Lecture 2
Lecture 2
Dr Iftekhar Salam
iftekhar.salam@xmu.edu.my
Acknowledgment:
Some of the slides are adapted and enhanced from materials prepared by Dr Leonie
Simpson
1 Overview
2 Threats
3 Vulnerabilities
4 Attacks
5 Summary
Introduction
Information is an important asset for individuals and organisations
Information security is about protecting information assets from damage or harm.
For particular assets, security goals may be:
Confidentiality: preventing the unauthorised disclosure of information
Integrity: detecting the unauthorised modification or destruction of information
Availability: ensuring resources are accessible when required by an authorised entity
Introduction
Threat
Set of circumstances with the potential to cause harm to an asset by compromising
security goals
Vulnerability
Characteristic of or weakness in a system that could, if acted on by a threat, result in
harm to asset
Security incident
Occurs when threats and vulnerabilities coincide
Attack: when vulnerabilities are deliberately exploited
Introduction
Introduction
Introduction
Introduction
Threats
Threat sources:
External: threat source outside of the organisation
Examples include people who are not authorized to use your information systems
organised criminal groups, commercial competitor, nation state-sponsored groups,
political activist, ......
May need access to assets in order to cause harm (Physical and/or logical access)
Threats
Threat type:
Natural event
Examples: Earthquake, Fire, Flood, Storm, Tornado, Tidal Wave, Extreme
Temperature, Vermin
Threats
Natural events:
Potential for threat to occur may depend on physical location of the information
asset
Earthquake, fire, flood, thunder strokes
Historical data may be useful indicator
Examples:
?
Most likely results in compromise of:
Which security goal? Think CIA
Threats
1
www.cbc.ca/news/world/story/2012/03/02/tornadoes-us-south.html
Threats
2
www.amnesty.org/download/Documents/36000/amr360042010en.pdf
Threats
Threats
3
www.theguardian.com/world/2015/mar/30/
personal-details-of-world-leaders-accidentally-revealed-by-g20-organisers
4
www.documentcloud.org/documents/1697616-g20-world-leaders-data-breach.html
Threats
5
https://nakedsecurity.sophos.com/2012/11/21/prince-william-photos-password/
6
https://www.theguardian.com/uk/2012/nov/20/prince-william-photos-mod-passwords
Threats
Threats
Threats
Human action - deliberate
Common malware types:
Viruses - programs with ability to replicate
Spreads by copying itself into other files (infecting) and is activated when these files are
opened or executables run
Worms - programs with ability to self replicate
Spreads from computer to computer without human interaction
Trojan horses - programs with known desirable properties and hidden undesirable
property
User downloads the program and knowingly uses desirable features
Undesirable feature runs without user knowledge
Watch: https://www.youtube.com/watch?v=YbiR6IMf5KQ
Threats
7
https://www.smh.com.au/technology/
what-a-major-data-breach-costs-target-by-the-numbers-20140506-zr5ny.html
8
https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/
Vulnerabilities
Vulnerabilities
Property includes:
Physical assets: buildings and contents
Hardware: computer systems, data communications devices, data storage devices
Software: Operating system, applications
Data: System and organisational data: files, databases, passwords, ......
Consider possible vulnerabilities for each
This list is by no means exhaustive, just some of the possibilities ......
Maintenance
of assets and perimeter protection
Redundancy
What happens if/when equipment fails?
Is there sufficient alternative resources?
e.g., Uninterruptible Power Supply (UPS)
Source of software:
authorised, legitimate, vendor supported?
downloading and installing
Testing of software:
Flaws (bugs) in software, e.g., buffer overflows, injections, .......
Need for patching and upgrading
Configuration/misconfiguration
Vulnerabilities: people
Aspects to consider include
Employees:
Recruiting staff suitable for the position
Failure to check background is common
Inadequate education of staff with respect to threats - for example, are staff aware of
policies regarding:
providing information by email or over phone
downloading software,
use of mobile devices,
Vulnerabilities: Example
9
https://www.bbc.com/news/world-asia-pacific-12304651
Vulnerabilities: processes
Aspects to consider include:
Access control and privilege management
Including keys, cards, passwords
Backup of files and systems
Business continuity plans
for recovery of information assets after disaster
Communications
Policy for acceptable use of communications systems
Example: confirmation for sending/receiving messages
Does it matter what the message is?
Example: Passwords - see: www.plaintextoffenders.com
Checks and balances:
People make mistakes: are there processes to detect, correct or reduce the impact of
errors?
Example: Separation of duties
Processes associated with staff joining/leaving organisation:
Clear statement of duties
Nondisclosure/confidentiality agreements
Software management processes and auditing
Application whitelisting?
Security incidents:
If the threat involves deliberate human action, then incident is referred to as an
attack
Attacker: person who deliberately attempts to exploit a vulnerability to gain
unauthorized access, or perform unauthorized actions
Even if threat is not deliberate, the damage from the security incident can still be
extensive
Providing effective security for information assets requires understanding threats and
vulnerabilities
so that appropriate security measures can be used
Attacks
Attack Types:
Passive
Attacker's goal is to obtain information
Attacker does not alter information system resources
No interaction by the attacker other than listening or observing
Difficult to detect; usually try to prevent the attack
Active
Attacker's goal may be to obtain, modify, replicate or fabricate information
Requires some action or interaction with the information system by the attacker
Usual approach is to try to detect attackers actions, recognise them as signs of attack
and recover
Passive attacks
Eavesdropping:
Listening to the conversations of others without their knowledge or consent
Wiretapping
Eavesdropping over telephone network
Information can be obtained from:
the content of the conversations, and
knowing who is talking to who and when (traffic analysis)
Passive attacks
Shoulder surfing
Watching the actions of others (especially at data entry) without their knowledge
or consent
Usually connected with entry of confidential information
PIN (for financial access at ATM)
Security code or password
Can also be for greater amounts of data
Use of mobile devices in insecure surroundings is vulnerability that can be exploited for
this attack
Passive attacks
Active attacks
The NIST Computer Security Incident Handling Guide defines a DoS attack as:
An action that prevents or impairs the authorized use of networks, systems, or
applications by exhausting resources such as central processing units (CPU),
memory, bandwidth, and disk space
Active attacks
The NIST Computer Security Incident Handling Guide defines a DoS attack as:
An action that prevents or impairs the authorized use of networks, systems, or
applications by exhausting resources such as central processing units (CPU),
memory, bandwidth, and disk space
Active attacks
Active attacks
10
https://krebsonsecurity.com/tag/mirai/
11
https://krebsonsecurity.com/tag/mirai-botnet/
Active attacks
Masquerade/Spoofing:
One entity pretends to be another in order to deceive others
Active attacks
Phishing:
Attempts to gain information (especially credentials to enable access to other
resources) by masquerading as a legitimate organisation (Bank, eBay, PayPal)
Example: account details, PIN number, password
Usually involves
spoofed emails and/or web pages + social engineering
Socially-aware attacks
Mine social relationships from public data
Phishing email appears to arrive from someone known to the victim
Use spoofed identity of trusted organization to gain trust
Urge victims to update or validate their account
Threaten to terminate the account if the victims not reply
Use gift or bonus as a bait
Security promises
Context-aware attacks
“Your bid on eBay has won!”
“The books on your Amazon wish list are on sale!”
Watch: https://www.youtube.com/watch?v=fZc2oXfz9Qs
Active attacks
Social Engineering:
Using social skills to convince people to reveal information or permit access to
resources
Examples:
Claim to be new employee, manager’s assistant, maintenance person, etc and ask for
assistance in accessing resource to complete an urgent task:
I’ve lost my password and I have to finish this today ......
My swipe card doesn't work/left at home......
Tailgating - follow another person closely so that when they go into secure area you
can also get in without providing appropriate credentials
Active attacks
Identity theft:
A crime where one person uses another person’s key personal information to
fraudulently impersonate them
The imposter gains a benefit:
Obtain advantages that the victim has:
access to certain locations or services,
get loans, spend on credit or debit cards,
use drivers license, medical care, etc
Avoid penalties incurred by imposter’s actions:
failing to make loan repayments or pay credit card bills,
using victim’s ID if caught speeding or other infringement, etc
Active attacks
12
www.sunshinecoastdaily.com.au/news/woman-to-fight-maroochydore-court/1301130/
Active attacks
Active attacks
Identity Theft: Example - Gaining personal information using Phishing E-mail
Active attacks
Identity Theft - Information used to steal someone's identity can be gained by:
Dumpster diving (digging through rubbish bin contents)
Hardcopy items that reveal personal information: credit card receipts, pre-approved
credit forms, paperwork from other organisations etc
Raiding letterboxes
Mail may include unique identifiers such as Tax File Number
Social engineering
Phone calls, email messages, phishing scams:
Romance scams, fake jobs, fake lottery wins,
Personal web page, social networking sites
Sites that are public, but should not be, e.g., December 2011 Telstra customer
database exposure
Info that has been stolen and made available
Cupid media (online dating) hack in 2013
Using malware to compromise a user’s PC
trojan keystroke logger
Attacking databases holding personal information
Active attacks
Active attacks
MITM: Interception
MITM: Interruption
MITM: Modification
MITM: Fabrication
Active attacks
Replay attack:
This is where a valid data transmission is recorded, and re-transmitted at a later
date
Example:
Access to a system requires use of password, but password is encrypted during
transmission
Attacker records encrypted password, and replays this information in order to gain
access
Doesn't matter that attacker doesn't know the password – they can provide the
expected credential on request.
Threat: ?
Vulnerability: ?
Attack: ?
Control measures: ?
End of Lecture 2! ,
Summary
For information assets and their support systems:
Many threats and many vulnerabilities
To protect information assets need to understand:
Possible threats, existing vulnerabilities, and
Likelihood of threats and vulnerabilities coinciding
Security incidents occur - result in CIA breaches:
Called attacks if deliberate human action is involved
Lots of different types, lots of different targets
Severity depends on value and criticality of asset, and degree of compromise
Need to implement controls to achieve security goals
Watch:
www.khanacademy.org/computing/computer-science/internet-intro/
internet-works-intro/v/the-internet-cybersecurity-and-crime
QUESTIONS?
Iftekhar Salam (XMUM) SWE 308 56 / 57
Summary
2 Mission: To nurture young talents with dignity and wisdom, turning them into fine
citizens of the region who will contribute to the prosperity of the people and social
progress of Malaysia, China and Southeast Asia.