Security Properties
Authenticity- something happened in ur assumption
Integrity- no data changed since authentic event
Confidentiality- only known to some parties
Privacy-protection of personal info
Availability- up and running- with high quality
Different ways how systems can be attacked in
Attacks on industrial control systems
E.g→ Stuxnet- attack on nuclear facilities in Iran- disabled- Denial of service attack
software- centrifuges - attacked the speed of rotation- destroyed it
Computer Worm
software that was created for a good cause initially.
send updates to UNIX operating system in a particular network
How to find targets to attack?
thousands of devices found on internet
many attackers dont go for large-scale breaches.
Attacking the normal user?
-Phishing
Malware
Viruses, Worms and trojans
Virus-
small piece of code written can copy itself
can corrupt files
append, impend, or embed itself. to another program
runs and spreads
Worm-
similar to virus, but it is a standalone program.
uses weakness in system to execute the worm
can spead via networking
Trojan:
-malware hidden in a seeminlgy legitimate piece of software(word.exe)
Do only careless people get malware?
probably, but malware can also spread without user interaction.
e.g→via content(flash) in advertisement on normal new websites
anti-malware programs,ant-virus, anti-pot keeps needing to be updated
- motivate person to access a website
-Ransomware
and solution
Ransomware- solution?
Bot-
DDOS attacks in detail
Distributed Denial of Service(DDoS)
DDoS attack from a service(router, web server, etc)
Two types of DDos Attacks
a)Distributed SYN Flood Attack
TCP attack- three way handshare
final ACK message is not sent
to a targeted router through a ping attack- ping message to particular IP Address.
many router dont allow pings.
a lot of requests than necessary and target router gets exchuasted.
fake IP addresses due to packets
connection is never established.
Flood TYpes
a) Direct DDoS attack- master zombies, slave zombies, attack
b) Reflector DDoS attack- more serious nature
multiple attackers, severe in detection.
risk management techniques?
Risk management- right security controls in place
What kind of weaknesses can be exploited?
buffer overflow?
Buffer overflow- cant go beyond that. programmer does not check limits of array bound . input is not properly sanitized.
-solution- randomize adressing
Command Injection-
goal of attacker is to execute an arbitrary command add in OS.
cookies, online forms
Cross-site Scripting(XSS)
Prevention-
Anti-virus software
SQL Injection- code is injected as SQL command and tampers database.
prevented easily by checking and sanitizing commands.
Other Attacks
-Attacks via DMA(direct memory access)
can potentially be used to read arbitrary parts of memory.
dont let anyone attach devices to your computers.
Physical (hard-disk access)
prevention- disk encryption, self-encryption disks
Privacy and how to solve
Privacy issues
If product is free, you are the product..
companies build large user profile can be leaked
Privacy Enhancing technologies
The Onion Router
How TOR works
How Tor Browser Works→
Step 1- Alice(Client) will first get Tor nodes from directory server(Dave).
Step 2- Once Alice gets it, can create a random pathway to destination server(Bob).
TOR the onion router-
multiple layers of encryption
E.g of TOR
hide data transmitting
Deep Web vs Dark Web
Dark Web- client and server are hidden(both sides use TOR)
Deep Web-content only accessible with KNOWN ADDRESS
invisible web - not indexed by search engines. hidden web