Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Security

2013, Salesian journal of humanities and social sciences

Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article 60 | Dhirodatta Subba Cyber Security Dhirodatta Subba is an Assistant Professor and Head, Department of Computer Science and Application, Salesian College, Siliguri Campus. He obtained his M. Sc (Mathematics) and M. Tech (Computer Science and Data Processing) from IIT Kharagpur. He worked with Tata Consultancy Services for many years before joining the College. He is associated with editing of the Salesian Journal of Humanities & Social Sciences. Abstract The growth of Internet Technology has brought huge benefits to mankind. However, new and more complex issues have arrived: cyber crime, cyber terrorism, cyber espionage, cyber war. The subject that deals with the preventive aspect of handling these issues is Cyber Security. It requires an army of trained professionals to make the country safe from these threats. Due to its importance, University Grants Commission (UGC) has mandated that the subject be taught in the institutes of higher education. It is a vast subject, and in this article effort has been made to introduce it in brief with some basic information regarding sources of threat, forms of cyber attack and elements of cyber security. Keywords: Cyber security, Cyber space, Cyber espionage, Cyber war, CERT-In. Introduction In the recent past we have witnessed some events which are worth mentioning. The first one is about Iran's nuclear program. Many countries in the world had been watching the development with concern as Tehran was determined on producing weapons-grade uranium. The stated intention about the program was for medical research. In his retirement speech to the Israeli Knesset Foreign Affairs and Defense Committee on January 7, 2011, Mossad Chief Meir Dagan stated that Iran would not be able to produce a viable nuclear weapon before 2015. He elaborated that Iran is still far from being capable of producing nuclear weapons and that a series of malfunctions and failures had set the Iranian nuclear weapons program back by several years.1 Meanwhile, from around June 2010, rumor about Stuxnet, a computer worm, believed to have originated in Israel, was doing the rounds in international media. It made its way into the computers of Iran's nuclear facilities via the laptops used by engineers. The worm first reached the laptops through internet. It knew exactly what to do. It did not make the control systems go haywire or stop the machines abruptly, which might have caused suspicion. It just tweaked the controls so as to make the centrifuge yield very little without going defunct. It is said to have increased the speed in order to damage the spindle in the machines over a period of time. The centrifuge 1 URL: http://www.haaretz.com/print-edition/news/outgoing-mossad-chiefiran- won-t-have-nuclearcapability-before-2015-1.335656 (accessed on 14/Apr/2013) Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article Cyber Security | 61 machines, during the productive period, worked so inefficiently that they hardly enriched any uranium quantity before going out of order.2 Another one that hit the news headlines in April 2010: Unidentified hackers based in China systematically penetrated computers in sensitive Indian government offices, including the National Security Council Secretariat, electronically stealing documents on Maoists, missiles, and personal and financial information on Indian officials.3 Further back, in 2008 South Ossetia war, Russia's initial attack on Georgian soil was preceded by a synchronized cyber attack that crippled Georgian government websites.4 These examples give us a sense of how the present and the future looks when we are dealing with the age old issues of conflicts or power game. Cyber world is known as the 'fifth front' by people involved in defense - others being land, air, sea and space. The use of cyberspace depends on physical facilities like undersea cables, microwave and optical fibre networks, telecom exchanges, routers, data servers, and so on. Sources of Threat Some of the known sources are as follows: • Insider Threat The disgruntled insider is a potential perpetrator of computer crimes. Insiders do have unrestricted access to the system/s; so, they could damage it or steal data for personal gain. • Criminal Groups Criminal groups are increasingly using cyber intrusions, attacking systems for purposes of monetary gain. They are responsible for extortion, credit card frauds, tricking employees into giving up their log-in and password information (identity theft) which they use to break into target systems and vandalize them. They are making use of social media sites to gather intelligence about companies to achieve this objective. They are also using innovative techniques through 'spam', 'phishing' and 'vishing' to steal sensitive user information. 2 URL: http://www.telegraphindia.com/1120216/jsp/opinion/ story_15137785.jsp#.UWV_96I9GxA (accessed on 14/Apr/2013) 3 URL: http://www.telegraphindia.com/1100407/jsp/frontpage/ story_12311784.jsp (accessed on 14/ Apr/2013) 4 URL: http://www.crn.com/news/security/210003057/russian-cyberattacks- shut-down-georgian-websites. htm (accessed on 14/Apr/2013) Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article 62 | Dhirodatta Subba • Malware Developers Malware (Virus, Worm, Trojan) developers can do more damage to networks than hackers do. Malware attacks are also being launched from social media sites such as Facebook or LinkedIn. • Foreign Intelligence Services Cyber espionage is the practice of using information technology to obtain secret information without permission from its owners or holders. Foreign intelligence services are actively using cyber tools as part of their information gathering and espionage tradecraft; target being sensitive government and private sector information for the purpose of gaining strategic, economic, political, or military advantage. The theft of innovations which are the fruits of costly investments in research and development is an immense strategic and economic loss to the targets. • Foreign Military Although cyber war is not so lethal in the sense of human loss or property destruction, the consequences could be equally severe, especially, if the level of automation is high in the country as the system of governance as well as business and industry could be brought down to a state of total collapse, even if temporarily. • Terrorists Terrorists are known to use information technology and the Internet to formulate plans, raise funds, spread propaganda, and communicate securely. There are reasons to expect terrorists to use cyber attacks to disrupt critical systems in order to harm targeted government or civilian populations. The knowledge of making bombs, lethal weapons, and even weapons of mass destruction (WMD) are freely available in the internet. • "Hacktivists" Politically motivated attacks on publicly accessible web pages or email servers. Groups and individuals seek to overload email servers and to hack into web sites in order to send a political message. While these attacks generally have not altered operating systems or networks, they still damage services, and by denying the public access to websites containing valuable information, they infringe on others' right to communicate. • "Recreational" Hackers Virtually every day there is another report about "recreational hackers" or "crackers" who penetrate networks for the thrill of it or for bragging rights in the hacker community. While remote cracking once required a fair amount of skill and Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article Cyber Security | 63 computer knowledge, the recreational hacker can now download attack scripts and protocols from the World Wide Web and launch them against victim sites. Thus, while attack tools have become more sophisticated, they have also become easier to use. These types of hacks are numerous and may appear on their face to be benign, but they can have serious consequences. Forms of Cyber Attack Following are the commonly found techniques: • Hacking It is a generic term used for any kind of unauthorized access to a computer or a network of computers. Some technologies like packet sniffing, tempest attack, password cracking and buffer outflow facilitates hacking. • Web Defacements and Semantic Attacks Website defacements are the most common form of politically motivated cyber attack. The most serious consequences of web defacements result from "semantic attacks," which change the content of a web page subtly, so that the alteration is not immediately apparent. As a result, false information is disseminated. • Domain Name Server (DNS) Attacks Computers connected to the Internet communicate with one another using Internet Protocol (IP) addresses. Computers consult domain name servers (DNS) to map the name of a website (e.g. xyz.com) to its numerical IP address (64.12.50.153). If the DNS provides an incorrect numerical address for the desired website, then the user will be connected to the incorrect server, often without the user's knowledge. A DNS attack can thus be used to disseminate false information or to block access to the original website. • Distributed Denial of Service (DDoS) Attacks Distributed Denial of Service attacks subject web and email servers to overwhelming numbers of communications from other computers. The high volume of communications can slow or crash the target system. Hackers often multiply the force of their DDoS attacks by using malicious code to take control of other users' machines and using these "zombie" machines to send additional communications to targeted servers. The hijacked computers are also called 'botnets'. • Syntactic Attacks using Malicious Code Worms, Viruses, and Trojan horses are types of malicious code. The computer infrastructure is damaged by modifying the logic of the system in order to introduce Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article 64 | Dhirodatta Subba delay or make the system unpredictable. It is a cost-effective way to significantly disrupt the information infrastructure. Malware is getting smarter and has evolved from simple code that can be identified by its signature to one that can change its signature, making it very difficult to detect. Major commercial anti?virus programs are not always able to identify them. • Exploitation of Routing Vulnerabilities Routers are the "air traffic controllers" of the Internet, ensuring that information, in the form of packets, gets from source to destination. Routing disruptions from malicious activity have been rare; but the lack of diversity in router operating systems leaves open the possibility of a massive routing attack. The malicious reprogramming of even one router could lead to errors throughout the Internet. • SQL Injection Attack SQL (Structured Query Language) is the language of computer database. Whenever one fills out a form to purchase a product through a website, the entries are translated into SQL and entered into a database. If a particular web form has been poorly designed, an attacker can enter information to trick the database into revealing information it was not intended to, for example, vast customer lists including email addresses and credit card information. • Defamation E-mails could be used for spreading disinformation, threats and defamatory elements. Similarly, social networking sites could be used. • Use of Cryptology Financial institutions and governments have been using encryption for secure data transmission. But the availability of high frequency encrypted voice/data links has made the task of tracking communications by bad elements and terrorists difficult. It is a herculean task to decrypt the information being exchanged. • Compound Attacks By combining methods, hackers could launch an even more destructive attack. Politically-motivated hackers will seek to attack high-value targets, including networks, servers, or routers whose disruption would have symbolic, financial, political or tactical consequences. Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article Cyber Security | 65 What is Cyber Security? "Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access."5 "Cyber security involves protecting information and systems from major cyber threats, such as cyber terrorism, cyber warfare, and cyber espionage. In their most disruptive form, cyber threats take aim at secret, political, military, or infrastructural assets of a nation, or its people."6 Elements of Cyber Security The following are the general characteristics of cyber security framework: Application Security It is the use of software, hardware, and procedural methods to protect applications from external threats. Following are some examples: • Application firewall that limits the execution of files or the handling of data by specific installed programs • Anti-virus software • Spyware detection/removal programs • Configuration and patch management • Following security protocols for Web applications during development • Performing hostile security test This involves breaking into own system through the web application - simulated attack. • Penetration tests These are regular scans for vulnerabilities which can uncover problems and make one aware of software that needs to be patched. Thorough scans can be performed by third party consultants like Qualys, or with use of software like. Information security • User access authorization • Encryption/decryption programs • Database logs 5 URL: http://whatis.techtarget.com/definition/cybersecurity (accessed on 11/Apr/2013). 6 URL: http://www.paloaltonetworks.com/community/learning-center/ what-is-cyber-security.html (accessed on 11/Apr/2013). Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article 66 | Dhirodatta Subba • Auditing process • Web Application Firewall (WAF) This new breed of firewall watches for attack signatures and stops them before they reach the application. It comes either as an appliance, made by companies like Imperva or Barracuda Networks, or as a cloud-based service, like CloudFlare. Network security • A router that can prevent the IP address of an individual computer from being directly visible on the Internet • Conventional firewalls • Network security monitoring for detection and prevention of intrusions • Auditing process Disaster recovery / business continuity planning • One possibility is that of moving some of the infrastructure to the cloud for its ability for network resources to scale elastically in order to mitigate the attacks. Google's AppEngine, Amazon's EC2, RackSpace's Cloud, CloudFlare - they have the infrastructure in place to continue to run even under what would be a withering attack to a traditionally hosted site. This approach allows sites to use only the resources they need under normal conditions, but still not be overwhelmed when an attack occurs. End-user education • Insuring all employees/users, not just the IT staff, are aware of safe computing practices by way of training, newsletters, posters and simulations. • Introducing the subject in regular courses of academic and engineering institutes so students get the knowledge early on. Issues Involved Following are some of the key issues: • Complications associated with cross-border law enforcement A typical cyber investigation can involve target sites in multiple states or countries, and can require tracing an evidentiary trail that crosses numerous state and international boundaries. Moreover, attribution and identification is extremely difficult as identities of the perpetrator can be easily masked, making it easy for the possibility of denials. • Slow realization Malware is getting smarter and has become very difficult to detect, even for major Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article Cyber Security | 67 commercial protection software. Often, cyber attacks are silent and go unnoticed for long periods. • Lack of International Standard/convention With regard to Cyber attack, Cyber war, and appropriate countermeasures, till date there is no common convention agreed upon by all nations. Globally, the issues are still under debate. • Constantly evolving nature of security risks To deal with such environment, advisory organizations are promoting a more proactive and adaptive approach. In USA, for example, the National Institute of Standards and Technology (NIST, a unit of the Commerce Department, formerly known as the National Bureau of Standards), issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments. International Organization for Standardization (ISO) has its own guideline. These guidelines are expatiated on in the NIST 8007 and ISO 270028 publications. How are we doing? On 9th June, 2000, our parliament passed the "IT Act 2000".9 It addressed issues primarily related to electronic commerce. In 2008, Parliament passed amendments to the IT Act, with added emphasis on Cyber Terrorism and Cyber Crime, with a number of amendments to existing sections and the addition of new sections, taking into account cyber threats. Further actions include the passing of rules such as the Information Technology (Guidelines for Cyber Cafe) Rules, 2011 under the umbrella of the IT Act. Indian Computer Emergency Response Team (CERT-In): CERT-In is the most important constituent of India's cyber community. It is modeled along similar agencies in the Western countries. Its mandate states, 'ensure security of cyber space in the country by enhancing the security communications and information infrastructure, through proactive action and effective collaboration aimed at security incident prevention and response and security assurance'. Under the IT Amendment Act 2008, only CERT-In is mandated to serve as the national agency in charge of cyber security. The Act also provided for a national nodal agency for protection of CII (Critical Information Infrastructure). 7 URL: http://www.itl.nist.gov/lab/specpubs/sp800.htm (accessed on 14/Apr/2013). 8 URL: http://www.iso27001security.com/html/27032.html (accessed on 14/Apr/2013). 9 URL: http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf (accessed on 15/Apr/2013). Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article 68 | Dhirodatta Subba As for National Policy on cyber security, the Department of Information Technology issued a discussion draft on National Cyber Security Policy10 on 26th March 2011, and invited comments on it. Among the publicly available feedbacks are following: • Observations from Takshashila Institution were provided back in May 2011.11 It contained many suggestions for improvement. • Institute for Defense Studies and Analysis (IDSA) has done a thorough job of assessing the cyber security challenges facing the country in the study report. It includes some feedback by way of references to the original document.12 It recommends setting up of a central command for handling cyber war, as it is considered to be the fifth front. • Data Security Council of India (DISC), setup as an independent Self-Regulatory Organization (SRO) by NASSCOM®, to promote data protection, develop security and privacy best practices & standards and encourage the Indian industries to implement the same, has presented its viewpoint from the Industry perspective: "While CERT-In is doing an excellent job in the government sector, same needs to be replicated for the private sector through establishment of appropriate agencies within each of the identified private sectors, that co-ordinate with CERT-In and / or National Nodal Center that may be created. DSCI feels that in this policy, there should be a recommendation for establishment of National Nodal Center, which will co-ordinate the efforts of both the public and private sectors and will also assign roles and responsibilities."13 • Dr. Marri Channa Reddy Human Resource Development Institute of Andhra Pradesh also provided some input. Table A in the next page is a summary of procedural recommendations at four levels: Country, Network, Corporation and User. Chart-1 (page 69) in the following section is a representation of government organizations that would work in collaboration with one another, as proposed in the draft security document. Department of Electronics and Information Technology initiated the Legal framework.14Many other entities are involved in the work.15 10 URL: http://www.mit.gov.in/sites/upload_files/dit/files/ncsp_060411.pdf(accessed on 15/Apr/2013). 11 URL: http://www.takshashila.org.in/wp-content/uploads/2010/03/TPACyberSecurity-RJSKN-1.pdf (accessed on 15/Apr/2013). 