Command Line & Information Security Pillars Dr. X Logistics • Command line lab due Thursday, Feb. 2 @ midnight • Project proposal: have you done your research yet? • Future Crimes reading: how is this going? Command Line • Steep learning curve!! • Key commands that you have learned: • • • • • • • • Pwd Ls Cd Mkdir Echo Cat Cp nano Command Line • Syntax • • • • • \: directories Spaces are important! >: redirect *: wildcard! |: pipe the output of one command to the input of another • File hierarchy • Command options • One option: ls –al • More than one option: cp file1.txt file2.txt Environment Variables • System variables are a special class of predefined variables available to all program units. System variables are used to set the options for plotting, to set various internal modes, to return error status, etc. • System variables have a predefined type and structure that cannot be changed. When an expression is stored into a system variable, it is converted to the variable type, if necessary and possible. • Examples • $USER • $PATH • $HOME Information Security Fundamentals …or how we will save the world... One server at at time =) The rabbit hole ... What is information security? • What are the goals? • Who/what are we trying to secure? What is security • CIANA • Confidentiality • Integrity • Availability • Non-repudiation • Authentication Research on the web • Find examples of violation of CIANA pillars Examples • Confidentiality • In December 2013, national retailer Target reported the theft of records for 40 million credit and debit cards used at its stores. Not long after the breach, the card data was being sold at underground forums to thieves. The credit card data was supposed to be confidential, but confidentiality of the data was not preserved. • Integrity • In 2010, the Stuxnet computer worm was used to infiltrate the computer systems controlling Iran's nuclear enrichment centrifuges. The Stuxnet code modified the programmable logic controller (PLC) software, causing the centrifuges to spin out of control, while giving the console operators only normal indications. The integrity of the PLC software was violated in this attack. Examples • Availability • In 2008, computer systems supporting banks, media, communications, transportation, and other infrastructure in the nation of Georgia experienced a widespread denial-of-service attack originating from Russia. At the time, a dispute had flared up between Georgia and Russia over control of areas along the GeorgiaRussia border. The availability of critical systems through Georgia's (entire country) connection to the Internet was greatly diminished. • Non-repudiation Although there aren't many publicized examples of nonrepudiation violations, or 'repudiation attacks,' the following are some general examples: • Unauthorized manipulation of e-commerce transaction logs (making it hard or impossible to later prove a company performed an action, such as an equipment purchase or a stock market trade). • Unauthorized manipulation of administrator access logs on any computer (making it hard or impossible to later prove who was logged on, and when). Examples • Authentication • In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. What is currently running on your computer? • Windows • Open a run box. • Type taskmgr.exe and press return. Alternatively right-click the taskbar and select 'Start Task Manager'... • Mac • Open spotlight search • Type” Activity monitor” • Command line • Top • Ps Are you safe/secure? What services can your computer run? • Mac • Open spotlight, type terminal • Type: launchctl list • Windows • Open a run box. • Type: services.msc • Are all these services necessary? • Remote desktop service: is it necessary for your grandma’s computer? Is it necessary for the CEOs computer? Cyber Security • Cyber Security is about providing services while maintaining the CIANA properties. Think/Answer • A computer in an airtight-watertight vault would be very secure. Why is this level of security not attainable in any practical setting? From a user's perspective what Pillar of Cyber Security is violated? • Suppose you went into a Starbucks (which offers wireless Internet access to its customers), and brought radio-jamming equipment so wireless (WiFi) communication was impossible. Explain, from the other customers' perspectives, which of the five Pillars of Cyber Security are attacked in this scenario. • Suppose you went into a Starbucks (which offers wireless Internet access to its customers) and used a WiFi snooping tool to discover someone’s session key for their online bank login, and used it to login to their account. Explain, from the other customers' perspectives, which of the five Pillars of Cyber Security are attacked in this scenario. Think/Answer • If you then looked at the info there. Explain, from the account holder's perspective, which Pillar of Cyber Security would you have attacked? • If you then actually transferred money from their account into yours. Explain, from the account holder's perspective, which Pillar of Cyber Security would be attacked? • If you then actually transferred money from their account into yours. Explain, from the bank's perspective, which Pillar of Cyber Security would be attacked? • If you then were able to delete any record of the money transfer. Explain, from the bank's and account holder's perspective, which Pillar of Cyber Security would be attacked. Sources • Introduction to Cybersecurity Technical Foundations: https://www.usna.edu/CyberDept/sy110/index.html
© Copyright 2026 Paperzz