Esecurity
Esecurity
Esecurity
So, it also means that any data which can be reconstituted so that it does enable an
individual to be identified can also be classed as personal data. So, even if personal data
has been de-identified, encrypted or pseudonymized, it is still classed as personal data.
Pseudonymized data is when, instead of removing the personal items of data, they are
replaced with a temporary ID. This means instead of seeing the person’s name, you would
see an ID which would mean nothing to you. The problem is that if, similar to de-
identification, somebody can recognize that individual from the rest of the record, they
can replace the ID with the individual’s name.
1. If it were to fall into the wrong hands, the data could be used for identity theft or
to withdraw huge sums of money from bank accounts.
2. Identity theft is when a fraudster pretends to be another individual online by using
that individual’s personal information.
3. Fraudsters who have accessed an individual’s personal data can use their login
details to access their bank accounts or commit other types of fraud, while
pretending to be that individual. They can take your banking information and make
unauthorized withdrawals and purchases, and transfer money between accounts.
4. If burglars obtain personal data such as addresses and information about when a
person is at work, then they can burgle that person’s house.
Organizations and businesses can take certain measures to ensure the confidentiality of
data.
1. It is essential that personal information should only be seen by those people who
are authorized to see it.
2. Workers who deal with confidential information must not tell anybody or use the
information for any reason except with the permission of the person who gave it.
In order for this to happen workers are often asked by their employers to sign an
agreement to this, which is called a confidentiality agreement.
3. Online services, particularly online banking and shopping, allow organizations to
have access to private data such as names, addresses, phone numbers, financial
records and so on. This information should not be passed from organization to
organization without authorization from the individual. Organizations must be held
responsible for their decisions to pass on information.
4. Individuals can keep their data confidential by not putting too much personal data
on social media. Insurance companies in many countries around the world often
use the same approach and might charge much higher premiums (monthly
payments) depending on the customer’s lifestyle and in addition may use this as
evidence when deciding not to pay out on a claim.
5. The photos and videos people take with their smartphone contain information,
known as metadata, including the time and place they were taken (geotag). If these
photos are intercepted, the individual’s address or where they work can be
discovered.
Firewalls do not always prevent hackers from accessing networks, however. Although a
hacker’s computer is prevented from accessing the network, the hacker could physically
steal a computer that is permitted to access the network. More likely, they can use
software which can change the IP address of their computer to one which is acceptable
to the firewall.
2. Penetration Testing
A penetration test, sometimes referred to as a ‘pen test’, is when companies employ
somebody to deliberately attack their computer network. They do this so that the
authorized ‘hacker’ will identify the weaknesses in their system’s security and the
company can then take measures to improve it if necessary.
3. Authentication Techniques
In order to prevent hackers accessing a computer network, users are required to log on.
This means that they have to identify themselves to the system so that it can be sure it is
not a hacker trying to gain access. This is called ‘authentication’. There are many ways in
which a person can prove to a computer system that they are who they say they are:
When using online banking, additional information such as the user’s date of birth is often
required. When a customer carries out certain transactions using a smartphone, some
banks will send a one-time PIN or password in a text message for them to enter as part
of the authentication process. This is also called two-factor authentication.
4. Levels of Access
If hackers do gain access to a network, their ability to retrieve personal data can be limited
by network settings created by a network manager. Different groups of users can be
granted different levels of access to the data on the network. This is particularly the case
with hospitals, for example, where doctors may be able to see the illnesses and diagnoses
of their patients but administration staff may only be able to find out other, not health-
related, information about patients.
Another example is the use of online shopping websites that require a login; customers
will only see data that is relevant to them. However, if programmers employed by the
company access the customer database, they will be able to view all the accounts.
With social networks, it is the owner of the data that can grant different levels of access.
It is possible for individuals to amend settings so that only ‘friends’ are allowed to see
their data, or they could allow both ‘friends’ and ‘friends of friends’ to see their data.
5. Network Policies
Network policies are sets of rules that allow companies to choose who is allowed to access
their computer network and control their use of the network once they have gained
access. When workers join a company, they are normally required to sign an agreement,
such as an acceptable use policy. This specifies what type of use is acceptable and what
is not. They have to agree not to use the network for illegal, unethical or distracting non-
work-related activities, such as downloading copyrighted material or spending time on
social networking sites to communicate with friends.
