{"id":353,"date":"2021-12-29T10:37:40","date_gmt":"2021-12-29T10:37:40","guid":{"rendered":"https:\/\/pkchopra.com\/blog\/?p=353"},"modified":"2024-03-12T10:15:41","modified_gmt":"2024-03-12T10:15:41","slug":"information-security-malware","status":"publish","type":"post","link":"https:\/\/pkchopra.com\/blog\/index.php\/information-security-malware\/","title":{"rendered":"Information Security &#038; Malware"},"content":{"rendered":"<p><strong>Computer security<\/strong>,\u00a0<strong>information technology security<\/strong>\u00a0(<strong>IT security<\/strong>) or\u00a0<strong>cyber security<\/strong>\u00a0is the protection of computer systems and networks from information disclosure, theft or damage to the hardware<a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_hardware\">,<\/a>\u00a0software, or electronic data, as well as from the disruption or misdirection of the services they provide.<\/p>\n<p><strong>\u201cCyber security\u201d<\/strong>\u00a0focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible.<\/p>\n<p><strong>\u201cInformation technology security\u201d<\/strong>\u00a0is a broader category which looks at protecting all information assets, whether in hard copy or digital form.<\/p>\n<p>A big impact on information security in organizations can be\u00a0<strong>Employee behaviour<\/strong>. During a research it was observed that employees often do not see themselves as part of their organization\u2019s information security effort and take actions which impede organizational changes.<\/p>\n<p>To\u00a0<strong>manage information security culture<\/strong>\u00a0effectively some steps are suggested:<\/p>\n<p><strong>Step 1: Pre-Evaluation<\/strong><br \/>\nUnderstand the level of awareness of information security amongst employees and analyse existing security policies.<\/p>\n<p><strong>Step 2: Strategic planning<br \/>\n<\/strong>A team of skilled professionals should be used to set clear targets and to come up with a better awareness program.<\/p>\n<p><strong>Step 3: Operative planning<br \/>\n<\/strong>Using internal communication, security awareness and a training program a good security culture can be established.<\/p>\n<p><strong>Step 4: Implementation<br \/>\n<\/strong>The information security culture is implemented in four stages:<br \/>\nI. Commitment by the management<br \/>\nII. Communication with organizational members<br \/>\nIII. Training for all organizational members<br \/>\nIv. Commitment of the employees<\/p>\n<p><strong>Step 5: Post-evaluation<br \/>\n<\/strong>Assess success of planning &amp; implementation and identify unresolved areas of concern.<\/p>\n<p><strong>Cost of Security Breaches<br \/>\n<\/strong>Serious financial damage has been caused by security breaches, but as there is no standard model for estimating the cost of an incident, the only data available is what is made public by the companies involved. Several IT security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general. The 2003 loss estimates range from $13 billion (worms and viruses only) to $226 billion (for all forms of covert attacks).<\/p>\n<p>Reasonable estimates of the financial cost of security breaches can actually help organizations make rational investment decisions. It is concluded that the amount a firm spends to protect information would be a small fraction of the expected loss (expected value of the loss resulting from a cyber\/information security breach)<\/p>\n<p><strong>Lack of Global Laws &amp; Regulations<br \/>\n<\/strong>International legal issues of cyber-attacks are complicated in nature because there are no global common rules to judge and punish cybercrimes and cybercriminals. At times when security firms\/ agencies are able to locate the cybercriminal behind a cyber-attack or a particular piece of malware<a href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\">,<\/a>\u00a0often the local authorities cannot take action due to lack of laws under which to prosecute.<\/p>\n<p>In addition, there is another major problem for law enforcement agencies is to prove attribution. Computer viruses switch from one country to another, from one jurisdiction to another \u2013 moving around the world, using the fact that we don\u2019t have capabilities for globally police operations in the similar manner.<\/p>\n<p><strong>Role of Governments<br \/>\n<\/strong>Currently government\u2019s role is to make regulations so that companies and organizations protect their systems, infrastructure and information from cyber-attacks. The government\u2019s regulatory role in cyberspace is not clear. There is an opinion that cyberspace is a virtual space which should remain free of government intervention and that can be seen in many of today\u2019s libertarian block chain and bitcoin discussions.<\/p>\n<p>However, many government officials and experts think that the government should do more as there is a crucial need for improved regulations. The emergency is due to the failure of the private sector to efficiently address cyber security problems.<\/p>\n<p>On 22 May 2020, the UN Security Council held its second ever informal meeting on cyber security to focus on cyber challenges to international peace. According to the then UN Secretary-General new technologies are often used to violate rights.<\/p>\n<p><strong>Cyber security<\/strong>\u00a0is a fast-growing field. According to a research 46% of organizations say that they have a \u201cproblematic shortage\u201d of cyber security skills in 2016, up from 28% in 2015.Commercial, government and non-governmental organizations all employ cyber security professionals. The fastest increases in demand for cyber security workers are in industries managing increasing volumes of consumer data such as finance, health care, and retail.<\/p>\n<p>Computer security can be achieved using\u00a0<strong>threat prevention, detection, and response processes<\/strong>. These processes are based on policies related to different system components. For ex:<\/p>\n<ul>\n<li>User account access controls can protect systems files and data, respectively.<\/li>\n<li>Firewalls are the most common prevention systems from a network security perspective.<\/li>\n<li>They can prevent access to internal network services and block certain kinds of attacks. Firewalls can be both hardware- or software-based.<\/li>\n<li>Intrusion Detection System (IDS) products are designed to detect network attacks in progress and assist in post-attack forensics.<\/li>\n<li>\u201cResponse\u201d is defined by the assessed security requirements of an individual system and may cover from simple upgrade of protections to notifying legal authorities, counterattacks etc.<\/li>\n<\/ul>\n<p>At present computer security consists of mainly\u00a0<strong>\u201cpreventive measures\u201d<\/strong>\u00a0such as firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine to provide real-time filtering and blocking. Another implementation is called \u201cphysical firewall\u201d which consists of a separate machine filtering network traffic.<\/p>\n<p>Some organizations are turning to big data platforms to extend data accessibility and machine learning to detect advance persistent threats.<\/p>\n<p>However, relatively few organizations maintain computer systems with effective detection systems, and fewer still have organized response mechanisms in place. As a result, Companies for the first time are reporting that they are losing more through electronic theft of data than physical stealing of assets. The primary obstacle to effective eradication of cybercrime can be traced to\u00a0<strong>excessive reliance<\/strong>\u00a0on\u00a0<strong>firewalls and other automated \u201cdetection\u201d systems<\/strong>.<\/p>\n<p><strong>Importance of Cyber Security\u00a0<\/strong><\/p>\n<p><strong>1. The costs of cyber security breaches are rising<br \/>\n<\/strong>Privacy laws mean significant fines for organisations which suffer cyber security breaches. There are also non-financial costs such as damage of reputation.<\/p>\n<p><strong>2. Cyber security is a critical issue for stakeholders<br \/>\n<\/strong>New regulations and reporting requirements have made cyber security risk oversight a challenge. The stake holders continuously seek assurances from management that its cyber risk strategies are capable of reducing the risk of attacks and limit financial &amp; operational effects.<\/p>\n<p><strong>3. Cybercrime is a big business<br \/>\n<\/strong>The cybercrime economy was estimated to be worth $1.5 trillion in 2018, according to one study. Political, ethical and social incentives also drive attackers.<\/p>\n<p><strong>4. Cyber-attacks are increasingly sophisticated<br \/>\n<\/strong>Cyber-attacks continue to grow in sophistication and attackers use an ever-expanding variety of tactics. These include social engineering<a href=\"https:\/\/www.itgovernance.co.uk\/social-engineering\">,<\/a>\u00a0malware and ransomware<a href=\"https:\/\/www.itgovernance.co.uk\/ransomware\">.<\/a><\/p>\n<p>Social engineering is the use of deception to manipulate individuals to breach security.<\/p>\n<p>A key logger is spyware which silently captures and stores each keystroke that a user types on the computer\u2019s keyboard.<\/p>\n<p><strong>Ransomware<br \/>\n<\/strong>Ransomware is a type of malicious software (malware) which threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the victim doesn\u2019t pay in time, the data is gone forever.<\/p>\n<p>Ransomware attacks are common these days. Major companies in North America and Europe have fallen victim to it. Cybercriminals attack any consumer or any business and victims come from all industries.<\/p>\n<p>Once the ransomware has been released into the device there is not much one can do unless there is a backup or security software in place. Sometimes it\u2019s possible to help infected users to regain access to their encrypted files or locked systems, without having to pay. A \u201cNo More Ransom\u201d Project has created a repository of keys and applications that can decrypt data locked by different types of ransomware.<\/p>\n<p><strong>History<br \/>\n<\/strong>Ransomware can be traced back to 1989 when the \u201cAIDS virus\u201d was used to extort funds from recipients of the ransomware. Payments for that attack were made by mail to Panama, at which point a decryption key was also mailed back to the user.<\/p>\n<p>In 1996, ransomware was known as \u201ccrypto viral extortion,\u201d introduced by Moti Yung and Adam Young from Columbia University. This idea, born in academia, illustrated the progression, strength, and creation of modern cryptographic tools. Young and Yung presented the first crypto virology attack at the 1996 Security and Privacy conference. Their virus contained the attacker\u2019s public key and encrypted the victim\u2019s files. The malware then prompted the victim to send asymmetric cipher text to the attacker to decipher and return the decryption key for a fee.<\/p>\n<p>Ransomware attacks began to soar in popularity with the growth of crypto currencies, such as Bitcoin. Crypto currency is a digital currency that uses encryption techniques to verify and secure transactions and control the creation of new units. Beyond Bitcoin, there are other popular crypto currencies that attacker\u2019s prompt victims to use, such as Ethereum, Litecoin and Ripple.<\/p>\n<p>Social engineering attackers have also become more innovative over time. A situation was reported where new ransomware victims were asked to have two other users install the link and pay a ransom in order to have their files decrypted.<\/p>\n<p><strong>How Ransomware Works<br \/>\n<\/strong>Ransomware is a type of malware designed to extort money from it victims, who are blocked or prevented from accessing data on their systems. The two most prevalent types of ransomware are encryptors and screen lockers. Encryptors, as the name implies, encrypt data on a system, making the content useless without the decryption key. Screen lockers, on the other hand, simply block access to the system with a \u201clock\u201d screen, asserting that the system is encrypted.<\/p>\n<p>Victims are often notified on a lock screen (common to both encryptors and screen lockers) to purchase a cryptocurrency, like Bitcoin, to pay the ransom fee. Once the ransom is paid, customers receive the decryption key and may attempt to decrypt files. Decryption is not guaranteed, as multiple sources report varying degrees of success with decryption after paying ransoms. Sometimes victims never receive the keys. Some attacks install malware on the computer system even after the ransom is paid and the data is released.<\/p>\n<p>While originally focused largely on personal computers, encrypting ransomware is increasingly targeting business users.<\/p>\n<p>Enterprise ransomware infections or viruses usually start with a malicious email. An unsuspecting user opens an attachment or clicks on a URL that is malicious or has been compromised.<\/p>\n<p>At that point, a ransomware agent is installed and begins encrypting key files on the victim\u2019s PC and any attached file shares. After encrypting the data, the ransomware displays a message on the infected device. The message explains what has occurred and how to pay the attackers. If the victims pay, the ransomware promises they\u2019ll get a code to unlock their data.<\/p>\n<p>Ransomware is an online form of the bully\u2019s game of keep-away. Here, the bully gets on your computer and takes your personal files: documents, photos, financial information, all the things you care about. Those files are still on your computer, dangling in front of you, but they are encrypted now, useless to you. In order to get them unencrypted, you\u2019ll need to pay the bully 300500 dollars.<\/p>\n<p><strong>Prevention<br \/>\n<\/strong>Some of the ways to prevent ransomware attacks are:\u00a0<strong>\u00a0<\/strong><\/p>\n<ul>\n<li><strong>Keep operating system and other software updated:<\/strong>\u00a0Software updates frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers. So always keep security software up to date.<\/li>\n<li><strong>Email is one of the main infection methods:<\/strong>\u00a0Be wary of unexpected emails, especially if they contain links and\/or attachments.<\/li>\n<li><strong>Be especially wary of any Microsoft Office email attachment that advises you to enable macros to view its content:\u00a0<\/strong>Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.<\/li>\n<li><strong>Backing up important data is the single most effective way of combating ransomware infection:<\/strong>\u00a0Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However, organizations should ensure that backups are appropriately protected or stored offline so that attackers can\u2019t delete them.<\/li>\n<li><strong>Using cloud services could help mitigate ransomware infection:<\/strong>\u00a0since many cloud services providers retain previous versions of files, allowing one to \u201croll back\u201d to the unencrypted form.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Computer security,\u00a0information technology security\u00a0(IT security) or\u00a0cyber security\u00a0is the protection of computer systems and networks from information disclosure, theft or damage to the hardware,\u00a0software, or electronic data, as well as from the disruption or misdirection of the services they provide. \u201cCyber security\u201d\u00a0focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":""},"categories":[12],"tags":[235,233,238,229,236,232,234,230,237,231],"_links":{"self":[{"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/353"}],"collection":[{"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=353"}],"version-history":[{"count":1,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/353\/revisions"}],"predecessor-version":[{"id":355,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/353\/revisions\/355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/354"}],"wp:attachment":[{"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pkchopra.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}