Module 5
Module 5
Module 5
Intruders
The most common threat to security is an attack by an Intruder. Intruders are often
referred to as hackers and are the most harmful factors contributing to the vulnerability
of security. They have immense knowledge and an in-depth understanding of
technology and security. Intruders breach the privacy of users and aim to steal the
confidential information of the users. The stolen information is then sold to third
parties, which aim at misusing the information for their own personal or professional
gains.
Types of Intruders
Benefits of IDS
• Detects malicious activity: IDS can detect any suspicious activities and
alert the system administrator before any significant damage is done.
• Improves network performance: IDS can identify any performance
issues on the network, which can be addressed to improve network
performance.
• Compliance requirements: IDS can help in meeting compliance
requirements by monitoring network activity and generating reports.
• Provides insights: IDS generates valuable insights into network traffic,
which can be used to identify any weaknesses and improve network
security.
IDS and firewall both are related to network security but an IDS differs from a firewall
as a firewall looks outwardly for intrusions in order to stop them from happening.
Firewalls restrict access between networks to prevent intrusion and if an attack is from
inside the network it doesn’t signal. An IDS describes a suspected intrusion once it
has happened and then signals an alarm.
Password Protection
Password protection aims to create a secure barrier between your sensitive data and
potential cyber threats. It’s like a bouncer for your online accounts that keeps
unauthorized users out by implementing policies, processes, and technologies that make
passwords and authentication methods more secure.
• Password protection helps protect your data from bad actors by detecting
and blocking known weak passwords and weak terms specific to your
organization. Passwords are the most common means of authentication, but
they only work if they are complex and confidential.
• Password security policies are rules created to increase password security
by encouraging users to create strong, secure passwords and then properly
store and utilize them. Passwords should contain at least 12 characters,
uppercase and lowercase letters, and punctuation marks, and avoid memorable
paths on the keyboard or keypad.
• Encryption provides additional protection for passwords, even if
cybercriminals steal them. The best practice is to consider end-to-
end encryption that is non-reversible. In this way, you can protect passwords
in transit over the network. Implementing two-factor authentication is also a
good practice.
• Password managers help prevent and avoid network security threats by
securely storing and managing credentials for online and offline accounts.
Password managers use U.S. government-grade computer encryption to store
passwords. This means that if a cybercriminal ever breached a password
manager company, which has happened, they would not be able to decipher or
use any of the stored passwords. Password managers also encrypt user
passwords and provide safe access.
When done right, password protection can effectively deter hackers and prevent various
forms of data breaches.
• Passwords are the first defense against cybercriminals and their unauthorized
access to your accounts, devices, and files. Resilient, hard-to-crack passwords
protect critical data from bad actors and malicious software.
• Passwords protect our stored account data, and a strong password provides
essential protection from financial fraud and identity theft.
• User education
• Computer-generated passwords
• Reactive password checking
• Proactive password checking
1. Users can be told the importance of using hard-to-guess passwords and can be
provided with guidelines for selecting strong passwords.Many users will simply ignore
the guidelines. Others may not be good judges of what is a strong password. For
example, many users believe that reversing a word or capitalizing the last letter makes
a password unguessable.
2. Computer-generated password,If the passwords are quite random in nature, users will
not be able to remember them. Even if the password is pronounceable, the user may
have difficulty remembering it and so be tempted to write it down. In general,
computer-generated password schemes have a history of poor acceptance by users.
3. A reactive password checking strategy is one in which the system periodically runs
its own password cracker to find guessable passwords. The system cancels any
passwords that are guessed and notifies the user. This tactic has a number of drawbacks.
First, it is resource intensive if the job is done right. Because a determined opponent
who is able to steal a password file can devote full CPU time to the task for hours or
even days, an effective reactive password checker is at a distinct disadvantage.
Furthermore, any existing passwords remain vulnerable until the reactive password
checker finds them.
4. The most promising approach to improved password security is a proactive password
checker. In this scheme, a user is allowed to select his or her own password. However,
at the time of selection, the system checks to see if the password is allowable and, if
not, rejects it. Such checkers are based on the philosophy that, with sufficient guidance
from the system, users can select memorable passwords from a fairly large password
space that are not likely to be guessed in a dictionary attack.
Malware is a software that gets into the system without user consent with an
intention to steal private and confidential data of the user that includes bank details
and password. They also generates annoying pop up ads and makes changes in
system settings
They get into the system through various means:
1. Along with free downloads.
2. Clicking on suspicious link.
3. Opening mails from malicious source.
4. Visiting malicious websites.
5. Not installing an updated version of antivirus in the system.
Types:
1. Virus
2. Worm
3. Logic Bomb
4. Trojan/Backdoor
5. Rootkit
6. Advanced Persistent Threat
7. Spyware and Adware
Computer virus refers to a program which damages computer systems and/or destroys
or erases data files. A computer virus is a malicious program that self-replicates by
copying itself to another program. In other words, the computer virus spreads by itself
into other executable code or documents. The purpose of creating a computer virus is
to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers
design computer viruses with malicious intent and prey on online users by tricking
them.
Symptoms:
• Letter looks like they are falling to the bottom of the screen.
• The computer system becomes slow.
• The size of available free memory reduces.
• The hard disk runs out of space.
• The computer does not boot.
Logical Bomb:
A logical bomb is a destructive program that performs an activity when a certain
action has occurred. These are hidden in programming code. Executes only when a
specific condition is met, e.g. Jerusalem.
Script Virus:
Commonly found script viruses are written using the Visual Basic Scripting Edition
(VBS) and the JavaScript programming language.
Trojan / Backdoor:
RootKits:
Collection of tools that allow an attacker to take control of a system.
• Can be used to hide evidence of an attacker’s presence and give them
backdoor access.
• Can contain log cleaners to remove traces of attacker.
• Can be divided as:
– Application or file rootkits: replaces binaries in Linux system
– Kernel: targets kernel of OS and is known as a loadable kernel module
(LKM)
• Gains control of infected m/c by:
– DLL injection: by injecting malicious DLL (dynamic link library)
– Direct kernel object manipulation: modify kernel structures and directly
target trusted part of OS
– Hooking: changing applicant’s execution flow
Advanced Persistent Threat:
Created by well funded, organized groups, nation-state actors, etc. Desire to
compromise government and commercial entities, e.g. Flame: used for
reconnaissance and information gathering of system.
Macro Viruses
A macro virus infects a software program and causes a series of actions to begin
automatically when the program is opened. It operates like a normal macro and
often installs itself in the place of an existing macro.
KEY TAKEAWAYS
Macro viruses originate on the internet and infiltrate programs already stalled on
a person's computer. To fully understand what a macro virus is, however, it is
important to first understand what a "macro" is:
Macro viruses originate on the Internet, often in spam email, and infiltrate
programs installed on a person's computer, such as Microsoft Office, by
imitating a benign macro. They often take the place of pre-installed macros and
are activated when the regular macro is executed, but they can operate even when
the program is not in use without the user's knowledge. The automatic actions
they trigger can range from adding text uncontrollably to a document to sending
spam messages to people in the user's address books.
Most antivirus software packages today are designed to find and destroy any
existing macro viruses on a computer, and prevent new ones from taking root.
However, not all macro viruses are detected by antivirus software, and not all
antivirus software are alike. It's important to maintain up-to-date antivirus
software, but it's equally important to be conscious of what you download or
open from the Internet.
For example, you should not open an attachment in an email sent from an address
you don't know. Email spam can be easily identifiable, but it can also use tricks
to make a person think the content is legitimate.
Antivirus
In computer systems, the security of data is always a major concern because there are
some unidentified people (known as hackers) who always try to steal or harm the
personal data or information of the users using viruses, worms, trojans, etc. So, to
protect computer systems from these viruses or any other harmful activity, software
is developed and that software is known as Antivirus software.
• Slows down system’s speed: When you use antivirus programs, you’re
using a lot of resources like your RAM and hard drive. As a result, the
computer’s overall speed may be significantly slowed.
• Popping up of Advertisements: Apart from commercial antivirus
applications, free antivirus must make money in some way. One approach
to attaining these is through advertising. Many times these advertisements
degrade the user experience by popping up every time.
• Security Holes: When security flaws exist in the operating system or
networking software, the virus will be able to defeat antivirus protection.
The antivirus software will be ineffective unless the user takes steps to
keep it updated.
Firewalls
Characteristics of Firewall
What is a Firewall?
Types of Firewalls
There are several classifications of firewalls based on where they are deployed and
how they filter traffic:
Network-Based Firewalls
Host-Based Firewalls
The firewall solutions above focus on network perimeter security. Host-based
firewalls secure individual hosts or endpoints:
▪ Windows Firewall – The built-in firewall included with Microsoft Windows provides stateful
packet filtering to monitor traffic in and out of the host computer.
▪ Linux iptables – Netfilter/iptables provides host-based firewall capabilities for Linux operating
systems. Tables of security rules can filter traffic and masquerade internal IP addresses.
▪ Third-party firewalls – Endpoint security suites from vendors like Symantec, McAfee, and
Trend Micro include host firewall components to control traffic at the endpoint level.
Cloud Firewalls
Major cloud platforms offer managed firewall services including:
▪ Amazon Web Services (AWS) security groups – Virtual firewalls can control traffic in and out
of AWS resources like EC2 instances and VPCs.
▪ Microsoft Azure firewall – Azure firewall policies secure virtual networks with stateful packet
filtering, intrusion detection, and identity-based controls.
▪ Google Cloud firewall – Cloud firewall rules manage connections between resources like VMs,
serverless applications, and services.
1. Traffic Filtering
The primary function of any firewall is filtering incoming and outgoing
network traffic based on a defined policy. As traffic passes through the firewall,
each packet is examined and matched to the criteria in the ruleset to determine
whether it should be allowed or blocked.
Sophisticated firewalls can filter on various packet attributes like IP address,
protocol, port number, ports and connectors and even application or website
category. Traffic filtering enables administrators to control what types of
connections are permitted for enhanced security.
2. Access Control
Firewalls govern access between network zones by allowing specific types of
traffic to pass while explicitly denying all other traffic. For example, a firewall can
be configured to allow only web traffic on port 80/443 between a private network
and the internet.
By default, everything else incoming or outgoing would be denied –
controlling external access to the network. Firewalls grant access based on
protocol, IP address range, subnet, and other criteria.
3. Network Segmentation
Internal firewalls can subdivide large private networks into smaller segments.
This provides perimeter security for the intranet, restricting lateral movement
between departments, branches, etc. Network segmentation contains threats and
limits the impact of breaches.
4. Security Logging & Monitoring
Modern firewalls provide robust logging capabilities, recording network
events like blocked connections or policy violations. Logging and reporting enable
administrators to monitor activity, analyze trends, and be alerted about suspicious
traffic.
5. Stateful Inspection
Stateful inspection firewalls maintain context about active connections,
allowing return traffic for established sessions while dropping other packets that
don’t match any approved flows. This dynamic filtering provides better protection
compared to static packet filtering.
6. SSL/SSH Inspection
Many firewalls can decrypt outbound encrypted traffic, scan its contents, and
then re-encrypt before forwarding permitted connections. Decryption defeats
threats trying to conceal malicious payloads within encrypted tunnels.
The Critical Role of Firewalls