Infosec 31564746
Infosec 31564746
Information Security
Disclaimer
Brent Scott LaReau has been an independent consul-
tant since 1987.
Information in this document is subject to change without
notice and is distributed on an “as is” basis, without war-
ranty. Although every precaution has been taken in the He provides design and development services in elec-
preparation of this document, its author shall not have any tronics, software, embedded systems and devices, web
liability to any person or entity with respect to any loss or and intranet sites, knowledge base construction, tech-
damage caused or alleged to be caused directly or indirectly nical writing and on-site training/mentoring. He
by the information contained in this document. is proficient in heterogeneous system design, where
diverse components use different programming lan-
guages, interfaces, databases, networks and commu-
nications protocols.
2
Contents
2.2 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.4 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.7 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.12 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3 Best Practices 10
4.1 Cybercrime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2.1 Worms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2.2 Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2.3 Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.2.4 Adware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.2.5 Ransomware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3
CONTENTS
4.2.6 Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.2.7 Rootkits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.1 Targeting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.6 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.7.5 Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6 Non-technological Threats 30
4
CONTENTS
7.1.4 Voice-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7.1.5 Web Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7.1.6 Equipment Disposal & Repair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
7.1.9 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
7.3 Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
7.4 Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8 Glossary 40
5
Part 1
Corporations, engineers and nontechnical people alike Finally, engineers know that a company’s end prod-
rely on globally available digital information having a ucts can contain computers, custom software and site-
definite dollar value. This has spurred cybercrimi- specific data. In a classic case of “finger-pointing”,
nals1 to use computers and software to steal personal customers will assume that vendors ”lock down” their
identities, hold enterprise databases for ransom, and products and that data is backed up automatically,
commit other information-related crimes. while vendors will assume that customers will some-
how perform these tasks themselves. Legal trends in-
In the U.S. alone, cybercrime costs companies roughly dicate that vendors, and eventually engineers them-
$67 billion per year, and costs individuals an extra $40 selves, may soon be liable for security breaches or
billion. On average, each U.S. wage earner 21 to 65 enterprise-crippling data loss at customer sites.
years old pays cybercriminals about $1500 each year,
directly or indirectly. This White Paper introduces the field of infor-
mation security—sometimes abbreviated InfoSec—
which deals with the protection of critical data and the
Today, cybercriminals use malware such as viruses,
digital information systems that store such data. Also
worms and spyware, as well as social engineer-
introduced are “best practices”in information security,
ing (psychological) techniques, to achieve their goals
which are tried-and-true security-related guidelines for
worldwide. Their primary vector is the Internet. Anti-
designing, implementing and maintaining any kind of
virus software is becoming irrelevant, as new types of
information system.
attacks occur long before anti-virus companies can is-
sue updates.
On a more detailed and practical level, this White Pa-
per brings into focus security and privacy issues af-
Even without falling prey to cybercriminals, companies fecting individuals and corporations. It describes com-
and individuals can accidentally allow important infor- mon attacks and their defenses; data leaks and their
mation to fall into the wrong hands. Consequences of prevention; effective individual and corporate policies;
such data leaks include embarrassment, termination, and technological solutions and their shortcomings. A
blackmail, lawsuits or even financial ruin. Simply e- glossary and a list of references are included.
mailing a spreadsheet to a customer, or failing to erase
a discarded hard drive, or using a wireless computer at As you read this White Paper, remember—
a coffee shop, can provide someone with enough con-
fidential data to bring down you or your company.
Praemonitus, praemunitus
For example, in 2004 The SCO Group submitted a (Forewarned is forearmed)
Microsoft Word document as part of a lawsuit against
DaimlerChrysler and AutoZone. An analysis of that
document’s hidden “meta-data” revealed that SCO’s
lawyers had originally planned to target Bank of Amer-
ica instead. This data leak seriously weakened SCO’s
legal position.
1 Most boldfaced words can be found in the Glossary located
6
Part 2
• Bids and contracts? Fortunately, a few people did blink, and consequently
tried to minimize those problems by inventing a new
• Documents and specifications? methodology.
• Schematics, bills of materials and CAD drawings? The field of information security (InfoSec) deals
with the protection of information systems and the
• Software and databases?
information stored in such systems. It applies equally
• Financial data? well to personal electronic devices, file cabinets, com-
puter centers, web sites, and the home or automobile.
• Addresses and phone numbers?
• Bank accounts?
2.3 Definition
• E-mail archives?
• Passwords? The U.S. National Information Systems Security Glos-
sary defines information security as: “The protection
of information systems against unauthorized access to
or modification of information, whether in storage, pro-
What would happen if such information was lost, cessing or transit, and against the denial of service to
stolen, corrupted, sold, fell into your competitor’s authorized users or the provision of service to unau-
hands, held for ransom, or put on public display? thorized users, including those measures necessary to
detect, document, and counter such threats” [14]1
All right, then! Let’s talk about preventing those 1 Numbers inside square brackets denote one or more cited
things from happening. references, which can be found at the end of this White Paper.
7
PART 2. INTRODUCTION TO INFORMATION SECURITY
Widely accepted objectives of information security [14] Risks can be managed only if they are known [15,
include: 26]. A discovery process is necessary to identify
information-related risks. Following established guide-
• Assurance - Confidence that security measures lines is better than going it alone, for two reasons.
work as intended to protect an information sys- First, a lot of time can be saved by following in some-
tem. Vulnerability assessments and testing must one else’s footsteps. Second, litigation often focuses
be performed to establish a confidence level. on whether industry“best practices”were used, as men-
tioned in Part 3 .
• Availability - Information systems should not
break down when attacked. This requires knowl-
edge of how attacks are performed.
2.7 Scope
• Confidentiality - Information should be acces-
sible only to authorized parties. Generally, this
requires access controls and encryption (see sec- Information security considerations are commonly, but
tion 7.1.9). incorrectly, thought to apply only to digital data stored
on servers located behind corporate firewalls. In
• Integrity - Confidence that data was not altered
fact, information security considerations apply to every
by unauthorized parties, or was not lost due to
piece of information, regardless of encoding, storage
equipment malfunction. Tools such as checksum
media or physical form.
generators can be used to verify data integrity.
• Accountability - Responsibility and liability is- For example, hardcopy of your company’s internal e-
sues regarding information systems. Impetus mail directory should not become publicly available
must come from effective management and legal through theft or carelessness. Confidential informa-
council. tion stored in a PDA should not be readable by a thief
who steals that PDA.
8
2.11. SECURITY STANDARDS
9
Part 3
Best Practices
Industry standard “best practices” are commonly used 100 companies. The ISF aims to deliver practical
during design, development and implementation activ- guidance and solutions to overcome today’s
ities of all kinds. Information security activities involve wide-ranging security challenges. Best practices
the same types of tasks, and therefore benefit from are defined in their massive 247-page document,
the use of best practices as well. There is no reason The Standard of Good Practice for Information
to “reinvent the wheel”. Security. URL: http://www.securityforum.org
According to one study, organizations that employed The Standard of Good Practice for Information
best practices enjoyed greater success in their informa- Security covers:
tion security efforts than those that did not do so [35].
In specific, organizations that employed best practices 1. Enterprise-wide security management.
saw a decrease in: 2. Critical business applications.
3. Computer installations.
• Exploitation of operating system vulnerabilities. 4. Networks.
5. Systems development.
• Network security incidents.
• Customer/employee records being compromised. • International Organization for Standardiza-
tion (ISO) and International Electrotechnical
• Alteration of system and application files.
Commission (IEC): ISO is an international
• E-mail system downtime. standard-setting body composed of representa-
• Downtime due to security breaches. tives from national standards bodies. Similarly,
IEC is an international standards organization
• Financial loss due to security incidents. dealing with electrical, electronic and related
technologies. ISO and IEC often jointly pub-
lish standards documents. ISO/IEC 17799
Also, litigation often focuses on “due diligence” and contains guidelines for best practices in infor-
whether best practices were used during product (or mation security. URLs: http://www.iso.org and
infrastructure) design and development activities. This http://www.iec.ch
is true regardless of whether a lawsuit involves a ven-
dor, a customer, a competitor, an employee or former ISO/IEC 17799 deals with:
employee, or a“script kiddie”who launched a“denial
1. Security policy.
of service” attack on your web site.
2. Organization of information security.
The following organizations publish industry “best 3. Asset Management.
practices” guidelines for dealing with information se- 4. Human resources security.
curity issues: 5. Physical and environmental security.
6. Communications/operations management.
• Information Security Forum (ISF): A leading 7. Access control.
independent and international authority on infor- 8. Acquisition, development and maintenance.
mation security, with members in 50% of Fortune 9. Information security incident management.
10
10. Business continuity management. of information security, and it operates the Inter-
11. Compliance. net’s early warning system: the Internet Storm
Center. SANS also publishes its own news digest
• The Computer Security Division (CSD) is one (NewsBites), a vulnerability digest (@RISK), and
of eight divisions within the Information Tech- flash security alerts. URL: http://sans.org
nology Laboratory of the National Institute
of Standards and Technology (NIST). CSD Noteworthy documents published by SANS
include:
acts to improve information systems security
by raising awareness, devising techniques, and
developing standards and validation programs. Information Technology System Security Plan -
Development Assistance Guide
CSD publishes many general and specific doc-
uments relating to information security. For (http://sans.org/projects/systemsecurity.php).
example, its “800 series” of Special Publications This covers:
deals specifically with security guidelines. URL: 1. System identification.
http://csrc.nist.gov 2. Management controls.
3. Operational controls.
Noteworthy documents published by NIST
4. Technical controls.
and its divisions include:
Special Publication 800-30: Risk Manage- Information Security Management - SANS Audit
ment Guide for Information Technology Systems. Check List. This summarizes the same 11 sub-
Topics include: jects as the ISO/IEC 17799 specification (see pre-
vious).
1. Risk management overview.
2. Risk assessment. • Information Systems Audit and Control As-
3. Risk Mitigation. sociation (ISACA) and IT Governance Insti-
4. Evaluation and assessment. tute (ITGI): ISACA is a global organization for
information governance, control, security and
audit professionals. ITGI is a research think
NIST Special Publication 800-26: Security Self-
tank that exists to be the leading reference on
Assessment Guide for Information Technology IT-enabled business systems governance for the
Systems. This covers: global business community. Jointly they pub-
1. Management controls. lish Control Objectives for Information and Re-
2. Operational controls. lated Technology (COBIT), which is a set of best
practices for information management. URLs:
3. Technical controls.
http://www.isaca.org and http://www.itgi.org
Engineering Principles for Information Technology • The CERT Coordination Center of Carnegie
Security (A Baseline for Achieving Security). This Mellon University’s Software Engineering Insti-
deals with: tute studies Internet security vulnerabilities, re-
searches long-term changes in networked sys-
1. Security foundation.
tems, and develops information and training
2. Risk. to help improve security. They created the
3. Ease of use. OCTAVE (Operationally Critical Threat, Asset,
4. Resilience.
and Vulnerability Evaluation) method for defin-
5. Vulnerabilities.
ing essential components of a security risk
6. Networking.
evaluation. Using the OCTAVE Method, ex-
ecutives and IT departments can work to-
• The SANS Institute was established in 1989 as gether to make information-protection decisions
a cooperative research and education organiza- and address information security needs. URL:
tion. SANS (an acronym for Sysadmin, Audit, http://www.cert.org
Network, Security) is now a widely-trusted
worldwide source for information security training
and certification. It maintains more than 1,200
freely available, original papers on various aspects
11
Part 4
For thousands of years, security threats consisted of of malware called ransomware to take enterprise in-
physical attacks such as break-ins and hold-ups. The formation hostage [18], or will destroy or corrupt data
nearly sequential births of computer science and the as an act of sabotage or revenge, or will drain funds
Internet have forever changed the way criminals—such from bank accounts.
as thieves, con artists and corporate spies—commit
their crimes. The Federal Bureau of Investigation (FBI) has reported
that cybercriminals have attacked almost every For-
tune 500 company at some time [12].
4.1 Cybercrime Recently, cybercriminals are finding it more
profitable—and less risky—to sell their malware
For thousands of years people have sought to obtain to other cybercriminals, instead of directly mounting
physical goods such as food, weapons, jewelry, or more an attack themselves.
recently, automobiles. But in recent decades there has
been an explosion of globally available digital informa- Cybercriminals are not always shadowy outsiders who
tion that is increasingly seen to have a definite dollar do their dirty work from afar. Indeed, roughly half
value. of cybercriminals are (or were) employees of the very
firms from which they steal [1]. Such“inside jobs”cost
Hence today, people will pay good money for informa- U.S. business $400 billion per year, according to the
tion, whether such was obtained legally or not. Worse, Association of Certified Fraud Examiners. Of that,
companies themselves are now starting to buy stolen $348 billion can be tied directly to employees who
enterprise information from corporate spies [39], and had been assigned higher-than-average computer ac-
to hire script kiddies [13] to attack another company’s cess privileges [18].
web site [22], to gain a competitive edge.
On a more personal level, cybercriminals sell stolen
This new demand for information has spawned cyber- information such as credit card numbers to unscrupu-
criminals, who are commonly but incorrectly known lous individuals who intend to use this information for
as hackers. True hackers have a passion for learning personal gain. According to a Federal Trade Survey,
a technology so that they can innovate, regardless of around 9.9 million Americans were victims of identity
whether they gain financially or not. Cybercriminals theft in 2003. In 2005 at least 55 million Americans
have a passion only for achieving illegal financial gain were exposed to potential identity theft [7], and losses
by learning a technology well enough to exploit it. due to Internet fraud in the first four months of 2005
alone totalled $1.5 billion ($800 million more than for
While hackers may be a nuisance, cybercrime is a se- all of 2004).
vere and costly problem. The US Treasury Depart-
ment’s Office of Technical Assistance estimated that A less-personal but more widespread form of criminal
cybercriminals reaped $105 billion in 2004—more than activity is the production of ordinary malware such as
illegal drug sales provided! [18] viruses, worms and spyware, which routinely cripple
enterprise information systems, computer-based prod-
After gaining access to a computer, cybercriminals will ucts, and personal computers alike, forcing victims to
steal copies of saleable information, or will use a type repeatedly perform costly mitigation activities.
12
4.2. MALWARE
13
PART 4. CYBERCRIMINALS AND THEIR ATTACK VEHICLES
active and replicates itself only when its host file is ex- • Information about your buying habits.
ecuted (opened). Hence viruses most often replicate
• Your passwords and account numbers.
only with human help. A virus can replicate without
human help only if someone has set up a means for a • Your bank accounts and balances.
computer to automatically execute (open) an infected
• Your credit card numbers and expiration dates.
file, possibly by using a scheduler program.
• Addresses of web sites you visit.
Aside from self-replication, a virus can be manually
• Your search engine queries.
replicated by simply making a copy of its host file.
This can even happen during routine backups, where
infected files are copied from one computer to another.
However, copies are in fact dormant and benign unless Common sources of spyware are spam e-mail attach-
executed (opened). ments, disreputable or hacked-into web sites, disrep-
utable application software, free games, and third-
While the primary purpose of a virus is to replicate party screensavers.
itself, some viruses carry a payload designed to cause
damage by deleting or corrupting files. A large number Spyware can enter a computer only when someone
of viruses carry a payload that is simply annoying. For opens infected e-mail attachments, visits infected web
example, some viruses display an egotistical or political sites, installs infected application software, or installs
message of some kind. infected screensavers. Otherwise spyware would never
enter your computer.
Viruses were once the most important and extensive
type of malware, but worms now have that title be- The National Cyber Security Alliance reported that
cause worms are much faster and more effective. 91% of computers in a studied group had been infected
by spyware. Webroot Software (in association with In-
ternet service provider EarthLink) scanned more than
4.2.3 Spyware one million Internet-connected computers and found
an average of 28 spyware programs on each computer
[18]. Some people actually have many hundreds of
Spyware is surveillance software that gains entry to a spyware programs on their computer.
computer only with human help. Once entry is gained,
spyware will permanently install itself in its new host,
often not only hiding itself but also rigging the com-
puter to automatically re-install itself should someone 4.2.4 Adware
remove it. Once installed, spyware will automatically
start running every day as soon as your computer is Adware is closely related to spyware in terms of its
powered up. source, technical characteristics, and operation. But
whereas spyware informs someone else about you, ad-
Spyware has only one purpose: to collect specific in- ware is designed to inform you about products or ser-
formation about you, and then transmit that informa- vices offered by someone else.
tion to someone who can profit from that information.
For example, in 2005 researchers found evidence of A computer infected by adware may:
a massive spyware-base identity theft ring that used
keystroke loggers to obtain personal information [37].
• Display“pop-up”advertisements for products, ser-
Collected information can include anything stored on vices or pornography.
your hard drive, anything you type on your keyboard,
and anything you view on web pages: • Hijack your web browser so that you will be ex-
posed to specific online shopping sites.
• Your contact information (name, address, phone • Notify disreputable companies of your e-mail ad-
number, etc.). dress so that they can send you unsolicited mail
(spam) containing all types of offers.
• Your demographic information (age, sex, race,
sexual preference, city, state, income, etc.). • Attempt to influence your political position.
14
4.3. ZERO-DAY EXPLOITS
15
PART 4. CYBERCRIMINALS AND THEIR ATTACK VEHICLES
Today, most cybercriminals do not personally use the • Automatic deactivation of detected malware.
botnets they create. Instead, they find it much more
profitable to sell or rent their botnets to other cyber- • Periodic updates to signature databases and
criminals who don’t possess technical skills required to heuristics engines.
create botnets themselves. Sadly, some botnet cre-
ators are even advertising “first hour free” sales to po- • Widespread availability of free or inexpensive ver-
tential customers. sions.
16
4.6. THE WRITING ON THE WALL
4.6 The Writing on the Wall Side Note: For four years this author has run his
business exclusively on Linux. Results: No licenses,
no patches, no updates, no anti-virus, no fears, no
Ponder This: What good is protection software such blue screens, no “pop-up” advertisements, no spyware,
as anti-virus or anti-spyware software, when their de- no adware, no worms, no crashes, no downtime, no
tection signatures and heuristics engines can only be expenses.
updated hours or days after new malware has attacked
your computer? Isn’t that like slamming the barn door
after the horse has bolted?
Possible Conclusions:
17
Part 5
The rise of ubiquitous data communications • A computer can obviously execute software that
networks—such as corporate networks, wireless communicates over the network with another
networks, and the Internet—coincides with the rise computer running compatible software. That’s
of network-borne attack vehicles and the decline of how you“surf the web”. But you can run an e-mail
simple viruses. program at the same time as a web browser. A
computer prevents communications conflicts be-
tween programs by assigning a unique port num-
ber to each program. A port number is expressed
5.1 Targeting as a single decimal number between 1 and 65,535
inclusive, and is analogous to an apartment num-
ber within a building. Well-known port numbers
As mentioned in Part 4, cybercriminals and worms use are those traditionally used for a specific func-
a network such as the Internet to find vulnerable com- tion. For example, web server programs normally
puters. But exactly how is this accomplished, and what use port 80.
can be done to stop it?
• A program running on one computer, can commu-
A review of four basic networking concepts, plus an nicate with a program running on another com-
introduction to three common diagnostic programs, is puter, only by first establishing a “connection”. It
required before we can address that question. does so by transmitting a connection request to a
specific port number at the other computer’s IP
address or name. A connection request is received
by a program only if it is actually“listening”on its
5.2 Networking Concepts assigned port number. For example, web servers
listen on port 80 for connection requests from re-
• Every computer on a network is assigned a unique mote web browsers. When a program is listening
network address, commonly called an IP address. on a port, that port is said to be “open”.
A computer’s IP address is analogous to a build-
ing’s street address. IP addresses are commonly
expressed as four decimal numbers, each between At this point we are on the verge of understanding
zero and 255 inclusive, separated by a period. how cybercriminals or worms locate computers on a
“216.109.112.135”is an example of an IP address. network. However, a quick look at some common net-
• The Domain Name System (DNS) was developed working tools would add some clarity to our discussion.
to allow human-readable computer names (such
as “google.com” or “yahoo.com”) to be specified
instead of IP addresses. DNS “servers” are pro-
vided as part of Internet and network infrastruc- 5.3 Diagnostic Software
tures to translate such names into corresponding
IP addresses. For example, “google.com” might
be translated into “72.14.207.99”, from which we Networking specialists use several types of diagnos-
can deduce that the computer serving Google’s tic programs to accomplish common network-related
web page has an IP address of “72.14.207.99”. tasks, such as:
18
5.3. DIAGNOSTIC SOFTWARE
• Determining whether any computer has been as- Another diagnostic program called netstat is built into
signed a particular IP address or name. every computer operating system. It lets you see which
ports are open on your computer, and which network
• Discovering which, if any, ports are open at a spe- connections to other computers are established [4].
cific IP address.
Netstat is not a beginner’s tool, but once you learn
how to use it you can:
Ping
• Discover certain types of malware running on your
computer. For example, the so-called Nachi worm
One such diagnostic program is built into every com- will open port 707 for malicious purposes once the
puter operating system. That program is called ping worm has infected a computer.
and it’s quite easy to use. You can try it right now :
• Identify potential security risks by identifying
which standard ports are open. For example, port
21 indicates the presence of an FTP server run-
1. In Windows, click Start - Run and then type
ning on that computer, and FTP servers are a
cmd into the “Open” textbox. Click OK. A black
known security risk.
command-line window will appear. If this fails,
use another means to bring up an MS-DOS com-
mand window.
Nmap
2. Type ping google.com and then press Enter.
If your computer is set up in the normal manner, Another diagnostic program is called Nmap, which is a
you will see something like this: free third-party program (not provided with Windows).
Nmap falls into the port scanner category even though
Pinging google.com [72.14.207.99] with it performs many other functions [2].
32 bytes of data:
Reply from 72.14.207.99: bytes=32 A port scanner is an automated means to determine
time=71ms TTL=245 which ports at an IP address are open. A port scanner
does its job by sending thousands of connection re-
quest messages to thousands of port numbers at a tar-
From this response we can infer that: get IP address, hoping to receive some replies. When
finished, port scanners will display a list of open ports
if any were found.
• A DNS server was able to translate “google.com”
into a specific IP address, and. . . Nmap can also perform a ping sweep. A ping sweep is
an automated means to find computers on a network,
• The ping program was able to send a request over by blindly running the equivalent of a ping command
the Internet to a remote computer at that IP ad- against every IP address within a given range. When
dress, and. . . finished, a ping sweeper will display a list of IP ad-
dresses for which ping succeeded.
• A program at that IP address was listening on the
appropriate port number, and. . . A ping sweep and a port scan may be combined to
produce a list of open ports for every computer within
• That program sent a response back to our ping a range of IP addresses. This can bring to light some
program. rather interesting facts. For example, this author once
discovered that 16 computers at a customer’s facility
were infected by the Nachi worm, because port 707
Ping programs accept either a computer name such as was open on those computers.
“google.com”or an IP address such as“72.14.207.99”.
So you could have typed “ping 72.14.207.99” in- If you are interested in Nmap you can visit its web site
stead of “ping google.com”. (http://www.insecure.org/nmap/).
19
PART 5. INTERNET & NETWORK THREATS
5.4 Vulnerabilities, Exploits & Windows used to be famous in network security cir-
cles for its wide-open port configuration “out of the
Patches box” [4]. For example, previously to Service Pack 2’s
(SP2’s) arrival, Windows XP Home Edition’s default
Now, we can finally address how cybercriminals or configuration opened the “messenger service” port.
worms find vulnerable computers on a network. That service is traditionally used by corporate system
administrators to send official announcements to em-
Cybercriminals (or worms) can simply perform a ping ployees. But why enable that service in XP’s home
sweep to locate active computers. Then, for each cor- edition? Did Microsoft think that each home contains
responding IP address, they can run a port scan to multiple PCs supervised by a system administrator?
locate open ports. Interestingly, cybercriminals can
Furthermore, most home computers have Internet ac-
also use search engines such as Google to discover vul-
cess, which means that “average Joe” has all kinds of
nerable servers [2].
ports open on the Internet. So it was easy for dis-
reputable companies to set up automated ping sweeps
If a well-known port number is open, it’s clear that a
and ports scans to find every open messenger service
specific type of program is running on that computer.
port on the Internet, so that advertisements could be
For example, if port 465 is open then one can assume
sent continuously to every available home computer in
that a mail server program is running.
America. Thanks, Microsoft!
Cybercriminals and security experts alike know that
At least Microsoft’s SP2 closed that security hole.
some programs are known to have certain vulnerabili-
But what about other open ports? You have several
ties, which can be exploited in specific ways.
choices:
A cybercriminal or worm need simply transmit a spe-
cially crafted message to a vulnerable program, to 1. Learn about network security so that you can
cause that program to malfunction in a predictable manage port-related security risks yourself. Ad-
way, resulting in a highly desired result: external con- vantages: Your port configuration will match your
trol of that computer [13]. specific requirements. You won’t be blindly fol-
lowing someone else’s advice for better or worse.
That’s why it is critically important for vendors to dis- Disadvantages: The learning process is time-
cover and immediately fix vulnerabilities in their soft- consuming. Your initial security fixes will be de-
ware. layed until you know what you’re doing.
And, that’s why it is critically important for you to 2. Have a computer geek close them for you. Ad-
apply security updates to all of your software the very vantages: You will get expert help in short order.
instant these become available. Disadvantages: You must blindly trust that geek,
for better or worse.
3. Install a firewall. Advantages: You will be pro-
tected in short order. Later, you can“tweak”your
5.5 Port Management firewall to match your specific requirements. Dis-
advantages: At least initially, you must blindly
Imagine this dialog: trust your firewall vendor’s default configuration,
for better or worse. Some firewalls are themselves
vulnerable to attacks by cybercriminals or their
Patient: “It hurts for hours every time some- worms.
one kicks me in the shins. What can I do
about it? ”
Doctor: “Stop letting people kick you in the 5.6 Firewalls
shins!”
20
5.6. FIREWALLS
obstacle in the path of cybercriminals and worms [2, 3, Disadvantages of a hardware firewall include:
4]. Interestingly, the recent increase in firewall usage
has caused many cybercriminals to shift their focus to
• It costs $50-200.
social engineering techniques (see section 5.7.10).
• An extra piece of equipment must be maintained.
Two types of firewalls exist: Hardware, and software. • It introduces an extra point of failure.
You can use both at the same time to get the best of
both worlds, which is precisely what this author rec- • It cannot be configured to disallow specific soft-
ommends. ware programs from obtaining network (or Inter-
net) access.
• It will not notify you when a new type of software
program running on your computer attempts to
Hardware Firewalls
obtain an outbound connection to a remote com-
puter. Many types of malware will try to “phone
A hardware firewall is a piece of electronic equipment home”, and you don’t want them to do that.
designed to block common types of network threats.
Hence you must connect it in-line between a “dirty”
network (such the Internet) and your computer, so that Software Firewalls
all network (or Internet) communications must pass
through the firewall. A software firewall is a program designed to block com-
mon types of network threats. You must install this
The best hardware firewalls employ Network Address program on every computer connected to a network
Translation (NAT) and Stateful Packet Inspection (or the Internet).
(SPI), which prevent unsolicited external network or In-
The best software firewalls employ Stateful Packet In-
ternet traffic—such as attack probes generated by cy-
spection (SPI), which provides additional protection
bercriminals or worms—from ever reaching your com-
against attacks mounted by cybercriminals or worms.
puter.
Advantages of a software firewall include:
Firewall using both NAT and SPI are not that expen-
sive ($100 & up). Do yourself a favor and insist on
• No extra equipment is required.
both NAT and SPI when purchasing a hardware fire-
wall. • No hardware failure can occur.
• Some are available free of charge (within the
Advantages of a hardware firewall include: terms of their license).
• It can be configured to disallow specific software
programs from obtaining network (or Internet) ac-
• One device can protect an entire private network.
cess.
• It provides a central “control panel”. All comput- • It will notify you when a new type of software
ers behind the firewall will receive the same type program running on your computer attempts to
of protection. obtain an outbound connection to a remote com-
puter.
• It is less vulnerable to attack than software fire-
walls.
Disadvantages of a software firewall include:
• It usually has a built-in Internet sharing fea-
ture, automatically providing Internet access to • It is vulnerable to attack, just like any other soft-
all computers behind the firewall. ware. As of April 2005, almost 80 vulnerabili-
ties had been discovered in defensive (firewall and
• It can usually be configured to block certain anti-virus) software products sold by Symantec,
communications protocols, IP addresses, web site F-Secure, CheckPoint Software Technologies, and
URLs, web page keywords, etc. others.
21
PART 5. INTERNET & NETWORK THREATS
• If you have more than one computer you may have Anti-virus software, firewalls and other technological
to pay additional license fees. protection methods are strong and important links in
your chain of protection. However, your computing
• You must manually ensure that every firewall is habits are chain links, too, and if they are weak then
set up the same (there is no central “control your chain will break.
panel”).
You can tremendously strengthen your chain of pro-
• If you use an Apple Mac and a Windows PC, you tection by establishing safe computing habits [3, 31].
must buy and learn two entirely different types of
software firewalls.
5.7.1 Good Habits
So far we have been focusing on how cybercriminals or 1. Use strong user ID / password combinations (see
malware invisibly attempt to get into your computer, section 5.7.9).
and what defenses you can mount to keep them out.
2. Shred every printed page before throwing it out
(see section 7.1.8).
But what if you unwittingly invite them into your com-
puter? 3. Guard mobile electronic devices (such as PDAs
and laptops) as if they were your wallet or purse.
This is more common than you may think. First, con- Don’t store PINs and passwords in these devices.
sider this fictional story: See section 6.3.
4. Use a safe web browser such as Firefox to surf the
web (see section 5.7.3).
To keep out criminals you have fortified your
property by erecting a barbed-wire fence with 5. Use a safe e-mail client such as Thunderbird to
a locked gate. Every day you unlock that send and receive e-mail (see section 5.7.5).
gate and cross the road to fetch your news-
paper and your mail. One day, you pause to 6. Put a firewall on your Internet connection (see
read a startling front-page story before re- section 5.6).
turning home, where you discover that your
7. Turn off your computer when you’re not using it,
wallet is no longer on the kitchen table!
especially if your computer has a continuous con-
nection to the Internet. Configure your computer
to blank its screen and lock itself after a few min-
Now, consider this analogous but true story:
utes of inactivity (requiring a password to restore
normal operation).
To keep out cybercriminals you have fortified 8. Encrypt confidential data stored in your com-
your computer by installing anti-virus soft- puter or on external media such as disks or USB
ware and a firewall. Every day you check your memory sticks, as described in section 7.1.9 [3, 4].
e-mail and surf the web to read top news sto- Use a strong password (see section 5.7.9).
ries. One day, you receive a startling e-mail
message from your bank, stating that your 9. Destroy old disks and tapes so that no one can
account will be suspended unless you verify read their contents (see section 7.1.6).
your account information. You click the e- 10. Use a Mac or a Linux PC when using the Internet
mail’s web page link and fill out their form. (see section 4.6). Update every software program
Later, you discover that your bank account you own the instant an update is available (see
is empty! section 5.4).
11. Never click on any web page link you find in any
Remember, a weak link in a chain will cause that chain e-mail. Instead, type the web page address (URL)
to break. into your browser yourself. See section 5.7.10.
22
5.7. SAFE COMPUTING
12. Avoid online accounts if you can. Otherwise, try which one can easily create “a rich browsing experi-
to minimize the amount of personal information ence” when surfing the web.
you provide to web sites. Lie if you must provide
extra information that seems to have no bearing Simply put, Microsoft’s ActiveX technology is a pro-
on your account. Absolutely avoid “secret ques- gramming interface between Internet Explorer and
tions” (a.k.a. “security questions”). See section your computer’s resources (disk drives, memory, files,
5.7.9. sound cards, etc.). So, through the miracle of ActiveX,
when you use Internet Explorer to view a web page con-
13. Obtain a credit card with an extremely low credit taining a suitable program, that program can reach
limit, which you will use only for online shopping. deep into your computer and do all sorts of things
Fraudulent charges will be much easier to spot [2, 18]. It can even reboot your computer!
that way. Make sure you never use a debit card
for online purchases. One software engineer was so aghast at the power of
14. Disable all “macros” in office document-related ActiveX that he created an informative web page titled
programs (such as Microsoft Office). Configure “ActiveX: Or how to put nuclear bombs in web pages”
those programs to also warn you if a macro is [27]. Obviously Microsoft was unhappy about that,
present in a document. Macros can be put to and threatened legal action against the engineer—for
bad uses as well as good uses. simply telling the truth.
15. Never open e-mail attachments unless you abso- Among other things, ActiveX can allow a disreputable
lutely have to. Never open any attachment di- web site to engage in a “drive-by download attack”,
rectly by clicking on it (see section 5.7.4). in which malware is quietly installed whenever a user
visits that site.
16. Occasionally check your computer and web
browser security levels by running free online tests The good news is that (as of July 2006), ActiveX only
offered by computer security firms [3]. For exam- works with Internet Explorer. All other browsers—
ple, PC Flank Ltd. (http://www.pcflank.com) of- Firefox, Netscape, Opera and others—are, perhaps de-
fers six on-line tests: Quick Test, Advanced Port liberately, incompatible with ActiveX. Therefore, no
Scanner, Stealth Test, Browser Test, Trojans Test other browser permits web page programs to reach so
and Exploits Test. deeply into your computer.
ActiveX: A Nuclear Bomb First, it’s possible that a flaw in Java’s run-time en-
vironment may be discovered and exploited. For-
tunately, its run-time environment has suffered few
According to Microsoft, ActiveX is one of many “ex- known vulnerabilities, but new exploits are being seen
citing and powerful features of Internet Explorer”, with on all fronts every year.
23
PART 5. INTERNET & NETWORK THREATS
Second, Java can permit a disreputable web site to Windows Update web site. And that is why you can’t
launch a “drive-by download attack” in an effort to perform updates using any other browser.
install malware whenever a user visits that site.
Think about it: Why would you want to stumble
Non-malicious Java programs are found in very few across www.cybercrime-central.com using the same
web pages, so this author recommends that you change web browser that Microsoft uses to update Windows?
your web browser’s configuration settings to disable
Java. If you have occasional need to visit a reputable, You can close that huge gap in your security fence
Java-enhanced web site, simply re-enable Java long quite simply:
enough to view that web content. Then disable it
again.
1. Obtain and install the Firefox web browser by vis-
iting www.mozilla.com, downloading Firefox, and
installing it according to Mozilla’s instructions.
Jscript
2. Set up Windows’ Internet Options as follows:
Before discussing Jscript it is necessary to briefly men- (a) Put only microsoft.com into Windows’
tion its cousin, JavaScript. In 1995, Netscape Com- “Trusted Sites” zone.
munications invented JavaScript to enable simple pro-
grams to be embedded in web pages. Later, JavaScript (b) Disable every feature in all other zones (“In-
was adopted as an international standard. JavaScript ternet”, “Local Intranet”, “Restricted”, etc.).
was designed with the user’s security in mind from the You may have to ask a computer geek for
very beginning. help with this [3].
24
5.7. SAFE COMPUTING
“File - Open” dialog to find and open that file. Image 5.7.7 Flash Landmines
programs that will open“BMP”files will refuse to open
“EXE” files, thereby saving you from inadvertently ex-
ecuting malware. Macromedia’s Flash (SWF) file format allows movies
to be embedded into web pages. This requires Macro-
media’s Flash Player “plug-in” software to be down-
loaded and installed, which almost everyone has al-
5.7.5 Outlook ready done.
Outlook and Outlook Express are Microsoft’s e-mail Unfortunately, Macromedia has occasionally reported
clients for enterprises and home (or small businesses) some rather serious security risks due to software bugs
users, respectively. Here we will simply call them both within their Flash Player software. Cybercriminals can
“Outlook” since they share the same roots. literally take over a computer by exploiting those vul-
nerabilities.
Outlook also happens to be the other missing section
of chain-link fence [4]. It is is tightly integrated with Worse, the Flash Player plug-in cannot be disabled and
Windows and IE, and so it suffers from many of the is difficult to remove once installed. But this author
same vulnerabilities as they do. strongly recommends that you search Adobe’s web site
(adobe.com) to learn how to remove the Flash Player
(or just its browser plug-in component).
You can close that huge gap in your security fence
quite simply:
Few PDF files contain any JavaScript code. There- 5.7.9 Passwords and User IDs
fore, this author recommends that you change your
Acrobat Reader’s configuration settings to disable
JavaScript. If you have a legitimate need to view People obviously know that their user ID and password
a trusted, JavaScript-enhanced PDF file, simply re- are supposed to guard their account from unauthorized
enable JavaScript long enough to view that one docu- access, but most people fail to understand five critical
ment. Then disable it again. concepts:
25
PART 5. INTERNET & NETWORK THREATS
1. Someone may actually try to get into their ac- Weak User IDs and Passwords
count.
A user ID or password is weak when it can be easily
2. Their user ID is just as important as their pass-
guessed by someone, or easily computed by password-
word.
cracking software.
3. Most user IDs and passwords are weak (easy to
Before we learn about what makes a user ID or pass-
guess or compute).
word strong, let’s stop to consider why most people
have weak user IDs and passwords, so that we can
4. “Security questions” are a curse.
learn what not to do.
5. Cybercriminals have all the time in the world. People have weak user IDs for two main reasons:
Let’s discuss these concepts one by one. • A user ID was assigned to them when its account
was established. Very interesting, because people
don’t realize that in many cases an“assigned”user
ID is simply a recommended or default user ID. If
Online Break-ins so, they could have overridden that default when
the account was established.
To increase your account’s security you must learn to • They don’t understand how some passwords are
regard a user ID and a password as being the same kind stronger than others.
of thing. They are both the same sort of combination
lock. • They think their password is so clever that no
one could possibly guess it, such as “GR8-ONE”,
“SteveRocks”, “kennwort” (which is German for
Common sense tells us to secure a door with two locks
“password”), or simply “z”.
instead of just one. We know that our security suf-
fers when one of those locks is missing or is extremely • They want a password that’s easy to remember,
cheap. Similarly, we should realize that every account like “grapefruit”.
should be secured with both user ID and password,
instead of just the user ID. We should know that our • They desire a password that represents something
security suffers when the password is missing, or when (or someone) meaningful to them, like “69mus-
the user ID or password is weak. tang” or “angeleyes”.
26
5.7. SAFE COMPUTING
• They think they don’t need a password, so they dictionary attack strategy, where passwords are gen-
just leave it blank. erated based on common words found in the dictionary
[4]. Or, a “brute-force” method can be used, in which
• A default password was provided to them, and every possible combination of characters is tried, one
they think it’s good enough. by one.
• They don’t realize that cybercriminals use social
engineering techniques and automated password- Password-cracking software is surprisingly effective,
cracking software to discover user IDs and pass- but only because most people use weak passwords!
words.
In some cases, the “cybercriminal”is actually someone 4. The answer to a secret question never changes,
relatively close to the victim, such as a neighborhood which means the“back door”will continue to work
teen, an estranged brother, or a coworker. In that case even if you change your password.
the cybercriminal is able to more easily collect personal
information about the victim. Regardless of how they
are done, targeted attacks are surprisingly effective.
The solution is to deactivate the “back door” [36]. To
Third, a cybercriminal may use easily available but do this, select any “secret question” at random, and
sophisticated password-cracking software to generate then answer that question by simply hitting a bunch
lists of likely passwords. Some password-cracking soft- of keys at random to generate something like ”awrop-
ware permits “hints” to be specified, which could be uqwpegjhvkl”. If you should ever forget your password,
“Jeb”, “Smith”, “Lilly”, “German”, “Shepard”, “1969”, simply contact tech support personnel and provide suf-
“69”, “Harley” and “Sportster” for the previous exam- ficient credentials to allow them to reset your pass-
ple. Other password-cracking software simply uses a word.
27
PART 5. INTERNET & NETWORK THREATS
Time is on Their Side, Not Yours Since strong passwords can’t be easily remembered,
you will want to write these down and store that list so
that it cannot be found by untrusted persons. For ex-
When setting up an account we usually have only a few ample, you could store the list in an unmarked manila
seconds in which to choose a new user ID or password. folder within a locked file cabinet in your locked of-
But cybercriminals face no time limit at all when trying fice. A cybercriminal is unlikely to travel to your state
to break into an account. They can keep trying for (or even your country), break into your home and find
hours if they wish. your password list before draining your bank account.
4. Has punctuation characters such as “!”, and In June 2004 The Gartner Group estimated that 1.98
million adults in America had suffered losses from
5. Contains at least eight (preferably 10) characters phishing scams [18]. As of July, 2006, more than
in length, and 40 million phishing scams were being attempted ev-
ery week.
6. Is seemingly too difficult to remember, and
Phishing usually relies on e-mail address spoofing,
7. Is not used for any other account, and
which is the creation of a false “From:” address for
8. Is changed frequently. an e-mail. As a joke, this author once sent his wife a
“threatening”e-mail message that was apparently from
Bill Gates at Microsoft. Unfortunately, she was quite
Here are some examples of strong user IDs or pass- shaken because she had believed the message was gen-
words (no kidding!): uine!
28
5.8. THREATS TO WIRELESS NETWORKS
The tricky thing about HTML-based web page links 5.8 Threats to Wireless Net-
is that the link’s URL doesn’t have to match the
link’s human-readable text. Therefore, it’s easy
works
to create a link saying “http://news.google.com” or
“Bank of America”that actually points to“www.nasty- Wireless access points (WAPs) create a cable-free
spyware.com” instead. That is why you should never “bridge”between conventional wired networks and mo-
click on any link in any e-mail message! bile devices such as laptop computers. WAPs have
been deployed worldwide by corporations, libraries,
stores, schools and homeowners alike.
A classic example of a phishing attempt is an e-mail
message that is carefully constructed to mimic what
According to a Federal Bureau of Investigation (FBI)
a bank would normally send to its customers. This
security presentation in 2005, about 70% of the mil-
message might inform the recipient that his account
lions of WAPs in the U.S. are completely unprotected
would be suspended if he didn’t confirm certain critical
against random access by strangers [18].
facts (such as his Social Security Number, his bank
account number, online banking password, etc.). A
If protected at all, most WAPs use an encryption
link to a fake “bank” website is usually provided so
method known as Wired Equivalent Privacy (WEP).
that gullible recipients can fill out a form to provide
Unfortunately, WEP can be cracked in minutes using
cybercriminals with all the information needed to drain
software that is freely available on the Internet [2, 18].
the recipient’s bank account.
This was demonstrated by the FBI when they pene-
trated a wireless network in three minutes during their
presentation. It should also be mentioned that many
A less-obvious example of a phishing attempt would
people enable WEP but don’t change the default pass-
be an e-mail supposedly from CNN or another news
word provided by their WAP’s manufacturer!
agency, containing a copy of an actual or fictitious
news story with a web site link so that you can ”Read
In 2003, WEP was superseded by Wi-fi Protected Ac-
More”. People will click on that link without even
cess (WPA or WPA2), which is thought to offer su-
questioning why they would ever receive an e-mail from
perior security. Everyone should use WPA instead of
CNN, and a few seconds later “www.fooled-you.com”
WEP [3]. However, new attacks are being invented
will begin to load malware into their computer.
daily, so one cannot simply set up WPA and then for-
get about it [13].
To demonstrate the effectiveness of social engineering You can directly answer that question by clicking
techniques, some bank security auditors placed 20 USB on the “Web Maps” link on wigle.net’s home page
memory sticks at random locations in a bank’s park- (http://wigle.net).
ing lot, as if someone had lost them. Within hours,
bank personnel had used bank computers to execute There, you easily “zoom in” to see your city or your
completely unfamiliar software stored in 15 of those neighborhood. Each colored dot on the map represents
devices. a WAP; green indicates an unprotected WAP, while red
represents one that uses WEP or WPA encryption. It’s
possible that you may even see your own WAP.
Fortunately, the software was not dangerous, but had
cybercriminals planted those devices instead, all sorts So much for your “needle in the haystack” theory!
of malware would have been installed behind the
bank’s firewall. This would have been a really bad In case you’re curious (or even enraged) at this point,
thing because firewalls generally allow outbound traf- all of the WAPs in wigle.net’s database were discovered
fic, so it is possible that the malware would have been by people who engage in a hobby called wardriving [2].
able to “phone home” (to the bank’s severe disadvan-
tage).
29
Part 6
Non-technological Threats
Ask any elder about what financial or business troubles • Pretending to be a janitor, maintenance man, cof-
he or she faced earlier in life, and you will hear noth- fee machine repairman, landscaper, city code in-
ing about losses due to online account break-ins, or spector, flower deliverer, or exterminator, to gain
contract penalties due to hard drive crashes. Instead, entry to a facility. Once inside, a cybercriminal
you will hear about property theft and con-men, which can attempt to gain access to important company
are still problems today. The more things change, the information.
more they stay the same!
• Wearing a fake ID badge, possibly fashioned after
an actual sample that was photographed through
a telephoto lens. Many employees will open a
6.1 Social Engineering door for a “fellow employee”whose ID badge fails
to scan correctly.
30
6.3. PROPERTY THEFT
31
Part 7
You should stop distributing Microsoft Office docu- computer hardware information, e-mail headers and/or
ments via e-mail and web sites—immediately—unless web server information [6, 20, 21].
you “scrub” those documents using a reputable third-
party tool. In 2003 the British government published a Microsoft
Word document which was supposedly their dossier
on Iraq’s security and intelligence services. Dr. Glen
Rangwala of Cambridge University dissected that file
7.1 Data Leaks and discovered much of its text was plagiarized directly
from a U.S researcher on Iraq. Worse, the document’s
revision history identified its last ten authors plus their
Enterprises and individuals can inadvertently allow im- edits and commentary [19].
portant information to fall into the wrong hands. For
example, an employee can e-mail a spreadsheet file While it is true that later versions of Microsoft Office
to a customer, not knowing that the spreadsheet con- programs can be configured to not save personal data
tains hidden information such as profit margins or even in document files, only a fool would trust that feature
derogatory statements about that customer. to scrub documents completely clean.
32
7.1. DATA LEAKS
7.1.2 E-mail active for years, long after IT staff has upgraded to a
modern Virtual Private Network (VPN) connection.
In 2002, Internet security journalist Brian McWilliams
The good news is that a simple security audit can be
decided to try “hacking into” Saddam Hussein’s e-
performed to determine if any network access is avail-
mail account on the official Iraqi government web
able in public areas of the company.
site. McWilliams succeeded, simply by using the word
“press” for both user ID and password! [25] Once “in”,
McWilliams saw many e-mail messages from business-
men and corporate executives who wanted to do busi- 7.1.4 Voice-mail
ness in Iraq.
From this lesson we should learn to secure every e- During Hewlett Packard’s merger with Compaq in
mail account with strong user IDs and passwords (see 2002, an intruder obtained access to the HP CEO’s
section 5.7.9). But e-mail-related data leaks can occur voice-mail account and leaked voice-mail messages to
in other, more insidious ways. the press [24].
For example, e-mail messages and their attachments Voice-mail accounts are usually protected by simple
are often forwarded and re-forwarded to third parties user-defined numeric access codes. New accounts are
without much thought, which can create quite a siz- usually set up with well-known default codes that any
able data leak. This can be mitigated two ways: cybercriminal can find via Google. When phone sys-
tem administrators reset someone’s access code, it is
usually set to the same default.
• Mandatory encryption for attached files, as de-
scribed in section 7.1.9 [3, 4]. Unfortunately, people generally fall into the same sort
of traps when choosing a voice-mail access code, as
• E-mail forwarding policies set and enforced by they do when choosing a computer account user ID or
management.
password (see section 5.7.9).
Many companies have a web-based e-mail portal set In short, you should not leave the default access code in
up so that employees can check their mail from home place; you should not choose your birth year or another
or while on the road. Such e-mail servers should be personal datum as your code; you should not choose
configured to require strong passwords, and to lock an stupid codes like “123”; and you should not choose a
account if three or more incorrect login attempts are code based on any physical pattern of button presses
seen. on a keypad (like “159” or “258”). Believe it or not,
some books and web sites list every possible pattern
of telephone button presses, so a cybercriminal doesn’t
even have to invent these himself!
7.1.3 Corporate Networks
Your phone system administrator should configure your
Company personnel are not so stupid as to install net- phone system to lock an account if three or more in-
work jacks in their parking lots. But many do install correct access codes are entered.
jacks in publicly-accessible conference rooms, lobbies,
cafeterias and libraries. Or, they install wireless access
points in or near those areas (see section 5.8). Out- 7.1.5 Web Servers
siders can simply plug right into the corporate network.
Even if no network jacks or wireless access points are Most businesses and many individuals have a web site,
accessible, cybercriminals may still find a “back door” which of course is stored as individual files on a web
or alternate way in. For example, sometimes an old- server computer. Since a file is just a file, it is possible
fashioned analog modem will be installed on a server so to store a large number of files—and many different
that Information Technology (IT) staff members can kinds of files—on a web server. In fact, some com-
establish a remote administrative connection via tele- panies use their web server as a sort of file server for
phone line. Such modem connections are often left their employees’ convenience.
33
PART 7. DATA LEAKS, DATA LOSS & PRIVACY
This begs the following questions: 7.1.6 Equipment Disposal & Repair
The moral of this story is: Never put sensitive data on The bottom line is that data destruction must be a
a web server! part of everyone’s information security plan.
34
7.2. DATA LOSS
Cross-cut, diamond-cut or oval-cut: These offer But what would happen if some (or all) of your paper
superior security compared to the strip-cut type, files or data storage devices were lost, stolen, damaged,
but are significantly slower and more expensive. corrupted, burned, or flooded? Would your projects
35
PART 7. DATA LEAKS, DATA LOSS & PRIVACY
fail? Would your job be in jeopardy? Would customers with legal and 11x17 originals. You may have to
tolerate the consequences? Would your business sur- use a color copier for some items.
vive?
Let’s take a look at some important considerations for Once you have“backed up”your paper copies, you will
preserving your data. need to carefully consider how and where to store those
backups. This is covered in section 7.2.5.
36
7.2. DATA LOSS
7.2.3 Media and Memory Sticks Three main backup methods exist:
We tend to consider floppies, CDROMs, DVDs, • Bare-metal backups create a so-called “image”
portable hard drives and USB “memory sticks” as var- file, which is perfect bit-for-bit copy of an entire
ious sorts of backup devices, but in fact they often hard drive. Later, the image can be written onto
contain original copies of files that are not backed up a new or existing hard drive, which can then be
anywhere else. It’s important to manage all those files installed in a computer to restore normal oper-
on all those media and memory devices. Fortunately, ation. An image contains everything your orig-
files on these devices can be copied quite easily using inal hard drive contained: boot sector(s), par-
one of the backup methods described in section 7.2.4. tition table(s), operating system(s), application
software and user-created data files. A bare-metal
Small devices and disks can be misplaced, lost or backup can consume hours. Some bare-metal
stolen, so you need to ensure that if someone finds backup software allow individual files to be re-
or steals these, he will not have access to your data. covered from the backup, while others require a
You absolutely need to encrypt your personal, propri- complete restoration of the entire hard drive just
etary or confidential data as described in section 7.1.9 to gain access to a single file.
[3, 4].
• User-file backups record only user-produced data
files such as documents and pictures. Operat-
Once you have backed up your media and memory ing system and application software files won’t be
sticks, you will need to think about how and where to backed up. If you have only a few user files then a
store your backups. This is covered in section 7.2.5. backup could take just a few minutes. But most
people accumulate tons of user files, so backups
can take hours. Individual files can usually be re-
stored from a user-file backup. However, if your
7.2.4 Backup & Restoration hard drive fails or becomes corrupted, you will
have to completely re-install the operating sys-
tem and all application software from scratch, and
Everyone might agree that religiously backing up data then apply all patches and updates, before you
is important, but in reality this task is often overlooked can restore your user-file backup. This can take
in today’s fast-moving world. Establishing a solid com- hours, and after it is done your computer will likely
puter backup method and a backup schedule is actually operate differently than you were accustomed to.
harder than it sounds [3, 16]. Difficulties include:
• Incremental backups record only those files that
have changed since the last full backup, which
• Most hard disks hold more data than will fit on means that this type of backup must be used in
common backup media. combination with a full (bare-metal or user-file)
backup. Incremental backups are generally very
• Backing up a large amount of data can take many quick.
hours.
• Many backup methods don’t verify that data was Once you have backed up your digital data, you will
written correctly. need a plan for how and where you will store your
backups. This is covered in section 7.2.5.
• Backups require supervision so that problems can
be corrected. A critical but often-overlooked part of the backup and
restoration process is the backup validation process.
• Validating a backup is difficult and time- Some people back up data all the time, but have never
consuming. had to actually restore it. It is quite a shock to dis-
cover that all of your backups are useless, because
• Reusable backup media can eventually become something was wrong with your methodology or imple-
unreliable. mentation. Validating a backup process can be quite
time-consuming but it absolutely must be done before
• Management of backup media is not trivial. it’s too late.
37
PART 7. DATA LEAKS, DATA LOSS & PRIVACY
Finally, we should mention that the backup and 7.2.6 Uninterruptible Power Supplies
restoration process plays a vital role when you buy new
equipment such as computers or memory sticks, for it An Uninterruptible Power Supply (UPS) is a piece of
provides an easy and familiar way to transplant data electrical equipment designed to continuously supply
from old devices to new ones. 120VAC to a load, even during a power failure. Most,
if not all, UPS units also contain transient suppressors
Backups also play a vital role when you need to send in and power filters to reduce power line noise. Some
your computer for repair. Most people don’t know that UPS units will also auto-correct for voltage sags or
computer warranties usually cover only hardware, not surges.
software. If software is covered, it will clearly be only
software included with the original purchase. Many All UPS units contain one or more lead-acid gel cell
vendors would rather replace than repair, which means batteries and a power inverter circuit that produces
that you have only a slim chance of getting your orig- a crude approximation of a sine wave during power
inal computer or hard drive back. At that point you outages. Otherwise, normal“wall”power flows through
would have lost a lot of data and created a massive the UPS to the load, charging the UPS’s batteries at
data leak at the same time (see section 7.1.6). the same time. UPS units will normally run for 20-60
minutes at full load.
38
7.4. POLICIES
• Batteries in brand-new UPS units typically last • Put extraneous paperwork into drawers before you
two or three years, but even brand-name replace- leave your office to take lunch, attend a meeting
ment batteries seldom last more than 18 months. or leave for home. This is called a “clean desk”
Worse, UPS battery-condition indicators simply policy.
cannot be trusted. It is a good practice to run a
full-load power-failure test on each UPS every six • Turn off computers and other electronic devices
months to determine its run time. You can use at night.
one or more light bulbs as a load if you wish. • Lock your office, drawers and/or file cabinets
• If you are really crazy about continuous power, when you leave the office.
you can consider buying a gasoline- or natural gas- • Make sure your online (web) accounts do not au-
powered generator to power your UPS during an tomatically log you in when you visit. Configure
extended power failure. them to require you to enter a user ID and pass-
word every time.
• Don’t leave your password list under your key-
7.3 Privacy board or in an unlocked drawer.
• And no exceptions for executive management!
Privacy is a small but important part of information
security. There is no reason to accidentally share per-
sonal, confidential or business data with those who Side note: Privacy addicts can learn a lot by look-
really don’t need to know [3, 4, 5]. Doing so can ing into the field of digital forensics (a.k.a. computer
increase your risk of identity theft, jealous acts, intel- forensics), which deals with ways to learn all about
lectual property theft, fraud, and so on. someone’s computer or online activities. Practitioners
in this field are often employed by prosecutors to obtain
Some simple tactics and a few accessories can help vital evidence by “digging into” someone’s hard drive.
prevent accidental sharing of information: Forensics investigators know that everyone produces a
continuous, invisible, detailed and accurate electronic
“paper trail” while using a computer to create docu-
• Password-protect all electronic devices (PDAs, ments, play games, surf the web. . .
computers, memory sticks, etc.).
• Shred all unwanted junk mail or statements relat- Before writing these you will want to review Parts 2
ing to financial matters, to reduce risk of identity and 3 of this White Paper. Several organizations men-
theft. tioned in Part 3 offer useful security checklists that can
supplement your policies.
• Install a privacy filter on your computer display to
prevent passers-by from seeing your screen.
39
Part 8
Glossary
Air Gap: A term used in the network security field, Denial of Service: A type of attack on a remote
referring to the absolute isolation of one or more computer, usually characterized by a massive
computers from any kind of external network flood of network traffic aimed at that computer,
(whether private or Internet, wireless or wired). which causes that computer to virtually cease net-
Worms and other network-borne malware require work operations. This can be disastrous for busi-
some sort of network connection to propagate; nesses that rely on online shopping for much of
they cannot cross an air gap. their revenue.
Anti-virus: Originally, a type of software designed to Dictionary Attack: One of several automated or
locate and deactivate computer viruses. Today, semi-automated password-cracking methods
“anti-virus” software typically recognizes several based on the use of word dictionaries for popular
types of malware, not just viruses. languages such as English or Spanish. For
example, the password “maverick1975” would fall
Attack: An attempt to gain unauthorized access to an
prey to a dictionary attack.
information system. Sometimes an attack vehi-
cle is employed during the attempt.
Distributed Denial Of Service: A Denial of Ser-
Attack Vehicle: A technological or other means to vice attack simultaneously mounted by many
gain access to an information system. Commonly, computers on the Internet (usually members of
malware such as worms and spyware are used a botnet).
as attack vehicles.
Data Leak: An unauthorized or accidental disclosure
Bluetooth: A form of wireless network used by mobile of important information to a third party. A data
devices such as cell phones, PDAs, laptop com- leak can occur when a confidential document is
puters and even automobiles. stored on a public web server (which Google might
find), or when incriminating meta-data is allowed
Botnet: An organized collection of zombie comput- to remain hidden inside a document (which spe-
ers, possibly including thousands or tens of thou- cial tools can extract).
sands of zombies.
Encryption: The reversible process of using a pass-
Corporate Spy: A person hired by one company to
word as the basis for translating information into
provide inside information and/or to steal intel-
an undecipherable form to ensure secrecy. The
lectual property from another company.
reverse process is known as decryption. Some
Cybercriminal: A person who commits a crime using encryption methods are inherently weak, mean-
computers and (usually) a network such as the ing that cryptographers can eventually perform
Internet. decryption without knowing the password. Other
encryption methods are strong, which is desirable.
Decryption: The process of using a password as the
basis for translating secret information from an Firewall: A software or hardware means to block cer-
undecipherable form to its original, normal form. tain types of network traffic while allowing other
Decryption is the reverse of encryption. types to pass.
40
Hacker: A person with a passionate interest in learn- Network Security: A subset of Information Secu-
ing and modifying the technical aspects of various rity that deals specifically with securing private
things, typically electronic, mechanical, computer networks and/or Internet access.
or software devices. “White Hat”hackers are those
who find, report and possibly solve flaws and se- Packet Sniffer: A network security software tool
curity vulnerabilities in products such as software. that reveals many low-level details of communica-
“Black Hats” find and exploit flaws and security tions transmissions in wired or wireless networks.
vulnerabilities to boost their ego, and/or to en- A packet sniffer allows one to see the exact con-
gage in criminal activities for profit or for revenge. tents of messages sent over a network.
Identity Theft: The criminal act of obtaining a vic- Phishing: A social engineering technique that uses
tim’s personal information so that purchases, spam e-mail messages to dupe unsuspecting vic-
transactions or other fraudulent actions can be ac- tims into providing cybercriminals with pass-
complished in the victim’s name (and at his risk). words, account information, etc.
Meta-data: Data that describes other data. Exam- Script Kiddie: A disparaging term for inexperienced
ples of meta-data include a disk file’s time stamp, hackers or budding cybercriminals who use
a JPEG file’s image resolution, and a document’s other people’s software to break into computers
author. Verbose meta-data is often hidden inside or to launch “denial of service” attacks on web
disk files, allowing anyone with meta-data extrac- servers. Most script kiddies haven’t a clue about
tion tools to easily discover facts that the file’s how such software works, and have no ability to
creator might consider highly confidential. See write their own. Script kiddies usually launch their
data leak. attacks on remote computers via the Internet.
41
PART 8. GLOSSARY
Spyware: A form of malware that, with human assis- Zombie: An Internet-connected computer that was
tance, gains entry to a computer through e-mail, successfully attacked in a manner designed to
web sites or application software. Therefore, spy- place it under the remote control of a cyber-
ware cannot infect a computer unless someone criminal. Owners of zombies are usually unaware
surfs the web, opens an e-mail attachment or in- that their computers were compromised. Zombies
stalls application software. commonly become members of a botnet.
42
References
[1] 2005 CSI/FBI Computer Crime and Security Survey (Computer Security Institute and Federal Bureau of
Investigation); Gordon, Loeb, Lucyshyn and Richardson.
[2] Hacking Exposed Fifth Edition: Network Security Secrets & Solutions; McClure, Scambray and Kurtz.
[3] Geeks On Call Security and Privacy: 5-Minute Fixes; Geeks On Call.
[4] Computer Security for the Home and Small Office; Thomas Greene.
[5] The Art of Intrusion; Mitnick and Simon.
[6] Information Leakage Caused by Hidden Data in Published Documents (IEEE Security & Privacy magazine);
Simon Byers.
[7] The Year of Breaches (“News Track” item); Communications of the ACM.
[8] The Windows Malicious Software Removal Tool: Progress Made, Trends Observed (June 2006); Rapid
Response Team, Waggener Edstrom Worldwide.
[9] Ohio Couple’s “Destroyed” Hard Drive Purchased in Chicago (plus similar news titles); WLWT-TV reporter
Tom Sussi et al.
[10] Security Company Recommends Macs (http://www.toptechnews.com/story.xhtml?story id=01100000AFT3)
[11] Data losses may spark lawsuits (eWEEK Magazine June 12, 2006); Matt Hines.
[12] The Simple Economics of Cybercrimes (IEEE Security & Privacy magazine); Nir Kshetri.
[13] Learning from Information Security History (IEEE Security & Privacy magazine); Dragos Ruiu.
43
REFERENCES
44