Cyber Security Primer XI
SOFTWARE AND APPLICATIONS
Understanding Patches
What are patches?
Similar to the way fabric patches are used to repair holes
in clothing, software patches repair holes in software programs. Patches are
updates that fix a particular problem or vulnerability within a program.
Sometimes, instead of just releasing a patch, vendors will release an upgraded
version of their software, although they may refer to the upgrade as a patch.
How do you find out what
patches you need to install?
When patches are available, vendors usually put them on
their websites for users to download. It is important to install a patch as
soon as possible to protect your computer from attackers who would take
advantage of the vulnerability. Attackers may target vulnerabilities for months
or even years after patches are available. Some software will automatically
check for updates, and many vendors offer users the option to receive automatic
notification of updates through a mailing list. If these automatic options are
available, we recommend that you take advantage of them. If they are not
available, check your vendors' websites periodically for updates.
Make sure that you only download software or patches from
websites that you trust. Do not trust a link in an email message—attackers have
used email messages to direct users to malicious websites where users install
viruses disguised as patches. Also, beware of email messages that claim that
they have attached the patch to the message—these attachments are often
viruses.
Understanding Voice over
Internet Protocol (VoIP)
What is voice over internet
protocol (VoIP)?
Voice over internet protocol (VoIP), also known as IP
telephony, allows you to use your internet connection to make telephone calls.
Instead of relying on an analog line like traditional telephones, VoIP uses
digital technology and requires a high-speed broadband connection such as DSL
or cable. There are a variety of providers who offer VoIP, and they offer
different services. The most common application of VoIP for personal or home
use is internet-based phone services that rely on a telephone switch. With this
application, you will still have a phone number, will still dial phone numbers,
and will usually have an adapter that allows you to use a regular telephone.
The person you are calling will not likely notice a difference from a traditional
phone call. Some service providers also offer the ability to use your VoIP
adapter any place you have a high-speed internet connection, allowing you to
take it with you when you travel.
What are the security
implications of VoIP?
Because VoIP relies on your internet connection, it may be
vulnerable to any threats and problems that face your computer. The technology
is still new, so there is some controversy about the potential for attack, but
VoIP could make your telephone vulnerable to viruses and other malicious code.
Attackers may be able to perform activities such as intercepting your
communications, eavesdropping, conducting effective phishing attacks by
manipulating your caller ID, and causing your service to crash. Activities that
consume a large amount of network resources, like large file downloads, online
gaming, and streaming multimedia, will also affect your VoIP service.
There are also inherent problems to routing your telephone
over your broadband connection. Unlike traditional telephone lines, which
operate despite an electrical outage, if you lose power, your VoIP may be
unavailable. There are also concerns that home security systems or emergency
numbers such as 911 may not work the way you expect.
How can you protect yourself?
• Keep software up to date - If the vendor releases patches
for the software operating your device, install them as soon as possible. These
patches may be called firmware updates. Installing them will prevent attackers
from being able to take advantage of known problems or vulnerabilities.
• Use and maintain anti-virus software - Anti-virus
software recognizes and protects your computer against most known viruses.
However, attackers are continually writing new viruses, so it is important to
keep your anti-virus software current.
• Take advantage of security options - Some service
providers may offer encryption as one of their services. If you are concerned
about privacy and confidentiality, you may want to consider this and other
available options.
• Install or enable a firewall - Firewalls may be able to
prevent some types of infection by blocking malicious traffic before it can
enter your computer. Some operating systems actually include a firewall, but
you need to make sure it is enabled.
• Evaluate your security settings - Both your computer and
your VoIP equipment/software offer a variety of features that you can tailor to
meet your needs and requirements. However, enabling certain features may leave
you more vulnerable to being attacked, so disable any unnecessary features.
Examine your settings, particularly the security settings, and select options
that meet your needs without putting you at increased risk.
Risks of File-Sharing
Technology
What is file sharing?
File sharing involves using technology that allows internet
users to share files that are housed on their individual computers.
Peer-to-peer (P2P) applications, such as those used to share music files, are
some of the most common forms of file-sharing technology. However, P2P
applications introduce security risks that may put your information or your
computer in jeopardy.
What risks does file-sharing
technology introduce?
• Installation of malicious code - When you use P2P
applications, it is difficult, if not impossible, to verify that the source of
the files is trustworthy. These applications are often used by attackers to
transmit malicious code. Attackers may incorporate spyware, viruses, Trojan
horses, or worms into the files. When you download the files, your computer
becomes infected.
• Exposure of sensitive or personal information - By using
P2P applications, you may be giving other users access to personal information.
Whether it's because certain directories are accessible or because you provide
personal information to what you believe to be a trusted person or
organization, unauthorized people may be able to access your financial or
medical data, personal documents, sensitive corporate information, or other
personal information. Once information has been exposed to unauthorized people,
it's difficult to know how many people have accessed it. The availability of
this information may increase your risk of identity theft.
• Susceptibility to attack - Some P2P applications may ask
you to open certain ports on your firewall to transmit the files. However,
opening some of these ports may give attackers access to your computer or
enable them to attack your computer by taking advantage of any vulnerabilities
that may exist in the P2P application. There are some P2P applications that can
modify and penetrate firewalls themselves, without your knowledge.
• Denial of service - Downloading files causes a
significant amount of traffic over the network. This activity may reduce the
availability of certain programs on your computer or may limit your access to
the internet.
• Prosecution - Files shared through P2P applications may
include pirated software, copyrighted material, or pornography. If you download
these, even unknowingly, you may be faced with fines or other legal action. If
your computer is on a company network and exposes customer information, both
you and your company may be liable.
How can you minimize these
risks?
The best way to eliminate these risks is to avoid using P2P
applications. However, if you choose to use this technology, you can follow
some good security practices to minimize your risk:
• use and maintain anti-virus software - Anti-virus
software recognizes and protects your computer against most known viruses.
However, attackers are continually writing new viruses, so it is important to
keep your anti-virus software current.
• install or enable a firewall - Firewalls may be able to
prevent some types of infection by blocking malicious traffic before it can
enter your computer. Some operating systems actually include a firewall, but
you need to make sure it is enabled.
Reviewing End-User License
Agreements
What is an end-user license
agreement?
An end-user license agreement (EULA) is a contract between
you and the software's vendor or developer. Some software packages state that
by simply removing the shrink-wrap on the package, you agree to the contract. However,
you may be more familiar with the type of EULA that is presented as a dialog
box that appears the first time you open the software. It usually requires you
to accept the conditions of the contract before you can proceed. Some EULAs
only apply to certain features of the software, so you may only encounter them
when you attempt to use those features.
Unfortunately, many users don't read EULAs before accepting
them. The terms of each contract differ, and you may be agreeing to conditions
that you later consider unfair or that expose you to security risks you didn't
expect.
What terms may be included?
EULAs are legal contracts, and the vendor or developer may
include almost any conditions. These conditions are often designed to protect
the developer or vendor against liability, but they may also include additional
terms that give the vendor some control over your computer. The following
topics are often covered in EULAs:
• Distribution - There are often limitations placed on the
number of times you are allowed to install the software and restrictions about
reproducing the software for distribution.
• Warranty - Developers or vendors often include
disclaimers that they are not liable for any problem that results from the
software being used incorrectly. They may also protect themselves from
liability for software flaws, software failure, or incompatibility with other
programs on your computer.
The following topics, while not standard, are examples of
other conditions that have been included in EULAs. They present security
implications that you should consider before accepting the agreement.
• Monitoring - Agreeing to the EULA may give the vendor
permission to monitor your computer activity and communicate the information
back to the vendor or to another third party. Depending on what information is
being collected, this type of monitoring could have both security and privacy
implications.
• Software installation - Some agreements allow the vendor
to install additional software on your computer. This may include updated
versions of the software program you installed (the determination of which
version you are running may be a result of the monitoring described above).
Vendors may also incorporate statements that allow them or other third parties
to install additional software programs on your computer. This software may be
unnecessary, may affect the functionality of other programs on your computer,
and may introduce security risks.
Understanding Your Computer:
Operating Systems
What is an operating system?
An operating system (OS) is the main program on a computer.
It performs a variety of functions, including
• determining what types of software you can install
• coordinating the applications running on the computer at any
given time
• making sure that individual pieces of hardware, such as
printers, keyboards, and disk drives, all communicate properly
• allowing applications such as word processors, email clients,
and web browsers to perform tasks on the system (e.g., drawing windows on the
screen, opening files, communicating on a network) and use other system
resources (e.g., printers, disk drives)
• reporting error messages
The OS also determines how you see information and perform
tasks. Most operating systems use a graphical user interface (GUI), which
presents information through pictures (icons, buttons, dialog boxes, etc.) as
well as words. Some operating systems can rely more heavily on textual
interfaces than others.
How do you choose an operating
system?
In very simplistic terms, when you choose to buy a
computer, you are usually also choosing an operating system. Although you may
change it, vendors typically ship computers with a particular operating system.
There are multiple operating systems, each with different features and
benefits, but the following three are the most common:
• Windows - Windows, with versions including Windows XP,
Windows Vista, and Windows 7, is the most common operating system for home
users. It is produced by Microsoft and is typically included on machines
purchased in electronics stores or from vendors such as Dell or Gateway. The
Windows OS uses a GUI, which many users find more appealing and easier to use
than text-based interfaces.
• Mac OS X - Produced by Apple, Mac OS X is the operating
system used on Macintosh computers. Although it uses a different GUI, it is
conceptually similar to the Windows interface in the way it operates.
• Linux and other UNIX-derived operating systems - Linux
and other systems derived from the UNIX operating system are frequently used
for specialized workstations and servers, such as web and email servers.
Because they are often more difficult for general users or require specialized
knowledge and skills to operate, they are less popular with home users than the
other options. However, as they continue to develop and become easier to use,
they may become more popular on typical home user systems.
Understanding Bluetooth
Technology
What is Bluetooth?
Bluetooth is a technology that allows devices to
communicate with each other without cables or wires. It is an electronics
"standard," which means that manufacturers that want to include this
feature have to incorporate specific requirements into their electronic
devices. These specifications ensure that the devices can recognize and
interact with other devices that use the Bluetooth technology.
Many popular manufacturers are making devices that use
Bluetooth technology. These devices include mobile phones, computers, and
personal digital assistants (PDAs). The Bluetooth technology relies on
short-range radio frequency, and any device that incorporates the technology
can communicate as long as it is within the required distance. The technology
is often used to allow two different types of devices to communicate with each
other. For example, you may be able to operate your computer with a wireless
keyboard, use a wireless headset to talk on your mobile phone, or add an
appointment to your friend's PDA calendar from your own PDA.
What are some security
concerns?
Depending upon how it is configured, Bluetooth technology
can be fairly secure. You can take advantage of its use of key authentication
and encryption. Unfortunately, many Bluetooth devices rely on short numeric PIN
numbers instead of more secure passwords or passphrases.
If someone can "discover" your Bluetooth device,
he or she may be able to send you unsolicited messages or abuse your Bluetooth
service, which could cause you to be charged extra fees. Worse, an attacker may
be able to find a way to access or corrupt your data. One example of this type
of activity is "bluesnarfing," which refers to attackers using a
Bluetooth connection to steal information off of your Bluetooth device. Also,
viruses or other malicious code can take advantage of Bluetooth technology to
infect other devices. If you are infected, your data may be corrupted,
compromised, stolen, or lost. You should also be aware of attempts to convince
you to send information to someone you do not trust over a Bluetooth
connection.
How can you protect yourself?
• Disable Bluetooth when you are not using it - Unless you are
actively transferring information from one device to another, disable the
technology to prevent unauthorized people from accessing it.
• Use Bluetooth in "hidden" mode - When you do have
Bluetooth enabled, make sure it is "hidden," not
"discoverable." The hidden mode prevents other Bluetooth devices from
recognizing your device. This does not prevent you from using your Bluetooth
devices together. You can "pair" devices so that they can find each
other even if they are in hidden mode. Although the devices (for example, a
mobile phone and a headset) will need to be in discoverable mode to initially
locate each other, once they are "paired" they will always recognize
each other without needing to rediscover the connection.
• Be careful where you use Bluetooth - Be aware of your
environment when pairing devices or operating in discoverable mode. For
example, if you are in a public wireless "hotspot," there is a
greater risk that someone else may be able to intercept the connection than if
you are in your home or your car.
• Evaluate your security settings - Most devices offer a variety
of features that you can tailor to meet your needs and requirements. However,
enabling certain features may leave you more vulnerable to being attacked, so
disable any unnecessary features or Bluetooth connections. Examine your
settings, particularly the security settings, and select options that meet your
needs without putting you at increased risk. Make sure that all of your
Bluetooth connections are configured to require a secure connection.
• Take advantage of security options - Learn what security options
your Bluetooth device offers, and take advantage of features like
authentication and encryption
Avoiding Copyright
Infringement
How does copyright
infringement apply to the internet?
Copyright infringement occurs when you use or distribute
information without permission from the person or organization that owns the
legal rights to the information. Including an image or cartoon on your web site
or in a document, illegally downloading music, and pirating software are all
common copyright violations. While these activities may seem harmless, they could
have serious legal and security implications.
How do you know if you have
permission to use something?
If you find something on a web site that you'd like to use
(e.g., a document, a chart, an application), search for information about
permissions to use, download, redistribute, or reproduce. Most web sites have a
"terms of use" page that explains how you are allowed to use
information from the site. You can often find a link to this page in the site's
contact information or privacy policy, or at the bottom of the page that
contains the information you are interested in using.
There may be restrictions based on the purpose, method, and
audience. You may also have to adhere to specific conditions about how much
information you are allowed to use or how the information is presented and
attributed. If you can't locate the terms of use, or if it seems unclear,
contact the individual or organization that holds the copyright to ask
permission.
What consequences could you
face?
• Prosecution - When you illegally download, reproduce, or
distribute information, you risk legal action. Penalties may range from
warnings and mandatory removal of all references to costly fines. Depending on
the severity of the crime, jail time may also be a possibility. To offset their
own court costs and the money they feel they lose because of pirated software
vendors may increase the prices of their products.
• Infection - Attackers could take advantage of sites or
networks that offer unauthorized downloads (music, movies, software, etc.) by
including code into the files that would infect your computer once it was
installed. Because you wouldn't know the source or identity of the infection
(or maybe that it was even there), you might not be able to easily identify or
remove it. Pirated software with hidden Trojan horses is often advertised as
discounted software in spam email messages.
Comments
Post a Comment