Chapter: 1 Introduction and Security Threats 1.1 Threats to Security : Virus and worms Intruders Criminal Organizations Terrorists Information warfare 1.1.1 The need for security:● In the past times computer application have very low security. But when different application where developed to handle financial application and personal data, from that time the need for security is generated. ● So, the various application develop for security. ● Provide user Id and password to every user. ● Encode the data and store in different format. ● Day by day technology is developed along with the communication medium is also developed. So, people realized that the basic security is not enough to secure the different application. ● Then next the internet is growing fast so the world become very small at this time if not prepare any security then what happen. 1.1.2 Types of Security:● Computer security:- Collection of tools designed to protect data and to thwart hackers is computer security. ● Network Security:- When we create network and transmit data between computer to computer that time needed to protect data during their transmission its call network security. ● Internet Security:- All business, government and academic organizations interconnect their data processing equipment with a collection of interconnected networks. Such a collection is referred as internet. And the term is internet security. No more difference between network security and internet security. 1.1.3 Threats to Security[1]:● Viruses:- Virus is a type of program code that attaches itself to authorized program code and runs when the legitimate program runs. ● It can then infect other programs in that computer or programs that are in other computers but on the same network. Introduction and Security Threats 1 ● Usually viruses cause damage to computer and network system. “ A virus is a computer program that attaches itself to another legitimate program and causes damage to the computer system or to the network” ● Worms:- Worms is same like Virus but it is different in implementation. ● Virus do the changes in program where worm does not modify a program instead of it worms replicates the file again and again. The replication grows so large that indirectly the computer or the network on which the worms resides, become very slow. ● A worm do the attack in the form of eating of its resources. “A worm does not perform any destructive actions and instead, only consumes system resources to bring it down” ● Intruders:- An intruder is a person who attempts to gain unauthorized access to a system, to damage that system or to disturb data on that system. “This person attempts to violate security by interfering with system availability, data integrity or data confidentiality.” ● Insiders :- Insiders may have accounts giving them legitimate access to computer systems. with this access originally having been given to them to serve in the performance of their duties these permissions could be abused to harm the organization. ● Insiders are often familiar with the organizations data and place to protect them. ● This makes it easier for insider to break security controls. ● Insider does not need to attack outside from the organization because he is inside already. ● Insider threats are harder to defend against than attacks from outsiders, because the insider already has legitimate access to the organization information. “An insider may attempt to steal property or information for personal gain or to benefit another organization or country. The threat to the organization could also be through malicious software.” 1.1.4 Criminal Organization:● It is the term which categories transnational, national or local grouping of highly centralized enterprises run by criminals, who intend to engage in illegal activity, most commonly for monetary profit. ● Sometimes criminal organizations force people to do business with them as when gang extorts money from shopkeepers for so called protection. Introduction and Security Threats 2 1.1.5 Terrorists:● Terrorism is the threat of violence and the use of pear to force, persuade and gain public attention. ● Terrorism is, in the broadest sense, the use of intentional violence for political or religious purposes. 1.1.6 Information Warfare:● IW is primarily united state military concept involving the use and management of Information and communication technology in Pursuit of a competitive advantage over an opponent. ● It may involve collection of tactical information, assurance that one’s own information is valid, speeding of propaganda or disinformation to demoralize or manipulate the enemy and public. ● Information Warfare is closely linked with psychological warfare. 1.2 Avenues of Attacks: Steps in attack 1.2.1 Avenues of Attacks [2]: ● An intelligent act that is a deliberate attempt to evade security service and violate the security policy of a system. ● The attacker has chosen the target not because of the hardware or software the organization is running but for another reason, such as apolitical reason. ● Example of this types of attack would be an individual in one country attacking a government system in another country. ● Example , in this case, might be an attacker who defaces the web site of a company that sells fur coats because the attacker feels using animals in this way is unethical. 