Advertisment

Cyber Terror

author-image
PCQ Bureau
New Update
Newsflash: The president gets five
threatening emails

Newsflash: Credit card numbers and other personal information
peddling for less than a dollar a record

Newsflash: Information stealing Trojan poses as Microsoft Windows
patch

Newsflash: Russia filters Internet traffic from Georgia

Newsflash: Google Earth being misused by militants in Gaza strip to
launch attacks on Israel

Newsflash: HSBC loses disk containing details of around 400,000
customers
Advertisment

News like above is enough to send shivers down anyone's spine, be it an
enterprise, individual, or the govt. But alas, it's all true. Increasingly, the
news headlines everywhere are getting filled with security incidents that are
more focused and malicious. It's no longer about a script-kiddie breaking into
an organization's server just for kicks or to hack a website just to leave a
funny message there. Security incidents the world over are being committed with
a very clear and malicious objective, which could be financial gain, plan for a
terrorist attack, or propaganda. In other words, security threats have really
changed and taken a much more gruesome shape than you could ever imagine. It
will only get worse in the future, so you have to be ready for it.

Today, terror is everywhere, and there's a dire need to combat it at all levels.
This special story from PCQuest will focus on various aspects of security,
strategies to adopt, and tools to combat it. We'll focus on different kinds of
security threats for different types of audience, along with the strategies and
tools to combat them. We'll look at cyber-terrorism, what it means for different
people, and how to combat it.

Just how vulnerable you are

Security incidents are different for different parts of the society, so measures
taken to safeguard against them also have to be different. For enterprises,
security could mean protecting critical information from getting stolen or
preventing a virus from causing significant downtime. For an individual,
security could mean preventing loss of personal information like credit card or
bank account details. For the govt, security could mean ensuring that national
secrets are well-guarded, senior leaders are protected, and citizens are safe.
But before you can do that, you have to first understand the nature of security
threats that you're most vulnerable to.

Advertisment

Enterprise security trends

If you feel your IT infrastructure is safe from any kind of security breaches,
well think again. That's because there's no such thing as a boundary for your
organization's network anymore, thanks to the growing number of mobile users and
Internet based applications. Your users will need access to your network from
everywhere, be it a hotel, cyber café, airport, or railway station. They will
access it from all sorts of networks, putting far more stress on your network
than ever before.

There are many more entries to watch in the organization, many more end
points to secure, and a lot more sensitivity towards protecting information
theft.

The other key trend is that security threats are no longer being carried out
by college pass-outs wanting to bring down a website or portal just for kicks.
Security attacks have now become more serious, and they're being conducted by
people with a criminal bent of mind for information theft, financial gain, or
other malicious reasons.

Advertisment

There is of course, more malware than ever before. In fact, the amount of
malware created last year was more than the combination of all malware ever
created till date. This clearly indicates that with increasing penetration of
the Internet, both the good as well as bad guys have better connectivity and
reach.

Last key trend in enterprise security is that today the focus of security
threats is not just on the infrastructure. It's also on stealing information. So
organizations must go beyond setting up firewalls, anti-virus, and anti-spam
software.

Advertisment

Consumer security trends

If you think you're safe from prying eyes on the Internet, think again. Today,
there are more bank accounts, credit cards and personal information available
for purchase on the Internet than ever before, and you'll be shocked at the
prices they sell them for (see table on previous page). Each record could be
available for less than a dollar if purchased in bulk. Premium accounts, with
higher bank balance or credit limit sell at higher prices.

Email tracing of
Ahmedabad blasts
How Cyberoam and their technical support
team helped to trace and identify the IP Address of Waghodia Dental
Institute , Vadodara after the Ahmedabad bomb blast.

1. An email is sent
to IndiaTV news channel giving some information on the blasts. From the
email, police was able to track the sender's IP address which is traced to
some web hosting company. The web hosting company finally traced the IP
Address to Waghodia Dental Institute in Vadodara.

2. A Cyberoam device is installed at the institute. The support
department of the institute is told to determine the exact computer from
where the mail was sent.

3. The device is able to tell which websites were surfed at the time when
the mail was sent.

4. From the websites, IP addresses of the same range were matched.

5. Finally the website is identified: abdultaiyeb.com. This was a web
based proxy service that the terrorists used.

6. With the help of these reports, the IP Address of the computer from
where this site was viewed is identified. Interestingly, the computer had a
static IP address, and belonged to one of the institute's internal labs. 3.
The police seized the computer for further investigation.

Credit card details can be stolen during online or offline transactions.
Online, you might land up on a fake site, which cons you into shelving out the
details. Or there could be an information stealing Trojan sitting on your
machine. Offline, your credit card could get cloned at a restaurant or any other
place. For instance, there are tiny credit card reading machines available,
which a person could simply swipe your card on before swiping it on the actual
terminal. And you thought that giving your credit card to the waiter in your
favorite restaurant was safe!

Advertisment

Web 2.0 has been a boon for everyone, but it could become a bane if you're
not careful. Just as you have access to so much information on the web, and so
many social networking sites to interact on, so do the bad guys. So we all
obviously know what that means! They can coordinate better and react more
quickly to vulnerabilities.So while you're busy watching that YouTube video, a
Trojan might be quietly be installing itself in your system, and bringing along
its other friends like keyloggers, bots, etc. Rest as they say, is history.

We all know the story of phishing emails pointing you to a fake website to
extract your personal information. But now, things are taking a different turn.
To take an example, suppose you receive an email pointing you to an
'interesting' website from where you could download some 'hot' pictures of a
known celeb. But along with the picture, you end up downloading certain file
infectors. These can then use your precious bandwidth to launch a deadly Denial
of Service attack on other websites. So guess who'll get caught for doing this
attack? You of course!

Incidentally, what that means is that it's not just bank sites that are bieng
faked. Any site that's not been hardened against vulnerabilities could get
infected, causing you to download Trojans.

Advertisment

Anil Chopra, Anindya Roy, Swapnil Arora, Isha Gakhar

Advertisment

Stay connected with us through our social media channels for the latest updates and news!

Follow us: