Tag: Security

  • How to Control Your Internet Privacy-MI 5

    In its site MI 5 has pointed out the controls needed to prevent cyber attacks.

    English: A candidate icon for Portal:Computer ...
    English: A candidate icon for Portal:Computer security (Photo credit: Wikipedia)

    Follow link at the bottom.

    20 critical controls for effective cyber defence

    Article Summary

    The Top Twenty Critical Security Controls are a baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks.

    The Centre for the Protection of National Infrastructure is participating in an international government-industry effort to promote the top twenty critical controls for computer and network security. The development of these controls is being coordinated by the SANS Institute.

    The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks. Outside of the technical realm, a comprehensive security program should also take into account many other areas of security, including overall policy, organisational structure, personnel issues and physical security. To help maintain focus, the twenty controls do not deal with these important but non-technical aspects of information security.

    The twenty controls and supporting advice are dynamic in order that they recognise changing technology and methods of attack. All twenty controls, together with a brief description, are given below. For further information, visit the SANS website.

    CONTROL 1 – INVENTORY OF AUTHORISED AND UNAUTHORISED DEVICES

    Reduce the ability of attackers to find and exploit unauthorised and unprotected systems. Use active monitoring and configuration management to maintain an up-to-date inventory of devices connected to the enterprise network, including servers, workstations, laptops, mobile, and remote devices.

    CONTROL 2 – INVENTORY OF AUTHORISED AND UNAUTHORISED SOFTWARE

    Identify vulnerable or malicious software to mitigate or root out attacks. Devise a list of authorised software for each type of system, and deploy tools to track software installed (including type, version, and patches) and monitor for unauthorised or unnecessary software.

    CONTROL 3 – SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE ON LAPTOPS, WORKSTATIONS, AND SERVERS

    Prevent attackers from exploiting services and settings that allow easy access through networks and browsers. Build a secure image that is used for all new systems deployed to the enterprise, host these standard images on secure storage servers, regularly validate and update these configurations, and track system images in a configuration management system.

    CONTROL 4 – CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION

    Proactively identify and repair software vulnerabilities reported by security researchers or vendors. Regularly run automated vulnerability scanning tools against all systems and quickly remediate any vulnerabilities – with critical problems fixed within 48 hours.

    CONTROL 5 – MALWARE DEFENCES

    Block malicious code from tampering with system settings or contents, capturing sensitive data, or spreading. Use automated anti-virus and anti-spyware software to continuously monitor and protect workstations, servers, and mobile devices. Automatically update such anti-malware tools on all machines on a daily basis. Prevent systems from using auto-run programs to access removable media.

    CONTROL 6 – APPLICATION SOFTWARE SECURITY

    Scan for, discover, and remediate vulnerabilities in web-based and other application software. Carefully test internally developed and third-party application software for security flaws, including coding errors and malware. Deploy web application firewalls that inspect all traffic, and explicitly check for errors in all user input (including by size and data type).

    CONTROL 7 – WIRELESS DEVICE CONTROL

    Protect the security perimeter against unauthorised wireless access. Allow wireless devices to connect to the network only if they match an authorised configuration and security profile and have a documented owner and defined business need. Ensure that all wireless access points are manageable using enterprise management tools. Configure scanning tools to detect wireless access points.

    CONTROL 8 – DATA RECOVERY CAPABILITY

    Minimise the damage from an attack: Implement a trustworthy plan for removing all traces of an attack. Automatically back up all information required to fully restore each system, including the operating system, application software, and data. Back up all systems at least weekly; back up sensitive systems more often. Regularly test the restoration process.

    CONTROL 9 – SECURITY SKILLS ASSESSMENT AND APPROPRIATE TRAINING TO FILL GAPS

    Find knowledge gaps, and fill them with exercises and training. Develop a Security Skills Assessment program, map training against the skills required for each job, and use the results to allocate resources effectively to improve security practices.

    CONTROL 10 – SECURE CONFIGURATIONS FOR NETWORK DEVICES SUCH AS FIREWALLS, ROUTERS, AND SWITCHES

    Preclude electronic holes from forming at connection points with the Internet, other organisations, and internal network segments: Compare firewall, router, and switch configurations against standards for each type of network device. Ensure that any deviations from the standard configurations are documented and approved and that any temporary deviations are undone when the business need abates.

    CONTROL 11 – LIMITATION AND CONTROL OF NETWORK PORTS, PROTOCOLS, AND SERVICES

    Allow remote access only to legitimate users and services. Apply host-based firewalls and port-filtering and scanning tools to block traffic that is not explicitly allowed. Properly configure web servers, mail servers, file and print services, and domain name system (DNS) servers to limit remote access. Disable automatic installation of unnecessary software components. Move servers inside the firewall unless remote access is required for business purposes.

    CONTROL 12 – CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES

    Protect and validate administrative accounts on desktops, laptops, and servers to prevent two common types of attack: (1) enticing users to open a malicious e-mail, attachment, or file, or to visit a malicious website; and (2) cracking an administrative password and thereby gaining access to a target machine. Use robust passwords that follow known standards.

    CONTROL 13 – BOUNDARY DEFENCE

    Control the flow of traffic through network borders, and police content by looking for attacks and evidence of compromised machines. Establish multilayered boundary defences by relying on firewalls, proxies, demilitarised zone (DMZ) perimeter networks, and other network-based tools. Filter inbound and outbound traffic, including through business partner networks (“extranets”).

    CONTROL 14 – MAINTENANCE, MONITORING, AND ANALYSIS OF SECURITY AUDIT LOGS

    Use detailed logs to identify and uncover the details of an attack, including the location, malicious software deployed, and activity on victim machines. Generate standardised logs for each hardware device and the software installed on it, including date, time stamp, source addresses, destination addresses, and other information about each packet and/or transaction. Store logs on dedicated servers, and run biweekly reports to identify and document anomalies.

    CONTROL 15 – CONTROLLED ACCESS BASED ON THE NEED TO KNOW

    Prevent attackers from gaining access to highly sensitive data. Carefully identify and separate critical data from information that is readily available to internal network users. Establish a multilevel data classification scheme based on the impact of any data exposure, and ensure that only authenticated users have access to non-public data and files.

    CONTROL 16 – ACCOUNT MONITORING AND CONTROL

    Prevent attackers from impersonating legitimate users. Review all system accounts and disable any that are not associated with a business process and owner. Immediately revoke system access for terminated employees or contractors. Disable dormant accounts and encrypt and isolate any files associated with such accounts. Use robust passwords that follow known standards.

    CONTROL 17 – DATA LOSS PREVENTION

    Stop unauthorised transfer of sensitive data through network attacks and physical theft. Scrutinise the movement of data across network boundaries, both electronically and physically, to minimise the exposure to attackers. Monitor people, processes, and systems, using a centralised management framework.

    CONTROL 18 – INCIDENT RESPONSE CAPABILITY

    Protect the organisation’s reputation, as well as its information. Develop an incident response plan with clearly delineated roles and responsibilities for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence, and restoring the integrity of the network and systems.

    CONTROL 19 – SECURE NETWORK ENGINEERING

    Keep poor network design from enabling attackers. Use a robust, secure network engineering process to prevent security controls from being circumvented. Deploy network architecture with at least three tiers: DMZ, middleware, private network. Allow rapid deployment of new access controls to quickly deflect attacks.

    CONTROL 20 – PENETRATION TESTS AND RED TEAM EXERCISES

    Use simulated attacks to improve organisational readiness. Conduct regular internal and external penetration tests that mimic an attack to identify vulnerabilities and gauge the potential damage. Use periodic red team exercises—all out attempts to gain access to critical data and systems— to test existing defences and response capabilities.

    Prioritisation of the critical controls:

    The twenty controls are a baseline of high-priority ‘technical’ information security measures and controls that can be applied across an organisation to improve its cyber defence. In order for a control to be a high priority, it must provide a direct defence against attacks. Controls that mitigate known attacks, or a wide variety of attacks, or attacks early in the compromise cycle, all have priority over other controls. Controls that mitigate the impact of a successful attack also have a high priority. Special consideration is given to controls that help mitigate attacks that have not yet been discovered.

  • AntiVirus Provider Symantec Hacked!

    When you come to know that the Doctor who is treating with the medicine he is prescribing you has been acknowledged by him that the medicine  can not cure him…what can you do?

    Symantec has been scrabbling around trying address a security breach from 2006 that came to light recently. But the fact that the company wasn’t sure its was hacked in the first place doesn’t exactly inspire confidence.

    Symantec originally said that the worst case scenario was that hackers had stolen some five-year-old versions of some business-centric software. Since, they’ve suggested that corporate users should stop using their software. Turns out, they’re not entirely sure what did happen. A Symantec spokesperson told Wired:

    “We knew there was an incident in 2006, but it was inconclusive at the time as to whether or not actual code was taken.”

    I am certainly not about to hold Symantec up as some kind of bastion of online security. But, when a company that trades on digital security can’t tell exactly how it’s been hacked, what the hell does that say about the industry as a whole? [Wired; Image: mmckeay]

  • Anyone can Access your Facebook Account!

