to have sensitive data scattered around a general use printer. Don't
is dangerous to both personnel and equipment. hesitate to put printers in locked rooms if that is what the situation demands.
Keep a record of your equipment: Maintain up-to-date logs of equipment
manufacturers, models, and serial numbers in a secure location. Be sure to Label printed information appropriately: Confidential printouts should be clearly
include a list of all attached peripheral equipment. Consider videotaping the identified as such.
equipment (including close-up shots) as well. Such clear evidence of ownership
can be helpful when dealing with insurance companies. Demand suitable security procedures of common carriers when
Maintain and repair equipment: Have plans in place for emergency repair of shipping/receiving confidential information: Mail, delivery, messenger, and courier
critical equipment. Either have a technician who is trained to do repairs on staff or services should be required to meet your organization's security standards when
make arrangements with someone who has ready access to the site when repair handling your confidential information.
work is needed. If funds allow, consider setting up maintenance contracts for
your critical equipment. Local computer suppliers often offer service contracts for Dispose of confidential waste adequately: Print copies of confidential information
equipment they sell, and many workstation and mainframe vendors also provide should not be placed in common dumpsters unless shredded.
such services. Once you've set up the contract, be sure that contact information
is kept readily available. Technical support telephone numbers, maintenance Electronic Mail Policy
contract numbers, customer identification numbers, equipment serial numbers,
User Responsibilities
and mail-in information should be posted or kept in a log book near the system
for easy reference. Remember that computer repair technicians may be in a
These guidelines are intended to help you make the best use of the electronic
position to access your confidential information, so make sure that they know
mail facilities at your disposal. You should understand the following:
and follow your policies regarding outside employees and contractors who
access your system.
The agency provides electronic mail to staff to enable them to communicate
effectively and efficiently with other members of staff, other companies, and
partner organizations.
Rebuff Theft:
When using the agency's electronic mail facilities you should comply with the
Identify your equipment as yours in an overt way: Mark your equipment in an
following guidelines.
obvious, permanent, and easily identifiable way. Use bright (even fluorescent)
paint on keyboards, monitor backs and sides, and computer bodies. It may
If you are in any doubt about an issue affecting the use of electronic mail, you
decrease the resale value of the components, but thieves cannot remove these
should consult the IT Services Manager.
types of identifiers as easily as they can adhesive labels.
Any breach of the agency's Electronic Mail Policy may lead to disciplinary action.
Losing a computer to theft has both financial costs (the replacement value
of the equipment) and information costs (the files contained on the hard DO
drive).
Do check your electronic mail daily to see if you have any messages.
Identify your equipment as yours in a covert way: Label the inside of equipment Do include a meaningful subject line in your message.
with the organization's name and contact information to serve as powerful Do check the address line before sending a message and check you are
evidence of ownership. sending it to the right person.
Do delete electronic mail messages when they are no longer required.
Make unauthorized tampering with equipment difficult: Replace regular body
Do respect the legal protections to data and software provided by copyright
case screws with Allen-type screws or comparable devices that require a special
and licenses.
tool (e.g., an Allen wrench) to open them.
Do take care not to express views that could be regarded as defamatory or
libelous.
Limit and monitor access to equipment areas: Keep an up-to-date list of
Do use an "out of the office assistant" to automatically reply to messages
personnel authorized to access sensitive areas. Never allow equipment to be
when you are not available.
moved or serviced unless the task is pre-authorized and the service personnel
DO NOT
can produce an authentic work order and verify who they are. Require picture or
other forms of identification if necessary. Logs of all such activity should be
Do not print electronic mail messages unless absolutely necessary.
maintained. Staff should be trained to always err on the cautious side (and the
Do not expect an immediate reply; the recipient might not be at their computer
organization must support such caution even when it proves to be inconvenient).
or could be too busy to reply straight away.
Do not forward electronic mail messages sent to you personally to others,
Laptops and other expensive equipment that leave the office often never
particularly newsgroups or mailing lists, without the permission of the
return.
originator.
something you should do (icon) Do not use electronic mail for personal reasons.
Do not send excessively large electronic mail messages or attachments.
Attend to Portable Equipment and Computers: Do not send unnecessary messages such as festive greetings or other
nonwork items by electronic mail, particularly to several people.
· Never leave a laptop computer unattended: Small, expensive things often Do not participate in chain or pyramid messages or similar schemes. Do not
disappear very quickly--even more quickly from public places and vehicles! represent yourself as another person.
Do not use electronic mail to send or forward material that could be construed
Store laptop computers wisely: Secure laptops in a hotel safe rather than a hotel as confidential, political, obscene, threatening, offensive, or libelous.
room, in a hotel room rather than a car, and in a car trunk rather than the back
seat. Network Security
Stow laptop computers appropriately: Just because a car trunk is safer than its
back seat doesn't mean that the laptop won't be damaged by an unsecured tire Network security, especially as it relates to the biggest network of all, the
jack. Even if the machine isn't stolen, it can be ruined all the same. Stow the Internet, has emerged as one of today's highest-profile information security
laptop and its battery safely! issues. Many education organizations have already connected their computing
Don't leave a laptop computer in a car trunk overnight or for long periods of resources into a single network; others are in the process of doing so. The next
time: In cold weather, condensation can form and damage the machine. In warm step for these organizations is to weigh the costs and benefits of opening a
weather, high temperatures (amplified by the confined space) can also connection between their private networks (with their trusted users) and the
damage hard drives. unknown users and networks that compose the Internet.
Policy Issues
Regulate Power Supplies:
Connecting to the Internet doesn't necessarily raise its own security policy issues
· Be prepared for fluctuations in the electrical power supply: as much as it focuses attention on the necessity of implementing security
strategies properly. Internet security goals fall within two major domains. The first
Do so by (1) plugging all electrical equipment into surge suppressors or electrical centers around protecting your networks, information, and other assets from
power filters; outside users who enter your network from the Internet. The second deals with
safeguarding information as it is being transmitted over the Internet.
and (2) using Uninterruptible Power Sources (UPSs) to serve as auxiliary
electrical supplies to critical equipment in the event of power outages Protect Your Network from Outsiders:
Pay attention to the manufacturer's recommendations for storing portable Implement applicable security recommendations as raised in previous
computer batteries--they carry live charges and are capable of igniting fires if not chapters: Solid defense against external Internet threats includes the proper
handled properly. implementation of relatively straightforward security measures
like encryption software, virus scanners , remote access regulations,
· Protect power supplies from environmental threats: Consider having a and passwords.
professional electrician design or redesign your electrical system to better Isolate your network through the use of a firewall: Installing a firewall enables
withstand fires, floods, and other disasters. the organization to decide which types of messages should be allowed into
the system from external sources (e.g., "nothing with identifiable virus coding"
· Select outlet use carefully: Although little thought generally goes into and "nothing with decryptor coding structures"). The actual installation and
plugging equipment into an outlet, machines that draw heavily from a power operation of the complex features requires expert technical assistance, but
source can affect, and be affected by, smaller equipment that draws energy from policy-makers can make informed decisions about product features all the same.
the same outlet. Locate equipment and information that is intended for external users outside of
the firewall: If an organization's Web server is intended to provide information
· Guard against the negative effects of static electricity in the office place: and services to the public, it should not be located on the private side of the
Install anti-static carpeting and anti-static pads, use anti-static sprays, and firewall. Nor should it be able to access confidential information that resides
encourage staff to refrain from touching metal and other static-causing agents inside the firewall. This way, if the public Web server should ever be
before using computer equipment. compromised, confidential information is still protected.
Protect Transmissions Sent over the Internet:
Use Secure Sockets Layer (SSL) Servers to secure financial and information
transactions made with a Web browser: In a secure Web session, your Web
browser generates a random encryption key and sends it to the Web site host to
be matched with its public encryption key. Your browser and the Web site then
encrypt and decrypt all transmissions.
Authenticate messages through the use of digital signatures: A digital
signature amounts to a "fingerprint" of a message. It depicts the message such
that if the message were to be altered in any way, the "fingerprint" would reflect
it--thus making it possible to detect counterfeits. The converse, of course, is that
if the "fingerprint" does not change during transmission, you can be confident that
the message was not altered.
Authenticate messages through the use of time stamps or sequence
numbers: Another way to recognize when messages have been modified is to
challenge the "freshness" of the message. This is done by embedding time
stamps, sequence numbers, or random numbers in the message to indicate
precisely when and in what order the message was sent. If a received message's
time and sequence are not consistent, you will be alerted that someone may
have tampered with the transmission.
Authenticate message "receivers" through the use of digital certificates: By
requiring an authentication agent or digital certificate, you force the person on the
other end of the transmission to prove his or her identity. In the digital world,
trusted third parties can serve as certificate authorities--entities that verify who
a user is for you. In this way, digital certificates are analogous to a state-issued
driver's license. If you trust the party that issues the certificate (e.g., the state or
the certificate authority), then you don't need to try to verify who the user is
yourself.
Encrypt all messages sent over the Internet: As more and more messages are
sent over larger and larger networks, information becomes increasingly
vulnerable to assault. Encryption has become a leading tool to combat
this vulnerability. Like other countermeasures, it can be very effective if used
properly and regularly