0% found this document useful (0 votes)
19 views41 pages

Chapter 6 - Data Security Issues

The document discusses various types of vulnerabilities related to data security including viruses, worms, Trojan horses, spyware, spam, adware, and keyloggers. It describes how these threats can infect systems, steal data, and outlines some methods to help prevent attacks.

Uploaded by

prashanthan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views41 pages

Chapter 6 - Data Security Issues

The document discusses various types of vulnerabilities related to data security including viruses, worms, Trojan horses, spyware, spam, adware, and keyloggers. It describes how these threats can infect systems, steal data, and outlines some methods to help prevent attacks.

Uploaded by

prashanthan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Data Security

Chapter 6
Introduction
 Computer virus have become today’s headline
news
 With the increasing use of the Internet, it has
become easier for virus to spread
 Virus show us loopholes in software
 Most virus are targeted at the MS Windows OS
Internet Use for
Privacy
 The ability of an individual or group to seclude
themselves or information about themselves
and thereby reveal themselves by selectively.

Authentication
• The act of establishing or conforming
something(or someone) as authentic, that is, that
claims made by or about the thing are true.
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Contractors to various government
agencies
 Multinational corporations
 ANYONE ON THE NETWORK

5
Enemies
 Hackers
 Access systems in an unauthorized manner.
 Hackers have no malicious intent
(i.e., they do not intend to cause harm).
• They are only motivated by curiosity, personal
satisfaction, or gaining reputation etc.

 Crackers
 Individuals who cause damages to information
systems with a malicious intent often for financial
gains.
Identity Theft
 In the Internet sometimes you have to disclose your
personal information such as name, telephone numbers
and email addresses
 To make online purchases you need to give your credit
card number
 However, you got to be careful when you disclose your
personal information over the Internet
Identity Theft (cont.)
 Identity theft is the act of using someone’s Identity and
good reputation by another individual for financial gains
 One of the fastest growing crimes in United States
 A popular way to obtain private information is by using
phishing scams
 In phishing scams attacker sends an
email to the victim which looks like
a legitimate request for victims
personal information
Preventing Identity Theft
 Do not disclose your private information over emails
 Always check whether a website is a trusted one before
you enter any sensitive information
 Always check whether the website supports secure
transactions (others cannot see the information you send
to secure sites)
 Always read privacy policies given on websites
Malicious Software

 These are software that can cause harm to


your data and information systems (e.g.,
Viruses, Worms, Trojan Horses, Spyware etc)
Types of Vulnerabilities
 Virus
A malicious code that infects software on a computer,
thereby causing undesired results, such as changing
system settings, deleting files, disabling functions, and
some even hardware damage (flashing the CMOS).
A virus spread by making copies of itself and spreading.
It may spread between files or disks, but the defining
character is that it can recreate itself on it’s own
without traveling to a new host.

• There are estimated 30,000 computer viruses in


existence
• Over 300 new ones are created each month
• First virus was created to show loopholes in software
Symptoms of Virus Attack
 Computer runs slower than usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
 Denial of Service (DoS)

 You can protect your machine by using an


updated anti-virus software.
Virus through the Internet

 Today almost 87% of all viruses are spread through


the internet (source: ZDNet)
 Transmission time to a new host is relatively low, on
the order of hours to days
Types of Vulnerabilities…(cont.)
 Worms
◦ Has similar properties to a virus
◦ Spread over network connection
◦ Worms replicate
◦ Has the capability of moving from location to location(PC
to PC) thereby doing some damage and going somewhere
else.
◦ Can spread and cause damage on its own without attaching
to another program
◦ Even if you scan your machine, the worm will not be found
◦ First worm released on the Internet was called Morris
worm, it was released on Nov 2, 1988.
◦ Recent e.g. CodeRed, BugBear, SoBig etc.
Worms…(cont.)
E.g.

 Bubbleboy

◦ requires WSL (windows scripting language), Outlook or


Outlook Express, and IE5
◦ Does not work in Windows NT
◦ Effects Spanish and English version of Windows
◦ 2 variants have been identified
◦ May cause DoS
Worms…(cont.)
 How Bubbleboy works

◦ Bubbleboy is embedded within an email message of HTML


format.
◦ a VbScript while the user views a HTML page
◦ a file named “Update.hta” is placed in the start up directory
◦ upon reboot Bubbleboy executes
◦ changes the registered owner/organization
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersio
n\RegisteredOwner = “Bubble Boy”
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersio
n\RegisteredOrganization = “Vandalay Industry”
◦ using the Outlook MAPI address book it sends itself to each
entry
◦ marks itself in the registry
 HKEY_LOCAL_MACHINE\Software\Outlook.bubbleboy =
“OUTLOOK.Bubbleboy1.0 by Zulu”
Macro

 Specific to certain applications


 Comprise a high percentage of the viruses
 Usually made in WordBasic and Visual Basic
for Applications (VBA)
Macro
E.g.

 Melissa

◦ requires Outlook or Outlook Express Word 97 SR1


or Office 2000
◦ 105 lines of code (original variant)
◦ received either as an infected template or email
attachment
◦ lowers computer defenses to future macro virus
attacks
◦ may cause DoS
◦ infects template files with it’s own macro code
◦ 80% of of the 150 Fortune 1000 companies were
affected
Macro
 How Melissa works

◦ the virus is activated through a MS word document


◦ document displays reference to pornographic websites
while macro runs
◦ 1st lowers the macro protection security setting for
future attacks
◦ checks to see is it has run in current session before
 HKEY_LOCAL_MACHINE\Software\Microsoft\Office\Melissa =
“by Kwyjibo”
◦ propagates itself using the Outlook MAPI address book
(emails sent to the first 50 addresses)
Types of Vulnerabilities…(cont.)
 Trojans

A class of software that enters into your system


pretending to be something else, or a part of
another software.
Hidden
Leaks information
Usually does not reproduce
Keyloggers, adware, spyware, could all enter into
your system as trojans.
Trojan Horse
 Features of Back Orifice
◦ pings and query servers
◦ reboot or lock up the system
◦ list cached and screen saver password
◦ display system information
◦ logs keystrokes
◦ edit registry
◦ server control
◦ receive and send files
◦ display a message box
Types of Vulnerabilities…(cont.)
 Spyware

This is a class of applications that spy on the


users activities.
They may provide others access to your system,
display unwanted banner ads, or steal your
confidential information
Symptoms

 Targeted Pop-ups SPYWARE


 Slow Connection SPYWARE / TROJAN
 Targeted E-Mail (Spam) SPYWARE
 Unauthorized Access TROJAN HORSE
 Spam Relaying TROJAN HORSE
 System Crash SPYWARE /TROJAN
 Program Customisation SPYWARE
Effects
• Allows remote access
– To spy
– To disrupt
– To relay a malicious connection, so as to disguise the
attacker’s location (spam, hacking)
– To access resources (i.e. bandwidth, files)
– To launch a DoS attack
Operation
 Listen for connections
 Memory resident
 Start at boot-up
 Disguise presence
 Rootkits integrate with kernel
 Password Protected
Similarities / Differences
Spyware Trojan Horses
Commercially Motivated Malicious

Internet connection required Any network connection required

Initiates remote connection Receives incoming connection

Purpose: To monitor activity Purpose: To control activity

Collects data and displays pop-ups Unauthorized access and control

Legal Illegal

Not Detectable with Virus Checker Detectable with Virus Checker

Age: Relatively New (< 5 Years) Age: Relatively Old ( > 20 Years)

Memory Resident Processes

Surreptitiously installed without user’s consent or understanding

Creates a security vulnerability


Types of Vulnerabilities…(cont.)
 Spam
Spam is “unsolicited” email – email that is sent without
permission.
This normally consists of credit cards, stock reports, etc.
Replying to a spammer and asking him not to sent emails is
pointless.
Best thing to do is to use a spam filter , which filter out the
spam mail and send it to another folder, or delete it.
 Adware
This is software that courses various advertisements to
display on your system as pop-ups or pop-unders while you
are browsing on-line.
 Keyloggers
This is software/hardware that monitors your keystrokes
and records them/publishes them.
This attempt to capture passwords, credit card numbers,
and other sensitive information.
Attacks on Passwords
 Brute force attack
 Here the attacker tries all possible combinations for a
password until he gets the correct one
 There are programs written to do this task

 Dictionary attack
 The attacker tries all the words in a dictionary with the
hope of discovering the password (including names,
places, etc.)
 There are dictionaries of frequently used passwords that
can be used for this purpose
Attacks on Passwords…(cont.)

 Keystroke Monitoring
 Attacker tries to obtain a password by looking at your key
strokes while you enter your password

 Dumpster diving
 Attacker searches through trash bins with the hope of
finding written down passwords or other confidential
information
Strong Passwords
 Passwords are not stored in clear-text (i.e., readable)
format in your computer
 It is possible for someone to find out your password
either by guessing it or by carrying out a password attack.
 Cannot be easily guessed by others or cracked by
password cracking programs
 Strong passwords are essential to protect your
information
For example, “sdfo839f” is a good password
Password Best Practices
 Always use a password of a minimum of eight characters
 Do not use your name, birthday, name of a close relative as
your password since these can be easily guessed
 Use non-dictionary words for your password
 Always use a combination of uppercase/lowercase characters,
numbers.
 Use at least one special character in your password
(e.g., !,#,$,@)
 Change your password at least twice every month
 Never write down your password in books, pieces of paper,
diary etc.
 Never send your password via email or disclose it to someone
even if you trust that person
Preventing Malicious Software (cont.)
 Always use a virus scanner and keep it up to date with latest
updates
 Enable auto-protect features of your virus scanner
 Use a spyware scanner to scan and remove spyware and
update it regularly
 Never download content from unknown web sites
 Never open email attachments coming from unknown sources
 sources
Preventing Malicious Software (cont.)
 Use a personal firewall
 Keep your operating system
updated with latest updates
and patches
 Never click “yes” in unknown
popup ads that appear.
Always close them using “x”
on the upper right hand
corner
Tracking Cookies
Cookies
 A Cookie is a small text file sent to the user from a
website.
◦ Contains Website visited
◦ Provides client-side personalisation
◦ Supports easy Login
 Cookies are controlled by…
◦ Website’s Application Server
◦ Client-side Java Script
 The website is effectively able to ‘remember’ the user and
their activity on previous visits.
Web Proofing
 The process of tracking the behavior of
users including
◦ the sites they go to
◦ How much time they spend there
◦ What they do there etc.
Protection/Prevention
 Knowledge
 Proper configurations
 Run only necessary programs
 Anti-virus software
Identifying Secure Websites
 Secure websites have a URL starting with https://

 There is a closed padlock icon at the bottom of the


browser status bar
Solutions

Short Term Long Term


• Add Spyware to Anti-Virus
 Firewall
 Virus Checker • Automatic maintenance

 Spyware Remover • Legislation


 Frequent OS updates • Education on problems
 Frequent back-up • Biometric access
 Learning problems • Semantic web (and search)
Encryption
 Encryption makes your data unreadable to others
 Encryption takes your normal messages (called clear text)
and changes it to an unreadable format called cipher text
 Example:
Take the word “Hello” and replace each letter by three
letters ahead in the alphabet.
You end up with “Khoor”
which is unreadable
Chapter Review
 What is Computer Security?
 What is Network Security?
 What is Internet Security?
 Information Security is concerned with three (03)
main areas. Name and describe those areas.
 When we doing instant chatting (Skype, gtalk, etc.)
viruses can attack our machine. How could that
happen and how can we avoid it?
 What does antivirus software do?
 Briefly explain term Data Encryption with its process.
 How can you protect your privacy on the Internet?
Briefly explain.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy