Tag: Operating system

  • How to Control Your Internet Privacy-MI 5

    In its site MI 5 has pointed out the controls needed to prevent cyber attacks.

    English: A candidate icon for Portal:Computer ...
    English: A candidate icon for Portal:Computer security (Photo credit: Wikipedia)

    Follow link at the bottom.

    20 critical controls for effective cyber defence

    Article Summary

    The Top Twenty Critical Security Controls are a baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks.

    The Centre for the Protection of National Infrastructure is participating in an international government-industry effort to promote the top twenty critical controls for computer and network security. The development of these controls is being coordinated by the SANS Institute.

    The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks. Outside of the technical realm, a comprehensive security program should also take into account many other areas of security, including overall policy, organisational structure, personnel issues and physical security. To help maintain focus, the twenty controls do not deal with these important but non-technical aspects of information security.

    The twenty controls and supporting advice are dynamic in order that they recognise changing technology and methods of attack. All twenty controls, together with a brief description, are given below. For further information, visit the SANS website.

    CONTROL 1 – INVENTORY OF AUTHORISED AND UNAUTHORISED DEVICES

    Reduce the ability of attackers to find and exploit unauthorised and unprotected systems. Use active monitoring and configuration management to maintain an up-to-date inventory of devices connected to the enterprise network, including servers, workstations, laptops, mobile, and remote devices.

    CONTROL 2 – INVENTORY OF AUTHORISED AND UNAUTHORISED SOFTWARE

    Identify vulnerable or malicious software to mitigate or root out attacks. Devise a list of authorised software for each type of system, and deploy tools to track software installed (including type, version, and patches) and monitor for unauthorised or unnecessary software.

    CONTROL 3 – SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE ON LAPTOPS, WORKSTATIONS, AND SERVERS

    Prevent attackers from exploiting services and settings that allow easy access through networks and browsers. Build a secure image that is used for all new systems deployed to the enterprise, host these standard images on secure storage servers, regularly validate and update these configurations, and track system images in a configuration management system.

    CONTROL 4 – CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION

    Proactively identify and repair software vulnerabilities reported by security researchers or vendors. Regularly run automated vulnerability scanning tools against all systems and quickly remediate any vulnerabilities – with critical problems fixed within 48 hours.

    CONTROL 5 – MALWARE DEFENCES

    Block malicious code from tampering with system settings or contents, capturing sensitive data, or spreading. Use automated anti-virus and anti-spyware software to continuously monitor and protect workstations, servers, and mobile devices. Automatically update such anti-malware tools on all machines on a daily basis. Prevent systems from using auto-run programs to access removable media.

    CONTROL 6 – APPLICATION SOFTWARE SECURITY

    Scan for, discover, and remediate vulnerabilities in web-based and other application software. Carefully test internally developed and third-party application software for security flaws, including coding errors and malware. Deploy web application firewalls that inspect all traffic, and explicitly check for errors in all user input (including by size and data type).

    CONTROL 7 – WIRELESS DEVICE CONTROL

    Protect the security perimeter against unauthorised wireless access. Allow wireless devices to connect to the network only if they match an authorised configuration and security profile and have a documented owner and defined business need. Ensure that all wireless access points are manageable using enterprise management tools. Configure scanning tools to detect wireless access points.

    CONTROL 8 – DATA RECOVERY CAPABILITY

    Minimise the damage from an attack: Implement a trustworthy plan for removing all traces of an attack. Automatically back up all information required to fully restore each system, including the operating system, application software, and data. Back up all systems at least weekly; back up sensitive systems more often. Regularly test the restoration process.

    CONTROL 9 – SECURITY SKILLS ASSESSMENT AND APPROPRIATE TRAINING TO FILL GAPS

    Find knowledge gaps, and fill them with exercises and training. Develop a Security Skills Assessment program, map training against the skills required for each job, and use the results to allocate resources effectively to improve security practices.

    CONTROL 10 – SECURE CONFIGURATIONS FOR NETWORK DEVICES SUCH AS FIREWALLS, ROUTERS, AND SWITCHES

    Preclude electronic holes from forming at connection points with the Internet, other organisations, and internal network segments: Compare firewall, router, and switch configurations against standards for each type of network device. Ensure that any deviations from the standard configurations are documented and approved and that any temporary deviations are undone when the business need abates.

    CONTROL 11 – LIMITATION AND CONTROL OF NETWORK PORTS, PROTOCOLS, AND SERVICES

    Allow remote access only to legitimate users and services. Apply host-based firewalls and port-filtering and scanning tools to block traffic that is not explicitly allowed. Properly configure web servers, mail servers, file and print services, and domain name system (DNS) servers to limit remote access. Disable automatic installation of unnecessary software components. Move servers inside the firewall unless remote access is required for business purposes.

    CONTROL 12 – CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES

    Protect and validate administrative accounts on desktops, laptops, and servers to prevent two common types of attack: (1) enticing users to open a malicious e-mail, attachment, or file, or to visit a malicious website; and (2) cracking an administrative password and thereby gaining access to a target machine. Use robust passwords that follow known standards.

    CONTROL 13 – BOUNDARY DEFENCE

    Control the flow of traffic through network borders, and police content by looking for attacks and evidence of compromised machines. Establish multilayered boundary defences by relying on firewalls, proxies, demilitarised zone (DMZ) perimeter networks, and other network-based tools. Filter inbound and outbound traffic, including through business partner networks (“extranets”).

    CONTROL 14 – MAINTENANCE, MONITORING, AND ANALYSIS OF SECURITY AUDIT LOGS

    Use detailed logs to identify and uncover the details of an attack, including the location, malicious software deployed, and activity on victim machines. Generate standardised logs for each hardware device and the software installed on it, including date, time stamp, source addresses, destination addresses, and other information about each packet and/or transaction. Store logs on dedicated servers, and run biweekly reports to identify and document anomalies.

    CONTROL 15 – CONTROLLED ACCESS BASED ON THE NEED TO KNOW

    Prevent attackers from gaining access to highly sensitive data. Carefully identify and separate critical data from information that is readily available to internal network users. Establish a multilevel data classification scheme based on the impact of any data exposure, and ensure that only authenticated users have access to non-public data and files.

    CONTROL 16 – ACCOUNT MONITORING AND CONTROL

    Prevent attackers from impersonating legitimate users. Review all system accounts and disable any that are not associated with a business process and owner. Immediately revoke system access for terminated employees or contractors. Disable dormant accounts and encrypt and isolate any files associated with such accounts. Use robust passwords that follow known standards.

    CONTROL 17 – DATA LOSS PREVENTION

    Stop unauthorised transfer of sensitive data through network attacks and physical theft. Scrutinise the movement of data across network boundaries, both electronically and physically, to minimise the exposure to attackers. Monitor people, processes, and systems, using a centralised management framework.

    CONTROL 18 – INCIDENT RESPONSE CAPABILITY

    Protect the organisation’s reputation, as well as its information. Develop an incident response plan with clearly delineated roles and responsibilities for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence, and restoring the integrity of the network and systems.

    CONTROL 19 – SECURE NETWORK ENGINEERING

    Keep poor network design from enabling attackers. Use a robust, secure network engineering process to prevent security controls from being circumvented. Deploy network architecture with at least three tiers: DMZ, middleware, private network. Allow rapid deployment of new access controls to quickly deflect attacks.

    CONTROL 20 – PENETRATION TESTS AND RED TEAM EXERCISES

    Use simulated attacks to improve organisational readiness. Conduct regular internal and external penetration tests that mimic an attack to identify vulnerabilities and gauge the potential damage. Use periodic red team exercises—all out attempts to gain access to critical data and systems— to test existing defences and response capabilities.

    Prioritisation of the critical controls:

    The twenty controls are a baseline of high-priority ‘technical’ information security measures and controls that can be applied across an organisation to improve its cyber defence. In order for a control to be a high priority, it must provide a direct defence against attacks. Controls that mitigate known attacks, or a wide variety of attacks, or attacks early in the compromise cycle, all have priority over other controls. Controls that mitigate the impact of a successful attack also have a high priority. Special consideration is given to controls that help mitigate attacks that have not yet been discovered.

  • Fake Windows Security Updates Spread Zeus Trojan.

    Image representing Windows as depicted in Crun...
    Image via CrunchBase

    Researchers from the security vendor AppRiver indicate the malware spam operation began on Friday, May 6, and is still actively delivering the fake update alerts.

    The emails contain the subject line “URGENT: Critical Security Update“, and the following message:

    The Security Update is to prevent malicious users from getting access to your computer files. The update applies to the following OS versions: Microsoft Windows 98, Microsoft Windows 2000, Microsoft XP, Microsoft Windows 7.

    Please notice, that present update applies to high-priority updates category. In order to help protect your computer against security threats and performance problems, we strongly recommend you to install this update.

    http://current.com/12lkmkc


  • 21 Infographics for every computer nerd.

    Screenshot of Mac OS X Snow Leopard, released ...
    Image via Wikipedia

    Computers have become the lifeblood of our society. Computers are responsible for so much, from making sure that you get your money when you want it, to handling long-distance calls to providing hours of entertainment. Computer science professionals are what make everything run smoothly. Working closely with computers provides some interesting insights into the world of computing. However, you don’t have to have a Master’s in computer science in order to be a computer nerd. Here are 21 infographics that any computer nerd can appreciate.

    Computers

    These infographics offer an interesting look at computers in general, and their usage.

    1. Mousepath: This is a great app that actually lets you build your own infographic. Interactive and designed by Anatoly Zenkov, you can track the way you use your mouse throughout the day. This app is available for PC or for Mac. All you have to do is run the app at the beginning of the day, and then minimize it to get it out of your way. Use your computer and mouse as usual. At the end of the day, you will have a custom infographic that shows the path followed by your mouse. A fun way to create a bit of abstract expressionist art of your very own. You can tell everyone it’s a Jackson Pollock.
    2. Computer Threats: Ever wondered about how many computer threats are really out there? You can see a breakdown of all of the active computer viruses, trojans and worms active in one year as compared to 2002. You can see how widespread computer threats have become. Also includes the costs of data breaches to the economy, and where malicious code comes from. This infographic also addresses phishing scams, and spam. It’s an interesting look at computer security, and how vulnerable many people are. Identify the threats that might affect you (or someone you know), and prepare yourself against them.
    3. Environmental Impact of Computing: If you are environmentally minded, you might be interested in this infographic, which shows the impact of computing. It includes information on how many new computers will be sold each year, and the types of resources that go into manufacturing computers. Also see how many computers are in use around the world (1 billion), and how much energy all of that uses. You might be surprised at what computing is doing to the environment. An eye-opening look at the impact of computers, and how they might be affecting the environment.
    4. Hype Cycle of interface designHype Cycle of Computer-Interface Design: We all like to get excited about new technologies — especially when it comes to the computer and new interface designs. We all want the coolest features, from fabric sensors to handwriting recognition to health monitoring. While some things come to be, others will not be realized for years. If they ever are.

    Operating Systems

    Look at the facts surrounding different operating systems in inforgraphic form.

    1. Linux Kernel Zoomable Map: This is an awesome infographic that shows the way the Linux operating system kernel works. Colorful, and zoomable, this infographic is quite useful. It is a top down view of kernel, showing calls, modules, functions, functionalities, layers and more. Just about everything vital about Linux. If you want to see better details, you can zoom in. Everything on this map is verifiable, as there are hypertext links that send you to documentation or actual source code. You can use this as a reference, or just as a cool tool to play around with for a while. A great resource.
    2. OS X Snow Leopard vs. Windows 7: The Onion pleases with this great, funny infographic comparing the Mac OS X Snow Leopard system with Windows 7. A funny comparison that includes the ability to run Snood and porn at the same time, as well as a comparison of the built-in audience for each system. Also includes the problems meant to solve (such as “chumps with too-much-money syndrome” and “chumps who thought things would be better this time around”). If you want to take a few minutes to have a good laugh — and then congratulate yourself for running Unix — this is the infographic for you.
    3. Should You Buy an Ipad?Should You Buy an Ipad?: This infographic offers a fun flowchart that can help you determine whether or not you should buy an Ipad. Looks at some of the things the Ipad does, and offers, below, a second infographic detailing all the specs of the Ipad. It looks at average cost of apps, as compared to the iPhone, considers point scale, and estimates device cannibalization. The two infographics together should offer you everything you need to know about the iPad. And let you decide whether to get one, or to wait until Google releases a tablet running Android, as the company is rumored to be planning.
    4. Cell Phone Operating SystemsCell Phone Operating Systems: Interesting look at cell phone operating systems, and what is most popular. The global market share of different cell phone operating systems can be clearly seen. Some, especially in the U.S., might find it interesting that  Symbian is the most used mobile phone OS in the
    1. world. Its popularity in Africa and Asia is one of the big reasons that it is ahead of the Blackberry and the iPhone. An interesting infographic that puts smart phone operating systems into perspective.

    Social Media

    The rise of social media is the subject of many an infographic. A look at the way we interact online.

    1. The United States of Facebook: What’s the third largest country by population? Facebook, of course! With more than 400 million users, the only countries in the world with more people than Facebook has users are China and India. This infographic also charts the explosive growth of Facebook, and shows a handy comparison between Facebook and countries such as the United States, Russia, Japan, Germany and the U.K. Also projects how many users will be on Facebook (630 million) if the population continues to grow at the same rate. That’s pretty crazy. Maybe one day Facebook will even surpass China.
    2. The Journey of a Tweet: Learn how a tweet makes its way from its source to various places on the Web. It’s not just about tweeting on Twitter. This infographic shows how the tweet can then travel all around the Interwebs, with stops at Facebook, Flickr (if it’s a picture), WordPress, and social bookmarking sites like Delicious, Digg, Stumble Upon and Reddit. Follow the various paths a tweet can take as it heads toward immortality as a bit of Web wisdom. Also includes how a tweet can be indexed by Google and used in office emails and how it can go viral all over the Internet.
    3. Profile of a Twitter User: This is a fun infographic that looks at the basic types of Twitter users. It also teaches you how to deal with different types of Twitter users. For example, you should understand the Newbie, and blog the B1tch. It is also important to be aware of different types of Twitterers, from Brands to Mavens. Who you follow can influence and provide you with helpful insight. This infographic is a fun way to learn what you can about the Twitterati, and even figure out what kind of Twitter user you are. (Hint: You want to be a Mensch, but you’re probably a Smore.)
    1. The CMO’s Guide to The Social Landscape: Simple and straightforward, this infographic offers you a look at the social media landscape — with the most important sites listed. No obscure sites here. Anyone can get an instantly recognizable overview of the main social media sites, and the best ways to drive traffic to your web site. Looks at ways that you can enhance customer communication, build your brand and do other things using social media. This is a helpful guide for anyone who is interested in targeting social media for use in driving traffic to a web site — even if you aren’t a CMO.
    2. Facebook Privacy Infographic: Another Facebook infographic, this one addresses privacy. Every dedicated computer nerd knows that Facebook is a privacy nightmare. And here’s the infographic that shows it in all its glory. Learn about how you have to navigate more than 170 options in 50 settings in order to get the security you are looking for. Perhaps there is no such thing as true privacy once you get online, but Facebook isn’t helping matters.

    Internet

    Interesting infographics about the Internet, and how it is used, and browsers.

    1. Day in the InternetA Day in the Internet: We don’t really think about the vastness of the Internet, and all of the information available online. However, there is a ton of information online. This infographic puts the size and scope of the Internet into perspective, with some startling facts, such as the stat that more than 210 billion emails are sent daily, and that you could fill 1.7 million Blu-ray discs with the amount of information sent every day via mobile phones. It’s astounding how much information is out there, and how much of it is sent all over the world on a daily basis. The Internet truly is one of the world’s great wonders.
    2. If Browsers Were Girls/Women: An irreverent look at Internet browsers. What if browsers were women? Well, Opera would be sexy and tough: Awesome for those who can handle it such a sassy babe. Internet Explorer would be kind of cheap (and maybe dangerous). Firefox would be just what you were looking for, full of goodness and fun. Chrome is skinny and inexperienced. It’s an interesting comparison
    1. of Internet browsers, and an fun way to think about them. It’s surprisingly accurate as well. Now, if you could just stop surfing the Internet, and go meet a girl…
    2. State of the Internet: Get a good look at Internet usage with this infographic. It offers an overview of the Internet in 2009, showing Internet use across different demographic groups. It’s probably not surprising that age group 18-29 uses the Internet the most. Additionally, the infographic addresses broadband access by income level, as well as Internet use by education level. College grads use the Internet the most — which isn’t particularly surprising. If you are interested in how often people use the Internet, and other facts about the Interwebs, this infographic is a cool resource.
    3. World Internet TrafficInternet Traffic: Look at Internet traffic around the world. See where the most users are, and see the percentage of the population that uses the Internet. China constitutes 17% of the world’s Internet users, which is not much of a surprise since China has such a large population. The U.S. is the second largest source of Internet traffic.

    MMORPG

    If you’re into creating a whole new life, then there are plenty of MMORPGs out there for you. And infographics about them!

    1. World of Warcraft statsThe Unbelievable World of Warcraft: Everything you could possibly want to know about the people who play World of Warcraft. Offers an account of the popular races chosen as characters (I was surprised to learn that humans surpass elves). It also includes a look at which continents subscribe to WoW the most, as well as average hours spent playing WoW in America. You can even get stats on female WoW subscribers, as well as quests completed and auctions participated in. See pictures of celebrity WoW players as well. No, you’re not alone. McCauley Caulkin likes to play World of Warcraft as well. Maybe you’ll run into him online.
    2. EverquestWho’s Playing EverQuest?: What sort of person plays EverQuest II? Someone actually set out to discover the answer to this question. The result is this infographic detailing the type of person actually playing this MMORPG. One of the most surprising bits of information is that the majority of players are between the ages of 30 and 30. Also, EverQuest players exhibit a higher level of depression than the average American. This is interesting as well. This infographic also contains the information that EverQuest players experience less obesity than average for Americans. Do you play EveryQuest? Do you fit the profile?
    3. Star Trek infographicThings You (Probably) Knew About Star Trek: Star Trek has its own MMORPG, so you can search the galaxy and have a good time with other Trekkies. This cool Infographic offers things you probably already know about Star Trek. But it offers a good reminder nevertheless. Information such as the incidence of the first inter-racial kiss on TV is old hat to most Trekkies. And, of course, many a geek laughs at the fact that Zachary Quinto had to glue his hands together to do the Vulcan salute. But did you know that in the original series, the pilot had a woman as first officer? And there is actually a college class on the anthropology of alien languages — including a look at the evolution of the Tribble language.
    4. Onling GamingOnline Gaming Stats: This infographic probably won’t come as a surprise, but it’s informational nonetheless. It looks at the size of the online gaming market ($15 billion), and looks at how many players
    5. are online. PS 3 users trail behind Xbox 360 in terms of hours played per week. Looks at other essential stats, such as gender, income, popular games and more.
    6. http://current.com/1967o4c