Week 7 - STRIDE: Repudiation
(memecrunch.com)
Repudiation, in short, is the denial of any wrongdoing, which is the very first thing anyone
would do when they get caught doing something illegal. Professional hackers learn to cover their
track very well. Likewise, security
professionals learn to track. For the
email tampering case I mentioned, the defendant
would not win the lawsuit if old emails weren’t available for investigation. So, what are ways to repudiate? Two words: evidence tampering.
Storage
In the old days, tapes are IT’s savior when it comes to data
restoration. Tapes quickly became obsolete
giving ways to hard drive, which will soon change to cloud storage. Destroying or tampering with backups will no
longer need physical access. In fact, the
storage is located at a data center somewhere thousands of miles away and under
extreme security protection. When it is
on the cloud, no one knows where and how their data is managed. So! Having
local backups can be very useful or even save your job some days.
Logs
Log files may be the first thing that an IT person get to
first after detecting an intrusion. And they
may also be the last place hackers visit before they leave the premises. In Windows platforms, there are logs and
events that one can look for suspicious activities. In Linux, most of the logs are stored in /var/log directory.
Audit
Audit data has lots of sensitive information. The data often shows who, what, where, when
the action was taken. Audit information
is different from log data. It is
designed specifically to track activities that could lead to system failure or
malfunction. Normally, an audit log
contains the identity of the user, the machine from
which the user login, the time it happened,
and the action that was requested.
More sophisticated hackers make use of encrypted
tunnels. They would connect to many
servers using TLS or SSL connections before reaching the target. When using such technique, the identity and origination
information in the logs or audit logs are no longer useful.
To nail those who are responsible,
we need to make sure our tracking mechanisms are protected from tampering. Backups are always useful when the time
comes, although it sounds like a waste of time and space. Like the case of the Signal Lake lawsuit, the company would have lost the millions
of dollars if they weren’t able to prove the email was manipulated.
Comments
Post a Comment