Cybersecurity Essential Guide For
Cybersecurity Essential Guide For
Internet Addresses
There are millions of devices connected to the internet which necessitates some
mechanism that can be used to identify every device connected to the internet
distinctively. Moreover, we also need some centralized approach to take care of this
mechanism so that the symbols used for identifying each device connected to the
internet do not get duplicate; otherwise, the whole purpose will be crushed. To take
care of this, experts have developed a centralized authority identified as Internet
Assigned Numbers Authority (IANA). This authority is responsible for to assign a
unique 32-bit binary number, which is known as IP (Internet Protocol) address. An IP
address is divided into four octets with each of the octets having eight binary digits.
A dot is used to separate these octets. Below mentioned is an example of such an IP
address
11011011.00001000.10111100.10101110
An octet contains 8-bits and can only have two binary values that are 1 and 0. Hence,
the minimum value each octet can have is 0., i.e. 00000000; whereas, the maximum
value an octet can have is 256, i.e. 11111111 (28 = 256).
It is difficult to remember this 32-bit address in binary, therefore, for our better and
easier understanding, it is expressed in a decimal format. Nevertheless, this decimal
format is only for human understanding. The computer only understands it in the
binary presentation, whereas the above IP address is expressed in decimal as
219.8.188.174. These octets are employed to form and different discrete classes.
There are two parts of an IP address, namely, Networ k and Host. The Network
part in IP is used for identifying the network to which it belongs; whereas, the host
part is used for identifying the device of a specific network.
The IP address of a device uniquely identifies different devices connected to the
internet. Its function can be thought of as similar to the postal system where we
identify any specific house by firstly identifying the country, then province/state,
district, post office, block, and finally, the house number. IP addresses have been
classified into five categories based on the availability of IP range. These categories
are as under:
Table 1‑1 IP Address categories
Class / Address range Supports
category
Class A 1.0.0.1 to Provides support to 16 million hosts on
126.255.255.254 each of 127 networks.
Class B 128.1.0.1 to Provides support to 65,000 hosts on each
191.255.255.254 of 16,000 networks.
Class C 192.0.1.1 to Provides support to 254 hosts on each of 2
223.255.254.254 million networks
Class D 224.0.0.0 to This class is reserved for multicast groups
239.255.255.255
Class E 240.0.0.0 to This class is reserved for future use, or
254.255.255.254 Research and Development purposes .
Internet Assigned Numbers Authority (IANA) has the responsibility of assigning the
IP addresses through the allocation of the large chunk of IP addresses to 5 Regional
Internet Registries (RIRs). These registries are, in turn, responsible for allocating the
IP addresses in their respective zones. Below mentioned is the list of these RIRs
along with their area of operations:
i. ARIN- This RIR is responsible for serving North America and several
regions of the North Atlantic and Caribbean islands.
ii. APNIC- This RIR is responsible for serving the Asia Pacific zone.
iii. LACNIC- This RIR is responsible for serving Latin America and the
Caribbean regions
iv. AfriNIC- This RIR is responsible for serving the African zone.
v. RIPE NCC- This RIR is responsible for serving Europe, parts of Central
Asia, and the Middle East.
Internet Infrastructure
As apparent by its name, Internet, is a collection of various small, medium as well as
large networks. This undoubtedly points out one fact, which is that no single body is
the owner of the internet, thereby making it a major proven example of collaborative
success. It is indeed amazing that how such a huge network extended across the
continents is running successfully without any problem. Naturally, we indeed need an
international body for monitoring such a huge network, which can set the rules,
guidelines, and protocols to join and expand this network. Hence, in 1992, an
international organization, famous as “The Internet Society,” was created to take care
of the above-stated concerns.
Let’s take a brief look at the working of the internet. Consider a scenario. We send
an email to our friend who receives it on his/her computer located in another country
or even another continent. While we are working on our computer without connecting
it to the internet, our computer at that instant is a standalone system (Stoica et al.
2002). However, when we connect our computer to the internet using a modem, we
become a part of the network. The Internet Service Provider (ISP) is the link amid
the internet backbone, by the help of which the routing of data to the user takes place.
The ISP is responsible for connecting us to the internet backbone at NetworkAccess
Points (NAP). Various large telecommunication companies provide these Network
Access Points in several regions (DiGiorgio and Bender 2002). Such large
telecommunication companies are in charge of connecting the countries and the
continents through building as well as maintaining the huge support/ backbone
infrastructure to route data from one NAP to another NAP. ISPs are linked to this
backbone infrastructure at NAP and have the responsibility of building and managing
networks locally. Therefore, when we connect our computer to the internet by dialing
through modem, we primarily become part of the local ISP, which further connects us
to the internet backbone via NAP. Through this backbone, our requested data is
routed and delivered to the desired destination NAP, where the ISP of our friend’s
network is sited. The moment when our friend connects his computer to the internet
by dialing through the modem, that data is delivered to his computer.
World Wide Web
We often interchangeably use the terms World Wide Web and internet, or sometimes
we simply use the word ‘web.’ In reality, the web is just one of the numerous
services provided by the internet. Few popular services other than the web provided
by the internet include Usenet, e-mail, FTP, messaging service, etc. To establish
communication over the internet and exchanging information, the web makes use of
HTTP protocol. The web was developed in 1989 at CERN (European de
Researchers Nucleaires), by an English scientist named Tim Berners-Lee. The web
is composed of all the public web sites as well as all the devices which access the
content of the web. As a matter of fact, WWW is an information-sharing model and
has been developed for exchanging information over the internet. Innumerable public
websites consisting of a collection of web pages, are accessible through the internet.
These websites hold abundant information in the form of audios, videos, texts, and
picture format. We access these web pages through an application software known as
a web browser. A few examples of the well-known web browser include Chrome,
Firefox, Safari, Internet Explorer, etc. After having an overview of the cyber world,
now, we will discuss the protection of cyber (internet) connected systems from
cyber-attacks, its importance.
Aspects of Cybersecurity
As the cyber world (internet) is extremely vulnerable to attacks by cybercriminals
and hackers, it is essential to equip our systems with cybersecurity protocols. So
while discussing cybersecurity, one might think that who are we trying to protect
ourselves from?” The answer is that there are three significant aspects we are trying
to control, which include:
i. Unauthorized Access
ii. Unauthorized Modification
iii. Unauthorized Deletion
The terms mentioned above are synonymous with the very popular CIA triad, which
is a model developed to guide policies for the security of information in any
organization. CIA stands for Confidentiality, Integrity, and Availability. We also
commonly refer to the CIA triad as three pillars of security, and the majority of the
security policies of any organization are founded on these three principles.
The CIA Triad
The CIA triad is a model designed to guide the formation of security policies in
organizations and companies. It is sometimes also referred to as the AIC triad to
avoid mix-up with the Central Intelligence Agency (CIA). The three components of
the CIA triad are thought of as the most fundamental and significant components of
security. Let’s have a look at these three components.
The model of CIA triad consisting of Confidentiality, Integrity, and Availability has
been designed and developed to provide guidelines to the organization for the
formation of Cyber Security policies in the territory of Information security
Confidentiality
Confidentiality defines the rules which restrict the access of data/information.
Confidentiality takes on the precautionary actions to limit sensitive data from being
accessed by hackers or cyber attackers.
In any organization, employees are permitted or denied the access of data as per its
type and sensitivity by only granting the right persons access to that data in a
department. Quite often, they are also properly trained about the sharing of data and
securing their accounts by using only strong passwords.
In any organization, the way of handling information can be changed to ensure its
protection. There are different ways to ensure confidentiality, such as Data
encryption, two-factor authentication, biometric verification, data classification, and
security tokens .
Integrity
Integrity guarantees that the data is correct, consistent, and trustworthy over the
period, which means that data must not be illegally accessed, altered, or deleted
within any transit.
In any organization, proper actions need to be taken to ensure the safety of data. Ways
of controlling the breach of information include making use of file permissions and
user access control methods. Moreover, different tools and technologies should be
developed and implemented to detect any illegal alteration or a breach in the data.
Several organizations verify the integrity of their data by using a checksum, or even
cryptographic checksum.
Additionally, there must be regular back-ups to cope with the unexpected loss of data
or any accidental deletion of data or even cyber-attacks. Presently, the most trusted
and popular solution for this is cloud backups.
Availability
The last component of the CIA triad is Availability. All essential constituents, like
software, hardware, devices, security equipment, and networks, should be upheld
and upgraded. This measure will result in uninterrupted operations with convenient
data access. The provision of constant communication among various components
must be ensured by providing sufficient bandwidth.
In case of bottlenecks or disaster situations, availability also includes the
arrangement of surplus security equipment. Utilities such as firewalls, proxy servers,
an appropriate backup solution, and disaster recovery plans must ensure the handling
of DoS attacks .
A successful methodology involves multiple security layers to guarantee the
protection of every component of Cybersecurity. For instance, the protection of
computers, networks, software programs, the data, and hardware systems is essential
for a successful protection methodology.
Need for Cybersecurity
It is an established fact that people in today’s world spend most of their time on the
internet. Most of the internet users are practically unaware of the mechanisms of the
online data transfers, and this is a golden situation for the hackers. With numerous
access points, constant traffic, public IP’s, and availability of enormous data to
exploit, it is quite convenient for the black hat hackers to exploit the vulnerabilities
by making malicious software. Presently, cyber-attacks are growing rapidly with
every passing day. Hackers have become cleverer and more innovative with their
cyber-attacks and how they dodge firewalls and virus scans still amazes a lot of
people.
Considering all the threats and vulnerabilities, all internet users need to possess
countermeasure systems to protect them against the plethora of cyber-attacks. In this
way, we will be able to protect our data from falling into the wrong hands.
Therefore, cybersecurity is essential to safeguard our systems in the vulnerable
world of the internet.
Chapter Two: Introduction to Cyber-crimes
Introduction
Cyber-crime is a type of crime involving the usage of digital technologies in the
commission of a felony, directed to communication and computing technologies. The
contemporary techniques are thriving the use of internet activities, which has resulted
in generating exploitation and has significantly increased susceptibility making an
appropriate manner of transferring intimate data to commit a felony through
illegitimate activity. Illegal activities involve various offenses such as online
transaction theft or fraud, an attack on Information center Data System, internet sale
fraud, child pornography built images and also partaking in positioning malicious
internet activities like email scams, viruses, third party abuse such as phishing, and
worm etc. As per the worldwide approach, the internet must be kept safe from any
illegal or unlawful activity by enforcement of different levels of firewall settings to
monitor and avoid crimes taking place in cyberspace. To avoid the entree of hackers
in networks, different network security controls are employed which includes virtual
private networks (VPNs), firewalls, and various encryption algorithms. Out of these
three, the virtual private network (VPNs) plays a significant part in inhibiting hackers
from gaining access to the networks. These networks deliver such a method to end
users so that they may access information privately on their network through a public
network infrastructure like the internet.
The earliest cyber-crime which was recorded took place in 1820, which is hardly
surprising keeping in mind the fact that the abacus, which is considered to be the most
primitive form of the computer, was invented around 3500 B.C. in Japan, India, and
China. However, the epoch of the latest computers instigated with the advent of the
analytical engine of Charles Babbage.
A textile manufacturer, named, Joseph-Marie Jacquard, produced the loom in France
in the year 1820. This particular device permitted the recurrence of a series of
footsteps in the weaving of distinctive fabrics. This led to generating a fear amid
workers of Jacquard that their conventional employment and income were being
threatened. Consequently, his employees’ started committing acts of sabotage to
dispirit Jacquard from further using the latest technology. This was the first-ever
noted cyber-crime.
Computers of today’s age have come a long way, with the advent of neural networks
and nano-computing devices capable of turning every atom in a glass of water into a
computer having the ability to perform millions of operations every second.
One reason for the rise in cyber-crimes today is the increasing dependence of humans
on computers in this modern era. In a time when everything from cooking stoves and
fridges to huge nuclear power plants is being controlled through computers, cyber-
crimes have assumed somewhat threatening implications. In the past years, some of
the significant cyber-crimes which took place include the Citibank rip off during
which 10 million US $ were deceitfully transferred from a bank into another bank
account in Switzerland. This attack was executed by a Russian hacker group headed
by Vladimir Kevin, who was a renowned hacker of his time. The group of hackers
compromised the security systems of the bank. Apparently, Vladimir Kevin was
making use of his office computer at AO Saturn, a computer firm situated in St.
Petersburg, Russia, to get into the computers of Citibank. He was eventually arrested
from Heathrow airport while traveling to Switzerland.
Defining Cyber-Crime
Let us first define "cyber-crime" and understand how it is different from a
"conventional Crime." Computer crimes can include conventional criminal offenses,
like forgery, theft, scam, defamation, and malice. All of these crimes are subject to
the Penal Codes. Such type of computer abuses have also given rise to several
modern crimes which are addressed by the Information Technology Act, 2000.
It is not appropriate to define cyber-crimes, as "actions which carry a punishment by
the Information Technology Act" since the Indian Penal Code also covers several
cyber-crimes, for example, cyber defamation, email spoofing, and sending
intimidating emails, etc. We can simply define cyber-crime as unlawful actions in
which the computer is either a target or a tool or else both".
Let have a look at the acts where the computer is used as a tool for an illegal act.
This type of activity generally consists of a variation of a traditional crime by using
computers. Few examples are given in the following text:
1.
Email Spoofing
An email is known as spoofed email is it seems to originate from one source where
in reality, it has been sent from another source. For example, the email address of
Sunita is [email protected]. Her enemy, Raveena, spoofs her e-mail ID and
sends offensive texts to all her connections. As the e-mails seem to have come from
Sunita, her friends might take offense, and her friendships could be ruined for life.
One implication of email spoofing can be loss of money. In one case, an American
youngster made billions of dollars by disseminating incorrect information about a
few particular companies whose shares he had short traded. He spread this incorrect
information by sending spoofed emails, allegedly from news agencies such as
Reuters to investors and share brokers who were told that the companies were
performing poorly. The share values did not go back to their initial levels even after
the truth came out hence causing loss of millions of dollars to the thousands of
investors.
Forgery
Fake currency notes, revenue stamps, and postage, mark sheets, etc. can be forged
with the help of sophisticated computers, scanners, and printers scanners (Snail
2009). One even finds vendors lobbying the sale of forged certificates and even mark
sheets outside numerous colleges in Asia. Such mark sheets or certificates are
produced using computers, and high-quality printers and scanners. As a matter of
fact, this has grown into a thriving business involving hundreds of Rupees being taken
from the student in exchange for these fake but authentic-looking degrees and
certificates .
Cyber Defamation
Cyber defamation takes place when defamation occurs using the internet or
computers. For example, somebody broadcasts defamatory stuff about particular
someone on a website or else broadcasts e-mails comprising defamatory information
to all contacts of that person.
One recent example is when a young girl, namely, Surekha (real names of people
have not been used), was about to be married to Suraj. The girl was really happy
because even though it was an arranged marriage, she had developed liking for the
boy. The boy seemed nice and open-minded. Later, one day when Surekha met Suraj,
he looked anxious and quite upset. He did not appear to have any interest in talking to
her. Upon asking, he told her that his family members had been receiving e-mails
containing mean things about Surekha's character. A few emails mentioned her past.
He further informed her that his parents were just very upset and were thinking of
breaking off their engagement. Luckily, Suraj succeeded in agreeing with his parents
and the other elders of his family to contact the police instead of believing in those
mails without verification.
In the course of investigation, it was exposed that the person responsible for sending
those e-mails was none other than the stepfather of Surekha. Her stepfather had sent
those e-mails with the intention to break up the marriage. In the case of Surekha’s
marriage, he was to lose control of her property, of which he was the legal custodian
till her marriage.
One more popular case of cyber defamation took place in America. All friends and
family of a woman were harassed with offensive e- mail messages which appeared
to be received from her email account. These offensive emails were damaging the
repute of the woman among her family and friends. That woman was a popular
activist against pornography. In actuality, a group of people who did not agree with
her point of view and were angry with her for differing with them had decided to
malign her repute by using such sly techniques. Besides sending spoofed offensive e-
mails, those people also put up websites about her, which essentially defamed her
character.
Cyberstalking
In the Oxford dictionary, cyberstalking is defined as "pursuing stealthily".
Cyberstalking includes following the actions of a person across the Internet through
posting messages (occasionally intimidating) on the notice boards visited by the
victim, continually bombarding the victim with emails and entering into the chat-
rooms which are frequently visited by the victim, etc.
Information on Cyber-Crime
In the start of a particular development period, people were quietly driven to
accomplish decent progress in prevailing technological activities. From the time of
the start of the civilization period, humans have always been inspired by their
necessities to make better progress in the prevailing technologies. In 1969, the design
of a super parallel network called ARPANET (Advanced Research Project Agency)
was made. ARPANET was composed of more than fifty computers connected with
web links to facilitate military operations. These networks gradually grew and later
became popular by the name of online Internet activity to share business systems
where communication was carried out in Cyberspace .
The term Cyberlaw denotes the legal jurisdiction and other means of previous
regulatory aspects on the internet. This process is a constantly generic one. At the
time when an internet development strategy is made, various modifications are
enforced during its development, as a result of which various legal concerns also
gets developed via illicit activists. Child Pornography is one of the severe
cybercrime on the Internet. Online pedophiles devise ways to engage kids in sexual
activities using the Internet. Likewise, the traffic threats, distribution of indecent
material, and posting of pornography with all its dirty exposure are some of the most
significant known criminal cyber offenses nowadays. Such offenses, in reality,
impends to defy the development of technology and also leave a perpetual scar and
destruction on the younger generation, if not restricted.
In the world of cybercrime, a rather distinctive form of harassment is Cyber
annoyance. Several types of harassment occur in cyberspace or by using cyberspace
to reach criminal offenses. Different forms of harassment can be racial, sexual,
religious, or any other. People involved in executing these types of harassment are
guilty of cybercrimes. Harassments and Stalking are among issues that numerous
people, particularly women, face in their real-life.
One more type of cybercrime is cybercrime against property in varied forms. Such
criminal offenses consist of unsanctioned computer trespass via cyberspaces,
destruction of computer, and transmission of harmful programs and unauthorized
tenure of computerized information. Until presently, cracking and hacking are among
the largest known cybercrimes. Hacking is known as breaking into a computer system
without the will and knowing of the authorized person, interfering with the valuable
and private information or data. Utilizing one's programming capabilities as well as
hiring different programmers to attain access to a network or a specific computer via
unauthorized access are among serious criminal offenses. Similarly, the making and
distribution of damaging computer programs or any type of nasty viruses or software
which causes permanent damage to network or computer systems are another types of
cybercrime, and such type of software piracy is also another discrete form of
cybercrime. Numerous people in the cyber world disseminate illegal and unofficial
pirated copies of software products for monetary benefits.
One more form of cybercrime is a crime against administration. In this type of
cybercrime, the most distinct kind is Cyber Terrorism. With the increase in the use of
the internet, several individuals or groups have arisen, which uses cyberspace to
threaten the worldwide governments and to terrify the residents of the country. This
crime exhibits when a group or an individual "cracks" or hacks into a military or
government maintained website. We can classify cyber-crimes into three broad
categories which are:
1) Crime against the Individuals
It can be further categorized into crimes against:
i. Person
ii. Property of an individual.
i. Government
ii. Any Firm, Company, or Group of Individuals.
a. Trafficking.
b. Child pornography
c. Indecent exposure to youth.
d. Forgery.
e. Online gambling.
f. Sale of banned articles.
The Department of Justice for cybercrime has classified the utilization of computer in
cyber-crime into following three ways:
Cloud Security
Whenever any organization moves into the cloud world, it generates new security
challenges for it. For instance, in 2017, data breaches were reported almost weekly
from poorly configured cloud cases. Even though cloud providers are constantly
creating and developing novel security tools for helping company users to secure
their data in a better way, still the bottom line persists: when it comes to
cybersecurity, moving to the cloud is not a complete solution for accomplishing due
diligence. Improved and advanced cybersecurity is one of the major explanations
why the cloud is taking succession .
Cloud security is a security tool based on software and monitors, as well as protects
the data in our cloud resources. There is a wrong perception of cloud computing that
it’s not as secure as traditional methods. Most people consider that their data is more
protected when it is stored on physical systems and servers which are owned and
controlled by them which is not the case as security and accessibility of data do not
merely depend on the physical location of the data.
A report on cloud security stated that on-premises environment users undergo more
cases as compared to those of service provider environments.
It was further stated in the report that:
i. Roughly 61.4 attacks are experienced by on-premise environment users
whereas;
ii. Service provider environment users experienced approximately 27.8
attacks on average.
Cloud computing security is analogous to conventional methods on-premise data
centers, the advantage is that it saves both cost and time of maintaining giant data
facilities; moreover, the threat of security breaches is marginal.
Application Security
Application security, particularly web application security, has to turn into the most
fragile technical attack point. However, few enterprises manage to reduce all the
vulnerabilities sufficiently. Application security instigates with secure coding
practices and must be augmented through penetration testing.
Prompt application development, as well as deployment to the cloud world, has
resulted in the introduction of a new discipline, which is development and operations
(DevOps). Development and operations teams generally prioritize business
requirements over security, a trend that will probably change, given the propagation
of threats.
Application security must be opted as one of the many required security measures
adopted by companies to protect their systems. Application security makes use of
both hardware and software methods to deal with external threats that can ensue
during the development stage of an application .
It is easier to access applications over networks, resulting in the implementation of
security measures during the development stage to be a vital stage of the project.
Different types of application security are mentioned below:
i. Firewalls
ii. antivirus programs
iii. encryption programs
These types of application security help to prevent unauthorized access to systems.
Companies can also identify their sensitive data possessions and guard them by using
particular application security procedures attached to such data sets.
Internet of Things (IoT) Security
IoT denotes to an extensive range of both critical as well as non-critical cyber-
physical systems such as sensors, printers, electronic appliances, and security
cameras . It is common by IoT devices to ship in an insecure state, and most of the
devices do not offer significant security patching, which not only poses threats just to
their users but to other people on the internet as well since such devices usually find
themselves part of a botnet. As a result, unique security challenges are to be faced
both by home users as well as society .
According to professionals:
i. By 2021, it is anticipated that the combined markets of IoT will
propagate to around $520 billion which is more than double than the year
2017 where market was around $235 billion;
ii. The fundamental technology of the IoT market includes IoT’s data center,
consumer devices, analytics, legacy embedded systems, networks, and
connectors.
iii. IoT devices often get into vulnerable states offering little to almost no
security patching, thereby posing a unique security challenge for its users.
A study carried out by Bain stated that
iv. One of the main hurdles in adopting IoT is security challenges associated
with it.
v. Companies would purchase more IoT devices regularly provided
security concerns are addressed
vi. Most enterprises expect that the business of IoT will expand in the future
to a great extent.
This demands from sellers to make investments in getting extensive knowledge about
security challenges so that more strategic solutions can be proposed as well as
implemented. IoT devices have nearly become impossible to avoid, and thus, our
best option will be to find an IT provider who can well manage their security
Common Cyber Threats
There are three general categories of common cyber threats categories (Abomhara
2015):
1. Attacks on confidentiality
2. Attacks on integrity
3. Attacks on availability
4. Social engineering
5. Phishing attacks
6. Unpatched software
7. Social media threats
8. Advanced persistent threats
Chapter Five: Network Security and Security of
Complex Infrastructures
Introduction
The consumption of the internet is rising exponentially, hence, making the security of
network more vital with each passing day. Quite often, the data flow faces numerous
problems. The data is sometimes altered, corrupted, lost or even fabricated. People
using the internet naturally have some expectation among which integrity and
confidentiality of data are their topmost concerns. If someone using the internet
receives any message, he /she will want to identify the message sender so that in any
situation, if the sender negates sending the message, then they can provide evidence
to prove him wrong.
The term ‘Industrial Control System’ (ICS) talks about a group of process automation
techniques, like Distributed Control Systems (DCS), and Supervisory Control and
Data Acquisition (SCADA) systems which unluckily have been the target of
increasing number of attacks from the past few years. Since these systems provide
crucial services to critical infrastructure like communications, energy, and
manufacturing services, increasing attacks by intimidating intruders pose a serious
threat to the routine running of nation-states .
ICS have distinct reliability as well as performance requirements and habitually use
operating systems, applications, and techniques that might not be considered
conventional by current IT professionals. Generally, these requirements follow the
precedence of availability and integrity, succeeded by confidentiality and take into
account the management of processes which, in case of not implemented properly,
present a significant threat to the safety and health of human lives, harm the
environment, as well as results in severe financial problems like production losses.
Additionally, the unavailability of critical infrastructure (such as transport, electrical
power) can result in such economic effect which is far beyond the systems bearing
direct and physical damage. Such economic impacts can lead to harmful effects on
the local, provincial, national, or even global economy.
Network Security Requirements
With the internet has come the ability to connect any computer from anywhere in the
world to any other computer placed at any other location in the world. This is both a
blessing and a nightmare. For people at home, surfing on the internet is entertainment.
However, for corporate security managers, it can be a nightmare. Many companies
have a huge quantity of confidential data on-line such as product development plans,
marketing strategies, trade secrets, financial analysis, etc. The release of such
sensitive information to an opponent/ competitor can have dreadful consequences.
Besides risks of data being leaked out, there is another risk as well which is of
information/ data being leaked in. Especially, worms, viruses, and several other
digital pests can attempt to breach the security of the system, destroy the treasured
data as well as a waste of a huge amount of time of database administrator for
cleaning up the mess .
Due to security concerns, government and commercial enterprises are hesitant to use
the internet. For the past few years, numerous attacks on routers have been reported.
Presently, the internet uses Border Gateway Protocol (BGP) for inter-domain routing.
Moreover, since BGP sessions employ TCP for transmission of data amid routers,
the latest rise in TCP based attacks have become a further threat to the security of
BGP. Earlier, SNMP (Simple Network Management Protocols) were used by the
internet community for monitoring network health and debugging operational
problems.
Objectives of Data Security
The main responsibility of data security is to secure the systems from following
threats:
Interception
The unsanctioned person gains access to the system for capturing the data in the
network. The security against interception must be ensured for the confidentiality of
data.
Modification
The unsanctioned person can modify the data in the network after gaining
unauthorized access to the system. The defense against any such modification is
necessary for maintaining the integrity of the data .
Fabrication
The unsanctioned person inset bogus data in-network or can add records in the stored
files. To guard against fabrication is requisite for authentication of the data.
Interruption
Complete data or some parts of it are destroyed. The guard is to save the data from
such interruption.
Non-Repudiation
Both data sender and recipient are proscribed from negating any data which is sent or
received, which means that the recipient must be able to provide proof that a
particular message came from some source.
Table 5‑1. Key stakeholders who pose a threat to the security of data
Adversary Goal
Student Snooping on people’s e-mail for fun
Cracker Stealing data to test out security system of anyone
Sales rep for claiming to represent all of Europe not just a single
country
Businessmanfor discovering the strategic marketing plan of a competitor
Ex- For getting revenge for being fired
employee
Accountant To steal money from an enterprise
Stockbroker To repudiate a promise made to a client through e-mail
Con man for stealing credit card numbers for sale
Spy for learning military or commercial secrets of an enemy
Terrorist for stealing germ warfare secrets
Internet Security Techniques
Below mentioned are five main types of internet security techniques:
1. Cryptography
2. Firewall
3. Disconnecting when not in usage
4. Protocols
5. Not opening unknown email attachments
Cryptography
The meaning of the word cryptography is ‘Secret Writing.’ It can deliver
confidentiality, integrity, as well as authentication and non-repudiation of messages.
Cryptography uses two techniques which are Encryption and Decryption. The
message which needs encryption is called plaintext which is transferred into
ciphertext using a key as a parameter. The path of cryptography is as below:
Plain text → Encryption → Ciphertext → Decryption → Plain text
Here,
i. The transformation of plain text to ciphertext is Encryption.
ii. After encryption, the transformed message is known as ciphertext.
iii. Transformation of the ciphertext back into plain text is decryption.
Plain text is the original message prior to being transformed, whereas ciphertext is
the transformed message. Hence the message which needs to be sent is converted into
a distinct message through encryption. The intruder does not know the key and
therefore duplicates the ciphertext. The function key is only known to the
user/recipient. Thus, only he can transform the ciphertext back into plain text through
the decryption process. In this way, cryptography helps to maintain the security of
data.
Firewall
Firewall plays the role of a gatekeeper amid the outside world and the internal
network of the company. The firewall performs as an electronic barrier for stopping
unauthorized entries. Principally, it performs two significant functions which are:
Gatekeeping
Firewall inspects the location from where the data tries to enter in our system and
then based on instructions, elects, whether or not to permit entry of that data .
Monitoring
Another function of a firewall is to monitor information. It monitors logging of all
system activities as well as the generation of reports for system administration.
Monitoring is of two types, i.e., active and passive.
When an event takes place during active monitoring, firewall directs information
about the event to the manager. Whereas, in the case of passive monitoring, the
firewall makes records of details of each event on a disk. The manager keeps
checking those details after regular intervals and marks results. Network Firewalls
(both hardware and software-based) delivers some level of protection against attacks
of intruders.
Architecture of Firewall
Any enterprise connected to the internet through a serial line might opt to connect a
firewall, as presented in the following figure.
Classes of Threats
Discussed below are the different kinds of threats that are or can be utilized to take
benefit of the security vulnerability .
Privilege Elevation
Privilege elevation is the class or type of attack where the hacker generally has an
account on the system and utilizes it to increase the privileges of his system to the
higher level than she/he wasn’t meant to have. If fruitful, this class of attack can
outcome in a hacker attaining privileges as high as root on the UNIX system. Once the
hacker obtains super-user privileges, she/he can execute code with this high level of
privilege, and the complete system is efficiently compromised .
SQL Injection
An SQL injection is the usual application layer attack method used by the hackers, in
which malicious SQL (Structured Query Language) statements are introduced into the
entry field for implementation. The attacks of SQL injection are very crucial as the
attacker can obtain precarious information from the server database. It is a kind of
attack which obtains the benefit of loopholes existent in the execution of web
applications that permits the hacker to hack the entire system. To check the attack of
SQL injection input fields like comments, text boxes, etc. need to be taken care of. To
avert injections, special characters must be either skipped or properly handled from
the input.
Unauthorized Data Access
One of the most popular kinds of attacks is obtaining unauthorized access to the data
within an application. Data can usually be accessed on a network or on servers (Deo
1997) .
Unauthorized access comprises:
i. Unauthorized access to the data through data-fetching operations
ii. Unauthorized access to the reusable client verification information by
observing the access of others
iii. Unauthorized access to the data by observing the access of others
URL Manipulation
URL manipulation is a process of controlling the website URL (Uniform Resource
Locater) query strings and capture of the significant information by hackers. This
takes place when the application utilizes the HTTP GET technique to pass
information amongst the server and client. The information is usually passed in the
parameters in the query string. The tester can alter the value of the parameter in the
query string to confirm if the server approves it.
DoS (Denial of Service)
A DoS attack is an obvious effort to make a network or machine resource unavailable
to legitimate users. Applications can also be breached in ways that make the
application and, at times, the complete machine, unusable.
Data Manipulation
In data manipulation, the hacker alters data used by the website to gain some benefit
or embarrass the owners of the website. Hackers will frequently gain access to
HTML (Hypertext Markup Language) pages and alter them to be offensive or
satirical .
Identity Spoofing
Identity spoofing is a method where the hacker utilizes the credentials of the
legitimate device or user to start attacks against the network hosts, bypass access
controls, or steal data. Preventing this attack needs network-level mitigations and IT-
infrastructure
Cross-Site Scripting (XSS)
Cross-site scripting (XSS) is the computer security vulnerability discovered in web
applications. Cross-site scripting enables the attackers to introduce a client-side
script into the Web pages seen by the other users and trick the user into clicking on
that particular URL. Once performed by the user’s browser, this script or code could
then execute actions like entirely changing the behavior of the website, thieving
personal data, or executing actions on behalf of the user. All attacks listed above are
the most critical threat types, but these aren’t all. The graph below explains the
percentage (%) of some well-known cyber-attacks.
Ethical Hacking
Ethical hacking means the hacking performed by an individual or a company to help
recognize possible threats on a network or computer. An ethical hacker tries to
bypass the security of the system and look for any loophole that could be misused by
the malicious hackers, aka the Black hats. White hats might suggest changes to the
systems that make the system less probable to be breached by black hats (Palmer
2001).
Password Cracking
This is the most crucial part while performing system testing. To gain access to the
reserved areas of the applications, hackers can utilize the password cracking tool or
usually can guess the common password. Common passwords or usernames are
effortlessly available online, along with the open-source password cracking
applications. Until the web application applies the complex password, it is very
simple to crack the password and username. Another method of cracking the
passwords is if a password/username is to aim cookies if the cookies are saved
without encryption.
Penetration Testing
This is an attack on the computer system to locate security loopholes, possibly
gaining access to the system, its data, and functionality.
Risk Assessment
This is the process of evaluating and concluding on the risk indulged with the kind of
loss and the probability of vulnerability occurrence. This is decided within the
organization by numerous interviews, analyses, and discussions .
Security Auditing
This is the systematic evaluation of the security of the company’s information system
by assessing how well it obeys to the set of developed criteria.
Security Scanning
Security scanning is a program that usually communicates with the web application
via web front-end to recognize potential security loopholes in the web application,
Networks, and OS.
SQL Injection Check
The next thing which needs to be checked is the SQL injection. Entering the single
quote (‘) in the textbox must be disallowed by the application. Instead, if the tester
comes across a database error, it generally means that the user input is injected in
some query and then implemented by the application. In such a situation, the
application is susceptible to SQL injection.
The attacks of SQL injection are very critical as the attackers can obtain critical
information from the database of the server. To check the SQL injection entry points
into the web application, discover code from the code base where MySQL queries
are implemented on the server database by taking some user inputs.
SQL Injection Testing can usually be done for:
i. Apostrophes
ii. Commas
iii. Brackets
iv. Quotation marks
Vulnerability Scanning
This is the automated computer program to proactively recognize the security
vulnerabilities of the computing systems in the network. This is used to determine
where the system can be threatened and/or exploited.
Posture Assessment
This describes the complete security posture of the organization; it is the combination
of Security scanning, Ethical hacking, and Risk Assessment.
URL Manipulation Via HTTP GET Methods
HTTP GET technique is used between server and application client to convey the
information. The tester verifies if the application is conveying important information
in a query string. The information through HTTP is passed in the parameters in the
query string. To test this, a value of the parameter can be altered in the query string to
validate if the server admits it.
Normally user information is passed via HTTP GET request to a server for either
fetching data or authentication. Hackers can control the input of GET request to the
server so that the needed information can be collected or corrupting the data. Any
unexpected behavior of a web server or application, in such circumstances, is vital
for the hacker to slide into the application.
Ad hoc Data Testing is an important part of security testing:
i. Random data, comprised of the requests, is tested.
ii. Random data, comprised of parameters, is tested.
iii. Random encoded data, comprised of parameters, is tested.
Data Protection
i. What is the mechanism of data protection?
ii. Does the mechanism of data protection comply with the organizational
security policy?
iii. What is the state of the protected data? Is it all at rest or in transit?
iv. Is encryption being implemented during data handling? Does the data
encryption and handling show compliance with organizational security
policies?
Logging
i. What type of audit trail logging mechanism is being implemented?
ii. Do the audit trail logging mechanisms comply with organizational
specifications?
iii. Is there any vulnerability of audit records to unauthenticated modification,
deletion, or disclosure?
Error Handling
i. What is the handling mechanism for error messages?
ii. Are there any chances of a data breach or data leak that could be
exploited in a consequent cyber-attack?
iii. Can the application failure lead to the vulnerability of the whole system?
Operation
i. Has the removal of all IDs (including built-in IDs, default IDs and testing
IDs) been carried out before the final launch of the web application?
ii. Is there a proper implementation of least privilege principles and
segregation of duties?
iii. Are there fully defined procedures for system administration, disaster
recovery, change management, and backup?
It is pertinent to note here that the above-discussed list is not exhaustive. The users
and application developers can add or subtract the checklist items according to the
requirements of a particular web application.
Additionally, in the case of outsourced projects, there must be an established
mechanism for security management for all the web applications to safeguard the
information as well as to alleviate the cybersecurity dangers linked to outsourced
projects .
Guidelines for Web Protection during Internet Surfing
End-users of a web application need to take some essential steps to safeguard
themselves from cyber threats. Nowadays, it is very common to install applications
after agreeing to their terms and conditions. Most of these web applications make
their users agree that the service provider of the web application will not be
responsible for any damage or loss that may take place because of cybersecurity
breaches. The following strategies can be implemented by the end-users to safeguard
web applications against potential cyber-attacks.
1. Do not use a public computer to log in to any important web application.
2. Do not allow the cache of your password and username in a workstation.
3. Ensure logging-off after the session ends.
4. Use variable user-logins and passcodes for different services and web
applications.
5. Make sure to change the passwords of web applications regularly.
6. Activate the feature of using a one-time password if the applications
support it.
7. Instantly report all anomalous behaviors of the web application to your
service provider.
8. Make sure to patch and update the operating system modules, e.g., Internet
Explorer, Mozilla Firefox, Google Chrome, Tor Browser, etc.
9. Install the latest version of antivirus and firewall. The installed anti-virus
software must be powerful enough to detect dangerous viruses, e.g.,
malware, Trojan, etc.
10. Avoid downloading software and their plug-ins from
unauthentic sources.