Sie sind auf Seite 1von 6

International Journal of Computer Science Research & Technology (IJCSRT)

ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

Data Breach Risk Reduction through Perimeter Security and Smart


Surfing
Adewale O Adebayo
School of Computing and Engineering Sciences, Babcock University, P.M.B.21244 Ikeja, Lagos,
Nigeria

Abstract

Data breach is probable, damaging and costly to No matter the kind of computer network system,
organisations. There is a high probability that a there is the need for some type of security to
data breach is through some form of hacking. It is, protect data and other network resources [6], [7],
therefore, important to fortify network perimeter [8]. Noteworthy is the fact that external intrusion or
and to surf the internet smartly in order to reduce hacking is the most prevalent and probable data
the risk of a data breach, which this research is breach method [5], [9], [10], [11], and avoidable
focused on addressing. Converging views in extant through simple or intermediate controls [11].
and current literature prescribe that every Securing network entry points, and surfing the
computer should have installed appropriate Internet smartly are, therefore, important to
firewall and up-to-date antivirus, that network reducing the risk of data breaches, which this
perimeter and network segments within the network research is focused on addressing. Implementation
should be fortified with appropriate firewall(s) and of adequate perimeter security and internet surfing
well configured router(s), and that important prescriptions would raise the bar against successful
T
servers should be hardened and dedicated to hacking and result in fewer data breaches and a
providing only one service. The internet should be
SR
more secure computing environment.
surfed with focus and anonymously where
acceptable, while avoiding falling victim of scams Extensive literature review on the subject matter
and malwares. was performed. The relevant documents obtained
IJC

were qualitatively analyzed for convergence, and


1. Introduction relevant details were extracted, using inductive
A data breach is an incident in which sensitive, approach. The succeeding section presents effective
protected or confidential Personally Identifiable perimeter security measures for personal, small
Information (PII) data has potentially been viewed, office and home office, and for larger networks.
stolen or used by an individual unauthorized to do The subsequent section discuses issues regarding
so, and incidents range from concerted attack by surfing the internet smartly.
black hats with the backing of organized crime or
national governments to careless disposal of used 2. Securing and Fortifying Network
computer equipment or data storage media [1]. A
Perimeter
large number of organisations have reported having
suffered data breaches and more than forty five of
Network Perimeter is the entry point into a network
US states have passed laws requiring that
or a computer system. Securing the perimeter
individuals be notified of security breaches [2], [3],
protects the particular computer or the group of
the catalyst for reporting data breaches to the
computers in the network from external attacks at
affected individuals being the US California law
the entry point, stopping attackers before entry
that requires notice of security breaches
[12], based upon clear understanding of business
implemented July 2003 [4]. No organisation profits
needs and processes related to the storage,
on its data breach. Strong economic reasons for
processing, and transmission of data [8]. Perimeter
organisations not to publicly report storage breach
security is the first line of defence against external
include damage to reputation, loss of current/future
attacks.
customers, liability from other state’s laws, and
possible lawsuits from shareholders/customers [5].
A network should generally have a firewall, which
is any system or group of systems that implements
and enforces any sort of access control policy
between any pair of computers and/or networks,
acting as the fortress wall for the protected.

IJCSRTV1IS050024 www.ijcsrt.org 46
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

Firewalls are devices that control computer traffic matter), and making sure that the POS is a Payment
allowed between an entity’s networks (internal) and Card Industry Data Security Standard compliant
un-trusted networks (beyond the organisation’s application [15].
control), as well as traffic into and out of more
sensitive areas within an entity’s internal trusted Firewall at each internet connection and between
networks [8]. If the incoming network traffic does any demilitarized zone and the internet network,
not fit the rules or policies defined in the firewall, and router with strong access control list, are
the traffic is blocked or rejected and does not enter necessary for a more secure needs (PCI Security
the internal part of the computer or network [12]. Standards Council, 2010). A deeper or more
Network traffic gets from point A to point B based advanced form of packet filtering called “Stateful
on computing device address and port number of Inspection” (dynamic packet filtering) keeps track
specific application requesting the service. Network of the state of the communications above the source
traffic is broken into small pieces called packets. and destination ports and addresses. Rather than
The packet header identifies the source IP address letting traffic in simply because it is on the right
and port as well as the destination IP address and port, it validates that computer on the network
port, which firewalls use to restrict or allow traffic. actually asked to receive the traffic. It also
A basic sort of firewall known as packet filter may evaluates the context of the communications and
be used to deny all traffic from a certain source IP will reject it if it is not in the same context as the
address or to block incoming traffic on certain request. Stateful Inspections use rules or filters or
ports. A firewall can adopt one of two basic policies to check the dynamic state table to verify
policies to control access: whatever is not that the packet is part of a valid connection [16]. A
prohibited is allowed or whatever is not allowed is newer requirement in the multilayer filtering
prohibited [13].The ideal configuration for firewall systems is application filtering, which in addition
is to simply deny all incoming traffic and then filters packets based on the application payload in
create specific rules to allow communication from the network packets, and can prevent malicious
specific IP addresses or ports as the need arises. attacks and enforce user policies. Application layer
Wireless Local Area Network should disallow open filtering includes web browsing and e-mail
T
access and allow only pre-authorized wireless scanning and deep content analyses, including the
Network Interface Cards [6]. ability to detect, inspect, and validate traffic using
SR

any port and protocol [17]. Application gateway


Personal and cable or Digital Subscriber Line and/or application proxy firewall offer(s) a great
(DSL) router firewalls are two different types that a level of protection. An application proxy mediates
IJC

personal computer or another device, which might the communications between the two devices, such
be the first port of call into a small office or home as a computer and server or one network and
office network, should generally implement. The another. All messages terminate at the firewall,
two are not mutually exclusive and should be used where they are captured, stored, logged, and
in conjunction with each other for added security examined. Some of these proxy servers will, upon
[12]. When using this type of router, the default successful screening of an incoming message,
password and default IP address used for the forward it to an appropriate application within the
internal network should be changed as soon as private network, but in most secure proxy servers, a
possible as they are easily available to attackers. It message originating outside an organization cannot
should be noted that cable home router firewall go any further than the firewall unless it passes all
does not provide any protection for users who use a the inspection criteria implemented at the firewall
dial-up telephone connection to access the internet. and an independent application, running within the
The most commonly used, and probably the most organization’s network, selects the message from a
effective, security measure for dial-up connections storage area on the proxy server and consciously
is known as “prearranged call-back” or simply brings it inside the protected network [17], [18].
“call-back”. A personal firewall application, which Application proxy has the added benefit of hiding
is installed on each individual computer system, the client machine’s true identity as the external
whether or not a router is providing protection for communications will all appear to originate from
the network, provides security for the computer the application proxy. The downside is that the
even on dial-up connection. Recent operating application proxy uses a lot more memory and
systems come with built-in firewall applications processing power and may slow down network
[14]. Most attacks directed against small performance. With recent boosts in processing
companies’ Point-Of-Sale (POS) systems can be power and with random access memory being less
prevented by changing administrative passwords on expensive, this issue is not as significant any
all POS systems, implementing a firewall or access longer.
control list on remote access/administration
services, avoiding using POS systems to browse the The perimeter security should be fortified through
web (or anything else on the Internet for that host hardening by removal or disabling of

IJCSRTV1IS050024 www.ijcsrt.org 47
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

unnecessary programs and ports, limiting access to 3. Surfing Smartly


data and configuration files, controlling users and
privileges, maintaining host security logs and
applying operating and application patches on a Surfing the Internet (Net) smartly would reduce
timely bases [19]. Inbound and outbound traffic data breach incidents and increase productivity.
should be limited to that which is necessary only This section therefore introduces the Net in a safer
and all other traffic specifically denied, besides manner by exposing some of its potential pitfalls
eliminating direct access between the internet and and how to avoid them, highlighting some of its
the internal network [8]. Effective anti-virus potential benefits and how to harness them, and
software should also be installed, and regularly highlighting some of its challenges. Succeeding
updated, on every host in the network. Protecting subsections are: Net Literature Review, Avoiding
the network perimeter challenges include balancing Net Pitfalls, Internet Challenges, and Internet
security and usability, determining proper firewall Dating.
design, proving access to resources for remote
users, effective monitoring and reporting, need for 3.1. Net Literature Review
enhanced packet inspection, and security standards
compliance. Encryption, encoding messages before Searching for relevant publications online is done
they enter the network or airwaves, the decoding using online databases, catalogues and search
them at the receiving end of the transfer, should engines as tools, anytime anywhere. There are all-
also be employed for authentication, purpose (e.g. www.google.com,
privacy/confidentiality, integrity and non- www.altavista.com), meta-search (e.g.
repudiation [6]. www.metacrawler.com), and special-purpose (e.g.
scholar.google.com) search engines. Keywords or
Intrusion detection system (IDS) or intrusion search terms are used methodically to produce a list
prevention system (IPS), which helps to detect of potentially useful references [22]. Every
malicious traffic that either slips past the firewall or document on the Net should be carefully evaluated.
originates within the network, may also be Remaining focused and taking a careful look at
T
implemented. IDS can be network-based (NIDS) authorship, credibility and authenticity are
examining actual packets travelling the network in
SR
necessary. Time should be provided for reading
real time or host-based (HIDS) examining log files. what is downloaded. Copies of anything vital
NIDs and HIDS can be used together to alert all the without breaking any copyrights should be made as
different types of attacks that might not be caught web pages can move or disappear without notice.
IJC

