Cyber Security Primer II
GENERAL SECURITY
Choosing and Protecting
Passwords
Why do you need a password?
Think
about the number of personal identification numbers (PINs), passwords, or
passphrases you use every day: getting money from the ATM or using your debit
card in a store, logging on to your computer or email, signing in to an online
bank account or shopping cart...the list seems to just keep getting longer.
Keeping track of all of the number, letter, and word combinations may be
frustrating at times, and maybe you've wondered if all of the fuss is worth it.
After all, what attacker cares about your personal email account, right? Or why
would someone bother with your practically empty bank account when there are
others with much more money? Often, an attack is not specifically about your
account but about using the access to your information to launch a larger
attack. And while having someone gain access to your personal email might not
seem like much more than an inconvenience and threat to your privacy, think of
the implications of an attacker gaining access to your social security number
or your medical records.
One of
the best ways to protect information or physical property is to ensure that
only authorized people have access to it. Verifying that someone is the person
they claim to be is the next step, and this authentication process is even more
important, and more difficult, in the cyber world. Passwords are the most
common means of authentication, but if you don't choose good passwords or keep
them confidential, they're almost as ineffective as not having any password at
all. Many systems and services have been successfully broken into due to the
use of insecure and inadequate passwords, and some viruses and worms have
exploited systems by guessing weak passwords.
How do you choose a good password?
Most
people use passwords that are based on personal information and are easy to
remember. However, that also makes it easier for an attacker to guess or
"crack" them. Consider a four-digit PIN number. Is yours a
combination of the month, day, or year of your birthday? Or the last four
digits of your social security number? Or your address or phone number? Think
about how easily it is to find this information out about somebody. What about
your email password—is it a word that can be found in the dictionary? If so, it
may be susceptible to "dictionary" attacks, which attempt to guess
passwords based on words in the dictionary.
Although
intentionally misspelling a word ("daytt" instead of
"date") may offer some protection against dictionary attacks, an even
better method is to rely on a series of words and use memory techniques, or
mnemonics, to help you remember how to decode it. For example, instead of the
password "hoops," use "IlTpbb" for "[I] [l]ike [T]o
[p]lay [b]asket[b]all." Using both lowercase and capital letters adds
another layer of obscurity. Your best defense, though, is to use a combination
of numbers, special characters, and both lowercase and capital letters. Change
the same example we used above to "Il!2pBb." and see how much more
complicated it has become just by adding numbers and special characters.
Longer
passwords are more secure than shorter ones because there are more characters
to guess, so consider using passphrases when you can. For example, "This
passwd is 4 my email!" would be a strong password because it has many
characters and includes lowercase and capital letters, numbers, and special
characters. You may need to try different variations of a passphrase—many
applications limit the length of passwords, and some do not accept spaces.
Avoid common phrases, famous quotations, and song lyrics.
Don't
assume that now that you've developed a strong password you should use it for
every system or program you log into. If an attacker does guess it, he would
have access to all of your accounts. You should use these techniques to develop
unique passwords for each of your accounts. Here is a review of tactics to use
when choosing a password:
• Don't use
passwords that are based on personal information that can be easily accessed or
guessed.
• Don't use words
that can be found in any dictionary of any language.
• Develop a mnemonic
for remembering complex passwords.
• Use both lowercase
and capital letters.
• Use a combination
of letters, numbers, and special characters.
• Use passphrases
when you can.
• Use different
passwords on different systems.
How can you protect your password?
Now
that you've chosen a password that's difficult to guess, you have to make sure
not to leave it someplace for people to find. Writing it down and leaving it in
your desk, next to your computer, or, worse, taped to your computer, is just
making it easy for someone who has physical access to your office. Don't tell
anyone your passwords, and watch for attackers trying to trick you through phone
calls or email messages requesting that you reveal your passwords.
If
your internet service provider (ISP) offers choices of authentication systems,
look for ones that use Kerberos, challenge/response, or public key encryption
rather than simple passwords. Consider challenging service providers that only
use passwords to adopt more secure methods.
Also,
many programs offer the option of "remembering" your password, but
these programs have varying degrees of security protecting that information.
Some programs, such as email clients, store the information in clear text in a
file on your computer. This means that anyone with access to your computer can
discover all of your passwords and can gain access to your information. For
this reason, always remember to log out when you are using a public computer
(at the library, an internet cafe, or even a shared computer at your office).
Other programs, such as Apple's Keychain and Palm's Secure Desktop, use strong
encryption to protect the information. These types of programs may be viable
options for managing your passwords if you find you have too many to remember.
There's
no guarantee that these techniques will prevent an attacker from learning your
password, but they will make it more difficult.
Understanding Anti-Virus
Software
What does anti-virus software do?
Although
details may vary between packages, anti-virus software scans files or your
computer's memory for certain patterns that may indicate an infection. The
patterns it looks for are based on the signatures, or definitions, of known
viruses. Virus authors are continually releasing new and updated viruses, so it
is important that you have the latest definitions installed on your computer.
Once you have installed an anti-virus package, you should scan your entire
computer periodically.
• Automatic scans -
Depending what software you choose, you may be able to configure it to
automatically scan specific files or directories and prompt you at set
intervals to perform complete scans.
• Manual scans - It
is also a good idea to manually scan files you receive from an outside source
before opening them. This includes
·
saving and scanning email
attachments or web downloads rather than selecting the option to open them
directly from the source
·
scanning media, including CDs
and DVDs, for viruses before opening any of the files
What happens if the software finds a virus?
Each
package has its own method of response when it locates a virus, and the
response may differ according to whether the software locates the virus during
an automatic or a manual scan. Sometimes the software will produce a dialog box
alerting you that it has found a virus and asking whether you want it to
"clean" the file (to remove the virus). In other cases, the software
may attempt to remove the virus without asking you first. When you select an
anti-virus package, familiarize yourself with its features so you know what to
expect.
Which software should you use?
There
are many vendors who produce anti-virus software, and deciding which one to choose
can be confusing. All anti-virus software performs the same function, so your
decision may be driven by recommendations, particular features, availability,
or price. Installing any anti-virus software, regardless of which package you
choose, increases your level of protection. Be careful, though, of email
messages claiming to include anti-virus software. These messages, supposedly
from your ISP's technical support department, contain an attachment that claims
to be anti-virus software. However, the attachment itself is in fact a virus,
so you could become infected by opening it.
How do you get the current virus information?
This
process may differ depending what product you choose, so find out what your
anti-virus software requires. Many anti-virus packages include an option to
automatically receive updated virus definitions. Because new information is
added frequently, it is a good idea to take advantage of this option. Resist
believing email chain letters that claim that a well-known anti-virus vendor has
recently detected the "worst virus in history" that will destroy your
computer's hard drive. These emails are usually hoaxes. You can confirm virus
information through your anti-virus vendor or through resources offered by
other anti-virus vendors.
While installing anti-virus software is one of
the easiest and most effective ways to protect your computer, it has its
limitations. Because it relies on signatures, anti-virus software can only
detect viruses that have signatures installed on your computer, so it is
important to keep these signatures up to date. You will still be susceptible to
viruses that circulate before the anti-virus vendors add their signatures, so
continue to take other safety precautions as well
Coordinating Virus and Spyware Defense
Spyware
and viruses can interfere with your computer's ability to process information
or can modify or destroy data. You may feel that the more anti-virus and
anti-spyware programs you install on your computer, the safer you will be. It
is true that not all programs are equally effective, and they will not all
detect the same malicious code. However, by installing multiple programs in an
attempt to catch everything, you may introduce problems.
How can anti-virus or anti-spyware software
cause problems?
It is
important to use anti-virus and anti-spyware software. But too much or the
wrong kind can affect the performance of your computer and the effectiveness of
the software itself. Scanning your computer for viruses and spyware uses some
of the available memory on your computer. If you have multiple programs trying
to scan at the same time, you may limit the amount of resources left to perform
your tasks. Essentially, you have created a denial of service against yourself.
It is also possible that in the process of scanning for viruses and spyware,
anti-virus or anti-spyware software may misinterpret the virus definitions of
other programs. Instead of recognizing them as definitions, the software may
interpret the definitions as actual malicious code. Not only could this result
in false positives for the presence of viruses or spyware, but the anti-virus
or anti-spyware software may actually quarantine or delete the other software.
How can you avoid these problems?
• Investigate your
options in advance - Research available anti-virus and anti-spyware software to
determine the best choice for you. Consider the amount of malicious code the
software recognizes, and try to find out how frequently the virus definitions
are updated. Also check for known compatibility issues with other software you
may be running on your computer.
• Limit the number
of programs you install - Many vendors are now releasing packages that
incorporate both anti-virus and anti-spyware capabilities together. However, if
you decide to choose separate programs, you really only need one anti-virus
program and one anti-spyware program. If you install more, you increase your
risk for problems.
• Install the
software in phases - Install the anti-virus software first and test it for a
few days before installing anti-spyware software. If problems develop, you have
a better chance at isolating the source and then determining if it is an issue
with the software itself or with compatibility.
• Watch for
problems - If your computer starts processing requests more slowly, you are
seeing error messages when updating your virus definitions, your software does
not seem to be recognizing malicious code, or other issues develop that cannot
be easily explained, check your anti-virus and anti-spyware software.
Understanding Firewalls
What do firewalls do?
Firewalls
provide protection against outside attackers by shielding your computer or
network from malicious or unnecessary Internet traffic. Firewalls can be
configured to block data from certain locations while allowing the relevant and
necessary data through. They are especially important for users who rely on
"always on" connections such as cable or DSL modems.
What type of firewall is best?
Firewalls
are offered in two forms: hardware (external) and software (internal). While
both have their advantages and disadvantages, the decision to use a firewall is
far more important than deciding which type you use.
• Hardware - Typically called
network firewalls, these external devices are positioned between your computer
or network and your cable or DSL modem. Many vendors and some Internet service
providers (ISPs) offer devices called "routers" that also include
firewall features. Hardware-based firewalls are particularly useful for
protecting multiple computers but also offer a high degree of protection for a
single computer. If you only have one computer behind the firewall, or if you
are certain that all of the other computers on the network are up to date on
patches and are free from viruses, worms, or other malicious code, you may not
need the extra protection of a software firewall. Hardware-based firewalls have
the advantage of being separate devices running their own operating systems, so
they provide an additional line of defense against attacks. Their major drawback
is cost, but many products are available for less than $100 (and there are even
some for less than $50).
• Software - Some operating
systems include a built-in firewall; if yours does, consider enabling it to add
another layer of protection even if you have an external firewall. If you don't
have a built-in firewall, you can obtain a software firewall for relatively
little or no cost from your local computer store, software vendors, or ISP.
Because of the risks associated with downloading software from the Internet
onto an unprotected computer, it is best to install the firewall from a CD or
DVD. If you do download software from the Internet, make sure it is a
reputable, secure website. Although relying on a software firewall alone does
provide some protection, realize that having the firewall on the same computer
as the information you're trying to protect may hinder the firewall's ability
to catch malicious traffic before it enters your system.
How do you know what configuration settings to
apply?
Most
commercially available firewall products, both hardware- and software-based,
come configured in a manner that is acceptably secure for most users. Since
each firewall is different, you'll need to read and understand the
documentation that comes with it to determine whether or not the default
settings on your firewall are sufficient for your needs. Additional assistance
may be available from your firewall vendor or your ISP (either from tech
support or a website). Unfortunately, while properly configured firewalls may
be effective at blocking some attacks, don't be lulled into a false sense of
security. Although they do offer a certain amount of protection, firewalls do
not guarantee that your computer will not be attacked. In particular, a
firewall offers little to no protection against viruses that work by having you
run the infected program on your computer, as many email-borne viruses do.
However, using a firewall in conjunction with other protective measures (such
as anti-virus software and "safe" computing practices) will
strengthen your resistance to attacks.
Debunking Some Common Myths
How are these myths established?
There
is no one cause for these myths. They may have been formed because of a lack of
information, an assumption, knowledge of a specific case that was then
generalized, or some other source. As with any myth, they are passed from one
individual to another, usually because they seem legitimate enough to be true.
Why is it important to know the truth?
While
believing these myths may not present a direct threat, they may cause you to be
more lax about your security habits. If you are not diligent about protecting
yourself, you may be more likely to become a victim of an attack.
What are some common myths, and what is the
truth behind them?
• Myth:
Anti-virus software and firewalls are 100% effective.
Truth:
Anti-virus software and firewalls are important elements to protecting your
information. However, neither of these elements are guaranteed to protect you
from an attack. Combining these technologies with good security habits is the
best way to reduce your risk.
• Myth:
Once software is installed on your computer, you do not have to worry about it
anymore.
Truth:
Vendors may release patches or updated versions of software to address problems
or fix vulnerabilities. You should install the patches as soon as possible;
some software even offers the option to obtain updates automatically. Making
sure that you have the latest virus definitions for your anti-virus software is
especially important.
• Myth:
There is nothing important on your machine, so you do not need to protect it.
Truth:
Your opinion about what is important may differ from an attacker's opinion. If
you have personal or financial data on your computer, attackers may be able to
collect it and use it for their own financial gain. Even if you do not store
that kind of information on your computer, an attacker who can gain control of
your computer may be able to use it in attacks against other people.
• Myth:
Attackers only target people with money.
Truth:
Anyone can become a victim of identity theft. Attackers look for the biggest
reward for the least amount of effort, so they typically target databases that
store information about many people. If your information happens to be in the
database, it could be collected and used for malicious purposes. It is
important to pay attention to your credit information so that you can minimize
any potential damage.
• Myth:
When computers slow down, it means that they are old and should be replaced.
Truth:
It is possible that running newer or larger software programs on an older
computer could lead to slow performance, but you may just need to replace or
upgrade a particular component (memory, operating system, CD or DVD drive,
etc.). Another possibility is that there are other processes or programs
running in the background. If your computer has suddenly become slower, you may
be experiencing a denial-of-service attack or have spyware on your machine
Comments
Post a Comment