Assignment One PRSE6212
Assignment One PRSE6212
Question One
The importance of information security in any organization could be seen as extremely
important, this is so because in many cases organization’s store their client’s personal
information, such as their ID number, bank card number and the list goes on. It is extremely
vital for organizations, more so banking institutions to safeguard this information and
ensure information security is put in place, there are several reasons as to why information
security is important and I will be mentioning them down below:
Protection of personal data- Different encryption techniques are used by banks to protect
their systems. They have AES, which is used to encrypt data while it is in transit and at rest.
Solutions for full disk encryption are also frequently employed to safeguard data that
organizations store. Asymmetric cryptography, sometimes known as public and private key
approaches, offers an additional choice. The same is done with various other organizations,
however banks in general place first priority on protecting their client’s information by
implementing the above techniques to ensure information security is being put in place.
(Investopedia, n.d).
Business Continuity - Business continuity is the process of creating a plan to handle
challenging circumstances so that your company can continue to run smoothly. You need to
know how to continue operating regardless of the situation, whether you run a corporation,
a public sector institution, charity or even a bank. Now in context of a banking institution, by
implementing information security and safeguarding important sensitive information, in the
event of a cyber-attack occurring, the bank will not encounter much problems due to its
sensitive information being secure. (BCI, 2018).
Reputation and trust - Security and trust are crucial in the financial sector. Banks play a
crucial role in guaranteeing the integrity and stability of the financial system as the
organizations in charge of protecting people's hard-earned money. Background checks are
an important technique used by banks to do this. The banking industry can reduce risks,
adhere to rules, and keep the trust of its clients by undertaking extensive checks on people
and companies, people would not want to have any dealings with a bank that has breached
their sensitive information before or a bank that has a reputation for having several security
glitches, ensuring information security will uplift the reputation of any organization or bank.
(www.linkedin.com, n.d).
Third party risks- Banks frequently need to give outside parties access to sensitive
information, vital systems, and other crucial resources. The largest risk of working with
subcontractors is arguably this one. After all, there's no assurance that your contracted third
party won't abuse their access rights. Hackers may also target your subcontractors in an
effort to access your sensitive data and important systems. This is it is important to ensure
information security to safeguard the banks information just in-case third party companies
have other intentions. (THE IMPORTANCE of THIRD-PARTY VENDOR RISK MANAGEMENT for
the BANKING INDUSTRY, n.d.)
Online Banking- Online banks take a number of security measures, such as FDIC insurance,
data encryption, multi-factor authentication, and others, to protect your money, utilize the
FDIC's database to ascertain a bank's legitimacy. Online banking has been the new go-to for
many people, however banks in general have gone the extra mile to ensure information
security on their banking webisite’s or apps , ultimately to ensure no information is
breached. (Admin, 2023).
Question Two
Delivery Method - Computer viruses typically spread by malicious web downloads,
corrupted email attachments, or by connecting contaminated devices, like a USB flash drive.
As long as the virus can evade detection by antivirus software, it can spread through nearly
any means of file sharing. Now essentially the delivery method would best describe as to
how a virus would be passed on. (www.cisa.gov, 2023).
A good example of this occurring is the “ILOVEYOU” virus that spread through email’s being
received and sent in the 2000’s. (Dataprot. N.d).
Behaviour- Another characteristic of malware would be to disguise itself as a rather
harmless file, we could look at TROJAN virus attacks. Essentially Trojan’s would disguise
itself as a harmless application, however when the file is opened, it will immediately launch
a virus attack within the user’s pc. (Fortinet, n.d).
A good example of a Trojan attack would be Zeus Trojan attack, zeus malware can grant
attackers complete access to compromised computers. Many variants of the Zeus virus can
also be used to add CryptoLocker ransomware to an operating system or add infected
computers to a botnet to carry out distributed denial-of-service (DDoS) attacks, whereas the
original Zeus variant primarily used man-in-the-browser keyloggers to obtain access to an
infected computer's banking credentials and other financial information. (Crowdstrike.com,
2023).
Adware- Also known as advertisement software, this is essentially will constantly spam
unwanted and unneeded adverts to user’s computer, at best this is annoying however this
can contribute towards a slower computer performance especially amongst lower-range
computers. (Malwarebytes, n.d).
A good example of adware could be adware in the form of spam, basically user’s would
receive several unwanted emails via an email service. (Malwarebytes, n.d).