1.2.2 Steps in Attack: ● The steps an Attacker takes in attempting to penetrate a targeted network are similar to the ones that a security consultant performing a penetration test would take. ● The attacker will need to gather as much information about the organization as possible. Introduction and Security Threats 3 ● There are number of ways to do this, including studying the organization’s own website, looking for postings on news groups or consulting resources such as the Securities and Exchange Commission’s (SEC’s) EDGAR web site. ● The first step in the technical part of an attack is often to determine what target systems are available and active. ● The next step is often to perform a port scan. This will help identify which ports are open, which gives an indication of which services may be running on the target machine. ● Determining the operating system that is running on the target machine. ● As well as specific application programs, follows along with determining the service that are available. 1.3 Security Basics: Confidentiality Integrity Availability 1.3.1 Security Basics[3]:● ● ● ● It is a basics term related to security so need to understand. Confidentiality Integrity Availability 1.3.2 Confidentiality:● The main concept of confidentiality is only sender and the intended receiver only send and receive the data. ● Confidentiality gets compromised when unauthorized person any how access the message. ● Example of confidentiality is user A transmit some confidential data to user B but somehow unauthorized user C access that data.so,the confidentiality of message is compromised. This type of attack is called interception. “interception causes loss of message confidentiality” 1.3.3 Integrity:● The content of message is changed after sending the message from sender and before received a message from receiver. ● This is called that the integrity of message is compromised. ● For example when user A sends data to user B and somehow user C tempers with Introduction and Security Threats 4 the data. Before getting message by user B, it is changed without the knowledge of user A. so, the integrity of message is lost. “modification causes loss of message integrity” 1.3.4 Availability:● availability means resources should available to authorized parties at all times. ● Because of the intentional action of unauthorized user C, an authorized A can’t be able to contact a server computer B. because of it authorized user not able to access the resource. “Interruption puts the availability of resources in danger” Figure 1.1 Security Basics 1.4 Types of Attack: Denial of Service Replay attack SQL Injection Distributed DOS Sniffing Spoofing Tcp/Ip Hacking Phishing attacks Backdoors and Trapdoors Man in the middle Malware: Viruses Logic bombs 1.4.1 Types of Attack [4]: Active attack: in active attack after the attack the data may get changed Passive attack: in passive attack after the attack the data doest not get changed Introduction and Security Threats 5 1. Denial of Service: This attack makes an attempt to prevent legitimate user from accessing some service for which they are eligible for. For instance an unauthorized user might send too many login request to server using random user ids, one after another in quick session, so as flood the network and deny other legitimate user from using network services. 2. Reply Attack: A user captures a series of events or some data units and resends it. For instance, suppose user A wants to transfer some amount to user C’s bank account. Both user A and C having bank account with Bank B. User A might send an electronic message to bank B, requesting for fund transfer. User C could capture this message and send a second copy to Bank B. Bank B would have no idea that this is an unauthorized message and would treat this is as a second and different request of fund transfer from user A. Therefore user C would get the benefit of the funds transfer twice once authorized and once though a reply attack. 3. SQL injection: it is a technique where malicious users can inject SQL commands into an SQL statement via web page input. Injected SQL command can alter SQL statement and compromise the security of a web application. 4. Distributed DOS (Denial of service): This attach is an attempt to make a machine or network resource unavailable to its intended users. As clarification, DDOS attacks are sent by two or more persons. DOS send by one person of system. 5. Sniffing: It is passive attack on ongoing conversation. An attacked need to not hijack a conversation but instead can simply observe packets as they pass by. To prevent attacker from sniffing packets we have some ways for protection (i) the data that is travelling can be encoded in some ways (ii) the transmission link itself can be encoded. To read packet, attacker somehow needs to access it. The simplest way to do this is to control a computer via which the traffic goes through. Usually this is a router, Router are highly protected resource. Therefore an attacker might not able to attack it, instead of it attacker might choose less protected computer on same path. Introduction and Security Threats 6 Figure 1.2 Sniffing 5. Spoofing: In this technique an attacker sends packets with false source address. When this happens, the receiver would inadvertently send replies back to this forged address. Figure 1.3 Spoofing ● The attacker can intercept the reply: if the attacker is between the destination and the source, the attacker can see the reply and use that information for hijacking attacks. ● The attacked needs not see the reply: if attacker’s intention was denial of service attack then need not bother about reply ● The attacker does not want reply: the attacker does not want a reply from the destination, as it wants the host with the forged address to receive it and get confused. Introduction and Security Threats 7 6. TCP/IP Hacking: it is a technique that uses spoofed packets to take over a connection between a victim machine and target machine. ● The victim’s connection hangs and the hacker is then able to communicate with the host machine as if the attacker were the victim. ● To launch a TCP/IP hacking attack the hacker must be on the same network as the victim. ● The target and victim machine can be anywhere. 7. Phishing:- phishing has become a big problem in recent times attackers set up fake web sites which look like real web sites. ● The attacker decides to create her own web site, which looks very identical to a real web site. For example the attacker can clone citibanks’s web site which look like a real web site. ● The attacker sends an email to the legitimate customers of the bank. the email itself appears to have come from the bank. this fake email warns the user that something went wrong with computer system so the bank wants to issue new password to all the customers or want to verify existing PIN number. For this reason request user to visit given link. ● When the customer innocently clicks on the URL given in mail. that link drives user towards the attacker site not at the bank’s original site. Now customer input the password and PIN in the database next attacker access that confidential data of user and with the help of that data attacker access the data from the bank and do any transaction. 8. Backdoor and trapdoors:- backdoors were originally nothing more than methods used by software developers to ensure that they could gain access to an application even if something were to happen in the future to prevent normal access methods. ● An example would be a hard coded password that could be used to gain access to the program in the event that administrators forget their own system password . ● he obvious problem with this sort of backdoor is that, since it is hard coded, it cannot be removed should an attacker learn of the backdoor all system running that software would be vualnerable to attack. ● The term backdoor is also, and more commonly used to refer to programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system, even if their initial access method is discovered and blocked. Common backdoors include net bus and back office. Both of these if running on your system, will allow an attacker remote access to your system. Introduction and Security Threats 8 9. Man in the middle:- it is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonated both parties and gains access to information that the two parties were trying send to each other. ● Man in the Middle is a type of eavesdropping attack that occurs when malicious actor inserts himself as a relay/proxy into a communication session between people or systems. Figure 1.4 Man in the middle ● A MITM attack exploits the real time processing of transactions, ● conversations, or transfer of other data. ● A MITM attack an attacker to intercept, send, and receive data never meant to be for them without either outside party knowing until it is too late. 10. Malware: Viruses: Malware short for malicious software is any software is any software used to disrupt computer operation. Gather sensitive information, or gain access to private Computer systems. It can appear in the form of executable code, scripts, active content, and other software. Introduction and Security Threats 9 Figure 1.4 Man in the middle Virus: Virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. Types of viruses: 1. File Infector viruses: File infector viruses infect program files. These viruses normally infect executable code, such as .com and .exe files. 2. Boot sector viruses: Boot sector viruses infect the system area of disk that is the boot record on floppy disks and hard disk. 3. Master boot record viruses: Master boot record viruses are memory resident viruses that infect disks in the same manner as boot sector viruses. 4. Multi-partite viruses: Multi-partite viruses infected both boot records and program files. 5. Macro viruses: These types of viruses infect data files. They are the most common and have cost corporations the most money and time trying to repair. 11. Logic bombs: they are small Programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled. The removal of a file and so on. ● For example, a programmer could establish a logic bomb to delete critical sections of code if she is terminated from the company. ● Logic bombs are most commonly installed by insiders with access to the system. ● A logic bomb is malware that is triggered by a response to an event, such as launching an application or when a specific date/time is reached. ● Attackers can use logic bombs in a variety of ways. References: Introduction and Security Threats 10 1. https://www.reveantivirus.com/in/computer-security-threats 2. https://www.oreilly.com/library/view/comptia-security-all-in-one/978007177147 4/sec1_chap13.html 3. https://www.geeksforgeeks.org/the-cia-triad-in-cryptography/ 4. https://www.javatpoint.com/types-of-cyber-attacks Introduction and Security Threats 11