Thursday, 4 December 2014


Annualized Loss Expectancy: The Annualized Loss Expectancy (ALE) is the expected monetary loss that can be expected for an asset due to a risk over a one year period. It is defined as:
ALE = SLE * ARO
where SLE is the Single Loss Expectancy and ARO is the Annualized Rate of Occurrence.
An important feature of the Annualized Loss Expectancy is that it can be used directly in a cost-benefit analysis. If a threat or risk has an ALE of $5,000, then it may not be worth spending $10,000 per year on a security measure which will eliminate it.
One thing to remember when using the ALE value is that, when the Annualized Rate of Occurrence is of the order of one loss per year, there can be considerable variance in the actual loss. For example, suppose the ARO is 0.5 and the SLE is $10,000. The Annualized Loss Expectancy is then $5,000, a figure we may be comfortable with. Using the Poisson Distribution we can calculate the probability of a specific number of losses occurring in a given year:


Number of Losses in Year Probability Annual Loss
0 0.6065 $0
1 0.3033 $10,000
2 0.0758 $20,000
3 0.0144 ≥$30,000
We can see from this table that the probability of a loss of $20,000 is 0.0758, and that the probability of losses being $30,000 or more is approximately 0.0144. Depending upon our tolerance to risk and our organization's ability to withstand higher value losses, we may consider that a security measure which costs $10,000 per year to implement is worthwhile, even though it is more than the expected losses due to the threat.
TERMS AND DEFINITIONS
To discuss the history and evolution of information risk analysis and assessment, several terms whose meanings are central to this discussion should first be defined.
Annualized loss expectancy (ALE) — This discrete value is derived, classically, from the following algorithm (see also the definitions for single loss expectancy [SLE] and annualized rate of occurrence [ARO] below):


SLE * ARO = ALE


To effectively identify risk and to plan budgets for information risk management and related risk reduction activity, it is helpful to express loss expectancy in annualized terms. For example, the preceding algorithm will show that the ALE for a threat (with an SLE of $1,000,000) that is expected to occur only about once in 10,000 years is $1,000,000 divided by 10,000, or only $100.00. When the expected threat frequency (ARO) is factored into the equation, the significance of this risk factor is addressed and integrated into the information risk management process. Thus, risk is more accurately portrayed, and the basis for meaningful cost/benefit analysis of risk reduction measures is established.
Annualized rate of occurrence (ARO) — This term characterizes, on an annualized basis, the frequency with which a threat is expected to occur. For example, a threat occurring once in 10 years has an ARO of 1/10 or 0.1; a threat occurring 50 times in a given year has an ARO of 50.0. The possible range of frequency values is from 0.0 (the threat is not expected to occur) to some whole number whose magnitude depends on the type and population of threat sources. For example, the upper value could exceed 100,000 events per year for minor, frequently experienced threats such as misuse-of-resources. For an example of how quickly the number of threat events can mount, imagine a small organization — about 100 staff members — having logical access to an information processing system. If each of those 100 persons misused the system only once a month, misuse events would be occurring at the rate of 1,200 events per year. It is useful to note here that many confuse ARO or frequency with the term and concept of probability (defined below). While the statistical and mathematical significance of these metrics tend to converge at about 1/100 and become essentially indistinguishable below that level of frequency or probability, they become increasingly divergent above 1/100 to the point where probability stops — at 1.0 or certainty — and frequency continues to mount undeterred, by definition.
Exposure factor (EF) — This factor represents a measure of the magnitude of loss or impact on the value of an asset. It is expressed as a percent, ranging from 0% to 100%, of asset value loss arising from a threat event. This factor is used in the calculation of single loss expectancy (SLE).
E-mail spoofing: E-mail spoofing is a term used to describe (usually fraudulent) e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the address indicated in the From field (found in the e-mail headers), it actually comes from another source.
Occasionally (especially if the spam requires a reply from the recipient, such as the '419' scams), the source of the spam e-mail is indicated in the Reply-To field (or at least a way of identifying the spammer); if this is the case and the initial e-mail is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a Trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party.
Prior to the advent of unsolicited commercial email as a viable business model, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of these "legitimate" uses fell victim to anti-spam techniques.
Methods
Because many spammers now use special software to create random sender addresses, even if the user finds the origin of the e-mail it is unlikely that the e-mail address will be active.
The technique is now used ubiquitously by mass-mailing worms as a means of concealing the origin of the propagation. On infection, worms such as ILOVEYOU, Klez and Sober will often try to perform searches for e-mail addresses within the address book of a mail client, and use those addresses in the From field of e-mails that they send, so that these e-mails appear to have been sent by the third party. For example:
User1 is sent an infected e-mail and then the e-mail is opened, triggering propagation
The worm finds the addresses of User2 and User3 within the address book of User1
From the computer of User1, the worm sends an infected e-mail to User2, but the e-mail appears to have been sent from User3
This can be particularly problematic in a corporate setting, where e-mail is sent to organizations with content filtering gateways in place. These gateways are often configured with default rules that send reply notices for messages that get blocked, so the example is often followed by:
User2 doesn't receive the message, but instead gets a message telling him that a virus sent to them has been blocked. User3 receives a message telling him that a virus sent by them has been blocked. This creates confusion for both User2 and User3, while User1 remains unaware of the actual infection.
Newer variants of these worms have built on this technique by randomizing all or part of the e-mail address. A worm can employ various methods to achieve this, including:
Random letter generation
Built-in wordlists
Amalgamating addresses found in address books, for example:
o User1 triggers an e-mail address spoofing worm, and the worm finds the addresses user2@efgh.com, user3@ijkl.com and user4@mnop.com within the users e-mail address book
o The worm sends an infected message to user2@efgh.com, but the e-mail appears to have been sent from user3@mnop.com
Spoofed/Forged Email
I. Description
Email spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).
Examples of spoofed email that could affect the security of your site include:
email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this
email claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information
Prevention (Deterrence)
o Use cryptographic signatures (e.g., PGP "Pretty Good Privacy" or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit. Similarly, sites may wish to consider enabling SSL/TLS in their mail transfer software. Using certificates in this manner increases the amount of authentication performed when sending mail.
o Configure your mail delivery daemon to prevent someone from directly connecting to your SMTP port to send spoofed email to other sites.
o Ensure that your mail delivery daemon allows logging and is configured to provide sufficient logging to assist you in tracking the origin of spoofed email.
o Consider a single point of entry for email to your site. You can implement this by configuring your firewall so that SMTP connections from outside your firewall must go through a central mail hub. This will provide you with centralized logging, which may assist in detecting the origin of mail spoofing attempts to your site.
o Educate your users about your site's policies and procedures in order to prevent them from being "social engineered," or tricked, into disclosing sensitive information (such as passwords). Have your users report any such activities to the appropriate system administrator(s) as soon as possible. See also CERT advisory CA-1991-04, available from
Q. "I found out from returned "undelivered" email that those address does not exist in my lists--in the first place, I have never sent them".
A. Many affected owners of email domain being spoofed are complaining of having their account being suspended for spamming and receiving "tons" of harassing hate mails marked as coming from them--which they have never sent and only found-out when they start receiving angry replies or returned undelivered bounce email.
The victims of these new form of harassment in which fake or boogie messages was sent-out posing as the original owner of the email address by spoofing, are usually done by dissatisfied or fired employees, competitors, pranksters, junk mailers, provocateurs or spammers trying to sell something--not that they want you to respond to the email but to click on a link in the message.
According to the FBI, spoofing is generally not illegal because no hacking is required, unless it involves a direct threat of violence or death and by using such tactic, knows as email spoofing--they exploit the simplicity of Internet SMTP (simple mail transport protocol RFC 821).
Email can be spoofed by tweaking the settings on standard email client like; Eudora, Outlook Express, etc.
There are also many website that offers an automated process for creating and sending spoofed email by inserting someone else email address into the Mail FROM: or REPLY TO: fields--which also contains information about the "origin" of the message--but most people don't know how to decipher it or simply assume that the spoofed message is genuine.
Spoofing is usually to obtain info, sell something, computer infected by spam zombie, spambot or simply hate mail by assuming another's ID and making the recipient think that the email is from the sender...
a) Pretending to be a legitimate bank, etc., to get your ID.
b) A link in the message body taking you to a sales site
c) Attachments with virus or hate message
d) Selling something by using an infected computer to send-out sales pitch (unknown to the owner of the machine) and at the same time "spoofing" the spam using the computer owner address book email list.
Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it, examining such solutions as the Sender Policy Framework (SPF) and Microsoft’s Sender ID, which is based on it.


**********************


1. What is a Dictionary Attack?
A dictionary attack consists of trying "every word in the dictionary" as a possible password for an encrypted message.
What is a Chosen Plaintext Attack?
A chosen plaintext attack is an attack where the cryptanalyst is able to define his own plaintext, feed it into the cipher, and analyze the resulting ciphertext.
Mounting a chosen plaintext attack requires the cryptanalyst to be able to send data of his choice into the device which is doing the encryption, and it requires the cryptanalyst to be able to view the output from the device. Because of these requirements, a chosen plaintext attack is in some cases impossible to attempt
2. What is a Brute Force Attack?
A brute force attack consists of trying every possible code, combination, or password until you find the right one
What is a Message Digest?
A message digest is a number which is created algorithmically from a file and represents that file uniquely. If the file changes, the message digest will change.
In addition to allowing us to determine if a file has changed, message digests can also help to identify duplicate files.
3. What are Digital Certificates?
Digital certificates are the equivalent of a driver's license, a marriage license, or any other form of identity. The only difference is that a digital certificate is used in conjunction with a public key encryption system. Digital certificates are electronic files that simply work as an online passport. Digital certificates are issued by a third party known as a Certification Authority such as VeriSign or Thawte. These third party certificate authorities have the responsibility to confirm the identity of the certificate holder as well as provide assurance to the website visitors that the website is one that is trustworthy and capable of serving them in a trustworthy manner.
Digital certificates have two basic functions. The first is to certify that the people, the website, and the network resources such as servers and routers are reliable sources, in other words, who or what they claim to be. The second function is to provide protection for the data exchanged from the visitor and the website from tampering or even theft, such as credit card information.
A digital certificate contains the name of the organization or individual, the business address, digital signature, public key, serial number, and expiration date. When you are online and your web browser attempts to secure a connection, the digital certificate issued for that website is checked by the web browser to be sure that all is well and that you can browse securely. The web browser basically has a built in list of all the main certification authorities and their public keys and uses that information to decrypt the digital signature. This allows the browser to quickly check for problems, abnormalities, and if everything checks out the secure connection is enabled. When the browser finds an expired certificate or mismatched information, a dialog box will pop up with an alert.
4. What is a Digital Signature?
A digital signature is a message digest used to cryptographically sign a message.
Digital signatures rely on asymmetric or public key, cryptography.
To create a digital signature, you sign the message with your private key. The digital signature then becomes part of the message.
This has two effects:
Any changes to the message can be detected, due to the message digest algorithm.
You cannot deny signing the message, because it was signed with your private key.
These two features, message integrity and non-repudiation, make digital signatures a very useful component for e-commerce applications
5. What is a One-Time Pad?
A one-time pad is the only theoretically unbreakable cipher. A one-time pad is a private key, or symmetric, cipher where the key size is equal to the plaintext size. Because of this, the key is never reutilized. As the key is never reutilized, there is no basis for mathematical cryptanalysis.
An example of a very poor one-time pad would be if you were to encrypt a letter to a friend using a substitution cipher and using Hemingway's A Farewell to Arms as a key. Your friend could decrypt your letter using an identical copy of A Farewell to Arms. No one else would be able to decrypt your message, unless they had a copy of the book you were using as a key.
This is actually a very poor one-time pad because books do not have random text. A message encrypted using a book as a one-time pad would actually not be difficult to cryptanalyst.
For a one-time pad to be truly unbreakable, the key must be generated with effective randomness.
One-time pad ciphers are sometimes called Vernam ciphers
6. What is Steganography?
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files.
It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file
7. What is SHA-1?
SHA stands for Secure Hash Algorithm. It consists of five hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The five algorithms are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. SHA-1 is the most commonly used of the SHA series.
Hash algorithms are called secure when
1. It is impossible to find a message that corresponds to a given message digest.
2. It is impossible to find two different messages that produce the same message digest.
3. If a message is changed even by a single character, the result will be a completely different message digest.
SHA-1 has these properties and is therefore referred to as secure. It is designed to work with the Digital Signature Algorithm (DSA). SHA-1 is a one-way hash function. One-way functions are characterized by two properties. The first is that they are one-way. This means that you can take a message and compute a hash value, but you cannot take a hash value and recreate the original message. It is also collision-free and, thus, no two messages can hash to the same value.
