Unit 5
Unit 5
Welcome to:
Unit 3: Countermeasures
• All the equipment in the network, computing systems and the different servers and the data
that they possess are subjected to the threats.
• Information differentiates companies and provides leverage that helps one company become
more successful than another.
• This is typically done in order to control access to the information in different ways,
depending on its importance, its sensitivity and its vulnerability to theft or misuse.
• Originally, the academic security model was “wide open” and the government security model
was “closed and locked”.
• In the early days of networking, individual computers were connected together only in
academic and government environments.
• If we these two models are compared, it can be noted that these two models are
diametrically opposite.
• The government model blocks everything, while the academic model allows everything.
• In the field of computer security, the practices established by the academic and government
institutions persisted until the early 1990s.
• Those practices that have endured continue to have their place in a comprehensive security
strategy.
• When businesses started to widely embrace the Internet as a sales channel and business
tool in the early-to-mid 1990s, a new security model was required.
• Overview
– Countermeasures discuss the subject of securing data storage, how security can be applied to the
specific locations where data resides.
• Definition
– A countermeasure is a process, system, device or action that can mitigate or prevent the effects of
various threats that an information asset like a computer, network or server faces.
• Explanation
– It is important to categorize the information before applying countermeasures to it. Information is
typically categorized as being in either a structured format or an unstructured format.
• Anti-virus: The propagation of malicious code can be dealt with by using an antivirus
software.
• Firewall: A dedicated network appliance or a software program which serves the purpose of
separating an area which is secure from an area which is less secure. Following are the
types of firewall:
– Software Firewalls
– Hardware Firewalls
• Network Monitors: The introduction of network monitors was due to the need of
troubleshooting network problems.
• Honeypot: A computing system which has been turned into a target by an attacker for other
attacks. The main purpose of a honeypot is to make a computing system a target which can
be identified and can be targeted accordingly in order to carry out the computing attacks.
• Demilitarized Zone (DMZ): Local area networks (LAN) can be secured by using a firewall
configuration viz. DMZ. DMZ also allows one or more computers to run outside the firewall.
• Security Logs/Access Logs: The Security Logs can be accessed in the Event Viewer
underneath the Windows Logo. The Maximum Log Size entry, for the log, is recommended to
be as large as per the affordability of the organization and select Do Not Overwrite Events.
• Audit Logs: There should be regular examination of the log files that are created by network
services which are crucial in nature. Following are the filters to be deployed:
– Reporting
– Alarms
– Alerts
– Trends
• Defense against key management attacks: Cryptography offers algorithms which are well
accepted and widely used for confidentiality, authentication and integrity.
• The relying basic feature for a cryptographic systems is the efficient, secure and robust key
management system.
• The input information in a cryptographic algorithms is called the key. If the identity of key is
compromised, the information is lost. Local hosts use Key Encryption Key (KEK) method for
building a line of defense.
• The Diffie-Hellman (DH) scheme allows a session key to be generated at both ends when
some public information is being exchanged between two communication parties.
• Preventing Backup Data Exposure: Encryption of data backups is also necessary and it is
been suggested by vendors. Cryptographic key management and performance point out as
drawbacks and a poor substitute to other aforementioned privilege controls.
• Strong Authentication
• Directory Integration
• Authentication Protections
• High Performance
• Separation of Duties
• Cross-Platform Auditing
• The privileges associated with the databases should only be limited to the SQL’s level at a
minimum amount:
– Access Control
– Flow Control
– Encryption
– RAID
– Authentication
– IP Address Locator
• Cross site script forgery Countermeasures: Countermeasures for stopping cross-site forgery
are given below:
– Check and validate all files
– Need of security policy
– Need of security review
– Implementation and use of different tools
– Filtration of the output script
– Comparison of the generated code
• Security policy
• Auditing process
• Physical Barrier: An organization should make sure to have at least three physical barriers for
an effective access control mechanism:
– Perimeter
– A locked door
– Computer room entrance
• Mantrap are high-security installations that use intermediate access control mechanism.
– It only allows only a limited number (one or two) of people to enter into the facility.