by just a NIDS [20]. An IPS is a kind of hybrid Summary of what the literature is about, summary
between an IDS and a firewall, which can alter or of evaluation of the literature and bibliographical
create and enforce firewall rules on detecting information are necessary for refreshing the
probable malicious traffic. Active intrusion memory and avoiding plagiarism [22].
response system (AIRS) using behavioural analysis
of inter-network communications, employing
signal processing, expert decision algorithms,
3.2. Avoiding Net Pitfalls
statistical algorithms, and closed feedback
Some of the pitfalls of the Net are exposure to data
techniques, is a more robust option, which should
theft, presence of malicious software, exposure to
be evaluated based on their self adaptive
inappropriate content, cyber bullying, presence of
mechanism, behaviour analysis, closed feedback
cyber predators, and the ease of damaging one’s
mechanism, countermeasures, real-time, and
reputation.
visualization capabilities [21].
Business should be transacted only at trusted
Firewalls, well configured routers, intrusion
websites, which provide secure connection
detection or prevention devices, and host hardening
indicated by the Uniform Resource Locator (URL)
will not protect from every possible computer
beginning with the prefix “https” where personal
attack, but exposure to risk is greatly reduced and
and credit details are requested. Further
security is increased with one or more of these
information may be found about the site’s security
technologies in place. If information is highly
by right-clicking on the web page, selecting
desired or targeted for other reasons, understanding
properties, and then clicking on the certificate
the motives, skills, and methods of our adversaries
button. The URL in the browser must match the
is important to any well-considered and well-
name in the certificate. Responsible and
prepared defence [11].
trustworthy websites hold certificates that are
issued by licensed certification authorities. A list of
the licensed authorities in the United States of
America can be found on the State Department’s
website at www.secstate.wa.gov/ea/ca_lic.htm [23].

IJCSRTV1IS050024 www.ijcsrt.org 48
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

The use of long hard-to-guess passwords (mixture 3.3. Internet Challenges


of letters, numbers and characters) not disclosed to
friends and strangers is essential. Malicious Net challenges include difficulty in policing and
software inadvertent installation should be avoided inherent lack of control. There is difficulty of
by being extremely cautious when opening
catching a wrong doer on the Net. The law differs
downloads or links from friends and strangers, by
never clicking advertisements or answering from country to country. Monitoring facilities
unsolicited e-mails, by refraining from needed are daunting and requires large investment
automatically clicking “yes” buttons, and by of time and effort. The skills required to investigate
downloading legitimate software exclusively from computer crimes quickly go out of date. Online
trusted sites. Installation of genuine software only crime is attractive because of these [27]. Besides,
(system and application), up-to-date antivirus to openness was part of internet design and
guard against viruses, worms, Trojan and the likes,
responsible for its wide-spread success and
and activation of a personal firewall (usually comes
with the operating system) to guard against acceptance; enforcing a level of control would be
spyware [12] is demanded. inhibiting to Net-based innovations.

Installation of internet filtering software to guard 3.4. Internet Dating


against inappropriate contents, to block such sites
even in other languages is also necessary. Online dating or Internet dating is a dating system
Monitoring software may also be installed to record which allows individuals, couples and groups to
instant messaging and chat room conversation as make contact and communicate with each other
well as websites visited by kids. Internet filtering over the Internet, usually with the objective of
software are software you install on your computer
developing a personal, romantic, or sexual
to constrain internet exposure. They are fallible and
must be supplemented by parental vigilance relationship [28]. Online dating services generally
T
regarding children. Free internet content filters are require a prospective member to provide personal
available from the Australian government NetAlert information. Most sites allow members to upload
SR

website (www.netalert.gov.au/home.html). The photos of them and browse the photos of others.
main types are filters, labels and safe zones. Filters Many sites are broad-based. Other sites are more
allow or disallow access to sites based on settings,
specific, based on the type of members, interests,
IJC

labels based on site label, and safe zone allows


access only to secure networks suitable to children, location, or relationship desired. The most
better pre-school [24]. successful niche sites pair people by race, sexual
orientation or by religion [29]. Online daters may
Instant messaging may be blocked or banned to have more liberal social attitudes compared to the
forestall cyber bullying, and the e-mail address general population [30]. Virtual dating combines
known to the bully, if any, may be deleted and online dating with online gaming using avatars for
another created made known only to family and
people to interact in a virtual venue that resembles
trusted friends. Cyber bullying should never be
responded to but evidence should be kept and a real life dating environment. It allows users to
report should be made to the police or Internet explore compatibility, sense of humour and rapport.
Service Provider (ISP), e-mail provider, or website People who had had a chance to interact with each
host [24]. other (by computer only) on a virtual tour of a
museum subsequently had more successful face-to-
User names and profiles should be kept generic and face meetings than people who had viewed only
anonymous. Posting personal photos and personal
profiles [31].
information online should be avoided to elude Net
predators. Parents should become part of children’s
online experience, learn about the Net, and be part 3.4.1. Internet dating problems. Many members
of keeping the Net safe [25]. The possible of dating sites misrepresent themselves by telling
consequences of posted photographs, videos, flattering lies. Casual dating sites are often geared
among others, that may be copied freely should be more towards short term (potentially sexual)
well known by all to avoid damaged reputation. relationships. Online predators find online dating
Taking of pictures or videos that could cause sites especially attractive, because such sites give
embarrassment online should be avoided
them an unending supply of new targets of
completely [26]. Individuals should have a clear
plan of what they want to achieve and remain opportunity for Internet fraud. Disreputable sites
focused while online.

IJCSRTV1IS050024 www.ijcsrt.org 49
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

may harvest users' personal information and avoided with limited exceptions. Niche online
contacts for use in e-mail spam [32]. dating within reachable locality done with deserved
care and caution is advisable.
3.4.2. Dating sites safety tips. Personal
information, such as email address, telephone or
cell numbers, home or work address, should never
be displayed on profile. An un-identifiable name Most data breaches are preventable through these
should be use in signing up. Person met online to means. However, clear understanding of business
be met offline should be really known - person's needs and processes related to the storage,
full name, address, cell phone or home phone processing, and transmission of data, and
number and even the place of work, and verified understanding of the motives, skills, and methods
before the meeting. It takes a long time to do, and of attackers, and are important to any well-
the desire is for the person to take precedence in considered and well-prepared defence.
many circumstances. Care should be taken to report
stalkers and harassers that are bugging or sending 5. References
messages. It is vitally important to avoid sending [1] Wikipedia. ( 2012). Data Breach. Retrieved
nude photographs. Besides, it should be noted that from http://en.wikipedia.org/wiki/Data_breach
photographs are unreliable as they could be
[2] Attrition. (2011). Entities that suffer large
deceptive [33].
personal data incidents (list). Retrieved from
http://attrition.org/errata/dataloss
4. Summary and Conclusion
[3] PrivacyRights. (2011). A chronology of data
A personal computer with direct access to external breaches reported since the Choicepoint incidence (list).
network requires turning on its operating system Privacy Rights Clearing House. Retrieved from
http://www.privacyrights.org/ar/ChronDataBreaches.htm
T
built-in firewall, and installation of effective anti-
virus software with real-time update. A small [4] National Conference of State Legislatures.
SR

office or home office network requires a rightly (2012). State Security Breach Notification Laws.
Retrieved from
configured cable or DSL router-based firewall and
http://www.ncsl.org/default.aspx?tabid=13489
IJC

installed effective anti-virus software with real-


time update on every host in the network to protect [5] Hasan, R., & Yurcik, W. (2006). A Statistical
the perimeter and ensure maximum security for the Analysis of Disclosed Storage Security Breaches.
International Workshop on Storage Security and
computers. A network requiring excellent perimeter Survivability: in conjunction with 12th ACM Conference
security demands at least an application gateway on Computer and Communications Security, October,
and an application proxy firewall. The perimeter 2006
security should also be fortified through host
[6] Jessup, L. & Valacich, J. (2007). Information
hardening. Effective anti-virus software with real- Systems today - Managing in the digital world. Saddle
time update should also be installed on every host River, New Jersey – Pearson Education
in the network. Inclusion of an intrusion detection
[7] Microsoft. (2000). Networking Essentials Plus.
and prevention security is also necessary. Redmond, Washington: Microsoft Press

Exploring the resources of the Net maximally [8] PCI Security Standards Council. (2010). PCI
requires wisdom in order to avoid its potential Data Security standard. Retrieved from:
pitfalls. A definite purpose for accessing the Net https://www.pcisecuritystandards.org/documents/pci_dss
_v2.pdf
each time and a constant focused attention is
required. The site to visit should be clear or [9] Adebayo, A. O., Omotosho, O. J., and
effective use of particular search engine(s) is (are) Adekunle, Y. A. (2012). Statistical Insight into Breach
Data toward Improved Countermeasures. Journal of
entailed. Everything online should be verified, even
Information and Knowledge Management, Vol. 2, No. 8
when published by supposed trusted sites. The pp 40-51.
computer or other devices through which the Net is
accessed should be protected with firewall, up-to- [10] Culnan, M J, and Williams, C C. (2009). How
Ethics Can Enhance Organizational Privacy: Lessons
date antivirus and filtering software to guard from the ChoicePoint and TJX Data Breaches. MIS
against malicious codes and abuse. Posting Quarterly December 2009, Vol. 33, Issue 4 (pp. 673-687)
personally identifying information online should be

IJCSRTV1IS050024 www.ijcsrt.org 50
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

[11] Verizon Risk Team. (2012). 2011 Data Breach [27] Shostack, A & Stewart, A. (2009). The new
Investigation Report. Retrieved from approach to Information Security. Harlow, Essex:
http://www.verizonbusiness.com/resources/reports/rp_da Pearson Education
ta-breach-investigations-report-2011_en_xg.pdf
[28] Wikipedia – Online Dating. (2012). Online
[12] Bradley, T., & Carvey, H. (2006). Essential dating Service. Retrieved from
Computer Security. Rockland, MA, US: Syngress http://en.wikipedia.org/wiki/Online_dating_service
Publishing
[29] Sullivan, J. C. (2008). "Let’s Say You Want to
[13] Parenty, T. (2003). Digital Defense. Boston: Date a Hog Farmer". New York Times. Retrieved from
Harvard Business School Press http://www.nytimes.com/2008/04/27/fashion/27niche.ht
ml?_r=1&ref=fashion&oref=slogin
[14] Microsoft. (2004). Understanding Windows
Firewall. Microsoft.com. Retrieved from [30] Madden, M., & Lenhart, A. (2006). "Online
www.microsoft.com/windowsxp/using/security/internet/s daters tend to identify with more liberal social attitudes,
p2_wfintro.mspx compared with all Americans or all internet users." Pew
Internet & American Life Project. Retrieved from
[15] Verizon. (2012). Point-of-Sale Security Tips. http://www.pewinternet.org/Reports/2006/Online-
Retrieved from www.verizon.com/enterprise/databreach Dating/05-Who-Is-Dating-Online/04-Online-daters-tend-
to-identify-with-more-liberal-social-attitudes.aspx?r=1
[16] Tyson, J. (2005). How Firewalls Work.
Retrieved from www.howstuffworks.com/firewall.htm [31] Epstein, R. (2007). The Truth about Online
Dating: Scientific American. Retrieved from
[17] Kiernan, P. (2010). Network and Perimeter http://www.scientificamerican.com/article.cfm?id=the-
Security. Retrieved from truth-about-online-da&page=4
download.microsoft.com/.../June_8_ME_Network%20an
d%20security.ppt [32] E-consultancy. (2011). Blogs. Retrieved from
http://econsultancy.com/us/blog
[18] Martin, R J, & Weadock, G E. (1997).
Bulletproofing Client/Server Systems. New York, NY, [33] Free Date Club. (2011). Online Dating Safety.
T
US: McGraw-Hill Retrieved from
http://www.freedateclub.com/?L=cms.Free-Online-
SR

[19] Northcutt, S., Zeltzer, L., Winters, S., Kent, K., Dating-Safety
& Ritchey, R. W. (2005). Inside Network Perimeter
Security, 2nd Ed. Indianapolis: SAMS
IJC

[20] Bradley, T. (2004). Host-based Intrusion


Prevention. Retrieved from
http://netsecurity.about.com/cs/firewallbooks/a/aa050804
.htm

[21] Chesla, A. (2011). Active Perimeter Network


Security. Retrieved from
http://www.outpost24.com/files/024_TKK_Network_Stu
dy.pdf

[22] Oates, B J. (2009). Researching Information


Systems and Computing. London: SAGE Publications

[23] Watson, J. (2001). Buying and Selling Online.


London: Dorling Kindersley

[24] Young Media. (2011). Media Children.


Retrieved from
http://www.youngmedia.org.au/mediachildren

[25] Isafe. (2011). Eluding Internet Predators Tip


Sheet. Retrieved from
//xblock.isafe.org/docs/eluding_internet_predators_tip_s
heet.pdf

[26] WebMd. (2011). Parenting – Internet Dangers.


Retrieved from www.webmd.com/parenting/features/4-
dangers-internet?

IJCSRTV1IS050024 www.ijcsrt.org 51

Das könnte Ihnen auch gefallen