Computer security
Computer security
Cyber
security, computer
security or IT security is the protection of computer systems from the theft and damage to
their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Cyber
security includes controlling physical access to the hardware, as well as
protecting against harm that may come via network access, data and code
injection. Also, due to malpractice by operators,
whether intentional or
accidental, IT security
is susceptible to being tricked
into deviating from secure procedures through various methods.
The
field is of growing importance due to the increasing reliance on computer
systems and the Internet, wireless networks such as Bluetooth and Wi-Fi,
the growth of "smart" devices,
including smartphones, televisions and tiny devices as part of the
Internet of Things.
Vulnerabilities
and attacks
A
vulnerability is a weakness in design, implementation, operation or internal
control. Most of the vulnerabilities that have been discovered are documented
in the Common
Vulnerabilities and Exposures (CVE) database.
An exploitable
vulnerability is one for which at least one working attack or "exploit"
exists Vulnerabilities are often hunted or exploited with the aid of automated tools or manually using customized
scripts.
To
secure a computer system, it is important to understand the attacks that can be
made against it, and these threats can typically be classified into one of
these categories below:
Backdoor
A backdoor in a
computer system, a cryptosystem or an
algorithm, is any secret method of bypassing normal authentication or security
controls. They may exist for a number of reasons, including by original design
or from poor configuration. They may have been added by an authorized party to
allow some legitimate access, or by an attacker for malicious reasons; but
regardless of the motives for their existence, they create a vulnerability.
Denial-of-service
attack
Denial of service
attacks (DoS) are designed to make a machine or network resource
unavailable to its intended users. Attackers can deny service to individual
victims, such as by deliberately entering a wrong password enough consecutive
times to cause the victims account to be locked, or they may overload the
capabilities of a machine or network and block all users at once. While a
network attack from a single IP address can be blocked by adding a new firewall
rule, many forms of Distributed
denial of service (DDoS) attacks are possible, where the attack
comes from a large number of points – and defending is much more difficult.
Such attacks can originate from the zombie computers of a botnet, but a range of other techniques are
possible including reflection and
amplification attacks, where innocent systems are fooled into
sending traffic to the victim.
Direct-access
attacks
An
unauthorized user gaining physical access to a computer is most likely able to
directly copy data from it. They may also compromise security by making operating system modifications, installing
software worms, keyloggers, covert listening
devices or using wireless mice. Even when the system is protected by standard
security measures, these may be able to be by-passed by booting another
operating system or tool from a CD-ROM or other bootable
media. Disk encryption and
Trusted Platform
Module are designed to prevent these attacks.
Eavesdropping
Eavesdropping is the act of surreptitiously
listening to a private conversation, typically between hosts on a network. For
instance, programs such as Carnivore and NarusInSight have been used by the FBI
and NSA to
eavesdrop on the systems of internet service
providers. Even machines that operate as a closed system (i.e., with
no contact to the outside world) can be eavesdropped upon via monitoring the
faint electro-magnetic
transmissions generated by the hardware; TEMPEST is a specification by the NSA referring
to these attacks.
Spoofing
Main article: Spoofing attack
Spoofing is the act of masquerading as a valid
entity through falsification of data (such as an IP address or username), in order to gain access
to information or resources that one is otherwise unauthorized to obtain. There are several types of spoofing,
including:
- Email spoofing, where an attacker forges the sending (From, or source) address of an email.
- IP address spoofing, where an attacker alters the source IP address in a network packet to hide their identity or impersonate another computing system.
- MAC spoofing, where an attacker modifies the Media Access Control (MAC) address of their network interface to pose as a valid user on a network.
- Biometric spoofing, where an attacker produces a fake biometric sample to pose as another user.
Tampering
Tampering describes a malicious modification of
products. So-called "Evil Maid" attacks
and security services planting of surveillance capability into routers are
examples.
Privilege
escalation
Privilege escalation
describes a situation where an attacker with some level of restricted access is
able to, without authorization, elevate their privileges or access level. For
example, a standard computer user may be able to fool the system into giving
them access to restricted data; or even to "become root" and have full unrestricted
access to a system.
Phishing
Phishing is the attempt to acquire sensitive
information such as usernames, passwords, and credit card details directly from
users. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to
enter details at a fake website whose look and feel are almost identical to the
legitimate one. Preying on a victim's trust, phishing can be classified as a
form of social
engineering.
Clickjacking
Clickjacking, also known as "UI redress
attack" or "User Interface redress attack", is a malicious
technique in which an attacker tricks a user into clicking on a button or link
on another webpage while the user intended to click on the top level page. This
is done using multiple transparent or opaque layers. The attacker is basically
"hijacking" the
clicks meant for the top level page and routing them to some other irrelevant
page, most likely owned by someone else. A similar technique can be used to
hijack keystrokes. Carefully drafting a combination of stylesheets, iframes,
buttons and text boxes, a user can be led into believing that they are typing
the password or other information on some authentic webpage while it is being
channeled into an invisible frame controlled by the attacker.
Social
engineering
Social
engineering aims to convince a user to disclose secrets such as
passwords, card numbers, etc. by, for example, impersonating a bank, a
contractor, or a customer.
A
common scam involves fake CEO emails sent to accounting and finance
departments. In early 2016, the FBI reported that the scam has
cost US businesses more than $2bn in about two years.
In May
2016, the Milwaukee Bucks NBA
team was the victim of this type of cyber scam with a perpetrator impersonating
the team's president Peter
Feigin, resulting in the handover of all the team's employees' 2015 W-2 tax forms.
No comments