Foundations of Cyber Security
Foundations of Cyber Security
MS6880
2
The CIA Triangle
} The C.I.A. triangle is made up of:
} Confidentiality
} Integrity
} Availability
}
Captain Smith’s decisions
} Smith was not ignoring the ice warnings; he was simply
not reacting to them. Ice warnings were just warnings
that a ship sent saying that they had seen ice at a certain
location (Kasprzak, 2012).
} Smith made the decision to not slow down the ship even
though there were reports of ice (Barratt, 2010;
Wilkinson & Hamilton, 2011).
} The weather was calm and clear which gave no reason for
Smith to slow the ship down
} Captain Smith also decided to leave the bridge to attend a
dinner party
Only the paranoid survive
Added words to business vocabulary:
} “Inflection point”, “valley of death”, “10X force”
“I believe that the prime responsibility of a
Manager is to guard constantly against other
people’s attacks and to inculcate this guardian
attitude in the people under his or her
management”
“…I worry about factories not performing well, I worry about
having too many factories. I worry about hiring the right people,
and I worry about morale slacking off…”
--Andrew Grove, Former CEO, Intel Corporation
After effects
} Lesson on employee’s ability to circumvent security
} Move towards security management
} Watershed moment in cyber security regulation
} 52 laws related to data breach in the US, but no
comprehensive national regulation; not one yet!
} 0.1/72 for Target
“As long as the fines aren’t putting businesses into bankruptcy–—or
even serious financial peril, for that matter–—executives and boards are
free to decide they are better off investing the bare minimum in security
and saving the rest for possible breach costs and fines. “ (An industry
observer)
} Is cyber security a god-talk* or a real concern?
Cyber Security and Privacy
MS6880
COSO COSO-ERM
} Control (internal) } Internal environment
environment } Objective setting
} Risk assessment } Event identification
} Control activities } Risk assessment
} Information and } Risk response
communication } Control activities
} Monitoring } Information and
communication
} Monitoring
Standards: ISO/IEC 17799:2005
Slide 11
ISO 27000 series
} ISO/IEC 17799:2005 has 133 possible controls, not all of
which must be used; part of the process is to identify
which are relevant
} Each section includes four categories of information:
} One or more objectives
} Controls relevant to the achievement of the objectives
} Implementation guidance
} Other information
} Renamed as ISO 27002 in 2007
} ISO 27001 provides guidelines on implementation (PDCA
format)
Slide 12
ISO politics
} Many countries, including the U.S., Germany, and Japan,
have not adopted the model, claiming it is fundamentally
flawed:
} The global InfoSec community has not defined any
justification for the code of practice identified
} The model lacks “the necessary measurement precision of a
technical standard”
} There is no reason to believe the model is more useful than
any other approach
} It is not as complete as other frameworks
} It is perceived as being hurriedly prepared, given the
tremendous impact that its adoption could have on industry
information security controls
Slide 15
NIST security models
} NIST documents have two notable advantages:
} They are publicly available at no charge
} Open source vs proprietary debate
} They have been available for some time and thus have been
broadly reviewed by government and industry professionals
} SP 800-12, Computer Security Handbook
} SP 800-14, Generally Accepted Security Principles & Practices
} SP 800-18, Guide for Developing Security Plans
} SP 800-26, Security Self-Assessment Guide-IT Systems
} SP 800-30, Risk Management for Information Technology Systems
Slide 16
SP 800-18: Guide for developing
security plans
} The NIST Special Publication 800-18 offers an approach
to policy management
} These policies are living documents that constantly
change and grow
} These documents must be properly disseminated
(distributed, read, understood, and agreed to) and
managed
} Good management practices for policy development and
maintenance make for a more resilient organization
Slide 17
Cyber Security and Privacy
MS6880
4
Policy fine print
} It takes 76 working days to read and understand a typical
privacy policy (Luca & Bazerman, 2021)
} Field experiments generally do not require consent as it
leads to demand effect
} If you are in social media, you are an uninformed participant in
several behavioral experiments
But,
} Very few people want to be let alone. They want to
manipulate the world around them by selective disclosure
of facts about themselves (Posner, 1978)
6
Personal experience and privacy
} Co-creation of value: the imperatives
} Personalization
} Personally identifiable data
} Give identity, get privileges
} Orwell's surveillance society vs small town life
7
“Yes we have a right to privacy. But in this society we can’t
have a right to anonymity”
-Derek Smith, CEO, ChoicePoint
8
Right to anonymity?
