Thursday, October 15, 2009

Social Media Revolution

I joined Orkut in 2006, to be li'l more specific February, 2006. By the time I joined Facebook it was 2009, and in these three years bebo, twitter and bharatstudent (in india) has already taken the world by storm. MySpace , Digg , hi5 e.t.c were already there from 2003/2004, but wasn't really popular amongst Indian Students (at least may group). There are many others who have stepped into the bandwagon, some seeing success some still searching for it. Social Networking, the concept as popularized by Orkut and Facebook worldwide, seems to have moved cities and states into the virtual world. We are in the age of Social Media Revolution, and it is coming up strongly. With a strong sense of bonding and opportunity to keep in touch these sites offer a lot of services apparently for free to the normal user, in turn building up a cult of followers which can be and in cases is a potential market for advertising and product endorsements.

Social Media refers to the explosion of data and information disseminated everyday though the social networking sites. It allows a brand to get closer to people by the people, penetrate our lives.The only advertisement strategy that both produces sales as well as builds up a strong loyal customer base is till now Word Of Mouth  and these sites have started to use / exploit it lately. There is a potential market hidden and it requires patience and skills to tap it without destroying the ecosystem.

To look into the statistics, Orkut has got around 50% users from Brazil and around 18% users from India and it has around 30 million users! Facebook has 250 million, Digg has around 240 million visitors, twitter has above 5 million regular users (twitter ranking by Alexa is 13[todays figure]) similar figures follow for hi5, bharatstudent and others. Since these sites people to be the guide, say in making friends, often people find old or new friends on these sites (with a different approach in case of twitter) sometimes they tend to be localized in terms of craze or hype. But nevertheless they present a perfect platform for a range of things, say a product launch, affiliate marketing, events tracking, audio and visual entertainment (allowing users to subscribe to say a YouTube channel ... advertising or selling music maybe?), word of mouth propaganda and lastly most of them allow formation of communities which safeguard to some extent loyalty of a customer.

This is a Image search result for Social media Revolution, that summarizes it all (thanks Florian Lainez) :



Though on pen and paper it looks mushy to the novice, the scenario in reality is a bit twisted. Being on Internet was never going to be easy and safe, as on the highways. Hence a number of plagues cripple the systems almost regularly, starting with spams(in any form, scraps in Orkut, tweets by bots e.t.c), worms, viruses and unsolicited friend requests. Orkut has been plagued by FrandShippers, facebook being attacked by koobface e.t.c. There has been lots of controversies regarding these sites and facilities that they provide, as these are exploitable in a wrong manner as in any other form of science(nuclear energy was not to be made into atom bombs). Nevertheless Social Media has evolved over the years from being a closed group of networks to a open world, where developers of these sites have started sharing API's for better integration of a site to another, or your own site, thereby increasing reach, coverage and better interaction between the consumer and the merchandiser.

The real potential of these sites are the fact that people who have once been in one social network would remain there or move into another, but social network !

To have a better look at the revolution this is a must watch video:
http://www.youtube.com/watch?v=NhPgUcjGQAw

Wednesday, October 14, 2009

SIEM Insights

Organizations worldwide have to follow regulations, thwart attacks against their Websites and Networks, in order to grow exponentially and expand geometrically! Leaving aside a plethora of business issues, on thing that consciously bugs almost all is security. The need for security and regulations is more for Banks, Financial organizations, Insurance dealers and who deal in all or mix and match parts of the three.

Hence, today we stand at a point, where we have this huge WEB, WWW. Internal networks, making the different company locations and data available at any point any time. Thus increases the need for better infrastructure, and command over the network, both internal and external. It is becoming seemingly difficult to be informed, let alone be managed about the various security and compliance violations taking place across the length and breadth of any given organization.

SIEM tools, or Security Information and Event Management tools provide a better look and allow management of these security incidents in a practical, real-time environment. There has been a lot of research going on, blogs or news being generated about them, and is at a commendable position, apart from Application Security. Though they are related, but application security focuses of implementation flaws, or bugs in general programming constructs as well as provide insights to design flaws, they concentrate on the applications more from a vulnerability stand point. SIEM in turn provides a platform and reports which just not caters to applications alone but to various network devices and network or sometimes local events as well.

Each day IDS/IPS sensors, Firewalls and various applications write millions of lines of logs. Human parsing of all log events in real time is not difficult but Impossible in it's most optimistic usage. SIEM tools accumulate these logs parse them with some intelligence and presents to the security analyst with a hawk eye view of the events that could be a possible security violation. To put it in detail, there are these network devices (IDS/IPS,Firewalls,Routers e.t.c) and the Domain controllers, Antivirus agents, applications (Enterprise & coustom) generating huge amount of log data. The connectors for the SIEM tool collect these data, preferably over HTTP (local deployment of connectors is a scenario, but there are other issues, discussed later) parse them picking up the most relevant fields, required for the Manager / Server that is the heart of the tool and houses the more intelligent parsers and or a correlation engine. The Correlation Engine finds out relations between diverse or similar events, coming form the different or same device(s), with the help of various Rules written by the security analyst/expert. Thus it flags an alert based on the conditions that are relevant for a certain organization, to the security analyst/expert. This provides relief from hand sieving huge amount of data (I presume this would again entail the usage of log analyzers), and yet getting the right event to focus upon in real time.Also a SIEM tool has its own database of events that it captures from various devices, for past data analysis and or for proof of a security breach.

Below is one probable Architecture of a SIEM tool.
(The thin lines show inward flow of events/logs. The thick lines show the events being transfered to the console and the events database)





SIEM allows better incident management compared to conventional methods, along with more reliability. It requires a full insight on the network and it's behavior to achieve the near perfect scenario of never missing a single security event in real time. It requires a lot of effort from both the analyst (Level 1/Level 2 of support) and the expert (Level 3/Level 4 of support) to devise accurate rules, making it sure that almost nothing is missed out. These tools allow one to track all kinds of malicious attempts to scan, gather information (one type can be of SQL injection on well known tables of various implementations of a database) or compromise of a network as well as regulation issues as SOX compliance.

Todays SIEM tools both open source and proprietary softwares, provide various facilities from detection to reporting of incidents. Reporting in the security incident scenario being is an important function, these modern tools provide a plethora of stylish and meaningful reports, with functionalities like that of a BI(Business Intelligence) drill down report. These tools alert about web attacks, such as SQL Injection, Script injection e.t.c, to low level scans of devices and servers to probing servers for information as well as they detect network traffic anomaly, device misconfiguration to failed password attempts and presence of unauthorized softwares to name a few.

How does a SIEM tool or platform assist in day to day event management? The implementation of the network and the tool decides the method of operation, but the basics goes like this.
An organization decides to put an SIEM tool to monitor the production environment. It engages some security analysts to monitor the network(ideally on a 24X7 basis). These analyst start with the stock rules present in the tool, finds out security incidents that are applicable to the organization and alerts the security expert or alternatively to system administrators or network engineers. They also do analysis on events that were not considered by the SIEM vendor for an incident and gathers data, which in turn provide information to the experts to formulate new rules, as and when required. The rules accumulate, undergo threshold or correlation changes to slowly evolve into a system that caters to every security or regulations
 need by the organization.

There are many vendors of SIEM tools, catering to both individual customers as well as MSSPs (Managed Security Service Providers). To name a few would be ArcSight, RSA, Cisco, Check Point, High Tower, Tri Geo, NetIQ.

The selection of a SIEM tool entirely depends on the use cases or scenarios that an organization is focused on to. Also for a mid size company huge customization costs will deter it to invest into one, but if the out-of-the-box functionalities fulfill the needs, it seems to be a good investment. But again huge International business houses are the one that have both the power and urgency to implement one, keeping them safe and consistent in the security arena.

Tuesday, October 13, 2009

Remembering Strong Passwords

There are a lot of blogs articles and websites making you knowledgeable on how to be safe on the Internet. But we mostly do forget the basics and end up compromising our accounts! Now that hundreds of hotmail accounts have a public display of private information, allegedly hacked by some more geek(or nerd) being/beings, I felt there is a need to go through the basics again.
For more details and authenticity of this news please visit these sites
http://www.neowin.net/news/main/09/10/05/thousands-of-hotmail-passwords-leaked-online
http://www.articlesbase.com/internet-articles/microsoft-hotmail-servers-have-possible-been-hacked-you-hotmail-account-is-in-danger-1305637.html
Google as usual will provide with more links :-)

To start with the basics, you can protect your account much better than it is now if you haven't already done something like putting in a really strong password. Yes strong is emphasized, as some days back there has been a speculation and proof[
http://www.geeksaresexy.net/2008/01/30/yahoo-captcha-cracked/] as CATPCHA(Completely Automated Public Turing Test to Tell Computers and Humans Apart) being cracked!! What weird thing is CAPTCHA?? Simply put it is the weird looking text (alphabets/words/mixture of letter and numbers) that is presented to you by some sites(secure ones as well) commonly while registering, may be while logging in or after a failed password attempt or some other transaction that must be done by a human, not a bot or malware in the wild.

Now, what is a strong password? Technically a password that mixes alphabets with numbers and sometimes special characters. Then what comes is to take care is that, the password is not easily guessable, that is to use words out of the dictionary! To make it really strong one needs to increase the number of letters or digits or special characters as well as have a diligent mix of them all, taking care it does not become a dictionary word or phrase e.t.c. By the way this dictionary i am referring to is not released by Oxford, it's harvested and enriched by hackers and crackers and Information security researchers all over the world!
To give an example: say the username is xyz@abc.com Now lets take a look at bad/undesirable passwords
EASILY GUESSABLE/WEAK PASSWORD : "xyz" (most of the modern websites don't accept these) or "zxcasd" or "1234567" or "password" or "letmein" or "asdfgh" or "pass123"
The realm of weak passwords is so huge that there can be hundereds of examples.
Take a look at this published list of 500 worst passwords of all times
Also you can go through this:
http://www.smartplanet.com/technology/blog/thinking-tech/how-to-avoid-the-500-worst-passwords-of-all-time/908/?tag=shell;main&gclid=CMC_iaCouJ0CFU8wpAodE0ibjA

Hopefully your password did not feature there. Or did it show up? If it has have a li'l more patience to finish this blog and make a really good password.

Most common problem with uncommon passwords is to remember that junk the computer might have thrown to you as a suggestion or onetime password that needs to be changed at first logon. I hope to show you how to make complex and uncommon passwords, which are already featuring in some blogs or other forms of information dissemination. Why would you read this? Because may be I will be able to show you how to remember them as well.

Lets start with one weak password from the above list(500 worst password list): "dallas" features at no. 50 in the list. Lets convert "dallas" into "d@ll@s" ! This makes it a little stronger, but 8 characters is the least for a strong password. Why? We'll get to it later on. So play with dallas more. If your name is Rick, try this d@ll@s#R1ck. Sure this will be considered a strong password, by many of the password checkers! Do you think it's a password to complex for you to remember?

I am sure it isn't. But this is a stepping stone only, going forward you will see that this example is not good enough as per the experts.Anyways please go through it, as without "a-b-c" one cannot make words, let alone sentences! Well, coming back to the topic, the trick is to find letters in your password that could be replaced by similiar looking special characters as well as numbers. To give you a clue small "a" can be thought as @, while capital "A" as 4.You can make your own substitutions and make a cryptic language of your own. Just one word of caution as with passwords, keep it to yourself and yourself only! Now if you want to make it even lil' different, try this D4l1s$r1cK. Hope it's again easy to remember :-) You can make out hundreds of combinations like this I am sure.
Now you can go for a mix of more than 3 words to make it even harder to crack. Say you can add the last 4 numbers of you cell phone or reverse your birth year in between, like this. If Rick from dallas was born in 1976, he can make this as a password, d@1L5-6719-r1Ck. Once you get started with simple patterns you'll start remembering complex ones quickly. incerase the length of your passwords overtime(don't make it years!), as and when you think you have mastered one level. As far I know no one imposes limits on password length (Microsoft recommends 14 character for a pretty good password). But be very sure you can remember the pattern and reproduce it, as an when required. Another good practice is not to use the same pattern for multiple accounts.

The example I gave above is to get one started with complex passwords, but it is just a stepping stone. Beware converting merely "password" to p@sswor0d" won't protect you well, the funda is to make the passwords tricky for a guess, but easy for you to remember. So try out a different approach each time, say make out a phrase you will easily remember as, "India is my home country and I love it the most" Now take out first letters of the phrase, it becomes -->> IIMHCAILITM It is a good password but lacks numbers or special characters. So lets make it complex: "iIm#C4I7!T|\/|" or "i Im# C4i7 ! t /\/\" But one problem that you can face is like some websites won't allow spaces, some don't allow all the special characters, but don't stop trying various combinations(use your imagination to the maximum!). Also this example is redundant by the use of same letters as initials. So make sure you have lesser, ideally no repetation of characters.

I know all these combinations and pattern stuff can overheat your natural processors, hence it is always a good idea to write them down. But in that case, do remember to keep that piece of paper in the most secure way you can.Guys, it could be your purse, Gals, may be your kinda purse.
Also there are a lot of products in the market (both for a price and free) which store all your passwords in the disk in an encrypted format.All you need to do is create a "Master Password" for accessing the software.
Here is one for quick reach: http://passwordsafe.sourceforge.net/
When you reach the download page search for the .exe format for download.

Do check this out, this is from the experts:
Good luck with your very strong passwords!