Monday, September 30, 2019

Cyber Security Modern Geo location Variations

Modern Geo location Variations are classified based on three
  • Triangulation
  • Trilateration
  • Multiateration
Triangulation:
Triangulation is actually just an average of latitudes and longitudes gathered using the signal strength squared as the weight is called as weighted centroid Trilateration.
Triangulation assume the signal strength will change at the inverse square of the distance.

Triangulation is the process of determining the location of a point by measuring angles to it from known points at either end of a fixed line.


You can check how to triangulate using above link.

Trilateration:
Trilateration is the process of determining absolute location of points by measurement of distances using the geometry of circle, spheres or triangles.

To check Trilateration check the below link


Ekahau Software:
Software used for site survey planning, mobile surveys, spectrum analyser and heat mapper.

Accuware:
Accuware used to WiFi location monitor. No mobile application required for the target.

Multiateration:
Multilateration is a navigation and surveillance technique based on the measurement of the times of arrival of energy waves having a known propagation speed. Multilateration is used by military forces to find the exact geo location of target based on the time difference.

Hill Station view :


Cyber Security Radio Location

Geo location:
Geographic location of object such as radar, mobile phone or Internet connected computer terminal.

Radio location:

Radio location is a technique used to find the location through radio waves in certain geographical area.

Radio location techniques:


  • Recieved signal strength (RSSI)
  • Time of arrival (TOA)
  • Time difference of arrival (TDOA)
  • Angle of arrival (AOA)

RSSI:Recieved Signal Strength:
  • Recieved signal strength is used to measure the distance at which signal received.
  • Received signal strength can be influenced by weather, terrain and antenna.

TOA:Time of Arrival:
  • Time of arrival is time of transmission and speed of propagation are known as TOA.
  • Clock skew at fast RF speeds, amplifiers, errors.

TDOA:Time Difference of Arrival:
  • Time difference of arrival is a combined TOA data from several receivers is known as TDOA.
  • Multiple clock skew faster RF speeds, amplifiers, errors.

AOA:Angle of Arrival:
  • Angle of arrival is determined by the use of directional antenna by correct way.
  • AOA can be easily influenced by antenna design and other factors.

Hill Station view :


Cyber Security Geo location

In Cyber security most important topic is Geo Location, by currently technology this plays a vital role.

Electromagnetic Radiation:

  • Electromagnetic radiation is a radiant energy, this em light is invisible, such as radio, infrared, and x rays.
  • The speed at which this waves oscillates is known as frequency.


Decibels:(dB)

  • Decibels logarithmic unit is dB is used to express the ratio of two values of quantity.
  • dB means it is a Isotropic physical property that has the same value when measured from different directions.


War driving:

  • Electron leaving antenna are equivalent to some one yelling loudly.
  • Using war driving attacker decrypt the signal in moving vehicle which is illegal to our law. Apart from country security issues.


Definition for War driving:

War driving is the act of searching for WiFi (wireless networks) by a person in moving vehicle. Using portable computers, smartphone.

Some of the tools are  used to find the signals.

Netspot - used to find radio signal leak for windows and mac.
Kismet-used to find wireless intrusion in Linux system.
WIGLE WiFi - used by Android to find the wireless intrusion.

Antenna:
Antenna has 8 dB isotropic value.

Yagi-Uda Antenna:
Yagi uda antenna is a directional antenna it has the value of 17 dB.
Yagi-Uda antenna every 3dB increase is a doubling of the power or intensity.

Omni directional antenna:
Omni directional works in all direction and it has overall gain of 15 dB.

WiFi access:
For WiFi every SSID will be unique in name

Top ten SSID includes xfinity WiFi, linksys, <no SSID>, NETGEAR, dlink, ziggo, HP setup(adhoc)

Note:IP and Mac address can easily spoofed.

Hill Station view :



Saturday, September 28, 2019

Cyber Security VPN uses

VPN for mobile:
  • Cyber Security is important for VPN usage.Virtual private network should be used in open network like using cisco anyconnect, we can able to connect.
  • While travelling VPN can be used to ensure security by accessing intranet.
  • Always use VPN to protect identity Nd location details when you connecting to Internet
For demo please look at the below diagram to understand, when you connecting to WiFi network through mobile.

VPN for Mobile









Whenever you are connected from end device it will go through firewall and firewall block unwanted access.Then through tagged VPN go to routing process and routed to private network for intranet. And without Vpn directly connected to firewall through routing process to access online video streaming and gaming.
  • Enable your end device with firewall using online tools like Glasswire. Glasswire enables firewall in end device.
  • Enable mobile device with VPN, private Internet access (PIA) used to connect via VPN
  • Analyze the WiFi network using quick look. Enable connectify for routing.

Hill Station view :


Friday, September 27, 2019

Cyber Security Threats and Counter Measures

Cyber security Threats are indicators or bugs in environment or software. Which can cause huge impact the business or an individual. Which will impact business reputation and theft of personal data etc.

Counter Measures are used to mitigate the security issues in Cyber security. Threats like..
  • Sniffing
  • Dns attacks
  • Man in middle attack
  • Phishing
  • Viruses
  • DOS
  • Always try to use virtual private network (VPN)  in open network. VPN like cisco any connect provide high encryption and ensure security in network in which you are connected.
  • Whenever user try to access websites use the https in search engines in address bar.
  • Because whenever you use Http which has a bug all your data will not be encrypted, so if you are logging in through http enabled website which will have unencrypted password and username in Web cache.
  • HTTPS is a hyper text transfer protocol secure which will enable encrypted tunnel.
  • HTTPS uses SSL (Secure Socket Layer) or TLS security certificates enabled. So all the data in the websites will be encrypted. Even Web cache also encrypted due to session hijacking issues  session I'd also encrypted using https.


SSL (Secure Socket Layer):
  • SSL is a socket layer security used in application layer. SSL is a Asymmetric cryptography uses public and private key encryption.
User -> Message(Public Key Encrypt) - >Message (Private Key)->Secret key used to decrypt on destination end.
  • AES-Advanced encryption standard algorithm cipher approved by NIST in 2011. 
  • Other ciphers includes twofish, Blowfish which used to replace DES algorithm. RC4, 3DES are ciphers with more number of bits.

Transport Layer Security(TLS):
  • TLS 1.0 is a very bad idea and unsafe. TLS 1.0 Can be POODLEd, BEASTed and otherwise padding-Oracled Database as well. Lots of other CVE weaknesses still apply which cannot be fixed unless by switching TLS 1.0 off.
  • TLS 1.1 is only a bad compromise though it is halfway free from TLS 1.0 Problems (but since both protocols do not provide any modern cipher mode which are essential today, the modern encryption methods do not work here)
  • TLS 1.2 with CBC Ciphers ON and also RSA on is kind of a Number play whether your connections are entirely safe or not. Which depends on how the ciphers are implemented on either side of the Connection from Server to Client browser. 
  • TLS 1.2 without any CBC Ciphers (that means also plain RSA handshakes off) is safe enough only TLS 1.3 is safer because of its handling improvement and the exclusion of everything that went obsolete since TLS 1.2 came up.
  • TLS 1.3 uses all algorithm for key exchange except Deffie-hellman algorithm. TLS 1.3 users certificates in server and Client, hacker unable to modify any information while in handshake. 
  • TLS 1.3 also uses RSA-PSS, this RSA-PSS is immune to cryptographic attack. One of the safest method is TLS 1.3.
All other encryption methods are unsafe 64bit including 3DES and RC4 ciphers are already disabled.
  • TLS 1.0 was published as RFC 2246 in the year 1996
  • TLS 1.1 was published as RFC 4346 in the year 2006
  • TLS 1.2 was published as RFC 5246 in the year 2008
  • TLS 1.3 was published as proposed standard in RFC 8446 in the year 2018.

Hill Station view :


Cyber Security Open vs Secure Wireless Network

WEP:Wired Encryption Privacy
  • WEP is a wired encryption privacy is a algorithm used in wireless standard IEEE802.11 to secure the WiFi connection it was introduced in 1997.
  • WEP was cracked and available publicly in 2001, which was cracked  the attacker and  eavsdropping methodologies attacker crab the information of user. WEP uses CRC used for key exchange. CRC is a cyclic redundancy check.
  • In 2005 FBI demonstrated in public, how an WEP can be cracked in 3 minutes.cyber security is important. 

WPA:Wireless Protected Access
  • WPA is a wireless protected access is a secure algorithm used by WPA. WPA Introduced on 2004 and which uses TKIP. 
  • TKIP is a Temporal Key Integral protocol used by WPA used to confirm the integrity of messages which send through wireless access.
  • WPA (TKIP) can be cracked in 7 minutes. Lot of tools available to crack WPA password.
  • Both WEP and WPA uses bad encryption standard. Encryption standard are concentrated by NIST cyber security. 

WPA2:Wireless Protected Access 2
  • Wireless Protected Access 2 is a standard used by WiFi standard IEEE802.11i. Which is introduced to enhance the security to overcome issues in WPA. WPA is uses CCMP.
  • Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) ensures message is properly encrypted. WPA2 uses advanced encryption standard(AES) to increase the security.
  • WPA2 is vulnerable with weak password so we need use Complex passwords and good encryption standard as recommended by cyber security. 

Hill Station view :


Tuesday, September 24, 2019

Cyber Security Netgear Nighthawk AX88 AX6000 WiFi 6 Router

Netgear Nighthawk WiFi 6 Router:


  • Wireless router AX8 amazing speed of up to 6 Gbps fast combined WiFi speed.
  • Netgear Nighthawk WiFi AX8 router is a award winning from Red dot and IF design award.
  • Netgear Nighthawk supports about 8 spatial streams in that four spatial streams support  2.4 GHz and remaining four spatial streams support 5 GHz band.
  • Netgear Nighthawk WiFi 6 is four times  the device capacity as compared to 2*2 IEEE802.11ac WiFi standard.
  • Multi Gigabit enables customers to get more than one Gbps of Internet access through aggregation.
  • Netgear Nighthawk WiFi 6 Router cost around 35999/- in indian rupees.

Hill Station view :


Cyber Security Tenda AC10 Smart Dual Band Gigabit WiFi Router

Network AC10 Wireless Router:
  • AC10 Smart  Dual Band WiFi router provides dual band wireless speed of 1167 Mbps.
  • AC10 wireless router which is three times  higher than wireless IEEE802.11N speed.
  • AC10 supports and guarantees stable online gaming and 4K video streaming.
  • AC10 wireless router also expects MU-MIMO  and beamforming+ technology features,  which increases the higher ranger of coverage and stable performance.
  • This is a wall router MU-MIMO technology provides a stable wireless connection and increases the quality of connected clients and data processing.
  • Beamforming technology boosts ranges for IEEE802.11ac wave 2 WiFi devices.
  • AC10 wireless router is very low price 2500 in Indian rupees.

Hill Station view :



Cyber Security Twitter Tweet Hide And Unhide Reply Feature

Twitter Tweet Hide feature:

  • Twitter was rolled out to test its users located in Japan and USA.
  • Because of this feature, where user can hide hurtful or irrelevant replies to thier tweets in twitter. And it will make more positive conversation.
  • If this feature enabled and tested means it will stop lot of misunderstanding and all free to express thier thoughts without any hindrance.
  • The micro-blogging has been under pressure to reduce the fight, abuse, harassment on this platform. 
  • Currently this feature is enabled for users in Japan and USA. To Hide reply now click on the grey downward arrow on right hand corner of tweet and then click  on the option on drop down 'hide reply'. 
  • Users can also find  'unhide reply' icon on the bottom right of the tweet, will indicate If any replies has been hidden. 

Hill Station view :



Cyber Security While Travelling

Security while Travelling:

We need to be always secure when travelling. Because while travelling only we try to access free hotspots and Wi-Fi

Travel triangle of security:
We are in travel need to consider below three things
  • Security
  • Convenience
  • Mobility
OODA is a short word to describe
O-Observe
O-Orient
D-Decide
A-Act

Security Consideration:
  • Privacy access and flexibility is important in security.
  • Layers of protection to end device will prevent from threats.
  • We need to evaluate threat in constant manner. Compare ease of use and convenience.
  • Security issues validated and solved by software and manufacturers.

Wireless situations:
  • WiFi is wireless fidelity which ranges from 2.4Ghz-5.4Ghz. And WiFi are standardised by IEEE802.11, IEEE802.11a, IEEE802.11b,IEEE802.11g, IEEE802.11n, IEEE802.11ac and IEEE802.11ax.
  • WiFi uses encryption like WEP, WPA these are bad encryption which can be easily cracked. Good encryption used is WPA2. 
  • Maximum speed WiFi support is 1 G/s.
  • The frequency band for Bluetooth is around 2.4Ghz. Bluetooth supports about 10 meter range.


Wired situation:
  • Wired is faster speed than Wi-Fi.Passive tabs will be behind the wall. All device will be fully secured with high production.
  • Not usually a network encryption employed. Apart from any financial services they will deploy the network with encryption.


Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Apple iPhone IOS 13.1 Version

IPhone IOS 13.1 version:

Main objective of IOS 13.1 is to provide CPU  throttling to iPhone. According to IOS software,  throttling process or a throttling controller as it is sometimes called as a process responsible for regulating the rate at which application processing is conducted, either statically or dynamically.

When Apple rolling out to IOS 13 for iPhones and watchOS 6 for the Apple watch series. Apple planned to add feature of throttling CPU. The iPhone maker is expected to release the IOS 13.1 with throttling feature for iPhone XS and iPhone XR. Apple find out throttle CPU found on iPhone on year 2017.

Newer iPhone models have advanced monitoring features to reduce CPU throttling. IOS 13.1 for iPhone was released on 24th September 2019.  It will bring several features that ever avoided for initial IOS 13, features are included in new version.

New versions features are automated Siri shortcut actions, a share ETA feature in Apple Maps and data separation for enterprise devices.

IOS 13.1 version also fixes some Bugs in iPhone IOS 13 version

Hills Station view :



Blog for securing you from modern threats from hackers:

Sunday, September 22, 2019

Cyber Security Skype For Business and Dropbox

Skype For Business:
  • Skype is designed to help business communication which is developed by Microsoft.
  • Skype uses transport layer security protocol which establishes connection by encryption of message.
  • Skype uses voice call based SIP session initiation protocol. Which is a communication protocol in video or voice.
  • To avoid Skype affected by Malware or virus which needs to be kept OS updated.
  • Avoid unwanted call through Skype through VOIP(Voice Over IP).

Skype Vulnerabilities:
  • In MS version 7.2.7.35, 7.2.7.36  both the version hackers has the ability to inject malicious code.
  • Most important is Skype is a peer to peer application which is distributed over virtual network. Adware and Malware in peer to peer application is possible.
  • Skype can be attacked by peer to peer by DDOS attacks, also able to gather personal identifiable information.

Recommendations:
  • To avoid any attack use NIDS in network to find intrusion detection system.
  • To avoid attack keep the Skype patched and updated.
  • By effectively monitoring the Skype continuously, we can avoid the attack.


Dropbox:
  • When you're using Dropbox go to system preferences->security and privacy -> access ability to confirm, everything be normal.
Recommendation:
  • Always keep update the security patches every 30 days.
  • User should change their password frequently.

Security Practices When Connecting To Cloud:
  • End to End protection by encryption and decryption in source and destination.
  • Always remember to encrypt the files whatever you are using.
  • Best encryption method used is AES-256.
  • Check for unauthorised software on our environment.
  • Always use the sites with HTTPS.

Hills Station view :



Blog for securing you from modern threats from hackers:

Saturday, September 21, 2019

Cyber Security Trend Micro Bracket Cloud Application Security Brokers

Most of the cloud tools runs in a Software containers as a instances with maximum security as per cloud standards.

Trend Micro and AWS:
  • Trend Micro deep security integration with AWS. 
  • Trend Micro defend against network attacks. 
  • Intrusion detection system /Intrusion prevention system. 
  • Trend Micro supports and virtually patch software. 
  • Keep Malware off Windows and Linux workloads.
  •  Identify and remove Malware and block the traffic known for bad domains. 
  • Uncover suspicious changes in environment. 
  • Get alerts for unplanned or malicious changes.
  •  Suspicious events are highlighted in the  dashboard of trend micro. 
  • Trend Micro speeds up the PCI-DSS Complaince. 

Bracket:
Bracket is a Metavisor used in advanced infrastructure services for management.

Cloud Application Security Brokers(CASB):
  • CASBs provide visibility into which Cloud services your organisation using. 
  • CASB can reveal "shadow IT"  as well as reveal cloud misuse and data classification, violations and data loss. 
  • CASB monitors all appliance proxy, Dns and everything in environment. 

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Splunk Tool and Dome 9

Most of the cloud tools runs in a Software containers as a instances with maximum security as per cloud standards.

Splunk Tool:

  • Splunk Tool used as an Web interface which supports data virtualization platform for day to day IT operation for security use case.
  • Splunk Tool is used in AWS and Google Cloud Platform. 
  • Splunk uses a bring your own license (BYOL) model on AWS Market Place, also Cloud can be build by
  • Splunk enterprise
  • Splunk Cloud 
  • Splunk with Hadoop 
  • Splunk lite

Dome 9:

  • Dome 9 tool provides policy  control for AWS EC2 (Elastic compute cloud) instance and VPC (virtual private cloud) security groups. 
  • AWS Cloud services like change management control, configuration management and audit control. 
  • Dome 9 Tool can detect tampering, abuse and stop unauthorised /non permitted configuration changes.
  • Dome 9 also monitor firewall policy Management and Complaince audit reporting.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Security Implications Of Software Containers

Software containers security:

Cloud applications are on run and operated in software containers.

  • Many cloud applications operate using software containers whereby an application has been decomposed into stateless application that runs in a separate software containers instances.
  • Software containers is instantiated within the kernel of the OS and virtualize the instances of applications.
Container architecture
Software containers architecture 

  • Software containers share the same kernel at the host key the run On. If kernel is vulnerable, kernel will be updated. 
  • Soft containers supports rapid scalability.

Hills Station view :



Blog for securing you from modern threats from hackers:

Friday, September 20, 2019

Cyber Security Best Practices Digital ocean cloud Salesforce Cloud Storage Security

Digital Ocean Cloud Security:
  • Digital Ocean Cloud is a popular development cloud service of Web based application.
  • Digital Ocean Cloud customers bears a lot of responsibility to secure.

Salesforce.com:
  • Salesforce.com Cloud service provider  which is a CRM SAAS (software as a service) provider.
  • Most of the responsibility falls on salesforce
  • Key consideration comes under customer responsibility.
  • User authentication, SAML, OAuth roles permission are services in Salesforce Cloud.
  • Salesforce Cloud security uses source code scanner.

Cloud Storage Security:
  • Always securing the cloud storage is considered as critical.
  • Mostly in cloud storage security authentication used are Multifactor authentication, SSO (single sign On), federated identity management.
  • Security also based on audit trails, reporting and logs on file storage and access.
  • Role based access access controls
  • Encryption is a important  prior to storage, files should be encrypted.
  • Data dispersion is used to ensure the availability of data on disaster.
  • Data classification based on markings and monitoring.


Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Best Practices For Microsoft Azure and Google Platform

Security best practices done by Microsoft Azure and Google cloud platforms are

Microsoft Azure:
  • Microsoft Azure cloud computing used for IAAS(infrastructure as a service ) and PAAS(platform as a service). 
  • Microsoft Azure holds the all certification and accreditation recommendation. 
  • Microsoft Azure uses their own documented security development life cycle(SDLC), Operational security assurance (OSA processes). 
  • Microsoft Azure offer AD (active directory) authentication, encryption, DDOS prevention key Vault. 
  • Microsoft Azure uses global threat intelligence to ensure security detection and prevention. 
  • Microsoft Azure cloud offer trust center. 

Google Cloud Platform security:
  • Google Cloud Platform is a suite of IAAS(infrastructure as a service ), cloud service provider services and leverages their own infrastructure used for search and YouTube.
  • Like other IAAS, Google Platform cloud also uses shared security responsibility model. Customers learns a lot of responsibility to secure their access, applications and storage but Google also provides tools to secure.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security CSA Cloud Security Alliance

CSA- Cloud Security Alliance
CSA is a group for security guidance for creating areas of focusing cloud computing.

Assessments includes
  • Level-1->Basic self assessment 
  • Level-2->3rd  party assessment 
  • Level-3->Continues monitoring

Cloud Computing Security Threats:

Security threats which are top three given below,
  • Insecure interfaces and API's about 29 %. 
  • Data loss and leakage about 25%.
  • Hardwares failures about 10%.

CSA publishes Top 7 threats
CSA published threats which is considered as breaches in network in attacker perspective.
  • Abuse and nefarious use of Cloud Computing. 
  • Insecure interface and API's
  • Malicious Insiders in network 
  • Shared Technology issues in cloud. 
  • Data loss or leakage in cloud. 
  • Unknown risk profiles. 
  • Account or service hijacking. 
  • Data breaches. 
  • Compromised credential and broken authentication.
  • Exploited system Vulnerabilities. 
  • DOS attacks
  • Cloud service abused. 
  • Permanent data loss. 
CSA is mostly used to stop security issues in cloud infrastructure.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Cloud Security Consideration

Cloud Security Consideration
  • Cloud security is considered as important and when you design a network we need to follow standards recommended by certain groups.
  • By the means of hyper jacking in 2014 many customers data are exposed when aws hack happened. And development company codespaces reputation got damaged and loss was heavy.


Cloud Compliance Assurance:

Compliance assurance is important to maintain the security on network using standards like,
  • ISO27001
  • PCI-Payment Card industry DSS level 1 service provider.
  • AWS Cloud Complaince.
  • AICPA-American Institute Of certified accountant is always want to make sure organisation are using reliable and secure environments.
  • SSAE(16)
  • SOC-Service organization controls.


ISO/IEC Cloud Security Standards:
  • ISO/IEC 17788:2014 is a information security cloud computing overview and reference.
  • FISMA (act) (DIACAP)
  • Cloud providers may also be required to meet US international traffic in Arms Regulations(ITAR).
  • FIPS(140-2) is used for cloud network its  keys and encryption also protected.
  • Fed RAMP is a accreditation given by cloud provider, they ensure keys and encryption are protected.
  • Third Party accreditations like walfire, kratos, secure-info, Veris-group among others.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Breaking Down Cloud Security

Breaking Down Cloud Security
Cloud security can be analysed by each segments.

Overview of Cloud Computing:
We are going to see below
  • Security Implication
  • Five Essential Characteristics Of Cloud
  • Four Deployment Models
  • Cloud service Models
  • NIST Guidelines On Cloud Security

Security Implications:
  • Data confidentiality and privacy are important for cloud network.
  • Classification and marking data based on Cloud.
  • Cloud network guarantees available resources.

Five Essential Characteristics Of Cloud:
  • On demand self service
  • Broad network access
  • Resource pooling
  • Rapid elasticity
  • Measured services

Four Deployment models:

Public Cloud Network:
Public cloud network is used by general public over the Internet system exists with cloud providers

Private Cloud Network:
Private cloud used by single organisation systems and infrastructure will be on premises or with third party control.

Hybrid Cloud Network:
Hybrid cloud network services uses two or more distinct cloud infrastructure by the combination of public and private cloud.

Community Cloud:
Community cloud is a collection of organisations that share an affiliation operated by organisations or third party.

Cloud Services Model:

IAAS:Infrastructure as a service 

IAAS is a service provider will give infrastructure as a service.
Servers/Network/Storage devices.

PAAS:Platform as a service

PAAS is a service provider will give platform as a service. Support O/S - middleware/dev tools/hypervisors.

SAAS:Software as a service 

SAAS is a service provide will give software as a service. Salesforce.com/VDI/VX11/Google Docs/Drive/HCS.

NIST: National Institute Of Standards And Technology:
  • NIST is a cloud computing Public security work group, which will used standard for security.
  • NIST SP 500-292,NIST SP 500-293, NIST SP 500-299 for vol 1,2,3.NIST cloud computing reference architecture.
  • NIST SP 800-144,NIST SP 800-145,NIST SP 800-146  are the guidelines for security in cloud environments. 

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Social Networking Privacy

Social Networking Privacy
  • Privacy is important for everyone. Privacy is condition of being free from observed or disturbed by other people.
  • Privacy is limit on power to access .
Facebook(Tracking):
  • Facebook tracking is based on privacy allowed by the user.
  • Facebook makes money from advertisers not from the users so you are free to use applications.
  • Facebook uses cookie tracking, which tracks our paths across Internet.
  • Facebook uses behavioural based advertising is the term used to describe the practice of tailoring advertisements to individuals personal interests.
Based on the technology advancement, according to hackers, social network are good platform used for identity theft.
  • 23% of Facebook users check their profile 5 times in a day.
  • Two new users joined in LinkedIn in every second.
  • Twitter has 320 millions of active users which is a medium to shared your thoughts and OKcubid has 25 millions of active users. which is a dating sites.

Locational privacy:
  • Location privacy is important which is misused by hackers, please turn off geo locations on photos.
  • Social media sites are used to cyber bully people.

Hackers Target Social media:
Most of the hackers uses social media to gather information. Used to identify theft by hackers and he tries to access Facebook accounts.

To protect from this type of attack, keep your browser/OS update-to-date.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Social Networking at Work

Social Networking at Work
Based upon history, In 1970 used a Modem based network. Computer used in 1980's to share files, news and events, email service providers and privacy is based on six degrees.

Personal Network:
  • Personal  network in which user share about his thoughts and expressions in a medium.
  • Facebook, LinkedIn, Match are used to connect with other people's.
Status update Network:
  • Status update are done using some of the application used in now a days.
  • Twitter is used to identify industry fellow to fellow.

Location Network:
Location network is used to identify geo locations by the means of GPS.

Content sharing Network:
Content sharing network is used to shared documents like applications Flickr.

Shared interest Network:
  • Shared interest network are used by group of people to share thier interest and exposure for example used application will be Pinterest.
  • For sharing about Home decor, food products to buy in all categories.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security Securing E-Commerce

Securing method for E-Commerce:

Electronic medium through all transactions will happen, so ensure that electronic medium is safer for transactions is important. 

Business-Businesses connection and security:

  • For this business process both the company are connected with dedicated circuits.
  • And this circuit ensures that QOS (Quality of service )  with the Internet speed of 45 Mbps link.
  • Service providers or carriers ensures that data transmit through optical network like OC48. 

Business-Consumer security :
Business-Consumer is a transaction happens between consumer and company. In this type of transaction TLS encryption is used. 

Transport Layer Security:(TLS):

  • TLS encryption is used to ensure the transactions are secure. TLS uses public key cryptology. Encryption and decryption used in source and destination addresses.
  • TLS used primary public key encryption. 

Public Key/Private key:
  • If anything sending from source address encrypted by public key only decrypted by private key in destination end. 
  • If you send anything from source end encrypted by private key only decrypted by public key. 

How In Bank transactions, public and private key created:

  • Bank uses third party company to create a certificate for authentication using bank domain. 
  •  When transaction initiated bank receives a new public key like a notary stamp, good for three years, certificate is fully encrypted. 

For example :
  • Sam - >TLS port->Sam connects to xxx bank using TLS. 
  • Xxx bank send certificate of public key to Sam. 
  • Verification sign public key is used by third party send to Sam and encrypts key and send to bank TLS protocol. Sam sends a symmetric key to bank TLS protocol.
  • TLS is used by self certification and replaced by SSL. 

Complaince:
Data-at-rest is a important to encrypt the identity. 

Data- at-rest:

  • In each organisation they will give priority to data at transit that in production network. And their second priority always will be data at rest, so data at rest will lack of security.
  • For Hackers data at rest is more attractive to them. 
  • This type of attack mostly the victim will be government office personnel system. 
To protect from this type of attack data at rest needs to be encrypted.

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security E-Commerce

E-Commerce:

E-Commerce abbreviated as Electronic Commerce. Buying and selling goods and services over electronic network is called as E-Commerce.
  • Most of E-Commerce faces the credit cards fraudulent.
  • In 1980's ms Email AOL, 1990's eBay and amazon came to known for E-Commerce industries. And 2000's Flipkart, snapdeal, Ajio, paytm are dominating E-Commerce industries.
Advantages of E-Commerce:
  • Generations big time consuming medium.
  • Because of E-Commerce error reduction.
  • Endless possibilities of rapid growth through new innovations.

Types of E-Commerce:
There are three types of E-Commerce given below,
  • Business-Businesses E-Commerce
  • Business-Consumer E-Commerce
  • Consumer-Consumer E-Commerce
Business-Businesses E-Commerce:
  • In this process one company conducting business with other company
  • For example business conducted between wholesale seller and retail seller.
Business-Consumer E-Commerce:
  • In this process business is conducted between company and the customer directly through electronic medium.
  • For example Amazon selling products to customers through online.
Consumer-Consumer E-Commerce:
  • In this process consumer makes direct contact with each other through online medium.
  • Best example for consumer to consumer business is residential property, intellectual property and real estate.

Hills Station view :



Blog for securing you from modern threats from hackers:

Wednesday, September 18, 2019

Cyber Security Tailgating or Piggybacking Eavesdropping Manipulation

Social Engineering is a vast topic due to technology upgradation, how much ever we can do good thing same as evil things are done by attackers.

We are going to most important topic of social engineering.


Tailgating/Piggybacking:
  • Attacker or anyone who want to access illegally walking behind someone having access. 
  • Person comes behind and enter into authorised premises. 
  • Employee or security may be failed to notice or ask identity or identification. 

How To Protect From Tailgating/Piggybacking :
  • Security on duty must be eye's wide open on work premises, so no one enter unauthorised. 
  • Employees should not miss use their ID card and shouldn't allow using his card. 
  • Better surveillance reduces this type of attack. 

Eavesdropping:
  • Eavesdropping is mostly done by CIA and intelligence bureau of any country using technology of lawful intercepts to save country from terrorism. 
  • Unauthorised interception of a private communication. For example Spyware
  • High technology listening device used record conversations. 
  • Its one of the easy methods for hackers. They can consume more time. 

How To Protect From Eavesdropping:
  • Use sound proof conference room to maintain secure and confidential discussion.
  • Listen to your computer by man in middle attack check the settings frequently in computers
  • Avoid public WiFi and hotpots it won't use encryption. So it's not safe. 

Manipulation:
  • Manipulation is a technique used by attacker, attacker use greed and emotional blackmail. 
  • Reciprocity- when you're gifted by some, you need indented to give something to gift giver. 
  • Obligation-attacker need a victim return favour. 
  • Concessions - also requested by attacker
  • Authority - attacker finds the authorization and try to manipulate 
  • Social Manipulation - victim feels the pressure 
  • Attacker play with victim as a doll. 

Hills Station view :



Blog for securing you from modern threats from hackers:

Cyber Security RFID Scareware

Social Engineering is a vast topic due to technology upgradation, how much ever we can do good thing same as evil things are done by attackers.

We are going to most important topic of social engineering.

RFID: Radio Frequency Identification:
  • RFID is most popularly used in modern day credit card, its used in inbuilt. 
  • Attacker brushes up next to an RFID card with a credit card reader. 
  • Most RFID enabled credit cards are heavily marketed with RFID symbol. 
  • Marketed as VISA, Paywave, Master card, Paypass, American Express, express pay way and discover Zip. 
  • RFID communications mostly with encryption. 
How To Protect From RFID:
  • Make sure your card does not have RFID capability. 
  • Apple pay (wireless ) similar to RFID. 
  • Apple pay is foremost secure than any credit card in almost every way. 
Scareware:
  • Scareware is technique used to trick victim into their computer infected.
  • A solution is offered but if you download, you are installing malware of attacker. 
  • Often generates pop-up window system messages. 
  • Often this type of technique used to steal personal identity. 

How To Protect From Scareware:
  • Close the pop-up window. 
  • Good pop-up blocker is used to avoid the scare ware. 

Hills Station view :


Blog for securing you from modern threats from hackers:

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....