    By default, Facebook sends your access credentials in the clear, with no encryption whatsoever. Switching to HTTPS is important because a browserextension called Firesheep has made it especially easy for anyone sharing your open wireless network—at cafe or conference, for example—to sniff your credentials and freely access your account. One blogger sitting in a random New York Starbucks was able to steal 20-40 Facebook identities in half an hour. HTTPS solves this longstanding problem by encrypting your login cookies and other data; in fact the inventor of Firesheep made the software to encourage companies like Facebook to finally lock down their systems. You can sign up for Facebook HTTPS by going to Account Settings and then selecting “Account Security,” third from the bottom. Then click under “Secure Browsing” — if it’s there. Facebook says everyone should have this by the end of the day, but in the meantime you might be missing the relevant option toggle.

    facebook


    Just a heads up for anyone using Facebook. Always good to be safe online. I am very wary of Facebook and rarely use it, certainly not to share information/pictures I wouldn’t want snatched up somehow. Stay safe out there ATS and Merry Christmas!

    http://www.abovetopsecret.com/forum/thread789414/pg1

    Apart from the  general perceptions about the security aspects of Facebook,I came to know that Students misuse Facebook by posting photos taken of teachers taken in the class,especially lady teachers.

    In an instance, a boy has posted the phone numbers of his male teacher,asking girls to contact him for sexual favors!

    Now this news that people can access your account from any where through by an inbuilt system.

    Sharing personal information may be thrill.

    But this move may prove to be fatal,figuratively and literally.

    Human tendency is to share information,but they are restrained because of personal equations and the apprehension that  they may be misundersttod.

    This barrier is broken when one interacts with a faceless friend(!)

    When one tends to be cautious with known people, it is not wise to divulge information to faceless people or people with false identities.

  • Smartphone -spies on you with hidden applications.

    Smartphone.
    Smartphone.

    A security researcher has posted a video detailing hidden software installed on smart phones that logs numerous details about users’ activities.

    In a 17-minute video posted Monday on YouTube, Trevor Eckhart shows how the software – known as Carrier IQ – logs every text message, Google search and phone number typed on a wide variety of smart phones – including HTC, Blackberry, Nokia* and others – and reports them to the mobile phone carrier.

    The application, which is labeled on Eckhart’s HTC smartphone as “HTC IQ Agent,” also logs the URL of websites searched on the phone, even if the user intends to encrypt that data using a URL that begins with “HTTPS,” Eckhart said.

    The software always runs when Android operating system is running and users are unable to stop it, Eckhart said in the video.

    “Why is this not opt-in and why is it so hard to fully remove?” Eckhart wrote at the end of the video.

    In a post about Carrier IQ on his website, Eckhart called the software a “rootkit,” a security term for software that runs in the background without a user’s knowledge and is commonly used in malicious software.

    Eckhart’s video is the latest in a series of attacks between him and the company. Earlier this month, Carrier IQ sent a cease and desist letter to Eckhart claiming he violated copyright law by publishing Carrier IQ training manuals online. But after the Electronic Frontier Foundation, a digital rights group, came to Eckhart’s defense, the company backed off its legal threats.

    The Electronic Frontier Foundation said the software that Eckhart has publicized “raises substantial privacy concerns” about software that “many consumers don’t know about.”

    Carrier IQ could not immediately be reached for comment. But the company told Wired.com that its software is used for “gathering information off the handset to understand the mobile-user experience, where phone calls are dropped, where signal quality is poor, why applications crash and battery life.”

    On its website, Carrier IQ, founded in 2005, describes itself as “the world’s leading provider of Mobile Service Intelligence solutions.”

    Watch video of Eckhart explaining his findings:

    http://www.huffingtonpost.com/2011/11/30/carrier-iq-trevor-eckhart_n_1120727.html?ref=technology&ncid=

  • Worst Passwords.

    I have a Blogger who informed me he has a password of 33 characters.It beats me how he remembers it?

    SplashData said it compiled the list from files containing stolen passwords posted online by hackers.

    Many on the list are sequences of numbers between 1 and 6 in order, either forward or backward. Sequences of letters on the keyboard in order, such as “qwerty” and “qazwsx” were also common, as were some first names, sports and animals.

    The complete Top 25 are:

    • password
    • 123456
    • 12345678
    • qwerty
    • abc123
    • monkey
    • 1234567
    • letmein

      Tips for strong passwords

      • Make them eight characters or more, with a mix of characters, e.g., letters, numbers, symbols.
      • One way to create longer, easy-to-remember passwords is to separate short words with spaces or other characters, e.g., “eat cake at 8!”
      • Don’t use the same username/password combination for multiple websites.
      • Use a password manager if you have trouble remembering your passwords. SplashData makes one called SplashID Safe.

      Source: SplashData Inc.

    • trustno1
    • dragon
    • baseball
    • 111111
      • iloveyou
      • master
      • sunshine
      • ashley
      • bailey
      • passw0rd
      • shadow
      • 123123
      • 654321
      • superman
      • qazwsx
      • michael
      • football

      In the past year, hacker collectives such as Lulz Security, also known as LulzSec, have taken responsibility for cyberattacks on websites such as Sony and Nintendo, and have posted stolen data such as usernames and passwords online that they claimed were from those sites and others, including Facebook and PayPal.

      http://www.cbc.ca/news/technology/story/2011/11/22/technology-worst-passwords-splashdata.html