Chapter 4 - E-Security Systems
Chapter 4 - E-Security Systems
Chapter 4 - E-Security Systems
Internet is always prone to various threats which makes day to day like difficult for
businesses & individuals. It’s a never-ending fight.
Types of Threats –
1. Viruses – A computer virus is a small piece of software that can spread from one infected
computer to another. The virus could corrupt, steal, or delete data on your computer—
even erasing everything on your hard drive. A virus could also use other programs like
your email program to spread itself to other computers.
Disadvantages –
i. It slowdowns the computer.
ii. It may damage computer software & hardware.
iii. It may steal important and sensitive data.
iv. It may use computer for cyber-crime without knowledge of the owner of it.
v. It can install unwanted malicious software on computer.
vi. It can further infect all computers connected to it in network or via email.
Solutions –
i. Start the computer in safe mode and run an anti-virus scan of entire computer.
ii. Refer to computer software supplier’s customer support team to see if they offer
any tools or resources to extract the virus from your computer.
iii. Be sure to delete all of temporary files in safe mode.
iv. Use Malware software to scan for additional threats to your computer and security.
v. Install “Firewall” (Hardware and / or Software) for preventive protection.
2. Worms – A computer worm is a software program that can copy itself from one computer
to another, without human interaction. Worms can replicate in great volume and with
great speed. For example, a worm can send copies of itself to every contact in your email
address book and then send itself to all the contacts in your contacts’ address books.
Because of their speed of infection, worms often gain notoriety overnight infecting
computers across the globe as quickly as victims around the world switch them on and
open their email.
Disadvantages –
i. Worms causes a tremendous amount of damage by shutting down parts of the
Internet.
ii. It creates havoc on an internal network and costing companies enormous amounts
of lost revenue.
Solutions –
i. Check that all antivirus signatures are up-to-date.
ii. Scan the computer with antivirus software.
iii. If the scan detects a computer worm or other malware, use the software to remove
malware and clean or delete infected files. A scan that detects no malware is
usually indicative that symptoms are being caused by hardware or software
problems.
iv. Check that the computer’s operating system is up-to-date and all software and
applications have current patches installed.
3. Trojan horse – Users can infect their computers with Trojan horse software simply by
downloading an application they thought was legitimate but was in fact malicious. Once
inside your computer, a Trojan horse can do anything from record your passwords by
logging keystrokes (known as a keystroke logger) to hijacking your webcam to watch and
record your every move.
Disadvantages –
Trojan can -
i. Delete your files.
ii. Use your computer to hack other computers.
iii. Watch you through your web cam.
iv. Log your keystrokes (such as a credit card number you entered in an online
purchase).
v. Record usernames, passwords and other personal information.
Solutions –
i. Install anti-malware software & scan computer in safe-mode.
ii. Uninstall any unfamiliar programs.
iii. Firewall also can be install for better protection.
4. Spam – Spam in the security context is primarily used to describe email spam —
unwanted messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it
can clutter your mailbox as well as potentially take up space on your mail server.
Unwanted junk mail advertising items you don’t care for is harmless, relatively speaking.
However, spam messages can contain links that when clicked on could go to a website
that installs malicious software onto your computer.
Disadvantages –
i. Spam can infect the computer with malicious attachments.
ii. It can create backdoor entry for viruses.
iii. It can use valuable high-speed data.
iv. It can help in web-jacking and other frauds.
Solutions –
i. Never give email ID to any unknown person / websites.
ii. Reject / delete mails from unknown persons / organisations / senders.
iii. Never click on any attachment from unknown senders.
iv. Use spam filter facility provided by email service providers.
5. IP Spoofing – A website or email address that is created to look like it comes from a
legitimate source. An email address may even include your own name, or the name of
someone you know, making it difficult to discern whether or not the sender is real. It
sends spam using your email address, or a variation of your email address, to your
contact list. it also recreates duplicate websites that closely resemble the authentic site.
This is used for financial frauds.
Disadvantages –
i. IP spoofing can lead to all problems like spread of virus, web-jacking, financial
frauds, data theft etc.
Solutions –
i. Disable commands like ping in computer
ii. Use encryption for communication
iii. Strengthen TCP/IP protocol
iv. Use of Firewall
v. IP trace back to confirm IP address
Disadvantages –
i. It leads to financial frauds as password & other sensitive financial details are
leaked to fraudsters.
Solutions –
i. Never open emails from unknown senders.
ii. Never click on links given in email to access your bank accounts, if it seems
serious matter, close email and log on to bank website separately and check
issue directly on bank website only.
iii. Beware of “Lottery / Fund winning” intimation emails.
Disadvantages –
Hacking can lead to-
i. Massive security breach.
ii. Unauthorized system access on private information.
iii. Hampering system operation.
iv. Denial of service attacks.
v. Malicious attack on the system.
Solutions –
i. Passwords used for login / authentication should be very tough.
ii. Passwords should be changed at very short intervals (like every week).
iii. There should be multi-level authentication.
iv. Maintain secrecy of passwords, do not let anybody know it.
v. Avoid using authentication mechanism from public or unknown computers.
vi. Install Firewall (Hardware & Software).
9. Salami Attack – A salami attack is when small attacks add up to one major attack that can
go undetected due to the nature of this type of cyber-crime. It also known as salami
slicing/penny shaving where the attacker uses an online database to seize the information
of customers, that is bank/credit card details, deducting small amounts from every account
over a period of time. These amounts naturally add up to large sums of money that is
unnoticeably taken from the collective accounts. Most people do not report the deduction,
often letting it go because of the mini amount involved. This could be a fraction of a cent,
so as to avoid suspicion from the unsuspecting customer.
10. Spyware & Adware – Spyware and adware are often used by third parties to infiltrate your
computer. Spyware is the software that collects personal information about you without you
knowing. They often come in the form of a ‘free' download and are installed automatically
with or without your consent. These are difficult to remove and can infect your computer
with viruses. Adware keeps bombarding computer with tons of advertisement thus
consuming data and it also covers malicious infections to the computer. It can collect
information about you without you knowing about it and give it to third parties. It sends your
usernames, passwords, surfing habits, list of applications you've downloaded, settings, and
even the version of your operating system to third parties. It changes the way your computer
runs without your knowledge.
11. Web-jacking - This term is derived from the term hi jacking. In these kinds of offences, the
hacker gains access and control over the web site of another. He may even change the
information on the site. This may be done for fulfilling political objectives or for money. E.g.
recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani
hackers and some obscene matter was placed therein. Further the site of Bombay crime
branch was also web jacked.
12. Physical Threats - A physical threat is a potential cause of an incident that may result in loss or
physical damage to the computer systems. The following list classifies the physical threats into
three (3) main categories;
i. Internal: The threats include fire, unstable power supply, humidity in the rooms
housing the hardware, etc.
ii. External: These threats include Lightning, Floods, Earthquakes, etc.
iii. Human: These threats include data theft, vandalism of the infrastructure and/or
hardware, disruption, accidental or intentional errors.
IT Risk Mitigation –
IT risks are managed according to the following steps:
1. Assessment: Each risk is discovered and assessed for severity
2. Mitigation: Countermeasures are put in place to reduce the impact of particular risks
3. Evaluation and Assessment: At the end of a project, the effectiveness of any
countermeasures (along with their cost-effectiveness) is evaluated. Based on the
results, actions will be taken to improve, change or keep up with the current plans.
2) Security Controls
Security Controls can be classified into three categories
Administrative Controls which include
Developing and publishing of policies, standards, procedures, and guidelines.
Screening of personnel.
Conducting security-awareness training and
Implementing change control procedures.
Technical or Logical Controls which include
Implementing and maintaining access control mechanisms.
Password and resource management.
Identification and authentication methods
Security devices and
Configuration of the infrastructure.
Physical Controls which include
Controlling individual access into the facility and different departments
Locking systems and removing unnecessary floppy or CD-ROM drives
Protecting the perimeter of the facility
Monitoring for intrusion and
Environmental controls.
3) The Elements of Security –
Vulnerability
It is a software, hardware, or procedural weakness that may provide an attacker
the open door he is looking for to enter a computer or network and have
unauthorized access to resources within the environment.
Vulnerability characterizes the absence or weakness of a safeguard that could
be exploited.
E.g.: a service running on a server, unpatched applications or operating system
software, unrestricted modem dial-in access, an open port on a firewall, lack of
physical security etc.
Threat
Any potential danger to information or systems.
A threat is a possibility that someone (person, s/w) would identify and exploit the
vulnerability.
The entity that takes advantage of vulnerability is referred to as a threat agent.
E.g.: A threat agent could be an intruder accessing the network through a port
on the firewall
Risk
Risk is the likelihood of a threat agent taking advantage of vulnerability and the
corresponding business impact.
Reducing vulnerability and/or threat reduces the risk.
E.g.: If a firewall has several ports open, there is a higher likelihood that an
intruder will use one to access the network in an unauthorized method.
Exposure
An exposure is an instance of being exposed to losses from a threat agent.
Vulnerability exposes an organization to possible damages.
E.g.: If password management is weak and password rules are not enforced, the
company is exposed to the possibility of having users' passwords captured and
used in an unauthorized manner.
Countermeasure or Safeguard
It is an application or a s/w configuration or h/w or a procedure that mitigates the
risk.
E.g.: strong password management, a security guard, access control
mechanisms within an operating system, the implementation of basic
input/output system (BIOS) passwords, and security-awareness training.
The Relation Between the Security Elements
Example: If a company has antivirus software but does not keep the virus
signatures up-to-date, this is vulnerability. The company is vulnerable to virus
attacks.
The threat is that a virus will show up in the environment and disrupt productivity.
The likelihood of a virus showing up in the environment and causing damage is
the risk.
If a virus infiltrates the company's environment, then vulnerability has been
exploited and the company is exposed to loss.
The countermeasures in this situation are to update the signatures and install the
antivirus software on all computers
Firewall –
A firewall is a network security system, either hardware- or software-based, that uses
rules to control incoming and outgoing network traffic. A firewall acts as a barrier
between a trusted network and an untrusted network. A firewall controls access to the
resources of a network through a positive control model. It is normally placed between
a protected network and an unprotected network and acts like a gate to protect assets
to ensure that nothing private goes out and nothing malicious comes in.
Firewall Components -
The primary components (or aspects) of a firewall are:
Network policy – There are two levels of network policy that directly influence the
design, installation and use of a firewall system. The higher-level policy is an issue-
specific, network access policy that defines those services that will be allowed or
explicitly denied from the restricted network, how these services will be used, and the
conditions for exceptions to this policy. The lower-level policy describes how the firewall
will actually go about restricting the access and filtering the services that were defined
in the higher-level policy.
Advanced authentication mechanisms – Advanced authentication measures such as
smartcards, authentication tokens, biometrics, and software-based mechanisms are
designed to counter the weaknesses of traditional passwords. While the authentication
techniques vary, they are similar in that the passwords generated by advanced
authentication devices cannot be reused by an attacker who has monitored a
connection.
Some of the more popular advanced authentication devices in use today are called one-
time password systems. A smartcard or authentication token, for example, generates a
response that the host system can use in place of a traditional password.
Packet filtering and – IP packet filtering is done usually using a packet filtering router
designed for filtering packets as they pass between the router's interfaces. A packet
filtering router usually can filter IP packets based on information of IP address & ports.
Filtering can be used in a variety of ways to block connections from or to specific hosts
or networks, and to block connections to specific ports
Application gateways – To counter some of the weaknesses associated with packet
filtering routers, firewalls need to use software applications to forward and filter
connections for services such as TELNET and FTP. Such an application is referred to
as a proxy service, while the host running the proxy service is referred to as an
application gateway. Application gateways and packet filtering routers can be combined
to provide higher levels of security and flexibility than if either were used alone.
Benefits of Firewall –
1. Monitors Traffic
A firewall monitors all of the traffic entering your computer network and the traffic
exiting your network as well. It prevents all threat from passing through in both
directions.
2. Blocks Trojans
A firewall helps block Trojan horses and other threats.
3. Stops Hackers
Having a firewall keeps hackers out of your network.
4. Stops Keyloggers
Having firewall security will reduce the risk of keyloggers monitoring you. A
keylogger is spyware software that cybercriminals try to put on your computer so
they can target your keystrokes.
5. Enforcing Policies
Many networks have policies regarding which users can access data. For example,
a school would likely prevent all of its computers from accessing adult content, while
a home user might limit the amount of time that her children could use the Internet.
PPT stands for People, Policy, & Technology. The security process is a mixture of
these three elements. Each element depends in some manner on the other elements.
Also, issues receive greater coverage when the elements are combined. The controls
environment is greatly enhanced when these three elements work in concert.
People This core element is the most important. The people element comprises the
people and various roles and responsibilities within the organization. These are the
people that are put in place to execute and support the process. A few key roles
include senior management, security administrators, system and IT administrators,
end users, and auditors.
Policy This element comprises the security vision statement, security policy and
standards, and the control documentation. This is basically the written security
environment—the bible that the security process will refer to for direction and
guidance.
Advantages of EDI –
1. EDI provides cost savings by reducing paper and eliminating paper processing.
2. Time savings and eliminating repetition are other benefits from the reduction in paper
processing.
3. Documents can be transferred more quickly and processing errors can be decreased
allowing business to be done more efficiently.
4. More efficient processing will likely lead to improved customer service which will
ultimately expand the customer base.
Examples of EDI – Shipping, Transport, Warehousing.
E-Cash -
'e-Cash' An Internet-based system that allows funds to be transferred anonymously. Cash has
to be accumulated in bank account for transaction.
Advantages of E-Cash –
i. Transfer of funds,
ii. Purchase of goods and variety of other services online.
iii. Safe to transact.
iv. Its time saving.
Disadvantages of E-Cash –
i. E-cash and E-Cash transaction security are the major concern.
ii. Hackers with good skill able to hack into bank accounts and illegally retrieve of
banking records
iii. E-Cash can be used by anti-social elements against society / national interest.
Requirements for safe e-payments −
Following are the essential requirements for safe e-payments/transactions −
Confidential − Information should not be accessible to unauthorized person. It should
not be intercepted during transmission.
Integrity − Information should not be altered during its transmission over the network.
Availability − Information should be available wherever and whenever requirement
within time limit specified.
Authenticity − There should be a mechanism to authenticate user before giving him/her
access to required information.
Non-Repudiabiity − It is protection against denial of order or denial of payment. Once
a sender sends a message, the sender should not able to deny sending the message.
Similarly, the recipient of message should not be able to deny receipt.
Encryption − Information should be encrypted and decrypted only by authorized user.
Auditability − Data should be recorded in such a way that it can be audited for integrity
requirements.
Security measures in International & Cross-Border Financial Transactions –
An International Transaction or Cross Border Transaction can be defined as a transaction
in an international trade between two or more entities beyond the territorial limits of a
country in which at least one of the party is located outside the country of the transaction.
The points to be consider for security of transaction –
i. Check authenticity of person & firm at opposite end.
ii. Check for its transaction history is they are financial criminal.
iii. Deal only through well reputed international banks only.
iv. Insist for getting security details from that firm.
v. Use secure web media.
vi. Don’t share personal bank details.
Cyber threat hunting is "the process of proactively and iteratively searching through networks
to detect and isolate advanced threats that evade existing security solutions." This is in contrast
to traditional threat management measures, such as firewalls, intrusion detection systems
(IDS) which typically involve an investigation after there has been a warning of a potential
threat or an incident has occurred.
Famous threat hunting software and services include:
Carbon Black
Countercept (by MWR InfoSecurity)
CrowdStrike
Cybereason
Sqrrl
ExtraHop Networks
Endgame, Inc.
Cyberbit
Haystax Technology