CAN protocol and IoT [1/3] #TC2027

--Originally published at Information Security A01229898

Internet of Things or IoT is something really popular nowadays, IoT for me in a few words is a lot of thing all connected so you can know all the information you want at every moment, so the cars will be conected too, on the next three post (incluiding this) I will talk a little about what I think of IoT with cars, first I will talk a little about the Controller Area  Network (CAN) protocol.

The Controller Area Network (CAN) protocol, is a serial communication protocol created at the 80’s by Bosch, at the beggining it was for the communication between controllers inside an automobile.

bosch

The information is transmitted between the control units through a data frame with a length and structure defined with braided cable, on the image below you can see how it looks.

 

can

 

The characteristics of the CAN protocol are:

-Message priority.

– Guaranteed latency times.

– Flexibility in the configuration.

– Multicast reception with time synchronization.

– Multimaster System: all the control units can transmit and receive, any control unit introduce a message inside the bus with the condition that the bus is free, if two control units try to send a message at the same time, the message with more priority will be sended first.

etc.

Just to finish this blog, the CAN protocol is supposed to be the same since the 1980’s, so I think that something that works for so long can be so trustworthy, because it means that people haved a lot of time to see how can be affected, but if the industry still use this protocol is because it can be secure and even though is that old, they have make updates of that protocol.

If you want to know more about the CAN bus you can see Continue reading "CAN protocol and IoT [1/3] #TC2027"

Phishing

--Originally published at Information Security Class

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. According to the 2013 Microsoft Computing Safety Index, released in February 2014, the annual worldwide impact of phishing could be as high as US$5 billion.

In June 2013, security firm Kaspersky Lab estimated that 37.3m people had encountered phishing attacks in the last year. Symantec, meanwhile, estimates that phishing accounted for one in 392 emails per day in 2013. Phishing is all about convincing you to divulge information that could help criminals steal your money and/or install malware on your computer, potentially also selling your passwords on to others.

It works by impersonating communications from companies that you trust: banks, online payment firms like PayPal, social networks, online retailers and other technology companies, as well as government bodies (tax authorities, for example). According to Symantec, 71% of phishing attacks in 2013 were related to financial organizations.

A lot of phishing attacks are done without you ever seeing them, thanks to the spam filters used by companies and webmail providers. But for those that make it through to your inbox, there are some common-sense tips to ensure you don’t fall victim.

If it looks wrong, it probably is wrong

Phishing often looks, well, fishy. Typos can be a sign that an email is dodgy – yes, The Guardian may be on thin ice with this point, but typos in an email from your bank really are a red flag – as are all-capitals in the email’s subject and a few too many exclamation marks.

Check the email address carefully

If you often get emails from a particular company, they’ll usually come Continue reading "Phishing"

What can we do to browse the internet safely?

--Originally published at Information Security Class

In my last blog I wrote about why the internet can be a really insecure place and that if you are not careful, your personal information can be compromised. That is why now I am writing what can we do to increase our security while we browse the web. Here I listed some things that will improve your internet security:

Encryption

Encryption used to be the sole province of geeks, but a lot has changed in recent years. In particular, various publicly available tools have taken the rocket science out of encrypting email and files. GPG for Mail, for example, is an open source plug-in for the Apple Mail program that makes it easy to encrypt, decrypt, sign and verify emails using the OpenPGP standard. And for protecting files, Apple’s MacOS operating system come with a new filesystem called APFS that lets you encrypt the hard drive of your computer. Those running Microsoft Windows have a similar function.

Web browsing

Since browsing is probably what internet users do most, it’s worth taking browser security and privacy seriously. If you’re unhappy that your clickstream (the log of the sites you visit) is in effect public property as far as the security services are concerned, you might consider using freely available tools such as Tor Browser to obscure your clickstream.

Wireless services

Have Bluetooth off by default in all your mobile devices. Only switch it on when you explicitly need to use it. Similarly, beware of using open wifi in public places. At the very minimum, make sure that any site you interact with uses HTTPS rather than unencrypted HTTP connections.

Personal security

It is recommended to use a password-management app like LastPass or 1Password, this applications not only provide safe passwords for you to use, but also encrypt all your information. This apps Continue reading "What can we do to browse the internet safely?"

What does VPN means?

--Originally published at Computer and Information Security

Before we start, I’ll recommend you to see the following video regarding Virtual Private networks:

 

So what is a VPN?

A VPN is a connection between the computer and a server. The server is operated by the VPN service and it creates a secure connection between both of them by a tunnel. This connection makes the user to be part of the company’s network, as if the computer was on it. The tunnel hides the traffic until it leaves the tunnel. One of the main goals is to hide the IP address of the computer.

There are a lot of advantages while using a VPN, its important to notice that the number of functions of a VPN is interesting. I’ll mention three of them.

Advantages

  • It prevents anyone that is on the same network access point from intercepting your web traffic in a man-in-the-middle attack.
  • It makes harder for advertisers, or spies, or hackers to track you online.
  • Avoid censorship, but it could be against the law.

I think that one of the most remarkable ones is the first one. Using a VPN to avoid or prevent a interception from another person is a very useful took. It is important to mention that the VPN doesn’t protect your information entirely, but it can make it harder for people to track your online information. As an example, we can see this useful feature as a shield that protects your information from a man-in-the-middle attack.

Avoiding censorship might be illegal in some countries, maybe in most of them, but it can be very practical. We can see this as a tool for a journalist. A journalist needs to find information for his or her research, but maybe the country blocks this information for many reasons. In this case, a journalist

Screen Shot 2018-02-08 at 3.37.34 PM.png
Continue reading "What does VPN means?"

IT Risk Management Frameworks

--Originally published at Seguridad Informática

Risk IT

Risk IT provides an end-to-end, comprehensive view of all risks related to the use of IT and a similarly thorough treatment of risk management. In business today, risk plays a critical role. Almost every business decision requires executives and managers to balance risk and reward.

Risk IT is a framework based on a set of guiding principles for effective management of IT risk. The framework complements COBIT, a comprehensive framework for the governance and control of business-driven, IT-based solutions and services.

While COBIT provides a set of controls to mitigate IT risk, Risk IT provides a framework for enterprises to identify, govern and manage IT risk. Enterprises who have adopted COBIT as their IT governance framework can use Risk IT to enhance risk management.

COBIT provides the means of risk management and Risk IT provides the ends.

 

COBIT Control Objectives for Information and Related Technology.

It is a framework that it is meant to be a supportive tool for managers and allows bridging the crucial gap between technical issues, business risks and control requirements.

Today, COBIT is used globally by all managers who are responsible for the IT business processes. COBIT ensures quality, control and reliability of information systems in organization, which is also the most important aspect of every modern business.

Some of the components of COBIT include:

  • Framework: IT helps organizing the objectives of IT governance and bringing in the best practices in IT processes and domains, while linking business requirements.
  • Process Descriptions: It is a reference model and also acts as a common language for every individual of the organization.
  • Control Objectives: This provides a complete list of requirements that has been considered by the management for effective IT business control.
  • Maturity Models: Accesses the maturity and the capability of every process while addressing Continue reading "IT Risk Management Frameworks"

Ethical hacking

--Originally published at Seguridad Informática

 

Every weak we see hacking on the news, it seems like the bad guys are always causing problems. From the annoying spam to the destructive cyber-attacks that steal personal data. But we need to know that there are good guys with the same skills, the ethical hackers.

An ethical hacker is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various system. Ethical hackers and malicious hackers use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.

What is the difference between ethical hackers and malicious hackers?

An ethical hacker’s break into systems legally and ethically.

 

An ethical hacker might use some of these strategies to penetrate a system:

  • Scanning ports and seeking vulnerabilities: An ethical hacker uses port scanning tools like Nmap or Nessus to scan one’s own systems and find open ports.
  • An ethical hacker will examine patch installations and make sure that they cannot be exploited.
  • The ethical hacker may engage in social engineering concepts like dumpster diving rummaging through trash bins for passwords, charts, sticky notes, or anything with crucial information that can be used to generate an attack.
  • An ethical hacker may also employ other social engineering techniques like shoulder surfing to gain access to crucial information or play the kindness card to trick employees to part with their passwords.
  • An ethical hacker will attempt to evade IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), honeypots, and firewalls.
  • Sniffing networks, bypassing and cracking wireless encryption, and hijacking web servers and web applications.
  • Ethical hackers may also handle issues related to laptop theft and employee fraud.

 

One can not just

logo_ceh
Continue reading "Ethical hacking"

How safe is the Internet in reality?

--Originally published at Information Security Class

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to me.

A decade ago the main purpose of the Internet was purely focussed on email communication and web browsing activities. Commercial, critical or even complex transactions were rarely performed on the Internet.

User interactions through web applications were possible at the time; however in most cases it was very simple and “unsafe”. Security concepts or even safety precaution measurements in corporate environments were ignored and were hardly implemented in any web application solutions.

Have you ever had any concerns about your privacy or security issues a decade ago? E.g. when sending an email with sensitive information to someone or filling sensitive information in a web form on the internet? How safe did you feel when browsing the web?

It is quite interesting that such concerns were not felt at that time. Yet much has changed now.

Internet and web security measurements in private or corporate environments are being taking more seriously than a decade before. Many efforts have been made by corporate organizations and educational institutes to make the internet more transparent and much safer.

At the same time billions of harmful malwares, worms, bots and malicious codes have been developed and distributed over the web. Some of them have survived until now as they have been coded with “intelligence” such as being able to act independently based on sophisticated algorithms.

Without security measurements no administrator in the world would be able to detect intrusions or even be smart enough to block a hidden attack on his corporate network. Data theft runs at milliseconds and you even won’t be Continue reading "How safe is the Internet in reality?"

Certifications in Computing Security

--Originally published at Seguridad Informática

Data breaches are growing in number, size and criticality, the cybersecurity talent gap is widening, and the security unemployment rate is at zero. Now a day’s cyber security and InfoSec skills are in remarkably high demand and are a good place to start for anyone looking to begin or advance a successful IT career path.

CISSP – Certified Information Systems Security Professional

Is an exam that will certify you have mastered the knowledge required to handle data and network security for companies.

The exam is 250 questions long, and it takes about six hours to complete. It is designed for professionals with a minimum of three to five years of experience

You will be challenged in a number of cyber security domains including:

  • Security management practices
  • Access control
  • Cryptography
  • Security models and architecture
  • Telecommunications
  • Networking

The average annual pay for CISSP certificate holders in $109,000.

cissp-certification-training-exam-pass-guarantee-st-louis

CISA – Certified Information Systems Auditor

It is focused on info systems control and monitoring skills. CISA applicants must have a minimum of five years professional experience and score above 450 on the 200-800 point test in order to be approved for this certification.

The topics of the exam will be focused on:

  • Information systems disciplines
  • Your skills in IT management and governance and the protection of information assets.

The annual salary of CISA certificate holders is $110,000.

cisa-logo

CISM – Certified Information Security Manager

Is centered on information security management. Applicants must pass a 200-question exam.

Will weigh their abilities in:

  • Developing and managing information security programs
  • Being able to quarterback the response to information security incidents.

Applicants must have a verified five-year experience before registering for the exam.

You can expect your CISM certificate to rake in an average of $115,000 annually.

CISMLogo

GSEC – GIAC Security Essentials Certification

GSEC is for people with hands-on information security experience

gsec-gold
crisc-grande
cisa-logo
ecsa
gpen-scaled1000
Security_plus
SSCP-logo-2-lines
Continue reading "Certifications in Computing Security"

Three goals: Integrity, Availability and Confidentiality

--Originally published at Seguridad Informática

All information security measures try to address these three goals:

  • Protect the confidentiality of data
  • Preserve the integrity of data
  • Promote the availability of data for authorized use

These goals form the confidentiality, integrity, availability (CIA) triad, the basis of all security programs. CIA triad, is a model designed to guide policies for information security within an organization. Information security professionals who create policies and procedures must consider each goal when creating a plan to protect a computer system.

02fig01

Confidentiality

Protecting the information from disclosure to unauthorized parties.

Information has value, especially in today’s world. Everyone has information they wish to keep a secret.

With encryption we can protect our information confidentiality. Encryption ensures that only the right people (people who knows the key) can read the information.

Other ways to ensure information confidentiality include enforcing file permissions and access control list to restrict access to sensitive information.

Integrity

Protecting information from being modified by unauthorized parties. Information only has value if it is correct. As with data confidentiality, cryptography plays a very major role in ensuring data integrity.

Commonly used methods to protect data integrity includes

  • Hashing the data you receive and comparing it with the hash of the original message.
  • Use existing schemes such as GPG to digitally sign the data.

 

Availability

Ensuring that authorized parties are able to access the information when needed. Information only has value if the right people can access it at the right times. There are some factors that might deny access to our information.

Factors that could lead to lack of availability to important information:

  • DDoS attacks is to deny users of the website access to the resources of the website.
  • Accidents such as power outages or natural disasters such as floods.

How does one ensure data availability?

Backup is key. Continue reading "Three goals: Integrity, Availability and Confidentiality"