Skip to content

Commit

Permalink
Update Cybersecurity Superstition article
Browse files Browse the repository at this point in the history
  • Loading branch information
Declan Chidlow committed Mar 6, 2024
1 parent 56d294d commit a58e425
Show file tree
Hide file tree
Showing 5 changed files with 90 additions and 44 deletions.
46 changes: 32 additions & 14 deletions blog/feed/documents/Cybersecurity_Superstition.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<meta name="description" content="A look into some cybersecurity myths and misinformation. Explore the best practices regarding passwords, multifactor authentication, social engineering tactics, antiviruses, and much more." />
<meta property="og:description" content="It's time to cut through the cyber clutter." />
<meta property="article:published_time" content="2024-02-28" />
<meta property="article:modified_time" content="2024-02-28" />
<meta property="article:modified_time" content="2024-03-06" />
<meta property="article:section" content="Essay" />
</head>

Expand All @@ -16,15 +16,19 @@
</h1>
<ul>
<li><time datetime="2024-02-28">28 Feb, 2024</time></li>
<li>1586 words</li>
<li>5 minute read</li>
<li>1896 words</li>
<li>7 minute read</li>
</ul>
</header>

Fear of hacking often conjures up images of a solitary figure cloaked in darkness, sporting a hoodie, and surrounded by monitors cascading Matrix style green code. Bonus points if the 'hacker' is wearing a Guy Fawkes mask. However, this depiction couldn't be further from the truth. Most of the hackers I know either wear thigh high pink socks or are balding and middle aged.

Such misconceptions about hackers and cybersecurity in general have persisted for years, fuelled by sensationalism and misinformation. As someone frequently tasked with debunking cybersecurity fallacies, I've decided enough is enough. This article seeks to debunk common myths surrounding cybersecurity and, with any luck, also frees me from the perpetual cycle of explanation.

<span class="callout note">
This article is written with the average computer user in mind. In its suggestions, it targets both security and convenience. If you boast more technical expertise, then you can and should tweak this information to your needs.
</span>

## Passwords

Almost everyone uses passwords. They're the simplest solution for restricting access to something, and they do their job well. Unfortunately, years of bad advice has left people creating passwords that are confusing and insecure. I want to clear this up and identify some best practices.
Expand All @@ -35,20 +39,20 @@ A short password is easy to guess, but as you might imagine, it becomes harder t

Bruteforcing is when someone tries _lots_ of different passwords in rapid succession to find the one that works. A bit like when you get locked out of your phone and try lots of different variations in an attempt to rediscover your password.

Most people know not to use names or common phrases in their passwords. Through years of conditioning, we've taught people that they should construct confusing passwords, substituting letters for numbers and forcing in random characters as they please. The embedded XKCD comic outlines the issue.
Most people know not to use names or common phrases in their passwords. Through years of conditioning, we've taught people that they should construct confusing passwords, substituting letters for numbers and forcing in random characters as they please. The embedded xkcd comic outlines the issue.

<figure class="right">
<img src="https://imgs.xkcd.com/comics/password_strength.png" alt="XKCD comic strip comparing password strength and memorability, showing a complicated password and a simple passphrase, highlighting the entropy and guessability of each, and a stick figure finding the passphrase easier to remember." />
<figcaption>Relevant XKCD comic.</figcaption>
<img src="https://imgs.xkcd.com/comics/password_strength.png" alt="xkcd comic strip comparing password strength and memorability, showing a complicated password and a simple passphrase, highlighting the entropy and guessability of each, and a stick figure finding the passphrase easier to remember." />
<figcaption>Relevant xkcd comic. Credit: <a href="https://xkcd.com/936">xkcd</a></figcaption>
</figure>

These confusing special character infused passwords don't improve security; they harm it. They are hard for humans and easy for computers - the worst of both worlds. I previously mentioned entropy and how we can use it to calculate the strength of a password. Well, it isn't a perfect measure.
These confusing, special character infused passwords don't improve security; they harm it. They are hard for humans and easy for computers - the worst of both worlds. I previously mentioned entropy and how we can use it to calculate the strength of a password. Well, it isn't a perfect measure.

While bruteforcing may have started by simply crawling through a list of predefined common passwords, they later moved on to using complex algorithms. zxcvbn is a very useful tool that takes these algorithms into account to give an accurate idea of what more modern bruteforcing attacks are capable of.

Bitwarder is a free and open source password manager and [supplies a free tool to check the strength of a password against zxcvbn](https://bitwarden.com/password-strength). It's worth giving it a go with a range of different passwords, just to see what is actually strong.

You should quickly come to realise that passphrases are much more effective than passwords, both in terms of difficulty for computers to crack and ability for humans to memorise.
You should quickly come to realise that, for the average person, passphrases are much more effective than passwords. Easy to remember and, when done right, hard for a computer to crack.

Many people get this far and then make a fatal mistake. They reuse their passwords across multiple sites or store them insecurely. In the modern age, you should be using a password manager. Something like [Bitwarden](https://bitwarden.com) or [Proton Pass](https://proton.me/pass) allows you to generate secure passwords, store them, and auto fill them on the login page. It's easy to use and provides much needed security. If you take one thing out of this article, make it this.

Expand All @@ -70,7 +74,7 @@ Timed One Time Passwords (TOTP) are excellent and are one of the best options. T

Unfortunately, one of the most common MFA solutions is SMS based authentication. It's hugely insecure, and most advisories urge against its usage. Exploitation of the system is all too common, and I have an upcoming article discussing the inherent issues with SMS as a whole.

Another good option is hardware authentication, such as a Yubikey. This works as you might expect a car or house key to function. You plug it in your computer and it authenticates you. Unfortunately, this also introduces issues of its own. One of these issues is the potential for loss or theft of the physical device. The effect is more or less the same as what would happen should keys of any other nature be lost or stolen.
Another good option is hardware authentication, such as a [Yubikey](https://www.yubico.com). This works as you might expect a car or house key to function. You plug it into your computer, and it authenticates you. Unfortunately, this also introduces issues of its own. One of these issues is the potential for loss or theft of the physical device. The effect is more or less the same as what would happen should keys of any other nature be lost or stolen.

## Social Engineering

Expand All @@ -80,9 +84,9 @@ I think the best example I can give is this scene from the 1995 film Hackers. Th

<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/_G3NT91AWUE?si=APFy9BFpmboUARbo" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>

Just like that, Johnny Lee Miller's character has access to the TV network. Something akin to this is the greatest and most common threat.
This scene illustrates how simple and innocuous a good social engineering attack can appear, yet how effective it can be. Something akin to this is the most significant and prevalent threat.

The scene highlights all the hallmarks of a good social engineering attack. A convincing story, a sense of urgency, and an overwhelming of the victim. They all come together to help the hacker achieve what they want without the need for any messy script writing.
It highlights all the hallmarks of a good social engineering attack. A convincing story, a sense of urgency, and an overwhelming of the victim. They all come together to help the hacker achieve what they want without the need for any messy script writing.

Social engineering is the most common vector of attack, not traditional 'hacking' as the media might portray. While it's important to have at least a basic security setup, that shouldn't be your sole focus. Educate yourself on common social engineering tactics, notably phishing attacks, and maintain a vigilant stance online. Approach all interactions with a healthy dose of scepticism.

Expand All @@ -96,13 +100,27 @@ Unlike computers, phones operate in a closed ecosystem. Apps are screened for ma

This doesn't mean it's impossible for phones to be hacked, but it does mean that it's a lot harder for it to happen unless you do things outside the norm. It's still possible to encounter malware on phones, but an antivirus really isn't necessary and will likely do more harm than good.

While it's not worth going out of your way to install an antivirus, it is worth installing an ad blocker. I'd recommend [uBlock Origin](https://ublockorigin.com), which is free, open source, and supported on most of the major browsers. Adblockers don't just block ads; they also block a lot of phishing material and malware links. Even America's FBI [recommend using an adblocker](https://www.ic3.gov/Media/Y2022/PSA221221).
While it's not worth going out of your way to install an antivirus in the majority of cases, it is worth installing an ad blocker. I'd recommend [uBlock Origin](https://ublockorigin.com), which is free, open source, and supported on most of the major browsers. uBlock Origin doesn't just block ads; it also blocks a lot of phishing material and malware links. Even America's FBI [recommend using an adblocker](https://www.ic3.gov/Media/Y2022/PSA221221).

## IP Addresses

One aspect of cybersecurity that often garners outsized concern is the IP address. As the name suggests, it serves as an address, pinpointing the location of a device or a network within the vast expanse of the internet.

A private IP address identifies a device on a network, while a public IP address signifies a network within the internet. With an IP address, you can glean information such as the ISP that assigned it, a vague geographical location, and some miscellaneous details. However, this information typically lacks significant personal identification.

This doesn't mean it isn't possible to use somebody's IP maliciously, though. For instance, someone could attempt to launch a Distributed Denial of Service (DDoS) attack to disrupt your network. Unless you've compromised your router's security by creating vulnerabilities in your firewall, the potential damage of most attacks is largely mitigated.

Also, IP addresses are not static; they change periodically. Most consumers have dynamic public IP addresses, meaning their ISP will routinely alter them every few weeks or so.

Unless you've really gone out of your way to make an enemy, and have poked holes through all the prequipped security, someone knowing your IP isn't a huge security threat, although it is worth assessing it as a potential privacy threat.

## VPNs

In the same vein as antiviruses, many Virtual Private Networks (VPNs) employ the same scare tactics and fearmongering regarding issues that haven't been relevant for years.
In the same vein as antiviruses, many Virtual Private Network (VPN) operators employ the same scare tactics and fearmongering regarding issues that haven't been relevant for years.

They especially advertise that they can mask users IPs, which, as discussed previously, isn't as important for most people as it may seem. Even if it were hugely important, it just means that your IP is being sent to them instead of elsewhere.

Honestly, there isn't much I can say that wouldn't be covered better by simply watching Tom Scott's excellent video, ["This Video Is Sponsored By ███ VPN"](https://www.youtube.com/watch?v=WVDQEoe6ZWY).
There is much more to be said about VPNs, but nothing that isn't better covered by Tom Scott's excellent video, ["This Video Is Sponsored By ███ VPN"](https://www.youtube.com/watch?v=WVDQEoe6ZWY).

---

Expand Down
2 changes: 1 addition & 1 deletion config/pages/blog/blog.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@

Essay
### [Cybersecurity Superstition](/blog/Cybersecurity_Superstition)
<time datetime="2024-02-28">28 Feb, 2024</time> | 1586 words | 5 minute read
<time datetime="2024-02-28">28 Feb, 2024</time> | 1896 words | 7 minute read
</div>

<div class="post">
Expand Down
2 changes: 1 addition & 1 deletion docs/blog.html
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ <h1 id="section">
<div class="post">
<p>Essay</p>
<h3><a href="/blog/Cybersecurity_Superstition">Cybersecurity Superstition</a></h3>
<p><time datetime="2024-02-28">28 Feb, 2024</time> | 1586 words | 5 minute read</p>
<p><time datetime="2024-02-28">28 Feb, 2024</time> | 1896 words | 7 minute read</p>
</div>
<div class="post">
<p>Review</p>
Expand Down
Loading

0 comments on commit a58e425

Please sign in to comment.