Wednesday 4 March 2020

Glossary

Glossary terms


I have done this post due to my lack of academic terms regarding my Major Project, namely Cyber Security and not only.


  • Kernel: is the core component of the computer system. It is built on the memory. It is useful to link applications with data processing at a high level.

  • Encryption- The process of encoding data or information in that way just an authorized person can access it.

  • VMI- Virtual Machine Introspection
  • VM- virtual machine
DDoS attack:       
 1) Master Mind/Planner: The Original Attacker, who creates reasons and answers for, why, when, how and by whom the attack will be performed.

2) Controller/Handler: Co-ordinator of the original attacker, who may be one or more than one machine, is used to exploit other machines to process DDoS attack

3) Agents/Zombies/Botnets: Agents, also known as slaves or attack daemons, subordinates are programs that actually conduct the attack on the victim. These programs are usually deployed on host computers. These daemons influence both the machines: target and the host computers. It facilitates the attacker to gain access and infiltrate the host computers.

4) Victim/Target: A victim is a target host that has been selected to receive the impact of the attack.


Reference list:

KnowHostBlog, 2019. DDoS Attack. [image] Available at: <https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.knownhost.com%2Fblog%2Fddos-protection-critical%2F&psig=AOvVaw2_4fpFrSXfFVQRAlbp7y4E&ust=1583832896322000&source=images&cd=vfe&ved=0CAIQjRxqFwoTCPjZj8WLjegCFQAAAAAdAAAAABAD> [Accessed 9 February 2020]

Linkov, V et al. (2019). Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research. Frontiers in Psychology, 10.




    

Monday 2 March 2020

Apple vs Samsung-final post for study case

Apple vs Samsung-final post for study case



There are many similarities between them linked to features, design, and shape. However after I have studied their security and privacy, I have discovered that although Apple has worldwide popularity related to its performance, there is nothing to dispute because I am not a user of the iOS system, but what I was interested in security has failed the test. The result of the CVE made me doubt about its security performance, the vulnerabilities were not in a small number but enormous for the fame they carry. In addition, Apple's privacy prevents users from accessing some websites due to privacy.



Although until I did this case study I thought Apple has no security competition, but Samsung surprised me, their KNOX security system only recorded three vulnerabilities and those at a low level, under 5 out of 10. In addition, Samsung uses the android system that is more permissible in accessing different websites, even allows the installation of software from unknown sources. Knox is also used by governmental organizations which makes me believe that it presents a reliable product.
 
In conclusion, after the ones listed above, as a user of the Android system, iOS didn't convince me to change my perceptions. In my opinion regarding security, Samsung is the winner.

Presentation

My presentation slides are shown:

 My presentation slides are shown below: 















































Car hacking-BMW

Car hacking, BMW - class task


Many BMW models have vulnerabilities regarding security, Zors (2018) states, researchers hack BMW cars and discovered 14 vulnerabilities. The security flaws have been discovered during a year-long experiment carried out by the Chinese security firm between January 2017 and February 2018. Most of them are connected with TCU* or TCB* and UDS*. However, six of them can be developing remotely, via the wireless interface of the vehicle, e.g. Bluetooth and cellular network.


 The attack via Bluetooth required a minimum distance between car and telephone and always in pairing mode. An attack via cellular mode can take place from afar. Almost all BMW models are affected by these vulnerabilities, BMW i Series,  BMW X Series,  BMW 3 Series, BMW 5 Series, BMW 7 Series. The most affected cars are models from 2012 onwards.
Both Keen LAB and BMW manufacturers recognize the hacks are complex and out of reach for many attacks.
The LAb report has shown how the attack takes place, namely the contactless attack,
The contactless attack is based on the wireless interfaces of the vehicle. And in such kinds of attack
chains, attackers may impact the vehicle remotely. In this part, the attack chains via Bluetooth and
the cellular network will be illustrated.

  • January 2017: Keen Lab kicked off the BMW security research project internally.
  • February 2018: Keen Lab proved all the vulnerability findings and attack chains in an

experimental environment.

  • February 25th, 2018: Keen Lab reported all the research findings to BMW.
  • March 9th, 2018: BMW fully confirmed all the vulnerabilities reported by Keen Lab.
  • March 22nd, 2018: BMW provided the planned technical mitigation measures for the

vulnerabilities reported by Keen Lab.

  • April 5th, 2018: CVE numbers related to the vulnerabilities have been reserved. (CVE-2018-9322,

CVE-2018-9320, CVE-2018-9312, CVE-2018-9313, CVE-2018-9314, CVE-2018-9311, CVE2018-9318)

  • May 22nd, 2018: This summary report is released to the public.
  • Year 2019: Keen Lab will release the full technical paper.

In 2018 BMW has implemented the solution offered by Keen LAB and all vulnerabilities have been fixed.
In conclusion, Keen Lab follows the "Responsible Disclosure" practice, which is a well-recognized practice by global manufactures in software and internet industries, to work with BMW on fixing the vulnerabilities and attack chains. The Chinese organization has discovered !4 vulnerabilities in BMW car security, regarding contactless attacks, Bluetooth Chanel and cellular networks. And all of these vulnerabilities have been fixed.

Zorz, Z., 2020. Researchers Hack BMW Cars, Discover 14 Vulnerabilities - Help Net Security. [online] Help Net Security. Available at: <https://www.helpnetsecurity.com/2018/05/23/hack-bmw-cars/> [Accessed 3 February 2020].

External cyber intelligence

External cyber intelligence

Cyber Threat Intelligence (CTI) communication aims to be a modern way to increase understanding of the situation among stakeholders. Organizations can be expected to provide a threat analysis system that is part of aggressive data defense and to disclose their details.


Fig. 1



According to Trifonov et.al. (2018), Cyber Threats Intelligence (CTI) contains the following:

  • Create structures and technological means to hold an up-to-date image of potential threats of varying size, origins and character, developments in the geopolitical background and related regional cyber image analysis and;
  • Developing skills to better define the causes of diversion and to take effective measures of security and counteraction.
CTI is a continuous system which must be improved forever. Preparing intelligence in a cyber operating setting is a comprehensive and ongoing method of evaluating possible threats to identify a suspect range of actions that could threaten devices, networks, documents, personnel or consumers by supplying means to interpret and analyze a variety of different intrusion sensor inputs to present a particular hazard (Trifonov et.al., 2018).
Cyber threat intelligence helps organizations to gain insight into the mechanisms and implications of threats, to build defense strategies and frameworks, and to reduce their attack surface with the ultimate goal of harm prevention and network protection.

Benefits of CTI

  • Cost efficiency with CTI the potential attack could be intercepted before being harmful to networks. Through staff readily informed and appropriate security measures in motion, a violation can be detected and remedied even more easily (Trifonov et.al., 2018). A recent survey shows that threat intelligence programs have saved organizations \$8.8 million in the past 12 months (CIS, 2020).
Conclusion
Many make the incorrect difference between vulnerability data and vulnerability information, without analysis, data can not provide organizations the suitable awareness they need to identify risks until they reach the network. CTI is something that will help secure the network, control the costs of managing network protection, and provide users with the information and awareness they need to concentrate on what really important.

References list:

R. Trifonov, O. Nakov, and V. Mladenov, "Artificial Intelligence in Cyber Threats Intelligence," 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Plaine Magnien, 2018, pp. 1-4.

Wagner, T., Mahbub, K., Palomar, E. and Abdallah, A., 2019. Cyber threat intelligence sharing: Survey and research directions. Computers & Security, 87, p.101589.

Cyber security assessment

Cybersecurity assessment


Cyber Protection Evaluation is a process that includes risk-based strategies to analyze and improve cyber-attack response mechanisms. The approach aims to detect risks that may impact the quality and stability of the network. Finally, a company may achieve a greater understanding of the strengths of protection against malware threats. The main aim of cybersecurity assessment is to determine the vulnerability inside an organization. Both network equipment and utilities could be a source of vulnerabilities.

Security assessment required a methodology that implements next:
  • Requirement Study and Situation Analysis
  • Security policy creation and update
  • Document Review
  • Risk Analysis
  • Vulnerability Scan
  • Data Analysis
  • Report & Briefing
The network protection risk evaluation determines sensitive properties that may be impacted by cyber threats (such as equipment, networks, computers, consumer data, and intellectual property) and also defines the hazards that may impact those properties (Cyber Security Risk Assessment | IT Governance UK, 2020).

Why is needing a security risk assessment?
There are a large number of reasons for those companies required security risk assessment.

Reduce long-term costs, identifying potential threats and working to mitigate them has the potential to prevent security incidents, which saves organization money in the long run.

Can improve communication, a cyber risk assessment requires input from a number of different departments and stakeholders, this can help increase visibility and enhance communication.


Conclusion

CyberRisk assessment is extremely important for every company, regardless of its influence and reputation in the industry. Any business wants it so that they can avoid cyber-crime attacks and utilize prevention strategies.

Reference List
Itgovernance.co.uk. 2020. Cyber Security Risk Assessment | IT Governance UK. [online] Available at: <https://www.itgovernance.co.uk/cyber-security-risk-assessments> [Accessed 5 March 2020].

Staff training

Staff training

Current workplace security awareness systems use a very one-size-fits-all approach. A more reliable and cost-effective approach to applying the workplace safety awareness model is to use a standardized multi-phase process that meets the specific needs of the company. Human error remains the leading cause of data breaches, and these breaches cause organizations a great deal of financial and reputational damage.
 Researchers have shown that 95% of cybersecurity breaches are due to human error. On top of that, only 38% of global organizations state that they’re prepared to handle a sophisticated cyber-attack.
And worse, as much as 54% of companies say they have experienced one or more attacks in the last 12 months, this number rises every month. Social engineering is the current favorite technique among cyber-criminals to psychologically exploit victims in order to persuade them to knowingly or unintentionally hand over private data that is then subverted for nefarious purposes. Another important tactic is phishing, where emails or connexions are sent to workers who then have their login certificates mined, in reality, 95% of cyber attacks are the product of phishing scams, causing phishing awareness training necessary (FraudWatch International, 2018).
To train employees involves the adoption of a methodology that has three phases. Valentine (2006) states in his research that methodology implements following some steps.
  • Assessment Phase
  • Identification Phase
  • Education Phase

  • Assessment Phase

    The primary aim of introducing an organizational-wide employee safety awareness plan is to secure client processes and information, particularly confidential and potentially sensitive records. It is also important that the organization will thoroughly evaluate what it wants to safeguard through the introduction of the security awareness program.

    Identification Phase

    After taking proper care of what it wants to secure, a company that aims to introduce a security awareness system requires defining the workers communicate periodically with the data and with any other security-related controls, such workers are basically gatekeepers for the data protection of an organization.

    Education Phase

    After an organization analyzes what the program should contain is important to educate the employees in that way to avoid do major mistakes when they could meet a security breach. For this reason, a company should test the staff in a possible scenario.





    Example of employee training.
    Li et al., (2019) have describe in them survey a model of this training.
    The findings of the analysis show that U.S. workers have been mobilizing resources for digital change in the battle against contemporary cybercriminals. Employees at different companies have experienced cyber-crime-related disruptions as they establish and implement new technology protocols, practices, techniques, and tools intended to keep up with developments in the marketplace. Respondents who engaged in this survey agree that digitalization requires them to reconsider their long-term information defense policies, techniques, and activities. The survey also showed that protection change does not only impact technological decisions but that it is also necessary to improve employee understanding in order to prevent cybercrime from happening.

    Conclusion

    Security awareness training is an important factor for every company. Each employee should be aware of the prevention and suggested remediation protocol for data security purposes. This will help organizations to avoid having to deal with a number of issues that could impact or damage the stability of the company and, therefore, cyber awareness training is required to help employees learn about the detection of fraudulent behavior and data stealing.

    References list:

    FraudWatch International. 2020. What Is Cybersecurity Awareness Training & Why Is It So Important?. [online] Available at: <https://fraudwatchinternational.com/security-awareness/what-is-cyber-security-awareness-training/> [Accessed 1 March 2020].

    Li, L., He, W., Xu, L., Ash, I., Anwar, M. and Yuan, X., 2019. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, pp.13-24.

    Valentine, J., 2006. Enhancing the employee security awareness model. Computer Fraud & Security, 2006(6), pp.17-19.