– It also serves to physically hold in an unauthorized person.
• The idea is to secure the outer periphery of the building so that no potential hostile person
can gain access to the resources present inside.
• Laptops are provided with a built-in security slot where a cable lock can be added.
• Areas that require restricted access can be broken down into smaller area.
• An alarm system can be installed that can communicate with security personnel.
• These systems, when integrated with security-oriented computer systems can be used to
record the attempts.
• There is a wide band of power characteristics required for the power systems to operate and
ensure smooth functioning.
• Shielding can be done against electronic emissions from disrupting operations of a computer
system.
• With a hot aisle, hot air outlets are used to cool the equipment, while with cold aisles; cold air
intake is used to cool it.
• Combining the two, there will be cold air intake from below the aisle and hot air outtake
above it, providing constant circulation.
• It is important that the hot air exhausting from one aisle of racks not be the intake air pulled in
by the next row of racks, or overheating will occur.
• Other fixed systems: The building systems contain the fixed systems in them.
• Physical Countermeasures
• Electrical Countermeasures
• Operational Countermeasures
• One should not disclose any personal information when such phone call is received.
– There are chances that caller ID may not tell the true identity of the caller.
– The risk of a telephone based social engineer attack is high.
• Attacks can be countered by deleting the mail before it downloads any malware in the
system.
• They just have to get the user to click on a certain page that may trigger downloading of a
script or other credentials.
• A little awareness goes a long way as the user can know the situation need handling.
• One wouldn’t leave a credit card application with their name on it on top of the trash pile out
in the dumpster or on the side of the street.
• Emails, phones, business cards can be used as media for advertising to fix the issues on
behalf of the organization.
• The attacker, after the advertising stage, would finally cause the problem they claim to fix.
• To counter this kind of attempt, the identity of people who aren’t allowed inside the
organization should be verified.
• Also, people who expect visitors to come should let everyone know via email.
• Also, if there is more than one exit door (e.g. exit to a parking lot or smoking area), it should
be made sure that these doors should not be used for unauthorized entry.
• The time taken by the database to give response get delayed when server resources are
overloaded by database DOS.
• Query rates, rates incurred for connection and various other rates for each user of the
database are limited by the server resource with the help of Connection Controls.
• The MAC address appears on a port and without authentication, the mapping cannot be
altered.
• Protection against tampering of newly forged APR packets can be achieved by sending ARP
request packets.
• The queue between the SYN ACK connections will increase if the time out waiting of the host
is decreased.
• All flooding attacks a can be dealt with by using an integrated force of Host-based Intrusion
Detection System (HIDS) and Network-based Intrusion Detection System (NIDS).
• Critical servers and network segment(s) are places under HIDS and NIDS, respectively.
• For example: When spoofed packets which have source addresses of fake stature are not
allowed to leave the network, then it is made sure that whatever comes out from the network
only has source addresses belonging to the network by using an Egress filter (outbound) in
the router or the network firewall.
• An Ingress (inbound) confirms that the source addresses of the packets coming to the
network are not present inside network.
• Security protocols divide the network into authentication server, authenticator and supplicant
such that when looked into a wireless network.
• Bluetooth PIN
– It can also be used to generate keys between two devices.
• Device Authentication
– Incorporating application-level software that requires password authentication to secure the device
will add an extra layer of security.
• Biometrics
• Other Measures
• It is extremely important for mobile phone users across the globe to be prepared with some
effective countermeasures.
• One of the most effective countermeasures against bluejacking is to simply disable Bluetooth
on a mobile phone by going into options.
True or False:
1. Attacks can be countered by deleting the mail before it downloads any malware in the
system.
2. A locked door protecting the computer centre and to keys, ID batches, smart cards, etc. to
be used to access the computer centre.
3. Laptops are provided with a built-in security slot where a cable lock can be added.
True or False:
1. Attacks can be countered by deleting the mail before it downloads any malware in the
system. True
2. A locked door protecting the computer centre and to keys, ID batches, smart cards, etc. to
be used to access the computer centre. True
3. Laptops are provided with a built-in security slot where a cable lock can be added. True