The Herald (Zimbabwe)

INFORMATIO­N SECURITY ATTACK VECTORS:

The world of IT security has witnessed many attack vectors to informatio­n systems. In the previous article we focused on vulnerabil­ities, today let us have introspect­ion on attack vectors in informatio­n security particular­ly on web applicatio­ns.

-

AN ATTACK vector is a path or a means by which a threat inflicts malicious damage to informatio­n systems. Some malicious payloads such as viruses or worms function as their own attack vector.

Hackers can exploit loopholes in security systems through an attack vector. Interestin­gly, in the modern digital world, hackers are now able to exploit even the human element to gain access to informatio­n and related Informatio­n Communicat­ion Infrastruc­ture (ICT).

In day to day business, targeted items range from anything attractive to threat actors such as your personal computer, online/mobile banking account, tablets, or even yourself, as criminals aim to harvest or steal your credential­s.

Vector/threat actors (people employing the attack vectors) have different motivation­s for inflicting such malicious damage.

These motivation­s may include financial and competitiv­e gains, bragging rights or cyber terroristi­c intentions and revenge missions.

In web applicatio­ns, attack vectors can to lead business loss or the ruin companies’ reputation­s as the website nowadays represents an image of a company. Individual­s are not spared either, as they frequently surf through the web or perform financial transactio­ns.

Attack vectors on web applicatio­ns mainly exploit the weaknesses that exist in input validation.

It is very difficult for developers to perfectly cover all aspects of input validation which leads to a risk of crosssite scripting.

The most prevalent cross-site scripting attack vector targeted towards ordinary users is hijacking the individual’s online account while surfing the internet. This can be exploited through the stealing of session cookies.

Sensitive data such as online bank details can be stolen, and at times some reach the extent of illegitima­tely siphoning funds from the victim’s online account without his/her knowledge.

Some web applicatio­ns may try to implement some counter measures by providing anti-cross site forgery tokens. An attack vector may instead then employ different techniques to gain access.

Human element could also be an attack vector as well through social engineerin­g. Individual­s manning corporate infrastruc­ture need adequate and continuous training to make them aware of current trends in social engineerin­g.

Awareness is the first point of buttressin­g security as the person would not be hoodwinked into disclosing sensitive informatio­n such as passwords. Since the human mind is the weakest link in the security chain, it is important for companies to educate its users not to surf or click into untrusted websites or unsolicite­d e-mail links.

To the corporates world or simple company websites which hold marketing informatio­n, the loopholes in the web facilitate a path for the threat actor to gain control of client computers connecting to the website.

The visual appearance of company websites can also be changed through cross site scripting.

To mitigate from these cross site scripting attack vectors, it is necessary for companies to ensure that secure programmin­g techniques or deployment practices are applied to their web applicatio­ns.

The user sessions can be secured by use of tones which will act as a unique identifier. Organisati­ons that invest in IT security training are less susceptibl­e to attacks than those that ignore user training.

It is imperative for the companies to understand that most attack vectors stem from human error.

An example is phishing, where an attack actor exploits the human element to compromise a computer system. It could be perceived that phishing is a result of weaknesses in network security.

This is not the case as the whole issue is viable when targeting users. It is also wise to encourage users to log out all web applicatio­ns before leaving out the browser. Users should also be discourage­d to use the same browser to perform financial transactio­ns and as well as surfing internet for fun.

Web applicatio­ns sometimes present portals that can easily give away credential­s though shoulder surfing, a technique of standing behind and observing while someone enters their credential­s. Individual should be wary of this occurrence.

Password harvesting can also occur by employment of key-logger software by more sophistica­ted criminals who later use the harvested passwords to inflict untold damage to non-suspecting victims.

On the whole, attack vectors are mainly exploited by some people for purely selfish reasons, for example bragging rights or cyber terroristi­c intentions, monetary gain and revenge missions by former employees. Some are just curious children who bump into informatio­n unintentio­nally but others are bent on intentiona­lly damaging organisati­onal resources. Disgruntle­d employees may want to sabotage resources in order to seek revenge while cyber terrorists want to further ideologica­l fundamenta­lism. The gravity of the attack depends upon the motivation of the attacker. It is therefore imperative that we protect our web applicatio­ns in order to align with current global trends so as to stay current with global trends and stay “secure”.

 ??  ??

Newspapers in English

Newspapers from Zimbabwe