Personal data
} Personal data is any information that relates to an identified or
identifiable living individual.
} Personal data that has been de-identified, encrypted
or pseudonymised but can be used to re-identify a person
remains personal data and falls within the scope of the GDPR.
Related words
} Anonymity: Anonymity is the ability to conceal a person’s
identity. individuals can choose to be totally anonymous,
pseudonymous, or identifiable.
} Secrecy: Secrecy has been defined as intentional
concealment of information. Privacy need not hide; and
secrecy hides far more than what is private
} Confidentiality: Concerns the externalization of restricted
but accurate information to a specific entity. British law
embraces privacy as confidentiality
} Security: protection of personal information with three
specific goals-integrity, authentication and confidentiality.
Anonymity
} Anonymity is the ability to conceal a person’s identity
} Central for the information collected for statistical
purposes, and use of IT
Privacy preserving data mining
} Anonymity exists when someone is acting in a way that
limits the availability of identifiers to others
} totally anonymous, pseudonymous*, or identifiable
} The goal of privacy preserving data mining is to develop
data mining methods without increasing the risk of
misuse of the data
} Randomization
} Anonymization
} Encryption
Randomization
Generalized
Suppressed
Generalization or suppression?
Limitations
The Act further defines residency as, "An individual who has resided in India for a
period or periods amounting in all to 182 days or more in the 12 months
immediately preceding the date of application for enrolment."
Rebooting India*
} Other IDs function oriented,
not universal
} Aadhar not specific
to a function
} Not a substitute for passport
(~ Chanakya, Arthashastra)
Aadhar security for privacy
‘Aadhaar biometric data is 100% secure’
“There is “ten foot wall” to protect Aadhaar data!”
---India’s cybersecurity chief, Gulshan Rai
Aadhar data architecture
Contingency Planning
Saji K Mathew, PhD
Professor, Management Studies
INDIAN INTITUTE OF TECHNOLOGY MADRAS
IT project at IVK
} The IT department of IVK proposed an upgrade of their
security infrastructure
} Reason: No ROI
Security a low priority?
} Tangible drove out the significant!
} Poor articulation by IT dept
} Prioritization process issue
} Selective, convenient, political
Planning
} Planning is creating action steps toward goals and
then controlling them
} Provides direction for the organization’s future
} Allows managing resources
} Optimizes the use of the resources
} Coordinates the effort of independent organizational units
4
Security in planning
This nation should dedicate itself to
achieving the goal, before this decade
is out, of landing a man on the moon
and returning him safely to Earth.
5
Information security planning
Threats, Attack, Vulnerability, Risk
Precursors to planning
} Value Statement
Integrity, honesty, passion, and respectfulness are significant parts of
Microsoft’s corporate philosophy
} Vision Statement
A personal computer in every home running Microsoft software ([old]
} Mission Statement
Organize the world's information and make it universally accessible
and useful. [Google]
Top-down strategic planning
9
CISO job description
10
What is contingency planning (CP)?
} The overall planning for unexpected events is called
contingency planning (CP).
} It is how organizational planners position their
organizations to prepare for, detect, react to, and recover
from events that threaten the security of information
resources and assets
} Main goal: restoration to normal modes of operation with
minimum cost and disruption to normal business
activities after an unexpected event
} Contingency Plan Management Committee (CPMT)
typically oversees the process
} Key open resource: Contingency planning guide for Federal information systems, NIST
Components of CP
Incident response planning (IRP) focuses on immediate
response
Ref: https://networksandservers.blogspot.com/2011/02/high-availability-terminology-ii.html
BIA process
Cost balancing
Contingency plan implementation
18
Incident Response Plan (Contd.)
} When a threat becomes a valid attack, it is classified as an
information security incident if:
} It is directed against information assets
*Pipkin, Donald, Information Security,: Protecting the global enterprise, Prentice Hall, 2000
24
Incident response
} Once an actual incident has been confirmed and properly
classified, the IR team moves from detection phase to
reaction phase
25
Notification of key personnel
} As soon as incident is declared, the right people must be
immediately notified in the right order
} Alert roster: document containing contact information of
individuals to be notified in the event of actual incident
either sequentially or hierarchically
} Alert message: scripted description of incident
} Other key personnel: must also be notified only after
incident has been confirmed, but before media or other
external sources learn of it
26
Documenting an incident
} As soon as an incident has been confirmed and the
notification process is underway, the team should begin
documentation
} Should record the who, what, when, where, why and how of
each action taken while the incident is occurring
} Serves as a case study after the fact to determine if right
actions were taken and if they were effective
} Can also prove the organization did everything possible to
deter the spread of the incident
27
Example of
IRP
Incident escalation
} An incident may increase in scope or severity to the point
that the IRP cannot adequately contain the incident
29
After Action Review
} Before returning to routine duties, the IR team must
conduct an after-action review, or AAR
30
Law enforcement involvement
} When incident violates civil or criminal law, it is
organization’s responsibility to notify proper authorities
} Selecting appropriate law enforcement agency depends on
the type of crime committed: Federal, State, or Local
} Involving law enforcement has both advantages and
disadvantages:
} Usually much better equipped at processing evidence,
obtaining statements from witnesses, and building legal cases
} However, involvement can result in loss of control of chain of
events following an incident
31
Disaster Recovery
32
Disaster Classifications
} A DRP can classify disasters in a number of ways
33
Crisis management
} Crisis management: set of focused steps taken during and
after a disaster that deal primarily with people involved
} Crisis management team manages event:
} Supporting personnel and their loved ones during crisis
} Determining event's impact on normal business operations
} When necessary, making a disaster declaration
} Keeping public informed about event
} Communicating with outside parties
} Two key tasks of crisis management team:
} Verifying personnel status
} Activating alert roster
34
Business Continuity Planning (BCP)
} BCP
} Ensures critical business functions can continue in a disaster
} Most properly managed by CEO of organization
} Activated and executed concurrently with the DRP when
needed
} Reestablishes critical functions at alternate site (DRP focuses
on reestablishment at primary site)
} Relies on identification of critical business functions and the
resources to support them
35
Continuity strategies
} Several continuity strategies for business continuity
} Determining factor is usually cost
} Three exclusive-use options:
} Hot sites
} Warm sites
} Cold sites
} Three shared-use options:
} Timeshare
} Service bureaus
} Mutual agreements
Management
36 of Information Security
Exclusive Use Options
} Hot Sites
} Fully configured computer facility with all services
} Warm Sites
} Like hot site, but software applications not kept fully prepared
} Cold Sites
} Only rudimentary services and facilities kept in readiness
37
Shared use options
} Timeshares
} Like an exclusive use site but leased
} Service Bureaus
} Agency that provides physical facilities
} Mutual Agreements
} Contract between two organizations to assist
} Specialized alternatives:
} Rolling mobile site
} Externally stored resources
Management
38 of Information Security
Off-site disaster data storage
} To get any BCP site running quickly, organization must be
able to recover data
} Options include:
} Electronic vaulting: bulk batch-transfer of data to an off-site
facility
} Remote Journaling: transfer of live transactions to an off-site
facility
} Database shadowing: storage of duplicate online transaction
data
39
Testing Contingency Plans
} Once problems are identified during the testing process,
improvements can be made, and the resulting plan can be
relied on in times of need
} There are five testing strategies that can be used to test
contingency plans:
} Desk Check
} Structured walkthrough
} Simulation
} Parallel testing
} Full interruption
} https://danielmiessler.com/study/red-blue-purple-teams/
Management
40 of Information Security
Risk management
Defense
Applying safeguards to to eliminate or reduce residual risks
Transferal
Shifting risk to other areas or outside agencies
Mitigation
Reducing the impact in the event of an attack (CP)
Acceptance
Understanding the consequences of choosing to leave a risk
uncontrolled
Termination
Removing or disconnecting
Related terminologies
Justifying controls
Before implementing one of the control strategies for a
specific vulnerability, the organization must explore all
consequences of vulnerability to information asset.
Several ways to determine the advantages/disadvantages
of a specific control
Items that affect cost of a control or safeguard include
cost of development or acquisition, training fees,
implementation cost, service costs, and cost of
maintenance.
Justifying controls (cont’d)
Asset valuation involves estimating real/perceived costs
associated with design, development, installation,
maintenance, protection, recovery, and defense against
loss/litigation.
Process result is the estimate of potential loss per risk.
Expected loss per risk stated in the following equation:
Annualized loss expectancy (ALE) =
single loss expectancy (SLE) ×
annualized rate of occurrence (ARO)
SLE [Loss magnitude] = asset value × exposure factor (EF)
The cost-benefit analysis (CBA)
CBA determines if an alternative being evaluated is worth
the cost incurred to control vulnerability.
The CBA is most easily calculated using the ALE from earlier
assessments, before implementation of the proposed control:
CBA = ALE(prior) – (ALE(post) + ACS)
ALE(prior) is the annualized loss expectancy of risk before
implementation of control.
ALE(post) is the estimated ALE based on control being in place
for a period of time.
ACS is the annualized cost of the safeguard.
Implementation, monitoring, and
assessment of risk controls
The selection of the control strategy is not the end of a
process.
Strategy and accompanying controls must be
implemented and monitored on ongoing basis to
determine effectiveness and accurately calculate the
estimated residual risk.
Process continues as long as the organization continues
to function.
Cyber security technologies
Saji K Mathew, PhD
Professor, Management Studies
INDIAN INSTITUTE OF TECHNOLOGY MADRAS
Technology: Boon or a curse?
Access control
Access control, key to Confidentiality and Integrity
Enabled through policies, and technologies
IAAA for access control
Identification
Authentication
Authorization
Accountability
IAAA for access control
Identification
Get your ID
Authentication
Something you know (password, passphrase, OTP)
Something you have (smart card)
Something you are (fingerprints, retina and iris scans)
Something you produce (voice, signature)
Evaluating biometrics
Cross Over Error Rate (CER)
FAR: False Acceptance Rate
FAR high: FP, TP high, FN low
FRR: False Rejection Rate
FRR high: FP, TP low, FN high
@CER: FAR=FRR
Widely used in comparison of
biometric devices
What is a desirable CER for
user authentication?
Mostly used biometrics:
Fingerprints,
Retina (blood vessel pattern) and
Iris (random patterns of freckles, pits, striations, vasculature and coronas)
Firewalls
Prevent specific types of information from moving between
the outside world (untrusted network) and the inside world
(trusted network);
Cryptography
Encryption is the process of converting an original message
into a form that cannot be understood by unauthorized
individuals
Ensures confidentiality, integrity and non-repudiation
Cryptology: the science of encryption
Cryptography [kryptos-graphein (hidden writing)] processes involved in
encoding and decoding messages so that others cannot understand them
Slide 13
Related terms
Plaintext can be encrypted using an algorithm
Bit stream: plaintext bit transformed into cipher bit one bit at a time
Block cipher: message divided into blocks (e.g., sets of 8- or 16-bit
blocks) and each is transformed into encrypted block of cipher bits
Cipher: the transformation of the individual components
(characters, bytes, or bits) of an unencrypted message into
encrypted components
Ciphertext or cryptogram: the unintelligible encrypted or
encoded message resulting from an encryption
Decipher: to decrypt or convert ciphertext to plaintext
Key: the information used in conjunction with the algorithm to
create the ciphertext from the plaintext
Symmetric key encryption
Slide 19
Substitution cipher
Substitute one value for another
Monoalphabetic substitution uses only one alphabet
Polyalphabetic substitution uses two or more alphabets
Example (Caesar cypher):
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
c = E(p) = (p + k) mod (26)
p = D(c) = (c – k) mod (26)
Vigenere cipher (Tabula recta)
Find the cipher text for DOMS using poly alphabetic substitution
Use IITM as the key and encode DOMS
Tabula recta
DOM S
I I T M
Transposition cipher
Keys: 8-3, 7-6, 6-2, 5-7, 4-5, 3-1, 2-8, 1-4
Exclusive OR
Truth table
Cybersecurity policy
Saji K Mathew, PhD
Professor, Management Studies
INDIAN INTITUTE OF TECHNOLOGY MADRAS
Policy influences progress
} India’s policy landmarks
} Industrial policy: 1949
} Entry of foreign players restricted:1972
} New Computer Policy:1984
} Policy on Computer Software Export, Development, and
Training: 1986
} Software Technology Park (STP): 1990
} Economic liberalization: 1991
Policy influences behavior
Slide 5
The Bulls-eye Model
Policies are important reference documents for internal audits and for the resolution of
legal disputes about management's due diligence, and policy documents can act as a
clear statement of management's intent
Slide 6
Policies, Standards, & Practices
Slide 8
Enterprise Information Security Policy
(EISP)
} Sets strategic direction, scope, and tone for organization’s
security efforts
} Assigns responsibilities for various areas of information
security
} Guides development, implementation, and management
requirements of information security program
Slide 9
Components of the EISP
} Statement of Purpose - What the policy is for
} Information Technology Security Elements - Defines
information security
} Need for Information Technology Security - Justifies
importance of information security in the organization
} Information Technology Security Responsibilities and
Roles - Defines organizational structure
} References Information Technology standards and
guidelines
Slide 10
Issue-Specific Security Policy (ISSP)
} Provides detailed, targeted guidance to instruct the
organization in secure use of technology systems, and
begins with introduction to fundamental technological
philosophy of the organization
} Documents how the technology-based system is
controlled; and identifies the processes and authorities
that provide this control
} ISSP requires frequent updates
} Serves to indemnify the organization against liability for an
employee’s inappropriate or illegal system use
ISSP issues/topics
} Contains a statement on the organization’s position on an
issue
} ISSP topics could include:
} electronic mail,
} use of the Internet and the World Wide Web,
} specific minimum configurations of computers to defend
against worms and viruses,
} prohibitions against hacking or testing organization security
controls,
} home use of company-owned computer equipment,
} use of personal equipment on company networks,
} use of telecommunications technologies
Slide 12
Components of the ISSP
} Statement of purpose
} Scope and applicability
} Definition of technology addressed
} Responsibilities
} Authorized access and usage of equipment
} User access
} Fair and responsible use
} Protection of privacy
Slide 13
Components of the ISSP (contd)
} Prohibited usage of equipment
} Disruptive use or misuse
} Criminal use
} Offensive or harassing materials
} Copyrighted, licensed, or other intellectual property
} Other restrictions
} Systems management
} Management of stored materials
} Employer monitoring
} Virus protection
} Physical security
} Encryption
Slide 14
Components of the ISSP (contd)
} Violations of policy
} Procedures for reporting violations
} Penalties for violations
} Policy review and modification
} Scheduled review of policy and procedures for modification
} Limitations of liability
} Statements of liability or disclaimers
Slide 15
Systems-Specific Policy (SysSP)
} Systems-specific policies (SysSPs) are created to function
as standards or procedures to be used when configuring
or maintaining systems
} SysSPs can be separated into:
} Management guidance
} Eg: How to configure a firewall
} Technical specifications
} Eg.: Configuration of the firewall
Management Guidance SysSPs
} Created by management to guide the implementation and
configuration of technology
} Applies to any technology that affects the confidentiality,
integrity or availability of information
} Informs technologists on management’s intent
Slide 17
Technical Specifications SysSPs
} System administrator’s directions on implementing
managerial policy
} Each type of equipment has its own type of policies
