Thursday, 4 June 2015

Cyber Security Pawimawh

Cyber Security pawimawhna tlem lo sawi ve dawn ila. Khawvel hriattham-a attacker kan hmelhriat hmasak ber pawl chu Robert Morris kha a ni ngei ang. Kum 1988 khan internet khawvelah Christmas tree worm a lo release a, kha khan computer sang 6 chuanga tam a lo tibuai a. A thiltih avang khan dollar sing khat chawi tir a ni. Hun a lokal zela kum 1990 chho vel khan hacker group pahnih Legend of Doom leh Masters of Deception chuan indo an puang a, an computer leh computer intihchhiatsak tumin an inbei chiam mai a ni. Kha thil vang khan a tam zawk chuan jail bang an zut phah reng a nih kha. Kum 1990 chho vel hian hacker turu tak tak an lo piang chho bawk a, heng zinga langsar tak chu Kevin Mitnik kha a ni ang. A ni pawh khan hacking vangin jail bang a zut ve bawk a ni. A hnuah chuan Cyber Security Author (Ghost in the wires) ropui a lo ni chho bawk. Heng lai chho velah hian hacker te hi buaina thlentu aimahin thil thar anga ngaih an ni zawk mah a. Kum 1990 tawp lamah chaun Internet server hmang an lo pung hluai a, sumdawng lian leh mimal tam takin hmang tangkaiin hlawkna siam nan an rawn hmang chho a. Internet kaltlang a money exchange a lo tihtheih takah chuan Banking system pawh online a access theih a lo ni ta. Hetah chiah hian hacker leh attacker te an ron inlar tan leh ta a ni. Kum a liam zel a, rukru (attacker leh hacker) te chu buaipuiawm leh hnawksak tak an lo ni ta a ni. Chuvangin kum 2009 khan Lockheed Martin’s Computer Incident Response Team chuan Cyber Kill Chain an tih mai intelligent-driven defence process chu an rawn siamchhuak a, cyber attack tuartute tawrhna tinepna tur leh cyber security professional kaihhruaina hnuaia hun lo awm zel tura inven nana hmalakna a ni. An site http://www.lockheedmartin.co.in ah hian in register theih a ni bawk e. Cyber Kill Chain hian cyber attack chu kawng sarihin a thlir a:

1. Reconnaissance: A hmasa berin attack tur chu khawihah nge a awm tih an zawng phot a. Internet-ah hian Internet service provider-in min pek address hrang theuh kan nei a. Chutihrualin sumdawng te chuan address tam tak, internet domain pawh an nei thei bawk ang. Attack tur chuan site chu an scan- a, a host (port scan) te an hre bel hle a. Tichuan eng port nge expose a nih tih an hre thei nghal a. Heng bakah hian attacker te hian internet computer, a neitu hriatloha spam leh virus thehdarh tura an hman thin botnet (zombie army) te hi an lei a, chutiang hmang chuan mi an hack thin a ni. I hriat lohvin i computer pawh kha an lo hralhkual vak tawh mai thei!

2. Weaponization: A hming kan bel em em malware te hi an target system a zirin ralthuam hlauhawmah an chhuah zung zung mai a ni. Target computer panna beih nana design theih a ni a, a nih loh pawhin online backing website beih nan te an siam (customize) thei a ni. Tunlai khawvelah hi chuan inchhung lumah miin hacking hmanrua an siam vak vak tawh lo va, a thiam bik te siam an lei zel mai tawh a ni.

3. Delivery: Hacker te'n mi an beihna hmanrua ber chu document, image leh pdf te malware hmanga tihbawlhhlawha emaila thawn darh te (Hei hi Phising attack an ti), software lem hmanga malware thehdarh leh software thenkhat that tawk lohna remchanga hmanga malware thun te hi a ni. USB pendrive-a virus kan kai tam tak te hi hemi huanga mi hi an ni. A dang lehah chuan mi website malware hmanga infect a ni a. He step hi a tawi zawnga kan sawi dawn chuan Target computer-a ralthuam thiarna (dahna) a ni kan ti thei ang.

4. Exploitation: Victim host-ah ralthuam ber dah a nih tawh chuan, Exploitation code an run thei tawh a, hei hian a beih ber chu victim OS panna lai a ni. Tichuan victim OS-ah chuan an duh ang feature an dahbelh tawh mai a ni.

5. Installation: Victim OS-ah trojan leh backdoor online victim computer an khawih theihna tur an install thin a, hnathawh environment an insiam ti pawhin sawi ila a dik ang.

6. Command & Control: Attacker chuan a duh ang thala payload a dah theih chuan a hlauhawm tawh hle a, a duh chen chen command a run thei tawh tih a kawk ber a ni. Victim computer keyboard an nei tihna tluk a ni thei bawk ang.

7. Action: A chunga step paruk khi hlawhtling taka an kalpui theih chuan victim awmdan leh khawsak dan engkim lo ngaihthlak a, ruk theih ang ang ruk a, information an mamawh ang lakkhawm kha an hna pui ber chu a ni tawh mai. Pawisa ruk, Victim website tihmingchhiatsak, information

Attack hi a indawt danin a hlawhtling zel bik lo a, Mahse a step te te hian a thawh dan a sawilang chiang viau awm e. Hman remchan hunah Advanced Persistent Threats and Computer Forensic chungchang rawn share leh ang.