IS 376 NOVEMBER 5, 2013 2013 DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
ISRT IS 376 OCTOBER 28, 2014 INTERNET SECURITY THREAT REPORT  2014.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Lecturer: Fadwa Tlaelan
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Chapter 14: Simulation, Graphics, and Other Applications Chapter 14 Simulation, Graphics, and Other Applications Page 148 In order to gain insight into.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
C8- Securing Information Systems
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Operating system Security By Murtaza K. Madraswala.
Types of Electronic Infection
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Security CS Introduction to Operating Systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Information Security in Distributed Systems Distributed Systems1.
Malicious Software.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Role Of Network IDS in Network Perimeter Defense.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
CS Chapter 3 – Operating SystemsPage 49 Operating Systems An operating system is a set of programs through which a computer manages its resources.
Chapter 40 Internet Security.
Instructor Materials Chapter 7 Network Security
Operating system Security
Security in Networking
NET 311 Information Security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Security.
Faculty of Science IT Department By Raz Dara MA.
Security.
Chap 10 Malicious Software.
Operating System Concepts
Presentation transcript:

IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge

COMPUTER SECURITY COMPUTERS AND NETWORKS WERE ORIGINALLY DEVELOPED TO FACILITATE ACCESS, NOT TO RESTRICT IT. SOFTWARE/HARDWARE SYSTEMS KNOWN AS FIREWALLS ARE OFTEN USED TO PROVIDE CHOKE POINTS FOR COMPUTER SYSTEMS. THEY PREVENT UNAUTHORIZED LOGINS FROM THE OUTSIDE WORLD.THEY PREVENT UNAUTHORIZED LOGINS FROM THE OUTSIDE WORLD. THEY AUDIT THE TRAFFIC ENTERING AND EXITING THE SYSTEM.THEY AUDIT THE TRAFFIC ENTERING AND EXITING THE SYSTEM. THEY MAY BE USED TO BLOCK OUTGOING DATA TO UNAUTHORIZED DESTINATIONS.THEY MAY BE USED TO BLOCK OUTGOING DATA TO UNAUTHORIZED DESTINATIONS. IS /5/13 PAGE 2

IS /5/13 PAGE 3 DENIAL OF SERVICE ATTACKS DENIAL OF SERVICE ATTACKS CONSIST OF THE CONSUMPTION OF A LIMITED RESOURCE, USUALLY NETWORK CONNECTIVITY, IN AN EFFORT TO DENY LEGITIMATE ACCESS TO THAT RESOURCE. IN THIS TYPE OF ATTACK, THE ATTACKER BEGINS THE PROCESS OF ESTABLISHING A CONNECTION TO THE VICTIM MACHINE, BUT DOES IT IN SUCH A WAY AS TO PREVENT THE ULTIMATE COMPLETION OF THE CONNECTION. IN THE MEANTIME, THE VICTIM MACHINE HAS RESERVED ONE OF A LIMITED NUMBER OF DATA STRUCTURES REQUIRED TO COMPLETE THE IMPENDING CONNECTION. THE RESULT IS THAT LEGITIMATE CONNECTIONS ARE DENIED WHILE THE VICTIM MACHINE IS WAITING TO COMPLETE BOGUS "HALF-OPEN" CONNECTIONS.

IS /5/13 PAGE 4VIRUSES A VIRUS IS A COMPUTER PROGRAM FILE CAPABLE OF ATTACHING TO DISKS OR OTHER FILES AND REPLICATING ITSELF REPEATEDLY, TYPICALLY WITHOUT USER KNOWLEDGE OR PERMISSION. SOME VIRUSES ATTACH TO FILES SO WHEN THE INFECTED FILE EXECUTES, THE VIRUS ALSO EXECUTES. OTHER VIRUSES SIT IN A COMPUTER'S MEMORY AND INFECT FILES AS THE COMPUTER OPENS, MODIFIES OR CREATES THE FILES. SOME VIRUSES DISPLAY SYMPTOMS, AND SOME VIRUSES DAMAGE FILES AND COMPUTER SYSTEMS.

IS /5/13 PAGE 5 HOW DO VIRUSES WORK? A COMPUTER VIRUS PIGGYBACKS ON ANOTHER FILE TO INFECT A SYSTEM. WHEN A USER RUNS AN INFECTED PROGRAM, THE COMPUTER STARTS BY COPYING THE PROGRAM FROM THE DISK (OR THE WEB), WHERE IT IS STORED AND INACTIVE, INTO RAM, WHERE IT CAN BE EXECUTED. THE VIRAL CODE BEGINS RUNNING FIRST, WHILE THE INFECTED PROGRAM IS STILL QUIESCENT. THE VIRUS COPIES ITSELF IN A PART OF RAM SEPARATE FROM THE PROGRAM SO THAT IT CAN CONTINUE ITS WORK EVEN AFTER THE USER STARTS RUNNING OTHER SOFTWARE. ITS INITIAL WORK DONE, THE VIRUS PASSES CONTROL BACK TO THE INFECTED PROGRAM. WHEN THE USER RUNS A DIFFERENT PROGRAM, THE DORMANT VIRUS BEGINS RUNNING AGAIN. IT INSERTS A COPY OF ITSELF INTO THE PREVIOUSLY UNINFECTED SOFTWARE SO THAT THE CYCLE OF VIRULENCE CAN REPEAT.

IS /5/13 PAGE 6 FIGHTING VIRUSES VARIOUS TECHNIQUES HAVE BEEN DEVELOPED TO COMBAT COMPUTER VIRUSES. GENERIC ANTIVIRAL PROGRAM FLAGS ACTIVITIES - SUCH AS THE ALTERATION OF CRITICAL SITES IN RAM OR PARTICULAR FILES ON DISK - THAT ARE LIKELY TO ARISE FROM A VIRUS IN ACTION. PREVENTING THESE ILLICIT ACTS WILL NOT ELIMINATE THE VIRUS BUT CAN STOP IT FROM INFECTING ADDITIONAL PROGRAMS OR INTERFERING WITH THE COMPUTER'S NORMAL OPERATION. SIGNATURE SCANNER SEARCHES A USER'S DISKS LOOKING FOR FRAGMENTS OF PROGRAM CODE THAT APPEAR IN KNOWN VIRUSES. ANTIVIRAL SNAPSHOTS CAPTURE MATHEMATICAL "FINGERPRINTS" OF CRUCIAL PROGRAMS AND DATA. SUBSEQUENT CHANGES STRONGLY SUGGEST VIRAL INFECTION. ADVANCED ALGORITHMS CAN USE THE ORIGINAL FINGERPRINTS TO RECOVER A PRISTINE PROGRAM FROM THE VIRUS-ALTERED VERSION.

WORMS WORMS ARE PARASITIC COMPUTER PROGRAMS THAT REPLICATE, BUT UNLIKE VIRUSES, DO NOT INFECT OTHER COMPUTER PROGRAM FILES. WORMS CAN CREATE COPIES ON THE SAME COMPUTER, OR CAN SEND THE COPIES TO OTHER COMPUTERS VIA A NETWORK. WORMS OFTEN SPREAD VIA OR CHAT APPLICATIONS. IS /5/13 PAGE 7

IS /5/13 PAGE 8 PROTECTION AGAINST WORMS STEP ONE A WORM FINDS A TARGET BY SCANNING INTERNET ADDRESSES AT RANDOM UNTIL IT FINDS ONE LEADING TO A LOCAL NETWORK. IT THEN ISSUES REQUESTS TO A LOCAL SERVER PROGRAM, SUCH AS ONE GOVERNING OR FILE EXCHANGES. WHEN THE PROGRAM ANSWERS, THE WORM TRIES TO CRAWL IN. PART ONE: DETECTION STEP TWO WHEN THE WORM ATTACKS A NETWORK PROTECTED BY A DEDICATED MACHINE USING WORM-DETECTION SOFTWARE, SOME OF ITS RANDOM REQUESTS WILL TARGET THAT MACHINES ADDRESSES, WHICH ARE UNLISTED. THE MACHINE CAN THUS DETERMINE, WITH HIGH RELIABILITY, THAT THE REQUESTS ARE HOSTILE.

IS /5/13 PAGE 9 PROTECTION AGAINST WORMS STEP THREE THE DEDICATED MACHINE RESPONDS WITH FAKE SERVICES THAT PRESENT THE WORM WITH THE APPEARANCE OF A NETWORK FULL OF MACHINES AND SERVICES. THE FALSE FAÇADE TRICKS THE WORM INTO REVEALING ITS IDENTITY, SO THAT IT CAN BE TRACKED TO EVERY MACHINE IN THE NETWORK. PART TWO: DISINFECTION STEP FOUR ONCE THE WORM IS CORNERED, ADMINISTRATORS ISOLATE INFECTED MACHINES, CLEAN THEIR FILES OF EVERY TRACE OF THE WORM, AND PATCH THE OUTER WALL OF THE NETWORK SO THAT THE SAME KIND OF WORM CAN NEVER PENETRATE THAT FAR AGAIN.

IS /5/13 PAGE 10 TROJAN HORSES A TROJAN HORSE IS A MALICIOUS PROGRAM THAT PRETENDS TO BE A BENIGN APPLICATION. A TROJAN HORSE PROGRAM PURPOSEFULLY DOES SOMETHING THE USER DOES NOT EXPECT. TROJAN HORSES ARE NOT VIRUSES SINCE THEY DO NOT REPLICATE, BUT THEY CAN BE JUST AS DESTRUCTIVE. ONE TYPE OF TROJAN HORSE, KNOWN AS A LOGIC BOMB, IS SET TO EXECUTE WHENEVER A SPECIFIC EVENT OCCURS (E.G., A CHANGE IN A FILE, A PARTICULAR SERIES OF KEYSTROKES, A SPECIFIC TIME OR DATE).

IS /5/13 PAGE 11 PORT SCANNERS A NETWORKED COMPUTER GENERALLY HAS ONE PHYSICAL CONNECTION (E.G., A CABLE) CONNECTING IT TO THE NETWORK. BEFORE CLOGGING THE NETWORK WITH HEAVY TRAFFIC, TRANSMITTING MACHINES WILL SEND A SHORT MESSAGE TO MAKE SURE THAT THE RECEIVING MACHINE WILL ACCEPT THE TYPE OF MESSAGE BEING SENT, I.E., TO SEE IF THE RECEIVERS PORT FOR THAT TYPE OF MESSAGE IS OPEN. PORT SCANNER SOFTWARE IS USED TO DETERMINE WHETHER A MACHINE HAS ANY OPEN PORTS AND, IF SO, A MALICIOUS SENDER CAN EXPLOIT THAT VULNERABILITY BY FLOODING THE PORT WITH TRAFFIC, CAUSING A BUFFER OVERFLOW IN THE RECEIVERS MEMORY, WHICH CAN CAUSE THE MACHINES MEMORY TO BE OVERWRITTEN WITH BITS THAT CAN ALTER THE MACHINES BEHAVIOR. HOWEVER, THE MACHINE HAS SEVERAL NETWORK PORTS, 16-BIT PREFIXES THAT INDICATE WHAT KIND OF MESSAGES ARE BEING COMMUNICATED ( , FILE TRANSFER, WEB PAGE, ETC.).

IS /5/13 PAGE 12 PACKET SNIFFERS ARE SOFTWARE PROGRAMS THAT INTERCEPT AND LOG TRAFFIC PASSING OVER A NETWORK. PACKET SNIFFERS COMMONLY USED BY NETWORK ADMINISTRATORS TO ANALYZE NETWORK TRAFFIC PROBLEMS AND TO DETECT ATTEMPTS AT NETWORK INTRUSION, THEY CAN ALSO BE USED TO GAIN INFORMATION TO ASSIST SOMEONE WHO WISHES TO INTRUDE, TO SPY ON OTHER NETWORK USERS, AND TO COLLECT SENSITIVE INFORMATION (E.G., PASSWORDS).

IS /5/13 PAGE DATA BREACH REPORT - A 4 Threat Overview: ACTORS

IS /5/13 PAGE DATA BREACH REPORT - A 4 Threat Overview: ACTIONS

IS /5/13 PAGE DATA BREACH REPORT - A 4 Threat Overview: ASSETS

IS /5/13 PAGE DATA BREACH REPORT - A 4 Threat Overview: ATTRIBUTES