Introduction to Security

Introduction
to
Security
A note about this guide
As you read through this guide you will see important terms in bold. These terms are
important to remember and are discussed throughout this chapter. Please refer to the Key
Terms at the end of this document for a complete list of where to find important
definitions. The majority of this document focuses on the Microsoft Windows®
operating system. The concepts covered within also apply to other operating systems, but
are not directly covered in this guide.
Each time you see this computer graphic it represents an exercise that you can
complete with this text. If you are reading this text in conjunction with a class,
be sure to complete any exercises required by your instructor.
Table of contents
A note about this guide ....................................................................................................... 1
Table of contents ................................................................................................................. 1
Things are still bad in security ............................................................................................ 2
What is information security? ............................................................................................. 3
Who are the attackers? ........................................................................................................ 4
Why such an increase in Attacks? ...................................................................................... 5
Identity Theft ...................................................................................................................... 6
The Security Paradigm ........................................................................................................ 7
Password Paradox ............................................................................................................... 7
Choosing a Password .......................................................................................................... 8
Phishing............................................................................................................................. 10
Social Networking ............................................................................................................ 11
Backups ............................................................................................................................. 12
Firewalls ............................................................................................................................ 12
Patch Management ............................................................................................................ 13
Antivirus ........................................................................................................................... 14
User Account Control ....................................................................................................... 15
Wireless Security .............................................................................................................. 16
Bluetooth ........................................................................................................................... 17
Final Thoughts .................................................................................................................. 17
Key Terms ......................................................................................................................... 18
Additional Labs:
Test My Firewall .......................................................................................................... 19
Patch Management ....................................................................................................... 20
Test My Antivirus ........................................................................................................ 21
1
Things are still bad in security
It is easy to think that computer security “isn’t my problem” or that “bad things won’t
happen to me.” Why do I need to know anything about information security? Here are a
few statistics:
• Web pages that infect by simply looking at them (6,000 new infected pages daily,
or 1 every 14 seconds)
• More attacks originate in U.S. than any other country (33%)
• Home users were the most highly targeted sector (93% all targeted attacks)
• An infected U.S. computer has an average of 8 instances of malware
• U.S. has highest number of infected computers
• 431 million adults experienced cybercrime in last year
• 1+ million daily victims (14 each second)
• 79% Internet users online 49+ hours per week have been victims
• 1 in 2.27 = odds consumer become cybercrime victim
• $388 billion total cost cybercrime
If you knew that your computer would be attacked today what would you do? On the
next few pages we will discuss what you can do to protect yourself, and your computer.
2
What is information security?
Information security is a term that is frequently used to describe the task of guarding
information that is in digital format. The goal in information security is to protect
information that has value to people and organizations, and avoid legal consequences.
Three key characteristics of information that must be protected
are:
1. Confidentiality – Ensures that only authorized parties
can view the information
2. Integrity – Ensures that the information is correct and
no unauthorized person or malicious software has
altered the data.
3. Availability – Ensures data is accessible to authorized
users.
These three characteristics of information security are better known as CIA.
Typically, we are extra cautious when we find ourselves in unfamiliar places. The same
caution should be used when on the internet. The internet is a network of interconnected
computers that share information. It is like a digital interstate system. Your automobile
can easily transport you from where you are to another location – in order to accomplish
some kind of task (grocery shopping, entertainment, etc). The same is true with the
internet – the internet allows you to gain information about something you do not know
without having to physically go there.
When dealing with information security, it is important to be able to understand the
language used – just as the medical profession has its own language. To make this
terminology easier to understand, let’s consider the following scenario.
There is inherent risk (the likelihood that something will happen) with many daily
activities we perform. If you were to drive an automobile there is a risk of an accident
caused by another driver. The automobile is an asset – something that has value. Other
drivers are a threat – an event or object that may defeat the security measures in place
and result in a loss. Just because there is a threat of an accident, does not mean that one
will happen. Therefore, a threat does not mean that security has been compromised, but
that there is a potential for a loss. Other drivers are considered a threat agent – a person
or thing that has the power to carry out a threat. In order to drive safely, drivers must
stay in his or her own lane. If a driver is not alert, due to being tired or intoxicated, the
driver may not stay in their own lane - creating a
vulnerability (a weakness that allows a threat agent to
bypass security). Intentionally taking advantage of a
vulnerability is known as exploiting the weakness.
Just as there are risks associated with driving an automobile on the interstate, there are
risks with using the internet. One such risk is that an attacker could select you as a target.
3
Who are the attackers?
Attackers come in several different categories. Here are just a few:
1. Hackers – a general term used to identify anyone who illegally breaks into, or
attempts to break into, a computer system. Hackers typically
have an advanced knowledge of computers and networks.
There are several subgroups, but the two primary groups of
hackers are Black Hat and White Hat. A “black hat” hacker
is an attacker that gains access to computer systems with
malicious intent. On the other hand, “white hat” hackers
(aka ethical hacker) break in for non-malicious reasons,
usually to expose security flaws in an effort to protect a
computer system or network from attacks.
2. Script kiddies – Unskilled users that do their work by downloading automated
hacking software (scripts) and using them to break into computers. Script kiddies
lack the advanced skills of hackers, but are sometimes considered more dangerous.
Their ability to use these tools, but not fully understand what they do or the impact of
their actions make them a threat.
3. Spies – A person who is hired to break into a computer to steal information. These
people target specific computers or networks to steal sensitive information.
4. Employees – Considered the largest information security threat to business,
employees typically have legitimate access to data, which can easily be compromised
through bribes, blackmail, and money.
5. Cybercriminals – Cybercriminals are a loose-knit group of attackers highly
motivated, better funded, and more eager than hackers. This group focuses their
attacks towards making money. They typically target credit card data and online
financial account information (cybercrime).
6. Cyberterrorists – This group of attackers should be the most feared. It is almost
impossible to predict when or where an attack may occur because this group is
motivated by ideology, not money. This group typically target computers or
networks that affect the largest number of people, such as power grids.
Security Awareness Assessment
If you are a reading this document in association with a class at CFCC, please
log into SAM to complete the Security Awareness Assessment BEFORE
reading further. This Assessment has no point value, so please answer the questions
honestly.
4
Why such an increase in Attacks?
The question is often asked, “What do I have that an attacker wants?” A better question
might be, “what do I have that I don’t want attackers to have?” While considering this
question, here’s a few difficulties faced when protecting your data:
Speed of attacks – Attackers can quickly scan systems to find weaknesses and launch
attacks very quickly. One such example was the Slammer Worm1, the fastest computer
worm in history. As it spread throughout the Internet, it doubled in size every 8.5
seconds. At its peak, the worm was scanning 55 million computers per second to find
other computers to infect.
Before Infection (5:30 UTC)
After Infection (6:00 UTC) 30 Minutes later
More sophisticated attacks – Attackers today are sending malicious data or commands to
attack computers, masking the attacks as legitimate data and commands. This makes it
very difficult to distinguish an attack from legitimate traffic.
Simplicity of attack tools – Many of the attack tools that attackers need are freely
available on the Internet and do not require any technical knowledge to use.
Faster detection weaknesses – Attackers are able to quickly respond to newly found
vulnerabilities and take advantage of the corresponding “window of exposure” (the time
between when the vulnerability is found, and a fix is developed). These attacks are
typically called zero day attacks, since there is no early warning that an attack is
eminent.
Delays in user patching – Software makers are constantly updating their software to
eliminate vulnerabilities. However, if a software maker was to keep their software 100%
secure at all times, it is estimated that they would have to update the software every 10
minutes in order to keep users protected.
Distributed attacks – Attackers can use thousands of computers in an attack against one
computer, or a network. By using multiple computers, it is much harder to locate a single
source point to determine where the attack started.
Exploit user ignorance & confusion – Users are often misinformed about what is the
correct way to protect their computer from attackers. This leads users to make decisions
without understanding the implications.
1
http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
5
Identity Theft
How do you compare to
other computer users?
•
•
•
•
•
•
88% use their home computer
for online banking, stock
trading, reviewing personal
medical information, and
storing financial information,
health records, and resumes
98% agree important to be
able to know risk level of a
web site before visiting it (But
64% admit don’t know how
to)
92% think that their anti-virus
software is up to date (But
only 51% have current antivirus software that been
updated within last 7 days)
44% don’t understand
firewalls
25% have not even heard of
the term “phishing” and only
13% can accurately define it
22% have anti-spyware
software installed, an enabled
firewall, and anti-virus
protection that has been
updated within last 7 days
The 2003 survey from the
Identity Theft Resource Center
found that:
•
•
•
Only 15% of victims find out
about the theft through
proactive action taken by a
business
The average time spent by
victims resolving the problem
is about 330 hours
73% of respondents indicated
the crime involved the thief
acquiring a credit card
One often overlooked segment of Information Security is
securing one’s personal identity. The internet often gives a
false sense of security – since most people access the internet
on personal devices, in places where they feel secure.
Identity Theft occurs when someone’s personal information,
such as social security number, is used to establish bank or
credit card accounts that are then left unpaid, leaving the
victim with debts and ruining their credit rating.
Here are a few of the ways thieves can steal your identity:
• Unshredded personal documents (dumpster diving) – to
prevent be sure to completely destroy any documents that
contain personally identifiable information.
• Lost USB Drives/External storage devices – if personal
information must be stored on these devices, use a password or
some encryption technique to ensure personal information isn’t
readily available. When disposing of these devices be sure to
completely erase all personal information.
• Unsecure PDA’s/Cell Phones – to prevent be sure to
enable a security code on these devices so thieves don’t have
easy access to your information. When upgrading, or
repairing, be sure to properly wipe (sanitize) the device to
ensure no personal information is available to others.
• Stealing Bank/Credit Cards, ID Cards, Passports
(Pickpocketing, Mail Theft) – to prevent be sure to
periodically take a personal inventory of these to ensure none
are missing.
• Skimming of Bank/Credit Cards – Skimming is a
technique where a thief makes a “copy” of your card with a
compromised card reader, or hand-held card reader. To
prevent be sure you know where you use your card, and
monitor your statement for unauthorized charges.
It is important to periodically monitor your personal credit
report to ensure the information is accurate. You can request a
free credit report from http://annualcreditreport.com. (Beware
of “Imposter” sites offering your report for a fee!) Remember
that no amount of prevention is 100% fail safe.
For more information about Identity Theft, please visit
http://www.FTC.gov/IDTheft
6
The Security Paradigm
The biggest challenge in a security system is the
balance between Security and Convenience. As
Security increases, convenience decreases. The
difficulty is having a system that will keep the “bad
guys” out while also allowing the “good guys” to do
their job.
If you were to have the best security system in the
world installed at your home but then used a brick to
prop a door open, how useful would that system be?
The same is true in information security – there is a
tradeoff for ensuring your information is secure, and
that means we need to accept that some convenience
is lost.
Password Paradox
A password is a series of letters or numbers used to authenticate a user (verify you are
who you say you are). For a password to remain secure it should never be written down
but must be committed to memory. Passwords should also be of a sufficient length and
complexity that an attacker cannot easily determine. Here’s the “Paradox”: although
lengthy and complex passwords should be used and never written down, it is very
difficult to memorize these types of passwords. Most of us have multiple accounts for
computers at work, school, and home, e-mail accounts, banks, online Internet stores, and
each account should have its own unique password.
What makes a Weak Password?
1. Common words – like ones
found in a dictionary (e.g.: Eagles).
2. Short passwords – passwords that
contain the minimum number of
characters, or are sequential and easy to
guess (ABCDEF).
3. Personal information passwords
– passwords containing the name of a
child, pet, or family member.
4. Writing a password down –
anyone who has access to the note can
see your password
5. Not changing a password –
passwords are not designed to “last a
lifetime” change them, and change them
often!
7
6. Reuse of the same password – it’s not enough to change a password, make it
unique each and every time. Attackers know that eventually everyone will reuse a
password, so it’s just a matter of time before they find yours.
Password Principles
1. Any password that can be memorized is a weak password.
2. NEVER share your password with anyone.
3. Any password that is repeated on multiple accounts is a weak password – once an
attacker has your password, they can access everything that uses that same
password!
Choosing a Password
Which of the following passwords are more secure?
1. thisisaverylongpassword
2. Xp4!e%
Answer: Length always trumps complexity!!!
Number-of-Keyboard-Keys
Password-Length
= Total-Number-of-Possible-Passwords
If You Rely On Memory Only
Keyboard Password
Possible
1. Length is more important than
Keys
Length
Passwords
complexity longisthislongerpassword is better
95
2
9,025
than u$%#16
2. Do not use passwords that consist
95
3
857,375
of dictionary words or phonetic
words
95
4
81,450,625
3. Do not use birthdays, family
member names, pet names,
95
6
735,091,890,625
addresses, or any personal
information
189
6
4.5579633e+13
4. Do not repeat characters (xxx) or
use sequences (abc, 123, qwerty)
5. A minimum of 12 characters in length should be used (if allowed). For accounts
that require higher security a minimum of 18 characters is recommended
6. Consider using a longer passphrase: theraininspainfallsmainlyontheplain
7. Use nonkeyboard characters
8
What are nonkeyboard characters?
Make passwords stronger with special
characters not on the keyboard. The
characters are created by holding
down the ALT key on the keyboard
while simultaneously typing a number
on the numeric keypad (but not the
numbers across the top of the
keyboard).
For example, ALT + 0163 produces £.
To see a list of all the available nonkeyboard characters click Start
and Run and enter charmap.exe; click
on a character and the code ALT +
0xxx will appear in lower-right corner
if can be reproduced in Windows.
Microsoft Character Map
Verifying your Password
The following exercises will test how strong your passwords are. Enter one of
your passwords (past or current) to check it.
Visit Microsoft’s Safety and Security Center to see how strong your passwords are.
1. For this lab please visit
https://www.microsoft.com/security/pc-security/password-checker.aspx
2. Enter one of your currently used passwords to check the strength. Your
password strength is rated as Weak, Medium, Strong, or Best
3. If you do not have a rating of “Best” what can you do to increase the strength?
Visit “How Secure is my Password?” to test your password to see how long it would
take before an attacker could crack your password.
1. For this lab please visit http://howsecureismypassword.net
2. Enter one of your currently used passwords.
3. What could you do to increase the time before your password is cracked?
Other interesting password sites:
• http://www.passwordmeter.com
• http://www.testyourpassword.com
• Ultra High Security Passwords: www.grc.com/passwords.htm
9
Phishing
The key to a successful phishing attack is the use of
social engineering – the practice of deceiving someone
to obtain secure information. Phishing - is a common
form of social engineering where an attacker sends an email or displays a Web announcement that falsely claims
to be from a legitimate enterprise in an attempt to trick
the user into surrendering private information. The User
is asked to respond to an e-mail or is directed to a Web
site where he or she is instructed to update personal
information, such as passwords, credit card numbers,
Social Security numbers, bank account numbers, or other
information for which the legitimate organization already
has a record. However, the Web site is actually a fake
and is set up to steal the user’s information. This fake
site is called a spoofed site. It looks exactly like another, but does not belong to the
organization represented.
In September 2010 a massive data breach from computers belonging to South Carolina's
Department of Revenue (DOR) Exposed Social Security numbers of 3.8 million
taxpayers plus credit card & bank account data for a total of 74.7 GB. This breach started
with an employee's computer infected with malware after user opened phishing e-mail.
The attacker captured the person's username and password, and then installed tools that
captured user account passwords on 6 servers. Eventually the attacker gained access to
36 other systems. As of January 2013, this attack has cost the state of South Carolina $20
million and counting. Read more here:
http://www.thestate.com/2013/01/06/2578924/the-latest-on-sc-hacking-costs.html
Phishing Tests
How quickly can you recognize a phishing scam?
1. For this lab please visit http://www.sonicwall.com/furl/phishing/
2. You will complete a series of 10 questions that will be based on screenshots of
actual emails. You will have to decide if the email is phishing or legitimate.
Answer all ten questions to see your score.
3. To better prepare you to recognize Phishing attempts, a score of 80 or higher is
suggested. When you are ready to begin, click “Start The Test”
4. What is an example of a phishing attempt that looked legitimate and why?
How bad is phishing? To get a better understanding of the impact Phishing is having
worldwide visit http://www.antiphishing.org/resources/apwg-reports/ and select a
Phishing Attack Trends Report.
10
Social Networking
Typically, a social network is made up of individuals and
organizations grouped together based on some type of affiliation.
Web sites that facilitate linking individuals with common
interests like hobbies, religion, politics, or school contacts are
called social networking sites and function as an online
community of users. Some of the more popular social network sites
(aka online communities) are Facebook, Twitter, Google+, LinkedIn and others.
These various sites require a user to create an account containing a certain amount of
personal information. A user who is granted access to a social networking site can read
the profile pages of other members and interact with them. With the various types of
easily accessible personal information, these sites have increasingly become prime targets
of attacks.
Consider carefully who is accepted as a friend. Once a person has been accepted as a
friend that person will be able to access any personal information or photographs you
have posted. Show "limited friends" a reduced version of your profile. Individuals
designated as “limited friends” only have access to a smaller version of the user’s profile.
Disable options and then reopen them only as necessary. Re-enable options as needed
instead of making everything accessible and restricting access later after it is too late.
When using social networking sites it is important to understand that information posted
on these sites create a digital footprint, a data trail left behind by interactions in a digital
environment. What seems like something funny posted today may not be so funny 8-10
years from now, and could even affect a potential job opportunity. Just deleting
something from one of these sites does not mean it is gone. Since the Internet is a
network of many computers, there is no way to guarantee that something deleted is
deleted on all the various computers that your data may be on. A better perspective is to
view anything posted on a social networking site as something that “lives forever”.
11
Backups
It has long been said that the only
people who backup their data are
those who have lost something. It
cannot be stressed enough that your
data must be backed up. Creating a
backup involves making a copy of
your data and placing it in another
location. This creates what is called
data redundancy. In addition to
ensuring no data is lost, a backup
provides a copy of files that can be
replaced in the event that one
becomes damaged, deleted, or
changed accidentally. Deleting a file
does not mean that it is permanently
gone (even if the drive is reformatted) but that you no longer have access to it. Data
recovery centers and forensic recovery specialists have tools that oftentimes allow the
recovery of deleted data. However, having a backup is much less costly than paying to
recover data that could have easily been backed up.
Here is a good rule of thumb. If you have a file (whether it be a word document, picture,
or anything else) that you could never access again and it would be missed, this file
should be backed up.
Firewalls
A firewall restricts what can come in and go out of your computer across the network. It
is like a locked door on your computer. It stops harmful data from coming in and stops a
compromised computer from infecting other computers on your network. A two-way
personal software firewall inspects network traffic passing through it and denies/permits
passage based on rules. An application-aware firewall allows a user to specify which
desktop applications can connect to the network. Just as you close the door to your house
to stop unwanted visitors, a firewall does the same on your computer.
