Friday, 8 February 2013

Computer Attacks and Security


Computer Security and Computer Attacks




Security in information technology, security is the protection of information assets through the use of technology, processes, and training and According to (http://en.wikipedia.org/wiki/Security) security as a condition is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. Establishing or maintaining a sufficient degree of security is the aim of the work, structures, and processes called "security."
The following statements about security below are the following that we had learned during our discussions.
Reducing Vulnerabilities
  • -          Security is a combination of technology, policy and people. It requires a wide range of activities to be effective.
  • -          Assess threats to an organization’s computers and network
  • -          Identify actions that address the most serious vulnerabilities
  • -          Educate users
  • -          Monitor to detect a possible intrusion
  • -          Create a clear reaction plan

Risk Assessment

-          Organizations review of:
-          Risk Assessment is a process of assessing security-related risks to an organizations computers and networks from both internal and external threats.
-          Identify investments that can best protect an organization from the most likely and serious threats
-          Reasonable assurance
-          Improve security in areas with:
·         Highest estimated cost
·         Poorest level of protection

Establishing a Security Policy – it defines an organizations security requirements, controls and sanctions needed to meet the requirements. Delineates responsibilities and expected behavior, outlines what need to be done, not how to do it. Automated system policies should mirror written policies.
-          Trade –off between – ease of use and increased security
-          Areas of concern – email attachments and wireless devices
VPN uses the internet to relay communications but maintains privacy through security features; additional security includes encrypting originating and receiving network addresses.

Educating Employees, Contractors, and Part-Time Workers
                Educate users about the importance of security it motivate them to understand and follow the security policy. Discuss recent security incidents that affected the organization. It help protect information by; guarding passwords, not allowing others to use passwords, applying strict access control to protect data, and reporting all unusual activity.

Firewall – limits network access. According to (http://en.wikipedia.org/wiki/Firewall_(computing)) A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Manyrouters that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.

Antivirus software – scans for specific sequence of bytes, known as the virus signature. Antivirus software continually updated with the latest virus detection information called definitions. Departing employees you should promptly delete computer accounts, login ID’s and passwords. Carefully define employee roles and create roles and user accounts. Keep track of well-known vulnerabilities, back up critical applications and data regularly and perform security audit. Lastly, according to (http://netforbeginners.about.com/od/a/g/antivirus.htm) "antivirus" is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.
                
This is the following attacks:
  • .       Virus
  • .       Worm
  •        Trojan horse
  •        Denial of Service

Virus – is a pieces of programming code, usually disguised as something else and cause unexpected and usually undesirable events. Often attached to files, deliver a “payload”. It does not spread itself to computer to computer without human intervention.  It be passed on to other users through infected e-mail document attachments, program diskettes and shared files. Macro viruses are common and easily created viruses. It is created in an application of macro language and infects documents and templates. According to (http://en.wikipedia.org/wiki/Computer_virus) A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. The majority of active malware threats are usually trojans or worms rather than viruses.

Worms – it is harmful programs that reside in active memory of a computer it duplicate them and can propagate without human intervention. The negative impact that worms can cause to the computers are lost of data and programs, lost productivity and effort of IT workers.
Trojan Horses – is a program that a hacker secretly installs to any part of the program that they have made. Users are tricked into installing it, can be delivered as an email attachment, and downloaded from a web site or from a removable device as CD/DVD or USB. Logic bomb executes under specific conditions.

Botnet – a large group of computers controlled from one or more remote locations by hackers, w/out the knowledge or consent by their owners. Accorind to (http://en.wikipedia.org/wiki/Botnet) a botnet is a collection of internet-connected programs communicating with other similar programs in order to perform tasks. This can be as mundane as keeping control of an IRC channel, or it could be used to send spam email or participate in DDOS attacks. The word botnet stems from the two words robot and network.

Denial –of-Service (DoS) Attacks – is a malicious hacker taker over computers on the internet and causes them to flood a target site with demands for data and other small tasks, the computers that are taken over are called zombies. DoS do not involve a break-in at the target computer. Target machine is busy responding to stream of automated requests, legitimate users cannot get in. Spoofing generates a false return address on packets. Ingress filtering is when internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on. Egress filtering is ensuring spoofed packets don’t leave a network.

Perpetrators – is an act or motives that are the same as other criminals. It has different objectives and access to varying resources. It also has different levels of risk to accomplish an objective. The people who launch that kinds of computer attacks include thrill seekers wanting to a challenge, common criminals looking for financial gain, industrial spies trying to gain a competitive advantage, and terrorists seeking to cause destruction.

Classifying Perpetrators of Computer Crime
  • .       Hackers
  • .       Crackers
  • .       Malicious Insiders
  • .       Industrial Spies
  • .       Cybercriminals
  • .       Hactivist and Cyberterrorists

Hackers – test limitations of systems out of intellectual curiosity.

Crackers – cracking is a form of hacking clearly criminal activity.

Malicious Insiders – top security concern for companies, estimated 85 percent of all fraud is committed by employees. Usually due to weaknesses in internal control procedures. Collusion is cooperation between an employee and outsider. Insiders are not necessarily employees it can be also consultants and contractors. It is extremely difficult to detect or stop authorized to access the very system they abuse.
Industrial Spies –illegally obtain trade secrets from competitors. Trade secrets are protected by the Economic Espionage Act of 1996. Competitive Intelligence uses legal techniques and gathers information that are available to the public why Industrial espionage uses illegal means and obtains information that are not available to the public.

Cyber Criminals – Hack into corporate computers and steal, engage in all forms of computer fraud. Chargeback are disputed transactions. Loss of customer trust has more impact than fraud, to reduce the potential for online credit card fraud sites:
  • -          Use encryption for online credit card
  • -          Verify the addresses submitted online against the issuing bank
  • -          Request a card verification value (CVV)
  • -          Use transaction-risk scoring software.

Smart cards
  • -          Contain a memory chip
  • -          Are updated with encrypted data every time the card is used
  • -          Used widely in Europe
  • -          Not widely used in the U.S.


Hactivists is a combination of the words hacking and activism, hacking to achieve a political or social goal.

A Cyber terrorist launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce a government in order to advance certain political or social objectives. Cyber terrorists seek to cause harm rather than gather information. Many experts believe terrorist groups pose only a limited threat to information system.



Trustworthy Computing – is a method of computing that delivers secure, private, and reliable computing experiences based on the sound business practices. This is what organizations worldwide are demanding today.
Detection systems can catch intruders in the act. Intrusion detection system monitors system and network resources and activities. Notifies the proper authority when it identifies. Possible intrusions form outside the organization, misuse from within the organization.



No comments:

Post a Comment