Chapter 4
Chapter 4
Chapter 4
Wherefores
Agenda
• Introduction
• Security in distributed networks
• Proven system and network security measures
• Security administration issues
• Getting the most return on investment (ROI)
• Conclusion
What is computer
security?
• General definition: computer security involves
providing appropriate levels of assurance of
– Availability of computing services and data/information
stored in computing systems
– Confidentiality of data/information stored in computing
systems
– Integrity of computing systems and data/information
stored therein
– Auditability of usage of computing systems and access to
data/information stored therein
– Non-repudiability of transactions initiated by individuals
and organizations
• the term 'availability' means ensuring timely and reliable access to and use of
information.
• confidentiality means the ability to protect data so that unauthorized parties
cannot view the data. The property that sensitive information is not disclosed to
unauthorized entities.
• Integrity means that data or information in your system is maintained so that it is
not modified or deleted by unauthorized parties. This is an important element of
data hygiene, reliability and accuracy.
• A data security audit is an evaluation of a company's entire security system to
identify areas of vulnerability. It's a preventive measure to protect your customers'
and employees' sensitive information against breaches of any kind.
• The certainty that someone cannot dispute the legitimacy of anything is known as
non-repudiation. Non-repudiation is a regulatory notion commonly used in
cybersecurity and refers to the service that confirms the origin and integrity of
data.
The number of security-related
incidents is escalating
Hacker forces Sun
to cut off outside
access
Computer system is shut
down in an effort to stop
possible sabotage of a product.
BY TOM SCHMITZ
Mercury News Staff Writer
Sun Microsystems Inc. cut off outside
access to its computer system Friday in
an attempt to block a hacker who
insiders say has been wreaking havoc
on the company’s internal network,
possibly trying to sabotage one of Sun’s
products.
POLICE FOIL £1M HACKING PLOT
30 January 2000 - Police have charged a woman under the
Computer Misuse Act following a £1 million hacking incident at a
leading city finance company.
Elaine Borg, a computer operator at fund managers Henderson
Financial Investment Services, is accused of hacking into the
company’s computer system between 1 October 1999 and 19
January 2000 with intent to defraud it of £1 million.
Borg appeared at City Magistrates’ Court in London last week
where police charged her under section two of the Computer
Misuse Act. Section two covers unauthorized access to system
with the aim of assisting a more serious crime, such as fraud or
blackmail.
Borg was arrested after security devices in the company’s OS/390
based systems detected irregular procedures. The irregularities
were monitored and traced back to Borg’s terminal.
GE Says Computers Linked
to Internet Were
Infiltrated
BY JARED SANDBERG
Staff Reporter of the WALL STREET JOURNAL
NEW YORK - Computer
hackers infiltrated General Electric Co.
computers connected to the Internet, according
to a broadcast report by GE’s local NBC
television station here.
The computer breach, which was
confirmed by a GE spokeswoman, gave the
hackers access to research and proprietary
information on GE computers in two cities,
according to the report on WNBC-TV. The
intruders, who managed to penetrate robust
security barriers, known as “firewalls, and
How much money is being spent?
What are organizations doing about it?
Number of cyber threat incidents reported to
CyberSecurity Malaysia through MyCERT in 2022, by
type of crime
Agenda
• Introduction
• Security in distributed networks
• Proven system and network security measures
• Security administration issues
• Getting the most return on investment (ROI)
• Status of cybersecurity legislation
• Conclusion
Major security challenges in
distributed computing environments
• It is difficult to centralize security (as opposed to
mainframes)
• Clients create weak links in security
• Diversity of clients exacerbates the problem
• Just about every protocol used in client-server
communications at every layer of the OSI model has
inherent security-related weaknesses
Types of security threats in distributed
computing environments
• Unauthorized users
• Misrepresentation or spoofing
• Unauthorized invocation of services
• Corruption of functions or operations
• Denial of service
Distributed denial of service attacks
Handler
Distributed denial of service attacks
Handler sends
command to
Zombies
Handler
Handler
• Firewalls
• Network authentication measures
• Appropriate network architectures
• Limiting services that run
• Intrusion detection
• Vulnerability scanning
• Encryption of network transmissions
Never underestimate the value of
security training and awareness
• The Gartner Group found that training and
awareness produces more dividends than any other
single security-related measure
• Target audiences include
– Users
– System and network administrators
– Auditors
– Management
Security administration issues
• Issues include
– Configuring systems to be secure right from the start
– Installing patches as needed
– Inspecting server configuration and settings to ensure that
unauthorized changes have not occurred
– Taking measures to minimize the likelihood of unauthorized changes
in the future
• Are extremely important because
– Machines are a target the minute they connect to the net
– The time gap between the discovery of a vulnerability and the time
it is exploited has narrowed considerably
– Most security-related events involve some degree of unauthorized
changes to systems and networks
What if you don’t patch vulnerabilities?
