• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • UVCeed Mobile UVC Light Sanitizer for $119

    UVCeed Mobile UVC Light Sanitizer for $119
  • AddStars Reviews: Lifetime Subscription for $59

    AddStars Reviews: Lifetime Subscription for $59
  • Locker Password Manager Premium Plan: Lifetime Subscription for $49

    Locker Password Manager Premium Plan: Lifetime Subscription for $49
  • The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34

    The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34
  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Cybersecurity through fairy-tales: Little Red Riding Hood

Sep 18, 2019 by iHash Leave a Comment


How do you explain the concepts of information security to your children? Chances are, you simply don’t. Some give up on making information security relatable and just forbid kids from doing some things online — or even from using the Internet in general. But prohibition without explanation is counterproductive, more likely spurring children to go after the forbidden fruit.

In answer to the question “Why not talk to your children about cyberthreats and how information security works?” parents, who may not have the firmest of grasps on the concepts to begin with, tend to get frustrated and give up, and not necessarily in that order. But everything’s already been explained. You might not realize it, but numerous textbooks on cybersecurity for little ones were in fact written hundreds of years ago. You know them as fairy tales. All you need to do is refocus them a little.

We analyze the fairy tale <em>Little Red Riding Hood</em> in terms of cybersecurity

Little Red Riding Hood

Take, for example, Little Red Riding Hood. It’s a well-known European folk tale that’s been repeatedly retold by such eminent cybersecurity experts as the Brothers Grimm, Charles Perrault, and many others. The various versions of the story may differ slightly, but the basic plot is the same. Let’s take a step-by-step look at what happens.

  1. Mom sends her daughter to Grandma with a basket of treats.
  2. Little Red Riding Hood meets the wolf, who asks: “Where are you going?”
  3. Little Red Riding Hood replies: “I’m going to see Grandma and bring her a basket of treats.”

The cybersecurity implications are clear from the start — here, you can explain the handshake procedure, which is the process of establishing communication between two parties, and together observe the related threats.

Now, Little Red Riding Hood has been programmed to knock on Grandma’s door, receive a “Who’s there?” query, and respond with a passphrase about Mom sending treats so that Grandma can proceed with authorization and grant access to the house. But for some reason, she gives out the passphrase to a random request, without having received the proper “Who’s there?” query. That gives the attacker an opening to exploit.

  1. Depending on the version of the firmware fairy tale, the wolf either sends Little Red on a detour, or suggests that she pick some flowers for Grandma.

Either way, it’s a type of Denial-of-Service (DoS) attack. If the wolf tries to log in to Grandma’s house after Little Red Riding Hood’s arrival, it is unlikely to be let in; the one expected visitor is already inside. Therefore, it’s important for him to put Little Red out of commission for a while, so that she cannot complete her task on schedule.

  1. Either way, the wolf is the first to reach Grandma’s house and duly logs in, responding correctly to the “Who’s there?” query. And Grandma grants him access to the house.

This is a near-textbook version of a Man-in-the-Middle (MitM) attack using the replay attack method (although in our case, Wolf-in-the-Middle would be more accurate). The wolf taps into the communication channel between two parties, learns the handshake procedure and passphrase from the client, and reproduces both to illegally gain access to the server.

  1. The wolf gobbles up Grandma, puts on her nightgown and nightcap, and lies in her bed under a blanket.

In modern terms, he is setting up a phishing site. Everything looks authentic from the door — Grandma’s bed is there, someone resembling Grandma is lying in it.

  1. Having approached the house and received the “Who’s there?” query, Little Red Riding Hood gives the passphrase about the treats she’s brought.

This is a continuation of the MitM attack, only now the wolf, who has learned the second part of the information exchange procedure, mimics the normal behavior of the server Grandma. Little Red, spotting nothing suspicious, logs in.

  1. She enters the house and wonders aloud why Grandma has such big ears, eyes, teeth. Smart questions, but in the end, satisfied with the wolf’s inarticulate explanations, she logs in … and gets eaten.