Firewall Test
In this exercise you can test your personal firewall. You may have a hardware
firewall or be using the built in firewall features of your specific operating
system. This lab will test to see if there are any flaws in your firewall. Please refer to the
Test my Firewall Lab at the end of this text.
12
Patch Management
It is essential that your computer is kept up
to date. Many of the vulnerabilities your
computer is exposed to can be closed
quickly and effectively by applying system
patches. A patch is piece of software
designed to fix a problem.
As you may recall, one of the reasons for
the increase in attacks is the lack of
software patches. A patch will only help if
it is installed. Microsoft Windows includes
the Windows Update utility to install system
updates. The MacOS includes the Apple
Microsoft Windows Update
Software Update tool to keep the system up
to date. Users don’t often patch their
systems because they don’t want to take the time to wait for their computers to reboot.
However, during this rebooting process, system files (files that are in use) are updated
and can then be placed back into service.
Patching should not be limited to only the operating system. Many vendors regularly
provide updates to their products. Acrobat Reader, Adobe Flash Player, and Java are just
a couple of key software packages that should be updated regularly.
A 2012 survey of American, British and German
computer users yielded the following:
•
•
•
•
•
40% do not always update software on computers when initially prompted
25% do not clearly understand what software updates do
25% do not understand the benefits of updating regularly
75% saw update notifications but over half said needed to see notification between 2-5 five
times before decided
25% do not know how to check if their software needs updating
Don’t leave your computer vulnerable. Take a few moments to see if your computer
needs to be updated!
Patch Management
In this exercise you can check to see if your computer is up to date. Please refer
to the Patch Management Lab at the end of this text.
13
Antivirus
Antivirus software monitors files in “real
time” to help prevent, detect, and remove
malware from a computer. Malware is a
broad term that describes any program
that is intended to cause harm. Malware
comes in many different forms – viruses,
worms, trojans, rootkits, spyware, and
adware.
Trojans
Rootkits
Worms
Viruses
Spyware
Malware
Adware
A virus instructs your computer to perform annoying or destructive activities. Viruses
are heavily dependent upon the user for its survival; the user must launch the program or
open a file for the virus to activate. Worms are malicious programs designed to take
advantage of vulnerabilities in an application or operating system in order to enter a
computer. Unlike viruses, a worm does not require any user interaction to spread.
Trojans are executable programs
advertised as doing one activity, but
doing something else. Trojans
contain hidden code that launches an
attack. Unlike viruses, a trojan is
installed on a computer system with
the user’s consent and knowledge.
One of the most common trojan
attacks comes in the form of fake
antivirus programs. These programs
typically present themselves as a
“popup” stating that your computer is
Fake Antivirus Screenshot
infected, and that their program will
fix the problem. Don’t be fooled! Rootkits are a set of software used by an attacker to
hide the presence of other types of malware. This is accomplished through changing the
operating system to force it to ignore any malicious activity. Rootkits are the hardest to
remove since they become an integrated part of the operating system. Oftentimes the
reinstallation of the operating system is the
only practical way to remove them.
Antivirus software searches files for
known infections based on a dictionary of
malware signatures (how they typically
behave). Since the majority of antivirus
solutions use a dictionary, it is essential that
they be maintained and kept up to date to
provide current protection. An antivirus
solution with an outdated dictionary is not
as effective in removing newly discovered
malware. The key is to update, and do it
often.
Microsoft Security Essentials Antivirus
14
It is essential that the chosen antivirus solution includes an anti-spyware component.
Spyware is software that tracks a computer user’s internet usage and sends that
information to a company or person, usually without the user’s permission or knowledge.
Unlike spyware, adware is software installed with another program, usually with the
user’s permission, that generates advertising revenue by generating targeted ads to the
user. To ensure maximum protection, you must periodically test and verify that your
antivirus solution is operating properly.
Test Antivirus
In this exercise you will test the effectiveness of your antivirus program. Please
refer to the Test My Antivirus Lab at the end of this text.
User Account Control
User Account Control (UAC) –
notifies a user when software attempts
to perform a task that requires
administrative access, and then prompts
for approval. If the current user is a
standard user, then an administrative
password would need to be provided to
continue. This tool was created to
PROTECT your computer! Too often
User Account Control Dialog Box
users turn off or disable UAC, just
because the notifications are
“annoying.” Instead of disabling, UAC should be leveraged as a tool to protect your
computer from malware. By accessing the Control Panel, then selecting User Accounts,
then “Change User Account Control settings” you can increase the level of protection to
“Always notify.” By doing
so, UAC will display the
authentication dialog box,
and it must be answered
before continuing. If you
are not installing any
software, you should never
see UAC interact with you.
This is one way to prevent
malware from unknowingly
infecting your computer.
User Account Control Settings
15
Wireless Security
Does wireless security matter? First, any unsecured wireless
device will allow an attacker to get into any folder set with file
sharing enabled. Second, an attacker can easily monitor and
capture wireless transmissions (find out what you are doing
online). An attacker can gain access to the network behind the
firewall and can inject malware, allowing additional access to
the entire network. An attacker could download harmful
content linked to the unsuspecting owner, all without his or her
knowledge.
Here’s a true story of one family’s experience of an attack performed by a neighbor:
After being accused of improper conduct with a family’s son, Barry A.
wanted to get even with the neighbors by using his computer hacking skills. He
started by breaking the family’s WiFi WEP encryption. He then created a
fictitious MySpace page with the husband's name on it and posted a picture of
child pornography. He included a note that the husband was a lawyer and could
get away with "doing anything.” Barry e-mailed the same pornography to the
husband's co-workers, and sent flirtatious e-mails to women in the husband's
office. He also sent threatening e-mails to the Vice President of the U.S. from the
husband's Yahoo account saying he was a terrorist and would kill the VP. The
husband’s law office hired a forensics investigator who installed a protocol
analyzer. This led to evidence that Barry was involved. Surrounding the
threatening e-mail sent to the Vice President was data that included Barry's name
and account information. The FBI searched Barry's house and found evidence
that Barry had done the same attack against a previous neighbor. Barry was
offered a 2-year sentence but turned it down, so prosecutors piled on more
charges. Finally, Barry pled guilty and was sentenced to 18 years in prison and
had to forfeit his house and all his computer gear.
http://www.wired.com/threatlevel/2011/07/hacking-neighbor-from-hell/
To secure a wireless network:
1. Lock Down the Device
• Create strong password (over 15 characters)
• Disable remote management (this eliminates the ability of accessing the wireless
device and changing the settings via the
Internet)
2. Turn on WPA2
• Locate the wireless security options
• Select WPA2 Personal security option,
which may be labeled as WPA2-PSK
[AES], is turned on by clicking the
appropriate option button
Wireless security settings
16
•
A key value, sometimes called a pre-shared key (PSK), WPA2 shared key, or
passphrase, must be entered. This key value can be from 8 to 63 characters in
length
After turning on WPA2 Personal on a wireless
router, and entering a key value, the same key
value must also be entered on each mobile device
that has permission to access the Wi-Fi network. A
mobile device that attempts to access a wireless
network with WPA2 Personal will automatically
ask for the key value. Once the key value is
entered, the mobile device can retain the value and
does not need to ask for it again.
3. Beware of Imposters
• When presented with a list of wireless networks, be
sure to NOT select the ad-hoc
(computer-to-computer) network icon
(see red arrow in wireless network list
to the right). This indicates a connection directly
Wireless network list
to another computer, and NOT to a network.
Attackers frequently use this technique to make a direct connection to another
user’s computer to steal information or install malware. The icons with the bars
represent a network connection.
•
Bluetooth
Bluetooth is a wireless technology that utilizes a radio frequency (RF) for transmitting
data over a short distance. When using a smartphone or tablet that supports Bluetooth, it
is advisable to disable Bluetooth and turn on this service only as necessary. Bluetooth
devices should be turned off when not being used or when in a room with unknown
people. Another option is to set Bluetooth on the device as undiscoverable, which keeps
Bluetooth turned on in a state where it cannot be detected by another device. Attackers
can use an open Bluetooth connection to gain access to your device, copy e-mails,
calendars, contact lists, or media stored on the phone without the owner’s knowledge or
permission.
Final Thoughts
Take a moment to compare your initial thoughts as reflected in the Initial Security
Awareness Assessment you took in SAM. Now that you have read through this guide see
if there are any answers you would change.
17
Key Terms
A
adware, 14
antivirus, 14
asset, 3
authenticate, 7
availability, 3
B
backup, 11
Bluetooth, 17
C
CIA, 3
confidentiality, 3
cybercrime, 4
cybercriminals, 4
cyberterrorists, 4
D
data redundancy, 11
digital footprint, 11
E
employees, 4
ethical hacker, 4
exploiting, 3
F
H
hackers, 4
I
identity Theft, 6
information security, 3
integrity, 3
internet, 3
M
malware, 13
N
nonkeyboard characters, 9
P
password, 7
password management app, 8
patch, 12
phishing, 10
R
risk, 3
rootkits, 14
security paradigm, 7
slammer worm, 5
social engineering, 10
social networking sites, 10
spies, 4
spoofed, 10
spyware, 14
T
threat, 3
threat agent, 3
trojans, 14
U
user account control, 15
V
virus, 13
vulnerability, 3
W
weak Password, 7
window of exposure, 5
worms, 13
Z
S
zero day attacks, 5
script kiddies, 4
firewall, 12
18
Test My Firewall
This lab will test your firewall for possible weaknesses.
1. For this lab please visit http://www.grc.com
2. In the menu, select Services, then select “Shields UP!”
3. The Shields UP page will load, giving you some initial feedback about your
connection. Select the “Proceed” button to begin.
4. Next the ShieldsUP!! Services application will load. To test your firewall, select
“All Service Ports” to begin. Be patient as this test will take some time.
5. Once the test is complete, you will receive
the results of the “grid scan” A “perfect
scan” would be completely green, with red
representing an open port and blue
representing a closed port. Scroll down
below the results to see a full explanation of
the results, and the meanings of the colors.
19
Patch Management
This lab will test your computer to see if you have any insecure versions of
common/popular programs installed on your PC. This lab runs through your browser, so
no installation or download is required.
1. For this lab please visit http://secunia.com/vulnerability_scanning/online/
2. If a java prompt opens asking “Do you
want to run this application?” and the
publisher is listed as Secunia, click Run.
3. On the right side of the screen select “Start
Scanner”
4. A security warning may open asking whether to “Block potentially unsafe
components from being run?” select “Don’t Block”
5. Now click Start to begin the system scan.
6. When the scan is complete, scroll down to the bottom of the screen to see the
results of the scan. Links to download updates should be provided for most
recommended updates.
20
Test My Antivirus
If you do not have a current Antivirus software program, or what you have is out of date,
you can download Microsoft Security Essentials for FREE by visiting:
http://www.microsoft.com/Security_Essentials/
If your computer is infected, and you know what infection you have, you can download a
removal tool provided by Norton Antivirus at:
http://us.norton.com/security_response/removaltools.jsp
This lab will test your Antivirus software to see if it is
functioning properly.
1. For this lab visit
http://www.eicar.org/anti_virus_test_file.htm
2. The website will initially open to an “Intended Use” page.
3. On the left menu, select Download
4. The download page will open, and a description of each
test file is discussed.
NOTICE: This test
does NOT contain
actual viruses. The
test file being used was
created to allow an
anti-virus software
package to react as if it
were a virus.
YOU DOWNLOAD
THESE FILES AT
YOUR OWN RISK.
21