6. Software Updates
As well as being vital for updating a computer’s operating system, software updates are
often made available for different types of application software. Although these updates
are useful in eliminating bugs and making the software easier to use, probably their most
useful function is when they eliminate specific security weaknesses. It is important for
users to install updates as soon as possible in order to limit the amount of time hackers
have to find and exploit these weaknesses. If a system or app is left without updating for
a long time, more hackers may become aware of any vulnerabilities and use that
information to gain access to personal information stored on the system or app.
Other measures
There are other measures which can be taken to increase network security. Encryption
has already been discussed in terms of the fact that data, even when illegally accessed,
will not be understandable. The use of digital certificates also provides security. If a device
is lost or stolen; the owner can send a command to it using another phone that will
completely remove any data, such as personal data, from it.
2- Smishing: It means SMS phishing. A fake SMS is sent to the user containing a URL
or telephone number. The user is asked to log on to the website or make a
telephone call.
An SMS text message is sent to a user that will ask them to telephone a number or click
on a link. When that number is telephoned, the person receiving the call will attempt to
get personal details from the caller. The caller could also be charged a great deal of money
for the call. When a link is clicked malware is downloaded onto the user’s phone. The
malware can be used to collect the user’s data to commit identity fraud and theft. It can
also make the device part of a bot network. The link could also take the user to a
legitimate looking website, as it does in phishing, and cause the user to give away their
personal details. Smishing will often entice a user into telephoning a number or clicking
the link by advising them of a profitable gain they will receive if they do so, for example a
voucher or a gift card that will give them money off a product or service.
Effects of smishing:
1- Creator of the sms can gain personal data, bank account etc.
2- It can lead to fraud or identity theft.
3- Vishing: Voice mail phishing, it uses a voice mail message to trick the user into
calling the telephone number contained in the message.
The person who is vishing will either say they are alerting the victim to an issue with their
account, or advising the victim of a profitable gain. They will often ask the victim subtle
questions to get the personal data they want.
Effects of vishing:
1- Creator can gain personal data, bank account etc.
2- It can lead to fraud or identity theft.
Effects of pharming:
1. Creator can gain personal data, back accounts
2. It can lead to fraud and identity theft
Methods to avoid pharming:
1. Use of anti-spyware software.
2. User should remain careful and cautious.
3. Always double check the URL to see if it is the same one you typed in.
4. Users should check if the website looks the same as when they last visited it.
5. Users should look for the padlock security symbol
6. Used to signify the HTTPS, showing that the website is secure, before entering
any personal and financial details.
7. Users should run regular scans of their computer with anti-virus software that
is designed to detect pharming programs.
Types of Malware
1. Virus A computer virus is a type of malware that is designed to spread from one
computer to another, usually by means of the internet, causing changes in the way
each computer operates as it spreads. They have the ability to replicate
themselves, just like real viruses.
Effects of Viruses
1. Some types of virus delete the data on the disk or just corrupt or change the data.
2. They insert themselves or attach themselves to another computer program.
Symptoms that can indicate a virus is present are that popup windows suddenly
start appearing frequently, the user’s homepage is changed so that it is different to
what it is normally, or their password is different, preventing the user from being
able to log on. Viruses can cause large numbers of emails to be sent from the user’s
email account. The computer may frequently crash or its processing speed can
noticeably slow down.
How to overcome?
1- Use an ad blocker
2- Pay for premium, ad-free versions of popular services:
3- Use an antivirus.
4- Use an adware removal software.
Effects of Rootkit:
1- Personal data can be stolen.
2- It can lead to identity theft.
3- Banking credentials can be stolen.
How to Overcome this threat?
1- Use anti-virus suite.
2- Use a strong firewall.
3- Reinstall the OS.
7- Malicious Bots: A bot is an application that is automated and used to carry out
simple and repetitive tasks. These are normally tasks that a human would find
mundane and time-consuming. Bots can be used for very productive reasons, but
they can also be used as a form of malware. Malicious bots are used by
cybercriminals in a variety of
ways:
1- SPAM bots are used to bombard people’s email inbox with SPAM emails.
2- Zombie bots are used to create a bot network. The bot will lay dormant on a
computer until an attack is launched. The computer will then be connected with
lots of other computers that have been compromised by zombie bots to launch a
large-scale attack on an organization.
3- Chatter bots will pretend to be humans on sites such as social networking and
dating sites.
1- Fraud
Computer fraud involves using a computer to take or alter electronic data, or to gain
unlawful use of a computer or system to illegally benefit financially. Several different
types of malware and general misuse of personal data have been described. For example,
spyware collects a user’s personal data, browsing habits and keystrokes. This can lead to
credit card fraud as well as identity theft. Once fraudsters have gained a user’s personal
and financial data, they can either sell the information to other criminals or they can
impersonate the user. They can use the user’s financial data to ask the bank for a new PIN
or even an extra card. They can buy goods via the internet using the credit card details
they have obtained. They can also withdraw large sums of money from the user’s bank
account. Most credit card fraud victims are unaware of what has happened until it is too
late.
Scareware, as we have seen, is used to obtain money under false pretense. Phishing,
vishing, smishing and pharming are intended to get the user to divulge their passwords,
credit card numbers and bank account information so that the fraudster can access the
user’s account to withdraw money, make money transfers and also use the details to shop
over the internet.
Ransomware, as we have seen, is used to blackmail users into paying large sums of
money, usually in Bitcoin so that it cannot be traced.
2- Industrial Espionage
It is ‘spying directed towards discovering the secrets of a rival manufacturer or other
industrial company’. It is usually the theft of business trade secrets. It used to be carried
out by getting an employee to work for a rival company and spy from the inside; it is now
more often carried out by hacking into databases or computer networks. Malware has
become a major tool in industrial cyber espionage, with the purpose of stealing
information in the form of company secrets. Regardless of what type of malware is being
used, each one attempts to exploit weaknesses in software to gain access. There exists a
form of malware that is designed to target a specific computer and thus lends itself to
industrial espionage where a particular company is being spied on. Hostile actors are
people who organize themselves into teams of hackers with a collective aim. They include
foreign states, criminals, groups of hackers with a common goal, as well as terrorists.
Foreign states are usually best placed to conduct the most damaging cyber espionage and
computer network attacks.
Cyber espionage can be conducted in order to hack into specific business computer
networks to steal large amounts of data without detection. This could include intellectual
property, research and development projects, or a company’s merger and acquisition
plans. In the past, companies employed spies but now they are turning more and more
to computer hackers to steal these secrets.
Intellectual property theft in the USA alone is estimated to cost companies hundreds of
billions of dollars per year. Certain countries have been held responsible for these
activities, but more private companies are now getting involved in this type of espionage.
Groups of hackers are offering their services for hire for millions of dollars. Some are
actually hacking into company secrets and offering the information they have gathered
to the highest bidder. This activity has been made easier by the development of the Dark
Web, where an auction-based marketplace exists. Most of the transactions are now
taking place using Bitcoin. It is a bit disconcerting for companies to realize that their most
confidential data may already be up for auction on the Dark Web. It is imperative for large
corporations to have their own counter-espionage operatives and to make their IT
systems secure. They need to investigate which of their secrets have already been offered
at auction.
3- Sabotage
The term computer sabotage refers to making deliberate attacks which are intended to
cause computers or networks to cease to function properly. The idea is that businesses,
education establishments and other organizations are attacked in order that their normal
operations are disrupted. It has been estimated that billions of dollars in the USA alone
have been spent on legal fees so that damages could be paid out to victims of sabotage
involving identity theft. A great deal of money has been spent on repairing computer
systems in hospitals and banks.
It is clear to see that not all sabotage is the result of sending malware, but it can consist
of a virus being sent to a computer which prevents users from logging on, and it can take
the form of distributing malware to allow hackers to illegally access an organization’s
network. Organizations need to guard against computer sabotage by taking measures to
protect all their hardware and software. This will not only require a firewall and use of
anti-virus software, but must include guidelines about the use of separate user IDs and
passwords for each individual user of a computer, including advice to change passwords
regularly.
Looking at the impact on an individual and their personal computer or laptop, malware
enables hackers to gain valuable information such as bank details, date of birth, email
address and passwords. The hacker can then commit identity fraud.