Confident Cyber Security - Jessica Barker
Confident Cyber Security - Jessica Barker
Confident Cyber Security - Jessica Barker
Jessica Barker
To FC, thanks for being on my team at home
and at work.
And, to everyone in the cyber security
community – including those of you who are
just joining us – let’s keep learning, sharing and
making the world a safer place.
CONTENTS
Acknowledgements
An introduction to cyber security
PART FIVE
The future of cyber security and what it means
for your career
11 Cyber security in different industries
Celebrity, entertainment and pop culture
Journalism and the media
Sport
Social media and influencers
Small and medium enterprises
Education
Conveyancing fraud
Notes
12 Cyber security at the board level
Cyber security frameworks
Cyber security governance
Risk appetite and risk tolerance
The board perspective on cyber security
Board members as challengers
Cyber security as a business risk
Notes
13 Pursuing a cyber security career
Qualifications and certifications
What do employers want?
What can you do to get a job in the industry?
Jack Daniel, BSides co-founder
Sophia McCall, Captain of Team UK at the European
Cyber Security Challenge
Note
14 The variety of cyber security careers
The start-up CEO
The infosec pundit
The professor
The journalist
Alternative paths into cyber security
The ethical hacker
The lawyer
The analyst
The national cyber security advisor
The security awareness leader
Specialists and generalists
The security contractor
A final word: Keep a learning mindset
Notes
Appendix: Answers
Index
LIST OF FIGURES
0.1
1.1 Cybercrime bell curve
5.1 Alice and Bob’s email
LIST OF TABLES
Notes
1 Wiener, N (1961) Cybernetics: Or control and communication in the animal and the
machine, MIT Press.
2 www.nytimes.com/1981/07/26/business/case-of-the-purloined-password.html.
(archived at https://perma.cc/QYK4-GY8T)
3 Stoll, C (2007) The Cuckoo’s Egg: Tracking a spy through the maze of computer
espionage, Gallery Books.
4 www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-intern
et-110218. (archived at https://perma.cc/Q44R-24WJ)
5 Storr, W (2015) The kid hackers who starred in a real-life WarGames, 16 September,
www.telegraph.co.uk/film/the-414s/hackers-wargames-true-story (archived at http
s://perma.cc/M6ZK-RVS6).
6 FC (2020) CyberUp: why we believe the Computer Misuse Act needs reform (blog),
Cygenta. 13 July, https://blog.cygenta.co.uk/cyberup (archived at https://perma.cc/G
C7X-2ULV).
PART ONE
Why cyber security?
01
What cyber security is
Cyber security has technically only been around for a few
decades, yet it is now so mainstream that it’s in the dictionary,
defined as:
Measures taken to protect a computer or computer system (as on the
internet) against unauthorized access or attack.
Hackers
The pen testers we referred to earlier are hackers, often called
ethical hackers. If they should be called anything beyond
‘hacker’, it would probably be more precise to call them legal
hackers (because saying they are ethical does not necessarily
confirm that they are also operating legally). I’m going to
generally call them hackers, and when they are not legal/ethical
hackers, I will call them criminals or cyber criminals.
Hackers use the same tools and techniques as cyber
criminals, but there is an important fundamental difference:
hackers do so within the boundaries of the law. Hackers operate
within a scope and contract, hacking an organization with that
organization’s permission, to identify vulnerabilities and
suggest mitigations to enable the organization to fix them (or at
least, to be aware of them), and to prevent the criminals from
exploiting them. Hackers often work as penetration testers (see
below) and can be employed by the company directly,
particularly if the company is large, or work for specialist cyber
security companies or operate freelance. Hackers are in
incredibly trusted roles and good intentions are not enough:
you may want to test the defences of an organization, website
or application for the right reasons, but without an agreement
from the organization itself, you are in uncertain territory, at
the least. If you carry out such a hack without permission, you
will probably find that you are no longer a hacker, you are a
criminal.
Criminals
Criminal hackers are at the opposite end of the scale to ethical
or legal hackers; these are people who carry out illegal hacking
activity to circumvent the access controls of organizations. We’ll
look in more detail at cybercrime, and cyber criminals, later in
this chapter (and, indeed, throughout the book).
Cybercrime
Criminal hackers can be split into different groups according to
their motivations and methods. This is important to
understand, as different groups will target different people and
companies. Organizations have the best chance of defending
themselves when they understand which group or groups are
likely to attack them and why, as that means they can target
their defences.
Script kiddies
Many of the people that financially motivated criminal gangs
have working for them would not be classed as hackers, but as
script kiddies. Script kiddies are individuals who do not have a
great deal of hacking knowledge or skill, but are able to use
other people’s code and pre-built tools to perform attacks on
organizations. There are many tools freely available, many of
which have been built for pen testing purposes, that are used
by script kiddies. There are also videos on platforms such as
YouTube that will show people, step by step, how to hack
without them needing to understand what they are doing. So,
financially motivated criminal operators will hire script kiddies
to work for them – but script kiddies also carry out attacks on
organizations under their own steam.
Nation-state hackers
Over the last few years, we have heard more about one type of
hacking group than ever before: nation-state hackers. There is
often talk in cyber security of the advanced persistent threat
(APT) – which refers to the level of sophistication that can be
achieved by nation-state hackers; they have the budget, time,
resources, motivation and skill to pursue a target until they
have compromised it. The truth is that most cybercrime does
not fall under this umbrella; most cybercrime is not carried out
by sophisticated nation-state hackers, but rather is low-skill
criminal activity that compromises known vulnerabilities or
exploits people. Most people, most organizations, are not
targeted by nation states (however, they can sometimes be
caught up in collateral damage).
Figure 1.1 Cybercrime bell curve
Non-malicious insiders
Non-malicious insiders are people with good intentions
working in organizations. Most people come to work with the
intention of doing their job well, or at least not doing harm to
the organization they work for. However, for many reasons,
people often unwittingly expose data throughout the course of
their work. This can be as simple as sending an email of
sensitive information and making a mistake with the email
address, so that it goes to the wrong person; or sending an
email to a large group of people in different organizations and
putting their email addresses in the ‘to’ field of the email,
exposing the email addresses to everyone on the list, rather
than in the ‘bcc’ field, which would keep the email addresses
confidential.
In the last few years, one of the most common threats to
organizations takes advantage of non-malicious insider activity:
cyber criminals socially engineering non-malicious insiders. In
the ClubCISO Live Vote of 2020, 100 chief information security
officers were asked to categorize the cause of material data
breaches that had occurred in their organization in the
previous 12 months: 40 per cent said malicious cyber criminals
and 42 per cent said non-malicious insiders.13 It is no
coincidence that these two numbers are so aligned: many cyber
attacks carried out by malicious external actors take advantage
of non-malicious insiders (we’ll look at this more in Chapter 3).
Non-malicious insider activity includes people being duped
by the kind of scams we see in spear-phishing emails, but there
are many other instances beyond this. It can be someone
misconfiguring a firewall so that the network defences of an
organization are not as strong as they could be; a developer
who stores personal data in an Amazon web server but leaves
access open to the internet rather than locking it down; an
administrator who sets the username and password to their
server as ‘admin’ and ‘admin’; and individuals using weak
passwords, which they re-use elsewhere because the burden of
creating and remembering strong, unique passwords for each
online account is too great without the use of a password
manager.
This data is entirely derived from publicly available sources. At this time our
review suggests this resulted from an authorized third party’s misconfiguration of
an AWS server, and the data is no longer available.14
In a similar example, in 2019 the UpGuard Cyber Risk team found more than 540 million
records of Facebook users were exposed by publicly accessible Amazon S3 buckets used by
two third-party apps to store user data. This information included plain text application
passwords, account names, user IDs, interests and relationship status. The information was
exposed by media company Cultura Colectiva in an Amazon S3 bucket which they
misconfigured, enabling anyone to download the data.15 In 2017, research found that 7 per
cent of all Amazon S3 buckets were exposed and 35 per cent were unencrypted.16 With more
and more data being collected and stored by companies, it is perhaps no surprise that this kind
of data exposure is so common.
a multinational bank;
a political party;
a local estate agent.
Notes
1 Spear-phishing is a form of social engineering: fraudulent messages are sent by
criminals to their targets, appearing to be from a trusted source, such as the
target’s friend, boss or bank. Spear-phishing messages will usually play on your
emotions to entice you into opening an attachment, sharing your login credentials
or clicking a link. Spear-phishing differs from phishing because it is targeted, and
this makes it more likely to be successful.
2 Weaver, M (2017) Teenage hackers motivated by morality not money, study finds,
Guardian, 21 April, www.theguardian.com/society/2017/apr/21/teenage-hackers-mo
tivated-moral-crusade-money-cybercrime (archived at https://perma.cc/MRK2-38C
Q)
3 Heathman, A (2016) 17-year-old given rehabilitation order for 2015 TalkTalk hack,
Wired, 13 December, www.wired.co.uk/article/17-year-old-boy-sentenced-talk-talk-
hack (archived at https://perma.cc/JFD4-LVGG)
4 IBM (2019) IBM X-Force Threat Intelligence Index Report, www.ibm.com/security/d
ata-breach/threat-intelligence (archived at https://perma.cc/VZ4Y-LCL3)
5 The United States Department of Justice (2018) Two Iranian men indicted for
deploying ransomware to extort hospitals, municipalities, and public institutions,
causing over $30 million in losses, Department of Justice, 28 November, www.justic
e.gov/opa/pr/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-mu
nicipalities-and-public (archived at https://perma.cc/2RUW-CUZR)
6 Barrett, B (2018) DOJ indicts hackers for ransomware that crippled Atlanta, Wired,
28 November, www.wired.com/story/doj-indicts-hackers-samsam-ransomware
(archived at https://perma.cc/K6PM-3B6Q)
7 ibid.
8 Robertson, A (2018) Two Iranian men charged with the ransomware attack that
took down Atlanta, The Verge, 28 November, www.theverge.com/2018/11/28/18116
213/iranian-hackers-samsam-ransomware-indictment-bitcoin-sanctions-wallet-atla
nta (archived at https://perma.cc/MSD2-TKST)
9 United States District Court for the Central District of California (2018)Criminal
complaint, 8 June, www.justice.gov/usao-cdca/press-release/file/1091951/download
(archived at https://perma.cc/3RTA-8FJS)
10 Corkery, M and Goldstein, M (2017) North Korea said to be target of inquiry over
$81 million cyberheist, New York Times, 22 March, www.nytimes.com/2017/03/22/b
usiness/dealbook/north-korea-said-to-be-target-of-inquiry-over-81-million-cyberhei
st.html?_r=0 (archived at https://perma.cc/X248-6GJC)
11 Epstein, EJ (2017) How America Lost its Secrets: Edward Snowden, the man and the
theft, Knopf, New York
12 Croft, J (2020) Morrisons wins appeal over data breach, Financial Times, 1 April, w
ww.ft.com/content/aa023d43-e9c3-493f-a866-33dac520c7b7 (archived at https://per
ma.cc/3KPB-W3JM)
13 ClubCISO (2020) Information Security Maturity Report 2020: Full survey results, w
ww.clubciso.org/downloads (archived at https://perma.cc/G2KM-MTSP)
Notes
1 YouTube (2019) YouTube for press, www.youtube.com/intl/en-GB/about/press
(archived at https://perma.cc/AM8M-5FEM)
2 Facebook Investor Relation (2019) Facebook reports third quarter 2019 results,
Facebook, 30 October, https://investor.fb.com/investor-news/press-release-details/2
019/Facebook-Reports-Third-Quarter-2019-Results/default.aspx (archived at https://
perma.cc/AD5V-QYZ4)
8 Lamont, T (2016) Life after the Ashley Madison affair, Observer, 28 February, www.t
heguardian.com/technology/2016/feb/28/what-happened-after-ashley-madison-was
-hacked (archived at https://perma.cc/WBZ2-CKFJ)
9 Office of the Privacy Commissioner of Canada, 2016 PIPEDA Report of Findings
2016-005, 22 August, www.priv.gc.ca/en/opc-actions-and-decisions/investigations/in
vestigations-into-businesses/2016/pipeda-2016-005 (archived at https://perma.cc/LK
M6-5FY4)
PART TWO
The technical side of cyber
security
03
Technical vulnerabilities
Every year, more and more technical vulnerabilities are
reported by security researchers. It’s important that the
security industry keeps up to date with vulnerabilities and their
details, so that we can respond appropriately and put
mitigations in place – however you use your new cyber security
skills in your life and career, you will need to keep abreast of
this kind of technical vulnerability. Fortunately, there are tools
already around to help you cultivate your vulnerability
awareness.
1. Injection
Injection flaws allow an attacker to ‘inject’ data into a system,
which can then enable the attacker to execute commands or
access data without proper authorization. It is worth noting
that cross-site scripting (XSS; included in this 2017 list as A7) is
actually an injection flaw but is considered to be noteworthy
enough to have its own separate listing in the OWASP top ten.
One of the most devastating injection attack vectors is against
applications that use a structured query language (SQL)
database for their backend data management. SQL is the
standard language for database management, and SQL injection
has been used in many cyber attacks, including the TalkTalk
breach of 2015.
2. Broken authentication
Another large group of issues is included in this simple term,
with typical broken authentication mechanisms including the
use of default accounts, systems that are vulnerable to brute-
force attacks using dictionary attacks and unexpired session
tokens that allow criminals to steal credentials and carry on
using them after the original user has logged off.8 Broken
authentication vulnerabilities are often exploited by fraudsters
who use the compromised accounts to perform identity (ID)
theft, money laundering or to simply steal data or products.
6. Security misconfiguration
Perhaps the largest category on the OWASP list is the security
misconfiguration section. Almost all server-side issues are due
to misconfiguration; these can vary from default accounts being
left unchanged through to unprotected files and directories.
There are many issues that fall into this category, and with the
rise of Internet of Things (IoT) devices that often have weak or
default passwords (as we see in the analysis of the Dyn DDoS on
page 75) the relevance of this category is only likely to keep
increasing.
7. Cross-site scripting
A special category for a particular form of injection attack,
cross-site scripting (XSS) is the second most prevalent issue in
the OWASP top ten and is found in around two-thirds of all
applications.9 XSS allows an attacker to run malicious code
against another user of an application; for example,
compromising end users in order to gain access to their private
data or even deliver malware to the victim. In this way it differs
from other forms of web attack, such as injection attacks, that
target the application itself and not the end users.
8. Insecure deserialization
This is a difficult category to understand if you are not dealing
with application creation or testing day to day. Applications
often send data to and from other services, databases, cache
servers, file systems and API calls, and this data is usually
unreadable to the end user, as it all happens in the background.
It does this via serialization, which is the encoding of data in a
specific way readable by other systems and not intended for
humans to see or interactive with. Insecure deserialization
relates to flaws that allow an attacker to deserialize (decode)
the data and modify it to either alter the application’s logic or in
some cases perform remote code execution, which is one of the
most serious attacks in cyber security. Remote code execution is
when a cyber criminal is able to access a device and make
changes to it, without needing physical access.
Notes
1 Mitre Corporation (2018) History, 10 December, https://cve.mitre.org/about/history.h
tml (archived at https://perma.cc/SUD7-D4EA)
2 Özkan, S (2010) CVE details, www.cvedetails.com (archived at https://perma.cc/WQ9
C-X3WM)
3 A web application is any computer program that uses web browsers and
technology to function over the internet, for example ecommerce websites, email
services, social media websites and online forms.
4 OWASP (2017) Top ten web application security risks, https://owasp.org/www-proje
ct-top-ten (archived at https://perma.cc/NQK9-ESS4)
5 BBC (2016) Boy, 17, admits TalkTalk hacking offences, BBC News, 15 November, ww
w.bbc.co.uk/news/uk-37990246 (archived at https://perma.cc/JQ4N-BLM7)
6 BBC (2018) TalkTalk hack attack: Friends jailed for cyber-crimes, BBC News, 19
November, www.bbc.co.uk/news/uk-england-stoke-staffordshire-46264327
(archived at https://perma.cc/AMB8-HZL9)
7 Press Association (2018) Two men jailed for involvement in TalkTalk hacking,
Guardian, 19 November, www.theguardian.com/uk-news/2018/nov/19/two-men-jail
ed-talktalk-hacking-customer-data (archived at https://perma.cc/R7R6-A8WC)
8 In dictionary attacks, the cyber criminal uses a wordlist with the aim of
compromising accounts that are protected by commonly used words, phrases or
passwords seen in previous breaches.
Design
The way hardware, software, technology and information
systems are designed is central to the security of those systems,
which of course relies upon the people involved with the
design. In cyber security, many problems are rooted in flawed
design; if security is built into technology, then it would be
tackled at the root cause.
The UK National Cyber Security Centre (NCSC) advocate an
approach they call ‘Secure by Default’:
To be truly effective, security needs to be built-in from the ground up.
Hardware needs to be designed to resist physical attacks, and provide
secure storage to other components. Operating systems need to take
advantage of hardware security features, and applications need to use the
right operating system security features.1
Creation
Building secure products and services involves ensuring that
the process of making those products and services has security
at its heart. This builds upon the Secure by Default approach we
have just covered, requiring that the manufacturing process
consider security at every stage. Those who are responsible for
creating technology must assess the process from every angle
with security in mind, and this involves mitigating the potential
for accidental and malicious insider threats.
In modern production, it is common for different elements in
the manufacturing process to be created at different places by
different suppliers. This means it can be much more difficult
for producers to have complete oversight of every stage of
production, which potentially increases the potential for
accidents and/or malicious insiders to introduce gaps or flaws
in security. The news article published by Bloomberg in 2018
and reproduced in the following case study highlights these
issues.
Testing
The testing stage is crucial for security. This relies upon people
in many regards: the creator or developer recognizing the need
for good testing, and allowing for the time it takes as well as
understanding what ‘good testing’ involves; the skills and
objectivity of the testers; and the willingness and ability of the
creator or developer to take any results from the testing and
incorporate any changes needed.
Security testing can take many forms, depending upon what
needs to be assessed. A piece of code, a new door and a process
for organizing paperwork are all things which may need
assessing from a security perspective – but how you would do
so varies. A piece of code would be analysed by a penetration
tester to identify whether it contained any bugs or malicious
code. A penetration tester with expertise in physical security
could assess a new door to identify whether there are any flaws
in how it was installed or whether security controls on the door
are lacking or could be circumvented. A process for organizing
paperwork would assess what paperwork is being handled and
by whom, where it will be transported and stored, how this
process will be logged, and who could have access to it at any
point. The extent to which all of this testing and assessing is
completed to a standard that benefits security depends on the
skills and mindset of the testers as well as the willingness and
ability of the creator to take feedback.
A very human part of a security tester’s job is to understand
both the legal and ethical elements of what they do and have a
careful consideration of both. For example, a penetration tester
can be exposed to a great deal of personal and organizational
data throughout the course of their work. They may discover
information about an individual or company’s activities that
they find morally ambiguous, but not illegal. Adhering to
professional ethics is a fundamental part of being a security
tester (we will explore ethics in more detail later in this
chapter).
Use
How we interact with technology and information has many
security implications, which is why cyber security awareness-
raising training is so important in organizations. When people
think of the insider threat in cyber security, they often think
immediately of the malicious insider threat. However, the non-
malicious insider threat – the accidental insider – is much more
common. The accidental insider is someone just trying to do
their job, but because of how a system is designed or built – or
how they use a system or interact with information – they make
a mistake that causes a breach. It could be a weak password,
which is compromised by a cyber criminal, or talking about
company confidential information on a crowded train. It could
be clicking a malicious link in a phishing email, accidentally
emailing a sensitive file to the wrong person or making errors
in how a system is set up, thereby exposing more data than
intended.
In October 2019, the personal details of 250,000 US and UK job seekers were publicly
exposed after two recruitment companies failed to make the settings of their Amazon
S3 buckets private.6
In 2018, Go Daddy (the world’s largest domain name registrar) failed to secure their
Amazon cloud services and exposed configuration information for 24,000 systems
within GoDaddy’s hosting infrastructure, essentially representing a detailed map of a
large part of the internet.7
In 2017, World Wrestling Entertainment (WWE) exposed the personal data of three
million fans due to misconfiguration of an Amazon S3 bucket.8
Two-factor authentication
Two-factor authentication (2FA) acts like a second layer of
defence on your online accounts, and most websites where you
make an account (email, social media, popular shopping sites)
have 2FA available. You set 2FA up in the security settings of
your accounts and, at its most basic level, it involves entering
your mobile phone number. Then, when you try to access the
account from a device that you don’t usually use, the website
requires you to enter, as well as your password, a unique one-
time code that is sent to your mobile by SMS. This means that if
your password is compromised in any way, and a criminal
attempts to get into your account with it, they would need the
unique code that is sent to you by SMS message. The benefit of
this is twofold: your account is better protected, and if you
receive a 2FA code without prompting the site for one, it’s a
very strong indicator that your password has been
compromised and you should change it (on that site and, if you
are re-using that password, anywhere else).
Abuse
A fundamental, inescapable element of cyber security is the
abuse of technology, systems and information. When it comes
to cyber attacks and breaches, people are often keen to
attribute blame. If a company gets hacked and valuable data
gets into the hands of criminals, there will generally be
speculation on what the company did wrong, or did not do
right. Of course, it is important for organizations to be
responsible when it comes to cyber security, and have measures
in place to protect their data (which can be anything from
intellectual property to sensitive information on their
employees to important data on their customers). However, if
we consider a hierarchy of blame, we must acknowledge that
cyber criminals who take advantage of security vulnerabilities
and abuse technology should be top of the list.
Ethical dilemmas
A fundamental element of the people part of cyber security is
that of ethics. We have already looked at this in terms of the
ethical considerations of security testing, but there are of
course other dimensions to explore. To explore the ethical
dilemmas of cyber security, let’s work through three scenarios
as a thought exercise (my thoughts on each are included after
the last scenario).
Destruction
In the lifecycle of technology and data, and how people are
central to security considerations, we must not overlook the
importance of how data is deleted and technology is destroyed.
This can be as simple, and personal, as what an individual does
with their old mobile phone when they buy a new one, through
to the more complicated issues of how large organizations
delete data in a timely and secure manner and how they
dispose of hardware when it is no longer required.
Software can be used to overwrite data. There are many
different government and industry standards that relate to
software-based overwriting, with the aim of ensuring that it is
carried out to a sufficient standard. Like every stage of the
lifecycle, secure data destruction relies on the human element
to consider the importance of what they are doing in relation to
the impact it could have on information security. And, like
every other stage, there is the danger of malicious action when
it comes to data destruction. This can include malicious actors
accessing and abusing data that the data owner failed to
adequately destroy as well as the malicious destruction of data.
A sobering example of malicious data destruction is included in
Chapter 10, which outlines the cyber attack experienced by the
shipping giant Maersk in 2018.
Notes
1 National Cyber Security Centre (2018) Secure by Default, National Cyber Security
Centre, 7 March, www.ncsc.gov.uk/information/secure-default (archived at https://p
erma.cc/B2SA-ACPJ)
2 Robertson, J and Riley, M (2018) The big hack: How China used a tiny chip to
infiltrate US companies, Bloomberg Businessweek, 4 October, www.bloomberg.co
m/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-a
merica-s-top-companies (archived at https://perma.cc/AVR7-XBRN)
3 Naughton, J (2018) The tech giants, the US and the Chinese spy chips that never
were… or were they? Guardian, 13 October, www.theguardian.com/commentisfree/
2018/oct/13/tech-giants-us-chinese-spy-chips-bloomberg-supermicro-amazon-apple
(archived at https://perma.cc/W4KB-7HC3)
4 Greenberg, A (2019) Planting tiny spy chips in hardware can cost as little as $200,
Wired, 10 October, www.wired.com/story/plant-spy-chips-hardware-supermicro-ch
eap-proof-of-concept (archived at https://perma.cc/Q75M-3Y2Z)
7 Seals, T (2018) GoDaddy leaks ‘map of the internet’ via Amazon S3 Cloud Bucket
misconfig, Threatpost, 13 August, https://threatpost.com/godaddy-leaks-map-of-the-
internet-via-amazon-s3-cloud-bucket-misconfig/135009 (archived at https://perma.c
c/7VAD-LJXS)
8 Cimpanu, C (2017) Exposed server leaked details of over 3 million WWE fans,
Bleeping Computer, 7 July, www.bleepingcomputer.com/news/security/exposed-ser
ver-leaked-details-of-over-3-million-wwe-fans/ (archived at https://perma.cc/VDZ6-8
HNA)
9 Wright, M and Horton, H (2019) Bank customers lose £9.1 million in five years to
‘sim swap’ scams, Telegraph, 30 November, www.telegraph.co.uk/news/2019/11/30/
bank-customers-lose-91-million-five-years-sim-swap-scams (archived at https://per
ma.cc/9CLX-629U)
10 Graff, G (2017) How a dorm room Minecraft scam brought down the internet,
Wired, 13 December, www.wired.com/story/mirai-botnet-minecraft-scam-brought-
down-the-internet (archived at https://perma.cc/EU5H-P5KH)
11 Hilton, S (2016) Dyn analysis summary of Friday October 21 attack (blog), Dyn, 26
October, https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack
(archived at https://perma.cc/RF7S-SJ5N)
12 Ragan, S (2016) Here are the 61 passwords that powered the Mirai IoT botnet, CSO
Online, 3 October, www.csoonline.com/article/3126924/here-are-the-61-passwords-t
hat-powered-the-mirai-iot-botnet.html (archived at https://perma.cc/TV66-VHK4)
13 OWASP (no date) Vulnerability disclosure cheat sheet, OWASP Cheat Sheet series,
https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_She
et.html (archived at https://perma.cc/39FZ-5UVS)
05
Social engineering
For decades, the cyber security industry (before it was even
called cyber security; when it was IT security, information
assurance, information security or infosec) focused heavily on
the technical side of attack and defence. Arguably, it still does.
Cybercriminals have taken this for the opportunity that it was,
and focused on targeting people rather than technology as a
means of gaining access to an organization, to information, to
money. This is social engineering: the manipulation of people in
order to gain access to information, assets or money that the
target would not or should not ordinarily give.
Victor Lustig
Here’s another example. In the wake of World War I, Victor
Lustig used his social engineering skills to become ‘the man
who sold the Eiffel Tower twice’. He did this having read that
Paris was having difficulty maintaining the Eiffel Tower due to
the cost. Armed with forged government stationery, Lustig
arranged a meeting with six scrap metal dealers in one of the
most prestigious hotels in Paris, the Hôtel de Crillon. Lustig
pretended to be the Director-General of the Ministry of Posts
and Telegraphs and told the dealers that they had been selected
based on their reputations as honest businessmen (red flag:
flattery). Lustig told the men that due to the cost of upkeep, and
because the Eiffel Tower was never intended to be permanent
anyway, the city intended to sell it for scrap. He stressed that
this must be kept confidential, to prevent public outcry (red
flag: social engineers will often stress that something must be
confidential; if their victim doesn’t discuss what is happening
with anyone, the attack is more likely to be successful). Lustig
told all the men to enter bids, but in his mind selected the one
he felt was most gullible due to his insecurities over his position
among the Parisian business community, Andre Poisson.
Poisson discussed the venture with his wife, who voiced
suspicions. To circumvent this, Lustig then ‘confessed’ to
Poisson that he did not make enough money as a government
minister and that this was the true reason for his need for
discretion (red flag: social engineers will often change their
story when they feel they are in danger of being caught out, and
will ‘let you in on their secret’ to make you feel closer to them).
Poisson felt reassured and had no reservation about paying a
bribe, so Lustig not only received funds for the fake sale of the
Eiffel Tower, but also obtained a large bribe on top. Poisson was
so embarrassed about falling for the con that he did not go to
the police (sadly, this too is quite common among victims of
social engineering scams). A month later, Lustig repeated the
scam, but, although his chosen victim informed the police this
time, he evaded arrest.2
Lustig made his living as a con artist, even carrying out a
social engineering attack on Al Capone and living to tell the tale.
During the depression, Lustig convinced Capone to invest
$50,000 in a fake stock deal. He kept the money for two months
and then went to Capone to tell him that the deal was off. Lustig
was no doubt risking his life, but he played this con perfectly by
producing the $50,000 to return to Capone, thus ‘proving’ his
honest character. When he expressed his upset that the deal
had fallen through because he was relying on the money,
Capone gifted him $5,000.
Frank Abagnale
There’s more. One of the most eye-opening accounts of social
engineering in modern years is the life story of Frank Abagnale,
which was the inspiration for the film Catch Me If You Can,
directed by Steven Spielberg and starring Leonardo DiCaprio.
Abagnale was born in 1948 in New York and, when his parents
separated, he turned to criminal activity aged 14, shoplifting
and scamming his father. He bought goods with his father’s
bank card and then returned the items for cash.
He continued to carry out financial fraud for many years,
using fake cheques to make an estimated $2.5 million. Abagnale
wanted to decrease the likelihood that he would be questioned
or caught cashing the fake cheques, and realized that if he could
borrow some professional credibility, he could take advantage
of people’s willingness to trust others from certain professions.
He therefore decided to pose as a pilot. He forged a pilot’s
licence and fake PanAm identity badge, which he used to
acquire a pilot’s uniform from the airline (red flag: authority).
The uniform and false identification enabled him to access free
flights and hotel stays around the world: he travelled, as a
passenger, over 1 million miles to 26 countries on over 250 free
flights.
Abagnale was not finished socially engineering his way
through new careers: he then went on to work as a doctor for
11 months. Next, he posed as a Harvard graduate as a way of
taking the bar exam, which he passed and which enabled him
to take a job in law. After his scamming was uncovered,
Abagnale was arrested in 1969 with 12 countries seeking his
extradition. He went to prison in France and Sweden before his
was extradited to the United States and sentenced to 12 years.
Perhaps unsurprisingly, even in prison he continued his social
engineering ways, receiving special treatment by posing as an
undercover inspector.
Abagnale was released in 1974 on condition that he would
work with the FBI for a few years, which he did, investigating
the scams of others. He continued to work with the FBI long
after he was required to by law, and founded a company
teaching others how to prevent fraud; he is a global keynote
speaker on the topic.3 Abagnale also funds, and teaches at, an
FBI summer camp programme for children in middle school
and high school, where they learn about the ethics of using
technology and computers.
At a conference in Amsterdam in 2019, I saw Abagnale
deliver a powerful speech about his past and the regret he feels
over what he did as a teenager. I spoke with Mr Abagnale
personally, asking him what he would say to young people with
his skills and mindset, and this is what he had to say:
I always try to remind young people that life is not short but is in fact very
long. When you make a mistake in your life, you do something to harm
someone, you mistreat someone, you deceive someone, that comes back
to haunt you as you get older and becomes a burden in your life that you
are constantly reflecting on and have to live with for many years. Even
though I know where my life is today, I never forget that I had to give up
five years of my youth in some very bad prisons and even today, 50 years
later, I not only have to live with the burden of what I did, but constantly
have to deal with some individuals who look upon me in a negative light,
don’t trust me and constantly judge me for what I did as a teenage boy
some 50 years ago.
Did you know?
Frank Abagnale is not the only social engineer to move from poacher to gamekeeper,
from criminal to criminal-catcher. In the 1990s, Kevin Mitnick was described by the US
Department of Justice as ‘the most wanted computer criminal in United States history’,
having allegedly ‘hacked’ into the computer systems of some of the world’s top
technology and telecommunications companies including Nokia, Fujitsu and Motorola.
Mitnick says himself that his activities were not hacking, but rather social engineering,
and he is now a computer security consultant and author.4
As soon as the transfer has gone through, Bob feels a sense of dread start to grow in the pit of
his stomach. He breaks out in a cold sweat as he suddenly begins to question whether he did
the right thing. He picks up the phone and calls the CEO’s office, anxious to hear that the email
was legitimate… but the CEO knows nothing of the email. She did not send it, and there is no
such acquisition taking place.
Bob, Alice and the company have become victims of what is sometimes called CEO fraud –
also called business email compromise (BEC) – and, unfortunately, it is too late to stop the
transfer or get the money back.
Hot states
We can turn to behavioural economics to understand what
happens in Bob’s brain to make him process the email
automatically, and only question its validity once the transfer
has been made. Thinking, Fast and Slow explains two ways of
thinking.5 The concept is also explored by Thaler and Sunstein
in Nudge.6 This work has been so influential that Richard Thaler
won the Nobel Prize for economics in 2017 for his contribution
to the field of behavioural economics. In Nudge, the authors
refer to two ways of processing information in our brains,
which they refer to as the Homer Simpson and the Spock ways
of thinking. When we’re processing information predominantly
with the Homer way of thinking, we are impulsive, emotionally
driven and short-termist: we do not consider the possible
unintended consequences of our actions. On the other hand,
when we’re predominantly processing information with the
Spock way of thinking, we are considered, cautious, rational
and forward-thinking: we weigh up many possible outcomes of
our actions. The Homer way of processing information is more
likely to dominate when we are in what Thaler and Sunstein
refer to as a ‘hot state’ and it is my observation that this is what
social engineering does: it puts people into ‘hot states’.7 How
does it do that? By using well-known triggers – the red flags we
have seen referenced throughout the social engineering
examples in this chapter, including authority, time pressure, the
need for confidentiality and flattery (as in the example with
Alice and Bob above), as well as temptation, appeals to
sympathy, shame and many more.
Sextortion
As we’ve seen, social engineering manipulates the emotions and
instincts of people to take advantage of them. If the target also
feels ashamed or embarrassed, as in the case of the
password/pornography email scam, then attackers know that
they are also more likely to keep quiet about what is happening,
which means the scam is more likely to be successful and less
likely to be reported to law enforcement.
Another type of attack that takes advantage of this
phenomenon is called online sexual coercion and extortion,
commonly known as ‘sextortion’. Sextortion attacks take many
forms, but one of the most frequent takes place over social
media.
Here’s how it works: the target, who we’ll call Sam, receives a
friendship or connection request from somebody who they
don’t know, but who they feel inclined to get to know – let’s call
them Alex. Alex looks like an attractive person, with the usual
personal information, likes and interactions that most profiles
have. Sam accepts the request, because – why not? They’re
flattered, tempted, intrigued and keen to make a connection
with this attractive person. Having made a connection, they
develop an online relationship and Alex sends more and more
pictures of themselves, including ones where they take their
clothes off. Perhaps even some video footage. Alex asks for the
same in return from Sam. Sam feels the pressure of temptation
and reciprocity: Alex has done something for Sam and so Sam
feels obliged to return the favour.
Reciprocity is why salespeople will offer customers a drink
when they enter a car showroom. It can be argued that the
human instinct to return a favour is hard-wired into our
evolutionary development, as before we had money to buy
goods and services, we traded based on reciprocity. Therefore,
if someone does us a favour, we feel obliged to return the
favour and we feel uncomfortable until we are even.
And so, this combination of temptation and reciprocity
encourages Sam to send explicit pictures or video footage of
themselves to Alex. At this point, unfortunately, Sam discovers
that Alex is not who they seemed. Once the explicit images have
been sent, Sam receives an extortion demand, requesting
payment (usually by bitcoin, money transfer or by providing
credit card details) and threatening that, if Sam doesn’t pay up,
the images will be released on the internet and sent to Sam’s
friends and family.
Many people quietly pay the ransom. Some do not, and never
hear from the criminals behind the scam again. Some pay once
and receive a second, then a third ransom message. Some
victims are targeted not for money, but for more explicit
photographs or videos. In 2017, the UK National Crime Agency
(NCA) found that the number of UK sextortion victims had risen
threefold in two years, with 1,304 cases reported that year.
There have been five known suicides in the UK as a result of
sextortion attacks. Unfortunately, we can be confident that the
reported number of sextortion cases is only the tip of the
iceberg, as many victims do not report the crimes to law
enforcement (which the criminals are of course relying upon).9
It is understandable why people pay the ransom, or send the
photographs being demanded, in return for the promise that
the compromising photos or footage will be deleted. However,
as with all ransom scenarios, we are dealing with criminals: the
people behind these attacks cannot be trusted to keep their
word. And, paying the ransom funds more criminal activity and
encourages the continuation of these crimes. Ideally, none of us
would ever be taken in by these social engineering attacks.
Unfortunately, they are getting more sophisticated and we are
only human. The good news is that awareness of social
engineering is higher than ever, and as more people become
attuned to the common type of attacks and the human emotions
they take advantage of, the less successful these common
attacks will be.
If you become a victim of a social engineering attack, whether
sextortion or otherwise, the best thing to do is report it to law
enforcement. When it comes to sextortion, many police forces
now have direct experience of working with victims and have
received specialist training not only in how to investigate or
report the crimes, but also in how to be sensitive to the victim.
EXERCISE 5.1 Hot state triggers
Here’s an example of an email. Read it carefully, and try to spot any ‘hot state triggers’ –
words or phrases that could be red flags for a social engineering attack. Are there any
other issues that should be investigated in this example?
Hi Sally
I’ve just landed in the States. We need to pay a supplier an overdue invoice,
it’s urgent and must be paid ASAP. I need you to keep this confidential – I
can’t go through the usual processes because there is an issue with fraud
internally. I’m trusting you to do this quickly and to keep it quiet. I know I
can rely on you.
Thanks
Phil
Notes
1 Surrowiecki, J (2014) Spy vs. spy, The New Yorker, 2 June, www.newyorker.com/mag
azine/2014/06/09/spy-vs-spy-3 (archived at https://perma.cc/T9CM-HGZB)
2 Johnson, JF (1961) The Man who Sold the Eiffel Tower, Double Day, Garden City, NY
3 Abagnale, F and Redding, S (2001) Catch Me If You Can: The true story of a real fake,
Mainstream, Edinburgh
4 Mitnick, KD and Simon, WL (2011) Ghost in the Wires: My adventures as the world’s
most wanted hacker, Little, Brown, New York
5 Khaneman, D (2011) Thinking, Fast and Slow, Farrar, Straus and Giroux, New York
6 Thaler, R and Sunstein, C (2008) Nudge: Improving decisions about health, wealth,
and happiness, Yale University Press, New Haven
7 Thaler, R and Sunstein, C (2008) Nudge: Improving decisions about health, wealth,
and happiness, Yale University Press, New Haven
8 Threat Intelligence Team (2019) The lucrative business of Bitcoin sextortion scams
(updated) (blog), Malwarebytes Labs, 22 August, https://blog.malwarebytes.com/sca
ms/2019/08/the-lucrative-business-of-bitcoin-sextortion-scams (archived at https://p
erma.cc/3NZH-5F73)
9 National Crime Agency (no date) Record numbers of UK men fall victim to
sextortion gangs (blog), NCA News, https://nationalcrimeagency.gov.uk/news/recor
d-numbers-of-uk-men-fall-victim-to-sextortion-gangs (archived at https://perma.cc/
M9PS-66NH)
06
Attacks that utilize social
engineering
Phishing
When we consider social engineering attacks, phishing emails
are a great place to start, partly because they are the most
common (albeit far from the only) form of social engineering.1
Phishing emails masquerade as coming from a legitimate
source (such as a bank) and try to coerce the recipient into
actions such as clicking a link, downloading an attachment,
sending money or inputting your credentials. Phishing emails
look like they come from a legitimate source, but they do not.
For example, the email may look like it comes from a social
media platform, such as LinkedIn, Twitter or Facebook, and
contains a link to ‘reset your password’ or ‘view messages’.
When you click the link, a couple of things might happen: you
might unwittingly download malware onto your device; or you
might open a page, which again may look legitimate, and be
prompted to input your credentials. So, in the example above,
you could open a page that looks identical to the Facebook login
page, but is in fact a fake page being run by cybercriminals. If
you put your username and password into that page, you are
handing them over to the criminals that run the page. There are
many, many different examples of phishing emails: this is just
one.
Spear-phishing
When many people think of phishing emails, they think of a
now well-established scam in which an email comes from
someone pretending to be a foreign prince, stating they have
come into an unexpected source of wealth and they would like
to share it with the recipient, if only the recipient would
transfer a relatively small sum of money to make that possible.
Phishing emails have evolved greatly from this scam, and many
of the most successful phishing emails can now be more
accurately categorized as spear-phishing emails, meaning they
are targeted. They may use the recipient’s name in the email,
they may purport to come from the target’s actual bank, or boss,
or best friend. Some spear-phishing emails target people in the
process of buying a house, coming from criminals who pose as
the solicitor requesting the deposit be paid using new bank
details. As we covered in the last chapter, some even contain
reference to an internet password that the target uses or has
used. Spear-phishing emails are unfortunately far more likely
to be successful than standard phishing emails and, because of
this, they have grown in volume phenomenally over the last
few years. In fact, spear-phishing emails represent one of the
most common ways in which organizations are compromised.
This is partly because they have a high success rate, and partly
because they can be used as a vehicle to carry out a number of
attacks, from fraud to credential compromise to ransomware.
The targeted nature of spear-phishing emails is a core
element in their success. Using a target’s name, appearing to be
sent from their boss, their bank, including their passwords –
this all lends the emails an air of legitimacy, it makes them
believable. We have become much more savvy to general
phishing emails, but spear-phishing emails are, unfortunately,
more likely to take us in.
However, as we saw in Chapter 5, we have seen a huge rise in
awareness of emails that use social engineering techniques. An
important factor in this growing awareness is the actions of
many large organizations: because they are seeing so many
attacks of this nature come in, and often have dealt with the
fallout of what happens when the attacks are successful, they
are spending effort, time and resource to make sure people are
aware of the risks. As more people understand spear-phishing
emails, and fewer people click on the links, download the
attachments or transfer the money, the criminals change their
methods. They move from emails to phone calls, social media,
and messaging platforms such as WhatsApp.
Voice-phishing or vishing
Social engineering over the telephone is sometimes called
vishing (voice phishing). Just like email spear-phishing, voice
phishing calls are used by criminals for all sorts of malicious
purposes. Let’s look at one fictional scenario.
Ransomware
Picture this: a small business owner receives an email that
looks as if it comes from the government, with the subject ‘Your
tax return’. The email states that there is important information
in the attachment relating to the company’s tax return, and that
this must be completed and returned within 48 hours, or a fine
will be issued. The business owner, feeling under pressure,
opens the attachment. The attachment contains no information.
When the business owner closes the attachment and attempts
to resume work, they discover that they cannot access any
information. Their files are locked. A pop-up box appears on
their screen informing them that their system has been
infected, all of their data is encrypted and they must pay a
ransom to receive the decrypt key and be able to access their
data once again. The ransom will usually need to be paid in
bitcoin, and sometimes the cyber criminals will be ‘helpful’ by
including ‘frequently asked questions’ on what bitcoin is and
how the target can get hold of some and make the transfer. This
is ransomware by social engineering: malicious software that
holds data to ransom.
Ransomware attacks have grown phenomenally in recent
years. Some ransomware attacks are particularly clever, in that
they will place the price of paying the ransom pretty low. It is
understandable why people and organizations pay up,
particularly if they have not backed up their data and feel their
only hope of getting access to the data back is to pay the
ransom. In some cases, losing the data could have serious
business ramifications, putting profits – and jobs – on the line.
However, there are many good reasons not to pay. Firstly, when
you’re the victim of a ransomware attack, you are negotiating
with criminals, and although they may say that they will give
you the decrypt key to access the data in return for payment,
they may not stay true to their word. In addition, by paying the
ransom, you are marking yourself as a target who will pay up,
and so you may find that you become a more frequent target of
cybercrime. In some cases, when victims pay the ransom, they
are sent a discount code to use in future attacks. Finally, paying
the ransom also supports the ransomware business model
(telling criminals that it is a worthwhile thing to keep doing)
and funds their activities, meaning they are more likely to
continue doing what they are doing.
The response to ransomware is a good example of
collaboration in the cyber security community. The No More
Ransom initiative was launched in July 2016 by law
enforcement and cyber security companies (the founding
partners were Europol, the Dutch Police, Kaspersky and
McAfee; they have now been joined by many more law
enforcement agencies, government agencies and cyber security
companies). No More Ransom keeps a repository of decrypt
keys and applications that can unlock data that has been
encrypted by different kinds of data. When an individual or
organization is affected by ransomware, they can visit www.no
moreransom.org to access decryption tools for many different
types of ransomware.
Unfortunately, not every type of ransomware has a solution,
and new strains of ransomware are frequently being
developed. When it comes to ransomware, prevention is
incredibly important and the best advice is to keep offline
backups of data (online backups can be infected with
ransomware themselves), test the backups to make sure they
are working as you would expect, keep devices and systems
patched and up-to-date, and be careful of the links you click and
attachments you open in emails.
Notes
1 Caveat: I said that phishing emails are currently the most common form of social
engineering. The operative word in that sentence is ‘currently’. The more savvy we
become to phishing emails (including spear-phishing, of course), the more
cybercriminals will evolve their methods. By the time this book is published, the
most common method of social engineering may be over social media or
messaging apps such as WhatsApp.
2 FBI (2018) Business e-mail compromise the 12 billion dollar scam, FBI Public
Service Announcement, 12 July, www.ic3.gov/media/2018/180712.aspx (archived at
https://perma.cc/LKE9-9CLB)
PART FOUR
The physical side of cyber
security
07
Why physical space matters in
cyber security
Physical space can sometimes be overlooked when it comes to
cyber security. Given the importance of how people, technology
and information converge in physical terms, this is an
oversight. The security of information has always been
paramount to individuals, organizations and nations, well
before there was a cyber element to it, and the physical
dimension remains just as crucial now – after all, digital
security always has a physical dimension.