SHA-1 produces a 160-bit message digest with a maximum length of 264 ?1. The message M to be hashed must have a length of l bit, where 0 l 264. The message digest is the fixed-length output of a message. The message digest is then input to the DSA, which will then generate the signature for the message. Signing the message digest instead of the message offers improved performance because the message digest will be much smaller than the message. The recipient of the message will then use the same hash algorithm to verify the signature. Any change that occurs during transit will result in a different message digest and, thus, the signature will not verify. Once it is verified as true, the recipient is able to unlock the message. This method prevents unauthorized users from viewing messages that are not intended for them.
When computing a message digest, SHA-1 processes blocks of 512 bits. The total length of the message digest will be a multiple of 512. This process is known as padding of the message.
SHA-1 differs from SHA-0 only by a single bitwise rotation in the message schedule of its compression function.
Cryptanalysis is the method of obtaining encrypted information without using the hash value. Breaking a hash function implies showing that the one-way property does not hold for it. Cryptographers have demonstrated that it just might be possible for the SHA-1 hash algorithm to be broken. Some have presented a collision for 58-round SHA-1, found with 233 hash operations. A brute force search would require 280 operations. However, experts argue that this might not happen for some time. Nevertheless, attacks always get better, and the National Institute of Standards and Technology (NIST) already has standards for longer - and harder-to-break - hash functions: SHA-224, SHA-256, SHA-384, and SHA-512.
Applications of SHA-1
SHA-1 can be used in a variety of applications:
1. Security applications that require authentication
2. E-mail
3. Electronic funds transfer
4. Software distribution
5. Data storage
Smurf attack: The Smurf attack is a way of generating significant computer network traffic on a victim network. This is a type of denial-of-service attack that floods a target system via spoofed broadcast ping messages.
In such an attack, a perpetrator sends a large amount of ICMP echo request (ping) traffic to IP broadcast addresses, all of which have a spoofed source IP address of the intended victim. If the routing device delivering traffic to those broadcast addresses delivers the IP broadcast to all hosts (for example via a layer 2 broadcast), most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, hundreds of machines might reply to each packet.
In the late 1990s, many IP networks would participate in Smurf attacks (that is, they would respond to pings to broadcast addresses). Today, thanks largely to the ease with which administrators can make a network immune to this abuse, very few networks remain vulnerable to Smurf attacks
The fix is two-fold:
Configure individual hosts and routers not to respond to ping requests or broadcasts.
Configure routers not to forward packets directed to broadcast addresses. Until 1999, standards required routers to forward such packets by default, but in that year, the standard was changed to require the default to be not to forward.


SNOOPING: Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail that appears on another's computer screen or watching what someone else is typing. More sophisticated snooping uses software programs to remotely monitor activity on a computer or network device.
Malicious hackers (crackers) frequently use snooping techniques and equipment such as key-loggers to monitor keystrokes, capture passwords and login information, and to intercept e-mail and other private communications and data transmissions. Corporations sometimes snoop on employees legitimately to monitor their use of business computers and track Internet usage; governments may snoop on individuals to collect information and avert crime and terrorism.
Although snooping has a negative connotation in general, in computer technology snooping can refer to any program or utility that performs a monitoring function. For example, a snoop server is used to capture network traffic for analysis, and the snooping protocol monitors information on a computer bus to ensure efficient processing.
What is Active Directory?
An active directory is a directory structure used on Microsoft Windows based computers and servers to store information and data about networks and domains. It is primarily used for online information and was originally created in 1996 and first used with Windows 2000.
An active directory (sometimes referred to as an AD) does a variety of functions including the ability to provide information on objects, helps organize these objects for easy retrieval and access, allows access by end users and administrators and allows the administrator to set security up for the directory.
An active directory can be defined as a hierarchical structure and this structure is usually broken up into three main categories, the resources which might include hardware such as printers, services for end users such as web email servers and objects which are the main functions of the domain and network.
It is interesting to note the framework for the objects. Remember that an object can be a piece of hardware such as a printer, end user or security settings set by the administrator. These objects can hold other objects within their file structure. All objects have an ID, usually an object name (folder name). In addition to these objects being able to hold other objects, every object has its own attributes which allows it to be characterized by the information which it contains. Most IT professionals call these setting or characterizations schemas.
Depending on the type of schema created for a folder, will ultimately determine how these objects are used. For instance, some objects with certain schemas cannot be deleted, they can only be deactivated. Others types of schemas with certain attributes can be deleted entirely. For instance, a user object can be deleted, but the administrator object cannot be deleted.
When understanding active directories, it is important to know the framework that objects can be viewed at. In fact, an active directory can be viewed at either one of three levels; these levels are called forests, trees or domains. The highest structure is called the forest because you can see all objects included within the active directory.
Within the Forest structure are trees, these structures usually hold one or more domains, going further down the structure of an active directory are single domains. To put the forest, trees and domains into perspective, consider the following example.
A large organization has many dozens of users and processes. The forest might be the entire network of end users and specific computers at a set location. Within this forest directory are now trees that hold information on specific objects such as domain controllers, program data, system, etc. Within these objects are even more objects which can then be controlled and categorized.
How are Active Directories used?
If you are a computer administrator for a large corporation or organization, you can easily update all end users computers with new software, patches, files, etc simply by updating one object in a forest or tree.
Because each object fits into a set schema and has specific attributes, a network administrator can easily clear a person on a set tree or instantly give access to some users for certain applications or deny access to certain users for others. The Microsoft servers use trust to determine whether or not access should be allowed. Two types of trust that Microsoft active directories incorporate are transitive trusts and one way non transitive trusts. A transitive trust is when there is a trust that goes further than two domains in a set tree, meaning two entities are able to access each other’s domains and trees.
A one way transitive trust is when a user is allowed accessed to another tree or domain, however, the other domain does not allow access to the other domains. This can be summed up as a network administrator and end user. The network administrator can access most trees in the forest including a specific end user's domain. However the end user, while able to access his or her own domain, cannot access other trees.
It is important to note that active directories are a great way to organize a large organization or corporation's computers data and network. Without an active directory, most end users would have computers that would need to be updated individually and would not have access to a larger network where data can be processed and reports can be created. While active directories can be extremely technical and require lots of expertise to navigate, they are essential to storing information and data on networks.


What is an Intrusion Detection System (IDS)?
An Intrusion Detection System (IDS) is a system for detecting misuse of network or computer resources.
An IDS will have a number of sensors it utilizes to detect intrusions. Example sensors may be:
A sensor to monitor TCP connection requests.
Log file monitors.
File integrity checkers.
The IDS system is responsible for collecting data from its sensors and analyzing this data to give the security administrator notice of malicious activity on the network.
IDS technologies are commonly divided into NIDS (Network Intrusion Detection Systems) and HIDS (Host Intrusion Detection Systems).
Newer NIDS also attempt to act as NIPS (Network Intrusion Prevention Systems).
Snort is an excellent open source Network Intrusion Detection System.
What is a Packet Sniffer?
Packet Sniffing
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password."
To do packet sniffing, you will have to obtain or code a packet sniffer that is capable of working with the type of network interface supported by your operating system:
Network interfaces include:
LLI
NIT (Network Interface Tap)
Ultrix Packet Filter
DLPI (Data Link Provider Interface)
BPF (Berkeley Packet Filter)
LLI was a network interface used by SCO, which has been augmented with DLPI support as of SCO OpenServer Release V.
NIT was a network interface used by Sun, but has been replaced in later releases of SunOS/Solaris with DLPI.
Ultrix supported the Ultrix Packet Filter before Digital implemented support for BPF
What is TLS (Transport Layer Security)?
TLS (Transport Layer Security), defined in RFC 2246, is a protocol for establishing a secure connection between a client and a server. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two.
The TLS (Transport Layer Security) protocol is extensible, meaning that new algorithms can be added for any of these purposes, as long as both the server and the client are aware of the new algorithms.
SSL vs. TLS
TLS (Transport Layer Security) is a replacement for Netscape's earlier SSL (Secure Sockets Layer) protocol.
TLS Usage
Many protocols use TLS (Transport Layer Security) to establish secure connections, including HTTP, IMAP, POP3, and SMTP
What is a Denial of Service (DoS) attack?
A Denial of Service (DoS) attack is an attack which attempts to prevent the victim from being able to use all or part of their network connection.
A denial of service attack may target a user, to prevent them from making outgoing connections on the network. A denial of service may also target an entire organization, to either prevent outgoing traffic or to prevent incoming traffic to certain network services , such as the organizations web page.
Denial of service attacks are much easier to accomplish than remotely gaining administrative access to a target system. Because of this, denial of service attacks have become very common on the Internet.
Types of Denial of Service (DoS) attacks
These are a few of the classic denial of service attacks. Most of these rely upon weaknesses in the TCP/IP protocol. Vendor patches and proper network configuration have made most of these denial of service attacks difficult or impossible to accomplish.
Flood Attack
The earliest form of denial of service attack was the flood attack. The attacker simply sends more traffic than the victim could handle. This requires the attacker to have a faster network connection than the victim. This is the lowest-tech of the denial of service attacks, and also the most difficult to completely prevent.
Ping of Death Attack
The Ping of Death attack relied on a bug in the Berkeley TCP/IP stack which also existed on most systems which copied the Berkeley network code. The ping of death was simply sending ping packets larger than 65,535 bytes to the victim. This denial of service attack was as simple as:
ping -l 86600 victim.org
SYN Attack
In the TCP protocol, handshaking of network connections is done with SYN and ACK messages. The system that wishes to communicate sends a SYN message to the target system. The target system then responds with an ACK message. In a SYN attack, the attacker floods the target with SYN messages spoofed to appear to be from unreachable Internet addresses. This fills up the buffer space for SYN messages on the target machine, preventing other systems on the network from communicating with the target machine.
Teardrop Attack
The Teardrop Attack uses IP's packet fragmentation algorithm to send corrupted packets to the victim machine. This confuses the victim machine and may hang it.
Smurf Attack
In the Smurf Attack, the attacker sends a ping request to a broadcast address at a third-party on the network. This ping request is spoofed to appear to come from the victims network address. Every system within the broadcast domain of the third-party will then send ping responses to the victim.
Distributed Denial of Service (DDoS) attacks
A Distributed Denial of Service (DDoS) attack is a denial of service attack which is mounted from a large number of locations across the network.
DDoS attacks are usually mounted from a large number of compromised systems. These systems may have been compromised by a trojan horse or a worm, or they might have been compromised by being hacked manually.
These compromised systems are usually controlled with a fairly sophisticated piece of client-server software such as Trinoo, Tribe Flood Network, Stacheldraht, TFN2K, Shaft, and Mstream.
The Mydoom worm attempted DDoS attacks against SCO and Microsoft from the systems which it infected.
DDoS attacks can be very difficult to defend against
What is IP Address Spoofing?
IP address spoofing denotes the action of generating IP packets with fake source IP addresses in order to impersonate other systems or to protect the identity of the sender. Spoofing can also refer to forging or using fake headers on emails or netnews to - again - protect the identity of the sender and to mislead the receiver or the network as to the origin and validity of sent data.
Basics of IP Address Spoofing
The Internet Protocol or IP is the fundamental protocol for sending/receiving data over computer networks and the Internet. With the Internet protocol, each packet sent or received contains information relevant to the operation such as the source and the destination of the packet. With IP address spoofing, the information placed on the source field is not the actual source of the packet. By using a different address in the source field of the packet, the actual sender can make it look like the packet was sent by another computer and thus the response of the target computer will be sent to the fake address specified in the packet - unless the attacker wants to redirect the response to his own computer.
Effects of IP Address Spoofing
IP address spoofing is very useful especially in the case of denial of service (DoS) attacks where large amounts of information are sent to a target computer or system without the perpetrators caring about the response of the target systems. This type of attack is especially effective since the attack packets seem to be coming from different sources and thus the perpetrators are hard to trace.
Hackers using IP address spoofing frequently make use of randomly chosen IP addresses from the entire spectrum of IP address space while some more advanced hackers only use the unregistered portions of the IP address range. IP address spoofing, however, is less effective than using botnets for DoS attacks because it can be monitored by Internet authorities using backscatter technique which can determine a DoS attack based on the number of invalid IP addresses used in the attack. Nevertheless, it remains a viable alternative for hackers.
IP address spoofing is also a very useful tool in infiltrating networks and overcoming network security measures. This happens when IP address spoofers use a trusted IP address within the network and thus circumvent the need to provide a username or password to log in to the system. This sort of attack generally is based on a specific set of host controls (such as rhosts) that are configured insecurely.
IP Address Spoofing Defense
Ingress filtering or packet filtering the incoming traffic from outside the system using a technology is an effective way of defending against IP address spoofing since this technique can determine if packets are coming from inside or outside the system. Consequently, egress filtering can also block spoofed IP address packets from exiting the system and launching an attack on other networks.
Upper layer protocols such as the TCP or Transmission Control Protocol in which a sequence of numbers is used to established a secure connection with other systems is also an effective way of defending against IP address spoofing.
