<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>alexsandrosのブログ</title>
<link>https://ameblo.jp/alexsandros/</link>
<atom:link href="https://rssblog.ameba.jp/alexsandros/rss20.xml" rel="self" type="application/rss+xml" />
<atom:link rel="hub" href="http://pubsubhubbub.appspot.com" />
<description>ブログの説明を入力します。</description>
<language>ja</language>
<item>
<title>Lecture 3 Revision</title>
<description>
<![CDATA[ <p><span style="font-size:1.4em;">Server-Side Web Application Attacks</span></p><p>&nbsp; Securing server-side web applications of often considered more difficult than protecting other systems</p><p>&nbsp; Traditional network security devices can block traditional network attacks, but cannot always block web application attacks</p><ul><li>Many network security devices ignore the content of HTTP traffic</li></ul><p>&nbsp; Zero-day attack - an attack that exploits previously unknown vulnerabilities, victims have not time to prepare for or defend against the attack</p><p>&nbsp; Many server-side web application attacks target the input that the applications accept from users</p><p>&nbsp; Such common web application attacks are:</p><ul><li>Cross-site scripting</li><li>SQL injection</li><li>XML injection</li><li>Command injection/directory traversal</li></ul><p>&nbsp;</p><p>Cross-site scripting</p><p>&nbsp; &nbsp;Injecting scripts into a Web application server to direct attacks at unsuspecting clients.</p><p>&nbsp; &nbsp;When victim visits injected Website:</p><ul><li>Malicious instructions are sent to victim’s browser</li></ul><p>&nbsp; &nbsp;Some XSS attacks are designed to steal information:</p><ul><li>Retained by the browser when visiting specific sites</li></ul><p>&nbsp; &nbsp;An XSS attack requires a website meets two criteria:</p><ul><li>Accepts user input without validating it</li><li>Uses input in a response</li></ul><p>&nbsp;</p><p><span style="font-size:1.4em;">Client-Side Application Attacks</span></p><p>• Web application attacks are server-side attacks</p><p>• Client-side attacks target vulnerabilities in client applications that interact with a compromised server or process malicious data</p><p>• The client initiates connection with the server, which could result in an attack.</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Client-Side Attacks</span></p><p>&nbsp;Cookies</p><p>&nbsp; &nbsp; •Cookies store user-specific information on user’s local computer</p><p>&nbsp;Types of cookies:</p><p>&nbsp; &nbsp; • <span style="font-weight:bold;">First-party cookie </span>- cookie created by Web site user is currently viewing.</p><p>&nbsp; &nbsp; • <span style="font-weight:bold;">Third-party cookie</span> - site advertisers place a cookie to record user preferences.</p><p>&nbsp; &nbsp; • <span style="font-weight:bold;">Session cookie</span> - stored in RAM and expires when browser is closed.</p><p>&nbsp; &nbsp; • <span style="font-weight:bold;">Persistent cookie</span> - recorded on computer’s hard drive and does not expire when the browser closes</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;•Also called a tracking cookie</p><p>&nbsp; &nbsp; • <span style="font-weight:bold;">Locally shared object</span> (LSO) - can store up to 100 KB of data form a website</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;•More complex than the simple text found in a regular cookie</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;•Also called a Flash cookie</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Denial of Service (DoS)</span></p><p>&nbsp;Denial of service (DoS)</p><p>&nbsp; &nbsp; &nbsp; &nbsp; • A&nbsp;deliberate attempt to prevent authorized users from accessing a system by overwhelming it with requests</p><p>&nbsp;Most DoS attacks today are distributed denial of service (DDoS)</p><p>&nbsp; &nbsp; &nbsp; &nbsp; • Using hundreds or thousands of zombie computers in a botnet to flood a device with requests</p><p>&nbsp;</p><p>&nbsp;Ping flood attack</p><ul><li>The ping utility is used to send large number of ICMP echo request messages</li><li>&nbsp;In a ping flood attack, multiple computers rapidly send a large number of ICMP echo requests to a server</li></ul><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; •Server will drop legitimate connections and refuse new connections</p><p>&nbsp;</p><p>&nbsp;Smurf attack</p><ul><li>Tricks devices into responding to false requests to an unsuspecting victim</li><li>An attacker broadcasts a ping request to all computers on the network but