BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Search This Blog

Showing posts with label Week 4 Topics. Show all posts
Showing posts with label Week 4 Topics. Show all posts

Sunday, July 12, 2009

Threat of online security:HOw safe is our Data ?

Online security is a kind of defense strategy to ensure that the data in our computer is not being grant access unless through authorization by hackers, furthermore avoid virus attacks. These method of prevention no longer can guarantee that our data is safe.


Threats of online security:
1.Worm
Worm is a self-reproducing until it interupts the whole computer system. The examples of worms are Blaster, Sasser, Bagle and Code red which are all causing interruption to the windows systems.


2. Computer virus
Computer virus is actually a kind of computer software that can copy itself to any computer without permission of the user. The examples of computer virus is "I love you".


3. Trojan Horse


The terms trojan horse comes from a Greek Myth. Trojan Horse is a kind of Malware which allows hackers to grant access to computers without any authorization. The examples of threats which can be perform are uploading and downloading files from the computer.

4. Identity theft
Identity theft occurs when there is criminal who uses other person's identity as their own identity. It can also incluse misuse the identity of cresit card and mail fraud.

5. Denial-of-service attack
Denial-of-service attack is an attempt to to make computer resource unavailable for its user. It usually slows down network performance, unavailability of certain websites or inability to access to some websites.
Methods use to prevent threat to the online security to make sure that our data is safe.

1. Firewall
Firewall is a system which limits network access between two or more networks. However firewall cannot prevent virus from spreading to the computer systems.
2. Virus defense
Anti virus softwares are use to detect and terminate virus before it spread to our computer system. Unfortunately, anti virus sofware cannot prevent every type of virus as we know virus nowadays are keep on transforming and there are difficulties for the software engineer to create new virus defense. Therefore, data may also be destroyed.

Sunday, July 5, 2009

The application of 3rd party certification programme in Malaysia

What is third party certification programme?

Third Party Certification (TPC) or Certificate authorities (CA) is actually a a third party that developed to secure personal data from leaking through surfing any website or by making any transaction online such as making currency payment, uploading personal information and etc. Internet users must be total awared of fraud as well as information security, this is where TPC comes in. MSC Trustgate appear to be one of the TPC program applied in Malaysia since 1999.
However, Trustgate offers a complete security solution that needed by the e-commerce businesses wherein securing their information as well as personal data and customers valuable data. As CA, the core business of Trusgate is to provide digital certification services, including digital certificates, and cryptographic products, Managed Public Key Infrastructure (PKI - enhance organization's security of data thus managing the identification credential from users and organization), Personal ID, My Trust, MyKad ID, Managed Security Services, VeriSign Certified Training and Application Development.

MyKad PKI
MyKey is a digital certificate that loaded into MyKad. The enrollment of this programme is accepted in Malaysia since 1997. MyKey provide highest protection for your data and transaction online and reliance limit for fraud protection.

Furthermore, Secured Sockets Layer (SSL) also appear to be one of the best solution to build Internet users' trust. During having an online negotiation or trasaction, SSL CA provides security of confidential communications and identifies individuals and websites on the Internet uniquely by serving as a sort of digital passport or credential.
VeriSign SSL Certificates is the public encrypted key that Webmaster sends to CA, which will then review on the credentials and check through all the background of the organization to ensure that the claim of organization before issuing any server certificates. VeriSign is one of the most trusted brand on Internet where it further enhanced the operation of e-commerce by giving Internet users more confidence to communicate and do transaction online.

Friday, June 26, 2009

Phishing: Examples And Its Prevention Methods



What Is Phishing?


In the field of computer security, phishing is a form of criminal activity using social engineering techniques. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.

You might see a phishing scam:

In e-mail messages, even if they appear to be from a coworker or someone you know.

On your social networking Web site.

On a fake Web site that accepts donations for charity.

On Web sites that spoof your familiar sites using slightly different Web addresses, hoping you won't notice.

In your instant message program.

On your cell phone or other mobile device.


Often phishing scams rely on placing links in e-mail messages, on Web sites, or in instant messages that seem to come from a service that you trust, like your bank, credit card Company, or social networking site.

Typically, phishing attacks will direct the recipient to a web page designed to mimic a target organization’s own visual identity and to harvest the user's personal information, often leaving the victim unaware of the attack. Obtaining this type of personal data is attractive to black hats because it allows an attacker to impersonate their victims and make fraudulent financial transactions. Victims often suffer significant financial losses or have their entire identity stolen, usually for criminal purposes. As a successful and lucrative form of financial fraud, phishing made its mark on the networked landscape in 2004. Today, it is a booming segment of the identity theft “industry”. In January of 2004, there were 174 phishing Web sites identified by the cross-vendor Anti-Phishing Working Group. By December, there were over 1700. Finally, that year, the reported consumer loss due to Internet-based fraud was estimated between US$500 million (according to the Federal Trade Commission) and US$2 billion (according to the Anti-Phishing Working Group). Financial institutions and law enforcement agencies alike were ill-prepared to deal with organized, technically literate, internationally-based criminals.


Examples of Phishing Scam


Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, Best Buy, and America Online.

This phish claims that Washington Mutual Bank is adopting new security measures which require confirming ATM card details. As with other phishing scams, the victim is directed to visit a fraudulent site and any information entered on that site is sent to the attacker.

The email warns that failing to comply with the instructions may result in account suspension. Note the use of the SunTrust logo.This is a common tactic with 'phishers' who often use valid logos they have simply copied from the real banking site in an attempt to lead credence to their phishing email.

As with the SunTrust example, this eBay phishing email includes the eBay logo in an attempt to gain credibility. The email warns that a billing error may have been made on the account and urges the eBay member to login and verify the charges.

There is no shortage of irony in the Citibank phishing example. The attacker claims to be acting in the interests of safety and integrity for the online banking community. Of course, in order to do so, you are instructed to visit a fake website and enter critical financial details that the attacker will then use to disrupt the very safety and integrity they claim to be protecting.

As seen with the previous Citibank phishing scam, the Charter One phishing email also pretends to be working to preserve the safety and integrity of online banking. The email also includes the Charter One logo in an attempt to gain credibility.

PayPal and eBay were two of the earliest targets of phishing scams. In the example, this PayPal phishing scams tries to trick recipients by pretending to be some sort of security alert. Claiming that someone 'from a foreign IP address' attempted to login to your PayPal account, the email urges recipients to confirm their account details via the link provided.

As with other phishing scams, the displayed link is bogus - clicking the link actually takes the recipient to the attacker's website.A security flaw on a US government website has been exploited by a phishing scam claiming to be an IRS refund notification. The phishing email claims the recipient is eligible for a tax refund of $571.94. The email then tries to gain credibility by instructing recipients to copy/paste the URL rather than clicking it. That's because the link actually does point to a page on a legitimate government website, http://www.govbenefits.gov. The problem is, the page being targeted on that site allows the phishers to 'bounce' the user to another site altogether.


Prevention methods


There are several (technical or non-technical) ways to prevent phishing attacks:

  • Educate users to understand how phishing attacks work and be alert when phishing-alike e-mails are received;
  • Use legal methods to punish phishing attackers;
  • Use technical methods to stop phishing attackers.


Social Responses


Users who are contacted about an account needing to be "verified" can take steps to avoid phishing attempts, by contacting the company that is the subject of the email to check that the email is legitimate, or by typing in a trusted web address for the company's website into the address bar of their browser, to bypass the link in the suspected phishing message. The Anti-Phishing Working Group, an industry and law enforcement association has suggested that conventional phishing techniques could become obsolete in the future as people are increasingly aware of the social engineering techniques used by phishers. They propose that pharming and other uses of malware will become more common tools for stealing information.


Legal Responses


Microsoft has joined the effort to crack down on phishing. On March 31, 2005, Microsoft filed 117 federal lawsuits in the U.S. District Court for the Western District of Washington. The lawsuits accuse "John Doe" defendants of using various methods to obtain passwords and confidential information. March 2005 also saw Microsoft partner with the Australian government to teach law enforcement officials how to combat various cyber crimes, including phishing. Microsoft announced a planned further 100 lawsuits outside the U.S. in March 2006.


Technical Responses


If we can cut off one or several of the steps that needed by a phishing attack, we then successfully prevent that attack.

  • Detect and block the phishing websites in time:

If we can detect the phishing Web sites in time, we then can block the sites and prevent phishing attacks. It’s relatively easy to (manually) determine whether a site is a phishing site or not, but it’s difficult to find those phishing sites out in time.

  • Enhances the security of the websites:

One method to enhance the security is to use hardware devices. Another method is to use the biometrics characteristic (e.g. voice, fingerprint, iris, etc.) for user authentication. With these methods, the phishers cannot accomplish their tasks even after they have gotten part of the victims’ information. However, all these techniques need additional hardware to realize the authentication between the users and the Web sites hence will increase the cost and bring certain inconvenience. Therefore, it still needs time for these techniques to be widely adopted.

  • Block the phishing e-mails by various spam filters:

The phishers hide their identities when sending the spoofed e-mails, therefore, if anti-spam systems can determine whether an e-mail is sent by the announced sender, the phishing attacks will be decreased dramatically. From this point, the techniques that preventing senders from counterfeiting their Send ID can defeat phishing attacks efficiently. The spoofed e-mails used by phishers are one type of spam e-mails. From this point of view, the spam filters, can also be used to filter those phishing e-mails. Most of these anti-spam techniques perform filtering at the receiving side by scanning the contents and the address of the received e-mails. Furthermore, spam filters are designed for general spam e-mails and may not very suitable for filtering phishing e-mails since they generally do not consider the specific characteristics of phishing attacks.

  • Install online anti-phishing software in user’s computers:

Despite all the above efforts, it is still possible for the users to visit the spoofed Web sites. As a last defense, users can install anti-phishing tools in their computers. The anti phishing tools in use today can be divided into two categories: blacklist/white list based and rule-based.


Related links:

  1. http://en.wikipedia.org/wiki/Phishing
  2. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916037,00.html
  3. http://www.honeynet.org/papers/phishing/
  4. http://www.microsoft.com/protect/yourself/phishing/identify.mspx
  5. http://antivirus.about.com/od/emailscams/ss/phishing_9.htm
  6. http://y2u.co.uk/Knowledge_Information/Technology/RN_Computer_Phishing_Scam.htm
  7. http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf

Tuesday, June 23, 2009

How to safeguard our personal and financial data?

Internet is very common in nowadays. Every person need to use computer to complete their task or job everyday. They all rely on computer to save our personal data and through online financial services to do the financial transaction such as online payment, online banking to save time.

It is very convenient but internet is not a safe place especially for those people using online banking or payment. It is because hackers have the expertise and ability to intercept and do falsely when they using the information such as credit card numbers. So we need to take some prevention to increase internet security and decrease the probability of data being stolen. There are some suggestions stated in below:

  1. Avoid using password that easy for memorize, use those password hardly to guess by other people. Beside that, don’t write down the password and carry it in your wallet. Use combination of numbers and letters if it possible
  2. Install or use updated antispyware and antivirus software to protect. For example, Symantec, Norton and Avg antivirus are most popular software use by computer users. Its clean computer and protect personal information, financial data and etc.
  3. Avoid accessing financial information in public. User must avoid logging in to check its own bank account or other sensitive personal data when using a free wireless connection that outside coffee shop, airports and other public places provided.
  4. Biometric device. Biometric devices using some biometric identifier to access program, computers or rooms to safeguard our own personal and financial data. Those biometric devices include fingerprint scanners, hand geometry systems, face recognition systems, voice verification systems, signature verification systems and iris recognition systems. Advantages of using this method is the data won’t lose although it is being stolen.

Additional informations:
1) Six ways to safeguard your online assets
2) Keep your financial data safe online
3) http://www.us-cert.gov/cas/tips/ST06-008.html
4) http://www.msisac.org/awareness/news/2007-03.cfm