• Introduction
• Security in distributed networks
• Proven system and network security measures
• Security administration issues
• Getting the most return on investment (ROI)
• Status of cybersecurity legislation
• Conclusion
Conclusion
• Computer and information security continue to
grow in importance
• The gap between attackers’ capabilities and ability
to defend against them is widening
• Neglecting security is the worst thing you can do
• Defense in depth (multi-tiered defenses) work best
• Always weigh costs versus benefits when
considering security measures
• Nobody ever said this was going to be easy!
Threats and Attacks
New Table
Botnets
• A collection of software robots, or 'bots', that creates an
army of infected computers (known as ‘zombies') that are
remotely controlled by the originator. Yours may be one of
them and you may not even know it.
What they can do:
• Send spam emails with viruses attached.
• Spread all types of malware.
• Can use your computer as part of a denial of service attack
against other systems.
Hacking
• Hacking is a term used to describe actions taken by
someone to gain unauthorized access to a computer.
The availability of information online on the tools,
techniques, and malware makes it easier for even non-
technical people to undertake malicious activities.
What it can do:
• Find weaknesses (or pre-existing bugs) in your security
settings and exploit them in order to access your
information.
• Install a Trojan horse, providing a back door for
hackers to enter and search for your information.
Malware
• Malware is one of the more common ways to infiltrate or damage
your computer.
What it is:
• Malicious software that infects your computer, such as computer
viruses, worms, Trojan horses, spyware, and adware.
What it can do:
• Intimidate you with scareware, which is usually a pop-up message
that tells you your computer has a security problem or other false
information.
• Reformat the hard drive of your computer causing you to lose all your
information.
• Alter or delete files.
• Steal sensitive information.
• Send emails on your behalf.
• Take control of your computer and all the software running on it.
Phishing
• Phishing is used most often by cyber criminals because it's easy to
execute and can produce the results they're looking for with very little
effort.
What it is:
• Fake emails, text messages and websites created to look like they're
from authentic companies. They're sent by criminals to steal personal
and financial information from you. This is also known as “spoofing”.
What it does:
• Trick you into giving them information by asking you to update,
validate or confirm your account. It is often presented in a manner
than seems official and intimidating, to encourage you to take action.
• Provides cyber criminals with your username and passwords so that
they can access your accounts (your online bank account, shopping
accounts, etc.) and steal your credit card numbers.
Spam
• Spam is one of the more common methods of both sending information out
and collecting it from unsuspecting people.
What it is:
• The mass distribution of unsolicited messages, advertising or pornography to
addresses which can be easily found on the Internet through things like social
networking sites, company websites and personal blogs.
• Canada's anti-spam legislation applies to all commercial electronic messages.
A commercial electronic message is any electronic message that encourages
participation in a commercial activity, regardless of whether there is an
expectation of profit.
What it can do:
• Annoy you with unwanted junk mail.
• Create a burden for communications service providers and businesses to filter
electronic messages.
• Phish for your information by tricking you into following links or entering
details with too-good-to-be-true offers and promotions.
• Provide a vehicle for malware, scams, fraud and threats to your privacy.
Spoofing
• This technique is often used in conjunction with phishing in an
attempt to steal your information.
What it is:
• A website or email address that is created to look like it comes
from a legitimate source. An email address may even include
your own name, or the name of someone you know, making it
difficult to discern whether or not the sender is real.
What it does:
• Spends spam using your email address, or a variation of your
email address, to your contact list.
• Recreates websites that closely resemble the authentic site.
This could be a financial institution or other site that requires
login or other personal information.
Spyware
• Spyware & Adware
• Spyware and adware are often used by third parties to infiltrate your
computer.
What it is:
• Software that collects personal information about you without you knowing.
They often come in the form of a ‘free' download and are installed
automatically with or without your consent. These are difficult to remove
and can infect your computer with viruses.
What it can do:
• Collect information about you without you knowing about it and give it to
third parties.
• Send your usernames, passwords, surfing habits, list of applications you've
downloaded, settings, and even the version of your operating system to
third parties.
• Change the way your computer runs without your knowledge.
• Take you to unwanted sites or inundate you with uncontrollable pop-up ads.
Principles of Information Security, 2nd
Edition
Figure 2-11 - Man-in-the-Middle