Lecture 18
Lecture 18
MIS – Lecture-18
N P Singh
The Crisis Management
Approach to Ransomware
• A culture of crisis management is one in which organizations are
prepared for the possibility of a ransomware attack and have a plan
in place to respond quickly and effectively.
• Proactive risk assessment and mitigation: Organizations should
regularly assess their risk of ransomware attacks and implement
proactive measures to mitigate those risks. This includes measures
such as patch management, vulnerability scanning and intrusion
detection systems.
• Continuous employee training and awareness: Employees
should be educated about the risks associated with ransomware
attacks, common attack vectors and best practices for cybersecurity
hygiene. Organizations should conduct regular training sessions,
workshops and awareness campaigns to keep employees up to date
with the evolving threat landscape.
• Incident response planning and testing: Organizations
should develop a comprehensive incident response plan that outlines
clear roles, responsibilities and protocols for responding to
ransomware attacks. The plan should be regularly tested to ensure
Continue…
• Robust backup and disaster recovery strategies:
Organizations should establish and maintain regular
backups of critical data and systems. The backups
should be regularly tested to ensure their integrity and
accessibility. Organizations should also implement a
well-defined disaster recovery plan that outlines the
process for restoring systems and data in the event of
a ransomware attack.
• Collaborative approach and cross-functional
teams: Organizations should foster a culture of
collaboration and cross-functional teamwork.
Representatives from IT, security, legal,
communications and other relevant departments
should be involved in the incident response planning
Continued…
• Post-incident analysis and lessons learned: After a
ransomware attack, organizations should conduct a
thorough post-incident analysis to understand the root
causes, evaluate the effectiveness of response measures
and identify areas for improvement. Lessons learned
should be documented and implemented to strengthen
the organization's security posture and prevent future
attacks.
• Regular security audits and assessments:
Organizations should conduct regular security audits and
assessments to evaluate the effectiveness of existing
security controls and identify areas for improvement.
External auditors or consultants may be engaged to
provide an unbiased assessment of the organization's
security practices and suggest remediation measures.
Virus Protection
Softwares
McAfee Total Protection :
$99.99 for 10-Devices on 2-Year Plan (List Price
$259.98)
Norton AntiVirus Plus
$19.99 for 1-Device on 1-Year Plan (List Price
$59.99)
Bitdefender Total Security
$35.99 for 5-Devices on 1-Year Plan (List Price
$94.99)
Webroot SecureAnywhere
$23.99 for 1 Device on 1 Year Plan (List Price
$39.99)
VIPRE Ultimate Security
$59.99 for 5-Devices on 1-Year Plan (List Price
Vulnerabilities of
communication lines
Tapping
Phone tapping means secretly listening or / recording a
communication in telephone in order to get information about
other’s activities.
It is also known as ‘wire-tapping’ in some countries.
Both, the Central and the State Governments have a right to
tap phones under Section 5(2) of Indian Telegraphic Act,
1885. There are times when an investigating authority/agency
needs to record the phone conversations of the person who is
under suspicion.
Such authorities are supposed to seek permission from the
Home Ministry before going ahead with such an act. In the
application specific reasons have to be mentioned.
In addition, the need for phone tapping must be proved. Then
the ministry considers the request and grants permission upon
evaluating the merits of the request.
Spoofing & Sniffing
Spoofing
Hackers redirect customer to a fake website that
looks almost exactly the same as true website and
collect the data of customers & use it for further
transactions
“Sniffing” refers to the monitoring of internet
traffic in real time.
Sniffers are type of eavesdropping (secretly listening
the conversation) programs or hardware devices that
can spy on you and all of your internet / network
activity.
Sometimes legitimate, sometimes criminal, sniffers
can leave you feeling exposed.
Attacks on Network
Vehicular Ad hoc Networks (VANETs), are
frequently targeted by a significant
volume of attacks.
VANETs are networks of vehicles equipped
with wireless communication devices,
allowing them to communicate with each
other and with roadside infrastructure.
These networks are vulnerable to various
types of attacks due to their dynamic and
decentralized nature.
Identity Theft as an
example
Phishing is an examples of Malware for Identity theft.
Phishing attacks via social media are on the rise
and India witnessed over 1.5 crore such cyber threats in the
second quarter (Q2) this year, an average of more than 17.5
lakh attacks per day which were blocked by Norton Labs (July
27, 2022).
Reserve Bank of India (RBI) Phishing Scam (2012): In a
first of its kind phishing attempt, scammers had targeted the
Reserve Bank of India. The phishing email, which had
purported to come from RBI, promised the targeted public,
prize money of Rs.10 lakhs within 48 hours if they clicked on
a link that took them to a website that looked exactly like the
RBI’s official website powered with the same logo and web
address. After that, the user was prompted to give personal
information such as his password, I-pin, and savings account
number
Popular Attacks
Confidentiality
Traffic analysis
Information gathering attack
Eavesdropping
Integrity
Message suppression
Message alteration
Fabrication
Masquerade (The attacker typically gains access
to the system or network by impersonating an
authenticated user or by exploiting vulnerabilities
to bypass authentication mechanisms.)
Click Fraud
All those ads you see on websites cost the sponsor money.
Every time someone clicks on an ad, the sponsor is charged
a pay-per-click fee.
The fee is based on the popularity of the search words that
generated the ad. What if your company is paying for an ad
with little or no resultant traffic to your website?
That’s what happens in the case of click fraud.
A person or a software program continually hits on the ad,
driving up the advertising fees, without any intention of
actually visiting the site.
“Click fraud is the act of illegally clicking on pay-per-click
(PPC) ads to increase site revenue or to exhaust advertisers’
budgets. Click fraud is different from invalid clicks (those
that are repeated or made by the ad's publisher) in that it is
intentional, malicious and has no potential for the ad to
Global Threats: Cyberterrorism
and Cyberwarfare
“cybercrime” as “a crime committed on a
computer network
Cyberterrorism essentially consists of using
computer technology to engage in terrorism.
Basically, crime is “personal” while terrorism
is “political.”
(i) weapon of mass destruction;
(ii) weapon of mass distraction; and
(iii) weapon of mass disruption.
“Cyberwarfare” constitutes the conduct of
military operations by virtual means.
Attacks
Packet-filtering firewalls
The most common type of firewall,
examine packets and prohibit them from
passing through if they don’t match an
established security rule set.
This type of firewall checks the packet’s
source and destination IP addresses.
If packets match those of an “allowed”
rule on the firewall, then it is trusted to
enter the network.
Next-generation firewalls
(NGFW)
Combine traditional firewall technology with
additional functionality, such as encrypted
traffic inspection, intrusion prevention
systems, anti-virus, and more.
Most notably, it includes deep packet
inspection (DPI).
While basic firewalls only look at packet
headers, deep packet inspection examines
the data within the packet itself, enabling
users to more effectively identify, categorize,
or stop packets with malicious data
Proxy firewalls
It filter network traffic at the application level.
Unlike basic firewalls, the proxy acts an
intermediary between two end systems.
The client must send a request to the firewall.
Firewall evaluate request against a set of
security rules and then permitted or blocked it.
Most notably, proxy firewalls monitor traffic for
layer 7 protocols such as HTTP and FTP, and
use both stateful and deep packet inspection to
detect malicious traffic.
How Proxy Firewall
works?
The user requests access to the internet
through a protocol such as File Transfer
Protocol (FTP) or Hypertext Transfer Protocol
(HTTP).
The user’s computer attempts to create a
session between them and the server, sending
a synchronize (SYN) message packet from
their IP address to the server’s IP address.
The proxy firewall intercepts the request, and
if its policy allows, replies with a synchronize-
acknowledge (SYN-ACK) message packet from
the requested server’s IP
How Proxy Firewall
works?
When the SYN-ACK packet is received by the user’s
computer, it sends a final ACK packet to the server’s IP
address. This ensures a connection to the proxy but not
a valid Transmission Control Protocol (TCP) connection.
The proxy completes the connection to the external
server by sending a SYN packet from its IP address.
When it receives the server’s SYN-ACK packet, it
responds with an ACK packet. This ensures a valid TCP
connection between the proxy and the user’s computer
and between the proxy and the external server.
Requests made through the client-to-proxy connection
then the proxy-to-server connection will be analyzed to
ensure they are correct and comply with the corporate
policy until either side terminates the connection.
Diagram of Proxy
Firewall
Intrusion Detection
Systems
Full time intrusion detection softwares are placed at
vulnerable points in the corporate network to monitor
abnormal events.
Examples
Solar Winds Security Event Manager
Analyzes logs from Windows, Unix, Linux, and Mac OS
systems.
It manages data collected by Snort, including real-time data.
Snort is an open-source, free and lightweight
network intrusion detection system (NIDS) software
for Linux and Windows to detect emerging threats
Security Event Management (SEM) is an intrusion
prevention system, shipping with over 700 rules to shut
down malicious activity. An essential tool for improving
security, responding to events and achieving compliance.
Anti Malware Software