{"id":23304,"date":"2019-09-18T11:37:19","date_gmt":"2019-09-18T15:37:19","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/fairy-tales-red-hood\/23304\/"},"modified":"2020-02-26T19:04:37","modified_gmt":"2020-02-26T17:04:37","slug":"fairy-tales-red-hood","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/fairy-tales-red-hood\/23304\/","title":{"rendered":"Little Red Riding Hood and the Wolf-in-the-Middle"},"content":{"rendered":"<p>How do you explain the concepts of information security to your children? Chances are, you simply don\u2019t. Some give up on making information security relatable and just forbid kids from doing some things online \u2014 or even from using the Internet in general. But prohibition without explanation is counterproductive, more likely spurring children to go after the forbidden fruit.<\/p>\n<p>In answer to the question \u201cWhy not talk to your children about cyberthreats and how information security works?\u201d parents, who may not have the firmest of grasps on the concepts to begin with, tend to get frustrated and give up, and not necessarily in that order. But everything\u2019s already been explained. You might not realize it, but numerous textbooks on cybersecurity for little ones were in fact written hundreds of years ago. You know them as fairy tales. All you need to do is refocus them a little.<\/p>\n<h2>Little Red Riding Hood<\/h2>\n<p>Take, for example, <em>Little Red Riding Hood<\/em>. It\u2019s a well-known <a href=\"https:\/\/en.wikipedia.org\/wiki\/Little_Red_Riding_Hood\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">European folk tale<\/a> that\u2019s been repeatedly retold by such eminent cybersecurity experts as the Brothers Grimm, Charles Perrault, and many others. The various versions of the story may differ slightly, but the basic plot is the same. Let\u2019s take a step-by-step look at what happens.<\/p>\n<ol>\n<li>Mom sends her daughter to Grandma with a basket of treats.<\/li>\n<li>Little Red Riding Hood meets the wolf, who asks: \u201cWhere are you going?\u201d<\/li>\n<li>Little Red Riding Hood replies: \u201cI\u2019m going to see Grandma and bring her a basket of treats.\u201d<\/li>\n<\/ol>\n<p>The cybersecurity implications are clear from the start \u2014 here, you can explain the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/handshake\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">handshake<\/a> procedure, which is the process of establishing communication between two parties, and together observe the related threats.<\/p>\n<p>Now, Little Red Riding Hood has been programmed to knock on Grandma\u2019s door, receive a \u201cWho\u2019s there?\u201d query, and respond with a passphrase about Mom sending treats so that Grandma can proceed with authorization and grant access to the house. But for some reason, she gives out the passphrase to a random request, without having received the proper \u201cWho\u2019s there?\u201d query. That gives the attacker an opening to exploit.<\/p>\n<ol start=\"4\">\n<li>Depending on the version of the <s>firmware<\/s> fairy tale, the wolf either sends Little Red on a detour, or suggests that she pick some flowers for Grandma.<\/li>\n<\/ol>\n<p>Either way, it\u2019s a type of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dos-denial-of-service-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Denial-of-Service<\/a> (DoS) attack. If the wolf tries to log in to Grandma\u2019s house after Little Red Riding Hood\u2019s arrival, it is unlikely to be let in; the one expected visitor is already inside. Therefore, it\u2019s important for him to put Little Red out of commission for a while, so that she cannot complete her task on schedule.<\/p>\n<ol start=\"5\">\n<li>Either way, the wolf is the first to reach Grandma\u2019s house and duly logs in, responding correctly to the \u201cWho\u2019s there?\u201d query. And Grandma grants him access to the house.<\/li>\n<\/ol>\n<p>This is a near-textbook version of a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Man-in-the-Middle<\/a> (MitM) attack using the replay attack method (although in our case, <em>Wolf-in-the-Middle<\/em> would be more accurate). The wolf taps into the communication channel between two parties, learns the handshake procedure and passphrase from the client, and reproduces both to illegally gain access to the server.<\/p>\n<ol start=\"6\">\n<li>The wolf gobbles up Grandma, puts on her nightgown and nightcap, and lies in her bed under a blanket.<\/li>\n<\/ol>\n<p>In modern terms, he is setting up a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> site. Everything looks authentic from the door \u2014 Grandma\u2019s bed is there, someone resembling Grandma is lying in it.<\/p>\n<ol start=\"7\">\n<li>Having approached the house and received the \u201cWho\u2019s there?\u201d query, Little Red Riding Hood gives the passphrase about the treats she\u2019s brought.<\/li>\n<\/ol>\n<p>This is a continuation of the MitM attack, only now the wolf, who has learned the second part of the information exchange procedure, mimics the normal behavior of <s>the server<\/s> Grandma. Little Red, spotting nothing suspicious, logs in.