In real life, as in this fairy tale, phishing sites are rarely 100% convincing and often contain dubious elements, like a suspicious hyperlink. To avoid problems, it pays to be attentive: If, say, Grandma’s domain name is sticking out of her nightcap, leave the site immediately.

Little Red Riding Hood sees some inconsistencies, but unfortunately, she ignores them. Here you’ll have to explain to your child that Little Red’s behavior is careless, and say what she should have done instead.

  1. Fortunately, a group of lumberjacks turn up (or hunters in some versions), cut the wolf open, and Grandma and Little Red Riding Hood pop out, miraculously safe and sound.

Admittedly, the parallels with information security are imperfect. You can’t cut open a cybercriminal to restore money, reputation, or security. Well, to be fair, we haven’t tried. And for the record, we are in no way associated with anyone who has.

Cybersecurity in other fairy tales

Fairy tales contain life lessons, and there’s bound to be some information security subtext in any fairy tale — the main thing is to expound correctly. In The Three Little Pigs, for example, we see a script kiddie who uses a huff-and-puff tool for brute-force attacks. The Snow Queen installs troll-mirror malware in Kai and takes control of him, much the way a remote-access tool (RAT) gives an insider’s level of system control to an outside criminal.

In turn, Puss in Boots is basically a detailed report on a very sophisticated APT attack, in which Puss first hijacks the ogre’s infrastructure, and then, having established a presence there, pulls off a fraudulent deal with the local government through a complex scam involving reputation services.





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: cybersecurity, fairytales, Hood, red, Riding

Special Offers

  • UVCeed Mobile UVC Light Sanitizer for $119

    UVCeed Mobile UVC Light Sanitizer for $119
  • AddStars Reviews: Lifetime Subscription for $59

    AddStars Reviews: Lifetime Subscription for $59
  • Locker Password Manager Premium Plan: Lifetime Subscription for $49

    Locker Password Manager Premium Plan: Lifetime Subscription for $49
  • The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34

    The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34
  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Apple’s Worldwide Developers Conference returns June 5

Mar 30, 2023 By iHash

UVCeed Mobile UVC Light Sanitizer for $119

Mar 30, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Heard on the Street – 3/30/2023

Welcome to insideBIGDATA’s “Heard on the Street” round-up column! In this regular feature, we highlight thought-leadership commentaries from members of the big data ecosystem. Each edition covers the trends of the day with compelling perspectives that can provide important insights to give you a competitive advantage in the marketplace. We invite submissions with a focus […]

3CX Desktop App Supply Chain Attack Leaves Millions at Risk

Mar 30, 2023Ravie LakshmananSupply Chain / Software Security 3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be an active supply chain attack that’s using digitally signed and rigged installers of the popular voice and video conferencing software to target downstream […]

AddStars Reviews: Lifetime Subscription for $59

Expires June 27, 2023 23:59 PST Buy now and get 90% off KEY FEATURES Why wait for customers to visit your website to see your reviews when AddStars will display them ALL, right where customers are searching – on Google’s search listings. AddStars is an innovative and comprehensive review aggregation tool that provides a range […]

Feed the Beast: How to Get Business Analytics Delivering

In this contributed article, Chonchol Gupta, CEO, Rebirth Analytics, believes that if enterprises want to identify and swerve risk, they require a radical rethink of how they obtain the data that fuels their analytics engines. With a long pedigree in Fintech, InsureTech, and supply chain innovation, Chonchol has more than a decade’s experience as a […]

The 2023 Complete Blender Bundle: Learn to Create Game Art in Blender for $34

Expires March 29, 2123 23:59 PST Buy now and get 94% off Blender Character Creator for Video Game Design KEY FEATURES Take your first steps to becoming a 3D character artist – learn everything from modeling to painting to animating the character. The course is the sequel to the highly popular Blender Character Creator course, […]

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

Mar 29, 2023Ravie LakshmananCryptocurrency / Malware Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. “Clipboard injectors […] can be silent for years, show no network activity or any other signs of presence until the disastrous […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT