Week-09-10-11-12 Fundamentals of Cybersecurity(2)
Week-09-10-11-12 Fundamentals of Cybersecurity(2)
to Cyber Security
SPRING-2024
Objectives
• SQL Injection: The SQL injection is the vulnerability that lets the attacker
inject SQL queries in the application in order to access the data from the
database without authorization.
• Cross-site scripting: This vulnerability allows an attacker to execute the
JavaScript at the client-side so that they can get the information stored in
the client-side and also to force the client to perform a particular activity.
• Broken authentication: The is the second vulnerability mentioned in the
list of OWASP top 10. Any application that allows the authentication bypass
is vulnerable to this attack.
• XML External Entity: Any application that parses the XML entity from the
external data is vulnerable to this attack. The hacker can gain access to
sensitive files stored in the server using this weakness of the application.
Assignment
• OWASP top web application
vulnerabilities 2024
What does Database Security mean?
• Safeguarding the data your company collects and manages is of utmost importance. Database security can
guard against a compromise of your database, which can lead to financial loss, reputation damage,
consumer confidence disintegration, brand erosion, and non-compliance of
government and industry regulation.
• Database security safeguards defend against a myriad of security threats and can help protect your
enterprise from:
• Deployment failure
• Excessive privileges
• Privilege abuse
• Platform vulnerabilities
• Unmanaged sensitive data
• Backup data exposure
• Weak authentication
• Database injection attacks
Network Security
We have talked about the different types of network security controls. Now let's
take a look at some of the different ways you can secure your network.
Network Access Control
• To ensure that potential attackers cannot infiltrate your network, comprehensive
access control policies need to be in place for both users and devices. Network
access control (NAC) can be set at the most granular level. For example, you could
grant administrators full access to the network but deny access to specific
confidential folders or prevent their personal devices from joining the network.
Antivirus and Antimalware Software
• Antivirus and antimalware software protect an organization from a range of
malicious software, including viruses, ransomware, worms and trojans. The best
software not only scans files upon entry to the network but continuously scans
and tracks files.
Types of network security
Firewall Protection
• Firewalls, as their name suggests, act as a barrier between the untrusted external networks and
your trusted internal network. Administrators typically configure a set of defined rules that blocks or
permits traffic onto the network. For example, Forcepoint's Next Generation Firewall (NGFW)
offers seamless and centrally managed control of network traffic, whether it is physical, virtual or in
the cloud.
• IPS & IDS – These are the tools that are used to detect malicious activity and stop it from being
executed. IPS stands for intrusion prevention system and IDS stands for the intrusion detection
system.
Virtual Private Networks
• Virtual private networks (VPNs) create a connection to the network from another endpoint or site. For
example, users working from home would typically connect to the organization's network over a VPN.
Data between the two points is encrypted and the user would need to authenticate to allow
communication between their device and the network. Forcepoint's Secure Enterprise SD-WAN
allows organizations to quickly create VPNs using drag-and-drop and to protect all locations with our
Next Generation Firewall solution.
Privacy
• Privacy is when nobody is aware of what you are doing but potentially
they know your identity.
• Privacy relates to content. Refraining from the public eye and
maintaining confidentiality. If you send an encrypted email to a friend
so only the two of you can open it, this is private. It is not public.
• Privacy is different than security in that you are now trying to control
access to data. Privacy measures are those you put in place to limit
who can access information which is important to you. This includes
both information which you possess such as your files and documents
and information which third parties are trying to gather about you.
Privacy Cont.…
1: Know what companies do with your data. Facebook you know how much information they
harvest and share with others. Google loves to track you as well (online and offline). You can
see our online privacy Article for a few measures to help against online tracking. Better yet,
before you give your data to a company, head over to tosdr.org (Terms of Service – Didn’t
Read) and see what they say about how that site uses your data.
2: Tune your computer and program settings. Windows 10 is a pretty good operating system
but has standard settings to share your information. Open up your privacy settings and turn
off all of the sharing settings you don’t need. Many programs have usage monitoring
agreements as well for “improvement studies.” Watch for those check boxes while installing.
And remember, any time a program has to go online to retrieve information, that means it is
sending out information as well. For example, Windows Media Player, while capable of
retrieving song/album info online, also calls back to Microsoft at the same time to update
them on your music.
Privacy Cont.…
3: Cloud storage… not near as secure or private as you might hope. There are actually
encryption programs you can pair with your cloud storage to keep everything private
and only accessible to you. You can also even host your own cloud storage from your
own network.
4: Use a VPN. While great for security, it also provides an amazing boost to privacy. Did
you know your ISP actually harvests and sells your browsing history? With a good VPN
running, they can only tell you are using the internet but lose the capability to monitor
what you are doing.
5: Encryption. I listed this for cloud storage but it goes much further. In fact, encryption
is pretty well your #1 tool when it comes to privacy. Want to keep your computer’s data
private? Encrypt the hard drive. Want to keep emails private (and insure people know
only you could have sent them)? Encrypt the emails. Anything encrypted using a secure
password and algorithm pretty well insures privacy.
Anonymity
• Having anonymity means your online actions do not trace back to you. Anonymity can
function with or without privacy. Consider a Facebook profile (we’ll assume you are
doing something to stop Facebook from tracking your IP here). You can create an
account using a fake name and fake email address. This makes your posts from that
account anonymous as they no longer tie back to you. They are not private however;
anyone on Facebook can still read them. If you then set that account to private so that
only select people can find it and read posts, it is both anonymous and private.
• Anonymity can be harder to achieve online being that so many different services try to
track your every action. And the truth of the matter is, you can’t really be anonymous
online if you aren’t somewhat anonymous offline as well. These tracking systems are
simply so advanced that they can pair related behaviors online and offline in order track
people. But here’s a few things you might consider:
Anonymity Cont.…
1: Have I mentioned a VPN? Security, privacy, and anonymity. I put this under
privacy but realistically, it’s keeping you private by anonymizing your traffic. That
said, if you use a VPN and then sign into Facebook or some other account, it’s still
pretty easy to trace your actions during that internet session back to you…
2: Use virtual machines. There are virtual machines designed purely for
anonymity. They definitely aren’t for everyone but they are relatively easy to
install and work with. Also, actions taken within the virtual machines aren’t really
recorded by your actual computer. Have an issue with the virtual machine or
think it may have been compromised? Not a big deal… a brand new one can be
implemented in minutes.
Anonymity Cont.…
3: Tor. I touched on this at the end. Tor is an internet browser based off of Firefox. It is set
up for security and connects you into the Tor network to anonymize your traffic. What
this network does is bounce your traffic around multiple relay nodes before it gets to its
destination. This prevents the traffic from being tied back to you. It’s slower than
traditional browsers because your traffic is moved between nodes and not as full
featured as normal browsers but does serve to allow for an anonymous connection. You
can read more about how it works.
4: Fake accounts. In my short intro to anonymity I mentioned creating a Facebook
account using a fake name (note that this does violate their policies and they may delete
the account if they decide it is fake… but if you are using like legitimately as you would a
normal one, this is not likely to happen). Having your online presence functioning under
a pseudonym provides you a layer of anonymity.
What is Pseudonymity?
To get a brief glimpse into how serious the threat to online privacy
can be, let’s explore a few examples. The following showcase the
U.S. and U.K. governments’ blatant disregard for internet privacy:
• Prism
• Prism is the name of a surveillance program under the NSA that
compels tech companies like Microsoft, Google, YouTube, Apple, etc.
to grant access to user data on their servers.
• Optic Nerve
• SIGINT Enabling Project
Internet Privacy: 10 Ways to Increase
Your Data Privacy and Anonymity Online
1. Clear Your Cache and Delete Temporary Internet Files
2. Use Incognito or Private Browsing Mode
3. Use Extensions That Protect Your Privacy Online
4. Use the Tor Network to Surf the Internet
5. Switch Search Engines
6. Use a Trusted Service for Instant Messaging
7. Review Your Choice of Operating System
8. Choose the Right VPN
9. Use Good Sense to Judge Whether an App Is Requesting Excess Permissions
10. Some Other Tools for Maintaining Internet Privacy and Anonymity Online
https://sectigostore.com/blog/internet-privacy-anonymity-in-the-age-of-internet-
surveillance/
Software Security
• The above numbers provide enough motivation for hackers to exploit security
loopholes in mobile applications and hackers try to leverage any or all of the
following things from unsecured codes:
• Hackers gain login credentials of any website or device; for example, email, banking,
social networking websites, etc. Anubis banking Trojan is a notorious example in this
category, which enters the user’s device by downloading compromised apps, some
of which are even hosted on the official app stores of Android. Once a device is
infected, the Trojan forces it to send and receive SMS, read contact lists, request
permission to access device location, allow push notifications, and determine the IP
address of the mobile connection along with access to personal files on the mobile
device.
• In May 2019, WhatsApp acknowledged that its app was vulnerable to spyware from
an Israeli firm NSO group that could infect a mobile device simply by calling a user
on WhatsApp from an unknown number.
Customer Information
• Apart from losing crucial user data, the loss can come in
the form of both misuses of user information as well as
lawsuits from affected parties. While the positive of
undertaking security drills is that customers stay loyal
and trust the brand, the negative is the loss of
customers’ confidence forever. Companies should
realize that at the center of their business lies the
confidence of their customers in their brand. Thus, the
rationale for app development should rightfully consider
this aspect of the business.
Loopholes in Mobile App Security
Reverse Engineering
• Android apps are developed in Java with an integrated
development environment (IDE) like Eclipse. These Java apps can
be reversed with various tools available on the internet. With
Android, the bytecode can be altered and packed again in the
form of APK files. Reversing Android apps can easily provide test
login credentials, insights into bad design, details about the
libraries and classes used. It can also provide details about the
type of encryption used in the app. This can help the attacker is
not only hacking one device but multiple devices using the same
decryption method.
Insecure Platform Usage
Ignoring Updates
• Many Android developers do not update their apps regularly or pay heed
to the OS patches issued by Android, which results in a lack of protection
against newly found vulnerabilities. Updates cover the latest security
patches and ignoring the same can expose applications to the latest
security risks.
Rooted Devices
• The Android OS lets users root their devices using third-party apps with
some warning issued to them. However, not every user understands that
their rooted device exposes it to manipulation from hackers and malware.
For developers, it, thus, becomes essential either not to allow their app to
run in a rooted environment or issue regular warnings to users.
iOS App Security Risks
Unlike Android, Apple iOS operating system strictly enforces security features
and is a closed operating system. Apps cannot communicate with other apps or
directly access the directories or data of other apps. iOS apps are developed in
native Objective C language with tools like Xcode. It is based on the same ARM
version of XNU kernel as that of OSX, which is used in Apple’s laptops and Mac
computers.
Jailbreak
• Jailbreaking is a popular term used in the context of Apple devices. It involves
finding an exploit in the kernel that allows users to run unsigned code on
mobile devices. Jailbreaking is tethered, which means that every time a user
reboots their phone, it should be connected to a laptop or run a jailbroken
code. While untethered jailbreak means that the code will remain on the phone
even after a reboot.
iOS App Security Risks
User Authentication
• iOS offers device-level security through Face ID and Touch ID and claims that they are secure because
they use a processor separate from the rest of the OS. It is called the Secure Enclave, which runs on a
dedicated microkernel. However, hackers have shown that Touch ID can be compromised, most notably
with a device called GrayKey, which makes brute-forcing the passcode guessing easy by doing away
with the need to wait between attempts at guessing. When app developers use Touch ID systems to
protect data or services within their apps, they are also exposed to this type of vulnerability.
Insecure Data Storage
• Most apps store data in SQL databases, cookies, binary data stores, or even as common text. These
storage locations can be accessed by hackers when the operating system, framework, or compiler is
vulnerable. Also, jailbreaking devices lead to data exposure. When hackers gain access to the database,
they modify the app and collect the information on their machines. Jailbroken devices expose even the
most sophisticated encryption algorithms.
Security experts have also found that insecure data storage is one of the most common vulnerabilities in
iOS devices, which hackers exploit to steal passwords, financial information, and personal data or users.
Common Application Risks
Lack of encryption
• Encryption is a method of transporting data in ciphered
code which cannot be viewed without matching it with a
secret key. According to data by Symantec, nearly 13.4
percent of consumer devices and 10.5 percent of
enterprise devices do not have encryption enabled,
which can easily expose sensitive data as plain text.
Using a high-level of data encryption ensures that the
app cannot be easily cracked.
Malicious code injection