Thursday, July 2, 2020

the keys to your kingdom: network security

Information and information systems are critical for day-to-day life of businesses and individuals. So, it follows that security of the hardware (system) and software (information) is also a critical component for day-to-day life. According to Frank Vahid and Susan Lysecky in Computing Technology for All, security is not only a function of the hardware and software, but a human component as well. While it is easiest for someone to target exploits in an OS it is almost as easy to target a user. Human curiosity will always be one of the easiest targets to exploit.


There are numerous ways that a business or individual can be attacked. The method for attack could come as a virus in a download, a spam or phish in an email, or malware, a general term similar to a virus, along side a download. Spam and phishing both normally exploit a user while a virus, malware, don’t need action once they are downloaded. We’ll explore phishing and spam a bit more below. All of these attacks are meant to control either software or hardware with intent to harm. The harm may be monetary, personal defamation, or business reputation. Any attack that is successful will almost always result in some kind of loss to the individual or business.

One particularly annoying and effective attack is a DoS or Denial of Service attack. This type of attack uses either a virus or email spam to attack a specific target. When the attack is ready to commence the virus or malware will send continuous ping requests to the target. The ping requests will overwhelm the target’s ability to accept new, legitimate, requests and return a “busy signal” or a denial or service/timeout. Now, the idea of a ping test is a single ping that returns information about the speed of the computer and network between locations. The continuous ping in a DoS attack is thousands of ping requests per second from a multitude of locations and all of them pinging a single location. If the attack is large enough it can cause a disruption of service across the location of the attack and the surrounding network. It is possible for a ping attack to take down an entire portion of the internet around a specific server.

The CAN-SPAM Act has defined spam as an unsolicited commercial email that the recipient has no affiliation with and was sent without consent of the recipient. Additionally, emails are considered if they were sent in bulk without the recipient’s consent. While not all bulk emails are considered spam, a vast majority is just that. Research from the Journal of Cyber Criminology indicates that 90% of the emails sent are possibly spam, depending on the definition adopted for spam. Email spam is primarily used for revenue generation or promoting products, however, there are also used for stealing information and phishing (hang in there we will get to it). When a spam attack is used properly it can infect an entire organizations network. With control of the organizations network and email it can launch attacks such as DoS attacks without disclosing the identity of the hacker inciting the attack.

Phishing according to Taking the Bait combines social engineering and complex attack vectors to create an illusion or deception in the eyes of the email recipient that the legitimacy of what is being offered or asked is not only truthful, but persuasive enough to prompt an action by the recipient in some form (Lacey et al.). Particularly phishing involves getting the recipient to open an email and/or click to another site and enter their personal information. Once they have either opened the message or entered their information the attacker has what they needed, access. If the email message is opened within a business network the phishing hacker can install ransomware or another type of virus to seize control and demand a monetary compensation for releasing the businesses information. To an individual the phishing scam may involve a person believing they are about to visit a trusted site and enter their personal information. If this a bank account, the thief now has your keys to the kingdom.


To protect against both of these types of attacks there are two primary defenses. The first of these is education. In instances of spam and phishing the attacker must gain access through a user accepting or opening the email sent in hostility. Educating the recipients on what warning signs exist and what to do with the attacker email is the best line of defense we have. Secondly, there are numerous security programs out there, like SolarWinds MSP, Spam Titan, and Mailwasher, that are used to filter emails, search for specific verbiage, and compare recipients on the users white/blacklists. While these types of security software are robust and can be very helpful they are not perfect. Because these types of software are available to the hacker just as readily as the user it is very difficult for the manufacturer to stay ahead. So, it is ultimately the end user’s responsibility to keep him/herself safe from attacks. Education is the best line of defense.

 


 

                                                                   References

 

Lacey, David, et al. “Taking the Bait: A Systems Analysis of Phishing Attacks.” Procedia Manufacturing, vol. 3, 2015, pp. 1109–1116, 10.1016/j.promfg.2015.07.185. Accessed 26 June 2019.

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Yu, S. (2011). a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License 715 Email spam and the CAN-SPAM Act: A qualitative analysis. International Journal of Cyber Criminology5(1), 715–735. https://www.cybercrimejournal.com/Yu2011ijcc.pdf

 

 

 


No comments:

Post a Comment

Well, dreams, they feel real while we're in them right?

  Since we are both relatively new to the concepts of programming computers lets be basic. I am not going to assume that you have advanced k...