Jitu Mali
Jitu Mali
The Internet is a pervasive force which is working its way into all aspects of our
civilization - of this fact there is no doubt. One could spend countless hours, days, and months
debating and studying the implications and connotations of this fact and its influence on
education, business, etc. However, in studying this medium, it is important to remain cautious
and realize the security issues surrounding the Internet. Being overly cautious and
conservative in this exploration is detrimental and foolish - the resources left undiscovered by
frightened people will be expanded by others, leaving the paranoid in the dust. However, it is
ultimately more careless to assume that all is legitimate and nothing will harm you. It's that
old principle of "that'll never happen to me" that can make one vulnerable. Educated medium
should be achieved between these extremes. We plan to take a look at the current work of
hackers threatening e-commerce, politics, and individuals with a range of viruses. Also what
is the difference between personal computers, e-commerce, and computer networks on
college campuses when it comes to security? Most importantly, how secure do you feel? How
do age and gender affect people's reactions on this matter? What general precautions can be
affected to make the common computer user better educated and more confident with their
security? We propose to research security policies and their effectiveness with an emphasis on
current events and the boom of buying and trading online. Then taking this information and
correlating with data compiled from extensive surveying of college students and the public
with a focus on age as a determining factor in the matter of personal security on the Internet.
INTRODUCTION
Internet security is a branch of computer security specifically related to the Internet. It's
objective is to establish rules and measure to use against attacks over the Internet. The
Internet represents an insecure channel for exchanging information leading to a high risk of
intrusion or fraud (e.g. phishing). Different methods have been used to protect the transfer of
data, including encryption.
When the term network security is used, it refers to the security of the network in general.
This includes such issues as password security, network sniffing, intrusion detection,
firewalls, network structure and so forth.
Why Security?
Computer security is required because most organizations can be damaged by hostile software
or intruders. There may be several forms of damage which are obviously interrelated. These
include:
The methods used to accomplish these unscrupulous objectives are many and varied
depending on the circumstances. This guide will help administrators understand some of these
methods and explain some countermeasures.
Security Issues
Computer security can be very complex and may be very confusing to many people. It can
even be a controversial subject. Network administrators like to believe that their network is
secure and those who break into networks may like to believe that they can break into any
network. I believe that overconfidence plays an important role in allowing networks to be
intruded upon. There are many fallacies that network administrators may fall victim to. These
fallacies may allow administrators to wrongfully believe that their network is more secure
than it really is.
This guide will attempt to clarify many issues related to security by doing the following:
No one can ever know all the software vulnerabilities of all software used on a system.
This is why even those who consider themselves hackers will say that the number one
computer security threat is the lack of quality in the applications and operating systems. At
this point, I could talk about the various corporate entities that write software and why
software lacks the quality that many of us believe that it should possess, but that subject is not
only way beyond the scope of this document, but also way beyond the scope of this project.
The bottom line here is that unless you can remove all the application and operating system
problems that allow viruses and intruders to penetrate networks, you can never secure your
network. Additionally the users on your network are potentially a greater security risk than
any programs. Obviously removing all vulnerabilities is impossible and will not secure your
network against user errors. I have even considered the possibility that an operating system
without a network interface can be completely secure, but even this cannot be guaranteed.
Unknown viruses or trojan programs can creep in with applications on CDs or floppies. This
has been known to happen. Although an attacker may not be able to get data from the system,
they can damage or destroy data.
Layered Security
The fact that complete security is impossible is the reason security experts recommend
"layered security". The idea is to have multiple ways of preventing an intrusion to decrease
the chance that intrusions will be successful. For example, you should have virus protection
on your client computers. To help layer this security you should also filter viruses at your
email server. To help even more, you should block the most dangerous types of email
attachments to prevent unrecognized viruses and other hostile software from entering your
network. Another good defense layer would also include educating your users about viruses,
how they spread, and how to avoid them.
Hackers
There are many documents that attempt to define the term hacker. I believe that the term
hacker is a connotative term. This means that it is more defined by people's beliefs rather than
by a dictionary. Some believe that a hacker is a very skilled computer person. Others believe
that hackers are those that perform unauthorized break ins to computer systems. The media
and many sources have caused many uninformed people to believe that a hacker is a threat to
computer and network security while this is not the case. A hacker is no more likely to break
the law than anyone else. I use the more accurate descriptive term, "intruder" to describe
those who intrude into networks or systems without authorization.
Physical Security
This guide will not talk about physical computer security beyond this paragraph. Your
organization should be aware how physically secure every aspect of its network is because if
an intruder gets physical access, they can get your data. Be sure the your organization
properly secures locations and consider the following:
• Servers - Contain your data and information about how to access that data.
• Workstations - Man contain some sensitive data and can be used to attack other
computers.
• Routers, switches, bridges, hubs and any other network equipment may be used as an
access point to your network.
• Network wiring and media and where they pass through may be used to access your
network or place a wireless access point to your network.
• External media which may be used between organizational sites or to other sites the
organization does business with.
• Locations of staff who may have information that a hostile party can use.
Some employees may take data home or may take laptops home or use laptops on the internet
from home then bring them to work. Any information on these laptops should be considered
to be at risk and these laptops should be secure according to proper policy when connected
externally on the network.
SECUERITY REQUIREMENTS
If you are an individual who is only concerned about the security needs of your home
computer and do not want to learn alot about computer security, then there are some simple
guidelines that you should read;
• A personal firewall when connecting to the internet over any type of connection.
• Anti-virus software that is kept updated.
• Back up your data onto another computer, CD-ROM, ZIP drive, or tape regularly.
• Regular security updates to the operating system (these are not as critical if a personal
firewall is installed, but this item is still important).
• Regular updates to the applications run on the system such as Microsoft Office.
Be aware of the following:
You should also be aware that most data that you send or receive on the internet can be
read by other people. Therefore you should be aware of the sensitivity of the data or
information you are sending. If you need to send confidential data you should only send
it to sites that begin with https:// or use some software to encrypt your data.
• Be careful when opening email attachments since they may contain hostile programs
even if your antivirus software has not detected it.
• Be careful when downloading and installing programs on the internet. You should scan
any programs for viruses that you get on the internet, but also be aware that some
programs may be spyware or other malware used to gain access to your system.
If you are someone who is responsible for your orgainzation's security and/or you are
learning about computer security, then you should read this complete document.
SECURITY ATTACKS
This page lists types of security attacks. This document will address security issues, measures,
and policies which take these types of attacks into consideration.
• IP spoofing - An attacker may fake their IP address so the receiver thinks it is sent
from a location that it is not actually from. There are various forms and results to this
attack.
o The attack may be directed to a specific computer addressed as though it is
from that same computer. This may make the computer think that it is talking
to itself. This may cause some operating systems such as Windows to crash or
lock up.
• Gaining access through source routing. Hackers may be able to break through other
friendly but less secure networks and get access to your network using this method.
• Man in the middle attack –
o Session hijacking - An attacker may watch a session open on a network. Once
authentication is complete, they may attack the client computer to disable it,
and use IP spoofing to claim to be the client who was just authenticated and
steal the session. This attack can be prevented if the two legitimate systems
share a secret which is checked periodically during the session.
• Server spoofing - A C2MYAZZ utility can be run on Windows 95 stations to request
LANMAN (in the clear) authentication from the client. The attacker will run this
utility while acting like the server while the user attempts to login. If the client is
tricked into sending LANMAN authentication, the attacker can read their username
and password from the network packets sent.
• DNS poisoning - This is an attack where DNS information is falsified. This attack can
succeed under the right conditions, but may not be real practical as an attack form. The
attacker will send incorrect DNS information which can cause traffic to be diverted.
The DNS information can be falsified since name servers do not verify the source of a
DNS reply. When a DNS request is sent, an attacker can send a false DNS reply with
additional bogus information which the requesting DNS server may cache. This attack
can be used to divert users from a correct webserver such as a bank and capture
information from customers when they attempt to logon.
Hostile Software
Hostile software programs may have several different types of functions. These functions may
cause damage or allow unauthorized access to be gained allowing the program to be spread or
information may be compromised. These are some functions that hostile software may
perform:
You should be aware that all types of hostile programs such as viruses and trojans can
perform any of the above functions. There is a tendency for viruses to only damage systems
or data, and trojan programs to send compromised data to other parties, but either type of
program can perform any of the functions. This is why all unauthorized programs are a very
serious matter.
Viruses
Viruses reproduce themselves by attaching themselves to other files that the used does not
realize are infected. Viruses are spread today mainly through E-mail attachments. The
attachment may be a file that is a legitimate file but the virus may be attached as a macro
program in the file. An example is a Microsoft word file. These files can contain macro
programs which can be run by Microsoft Word. A virus may infect these files as a macro and
when they get on the next user's computer, they can infect other files. These virus programs
normally take advantage of a security vulnerability of the running application. In the case of
this example a Microsoft Word macro permission security vulnerability is exploited. Viruses
can directly affect executable files or Dynamic Link Library (DLL ) files that the operating
systems and applications use to run.
Usually the virus will spread before it will do anything that may alert the user to its presence.
Trojan horse software is software that appears to have some useful function, but some hidden
purpose awaits inside. This purpose may be to send sensitive information from inside your
organization to the author of the software.
The countermeasure to prevent trojan horse programs from infiltrating your organization is to
implement the countermeasures in the section titled "Software vulnerability Control".
Allowing only approved software with proper testing to be run in the organization will
minimize the threat of these programs. The organizational security policy can help ensure that
all members of the organization operate in compliance with this countermeasure.
A buffer overflow is an exploit that takes advantage of a program that is waiting on a user's
input. There are two main types of buffer overflow attacks: stack based and heap based.
Heapbased attacks flood the memory space reserved for a program, but the difficulty involved
with performing such an attack makes them rare. Stack-based buffer overflows are by far the
most common.
The semi-private network is commonly called a "DMZ" (for DeMilitarized Zone) in many
security circles. In this diagram the semi-private network contains a mail relay box to increase
security since the mail server is not directly accessed. The mail relay box routes mail between
the internet and the mail server.
Many times when security vulnerabilities are published, an older version of software may not
be supported by the manufacturer. This may require an operating system upgrade or an
additional license to be purchased to upgrade specific software. This may be very cost
prohibitive to many organizations. When dealing with these situations, it is important to
consider your network layout and how it is used.
One consideration that should be kept in mind when dealing with network security is what
users can perform what functions and what computers these users can use. For example the
following situation may exist in an organization:
• Some users can receive and send both internal and external e-mail while others can
only send and receive internal e-mail.
• User's who can only send and receive internal e-mail will not have users on their
systems who can use external e-mail.
Considering this situation, the computers that can only receive internal e-mail are less of a
security risk than those who can receive external e-mail. Many viruses spread with e-mail. If
computers that send and receive external email do not get the virus, then it is not likely to
spread to those computers that only deal with internal e-mail. Therefore it is more important
to fix application vulnerabilities on computers that deal with external e-mail than on those
that do not. In this way, a virtual perimeter of protection may be established in an
organization. This may not be the most secure network configuration, but it is much more
secure than not updating any computers at all.
Once authenticated, a firewall enforces access policies such as what services are allowed to be
accessed by the network users. Though effective to prevent unauthorized access, this
component may fail to check potentially harmful content such as computer worms or Trojans
being transmitted over the network. Anti-virus software or an intrusion prevention system
(IPS), help detect and inhibit the action of such malware. An anomaly-based intrusion
detection system may also monitor the network and traffic for unexpected (i.e. suspicious)
content or behavior and other anomalies to protect resources, e.g. from denial of service
attacks or an employee accessing files at strange times. Individual events occurring on the
network may be logged for audit purposes and for later high level analysis.
Communication between two hosts using a network could be encrypted to maintain privacy.
Honeypots, essentially decoy network-accessible resources, could be deployed in a network as
surveillance and early-warning tools as the honeypot will not normally be accessed.
Techniques used by the attackers that attempt to compromise these decoy resources are
studied during and after an attack to keep an eye on new exploitation techniques. Such
analysis could be used to further tighten security of the actual network being protected by the
honeypot.
