Tuesday, 13 September 2022
What is Vulnerability Analysis, and How Does It Work?
Tuesday, 28 September 2021
Potential Security Threats To Your Computer Systems
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.
More Info: 312-50: Certified Ethical Hacker (CEH)
In this article, we will introduce you to the common computer system threats and how you can protect systems against them.
What is a Security Threat?
Security Threat is defined as a risk that which can potentially harm computer systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.
What are Physical Threats?
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The following list classifies the physical threats into three (3) main categories;
◉ Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
◉ External: These threats include Lightning, floods, earthquakes, etc.
◉ Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
◉ Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
◉ External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
◉ Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.
What are Non-physical Threats?
A non-physical threat is a potential cause of an incident that may result in;
◉ Loss or corruption of system data
◉ Disrupt business operations that rely on computer systems
◉ Loss of sensitive information
◉ Illegal monitoring of activities on computer systems
◉ Cyber Security Breaches
◉ Others
The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats;
◉ Virus
◉ Trojans
◉ Worms
◉ Spyware
◉ Key loggers
◉ Adware
◉ Denial of Service Attacks
◉ Distributed Denial of Service Attacks
◉ Unauthorized access to computer systems resources such as data
◉ Phishing
◉ Other Computer Security Risks
To protect computer systems from the above-mentioned threats, an organization must have logical security measures in place. The following list shows some of the possible measures that can be taken to protect cyber security threats
To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the user’s computer.
Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.
Intrusion-detection/prevention systems can be used to protect against denial of service attacks.There are other measures too that can be put in place to avoid denial of service attacks.
Source: guru99.com
Saturday, 30 May 2020
Cyber Threat Scores – What you need to know
Threat intelligence provides data to security professionals to help them with prompt decisions on cyber defense strategy.
The first step to creating a threat score is to analyze the effect of cyber threats over business risks to determine the most effective cyber threat intelligence management plan.
◉ What threats are impacting your specific business region?
◉ Are your supply chain partners secure?
◉ To what extent are the supply chain partners granted access to your networks?
◉ What type of malicious activity does your first-line security team observe on the network?
◉ Did your security team record malicious activity on the adjacent networks too?
From Threat Score to Risk Assessment
The cyberthreat intelligence process provides threat severity scores and these scores assess the impact of each threat. Even though these threat scores convey insufficient information about each threat’s probability, they can be compared with each other to begin to get a clear picture of the threat landscape. We need the probability and severity information of potential threats to assess the risks to the organization. The threat score helps you tune your security to challenge or block the attacks based on their severity.
Threat intelligence feeds report potential network threats, including those already within an organization’s firewalls, and their probability of causing harm. However, solely relying on threat feeds to assess threat possibilities is not enough because there is so much to know about threats that can’t be adequately summarized by threat feeds.
6 Factors influencing the risk of cyber threats
The various factors that influence the probability and risk of encountering various threats are as follows –
1. Cyber supply chain
It’s not enough to just security an organization’s network assets. According to Symantec, supply chain attacks were up by 78% in 2019, making third-parties with access to your organization’s networks a major area of concern. Any access given to partners, consultants, or other contractors should be scrutinized heavily and managed thoughtfully. Another way criminals can use your relationships with third parties against you is by taking advantage of their potentially weaker security systems and accessing any of your data they have on their networks that way. Organizations should required supply chain partners follow security practices as stricts as their own before sharing data or network access.
2. Industry
Threats can be industry-specific or impact each industry differently. For example, IoT threats in healthcare are more dangerous than in other industries, point-of-sale malware can cripple retail businesses in ways not seen in other sectors, and threats to the industrial control systems in the infrastructure sector could cause nation-wide outages and mass chaos.
3. Vulnerabilities
Some threats exploit vulnerabilities in segments of the application services, firmware, open ports, etc. of specialized devices. Information gathered from regular vulnerability scans enables the prioritization of threats in accordance with the organization’s network inventory. Of course, any actionable information regarding vulnerabilities requires attention.
4. Network connectivity
Threats can multiply rapidly in the local network framework either by activity patterns or design. Upon activation of these rapidly multiplying threats in autonomous blocks, the risk of the threat spreading across network assets increases significantly. Therefore, being aware of threats in and around the network is essential to protecting them. It is equally important to assess the risks accurately in the ever-evolving topology of the internet.
Understanding the organization’s network segmentation is important too. The location of malicious activity on the network defines the prioritization of response activity. Similarly, it’s important to verify whether the newly discovered malware instance has access to the server or to any crucial databases.
5. Interaction effects
Threats cannot be treated in isolation. They are largely influenced by other factors like network connectivity, vulnerabilities, and location on the network. Interaction can be the most difficult part of implementing an organization’s cyber risk assessment. At the same time, understanding how threats on different segments of the network can affect the network as a whole is an essential part of any security program.
6. Value
While performing cyber risk assessments, it is important to consider the different values of the assets you are protecting. The value an adversary places on a piece of information could be different from how the organization sees the asset. The internal value assessment, or how the organization sees the asset, influences the impact of a data attack and calls for cybersecurity action. The external value assessment, or how a criminal sees the asset, affects the probability of a targeted cyberattack.
Organizations need automated risk assessment capabilities that perform in tandem with threat severity scores. Information from threat intelligence enables cybersecurity professionals to understand and follow the dynamic threat landscape. However, the integration of contextual data is crucial for cybersecurity management to assess the probability associated with each threat as it pertains to their specific organization.
Sunday, 8 March 2020
5 Reasons Why Your Threat Intelligence Strategy Will Fail and How You Can Salvage It
In a study performed by PwC (Price Waterhouse Coopers), of 10,000 global CSOs and CIOs, only 51% monitor and analyze threat intelligence for detecting incidents and risks.
Why Threat Intelligence Can Fail
1. Misunderstanding business value
It is significant to understand what type of threat intelligence is required for your business. Threat intelligence data is identified based on business problems. An analyst collects the data if a particular threat feed serves as a problem-solving tool and not because the data is interesting, and the chart looks cool. If the intelligence is not connected to the business problems, the purpose of having a threat intelligence team will not be met.
How to fix it:
Always analyze the data from the threat intelligence perspective and its ability to protect your business. Understand if it can help in finding direct threats to your organization and can correlate internal data with external sources. The correlation should able to create more effective security policies and prioritize vulnerabilities to reduce business risks.
2. The wrong feed
There are many feeds available on threat intelligence and if the feed that you own is not relevant to your business, it is of no value. When your business is operating from a challenging environment, then your business requirements are different than those of other companies working from a safer place. For example, if your business is healthcare and you are based in an environmentally challenging environment, then your business is exposed to threats that are different to that of other healthcare operating from developed towns and cities.
Consider the source of data, whether it is raw or processed, drawn from public or private sources. Find out what your requirement is and ensure that you minimize redundancy. The same threat on different feeds doesn’t make it important.
Getting overwhelmed with the information is equally worse to having too little. Be focused on the information relevant to your business.
How to fix it:
Simply having feeds are not enough for having a successful threat intelligence program. There should be context present in the threats that allow you to do security decisions quickly without drowning data. Understand that every threat does not address risks directly but ensure that the threat of intelligence is relevant to your business.
3. Wrong focus on the feeds
Do you focus on the feeds or the entire data as a whole? The entire collection of data includes the internal data of threat, attack, etc., feed data, and data related to event monitoring, traffic, rules, etc. Do you have enough metadata or are you missing on the valuable data about a real threat? Do you able to establish the connection? This is understandable that getting intelligence regularly is a critical task. But it is not possible to analyze the data on a weekly basis or expecting automation of the process serves no purpose.
How to fix it:
To fix the wrong focus of threat intelligence, move from collection to analyzing. But analyzing the entire data is time-consuming and the burden can be reduced by using the technologies that enable your team to concentrate on data analysis and not simply on data collection. Ultimately, threat intelligence is useful if it can prioritize threats based on the severity of the risks and enables you to focus on it.
4. Drowning the data
The Automation and Orchestration research study conducted by ESG, it was identified that despite investing heavily in information security solutions, nearly 74% of those surveyed reported that security events/alerts are simply ignored because their teams can’t keep up with the suffocating volume. The causes include feeds intended for wrong industries or inappropriately sized security teams. Hence, it is important to figure out what the requirement, whether raw data on threats or actionable intelligence which can help on finetuning firewall rules.
How to fix it:
Understand that the feeds are data and not real intelligence. If the feeds are bringing fatigue efforts should be made in tying the feeds with the business needs to make a faster security decision. If the data from the feed is not used, then it is not needed.
5. Inability to operationalize the data
In a survey conducted by the Ponemon Institute on IT leaders, it was observed that 65% believe that threat intelligence could have prevented from an attack to their organization. However, 66% are not satisfied with their current approaches to threat intelligence and felt that the information is not timely. 46% analyzed that the information is not well categorized according to threat trap and it needs to be improved.
Threat intelligence does not trigger a response to a breach but can help in developing tactical actions, provided the team knows how to drive the required action. For an effective threat intelligence, tools and feeds alone not enough and it should be aligned with the business requirements.
How to fix it:
Threat intelligence plays an important role with numerous teams while working to prevent, detect, respond and predict the latest known and unknown threats. it requires continuous monitoring and analysis and strategic to process the valuable feed throughout each phase.