Data Security
Data Security
Data breaches and cyber-attacks are anticipated to increase in the due course of
time as the computer networks expand. It is important to have the right Data
Security Solutions in place to meet the challenging threats.
• The data security software may also protect other areas such as programs or
operating-system for an entire application.
• Its goal is to recognize rules and actions to apply against strikes on internet security
The cryptographic techniques also protect TCP/IP (Internet protocol) alongside other
internet protocols that have been designed for protecting emails on the internet.
The techniques include SSL and TLS for the traffic of the website, PGP for email and
for network security it’s backed by IPSec .
The IPSec Protocol was initially developed for guarding interaction using TCP/IP. It was
designed by the IETF, and it provides security and verification by using the method of
cryptography, the data is modified using security methods. The two main aspects of
modification that form the reasons for IPSec are Authentication Header (AH) and
Encapsulating Security Payload (ESP).
2. System security works closely associating with data security. System security
protects everything that an organization wants to ensure in its networks and
resources.
3. Simply put, data security is meant to protect the information and system security is
what protects the information containing the devices and network.
The number of security risks associated with your company data will depend on the data
you store. It’s extremely important that all risks are covered by some sort of protection. A
good way to start this is by ensuring your security policy complies with data protection and
privacy laws. You should also appoint a trained data protection officer with good
knowledge of recent threats to manage your security.
Knowing your security risks will allow you to carry out data landscaping and estimate the
value of your data should it be lost or compromised. This will give you a better
understanding of the impact on your organisation following misrepresentation or
unauthorised entities accessing valuable information. Team Computers Pvt. Ltd. / 2017 14
How To Secure Organization’s Data
Analyse the Information
Ensure you have a good understanding of the information accessed across the
business, who accesses it and what it is used for. A gap analysis provides a point of
reference and will help you determine security areas that need improvement.
It’s important to remember that data security is not just digital, but physical too.
Review where your data is stored, screen visibility and the vetting of new staff.
Unlike attacks that are designed to enable the attacker to gain or increase access,
denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s
enough to have the satisfaction of service denial. However, if the attacked resource
belongs to a business competitor, then the benefit to the attacker may be real
enough. Another purpose of a DoS attack can be to take a system offline so that a
different kind of attack can be launched. One common example is session hijacking,
which I’ll describe later.
There are different types of DoS and DDoS attacks; the most common are TCP SYN
flood attack, teardrop attack, smurf attack, ping-of-death attack and botnets.
Team Computers Pvt. Ltd. / 2017 24
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks-
a) TCP SYN flood attack- In this attack, an attacker exploits the use of the buffer space
during a Transmission Control Protocol (TCP) session initialization handshake. The
attacker’s device floods the target system’s small in-process queue with connection
requests, but it does not respond when the target system replies to those requests.
This causes the target system to time out while waiting for the response from the
attacker’s device, which makes the system crash or become unusable when the
connection queue fills up. There are a few countermeasures to a TCP SYN flood attack:
Place servers behind a firewall configured to stop inbound SYN packets
Increase the size of the connection queue and decrease the timeout on open
connections.
Team Computers Pvt. Ltd. / 2017 25
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks-
b) Teardrop attack- This attack causes the length and fragmentation offset fields in
sequential Internet Protocol (IP) packets to overlap one another on the attacked host;
the attacked system attempts to reconstruct packets during the process but fails. The
target system then becomes confused and crashes.
• If users don’t have patches to protect against this DoS attack, disable SMBv2 and block
ports 139 and 445.
c) Smurf attack- This attack involves using IP spoofing and the ICMP to saturate a target
network with traffic. This attack method uses ICMP echo requests targeted at
broadcast IP addresses. These ICMP requests originate from a spoofed “victim”
address. For instance, if the intended victim address is 10.0.0.10, the attacker would
spoof an ICMP echo request from 10.0.0.10 to the broadcast address 10.255.255.255.
This request would go to all IPs in the range, with all the responses going back to
10.0.0.10, overwhelming the network. This process is repeatable, and can be
automated to generate huge amounts of network congestion.
To protect your devices from this attack, you need to disable IP-directed broadcasts at
the routers. This will prevent the ICMP echo broadcast request at the network devices.
Another option would be to configure the end systems to keep them from responding
to ICMP packets from broadcast addresses.
d) Ping of death attack- This type of attack uses IP packets to ‘ping a target system with
an IP size over the maximum of 65,535 bytes. IP packets of this size are not allowed, so
attacker fragments the IP packet. Once the target system reassembles the packet, it
can experience buffer overflows and other crashes.
Ping of death attacks can be blocked by using a firewall that will check fragmented IP
packets for maximum size.
e) Botnets- Botnets are the millions of systems infected with malware under hacker
control in order to carry out DDoS attacks. These bots or zombie systems are used to
carry out attacks against the target systems, often overwhelming the target system’s
bandwidth and processing capabilities. These DDoS attacks are difficult to trace
because botnets are located in differing geographic locations.
A MitM attack occurs when a hacker inserts itself between the communications of a
client and a server. Here are some common types of man-in-the-middle attacks:
b) Replay- A replay attack occurs when an attacker intercepts and saves old messages and
then tries to send them later, impersonating one of the participants. This type can be
easily countered with session timestamps or nonce (a random number or a string that
changes with time).
(For example, attacker “A” intercepts public key of person “P” and substitute it with his own
public key. Then, anyone wanting to send an encrypted message to P using P’s public key is
unknowingly using A’s public key. Therefore, A can read the message intended for P and then
send the message to P, encrypted in P’s real public key, and P will never notice that the message
was compromised. In addition, A could also modify the message before
So, how can you make sure that P’s public key belongs to P and not to A? Certificate
authorities and hash functions were created to solve this problem. When person 2 (P2)
wants to send a message to P, and P wants to be sure that A will not read or modify the
message and that the message actually came from P2, the following method must be
used. Team Computers Pvt. Ltd. / 2017 36
Man-in-the-middle (Mitm) Attack -
6. P, and only P, can decrypt the symmetrically encrypted message and signed hash
because he has the symmetric key.
7. He is able to verify that the message has not been altered because he can compute
the hash of received message and compare it with digitally signed one.
8. P is also able to prove to himself that P2 was the sender because only P2 can sign the
hash so that it is verified with P2 public key.
Phishing attack is the practice of sending emails that appear to be from trusted
sources with the goal of gaining personal information or influencing users to do
something. It combines social engineering and technical trickery. It could involve an
attachment to an email that loads malware onto your computer. It could also be a link
to an illegitimate website that can trick you into downloading malware or handing
over your personal information.
Spear phishing is a much targeted type of phishing activity. Attackers take the time to
conduct research into targets and create messages that are personal and relevant.
Because of this, spear phishing can be very hard to identify and even harder to defend
against. One of the simplest ways that a hacker can conduct a spear phishing attack is
email spoofing, which is when the information in the “From” section of the email is
falsified, making it appear as if it is coming from someone you know, such as your
management or your partner company. Another technique that scammers use to add
credibility to their story is website cloning — they copy legitimate websites to fool you
into entering personally identifiable information (PII) or login credentials.
Team Computers Pvt. Ltd. / 2017 40
To Reduce The Risk Of Being Phished, You Can Use These
Techniques -
Critical thinking — do not accept that an email is the real deal just because you’re
busy or stressed or you have 150 other unread messages in your inbox. Stop for a
minute and analyse the email.
Hovering over the links — Move your mouse over the link, but do not click it! Just let
your mouse cursor h over over the link and see where would actually take you. Apply
critical thinking to decipher the URL.
Analysing email headers — Email headers define how an email got to your address.
The “Reply-to” and “Return-Path” parameters should lead to the same domain as is
stated in the email.
Sandboxing — you can test email content in a sandbox environment, logging activity
from opening the attachment or clicking the links inside the email.
Drive-by download attacks are a common method of spreading malware. Hackers look
for insecure websites and plant a malicious script into HTTP or PHP code on one of the
pages. This script might install malware directly onto the computer of someone who
visits the site, or it might re-direct the victim to a site controlled by the hackers. Drive-
by downloads can happen when visiting a website or viewing an email message or a
pop-up window. Unlike many other types of cyber security attacks, a drive-by doesn’t
rely on a user to do anything to actively enable the attack — you don’t have to click a
download button or open a malicious email attachment to become infected. A drive-by
download can take advantage of an app, operating system or web browser that
contains security flaws due to unsuccessful updates or lack of updates.Team Computers Pvt. Ltd. / 2017 43
4. Drive-by attack -
To protect yourself from drive-by attacks, you need to keep your browsers and
operating systems up to date and avoid websites that might contain malicious code.
Stick to the sites you normally use — although keep in mind that even these sites can
be hacked. Don’t keep too many unnecessary programs and apps on your device. The
more plug-ins you have, the more vulnerabilities there are that can be exploited by
drive-by attacks.
Because passwords are the most commonly used mechanism to authenticate users to an
information system, obtaining passwords is a common and effective attack approach.
Access to a person’s password can be obtained by looking around the person’s desk,
‘‘sniffing’’ the connection to the network to acquire unencrypted passwords, using social
engineering, gaining access to a password database or outright guessing. The last
approach can be done in either a random or systematic manner:
NOTE-In order to protect yourself from dictionary or brute-force attacks, you need to
implement an account lockout policy that will lock the account after a few invalid
password attempts. You can follow these account lockout best practices in order to set it
up correctly.
SQL injection has become a common issue with database-driven websites. It occurs
when a malefactor executes a SQL query to the database via the input data from the
client to server. SQL commands are inserted into data-plane input (for example,
instead of the login or password) in order to run predefined SQL commands.
A successful SQL injection exploit can read sensitive data from the database, modify
(insert, update or delete) database data, execute administration operations (such as
shutdown) on the database, recover the content of a given file, and, in some cases,
issue commands to the operating system.
Team Computers Pvt. Ltd. / 2017 47
SQL injection attack -
For example, a web form on a website might request a user’s account name and then
send it to the database in order to pull up the associated account information using
dynamic SQL like this:
Because ‘1’ = ‘1’ always evaluates to TRUE, the database will return the data for all
users instead of just a single user.
The vulnerability to this type of cyber security attack depends on the fact that SQL
makes no real distinction between the control and data planes. Therefore, SQL
injections work mostly if a website uses dynamic SQL. Additionally, SQL injection is very
common with PHP and ASP applications due to the prevalence of older functional
interfaces. J2EE and ASP.NET applications are less likely to have easily exploited SQL
injections because of the nature of the programmatic interfaces available.
In order to protect yourself from a SQL injection attacks, apply least0privilege model of
permissions in your databases. Stick to stored procedures (make sure that these
procedures don’t include any dynamic SQL) and prepared statements (parameterized
queries). The code that is executed against the database must be strong enough to
prevent injection attacks. In addition, validate input data against a white list at the
application level.
XSS attacks use third-party web resources to run scripts in the victim’s web browser
or scriptable application. Specifically, the attacker injects a payload with malicious
JavaScript into a website’s database. When the victim requests a page from the
website, the website transmits the page, with the attacker’s payload as part of the
HTML body, to the victim’s browser, which executes the malicious script.
• For example, it might send the victim’s cookie to the attacker’s server, and the attacker
can extract it and use it for session hijacking. The most dangerous consequences occur
when XSS is used to exploit additional vulnerabilities. These vulnerabilities can enable
an attacker to not only steal cookies, but also log key strokes, capture screenshots,
discover and collect network information, and remotely access and control the victim’s
machine.
While XSS can be taken advantage of within VBScript, ActiveX and Flash, the most
widely abused is JavaScript — primarily because JavaScript is supported widely on the
web.
To defend against XSS attacks, developers can sanitize data input by users in an HTTP
request before reflecting it back. Make sure all data is validated, filtered or escaped
before echoing anything back to the user, such as the values of query parameters
during searches. Convert special characters such as ?, &, /, <, > and spaces to their
respective HTML or URL encoded equivalents. Give users the option to disable client-
side scripts.
Team Computers Pvt. Ltd. / 2017 53
8. Eavesdropping attack -
Birthday attacks are made against hash algorithms that are used to verify the
integrity of a message, software or digital signature.
The birthday attack refers to the probability of finding two random messages that
generate the same MD when processed by a hash function.
• If an attacker calculates same MD for his message as the user has, he can safely replace
the user’s message with his, and the receiver will not be able to detect the replacement
even if he compares MDs.
Malicious software can be described as unwanted software that is installed in your system
without your consent. It can attach itself to legitimate code and propagate; it can lurk in
useful applications or replicate itself across the Internet. Here are some of the most
common types of malware:
Macro viruses — these viruses infect applications such as Microsoft Word or Excel.
Macro viruses attach to an application’s initialization sequence. When the application is
opened, the virus executes instructions before transferring control to the application.
The virus replicates itself and attaches to other code in the computer system.
File infectors — File infector viruses usually attach themselves to executable code,
such as .exe files. The virus is installed when the code is loaded. Another version of a
file infector associates itself with a file by creating a virus file with the same name,
but an .exe extension. Therefore, when the file is opened, the virus code will
execute.
Stealth viruses — Stealth viruses take over system functions to conceal themselves.
They do this by compromising malware detection software so that the software will
report an infected area as being uninfected. These viruses conceal any increase in the
size of an infected file or changes to the file’s date and time of last modification.
Trojans — A Trojan or a Trojan horse is a program that hides in a useful program and
usually has a malicious function. A major difference between viruses and Trojans is that
Trojans do not self-replicate. In addition to launching attacks on a system, a Trojan can
establish a back door that can be exploited by attackers. For example, a Trojan can be
programmed to open a high-numbered port so the hacker can use it to listen and then
perform an attack. Team Computers Pvt. Ltd. / 2017 60
Malware attack -
Logic bombs — a logic bomb is a type of malicious software that is appended to an
application and is triggered by a specific occurrence, such as a logical condition or a
specific date and time.
Worms — Worms differ from viruses in that they do not attach to a host file, but are
self-contained programs that propagate across networks and computers. Worms are
commonly spread through email attachments; opening the attachment activates the
worm program. A typical worm exploit involves the worm sending a copy of itself to
every contact in an infected computer’s email address In addition to conducting
malicious activities, a worm spreading across the internet and overloading email
servers can result in denial-of-service attacks against nodes on the network.
Team Computers Pvt. Ltd. / 2017 61
Malware attack -
2. Reduce transfer of data: The organisation should ban shifting data from one device to
another external device. Losing removable media will put the data on the disk under risk.
3. Restrict download: Any media that may serve as an allegiance to the hackers should be
restricted to download. This could reduce the risk of transferring the downloadable media
to an external source.
4. Shred files: The organisation should shred all the files and folder before disposing a
storage equipment. There are application which can retrieve information after formatting.
Team Computers Pvt. Ltd. / 2017 64
Ways To Prevent Data And Security –
5. Ban unencrypted device: The institution should have a ban on the device that are
unencrypted. Laptops and other portable devices that are unencrypted are prone to
attack.
6. Secure transfer: The use of secure courier services and tamper proof packaging while
transporting bulk data will help in preventing a breach.
7. A good password: The password for any access must be unpredictable and hard to
crack. Change of password from time to time
8. Automate security: Automating systems that regularly check the password settings,
server and firewall configuration might bring about reduction of risk in the sensitive
information. Team Computers Pvt. Ltd. / 2017 65
Ways To Prevent Data And Security –
9. Identify threats: The security team should be able to identify suspicious network
activity and should be prepared if there is an attack from the network.
10. Monitor data leakage: Periodically checking security controls will allow the security
team to have a control on the network. Regular check on internet contents to locate if
any private data is available for public viewing is also a good measure to monitor data.
11. Track data: Tracking the motion of data within the organisational network will
prevent any unintentional use of sensitive information.
Email security
Email gateways are the number one threat vector for a security breach. Attackers use
personal information and social engineering tactics to build sophisticated phishing
campaigns to deceive recipients and send them to sites serving up malware. An email
security application blocks incoming attacks and controls outbound messages to prevent
the loss of sensitive data. Team Computers Pvt. Ltd. / 2017 75
Types of network security -
Firewalls
Firewalls put up a barrier between your trusted internal network and untrusted outside
networks, such as the Internet. They use a set of defined rules to allow or block traffic. A
firewall can be hardware, software, or both. Cisco offers unified threat
management (UTM) devices and threat-focused next-generation firewalls.