Essay on "Security Solution"

Essay 7 pages (1915 words) Sources: 4 Style: Harvard

[EXCERPT] . . . .

Computer Security

We have achieved great strides in computer technology but there is also a corresponding rise in cybercriminals employing new and sophisticated methods of attacks. Cybercriminals do not just do it for fun or fame anymore but are getting more professional and monetizing their skills. Exploitation of web application and browser plugin vulnerabilities, Phishing, identity theft and stealing of valuable personal and financial information are some of the major issues. As always, prevention is better than cure. Updating antivirus software, operating system and other software regularly and using sensible precautions such as regular backups would certainly eliminate the risk or atleast minimize the damage of malware attacks.

Introduction

The first decade of the new millennium was marked by a phenomenal growth of the Internet and its many applications. Information technology has achieved a paradigm shift casting its influence in almost all spheres of our lives. However, this unprecedented growth of the Internet has also spurred the development of new malicious technologies in the form of viruses, worms, bots and Trojans that are used to illegally attack and exploit the software and hardware vulnerabilities. Cybercrime has become ubiquitous with cyber criminals using network worms, Trojans, spyware, keylogger software, rootkits, and a variety of other professional attacking tools for financial gain or even political reasons. Tackling these Computer security issues the antivirus industry has developed into a niche field offering several products for Internet security solutions. Today the antivirus market is flooded with many players competing in a
Continue scrolling to

download full paper
continuously changing and challenging domain. [Eugene Kaspersky] Notable among these include Symantec, NOD32, Kaspersky, McAfee, etc. A brief overview of the annual security reports published by some of these companies reveals critical information pertaining to the trends in the changing threats to the Internet security and how continuous research and evolution of the security programs are stalling the efforts of the nefarious cybercriminals.

Cybercriminals: More Professional

Just as we are achieving great strides in computer technology there is also a corresponding rise in cybercriminals employing new and sophisticated methods of attacks. As Arthur Wong, security expert and senior vice president, Symantec Security Response states, "The Internet threats and malicious activity we are currently tracking demonstrate that hackers are taking this trend to the next level by making cybercrime their actual profession, and they are employing business-like practices to successfully accomplish this goal.." [Symantec, (2007)]Increasingly cyberattacks are becoming broadbased focusing on well-trusted social networking websites by exploiting vulnerabilities in the programs and through them attacking their end users. A recent instance is the concurrent attack on Facebook and Twitter, two of the world's popular online social networks using 'Denial of service attacks'. Twitter co founder Biz Stone reported, "We are defending against this attack now and will continue to update our status blog as we continue to defend and later investigate," [Alexi Oreskovic, 2009]

The Symantec report reveals that 2008 witnessed the highest ever malicious code threats with Symantec detecting a record 1,656,227 threats that is almost 60% of the threats the company has detected over the last several years. This proliferation of virus signatures is an indication of how intent and professional cybercriminals are becoming and how important it is for endusers to keep their anti-virus program updated. [Symantec, (2009) pg. 55] the Symantec report further indicates that the trend of attack is more towards the client side than the server side. Over 95% of the attacked vulnerabilities in the year 2008 were on the client side with the server side constituting only 5%. [Symantec, (2009) pg. 52] Educational institutions were found to be the most affected in terms of data breaches accounting for 27% of all data breaches in 2008. [Symantec 2009, pg. 20]

NOD32, (from Eset) another industry leader in computer security solutions has reported that there is a huge increase in fake anti-virus and malware products. The ESET report for 2008 shows that increasingly cyber criminals are targeting PDF and other forms of data files to spread malicious codes. Compromised PDFs carrying malicious links are the new form of attack. The report also indicates that most forms of malicious software use the windows autorun feature to their advantage for gaining entry into the host computer. The report also includes Win32/Toolbar.MyWebSearch and the Trojan Virtumonde as some of the most common malwares of 2008. [ESET, 2008, pg. 22] Among the email attachment-based malwares Netsky, Mytob and Bagle which use social engineering techniques are the top three for 2008. [ESET, 2008, pg. 25] Both Symantec and ESET reports agree that trend of using email attachments for the spread of malware is on the decline (31%) and this is attributed to the increased availability of free email scanning virus software. Instead the propagation of malicious software is now increasingly based on the peer-to-peer networks and other file sharing systems. [Symantec, 2009-page 69]

The Win32/Conficker, a network worm was seen high on the list for 2008 . This worm, which exploited the RPC subsystem of the operating system, could disable the firewall and used the open port to activate a HTTP server. [ESET, 2008, pg 15] Though Microsoft released the patch in Oct 2008, pirated softwares, which do not have update capabilities, are still prone to such attacks. Norton also reports this RPC vulnerability as the top high-severity vulnerability for 2008 that allowed the hacker to run codes remotely. More than one million systems were affected by the Downadup worm using the above-mentioned vulnerability. [Symantec, 2009-page 7] Malware disguised as video codecs such as Win32/GetCodec.A is also on the rise this year. Typically, these programs are infected video downloads that require the user to download some special codec file which is nothing but a masqueraded Trojan file. [ESET, 2008, pg 12] the top 5 of the ten Staged Downloaders for 2008 were Trojans. Brisv Trojan was the most popular Trojan of 2008 and early 2009. It is reported that this particular Trojan affected more than 1.6 million computers converting all the mp2, mp3 files into WMA format and then injected the file marker with a malicious URL. This implies that whenever the file is opened with windows media player the user is taken to the particular malicious website exposing the computer to further malware attacks. [Symantec, 2009-page 57]

Browser Toolbars and other plugins

ESET projects that popular browsers will be the most targeted software for malware attack in the future. As browsers can be used to lure the unwary customer to the malicious websites they lend themselves naturally to attacks by malwares. [ESET, 2008, pg. 8]. Statistics from the Symantec 2008 reports indicates that active X-based controls are the leading cause for browser plugin vulnerabilities. There were a total of 415 browser plugin vulnerabilities in the year. [Symantec, 2009-page 14] the recent "browse-and-get-owned attack" reported by Microsoft security engineer Chengyun Chu is a case in point. As Chu said, "A user needs to be lured to navigate to a malicious Web site or a compromised legitimate Web site to be affected. No further user interaction is needed.." [Thomas Claburn, 2009] in 2008 there were a total of 9 zero day vulnerabilities and Internet explorer was involved in 6 of these attacks. [Symantec, (2009) pg.49] . With increasing use of mobile devices the attention of cyber criminals has turned on to these devices.

Increased attacks against mobile devices such as Iphones and mobile browser attacks are expected in the coming year. ESET also reports that 2008 saw increasing use of obfuscation techniques to avoid malware detection. Runtime packers such as Themida are also used to evade detection. [ESET, 2008, pg 7]

Phishing

Phishing and mule scams are the top email nuisances. Financial sector was the worst affected by phishing scams with almost 76% of phishing schemes targeting this sector. [Symantec, (2009) pg. 75] Reports from both these popular antivirus companies indicate that fake antivirus software and majority of the phishing lures are from Russia and China. Typically Phishing is done by way of unsolicited emails that request people to visit a particular financial institution's website posing as a legitimate service routine from the institution. The unwary customer then divulges all his personal information not realizing the scam. Phishing results in severe economic loss and stealing of personal identity. The security reports also indicate online gaming sites as the new focus of attackers. Win 32/PSW.OnLineGames.NMY was the leading malware for 2008. This is a group of malicious keyloggers and other rootkits that are capable of stealing personal information of users involved in online gaming. They are used extensively to steal virtual assets that can be traded into money. [ ESET, 2008, pg 13]

There is a marked increase in web application vulnerabilities in 2008 with Symantec reporting a total of 3462 web application vulnerabilities compared to 2750 in the previous year. The most noticeable of these was the SQL injection vulnerability that affected many web applications that used ASP script engine with SQL server database as the backend. This vulnerability injected malicious code into the database and remained undetected as it exploited the database layer of… READ MORE

Quoted Instructions for "Security Solution" Assignment:

There are many companies that operate in the Computer Security field. They provide

security solutions: for example, anitvirus software, biometric security, firewalls, public

key infrastructure etc. Some of these companies publish reports and media releases on

their current operations and current security threats.

Your task is to research these reports and write an essay on what such companies

consider as major security threats in 2008-2009. To get you started, see the Internet

Security Threat Report Volume XIV linked from the following

site:

http://www.symantec.com/en/au/about/news/release/article.jsp?prid=20090512_01

FORMAT

The essay should be around 2000 words. You should write it in your own words.

Provide full references of your sources and use Harvard style referencing.

MARKING SCHEME

Proper introduction and conclusion 10%

Grammar and spelling 10%

Writing style 10%

Contents 60%

References 10%

How to Reference "Security Solution" Essay in a Bibliography

Security Solution.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076. Accessed 4 Oct 2024.

Security Solution (2009). Retrieved from https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076
A1-TermPaper.com. (2009). Security Solution. [online] Available at: https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076 [Accessed 4 Oct, 2024].
”Security Solution” 2009. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076.
”Security Solution” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076.
[1] ”Security Solution”, A1-TermPaper.com, 2009. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076. [Accessed: 4-Oct-2024].
1. Security Solution [Internet]. A1-TermPaper.com. 2009 [cited 4 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076
1. Security Solution. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-security-achieved/29076. Published 2009. Accessed October 4, 2024.

Related Essays:

Security - Agip Kazakhstan North Caspian Operating Term Paper

Paper Icon

Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)

Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production… read more

Term Paper 35 pages (14948 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Security Awareness the Weakest Link Case Study

Paper Icon

Security Awareness

The weakest link in an organization's security architecture is typically found in the user. This paper explores the concept of developing security awareness in the individual user. In… read more

Case Study 30 pages (8202 words) Sources: 10 Topic: Computers / IT / Internet


Security Plan Case Study

Paper Icon

Security Plan

The Maryland public safety education and training center deals with firearms training, public safety and education, and drug abuse resistance. The center is located on a 700 acre… read more

Case Study 9 pages (2681 words) Sources: 6 Topic: Computers / IT / Internet


Security Issues of Cloud Computing Data Analysis Chapter

Paper Icon

Security Issues in Cloud Computing

The name Cloud computing was coined from the drawings oftentimes employed to illustrate the internet. Cloud computing is an innovative consumption and new delivery approach… read more

Data Analysis Chapter 5 pages (1450 words) Sources: 5 Topic: Computers / IT / Internet


Security Best Practices: Assessing the Risks Essay

Paper Icon

Security Best Practices: Assessing the Risks Associated with Unauthorized Installation of File-Sharing Software

One of the most potent and potentially disruptive threats enterprises face is the use of peer-to-peer (P2P)… read more

Essay 3 pages (934 words) Sources: 3 Topic: Computers / IT / Internet


Fri, Oct 4, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!