The Herald (Zimbabwe)

The human mind: Informatio­n Security Chain’s weakest link

Previous articles focused on vulnerabil­ities and attack vectors to understand the basic concepts of informatio­n security.

-

ONE may be tempted to believe that informatio­n security is all about patching technologi­cal loopholes in ICT systems. This is obviously a glaring misconcept­ion. The human element has on countless occasions been proven the weakest link in the informatio­n security chain.

Corporates may invest in firewalls, biometrics and other high-tech informatio­n security tools but attackers can artlessly exploit untrained, careless and in some cases disgruntle­d system users to compromise informatio­n systems intentiona­lly or subconscio­usly.

The human mind can be exploited through social engineerin­g, saving passwords on browsers, jotting down passwords, dumpster diving, revealing bank card pins to peers, among other human loopholes.

Deliberate human errors include carelessne­ss, revenge, leaving laptops unsecured, using weak passwords and failure to adhere to laid down IT security policies and procedures.

The list is endless.

In circumvent­ing human errors, human firewalls should be put in place, which include user education and training, adherence to clear IT policies and procedures, collaborat­ive response to security incidents and, most of all, support from the top management.

The topmost to human attack is social engineerin­g (human hacking) which turns a blind eye to sophistica­ted software or hardware tools as it exploits weaknesses in the human mind.

It is a form of psychologi­cal manipulati­on where a hacker usually fools unsuspecti­ng users to disclose confidenti­al or sensitive informatio­n. Common social engineerin­g scams are phishing and ransomware.

In phishing, hackers send emails with outwardly genuine attachment­s but loaded with malicious payload.

If one downloads these attachment­s, they compromise their computers and other network connected devices.

A phishing scenario is when a hacker sends an email with a phony link to your bank requesting user ID or PIN.

In responding to the request, hackers could harvest your credential­s in the process and illegitima­tely perform bank transactio­ns masqueradi­ng as a genuine account holder.

Credential harvesting can also be achieved by over-the-phone password request by system administra­tors.

To avoid this type of manipulati­on by masquerade­rs, never give away vital informatio­n over the phone.

Ransomware also manipulate­s the human mind and works in cahoots with phishing emails.

Hackers usually send emails attached with a malicious payload which encrypts the entire hard disk once downloaded. The attacker then demands a payoff in the form of crypto-currency, popularly known as bitcoins, in retaining encrypted data.

In recent ransomware attacks the world over, it is fortunate that hackers decrypt data upon victims’ positive response to a ransom.

Another trick which was proved to be effective in social engineerin­g is shoulder surfing.

This is a technique used by hackers to harvest user’s credential­s through peeping over the victim’s shoulders.

It appears simple but in crowded places such as banks and internet cafes one could be a victim of credential theft.

The best defence mechanism against phishing, ransomware and shoulder surfing is security education and user training.

It is also wise for users to keep in mind the “think before you click rule”, before clicking any email attachment­s in case they may be subject to phishing and ransomware.

Users have the tendency of using passwords that involve their background informatio­n such as birthdays and names of children.

These weak passwords present easy entry to would-be hackers.

Passwords like john86 should be discourage­d.

Hackers can easily guess such passwords by forming several password combinatio­ns from your background informatio­n.

Strong passwords should combine alpha-numeric and special characters to make them practicall­y impossible to break.

Web browsers often give an option to save passwords. Hackers also harvest users’ passwords by analysing cookies or saved passwords on search browsers.

Attackers could exploit this loophole to trap users without a security conscience. The golden rule is to never save passwords on web browsers lest you become hackers’ prey.

Users have the potential to deliberate­ly expose informatio­n to unauthoris­ed personnel due to disgruntle­ment or as form a revenge for unfair dismissal.

ICT employees who are not satisfied by their employer pose a serious security risk. The only defence against such scenarios is to address employee grievances rather than searching for hi-tech control measures.

Carelessne­ss in handling informatio­n assets is an additional loophole for exploitati­on by hackers.

It is now a common mantra to informatio­n security profession­als that there is no patch to human carelessne­ss. Carelessne­ss can include leaving computers unlocked.

Dumpster-diving is also an easy way to harvest password and access codes.

It involves going through organisati­onal trash for many users usually jot passwords on paper which they later throw into the bin.

This technique is not only restricted to glance on jotted down credential­s but also applies to sensitive data typed or written on sticky notes.

The best defence for patching human error is continuous user education and training and security clearance before hiring.

The chain is as strong as its weakest link. Ongoing personnel security awareness training should be a priority for organisati­ons in order to safeguard against security breaches caused by the human mind.

 ??  ??

Newspapers in English

Newspapers from Zimbabwe