UNIT 2 Cyber Security (1)
UNIT 2 Cyber Security (1)
Application Security
Application security is the use of software, hardware, and procedural
methods to protect applications from external threats.
It includes knowing your threat, securing the network, applications, file and
data.
Application security is the discipline of processes, tools, and works on
planning to protect applications from dangers all through the whole
application lifecycle.
There are various challenges for vendors to prevent any malicious activity
and for users to keep their system secure.
Vendors is to develop secure applications for varieties and versions of
platforms whereas user challenges include compliance with its standards
and managing patch cycles.
2
Hardware Backup
• It is important to decide which hardware to use for the backup.
• The speed of processing the backup and restore depends on the
hardware being used, how the hardware is connected, bandwidth of
the network, backup software, and the speed of server's I/O system.
• Tape Technology
• Disk Backups
Software Backups
• There are software tools available that help in the backup process. These software
tools come as a package.
• These tools not only take backup, they can effectively manage and control the
backup strategies.
• The criteria for choosing the best software package are listed below
How scalable is the product as tape drives are added?
4
Does the package have client-server option, or must it run on the database
server itself?
What degree of parallelism is required?
What platforms are supported by the package?
Does the package support easy access to information about tape contents?
Is the package database aware?
What tape drive and tape media are supported by the package?
Firewall
Firewall is computer system which inspect incoming and outgoing traffic and
control traffic flow by dropping or passing certain packets.
• Firewall can be implemented using:
Hardware
Software
5
Types of Firewalls
1. Packet Filter
2. Application Level Gateway
3. Circuit Level Gateway
4. Proxy Server
4. Proxy Server
• Act as intermediate between client and server
• Block the unauthorized packets
•Monitor the outbound traffic
• Hide the true network address and intercept all messages entering and leaving
the network
• It is also serve as intermediate for request sent by hackers seeking resource for
other servers
8
HIDS may also be able to identify malicious traffic that originates from the
host itself, as when the host has been infected with malware and is
attempting to spread to other systems.
It is used to monitor the packets inbound as well as outbound. HIDS run on
individual host or devices on the network.
Access Control
Access Control is a mechanism that defines and controls access rights for
individuals who can use specific resource in the OS.
Access control system include
File permissions – refer to the access control in which the user can
create, read, edit or delete on the file server.
12
Program permission – refers to the access control in which the user can
execute a program on the application server.
Data right permission- refers to the access control in which the user
can retrieve or update information in a database.
Access control is a way of limiting access to a system or to physical or
virtual resources.
Access control is a process by which users are granted access and certain
privileges to systems, resources or information.
In access control systems, users must present credentials before they can be
granted access.
Security Threat
A security threat is a malicious act that aims to corrupt or steal data or disrupt
an organization's systems or the entire organization.
With the increasing use of the internet and advancing IT, applications are becoming
increasingly vulnerable to threat that could be malicious code, virus, worms etc.
Polymorphic Virus: refers to the virus that change from one form to another
to avoid being detected. A system infected by a polymorphic virus displays a
message deletes the files available on the system.
Stealth Virus: refers to a virus that masks itself from application in order to
avoid being detected. The stealth virus gets attached to the boot sector of a
hard disk.
Retro viruses: refer to the virus types that bypass installed antivirus software.
The retro virus is capable of making direct attack on the antivirus.
Multipartite virus: refers to virus type that has ability to react in multiple
ways. It provides harm to a system in such a way that it infects boot sector
and executable files.
Macro Virus: Refer to the virus that effect the enhancement available in
applications programs. This type of virus is commonly found in programs
such as Microsoft Word or Excel. These viruses are usually stored as part of
a document and can spread when the files are transmitted to other computers,
often through email attachments.
Browser Hijacker -This virus targets and alters your browser setting. It is
often called a browser redirect virus because it redirects your browser to
other malicious websites
Boot Sector Virus – It is a type of virus that infects the boot sector of floppy
disks or the Master Boot Record (MBR) of hard disks.
File Infector Virus – As the name suggests, it first infects a single file and
then later spreads itself to other executable files and programs. The main
source of this virus are games and word processors.
Network Virus -Network viruses travel through network connections and
replicate themselves through shared resources.
Resident Virus -A resident virus stores itself on your computer’s memory
which allows it to infect files on your computer. This virus can interfere with
your operating system leading to file and program corruption.
web scripting virus – It is the malware that breaches your web browser's
security and injects the malicious code on the webpage to take control of
your browser and alter its settings.
Trojan Horses
Trojan horses can be defined as programs that are transmitted to a system
under disguise of any legitimate application programs such as attachment to a
program or as part of an installation process.
15
Logic Bombs
A logic bomb is a piece of code intentionally inserted into a software system
that will set off a malicious function when specified conditions are met.
For example, a programmer may hide a piece of code that starts
deleting files (such as a salary database trigger), should they ever be
terminated from the company.
A logic bomb is a malicious piece of code that’s secretly inserted into a
computer network, operating system, or software application.
Worms
Worms can be defined as threats that are self-sufficient to replicate themselves
and do not need any host application to get transmitted.
A computer worm is a type of malware whose primary function is to self-
replicate and infect other computers while remaining active on infected
systems.
Spoofing
Spoofing means to provide false information about your identity to gain
unauthorized access to others computer systems.
Spoofing is a type of attack on computer device in which the attacker tries
to steal the identity of the legitimate user and act as another person.
In a spoofing attack, one person or program successfully pretends as another
by falsifying data, there by gaining an illegitimate advantage.
IP spoofing and DNS spoofing are two popular spoofing attacks.
16
The objective of IP spoofing is to make the data look as if it has come from a
trusted host when it did not.
Types of Spoofing
IP Spoofing:
IP is a network protocol that allows you to send and receive messages over the
internet. The sender’s IP address is included in the message header of every email
message sent (source address). By altering the source address, hackers and
scammers alter the header details to hide their original identity.
Email Spoofing:
The most common type of identity theft on the Internet is email spoofing. Phishers,
send emails to many addresses and pose as representatives of banks, companies,
and law enforcement agencies by using official logos and headers. Links to
dangerous or otherwise fraudulent websites, as well as attachments loaded with
malicious software, are included in the emails they send.
17
URL spoofing:
A spoofed URL is a fraudulent link that is masked to look like a legitimate source in
order to steal your data. Sometimes, just clicking on a spoofed URL is enough to
infect your device with malware.
DNS Spoofing
It means getting a wrong entry or IP address of the requested site from the DNS
server. Attackers find out the flaws in the DNS system and take control and will
redirect to a malicious or fake website.
Trapdoor or Backdoor
Backdoor is any hidden method for obtaining remote access to a computer.
Trap doors are hidden entryways into a program that allow access to anyone
without going through the usual security checks.
It is an undocumented entry point to a module or application.
Network administrations often use backdoors to control their clients and
supervise their actions in a business network
Backdoors are usually based on client –server network communication,
where server is the attacked machine and the client is the attacker.
18
Trap doors turns to threats when any dishonest programmers to gain illegal
access.
Malicious software
Malicious software, commonly known as malware, is any software that brings harm
to a computer system. Malware can be in the form of worms, viruses, trojans,
spyware, adware and rootkits, etc., which steal protected data, delete documents or
add software not approved by a user. Malicious Software refers to any malicious
program that causes harm to a computer system or network.
19