Free Essay

Top Security Threats

In:

Submitted By ctgagne
Words 727
Pages 3
Top Security Threats
Craig Gagne’
IS317: Hacker Techniques Tools and Incident Handling
12/15/2013
Hany Othman

The report highlights dramatic increases in targeted attacks on enterprises; the continued growth of social networking sites as an attack distribution platform; and a change in attackers’ infection tactics, increasingly targeting vulnerabilities in Java to break into traditional computer systems. In addition, the report explores how attackers are exhibiting a notable shift in focus toward mobile devices.

Targeted attacks
Targeted attacks such as Hydraq and Stuxnet posed a growing threat to enterprises in 2010. To increase the likelihood of successful, undetected infiltration into the enterprise, an increasing number of these targeted attacks leveraged zero-day vulnerabilities to break into computer systems.
Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source.
Social Networks Social network platforms continue to grow in popularity and this popularity has not surprisingly attracted a large volume of malware. One of the primary attack techniques used on social networking sites involved the use of shortened URLs. Under typical, legitimate, circumstances, these abbreviated URLs are used to efficiently share a link in an email or on a web page to an otherwise complicated web address. The report found that attackers overwhelmingly leveraged the news-feed capabilities provided by popular social networking sites to mass-distribute attacks. In a typical scenario, the attacker logs into a compromised social networking account and posts a shortened link to a malicious website in the victim’s status area.
Zero-day vulnerabilities and rootkits Once inside an organization, a targeted attack attempts to avoid detection until its objective is met. Exploiting zero-day vulnerabilities is one part of keeping an attack stealthy since these enable attackers to get malicious applications installed on a computer without the user’s knowledge. Zero-day vulnerabilities become everyday vulnerabilities via attack kits; inevitably, some of the vulnerabilities used on Stuxnet as well as the other 6,253 new vulnerabilities discovered in 2010 will find their way into attack kits sold in the underground economy.
In 2010, attack toolkits, software programs that can be used by novices and experts alike to facilitate the launch of widespread attacks on networked computers, continued to see widespread use. These kits increasingly target vulnerabilities in the popular Java system, which accounted for 17 percent of all vulnerabilities affecting browser plug-ins in 2010. As a popular cross-browser, multi-platform technology, Java is an appealing target for attackers. The Phoenix toolkit was responsible for the most Web-based attack activity in 2010. This kit, as well as many others, incorporates exploits against Java vulnerabilities. The sixth highest ranked Web-based attack during the reporting period was also an attempt to exploit Java technologies.
Mobile Threats In 2010, most malware attacks against mobile devices took the form of Trojan Horse programs that pose as legitimate applications. While attackers generated some of this malware from scratch, in many cases, they infected users by inserting malicious logic into existing legitimate applications. The attacker then distributed these tainted applications via public app stores. While the new security architectures employed in today’s mobile devices are at least as effective as their desktop and server predecessors, attackers can often bypass these protections by attacking inherent vulnerabilities in the mobile platforms’ implementations. Unfortunately, such flaws are relatively commonplace - Symantec documented 163 vulnerabilities during 2010 that could be used by attackers to gain partial or complete control over devices running popular mobile platforms. This report discusses these trends, impending threats, and the continuing evolution of the Internet threat landscape in 2010. Supporting the commentary are four appendices of data collected over the course of the year covering the following categories: Threat activity, Vulnerabilities, Malicious code and Fraud activity. Along with this analysis, Symantec provides a comprehensive guide to best practices for both enterprises and consumers to adhere to in order to reduce their risk from the dangers of the current Internet security threat landscape.

Symantec. (2011, April 16). Symantec Internet Security Threat Report. Retrieved 12 14, 2013, from Symantec.com: https://www4.symantec.com/mktginfo/downloads/21182883_GA_REPORT_ISTR_Main-Report_04-11_HI-RES.pdf

Similar Documents

Premium Essay

Cloud Computing

...Top Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance March 2010 Top Threats to Cloud Computing V1.0 Introduction The permanent and official location for the Cloud Security Alliance Top Threats research is: http://www.cloudsecurityalliance.org/topthreats © 2010 Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance “Top Threats to Cloud Computing” at http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance “Top Threats to Cloud Computing” Version 1.0 (2010). Copyright © 2010 Cloud Security Alliance 2 Top Threats to Cloud Computing V1.0 Table of Contents Introduction................................................................................................................................... 2 Foreword........................................................................................................................................ 4 Executive...

Words: 3759 - Pages: 16

Premium Essay

Cyber Threats

...TOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising importance of cyber security at the work place. These security threats are becoming more common every day. Workplaces and personal lives are being attacked by using smaller more mobile devices. Therefore these cyber threats will be talked about in Therefore, these cyber threats will be assessed, to give you an idea of what they can do to your company or life, and the proper response on how to mitigate them.   TOP FIVE CYBER SECURITY THREATS FOR 2012 With cyber security becoming an issue in todays corporate society the corporate world is looking into all of the threats to mitigate the leaking of sensitive information to the public. This has come to light with hactivists conducting large-scale exploits to infiltrate law enforcement agencies and major companies and steal sensitive data that could embarrass or damage certain organizations (Wansley, 2012). In this paper the top five cyber security threats for 2012 will be assessed and talked about to help control, mitigate,...

Words: 931 - Pages: 4

Free Essay

11.2.2.6 Lab Cnaa

...Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat. Present information to the class. Background / Scenario To defend a network against attacks, an administrator must identify external threats that pose a danger to the network. Security websites can be used to identify emerging threats and provide mitigation options for defending a network. One of the most popular and trusted sites for defending against computer and network security threats is SysAdmin, Audit, Network, Security (SANS). The SANS site provides multiple resources, including a list of the top 20 Critical Security Controls for Effective Cyber Defense and the weekly @Risk: The Consensus Security Alert newsletter. This newsletter details new network attacks and vulnerabilities. In this lab, you will navigate to and explore the SANS site, use the SANS site to identify recent network security threats, research other websites that identify threats, and research and present the details about a specific network attack. Required Resources Device with Internet access Presentation computer with PowerPoint or other presentation software...

Words: 593 - Pages: 3

Premium Essay

Cloud Computing Security

...Cloud Computing Security Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption. interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II. TOP BENEFITS OF CLOUD COMPUTING  Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection....

Words: 4691 - Pages: 19

Premium Essay

Homeland Security Research Paper

...Homeland security is often something taken for granted by United States citizens and policy makers. Many felt that the United States was inherently immune to acts of terrorism until the tragic events that occurred on 9/11. Though time has elapsed since then, the impact of terrorism on the nation must not be forgotten. The importance of Homeland Security must continually be emphasized in order to make it a top priority for governing officials and citizens of the United States for the safety of its citizens and the ability to thrive as a nation. Now, more than ever, United States policy makers play a drastic role in Homeland Security. The threat of various WMD proliferation is growing exponentially with the numerous technological advancement...

Words: 1850 - Pages: 8

Premium Essay

Team E Final Unix-Linux Paper

...Enterprise Security Plan University Of Phoenix CMGT 430 Carol Eichling March 26, 2014 Enterprise Security Plan Huffman trucking company is a national transportation company. The company’s 1,400 employee’s work in its logical hubs located in Los Angeles, California, St. Louis, Missouri, and Bayonne, New Jersey; its central maintenance facility is in Cleveland, Ohio; and as drivers of its 800 road tractors. (University of Phoenix, 2005) Team A has been consulted to create an enterprise security plan that will identify the information security challenges within Huffman trucking company network and establish mitigation plans to offset those challenges. The enterprise security plan will address some of the top vulnerabilities and risks that Huffman trucking company has the potential of experiencing. The plan will also include a list of physical and logical vulnerabilities within the company, and a specific list of remediation or mitigation steps for those vulnerabilities or threat pairs. “Enterprise security planning (ESP) is the aligning of information security policies and practices and applicable security technologies with the business rules and the evolving information models and technical architectures being used by a government or business”. (Erutal, L., Braithwaite, T., Bellman, B., 2012 pg. 144) As we started our examination of Huffman trucking vulnerabilities and risk, we took a strategic look at their assets and the possible vulnerabilities that could have an...

Words: 1665 - Pages: 7

Premium Essay

Supervisor

...Cyber Security Student: Maurice Jones Class ISSC461: IT Security: Countermeasures Instructor: Professor Christopher Weppler Date: 2 August 2013 Introduction “In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home (President Barack Obama, 2012).” Technology has changed the total lifestyle of people around the world. Here in the United Stated, society’s daily lives revolve around social interaction, economic stability, job security and information dominance. Information Dominance is “the degree of information superiority that allows the possessor to use information systems and capabilities to achieve an operational advantage in a conflict or to control the situation in operations other than war while denying those capabilities to the adversary (US Cyber Command, 2012).” Corporations as well as many of the world’s governments have risen and fallen due to their degree of Information Dominance and Information Security. Cyber-attacks have increased exponentially within the last 10 years. Battlefield lines that were once drawn in the sand no longer exist. Cyber-attacks can occur from any location in the world and at any time. A Cyber-terrorist has the ability to use current communication infrastructure to launch an attack that could cripple a nation. In 2012, Defense Secretary, Leon Panetta spoke at the Business Executives for National Security (BENS) summit....

Words: 3217 - Pages: 13

Premium Essay

Nt1330 Unit 3 Assignment

...1) Describe a threat and a threat agent. What are the differences between the two? Provide an example of a threat and a threat agent and how they interact (the example can be fictitious). • Threat – is a nonstop danger to an asset and this could be planned or accidental threat. For example, fire is a threat and it could happen accidentally or it could be planned. • Threat agent – (attacker) is the enabler of an attack. For example lighting strike or a person that set something on fire would be the threat agent. 2) Describe the CIA Triangle (also known as the CIA Triad), and give an example of each of its three aspects. How does it tie into Information Security? • CIA Triad – According to Michael E. Whitman and Herbert J. Mattord, “The...

Words: 927 - Pages: 4

Free Essay

Auditing It Infrastructures for Compliance

...reports for which I have completed over the last 5 weeks and combine them into one final report. These reports will consist of: - The two auditing frameworks or hardening guidelines / security checklists used by the DoD. - How a security assessment addressing modern day risks, threats, and vulnerabilities throughout the 7-domains of a typical IT infrastructure can help an organization achieve compliance. - How to gather and obtain needed information to perform a GLBA Financial Privacy & Safeguards Rules compliance audit and what must be covered. - The top workstation domain risks, threats, and vulnerabilities which will not only include possible causes, but mitigations as to prevent these issues from happening. - The top LAN – to – WAN risks, threats, and vulnerabilities which will not only include possible causes, but mitigations as to how we can prevent these issues from happening. - The top Remote Access Domain risks, threats, and vulnerabilities as well as ways to mitigate these types of issues. - The top Systems / Application Domain risks, threats, and vulnerabilities as well as ways to mitigate these types of issues. Part 1: Purpose: The purpose of part 1 for this lab is to develop an executive summary in regards to either the two auditing frameworks or hardening guidelines/security checklists used by the DoD. For this, I have chosen to discuss the two auditing frameworks. Background: A little background about the AF (Auditing Framework) for the DoD is that...

Words: 2140 - Pages: 9

Premium Essay

Security Threats

...Project Part 1: Current Security Threats The top three security threats that Aim Higher College faces are the following: * Mobile devices connecting to the network * Social Media * Compromised routers intercepting sensitive information These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential to transmit malware...

Words: 589 - Pages: 3

Premium Essay

Treat

...variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or professional computer, it is very important to get some type of security protection. There are a lot of choices out there in terms of what brand and what level of security an individual is looking for. The best option to defend a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to care about is identity theft. Identity theft can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or aggravations to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data limited protected within the computer is vital. The all-in-one computer security systems are current in a way that it protects one’s computer from all the threats previously stated, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and...

Words: 435 - Pages: 2

Free Essay

China Threat Theory

...China Threat Theory Rising China: a security threat to the West? Abstract The rising China into the world stage has paved the way to the China threat theory. The China threat theory claims that China will soon disrupt the status quo in the world that has been dictated for decades by the Western nations like United States, United Kingdom and France. Especially the United States will not easily give up or relinquish their position as hegemon. The perceived threat of a rising China; especially when there are several publications of books, articles and anti-China bashing blogs that helps to exacerbate these fears. China’s increase in soft power and hard power does not mean it is a threat to the global security; China’s development and their economic growth relies on peaceful relations with the West because China needs access to their domestic markets. The main reason why China is considered to be a threat to the West is because they cannot maintain their domination on the world stage, and has to make room for developing nations like the BRICS countries (Brazil, Russia, India, China and South Africa). Yet China simply wants to develop and increase the living standards of its people, and no desire of aggressive military actions. Thus, the foundation of why China is still been seen as a threat will be explored but the conception will be dismissed because as a growing superpower these steps are logical and any country that is in the same situation as China now will simply...

Words: 1324 - Pages: 6

Premium Essay

Planning for Security

...John Moura Chapter 2: Planning for Security Review Questions 1. Describe the essential parts of planning. How does the existence of resource constraints affect the need for planning? Answer: Organizational planning, described below, and Contingency planning, which focuses on planning or unforeseen events. Organizations must be able to forecast their needs relative to available resources as best they can to insure best decision making. 2. What are the three common layers of planning? How do they differ? Answer: Strategic – lays out long term goals, Tactical – more short term focus, Operational – daily and on-going operation goals 3. Who are the stakeholders? Why is it important to consider their views when planning? Answer: Stakeholders are individuals, groups of individuals, or organization that have a ‘stake’ or are affected by organizational decisions. When planning, an organization must take into consideration all stakeholders in order to evaluate planning decisions properly and resourcefully. 4. What is a mission statement? Why is it important? What does it contain? Answer: Mission statement – explicitly explains what the organizations business is and its intended areas of operations. 5. What is a vision statement? Why is it important? What does it contain? Answer: Vision statement – expresses what the organization wants to be 6. What is a values statement? Why...

Words: 945 - Pages: 4

Premium Essay

Cmgt 410 Week 2 Individual

...Protecting information and all assets is critical in today’s time. The military faces three major types of threats: Employees, Zero-Day Exploits, and Cyber Espionage. It is imperative, due to the information and assets on-hand, that the military mitigates these risks. The first major threat, employees, is a very common threat to all organizations. Employees can be broken down into three types of threats which include, employees that are careless and untrained, employees that are tricked or fall prey to social engineering, and employees with malicious intentions. This will always be a potential threat because every organization requires employees to run and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand...

Words: 1178 - Pages: 5

Free Essay

Owasp

...O Foreword About OWASP About OWASP The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. At OWASP you’ll find free and open … • Application security tools and standards • Complete books on application security testing, secure code development, and security code review • Standard security controls and libraries • Local chapters worldwide • Cutting edge research • Extensive conferences worldwide • Mailing lists • And more … all at www.owasp.org All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem, because the most effective approaches to application security require improvements in all of these areas. OWASP is a new kind of organization. Our freedom from commercial pressures allows us to provide unbiased, practical, cost-effective information about application security. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. Similar to many open-source software projects, OWASP produces many types of materials in a collaborative, open way. The OWASP Foundation is the non-profit entity that ensures the project’s long-term success. Almost everyone associated with OWASP is a volunteer, including the OWASP Board, Global Committees...

Words: 5349 - Pages: 22