Anda di halaman 1dari 8

Some differences between traditional

What is Security? security and information security


Security is the protection of assets. The
three main aspects are: • Information can be stolen - but you still
have it
• prevention • Confidential information may be copied and
sold - but the theft might not be detected
• detection • The criminals may be on the other side of
the world

• re-action
1 2

Terms used:
• Information security is securing information
Computer Security from unauthorized access, modification &
deletion
Computer security is the protection of computer systems
• Computer Security means securing a standalone
and information from harm, theft, and unauthorized use.
It is the process of preventing and detecting unauthorized machine by keeping it updated and patched
use of your computer system. • Cybersecurity is defined as protecting computer
systems, which communicate over the
computer networks

3 4

1
Components of computer The CIA Triad
system
• Hardware, the physical part of the computer,
like the system memory and disk drive
• Firmware, permanent software that is etched
into a hardware device’s nonvolatile memory
and is mostly invisible to the user
• Software, the programming that offers services,
like operating system, word processor, internet
browser to the user
5 6

• Confidentiality is ensuring that Confidentiality


information is available only to the
intended audience • The prevention of unauthorised disclosure
of information.
• Integrity is protecting information from
being modified by unauthorized parties • Confidentiality is keeping information
secret or private.
• Availability is protecting information from
being modified by unauthorized parties • Confidentiality might be important for
military, business or personal reasons.

7 8

2
Basic Network Attacks
Integrity
• Malware – It is the malicious software which is
• Integrity is the unauthorised writing or specifically designed to disrupt, damage, or gain
modification of information. authorized access to a computer system. Much of
• Integrity means that there is an external the malware out there today is self-replicating:
consistency in the system - everything is as once it infects one host, from that host it seeks
it is expected to be. entry into other hosts over the Internet, and from
• Data integrity means that the data stored on the newly infected hosts, it seeks entry into yet
a computer is the same as the source more hosts. In this manner, self-replicating
documents. malware can spread exponentially fast.
9 10

• Virus – A malware which requires some form of


user’s interaction to infect the user’s device. The • Botnet – A botnet is a group of computers connected
classic example is an e-mail attachment containing to the internet, that have been compromised by a
malicious executable code. If a user receives and hacker using a computer virus. An individual
opens such an attachment, the user inadvertently computer is called ‘zombie computer’. The result of
this threat is the victim’s computer, which is the bot
runs the malware on the device.
will be used for malicious activities.
• Worm – A malware which can enter a device • Rootkit: A rootkit is a computer program designed to
without any explicit user interaction. For example, provide continued privileged access to a computer
a user may be running a vulnerable network while actively hiding its presence. Once a rootkit has
application to which an attacker can send malware. been installed, the controller of the rootkit will be
able to remotely execute files and change system
configurations on the host machine.
12

3
Keylogger: Also known as a keystroke logger, DoS (Denial of Service) – A DoS attack renders a
keyloggers can track the real-time activity of a user network, host, or other pieces of infrastructure unusable
on his computer. It keeps a record of all the by legitimate users. Most Internet DoS attacks fall into
keystrokes made by user keyboard. Keylogger is also one of three categories :
a very powerful threat to steal people’s login • Vulnerability attack: This involves sending a few well-
credential such as username and password. crafted messages to a vulnerable application or operating
system running on a targeted host. If the right sequence of
packets is sent to a vulnerable application or operating
system, the service can stop or, worse, the host can crash.
• Bandwidth flooding: The attacker sends a deluge of
packets to the targeted host—so many packets that the
target’s access link becomes clogged, preventing
legitimate packets from reaching the server.
13

• DDoS (Distributed DoS) – DDoS is a type


of DOS attack where multiple compromised
systems, are used to target a single system
• Connection flooding: The attacker
causing a Denial of Service (DoS) attack.
establishes a large number TCP connections
DDoS attacks leveraging botnets with
at the target host. It is also known as a
thousands of comprised hosts are a common
"TCP connection flood“. it attempts to
occurrence today. DDoS attacks are much
occupy all possible TCP connections on a
harder to detect and defend against than a
server. By flooding the server with requests
DoS attack from a single host.
for new connections, it prevents legitimate
requests from being established and served.
15 16

4
Packet sniffer – A passive receiver that records • IP Spoofing – IP spoofing refers to
a copy of every packet that flies by is called a connection hijacking through a fake Internet
packet sniffer. By placing a passive receiver in Protocol (IP) address. IP spoofing is the
the vicinity of the wireless transmitter, that action of masking a computer IP address so
receiver can obtain a copy of every packet that that it looks like it is authentic. During this
is transmitted! These packets can contain all masking process, the fake IP address sends
kinds of sensitive information, including the message coupled with an IP address that
passwords, social security numbers, trade appears to be authentic and trusted
secrets, and private personal messages. some of
the best defenses against packet sniffing
involve cryptography.
18

Man-in-the-Middle Attack –It is a type of • Compromised-Key Attack – A key is a


cyberattack where a malicious actor inserts secret code or number necessary to interpret
him/herself into a conversation between two secured information. After an attacker
parties, impersonates both parties and gains obtains a key, that key is referred to as a
access to information that the two parties were compromised key. An attacker uses the
trying to send to each other. A man-in-the- compromised key to gain access to a
middle attack allows a malicious actor to secured communication without the sender
intercept, send and receive data meant for or receiver being aware of the attack.
someone else, or not meant to be sent at all,
without either outside party knowing until it is
too late
19 20

5
• Phishing – Phishing is a form of fraud in Computer Security Practices
which an attacker act as a genuine entity or
Some preventive steps you can take include:
person in email or other communication
channels. The attacker uses phishing emails • Secure your computer physically by:
to distribute malicious links or attachments – Installing reliable, reputable security and anti-virus
that can perform a variety of functions, software
including the access of login credentials, – Activating your firewall, because a firewall acts as
a security guard between the internet and your
account information, credit card information
local area network
from victims.
• Stay up-to-date on the latest software and news
surrounding your devices and perform
software updates as soon as they become
21
available 22

• Avoid clicking on email attachments unless you 6 Indian Websites That Have Recently
know the source Been Taken Down By Hackers
• Change passwords regularly, using a unique Telecom Regulatory Authority of India
combination of numbers, letters and case types (TRAI): Indian Telecom regulator TRAI's
• Use the internet with caution and ignore pop-ups, website was hacked soon after it released
drive-by downloads while surfing millions of email IDs which were used to send
the response to a consultation paper. Famous
• Perform daily full system scans and create a
hacker group Anonymus' India wing was
periodic system backup schedule to ensure your
behind this and they claimed the responsibility
data is retrievable should something happen to
on twitter as well.
your computer.

23 24

6
Indian Army: In April 2015, the army's Indian Space Research Organisation
Principal Comptroller of Defence Accounts (ISRO): Indian Space Research
Officers (PCDAO) website was reportedly Organization's marketing arm Antrix saw its
hacked in April 2015. It has personal and website hacked in July 2015. Users were
financial information of army personnel. redirected to a buying portal while trying to
Many officers were unable to access their access the website. Later on, there was a 404
salary information. error on the web page.
University website hacks: JNU's library • Kerala Government website: Pakistani
website was compromised to warn the 'anti- hackers took down the Kerala government
nationals' and 'Traitors'. The official website website and replaced its page with "Pakistan
of Orissa University of Agriculture and Zindabad" and "Security is just an illusion".
Technology (OUAT) was also hacked Hackers also displayed their names and
25
said, "We are an army of Pakistani hackers".

Central Bureau Of Investigation (CBI): Marketplace for Vulnerabilities


Pakistani hackers have been targeting Indian
• Option 1: bug bounty programs
cyberspace since a long time. In December
2010, they attacked the intelligence – Google: up to $3133.7 in 2010, now up to $20K per
bug
agency CBI's website. The 'Pakistani Cyber
– Facebook: up to $20K per bug
Army' also left a message about filtering
– Microsoft: up to $150K per bug
controls of National Informatics Center (NIC).
– Pwn2Own competition: $10-15K
• Option 2: vulnerability brokers
– ZDI, iDefense: $2-25K
• Option 3: gray and black markets
– Up to $100-250K reported (hard to verify)
27 slide 28

– A zero-day against iOS sold for $500K (allegedly)

7
It’s a Business Marketplace for Stolen Data
• Several companies specialize in finding and • Single credit card number: $4-15
selling exploits • Single card with magnetic track data: $12-30
– ReVuln, Vupen, Netragard, Exodus Intelligence • “Fullz”: $25-40
– The average flaw sells for $35-160K
– Full name, address, phone, email addresses (with
– $100K+ annual subscription fees passwords), date of birth, SSN, bank account
• Nation-state buyers and routing numbers, online banking credentials,
– “Israel, Britain, Russia, India and Brazil are some credit cards with magnetic track data and PINs
of the biggest spenders. North Korea is in the • Online credentials for a bank account with
market, as are some Middle Eastern intelligence $70-150K balance: under $300
services. Countries in the Asian Pacific, including
Malaysia and Singapore, are buying, too” slide 29 slide 30

Marketplace for Victims


• Pay-per-install on compromised machines
– US: $100-150 / 1000 downloads, “global mix”:
$12-15
– Can be used to send spam, stage denial of service
attacks, perform click fraud, host scam websites
• Botnets for rent
– DDoS: $10/hour or $150/week
– Spam: from $10/1,000,000 emails
• Tools and services
– Basic Trojans ($3-10), Windows rootkits ($300),
email, SMS, ICQ spamming tools ($30-50), botnet
slide 31

setup and support ($200/month, etc.)

Anda mungkin juga menyukai