changes the address from which the request came from (called spoofing)</li><li>Appears as if victim’s computer is asking for response from all computers on the network</li><li>All computers send a response to the victim’s computer so that it is overwhelmed and crashes or becomes unavailable to legitimate users</li></ul><p>&nbsp;</p><p>&nbsp;SYN flood attack</p><ul><li>•Takes advantage of procedures for initiating a session</li></ul><p>&nbsp;In a SYN flood attack against a web server:</p><ul><li>The attacker sends SYN segments in IP packets to the server</li><li>Attacker modifies the source address of each packet to computer addresses that do not exist or cannot be reached</li></ul><p style="text-align: center;"><a href="https://stat.ameba.jp/user_images/20180415/17/alexsandros/c0/81/j/o0846077714171140888.jpg"><img alt="" contenteditable="inherit" height="386" src="https://stat.ameba.jp/user_images/20180415/17/alexsandros/c0/81/j/o0846077714171140888.jpg" width="420"></a></p><p style="text-align: center;">&nbsp;</p><p><span style="font-size:1.4em;">Poisoning</span></p><p>&nbsp;Poisoning</p><ul><li>The act of introducing a substance that harms or destroys</li></ul><p>&nbsp;Two types of attacks inject “poison” into a normal network process to facilitate an attack:</p><ul><li>ARP poisoning</li><li>DNS poisoning</li></ul><p>&nbsp;ARP Poisoning</p><ul><li>Attacker modifies MAC address in ARP cache to point to a different computer</li></ul><div style="text-align: center;"><a href="https://stat.ameba.jp/user_images/20180415/17/alexsandros/ac/50/j/o1316038814171143102.jpg"><img alt="" contenteditable="inherit" height="124" src="https://stat.ameba.jp/user_images/20180415/17/alexsandros/ac/50/j/o1316038814171143102.jpg" width="420"></a></div><div style="text-align: center;"><a href="https://stat.ameba.jp/user_images/20180415/17/alexsandros/cf/da/j/o1238041414171143841.jpg"><img alt="" contenteditable="inherit" height="140" src="https://stat.ameba.jp/user_images/20180415/17/alexsandros/cf/da/j/o1238041414171143841.jpg" width="420"></a></div><div style="text-align: left;"><p>&nbsp;DNS poisoning</p><ul><li>Domain Name System is the current basis for name resolution to IP address</li><li>DNS poisoning substitutes DNS addresses to redirect a computer to another device</li></ul><p>&nbsp;Two locations for DNS poisoning</p><ul><li>Local host table</li><li>External DNS server</li></ul></div><div style="text-align: center;"><a href="https://stat.ameba.jp/user_images/20180415/17/alexsandros/e8/9d/j/o1007075914171144758.jpg"><img alt="" contenteditable="inherit" height="317" src="https://stat.ameba.jp/user_images/20180415/17/alexsandros/e8/9d/j/o1007075914171144758.jpg" width="420"></a></div><div style="text-align: left;">&nbsp;</div>
]]>
</description>
<link>https://ameblo.jp/alexsandros/entry-12368596773.html</link>
<pubDate>Sun, 15 Apr 2018 17:46:22 +0900</pubDate>
</item>
<item>
<title>Lecture 2 Revision</title>
<description>
<![CDATA[ <p><span style="font-size:1.4em;">Three types of malware have the primary traits of circulation and/or infections:</span></p><p>1. Viruses</p><p>&nbsp; &nbsp;Viruses perform two actions:</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Unloads a payload to perform a malicious action.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Reproduces itself by inserting its code into another file on the same computer.</p><p>&nbsp; &nbsp;</p><p>&nbsp; &nbsp; Examples of virus actions:</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Cause a computer to repeatedly crash.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Erase files from or reformat hard drive.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Turn off computer’s security settings.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Reformat the hard disk drive.</p><p>&nbsp;&nbsp;</p><p>&nbsp; &nbsp; Viruses cannot automatically spread to another computer.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Relies on user action to spread.</p><p>&nbsp; &nbsp; Viruses are attached to files.</p><p>&nbsp; &nbsp; Viruses are spread by transferring infected files.</p><p>&nbsp;</p><p>2. Worms</p><p>&nbsp; &nbsp; Worm - malicious program that uses a computer network to replicate</p><p>&nbsp; &nbsp; Sends copies of itself to other network devices</p><p>&nbsp; &nbsp; Worms may:</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Consume resources or</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Leave behind a payload to harm infected systems</p><p>&nbsp; &nbsp; Examples of worm actions</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Deleting computer files</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Allowing remote control of a computer by an attacker</p><p>&nbsp;</p><p>3. Trojans</p><p>&nbsp; &nbsp; Trojan horse (Trojan) - an executable program that does something other than advertised</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Contain hidden code that launches an attack</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Sometimes made to appear as data file</p><p>&nbsp; &nbsp; Example</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;User downloads “free calendar program”</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Program scans system for credit card numbers and passwords</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Transmits information to attacker through network</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href="https://stat.ameba.jp/user_images/20180415/16/alexsandros/63/ff/p/o0785027814171102002.png"><img alt="" height="149" src="https://stat.ameba.jp/user_images/20180415/16/alexsandros/63/ff/p/o0785027814171102002.png" width="420"></a></p><p>&nbsp;</p><p><span style="font-size:1.4em;">Concealment</span></p><p>&nbsp; &nbsp;Rootkits - software tools used by an attacker to hide actions or presence of other types of malicious software.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;•Hide or remove traces of log-in records, log entries.</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Collect Data</span></p><p>&nbsp; &nbsp;Ransomware - prevents a user’s device from properly operating until a fee is paid</p><p>&nbsp; &nbsp; &nbsp; &nbsp; • Is highly profitable</p><p>&nbsp; &nbsp; &nbsp; &nbsp; • Nearly 3 percent of those users who have been infected pay the ransom without questions, generating almost $5 million annually</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Social Engineering Attacks</span></p><p>&nbsp; •Social engineering - a means of gathering information for an attack by relying on the weaknesses of individuals</p><p>&nbsp; •Social engineering attacks can involve psychological approaches as well as physical procedures</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Phishing</span></p><p>&nbsp; &nbsp;Phishing - sending an email claiming to be from legitimate source</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;–Tries to trick user into giving private information</p><p>&nbsp; &nbsp;Many phishing attacks have these common features:</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Deceptive web links</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Logos</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Urgent request</p><p>&nbsp; &nbsp;Variations of phishing attacks</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Pharming - automatically redirects user to a fraudulent Web site</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Spear phishing - email messages target specific users</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Whaling - going after the “big fish”</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Targeting wealthy individuals</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Vishing (voice phishing)</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Attacker calls victim with recorded “bank” message with callback number</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Victim calls attacker’s number and enters private information</p><p>&nbsp;</p>
]]>
</description>
<link>https://ameblo.jp/alexsandros/entry-12368583892.html</link>
<pubDate>Sun, 15 Apr 2018 16:00:30 +0900</pubDate>
</item>
<item>
<title>Lecture 1 Revision</title>
<description>
<![CDATA[ <p><span style="font-size:1.4em;">Defining Information Security</span></p><p><span style="font-size:1.4em;">&nbsp; </span><span style="font-size:1em;">- Three types&nbsp;of information&nbsp;protection: often called&nbsp;CIA&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;1.&nbsp;Confidentiality</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Only approved&nbsp;individuals&nbsp;may&nbsp;access information.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;2. Integrity&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Information is&nbsp;correct and&nbsp;unaltered.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;3. Availability&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Information is&nbsp;accessible to&nbsp;authorized users.