Cyber Crime 111
Cyber Crime 111
Cyber Crime 111
Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence,
international engagement, incident response, resiliency, and recovery policies and activities,
including computer network operations, information assurance, law enforcement, etc."
OR
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access. The
term cyber security refers to techniques and practices designed to protect digital data,
the data that is stored, transmitted or used on an information system.
OR
Listed below are the reasons why cyber security is so important in what’s become a
predominant digital world:
In addition to financial damage suffered by the business, a data breach can also inflict
untold reputational damage.
Cyber-Attack
Injection attacks: It is the attack in which some data will be injected into a web
application to manipulate the application and fetch the required information. In an
Injection attack, an attacker supplies untrusted input to a program, this input gets
processed by an interpreter as part of a command or query which in turn alters the
execution of that program. Example- SQL Injection, code Injection, log Injection, XML
Injection etc.
The DNS spoofing attacks can go on for a long period of time without being detected
and can cause serious security issues.
After a user starts a session such as logging into a banking website, an attacker can
hijack it.Web applications create cookies to store the state and user sessions. By stealing
the cookies, an attacker can have access to all of the user data.
Phishing: Phishing is a type of attack which attempts to steal sensitive information like
user login credentials and credit card number. It occurs when an attacker is
masquerading as a trustworthy entity, dupes a victim into opening an email, instant
message or text message.
Brute force: It is a type of attack which uses a trial and error method to guess login
info, encryption keys, or find a hidden web page. This attack generates a large number
of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or
by security, analysts to test an organization's network security.
It can be classified into the following; Volume-based attacks, Protocol attacks and
Application layer attacks
Dictionary attacks: This type of attack stored the list of a commonly used password and
validated them to get original password.
URL Interpretation: It is a type of attack where we can change the certain parts of a
URL, and one can make a web server to deliver web pages for which he is not authorized
to browse.
Man in the middle attacks: It is a type of attack that allows an attacker to intercepts
the connection between client and server and acts as a bridge between them. Due to this,
an attacker will be able to read, insert and modify the data in the intercepted
connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network.
Some of the important system-based attacks are as follows:
Virus: It is a type of malicious software program that spread throughout the computer
files without the knowledge of a user. It is a self-replicating malicious computer program
that replicates by inserting copies of itself into other computer programs when executed.
It can also execute instructions that cause harm to the system.
Worm: It is a type of malware whose primary function is to replicate itself to spread to
uninfected computers. It works same as the computer virus. Worms often originate from
email attachments that appear to be from trusted senders.
Bots: A bot (short for "robot") is an automated process that interacts with other
network services. Some bots program run automatically, while others only execute
commands when they receive specific input. Common examples of bots program are the
crawler, chatroom bots, and malicious bots.
The 7 layers of cyber security should center on the mission critical assets you are seeking to
protect.
1. Mission Critical Assets: This is the data you need to protect, critical assets can include
patents/copyrights, corporate financial data, customer sales information, human
resource information and internal manufacturing processes.
2. Data Security: Data security controls protect the storage and transfer of data.
6. Perimeter Security:Perimeter security controls include both the physical and digital
security methodologies that protect the business overall.
7. The Human Layer: Humans are the weakest link in any cyber security posture. Human
security controls include phishing simulations and access management controls that
protect mission critical assets from a wide variety of human threats, including cyber
criminals, malicious insiders, and negligent users.
As the recent epidemic of data breaches illustrates, no system is immune to attacks. Any
company that manages, transmits, stores, or otherwise handles data has to institute and
enforce mechanisms to monitor their cyber environment, identify vulnerabilities, and close
up security holes as quickly as possible. Before identifying specific dangers to modern data
systems, it is crucial to understand the distinction between cyber threats and
vulnerabilities.
Cyber threats are security incidents or circumstances with the potential to have a negative
outcome for your network or other data management systems.
Threat is any incident that could negatively affect an asset – for example, if it’s lost,
knocked offline or accessed by an unauthorized party.
Examples of common types of security threats include phishing attacks that result in the
installation of malware that infects your data, failure of a staff member to follow data
protection protocols that cause a data breach, or even a tornado that takes down your
company’s data headquarters, disrupting access. Vulnerabilities are the gaps or weaknesses
in a system that make threats possible and tempt threat actors to exploit them. Types of
vulnerabilities in network security include but are not limited to SQL injections, server
misconfigurations, cross-site scripting, and transmitting sensitive data in a non-encrypted
plain text format. When threat probability is multiplied by the potential loss that may result,
cyber security experts, refer to this as a risk.