In December 2019, the building company Balfour Beatty had
its contract to refurbish the headquarters of the UK’s Secret
Intelligence Service (SIS, better known as MI6) terminated after
losing over 100 papers which provided details of the building
layout and security measures.1 This example highlights the
importance of physical security, as the misplacement of
paperwork – itself a physical asset – posed a threat to the
physical security of a building that requires stringent security
and protection. The information detailed on the plans could
have enabled anyone with malicious intent, such as terrorists,
to plan an attack on the building with insider knowledge of
where alarms are situated and how to move around the
building. Although most of the plans were recovered inside the
building, the security oversight was deemed serious enough for
the company responsible to be removed from the project.
Although this is an extreme example, relating to a building
that requires the utmost security, physical security is important
to all organizations. At an organizational level, the correct
installation of physical security measures (which increasingly
have a digital element to them) is vital in the protection of
information. A fundamental part of physical security for a
building is access control systems.
Biometrics
In the face of many security issues associated with passwords,
more and more manufacturers are moving towards using
biometric access control systems. Like all security controls,
biometric systems are not a silver bullet: they have benefits and
drawbacks.
In areas where it might be possible to shoulder surf, overhear
or otherwise clone or replicate a security measure (such as a
password) being used, biometrics can come into their own,
utilizing gait, hand spans, fingerprint or retinas to create a
unique key for every individual. However, it is often easier than
expected to bypass these systems, from using fake 3D printed
faces through to easily lifting and cloning fingerprints. As the
level of sophistication of these systems grow, they all need an
element of fuzziness in order to work. A facial recognition
system still needs to work if the user grows a beard and a
fingerprint system still needs to function if they cut their finger;
there needs to be some level of identification to prevent an
overwhelming number of false positives that lock out a user.
This careful balance of identification versus lockout provides a
weak point that can be exploited by criminals.
Magnetic locks
Magnetic locks (mag locks) can be found in most offices and
institutional buildings. They are an incredible invention, taking
the simple concept of the electromagnet and making it into an
effective access control system that is simple to install and use.
One large metal plate is affixed to the door and another to the
door frame. One of these will have an electromagnet attached,
which is a core of iron with wires wrapped around it. If
electricity is flowing through the wires, this induces a magnetic
field in the iron core; with this very strong magnetic field, it
attracts the other metal plate to it, which keeps the door tightly
shut. The door will be kept tightly shut until the flow of
electricity is stopped (for example via a switch that is activated
by pressing a button), breaking the magnetic induction and
allowing the door to open.
As with any security system, mag locks need to be installed
correctly – otherwise they are trivial to bypass. The two most
common flaws in mag locks stem from flaws in the installation
of the system itself. Magnetic locks are very strong, which can
lead to people underestimating the size of lock they need for a
door. Although they are very strong, the right size lock still
needs to be used on a door; smaller locks can only handle about
10 pounds of pressure, so using a lock that is too small allows
the door to be pulled or pushed open, overcoming the magnetic
force and leaving the door intact.
Another extremely common installation flaw is when the
magnetic part (where the electronics are mounted) is placed on
the wrong side of the door – the public facing, or unrestricted,
part. This means that the controlling parts of the system are on
the side where an attacker can easily access – if a malicious
actor knows to take advantage of this access, then your system
can be easily compromised.
CCTV
At the organizational level, cameras are often installed to
monitor people’s activity, deter negative behaviours and
capture footage of incidents – in theory. CCTV is often not part
of an access control system but part of the physical monitoring
of a building or estate. However, in practice, there are a
number of issues that limit the value of CCTV, too often
reducing it to security theatre.
Poor quality
CCTV cameras are often used just as a deterrent, but when
required, the quality of CCTV images is of paramount
importance. However, organizations often buy lower budget
cameras and fail to upgrade them, despite the fact that smaller,
better quality cameras are being produced every year that
would be cheaper than a standard system installed a few years
previously.
Lack of monitoring
As individuals, when we see a CCTV camera we often assume it
is being monitored. Signs beside cameras will state that it is,
and scenes from Hollywood movies reinforce the expectation,
in which we see banks of monitors being constantly observed
by two security guards who watch for every minor incident,
person or bag that looks out of place. In reality, it is most
common that the only ‘person’ watching CCTV output is in fact a
recording device, sometimes one that records over the same
tape as frequently as every few hours or days.
The common lack of active monitoring means that CCTV
cameras are not active security measures, as often assumed, but
rather part of a passive retrospective system, which highlights
misgivings about the level of security that CCTV provides. Of
course, there may be a need to have measures in place to
capture evidence of crime being committed, but it is important
that the role of CCTV at the organizational level has been
determined and understood, with the CCTV system then
configured to support that role. If it is decided and understood
that CCTV is there to record activity, with recordings that will be
retained for a set amount of time, there is no problem. If it is
expected that CCTV will be an active security measure to
identify suspicious behaviour in real-time, an approach which
enables that to occur must be put in place. CCTV is a tool and,
like all tools, has to be used effectively.
CCTV camera positioned where an attacker could reach, move or unplug it.
CCTV camera not covering what it should.
Someone wearing their security badge or lanyard away from their office.
Someone working in public where you can read their screen.
Magnetic lock mounted on the unrestricted side (so it could be disabled).
Someone tailgating access into an area covered by access control (eg into an
office).
Notes
1 Warrell, H and Wright, R (2019) Balfour Beatty sacked from MI6 refurbishment
contract, Financial Times, 27 December, www.ft.com/content/81d4ac8c-28d9-11ea-9
a4f-963f0ec7e134 (archived at https://perma.cc/234D-3JJT)
2 Ritschel, C (2019) Mother releases video of hacker talking to eight-year-old child
through Ring camera, Independent, 12 December, www.independent.co.uk/news/w
orld/americas/ring-camera-video-hack-security-mississippi-child-a9244326.html
(archived at https://perma.cc/64Z5-QJ62)
3 Kellon, L (2018) MiSafes’ child-tracking smartwatches are ‘easy to hack’, BBC News,
15 November, www.bbc.co.uk/news/technology-46195189 (archived at https://perm
a.cc/PN89-X9U5)
4 Anderson, N (2006) Steal David Beckham’s car with a laptop, Ars Technica, 5 April,
https://arstechnica.com/uncategorized/2006/05/6750-2/ (archived at https://perma.c
c/4D4R-M2D8)
5 Greenberg, A (2015) Hackers remotely kill a Jeep on the highway – with me in it,
Wired, 21 July, www.wired.com/2015/07/hackers-remotely-kill-jeep-highway
(archived at https://perma.cc/WRP9-WGLH)
6 FBI (2016) Motor vehicles increasingly vulnerable to remote exploits, FBI Public
Service Announcement, 17 March, www.ic3.gov/media/2016/160317.aspx (archived
at https://perma.cc/49CK-BAZB)
7 DEFCON Conference (2019) Jmaxxz – your car is my car (online video), www.youtub
e.com/watch?v=w8SG2V3n4-U (archived at https://perma.cc/3QHB-JXUU)
08
How organizations can better
protect themselves
There is no one security solution that will protect an
organization. As we have seen, security relies on a layered set
of defences in conjunction with monitoring and testing of those
defences to ensure that they maintain required levels of
defence, detection and response. The first step in establishing a
security programme is understanding the information assets
you have and what value they represent for the organization,
its clients or customers, and those who might seek to access and
abuse the information. Cataloguing the assets and performing
risk assessments (as covered in Chapter 2) is a fundamental
part of establishing what level of security to ascribe to which
systems and assets, and therefore which controls to put in
place. Using a framework (such as the National Institute of
Standards and Technology (NIST) Cybersecurity Framework or
ISO 27001) will help many organizations with the process of
categorizing information assets, conducting risk assessments
and determining appropriate controls (as we will discuss in
Chapter 12). In this chapter, we are going to look at the common
security controls and practices that organizations use to better
protect themselves.
Firewalls
Firewalls are commonly regarded as the first line of defence in
cyber security, a gateway that is intended to protect an internal,
secured network from threats that exist on the open internet. A
firewall sits on the network, as hardware and/or software, and
monitors traffic that is coming in and going out. Using a set of
rules, it determines traffic that is authorized or expected to
come into the network and where it can go. The rules revolve
around the data source, destination and ports. A simple analogy
would be to imagine a security desk in a shared building as the
firewall; the security desk decides who can be allowed in and
where they are able to go within the building, depending on
who they are and how trusted they are.
Anti-virus software
Anti-virus software can also be understood as anti-malware. It
traditionally works by detecting and removing computer
viruses and malicious software, running in the background of
systems and searching for signatures of known malware (if you
imagine that each piece of malware has a fingerprint, it is
searching for the fingerprint). A key limitation of this, of course,
is that it can only detect and remove known malware; it uses a
database of known malware signatures and so, when a new
threat emerges, its signature will not be in the database. Due to
this limitation, anti-virus protections have evolved to monitor
the system and pick up on unusual behaviour: when the system
does something that is unusual, the anti-virus is triggered.
Advances in machine learning have been incorporated in anti-
virus, enabling the systems to learn from new data, behaviours
and signatures.
Network segmentation
Network segmentation is a very important element in an
organization’s defences, based on the understanding that
organizations must not only try to protect against being
attacked, but also put in place damage limitation for if (or
when) they are breached. Network segmentation means that if
one part of an organization or its network is compromised, this
compromise can be contained and not infect the whole. This
also allows for logical segmentation of an organization, so that
different departments have different segments. It works in
conjunction with what is called the ‘least privilege’ principle –
that users can only access the minimum that they need in order
to do their work – meaning that access to information can be
structured more easily on a need to know basis. It also allows
for better monitoring and auditing of access to information.
This is superior to a flat network, in which nothing is
segmented and people can move around the network more
freely, accessing information that perhaps should not be
available to them.
Airgapped networks
When a segmented network is not enough and more control is required over a system
or some particular information, organizations will build an airgapped network, meaning
a network that does not touch the internet or any other part of the existing network. An
airgapped network is a standalone, solitary system that is built to resist infection from
outside. Airgapped systems are used in the military, defence firms and industrial control
systems. As covered in Chapter 11, reports suggest that an airgapped computer was
used successfully by Vanity Fair magazine in 2015 to protect their global exclusive
covering Caitlyn Jenner’s transformation.1 As covered in Chapter 10, the Stuxnet
attack compromised an airgapped system at the Natanz facility, spread by an infected
USB stick, confirming that of course airgapped systems are – like anything – not 100 per
cent secure.
Logging
Logging is the recording of events that relate to the security of
systems. The information that is logged depends on the
requirements, but examples include what information has been
accessed, when, and by which user account. Logs should be
auditable and audited. One mistake organizations often make
with logs is collecting too much information, making them
unwieldy and drowning out the useful information. It is
important that logs are regularly reviewed, not just in terms of
auditing events that have occurred but also considering
whether the information being collected is still of value.
Monitoring
Monitoring is usually carried out in the background of systems,
aiming to detect attacks and ensure that systems are being used
according to organizational policies. Monitoring enables
organizations to detect attacks; the quicker an organization can
identify an attack, the better positioned it is to respond.
Monitoring is also often required as part of legal and regulatory
requirements. As with logging, organizations can fall foul of
attempting to monitor too much, which can lead to false
positives and the danger of becoming desensitized to alerts,
which can lead to true incidents being overlooked.
Auditing
Security audits are a review of an organization’s cyber security
policies, systems and controls, and they can be performed both
internally and externally. A security audit can include
vulnerability scans and penetration tests (see below), cultural
assessments (see below), reviewing access controls, assessing
physical security and more. Audits are often a regulatory
requirement and can be part of an organization meeting a
security standard, such as ISO 27001. Audits can be regarded as
a ‘tick box exercise’, conducted simply for the sake of
compliance, but when conducted as part of a genuine drive to
assess and improve security they can provide valuable and
actionable insights.
Vulnerability scanning
Vulnerability scans are automated assessments of a network,
with the purpose of identifying known vulnerabilities in
firewalls, applications and other devices. Even small
organizations will usually have the ability to conduct
vulnerability scans on a fairly regular basis due to the
automation available either using software themselves or using
a third-party provider such as a penetration testing company. It
is important that vulnerability scanning is not confused with
penetration testing, though – a vulnerability scan will only find
known vulnerabilities, and will not be nuanced enough to
address issues of impact and business implications.
Penetration testing
Taking vulnerability scanning to another level and beyond is
penetration testing, or pen testing (also called ethical hacking).
Pen testing involves assessing computer systems and software
to find security vulnerabilities and how these vulnerabilities
could be exploited, within a defined scope that is usually set by
the organization. It is a common regulatory requirement. Pen
testers will often use the operating system Kali Linux, which
includes tools such as Burp Suite, Metasploit and OpenVAS; the
tools will support the professional in doing their work, but they
do not do the assessment for them. Pen testing requires the
technical skills to identify vulnerabilities and – depending on
the terms of the engagement – to either exploit the
vulnerabilities, or to understand how they could be exploited.
Pen testing also requires the professional expertise to recognize
the potential impact of these issues and communicate the
findings in a way that makes sense to both the technical team
and the senior executives.
Awareness-raising training
Awareness-raising training comes in many forms, and there are
many innovative approaches that are in a different league to
some of the dry and ineffective approaches of the past (how
many people have clicked through a dull computer-based
training module or snoozed their way through a boring
presentation without learning a thing?). In my experience, the
most effective training is tailored to the recipient, engaging and
experiential; for example, live hacking demonstrations are
often really powerful. It’s important to use case studies that are
relevant to the audience, clearly communicate without
unnecessary jargon, create an environment where people are
comfortable asking questions and discuss cyber security not
just in terms of the workplace, but in relation to people’s
personal lives as well.
There are so many things that we need people to be aware of,
from social engineering threats to good security practices,
including password management, multi-factor authentication
and how they use social media (how individuals can better
protect themselves is covered in detail in Chapter 9). However,
the aim of awareness-raising training is not just to change
people’s behaviours in terms of specific threats, because the
threats can change, but rather to positively influence their
security mindset and enhance their situational awareness.
Entertaining people, at the same time as educating and
informing them, helps keep people engaged and interested, and
means they are more likely to go away from the awareness-
raising talking positively about it and spreading the messages.
Security culture
More and more organizations are recognizing that the most
effective awareness-raising training will be in harmony with
organizational culture. When considering what culture is, I find
a definition provided by MIT Professor Edward Schien to be
very helpful: he explains organizational culture as the values
and beliefs that underpin the norms of expected behaviours that
employees may follow.3
Organizational culture is very influential on security; it can
influence everything from whether people write their
passwords on a piece of paper and stick it to their desks, to how
likely someone is to report an incident and whether the
developers will work with the security team from the outset of
building a new product. When I am helping organizations
consider their cyber security awareness, behaviour and culture
programmes, I will encourage them to firstly consider what
kind of organizational culture they have, and what kind of
cyber security culture they want. This often involves cultural
assessments and analysis to make sure that we truly
understand what the company culture is like and how (and
why) it differs from team to team and at different levels. From
that, we will look at the behaviours that would exemplify the
kind of cyber security culture that they are looking to engender.
The final piece of the puzzle is awareness: what awareness-
raising initiatives would fit with the wider company culture
whilst positively influencing behavioural change?
Champion programmes
They can go by many names, but security champion
programmes are when people throughout the organization
represent security; they are not security professionals and they
are not expected to be experts, but instead they function in a
similar way to fire wardens or health and safety
representatives. They may get some additional training, and
have access to resources and a source of expertise if they need
it. Their role is usually to push out security messages to their
team, listen to people in their part of the organization with
regards to security (what communications are being
understood, what security worries do people have, what would
they like to know more about) and often be the first port of call
if someone has a worry, such as thinking they may have clicked
on a link in a phishing email. Champion programmes are a
great way of scaling up security, of listening to the organization
and providing a friendly, known face for security throughout
different teams. The champions can provide social proof,
showing that security is relevant in different teams and leading
the way for positive behaviours. Champion programmes are not
one-size-fits-all; they can take some designing to make sure that
the logistics have been considered at the outset and, like all of
the measures in this chapter, they certainly aren’t a silver
bullet, but they can be hugely effective as part of a positive
security programme.
A layered approach
This chapter has covered some of the most important security
controls that organizations can put in place to better protect
themselves. Of course, to cover everything would take a whole
book in itself, and entire books can be (and are!) written on
each topic in isolation. One of the most important messages to
understand is that there is no one security solution, but rather a
layered approach – which does not just try to defend an
organization, but also recognizes that we need to be prepared
for when a breach happens – offers the best defence. One of the
most important, and complicated, layers of defence is human
behaviour. In the next chapter, we will look at what people can
do to better protect themselves, which not only has individual
benefits but also organizational, economic and societal benefits.
Notes
1 Miller, J (2015) The inside story of Caitlyn Jenner’s historic Vanity Fair cover, Vanity
Fair, 27 July, www.vanityfair.com/hollywood/2015/07/caitlyn-jenner-documentary
(archived at https://perma.cc/LFX8-B4AZ)
2 ClubCISO (2019) Information security maturity report 2019: Full survey results, ww
w.clubciso.org/downloads/ (archived at https://perma.cc/L4XX-VX2Y)
Password managers
Password managers are what their name implies, they are tools
to generate, store and manage passwords, acting like a vault.
There are different options available, from ones that you run on
your computer to cloud-based password managers that enable
you to access your passwords on your different devices. You
generally need to access the password manager with a
password, so it is important that this password is a very secure
one (by which I mean long and complicated), but this should be
the only password you need to remember. The benefits of
password managers are many:
They take away the mental burden of having to think up
secure passwords.
They take away the mental burden of having to remember
many secure passwords.
Many will automatically log you in to accounts.
If you need to share passwords, for example with your
spouse or colleagues, many will provide a secure way for
you to do that.
Most are free for personal use (password managers are
generally based on a business model that charges
organizations a fee, but not individuals).
I just mentioned another password no-no, didn’t I? Sharing
passwords. It is common security advice that people should
never share passwords and, like most sweeping security advice,
it is unrealistic and unhelpful. There are many times where we
need to share passwords, from the family account for a TV
streaming service to a corporate social media account, to the
harsh reality of enabling access to household accounts if the
main account holder dies. If we continue to give security advice
that is not aligned with reality, we will continue to be ignored.
Instead, let’s understand how people live and work, and
provide advice that takes that into account.
For me, this is the beauty of password managers. Password
managers recognize that cognitive burden of creating and
remembering unique passwords for a number of online
accounts is too great for the vast majority of people. This
cognitive burden is why people will create a Word, Excel or
Notes document on their computers to save all of their
passwords in. This is not a secure way of storing passwords; if
the device is compromised, one of the first things a cyber
criminal will do is look for such a file. So, password managers
are the secure version of that. People often ask how secure it
really is to put all of your eggs in one basket, to entrust all of
your passwords to a password manager. This is a great, and
valid, question. The way I see it is that password managers are
much more secure than what most people are doing now,
which is re-using weak passwords. Password management
companies put way more time, effort, expertise and money into
securing their product than I can put into managing my
passwords myself. If they become compromised, their business
is over, which is quite an incentive to ensuring that they
maintain as good a level of security as possible.
If we, as security professionals, cannot follow our own
advice, then we need to accept that the advice is wrong. If it is
too unrealistic for those of us who spend our days focused on
security, it is definitely too unrealistic for everyone else.
Two-factor authentication
Passwords should not be the only layer of security on your
online accounts; two-factor authentication is vital, so that if
your password is compromised or not kept safe by the account
provider, your accounts are as secure as possible. We looked at
what two-factor authentication (2FA) is, why it is important and
the different options in Chapter 4. One issue I did not address
there is the lack of take-up of 2FA; in 2019, I surveyed 1,000
people in the UK and found that only 26 per cent of those were
using 2FA where possible, and 62 per cent did not know what it
was.1
We need to find a way to encourage more uptake of 2FA.
Providers are reluctant to make 2FA use default for their
services, as they don’t want to force it on people and lose
customers. However, some companies are taking an innovative
approach to encourage engagement with 2FA. The games
company EA ran a campaign in which they gave away a free
month of the game Origin Access to players who have 2FA
enabled or who activate it. EA were following in the footsteps of
the marketing platform Mailchimp, which provides a 10 per
cent discount for three months when customers enable 2FA.
Research suggests that when these incentives are well chosen,
they can lead to greater adoption of 2FA.2
On Wi-Fi
The threat of public Wi-Fi comes from the potential for
criminals to clone the network, appearing as a legitimate
network so that people connect to it and, in doing so, expose
their internet traffic to the malicious Wi-Fi. This enables the
criminal running the cloned network to steal any valuable data.
For example, if I go to a coffee shop and a criminal is running a
cloned Wi-Fi network, I may inadvertently log on to their
network and not the legitimate one. If I have logged on to the
coffee shop Wi-Fi before, or if the criminal network signal is
stronger, then I may even be automatically logged on. If I then
use my banking app, my bank details and login credentials will
be exposed to the criminal, enabling them to login to my
account and steal money. It is best to avoid using public Wi-Fi
(for example, public hotspots, Wi-Fi on trains, in hotels and
coffee shops) for doing anything that exposes sensitive data
online, such as online banking, checking your emails or
carrying our transactions on shopping sites.
Some people use virtual private networks (VPNs) to mitigate
the risks of public Wi-Fi. VPNs are an encrypted connection
from a device to a network, allowing anyone using the VPN to
send and receive data on a public Wi-Fi network without
exposing that data to that network; they operate so that the data
you send and receive is as if you were directly connected to the
private network. The data you send and receive is encrypted, so
anyone who intercepts it would not be able to decipher it. VPNs
are widely used in a corporate environment to enable people to
do work, send emails and access the corporate network without
exposing that data to networks that could allow others to
eavesdrop on it.
When it comes to VPNs, it is important to be aware that you
are not hiding your internet traffic from everyone: you are
running it through the VPN. Therefore, the VPN provider may
have access to your data, and nefarious ones may abuse this
access, for example by selling your data. Anyone who plans to
use a VPN personally should do a little research online to make
sure they pick a VPN that has been independently tested from a
security and privacy point of view.
On websites
The green padlock that often shows in the URL bar when you
visit a website is meant to show that the website is secure. In
reality, it does not mean that the website is secure; if only
security was that simple. The padlock means that the website is
using a Secure Sockets Layer (SSL) certificate, which means that
it is running https not http. This means that your connection to
the website is encrypted. Whilst it is recommended to use
websites that are encrypted, especially if you are sharing
personal data, the fact that the site you are on is encrypted does
not by default make it a secure one. Cyber criminals have found
ways to fake security certificates or obtain them with false
details and so there are malicious sites that display the padlock
sign, seeking to lull people into a false sense of security. A
padlock is just one sign of whether a site is authentic and to be
trusted.
Criminals use fake websites for all sorts of things. Sometimes
fake websites are used to sell counterfeit goods, sometimes they
are used to steal people’s personal and financial data;
sometimes they are used for both. When we buy goods online,
we provide a lot of personal and financial data and this opens
the potential for the criminals running scam sites to steal this
data. Criminals do different things with stolen data: they may
sell it to other criminals, they may carry out fraud on us directly
by accessing our bank accounts, or they may use our data to set
up scam sites in our names and with our details.
Spotting a scam website is about looking at the site as a whole
and identifying any anomalies, such as spelling and
grammatical errors, poor photographs and links to other
content that fail to load. You can check reviews of the website
and also see where it is based; for example, if there is a UK,
European or US postal address.
Backing up
The rise of ransomware, as discussed in Chapter 1, has affected
individuals and home users as well as organizations. Many
people now store a great deal of data digitally, which can
include sentimental items such as family photographs. To
prevent losing these in a ransomware attack or computer
failure, it is recommended that individuals regularly back up
their data, for example using external hard drives. Just be sure
to disconnect it and store it safely when you are not actively
using it.
Notes
1 Barker, J (2019) 62% of people do not know what two-factor authentication is: Our
survey of 1,000 people in the UK (blog), Cygenta, 4 October, https://blog.cygenta.co.
uk/2fa_2019 (archived at https://perma.cc/84RK-7NSU)
2 Busse, K, et al (2019) ‘Get a free item pack with every activation’: Do incentives
increase the adoption rates of two-factor authentication? Journal of Interactive
Media, Special Issue on Usable Security and Privacy, https://arxiv.org/abs/1910.0726
9 (archived at https://perma.cc/GZH8-CZME)
10
Nation-state cyber security:
Geopolitics
As we have seen already from some of the examples in this
book so far, there is an inherent tension in how we approach
cyber security at a global level. The digital sphere doesn’t have
boundaries in the same way that states – and therefore
legislation and legal jurisdiction – do.
Stuxnet
The blurring of lines between cyber and physical attacks is seen
more at the nation-state level than any other dimension of
cyber security. One such case is Stuxnet, understood to be the
first malware that caused physical destruction. This made
Stuxnet unprecedented; a game-changer not just in how it
crossed the kinetic boundary, but also in terms of its
sophistication, with Kaspersky Lab estimating that it would
have taken a team of ten coders two to three years to create it.
It targeted ‘airgapped’ systems (systems not connected to the
internet) and was transmitted mainly via USB sticks. In fact,
Stuxnet had a very specific target: the centrifuges that spin
nuclear material at Natanz, Iran’s main nuclear enrichment
facility. It was identified in 2010, hiding in the systems of the
power plants and signalling to the operating system that
everything was normal. Stuxnet set the country’s nuclear
production programme back by at least 18 months when it
destroyed 1,000 of the 5,000 centrifuges at Natanz.10 Attribution
of Stuxnet was challenging, but in 2012, the New York Times
published an in-depth report claiming what many suspected,
that it was the work of the United States, under President
Obama’s orders, in collaboration with Israel.11
What the creators of Stuxnet apparently did not intend or
expect was that the worm would escape from Natanz. Stuxnet
spread to an engineer’s computer when it was connected to the
centrifuges due to an error in the code; when that computer
was then connected to the internet, the worm began self-
replicating around the world.12 Stuxnet was the first cyber
weapon and illustrated that cyber weapons are not (yet) like
kinetic weapons. With traditional, kinetic warfare, weaponry
has become more precise and targeted, resulting in less
collateral damage. In cyber warfare, it is much more difficult to
make weaponry that is precise, targeted and contained, with no
risk of collateral damage.
WannaCry
We have been reminded of this reality many times since
Stuxnet, not least with WannaCry. In Chapter 3, we covered
what happened when WannaCry hit and how the attack was
thwarted; now we will explore the nation-state dimensions.
WannaCry propagated through EternalBlue, an exploit that
takes advantage of a vulnerability in Microsoft’s Server Message
Block (SMB; a method that allows for shared access to files,
printers and ports on a network). The exploit was discovered,
or perhaps even created, by the US National Security Agency
(NSA) and kept secret by the Agency, not informing Microsoft of
it for five years until a hacking group named the Shadow
Brokers revealed they had possession of it. If an intelligence
agency creates or discovers an exploit, they may be motivated
to keep it secret so they can use it in operations against other
nation states. Many people criticize this practice, especially in
the wake of WannaCry and other attacks that utilize
EternalBlue, but it seems a fact of life that intelligence agencies
will conduct themselves this way. Spies are going to spy!
From 2016 to 2017, the Shadow Brokers released highly
classified NSA data that dated no later than 2013. The data
included the EternalBlue exploit, along with details of major
vulnerabilities in Cisco routers, Linux mail servers and more,
and came from the NSA’s hacking group, Tailored Access
Operations (TAO, also known as the Equation Group).
The timeline of events was as follows:
August 2016: The Shadow Brokers announce possession of TAO/NSA
classified data and attempt to auction it.
January 2017: The Shadow Brokers publish screenshots that show a list of
exploit tools, including EternalBlue.
March 2017: Microsoft patch the vulnerability that can be exploited by
EternalBlue.
April 2017: The Shadow Brokers release all of the tools shown in the
screenshot they shared in January, including EternalBlue.
Saudi Aramco
On 15 August 2012, one of the most destructive computer
viruses ever seen sabotaged Saudi Aramco, the state-owned oil
company of Saudi Arabia. The data on three-quarters of Saudi
Aramco’s computers (35,000 in total) was completely destroyed,
and replaced with an image of a burning American flag.
Aramco shut down the internal corporate network, disabling
email and internet access, in an attempt to contain the virus,
called Shamoon. Oil production was segregated on the network,
and so unaffected, but the business side of Aramco was
completely disconnected with a return to pen and paper,
typewriters and fax machines. Recovery took months.
The attack was claimed by a hacking group calling themselves
‘Cutting Sword of Justice’, who said they were motivated by
Saudi policies in the Middle East, although many believe this is
a ruse and the true culprits are Iran, potentially in retaliation
for Stuxnet, using lessons learned from the attack. Much like
Stuxnet, it is suspected that an insider was fundamental to the
Shamoon infection of Aramco, initiating it by plugging in a USB
stick containing the virus.
As the state-owned national oil company of Saudi Arabia, it is
not surprising that Saudi Aramco would be targeted by nation-
state actors. However, we also see private companies that are
not state-owned being caught up in nation-state level activity.
NotPetya
The shipping giant Maersk is responsible for approximately
one-fifth of the world’s shipping capacity, carrying tens of
millions of tons of cargo around the world. On 27 June 2017,
computers across Maersk were infected by NotPetya.
Computers shut down, phones stopped working, access gates
locked and the vast majority of employees were told to go home
until further notice.
Maersk was caught up in a huge attack using the malware
NotPetya, which has been identified as a tool in the Russian war
with Ukraine. NotPetya is linked to, but not the same as, the
ransomware Petya, which spread via email attachments;
NotPetya masqueraded as ransomware but was irreversible,
intended to destroy not extort. It was built on EternalBlue and
Mimikatz (a penetration testing tool that can pull passwords out
of computer memory and use them to hack into other machines
using the same username and passwords). The combination of
these two tools was powerful, meaning that computers that
were not patched against ExternalBlue could be hacked and
then, via use of Mimikatz, those that were patched could be
accessed and infected.14
Ukraine was the first to be hit with NotPetya, and was hit
with the majority of infections, with victims including banks,
energy firms and Borispol airport in Kiev. This is not the first
time Ukraine has been subject to cyber attacks at the nation-
state level: it has been a target of cyber attacks in parallel to
Russian military intervention in the country since 2014. During
this time, companies running Ukraine’s power grid have been
targeted, resulting in blackouts that affected hundreds of
thousands of citizens for up to six hours.
Although the NotPetya malware is understood to have been
specifically targeting Ukraine, the malware did not stop at the
country’s borders, but soon spread around the world. NotPetya
indiscriminately and permanently encrypted the hard drives of
tens of thousands of computers – not only in Maersk, but also
the pharmaceutical company Merck and the courier delivery
service FedEx – costing each company hundreds of millions of
dollars. The United States White House has identified the
Russian military as the source of NotPetya, whilst describing it
as the most destructive and costly cyber attack so far
experienced.15
Notes
1 Schmitt, M N (ed) (2017) Tallinn Manual 2.0 on International Law Applicable to Cyber
Operations, Cambridge University Press, Cambridge
2 Moussouris, K (2017) Serious progress made on the Wassenaar Arrangement for
global cybersecurity, The Hill, 17 December, https://thehill.com/opinion/cybersecuri
ty/365352-serious-progress-made-on-the-wassenaar-arrangement-for-global
(archived at https://perma.cc/Z77F-BBVY)
7 Pau, A (2007) Statement by the Foreign Minister Urmas Paet, Eesti Päevaleht, 1 May,
https://epl.delfi.ee/eesti/statement-by-the-foreign-minister-urmas-paet?id=51085399
(archived at https://perma.cc/UM5L-WSZG)
8 OECD Observatory of Public Sector Innovation and Mohammed Bin Rashid Centre
for Government Innovation (2018) Embracing innovation in government: Global
trends 2018, www.oecd.org/innovation/innovative-government/innovation2018.ht
m (archived at https://perma.cc/VR4X-GEGW)
12 Sanger, D (2012) Obama order sped up wave of cyberattacks against Iran, New
York Times, 1 June, www.nytimes.com/2012/06/01/world/middleeast/obama-ordere
d-wave-of-cyberattacks-against-iran.html (archived at https://perma.cc/LG72-29MS)
13 FC (2020) The first official NSA exploit (CVE-2020-0601) (blog), Cygenta, 15 January,
https://blog.cygenta.co.uk/first-nsa-exploit/ (archived at https://perma.cc/2LRK-
8BZY)
14 Greenberg, A (2019) Sandworm: A new era of cyberwar and the hunt for the
Kremlin’s most dangerous hackers, Doubleday, New York
15 Greenberg, A (2018) The White House blames Russia for NotPetya, the ‘most costly
cyberattack In history’, Wired, 15 February, www.wired.com/story/white-house-rus
sia-notpetya-attribution (archived at https://perma.cc/7276-WX5M)
PART FIVE
The future of cyber security
and what it means for your
career
11
Cyber security in different
industries
When you first hear the term ‘cyber security’ you would be
forgiven for thinking that it’s only something that governments,
banks and big corporations need to consider. And, of course,
those industries absolutely do need to embrace cyber security –
but they’re not the only ones. Cyber security considerations
apply to all sorts of different organizations and industries,
including ones that you might not expect.
Taylor Swift
Have you ever wondered how someone like Taylor Swift
manages cyber security? Success in the music industry relies on
many things, and one of those is music being released at the
time and in the way intended. If songs or albums are leaked
before their release date, it could cost the artist and their record
label a good deal of money and, potentially, damage the career
of the artist. According to news reports, Taylor Swift (or,
certainly, her team) is very aware of this and takes a number of
steps to manage her most valuable data: her upcoming music.
It is reported that when backing dancers are performing in
the filming of Taylor Swift’s music videos, they are not
performing to the actual track that will be the subject of the
video. To ensure that her music is only heard by those who
absolutely need to hear it, and apparently limit the possibility
of someone secretly recording and releasing the music before
the official release date, Swift’s backing dancers perform to
‘click tracks’ which play the correct beat of the relevant track
rather than the track itself.1 That way, the dancers are
performing to the correct rhythm but without being exposed to
the music.
Reports suggest that it this is not an isolated example with
regards to keeping Swift’s music secure, but rather part of an
overall approach. Ed Sheeran has commented on the measures
that Swift’s team took to protect her music, when they
collaborated on the song Everything Has Changed on her album
Red. According to Sheeran, he listened to the song once, when a
member of Swift’s team met him. The track was apparently the
only song on an iPad, which was stored in a locked briefcase;
Sheeran listened to it once before acknowledging that he was
happy with it, and the iPad was then locked up and taken back.2
This shows a considered approach to the cyber security of
Swift’s intellectual property. Swift’s team are keeping a careful
chain of custody of the music, not sending it via email, which
can be vulnerable to hacking, and from what Sheeran has said,
possibly even keeping the song on a so-called ‘clean’ device, one
that has not been used to access the internet or store other data.
It is not just Swift’s digital security that her team take so
seriously, but also her physical security as well. In 2018, it was
reported that kiosks showing rehearsal clips of Taylor Swift, set
up outside her concert venue, were more than they first
appeared. When concertgoers watched the clips of Swift being
played at the kiosks, their images were taken, and facial
recognition scans were performed to determine if any of the
attendees were known stalkers of Swift.3 This may seem
extreme, and it certainly raises questions regarding the balance
of personal security for one individual compared to the
personal privacy of others, but it represents how celebrities can
(and do) embrace the latest digital technologies as part of their
approach to security.
Kim Kardashian
Physical security is, of course, an issue that people in the public
eye have long been aware of. However, these issues have been
brought more to the fore with the advent of greater
connectivity over the internet and social media technology,
meaning people with a high profile are more accessible to the
rest of us compared to even a few decades ago. In 2016, the
Kardashians re-evaluated their use of social media after Kim
Kardashian was attacked while staying in Paris. Kardashian
was robbed at gunpoint, with the criminals stealing $10 million
worth of jewellery. The alleged leader of the criminal group told
French police that he and his team were able to pull off the
attack by using information she had shared on social media.4
Kardashian had shown pictures of expensive jewels on social
media, commenting that they were not fake, and her posts also
revealed information about her whereabouts and movements
whilst in Paris. This is, of course, not to blame Kardashian for
the attack: she was a victim of criminal action and suffered
what, by all accounts, must have been a very traumatizing
experience. The case does highlight, however, the fact that
criminals use social media as a tool in their activities. This is
something for us all to be aware of, but particularly people with
a high profile. It means that cyber security is of central
importance to celebrities, to protect not just their data security
and finances, but also their physical security.
Caitlyn Jenner
And there are plenty of examples from the Kardashian empire.
When Caitlyn Jenner transitioned gender this was of course a
huge news story – which means cyber security was central to it
(as we first covered in Chapter 8). Vanity Fair had the very
exclusive first public interview and photoshoot with Jenner
after her transition, which involved a great deal of security to
maintain the exclusivity and prevent details, such as
photographs, from leaking. Extra security was reportedly hired
for the photoshoot, with everyone on site forced to be without
mobile phones to prevent them from taking photographs. The
article and the photographs were contained on only one
computer, which was never connected to the internet, with all
of the data put on a flash drive every night and deleted from
the machine itself. The story was hand-delivered to the printers,
rather than risked over the internet.5
Although such security measures may seem extreme, they
actually make perfect sense. For journalists and the media,
maintaining all aspects of cyber security is important:
confidentiality, integrity and (discussed in the next section)
availability. Confidentiality of information is obviously
important, to ensure that any scoops are maintained; loss of
confidentiality could affect the journalist or media outlet in
financial terms but also damage their reputation. Integrity of
information is crucial, to prevent information being altered:
imagine the damage that could be done if information for news
stories was changed without the media outlet being aware, with
malicious intent. This would give a whole new meaning to ‘fake
news’, with potential far-reaching social, political and economic
consequences if a reputable news source was manipulated into
publishing misinformation.
Sport
In 2019, Deloitte estimated that the European football market
was worth £25.1 billion.7 With that kind of money at stake, it is
no surprise that sport is not immune to the threat of insecurity.
In 2017, the BBC reported on the UK Football Association’s
concern that sensitive information could be exposed during the
2018 World Cup in Russia.8 This concern was in light of a hack
by the Russian group commonly known as Fancy Bear, in which
documents were leaked that indicated 160 football players had
used banned medicines at the 2010 World Cup.9 When sport
means so much to national identity and national economies, of
course it has the potential to be caught in the crossfire of
nation-state hacking.
There is a lot of money at stake at the national level of sport,
and of course a great deal of money at stake for individual
clubs. In 2019, news emerged that Liverpool Football Club had
paid Manchester City a £1 million settlement in response to a
complaint from Manchester City that their scouting system had
been hacked. The settlement was paid confidentially, in 2013, a
year after three former Manchester City scouts joined Liverpool
Football Club. Manchester City reportedly used the services of
digital forensics experts to identify whether their system had
been accessed in a way that was not approved; the allegations
were not taken to court and the settlement was made without
the Premier League being informed or Liverpool Football Club
accepting any liability for wrongdoing.10 Details on upcoming
talented players, players’ injuries, team tactics, planned
negotiations and more must be confidential – just like other
industries, information is hugely valuable for football.
Education
Education is another sector that has found itself, perhaps
unexpectedly, the target of cybercrime. Universities are often
home to a great deal of intellectual property, and research and
development data, as well as large amounts of funds and
personal data. With a decentralized structure and many
different stakeholders (academics, professional staff,
researchers and students), universities can be challenging
organizations to secure. Traditionally in many businesses, there
is a culture of ‘top down’, centralized authority, with an
acceptance that leadership set the rules and everyone else falls
in line, to greater and lesser extents. In universities, there are
often distinct schools and departments that operate fairly
independently of the central university function. Academics
and researchers have an authority that can be challenging to
‘rule over’ in the traditional sense: it may be hard for a chief
information security officer in a university to tell a leading
academic that they should not store sensitive research data on a
USB stick or email it to their personal email address because of
the cyber security risks, as the culture of academia is not
structured in the top-down way of many other organizations.
Whilst it is in the best interest of the academic, as well as the
university as whole, to protect the data, the CISO needs to
persuade the academic rather than rely on institutional
authority.
In July 2019, Lancaster University reported that it had been
the victim of a cyber attack, which involved phishing emails.14
The students’ record system was accessed and some students
had their student record and identification documents
breached. At the same time, the names, addresses, telephone
numbers and email addresses of undergraduate applicants
were stolen, enabling the cyber criminals to send phishing
emails, with fake university invoices, to some of the applicants.
This example highlights an important issue: we can
sometimes underestimate the value of our email addresses,
with a tendency for many of us to share them widely. Email
addresses represent value to cyber criminals and fraudsters
because they can use these to contact us with phishing emails. If
a cyber criminal is able to access a list of email addresses,
especially combined with information such as the university
that they have applied to, they can use this information to
quickly send a convincing phishing email that will be profitable
for them if only one person takes the bait. If you have applied
for a university, are expecting to make a payment to them and
receive an email which comes from a university account (or
looks very convincingly as if it comes from a legitimate
account), wouldn’t you pay the invoice?
Personal data, the need to keep operating and low IT budgets
are factors that also make the education sector vulnerable to
cyber attacks. The National Cyber Security Centre and London
Grid for Learning conducted an audit of 430 schools in the UK,
finding that 83 per cent had experienced at least one cyber
security incident, 30 per cent had suffered from a malware
infection and 35 per cent had experienced important
information being made unavailable.15 Globally, there have
been numerous reports of schools becoming victim of
ransomware attacks.
Conveyancing fraud
In 2016, the Solicitors Regulation Authority reported client losses of £7 million in
relation to conveyancing fraud, which they also refer to as Friday afternoon fraud. In
this attack, cyber criminals insert themselves in the middle of communications between
a solicitor and a house buyer while a purchase of a house is taking place. By
compromising the account of the solicitor or using an email address that appears very
similar to the solicitor’s legitimate one, the criminals pose as the solicitor and provide
the house buyer with bank details that the house deposit should be paid to. The house
buyer transfers the deposit, believing that they are transferring the money for the
purchase of the house to the legitimate solicitor, the money goes to the criminal’s bank
account details and the solicitor is unaware that any of this is taking place. As is the case
with many social engineering attacks, there is a trend for them to be carried out on a
Friday afternoon, when people are in a rush to complete transactions and when the
criminal has a weekend to evade detection and hide the money via proxy accounts and
money mules. In many cases of conveyancing fraud, individuals lose significant amounts
of money, sometimes life savings, as was the case with Andrew Mollett, a charity worker
from London who in 2017 was defrauded out of £67,000, his life savings.16 There will
often be disputes between the house buyer and the solicitors with regards to who bears
responsibility for the fraud (aside from the criminals, who often evade detection), and
investigations to uncover how the fraud was actually perpetrated are costly.
Notes
1 Taylor Swift (2018) End Game – behind the scenes (online video), https://youtu.be/V
A7Y_Psp5l4 (archived at https://perma.cc/A558-BJ9N)
2 Prakash, N (2017) Ed Sheeran explains how Taylor Swift keeps her music from
leaking, TeenVogue, 10 February, www.teenvogue.com/story/ed-sheeran-reveals-ho
w-taylor-swift-keeps-music-from-leaking (archived at https://perma.cc/E62P-SZUB)
3 Knopper, S (2018) Why Taylor Swift is using facial recognition at concerts, Rolling
Stone, 13 December, www.rollingstone.com/music/music-news/taylor-swift-facial-r
ecognition-concerts-768741 (archived at https://perma.cc/PR5E-X5NN)
4 Bryant, K (2017) Kim Kardashian’s alleged robber confirms social media helped
him plan heist, Vanity Fair, 30 January, www.vanityfair.com/style/2017/01/kim-kard
ashian-paris-robbery-social-media-heist (archived at https://perma.cc/T9LC-5UGA)
5 Miller, J (2015) The inside story of Caitlyn Jenner’s historic Vanity Fair cover, Vanity
Fair, 27 July, www.vanityfair.com/hollywood/2015/07/caitlyn-jenner-documentary
(archived at https://perma.cc/LFX8-B4AZ)
6 Moore, H and Roberts, D (2013) AP Twitter hack causes panic on Wall Street and
sends Dow plunging, Guardian, 23 April, www.theguardian.com/business/2013/apr/
23/ap-tweet-hack-wall-street-freefall (archived at https://perma.cc/F6B3-ZDND)
7 Deloitte (2019) Annual review of football finance 2019, www2.deloitte.com/uk/en/pa
ges/sports-business-group/articles/annual-review-of-football-finance.html
(archived at https://perma.cc/SUS3-7X4H)
8 Conway, R (2017) World Cup 2018: FA increases cyber security over hacking
concerns, BBC Sport, 11 September, www.bbc.co.uk/sport/football/41230542
(archived at https://perma.cc/X6KH-EF55)
9 BBC (2017) Fancy Bears: Hackers name footballers given 2010 World Cup TUEs, BBC
Sport, 22 August, www.bbc.co.uk/sport/football/41011854 (archived at https://perm
a.cc/MHR9-X8A6)
10 Ziegler, M and Dickinson, M (2019) Liverpool paid Manchester City £1m ‘spy’
settlement, The Times, 21 September, www.thetimes.co.uk/edition/sport/liverpool-p
aid-manchester-city-1m-spy-settlement-mxkns7mb6 (archived at https://perma.cc/4
GHN-PX7G)
11 Russon, M-A (2019) My Instagram got hacked and I lost my business, BBC Business,
19 August, www.bbc.co.uk/news/business-49397038 (archived at https://perma.cc/K
66Y-BNFH)
12 Lorenz, T (2018) How hackers are stealing high-profile Instagram accounts, The
Atlantic, 16 November, www.theatlantic.com/technology/archive/2018/11/hackers-a
re-stealing-influencer-instagram-accounts-promising-lucrative-brand-deals/575662
(archived at https://perma.cc/N8YV-G7GG)
13 Federation of Small Businesses (2019) Small firms suffer close to 10,000 cyber-
attacks daily, FSB Press Release, 5 August, www.fsb.org.uk/media-centre/press-relea
ses/small-firms-suffer-close-to-10-000-cyber-attacks-daily (archived at https://perm
a.cc/Y89P-LB32)
14 Press Association (2019) Lancaster University students’ data stolen in cyber-attack,
Guardian, 23 July, www.theguardian.com/technology/2019/jul/23/lancaster-universi
ty-students-data-stolen-cyber-attack (archived at https://perma.cc/QT5F-3SHF)
15 National Cyber Security Centre and London Grid for Learning (2019) Cyber
security schools audit 2019, www.lgfl.net/cybercloud/securityaudit (archived at htt
ps://perma.cc/23UH-WUZ2)
16 Jones, R (2017) I thought I’d bought my first home, but I lost £67,000 in a
conveyancing scam, Guardian, 14 January, www.theguardian.com/money/2017/jan/
14/lost-67000-conveyancing-scam-friday-afternoon-fraud-legal-sector-email-hacker
(archived at https://perma.cc/KYC8-ZHLY)
12
Cyber security at the board level
Cyber security issues pose key risks to organizations and should
be addressed at the board level like any other business risk. In a
modern business, most organizational risks will have a cyber
security element to them; all board members should, therefore,
have some knowledge of cyber security and recognize that good
cyber security is necessary for the organization to meet its
objectives. However, this is not to suggest that they should be
expected to be cyber security experts. For board members, it is
actually more about knowing what questions to ask and how to
interpret the answers.
Cyber security is a relatively new field so it’s quite natural
that board members often need to develop their comfort levels
with it. Cyber security has also been – and is still too often –
seen as a technical domain, which has stunted the extent to
which organizations have adequately engaged with it at the
human and business level. It is important that cyber risks are
elevated from their technical detail to be captured, and
managed, in business terms, which is why it is so critical for
organizations to have board members with a level of
understanding in cyber security within a business context. It is
crucial that board members without experience and knowledge
of cyber security develop their understanding to such an extent
that they are able to engage in agreeing on and monitoring
their organization’s cyber risk approach, and they are
comfortable enough with the domain to be able to ask pertinent
questions (and be able to interpret the answers!). This chapter
is intended to support board members who want to develop
their cyber security understanding, as well as provide a steer
for those with ambitions to reach the board at a future stage.
Likewise, if you are a cyber security professional who is going
to be working with the board, this chapter will give you an
overview of their role and responsibilities and help you
understand how you can frame discussions of cyber security in
a way that will be more relevant to them.
Notes
1 Ernst & Young (2010) Risk Appetite: The strategic balancing act, Ernst & Young
2 HM Government (2019) FTSE 350 Cyber Risk Governance: Health check 2018, https://
assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_
data/file/798068/FTSE_350_Cyber_Governance_Health_Check_2018_-_main_report.p
df (archived at https://perma.cc/FAL7-VEHK)
3 HM Government (2019) FTSE 350 Cyber Risk Governance: Health check 2018, https://
assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_
data/file/798068/FTSE_350_Cyber_Governance_Health_Check_2018_-_main_report.p
df (archived at https://perma.cc/FAL7-VEHK)
4 National Cyber Security Centre (2019) Cyber Security Toolkit for Boards, www.ncsc.
gov.uk/collection/board-toolkit (archived at https://perma.cc/5BJ3-KKEE)
5 ClubCISO (2020) Information Security Maturity Report 2020: Full survey results: w
ww.clubciso.org/downloads (archived at https://perma.cc/G2KM-MTSP)
13
Pursuing a cyber security career
Two questions I am commonly asked are ‘How did you get
started in cyber security?’ and ‘How can I get started in cyber
security?’ I was very lucky to find myself working in this
industry and I consider it a huge blessing that I found
something I am hugely passionate about. It was not a career I
had even considered – I was barely aware of it – until I was
headhunted by a start-up consultancy. On top of that, the little I
knew about the industry gave me the impression that it was an
exclusively technical discipline, and this did not seem accessible
to me. And my story isn’t that uncommon; many people of my
age and stage in cyber security stumbled into it. Cyber security
was not taught when I was at school – we were only in the early
stages of having the internet – nor when I was at university.
This is why my husband (who is also my business partner) and I
are such big advocates of outreach work with schools and
universities: we want young people to know that there is a big,
fun, diverse cyber security industry that is full of opportunities
which they may love.
Since I started in the sector, I have seen cyber security being
taught in schools; university degrees in subjects such as ethical
hacking and cyber psychology; and many great initiatives set
up to develop people’s skills in cyber security and raise
awareness of careers in the industry. However, this does not
mean that pathways into a cyber security career are clearly
defined. There are lots of ways into a cyber security job, but no
one way. This has many benefits, but can feel overwhelming if
you’re looking to get a foot in the door.
Security+
The aim of Security+ is to equip someone with a foundational
understanding of risk management, cryptography and security
vulnerabilities. Emphasising practical skills and knowledge,
passing Security+ requires demonstrating an understanding of:
vulnerabilities, attacks and threats;
identity and access management;
network architecture;
cryptography;
risk management.
The Security+ certification covers the junior IT
auditor/penetration tester job role, systems administrator,
network administrator, and security administrator.
There is more information on CompTIA’s website: www.comp
tia.org
University study
Given that I took an academic route up to and including PhD
level, it would be remiss of me not to mention the benefits of
university study. Completing a degree teaches you not only
about the subject of study, but also equips you with transferable
skills that include time management, written and oral
communication skills, how to conduct research, team working
experience, self-study discipline and more. If you want to
pursue a cyber security career, undertaking a degree in the
subject would give you a chance to learn some of the
foundational subjects, explore the discipline and perhaps
uncover those particular areas that interest you the most,
demonstrate your interest in the field and make valuable
contacts. There are benefits to going to university and benefits
to focusing your studies on cyber security.
DEFCON groups
DEFCON groups (DCGs) grew out of the annual DEFCON
conference in Las Vegas, which began in 1993 as a place for
people interested in hacking to meet. As stated on the DEFCON
website:
DCG meetings are open to anyone, regardless of their skill, age, job,
gender, etc. DCGs are designed to help you learn new things, meet new
people, mentor others in areas you may be strong in, and provide some
cohesion within the hacker culture and its members.1
BSides
BSides are security community events, aimed at enabling
people in the community to meet, present their ideas and
research and listen to others sharing their knowledge. BSides
are run by local community teams and so they vary, but they
are most often an annual conference with a call for
presentations (CFP) in advance of the event, to which people
can submit a topic they would like to speak about, which is then
voted on by the community. Many BSides also run rookie tracks,
in which people new to the industry or new to speaking can
present in a smaller room with the support of a mentor, as well
as lightning tracks, which offer shorter speaking slots that you
sign up for on the day of the event.
Jack Daniel, BSides co-founder
I’m a displaced mechanic who landed in automotive management where I had to learn
to work with computers and soon took over computer operations and administration. If
you did systems and network admin in the 1990s, you learned about security whether
you wanted to or not. I liked it and gradually shifted focus to security. As I was thrown
into tech, I discovered local user groups and learned much from them. When I had
something to share, I shared it – that started my long involvement in community
engagement. When I saw the US auto industry decline on the horizon, I joined the
vendor side, first at Astaro, and later at Tenable, where I have been for over eight years.
Both companies have been incredibly supportive of my community engagement work.
In 2009 many in the hacker and security communities had come together on Twitter,
and when people started discussing the talks that were turned down at the bigger
conferences a few of us looked and saw some interesting ideas so we made a place for
people to share their presentations and discussions. Although there had been some
discussions on how to make conferences better, we didn’t intend to create a series, and
certainly never expected to launch a global movement, but people wanted more, and
the BSides idea took off. As we discussed the keys to BSides’ success and growth, we
found four core ideas, each building on the others. First was content – interesting ideas
are shared. Second was conversation – since the events are smaller and more informal,
the presentations are usually more conversational, ideas are shared and discussed.
Third is community – if you share ideas and spark conversation, people build and
strengthen the local (and often global) hacker and infosec communities. Last, but not
least, is career – if you share and discuss ideas in a healthy and growing community,
people will naturally progress in their careers as they see what topics are hot, what
companies are hiring and who has what expertise.
Note
1 DEFCON Groups (2019) The latest, https://defcongroups.org (archived at https://per
ma.cc/KY4W-VM3F)
14
The variety of cyber security
careers
I hope reading this book so far has given you a good overview
of the breadth of cyber security. It is a discipline that cuts across
human, technical and physical issues, with dimensions that
cover legal, business and geo political domains, as well as much
more. This chapter will introduce you to some of the many
different careers in this industry, by profiling people who work
in the field. I asked the amazing people featured to explain
what they do, what they like about it, what their backgrounds
are and what advice they would give their younger selves.
What I love about my job is the ability to make a difference in the world.
All around me I see the consequences of our predictable human failure to
prepare for the consequences of our technological revolution. Whether
it’s families coping with trying to protect their children from a horde of
internet predators or small businesses trying to avoid losing what little
money they have to ever more sophisticated fraudsters, or political actors
trying to protect democracy itself from internet-fuelled hate and
propaganda, the need to put people in control of technology has never
been greater.
The day when we reached 100 per cent completion on training a police
department on cyber security was one of my proudest ever as CEO. We
helped protect police so they can help protect citizens. The day we
deployed our technology to one of the biggest financial institutions in
North America is a close second because if we helped in educating and
protecting that bank, it will help protect individuals and businesses.
Twenty years ago this summer I was a young soldier who was exposed to
some of the hard truths of our world while helping care for and protect
Kosovar refugees who fled violence in their homeland and sought refuge
in Canada. That experience and the many, many questions that came from
it prompted me to pursue higher education. When I left the military in
2003, I took that education and became a journalist.
When I turned 40 this year, I looked back at my life to date and tried to
make some sense of it. I realized that while it’s felt like a series of crazy
twists and turns – soldier, journalist, marketer, cyber security lead, CEO –
there was a common theme: a passion for making a difference in the
world and telling stories, as well as a desire to be part of something bigger
than myself.
The final piece of advice I’d give my younger self is this: no man or
woman achieves anything great on their own. It always takes a
community to truly make lasting change happen.
There was a time, when I first went down the Alice in Wonderland rabbit-
hole of cyber security in 2012, that the sheer scale and scope of the
problems in cyber security felt overwhelming and disheartening. But over
the last few years as we formed our company I reached a greater
understanding of the growing army of much smarter women and men
around the world who are in this fight for the long haul. I wasn’t alone.
Far from it, in fact. I could learn new things from all of them and do more
good.
One of the elements of cyber security that I love the most is how
much there is to learn and the really interesting people that you
get to meet as part of that learning. This field is built on sharing
knowledge; most people who work in cyber security love to
learn, to share what they have learnt and to soak up knowledge
that others share. I’ve worked for myself and run my own
companies for a lot of my career, and this is partly because it
allows me to go on that journey of following my curiosity and
seeing where the learning takes me, rather than having
someone else dictate the direction that I take. This is something
Theriault and I have in common:
I love a bold challenge and meeting brainy tech lovers, and that’s what I
spend my days doing. I connect with people I find interesting, and then
pick their brains. Working for yourself is like nothing else. Sure, it’s
incredibly complex and daunting at first, but once a good rhythm sets in,
it’s as wonderful as riding a bike on a quiet sunny day. I get involved in
the projects that interest and excite me, and belly laugh on a daily basis.
So ya, it’s pretty sweet.
Working for yourself also allows you (if you plan for it) to build
a way of working that fits your life, which means a lot to
Theriault:
Having years ago found myself too close to burnout for comfort, I try to
limit work hours to 4–6 hours a day, though that sometimes means
weekend days too. I juggle running the company, preparing or giving a
talk, interviewing guests and producing podcasts, as well as assisting our
Tick Tock Social team with clients.
The professor
Theriault makes so many good points with her advice, not least
that when you’re early on in your career, it’s accepted that
there will be lots you don’t know, and that’s nothing to be
ashamed of. None of us can be expected to know everything,
especially in a field as diverse as cyber security. Professor
Shujun Li has some really good advice in this area:
Cyber security is a fast-growing and increasingly interdisciplinary field,
and not a technical subject only computer scientists and electronic
engineers can do something with. Cyber security has also a lot of overlaps
with another hot topic –- AI – where we can see two important sub-areas:
security of AI, and AI for security. I strongly encourage more young
people to consider a future career in cyber security, or even cyber
security and AI together. Due to its interdisciplinary nature, you need to
try to be good at going broad as much as you can, but be prepared to
transform yourself to be good at going deep if your interest is more
focused on a smaller area of cyber security. Even if you want to be a
specialist, you still need to have sufficient exposure to a broad range of
fundamental knowledge and skills, in order to be able to better
understand complicated cyber security problems in the real world. When
you are out of school, it is important to keep a close eye on recent news on
ICT technologies (not just cyber security) and try to do as many hands-on
exercises with computer hardware and software as possible, to develop a
more comprehensive understanding of the cyber security landscape.
The journalist
As we saw with David Shipley earlier, having a diverse
background is the norm in cyber security. This industry has
evolved very organically, alongside the organic growth of the
internet. There were no cyber security courses or degrees until
quite recently; those of us of a certain age and generation in the
industry would never have been told about cyber security
careers at school, because those careers did not exist. We have
found our way and forged our careers as we move forwards,
which often means an unusual career path.
For example, the journalist Kate O’Flaherty did not originally
plan to focus on cyber security. O’Flaherty is a freelance
journalist and copywriter, who writes content that appears in
the press, such as Forbes, the Guardian and SC Magazine. She
also writes on behalf of clients such as security companies, but
this focus on cyber security was not always her plan:
When I was younger, I wanted to be a music journalist – I couldn’t have
imagined going into technology, let alone cyber security. But if I could give
my younger self advice, I’d tell myself to consider security and tech more
generally earlier on.
I sometimes relive those experiences and not a day goes by without using
the skills and methods I had learned – even though I learned these skills
from people who were using them to manipulate others and take
advantage of them, I now use those same skills to positively influence
people into being more secure and resisting becoming victim to social
engineering attacks. Getting into the mindset of an attacker can be the
best way of defending yourself and others.
I get to meet and work with so many interesting people and, most
importantly, I help people be safer and more secure. For more than half of
my life I have been breaking into places, either physically or digitally, but
always legally and ethically! It’s the best job in the world as far as I’m
concerned.
The lawyer
The variety of work that Freakyclown mentions is a factor that
keeps Jonathan Armstrong enthusiastic about his work.
Armstrong is a lawyer at Cordery, focusing on compliance
issues including cyber security, and this means working on lots
of different problems for all sorts of clients:
What I like most about my job is the variety. No two days are ever the
same. It’s also an area where there’s a skills gap – many lawyers don’t
understand cyber security issues so there’s a chance to help a wide
variety of companies large and small.
The analyst
Kenneth Geers echoes this. Geers is a world-renowned cyber
intelligence analyst enjoying an amazing career that includes
20 years of experience working for the United States
Government (including the NSA and NCIS) and roles as an
Ambassador of NATO Cooperative Cyber Defence Centre of
Excellence and a Senior Fellow with the Atlantic Council. This is
how he summed up his career so far:
I have worked in signals intelligence or cyber security since 1993, with
time on offence, defence and in academia. But I have always been an
intelligence analyst, in the national security space, so I care less about the
‘how’ of computer hacking – and more about the ‘who’ and the ‘why’.
When I spoke to him about what he most loves about his work,
he perfectly captured the diversity of cyber security as a field.
Working at the international level, covering issues relating to
nation-state level cyber security, Geers highlighted the fact that
cyber security is at the heart of every international issue you
can think of:
There are endless areas of research, from elections to electricity, and
cryptocurrency to human rights. There were many sceptics who doubted
the connection between network security and national security, but today
it is clear that computer hacking (and IT-enabled social engineering) has
transformed everything, including politics, crime, terrorism and war.
In myself, I’m mainly about the human side of cyber security. I think
cyber security should work better for people who aren’t experts at it,
without us all having to go and get computer science degrees first. When
we’re at home, we should all be able to confidently protect ourselves and
our loved ones from the most common online threats and scams. When
we’re at work, we are our organization’s first and most important line of
defence against cyber attacks – which means we need security tools,
policies, processes and culture that match people’s real capabilities, and
how we need to work. For too many of us, security still seems expensive,
inconvenient, impenetrably technical, and generally bothersome. And we
need to fix that. I generally win fans when I say ‘I’m trying to help you
stay safe online without having to remember a million passwords’!
More than anything, I love our mission. We’re here to make the UK the
world’s safest place to live and work online. I can’t imagine many things I
could do with my life that could be more worthwhile than that. Also, we
have a fantastic, diverse team at NCSC. I find it really stimulating to work
in an environment where others have very different backgrounds to me,
and many different skills, experiences and perspectives. We trust each
other, we respect everyone’s specialist knowledge, we have great
discussions, and together we achieve things that none of us could do
alone. Also the cake. We have a lot of good cake. If I were a hostile
intelligence agency trying to disrupt GCHQ and NCSC, the first thing I’d
target would be the cake.
Whilst of course appreciating the cake (which does sound like a
very nice perk), Emma W is driven by contributing to the
security of the UK at a national level, which is an amazing
mission. When she talks about what her work is like on a day-
to-day basis, it is clear that she is also motivated by helping
those around her and by inspiring and supporting the next
generation of cyber security professionals:
On a typical day, I’ll be in one of our Cheltenham offices working in the
awesome NCSC comms team. I’ll review guidance in progress – maybe
nudge something along if it’s ground to a halt, or settle a debate about
exactly what we should say, how and to whom. I may meet an NCSCer
who wants to produce some new guidance, to find out more about what
they want to do. Who needs to hear this advice? What do they need? How
are we going to do it? How important or urgent is this, compared to
everything else?
That’s a typical day, but my favourite days at work are either a) when I’m
presenting to an audience, as I love sharing my thinking about cyber
security, helping to build consensus for change, and hearing from others
in return; or b) if I have someone shadowing me at work. I really enjoy
giving them an insight into the things we do (there tends to be quite a few
‘wows’, because we do get up to some truly impressive stuff), and helping
them to make useful contacts to follow up on things that interest them.
Combining both those favourite things: I love it when I’m allowed out to
talk to younger people about careers in cyber security. It’s really
important to take that time, to help grow and inspire the security
professionals of the future. Many people don’t realize what a diverse
profession it is, and think it’s not for them unless they’re studying
computing or maths. This is totally untrue!
Also, don’t worry that you ‘aren’t technical enough’ for cyber security. It
won’t hold you back. Cyber security really needs more ‘people-people’ –
those who understand a bit more about what makes people tick, and can
represent their needs and advocate for their points of view, to help make
security that works for people. Because, as we all know, security that
doesn’t work for people doesn’t work.
I love Emma W’s message above and the final line is simply
perfect; I often quote this message from Emma W and the NCSC
when I am delivering a conference keynote.
Although you need to know your area, it’s ok to rely on the expertise of
others: journalists are not experts, the people they speak to are. Do not be
afraid to look stupid and always ask questions – people are more than
happy to help.
This message will be especially pertinent to journalists, but we can all learn from
O’Flaherty’s advice. I am a firm believer in the message that there are no stupid
questions. The only way we can evolve is to ask questions and learn, which is true both
at the individual and group level. If we are working in cyber security as part of a desire
to make people more secure, we have a responsibility to ask questions, because if we
don’t understand something, we may be limiting our ability to contribute to resolving a
problem. If we want to make the world a safer place, we need to know when to swallow
our pride.
It’s OK to eat coco pops from a pan if the bowl isn’t big enough.
Some people want your advice, some people need to look like they want
your advice, you can’t control that, but you can always give good advice.
I like thinking about things that might not yet have been considered. I like
demonstrating flaws, not so much for the flaw at face value, but more
what process would prevent this flaw at scale. I like being embraced by
teams, and I like showing why security should be embraced by teams that
might not see the need initially.
Answers
Exercise 0.1: Decoding the message (page 4)
The key is 13 right (or 13 left!) and the message should read:
This is an example of a Caesar cipher. Well done for decoding it!
A multinational bank
The information an international bank will handle includes
personal and financial information of customers, money
transfers, personal and financial information of personnel, and
intellectual property. Of course, on top of this, banks hold
physical money and assets.
Attackers that are most likely to target them include
financially motivated cyber criminals, hacktivists, script
kiddies, nation-state level attackers and malicious insiders.
A political party
The information a political party will handle includes personal
and financial information of members and donors, plans and
strategies for the party, internal (potentially sensitive)
communications of the party and internal financial data.
Attackers that are most likely target them include financially
motivated cyber criminals, hacktivists, script kiddies, nation-
state level attackers and malicious insiders.
Abagnale, F 88–89
advanced persistent threat (APT) 24
Allsopp, C – jailed for TalkTalk breach 51
Amazon 66
Simple Storage Service (S3) 68
appendix: exercise answers 230–31
exercise 1.1: assessing the risks 230–31
local estate agent 230–31
multinational bank 230
political party 230
exercise 3.1: identifying vulnerabilities 231
exercise 5.1: hot state triggers 231
Apple 34, 66, 68, 148
Armstrong, J 219, 228
Ashley Madison – hacked by cyber criminals 42–43
attacks that utilize social engineering 101–12 see also case studies
money trails and cryptocurrency 109
offline social engineering attacks 111–12
phishing 101–09
spear-phishing 102–03
voice-phishing or vishing 103
ransomware 109–11
and No More Ransom initiative 110–11
Avid Life Media (ALM) 42–43
and breach of Ashley Madison 42
rebranded to Ruby Corp 43
Beckham, D 123
and his £100,000 BMW 123
Caesar, J 3
Caesar cipher/shift 3–4, 4
Carroll, J (security contractor) 225–27
case studies (for)
attacks that utilize social engineering
business email compromise 108
FireEye 105–06
voice-phishing: Bill 103–04
voice-phishing: FireEye 105–06
WhatsApp 106–07
social engineering
why social engineering works: Alice and Bob 92–93, 93
technical vulnerabilities
Life at Parliament View Ltd 56
TalkTalk 50–51
WannaCry 54–55 see also WannaCry
what cyber security is
cybercrime: ransomware – SamSam 26–27
cybercrime: script kiddies – TalkTalk 23
malicious insiders: Andrew Skelton 28–29
non-malicious insiders: Dow Jones and Facebook apps 30–31
why people are so important in cyber security
creation: The Big Hack (Bloomberg Businessweek) 65–66
use: Amazon Simple Storage Service (S3) 68
chapter notes (for)
attacks that utilize social engineering 112
cyber security at the board level 193–94
cyber security in different industries 181–82
how individuals can better protect themselves 153
how organizations can better protect themselves 139
introduction to cyber security 10
nation-state cyber security: geopolitics 167–68
pursuing a cyber security career 208
social engineering 99–100
technical vulnerabilities 59–60
the variety of cyber security careers 229
what cyber security is 32–33
why cyber security is important 43–44
why people are so important in cyber security 81–83
why physical space matters in cyber security 126
Clinton, H 165, 166
Computer Emergency Response Team (CERT) 80
cyber security: introduction 1–10 see also why cyber security is important
cyber security, you and your career 9–10
history of cyber security 3–4, 4, 5–8
the rise of cybercrime 8–9 see also legislation (UK) and legislation (US)
and the 414s 8–9
cyber security at the board level 183–94
board members as challengers (and) 188–91
NCSC (UK): key questions for board to ask 189–90
need to receive on-going communication on threats 191
questions for members to ask 190–91
the board perspective on cyber security 187–88
key findings of UK Government report (2019) 187–88 see also reports
cyber security as a business risk (and) 191–93
cloud computing 193
questions – knowing which, when and how to ask 192
cyber security frameworks 184 see also subject entry
cyber security governance 184–85
risk appetite and risk tolerance 186–87 see also studies
cyber security in different industries 171–82
celebrity, entertainment and pop culture 171–74
Caitlyn Jenner 173–74
Kim Kardashian 173
Taylor Swift 171–73
conveyancing fraud 180
education 178–79
of 430 UK schools 83% had experienced a cyber security incident 179
cyber attack/phishing emails at Lancaster University 179
journalism and the media 174–75
small and medium enterprises 177–78
social media and influencers 176–77
‘Joshua Brooks’ influencer scam 176–77
sport 175–76
cyber security frameworks
Cyber Essentials 184
ISO 27001 184
National Institute of Standards and Technology (NIST) 127, 184
cyber weapon: Stuxnet 125
Diachenko, B 30–31
Disney ‘hack’ (2019) 70
Dunning, D 25
Gates, B 145
Geers, K (cyber intelligence analyst) 219–20, 227
Gold, S 9
Greenberg, A 123
hackers (and)
Advanced Persistent Threat 28 (APT28) 165
Fancy Bear 165
Guccifer 2.0 165
hacking of US Democrat emails 165
hacks and ‘hacks’ 70
Jmaxxz 123
Miller, C 123, 124
Sofacy Group 165
Valasek, C 123, 124
Handbook of Rules and Guidance (Financial Conduct Authority) 39
Hanley, M: jailed for TalkTalk breach 51
Histiacus 3
how individuals can better protect themselves (by) 140–53
being social engineering savvy 151–53
seven steps for protection against cybercrime 152
being social media savvy 151
biometric security 145
from loyalty points theft 146–47
protecting their accounts (by/with) 141–47
biometric security 145
password managers 142–43
two-factor authentication 145–46
writing passwords down 143–44
protecting data 148–50
by backing up 150
on websites 149–50
on Wi-Fi 148–49
protecting devices 147–48
how organizations can better protect themselves (with) 127–39
anti-virus software 128
auditing 131
awareness-raising training 134–35
block list and allow list 132
champion programmes 136
cyber threat intelligence and threat hunting 133
digital footprint assessments 136–37
firewalls 128
intrusion detection systems (IDS), intrusion protection systems (IPS) 131 –32
a layered approach 138–39
logging 130
monitoring 131
network segmentation 129
and airgapped networks 129
penetration testing 134
using Kali Linux and Burp Suite, Metasploit, OpenVAS 134
physical security controls 137
policies and procedures 130 see also research
security culture 135–36 see also definitions and Schien, E
social engineering assessments and red team engagements 137–38
vulnerability scanning 133
Jenner, C 173–74
Obama, B 174
O’Flaherty, K 216, 224
Open Web Application Security Project (OWASP) 80
organizational culture, definition of 135 see also Schien, E H
Patrick, N 8, 9
physical space: why it matters in cyber security 115–26
access control systems 116–19
badges and lanyards 117–18
biometrics 118
magnetic locks 118–19
CCTV 119–21
lack of monitoring 120
poor placement and lack of coverage 120–21
poor quality 119–20
physical vulnerabilities in the Internet of Things 122–26
and the physical infrastructure of the internet 125
Privacy Commissioners: Australia and Canada 42
pursuing a cyber security career (and) 195–208
Jack Daniel, BSides co-founder 204–05
qualifications and certifications 196–99
Certified Ethical Hacker (CEH) 197
Certified Information Systems Security Professional (CISSP) 197–98
Offensive Security Certified Professional (OSCP) 198
‘real world’ experience 199
Security+ 196
university study 198
what do employers want? – your personal attributes and skills 199–202
acceptance that you don’t know everything 200–201
communication skills 202
curiosity 200
a desire to learn 200
empathy 201
ethical and moral code 199–200
situational awareness 201
spotting patterns 201–02
what can you do to get a job in the industry? 202–08
BSides 203–05
and co-founder: Jack Daniel 204–05
bug bounties 207
‘capture the flags’ (CTFs) competitions 205–07
Sophia McCall (Captain, Team UK, European Cyber Security Challenge) 206–07
DEFCON groups 203
develop your network 207–08
Putin, V 165
report: FTSE 350 companies and cyber risk governance (UK Government 2019) 187
research
on information security policies (Club CISO, 2019) 130
into spear-phishing email campaign (Malwarebytes) 96–97
risk, threat and vulnerability – and their meaning 35
Room, C (Director, Pulse Conferences) 218
Sawers, S and J 73
Schien, E H 135
Schifreen, R 9
Sheeran, E 172
and definition of organizational culture 135
Shipley, D 209 (CEO, Beauceron) 209–11, 212
Skelton, A 28–29
social engineering 84–100
through history 85–90
Francis Cabot Lowell 86
Frank Abagnale 88–90
and did you know? 89–90
the Trojan Horse 85–86
Victor Lustig 87–88
non-criminal 90–91
red flags 84–85
and why social engineering works 91–99 see also case studies
exercise 5.1: hot state triggers 99
hot state emails: Shame 95–97
hot states 94–95
sextortion 97–99
Sorenson, A (CEO, Marriott Group) 41
Spitzner, L (Director, SANS Security Awareness) 216, 223, 224
studies (of/on)
850 ICS and SCADA networks 57–58
determination of risk appetite levels (UK Government) 186
Sunstein, C 94–95 see also Nudge and Thaler, R
Supermicro 65–66
Swift, T 171–73
First published in Great Britain and the United States in 2020 by Kogan Page Limited
Apart from any fair dealing for the purposes of research or private study, or criticism or
review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may
only be reproduced, stored or transmitted, in any form or by any means, with the prior
permission in writing of the publishers, or in the case of reprographic reproduction in
accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction
outside these terms should be sent to the publishers at the undermentioned addresses:
The right of Jessica Barker to be identified as the author of this work has been asserted by her
in accordance with the Copyright, Designs and Patents Act 1988.
ISBNs
Hardback 978-1789663426
Paperback 978-1789663402
Ebook 978-1789663419
A CIP record for this book is available from the British Library.
2020941948