Computer Security Introduction
In this article we will talk about computer security.If you want to make your system secure and wants to know about different types of attack and wants to prevent yourself from attacker then this article gonna help you alot.
1. Computer security is the protection of information systems from theft or damage to
the hardware, software and to the information on them.
2. It includes controlling physical access to the hardware, as well as protecting against
harm that may come via network access, data and code injection, and due to
malpractice by operators.
We can design the policies for information security within an organization by providing :
Confidentiality : Only authorized users can access the data resources and
information
Integrity : Only authorized users should be able to modify the datawhen needed.
Availability : Data should be available to users when needed.
Authentication : Communicating with the authorized
Advantages of computer security :
1. Protects system against viruses, worms, spyware and other unwanted programs.
2. Protection against data from theft.
3. Protects the computer from being hacked.
4. Minimizes computer freezing and crashes.
5. Gives privacy to users
Disadvantages of computer security :
1. Firewalls can be difficult to configure correctly.
2. Makes the system slower.
3. Need to keep updating the new software in order to keep security up todate.
4. Could be costly for average user
Components of the computer system needs to be protected:
The components of a computer system that needs to be protected are :
1. Hardware : The physical part of the computer, like the system memory and disk
drive.
2. Firmware : Permanent software that is etched into a hardware device’s non-volatile
memory and is mostly invisible to the user.
3. Software : The programming that offers services, like operating system, word
processor, internet browser to the user
To protect the system, security measures can be taken at the following levels
1. Physical :
a. The sites containing computer systems must be physically secured against armed
and malicious intruders.
b. The workstations must be carefully protected.
2. Human :
a. Only appropriate users must have the authorization to access the system.
b. Phishing (collecting confidential information) and dumpster diving (collecting
basic information so as to gain unauthorized access) must be avoided.
3. Operating system :
The system must protect itself from accidental or purposeful
security breaches.
4. Networking system :
a. Almost all of the information is shared between different systemsvia a network.
b. Intercepting these data could be just as harmful as breaking into acomputer.
c. Henceforth, Network should be properly secured against suchattacks
Five steps to protect computer system hardware are :
1. Install firewall :
a. A firewall enacts the role of a security guard.
b. A firewall is the first step to provide security to the computer. It creates a barrier
between the computer and any unauthorized program trying to come in through
the Internet.
2. Install antivirus software :
a. Antivirus is a software that helps to protect the computer from anyunauthorized
code or software that creates a threat to the system.
b. Unauthorized software includes viruses, keyloggers, Trojans etc.
c. This might slow down the processing speed of our computer, delete important files
and access personal information.
3. Install anti-spyware software :
a. Spyware is a software program that collects personal informationor information
about an organization without their approval.
b. This information is redirected to a third party website.
c. Anti-Spyware software is solely dedicated to combat spyware.
d. Anti-spyware software offers real time protection.
e. It scans all the incoming information and helps in blocking the threat once
detected.
4. Use complex and secure passwords :
a. For maintaining system security we have to use strong and complexpasswords.
b. Complex passwords are difficult for the hackers to find.
5. Check on the security settings of the browser :
a. Browsers have various security and privacy settings that we shouldreview and set
to the level we desire.
Recent browsers give us ability to tell websites to not track ourmovements, increasing
our privacy and security
Goals of computer security system:
Computer security has three main goals :
1. Confidentiality : Making sure people cannot acquire information they should not
(keeping secrets).
2. Integrity : Making sure people cannot change information they should not
(protecting data).
3. Availability : Making sure people cannot stop the computer from doingits job.
Problems related with computer security or Various sample attacks in computer
security:
1. Phishing :
Phishing is an attempt to obtain users sensitive information, including
credit card details and banking information, by disguising as a trustworthy entity in
an online communication (e-mail, social media, etc).
2. Vishing :
Vishing (voice phishing) is an attempt of fraudsters to persuade the victim
to deliver personal information or transfer money over the phone.
3. Smishing :
Smishing (SMS phishing) is any case where sent text messages attempt
to make potential victims pay money or click on suspicious links.
4. Pharming :
a. Pharming is a cyber attack meant to redirect a website’s traffic toanother, fake
one.
b. Pharming can be done either by changing the hosts file on a victim’smachine or
by exploiting a flaw in DNS server software.
c. In pharming, no conscious user interaction is required.
5. Vulnerability :
a. Vulnerability is a software mistake that enables a bad actor toattack a system
or network by directly accessing it.
b. Vulnerabilities can permit an attacker to act as a super-user oreven a system
admin and granting them full access privileges.
6. Malware :
a. Malware is used to describe malicious software, including spyware,ransomware,
viruses and worms.
b. Malware breaches a network through vulnerability typically whena user clicks a
dangerous link or email attachment that then installsrisky software.
7. Macro viruses :
These viruses infect applications such as Microsoft Word or Excel.
a. Macro viruses attach to an application’s initialization sequence.
b. When the application is opened, then virus executes instructions before
transferring control to the application.
c. The virusreplicates itself and attachesto other code in the computer system.
8. File infectors :
a. File infector viruses usually attach themselves to executable code, such as .exe
files.
b. The virus is installed when the code is loaded.
9. System or boot-record infectors :
a. A boot-record virus attaches to the master boot record on hard disks.
b. When the system is started, it will look at the boot sector and load the virus into
memory, where it can propagate to other disks and computers.
10. Stealth viruses :
a. Stealth viruses take over system functions to conceal themselves.
b. They do this by compromising malware detection software so that the software
will report an infected area as being uninfected.
c. These viruses conceal any increase in the size of an infected file orchanges to the
file’s date and time of last modification.
11. Trojans :
a. A Trojan is a program that hides in a useful program and has a malicious
function.
b. A major difference between viruses and Trojans is that Trojans do not selfreplicate.
12. Logic bombs :
A logic bomb is a type of malicious software that is appended to an
application and is triggered by a specific occurrence, such as a logical condition or a
specific date and time.
13. Ransomware :
Ransomware is a type of malware that blocks access to the victim’s
data and threatens to publish or delete it unless a ransom ispaid.
14. Denial of service attack :
a. A denial of service attack floods systems, servers, or networks with traffic to
exhaust resources and bandwidth.
b. As a result, the system is unable to fulfill legitimate requests. Attackers can
also use multiple compromised devices to launch thisattack.
c. This is known as a Distributed Denial of Service (DDoS) attack.
Market place for vulnerabilities
1. Vulnerable consumers fail to understand their preferences and lack the knowledge,
skills, or freedom to act on them.
2. To protect them, we can censor information, restrict choices, and mandate behaviors.
3. One-fifth of the public is functionally illiterate and substantial majorityof consumers
(adolescents included) appear to be marketplace literate.
4. Rather than curtail consumer prerogatives to protect a vulnerable minority, education
reform focused on the values, knowledge, and skillsnecessary to create and navigate
responsive markets should be developed.
5. Reformed adult and adolescent education can refine, expand, and accelerate learner’s
informal and experiential understanding of marketplace fundamental
Error 404 Hacking Digital India part1
1. In error 404 hacking digital India part 1 chase, the cyber crime and cyberattacks hack
the information of users like bank detail and personal information.
2. It is real time incident. In this, attacker or hacker creates an attractive video so that
victim gets attracted and plays that video into system.
3. When we clicked on video to play then at the time of buffering, hacker can know our
current location and GPS history but also have complete access to our contacts, text
messages, Facebook, Whatsapp and most importantly our bank details, including our
CVV number.
4. Hackers are creating a kind Trojan file, and android apk files. The apk files that will
be distributed all over the internet. Those who download this file will be hacked
easily.
5. Potential cyber attacks that is most common in error 404 hacking :
a. Web application attacks :
i. A web application is a client-server computer program which uses web
browsers and web technology to allow its visitors to store and retrieve data
to/from the database over the internet.
ii. Ifthere is flaw in the web application, it allowsthe attacker tomanipulate data
using SQL injection attack.
b. Network security attacks :
i. Network security attacks are unauthorized actions against private, corporate
or governmental IT assets in order to destroy them; modify them or steal
sensitive data.
ii. As more enterprises invite employees to access data from mobile devices,
networks become vulnerable to data theft or total destruction of the data or
network.
c. Mobile security attacks :
i. Mobile security, or mobile device security, has become increasingly
important in mobile computing.
ii. The security of personal and businessinformation now storedon smartphones.
iii. More and more users and businesses use smartphones to communicate, but
also to plan and organize their users' work and also private life.
Control Hijacking:
1. Hijacking is a type of network security attack in which the attacker takes control of
a communication.
2. In hijacking (also known as a man in the middle attack), the perpetrator takes control
of an established connection while it is in progress.
3. The attacker intercepts messages in a public key exchange and then retransmits them,
substituting their own public key for the requested one, so that the two original
parties still appear to be communicating with each other directly. \
4. The attacker uses a program that appears to be the server to the client and appears to
be the client to the server.
5. This attack may be used simply to gain access to the messages, or to enable the
attacker to modify them before retransmitting them.
6. Attacker’s goal in control hijacking :
a. Takeover target machine (for example web server)
b. Execute arbitrary code on target by hijacking application control flow
7. There are three types of control hijacking in computer security :
a. Buffer overflow attacks
b. Integer overflow attacks
c. Format string vulnerabilities
Buffer overflow in Control Hijacking :
1. Buffers are memory storage regions that temporarily hold data while it is being
transferred from one location to another.
2. A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the
storage capacity of the memory buffer.
3. As a result, the program attempting to write the data to the buffer overwrites
adjacent memory locations.
Attackers exploit buffer overflow issues by overwriting the memory of an application. This
changes the execution path of the program, triggering a response that damages files or
exposes private information
Integer Overflow attack in Control Hijacking:
1. An integer overflow attack occurs when an attacker causes a value in the program to
be large enough to overflow unexpectedly.
2. A common form of this attack is to cause a buffer to be allocated that is too small to
hold data copied into it later, thus enabling a buffer overflow attack.
3. We are able to detect buffer overflow attacks in the same way as a normal buffer
overflow attack.
4. An integer overflow is the condition that occurs when the result of an arithmetic
operation, such as multiplication or addition, exceeds the maximum size of the
integer types used to store it.
Format string vulnerabilities in Control Hijacking:
1. A format string vulnerability is a bug where user input is passed as the format
argument to printf, scanf, or another function in that family.
2. The format argument has many different specifies which could allow an attacker to
leak data if they control the format argument to printf. Since printf and scanf are
variadic functions, they will continue popping dataoff of the stack according to the
format.
3. For example, if we can make the format argument “%x.%x.%x.%x”, printf will
pop off four stack values and print them in hexadecimal, potentially leaking
sensitive information.
Defence against control hijacking/ How to control Hijacking:
Hijacking attack is controlled through
i. Platform defense :
Through platform defense we can prevent target machine by
using :
1. Fixed the bug :
a. Audit software through automated tools.
b. Rewrite software in a safe language.
2. Marking memory as non-execute :
a. Prevent attack code execution by marking stack and heap asnon-executable.
ii. Run-time defense :
1. In run-time defense, we tests for stack integrity.
2. We embed “canaries or a parity bit” in stack frames and verify their integrity
prior to function return. There are three types of canaries or parity bits:
a.
Starting canary or parity bit
b. Random bit
c. Terminal bit
Advanced control hijacking techniques:
Comments
Post a Comment