Cyber Security Primer VII
EMAIL
AND COMMUNICATION – II
Avoiding the Pitfalls of Online Trading
What is online trading?
Online trading allows you to conduct investment
transactions over the internet. The accessibility of the internet makes it
possible for you to research and invest in opportunities from any location at
any time. It also reduces the amount of resources (time, effort, and money) you
have to devote to managing these accounts and transactions.
What are the risks?
Recognizing the importance of safeguarding your money,
legitimate brokerages take steps to ensure that their transactions are secure.
However, online brokerages and the investors who use them are appealing targets
for attackers. The amount of financial information in a brokerage's database
makes it valuable; this information can be traded or sold for personal profit.
Also, because money is regularly transferred through these accounts, malicious
activity may not be noticed immediately. To gain access to these databases,
attackers may use Trojan horses or other types of malicious code.
Attackers may also attempt to
collect financial information by targeting the current or potential investors
directly. These attempts may take the form of social engineering or phishing
attacks. With methods that include setting up fraudulent investment
opportunities or redirecting users to malicious sites that appear to be
legitimate, attackers try to convince you to provide them with financial
information that they can then use or sell. If you have been victimized, both
your money and your identity may be at risk.
How can you protect yourself?
• Be wary of online information - Anyone can publish information
on the internet, so try to verify any online research through other methods
before investing any money. Also be cautious of "hot" investment
opportunities advertised online or in email.
• Check
privacy policies - Before providing personal or financial information, check
the web site's privacy policy. Make sure you understand how your information
will be stored and used.
• Make
sure that your transactions are encrypted - When information is sent over the
internet, attackers may be able to intercept it. Encryption prevents the
attackers from being able to view the information.
• Verify that the web site is legitimate -
Attackers may redirect you to a malicious web site that looks identical to a
legitimate one. They then convince you to submit your personal and financial
information, which they use for their own gain. Check the web site's
certificate to make sure it is legitimate.
• Monitor
your investments - Regularly check your accounts for any unusual activity.
Report unauthorized transactions immediately.
• Use
and maintain anti-virus software - Anti-virus software recognizes and protects
your computer against most known viruses. However, because attackers are
continually writing new viruses, it is important to keep your virus definitions
current.
• Use
anti-spyware tools - Spyware is a common source of viruses, and attackers may
use it to access information on your computer. You can minimize the number of
infections by using a legitimate program that identifies and removes spyware.
• Keep
software up to date - Install software patches so that attackers can't take
advantage of known problems or vulnerabilities. Enable automatic updates if the
option is available.
• Evaluate
your security settings - By adjusting the security settings in your browser,
you may limit your risk of certain attacks.
Understanding Digital
Signatures
What is a digital signature?
There are different types of digital signatures; this tip
focuses on digital signatures for email messages. You may have received emails
that have a block of letters and numbers at the bottom of the message. Although
it may look like useless text or some kind of error, this information is
actually a digital signature. To generate a signature, a mathematical algorithm
is used to combine the information in a key with the information in the
message. The result is a random-looking string of letters and numbers.
Why would you use one?
Because it is so easy for attackers and viruses to
"spoof" email addresses, it is sometimes difficult to identify
legitimate messages. Authenticity may be especially important for business
correspondence—if you are relying on someone to provide or verify information,
you want to be sure that the information is coming from the correct source. A
signed message also indicates that changes have not been made to the content
since it was sent; any changes would cause the signature to break.
How does it work?
Before you can understand how a digital signature works,
there are some terms you should know:
·
Keys - Keys are used to create digital signatures.
For every signature, there is a public key and a private key.
Fingerprint - When confirming a key, you will actually be confirming the unique series of letters and numbers that comprise the fingerprint of the key. The fingerprint is a different series of letters and numbers than the chunk of information that appears at the bottom of a signed email message.
Key certificates - When you select a key on a key ring, you will usually see the key certificate, which contains information about the key, such as the key owner, the date the key was created, and the date the key will expire.
"Web of trust" - When someone signs your key, they are confirming that the key actually belongs to you. The more signatures you collect, the stronger your key becomes. If someone sees that your key has been signed by other people that he or she trusts, he or she is more inclined to trust your key. Note: Just because someone else has trusted a key or you find it on a public key ring does not mean you should automatically trust it. You should always verify the fingerprint yourself.
The process for creating, obtaining, and using keys is
fairly straightforward:
1. Generate a key using software such as PGP, which stands for Pretty
Good Privacy, or GnuPG, which stands for GNU Privacy Guard.
2. Increase the authenticity of your key by having your key signed by
co-workers or other associates who also have keys. In the process of signing
your key, they will confirm that the fingerprint on the key you sent them
belongs to you. By doing this, they verify your identity and indicate trust in
your key.
3. Upload your signed key to a public key ring so that if someone
gets a message with your signature, they can verify the digital signature.
4. Digitally sign your outgoing email messages. Most email clients
have a feature to easily add your digital signature to your message.
There are a variety of mechanisms for creating digital
signatures, and these mechanisms may operate differently. For example, S/MIME
does not add a visible block of letters and numbers within the message, and its
digital signatures are verified indirectly using a certificate authority
instead of directly with other users in a web of trust. You may just see an
icon or note on the message that the signature has been verified. If you get an
error about a digital signature, try to contact the sender through a phone call
or a separate email address that you know is valid to verify the authenticity
of the message.
Using Instant Messaging and
Chat Rooms Safely
What are the differences
between some of the tools used for real-time communication?
• Instant messaging (IM) - Commonly used for recreation,
instant messaging is also becoming more widely used within corporations for
communication between employees. IM, regardless of the specific software you
choose, provides an interface for individuals to communicate one-on-one.
• Chat rooms - Whether public or private, chat rooms are
forums for particular groups of people to interact. Many chat rooms are based
upon a shared characteristic; for example, there are chat rooms for people of
particular age groups or interests. Although most IM clients support
"chats" among multiple users, IM is traditionally one-to-one while
chats are traditionally many-to-many.
• Bots - A "chat robot," or "bot," is
software that can interact with users through chat mechanisms, whether in IM or
chat rooms. In some cases, users may be able to obtain current weather reports,
stock status, or movie listings. In these instances, users are often aware that
they are not interacting with an actual human. However, some users may be
fooled by more sophisticated bots into thinking the responses they are
receiving are from another person.
There are many software packages that incorporate one or
more of these capabilities. A number of different technologies might be
supported, including IM, Internet Relay Chat (IRC), or Jabber.
What are the dangers?
• Identities can be elusive or ambiguous - Not only is it
sometimes difficult to identify whether the "person" you are talking
to is human, but human nature and behavior isn't predictable. People may lie about
their identity, accounts may be compromised, users may forget to log out, or an
account may be shared by multiple people. All of these things make it difficult
to know who you're really talking to during a conversation.
• Users are especially susceptible to certain types of attack -
Trying to convince someone to run a program or click on a link is a common
attack method, but it can be especially effective through IM and chat rooms. In
a setting where a user feels comfortable with the "person" he or she
is talking to, a malicious piece of software or an attacker has a better chance
of convincing someone to fall into the trap.
• You don't know who else might be seeing the conversation -
Online interactions are easily saved, and if you're using a free commercial
service the exchanges may be archived on a server. You have no control over
what happens to those logs. You also don't know if there's someone looking over
the shoulder of the person you're talking to, or if an attacker might be
"sniffing" your conversation.
• The software you're using may contain vulnerabilities - Like any
other software, chat software may have vulnerabilities that attackers can
exploit.
• Default security settings may be inappropriate - The default
security settings in chat software tend to be relatively permissive to make it
more open and "usable" and this can make you more susceptible to
attacks.
How can you use these tools
safely?
• Evaluate your security settings - Check the default settings in
your software and adjust them if they are too permissive. Make sure to disable
automatic downloads. Some chat software offers the ability to limit
interactions to only certain users, and you may want to take advantage of these
restrictions.
• Be conscious of what information you reveal - Be wary of
revealing personal information unless you know who you are really talking to.
You should also be careful about discussing anything you or your employer might
consider sensitive business information over public IM or chat services (even
if you are talking to someone you know in a one-to-one conversation).
• Try to verify the identity of the person you are talking to, if
it matters - In some forums and situations, the identity of the
"person" you are talking to may not matter. However, if you need to
have a degree of trust in that person, either because you are sharing certain
types of information or being asked to take some action like following a link
or running a program, make sure the "person" you are talking to is
actually that person?
• Don't believe everything you read - The information or advice
you receive in a chat room or by IM may be false or, worse, malicious. Try to
verify the information or instructions from outside sources before taking any
action.
• Keep software up to date - This includes the chat software, your
browser, your operating system, your mail client, and, especially, your
anti-virus software.
Staying Safe on Social Network Sites
What are social networking
sites?
Social networking sites, sometimes referred to as
"friend-of-a-friend" sites, build upon the concept of traditional
social networks where you are connected to new people through people you
already know. The purpose of some networking sites may be purely social,
allowing users to establish friendships or romantic relationships, while others
may focus on establishing business connections.
Although the features of social networking sites differ,
they all allow you to provide information about yourself and offer some type of
communication mechanism (forums, chat rooms, email, instant messenger) that
enables you to connect with other users. On some sites, you can browse for
people based on certain criteria, while other sites require that you be
"introduced" to new people through a connection you share. Many of the
sites have communities or subgroups that may be based on a particular
interest.
What security implications do
these sites present?
Social networking sites rely on connections and
communication, so they encourage you to provide a certain amount of personal
information. When deciding how much information to reveal, people may not
exercise the same amount of caution as they would when meeting someone in
person because
• the internet provides a sense of anonymity
• the lack of physical interaction provides a false sense of
security
• they tailor the information for their friends to read,
forgetting that others may see it
• they want to offer insights to impress potential friends or
associates
While the majority of people using these sites do not pose
a threat, malicious people may be drawn to them because of the accessibility
and amount of personal information that's available. The more information
malicious people have about you, the easier it is for them to take advantage of
you. Predators may form relationships online and then convince unsuspecting
individuals to meet them in person. That could lead to a dangerous situation.
The personal information can also be used to conduct a social engineering
attack. Using information that you provide about your location, hobbies,
interests, and friends, a malicious person could impersonate a trusted friend
or convince you that they have the authority to access other personal or
financial data.
Additionally, because of the popularity of these sites,
attackers may use them to distribute malicious code. Sites that offer
applications developed by third parties are particularly susceptible. Attackers
may be able to create customized applications that appear to be innocent while
infecting your computer without your knowledge.
How can you protect yourself?
• Limit the amount of personal information you post - Do not post
information that would make you vulnerable, such as your address or information
about your schedule or routine. If your connections post information about you,
make sure the combined information is not more than you would be comfortable
with strangers knowing. Also be considerate when posting information, including
photos, about your connections.
• Remember that the internet is a public resource - Only post
information you are comfortable with anyone seeing. This includes information
and photos in your profile and in blogs and other forums. Also, once you post
information online, you can't retract it. Even if you remove the information
from a site, saved or cached versions may still exist on other people's
machines.
• Be wary of strangers - The internet makes it easy for people to
misrepresent their identities and motives. Consider limiting the people who are
allowed to contact you on these sites. If you interact with people you do not
know, be cautious about the amount of information you reveal or agreeing to
meet them in person.
• Be skeptical - Don't believe everything you read online. People
may post false or misleading information about various topics, including their
own identities. This is not necessarily done with malicious intent; it could be
unintentional, an exaggeration, or a joke. Take appropriate precautions,
though, and try to verify the authenticity of any information before taking any
action.
• Evaluate your settings - Take advantage of a site's privacy
settings. The default settings for some sites may allow anyone to see your
profile. You can customize your settings to restrict access to only certain
people. However, there is a risk that even this private information could be
exposed, so don't post anything that you wouldn't want the public to see. Also,
be cautious when deciding which applications to enable, and check your settings
to see what information the applications will be able to access.
• Use strong passwords - Protect your account with passwords that
cannot easily be guessed. If your password is compromised, someone else may be
able to access your account and pretend to be you.
• Check privacy policies - Some sites may share information such
as email addresses or user preferences with other companies. This may lead to
an increase in spam. Also, try to locate the policy for handling referrals to
make sure that you do not unintentionally sign your friends up for spam. Some
sites will continue to send email messages to anyone you refer until they join.
• Use and maintain anti-virus software - Anti-virus software
recognizes most known viruses and protects your computer against them, so you
may be able to detect and remove the virus before it can do any damage. Because
attackers are continually writing new viruses, it is important to keep your
definitions up to date.
Children are especially susceptible to the threats that
social networking sites present. Although many of these sites have age
restrictions, children may misrepresent their ages so that they can join. By
teaching children about internet safety, being aware of their online habits,
and guiding them to appropriate sites, parents can make sure that the children
become safe and responsible users.
Comments
Post a Comment