UNit-2 (Part-1)
UNit-2 (Part-1)
Active attacks: An Active attack attempts to alter system resources or effect their operations. Active attack
involves some modification of the data stream or creation of false statement.
Types of active attacks are as following:
1. Masquerade – Masquerade attack takes place when one entity pretends to be different entity. A
Masquerade attack involves one of the other forms of active attacks.
2. Modification of messages – It means that some portion of a message is altered or that message is
delayed or reordered to produce an unauthorised effect. For example, a message meaning “Allow JOHN
to read confidential file X” is modified as “Allow Smith to read confidential file X”.
3. Repudiation – This attack is done by either sender or receiver. The sender or receiver can deny later that
he/she has send or receive a message. For example, customer ask his Bank “To transfer an amount to
someone” and later on the sender(customer) deny that he had made such a request. This is repudiation.
4. Replay – It involves the passive capture of a message and its subsequent the transmission to produce an
authorized effect.
5. Denial of Service – It prevents normal use of communication facilities. This attack may have a specific
target. For example, an entity may suppress all messages directed to a particular destination. Another
form of service denial is the disruption of an entire network wither by disabling the network or by
overloading it by messages so as to degrade performance.
Passive attacks: A Passive attack attempts to learn or make use of information from the system but does not
affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring of transmission.
The goal of the opponent is to obtain information is being transmitted.
Types of Passive attacks are as following:
1. The release of message content – Telephonic conversation, an electronic mail message or a transferred
file may contain sensitive or confidential information. We would like to prevent an opponent from
learning the contents of these transmissions.
2. Traffic analysis – Suppose that we had a way of masking (encryption) of information, so that the
attacker even if captured the message could not extract any information from the message. The
opponent could determine the location and identity of communicating host and could observe the
frequency and length of messages being exchanged. This information might be useful in guessing the
nature of the communication that was taking place.
Cybercrime prevention methods
1. Use Strong Passwords - Use different user ID / password combinations for different accounts and avoid
writing them down. Make the passwords more complicated by combining letters, numbers, special
characters (minimum 10 characters in total) and change them on a regular basis.
2. Secure your computer -
• Activate your firewall - Firewalls are the first line of cyber defence; they block connections
to unknown or bogus sites and will keep out some types of viruses and hackers.
• Use anti-virus/malware software - Prevent viruses from infecting your computer by installing
and regularly updating anti-virus software.
• Block spyware attacks - Prevent spyware from infiltrating your computer by installing and
updating anti-spyware software.
3. Be Social-Media Savvy - Make sure your social networking profiles (e.g., Facebook, Twitter, YouTube,
MSN, etc.) are set to private. Check your security settings. Be careful what information you post online.
Once it is on the Internet, it is there forever!
4. Secure your Mobile Devices - Be aware that your mobile device is vulnerable to viruses and hackers.
Download applications from trusted sources.
5. Install the latest operating system updates - Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent
potential attacks on older software.
6. Protect your Data - Use encryption for your most sensitive files such as tax returns or financial records,
make regular back-ups of all your important data, and store it in another location.
7. Secure your wireless network - Wi-Fi (wireless) networks at home are vulnerable to intrusion if they
are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also
vulnerable. Avoid conducting financial or corporate transactions on these networks.
8. Protect your e-identity - Be cautious when giving out personal information such as your name, address,
phone number or financial information on the Internet. Make sure that websites are secure (e.g., when
making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social
networking sites).
9. Avoid being scammed - Always think before you click on a link or file of unknown origin. Don’t feel
pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply
to emails that ask you to verify your information or confirm your user ID or password.
10. Call the right person for help - Don’t panic! If you are a victim, if you encounter illegal Internet content
(e.g., child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report
this to your local police. If you need help with maintenance or software installation on your computer,
consult with your service provider or a certified computer technician.
Data security uses various methods to make sure that the data is correct, original, kept confidentially and is
safe. It includes-
• Ensuring the integrity of data.
• Ensuring the privacy of the data.
• Prevent the loss or destruction of data.
Data security consideration involves the protection of data against unauthorized access, modification,
destruction, loss, disclosure or transfer whether accidental or intentional. Some of the important data security
consideration are described below:
Backups
Data backup refers to save additional copies of our data in separate physical or cloud locations from data files
in storage. It is essential for us to keep secure, store, and backup our data on a regular basis.
Keeping reliable and regular backups of our data protects against the risk of damage or loss due to power
failure, hardware failure, software or media faults, viruses or hacking, or even human errors.
To use the Backup 3-2-1 Rule is very popular. This rule includes:
• Three copies of our data
• Two different formats, i.e., hard drive+tape backup or DVD (short term)+flash drive
• One off-site backup, i.e., have two physical backups and one in the cloud
Some of the top considerations for implementing secure backup and recovery are-
1. Authentication of the users and backup clients to the backup server.
2. Role-based access control lists for all backup and recovery operations.
3. Data encryption options for both transmission and the storage.
4. Flexibility in choosing encryption and authentication algorithms.
5. Backup of a remote client to the centralized location behind firewalls.
6. Backup and recovery of a client running Security-Enhanced Linux (SELinux).
7. Using best practices to write secure software.
Archival Storage
• Data archiving is the process of retaining or keeping of data at a secure place for long-term storage.
• The data might be stored in safe locations so that it can be used whenever it is required.
• The archive data is still essential to the organization and may be needed for future reference.
• Also, data archives are indexed and have search capabilities so that the files and parts of files can be
easily located and retrieved.
• The Data archival serve as a way of reducing primary storage consumption of data and its related costs.
• Data archival is different from data backup in the sense that data backups created copies of data and used
as a data recovery mechanism to restore data in the event when it is corrupted or destroyed. Onthe
other hand, data archives protect the older information that is not needed in day-to-day operations but
may have to be accessed occasionally.
Data archives may have many different forms. It can be stored as Online, offline, or cloud storage-
• Online data storage places archive data onto disk systems where it is readily accessible.
• Offline data storage places archive data onto the tape or other removable media using data archiving
software. Because tape can be removed and consumes less power than disk systems.
• Cloud storage is also another possible archive target. For example, Amazon Glacier is designed for
data archiving. Cloud storage is inexpensive, but its costs can grow over time as more data is added to
the cloud archive.
The following list of considerations will help us to improve the long-term usefulness of our archives:
1. Storage medium
2. Storage device
3. Revisiting old archives
4. Data usability
5. Selective archiving
6. Space considerations
7. Online vs. offline storage
Storage medium - The first thing is to what storage medium we use for archives. The archived data will be
stored for long periods of time, so we must need to choose the type of media that will be lost as long as our
retention policy dictates.
Storage device - This consideration takes into account about the storage device we are using for our archives
which will be accessible in a few years. There is no way to predict which types of storage devices will standthe
best. So, it is essential to try to pick those devices that have the best chance of being supported over the long
term.
Revisiting old archives - Since we know our archive policies and the storage mechanisms we use for archiving
data would change over time. So we have to review our archived data at least once a year to see thatif anything
needs to be migrated into a different storage medium.
For example, about ten years ago, we used Zip drives for archival then we had transferred all of my archives
to CD. But in today?s, we store most of our archives on DVD. Since modern DVD drives can also read CDs,
so we haven't needed to move our extremely old archives off CD onto DVD.
Data usability - In this consideration, we have seen one major problem in the real world is archived data which
is in an obsolete format.
For example, a few years ago, document files that had been archived in the early 1990s were created by an
application known as PFS Write. The PFS Write file format was supported in the late 80s and early 90s, but
today, there are not any applications that can read that files. To avoid this situation, it might be helpful to archive
not only the data but also copies the installation media for the applications that created the data.
Selective archiving - In this consideration, we have to sure about what should be archived. That means we will
archive only a selective part of data because not all data is equally important.
Space considerations - If our archives become huge, we must plan for the long-term retention of all our data.
If we are archiving our data to removable media, capacity planning might be simple which makes sure that there
is a free space in the vault to hold all of those tapes, and it makes sure that there is a room in our ITbudget
to continue purchasing tapes.
Online vs. offline storage - In this consideration, we have to decide whether to store our archives online (on
a dedicated archive server) or offline (on removable media). Both methods of archival contain advantages and
disadvantages. Storing of data online keeps the data easily accessible. But keeping data online may bevulnerable
to theft, tampering, corruption, etc. Offline storage enables us to store an unlimited amount of data, but it is not
readily accessible.
Disposal of Data
• Data destruction or disposal of data is the method of destroying data which is stored on tapes, hard disks
and other electronic media so that it is completely unreadable, unusable and inaccessible for unauthorized
purposes.
• It also ensures that the organization retains records of data for as long as they are needed.
• When it is no longer required, appropriately destroys them or disposes of that data in some other way,
for example, by transfer to an archives service.
The disposal of data usually takes place as part of the normal records management process. There are two
essential circumstances in which the destruction of data need to be handled as an addition to this process-
• The quantity of a legacy record requires attention.
• The functions are being transferred to another authority and disposal of data records becomes part of
the change process.
The following list of considerations will help us for the secure disposal of data-
1. Eliminate access
2. Destroy the data
3. Destroy the device
4. Keep the record of which systems have been decommissioned
5. Keep careful records
6. Eliminate potential clues
7. Keep systems secure until disposal
Eliminate access - In this consideration, we have to ensure that eliminating access account does not have any
rights to re access the disposed of data again.
Destroy the Data - In this consideration, there is not necessary to remove data from storage media will be
safe. Even these days reformatting or repartitioning a drive to "erase" the data that it stores is not good enough.
Today's many tools available which can help us to delete files more securely. To encrypt the data on the drive
before performing any deletion can help us to make data more difficult to recover later.
Destroy the device - In the most cases, storage media need to be physically destroyed to ensure that our sensitive
data is not leaked to whoever gets the drives next. In such cases, we should not destroy them itself. To do this,
there should be experts who can make probably a lot better at safely and effectively rendering any data on our
drives unrecoverable. If we can't trust this to an outsider agency that specializes in the secure destruction of
storage devices, we should have a specialized team within our organization who has the same equipment and
skills as outside contractors.
Keep the record of which systems have been decommissioned - In this, we have to make sure that the storage
media has been fully decommissioned securely and they do not consist of something easily misplaced or
overlooked. It is best if storage media that have not been fully decommissioned are kept in a specific location,
while decommissioned equipment placed somewhere else so that it will help us to avoid making mistakes.
Keep careful records - In this consideration, it is necessary to keep the record of whoever is responsible for
decommissioning a storage media. If more than one person is assigned for such responsibility, he should sign off
after the completion of the decommissioning process. So that, if something happened wrong, we know who to
talk to find out what happened and how bad the mistake is.
Eliminate potential clues - In this consideration, we have to clear the configuration settings from networking
equipment. We do this because it can provide crucial clues to a security cracker to break into our network and
the systems that reside on it.
Keep system secure until disposal of data - In this consideration, we should have to make clear guidelines for
who should have access to the equipment in need of secure disposal. It will be better to ensure that nobody should
have access authentication to it before disposal of data won't get his or her hands on it.
Types of Firewalls
• Packet filtering - A small amount of data is analyzed and distributed according to the filter’s
standards.
• Proxy service - Network security system that protects while filtering messages at the application layer.
• Stateful inspection - Dynamic packet filtering that monitors active connections to determine which
network packets to allow through the Firewall.
• Next Generation Firewall (NGFW) - Deep packet inspection Firewall with application-level
inspection.
Work of Firewall
A Firewall is a necessary part of any security architecture and takes the guesswork out of host level protections
and entrusts them to your network security device. Firewalls, and especially Next Generation Firewalls, focus
on blocking malware and application-layer attacks, along with an integrated intrusion prevention system (IPS),
these Next Generation Firewalls can react quickly and seamlessly to detect and react to outside attacks across
the whole network. They can set policies to better defend your network and carry out quick assessments to detect
invasive or suspicious activity, like malware, and shut it down.
Need of Firewall
Firewalls, especially Next Generation Firewalls, focus on blocking malware and application-layer attacks. Along
with an integrated intrusion prevention system (IPS), these Next Generation Firewalls are able to react quickly
and seamlessly to detect and combat attacks across the whole network. Firewalls can act on previously set
policies to better protect your network and can carry out quick assessments to detect invasive or suspicious
activity, such as malware, and shut it down. By leveraging a firewall for your security infrastructure, you’re
setting up your network with specific policies to allow or block incoming and outgoing traffic.
VPNs - A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a
network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized
people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is
widely used in corporate environments.
Working of VPN
When you connect your computer (or another device, such as a smartphone or tablet) to a VPN, the computer
acts as if it’s on the same local network as the VPN. All your network traffic is sent over a secure connection
to the VPN. Because your computer behaves as if it’s on the network, this allows you to securely access local
network resources even when you’re on the other side of the world. You’ll also be able to use the Internet as
if you were present at the VPN’s location, which has some benefits if you’re using pubic Wi-Fi or want to access
geo-blocked websites.
When you browse the web while connected to a VPN, your computer contacts the website through the encrypted
VPN connection. The VPN forwards the request for you and forwards the response from the website
back through the secure connection. If you’re using a USA-based VPN to access Netflix, Netflix will see your
connection as coming from within the USA.
Types of VPNs
• Remote access - A remote access VPN securely connects a device outside the corporate office. These
devices are known as endpoints and may be laptops, tablets, or smartphones. Advances in VPN
technology have allowed security checks to be conducted on endpoints to make sure they meet a certain
posture before connecting. Think of remote access as computer to network.
• Site-to-site - A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-
to-site VPNs are used when distance makes it impractical to have direct network connections between
these offices. Dedicated equipment is used to establish and maintain a connection. Think of site-to-site
access as network to network.
Uses of VPN
VPNs are a fairly simple tool, but they can be used to do a wide variety of things:
• Access a Business Network While Traveling
• Access Your Home Network While Travelling
• Hide Your Browsing Activity From Your Local Network and ISP
• Access Geo-Blocked Websites
• Bypass Internet Censorship
• Downloading Files
Intrusion Detections
Intrusion Detection System - is a system that monitors network traffic for suspicious activity and issues alerts
when such activity is discovered. It is a software application that scans a network or a system for harmful activity
or policy breaching. Any malicious venture or violation is normally reported either to an administrator or
collected centrally using a security information and event management (SIEM) system. A SIEM system
integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity
from false alarms.
Intrusion prevention systems also monitor network packets inbound the system to check the malicious activities
involved in it and at once sends the warning notifications.
Access Control
Access control is a method of restricting access to sensitive data. Only those that have had their identity verified
can access company data through an access control gateway.
Types –
1. CPU Protection: CPU protection is referred to as we cannot give CPU to a process forever, it should
be for some limited time otherwise other processes will not get the chance to execute the process. So, for
that, a timer is used to get over from this situation. which is basically give a certain amount of timea
process and after the timer execution a signal will be sent to the process to leave the CPU. hence process
will not hold CPU for more time.
2. Memory Protection: In memory protection, we are talking about that situation when two or more
processes are in memory and one process may access the other process memory. and to protecting this
situation we are using two registers as:
1. Bare register
2. Limit register
So basically, Base register store the starting address of program and limit register store the size of the
process, so when a process wants to access the memory then it is checked that it can access or can not
access the memory.
3. I/O Protection: So when we ensuring the I/O protection then some cases will never have occurred in the
system as:
1. Termination I/O of other process
2. View I/O of other process
3. Giving priority to a particular process I/O
If an application process wants to access any I/O device then it will be done through system call so
that OS will monitor the task.
Like In C language write() and read() is a system call to read and write on file. There are two modes
in instruction execute:
• User mode - The system performs a task on behalf of user application this instruction. In this
mode, the user cannot directly access hardware and reference memory.
• Kernel mode - Whenever a direct access to hardware is required a system call is used by the
application program.
We know that when an application process wants to access any I/O device it should be done through system
call so that the Operating system will monitor the task.
OS Security
• Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and
availability.
• OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms,
malware or remote hacker intrusions.
• Security refers to providing a protection system to computer system resources such as CPU, memory,
disk, software programs and most importantly data/information stored in the computer system.
• If a computer program is run by an unauthorized user, then he/she may cause severe damage to computer
or data stored in it. So, a computer system must be protected against unauthorized access, malicious
access to system memory, viruses, worms etc.
• OS security encompasses all preventive-control techniques, which safeguard any computer assetscapable
of being stolen, edited or deleted if OS security is compromised.
• OS security may be approached in many ways, including adherence to the following:
• Performing regular OS patch updates
• Installing updated antivirus engines and software
• Scrutinizing all incoming and outgoing network traffic through a firewall
• Creating secure accounts with required privileges only (i.e., user management)
One Time passwords - One-time passwords provide additional security along with normal authentication. In
One-Time Password system, a unique password is required every time user tries to login into the system. Once
a one-time password is used, then it cannot be used again. One-time password are implemented in various ways.
• Random numbers − Users are provided cards having numbers printed along with corresponding
alphabets. System asks for numbers corresponding to few alphabets randomly chosen.
• Secret key − User are provided a hardware device which can create a secret id mapped with user id.
System asks for such secret id which is to be generated every time prior to login.
• Network password − Some commercial applications send one-time passwords to user on registered
mobile/ email which is required to be entered prior to login.
Program Threats - Operating system's processes and kernel do the designated task as instructed. If a user
program made these process do malicious tasks, then it is known as Program Threats. One of the common
examples of program threat is a program installed in a computer which can store and send user credentials via
network to some hacker. e.g. Trojan Horse, trap door, logic bomb, virus, etc
System Threats - System threats refers to misuse of system services and network connections to put user in
trouble. System threats can be used to launch program threats on a complete network called as program attack.
System threats creates such an environment that operating system resources/ user files are misused. e.g. worm,
port scanning, DoS, etc