Categories of vulnerabilities
Types of attacks:
Passive Attack – Make use of information from the system without affecting system
resources
Computer criminals
Computer Criminals are criminals who uses computer as an instrument to further illegal
ends, such as committing fraud, trafficking in child pornography and intellectual property,
stealing identities, or violating privacy.
Computer criminals have access to enormous amounts of hardware, software, and data; they
have the potential to cripple much of effective business and government throughout the
world. In a sense, the purpose of computer security is to prevent these criminals from doing
damage. We say computer crime is any crime involving a computer or aided by the use of one.
Although this definition is admittedly broad, it allows us to consider ways to protect
ourselves, our businesses, and our communities against those who use computers maliciously.
One approach to prevention or moderation is to understand who commits these crimes and
why. Many studies have attempted to determine the characteristics of computer criminals.
By studying those who have already used computers to commit crimes, we may be able in the
future to spot likely criminals and prevent the crimes from occurring.
CIA Triad
The CIA Triad is actually a security model that has been developed to help people think
about various parts of computer security against cybercrimes.
It's crucial in today's world for people to protect their sensitive, private information from
unauthorized access. At its core, the tenet of confidentiality is about keeping what needs to
be private, private. Government regulation, industry compliance requirements, expectations
from business partners and your company’s own business priorities all play a role in defining
what data needs to be kept confidential. Protecting confidentiality is dependent on being
able to define and enforce certain access levels for information.
In some cases, doing this involves separating information into various collections that are
organized by that needs access to the information and how sensitive that information
actually is - i.e. the amount of damage suffered if the confidentiality was breached.
Integrity
Integrity focuses on keeping data clean and untainted, both when it’s uploaded and when
it’s stored. This means making sure only those who are allowed to modify it, modify it.
This is an essential component of the CIA Triad and designed to protect data from deletion
or modification from any unauthorized party, and it ensures that when an authorized person
makes a change that should not have been made the damage can be reversed.
Availability
This is the final component of the CIA Triad and refers to the actual availability of your
data. Authentication mechanisms, access channels and systems all have to work properly for
the information they protect and ensure it's available when it is needed. Availability
essentially means that when an authorized user needs to access data or information, they
can. It can sometimes be confused with or even seem to contradict confidentially.
ii) deliberate actions (by insiders or outsiders) that are taken intentionally and are
meant to do harm; and
iii) inaction (generally by insiders), such as a failure to act in a given situation, either
because of a lack of appropriate skills, knowledge, guidance, or availability of the
correct person to take action Of primary concern here are deliberate actions, of which
there are three categories of motivation.
Cyber Attacker
Actions
Session replay: In this type of attack, a hacker steals an authorized user’s log in
information by stealing the session ID. The intruder gains access and the ability to do
anything the authorized user can do on the website.
Message modification: In this attack, an intruder alters packet header addresses to direct
a message to a different destination or modify the data on a target machine.
Denial of service (DoS) attack: Users are deprived of access to a network or web resource.
This is generally accomplished by overwhelming the target with more traffic than it can
handle.
Passive Attacks
Passive attacks are relatively scarce from a classification perspective, but can be carried
out with relative ease, particularly if the traffic is not encrypted.
Traffic analysis: the attacker looks at the metadata transmitted in traffic in order to
deduce information relating to the exchange and the participating entities, e.g. the form of
the exchanged traffic (rate, duration, etc.). In the cases where encrypted data are used,
traffic analysis can also lead to attacks by cryptanalysis, whereby the attacker may obtain
information or succeed in unencrypting the traffic.
Attack Characteristics
Virus A virus is a program that attempts to damage a computer system and
replicate itself to other computer systems.
A virus:
Requires a host to replicate and usually attaches itself to a
host file or a hard drive sector.
Replicates each time the host is used.
Often focuses on destruction or corruption of data.
Usually attaches to files with execution capabilities such as
.doc, .exe, and .bat extensions.
Often distributes via e-mail. Many viruses can e-mail
themselves to everyone in your address book.
Examples: Stoned, Michelangelo, Melissa, I Love You.
Worm A worm is a self-replicating program that can be designed to do any
number of things, such as delete files or send documents via e-mail. A
worm can negatively impact network traffic just in the process of
replicating itself. A worm:
Can install a backdoor in the infected computer.
Is usually introduced into the system through vulnerability.
Infects one system and spreads to other systems on the
network.
Example: Code Red.
Trojan horse A Trojan horse is a malicious program that is disguised as legitimate
software. Discretionary environments are often more vulnerable and
susceptible to Trojan horse attacks because security is user focused
and user directed. Thus the compromise of a user account could lead to
the compromise of the entire environment. A Trojan horse:
Cannot replicate itself.
Often contains spying functions (such as a packet sniffer) or
backdoor functions that allow a computer to be remotely
controlled from the network.
Often is hidden in useful software such as screen savers or
games. Example: Back Orifice, Net Bus, Whack-a-Mole.
Logic Bomb A Logic Bomb is malware that lies dormant until triggered. A logic
bomb is a specific example of an asynchronous attack.
A trigger activity may be a specific date and time, the
launching of a specific program, or the processing of a specific
type of activity.
Logic bombs do not self-replicate.
Hardware Attacks
Backdoor creation; the presence of hidden methods for bypassing normal computer
authentication systems
Counterfeiting product assets that can produce extraordinary operations and those
made to gain malicious access to systems.
Cyber Crime: Cybercrime is criminal activity that either targets or uses a computer, a
computer network or a networked device. Cybercrime is committed by cybercriminals or
hackers who want to make money. Cybercrime is carried out by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly technically
skilled. Others are novice hackers.
Cyber Espionage: Cyber spying, or cyber espionage, is the act or practice of obtaining
secrets and information without the permission and knowledge of the holder of the
information fromindividuals, competitors, rivals, groups, governments and enemies for
personal, economic, political or military advantage using methods on the Internet.
Unit 2
Cybercrimes
Cyber-crime is vastly growing in the world of tech today. Criminals of the World Wide Web
exploit internet users’ personal information for their own gain. They dive deep into the dark
web to buy and sell illegal products and services. They even gain access to classified
government.
Cyber –crimes are at all-time high, costing companies and individuals billions of dollars
annually.The evolution of technology and increasing accessibility of smart tech means there
are multiple access points within users’ home for cybercriminals or hackers to exploit.
What is cybercrime?
Cybercrime is defined as a crime where a computer is the object of the crime or is used as a
tool to commit an offense. Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device.
Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make
money. Cybercrime is carried out by individuals or organizations. Some cybercriminals are
organized, use advanced techniques and are highly technically skilled. Others are novice
hackers. Rarely, cybercrime aims to damage computers for reasons other than profit. These
could be political or personal.
Categories of cybercrime
There are three major categories that cybercrime falls into: individual, property and
government. The types of methods used and difficulty levels vary depending on the
category.
Government: This is the least common cybercrime, but is the most serious offense. A crime
against the government is also known as cyber terrorism. Government cybercrime includes
hacking government websites, military websites or distributing propaganda. These criminals
are usually terrorists or enemy governments of other nations.
Types of Cybercrime
These are used to make an online service unavailable and take the network down by
overwhelming the site with traffic from a variety of sources. Large networks of infected
devices known as Botnets are created by depositing malware on users’ computers. The
hacker then hacks into the system once the network is down.
Botnets
Botnets are networks from compromised computers that are controlled externally by
remote hackers. The remote hackers then send spam or attack other computers through
these botnets. Botnets can also be used to act as malware and perform malicious tasks.
Identity Theft
This cybercrime occurs when a criminal gains access to a user’s personal information to steal
funds, access confidential information, or participate in tax or health insurance fraud. They
can also open a phone/internet account in your name, use your name to plan a criminal
activity and claim government benefits in your name. They may do this by finding out user’s
passwords through hacking, retrieving personal information from social media, or sending
phishing emails.
Cyberstalking
This kind of cybercrime involves online harassment where the user is subjected to a plethora
of online messages and emails. Typically cyberstalkers use social media, websites and search
engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim
and makes the person feel afraid or concerned for their safety.
Social Engineering
Social engineering involves criminals making direct contact with you usually by phone or
email. They want to gain your confidence and usually pose as a customer service agent so
you’ll give the necessary information needed. This is typically a password, the company you
work for, or bank information. Cybercriminals will find out what they can about you on the
internet and then attempt to add you as a friend on social accounts. Once they gain access
to an account, they can sell your information or secure accounts in your name.
PUPs
PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but
are a type of malware. They uninstall necessary software in your system including search
engines and pre-downloaded apps. They can include spyware or adware, so it’s a good idea to
install an antivirus software to avoid the malicious download.
Phishing
This type of attack involves hackers sending malicious email attachments or URLs to users
to gain access to their accounts or computer. Cybercriminals are becoming more established
and many of these emails are not flagged as spam. Users are tricked into emails claiming
they need to change their password or update their billing information, giving criminals
access.
Prohibited/Illegal Content
This cybercrime involves criminals sharing and distributing inappropriate content that can
be considered highly distressing and offensive. Offensive content can include, but is not
limited to, sexual activity between adults, videos with intense violent and videos of criminal
activity. Illegal content includes materials advocating terrorism-related acts and child
exploitation material. This type of content exists both on the everyday internet and on the
dark web, an anonymous network.
Online Scams
These are usually in the form of ads or spam emails that include promises of rewards or
offers of unrealistic amounts of money. Online scams include enticing offers that are “too
good to be true” and when clicked on can cause malware to interfere and compromise
information.
Exploit Kits
Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a
user’s computer. They are readymade tools criminals can buy online and use against anyone
with a computer. The exploit kits are upgraded regularly similar to normal software and are
available on dark web hacking forums.
History of Cybercrime
The malicious tie to hacking was first documented in the 1970s when early computerized
phones were becoming a target. Tech-savvy people known as “phreakers” found a way
around paying for long distance calls through a series of codes. They were the first hackers,
learning how to exploit the system by modifying hardware and software to steal long
distance phone time. This made people realize that computer systems were vulnerable to
criminal activity and the more complex systems became, the more susceptible they were to
cybercrime.
Fast Forward to 1990, where a large project named Operation Sundevil was exposed. FBI
agents confiscated 42 computers and over 20,000 floppy disks that were used by criminals
for illegal credit card use and telephone services. This operation involved over 100 FBI
agents and took two years to track down only a few of the suspects. However, it was seen as
a great public relations effort, because it was a way to show hackers that they will be
watched and prosecuted.
The Electronic Frontier Foundation was formed as a response to threats on public liberties
that take place when law enforcement makes a mistake or participates in unnecessary
activities to investigate a cybercrime. Their mission was to protect and defend consumers
from unlawful prosecution. While helpful, it also opened the door for hacker loopholes and
anonymous browsing where many criminals practice their illegal services.
Crime and cybercrime have become an increasingly large problem in our society, even with
the criminal justice system in place. Both in the public web space and dark web,
cybercriminals are highly skilled and are not easy to find. Read below to learn more about
how to combat cybercrime through cyber law.
Cybercrime has created a major threat to those who use the internet, with millions of users’
information stolen within the past few years. It has also made a major dent in many nations’
economies. IBM president and CEO GinniRometty described cybercrime as “the greatest
threat to every profession, every industry, and every company in the world.”
Cybercrime affects society in a number of different ways, both online and offline,
Becoming the victim of cybercrime can have long-lasting effects on life. One common
technique scammers employ is phishing, sending false emails purporting to come from a
bank or other financial institution requesting personal information. If one hands over this
information, it can allow the criminal to access one's bank and credit accounts, as well as
open new accounts and destroy credit rating. Cyber criminals take full advantage of
anonymity, secrecy, and interconnectedness provided by the Internet, therefore, attacking
the very foundations of our modern information society. Cybercrime can involve botnets,
computer viruses, cyber bullying, cyber stalking, cyber terrorism, and cyber pornography,
denial of service attacks, identity theft, malware, and spam. Law enforcement officials
have struggled to keep pace with cyber criminals, who cost the global economy billions
annually. Police are attempting to use the same tools cyber criminals use to perpetrate
crimes in an effort to prevent those crimes and bring the guilty parties to justice.
SECURITY COSTS: Cyber criminals also focus their attacks on businesses, both large and
small. Hackers may attempt to take over company servers to steal information or use the
machines for their own purposes, requiring companies to hire staff and update software to
keep intruders out. A survey of large companies found an average expenditure of $8.9
million per year on cyber security, with 100 per cent of firms surveyed reporting at least
one malware incident in the preceding 12 months and 71 per cent reporting the hijacking of
company computers by outsiders.
MONETARY LOSSES: The overall monetary losses from cybercrime can be immense.
According to a 2012 report by Symantec, more than 1.5 million people fall victim to some
sort of cybercrime every day, ranging from simple password theft to extensive monetary
swindles. With an average loss of $197 per victim, this adds up to more than $110 billion
dollars lost to cybercrime worldwide every year. As consumers get wise to traditional
avenues of attack, cyber criminals have developed new techniques involving mobile devices
and social networks to keep their illicit gains flowing.
PIRACY: The cybercrime of piracy has had major effects on entertainment, music and
software industries. Claims of damages are hard to estimate and even harder to verify,
with estimates ranging widely from hundreds of millions to hundreds of billions of dollars
per year. In response, copyright holders have lobbied for stricter laws against intellectual
property theft, resulting in laws like the Digital Millennium Copyright Act. These laws allow
copyright holders to target file sharers and sue them for large sums of money to
counteract the financial damage of their activities online.
It seems like in the modern age of technology, hackers are taking over our systems and no
one is safe. The average dwell-time, or time it takes a company to detect a cyber-breach, is
more than 200 days. Most internet users are not dwelling on the fact that they may get
hacked and many rarely change their credentials or update passwords. This leaves many
people susceptible to cybercrime and it’s important to become informed.
Following are some preventive measures you can take in order to protect yourself as an
individual or as a business from cyber attack.
1. Become vigilant when browsing websites.
2. Flag and report suspicious emails.
1. Portable computer: It is a general-purpose computer that can be easily moved from one
place to another, but cannot be used while in transit, usually because it requires some
"setting-up" and an AC power source.
2. Tablet PC: It lacks a keyboard, is shaped like a slate or a paper notebook and has
features of a touchscreen with a stylus and handwriting recognition software. Tablets
may not be best suited for applications requiring a physical keyboard for typing, but are
otherwise capable of carrying out most tasks that an ordinary laptop would be able to
perform.
3. Internet tablet: It is the Internet appliance in tablet form. Unlike a Tablet PC, the
Internet tablet does not have much computing power and its applications suite is limited.
Also it cannotreplace a general-purpose computer. The Internet tablets typically
feature an MP3 and video player, a Web browser, a chat application and a picture viewer.
8. Fly Fusion Pentop computer: It is a computing device with the size and shape of a pen. It
functions as a writing utensil, MP3 player, language translator, digital storage device
and calculator.
1. Malwares, viruses and worms: Although many users are still in the transient process of
switching from 2G,2.5G2G,2.5G to 3G,3G, it is a growing need to educate the community
people and provide awareness of such threats that exist while using mobile devices. Here
are few examples of malware(s) specific to mobile devices:
Skull Trojan:It’s a malicious code that deactivates all links to Symbian system
applications, such as e-mail and calendar, by replacing their menu icons with images
of skulls.
Cabir Worm: It is the first dedicated mobile-phone worm infects phones running on
Symbian OS and scans other mobile devices to send a copy of itself to the first
vulnerable phone it finds through Bluetooth Wireless technology. The worst thing
about this worm is that the source code for the Cabir-H and Cabir-I viruses is
available online.
Brador Trojan: It affects the Windows CE OS by creating a svchost. exe file in the
Windows start-up folder which allows full control of the device. This executable file is
conductive to traditional worm propagation vector such as E-Mail file attachments.
Lasco Worm: It was released first in 2005 to target PDAs and mobile phones running
the Symbian OS. Lasco is based on Cabir's source code and replicates over Bluetooth
connection.
2. Denial-of-service (DoS): The main objective behind this attack is to make the system
unavailable to the intended users. Virus attacks can be used to damage the system to
make the system unavailable. Presently, one of the most common cyber security threats
to wired Internet service providers (iSPs) is a distributed denial-of-service (DDos)
attack .DDoS attacks are used to flood the target system with the data so that the
response from the target system is either slowed or stopped.
4. Spoofed policy development process (PDP): These of attacks exploit the vulnerabilities
in the GTP [General Packet Radio Service (GPRS) Tunneling Protocol].
5. Signaling-level attacks: The Session Initiation Protocol (SIP) is a signaling protocol used
in IP multimedia subsystem (IMS) networks to provide Voice Over Internet Protocol (VoIP)
services.
These are new trends in cybercrime that are coming up with mobile computing - mobile
commerce (M-Commerce) and mobile banking (M-Banking). Credit card frauds are now
becoming commonplace given the ever-increasing power and the ever-reducing prices of the
mobile hand-held devices, factors that result in easy availability of these gadgets to almost
anyone. Today belongs to "mobile computing" that is, anywhere anytime computing. The
developments in wireless technology have fuelled this new mode of working for white collar
workers. This is true for credit card processing too; wireless credit card processing is a
relatively new service that will allow a person to process credit cards electronically, virtually
anywhere. Wireless credit card processing is a very desirable system, because it allows
businesses to process transactions from mobile locations quickly, efficiently and
professionally. It is most often used by businesses that operate mainly in a mobile
environment
Mobile security threats are commonly thought of as a single, all-encompassing threat. But
the truth is, there are four different types of mobile security threats that organizations
need to take steps to protect themselves from:
Mobile Network Security Threats: Network-based threats are especially common and risky
because cybercriminals can steal unencrypted data while people use public WiFi networks.
Mobile Device Security Threats: Physical threats to mobile devices most commonly refer to
the loss or theft of a device. Because hackers have direct access to the hardware where
private data is stored, this threat is especially dangerous to enterprises.
Below are the most common examples of these threats, as well as steps organizations can
take to protect themselves from them.
1. Social Engineering:Social engineering attacks are when bad actors send fake emails
(phishing attacks) or text messages (smishing attacks) to your employees in an effort to
trick them into handing over private information like their passwords or downloading
malware onto their devices.
The best defense for phishing and other social engineering attacks is to teach employees
how to spot phishing emails and SMS messages that look suspicious and avoid falling prey to
them altogether. Reducing the number of people who have access to sensitive data or
systems can also help protect your organization against social engineering attacks because
it reduces the number of access points attackers have to gain access to critical systems or
information.
2. Data Leakage via Malicious Apps: As Dave Jevans, CEO and CTO of Marble Security,
explains, “Enterprises face a far greater threat from the millions of generally available
apps on their employees’ devices than from mobile malware.”That’s because 85% of
mobile apps today are largely unsecured. Tom Tovar, CEO of Appdome, says, “Today,
hackers can easily find an unprotected mobile app and use that unprotected app to
design larger attacks or steal data, digital wallets, backend details, and other juicy bits
directly from the app.”
For example, when your employees visit Google Play or the App Store to download apps
that look innocent enough, the apps ask for a list of permissions before people are
allowed to download them. These permissions generally require some kind of access to
files or folders on the mobile device, and most people just glance at the list of
permissions and agree without reviewing them in great detail.
However, this lack of scrutiny can leave devices and enterprises vulnerable. Even if the
app works the way it’s supposed to, it still has the potential to mine corporate data and
send it to a third party, like a competitor, and expose sensitive product or business
information.
The best way to protect your organization against data leakage through malicious or
unsecured applications is by using Mobile Application Management (MAM) tools. These tools
allow IT admins to manage corporate apps (wipe or control access permissions) on their
employees’ devices without disrupting employees’ personal apps or data.
3. Unsecured Public WiFi: Public WiFi networks are generally less secure than private
networks because there’s no way to know who set the network up, how (or if) it’s secured
with encryption, or who is currently accessing it or monitoring it. And as more companies
offer remote work options, the public WiFi networks your employees use to access your
servers (e.g., from coffee shops or cafes) could present a risk to your organization.
For example, cybercriminals often set up WiFi networks that look authentic but are
actually a front to capture data that passes through their system (a “man in the middle”
attack)
The best way for you to protect your organization against threats over public WiFi networks
is by requiring employees to use a VPN to access company systems or files. This will ensure
that their session stays private and secure, even if they use a public network to access your
systems.
4. End-to-End Encryption Gaps: An encryption gap is like a water pipe with a hole in it.
While the point where the water enters (your users’ mobile devices) and the point where
the water exits the pipe (your systems) might be secure, the hole in the middle lets bad
actors access the water flow in between.
Unencrypted public WiFi networks are one of the most common examples of an
encryption gap (and it’s why they’re a huge risk to organizations). Since the network
isn’t secured, it leaves an opening in the connection for cybercriminals to access the
information your employees are sharing between their devices and your systems.
However, WiFi networks aren’t the only thing that poses a threat—any application or
service that’s unencrypted could potentially provide cybercriminals with access to
sensitive company information. For example, any unencrypted mobile messaging apps
your employees use to discuss work information could present an access point for a bad
actor.
For any sensitive work information, end-to-end encryption is a must. This includes ensuring
any service providers you work with encrypt their services to prevent unauthorized access,
as well as ensuring your users’ devices and your systems are encrypted as well.
5. Internet of Things (IoT) Devices: The types of mobile devices that access your
organization’s systems are branching out from mobile phones and tablets to include
wearable tech (like the Apple Watch) and physical devices (like Google Home or Alexa).
And since many of the latest IoT mobile devices have IP addresses, it means bad actors
can use them to gain access to your organizations’ network over the internet if those
devices are connected to your systems.
Mobile device management (MDM) tools can help you combat shadow IoT threats, as well as
identity and access management (IAM) tools like Auth0. However, IoT/Machine-to-Machine
(M2M) security is still in a bit of a “wild west” phase at the moment. So it’s up to each
organization to put the appropriate technical and policy regulations in place to ensure their
systems are secure.
6. Spyware: Spyware is used to survey or collect data and is most commonly installed on a
mobile device when users click on a malicious advertisement (“malvertisement”) or
through scams that trick users into downloading it unintentionally.
Whether your employees have an iOS or Android device, their devices are targets ripe
for data mining with spyware—which could include your private corporate data if that
device is connected to your systems.
Dedicated mobile security apps (like Google’s Play Protect) can help your employees detect
and eliminate spyware that might be installed on their devices and be used to access
company data. Ensuring your employees keep their device operating systems (and
applications) up to date also helps ensure that their devices and your data are protected
against the latest spyware threats.
7. Poor Password Habits: A 2020 study by Balbix found that 99% of the people surveyed
reused their passwords between work accounts or between work and personal accounts.
Unfortunately, the passwords that employees are reusing are often weak as well.
For example, a 2019 study by Google found that 59% of the people they surveyed used a
name or a birthday in their password
These bad password habits present a threat to organizations whose employees use their
personal devices to access company systems. Since both personal and work accounts are
accessible from the same device with the same password, it simplifies the work a bad
actor has to do in order to breach your systems.
However, these behaviors also provide opportunities for credential-based brute force
cyber-attacks like credential stuffing or password spraying because cybercriminals can
use weak or stolen credentials to access sensitive data through company mobile apps.
The NIST Password Guidelines are widely regarded as the international standard for
password best practices. Following these guidelines—and insisting your employees do the
same—will help protect you against threats from weak or stolen passwords. Password
managers can simplify the work required for your employees to follow these guidelines.
Requiring your employees to use more than one authentication factor (multi-factor
authentication or MFA) to access mobile company applications will also help reduce the risk
that a bad actor could gain access to your systems since they’d need to verify their
identity with additional authentication factors in order to log in.
Finally, implementing passwordless authentication will help you eliminate password risks
altogether. For example, in the event that a mobile device is stolen or accessed illegally,
requiring a facial scan as a primary (or secondary) authentication factor could still prevent
unauthorized access.
8. Lost or Stolen Mobile Devices: Lost and stolen devices aren’t a new threat for
organizations. But with more people working remotely in public places like cafes or
coffee shops and accessing your systems with a wider range of devices, lost and stolen
devices pose a growing risk to your organization.
First and foremost, you’ll want to ensure employees know what steps to take if they lose
their device. Since most devices come with remote access to delete or transfer information,
that should include asking employees to make sure those services are activated.
9. Out of Date Operating Systems
Like other data security initiatives, mobile security requires continuous work to find and
patch vulnerabilities that bad actors use to gain unauthorized access to your systems and
data.
However, these patches only protect your organization if your employees keep their devices
up to date at all times. And according to Verizon’s Mobile Security Index Report, operating
system updates on 79% of the mobile devices used by enterprises are left in the hands of
employees.
Google and Apple both allow organizations to push updates to managed Android and iOS
devices. Third-party MDM tools often provide this functionality as well.
Identity and Access Management (IAM) tools can help organizations secure the apps and
data that users access from their mobile devices, including:
Restricting which devices and users can access enterprise applications and data, as well as
which parts of those applications they’re allowed to access.
Tracking user behavior and securing access in the event that something looks suspicious with
security features like multi-factor authentication (MFA),brute force attack protection,
and more.