} There are two general methods of implementing such
technical controls:
} Access control lists
} Configuration rules
Slide 18
Access Control Lists
} Include the user access lists, matrices, and capability tables
that govern the rights and privileges
} A similar method that specifies which subjects and
objects users or groups can access is called a capability
table
} These specifications are frequently complex matrices,
rather than simple lists or tables
} In general, ACLs enable administrations to restrict access
according to user, computer, time, duration, or even a
particular file
Slide 19
ACLs
} In general, ACLs regulate:
} Who can use the system
} What authorized users can access
} When authorized users can access the system
} Where authorized users can access the system from
} How authorized users can access the system
} Restricting what users can access, e.g., printers, files,
communications, and applications
Slide 20
Windows XP ACLs
Slide 21
Configuration Rules
} Configuration rules are the specific configuration codes
entered into security systems to guide the execution of
the system when information is passing through it
} Rule policies are more specific to the operation of a
system than ACLs, and may or may not deal with users
directly
} Many security systems require specific configuration
scripts telling the systems what actions to perform on
each set of information they process
Slide 22
Firewall Configuration Rules
Slide 23
IDS Configuration Rules
Slide 24
Design elements (cont.)
} SETA – Security education, training and awareness
program contains
} Security education
} Security training
} Security awareness
} Purpose
} Improving awareness
} Developing skills & knowledge
} Building in-depth knowledge
25
Cybersecurity : Threats & Solutions
Industry Perspective.
It begins.
• “The only system which is truly secure is one which is switched
off and unplugged, locked in a titanium safe, buried in a
concrete bunker, and is surrounded by nerve gas and very
highly paid armed guards. Even then, I wouldn’t stake my life on
it.”
Professor Gene Spafford
Cyber Security : Definition
• Cyber security is the body of technologies, processes and practices
involved in protecting individuals and organizations from cyber crime
and now cyber warfare.
• It is designed to protect integrity of networks, computers, programs
and data from attack, damage or unauthorized access
• There are five key principles in cyber security:
• Confidentiality
More popular triad of
• Integrity Cybersecurity.
• Availability
• Accountability
• Auditability
Scope of Cybersecurity.
First Cyber attack (1982) !
Concepts of
Cyber Security
Basics to Intermediate users.
Introduction to Concepts : Cyber Security
• General Concepts
• Operating Systems
• Cryptography
• Networking Concepts
• OSI Model
• Packets & Protocols
• Firewalls
• Design of a Simple Network
• Connecting to Network
• Security Concepts
• CIA Triad
• Cyber Operational Concepts & Terms.
• Workshop & Discussion
• QBOT : Execution
• QBOT : Analysis
Operating Systems.
Rings for all.
Security Checks.
2
VPN – Virtual Private Network
VPN : Connecting Two Networks
Introduction to Concepts : Cyber Security
• General Concepts
• Operating Systems
• Cryptography
• Networking Concepts
• OSI Model
• Packets & Protocols
• Firewalls
• Design of a Simple Network
• Connecting to Network
• Security Concepts
• CIA Triad
• Cyber Operational Concepts & Terms.
• Workshop & Discussion
• QBOT : Execution
• QBOT : Analysis
Cyber Attack : Phases.
General Information Collection strategies.
Untargeted Attacks
Focussed Information Collection.
Targeted Attacks
Basic Concepts
• Confidentiality
• Keeping data hidden for unauthorized users.
• Example : Encryption.
• Integrity
• Accuracy and completeness of the data.
• Example : Hash matches & Checksums
• Availability
• Being able to access the data when required.
• Example: Denial of Service Attacks
Common Terminologies.
● Malware.
● Remote Administration Tools (RATs)
● Trojans.
● KeyLogger.
● Ransomware.
● Social Engineering
● Phishing & Spear Phishing.
● Command & Control (C2)
● “Man in the Middle” (MitM) attack.
● Denial of Service attack
● Distributed Denial of Service Attack (DDoS).
Concepts of Ethical Hacking.
• Scanning
• Vulnerability
• Exploit
• Payload
Remote Administration Tool.
• Multiple Options.
• Commercial Tools (Misused)
• Ammy Admin
• Team Viewer
• AnyDesk
• Professional & Open Source
• Puppy RAT
• Qrat
• Professional & Licensed
• DarkComet
• Atom Logger (See Screen.)
Lazarus Group
MageCart Syndicate
GozNym Gang
Organised DarkSide
Crime Groups. REvil
Clop
Lapsus$
FIN7
Lapsus$
• Lapsus$, stylised as LAPSUS$ and classified by Microsoft as DEV-0537, is an international
extortion-focused hacker group known for its various cyberattacks against companies
and government agencies
• In March 2022, Lapsus$ gained notoriety for a series of cyberattacks against large tech
companies, including Microsoft, Nvidia and Samsung
• Following these attacks, the City of London Police announced that it had made seven
arrests in connection to a police investigation into Lapsus$.
• Although the group had been considered inactive by April 2022, the group is believed to
have re-emerged in September 2022 with a series of data breaches against various large
companies through a similar attack vector, including Uber and Rockstar.
Russia Ukraine Cyberwarfare
• During the prelude to the 2022 Russian invasion and even during the invasion multiple cyberattacks against Ukraine were
recorded, as well as some attacks on Russia.
• The first major cyberattack took place on 14 January 2022, and took down more than a dozen of Ukraine
government websites
• According to Ukrainian officials, around 70 government websites, including the Ministry of Foreign Affairs, the Cabinet of
Ministers, and the Security and Defense Council, were attacked. Most of the sites were restored within hours of the attack
• On 15 February 2022, a large DDoS attack brought down the websites of the defense ministry, army, and Ukraine's two
largest banks, PrivatBank and Oschadbank .Cybersecurity monitor Netblocks reported that the attack intensified over the
course of the day, also affecting mobile apps and ATMS of the banks
• Independent hacker groups, such as Anonymous, have launched cyberattacks on Russia in retaliation for the invasion
Russia Ukraine Cyberwarfare
• Beginning on 6 March, Russia began to significantly increase the frequency of its cyber-attacks against Ukrainian
civilians.
• On 9 March alone, the Quad9 malware-blocking recursive resolver intercepted and mitigated 4.6 million attacks
against computers and phones in Ukraine and Poland, at a rate more than ten times higher than the European
average.
Introduction to Securing
Institutions.
Cyber Attack of accident?
What is Critical information infrastructure?
Monitor Military and Frieght Movement Joint Operation with Pakistan - Possible human
11 Indian Railways
(Northern Railways) element involved.
Create psychological impact on youth - as a country
12 Unacademy Understanding preferences of youth.
which is weak and vulnerable.
Kudankulam Nuclear Steal IPR and monitor the possible production of Triggering an accident - could be devastating in our
13
Power Plant fissile material - an idea on Nuclear Capabilities. country.
- Forrester
Threat Intel for organizations
Social Media
DARK WEB
• Social Messaging Companies • Log Aggregation, Triage, • EDR
and Analysis • MDR
• Telecom Companies
• Data Analytics • XDR
• Internet Service Providers
• Support for Threat Hunting
• Grocery & Pizza Providers.
Framework to study the Security of Org.
Integrity of Supply Chain.
Challenges of CIIP Vendor Security Risk & Leakages
Boundary Protection – DMZ
Smart Monitoring - Use of Machine Learning – Anomaly
detection etc.
Issues of Identification & Authentication.
Physical Access Control – Sabotage.
Interconnectedness – Risks.
Hardening of Systems – Limited Privilege.
Resource Allocation Caps.
Remote Access Permissions
Account Management
Discussion : Questions?
• Who is the Attacker?
• Internal
• External
• What is his Skill level?
• Script Kiddies
• Semiskilled
• Highly Skilled
• What is his motive?
• Espionage
• Weakening & Demoralising organization.
• Which type of attack would be used for targeting your organization?
• Focussed campaigns
• