Information Security
Information Security
DR M Y Siyal
Computer/Information Security
P1-1
COURSE OUTLINES
OBJECTIVE
This subject intends to provide students with essential concepts
of computer/information security, cryptography, secure protocols,
security
Plan-Protect-Respond
cycle,
and
other
security
Computer/Information Security
P1-2
COURSE ASSESSMENT
The course assessment is done by:
CONTINUOUS ASSESSMENT (CA)
20%
Questions
80%
Four Questions
Closed Book
DR M Y Siyal
Computer/Information Security
P1-3
BOOKS
Text and Reference Books
William Stallings, Cryptography and Network Security: Principles
and Practices, 6 Ed, Prentice Hall, 2013.
William Stallings, Network Security Essentials: Applications and
Standards, 5 Ed, Prentice Hall, 2014.
Other Useful Books
Computer/Information Security
P1-4
SAMPLE OF
COMPUTER/INFORMATION
SECURITY
INCIDENTS/ATTACKS
DR M Y Siyal
Computer/Information Security
P1-5
Computer/Information Security
P1-6
Computer/Information Security
P1-7
Computer/Information Security
P1-8
Computer/Information Security
P1-9
Computer/Information Security
P1-10
Computer/Information Security
P1-11
Computer/Information Security
P1-12
Computer/Information Security
P1-13
Computer/Information Security
P1-14
Source: http://www.hackmageddon.com/2015/07/13/june2015-cyber-attacks-statistics/
DR M Y Siyal
Computer/Information Security
P1-15
Source: http://www.hackmageddon.com/2015/07/13/june2015-cyber-attacks-statistics/
DR M Y Siyal
Computer/Information Security
P1-16
Source: http://www.hackmageddon.com/2015/07/13/june2015-cyber-attacks-statistics/
DR M Y Siyal
Computer/Information Security
P1-17
Source: http://www.hackmageddon.com/2015/07/13/june2015-cyber-attacks-statistics/
DR M Y Siyal
Computer/Information Security
P1-18
DR M Y Siyal
Computer/Information Security
P1-19
DR M Y Siyal
Computer/Information Security
P1-20
DR M Y Siyal
Computer/Information Security
P1-21
DR M Y Siyal
Computer/Information Security
P1-22
DR M Y Siyal
Computer/Information Security
P1-23
Data Breaches
DR M Y Siyal
Computer/Information Security
P1-24
INTRODUCTION TO
COMPUTER/INFORMATION
SECURITY
DR M Y Siyal
Computer/Information Security
P1-25
WHAT IS COMPUTER/INFORMATIONSECURITY?
The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the:
Confidentiality
Integrity
Availability
of information system resources
Hardware
Software
Firmware
Information/data
Telecommunications
Examples of Security Requirements
Confidentiality student grades
Integrity patient information
Availability authentication services
DR M Y Siyal
Computer/Information Security
P1-26
COMPUTER/INFORMATION SECURITY
SECURITY
State of freedom from a danger or risk
INFORMATION SECURITY
Tasks of guarding information that is in a digital format
Ensures that protective measures are properly implemented
Protect information that has value to people and
organizations
Value comes from the characteristics of the information
Security is achieved through a combination of three entities
Products
People
Procedures
DR M Y Siyal
Computer/Information Security
P1-27
COMPUTER/INFORMATION SECURITY
A successful organization should have multiple layers of
security in place:
Physical security (Products)
Personal security (People)
Organization security (Procedure)
Communications security
Network security
Information security (CIA)
DR M Y Siyal
Computer/Information Security
P1-28
COMPUTER/INFORMATION SECURITY
COMPONENTS
DR M Y Siyal
Computer/Information Security
P1-29
COMPUTER/INFORMATION SECURITY
COMPONENTS
C.I.A. TRIANGLE
Was standard based on Confidentiality, Integrity, and
Availability
Now expanded into list of critical characteristics of
information
DR M Y Siyal
Computer/Information Security
P1-30
DR M Y Siyal
Computer/Information Security
P1-31
DR M Y Siyal
Computer/Information Security
P1-32
Computer/Information Security
P1-33
DR M Y Siyal
Computer/Information Security
P1-34
SECURITY SERVICES
AUTHENTICATION
Assurance that communicating entity is the one claimed.
ACCESS CONTROL
Prevention of the unauthorized use of a resource.
DATA CONFIDENTIALITY
Protection of data from unauthorized disclosure.
DATA INTEGRITY
Assurance that data received is as sent by an authorized entity.
NON-REPUDIATION
Protection against denial by one of the parties in a communication.
AVAILABILITY
Resource accessible/usable.
SECURITY MECHANISM
Feature designed to detect, prevent, or recover from a security attack.
DR M Y Siyal
Computer/Information Security
P1-35
SECURITY GOALS
C.I.A.
INTEGRITY
CONFIDENTIALITY
DR M Y Siyal
AVAILABILITY
Computer/Information Security
P1-36
Sender
encrypt
Recipient
decrypt
ciphertext
plaintext
plaintext
shared
secret
key
DR M Y Siyal
Attacker
(eavesdropping)
Computer/Information Security
shared
secret
key
P1-37
Computer/Information Security
P1-38
Computer/Information Security
P1-39
Computer/Information Security
P1-40
Computer/Information Security
P1-41
Computer/Information Security
P1-42
Computer/Information Security
P1-43
Computer/Information Security
P1-44
Computer/Information Security
P1-45
Computer/Information Security
P1-46
2007
Estonia suffers massive denial-of-service attack.
United Nations website hacked by Turkish Hacker Kerem125.
FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and
8 indictments.
2008
Around 20 Chinese hackers claim to have gained access to the world's most
sensitive sites, including The Pentagon.
2009
April 1: Conficker worm has infiltrated billions of PCs worldwide including
many government-level top-security computer networks.
July 4: The July 2009 cyber attacks occur and the emergence of the
W32.Dozer attack the United States and South Korea.
July 19: Kaspersky official website successfully hacked by Yusuf, a Turkish
Hacker
DR M Y Siyal
Computer/Information Security
P1-47
Computer/Information Security
P1-48
Computer/Information Security
P1-49
25 July 2013
Five hackers stole 160 Million credit card numbers in largest data theft case
ever prosecuted in the U.S.
Four Russians and a Ukrainian are charged with running sophisticated
hacking organization over seven year period.
One company - Heartland Payment Systems - suffered losses of about $200
million and 130 million cards numbers were stolen.
DR M Y Siyal
Computer/Information Security
P1-50
Computer/Information Security
P1-51
FAMOUS HACKERS
KEVIN MITNICK
He was once one of the most wanted criminals, with break-ins
ranging from the Pentagon to Digital Equipment Corp.
Currently he runs Mitnick Security Consulting in USA, and is an
author.
His latest book is called "Ghost in the Wires" .
He has acquired a kind of celebrity status and regularly appears
at speaking engagements and book signings.
DR M Y Siyal
Computer/Information Security
P1-52
FAMOUS HACKERS
GEORGE HOTZ
A 22-year-old hacker best known for "jailbreaking" the iPhone
and hacking the PlayStation 3 (2011), which led to a showdown
with Sony Corp.
Sony sued Hotz, which resulted in a settlement forbidding Hotz
from hacking Sony products.
The hacking group Anonymous took up Hotz's cause,
retaliating with attacks against the company.
He was later hired by Facebook.
DR M Y Siyal
Computer/Information Security
P1-53
FAMOUS HACKERS
ADRIAN LAMO
He was arrested in 2003 for breaking into the New York Times'
computer network and was sentenced to house arrest.
Lamo returned to the spotlight in 2010 when he and a young
Army private named Bradley Manning leaked classified
government communications to WikiLeaks.
Manning was charged, while Lamo has been branded as a
traitor, leading to his harassment on the internet and at hacking
conferences.
DR M Y Siyal
Computer/Information Security
P1-54
FAMOUS HACKERS
ROBERT TAPPAN MORRIS
Robert Tappan Morris attained notoriety in 1988 when, as a graduate
student at Cornell University, he unleashed the first widespread worm attack
on the Internet, causing thousands of computers to crash.
The son of a high-ranking National Security Agency scientist, Morris said the
program was a research experiment that got out of control.
He became the first person charged under an anti-hacking law that made it
illegal to penetrate federal computers. He was fined $10,000 and ordered to
perform 400 hours of community service, a punishment some security
experts say was too steep considering the types of internet attacks that are
now launched daily.
Morris is currently a computer science
professor at the
Massachusetts Institute of Technology
DR M Y Siyal
Computer/Information Security
P1-55
FAMOUS HACKERS
MAX BUTLER
Max Butler is a former FBI informant who operated a stolen credit-card site
called CardersMarket.
Known online as "Iceman," he assembled one of the Internet's largest
cybercrime commerce sites, with thousands of users, and ran it out of his
San Francisco apartments.
A series of blunders by associates -- getting caught using stolen cards in
retail stores -- led to the site's unravelling and Butler's arrest and
incarceration. He was sentenced to 13 years in prison for stealing 2 million
credit-card numbers, which were used to rack up $86 million in fraudulent
charges.
DR M Y Siyal
Computer/Information Security
P1-56
FAMOUS HACKERS
MICHAEL LYNN
Michael Lynn rose to fame in 2005 when Cisco Systems Inc went to great
lengths to try to censor his presentation on software vulnerabilities that
would allow attackers to take over Cisco routers.
Cisco threatened a lawsuit, ordering workers to rip 20 pages out of the
program for the Black Hat security conference and destroy 2,000 CDs
containing the presentation.
Lynn quit his employer, Internet Security Systems Inc., which he says
pressured him to censor the talk as well.
He gave it anyway, becoming a hacker hero.
Lynn now works for Cisco rival
Juniper Networks Inc. as a senior engineer.
DR M Y Siyal
Computer/Information Security
P1-57
FAMOUS HACKERS
KEVIN POULSEN
Kevin Poulsen is a convicted computer hacker who has transformed
himself into a top security journalist.
He is the author of "Kingpin," a book about CardersMarket operator
Max Butler, and is the news editor at Wired.com.
Poulsen's specialty was hacking telephone networks.
He once commandeered all the phone lines of a Los Angeles radio
station to ensure he would be the winning caller in a Porsche
giveaway.
Poulsen served more than five years in prison.
DR M Y Siyal
Computer/Information Security
P1-58
FAMOUS HACKERS
Jonathan James
At only fifteen years of age, he managed to hack into a number of
networks, including the U.S. Department of Defense, and NASA.
Total cost to NASA was $1.7 millions, while NASA had to shut down for 3
days to complete the investigation, which incur another $41,000.
He was convicted and sent to prison while he was still a minor.
In 2007 a number of high profile companies fell victim to a massive wave
of malicious network attacks.
Even though James denied any involvement, he was
suspected and investigated.
In 2008, James committed suicide, believing he would
be convicted of crimes that he did not commit.
DR M Y Siyal
Computer/Information Security
P1-59
FAMOUS HACKERS
Albert Gonzalez
He was the leader of a hacker group known as ShadowCrew and stole
over 170 million credit cards and ATM cards and sold them online for profit.
ShadowCrew also fabricated $4.3 million fraudulent passports, health
insurance cards, and birth certificates for identity theft crimes.
He was caught when he hacked into the databases of TJX Companies and
Heartland Payment Systems for their stored credit card numbers.
In 2010, Gonzalez was sentenced to prison for 20 years.
DR M Y Siyal
Computer/Information Security
P1-60
Computer/Information Security
P1-61
Computer/Information Security
P1-62
Computer/Information Security
P1-63
Computer/Information Security
P1-64
Computer/Information Security
P1-65
Computer/Information Security
P1-66
DR M Y Siyal
Computer/Information Security
P1-67
Computer/Information Security
P1-68
1. AUTOMATION
Speed of computers and networks makes minimal rate of return
attacks possible.
Data mining is easy and getting easier, affecting privacy
2. ACTION AT A DISTANCE
Attackers can be far away from their prey and still do damage.
Interstate/International differences in laws can affect prosecution
Computer/Information Security
P1-69
Computer/Information Security
P1-70
Computer/Information Security
P1-71
Computer/Information Security
P1-72
SECURITY ATTACKS
DR M Y Siyal
Computer/Information Security
P1-73
Alice
Bob
Eve
DR M Y Siyal
Computer/Information Security
P1-74
DR M Y Siyal
Computer/Information Security
P1-75
Communication
channel
Sender
encrypt
Recipient
decrypt
plaintext M
plaintext M
shared
secret
key
ciphertext C
ciphertext C
shared
secret
key
Attacker
(intercepting)
DR M Y Siyal
Computer/Information Security
P1-76
From: Alice
REPUDIATION
DR M Y Siyal
Computer/Information Security
P1-77
Alice
DR M Y Siyal
Computer/Information Security
P1-78
Computer/Information Security
P1-79
Bacteria
DR M Y Siyal
Computer/Information Security
Worms
P6-80
MALWARE
Vulnerability-Specific versus Universal Malware
Vendors release patches to close vulnerabilities.
However, users do not always install patches promptly or at all and so
continue to be vulnerable.
Also, zero-day attacks occur before the patch is released for the
vulnerability.
VIRUS
A program that piggybacks on other executable programs
Not structured to exist by itself
When the host program is executed, the virus code also executes and
performs its action
Typically, actions may be
Spreading itself to other programs or disks
Delete files
Cause systems to become unusable
DR M Y Siyal
Computer/Information Security
P1-81
VIRUS DETECTED
Source: http://isc.sans.org/diary.html
DR M Y Siyal
Computer/Information Security
P1-82
Computer/Information Security
P1-83
VIRUS
A typical virus goes through phases of:
DORMANT : The virus is idle
PROPAGATION: The virus places an identical copy of itself into
other programs
TRIGGERING: The virus is activated to perform the function for
which it was intended
EXECUTION: The function is performed
What Viruses CANT Do
Viruses CANT physically damage your computers hardware.
If your computer suddenly bursts into flames
it isnt a virus.
DR M Y Siyal
Computer/Information Security
P1-84
In the late 1980s and early 1990s, most viruses were spread by
FLOPPYNET.
Someone inserts an infected floppy disk with a boot sector
virus into their computer, infecting their computer and
every other floppy they insert thereafter.
Most viruses today spread through
Contaminated media (USB drive, or DVD)
Email and peer-to-peer sites
Part of another program
Visits to Websites (even legitimate ones)
Social networking sites
DR M Y Siyal
Computer/Information Security
P1-85
TYPE OF VIRUS
ARMORED VIRUS
COMPANION VIRUS
MACRO VIRUS
MULTIPARTITE VIRUS
PHAGE VIRUS
RETROVIRUS
POLYMORPHIC VIRUS
STEALTH VIRUS
ARMORED VIRUS
It is designed to make itself difficult to detect or analyze
Cover themselves with a protective code that stop debuggers or
dis-assemblies from examining critical elements of the virus
Some part of the code may also act as a decoy to distract
analysis
Need to identify them quickly!
DR M Y Siyal
Computer/Information Security
P1-86
TYPE OF VIRUS
COMPANION VIRUS
Attaches itself to legitimate program and when a user types the name
of the legitimate program, the companion virus executes instead of
the real program
Or make changes to program pointers in the registry so that they
point to the infected program
The infected program perform its dirty deed and then starts the real
program
MACRO VIRUS
It exploits the enhancements made to many applications
Macro virus infects such macros such that the related documents are
infected and can spread to other systems via attached documents in
an email
DR M Y Siyal
Computer/Information Security
P1-87
TYPE OF VIRUS
MULTIPARTITE VIRUS
Attacks your system in multiple ways
May infects your boot sector, all your executable files and destroy your
application files (e.g., MS word documents) at the same time
The key is that you wont be able to correct all the problems and will allow
infestation to continue
PHAGE VIRUS
It modifies other programs and databases
Require reinstallation of programs or databases to remove virus
POLYMORPHIC VIRUS
The virus changes form in order to avoid detection
Attempt to hide from your antivirus program by
Encrypting itself
Change its signature to fool the antivirus program
DR M Y Siyal
Computer/Information Security
P1-88
TYPE OF VIRUS
RETROVIRUS
It bypasses the antivirus program
May directly attack the antivirus program
Destroy the virus definition database file
May leave you with a false sense of security
STEALTH VIRUS
Hide from antivirus program by masking itself from application
May attach itself to the boot sector
Redirects commands to avoid detection
Report a different file size
Move around from file to file, e.g., from file A (not yet scanned) to file B
(already scanned) during a virus scan
VIRUS TRANSMISSION
Some viruses destroy the target system immediately, while some use the
victim system as a carrier to infect other servers and eventually infects the
original victim system and destroy it completely.
DR M Y Siyal
Computer/Information Security
P1-89
WORMS
Viruses, as just noted, are pieces of code that attach themselves
to other programs.
Worms, in contrast, are stand-alone programs that do not need to
attach to other programs.
Can propagate like viruses through e-mail, and so on.
Antivirus programs search for worms as well as viruses.
Directly-propagating worms jump to victim hosts directly.
Can only do this if target hosts have a specific vulnerability.
Directly-propagating worms can spread with amazing speed.
Directly-propagating worms can be thwarted by firewalls and by
installing patches.
Not by antivirus programs.
DR M Y Siyal
Computer/Information Security
P1-90
MALWARE
PAYLOADS
After propagation, viruses and worms execute their payloads.
Payloads erase hard disks or send users to harmful sites.
Often, the payload downloads another program.
An attack program with such a payload is called a
downloader.
Many downloaded programs are Trojan horses.
Trojan horses are programs that disguise themselves as
system files.
Spyware Trojans collect sensitive data and send the data they
collect to an attacker.
Website activity trackers
Keystroke loggers
DR M Y Siyal
Computer/Information Security
P1-91
MALWARE
MOBILE CODE
HTML Webpages can contain scripts.
Scripts are snippets of code in a simplified programming language
that are executed when the Webpage is displayed in a browser.
A common scripting language is JavaScript.
Scripts enhance the user experience and may be required to see the
Webpage.
Scripts are called mobile code because they are downloaded with the
Webpage.
Scripts may be damaging if the browser has a vulnerability.
TROJAN HORSE
A program that hides its malicious nature behind the facade of something
useful or interesting
It is a complete and self-contained program that is designed to perform
some malicious actions
It may contain mechanism to spread itself
DR M Y Siyal
Computer/Information Security
P1-92
DR M Y Siyal
Computer/Information Security
P1-93
MALWARE
LOGIC BOMB
Program or snippet of codes that execute when a certain
predefined events occurs
Events could also be based on a certain date (e.g., Christmas) or
set of circumstances (certain employee has being sacked)
It could send a message back to the attacker or launch an attack
such as DDoS, or grant access to the victim system at attackers
choice of time
HOAX AND SPAM
Hoaxes usually claim to do things that are impossible for viruses
to do the aim is to create widespread panic
Spams are annoying, unwanted, unsolicited emails and come in
large volume
Anti-spam and filtering software are used to prevent spams
DR M Y Siyal
Computer/Information Security
P1-94
Source: http://isc.sans.org/diary.html
DR M Y Siyal
Computer/Information Security
P1-95
Computer/Information Security
P1-96
ATTACKS ON INDIVIDUALS
SOCIAL ENGINEERING
Social engineering is a network intrusion technique based on
trickery.
Hackers use it to fool someone into revealing access codes,
passwords, or other confidential information and break into a system.
Works best if people dont know one another and high staff turn over.
IDENTITY THEFT
Collecting enough data to impersonate the victim in large financial
transactions
May take a long time to restore the victims credit rating
In corporate identity theft, the attacker impersonates an entire
corporation.
Accept credit cards in the companys name.
Commit other crimes in the name of the firm.
Can seriously harm a companys reputation.
DR M Y Siyal
Computer/Information Security
P1-97
DR M Y Siyal
Computer/Information Security
P1-98
DR M Y Siyal
Computer/Information Security
P1-99
HUMAN BREAK-INS
Viruses and worms only have a single attack method.
Humans can keep trying different approaches until they succeed.
HACKING
Informally, hacking is breaking into a computer.
Formally, hacking is intentionally using a computer resource
without authorization or in excess of authorization.
HACKER
Originally, an expert programmer.
Today, someone who breaks into computers.
TYPES OF HACKERS
Elite Hackers
Script Kiddies
Script writers
DR M Y Siyal
Computer/Information Security
P1-100
HACKER
ELITE HACKERS
Superior technical skills
Very persistent
Often publish their exploits
Not only have the ability to write scripts that exploit vulnerabilities but
also are capable of discovering new vulnerabilities
SCRIPT WRITERS
Writing scripts to exploit known vulnerabilities.
Much more technically competent than script kiddies
SCRIPT KIDDIES
Hacker in training
Script kiddies use the scripts written by Elite hackers to make attacks
Script kiddies have low technical skills
Script kiddies are dangerous because of their large numbers
DR M Y Siyal
Computer/Information Security
P6-101
HACKER
DR M Y Siyal
Computer/Information Security
P6-102
Computer/Information Security
P6-103
HUMAN BREAK-INS
AVENUES OF ATTACK
There are two general reasons a particular system is attacked:
It is specifically targeted
It is a target of opportunity
Equipment may be targeted because of the organization it belongs to or
for political reasons.
Targets of opportunity attacks are conducted against a site that has
software vulnerable to a specific exploit. In these instances, the
attackers are not targeting the organization, instead they are targeting a
vulnerable device that happens to belong to the organization
Typical Stages in a Human Break-In
Scanning Phase
The Break-In
After the Break-In
DR M Y Siyal
Computer/Information Security
P6-104
Determine systems
available
3 Finger
printing
Determine the OS
and open ports
Discover applicable
exploits
Execute exploit
DR M Y Siyal
Computer/Information Security
P1-105
Computer/Information Security
P1-106
Computer/Information Security
P1-107
HUMAN BREAK-INS
STAGE 2: The Break-In
Uses an exploit
A tailored attack method that is often a program.
Normally exploits a vulnerability on the victim computer.
The act of breaking in is called an exploit.
The hacker tool is also called an exploit.
DR M Y Siyal
Computer/Information Security
P1-108
DR M Y Siyal
Computer/Information Security
P1-109
HUMAN BREAK-INS
STAGE 3: After the Break-In
1. The hacker downloads a hacker tool kit to automate hacking work.
2. The hacker becomes invisible by deleting log files.
3. The hacker creates a backdoor (way to get back into the
computer).
Backdoor Account: An account with a known password and
full privileges.
Backdoor Program: A program to allow re-entry; usually
Trojanized.
The hacker can then do damage at his or her leisure.
Download a Trojan horse to continue exploiting the computer
after the attacker leaves.
Manually give operating system commands to do damage.
DR M Y Siyal
Computer/Information Security
P1-110
INTERNET ATTACKS
COOKIES
When you access a specific website, it might store information as a
cookie
Every time you revisit that server, the cookie is re-sent to the server
Effectively used to hold state information over sessions
Can also hold sensitive information
This includes passwords, credit card information, social security
number, etc.
Almost every large website uses cookies
Cookies are stored on your computer and can be controlled
However, many sites require that you enable cookies in order to use the
site
The expiration is set by the sites' session by default, which is chosen by
the server
This means that cookies will probably stick around for a while
DR M Y Siyal
Computer/Information Security
P1-111
INTERNET ATTACKS
COOKIES
First-party cookie
Third-party cookie
Cannot contain a virus or steal personal information stored on a hard
drive
Can pose a privacy risk
ADWARE
Software that delivers advertising content
Unexpected and unwanted by the user
Can be a privacy risk
Tracking function
POPUP
Small Web browser window appears over the Web site that is being
viewed
DR M Y Siyal
Computer/Information Security
P1-112
INTERNET ATTACKS
ATTACKS WHILE SURFING
Attacks on users can occur while pointing the browser to a site or just
viewing a site
REDIRECTING WEB TRAFFIC
Mistake when typing Web address
Attackers can exploit a misaddressed Web name by registering the
names of similar-sounding Web sites
DRIVE-BY DOWNLOADS
Can be initiated by simply visiting a Web site
Spreading at an alarming pace
Attackers identify well-known Web site
Inject malicious content
Zero-pixel IFrame
Virtually invisible to the naked eye
DR M Y Siyal
Computer/Information Security
P1-113
SPYWARE
Software that violates a users personal security
Tracking software that is deployed without adequate notice, consent, or
user control
Spyware creators are motivated by profit
Very widespread
Average computer has over 24 pieces of spyware
KEYLOGGER
Small hardware device or a program
Monitors each keystroke a user types on the computers keyboard
Transmits keystrokes to remote location
Attacker searches for useful information in
captured text
DR M Y Siyal
Computer/Information Security
P1-114
EFFECTS OF SPYWARE
DR M Y Siyal
Computer/Information Security
P1-115
PHISHING
Phishing is a way of attempting to acquire sensitive information such as
usernames, passwords and credit card details by deceiving users.
Phishing is typically carried out by e-mail spoofing and it often directs users
to enter details at a fake website whose look and feel are almost identical to
the legitimate one.
Number of users that respond to phishing attacks is considered to be
extremely high and social networking sites are prime target.
Experiments show a success rate of over 70% for phishing attacks on social
networks.
DAMAGED CAUSED BY PHISHING
It is estimated that between May 2004 and May 2005, approximately 1.2
million computer users in the United States suffered losses caused by
phishing, totaling approximately US$929 million.
In 2007, 3.6 million adults lost US$3.2 billion in the phishing attacks.
In 2009 45K unique phishing sites were detected monthly.
DR M Y Siyal
Computer/Information Security
P1-116
PHISHING
MOST TARGETED SITES
Financial services (e.g., Citibank)
Payment services (e.g., PayPal)
Auctions (e.g., eBay)
Social networks (e.g., Facebook)
DR M Y Siyal
Computer/Information Security
P1-117
PHISHING EXAMPLE
DR M Y Siyal
Computer/Information Security
P1-118
PHISHING EXAMPLE
DR M Y Siyal
Computer/Information Security
P1-119
CYBER BULLYING
CYBER BULLYING is being cruel to others by sending or posting harmful
material using technological means.
DR M Y Siyal
Computer/Information Security
P1-120
Computer/Information Security
P1-121
CYBER BULLYING
Cyber bullying is a crime in Singapore and the punishment is fine of up to
S$5,000 or a jail term not exceeding 12 months.
Tips to Help Stop Cyberbullying
Dont respond or retaliate: Sometimes a reaction is exactly what
aggressors are looking for because they think it gives them power over
you, and you dont want to empower a bully.
Save the evidence. Bullying online or on phones can usually be
captured, saved, and shown to someone who can help.
Tell the person to stop.
Reach out for help
Use available tech tools: Most social media apps and services allow
you to block the person. You can also report the problem to the service.
Protect your accounts. Dont share your passwords with anyone even
your closest friends, who may not be close forever and passwordprotect your phone so no one can use it to impersonate you.
DR M Y Siyal
Computer/Information Security
P1-122