Tuesday, May 5, 2020

Top 5 fundamentals of Computer Security

Question: Discuss about the Top 5 fundamentals of Computer Security . Answer: Basic Network Diagram Of Home Network Along With Identification And Labelling Of The Workstations And The Other Devices Description Of The Home Network System The above network diagram is presently in vogue in my home. I have a main server connected to a router which is further connected to an internet service provider. My server is connected to six other devices, laptop of my father which he uses for official purposes, a printer cum scanner, a mobile phone and three other computers used by various people at home either for project making or book reading or simple internet surfing. Whenever anyone wants to log into the laptop or any other computer he or she has to log in the password which authenticates one to start using the device. All the devices have separate passwords and the passcode of the laptop is not known to anyone else but for my father since it has important confidential data stored. If any one of us wants to use it, then it is he who opens the lock of the system. However other computer systems are also protected by a password but the laptop uses a password at the confidential folder also. Only my mobile phone has got the acce ss to the computer system. Anybody cannot access the system. Adequate firewalls are also installed and the anti-viruses are run once a month or if there is a requirement then the same is run as per need. Passwords are not changed frequently. If a security issue is ever felt it is only then that the passwords are changed. Also the passwords of all the systems are different but easy to remember. Steps Of A Trojan Based Attack A Trojan is a malware and not a virus that is often camouflaged in the form of a justifiable software package. It enables the hackers and the other unauthorized entities to enter into the system of other users. Once the virus gets triggered, it gives full access to the hackers to overview and keep a track of whatever is happening in the system network, pilfer the important data and obtain backdoor entry to the entire network (Komando 2013). They are able to perform functions such as deletion, blocking, and copying of information from the hacked system for ones own malicious intents. The said virus disturbs the entire systems performance. Trojans, however cannot reproduce itself automatically (Symantec.com, 2013). An example of one such attack was seen in the year 2011 when the Japanese Government complained of their servers and computers f the Parliament being attacked by Trojan Horse Virus. This happened due to a negligent act of a politician who happened to click on an email attachment which was a spam. The government suspected that it was act by the Chinese who must have got access to important information and passwords within spick of a time till they could log off from the system (Russel, 2011). One such malicious act had occurred in the UK which lead to leakage of the drawing of the revolutionary wind turbine blades by its competitors who were the supposed hackers of the same. This led to a loss to the company as the competitor ended up manufacturing the same at a lower price. Thus the steps to attack using Trojan is very simple. Steps For Minimizing Avenues Of A Trojan Based Attack A Trojan based attack can be avoided or minimized if some careful steps are undertaken. The user has to be very careful before he downloads any file in his system. The origination and the data of the file to be downloaded should be known. Even though the person giving you the file for downloading is a known and a trusted one yet the same should be verified again as it may happen that the person providing with the file is himself unaware of any such malware. If there lies a little bit of a suspicion, the file should be checked such as its headings and what it flashes in the form of an advertisement. Also one can verify the information of a file before downloading it with help of available virus scanners (Lo, 2006). Further one should open up all the concealed extensions of a file before downloading it. This would enable one to know that a file which reads as amy.jpeg is actually amy.jpeg.exe which is a Trojan. Another way to minimize the Trojan based attack is by disabling features which downloads or previews file and folders as a routine affair. This is the most convenient method although yet to be safe from these attacks one should ensure that manual downloading and previewing is done. For example auto DCC get in mIRC is an auto-downloading and previewing feature which should always be kept disabled. One of the most common routes that these Trojan attackers take is by convincing people to open web addresses that they ask for or describe some false benefits about pre-formulated programs which basically are Trojans. Also one common mistake which all users do is that they overtly believe in the anti-virus programs. Users should understand the fact that they are backups which helps basically when something unlawful and harmful has already become a part of your system(Meier et.al. 2003). Describe The Approach To Both Workstation/Device And Network Level Security From A Trojan Based Attack The workstations as well as networks all have become prone to security risks with regards data stored and the functions