Unit 1 and 2
Unit 1 and 2
Unit 1 and 2
Welcome to:
Unit 1: Data Security Threats
• Data protection is needed not only to protect the data on a system from harmful cyber-
attacks or viruses, but also to ensure that if it does find its way into the wrong hands, it
remains secure and unable to be viewed.
• Data protection is comprised of many elements, including where the data resides, how it is
used and who has access to it.
• For any organization, data security is a vital issue. They can suffer serious issues if an user
who is not authorized to gain access to their data enters their systems.
• The contingency plan of an organization has managing and protecting data as one of its
necessary part.
• Data breach can cause very large financial penalties, reputation loss and expensive law suits
for any organization.
• It can also have a serious impact on individuals, as their identity can be stolen and a large
damage can be made when it comes to their credit rating or financial history.
• eBay
• Sony
• Gaana.com
• BlueCross BlueShield
• Methodist Hospital
• Health Net
• Michaels Stores
• Every organization today has all their data present in digital form, which if not protected can
have catastrophic effect on the business continuity of the organization.
• Data security is extremely important for all companies, large and small. On an average daily
basis, data theft occurs from a multitude of companies, either by accident or on purpose.
• The process of protecting massive amounts of data or information which an organization may
want to keep confidential and protected from others is known as Business Data Protection.
• Often, organizations struggle to create real-time security policies as the data keeps growing.
• While data breaches affect businesses of all sizes, many small business owners aren’t taking
the necessary steps to create ongoing data security policies and practices, including training
their employees.
• Reputational advantage
• Ongoing productivity
• Customer Information
– The data associated to its customer should be of top most priority.
• Product Information
– Protecting information about the existing products and the products to be launched can be a high
priority thing for many organizations.
• Employee Information
– All the detailed personal information of the employees are in the possession of most of the
organizations.
• Company Information
– An organization has various critical data which it needs to protect.
• Cost
– The cost plays an important role.
• What is to lose
– Security needs of an organization must be of utmost priority if the business of this organization realize
on the trust of the customer.
• Overview
– The data possessed by an organization is the most critical thing they need to protect
– There can be many reasons for the data getting lost like it can be deleted intentionally or un-
intentionally.
• Definition
– Data security refers to protective digital privacy measures that are applied to prevent unauthorized
access to computers, databases and websites. Data security also protects data from corruption. Data
security is the main priority for organizations of every size and genre.
• Data security is especially important for state agencies, where the public's trust is essential
for the efficient delivery of services.
• Security can be a significant investment, which adds to an already long list of administrative
duties.
• The focus behind data security is to ensure privacy while protecting personal or corporate
data.
• Data security deals with the protection of a database from any kind of actions or forces that
can be dangerous for the database.
• Malware Threats
– Malicious software or malwares refer to a broad category of software threats to any network and
systems, including viruses, Trojan horses, logic bombs and worms.
– The users in an organization needs help from them to decline these attacks and keep the systems in
their organization safe from any damage.
– Attacks like these can spread through the entire network and can be devastating to the systems
which are in the network.
– This is considered the largest worm infestation to date, and variants of it are still on the internet and
propagating.
• Virus
– A program written to change the operations of a computer, without the knowledge or the permission of
the user is a Virus.
– A computer system can be infected by a virus. It can be residing on a computer, but it may also be
damaging the data on the computer system’s hard-drive.
– The virus may also destroy the operating system of the computer and can spread to the other system
which are connected to that device.
• Armored Virus
– This virus use protective course to cover themselves in order to deny disassemblers or debuggers to
examine their critical elements.
• Companion Virus
– This kind of virus creates a program within the system which has a different file name extension after
attaching to the programs which are legitimate.
• Macro Virus
– This virus exploit the applications which the programmer use to increase the application capability.
• Phage Virus
– The databases and the programs are altered and modified by a phage virus. All the files present on
the database are infected by this virus.
• Multipartite Virus
– As the name suggest, multipartite virus can attack a system in multiple manners.
• Polymorphic Virus
– This virus attacks a system by displaying a message and then starts to delete all the file that are on
the system.
• Retro Virus
– This type of virus is also knows as anti-antivirus as this virus tries to surpass the antivirus which has
been installed on the system.
• Stealth Virus
– This virus attaches to the hard-drive’s boot sector and redirects all the commands that are around it
when a system program or utility runs.
• Trojan horses use the identity of other programs to enter a system or a network.
• After it has taken the identity of another program it would accomplish its mission to corrupt
the system.
• In case a Trojan horse is detected the whole program must be reinstalled immediately.
• Adware is a type of spyware used by marketers to track Internet user’s habits and interests.
• The information is then used to customize future advertisements directed to the user, or can
be sold to a third party for the same purpose.
• After it has taken the identity of another program it would accomplish its mission to corrupt
the system.
• In case a Trojan horse is detected the whole program must be reinstalled immediately.
• These malwares are executed when a certain event which is predefined occurs.
• The attack is not started by the bomb but the bomb only tells the attackers that the user to be
attacked has met the needed criteria and is in a state to attack.
• When a user is locked on to the internet, a logic bomb may send this information to the
attacker and inform the attacker about the files which the user is accessing.
• There has been a huge increase in the number of hackers and other criminals creating
malicious threats over the last five years.
• They are number of Internet computers that have been set up to forward transmissions
(including spam or viruses) to other computers on the internet.
• This can prove to be major security threat as the network is acting as a center that is sending
malicious files to other systems.
• Cyber criminals consider botnets as one of their major tool to carry out a cyber-attack.
• HTTP and peer-to-peer channel technology are used now-a-days to create botnets.
• This threat lures the victim by showcasing the identity of a trustworthy public platform and
then all the critical credentials of the victim is retrieved.
• Earlier, the phishers used to copy source codes from the AOL websites and then craft a page
which would look like a part of the website.
– Spear Phishing: A specific group is targeted by spear phishing whose members have something in
common between them.
– Phone Phishing: As the name suggests, this type of phishing is carried out using mobile phones.
• In a network, a packet sniffer can filter out personal information and this can lead to areas
such as identity theft.
• Packet sniffer can intercept and log traffic passing over a digital network or part of a network.
• As data streams travel back and forth over the network, the sniffer captures each packet and
eventually decodes it.
• Identity theft is when information which can only be identified personally is used by an
unauthorized party to assume the victim’s identity.
• Information such as address, credit card number, name or bank account number is used by
the attacker to commit frauds.
• There are many ways by which personal information of the victim can be stolen.
• Identity Theft (Contd.): After stealing the identity of a user, the unauthorized party can do
anything with the personal data that they will get access to.
• The networks and systems which are password protected can be exploited.
• For example: If a number of computer systems are stolen form a single bank then all the
details of the clients that were stored on those systems would be stolen.
• The attacker can then steal the identity of the client and can do frauds on a huge basis.
• The only method to keep hardware safe is by keeping them under proper surveillance.
• Cryptographic threats can exploit the present loophole and can damage the confidentiality.
• Several high-profile laptop thefts have raised awareness about the dangers of storing large
quantities of personally identifying information without encrypting it.
• The Keys are attacked directly in this type of attack to determine its value.
• Commonly used passwords, a serial of different words or other combinations can be used by
an attacker to crack a password.
• A password can be broken by an attacker by using the information and access provided by
many of the manufacturers of operating systems.
• The algorithms and programming instructions used for data encryption are at risk as well.
• Back doors are available in many algorithms which can be used to attack the algorithm.
• The attackers may gain information inadvertently about the systems of encryption that are in
use.
• Frequency Analysis
• Algorithm Errors
• For Example: There will be a likely probability that if there are 25 people sitting in a room, at
least two of them will have their birthdays on the same date.
• Likewise if one key of an organization is determined, then there is a possibility that some
other key will resemble the determined key.
• Passwords which are common in nature are used by many people. This threat exploits this
loophole.
• The hash value resulting from the key will be very easy to guess if the length of the key is
short.
• Critical information stored on the database makes it a target for the cyber criminals.
• Cyber criminals can earn a huge amount of profit by breaching the databases of an
organization.
• Sometimes employees are granted privileges for accessing the database above the
requirements of their job role.
• For example: An administrator of a university can be given excessive privilege that he can
update or change grades of the students. The administrator can take advantage of this
situation and can change the grades of the students who he dislikes.
• For example: A worker is not happy with the management of the healthcare firm for some
reason and thus he takes revenge by retrieving and saving some of the records of the
patients. In this way the data can be misused.
• Storing a huge amount of data on the system can create this threat as well.
• They take advantage of the vulnerabilities that are existent on the database platform
software.
• These vulnerabilities can be found in implementation of the protocol, SQL statements etc.
• For example: At a financial institution a software developer can take advantage of a function
which is vulnerable and gain access to the privileges of the database administrator.
• Hopscotch is a process where a weakness is first identified by the attacker and then used as
a leverage for some more attack.
• This process is repeated until the attackers reach the backend of the database system.
• For example: Hackers use worms to find their way around the accounts department of the
organization and then they hit the processing area associated with the credit cards.
• These stealing activities are done for profit, money or simply to take revenge.
• Encrypting the database backups is the only way to mitigate this type of threat.
• Many of a customer’s vital information is available with the bank that can be breached.
• This fraud is carried out by making the customer to an authentic looking but actually fake
website and give in their account details.
• Another method is to send a security message and advice the customer to install software
that will check viruses and also remove them.
• The cards can also be intercepted while it is being sent to someone else or in other words it
is in transit.
• The cards can also be misused by a merchant who undertakes transactions of a duplicate
nature on the customer’s card.
• Malicious users can gain unauthorized access to the web-application and exploit a
vulnerability.
• Thus security measures must be built around the web application of an organization.
• If authentication which are stringent in nature is used, then spoofing attacks can be mitigated.
• It must be made sure that the request which comes from a non-public domain is using the
identity of their own.
• For example: A web page is defaced by an attacker who gets onto the site of the organization
and changes the files which are existing.
• Exploiting the script of a website is an indirect way to carry out a tampering attack.
•
• The script is also used as a link and sent to the user.
• By using authentication which is stringent in nature, computing systems and web application
can be guarded against this type of attack.
• This simply means to steal or to reveal data which is private and should not be breached.
• For example: To steal the password of a system or to disclose the information which involves
file access or access to a server.
• To enter unexpected values in an application and cause the application to crash is fuzzing.
• When that happens, it may be possible for the user to be left with elevated privileges or
access to values they should not have.
• There are numerous physical threats which can disrupt the physical security.
• Physical security deals with intruders, physical destruction, theft, vandalism and
environmental issues etc.
• The view of the security professionals changes when they look at network security and
physical security.
• For securing the network they concentrate on the modem, wireless access point etc.
• Natural Disaster
• Man-Made Threat
• Political Threat
• Wireless LANs increase the risk of wireless network attacks in almost every environment.
• When a wireless network is deployed, it does not require any real physical access and can
be exploited and manipulated easily.
• Attackers can make users to trust their legitimate devices to be connected to an access
point.
• This rogue access point is setup by attackers when they target an existing wireless LAN.
• The physical access takes care of the issue of the short life-time of vulnerability.
• This is another way for limiting access to services apart from targeting traffic.
• Grade access points are shipped with no security configuration, which causes configurations
complexities.
• Weak security deployments, weak passphrases and using default SSID are other issues that
increase risks.
• Bluetooth offers several benefits and advantages, but the benefits are not provided without
risk.
• Messages which are unsolicited in nature or business cards are sent by an attacker to a
Bluetooth-enabled device.
• Bluejacking resembles phishing attacks and spams carried out against users who use e-
mails.
• Bluetooth device owners should be aware that a variety of social engineering attacks may be
caused where it manipulates user into performing actions or divulging confidential
information.
• Connections are forced to a device which has Bluetooth feature in it, in order to access data
in it.
• The IMEI number stored in the phone’s memory is used to divert calls.
• This method was developed after the onset of bluejacking and bluesnarfing.
• The features are used in examining calendars, reading the phonebooks, connecting to
Internet, placing calls etc.
• These requests generated are malicious in nature which causes the devices to be in an
inoperable state.
• The hostile nature of people has been found lower and the data security threats have
increased.
• All the organizations are rushing to the cloud and are over dependent on it.
• There were some serious breaches in cloud computing in the year 2014.
• Amazon was forced to reboot its EC2 instances due to the Xen bug.
• The personal information and the privacy of 7 million online application users were violated in
the year 2014.
• IoT devices are exposed to the same attacks as other Internet-connected devices, such as
denial-of-service attacks etc.
• One major IoT attack disclosed recently was found by Akamai Technologies Inc.
• Researchers reported distributed denial-of-service (DDoS) attacks that started using insecure
IoT device configurations.
• The Shellshock Unix/Linux Bash security hole affected almost half of the websites on the
internet.
• UNIX, Linux and Mac servers were an easy attack for malware as Shellshock.
• Mail servers were affected on these servers and the bug, which had been in Bash Shell for
around 20 years.
• Heartbleed
– Sensitive data (like passwords and encryption keys) are at risk.
• Software Interoperability
True or False:
1. Polymorphic is a virus.
2. Botnets is a network based threat.
3. Data security can make an organization’s data secure.
True or False: