Monday, November 9, 2015

DATA THEFT AND DEFENSE













image courtesy:http://www.google.co.in/imgres?imgurl=http://www.centranixqatar.com/wp-content/uploads/2014/01/banner3.jpg&imgrefurl=http://www.centranixqatar.com/firewall-network-security/&h=264&w=959&tbnid=XI0rzfAYN-axvM:&docid=W3i1xsbu9_neqM&ei=xllAVpeqKcqMuATZ6YH4BA&tbm=isch&ved=0CAMQMygAMAA4kANqFQoTCJel_872gskCFUoGjgod2XQATw


Some of the recent headlines were so shocking that made stunned people all over the world. The links are presented for anyone who cares to read further and know for themselves.




Apple Removes 300 Infected Apps from App Store | WIRED 

Apple Targeted as Malware Infects China Mobile Apps - WSJ 


Ashley Madison data breach -

Over 60 gigabytes worth of data was confirmed to be valid on 18 August. The information was released on BitTorrent in the form of a 10 gigabyte compressed archive and the link to it was posted on a Dark Website only accessible via the anonymity network Tor

 

The images were believed to have been obtained via a breach of Apple's cloud services suite iCloud. Apple later confirmed that the hackers responsible for the leak had obtained the images by phishing and brute force guessing i Cloud usernames and passwords.

The Sony Pictures Entertainment hack was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of (previously) unreleased Sony films, and other information.

Industrial espionage goes a long way back to the mid-90s  [remember the incident in Intel when one of the employees tried to sell sensitive documents to competitor ].
  
In the digital era, the crime is quite steep given the climbing numbers and catastrophic consequences. The links listed aren't of distant past but relatively new - some or still unveiling and some under investigation.  What shocks the learned and layperson is when technology is no longer nascent why the threat should not be nipped in the bud? Nipped?! These bloopers don’t blossom from a bud – be it insider job or outsider, but come to light after shaking our faith and foundation.

The worst threat for now is the cyber threat and measures are mounted to step up cyber security despite which why the crime rate is scaling is both puzzling and perplexing. If there are breaches in security, the damage could be colossal, making it mandate in tying the loose ends. The best anti-virus is unable to prevent a malware from harming the programs; the best social engineering is not able to mitigate but only makes lives miserable. Ashley Madison hack’s ramification ruined personal life and which is an intrusion into privacy and revelation is damning both to the customers and commerce.  When powerhouses like apple’s app store with a reputation of rigid and robust ‘firewall’ is no longer impregnable, anything can be infiltrated, and as endorsers or end-users we lost our insulation and immunity. 

Every software is susceptible and hardware vulnerable? So where is the power of protection?  Unfortunately there is no anti-dote ready that can anticipate attack and annihilate the assailant. Surely some minds are busy at ‘work-is-in-progress’ in chalking out a solution. A more complex encryption or safe vault or something very innovative and effective. When the shadow of the danger grows in size threat looms large. The usual suspects are as insiders as ‘
John McAfee’ of McAfee anti-virus put out a good perspective on Ashley Madison hack. He essentially said it had to be an insider given the vast amounts of data stolen - most hackers don't have that much access for that long. It could have been an insider combined with a hacker, but he is convinced there was an insider involved. [Courtesy: quora]

So it’s important to acknowledge the insider’s role. Not every employee is a suspect but suspects are usually insider. “Approximately 1,600 AT&T customers have been alerted that one of the wireless carrier's employees illegally compromised their data, including Social Security numbers and driver's license details, according to reports.” [courtesy: http://www.techtimes.com/articles/17405/20141007/ex-at-t-employee-tagged-as-culprit-in-data-breach.htm]

Another article conceded that the AT&T Insider Data Breach More Dangerous Than External Hacking
Yet another Ex-AT&T employees secretly unlocked ‘hundreds of thousands’ of phones in 2013
Disturbing as it gets for the very hand trusted was the one that gave it away. One can defend from outside but how to discern that ‘insider’. Even after closing all gaps, plugging holes, locking doors, securing and sanitizing, how does that slip happen and that too under our very nose? TECHNOLOGY.

Technology is always a double-edged sword. The insiders also use ‘Cloud’ facilities to make away with their goodies. Cloud services are proving to be almost indispensable. Line up the companies offering cloud capabilities and it will feature the heavyweights in the industry: Amazon, Microsoft, apple. So as a safety chute should we just shut down access to the services so that any possible ‘breach’ prevented? Or restrict access? The sanction of cloud services is strictly on need and merit and of course trust.

Study reveals that the average company now uses 923 distinct cloud services, such as Amazon Web Services, Microsoft’s Azure, Office 365, Salesforce, Box, and Yammer. Use of these services grew 21.6% in 2014, reports cloud-security firm Sky high Networks, which tracks 17 million users and 10,000 cloud services worldwide. Some 90% of companies’ cloud activity is attributable to individual employees and small teams, rather than corporations’ business-technology groups.

The security of these services is an issue: The vast majority of cloud services don’t encrypt data (as opposed to in transmission), only 15% support multi-factor authentication, and even fewer (6%) are ISO certified, says Sky high CEO Rajiv Gupta. (ISO 27001 was created in 2013 to ensure that security risks and threats to the business are assessed and managed, that physical security processes such as restricted access are enforced consistently, and that audits are conducted regularly.)

Because it’s so difficult to monitor and regulate employees’ use of file-sharing sites and other cloud services, many CIOs simply ignore the whole issue.

So what are the defence mechanisms with regard to data security in cloud?

Data hashing is a technology that creates a hash, or specific code, to identify a given dataset. This allows the integrity of the data to be checked every time the data is used or accessed by a credential individual at the firm. Hashing would prevent data from being changed by an unauthorized third party.

Digital watermarks allow data to be tracked. While this approach does not protect the data, it does allow it to be linked back to the individual who placed it on a cloud or at an unsanctioned location, making that person potentially responsible for any consequences to the data’s misappropriation.

Researchers are attempting to create simple yet effective means of facilitating cross-cloud single-sign-on authentication, where a “foreign” cloud provider is required to gain trusted third-party status from the “home” cloud before being able to communicate with the user and the user’s applications.

Still the advice holds well that sensitive and critical data is guarded and under heavy security and scrutiny.

SalesForce recently introduced Salesforce Shield to protect its cloud apps assuring users that the encryption is by far the best and chances of breach is very slim. But can it be slammed down from slim to simply impossible?

We scratched the surface with regard to Data Defence with Cloud based survives. In the next post, let us look at ways to safeguard out data against any attack.

We welcome Your thoughts about Data Security…..

No comments:

Post a Comment