Edison Cameras Infected With Mirai Botnet Malware: A Case Study Analysis

Task 2: Critical thinking

EnCt21771efe0563dd16919618e2e21fc8dcc2ba4965e1771efe0563dd16919618e2elezuT=h03wA

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

6BBwIt1vA/HdsWSFAm5e7UdDRxjgmq6/sd2enDm4FUNzHXfZlz6kuSQ==IwEmS

Task 2: Critical thinking

Field Selection

Internet of Things

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Finding a Case Study

Our case study is the Edimax cameras which were infected by a malware known as Mirai Botnet in late 2016.

Analysis of the Business Case 

Summary of the case study

This business case involves Edison cameras that were primarily affected by the Mirai malware. The cameras were affected as the attackers used them. This made it possible for the attackers to use the cameras for DDoS (Distributed Denial of Service) attacks.

Identification of the security breaches that occurred

The Marai botnet malware infected the Edimax cameras and they were greatly affected.  Mirai malware exploits the security of many devices of the Internet of Things that is weak. Its operations are through scanning the devices of the internet of things devices in a continuous way (Strba, 2018:33). These devices are those that can be accessed through the internet and which get protection from factory default or usernames that are hardcoded as well as passwords.

The default usernames of the Internet of things devices, as well as their passwords, are generally not changed. This is the same case with the Edison cameras (Ling et al. 2018: 123). The Mirai botnet malware infects these devices forcing them to do their reporting to the server that is controlled centrally. This turns them into a bot that can be used in enhancing DDoS attacks.

The main vulnerability that was found by the hackers who developed Mirai malware was that cameras are devices of the Internet of Things that can be operated and fully controlled by anyone.  This are cameras that underlie operating system especially Linux through the typing of a username that is random but which contains very many characters(Kennefick, 2017: 111). Since the passwords of the cameras are not normally changed, the Mirai malware capitalized on this by infecting them and taking full control of them. The main security breach that the cameras were exposed to is one of them being able to be controlled by anyone.

Following this vulnerability, the Mirai malware infected the cameras and turned them into bots. This facilitated them to be used for DDoS attacks(Gupta et al. 2017:411). They were also in campaigns of extortion through the use of ransomware. The Mirai Malware mainly targeted the devices that were using the Linux operating system.

Therefore, the cameras were affected greatly because of the poor security procedures in these devices. The attackers are able to pre-program their worm with default passwords and those passwords that are used commonly (Guez, 2017: 61). The limitations of power processing as well as operating systems imply that there is a lack of security features that are advanced in many devices of Iota.

Solution against the attacks

In ensuring that a device is safe, four pillars must be considered. These pillars help in the determination of the right security level for the device (Galluscio et al. 2017: 46). The developers need to ensure that security measures are observed at every lifecycle of a device. The pillars in the lifecycle of a device include the design phase, execution phase, execution phase as well as the power down phase.

Field Selection

The design phase is during the inception of a device. This phase is very significant in the prevention of the introduction of codes that might be malicious during the process of development (Dulaunoy et al., 2017: 68). Some of the measures for prevention include delivery of signed binary, ensuring that there is authenticity and that alliterating codes is not possible. Another is ensuring that the device is developed on a certified platform of software under the standards of security of industries, for instance, IEC 27034 as well as IEC 62443.

The execution phase is also significant to the security of a device. The main security goal in this phase is to ensure or establish the background for trust (Cusack and Tian, 2017: 55). This is to help in the prevention of binaries that are entrusted from running which will go a long way in ensuring that the software that is placed in the hardware is the most appropriate one and that there is trust between the software and the hardware(April et al. 2017: 67). In developing the root of trust, the requirements are a boot technology that is secure as well as cryptographic signatures which ensure that there is prevention of code that is unsigned from executing.

In the operation phase, there is deployment of measures that are multiple in the prevention of attacks that might be malicious in the mode of operation. This includes controls for prevention of access that is not authorized and ensuring the security of networks through encryption (Antonakakis et al. 2017: 1093). In the power down phase, the necessary measures include storage that is encrypted and ensuring that the containers of data are secure for prevention of access of data from onboard.

As security features are being observed right from the initial stage of developing a device, some dimensions need to be considered. They include the hardware of the device, its operating system, its software, and mode of working with the internet as well as generation of data and its maintenance in the system (Angrishi, 2017: 88). The interface has to be secured including that of the users as well as attackers.

Diagram showing the aspects of a secure system of IoT and privacy

Critical Review of the Journal 

Summary of the paper

The paper looks into how the devices of IoT are vulnerable to infection by attackers. The attackers then use them to perform DDoS attacks. It specifically takes a look at the Edison cameras that were infected by Mirai botnet malware. The paper looks into the factors that made the Edison cameras vulnerable to attacks. They were mainly infected because of the poor security features. They operate on basic operating systems such as Linux and which is prone to infection by the malware. Their passwords can also be changed easily through typing of passwords with many characters, and this is enhanced because they do not have security features that are advanced.

The paper proceeds by identifying the breaches of security that happened in the Edimax cameras. Upon identification of the breaches, the paper also gives the solution to this kind of attacks. It provides a solution that starts right from the initial stages of developing a device. The paper also provides solutions to devices that have already been infected.

Internet of Things

Strengths of the paper

The paper identifies how the security of IoT devices can be breached and gives a detailed and intensive solution on how these devices can be protected from such attacks.

Weakness of the paper

The paper does not talk of other IoT devices. It mainly talks of cameras while there are many IoT that are vulnerable to attacks. 

Text coding

Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Sed ut perspiciatis, unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam eaque ipsa, quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt, explicabo. Nemo enim ipsam voluptatem, quia voluptas sit, aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos, qui ratione voluptatem sequi nesciunt, neque porro quisquam est, qui dolorem ipsum, quia dolor sit amet.

Qui blanditiis praesentium voluptatum deleniti atque corrupti, quos dolores et quas molestias excepturi sint, obcaecati cupiditate non provident, similique sunt in culpa, qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio.

Nam libero tempore, cum soluta nobis est eligendi optio, cumque nihil impedit, quo minus id, quod maxime placeat, facere possimus, omnis dolor repellendus. Qua temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe eveniet, ut et voluptates repudiandae sint et molestiae non recusandae pondere ad lineam. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat

Qui autem alia matunt scribi a nobis, aequi esse debent, quod et seripta multa sunt, sic ut plura nemini e nostris, et scribentur fortasse plura et tamen qui diligenter haec quae de philosophia Htteris mandamus legere assueverit, iudicabit nulla ad legendum his esse potiora.

—–BEGIN PGP MESSAGE—–

Version: BCPG v1.58
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C6GYT/k3wFm+pihrc8S07DrjOfu+t2n9jearMisV4Em6YVzPZzNcagXuo8KPBnZX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u003dqo/u
—–END PGP MESSAGE—–

Information security

Information security involves the concepts of integrity confidentiality authenticity and the availability these concepts are essential in facilitating transactions, and other business operations. However, they may be unreliable if they are no accomplished when designing a system. Confidentiality involves hiding data from strangers and therefore requires a secure authentication process for an outside party to access data. It also utilizes strict controls that are the sender and recipients are the only individuals supposed to obtain information.

Confidentiality also ensures data encryption hence information may not be readily intercepted. The next is integrity which implies that there should be resistance to the alteration of data and any changes must be detected. Integrity ensures only authorized agents access information. It is mainly enforced by the use of checksums and algorithmic validation. The maintenance of integrity involves the hardware and on the logic of applications

The third is available when needed and at the required time. The concern is how to keep the information open. The security issues may destroy data. Therefore, high availability solutions for instance load balancing quick backups are necessary. The last is authenticity that is a user must have an assurance that the data received is from the right sources. The failure of verifying the authenticity may lead to issues for instance browsers hijacking, spam, and email phishing.

Finding a Case Study

Data fraud and intrusion of privacy

Data fraud and intrusion of privacy are increasing even as the dangers of information revelation are on the rise. Progressively, healthcare, financial and different organizations must manage enactment and control information security, and in perspective of current news reports concerning cyber terrorism consumer worries pertaining data revelation and exploitation will most likely make enterprises and institutions obliged in protecting consumer data. Therefore, an effective security plan must be put in place to protect delicate data or information against misuse by putting into practice an efficient encryption protocol.

Cyber security

In the current digital era, cyber security attacks can come from any place either internally or externally. Advancement in information technology has come at the cost of increased vulnerability to attack of organizational information and data. Information security has therefore emerged as a central agenda for companies and institutions, which are worried about the danger caused by cybersecurity attacks. However, despite the increased investment by companies on cybersecurity, there are still some risks and threats which expose corporate data to attacks. This essay will discuss various risks and threats to company data and the procedures/policies to be implemented for data handling and protection to enhance smooth business continuity.

`           The first major security risk and a threat to company data are targeted cyber-attacks. Nowadays, cyber-attacks have ceased to be a mere creation of idle/bored young computer wizards who are after bragging rights. The nature of attacks network is changing globally, with attacks being conducted by organized crime syndicates who are everywhere and are globally connected. The modern-day hacking has advanced whereby hackers do not require the bulk of information in one go but can now excerpt information over a long period (Pillai, 2010). This poses a challenge and a difficulty for companies to manage their information security. The second threat and risk to company information are data breaches.

Many companies’ data is at risk of being violated, as a consequence of intended leaks by discontented employees, or other common mistakes such as misplacement of electronic gadgets, which facilitate leakage or escape of data from companies. A report on by data breach investigations has indicated that about half 50% of the data breaches occur within companies. Internal factors of employees and blunders in data handling result to a data breach. This, therefore, is a factor that increases the risks and vulnerabilities of companies’ information security (Keller, 2015). Because for instance if a gadget such as a laptop is misplaced, there is a risk that an intruder may come across it and gain access to critical information and may also temper with it. Companies should manage data breaches by being vigilant about who has legal access to what information.

Cloud computing

The third threat and risk to business data security are cloud computing, which has presented a new type of information security concern. This is due to the notion of cloud computing whereby companies must surrender their security control to an outside/external party. Although cloud computers tend to guarantee maximum data security in their centers, information is stored in the cloud together with information from other customer companies/organization. This mix up increases vulnerability to data insecurity because it is different from how a company may store information by itself (Catteddu, 2010). Cloud computing is, therefore, a threat or risk to company data security especially when the cloud computers’ data centers are not secure.

Analysis of the Business Case

The fourth risk and threat to modern company data security is a social network or social media. Social network/media sites including Facebook, Twitter, and Instagram have come at a cost to most companies and organizations whereby in addition to employees wasting working time, they also inadvertently leak company data. Apart from the susceptibilities in the online applications developed for seeping company network, people mostly post private information. Also, data security threats which are unknown to company information technology may be posed when third-party employees can access applications which are mostly developed by small companies and individuals through social media.

Mitigation of data security risks 

To mitigate and minimize the above data security risks, some policies/procedures should be implemented to ensure data protection and continuity of business. The first policy is a restriction of data/information access. This restricting classified data and software access to only the authorized personnel within the company. Common techniques for access restriction are authentication using passwords or tokens, and application of different authorization profiles to different users of the system, based on their varying roles. Authentication should be supplemented with audit trails, and valuable information can be provided by inclusive activity logs, which is used to refine the security measures effectiveness.

Companies should ensure that the information is completely removed before disposal. The removal may include physical destruction of the media or through data reformatting/overwriting on the storage media. Secondly, some situations may call for the company management to prevent employees from bringing and using personal computing gadgets such as smartphones in the job context. This helps to enhance device security control and therefore eliminate/reduce the vulnerabilities to information theft.

The information technology systems used in the modern companies has shifted to open standard systems and platforms which have created more opportunities for outsiders/intruders to take advantage of and access company data. Some techniques of information security such as physical isolation of raw data are no longer effective. Therefore, companies have to conduct a good plan and review process for policies and procedures of enhancing data security with the above examples very important in the modern information technology context.

April, M.A.T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman,

J.A., Invernizzi, L., Kallitsis, M., Kumar, D. and Ma, C.L.Z., 2017. Understanding the Mirai Botnet. In USENIX Security Symposium.

Angrishi, K., 2017. Turning internet of things (iot) into internet of vulnerabilities (iov): Iot

botnets. arXiv preprint arXiv:1702.03681.

Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z.,

Halderman, J.A., Invernizzi, L., Kallitsis, M. and Kumar, D., 2017, August. Understanding the Mirai botnet. In USENIX Security Symposium (pp. 1092-1110).

Cusack, B. and Tian, Z., 2017. Evaluating IP surveillance camera vulnerabilities.

Catteddu, D., 2010. Cloud Computing: benefits, risks and recommendations for information

security. In Web application security (pp. 17-17). Springer, Berlin, Heidelberg.

Dulaunoy, A., Wagener, G., Mokaddem, S. and Wagner, C., 2017. An extended analysis of an

IoT malware from a blackhole network. TNC17.

Egan, M. and Mather, T., 2004. The executive guide to information security: Threats, challenges,

and solutions. Addison-Wesley Professional.

Galluscio, M., Neshenko, N., Bou-Harb, E., Huang, Y., Ghani, N., Crichigno, J. and Kaddoum,

G., 2017, October. A first empirical look on internet-scale exploitations of IoT devices. In Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual

International Symposium on(pp. 1-7). IEEE.

Guez, G., 2017. Why Hardware-Based Design Security is Essential for Every Application. White

Paper.

Gupta, N., Naik, V. and Sengupta, S., 2017, January. A firewall for Internet of Things.

In Communication Systems and Networks (COMSNETS), 2017 9th International Conference on (pp. 411-412). IEEE.

Kennefick, D., 2017. Can a Strictly Defined Security Configuration for IoT Devices Mitigate the

Risk of Exploitation by Botnet Malware?

Keller, S., Powell, A., Horstmann, B., Predmore, C. and Crawford, M., 2015. Information

security threats and practices in small businesses. Information systems management, 22(2), p.7.

Ling, Z., Liu, K., Xu, Y., Gao, C., Jin, Y., Zou, C., Fu, X. and Zhao, W., 2018. IoT Security: An

End-to-End View and Case Study. arXiv preprint arXiv:1805.05853.

Strba, S., 2018. Internet of Things Security: Ongoing Threats and Proposed Solutions.

Pillai, D. and Andley, P., 2010. Information security threats. Compendium of Papers 2009-10

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP