Cs Unit-4
Cs Unit-4
Cs Unit-4
Introduction:
In the global environment with continuous network connectivity, the possibilities for cyberattacks
can emanate from sources that are local, remote, domestic or foreign. They could be launched by an
individual or a group. They could be casual probes from hackers using personal computers (PCs) in
their homes, hand-held devices or intense scans from criminal groups.
Most information the organization collects about an individual is likely to come under “PI” category
if it can be attributed to an individual. For an example, PI is an individual’s first name or first initial
and last name in combination with any of the following data:
1. Social security number (SSN)/social insurance number.
2. Driver’s license number or identification card number.
3. Bank account number, credit or debit card number with personal identification number such as an
access code, security codes or password that would permit access to an individual’s financial
account.
4. Home address or E-Mail address.
5. Medical or health information.
• A case in point is the infamous “Heartland Payment System Fraud” that was uncovered in January
2010.
• In this case, the concerned organization suffered a serious blow through nearly 100 million credit
cards compromised from at least 650 financial services companies.
• When a card is used to make a purchase, the card information is transmitted through a payment
network.
• A piece of malicious software (keystroke logger) planted on the company’s payment processing
network; recorded payment card data as it was being sent for processing to Heartland by thousands
of the company’s retail clients.
• Digital information within the magnetic stripe on the back of credit/debit cards was copied by
keylogger.
• Criminal created counterfeit credit cards.
• Yet another incidence is the Blue Cross Blue Shield (BCBS) Data Breach in October 2009 the
theft of 57 hard drives from a BlueCross BlueShield of Tennessee training facility puts the private
information of approximately 500,000 customers at risk in at least 32 states.
• The hard drives containing 1.3 million audio files and 300,000 video files related to coordination
of care and eligibility telephone calls from providers and members were reportedlystolen from a
leased office.
1. Physical security is very important.
2. Insider threats cannot be ignored.
1. Informational/data privacy: It is about data protection, and the user’s rights to determine how,
when and to what extent information about them is communicated to other parties.
2. Personal privacy: It is about content filtering and other mechanisms to ensure that the end-
users are not exposed to whatever violates their moral senses.
3. Communication privacy: This is as in networks, where encryption of data being transmitted is
important.
4. Territorial privacy: It is about protecting user’s property.
For example, the user devices from being invaded by undesired content such as SMS or
E-Mail/Spam messages.
The key challenges from emerging new information threats to organizations are as follows:
1. Industrial espionage: There are several tools available for web administrators to monitor and
track the various pages and objects that are accessed on their website.
2. IP-based blocking: This process is often used for blocking the access of specific IP addresses
and/or domain names.
3. IP-based “cloaking”: Businesses are global in nature and economies are interconnected. There
are websites that change their online content depending on a user’s IP address or user’s geographic
location.
4. Cyberterrorism: “Cyberterrorism” refers to the direct intervention of a threat source toward your
organization’s website.
5. Confidential information leakage: “Insider attacks” are the worst ones. Typically, an
organization is protected from external threats by your firewall and antivirus solution.
There are many new endpoints in today’s complex networks; they include hand-held devices.
1. Endpoint protection: It is an often-ignored area but it is IP-based printers, although they are
passive devices, are also one of the endpoints.
2. Secure coding: These practices are important because they are a good mitigation control to
protect organizations from “Malicious Code” inside business applications.
3. HR checks: These are important prior to employment as well as after employment.
4. Access controls: These are always important, for example, shared IDs and shared laptops are
dangerous. (for confidential and sensitive data).
5. Importance of security governance: It cannot be ignored - policies, procedures and their
effective implementation cannot be over-emphasized.
The most often quoted reasons by employees, for use of pirated software, are as follows:
• Cloud computing is one of the top 10 Cyber Threats to organizations. There are data privacy risks
through cloud computing. Organizations should think about privacy scenarios in terms of “user
spheres”.
• There are three kinds of spheres and their characteristics:
1. User sphere: Here data is stored on user’s desktops, PCs, laptops, mobile phones, Radio
Frequency Identification (RFID) chips, etc. Organization’s responsibility is to provide
access to users and monitor that access to ensure misuse does not happen.
2. Recipient sphere: Here, data lies with recipients: servers and databases of network
providers, service providers or other parties with whom data recipient shares data.
CYBER SECURITY Page 43
Organizations responsibility is to minimize users privacy risk by ensuring unwanted
exposure of personal data of users does not happen.
3. Joint sphere: Here data lies with web service provider’s servers and databases. This is the
in-between sphere where it is not clear to whom does the data belong. Organization
responsibility is to provide users some control over access to themselves and to minimize
users futures privacy risk.
• Social media marketing has become dominant in the industry. According to fall 2009 survey by
marketing professionals; usage of social media sites by large business-to-business (B2B)
organizations shows the following:
• Facebook is used by 37% of the organizations.
• LinkedIn is used by 36% of the organizations.
• Twitter is used by 36% of the organizations.
• YouTube is used by 22% of the organizations.
• My Space is used by 6% of the organizations
• Although the use of social media marketing site is rampant, there is a problem related to “social
computing” or “social media marketing” – the problem of privacy threats.
• Exposures to sensitive PI and confidential business information are possible if due care is not taken
by organizations while using the mode of “social media marketing.”
Following are the most typical reasons why organizations use social media marketing to promote
their products and services:
1. To be able to reach to a larger target audience in a more spontaneous and instantaneous manner
without paying large advertising fees.
There are other tools too that organizations use; industry practices indicate the following:
1. Twitter is used with higher priority to reach out to maximum marketers in the technology space
and monitor the space.
2. Professional networking tool LinkedIn is used to connect with and create a community of top
executives from the Fortune 500.
3. Facebook as the social group or social community tool is used to drive more traffic to Websense
website and increase awareness about Websense.
4. YouTube (the video capability tool to run demonstrations of products/services, etc.) is used to
increase the brand awareness and create a presence for corporate videos.
5. Wikipedia is also used for brand building and driving traffic.
• There are conflict views about social media marketing some people in IT say the expensive and
careless use of it. Some illustrate the advantages of it with proper control of Security risk
5. Use of Firewalls:
• Firewalls helps organizations keep their security technology up to date.
• Some firewalls provides a comprehensive analysis of all data traffic.
• Deep inspection of Network traffic makes it possible to monitor the type of data traffic,
the websites from which it is coming, to know the web browsing patterns and peer-to- peer
applications to encrypted data traffic in SSL tunnel.
• The firewall decrypt the SSL data stream for inspection and encrypt it again before
forwarding the data to the Network.
• This results in effective protection of Workstations and other endpoints, internal networks,
hosts and servers against attacks within the SSL tunnels.