Problems and Solutions Over Internet Security

Employers and employees need to know how to implement safety measures against these attacks. Introduction The internet has become a significant factor in the business world as all aspects of doing business have migrated to the internet. Where did the internet come from and who created it? The internet was first introduced to the world circa August 1991; the World Wide Web avgas made available to the general public by Tim Burners-Lee. Use Of the internet grew exponentially from there giving everyone access to information across the globe.Access to the internet opened up many lucrative business ventures across the world.

Unfortunately the web was not a perfect creation and soon there were people who realized that they could secretly access other users’ information and cause substantial damage to the system or the individual This paper will examine some of the threats that re encountered by the Rally Corporation during their business transactions on the internet and examine possible security solutions for the company.We will look at the viewpoints from the user to the supervisors as they use and deal vita potential problems with security on all nets. We have to keep in mind that these issues are related to all information technology that drives the company revenue and daily operations. Company summary: The Ralph/ Corporation The Rally Corporation is an American technology company that specializes in the sale Of services and merchandise to acquire and manage private sector and overspent contracts.Founded in 1989 in Clarksville, Tennessee, the services include but are not limited to: 1. COCOON (Outside the Continental Limited States) and CONCUSS (Continental United States) training and advisory service missions that are focused on training organizations on newly purchased equipment from the company or another source.2.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Advisory services that assist the customers on applications of new equipment to include certain other applications that require active participation why the customer in numerous scenarios that replicate real- world incidences. . Merchandise, which includes non-prescription preventative medicines and the containers for storage and use in urban and rural austere environments, commercial-grade sure?»vial, military-law enforcement style uniforms and accessories, These include flashlights, equipment containers, tents, backpacks, equipment belts, navigation aids, and training software.

The corporation has had numerous problems with viruses and other mallard programs in the network servers. One attack stopped business operations for six hours.The network IT department had briefed everyone on the use of the LANA yester and they had even held initial briefings on the new trend of BOYD (Bring your own device) that involves doing some tasks on the employees’ smartness. This concept avgas introduced in response to employee input that indicated that they could be more efficient, doing simple company transactions, on their personal smartness. Advent of the Internet and the start of cyber-attacks: We know that the internet or the World Wide Web became publicly available on 6 August 1991 This started a new technology that would fundamentally change the world as we know it.Tim Burners-Lee is credited with the creation of the World Wide Web. Burners-Lee proposed that the internet be used for a variety of purposes such as online help, news schemes, and project documentation to name a few. This proposal went through various editions and then on 6 August 1991 the World Wide Web went public to not a lot of news coverage and fanfare because people didn’t know what the internet was and what it could do for them.

There is a quote from Burners-Lee about the internet that is still posted on Google Groups, WV he World Wide web (WV) project merges the techniques tot information retrieval and hypertext to make an easy but powerful global information system. The project started with the philosophy that much academic information should be freely available to anyone. It aims to allow information sharing within internationally dispersed teams and the dissemination of information by support groups.

From here the internet began developing very quickly, the first image was uploaded in I egg and in I egg the WWW was announced to be free for everyone to use with no fees payable. This was the key factor that would allow the internet to take off in exponential leaps and bounds, The advent of the internet wasn’t without a downside in the form of cyber- attacks. Cyber-attacks are defined as the deliberate breaching of an entity’s computer system with the intent of stealing intellectual property or financial resources, disabling or manipulating a computer or network, or causing other damage or disruption to a computer driven system.These attacks are real and have been a part Of the internet since its inception. The following is a short timeline of incidents of cyber-attacks that happened throughout the history of the internet. This is just a highlight of some Of the cyber-attacks there are many more not listed here: 1. 988: An internet worm shuts down about 10% of the world’s internet servers; it is the first occurrence of an internet worm.

Robert Tappet Morris, a student at Cornell university released the worm.Morris is arrested and convicted under the computer fraud and abuse act, he is the first person to be tried and convicted under the act. . 1994: Computers at the Rome air department Center at Griffins Air Force Base in New York are attacked 150 times by anonymous hackers using “sniffed’ programs to steal login credentials and sensitive information trot a lab that conducts research on artificial intelligence. , 1998:The Air Force Computer Emergency Response Team in San Antonio, Texas noticed intrusions into their computer networks from several academic institutions including Harvard University, The hackers were three teenagers; the exploited weakness was in the operating system this was wake- up call for the IS_S.President Bill Clinton is prompted to develop a cyber-attack plan. 4. 2001: The worm named Code Red affects computer networks running a Microsoft operating system.

Some websites including the White House site are disabled. 5. 2003: Anonymous, the group of hackers who refer to themselves s “Internal Activists” attack government, corporate and religious websites, is organized. While the group avoids adhering to a strict philosophy, its members seem united in their opposition to censorship. 6. 2003: Hackers, believed by U.S. To be backed by the Chinese military, search to find vulnerabilities in the military computer network and steal sensitive information.

The attacks continued for about three years and were given the name Titan Rain by U. S. Officials. 7. 2007: Secretary of Defense Robert Gates’ email is hacked. Officials blame China’s People’s Liberation Army.8.

012: The U. S. Department of Homeland Security announces that spear fishers have penetrated the computer systems of LIST. Gas pipeline systems. 9, 2012: Nine banks in the US. Ere hit by a distributed denial-of-service attacks that denied customers access to the banks’ website for several days, The Islamic hastiest group Size ad Din AY-Assam Cyber fighters.

The group is linked to the military wing of Hams. 10. 2013: The New York Times website is shut down for about 20 hours after being hacked by the Syrian Electronic_ Army, a group tot hackers who back Syrian president Basher al-Sad. II, 2014: American officials announced that Chinese hackers had breached the computer network of the Office of Personnel Management.They said they believe the hackers were targeting employees applying for security clearances, 12.

2013-2014: The Veterans Administration reported that they had been the victim of hacking and that thousands of veterans’ social security numbers and addresses had been compromised.The Home Depot and Target were victims of a cyber-attack where thousands of customers’ credit card numbers, email addresses and house addresses were stolen. Where do the security threats come from? These attacks come from the most innocuous places that some people never suspect to have or they would notice to carry a virus or worm.

The Cyber threat is a multi-faceted attack that includes mallard, fishing, hacking, spam, social engineering, cyber espionage, mobile and insider threats. The Human factor is a big vulnerability this includes data leaks, downloading unauthorized programs and emails or misuse Of company property and software programs. Some threats have been around for a long time such as hacking, fishing and SP?»bare. Others have been specifically generated to target certain systems and people.These threats seem to change constantly and, spread faster than IT professionals have been able to secure systems against them. According to an independent study (Market Connections, The Lockheed Martin Cyber Security Alliance, (2012), Cyber Security and Transformational Technologies, Keeping Data Systems Safe, Retrieved from: http://mow.

Nonrepresentational. Com) Mallard is the most prolific threat followed by fishing, accidental data leaks, hacking, spam, misuse, data breaches, social engineering, insider threats, cyber espionage, mobile threats, errors and physical threats in that order.The emerging vector s mobile threats that attack the wireless networks that we use in the office and during travel. The mobile networks are still being evaluated on how they can be better secured in the future. The business world depends on the wireless network more and more so the security of the wireless network is a priority. Mallard, (for “malicious software”) what is it? It is defined as is any program or file that is harmful to a computer and user. Thus, mallard includes computer viruses, worms, and Trojan horses.This includes spare, programming that gathers information about a computer user without their permission.

This means that you can unsuspected download this type Of software onto your computer, smartened or other computing device with no knowledge until you open an attachment or email. We know that most APS (applications) that are available for download on smartness (Android, phone are the most popular) aren’t secure. There are APS that are available for download that aren’t from a reputable company but users don’t know that and they don’t know mallard is attached to the app.

Playing free games online that require you to download an “updated” version of a web-player and that download can contain these luscious programs. That is one reason people aren’t allowed to surf the web unmonitored at work the online games are the big problem such as Candy Crush. The IT managers can restrict certain sites based on viruses that are suspected as having these programs, The unfortunate thing about these programs is that they can remain in the computers operating system dormant tort a long time unnoticed by the user. Another type of cyber intrusion is Bootee.

The term bootee is short for robot net.Criminals distribute mallard that can turn your computer into a boot (also known as a zombie). When this occurs, your computer can reform automated tasks over the Internet for the hacker, without you knowing it. Criminals typically use bots to infect large numbers of computers. These computers form a network, or a bootee. Criminals use bootees to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud.

If your computer becomes part of a bootee, your computer might slow down and you might inadvertently be helping criminals.The inadvertent activity of the user or the criminals can cause the individual computer to become part Of a bootee: (Microsoft, Safety and Security Center, What is a Bootee? Retrieved on 11/28/14 from: http://www. Microsoft. Com/security ‘resources/bootee-what’s_asps) The bottom line here is that some Of the most visited websites, some of the most downloaded software and applications (APS) can have a virus attached to IL This is especially true if the site that you download it from is not the official site. Other things that can place spare on your computer are Adobe Acrobat, Adobe Flash Player and Java.

These programs are virtually everywhere on the internet and in most cases they are required for you to view certain material and accomplish basic tasks. These programs are also available for download in tablets and smartness. Mallard has been disguised as an update to Java as well as updates to Adobe Acrobat (Reader and Flash Player) that will prompt you to download an “update’ that will have mallard such as the Zeus Trojan Horse program attached.

This Trojan was designed to steal banking information from infected computers.Common Mistakes and unauthorized system access Some of the common mistakes that users commit in the workplace and at home while working or just surfing the web: 1. Passwords: They need to be omitting that is not easily predictable about the user like your birthday, the name of your pet, the name of your family backwards or using the same password for everything. Another example, there have been incidents when a professional hacker working for a corporation has hacked into email accounts of the employees based in information that can be found on the internet and intranet (Faceable pages, Namespace accounts, Twitter and insecure HRS files).Passwords are the first line Of defense for most users. They need to be changed often. A complex password that has seven or more characters combined with t least three numbers and one special character (capital letters, or # signs, etc. ) Network security administrators should require the creation of a complex password as well as implementing a password expiration system to remind users to change their passwords often.

Restrictions on if passwords can be reused is another precaution, that way somebody is not cycling between the two same passwords every month or so. . Access points: LANA Networks: usually the victim of a fishing attack or downloading unauthorized programs on the LANA will result in the LANA being infected. We all know that the hackers can shut he LANA down or collect information to steal or sell or they can use the PC’s on the LANA as a bootee.This net will expand the hackers reach exponentially if they reduce signature activities on the system. Weak Passwords will infect CAN just as stated above, using “Password 123′ and not changing it will he like an open door too hacker.Some solutions include, segmenting the CAN in case there is a catastrophic attack the business can run systems on the uninfected side. This is one technique that companies use when they have been hacked so they can continue with business and warn consumers about the intrusion.

Restrict access to the internet to people at work and have secure portals so that if employees need to access the company internet they can with a degree of safety. Examples, cookies are a form of spare that is loaded on your computer when you visit certain internet sites; they can change your homepage, display “pop-ups” at the most inappropriate times.Have a comprehensive virus removal program on the net. Something that Will adapt to some Of the evolving threats. Network security personnel should be analyzing sites that employees visit and what if any spy. bare has been inadvertently downloaded. Place filters on What site can be accessed; this goes hand-in hand with restriction.

Good web-filtering software lets you decide What is permitted on your computers through the browser and What will be denied access. Wireless Networks use some of the same principle as the LANA but they differ in that all WI.IF capable devices will try to gain access to the net. Set passwords as described above, use a “gated system” where employees might have to use a token to access the system or net.

Change the SAID when needed don’t leave factory settings on the system. We have witnessed this stake by people who owned baby websites. Alleged Russian hackers were scanning systems using factory default settings and they were gaining visual access to people’s homes. They were trying to sell some tot the more private clips for money, Make sure that you scan regularly for exploits on the system.We have to mention this here but limit access by BOYD (bring your own device) as this point is used more and more in business network security personnel have to be vigilant in what device can access the network and what areas it is granted access. Restricting access to certain areas can save you some headache ND reduce the search area when a mallard program is found. Disable file/ print sharing on everything other than your file server. You don’t want to be broadcasting your entire file system to everyone around you at the airport or hotel.

Else whole disk encryption on all laptops that will leave the Office. YOU never know when your computer will be stolen because you left it in a room or unsecured in the airport. Smartness and applications; always make sure that smartness are approved to access the company’s wireless internet, have employees sign an access use policy so that they understand What they can and ant do when on the company net. Monitoring is an option but they have to acquiesce to this company monitoring some say it is an invasion of privacy but it takes place at work then it might merit the use.Be certain that all applications downloaded are from the originating company. Don’t download anything that asks for passwords or any other personal data. The larger companies (Microsoft, Adobe, and Java) don’t ask for any private information if they do not download the application. If you are still unsure seek help from the Network Security section.

The types tot networks that we have examined here are CAN, wireless ND VPN. LANA Networks are as good as the measures that have secured them.In other words no opened mallard messages, no release tot intimation through fishing (spear-fishing or Fishing), no unauthorized surfing of restricted sites and regular maintenance by Network security personnel and you should have no real problems with security, Getting the employees to adhere to access policies is possibly the toughest obstacle with the LANA as they always sign the access use policy but inner read it Wireless computing, increasing in use in the business environment and with the introduction of BOYD (Bring Your Own Device) the security of this network is crucial to keeping the business at optimum level.This network has to be secured from the SAID (Set Service Identifier) this is the name of a local wireless local area network (WALL).

Leaving the SAID blank allows all wireless devices in range of your WALL access to the WALL. You must manually change the SAID to decrease any attacks and unauthorized accesses by unauthorized people. Constant monitoring of activity and enabling the firewall Will keep this network intact. The possible highest secure network here is the VPN (virtual private network).This system connects remotes sites or users gather privately using virtual connections routed through the Internet from the company’s private network to the remote site or employee. These networks encrypt packets of information before they are sent over the network. The connections are also available through the regular internet and not an expensive dedicated line LANA system thus saving the company money. Securing the Network (things that everyone can do and more) This section will provide some solutions to some of the problems that the company will encounter in daily operations on the internet.

We already addressed some of them. These things include: l, Passwords: .Access points: LANA Networks, Wireless networks, Smart phones and applications 3, Types of networks and their levels of security What can the user do to help the company with securing information and the intrusion of hackers? The answer is simple but it has to be followed to the letter and if there is any doubt about anything it has to be reported to the Network security section as soon as possible. I Change passwords often, use different letter number combinations don’t use your birthday or anything that has to do with you or your family. Hackers can and have gotten this information through Faceable and other network sharing sites. Don’t write them down and leave access to them (on your desk or in the desk drawer).

We have to remember one of the threats is from a disgruntled employee who may have been one of your friends and had access to your desk. 2. Only surf approved sites at work and on the wireless N.B.

,fork. Venturing outside of the approved sites can be disastrous especially when you inadvertently download a virus. Another scenario is somebody contacts you and sends you a mallard email. You open it and then forward it to your friends on their company systems and there you have it a outwork that is compromised.

3, Be wary of free Wi-If connections, the airport, hotel and cafes have this service to attract customers. The unfortunate fact is that there are people with a program that can “see” your activities online.Once they have your sensitive information they can leave without you even knowing that they have compromised your information. Don’t do any business on these sites or any other activity that you don’t want anybody to see.

4 Scan your computer and devices regularly for viruses. Use the company and your own virus scanners to “clean your computer. Too many files can slow down the computer ND we know that a Trojan in competition with your computer can and will slow down your computer. Update your protection, the world of hackers is always evolving so you should be also keeping up with new viruses and the bew attacks that fishers are implementing makes you a hard target. 5.

Downloads: In the smartened and wireless world APS are the ‘in-thin* There are APS for just about everything including but not limited to: banking, navigation to music and restaurants. You have to be careful what APS are downloaded and where up download them. Use the official site only to download these APS. If you have questions about any downloads ask the Network security section and they should be able to suggest what APS to use and where you should download them. Always keep an eye on your bank accounts for any strange activity. You should also monitor your company computer for any strange activity plus “clean temp files that may contain SP;Yankee) and run the virus scan program regularly.Don’t open any strange emails from people that you don’t know or pass it onto another person in the company. Don’t download anything, on your computer, that hasn’t been approved by the Nonvoter security section.

They have the latest information on threats on the internet. Read your access policy so you can he sure of what you can and can’t do on the web at work, 6, Nonvoter security professionals should accomplish the following: a. Monitor all activity on the LANA and the wireless network b. Use whole disk encryption for the computers to ensure that some data will be protected and accessible. C. Disable file/ print sharing on everything, You don’t want everybody reading everyone else’s emails. D.

Scan your networks regularly for threats and exploits.This includes all employees while they are at work, If n intrusion occurs this will give security professionals a point to start looking for threats and infections. E.

Load antivirus software on all computers and keep it updated anything out of date isn’t doing you or your company any good. F. When possible use a VPN, the most cost effective and secure way to compute while traveling. G. Close out and block any accounts of employees that have been terminated, change any and all passwords that they used to access systems, LANA and wireless. This includes any VPN network accessories (secure tokens) so these employees can’t access any company sites. H. If you have encryption make sure that it is up-to-date, set up either 128-bit WEEP encryption or Windows encryption.

In the same note run scheduled updates for company virus software and send out notices for wireless users and if you still have Blackberry service update that also. In this day and age Blackberry doesn’t exist so email updates information to personnel that use BOYD if applicable. If not update the VPN security, maintain accountability of tokens and change them out if somebody loses one, do that immediately. i, One final word that will prevent random access to your network wired or wireless.

Change your workup name for any PC’s in your business, type in any name that you think will not be easily guessed by anyone, Back up your data online (cloud computing) or local backup often, concentrate on the most important files that maybe include some customer data and key business data. Hide your personal data.New evolving threats This next section will touch on some new identified threats that have been encountered in the past year and some advice on how to spot them and deal with them, New threats to be concerned about: As we continue to advance in the use of the internet for business and even expand on the complexity of its use in lobar commerce we need to be aware of what threats await on the horizon. The following security challenges are just few of the many that will have an effect on the internet for personal and business uses in the near future. I _ Cloud migration: 2013 was promoted as the year companies moved critical systems and data to the cloud. This migration into virtual shared infrastructures changed how we addressed information security and risk management.

The challenge is that cloud security processes and solutions are still being developed. With a lot of planning and innovation cloud computing could reduce business risks y providing greater flexibility, resiliency and security. The jury is still out on the overall security of the cloud and its resiliency, there is no argument about costs, as there are no onsite servers and .NET. ‘org security personnel so the costs are minimal compared to having these people in the office. 2.

State-sponsored espionage: We have already seen this through numerous attacks by the Chinese Government, Data that is critical to the company can be given to espionage personnel through unauthorized access. 3.Mobility: Management and security of mobile networks and smart phones become even more challenging. When employees want to use their smartness instead of a company issued one. The bring-your-own-device trend makes this challenge harder when we look at protecting the critical information needed to manage the organization without sacrificing the integrity of the company and the integrity of the smartened user. 4. Bootees: They are everywhere.

The challenge is that many bootee owners design systems that are more adaptive and redundant than many corporate and government systems and networks. Controlling this attack vector before it can be used as an advanced persistent threat (APT) and migrates into smart devices is racial. 5.Web-based Mallard: The highest profile case if mallard was Darkle which, according to one report, had infiltrated over 40,000 web domains and Pips by May 2013.

Some of these websites included the Los Angles Times and Seagate. Darkle compromised web servers were responsible for delivering some exceptionally serious mallard, including Main ransom ware that encrypted users’ files and demanded a $300 payment to provide a key. The EBB virus ransom ware worked off of the same principle, in drive-by downloads where the program is downloaded simply by visiting a site. Android Mallard: Android Mallard was first detected in August 2010 and there are an estimated 300 mallard families that are out there in the android world.

The newer forms are reportedly more difficult to detect as it avoids detection and counter detection methods. First discovered in China in August 2011 Gamester was a terrorized program that was injected into many legitimate APS that were distributed through third-party markets. In 2012 Gamester began resisting detection by obfuscating class names, encrypting URL and C&C instructions. The makers of this mallard program implemented tar more complex and subtle obfuscation ND encryption making this mallard harder to detect or reverse engineer, There have been strides in detecting Gamester, a recorded 4,700 detections between February and April of 2013. 6.

Denial of Service Attacks or Distributed Denial of Service Attack: we can expect to see more of these attacks as the ‘Wackiest” use this to prove points and embarrass companies, Example of this are: The Sony USN Attack, Chapeaus, an attack by unknown hackers to protest Chapeaus spam fighting website. This attack affected most of the internet service that slowed down most of the internet services around the globe. 7. There has been en successful attack against a cloud system, while there is no proof of the existence of a unique entity at the origin of these attacks: it is a matter of fact that in less than one month three of the most important video game companies in the world Sony, Saga and Epic Games were successfully attacked.In this case about 100 million users were affected, credit card numbers, private data, user logins and passwords were stolen. In this case what raised attention was the fact that the attacked was launched taking advantage Of the SO Cloud Of Amazon. A fact that had never happened before, this had the potential to start looking rigorously at cloud security.

We have just now realized that the cloud is the next step in the business and personal worlds. The cloud saves money, in salaries of IT experts and onsite servers plus it provides off-site storage for large amounts of data that doesn’t have to be stored locally on laptops so it is readily available in case of hard drive crashes.Conclusion: The use of the technology and solutions presented here will better the Rally Company in the execution of business ventures both internal and external. We know that hackers are now more of a threat than before. They hack to teal, disrupt and discredit businesses. Their tactics have severely damaged businesses and their customers, The proposed techniques will ensure that all employees have no accidental data leaks and employees will be aware of spare and mallard innocuous attacks.

They will know how to report these stacks and actions they need to take in case they are a victim of these types of attacks. Training on all systems access protocols and what each consists of and how to safeguard them. What to do in case of a hacking attempt, data breach and mallard detected in the system.Safeguarding sensitive information in he system, even in cloud computing systems and Vans are detrimental to the company being able to secure its systems and the ability to recover the trust from your clients and customers. We also must prepare for the daily assaults that hackers develop each day to steal data from our organization.

We must continue to be vigilant as the attacks are becoming more and more frequent and they use stealthier means to infiltrate systems, everything changes almost daily. Cloud systems are the future and the next frontier that needs to be protected from hastiest as they continue to stop services to demonstrate political and personal views.