%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 14 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240519011443+00'00') /ModDate (D:20240519011443+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6788 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 64.198 521.469 682.536 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 64.198 l 565.984 64.198 l 565.984 745.984 l f 45.266 746.734 m 45.266 64.198 l 46.016 64.198 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(CYBER SECURITY – NO SCIENCE FICTION)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [("Cyber" - the word conjures up images of futuristic robots, a post apocalyptic world and machines displaying human )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(characteristics. Clearly we've seen too many sci-fi movies.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(However, cyber security isn't in the future, it's here now and the threat is very real.)] TJ ET BT 61.016 513.066 Td /F3 9.0 Tf [(Wikipedia defines cyber security as follows:)] TJ ET BT 61.016 493.077 Td /F3 9.0 Tf [(Computer security, also known as cybersecurity or IT security, is the protection of information systems from )] TJ ET BT 490.154 493.077 Td /F4 9.0 Tf [(theft )] TJ ET BT 512.150 493.077 Td /F3 9.0 Tf [(or )] TJ ET BT 61.016 482.088 Td /F4 9.0 Tf [(damage)] TJ ET BT 95.027 482.088 Td /F3 9.0 Tf [( to the )] TJ ET BT 122.549 482.088 Td /F4 9.0 Tf [(hardware)] TJ ET BT 162.563 482.088 Td /F3 9.0 Tf [(, the )] TJ ET BT 182.579 482.088 Td /F4 9.0 Tf [(software)] TJ ET BT 219.587 482.088 Td /F3 9.0 Tf [(, and to the )] TJ ET BT 267.125 482.088 Td /F4 9.0 Tf [(information)] TJ ET BT 316.625 482.088 Td /F3 9.0 Tf [( on them, as well as from )] TJ ET BT 419.162 482.088 Td /F4 9.0 Tf [(disruption)] TJ ET BT 463.163 482.088 Td /F3 9.0 Tf [( or )] TJ ET BT 476.168 482.088 Td /F4 9.0 Tf [(misdirection)] TJ ET BT 529.682 482.088 Td /F3 9.0 Tf [( of )] TJ ET BT 61.016 471.099 Td /F3 9.0 Tf [(the )] TJ ET BT 76.028 471.099 Td /F4 9.0 Tf [(services)] TJ ET BT 112.055 471.099 Td /F3 9.0 Tf [( they provide. It includes controlling physical access to the hardware, as well as protecting against harm that )] TJ ET BT 61.016 460.110 Td /F3 9.0 Tf [(may come via network access, data and code injection, and due to malpractice by operators, whether intentional, )] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(accidental, or due to them being tricked into deviating from secure procedures. )] TJ ET 0.373 0.169 0.255 rg BT 61.016 438.132 Td /F3 9.0 Tf [(https://en.wikipedia.org/wiki/Computer_security)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 436.981 m 248.576 436.981 l S 0.400 0.400 0.400 rg BT 248.576 438.132 Td /F3 9.0 Tf [( \(2015/10/12\))] TJ ET BT 61.016 418.143 Td /F3 9.0 Tf [(It is clear that any theft from ICT equipment or data, as well as any disruption of service, can be added to this definition.)] TJ ET BT 61.016 398.154 Td /F3 9.0 Tf [(The following categories have been included in Wikipedia: )] TJ ET BT 294.620 398.154 Td /F3 9.0 Tf [(Backdoors; )] TJ ET BT 342.140 398.154 Td /F3 9.0 Tf [(Denial-of-service attack; )] TJ ET BT 441.167 398.154 Td /F3 9.0 Tf [(Direct-access attacks; )] TJ ET BT 61.016 387.165 Td /F3 9.0 Tf [(Eavesdropping; )] TJ ET BT 126.050 387.165 Td /F3 9.0 Tf [(Spoofing; )] TJ ET BT 166.577 387.165 Td /F3 9.0 Tf [(Tampering; )] TJ ET BT 214.592 387.165 Td /F3 9.0 Tf [(Privilege escalation; )] TJ ET BT 297.122 387.165 Td /F3 9.0 Tf [(Phishing; )] TJ ET BT 336.641 387.165 Td /F3 9.0 Tf [(Clickjacking; )] TJ ET BT 389.147 387.165 Td /F3 9.0 Tf [(Social engineering and trojans. )] TJ ET BT 515.210 387.165 Td /F3 9.0 Tf [(\(Over )] TJ ET BT 61.016 376.176 Td /F3 9.0 Tf [(the next few months we will be discussing these categories in more detail.\))] TJ ET BT 61.016 356.187 Td /F3 9.0 Tf [(The reasons for attacks on companies are mostly for financial gain, but where Stellenbosch University is concerned, there )] TJ ET BT 61.016 345.198 Td /F3 9.0 Tf [(are a few other reasons. For example financially, manipulation of marks or degrees, access to exam papers, access to )] TJ ET BT 61.016 334.209 Td /F3 9.0 Tf [(and manipulation of research material, obtaining contact information \(staff, students or donors\), for ideological reasons, )] TJ ET BT 61.016 323.220 Td /F3 9.0 Tf [(using our computing power and abusing our high speed internet access to launch attacks on other entities, etc.)] TJ ET BT 61.016 303.231 Td /F3 9.0 Tf [(The biggest weak spots in security include usernames and passwords; untrained or inadvertent users; unsafe work )] TJ ET BT 61.016 292.242 Td /F3 9.0 Tf [(stations; obsolete equipment, faulty hard drives; ")] TJ ET BT 257.306 292.242 Td /F3 9.0 Tf [(man-in-the-middle)] TJ ET BT 329.819 292.242 Td /F3 9.0 Tf [("attacks and cloud services.)] TJ ET BT 61.016 272.253 Td /F3 9.0 Tf [(The easiest way to gain access to our systems is by means of an existing username and password. Of course it's of the )] TJ ET BT 61.016 261.264 Td /F3 9.0 Tf [(utmost importance that users choose passwords that are difficult to hack and maintain good password practice.)] TJ ET BT 61.016 241.275 Td /F3 9.0 Tf [(Don't use official SU usernames and passwords for any other service or social media. Rather create a separate gmail or )] TJ ET BT 61.016 230.286 Td /F3 9.0 Tf [(live.com e-mail address and use it for official registrations and services.)] TJ ET BT 61.016 210.297 Td /F3 9.0 Tf [(User access needs to be audited on a regular basis and out-dated rights, need to be removed.)] TJ ET BT 61.016 190.308 Td /F3 9.0 Tf [(Untrained or inadvertent users are probably the single biggest risk. It's easy to be "convinced" to click on a link or open an )] TJ ET BT 61.016 179.319 Td /F3 9.0 Tf [(e-mail attachment. Someone who does not pay attention to what they do, are easy targets - even in cyber space.)] TJ ET BT 61.016 159.330 Td /F3 9.0 Tf [(Work stations under control of end users with administrator rights provide another risk, since they can install any )] TJ ET BT 61.016 148.341 Td /F3 9.0 Tf [(programme. Users navigate to any web address and click links without thinking twice. Any of these links can compromise )] TJ ET BT 61.016 137.352 Td /F3 9.0 Tf [(the workstation and subsequently also the whole campus infrastructure.)] TJ ET BT 61.016 117.363 Td /F3 9.0 Tf [(Even outdated equipment contains data. Therefore it is important that any data be removed before equipment leaves )] TJ ET BT 61.016 106.374 Td /F3 9.0 Tf [(university property.)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 437.2996 248.5757 446.4571 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Computer_security) >> endobj 14 0 obj << /Type /Page /Parent 3 0 R /Contents 15 0 R >> endobj 15 0 obj << /Length 867 >> stream 0.400 0.400 0.400 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 672.778 521.469 85.206 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 672.778 m 566.734 672.778 l 565.984 673.528 l 46.016 673.528 l f 566.734 757.984 m 566.734 672.778 l 565.984 673.528 l 565.984 757.984 l f 45.266 757.984 m 45.266 672.778 l 46.016 673.528 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 740.193 Td /F3 9.0 Tf [(These are just a few examples of threats to cyber security and the challenges they present Information Technology. With )] TJ ET BT 61.016 729.204 Td /F3 9.0 Tf [(the assistance of our users, we can at least prevent a few of these dangers.)] TJ ET BT 61.016 709.215 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 690.726 Td /F3 9.0 Tf [(Posted in:Security | | With 0 comments)] TJ ET endstream endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000476 00000 n 0000000558 00000 n 0000007398 00000 n 0000007510 00000 n 0000007617 00000 n 0000007733 00000 n 0000007853 00000 n 0000007980 00000 n 0000008079 00000 n 0000008144 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 9063 %%EOF Cyber security – no science fiction « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Cyber security – no science fiction

“Cyber” – the word conjures up images of futuristic robots, a post apocalyptic world and machines displaying human characteristics. Clearly we’ve seen too many sci-fi movies.

However, cyber security isn’t in the future, it’s here now and the threat is very real.

Wikipedia defines cyber security as follows:

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. https://en.wikipedia.org/wiki/Computer_security (2015/10/12)

It is clear that any theft from ICT equipment or data, as well as any disruption of service, can be added to this definition.

The following categories have been included in Wikipedia: Backdoors; Denial-of-service attack; Direct-access attacks; Eavesdropping; Spoofing; Tampering; Privilege escalation; Phishing; Clickjacking; Social engineering and trojans. (Over the next few months we will be discussing these categories in more detail.)

The reasons for attacks on companies are mostly for financial gain, but where Stellenbosch University is concerned, there are a few other reasons. For example financially, manipulation of marks or degrees, access to exam papers, access to and manipulation of research material, obtaining contact information (staff, students or donors), for ideological reasons, using our computing power and abusing our high speed internet access to launch attacks on other entities, etc.

The biggest weak spots in security include usernames and passwords; untrained or inadvertent users; unsafe work stations; obsolete equipment, faulty hard drives; “man-in-the-middle“attacks and cloud services.

The easiest way to gain access to our systems is by means of an existing username and password. Of course it’s of the utmost importance that users choose passwords that are difficult to hack and maintain good password practice.

Don’t use official SU usernames and passwords for any other service or social media. Rather create a separate gmail or live.com e-mail address and use it for official registrations and services.

User access needs to be audited on a regular basis and out-dated rights, need to be removed.

Untrained or inadvertent users are probably the single biggest risk. It’s easy to be “convinced” to click on a link or open an e-mail attachment. Someone who does not pay attention to what they do, are easy targets – even in cyber space.

Work stations under control of end users with administrator rights provide another risk, since they can install any programme. Users navigate to any web address and click links without thinking twice. Any of these links can compromise the workstation and subsequently also the whole campus infrastructure.

Even outdated equipment contains data. Therefore it is important that any data be removed before equipment leaves university property.

These are just a few examples of threats to cyber security and the challenges they present Information Technology. With the assistance of our users, we can at least prevent a few of these dangers.

 

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.