Module 4PPT
Module 4PPT
1
SYLLABUS
• Introduction to computer security
– Threats
– Vulnerabilities
– Controls
• Browser attack types
• Web attacks targeting users
• Email attack types
• Introduction to program security
– Non-malicious programming oversights
– Malware.
2
What Is Computer Security?
3
What Is Computer Security?
• Information security is securing information from
unauthorized access, modification & deletion
• Application Security is securing an application by building
security features to prevent from Cyber Threats such as SQL
injection, DoS attacks, data breaches and etc.
• Computer Security means securing a standalone machine by
keeping it updated and patched
• Network Security is by securing both the software and
hardware technologies
• Cybersecurity is defined as protecting computer systems,
which communicate over the computer networks
4
C-I-A
Confidentiality means Confidentiality measures are designed
to prevent sensitive information from unauthorized access
attempts
Confidentiality
Secure
Integrity Availability
• Threat
• A cyber threat is a malicious act that seeks to steal or
damage data or discompose the digital network or system.
Threats can also be defined as the possibility of a
successful cyber attack to get access to the sensitive data
of a system unethically. Examples of threats include
computer viruses, Denial of Service (DoS) attacks, data
breaches, and even sometimes dishonest employees.
• Types of Threat
• Threats could be of three types, which are as follows:
• Intentional- Malware, phishing, and accessing someone’s
account illegally, etc. are examples of intentional threats.
• Unintentional- Unintentional threats are considered
human errors, for example, forgetting to update the
firewall or the anti-virus could make the system more
vulnerable.
• Natural- Natural disasters can also damage the data, they
are known as natural threats.
7
• Vulnerability:
• In cybersecurity, a vulnerability is a
flaw in a system’s design, security
procedures, internal controls, etc., that
can be exploited by cybercriminals. In
some very rare cases, cyber
vulnerabilities are created as a result
of cyberattacks, not because of
network misconfigurations. Even it can
be caused if any employee anyhow
downloads a virus or a social
engineering attack.
8
• Types of Vulnerability
• Vulnerabilities could be of many types, based on different
criteria, some of them are:
• Network- Network vulnerability is caused when there are
some flaws in the network’s hardware or software.
• Operating system- When an operating system designer
designs an operating system with a policy that grants
every program/user to have full access to the computer,
it allows viruses and malware to make changes on behalf
of the administrator.
• Human- Users’ negligence can cause vulnerabilities in the
system.
• Process- Specific process control can also cause
vulnerabilities in the system.
9
Controls
We can group controls into three largely independent classes. The following
list shows the classes and several examples of each type of control.
11
Controls Available
• Encryption
• cleartext or plaintext, and transform them so that they are
unintelligible to the outside observer; the transformed
data are called enciphered text or ciphertext.
• Physical Controls
– i.e. locks on doors,
– guards at entry points,
– backup copies of important software and data, and
– physical site planning that reduces the risk of natural disasters.
identification and Authentication
18
If you send email to someone, you implicitly
send along your email account ID so the other
person can reply to you.
Your bank account number is printed on checks
you write; your debit card account number is
shown on your card, and so on. In each of these
cases you reveal a part of your identity.
Authentication, on the other hand, should be
reliable. Although identifiers may be widely
known or easily determined, authentication
should be private.
19
Browser Attack Types
through browsers.
were not enough, SilentBanker also changed the effect of customer actions. So, for
bank A, SilentBanker converted that request to make the transfer go to its own
account at bank B, which the customer’s bank duly accepted as if it had come from
the customer. When the bank returned its confirmation, SilentBanker changed the
details before displaying them on the screen. Thus, the customer found out about
the switch only after the funds failed to show up at bank A as expected.
23
Browser Attack Types
24
• Keystroke Logger
A keystroke logger (or key logger) is either
hardware or software that records all keystrokes
entered. The logger either retains these
keystrokes for future use by the attacker or
sends them to the attacker across a network
connection.
25
Page-in-the-Middle
26
• Program Download Substitution
In a download substitution, the attacker
presents a page with a desirable and harmless
program for the user to download,
27
• User-in-the-Middle
28
Web Attacks Targeting Users
29
• False or Misleading Content
30
• Defaced Web Site
32
• Fake Code
For a replacement or update to the popular Adobe
Reader. The link from which it came (www.pdf-
new-2010-download.com) was redirected from
www.adobe-download-center.com; both
addresses seem like the kinds of URLs Adobe
might use to distribute legitimate software.
Whether this attack is meant just to deceive or to
harm depends on what code is actually delivered.
This example shows how malicious software can
masquerade as legitimate.
33
Web Bug
• If you order flowers online, the florist can obtain your
IP address and set a cookie containing your details so
as to recognize you as a repeat customer.
A web bug allows this tracking across multiple
merchants. Your florist might subscribe to a web tracking
service, which we name ClicksRUs.
The florist includes a web bug in its web image, so when
you load that page, your details are sent to ClicksRUs,
which then installs a cookie.
If you leave the florist’s web site and next go to a bakery’s
site that also subscribes to tracking with ClicksRUs, the
new page will also have a ClicksRUs web bug.
34
Web Bug
A web bug allows this tracking across multiple merchants. Web bugs and
tracking services are big business
35
• Clickjacking
We are all familiar with the click box “Do you want to delete
this file? [Yes] [No].”
Clickjacking is a technique that essentially causes that prompt
box to slide around so that [Yes] is always under the mouse.
The attacker also makes this box transparent, so the victim is
unaware of clicking anything. Furthermore, a second, visible
image is pasted underneath, so the victim thinks the box being
clicked is something like “For a free prize, click [Here].”
The victim clicks where [Here] is on the screen, but [Here] is
not a button at all; it is just a picture directly under [Yes]
(which is invisible). The mouse click selects the [Yes] button.
36
Email Attacks
37
• Fake Email Messages as Spam
Email attacks succeed is that the headers on email are easy to spoof, and thus
recipients believe the email has come from a safe source. Here we consider precisely
Control of email headers is up to the sending mail agent. The header form is
standardized, but within the Internet email network as a message is forwarded to its
destination, each receiving node trusts the sending node to deliver accurate content.
However, a malicious, or even faulty, email transfer agent may send messages with
39
• Phishing
40
Protecting Against Email Attacks
PGP
PGP stands for Pretty Good Privacy.
The PGP processing performs some or all of the following actions, depending
on whether confidentiality, integrity, authenticity.
• Create a random session key for a symmetric algorithm.
• Encrypt the message, using the session key (for message confidentiality).
• Encrypt the session key under the recipient’s public key.
• Generate a message digest or hash of the message; sign the hash by
encrypting it with the sender’s private key (for message integrity and
authenticity).
• Attach the encrypted session key to the encrypted message
• Transmit the message to the recipient. The recipient reverses these steps to
retrieve and validate the message content.
41
• S/MIME
The general MIME specification defines the format and
handling of email attachments. S/MIME (Secure Multipurpose
Internet Mail Extensions) is the Internet standard for secure
email attachments.
49
One-Time Execution
One-Time Execution (Implanting) Malicious code
often executes a one-time process to transmit or
receive and install the infection. Sometimes the
user clicks to download a file, other times the
user opens an attachment, and other times the
malicious code is downloaded silently as a web
page is displayed.
50
Memory-Resident Viruses
• For frequently used parts of the operating system and
for a few specialized user programs, it would take too
long to reload the program each time it is needed.
Instead, such code remains in memory and is called
“resident” code.
• Virus writers also like to attach viruses to resident code
because the resident code is activated many times
while the machine is running. Each time the resident
code runs, the virus does too. Once activated, the virus
can look for and infect uninfected carriers
51
Boot Sector Viruses
52
Boot Sector Viruses
When a computer is started, control begins with
firmware that determines which hardware
components are present, tests them, and transfers
control to an operating system.
The boot sector is an especially appealing place to
house a virus. The virus gains control early in the boot
process, before most detection tools are active,
With boot sector attacks, the assailant changes the
pointer to the next part of the operating system to
load.
53
Stealth
Most viruses maintain stealth by concealing their
action, not announcing their presence, and
disguising their appearance.
several approaches used to transmit code without
the user’s being aware, including downloading as
a result of loading a web page and advertising one
function while implementing another.
Malicious code designers are fairly competent at
tricking the user into accepting malware.
54
• June 2022
17 a) List and explain the countermeasures that can be taken for attacks against identification and authentication.
(b) With the help of suitable examples, explain the security problems created by
OR
attack. 55