Module 2 - Security
Module 2 - Security
Current Events
Living andIT
in the Issues
Era in IT
LEARNING OBJECTIVES:
KEY TERMS
Computer Security Confidentiality Integrity Availability
Authentication Surveillance CCTV RFID
GPS Forensics Phenom Sem DNA Sequencing
Hacking Ransomware DoS/DDoS Phishing
Encryption Cryptography Encryption Algorithm Predictive Analytics
CORE CONTENT
Prevention of data theft such as bank account numbers, credit card information,
passwords, work related documents or sheets, etc. is essential in today’s communications since
many of our day to day actions depend on the security of the data paths.
Data present in a computer can also be misused by unauthorized intrusions. An intruder
can modify and change the program source codes and can also use your pictures or email
accounts to create derogatory content such as pornographic images, fake misleading and
offensive social accounts.
Malicious intents can also be a factor in computer security. Intruders often use your
computers for attacking other computers or websites or networks for creating havoc. Vengeful
hackers might crash someone’s computer system to create data loss. DDOS attacks can be made
to prevent access to websites by crashing the server.
Above factors imply that your data should remain safe and confidential. Therefore, it is
necessary to protect your computer and hence the need for Computer Security arises.
SURVEILLANCE
This is one of the most common security out there, monitoring of behavior, activities,
or information for the purpose of influencing, managing or directing. This can include
observation from a distance by means of electronic equipment, such as closed-circuit
television (CCTV), or interception of electronically transmitted information, such as Internet
traffic. It can also include simple technical methods, such as human intelligence
gathering and postal interception.
Types of Gadgets for Surveilling
• Camera - Digital Cameras are one of the common equipment used for surveilling and
is amazing for such a low cost.
• Audio Surveilling Equipment – there are different types of Audio equipment’s and here
are some example:
◦ Microphones – Most common used, small ones that is used for intercepting
conversations
◦ Parabolic Microphones – Designed to receive one-direction sound and is very
susceptible in crowds.
◦ Laser Microphones – It uses laser to detect a vibration in a hard surface, it comes
back to the transmitter then it will be recorded.
◦ Signal Tracking – Much like GPS it uses radio frequency ID tag, it can transmit
unique identifying signal allowing scanners to identify the tagged subject.
◦ Signal Interception – Electronic bugs can be physically attached in mother boxes
or switchboxes; the bug then hijacks the signal and can transfer when and
wherever its desire. This is commonly used for listening in some conversations.
◦ Computer Surveillance – Software or application imbedded or planted in hard
drives to monitor the internet traffic and data storage; you can associate this
with some viruses.
• Strengths
◦ Exposure status can be determined by analyzing the data gathered in the
surveillance.
◦ Very accurate information can be gathered.
◦ Can collect more detailed information.
• Weaknesses
◦ Costly
◦ Labor intensive
◦ Difficult to sustain over time
CCTV
Technology is quickly taking over every aspect of our lives, and solving crimes is no
different. In fact, the rapid changes and improvements in technology have meant that solving
crimes almost takes on a futuristic factor, like something from a work of fiction. During the
forensic science process, forensic equipment is used to process samples and evidence and
hopefully solve crimes. Measurements include analysis of evidence, fingerprinting or DNA
identification, analyzing drugs or chemicals and dealing with body fluids. Importantly, it is the
fusion of science and technology that allows forensic scientists to do a lot of their work.
Sciences such as biology, chemistry and mathematics are combined with various technologies
to process evidence.
Computer Forensics
There is different type of forensics like crime lab forensics, crime scene investigator
forensics, etc. Digital Forensics, also known as Computer forensics. Computer forensics is a
branch of digital forensic science pertaining to evidence found in computers and digital storage
media. The goal of computer forensics is to examine digital media in a forensically sound
manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and
opinions about the digital information.
• Digital Forensics Framework – One of the popular platforms for digital forensics work,
it is open source and comes under GPL (General Public License). Can be used in
Microsoft and Linux
• Open Computer Forensics Architecture (OCFA) - Another popular open source
platform, but this is it develop and built on Linux platform and uses PostgreSQL
database for storing data.
• CAINE – Computer Aided Investigative Environment, a Linux distro creation for digital
forensics.
• X-Ways Forensics – A advance platform for digital forensics examiners. It runs all
throughout the different version of Window OS.
• EnCase - multi-purpose forensic platform with many nice tools for several areas of the
digital forensic process. This tool can rapidly gather data from various devices and
unearth potential evidence. It also produces a report based on the evidence.
• Registry Recon – It’s an amazing analysis tool, it extracts the registry information from
the evidence and then rebuilds the registry representation. It can rebuild registries from
both current and previous Windows installations. However, it’s not free, it cost $399.
• The Sleuth Kit - A windows-based tool which helps in forensic analysis of computers.
It comes with various tools which helps in digital forensics. These tools help in analyzing
disk images, performing in-depth analysis of file systems.
Phenom Sem
This equipment is also used by many forensic labs to determine the appearance of
victims who are too
decomposed or damaged to
make a visual identification.
The user inputs data into the
software, including
information regarding human
remains, and a possible
physical appearance is deduced.
DNA Sequencing
Drug Testing
Ransomware
When a massive DDoS attack hit code-hosting site Github on Feb. 28, 2018 traffic
peaked at 1.3 terabytes per-second, setting a new record for attack size. On March 5, a US-based
“wired telecommunication carrier” received a massive wave of traffic hitting 1.7 terabytes per
second and shattering the previous record by nearly a third. Two years ago, the record was less
than half this size, set by an attack that knocked out the BBC’s website and hit 602 gigabytes
per second.
Phishing
Using bait and switch hacking technique, an attacker can buy advertising spaces on the
websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected
with malware. This way, they can further install malware or adware on your computer. The ads
and download links shown in this technique are very attractive and users are expected to end
up clicking on the same.
Man-in-the-middle (MitM)
A hacker inserts itself between the communications of a client and a server. (Hijacking,
Ip spoofing.)
Drive-by
Hackers look for insecure websites and plant a malicious script into HTTP or PHP code
on one of the pages. This script might install malware directly onto the computer of someone
who visits the site, or it might re-direct the victim to a site controlled by the hackers.
Malware Attacks
ENCRYPTION
The word encryption comes from the Greek word kryptos, meaning hidden or secret.
The use of encryption is nearly as old as the art of communication itself. As early as 1900 B.C.,
an Egyptian scribe used nonstandard hieroglyphs to hide the meaning of an inscription.
Encryption is widely used on the internet to protect user information being sent
between a browser and a server, including passwords, payment information and other personal
information that should be considered private. Organizations and individuals also commonly
use encryption to protect sensitive data stored on computers, servers and mobile devices like
phones or tablets.
Types of Encryption
Symmetric Cryptography
Asymmetric Cryptography
Asymmetric cryptography is
usually implemented by the use of one-
way functions. In mathematic terms, these
are functions that are easy to compute in
one direction but very difficult to compute
in reverse. This is what allows you to
publish your public key, which is derived
from your private key.
Latest Encryption Technology
Quantum cryptography
This is the only proven method for transmitting a secret key or password over a
distance. It functions by using photons of light to physically move a shared file between two
parties. These photons might be intercepted by another technology, however they can’t be
cloned or copied.
Types of Encryption Algorithm
• Blowfish - a 64-bit block cipher that uses a key length that can vary between 32 and
448 bits.
• AES – Advance Encryption Standard, a symmetric 128-bit block data encryption
technique.
• DES – Data Encryption Standard, a popular symmetric-key encryption method
developed in 1975 and standardized by ANSI in 1981 as ANSI X.3.92. DES uses a 56-bit
key and uses the block cipher method, which breaks text into 64-bit blocks and then
encrypts them.
◦ Strength
◦ Private keys in cryptography is resilient, it is immune in some brutal force
attacks.
◦ It is very secure.
◦ If an attack does happen, you can immediately change the algorithm for more
safety measures.
◦ In symmetrical cryptography, every participant has identical private keys.
◦ Weakness –
◦ Very Difficult to develop
◦ If an attacker gets in the algorithm, every user is at risk.
◦ Is it very difficult to be completed because it’s in a secure manner.
Pattern Recognition
◦ Machine Learning – the scientific study of algorithms and statistical models that
computer systems use to perform a specific task without using explicit instructions,
relying on patterns and inference instead. It is seen as a subset of artificial intelligence.
◦ Deep learning - a part of a broader family of machine learning methods based on
artificial neural networks with representation learning. Learning can be supervised,
semi-supervised or unsupervised. This is commonly used in self-learning video games
and A.I’s.
◦ Speech Recognition - an interdisciplinary subfield of computational linguistics that
develops methodologies and technologies that enables the recognition and
translation of spoken language into text by computers. It is also known as automatic
speech recognition, computer speech recognition or speech to text.
◦ Stock Market Forecasting - pattern recognition is used for comparative analysis of the
stock exchanges and predictions of the possible outcomes.
◦ Text correction and adaptation - in addition to correcting grammar and formal
mistakes, this technique can be used for the simplification of the text - from the
structure to the choice of words.
◦ Face Pattern – It uses the points in your face to determine the features of your face.
Facial Recognition
Iris Recognition
Voice Recognition
PREDICTIVE ANALYTICS
Critical data breaches are in the news on a regular basis these days. A single breach can
result in massive losses, both in money and reputation. Stock prices drop, customers become
angry and business goals are jeopardized.