Security management
Security Management for networks is different for all kinds of situations. A small home or an
office would only require basic security while large businesses will require high maintenance
and advanced software and hardware to prevent malicious attacks from hacking and
spamming.
Small homes
• A basic firewall like COMODO Internet Security or a unified threat management
system.
• For Windows users, basic Antivirus software like AVG Antivirus, ESET NOD32
Antivirus, Kaspersky, McAfee, Avast!, Zone Alarm Security Suite or Norton
AntiVirus. An anti-spyware program such as Windows Defender or Spybot – Search &
Destroy would also be a good idea. There are many other types of antivirus or
antispyware programs out there to be considered.
• When using a wireless connection, use a robust password. Also try to use the strongest
security supported by your wireless devices, such as WPA2 with AES encryption. If
using Wireless: Change the default SSID network name, also disable SSID Broadcast;
as this function is unnecessary for home use. (However, many security experts
consider this to be relatively useless. http://blogs.zdnet.com/Ou/index.php? p=43 )
• Enable MAC Address filtering to keep track of all home network MAC devices
connecting to your router.
• Assign STATIC IP addresses to network devices.
• Disable ICMP ping on router.
• Review router or firewall logs to help identify abnormal network connections or traffic
to the Internet.
• Use passwords for all accounts.
• Have multiple accounts per family member, using non-administrative accounts for
day-to-day activities. Disable the guest account (Control Panel> Administrative
Tools> Computer Management> Users).
• Raise awareness about information security to children.
Medium businesses
• A fairly strong firewall or Unified Threat Management System Strong Antivirus
software and Internet Security Software.
• For authentication, use strong passwords and change it on a bi-weekly/monthly basis.
• When using a wireless connection, use a robust password.
• Raise awareness about physical security to employees.
• Use an optional network analyzer or network monitor.
• An enlightened administrator or manager.
Large businesses
• A strong firewall and proxy to keep unwanted people out.
• A strong Antivirus software package and Internet Security Software package.
• For authentication, use strong passwords and change it on a weekly/bi-weekly basis.
• When using a wireless connection, use a robust password.
• Exercise physical security precautions to employees.
• Prepare a network analyzer or network monitor and use it when needed.
• Implement physical security management like closed circuit television for entry areas
and restricted zones.
• Security fencing to mark the company's perimeter.
• Fire extinguishers for fire-sensitive areas like server rooms and security rooms.
• Security guards can help to maximize security.
School
• An adjustable firewall and proxy to allow authorized users access from the outside and
inside.
• Strong Antivirus software and Internet Security Software packages.
• Wireless connections that lead to firewalls.
• Children's Internet Protection Act compliance.
• Supervision of network to guarantee updates and changes based on popular site usage.
• Constant supervision by teachers, librarians, and administrators to guarantee
protection against attacks by both internet and sneakernet sources. security via
firewall
Large government
• A strong firewall and proxy to keep unwanted people out.
• Strong Antivirus software and Internet Security Software suites.
• Strong encryption.
• White list authorized wireless connection, block all else.
• All network hardware is in secure zones.
• All host should be on a private network that is invisible from the outside.
• Put web servers in a DMZ, or a firewall from the outside and from the inside.
• Security fencing to mark perimeter and set wireless range to this.
• Sign an email message to ensure its integrity and confirm the identity of its sender.
• Encrypt the body of an email message to ensure its confidentiality.
• Encrypt the communications between mail servers to protect the confidentiality of
both the message body and message header.(Cryptography)
The first two methods, message signing and message body encryption, are often used together.
The third cryptography method, encrypting the transmissions between mail servers, is typically
applicable only when two organizations want to protect emails regularly sent between them.
For example, the organizations could establish a virtual private network.(VPN) to encrypt the
communications between their mail servers over the Internet. Unlike methods that can only
encrypt a message body, a VPN can encrypt entire messages, including email header
information such as senders, recipients, and subjects. In some cases, organizations may need to
protect header information. However, a VPN solution alone cannot provide a message signing
mechanism, nor can it provide protection for email messages along the entire route from sender
to recipient.
• Anti-Spam Control Most modern mail servers use several anti-spam controls, one of
which is the Real-time Blackhole List or RBL. The Real-time Blackhole List prevents
mail coming from known spamming domains from reaching your users. It does this by
comparing the IP address of the sender with a list of known spammers. If the IP
address is found, the mail is rejected.
Firewall Protection
It limits and regulates the access from the outside to the internal network and also regulates
traffic going out. It is used to keep outsiders from gaining information to secrets or from
doing damage to internal computer systems. Firewalls are also used to limit the access of
individuals on the internal network to services on the internet along with keeping track of
what is done through the firewall.
Firewalls filter traffic based on their protocol, sending or receiving port, sending or receiving
IP address, or the value of some status bits in the packet. There are several types of firewalls
which include packet filtering, circuit level relay, and application proxy.
If your organization does not have a firewall, get one. At least implement a packet filtering
firewall on a Linux based computer, if money is the concern.
• The firewall should filter e-mail, FTP file transfers, and web content traffic for
potential harmful or hostile code and viruses.
• No computer should be directly connected to the internet without going through an IS
approved firewall. This means independent modem connections to the internet should
be forbidden.
Firewall Policy
• Set up a "spoofing filter" on your firewall - Don't allow traffic from the internet
that indicates a source IP address matching any of your internal network addresses.
This keeps attackers from "spoofing" your machines and possibly causing them to
crash.
Prevent spoofing from your network - Place an outbound filter (for addresses inside your
network attempting outside access) on the firewall that only allows traffic from valid internal
network addresses to be serviced. This should prevent attacks against other networks from
being originated in your network.
Types of Firewalls
• Packet Filters
Packet filters are one of several different types of firewalls that process network traffic on
packet-by-packet basis. Its main job is to filter traffic from a remote IP host, so a router is
needed to connect the internal network to the internet. The routers is known as screening
router, which screens packets leaving and entering the network.
• Circuit-Level Gateways
The Circuit-Level Gateway represents proxy server that statically defines what traffic will be
allowed. Circuit proxies always forward packets containing a given port number, if the port
number is permitted by the rules set. This gateway operates at the network level of OSI
model. IT act as IP address translator between internet and internal network. The main
advantage of proxy server is its ability to provide Network Address Translation (NAT). NAT
hides the IP address from the internet. This process effectively protects all internal
information from internet.
• Application-Level Gateways
The application-level gateways represents the proxy server operating at the TCP/IP
application level. A packet is forwarded only if a connection is established using some known
protocol. The application gateway analysis the whole message instead of individual packets
when receiving or sending data.
Password Security
Passwords are a primary piece of information that intruders will try to acquire in order to gain
unauthorized access to systems or networks.
Password Storage
When users enter passwords for the network or operating system, they or some facsimile of
them must be stored so there is something to compare user login attempts to. There are three
primary choices for password storage:
• Clear text
• Encrypted password
• Hash value of a password - Used by Unix and Windows NT
• Readable by anyone.
Passwords are more secure when they can only be read by the administrator or root account.
Also the best password storage security is to store the hashed value of a password.
For help in choosing passwords wisely see the article Tips for choosing Passwords that can be
easily remembered, but are secure
• PAP - Password Authentication Protocol - Used with Point to Point Protocol (PPP).
The password is sent in the clear.
CHAP - Challenge handshake authentication protocol is preferred rather than PAP since the
actual password is not sent across the internet or network.
Anti-virus
Some apparently useful programs also contain features with hidden malicious intent. Such
programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.
• Malware is the most general name for any malicious software designed for example
to infiltrate, spy on or damage a computer or other programmable device or system of
sufficient complexity, such as a home or office computer system, network, mobile
phone, PDA, automated device or robot.
• Viruses are programs which are able to replicate their structure or effect by integrating
themselves or references to themselves, etc. into existing files or structures on a
penetrated computer. They usually also have a malicious or humorous payload
designed to threaten or modify the actions or data of the host device or system without
consent. For example by deleting, corrupting or otherwise hiding information from its
owner.
• Trojans (Trojan Horses) are programs which may pretend to do one thing, but in
reality steal information, alter it or cause other problems on a such as a computer or
programmable device / system.
• Spyware includes programs that surreptitiously monitor keystrokes, or other activity
on a computer system and report that information to others without consent.
• Worms are programs which are able to replicate themselves over a (possibly
extensive) computer network, and also perform malicious acts that may ultimately
affect a whole society / economy.
• Bots are programs that take over and use the resources of a computer system over a
network without consent, and communicate those results to others who may control
the Bots.
The above concepts overlap and they can obviously be combined. The terminology, along
with the dangers involved, are constantly evolving.
Antivirus programs and Internet security programs are useful in protecting a computer or
programmable device / system from malware.
Such programs are used to detect and usually eliminate viruses. Anti-virus software can be
purchased or downloaded via the Internet. Care should be taken in selecting anti-virus
software, as some programs are not as effective as others in finding and eliminating viruses or
malware. Also, when downloading anti-virus software from the Internet, one should be
cautious as some websites say they are providing protection from viruses with their software,
but are really trying to install malware on your computer by disguising it as something else.
Anti-spyware
There are two major kinds of threats in relation to spyware:
Spyware collects and relays data from the compromised computer to a third-party.
Browser choice
As of December 2008, 68.2% of the browser market was held by Internet Explorer. As a
result, malware creators often exploit Internet Explorer. Internet Explorer market share is
continuously dropping (as of 2009; see list of web browsers for statistics) as users switch to
other browsers, most notably Firefox (with 21.3% market share), Safari (web browser) (with
7.9% market share) and Google Chrome (1% market share).
USER SECURITY ISSUES
User Education
• Use caution opening e-mails. Do not open mail from unknown originators.
• Make users aware of ability for hackers to hide executable files as text or other
harmless file types.
• Users must be educated not to use the same passwords at work that they may use over
unsecured connections on the internet.
Password Policies
• Logon passwords must be changed at least every 90 days (30-60 days
recommended).
• Minimum password age policy - 5 days.
• Passwords must be at least 8 characters long and use at least two numbers.
• On Windows Domain networks in the "Domain Security Policy" tool, select
"Security Settings", "Account Policies", and "Password Policy". Enable the
"passwords must meet complexity requirements" rule. This means at least one
character from three of the following categories must be included:
o lowercase
o uppercase
o numbers
o special characters such as !@#$%^&*(){}[]
• Passwords must be kept secret and not written down.
• Don't let programs save passwords.
• Lock account after 3 failed logon attempts within 15 minutes.
• Account lockout should be reset by an administrator.
• No clear text passwords that can allow access to any sensitive information should
be sent through any unsecured network such as the internet.
• The use of clear text passwords that can allow access to any sensitive information
on a secure network should be avoided. This means that the use of FTP programs
(unless over VPN) should be avoided. Secure Shell (SSH) programs can be used to
perform the same function with encrypted passwords.
• Passwords should not be stored using reversible encryption.
Account Policy
• Remote users should be disconnected on NT domains after 1-4 hours of inactivity.
This keeps users logged off after business hours so attackers can't use an open account
to launch an attack from. Also any open files are closed and the tape backup program
can backup all files. Open files are not backed up.
• Set the account policy "Users must log on in order to change password".
which, for example, have signatures, dates; need protection from disclosure, tampering,
Good software security practices can help ensure that software behaves properly.
Safetycritical and high-assurance system designers have always taken great pains to analyze
and to track software behavior. Security-critical system designers must follow suit. We can
avoid the Band-Aid-like penetrate-and-patch approach to security only by considering
security as a crucial system property. This requires integrating software security into your
entire software engineering process.
REFERENCES
• http://www.wikipedia.com/internetsecurity
• http://howstuffworks.com/internetsecurity
• http://internetsecurity.sys-con.com
• http://answers.com
• http://www.ibm.com/developerworks/websphere/techjourna
l/0904_amrhe in/0904_amrhein.html
• http://Amazon.com
• http://itcd.hq.nasa.gov/networking-vpn.html