<br>&nbsp;-&nbsp;Protections implemented&nbsp;to secure&nbsp;information.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;1. Authentication&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; • Ensures the&nbsp;individual is&nbsp;who they&nbsp;claim to&nbsp;be.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;2. Authorization&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; • Provides permission&nbsp;or approval&nbsp;to specific&nbsp;technology resources.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;3. Accounting&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Provides tracking&nbsp;of events.</span></p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Who&nbsp;Are the&nbsp;Attackers?</span></p><p><span style="font-size:1em;">&nbsp; Hacker: The person who&nbsp;uses computer&nbsp;skills to&nbsp;attack computers.&nbsp;</span></p><ul><li><span style="font-size:1em;"><span style="font-weight:bold;">Blackhat</span>&nbsp;</span><span style="font-size:1em;"><span style="font-weight:bold;">hackers</span>: Violate computer&nbsp;security&nbsp;for personal&nbsp;gain and&nbsp;the goal&nbsp;is&nbsp;to inflict&nbsp;malicious damage.&nbsp;</span></li><li><span style="font-size:1em;"><span style="font-weight:bold;">White hat&nbsp;hackers</span>: Goal to&nbsp;expose security&nbsp;flaws,&nbsp;not to&nbsp;steal or&nbsp;corrupt data.</span></li><li><span style="font-size:1em;"><span style="font-weight:bold;">Gray hat&nbsp;hackers</span>: Goal is&nbsp;to break&nbsp;into a&nbsp;system without&nbsp;owner ’s permission,&nbsp;but not&nbsp;for their&nbsp;own advantage.</span></li></ul><p>&nbsp;</p><p>&nbsp;</p><p><span style="font-size:1.4em;">Categories&nbsp;of&nbsp;attackers</span></p><p><span style="font-size:1em;"><span style="font-weight:bold;">1. Cybercriminals</span></span></p><p><span style="font-size:1em;">&nbsp; &nbsp;A network&nbsp;of attackers,&nbsp;identity thieves, spammers,&nbsp;financial fraudsters.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - More&nbsp;highly motivated.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -&nbsp;Willing&nbsp;to take&nbsp;more risk.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -&nbsp;Well-funded&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - More tenacious&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; The goal&nbsp;of a&nbsp;cybercriminal&nbsp;is financial&nbsp;gain.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp;&nbsp;<span style="font-weight:bold;">Cybercrime</span> - targeted attacks&nbsp;against financial&nbsp;networks and&nbsp;the&nbsp;theft of&nbsp;personal information.</span></p><p><span style="font-size:1em;">&nbsp; Financial&nbsp;cybercrime is&nbsp;divided into&nbsp;two categories:</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; • Individuals and&nbsp;businesses.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Use stolen&nbsp;data,&nbsp;credit card&nbsp;numbers,&nbsp;online financial&nbsp;account information, or Social&nbsp;Security numbers&nbsp;to&nbsp;profit from&nbsp;victims.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; • Businesses and governments.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;• Attempt to&nbsp;steal research&nbsp;on a&nbsp;new&nbsp;product so&nbsp;they can&nbsp;sell&nbsp;it to an unscrupulous&nbsp;</span><span style="font-size:1em;">foreign supplier.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; Advanced Persistent Threat (APT) - multiyear intrusion&nbsp;campaign that&nbsp;targets highly&nbsp;sensitive economic, proprietary,&nbsp;or national&nbsp;security information.</span><br><br><span style="font-size:1em;"><span style="font-weight:bold;">2. Script kiddies</span><br>&nbsp;&nbsp;Script kiddies&nbsp;- individuals who&nbsp;want to&nbsp;attack computers&nbsp;yet they&nbsp;lack the&nbsp;knowledge&nbsp; of&nbsp;computers and&nbsp;network needed&nbsp;to do&nbsp;so.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp;&nbsp;They&nbsp;download automated&nbsp;hacking software&nbsp;(scripts)&nbsp;from websites.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp;&nbsp;Over 40&nbsp;percent of&nbsp;attacks require&nbsp;low or&nbsp;no skills.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp;&nbsp;<span style="font-weight:bold;">Exploit kits</span>&nbsp;- automated attack&nbsp;package that&nbsp;can be&nbsp;used without&nbsp;an advanced&nbsp;knowledge&nbsp; &nbsp;of&nbsp;computers.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp;• Script kiddies&nbsp;either rent&nbsp;or&nbsp;purchase them.</span></p><p>&nbsp;</p><p><span style="font-size:1em;">3.&nbsp;<span style="font-weight:bold;">Brokers</span></span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Brokers-attackers who&nbsp;sell knowledge&nbsp;of a&nbsp;vulnerability to&nbsp;other&nbsp;attackers or&nbsp;governments.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Often hired&nbsp;by the&nbsp;vendor&nbsp;to uncover&nbsp;vulnerabilities.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; • Instead, they&nbsp;do not&nbsp;report&nbsp;it to&nbsp;the&nbsp;vendor but&nbsp;sell&nbsp;the information&nbsp;about the vulnerabilities&nbsp;</span><span style="font-size:1em;">to the&nbsp;highest bidder.</span></p><p>&nbsp;</p><p><span style="font-size:1em;">4.&nbsp;<span style="font-weight:bold;">Insiders</span></span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Employees, contractors,&nbsp;and business&nbsp;partners.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Over 48&nbsp;percent of&nbsp;breaches attributed&nbsp;to insiders.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Examples of insider attacks:&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; • Health&nbsp;care worker&nbsp;may&nbsp;publicize celebrities’&nbsp;health records.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Disgruntled&nbsp;over an upcoming&nbsp;job termination.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; • A stock&nbsp;trader might&nbsp;conceal&nbsp;losses through&nbsp;fake transactions.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp; • Employees&nbsp;may be&nbsp;bribed&nbsp;or coerced&nbsp;into&nbsp;stealing data&nbsp;before&nbsp;moving to&nbsp;a&nbsp;new job.</span></p><p>&nbsp;</p><p><span style="font-size:1em;">5.&nbsp;<span style="font-weight:bold;">Cyberterrorists</span></span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Cyberterrorists&nbsp;&nbsp; &nbsp;- an attacker&nbsp;whose&nbsp;motivation may&nbsp;be&nbsp;ideological or&nbsp;for&nbsp;the sake&nbsp;of&nbsp;principles or&nbsp;beliefs.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;• Almost&nbsp;impossible to&nbsp;predict when or&nbsp;where the&nbsp;attack&nbsp;may occur.</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Targets may include:&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; &nbsp;• A&nbsp;small group&nbsp;of computers&nbsp;or&nbsp;networks that&nbsp;can&nbsp;affect the&nbsp;largest&nbsp;number of&nbsp;users.&nbsp; &nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Example:&nbsp;&nbsp; &nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp; &nbsp; • Computers&nbsp;that control&nbsp;the&nbsp;electrical power&nbsp;grid of a&nbsp;state or&nbsp;region.</span></p><p>&nbsp;</p><p><span style="font-size:1em;">6.&nbsp;<span style="font-weight:bold;">Hacktivists</span></span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Hacktivists&nbsp;&nbsp; &nbsp;- attackers who&nbsp;attack&nbsp;for ideological&nbsp;reasons&nbsp;that are&nbsp;generally&nbsp;not as&nbsp;well-defined as&nbsp;a&nbsp;cyberterrorist ’s motivation.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Examples of hacktivist attacks:&nbsp;</span></p><ul><li><span style="font-size:1em;">Breaking into&nbsp;a website&nbsp;and changing&nbsp;the&nbsp;contents on&nbsp;the site&nbsp;to make&nbsp;a&nbsp;political statement.&nbsp;</span></li><li><span style="font-size:1em;">Disabling a website belonging to&nbsp;a&nbsp;bank because&nbsp;the bank&nbsp;stopped accepting&nbsp;payments that&nbsp;were deposited&nbsp;into accounts&nbsp;belonging&nbsp;to the&nbsp;hacktivists.</span></li></ul><p>&nbsp;</p><p><span style="font-size:1em;">7.&nbsp;<span style="font-weight:bold;">State-sponsored attackers&nbsp;</span></span></p><p><span style="font-size:1em;"><span style="font-weight:bold;">&nbsp;&nbsp;</span>&nbsp;State-sponsored attacker&nbsp;- an attacker&nbsp;commissioned&nbsp;by the&nbsp;governments to&nbsp;attack enemies’&nbsp;information systems.</span></p><ul><li><span style="font-size:1em;">May&nbsp;target foreign&nbsp;governments&nbsp;or even&nbsp;citizens&nbsp;of government who&nbsp;are considered&nbsp;hostile&nbsp;or threatening.&nbsp;</span></li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;Examples of attacks:&nbsp;</span></p><ul><li><span style="font-size:1em;">Malware targeting&nbsp;government&nbsp;or military&nbsp;computers.&nbsp;</span></li><li><span style="font-size:1em;">Citizens having&nbsp;their&nbsp;email messages&nbsp;read&nbsp;without their&nbsp;knowledge.