cyber security - halvorsen.blog · a firewall is a network security device that monitors incoming...

44
Cyber Security Hans-Petter Halvorsen https://www.halvorsen.blog

Upload: others

Post on 19-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Cyber SecurityHans-Petter Halvorsen

https://www.halvorsen.blog

Page 2: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Cyber Security Cyber Security, Data Security, GDPR and Data Privacy Hans-Petter Halvorsen - 2019

Page 3: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

2

Table of Contents Table of Contents ................................................................................................................ 2

Preface ............................................................................................................................... 5

Part 1 : Introduction ........................................................................................................... 6

1. Your Digital Life .......................................................................................................... 7

1.1 Introduction ................................................................................................................... 7

1.2 Internet .......................................................................................................................... 8

1.3 Internet of Things ........................................................................................................... 9

2. What is Cyber Security? ............................................................................................. 12

2.1 Hacking and Cyber Attacks ............................................................................................ 12

2.2 Types of Cyber Security threats ..................................................................................... 12 2.2.1 Ransomware ................................................................................................................................. 12 2.2.2 Malware ........................................................................................................................................ 13 2.2.3 Social Engineering ......................................................................................................................... 13 2.2.4 Phishing ......................................................................................................................................... 13

2.3 Spam ............................................................................................................................ 14

2.4 How to be Secure? ........................................................................................................ 14 2.4.1 Firewall .......................................................................................................................................... 14 2.4.2 Antivirus and Antimalware Software ............................................................................................ 14 2.4.3 Access Control ............................................................................................................................... 15 2.4.4 VPN ............................................................................................................................................... 15 2.4.5 Wi-Fi Network ............................................................................................................................... 15 2.4.6 Education ...................................................................................................................................... 15

Part 2 : Cyber Attacks ....................................................................................................... 16

3. Types of Cyber Attacks .............................................................................................. 17

3.1 Malware ....................................................................................................................... 17

3.2 Phishing ........................................................................................................................ 17

3.3 Man-in-the-middle attack (MitM) ................................................................................. 17

3.4 Denial-of-service attack (DoS) ....................................................................................... 18

3.5 SQL injection ................................................................................................................ 18

3.6 Zero-day exploit ........................................................................................................... 18

4. Malware ................................................................................................................... 19

4.1 Virus ............................................................................................................................. 19

4.2 Worms .......................................................................................................................... 19

Page 4: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

3

4.3 Trojan virus .................................................................................................................. 19

4.4 Spyware ....................................................................................................................... 19

4.5 Adware ......................................................................................................................... 20

4.6 Ransomware ................................................................................................................ 20 4.6.1 WannaCry ransomware attack ..................................................................................................... 20 4.6.2 Norsk Hydro .................................................................................................................................. 20 4.6.3 Cryptojacking/Cryptomining Malware .......................................................................................... 20

5. SQL Injection ............................................................................................................. 22

5.1 Introduction ................................................................................................................. 22

5.2 Example ........................................................................................................................ 22

5.3 Other Resources ........................................................................................................... 23

6. How to be Secure? ..................................................................................................... 25

6.1 Passwords .................................................................................................................... 25

6.2 Firewall ........................................................................................................................ 25 6.2.1 Web Application Firewall (WAF) ................................................................................................... 25

6.3 Antivirus and antimalware software ............................................................................. 26

6.4 Access Control .............................................................................................................. 26 6.4.1 Two-factor Authentication ............................................................................................................ 26

6.5 VPN .............................................................................................................................. 27

6.6 Web Hosting Providers ................................................................................................. 27

6.7 Wi-Fi Network .............................................................................................................. 27

6.8 Operating System ......................................................................................................... 27

6.9 Education ..................................................................................................................... 27

Part 3 : Data Privacy ......................................................................................................... 28

7. Introduction to Data Privacy ..................................................................................... 29

8. GDPR ........................................................................................................................ 30

Part 4 : Internet of Things ................................................................................................. 31

9. Internet of Things (IoT) .............................................................................................. 32

10. IoT and Cyber Security ........................................................................................... 34

11. Industrial Internet of Things and Industry 4.0 ........................................................ 35

11.1 SCADA Systems ............................................................................................................. 35

Part 5 : Data Security ........................................................................................................ 36

12. Data Security ......................................................................................................... 37

13. Antivirus Software ................................................................................................. 38

13.1 Operating System ......................................................................................................... 38

Page 5: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

4

13.1.1 Windows 10 ............................................................................................................................. 38 13.1.2 macOS ...................................................................................................................................... 38

Part 6 : Software Security Testing ..................................................................................... 39

14. Software Security Testing ...................................................................................... 40

14.1 Introduction ................................................................................................................. 40

14.2 Test Standards .............................................................................................................. 40 14.2.1 ISO/IEC 27001 .......................................................................................................................... 40

14.3 Test Tools ..................................................................................................................... 40

14.4 OWASP ......................................................................................................................... 40

14.5 Test Platforms .............................................................................................................. 40

15. OWASP .................................................................................................................. 41

References ........................................................................................................................ 42

Page 6: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

5

Preface In this textbook an overview of Cyber Security, Data Security, GDPR and Data Privacy will be given.

Why should we know about these things? This textbook will give you the answers.

Cyber Security Web Site:

https://www.halvorsen.blog/documents/technology/cyber_security/

Here you will find lots of resources regarding Cyber Security in context of Internet of Things (IoT) systems, Industry 4.0, Cloud systems, Web Technology and Software Engineering.

You will in addition find lots of useful resources on my Website/Blog:

https://www.halvorsen.blog

This textbook consists of the following Parts:

• Part 1 - Introduction • Part 2 - Cyber Attacks • Part 3 - Data Privacy • Part 4 - Internet of Things (IoT) • Part 5 - Data Security • Part 6 - Software Security Testing

Page 7: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Part 1 : Introduction This part gives a short introduction to topics covered in this textbook.

Page 8: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

7

1. Your Digital Life 1.1 Introduction Figure 1-1 shows an overview of Cyber Security Issues.

Figure 1-1: An overview of Cyber Security Issues

Facebook – Social Network founded by Mark Zuckerberg, 2.2 billion monthly active users

You probably use hundreds of different Internet services

Are your personal data safe within these companies?

• Is the data well protected (from hackers)? • Is the data sold to other companies (advertising purposes)? • Can you get an overview of the information stored on you? • Is it possible to delete it?

Data Security: Protect digital data (e.g., data in a database) from destructive forces and from the unwanted actions of unauthorized users (e.g., hackers, etc.)

Data Privacy: Issues regarding your personal data stored

Cyber Security is the practice of protecting systems, networks, and programs from digital attacks

Page 9: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

8

Cybersecurity, or computer security, is a catchall term for any strategy for protecting one’s system from malicious attacks aimed at stealing money, personal information, system resources (cryptojacking, botnets), and a whole host of other bad things. The attack might occur on your hardware or software, or through social engineering.

[https://www.malwarebytes.com/antivirus/]

GDPR: General Data Protection Regulation. EU directive. Purpose: Protect the privacy and the data stored, i.e., protection of your digital life The “Facebook/Cambridge Analytica” Issue:

• Facebook shared your personal data with Cambridge Analytica • Cambridge used the data in the US election • About 87 million people affected by the scandal

WannaCry

The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

1.2 Internet With the good, comes the bad. Since Internet connected all devices together a new era of our life was a fact.

Internet is great for many things, but it is also a great place for criminals.

Figure 1-2 we see the evolution of computers and internet from the early begging and until today.

Page 10: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

9

Figure 1-2: The Evolution of Computers and Internet

1.3 Internet of Things Internet of Things (IoT)

Smartphones, Smart Watches, Smart TVs, etc.

Everything is connected with Internet and online

Page 11: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

10

Figure 1-3: Modern Software Trends

Figure 1-4 shows the complexity of software development and different components that are involved.

Page 12: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

11

Figure 1-4: The Complexity of modern Software

For more information about creating modern software, please see my textbook "Software Development - A Practical Approach!".

Web:

https://www.halvorsen.blog/documents/programming/software_engineering/

Page 13: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

12

2. What is Cyber Security? Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.

These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes.

2.1 Hacking and Cyber Attacks What are Cyber Attacks?

What is Hacker? Who is hacking?

Private persons, professional organizations and even countries. The main goal is to make money or get information from other countries.

What is the goal with hacking?

2.2 Types of Cyber Security threats [https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html] Different types of Cyber Security threats:

• Ransomware • Malware • Social engineering • Phishing

These will be discussed more in detail below.

2.2.1 Ransomware Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid.

These include email phishing, malvertising (malicious advertising), and exploit kits. After it is distributed, the ransomware encrypts selected files and notifies the victim of the required payment.

Paying the ransom does not guarantee that the files will be recovered, or the system restored.

The most "famous" Ransomware is the WannaCry Ransomware.

Page 14: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

13

2.2.2 Malware Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.

Malware is short for “malicious software” (Norsk: skadelig programvare).

Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.

2.2.3 Social Engineering Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

2.2.4 Phishing Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources.

The aim is to steal sensitive data like credit card numbers and login information, or to install malware on the victim’s machine.

It’s the most common type of cyber-attack.

You can help protect yourself through education (teach them not to click on links, etc. from untrusted sources) or a technology solution that filters malicious emails.

Types of phishing attacks:

• Deceptive phishing - Deceptive phishing is the most common type of phishing. In this case, an attacker attempts to obtain confidential information from the victims. Attackers use the information to steal money or to launch other attacks. A fake email from a bank asking you to click a link and verify your account details is an example of deceptive phishing.

• Spear phishing - Spear phishing targets specific individuals instead of a wide group of people. Attackers often research their victims on social media and other sites. That way, they can customize their communications and appear more authentic. Spear phishing is often the first step used to penetrate a company’s defenses and carry out a targeted attack.

• Whaling - When attackers go after a “big fish” like a CEO, it’s called whaling • Pharming - pharming sends users to a fraudulent website that appears to be

legitimate. However, in this case, victims do not even have to click a malicious link to be taken to the bogus site

Page 15: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

14

2.3 Spam Spam is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes. It can be sent in massive volume by botnets, networks of infected computers.

Often, spam email is sent for commercial purposes. While some people view it as unethical, many businesses still use spam. The cost per email is incredibly low, and businesses can send out mass quantities consistently. Spam email can also be a malicious attempt to gain access to your computer.

Spam email can be difficult to stop, as it can be sent from botnets. Botnets are a network of previously infected computers. As a result, the original spammer can be difficult to trace and stop.

Spam email can be dangerous. It can include malicious links that can infect your computer with malware (see What is malware?). Do not click links in spam. Dangerous spam emails often sound urgent, so you feel the need to act.

2.4 How to be Secure? Here are some examples:

• Firewall • Antivirus and antimalware software • Access control • VPN • Wi-Fi Network • Education

These will be discussed more in detail below.

2.4.1 Firewall A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Firewalls are the first line of defense in network security.

A firewall can be hardware, software, or both.

2.4.2 Antivirus and Antimalware Software "Malware," short for "malicious software", includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.

Page 16: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

15

2.4.3 Access Control Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device.

Two Factor Authentication.

2.4.4 VPN A virtual private network encrypts the connection from an endpoint to a network, often over the Internet.

2.4.5 Wi-Fi Network Use only secure Wi-Fi networks, not open Wi-Fi network that don’t need password, etc.

2.4.6 Education By learning more about cyber security threats and how you can protect yourself as a private person or a company is crucial.

Page 17: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Part 2 : Cyber Attacks This part gives an overview common types of Cyber Attacks in our software-based world.

Page 18: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

17

3. Types of Cyber Attacks A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization.

Usually, the attacker seeks some type of benefit from disrupting the victim’s network.

Common types of cyber attacks:

• Malware • Phishing • Man-in-the-middle attack (MitM) • Denial-of-service attack (DoS) • SQL injection • Zero-day exploit

These will be discussed more in detail below.

3.1 Malware Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms.

Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software.

3.2 Phishing Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources.

The aim is to steal sensitive data like credit card numbers and login information, or to install malware on the victim’s machine.

It’s the most common type of cyber-attack.

3.3 Man-in-the-middle attack (MitM) Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

Two common points of entry for MitM attacks:

• On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.

• Once malware has breached a device, an attacker can install software to process all of the victim’s information.

Page 19: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

18

3.4 Denial-of-service attack (DoS) A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests.

Attackers can also use multiple compromised devices (Botnet) to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.

Botnet

A botnet is a network of devices that has been infected with malicious software, such as a virus. Attackers can control a botnet as a group without the owner’s knowledge with the goal of increasing the magnitude of their attacks. Often, a botnet is used to overwhelm systems in a distributed-denial-of-service attack (DDoS) attack.

3.5 SQL injection A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not.

An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.

[https://www.cisco.com/c/en/us/about/security-center/sql-injection.html]

3.6 Zero-day exploit A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time.

Page 20: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

19

4. Malware [https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html] Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.

Malware is a contraction for “malicious software” (Norsk: skadelig programvare).

Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.

Types of malware:

• Virus • Worms • Trojan virus • Spyware • Adware • Ransomware • Cryptojacking or Cryptomining malware

These will be discussed more in detail below.

4.1 Virus A virus is malicious software attached to a document or file that supports macros to execute its code and spread from host to host. Once downloaded, the virus will lay dormant until the file is opened and in use.

4.2 Worms Worms are a malicious software that rapidly replicates and spreads to any device within the network.

4.3 Trojan virus Trojan viruses are disguised as helpful software programs. But once the user downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or delete the data.

4.4 Spyware Spyware is malicious software that runs secretly on a computer and reports back to a remote user. Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators.

Page 21: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

20

Spyware is often used to steal financial or personal information.

A specific type of spyware is a keylogger, which records your keystrokes to reveal passwords and personal information.

4.5 Adware Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you.

While adware is not always dangerous, in some cases adware can cause issues for your system.

Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and spyware.

4.6 Ransomware Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so that the user cannot access it, and then demands a financial payout for the data to be released.

The most "famous" Ransomware is the WannaCry Ransomware.

4.6.1 WannaCry ransomware attack [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack]

The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

4.6.2 Norsk Hydro In the beginning of 2019 Norway's Norsk Hydro was hit by ransom cyber-attack.

Norwegian aluminum maker Norsk Hydro may have lost more than $40 million in the week that followed a cyber attack that paralyzed parts of its operations, and a full recovery of IT systems.

4.6.3 Cryptojacking/Cryptomining Malware Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.

[https://www.malwarebytes.com/cryptojacking/]

Page 22: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

21

Cryptocurrencies are forms of digital money that exist only in the online world, with no actual physical form. They were created as an alternative to traditional money, and gained popularity for their forward-looking design, growth potential, and anonymity.

Two words, “cryptography” and “currency”—combine to form “cryptocurrency,” which is electronic money, based on the principles of complex mathematical encryption. All cryptocurrencies exist as encrypted decentralized monetary units, freely transferable between network participants.

One of the earliest, most successful forms of cryptocurrency is Bitcoin.

Now also Facebooks together with others created a new cryptocurrency called Libra.

Page 23: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

22

5. SQL Injection SQL Injection is a type of attack by which cybercriminals exploit software vulnerabilities in web applications for the purpose of stealing, deleting, or modifying data, or gaining administrative control over the systems running the affected applications.

[https://www.malwarebytes.com/sql-injection/]

5.1 Introduction A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not.

An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.

[https://www.cisco.com/c/en/us/about/security-center/sql-injection.html] Structured Query Language (SQL) is used to query, operate, and administer database systems such as Microsoft SQL Server, Oracle, or MySQL. The general use of SQL is consistent across all database systems that support it.

Database systems are commonly used to provide backend functionality to many types of web applications. In support of web applications, user-supplied data is often used to dynamically build SQL statements that interact directly with a database. A SQL injection attack is an attack that is aimed at subverting the original intent of the application by submitting attacker-supplied SQL statements directly to the backend database.

5.2 Example Web Site:

<form action="/cgi-bin/login" method=post> Username: <input type=text name=username> Password: <input type=password name=password> <input type=submit value=Login>

SQL query executed by the web site for getting the user information:

select * from Users where (username = 'submittedUser' and password = 'submittedPassword');

SQL Injection #1:

Page 24: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

23

For example, if an application accepts and processes user-supplied data without any validation, an attacker could submit a maliciously crafted username and password. Consider the following string sent by an attacker:

username=admin%27%29+--+&password=+

The SQL query executed by the web site for getting the user information will be:

select * from Users where (username = 'admin') -- and password = ' ');

In this example, an attacker could successfully log in to the application using the admin account without knowledge of the password to that account.

Note that the string of two dash characters (--) indicates to the database server that the remaining characters in the SQL statement are a comment and should be ignored.

SQL Injection #2:

[https://www.w3schools.com/sql/sql_injection.asp]

A hacker might get access to user names and passwords in a database by simply inserting " OR ""=" into the user name or password text box:

The SQL query executed by the web site for getting the user information will be:

select * from Users where Name ="" or ""="" AND Pass ="" or ""=""

The SQL above is valid and will return all rows from the "Users" table, since OR ""="" is always TRUE.

5.3 Other Resources Here are some other resources regarding SQL injection:

Page 25: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

24

https://www.owasp.org/index.php/SQL_Injection

https://en.wikipedia.org/wiki/SQL_injection

https://www.w3schools.com/sql/sql_injection.asp

Page 26: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

25

6. How to be Secure? How can you avoid cyber attacks in general?

What can you do as a company or a private person?

Here are some examples:

• Passwords • Firewall • Antivirus and antimalware software • Access control • VPN • Wi-Fi Network • Education

These will be discussed more in detail below.

6.1 Passwords Make sure to use secure passwords, don’t use the same password for all your services and software systems.

6.2 Firewall A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Firewalls are the first line of defense in network security.

A firewall can be hardware, software, or both.

6.2.1 Web Application Firewall (WAF) A web application firewall (WAF) is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection.

The WAF software (or hardware) is installed on the server that runs the web applications or web sites.

A WAF is used for protection of a specific web application or set of web applications.

[https://www.owasp.org/index.php/Web_Application_Firewall]

[https://en.wikipedia.org/wiki/Web_application_firewall]

A WAF creates a shield between the web application and the Internet, which can avoid many common attacks.

Page 27: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

26

A WAF helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others.

[https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/]

Most professional hosting platforms offers some kind of WAP, like Amazon Web Services.

In addition, there are many WAF software you can buy and use, e.g., Imunify360.

6.3 Antivirus and antimalware software "Malware," short for "malicious software", includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.

The Windows 10 operating system has built in antivirus software called "Windows Defender".

The name "Antivirus" software is a little old, because viruses are just one kind of malware in today’s world of cyber threats. Though viruses still exist, there are other forms of malware that are more common these days, as mention in an earlier chapter.

6.4 Access Control Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device.

6.4.1 Two-factor Authentication Two-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication.

It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.

[https://en.wikipedia.org/wiki/Multi-factor_authentication]

A good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something the user possesses) and a PIN (something the user knows) allows the transaction to be carried out.

All the large providers of internet services, like Facebook, Google, Apple, etc. offers Two-factor authentication, you just need to turn it on.

Page 28: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

27

6.5 VPN A virtual private network encrypts the connection from an endpoint to a network, often over the Internet.

6.6 Web Hosting Providers Make sure to use professional Web hosting companies for your web sites.

You have the large Cloud platform providers like Amazon Web Services (AWS), Microsoft Azure, Oracle Cloud and Google Cloud Platform.

These large providers have a high level of security, they continuously update the systems with new security patches, etc.

6.7 Wi-Fi Network Use only secure Wi-Fi networks, not open Wi-Fi network that don’t need password, etc.

6.8 Operating System Make sure your PC and the operating system is up to date.

6.9 Education By learning more about cyber security threats and how you can protect yourself as a private person or a company is crucial.

Page 29: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Part 3 : Data Privacy You store lots of information about yourself when you use different devices, web sites and services. Can you trust that the data is safe?

Page 30: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

7. Introduction to Data Privacy Data Security: Protect digital data (e.g., data in a database) from destructive forces and from the unwanted actions of unauthorized users (e.g., hackers, etc.)

Data Privacy: Issues regarding your personal data stored

Facebook – Social Network founded by Mark Zuckerberg, 2.2 billion monthly active users

You probably use hundreds of different Internet services

Are your personal data safe within these companies?

• Is the data well protected (from hackers)? • Is the data sold to other companies (advertising purposes)? • Can you get an overview of the information stored on you? • Is it possible to delete it?

GDPR: General Data Protection Regulation. EU directive. Purpose: Protect the privacy and the data stored, i.e., protection of your digital life The “Facebook/Cambridge Analytica” Issue:

• Facebook shared your personal data with Cambridge Analytica • Cambridge used the data in the US election • About 87 million people affected by the scandal

Page 31: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

8. GDPR GDPR: General Data Protection Regulation

EU regulation. All countries and companies within EU need to follow the regulation. Also outside EU if the company save data about EU citizens.

Purpose:

• Protect the privacy and the data stored, i.e., protection of your digital life • Better control of your personal data

o What kind of data is stored? o Should be able to delete them

What is GDPR about? Data Protection and Privacy

Main contents:

1. You decide what kind of data that should be stored and what the data should be used for

2. Privacy statements: It should be clear what you say yes to 3. It should be possible to later delete the information stored

Page 32: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Part 4 : Internet of Things

IoT or Internet of Things and Cyber Security Issues

Page 33: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

9. Internet of Things (IoT) The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit.

Wikipedia:

https://en.wikipedia.org/wiki/Internet_of_Things

It is expected that all kinds of things will be connected to the Internet (Figure 9-1), e.g., lights, heating system, even the fridge.

Figure 9-1: Internet of Things (IoT)

...

Page 34: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

33

Web:

https://www.halvorsen.blog/documents/technology/iot/

Page 35: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

10. IoT and Cyber Security Maintaining a high level of security is critical when transporting the data around the IoT network. Information transmitted through this network can be anything from temperature sensor data in production machines to patient data recorded by X-ray machines in hospitals.

Business-critical information is often collected and reported in a central database located somewhere in the cloud or a local data center. When we have IoT devices containing so much sensitive data, security is absolutely essential for developers who want to take advantage of the benefits offered by IoT technology.

Page 36: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

11. Industrial Internet of Things and Industry 4.0

Industrial Internet of Things (IIoT) is another word for Industry 4.0. Security is crucial in IIoT applications.

IoT – Consumer oriented, Smart Home Solutions, etc.

IIoT – Industrial use of IoT Technology.

IoT often focuses on consumer-oriented products and solutions, while IIoT focuses industrial use of IoT technology.

11.1 SCADA Systems SCADA (Supervisory Control And Data Acquisition) is a type of Industrial Control System (ICS). Industrial Control Systems (ICS) are computer-controlled systems that monitor and control industrial processes that exist in the physical world.

Industrial Control Systems, like PLC (Programmable Logic Controller), DCS (Distributed Control System) and SCADA (Supervisory Control And Data Acquisition) share many of the same features.

Next Generation Control and Automation Systems/SCADA systems are closely related to Industrial Internet of Things (IIoT) and Industry 4.0.

Page 37: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Part 5 : Data Security An overview of different Data Security aspects.

Page 38: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

12. Data Security Data Security: Protect digital data (e.g., data in a database) from destructive forces and from the unwanted actions of unauthorized users (e.g., hackers, etc.).

Antivirus Software

Page 39: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

13. Antivirus Software ...

13.1 Operating System

13.1.1 Windows 10 ...

13.1.2 macOS ...

[https://www.malwarebytes.com/mac-antivirus/]

Page 40: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Part 6 : Software Security Testing

An overview of Software Security Testing.

Page 41: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

40

14. Software Security Testing 14.1 Introduction Penetration Testing

14.2 Test Standards ISO/IEC 27001

14.2.1 ISO/IEC 27001 ISO/IEC 27001 provides requirements for information security management system (ISMS). An ISMS is a systematic approach to managing sensitive company information so that it remains secure.

14.3 Test Tools ...

14.4 OWASP The Open Web Application Security Project (OWASP) is an organization focused on improving the security of software.

Web Site:

https://www.owasp.org

14.5 Test Platforms ...

Page 42: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

15. OWASP ...

Page 43: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

References • Cyber Security: https://www.cisco.com/c/en/us/products/security/what-is-

cybersecurity.html

• Data Security: https://en.wikipedia.org/wiki/Data_security

• GDPR: https://gdpr-info.eu

• GDPR - Wikipedia: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation

• What is Cyber Security? https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html

• MitM: https://en.wikipedia.org/wiki/Man-in-the-middle_attack

• Eavesdropping: https://en.wikipedia.org/wiki/Eavesdropping

• WannaCry: https://en.wikipedia.org/wiki/WannaCry_ransomware_attack

Page 44: Cyber Security - halvorsen.blog · A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic

Cyber Security