that these workstations and the networks are expected to perform due to too much exposure to the internet. Even though dependence over the internet has increased tremendously over the last few decades yet one cannot afford to compromise with regards the accessibility of the information to any unknown person. A systematic approach has to be followed to ensure that the devices and the network are well protected from such hackers. A network security is more important as many systems are connected to each other and if the hacker enters a network then he can have access to various systems that are linked (Paquet, 2013). The most sought after security approach for any computer system or the networking system is that the system should deploy three important things i.e. maintenance of confidentiality of data, integrity checks , authorization of usage. Who would have access to the companys insight and data which is indispensable in nature should be picked up very carefully. Further it should also ensures that integrity is maintained. Users who are permitted to access and change sensitive data and information do not misuse their rights. It is very crucial that information of an organization is divided according to its importance. Data which should be secured should be stored and accessed only by those who are highly trusted. The custody of the data should be given as per its importance. This way it is easy for the organizations to fix responsibility in case of any mishaps. Data should be classified into various types and depending on the same security levels should imbibed into the system (intelligentedu.com, 2012). Data that is not of much importance, little or no effort is required for protecting the same from the Trojan attackers. Some data have restricted approach and if it falls into unwanted hands may have unruly impact upon the organization Some data are classified as confidential and some as secret in nature. The later requires greater security as its leakage may lead to graver damage as compared to the former. Further the number of people who get access to secret information is much less than the former. Another high level security is required for data which is termed as top-secret data. Companies even go to the extent of spending money so as to ensure its secrecy and security is maintained. Another form of classification of approach for ensuring security from the Trojan attackers are administrative and technical. Administrative policy for security maintenance of data is basically policy driven. The hackers may be a part of the organization as an employee and one would be unaware of the same. Thus adequate checks should be done of people before hiring them and also regular checks of hired employees should also be in place. Role change and transfers should be a part of the policy so as to understand if there is any loop holes. Trojan is nothing but a technology and to fight it successfully technology is the best solution. A full proof technical control system should be inculcated into a companys security program. The controls imbibed should be strong enough for safeguarding the information from the possible hackers. Some famous security controls are firewalls, intrusion prevention system, smart cards and biometric authentication devices. Thus these help to secure both single workstations as well as entire network (Daly 2009). The Three Security Problems The three security problem with regards workstations and the networks are : Web Cookies: The web cookies do not carry viruses and Trojans however if the cookies are not deleted and kept open then hackers or unauthorized users may have access to saved password sessions which may be harmful. This leads to very critical privacy issue (Bhardwaj Singh, 2011). Host sharing: This is one of the easiest ways for the Trojan attackers to get into your network system. Business houses who have a website of their own and that website is connected to the internal server or the host server is prone information security risks. Each site has a dedicated space in the server and unknowingly the Trojan may also take a space to reside and then attack over the confidential and the secret data. Outdated server applications: Business houses should update their servers and applications on a timely basis as the system hackers continuously keep on developing new hacks so as to disrupt the systems and networks and derive valuable information from the system thus harming the users. Thus the business house who simply rely on their old system without updating it on a regular basis are prone to such security issues (Pierce, 2012). Measures To Counter These Security Problems Web cookies should be encrypted on a regular basis and should have a preset time for expiry of these web cookies. The administrator should put in a rule in place that the every time a crucial information is being accessed by the authorized users they are to login and re-login. This provides better safety to the data. In the case of host sharing problem the website of a business house should not be linked to the host server. The accessibility of the host server should be limited as the important data is always stored here. The third security problem can be easily resolved if the administrator keeps oneself updated with the existing and the probable host malwares which may affect the system and