<\/p>\n<ol start=\"8\">\n<li>She enters the house and wonders aloud why Grandma has such big ears, eyes, teeth. Smart questions, but in the end, satisfied with the wolf\u2019s inarticulate explanations, she logs in \u2026 and gets eaten.<\/li>\n<\/ol>\n<p>In real life, as in this fairy tale, phishing sites are rarely 100% convincing and often contain dubious elements, like a suspicious hyperlink. To avoid problems, it pays to be attentive: If, say, Grandma\u2019s domain name is sticking out of her nightcap, leave the site immediately.<\/p>\n<p>Little Red Riding Hood sees some inconsistencies, but unfortunately, she ignores them. Here you\u2019ll have to explain to your child that Little Red\u2019s behavior is careless, and say what she should have done instead.<\/p>\n<ol start=\"9\">\n<li>Fortunately, a group of lumberjacks turn up (or hunters in some versions), cut the wolf open, and Grandma and Little Red Riding Hood pop out, miraculously safe and sound.<\/li>\n<\/ol>\n<p>Admittedly, the parallels with information security are imperfect. You can\u2019t cut open a cybercriminal to restore money, reputation, or security. Well, to be fair, we haven\u2019t tried. And for the record, we are in no way associated with anyone who has.<\/p>\n<h2>Cybersecurity in other fairy tales<\/h2>\n<p>Fairy tales contain life lessons, and there\u2019s bound to be some information security subtext in any fairy tale \u2014 the main thing is to expound correctly. In <em>The Three Little Pigs<\/em>, for example, we see a script kiddie who uses a huff-and-puff tool for <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/brute-force\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">brute-force attacks<\/a>. <em>The Snow Queen<\/em> installs troll-mirror malware in Kai and takes control of him, much the way a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/rat-remote-access-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote-access tool (RAT)<\/a> gives an insider\u2019s level of system control to an outside criminal.<\/p>\n<p>In turn, <em>Puss in Boots<\/em> is basically a detailed report on a very sophisticated <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">APT attack<\/a>, in which Puss first hijacks the ogre\u2019s infrastructure, and then, having established a presence there, pulls off a fraudulent deal with the local government through a complex scam involving reputation services.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"safe-kids\">\n","protected":false},"excerpt":{"rendered":"<p>Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!<\/p>\n","protected":false},"author":700,"featured_media":23305,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2670],"tags":[3008,3219,89,1519,76,97],"class_list":{"0":"post-23304","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-dos","9":"tag-fairy-tales","10":"tag-kids","11":"tag-mitm","12":"tag-phishing","13":"tag-security-2"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fairy-tales-red-hood\/23304\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fairy-tales-red-hood\/16674\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fairy-tales-red-hood\/14067\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/fairy-tales-red-hood\/6521\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fairy-tales-red-hood\/18643\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fairy-tales-red-hood\/16715\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/fairy-tales-red-hood\/15431\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fairy-tales-red-hood\/19330\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fairy-tales-red-hood\/18022\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/fairy-tales-red-hood\/6458\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fairy-tales-red-hood\/28707\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/fairy-tales-red-hood\/12369\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/fairy-tales-red-hood\/11213\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fairy-tales-red-hood\/20237\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/fairy-tales-red-hood\/10213\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fairy-tales-red-hood\/24206\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/fairy-tales-red-hood\/24241\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fairy-tales-red-hood\/23460\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/kids\/","name":"kids"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/23304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=23304"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/23304\/revisions"}],"predecessor-version":[{"id":26809,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/23304\/revisions\/26809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/23305"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=23304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=23304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=23304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}