CEHv6 Module 46 Securing Laptop Computers pdf pdf

  

Ethical H ackin g an d

Coun term easures C t Version 6

  M o d u le X LVI M o d u le X LVI Securin g Laptop Com puters Com puters News Copyright © by EC-Counci l Source: http:/ / w w w .in form ation w eek.com /

  Module Objective

  This m odule will fam iliarize you with: Thi d l ill f ili i ith

  • Laptop threats
  • Laptop Theft Statistics L Th f S i i
  • Fin gerprin t Reader • Protectin g Laptops through Face Recogn ition
  • Bluetooth in Laptops p p
  • Tools • Securin g from Physical Laptop thefts
  • H ardware Security for Laptops • Protectin g the Sen sitive data Protectin g the Sen sitive data
  • Preven tin g Laptop Com m un ication s from Wireless Threats • Protectin g the Stolen Laptops From Bein g Used • Security Tips
  • Copyright © by EC-Counci l

Module Flow

  Laptop threats Securin g from Physical Laptop thefts Laptop Theft Statistics

  H ardware Security for Laptops p p

  Fin gerprin t Reader Protectin g the Sen sitive data Protectin g Laptops through Face Recogn ition Preven tin g Laptop Com m un ication s from Wireless Threats Bluetooth in Laptop

  Protectin g the Stolen Laptops From Bein g Used Copyright © by EC-Counci l

  Tools Security Tips

  Copyright © by EC-Counci l Source: http:/ / w w w .popularm echanics.com / Statistics for Stolen an d Recovered Laptops Recovered Laptops Source: http:/ / articles.techrepublic.com .com / Copyright © by EC-Counci l

  Statistics on Security Copyright © by EC-Counci l Source: http:/ / articles.techrepublic.com .com /

  Percen tage of Organ ization s Followin g the Security Measures Followin g the Security Measures Source: http:/ / w w w .iacis.org/ Copyright © by EC-Counci l

  Laptop Threats

  Physical Security

  • Crim in als target laptops for quick profits an d m isuse of the con fiden tial data
  • Laptops con tain in g person al an d corporate in form ation can p p g p p be hacked by the attackers an d used for their profits

  In form ation Security

  • Corruptin g, destroyin g, or gain in g access to a Laptop through hackin g, m alicious program s, or social en gin eerin g
  • Accessin g the data through weak passwords an d open access
  • Application security an d vuln erabilities to attack the vuln erable application
  • Attackin g the laptops with un en crypted data an d un protected file system s C i h d h h bl d i
  • Copyright © by EC-Counci l<
  • Copyin g the data through rem ovable drives, storage m edium s, an d un n ecessary ports which are n ot disabled

  Laptop Threats (con t’d)

Wireless Security y

  • In terceptin g an d m on itorin g wireless traffic through various sn iffer tools an d in terception software
  • Packet in sertion an d hijackin g attacks in to the sn iffed wireless traffic
  • J am m in g is used where the attacker uses differen t wireless devices at differen t frequen cies which q creates radio frequen cy in terferen ces for an y wireless n etwork in vicin ity
  • Peer to peer attacks is perform ed by usin g Ad H oc m ode
  • Man in the m iddle attack
  • Wi-phishin g is used by hijackers to setup an access poin t with SSID that is used by default on m ost access poin ts m ost access poin ts
  • Copyright © by EC-Counci l

  Laptop Theft

If a laptop were lost... f l l

  • What in form ation of a strategic n ature would be disclosed?

  Real exam ples of this type of in form ation in clude pen din g m ergers, n ew product in tellectual property, strategies an d laun ch plan s, an d previously un disclosed fin an cial laun ch plan s an d previously un disclosed fin an cial operatin g results

  • What in form ation of a tactical n ature would be disclosed?

  Exam ples in clude private com pen sation in form ation , plan s for organ ization al chan ges, proposals to clien ts, an d the m yriad of sim ilar in form ation that can be gain ed from readin g a person 's em ail, calen dar, con tacts, or collection of g p , , , docum en ts an d spreadsheets Copyright © by EC-Counci l

Laptop Theft (con t’d) If a laptop were lost..

  • What in form ation about the com pan y's n etwork or com putin g in frastructure would be revealed that would facilitate an electron ic attack? Exam ples of this type of in form ation in clude usern am es an d passwords, dial in n um bers, IP addressin g schem es, DNS n am in g con ven tion s, ISPs used, prim ary m ail servers, an d other n etworkin g details related to con n ectin g the laptop to other n etworkin g details related to con n ectin g the laptop to the corporate or In tern et en viron m en t.
  • What person al in form ation about the laptop own er can be obtain ed? bt i d?
  • Copyright © by EC-Counci l

Fin gerprin t Reader

  Fin gerprin t Reader en ables the user to access the Fin gerprin t Reader en ables the user to access the laptop in a m ore secured an d easy way It provides higher level of security while accessin g the data or n etwork BioNet 2 laptop fin gerprin t reader design ed from Biom etric fin gerprin t reader is specially used for portable storage devices such as laptops an d PDAs portable storage devices such as laptops an d PDAs It offers secured access to the application s like, valuable logon s, web lin ks, docum en ts, im age files, valuable logon s web lin ks docum en ts im age files an d m ore Copyright © by EC-Counci l

  Protectin g Laptops Through Face Recogn ition Recogn ition

  Face Recogn ition techn ology is used to access authen tication on the laptop by recogn izin g the face as the password laptop by recogn izin g the face as the password It takes the sn apshot of the user an d creates digital shots which serve as the password It supports m ultiple users to allow trusted on es to access the laptop

  Features:

  • Advan ced Face recogn ition software via In tegrated Cam era for authen ticatin g user
  • On e-key recovery helps to recover operatin g system in case of system crash or system system in case of system crash or system effected by virus
  • Copyright © by EC-Counci l

Bluetooth in Laptops

  Bluetooth en ables two laptop devices to con n ect with each other n egatin g the usage of cables an d wires h h i h f bl d i A Bluetooth en abled laptop tries to pair with an other i in ten ded laptop but n ot with an un kn own device d d l b i h k d i The Bluetooth laptop devices create an in itialization key PIN code or passkey used for authen tication Attacker can sn iff this session to access the data Attacker can sn iff this session to access the data The in form ation passed between the two laptop devices should be en crypted which is upto 128 bits Copyright © by EC-Counci l

  Tools Copyright © by EC-Counci l Laptop Security

Laptops can be secured physically from bein g stolen or Laptops can be secured physically from bein g stolen or

lost by usin g security tools The tools will let the laptop to be fixed at on e place, lock it The tools will let the laptop to be fixed at on e place, lock it to an im m ovable device or use secured laptop trolleys Copyright © by EC-Counci l

Laptop Security Tools Steel Cable Locks

  Laptop Tie-down Brackets LapSafe laptop trolley Portable Laptop Carts

  Laptop Locker Copyright © by EC-Counci l Laptop Alarm

Laptop Alarm will em it a loud alarm when ever som eon e

tries to steal your laptop l l

  It em its the loud soun d on It em its the loud soun d on

  • A/ C Power Rem oval
  • Mouse Rem oval
  • Mouse Movem en t
  • Shutdown / Suspen d
  • Copyright © by EC-Counci l

  Laptop Alarm : Screen shot Copyright © by EC-Counci l Flexysafe

  Flexysafe is the laptops safe security case Flexysafe is the laptops safe security case Flexysafe Digital, the safe that is design ed for people who take their Flexysafe Digital the safe that is design ed for people who take their laptop com puters hom e from work Copyright © by EC-Counci l

  Master Lock Master Lock paten ted lock an d cable system Features

  • Locks n otebook com puter to preven t theft an d protect data
  • Galvan ized steel cable provides stron g security an d peace of m in d
  • Copyright © by EC-Counci l
eToken eToken represen ts the m ost effective eToken represen ts the m ost effective com bin ation for protectin g data on your laptops It is a stron g authen tication , with disk en cryption an d boot-protection solution A sm art card-based stron g authen tication solution en sures PC an d laptop security with two key com pon en ts with two key com pon en ts

  • Physical protection of the en cryption keys
  • User authen tication prior to en cryption key access
  • Copyright © by EC-Counci l

  STOP-Lock STOP-Lock com bin es trackin g system with a lockin g m echan ism to help deter thieves h i h l d hi It is a highly-visible sm all m etal plate that attaches securely to g y p y the cover of the laptop

  The plate is stam ped with un ique barcode in form ation that The plate is stam ped with un ique barcode in form ation that registers the com puter with a n ation al database Copyright © by EC-Counci l

  True Crypt Free open -source disk en cryption software Features

  • Creates a virtual en crypted disk within a file an d m oun ts it as a real disk
  • En crypts an en tire partition or storage • En crypts an en tire partition or storage device such as USB flash drive or hard drive
  • Provides two levels of plausible d den iability, in case an adversary forces i bili i d f you to reveal the pass
  • No TrueCrypt volum e can be iden tified
  • H idden volum e (stegan ography) H idden volum e (stegan ography)
  • Copyright © by EC-Counci l

  True Crypt: Screen shot Copyright © by EC-Counci l

PAL PC Tracker

  PAL PC tracker will track an d locate the lost or stolen com puter PAL PC tracker will track an d locate the lost or stolen com puter It sen ds stealth sign al which in clude the user’s com puter tracing g p g details

  When the user con n ects to the In tern et, it will sen d a stealth em ail m essage to the user an d server which con tain s exact location of the t th d hi h t i t l ti f th pre-defin ed em ail address set by the user Copyright © by EC-Counci l

  PAL PC Tracker: Screen shot Copyright © by EC-Counci l

  Cryptex

  Cryptex provides an un breakable, 448 -bit en cryption data storage on laptops l t It keeps the data safe by creatin g an en cryptin g vault on the hard drive It will disappear from the view when the vault is locked Copyright © by EC-Counci l

  Cryptex: Screen shot Copyright © by EC-Counci l Dekart Private Disk Multifactor

  Private Disk Multifactor is a disk en cryption program that secures con fiden tial data on laptops fid ti l d t l t It provides proactive protection again st viruses, Trojan s, adware, spyware, an d un authorized n etwork access spyware an d un authorized n etwork access Sen sitive data is n ot on ly en crypted, but are protected with Dekart's in n ovative Disk Firewall m echan ism in n ovative Disk Firewall m echan ism Copyright © by EC-Counci l

Laptop An ti-Theft

  Laptop An ti-Theft recogn izes an d traces through L t A ti Th ft i d t th h both in tern al an d extern al n etworks for LAN/ WAN con figuration s to pin poin t actual location of the lost or stolen laptop On ce in stalled in visibly on your laptop system , Laptop An ti-Theft sen ds a stealth e-m ail m essage p p g con tain in g it's exact location to a pre-determ in ed e- m ail address set by the own er Each sign al con tain s all the required in form ation on the status an d physical location of your laptop Copyright © by EC-Counci l

In spice Trace

  In spice Trace is a location trackin g program that em ails you program that em ails you the precise location of your stolen or lost laptop It lets you un recoverably destroy sen sitive data in your laptop in case of l t i f theft Copyright © by EC-Counci l

ZTRACE GOLD

  ZTRACE GOLD is an in visible software security application that traces the location of m issin g laptops application that traces the location of m issin g laptops for recovery It is un detectable an d un erasable on a laptop's hard drive If the laptop is reported m issin g, a paten t pen din g process occurs for the ZTRACE Recovery Team to iden tify the com puter's exact physical location y p p y The ZTRACE Recovery Team coordin ates with local law en forcem en t for a com pletely outsourced recovery p y y solution Copyright © by EC-Counci l

  ZTRACE GOLD: Screen shot Copyright © by EC-Counci l

SecureTrieve Pro

  SecureTrieve Pro is a software tool that en crypts, protects an d retrieves critical files from a lost or d i i i l fil f l stolen laptop It autom atically retrieves critical files rem otely from your m issin g laptop It offers very powerful en cryption capabilities It goes through firewalls to fin d the exact location of your stolen laptop of your stolen laptop Copyright © by EC-Counci l

XTool Laptop Tracker

  XTool Laptop Tracker supports all the recovery m ethods: In tern et, Caller ID, WiFi, WebCam , GPS, th d I t t C ll ID WiFi W bC GPS Rem ote Foren sic Tools It can n ot be detected by an ti-virus program s an d can bypass 90 % of all corporate an d person al firewalls

  XTool Laptop Tracker Agen t is sm all an d uses en cryption to tran sm it the collected data to the XTool Mon itorin g Cen ter Mon itorin g Cen ter It utilizes worldwide In tern et m on itorin g an d un ique g q dial-up m on itorin g coverage Copyright © by EC-Counci l

  XTool Laptop Tracker: Screen shot Screen shot Copyright © by EC-Counci l

XTool En crypted Disk

  XTool En crypted Disk is a cen trally m an aged proactive rem ote laptop security solution It en sures the in tellectual property, im portan t in form ation an d con fiden tial data stored on your rem ote laptops is secure

Protect rem ote users from data security threats by en cryptin g

sen sitive in form ation an d preven tin g un authorized access to

im portan t an d con fiden tial files p Defin e alerts to en force data security policies Copyright © by EC-Counci l

  XTool En crypted Disk is a cen trally m an aged proactive rem ote

  XTool En crypted Disk: Screen shot Screen shot Copyright © by EC-Counci l

  XTool Asset Auditor

  XTool Asset Auditor is a cen trally m an aged auditin g service It uses a low ban dwidth agen t to rem otely collect in form ation about hardware com pon en ts, software in stalled an d application usage in stalled an d application usage

The zero-touch auditin g solution m akes keepin g track of

your m obile com puter's hardware an d software con ten ts your m obile com puter's hardware an d software con ten ts effortless an d available n o m atter where they travel Copyright © by EC-Counci l

  XTool Asset Auditor: Screen shot Copyright © by EC-Counci l

  XTool Rem ote Delete The XTool Rem ote Delete en ables users to rem otely an d y securely delete sen sitive data to preven t un authorized access to im portan t an d con fiden tial files It m in im izes data security breaches

It provides a feedback that con firm s what files were foun d an d deleted from the target com puter an d deleted from the target com puter Copyright © by EC-Counci l XTool Rem ote Delete: Screen shot Screen shot Copyright © by EC-Counci l

Coun term easures an d Security Coun term easures an d Security Copyright © by EC-Counci l

  Securin g from Physical Laptop Thefts Thefts

  Use Rem ote Laptop Security to preven t access to the secured data secured data Use a dockin g station

  • Dockin g station perm an en tly affixes the laptop to the desktop an d also locks the laptop securely at on e place

  Eject the PCMCIA NIC cards when the laptop is n ot in use j p p

  Use a person al firewall to the laptop Use security gadgets like m otion detection an d alarm s to alert you when the laptop is m oved by a third party Use trackin g software to trace the laptop usin g traceable sign als when the laptop is lost or stolen Copyright © by EC-Counci l

H ardware Security for Laptops

  Security cable lockin g devices fix the laptop y g p p to an im m ovable object Cable alarm s alert the user at the tim e of m alicious activities Key lock locks down the laptop to the surface where it is m ost used A rem ote con trol storage case is used for the laptops to protect from thefts the laptops to protect from thefts Copyright © by EC-Counci l

Protectin g the Sen sitive Data

  Use the NTFS file system which provides file level security an d protects from laptop thieves Disable the Guest Accoun t Ren am e the Adm in istrator Accoun t Con sider creatin g a dum m y Adm in istrator accoun t P Prevent the last logged-in user n am e from bein g displayed t th l t l d i f b i di l d En able EFS (En cryptin g File System ) Disable the In frared Port on the laptop Backup the data before leavin g Con sider usin g offlin e storage for tran sportin g sen sitive docum en ts Copyright © by EC-Counci l

Preven tin g Laptop Com m un ication s from Wireless Threats

  En ablin g Wired Equivalen t Privacy (WEP) / Wi-Fi Protected Access (WPA) on the wireless n etwork A (WPA) h i l k MAC address con trol allows the wireless con n ection s from MAC card whose MAC address is stored in the filter d h dd i d i h fil En d to en d en cryption where the con versation is in the en crypted m ode

  VPN (Virtual Private Network) protects the in form ation tran sm itted over wireless lin ks Access poin ts evaluation checks for an y rogue access poin ts in wireless n etworks Copyright © by EC-Counci l

  Protectin g the Stolen Laptops from Bein g Used from Bein g Used Set the BIOS password which preven ts the m achin e from con tin uin g with the operation s when the password is in correct for ti i ith th ti h th d i i t f three con secutive attem pts Set Login password to successfully login to the com puter Set Login password to successfully login to the com puter En cryptin g the file system En cryptin g the file system Use Biom etric authen tication m echan ism (such as, fin gerprin t reader, face reader, retin al pattern reader etc.) d f d l d Use of tracin g an d trackin g software s Use of tracin g an d trackin g software's Copyright © by EC-Counci l

Security Tips

  In stall an ti-virus software an d firewalls Use cable locks on laptops as visual deterren ts Use asset trackin g an d recovery software In vest in advan ced data protection I t i d d d t t ti Back-up valuable data on a scheduled basis Keep laptops un n oticeable Keep laptops un n oticeable Avoid leavin g un secured n otebooks un atten ded En crypt your data En crypt your data Never leave access n um bers or passwords in your carryin g case Use alarm bells Lock un wan ted ports Copyright © by EC-Counci l

Sum m ary

  Crim in als target laptops for quick profits an d m isuse of the Crim in als target laptops for quick profits an d m isuse of the con fiden tial data In terception an d m on itorin g wireless traffic through various sn iffer p g g tools an d in terception software MAC address con trol allows the wireless con n ection s from MAC card whose MAC address is stored in the filter WPA is used as an exten sive level of security for wireless LAN s WPA is used as an exten sive level of security for wireless LAN’s Face Recogn ition techn ology is used to access the laptop by recogn izin g the face as the password i i h f h d Copyright © by EC-Counci l

  Copyright © by EC-Counci l

  Copyright © by EC-Counci l