Propagation Mechanism- Over here we’re going to specifically look at a computer worm
virus attack, a computer worm is a subset of Trojan horse malware that, once infiltrating a
system, can spread or self-replicate from one computer to another without human
activation. Worms are generally spread through email. (Malwarebytes, 2023).
A good example of a worm virus attack would be the “Slammer” this was a worm attack that
occurred in 2003, a swiftly moving worm was able to momentarily shut down a large portion
of the Internet. Some nations believed the threat to be a coordinated attack against them
because it was so hostile. (News, n.d).
Question Three
Cross Site Scripting- Malicious scripts are injected into otherwise trustworthy and innocent
websites in Cross-Site Scripting (XSS) attacks. XSS attacks take place when an attacker sends
malicious code, typically in the form of a browser side script, to a separate end user using an
online application. These attacks can be successfully conducted everywhere a web
application incorporates user input without verifying or encoding it into the output it
produces. (B, 2020).
SQL Injection- SQL injection, sometimes referred to as SQLI, is a popular attack method that
use malicious SQL code to manipulate backend databases and access data that was not
meant to be displayed. Any number of things, such as private customer information, user
lists, or sensitive corporate data, may be included in this data. (imperva, 2022)
Command Injection- An attack known as "command injection" aims to use a weak
application to execute arbitrary commands on the host operating system. When an
application sends unsecured user-supplied data (forms, cookies, HTTP headers, etc.) to a
system shell, command injection attacks are conceivable. In this attack, the vulnerable
application's privileges are typically used to execute the operating system commands
supplied by the attacker. Attacks using command injection are largely made possible by
inadequate input validation. (Zhong, nd.d).
Data Transversal- Running a secure web server depends on properly regulating access to
web content. An HTTP attack known as directory traversal, sometimes known as path
traversal, enables attackers to enter password-protected directories and run commands
outside of the web server's root directory. As a result, hackers can now readily access
sensitive data and have the ability to fully shut down that website. (Acunetix, 2019).
DDos Attack- A distributed denial-of-service (DDoS) attack is a malicious attempt to obstruct
the regular flow of traffic on a targeted server, service, or network by saturating the target
or its surrounding infrastructure with an excessive amount of Internet traffic. In the end, this
could result in unauthorized access to the web server's directory and its sensitive data, and
at the same time, the server might go completely offline for a period. (Cloudfare, 2022).
Question Four
There are many ways in which local South African businesses can protect their businesses
OS from being hacked, I am going to mention them down below:
Ensure that the OS is constantly up to date: It is extremely important to keep your software
updated to take advantage of new features, patch security holes, add additional security
features, address bugs, and boost device performance, by doing so you make it hard for
evolving malware to enter the OS system of your business. ( Trevino, 2023).
Endpoint Security - Endpoint security is the process of guarding against dangerous threats
and online attacks on gadgets like desktops, laptops, mobile phones, and tablets.
Technology for endpoint security is essential for shielding enterprises from the perilous
threat landscape. We need to remember that endpoint security will protect the businesses
entire device spectrum and not just one device, this is crucial as many businesses in SA rely
on multiple devices to run the business. (Fortinet, n.d)
Strong Passwords - It is crucial to have a strong password since it prevents unauthorized
access to your critical personal data. Hackers and cybercriminals employ a variety of
techniques, such as dictionary attacks, brute force attacks, and social engineering, to break
weak passwords. Hackers exploit weak passwords and we should encourage upcoming
smaller businesses within mainly townships to implement this strategy as many of them rely
solely on one computer or device. (University, 2023).
Use Firewalls - A firewall is a type of network security device that keeps track of incoming
and outgoing network traffic and makes decisions about which traffic to allow or deny in
accordance with a set of security rules. Firewalls will be able to detect any malicious file that
is trying to make its way to the network or the operating system, therefore safeguarding
your businesses operating system. (Cisco, n.d).
Install antivirus software - Antivirus software stops malware from harming your device by
identifying, containing, and/or destroying dangerous code. Modern antivirus programs
automatically update themselves to offer protection against the most recent viruses and
malware. This will work wonders if the business solely relies on one device only , however if
there are there is no harm in installing anti-virus programmes individually on each device
even if there is endpoint security. (www.ncsc.gov.uk, n.d).
Question Five
Let’s start off with talking about the security zones, a section of a network with unique
security needs is known as a security zone. A security policy is applied to a single interface or
a collection of interfaces that make up each zone. Usually, a layer 3 device like a firewall is
used to divide these zones. Now businesses in South Africa could for sure implement this to
minimize the chance of getting attacked by hackers, however in order for businesses to
make use of security zones correctly, they would need to divide the security zones into
three sections, let me talk about them below: (Kwtrain, 2018).
The Trusted Zone- This zone is the most crucial of them all. Over here extremely important
and sensitive information will be kept here, this means that the public would not be able to
gain any form of access to this zone. This zone will also consist of physical assets such as
work-printers, computers, physical files and so on. Devices that are within this zone will be
connected privately to the businesses network. (Kwtrain, 2018).
The Untrusted Zone – Essentially over here this zone will be specifically for the general
public, which means that anyone can access this part of the business through the internet. A
good example could be a local clothing store which will have its items on display and on sale
over here, in which the public can interact with the clothing store’s website. (Kwtrain, 2018).
The Demilitarized Zone - Resources in the DMZ require access from the outside zone in
order to be used. Public-facing servers, such as email, web, or application servers, are
frequently seen in the DMZ. These resources can be accessed by the general public through
a DMZ without endangering the private, inside zone resources. (Kwtrain, 2018).
By local businesses implementing Security Zones this will in turn drastically lower the
amount of cyberattacks our local South African businesses face yearly.
Question Six
There’s several ways in which South African Businesses can manage their network platforms
to protect their network systems, let me mention the various ways they can do so:
Apply Access Control to the network - Three crucial cyber security concepts—
authentication, authorization, and access control—are frequently misunderstood and used
interchangeably. It can be because the end user typically views all three as a single process,
but it is crucial to recognize the differences while developing the security architecture. This
will ensure that unauthorised user’s will not gain access to important information within the
network platforms. (www.logsign.com , n.d).
Security Testing - Software testing that identifies system flaws and establishes whether the
system's data and resources are secure from potential hackers is known as security testing.
It makes sure that the software system and application remain secure and unaffected by any
dangers or threats that could result in harm. This is often over-looked however this is so
important, security testing will pick out loopholes and allow the developers to patch all that
is wrong. More South African businesses should make use of this software. (geeksforgeeks,
2019).
Encryption - Encryption, at its most basic level, is the process of securing information or data
by utilizing mathematical models to jumble it in a way that only those with the key to unlock
it can access it. Using encryption methods to protect data is one of the most common and
easiest ways to safeguard the businesses data from hackers and malware. This could be
seen as one of the cheapest solutions for local businesses to protect their information from
cyber-attacks. (Google cloud, n.d).
User-Training - The process of educating people to recognize, comprehend, and prevent
cyber risks is known as security awareness training. The ultimate objective is to avoid or
minimize harm to the organization and its stakeholders while lowering the risk posed by
human cyber activity. This could be seen as crucial especially amongst new upcoming
businesses locally, this will prepare them well in the event of a cyber-attack happening.
(Cybsafe, 2023).
Regular security audits - A security audit, also known as a cybersecurity audit, is a thorough
evaluation of the information systems within your company. Typically, this evaluation
compares the security of your information systems to a checklist of industry best practices,
externally established standards, and/or governmental regulations. Once again, a security
audit could prove beneficial in many businesses around South Africa. (auditboard, 2021).
Question seven
Collision Attack - On the other hand, a collision attack identifies two identical values among
elements picked from a finite set S using some distribution. In cryptography, a uniform
distribution of the objects is often assumed to be used. A repeated value or collision
typically leads to an attack on the cryptographic system, the ultimate goal of a collision
attack is two find two different input that produces the same hash output. A hacker would
take advantage of his/her finding and would often replace the original data files with a
malicious file without changing the hash value. (Preneel, 2011).
In South Africa many services and institutions rely on electronics to operate as normal, if
hacker’s were to exploit the algorithms of these systems then sensitive information could be
exposed and that could be seen as a criminal act as mentioned in the extract.
Question eight
Use Strong Encryption Algorithms - Strong cryptography or cryptographically strong are
phrases used to refer to cryptographic algorithms that, when implemented properly, offer a
very high often unsurmountable level of protection against any listener, including the
government agencies. The line separating strong cryptography from (breakable)
cryptography is not well defined. For practical purposes, the security strength of strong
cryptography techniques is typically expressed in terms of the number of bits in the key. For
instance, the US government takes into account any use of symmetric encryption when
regulating the export of encryption. Strong algorithms alongside with strong cryptography
will ensure maximum security of the network security. (Wikipedia , 2022).
Key Management - In a cryptosystem, managing cryptographic keys is referred to as key
management. Dealing with the creation, transfer, storage, use, crypto-shredding
(destruction), and replacement of keys is included in this. The design of cryptography
protocols, key servers, user procedures, and other pertinent protocols are all included. An
effective key management process is essential to a cryptosystem's security. It is the more
difficult aspect of cryptography because, unlike pure mathematical operations that can be
automated, it involves social engineering elements like system policy, user training,
organizational and departmental interactions, and coordination between all of these
elements. Proper key management means that if even if an unauthorised user gains access
of a company he/she will not be able to use that data without the proper keys. (Wikipedia
Contributors, 2019).
Use of VPN’s - By establishing a private web browsing session, a virtual private network
functions. To prevent others from listening in on the user's online activity and the data and
information they communicate while using public Wi-Fi, this is very crucial. A VPN conceals a
user's online activities and location by establishing a secure tunnel between their machine
and the VPN server. Users may safeguard their online privacy and stop their internet service
provider (ISP) from monitoring their surfing behaviour thanks to VPN security. When a
user's device is connected to the VPN server, their internet traffic is then routed through the
VPN provider's internet connection. By concealing browsing data, this makes it more
difficult for malicious parties to compile or keep tabs on a user's online activity. (Fortinet,
n.d).
References:
Fortinet. (n.d.). What Is a Trojan Horse? Trojan Virus and Malware Explained.
[online] Available at: https://www.fortinet.com/resources/cyberglossary/trojan-
horse-virus#:~:text=A%20Trojan%20Horse%20Virus%20is. [Accessed on the 15th
of October 2023].
Dataprot. (n.d.). The ILOVEYOU Virus: What Is It and How To Protect Yourself.
[online] Available at: https://dataprot.net/articles/iloveyou-virus/. [Accessed on
the 15th of October 2023].
News, A.B.C. (n.d.). Top 10 Computer Viruses and Worms. [online] ABC News.
Available at: https://abcnews.go.com/Technology/top-computer-viruses-worms-
internet-history/story?id=8480794. [Accessed on the 15th of October 2023].
Imperva (2022). What is SQL Injection | SQLI Attack Example & Prevention
Methods | Imperva. [online] Learning Center. Available at:
https://www.imperva.com/learn/application-security/sql-injection-sqli/
#:~:text=SQL%20injection%2C%20also%20known%20as. [Accessed on the 15th of
October 2023].
S, K. (2020). Cross Site Scripting (XSS) | OWASP. [online] Owasp.org. Available at:
https://owasp.org/www-community/attacks/xss/. [Accessed on the 15th of
October 2023].
University, E.-C. (2023). The Importance of Strong Passwords and How to Create
Them. [online] Accredited Online Cyber Security Degree Programs | EC-Council
University. Available at: https://www.eccu.edu/blog/technology/the-importance-
of-strong-secure-passwords/#:~:text=a%20strong%20password%3F-. [Accessed
on the 15th of October 2023].
F ortinet. (n.d.). What is Endpoint Security? How Does It Work? [online] Available
at: https://www.fortinet.com/resources/cyberglossary/what-is-endpoint-
security#:~:text=Endpoint%20security%20is%20the%20process%20of
%20protecting%20devices%20like% [Accessed 15 Oct. 2023].
Google Cloud. (n.d.). What is encryption and how does it work? [online] Available
at: https://cloud.google.com/learn/what-is-encryption#:~:text=started%20for
%20free-. [Accessed on the 15th of October 2023].
auditboard (2021). What Is a Security Audit? The Basics You Need to Get Started.
[online] AuditBoard. Available at: https://www.auditboard.com/blog/what-is-
security-audit/. [Accessed on the 15th of October 2023].
Fortinet. (n.d.). VPN Security: How Secure Is It & Do You Need One? [online]
Available at: https://www.fortinet.com/resources/cyberglossary/are-vpns-
safe#:~:text=A%20VPN%20creates%20a%20secure. [Accessed on the 15th of
October 2023].
Fortinet. (n.d.). VPN Security: How Secure Is It & Do You Need One? [online]
Available at: https://www.fortinet.com/resources/cyberglossary/are-vpns-
safe#:~:text=A%20VPN%20creates%20a%20secure. [Accessed on the 15th of
October 2023].