12 IDSA, IDSA Task Force Report, 2012. URL: http://idsa.in/system/files/book_indiacybersecurity.pdf (accessed on 15/Apr/2013). 13 DSCI Comments on National Security Policy_Final.pdf, URL: http://www.dsci.in/taxonomy/term/591 (accessed on 15/Apr/2013). 14 URL: http://deity.gov.in/content/cyber-laws (accessed on 15/Apr/2013). 15 URL: http://www.cyberlawsindia.net/; http://www.caaa.in/Image/cyber%20laws%20overview.pdf (accessed on 15/ Apr/2013). • • • • • • • • monitoring, routing and gateway controls security manpower - CISA, CISSP, ISMS-LA, DISA etc.) processes and crisis management) • manpower. Crisis management and focusing on tools, technology, products and services. • • • • • • • • Corporate controls routing and (configuration, patch of outside safe computing both within and behavior in the interest Promotion of acceptable users' activities security related of skills for personnel engaged in Periodic training and upgradation emergency response. Crisis management and services and skilled manpower. Use of secure product and advisories issued by CERT-In. including prompt actions on law enforcement activities, obligations and cooperation with Conformation to legal and vulnerability management) processes technologies and Keeping up-to-date with security gateway monitoring, end users by way of net traffic activities, protecting average Pro-active dealing with malicious practices (ex. ISO27001. Compliance to security best Table : Actions At Different Levels emergency response. and services and skilled Use of secure product Security research and development campaign. • advisories issued by CERT-In. enforcement. awareness including prompt actions on Nation- wide security enforcement activities, routing and gateway controls on the net by way of net traffic monitoring, Lawful interceptions and Law obligations and cooperation with law Pro-active dealing with malicious activities Conformation to legal management) overseas (MoUs with vendors and CERTs and security forums). patch and vulnerability Information sharing and cooperation (configuration, security technologies and Keeping up-to-date with response (National cyber alert system • net traffic 15408, security process - ISO 27001 and • average end users actions concerning security product - ISO Security incident - early warning and protecting by way of quality of services and Conformity assessment malicious activities, ensuring Pro-active actions to deal with infrastructure (enabling and endorsement In guidelines) compliance (ex: ISO 27001, ISO 20001 & CERT- • agreements (SLAs). (ISO 20001) and service level Technology Act 2000) Information Standards and guidelines for practices (ex. ISO27001), service quality enforcement (e.g. Compliance to security best privacy protection - Compliance, • Network liabilities and Policy directives on data security and Country • • • • computer resources abuse of control to prevent trust-worthy access and Maintain reasonable necessary. as to security advisories net and adhere while on the pitfalls Beware of security intervals. and update at regular Use legal software protection. necessary for self- level of awareness Maintain a User Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article Cyber Security | 69 Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article 70 | Dhirodatta Subba Chart 1: Stakeholders : Government Organisations Thus the legal aspect is also getting refined with collaboration of different groups. As of writing this article, final policy document has not been released; but the government, the industry, the academia and legal experts are converging, and it is expected to be available soon. Salesian Journal of Humanities & Social Sciences, Vol. IV, No. 1 (May 2013) ISSN: 0976-1861 | DOI: 10.51818/SJHSS.04.2013.60-71 | Page No: 60-71 | Section: Article Cyber Security | 71 Conclusion More and more nations are realizing that their national security, as well as economic prosperity, will depend on their ability to protect themselves in cyber space (which includes the internet, wider telecommunications networks and computer systems). The complex nature of cyber space requires a multi-faceted approach involving a close partnership between Government, industry and academia for ensuring the security of information systems and assets of the country. While the government, the industry, the academia and the law schools are working on the multi-dimensional aspect of capacity building, national and international cooperation, research and development, education and awareness, issues relating to privacy and freedom of expression - we come to the humble realization that cyber security is everyone's responsibility, every contribution is important, though it may seem like a drop in the ocean.16 16 Recommended reading 1. URL: http://en.wikipedia.org/wiki/Cyber_security_standards 2. URL: http://www.denyall.com/company/ whitepaperrs_en.html?gclid=CMCElrGF3bYCFU8a6wodNm4A_Q 3. URL: https://www.prometric.com/en-us/clients/cybersecurity/Assets/ default.html?cshp 4. URL: http://www.cybersecurityindex.org/ 5. URL: https://www.eff.org/cybersecurity