Skip to main content

Double-Edged Sword: Dual-Purpose Cyber Security Methods

  • Chapter
  • First Online:
Cyber Weaponry

Abstract

Using forensics techniques, organizations can uncover vital evidence and information regarding intrusion methods and techniques, what actions an intruder took when inside the system or network and what information was taken. However, anti-forensic techniques are being used by cyber-criminals to remove the traces which can be used to successfully investigate their intrusion or cover the fact that an intrusion has taken place. Many of the modern cyber-security programs that are used to defend networks, and the data held within them, are being used by those who would wish to enter these systems without permission—they are a double-edged sword. Cyber-security applications provide important advantages to security professionals. Nevertheless, these advantages are reduced, or lost, when they are used by cyber-criminals in an anti-forensics manner. This chapter explores how common security techniques and methods, such as system logging, vulnerability scanning, and network monitoring, can be misused by cyber-criminals to hide their presence on the network. It then explores some simple security practices and approaches that can be used by network defenders to reduce the effectiveness of these anti-forensic practices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Bash shell script is a computer program written in the Bash programming language. A Bash shell script can contain a single command, a very simple list of commands or contain functions, loops, conditional constructs.

  2. 2.

    Spoofing refers to the act of tricking or deceiving a computer system or computer user by hiding one’s identity or pretending to be another user.

  3. 3.

    MACs are time sensitive, making it difficult to spoof log records from a prior time-period. The MAC is calculated for the first time-period and is then used to calculate the MAC for the next time-period. The first MAC is then permanently deleted (Lantz et al. 2006: 45).

  4. 4.

    A zero-day vulnerability refers to an exploitable bug in software that is unknown to the vendor. The security hole may be exploited before the vendor can fix it (Symantec 2016).

  5. 5.

    A CVE is a dictionary of publicly known information about security vulnerabilities and exposures.

  6. 6.

    The vulnerability dataset came from 200 million + successful exploitations across more than 500 CVEs from over 20,000 enterprises in more than 150 countries. Security incidents were collected from SIEM logs, then analysed for exploit signatures, and paired with vulnerability scans of the same environments to create an aggregated picture of exploited vulnerabilities over time.

  7. 7.

    Cyber security hygiene is the establishment and maintenance of an individual’s online safety and encapsulates the daily routines, occasional checks and general behaviours required to maintain a user’s online security. This would typically include the following best practices: updating virus definitions, using a firewall, running security scans, proper password selection, updating software, securing personal data and backing-up data (InfoSec Institute 2015).

  8. 8.

    If they have the encryption key.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Angela S. M. Irwin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Irwin, A.S.M. (2018). Double-Edged Sword: Dual-Purpose Cyber Security Methods. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74107-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74106-2

  • Online ISBN: 978-3-319-74107-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics