IT Data Security_Notes
IT Data Security_Notes
IT Data Security_Notes
Encryption
Data erasure
Data erasure uses software to completely overwrite data on any storage device,
making it more secure than standard data wiping. It verifies that the data is unrecoverable.
Data masking
Shuffle Masking
Shuffle masking masks the data in a column with data from the same
column in another row of the table. Shuffle masking switches all the values
for a column in a file or database table. You can restrict which values to
shuffle based on a lookup condition or a constraint. Mask date, numeric, and
string data types with shuffle masking.
For example, you might want to switch the first name values from one
customer to another customer in a table. The table includes the following
rows:
When you apply shuffle masking, the rows contain the following data:
Data resiliency
Resiliency depends on how well an organization endures or recovers from any type of
failure—from hardware problems to power shortages and other events that affect data
availability. Speed of recovery is critical to minimize impact.
Data resiliency refers to an organization's ability to recover from data breaches and
other types of data loss, immediately enact business continuity plans, effectively recover lost
assets and aggressively protect that organization's data moving forward.
Update all software to the latest version as soon as possible after patches or the
release of new versions.
Backups
Maintaining usable, thoroughly tested backup copies of all critical data is a core
component of any robust data security strategy. In addition, all backups should be subject to
the same physical and logical security controls that govern access to the primary databases
and core systems.
Employee education
Transform your employees into “human firewalls”. Teaching them the importance of
good security practices and password hygiene and training them to recognize social
engineering attacks can be vital in safeguarding your data.
Network and endpoint security monitoring and controls
A data security threat is any action that could DEMAGE the confidentiality, integrity
or availability of data.
Data security threats can come from a variety of sources, including hackers, insider
threats, natural disasters and human error.
Data breaches can have serious consequences for businesses and consumers alike,
including financial losses, compromised identities and damaged reputations.
To protect their assets, companies need to do their due diligence and make sure they have a
system in place that will minimize data security threats by educating employees, monitoring
networks for vulnerabilities and more.
There are many data security threats that organizations face daily. Some of these
threats include
malware
ransomware
phishing attacks and social engineering.
Data security is one of the most important aspects of online life. Without data
security, our personal information, financial information and other sensitive data
would be vulnerable to cybercriminals. There are many ways to protect your data
from cybercriminals, including using strong passwords, installing antivirus software
and using firewalls.
One of the best ways to protect your data is to use a password manager. A password
manager helps you create and manage strong passwords, and it keeps all of your
passwords in one place. This makes it easier to create and remember complex
passwords, and it also makes it harder for cybercriminals to hack your account.
Another way to protect your data is to install antivirus software. Antivirus software
helps to protect your computer from malware, which can include viruses, spyware and
other malicious software. Antivirus software can also help remove any existing
malware from your computer.
Finally, you can use a firewall to protect your data. A firewall is a piece of hardware
or software that helps to block incoming and outgoing network traffic. Firewalls can
be used to prevent cybercriminals from accessing your computer, and they can also
help to protect your data from being stolen.
Types of Viruses
Armored Virus
An armored virus is a computer virus that contains a variety of
mechanisms specifically coded to make its detection and decryption very
difficult.
Companion Virus
A companion virus is a type of computer virus that attaches itself to
legitimate programs and runs simultaneously with them.
As a result, the virus spreads and can cause damage or allow unauthorized
access to the infected system.
Key Takeaways
1. Companion Virus is a type of malware that disguises itself as a legitimate
program and is designed to run parallel to an existing executable file
without altering or infecting it directly.
2. It typically spreads by attaching itself to other applications or files and is
executed when the user inadvertently launches the infected program,
leading to the simultaneous launch of the virus.
With the release of Microsoft Office 2000 and all subsequent versions,
Microsoft disabled macros by default. Since then, it's become more
difficult for bad actors to easily launch macro viruses.
Multipartite Virus
A multipartite virus is a type of fast-acting malware that attacks a
device's boot sector and executable files simultaneously.
Multipartite viruses are often considered more problematic than
traditional computer viruses due to their ability to spread in multiple
ways.
They are considered to be much more destructive than other viruses.
Multipartite viruses infect computer systems multiple times, at varying
times and in order to eradicate the virus it must be purged from the entire
system.
Failure to do so can result in the system being repeatedly re-infected if
all parts of the virus are not eradicated.
Polymorphic Virus:
‘Poly’ refers to many and ‘morphic’ refers to forms. Therefore as the name
suggests polymorphic virus is a complicated computer virus that changes its
form as it propagates to avoid detection by antivirus. It is a self-encrypting
virus that pairs a mutation engine along with a self-propagating program code.
A Polymorphic Virus Consists of:
A decryption routine.
An encrypted virus body.
A mutation engine that generates randomized decryption routines.
In polymorphic viruses, the mutation engine and virus body are
encrypted.
When an infected program is executed, the virus decryption routine
gains control of the computer decrypts the virus body and mutation
engine. The control is then transferred to the virus which locates a
new program to infect.
As the virus body is encrypted and the decryption routine also varies
from infection to infection, the virus scanners cannot scan for a fixed
signature or a fixed decryption routine making it difficult to detect.
A data protection strategy can help companies lessen the risks associated with various
data-related activities.
It achieves this goal by identifying and tackling these risks while reducing the
possibility of other damaging events.
Identifying the desired result and the necessary steps to build compelling data
protection strategies is crucial.
Moreover, to ensure effectiveness, companies must clearly understand how these
strategies can address their specific concerns.
o Complying with domestic and foreign data protection laws is vital in today’s
business world. Businesses can also enhance their efficiency and profitability
by investing in data compliance.
o Effective data compliance practices keep company data up-to-date and
accurate. It helps protect it from costly errors and improves the overall quality
of business operations.
o With valuable data compliance strategies, businesses can significantly reduce
the time and money spent on handling data. Then it becomes an investment
that pays off both in the short and long term, ensuring success and peace of
mind for all involved.
Phishing Attacks
i. on-path attack
On-path attackers place themselves between two devices (often a web
browser and a web server) and intercept or modify communications
between the two.
The attackers can then collect information as well as impersonate
either of the two agents.
In addition to websites, these attacks can target email
communications, DNS lookups, and public WiFi networks.
Example:
You can think of an on-path attacker like a rogue postal worker who
sits in a post office and intercepts letters written between two people.
This postal worker can read private messages and even edit the
contents of those letters before passing them along to their intended
recipients.
In a more modern example, an on-path attacker can sit between a user
and the website they want to visit and collect their username and
password.
This can be done by targeting the HTTP connection between the user
and the website; hijacking this connection lets an attacker act as a
proxy, collecting and modifying information being sent between the
user and the site.
Alternately the attacker can steal a user’s cookies (small pieces of data
created by a website and stored on a user’s computer for identification
and other purposes).
These stolen cookies can be used to hijack a user’s session, letting an
attacker impersonate that user on the site.
cross-site scripting
Cross-site scripting (XSS) is an exploit where the attacker attaches
code onto a legitimate website that will execute when the victim loads
the website. That malicious code can be inserted in several ways.
Most popularly, it is either added to the end of a url or posted directly
onto a page that displays user-generated content.
In more technical terms, cross-site scripting is a client-side code
injection attack.
Types of Phishing
1. Email Phishing:
Attacker sends a fake email that appears to be from a legitimate source
(e.g., bank) asking for sensitive information (e.g., login credentials).
Example: An email that looks like it's from your bank, asking you to click
a link and enter your login details.
The link leads to a fake website that steals your login credentials.
Example:
If you don't take action, your account will be suspended within 24 hours.
Best regards,
2. Spear Phishing:
An email tailored to a specific individual, using their name and company
information.
The email appears to be from a colleague or supervisor, asking for sensitive data.
3. Whaling:
An email targeting high-level executives, attempting to trick them into revealing
sensitive information.
The email may appear to be from a government agency or legal authority.
4. Smishing:
An SMS or text message claiming to be from a bank or service provider.
The message asks you to click a link or provide sensitive information.
5. Vishing or Voice Phishing:
A voice call claiming to be from a bank or service provider.
The caller asks for sensitive information or directs you to a fake website.
Identity theft
Identity theft occurs when someone uses your personal information
without your permission to commit fraud or other crimes. Here's an example:
Example:
John's wallet is stolen, containing his driver's license, credit cards, and
Social Security card. The thief, Jane, uses John's information to:
1. Open a new credit card account in John's name, charging thousands of
dollars.
2. Apply for a loan in John's name, using his Social Security number and
credit history.
3. Use John's driver's license to pose as him and commit crimes, resulting in
John receiving traffic tickets and even an arrest warrant.
Protection tips:
Monitor credit reports and accounts regularly.
Use strong, unique passwords and two-factor authentication.
Keep personal documents secure and shred sensitive information.
Be cautious when sharing personal information online or in public.
Use identity theft protection services or credit monitoring tools.
Unit - II
Cryptographic Attacks
What is cryptography?
Cryptography is a security mechanism for storing and transmitting sensitive data such
that only the sender and the intended receiver can read or understand it. Key(s) are used to
encode (at the sender's end) and decode (at the receiver's end) the data. Encryption is the
process of converting plaintext or data into ciphertext or encoded data (that is not readable to
everyone). Converting the ciphertext or encrypted data to a readable form or decoded version
is called decryption.
Each brute force attack can use different methods to uncover your sensitive data. You
might be exposed to any of the following popular brute force methods:
1. Simple brute force attack: It uses a systematic approach to
'guess' that doesn't rely on outside logic. Hackers attempt to
logically guess your credentials, which completely unassisted from
software tools or other means. These can reveal extremely simple
passwords and PINs.
2. Dictionary attacks: It guesses usernames or passwords using a
dictionary of possible strings or phrases. A hacker chooses a target
and runs possible passwords against that username. Dictionary
attacks are the most basic tool in brute force attacks. While not
necessarily being brute force attacks in themselves, these are often
used as an important component for password cracking.
3. Hybrid brute force attacks: It starts from external logic to
determine which password variation may be most likely to succeed
and then continues with the simple approach to try many possible
variations. A hybrid attack usually mixes dictionary and brute force
attacks. These attacks are used to figure out combo passwords that
mix common words with random characters.
4. Rainbow table attacks: A rainbow table is a pre-computed table
for reversing cryptographic hash functions. You can use it to guess a
function up to a certain length consisting of a limited set of
characters.
5. Reverse brute force attack: A reverse brute force attack reverses
the attack strategy by starting with a known password. It uses a
common password or collection of passwords against many possible
usernames. Then hackers search millions of usernames until they
find a match. Targets a network of users for which the attackers
have previously obtained data. Many of these criminals start with
leaked passwords that are available online from existing data
breaches.
6. Credential stuffing: It uses previously-known password-username
pairs, trying them against multiple websites. If a hacker has a
username-password combo that works for one website, they'll try it
in tons of others as well. Since users have been known to reuse
login info across many websites, they are the exclusive targets of an
attack. Exploits the fact that many users have the same username
and password across different systems.
Brute Force Attack Tools
Guessing a password for a particular user or site can take a long time, so hackers have
developed tools to do this task faster.
Ciphertext-only attack
In this attack model, the cybercriminal can choose arbitrary plaintext data
to obtain the ciphertext. It simplifies the attacker's task of resolving the
encryption key. One well-known example of this type of attack is the
differential cryptanalysis performed on block ciphers.
Let’s now consider the chosen-plaintext attack.
In this case, we can relax the previous constraint and assume we aren’t
certain of the encryption algorithm being used. However, we can still choose a
set of plaintexts and compare them with the resulting ciphertexts in order to
learn something about the encryption algorithm and its associated key.
Plaintext Ciphertext
11111111 01010101
11111110 01010100
11111101 01010111
11111011 01010001
11110111 01011101
11101111 01000101
11011111 01110101
10111111 00010101
01111111 11010101
In varying each individual bit of the plaintext and comparing the corresponding
encrypted text, we could notice that the bit we vary is consistently negated in
the encryption process. We could also notice that, as one bit varies, the
remaining ones are left untouched: in this case, we should strongly suspect that
the encryption involves a bit-wise operator of some kind; that would, in turn,
significantly restrict the search space of the possible encryption algorithms
that generate the ciphertexts.
Here, the attacker tries to recover the key used to encrypt or decrypt the
data by analyzing the cryptographic algorithm.
Here are a few ways you can create strong passwords against brute attacks, such
as:
Identity attacks
Identity attacks refer to malicious activities aimed at stealing,
manipulating, or exploiting individuals' personal information, credentials, or
identities to gain unauthorized access, privileges, or benefits. These attacks
target sensitive data such as:
Names
Passwords
Social Security Numbers (SSNs)
Credit card information
Email addresses
Personal identifiable information (PII)
Identity attacks can be launched through various tactics, including:
2. SQL Injection: Malicious SQL code injected into database queries to extract
or modify data.
SQL injection
SQL injection is a type of security vulnerability that occurs when an
attacker manipulates a SQL query to gain unauthorized access to a
database or alter its content. This typically happens when user inputs are
improperly sanitized or validated, allowing malicious SQL code to be
executed. Here are some common examples to illustrate SQL injection:
Example Injection: If an attacker enters admin' -- as the username and leaves the password
field empty, the resulting query becomes:
SELECT * FROM users WHERE username = 'admin' --' AND password = '';
Explanation: The -- comment sequence in SQL comments out the rest of the query, so the
password check is bypassed. This could allow the attacker to log in as an admin if the
username admin exists in the database.
Example Injection: If an attacker inputs ' OR 1=1 --, the resulting query becomes:
Explanation: The condition 1=1 is always true, so the query returns all records from the
products table, potentially exposing sensitive data.
Example Injection: If an attacker inputs a username like ' OR 1=1 --, the query
becomes:
Explanation: The query always returns true due to 1=1, allowing the attacker to
infer information about the existence of users based on the application’s
response.
4. Error-Based SQL Injection
Scenario: An application returns detailed error messages when SQL queries
fail.
Vulnerable SQL Query:
Explanation: The query always returns true because 1='1' is always true. The
application might reveal error messages that can be used to further probe the
database structure.
Mitigation Strategies
1. Parameterized Queries: Use parameterized queries or prepared
statements to ensure that user inputs are treated as data and not executable
code.
Difference
Differing from the traditional type of hacker, who modifies a computer's
software and hardware structure to carry out certain tasks, social
engineering uses people as weapons to attack select targets.
In this way the manipulation is accomplished by employing trust through
different forms of communication