</span><br>&nbsp;</li></ul><p>&nbsp;</p><p><span style="font-size: 22.4px;">Defenses Against Attacks</span></p><p><span style="font-size:1em;">&nbsp;Five fundamental&nbsp;security principles&nbsp;for defenses.&nbsp;</span></p><p>&nbsp;</p><p><span style="font-size:1em;">1. Layering&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Information security&nbsp;must be&nbsp;created&nbsp;in layers.&nbsp;</span></p><ul><li><span style="font-size:1em;">A&nbsp;single defense&nbsp;mechanism&nbsp;may be&nbsp;easy&nbsp;to circumvent.</span></li><li><span style="font-size:1em;">Making it&nbsp;unlikely&nbsp;that an&nbsp;attacker can&nbsp;break&nbsp;through all&nbsp;defense&nbsp;layers.&nbsp;</span></li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;Layered security&nbsp;approach.</span></p><ul><li><span style="font-size:1em;">Can&nbsp;be useful&nbsp;in&nbsp;resisting&nbsp;a&nbsp;variety of&nbsp;attacks.&nbsp;</span></li><li><span style="font-size:1em;">Provides the&nbsp;most&nbsp;comprehensive protection.</span></li></ul><p>&nbsp;</p><p><span style="font-size:1em;">2. Limiting&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Limiting access to information:&nbsp;</span></p><ul><li><span style="font-size:1em;">Reduces the&nbsp;threat&nbsp;of&nbsp;it.&nbsp;</span></li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;Only those&nbsp;who must&nbsp;use data&nbsp;should&nbsp;be granted&nbsp;access.&nbsp;</span></p><ul><li><span style="font-size:1em;">Should&nbsp;be limited&nbsp;to only&nbsp;what they&nbsp;need&nbsp;to&nbsp;do their&nbsp;job.&nbsp;</span></li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;Methods of&nbsp;limiting access.&nbsp;</span></p><ul><li><span style="font-size:1em;">Technology-based&nbsp;&nbsp; &nbsp;--&gt; such as&nbsp;file permissions.&nbsp;</span></li><li><span style="font-size:1em;">Procedural&nbsp;&nbsp; &nbsp;--&gt; such as&nbsp;prohibiting document&nbsp;removal&nbsp;from premises.</span></li></ul><p>&nbsp;</p><p><span style="font-size:1em;">3. Diversity&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Closely related to layering&nbsp;</span></p><ul><li>Layers must be different (diverse)&nbsp;</li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;If attackers penetrate one layer:&nbsp;</span></p><ul><li>Same techniques will be unsuccessful in breaking through other layers.</li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;Breaching one security layer does not compromise the whole system.<br>&nbsp; &nbsp;Example of diversity&nbsp;</span></p><ul><li><span style="font-size:1em;">Using security products from different manufacturers.</span></li></ul><p>&nbsp;</p><p><span style="font-size:1em;">4. Obscurity&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Obscuring&nbsp;inside details&nbsp;to&nbsp;outsiders.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Example:&nbsp;not revealing&nbsp;details.&nbsp;</span></p><ul><li><span style="font-size:1em;">Type of&nbsp;computer.&nbsp;</span></li><li><span style="font-size:1em;">Operating system&nbsp;version.&nbsp;</span></li><li><span style="font-size:1em;">Brand&nbsp;of software&nbsp;used.</span></li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;Difficult for an attacker&nbsp;to devise&nbsp;attack if&nbsp;system&nbsp;details are&nbsp;unknown.</span></p><p>&nbsp;</p><p><span style="font-size:1em;">5. Simplicity</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Nature&nbsp;of information&nbsp;security&nbsp;is complex.&nbsp;</span></p><p><span style="font-size:1em;">&nbsp; &nbsp;Complex security systems:&nbsp;</span></p><ul><li><span style="font-size:1em;">&nbsp;Can be&nbsp;difficult&nbsp;to understand&nbsp;and troubleshoot.</span></li><li><span style="font-size:1em;">&nbsp;Are often&nbsp;compromised&nbsp;for ease&nbsp;of&nbsp;use by&nbsp;trusted users.</span></li></ul><p><span style="font-size:1em;">&nbsp; &nbsp;A&nbsp;secure system&nbsp;should be simple&nbsp;from the&nbsp;inside.</span></p><p>&nbsp;</p><ul><li><span style="font-size:1em;">But complex&nbsp;from&nbsp;the outside.</span></li></ul>
]]>
</description>
<link>https://ameblo.jp/alexsandros/entry-12368372101.html</link>
<pubDate>Sat, 14 Apr 2018 19:42:17 +0900</pubDate>
</item>
<item>
<title>The new semester begin</title>
<description>
アメンバー限定公開記事です。
</description>
<link>https://ameblo.jp/alexsandros/amemberentry-12355819458.html</link>
<pubDate>Mon, 26 Feb 2018 07:38:43 +0900</pubDate>
</item>
</channel>
</rss>