ensure that programs updating applications are run from time to time (Eckel, 2009). Protection- PREVENTION DETECTION + RESPONSE Security Software Audit logs Scans the data and takes backups Anti-spyware programs Trojan infections are detected Anti spyware programs which are purchased help to remove these infection Auto run should be disabled Automatic installation of unwanted files Microsoft recommends how to disable the auto download facility Awareness with regards the spam mails Spam mails should be reported Deletion of spam mails Security Principle Essential For Maintaining Security Of Home Network Against Trojan One of the most sought after security principle which is most essential for maintaining security of home network against Trojan malware is to secure the VPN of your home network. For ensuring that the VPN is secured one of the most common ways adopted by network users are encryption of data and verification of self. An easy accessible network is more prone to Trojan malware. So as to ensure that the same is prevented timely review of the encrypted data on the server and the VPN software should be done. Usage of a firewall will also be helpful in separating the VPN network from others (Berry 2012). Summary Of Approach Adopted For Solving The Problem Of Home Network From The Attack Of Trojan On understanding the said malware in detail I have understood that the same could be countered by ensuring that the data accessibility of the network at home should be secured by a password which is very strong. Further the same should be changed on a timely basis so that the hacker finds it difficult to get inside the network. The VPN system should be verified and checked regularly by technicians who are expert and trusted professionals. Further timely backup of data and updation of application software on a continuous basis should be made a part of the system. The users should be educated with regards the spam mails and the fact that they should not entertain any of it as it may lead to destruction of the entire system in place. Important data should be protected by passwords and accessibility of the same should be permitted only via repeated logins by each new user. Updated firewalls and anti viruses should be in place too so as to secure the system from the problem of Trojan attackers. Summarization Of What Is Learnt On summarizing the entire write up I have learnt that to ensure that ones important data is not misused, adequate security walls should be instilled into the home network as well. Hackers can hack not only networks of organizations but also ones personal network installed in ones house. Trojan is found to be more dangerous than any other malware because of its nature to behave as a legitimate software program. This malware can easily disinfect ones network if not made aware of. Further emails should also be checked and viewed very carefully. Auto runs though may seem to be an easy way out yet these should be disabled at the earliest. Last but not the least, trying to save cost on installing anti-virus may lead to incurring a heftier loss for me, thus I have learnt that anti-virus ad firewalls should be made a part of my home network at the earliest and it should be updated regularly and not occasionally. References Berry, M., 2012, Network Security: Top 5 fundamentals, viewed on 03rd Aug 2016, https://www.itmanagerdaily.com/network-security-fundamentals/ Bhardwaj, M., Singh, G.P., 2011, Types of Hacking and their counter measure, International Journal of Educational Planning and Administration, vol. 1, no.1, pp. 43-53 Daly, C., 2009, Netwrok Security Threats and Solutions, viewed on 03rd Aug 2016, https://www.slideshare.net/Colin058/network-security-threats-and-solutions-1018888 Eckel, E., 2009, 10 ways to avoid viruses and spyware, viewed on 03rs Aug 2016, https://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/ intelligentedu.com, 2012, Chapter 18: Threats, Attacks, Hackers Crackers, viewed on 03rd Aug 2016, https://www.intelligentedu.com/computer_security_for_everyone/18-threats-attacks-hackers-crackers.html Komando, K., 2013, 5 ways hackers attack you (and how to counter them), viewed on 03rd Aug 2016, https://www.usatoday.com/story/tech/columnist/komando/2013/07/19/hacker-attack-trojan-horse-drive-by-downloads-passwords/2518053/ Lo, J., 2006, Trojan Horse Attacks, viewed on 03rd Aug 2016, https://www.irchelp.org/irchelp/security/trojan.html Meier, J.D., Mackman, A., Vasireddy, S., Dunner, M., Escamilla, R., Murukan, A., 2003, Chapter 2: Threats and countermeasures, Improving Web Application Security : Threats and Counter measures, Microsoft Corporation Paquet, C., 2013, Network Security Concepts and Policies, viewed on 03rd Aug 2016, https://www.ciscopress.com/articles/article.asp?p=1998559 Pierce, T., 2012, 5 Network Security Issues and Solutions, viewed on 03rd Aug 2016, https://www.calibersecurity.com/5-network-security-issues-and-solutions/ Russel, J., 2011, Japanese Government hit by Chinese Trojan Horse attack, viewed on 03rd Aug 2016, https://thenextweb.com/asia/2011/10/25/japanese-government-hit-by-chinese-trojan-horse-attack/#gref Symantec.com, 2013, Trojans and other security threats, viewed on 03rd Aug 2016, https://www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-security-threats

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.