Turning off source routing (loose and strict) on your network routers can also assist in preventing hackers from taking advantage of many spoofing features. Source routing was a technology used widely in the past to prevent a single network fault from causing a major network outage, but the current routing protocols on the Internet today makes it all but unnecessary
What are the main Online Security Threats?
Just about anyone that gets online is at risk. Online security threats are one of the biggest challenges on the Internet today. The problem is that the people that want to attack your computer and the computers of the people that you know don't create difficult methods to create problems; instead they focus on common failures that will give them access. When those that get on the Internet know how these attacks take place, these attacks can be lessened and even prevented in most cases.
The best thing you can do if you get on the Internet at all is to use security software and hardware such as firewalls and authentication servers, as this is the most effective way to protect your computer and your personal information. The problem is that every day there are new viruses and security threats that are launched all over the Internet, which means you need programs that can be updated continuously and don't just target one specific type of problem. It's best if you choose hardware and software that will update itself each time you are on the Internet, without you having to remember. It's also very important that you choose your passwords carefully, so that those that might want access to your information won't be able to guess as to what password you might use.
Some of the main online security threats are:
Web servers and services
Many default HTTP web servers expose visitors every time they log on to these websites. You should be sure that you have the patches available that have been released over the last few years and that your computer isn't utilizing a default configuration.
Password Protection
Passwords are undeniably a huge part of your online security. You'll find that almost every website that you visit that deals with online transactions, emailing, and shopping use passwords to verify you are who you say you are. This means that you not only need to choose a password that cannot easily be figured out, but you should also keep it safe and secure and not share it with anyone. Do not use the same password for all of your accounts and attempt to come up with a password that contains letters, numbers, and special characters.
Windows remote access services
Most systems provide methods for remote access, which can be great when you need to access your information from other places, but it means that other people with the right tools might be able to access your information as well. If you use remote access services you should be sure that you are using a good firewall protection service as well as other security software that will help you to prevent unauthorized access by anyone but you and those that you authorize.
File sharing applications
File sharing programs are used by most computer users to share files. Peer to peer file sharing is an easy way to share files between computer users, as it uses a network to link the computers to one another so the information can be shared. The problem is that this allows hackers easy access to search and even download files from any computer on the network. Most experts warn that it simply is not a good idea to use peer-to-peer programs to share files.


Instant messaging
Instant messaging is a common enough means of communication, but it is often used by hackers to attack one's system. Configuring your instant messaging services properly so that you have complete control over any file transfer that can take place through instant messaging can easily prevent this.
Mail client
Many hackers use email as a means to spread devastating viruses and worms by including them as attachments in emails. This can be prevented or limited by configuring your mail server properly so that you can block suspicious attachments or files.
LSAS exposures
Windows local security authority subsystem is a place of vulnerability for most victims. This system has a major buffer overflow that most hackers know how to exploit to take over control of your computer. Proper configuration and use of security patches can help one avoid this safety threat.
Spyware Attacks
Spyware attacks are something that we are probably all familiar with, as they are the most common online security threat faced by Internet users. Spyware is simply a computer program that is designed to steal information from your computer without your knowledge. The software will typically be installed on your computer without you even knowing it, and then it will send your personal information such as documents, passwords, credit card numbers, bank accounts, and many others to another source. Common spyware includes Trojan horses, key loggers, dialers, and adware programs.
Trusted anti spyware programs that are available will help protect your computer from spyware. Do not simply download software that you have never heard of, instead stick with the names that you know. You should also take care to scan all files before they are downloaded.
Online threats are very real, but if you know how you become vulnerable, you'll be able to better protect yourself. You should be able to get online without constantly worrying, and you can
What is Access Control?
Access control is a term taken from the linguistic world of security. In general, it means the execution of limitations and constrictions on whoever tries to occupy a certain protected property. Guarding an entrance of a person is also a practice of access control. There are many types of access control. Some of them are mentioned in this article. You, the reader of this article, will have several types of access control around you.
Access Control for Computers (Anti-Virus etc)
Nowadays, almost every computer user has a firewall or antivirus running on his computer, a popup blocker and many other programs. All of these are with access control functions. All of these programs guard us from intruders of sorts. They inspect everything trying to enter the computer and let it in or leave it out. Computers have complicated access control abilities. They ask for authentication and search for the digital signatures.

No comments:

Post a Comment