12.07.2015 Views

Download PDF - Department of Navy Chief Information Officer - U.S. ...

Download PDF - Department of Navy Chief Information Officer - U.S. ...

Download PDF - Department of Navy Chief Information Officer - U.S. ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5. Which <strong>of</strong> the following is the most effective computer security strategy:a. Whitelisting: Allow only certain specified applications to run onyour system and block all othersb. Penetrate and Patch: Attack your system repeatedly until you findsecurity holes and patch them before hackers find themc. Educate Users: Humans are the biggest vulnerability in any informationsystem, so provide end users with more and better securitytrainingd. Default Permit: Route identifiable attacks away from the systemand allow all other applications to run6. True or False: Antivirus s<strong>of</strong>tware will keep you safe from malwareinfection7. True or False: It is safer to run your computer in admin mode because itgives you more control8. True or False: A rootkit is a useful application that can give you controlover the core operations <strong>of</strong> a PC9. True or False: Blocking incoming communications from foreign IP addressesis an effective way to defend your organization from cyber attacks10. True or False: You will have a more secure system by adopting newtechnology as soon as it comes out – before hackers have a chance to findvulnerabilitiesBonus question: In 2004, what key change was made in the default settings<strong>of</strong> Windows XP?In the last installment <strong>of</strong> the Lazy Person’s Guide we looked atbotnets, collections <strong>of</strong> computers corrupted by malicious s<strong>of</strong>tware,dedicated to serving the whims <strong>of</strong> shadowy masters hiddenwithin the vast unknown <strong>of</strong> the Internet. Now that we havesome understanding <strong>of</strong> what botnets are, the next steps are toexamine how a computer can be transformed into an unwittingcyberspace zombie and, hopefully, how to try and defend ourselvesagainst the Cyber-Zombie Apocalypse.To start, take a short quiz. Please note your answers now. We’llcheck them as we go along.1. Most zombie computers are:a. PCs owned by home usersb. PCs on large organizational networksc. PCs on small organizational networksd. PCs owned by the botnet owner2. Your computer is at risk <strong>of</strong> becoming infected by malware if you:a. Open your Web browserb. Open your e-mail applicationc. Open an Adobe Acrobat <strong>PDF</strong> filed. Both a and b3. An application that appears useful or entertaining but installs hiddens<strong>of</strong>tware on your PC is called:a. Rootkitb. Trojan horsec. Spywared. MP3 player4. In 2008, which country was allegedly the largest source <strong>of</strong> zombie PCcyber-attacks?a. United Statesb. Chinac. Russiad. BrazilNow, let’s see how you did.Uncle Zombie Wants YouAnd Uncle Zombie likes them big. The answer to No. 1 is c.Yes, home PCs may get infected daily, but it requires defeatingthe firewall on each computer. Networks represent a much higherreturn on the attack investment, and the larger they are, thebetter. There might be one or more computers on a home localarea network, but that's slim pickings for a botnet that needsthousands <strong>of</strong> drones to be a real threat. However, if malwarepenetrates an organization's firewall it has hundreds, if not thousands,<strong>of</strong> targets to try and enlist to its cause.No. 2 is tricky. I can remember back to a halcyon time whenjust opening an e-mail did not put you at risk <strong>of</strong> infection. At thistime, Web pages were handcrafted line by line using Notepadand not by a scripting language that waits to load nasty stuffon your computer. However, you still cannot get infected justby opening an application — you have to open content from anexternal source to be at risk. So, the answer to No. 2 is c.Adobe Portable Document Format files, generally consideredsafe and reliable for years, have been used as malware deliveryplatforms. If you’re using a version <strong>of</strong> Adobe Reader earlier thanversion 8.1.2, for example, you may be vulnerable to <strong>PDF</strong>s carryingthe Trojan.Zonebac which lowers Micros<strong>of</strong>t Internet Explorersecurity settings. (Go to http://web.nvd.nist.gov/view/vuIn/detail?vuInId=CVE-2008-0655 for more information.)If <strong>PDF</strong> files are not safe, is anything? No, not really. You canget malware from graphics files, music files, document files andpretty much anything else capable <strong>of</strong> carrying a form <strong>of</strong> executablecode. If you want a truly frightening picture <strong>of</strong> the ratio <strong>of</strong>bad to good applications, take a look at the list your antiviruss<strong>of</strong>tware uses to identify malicious code.A well-developed antivirus program will probably list at least75,000 different dangerous items that it needs to keep out <strong>of</strong>our computers. On the other hand, we probably run only a fewdozen “good” applications and maybe a few hundred useful bits<strong>of</strong> mobile code from Web sites. With that ratio <strong>of</strong> crud in mind itis not a stretch to say that the Internet may be more like a sewersystem than a highway.66 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!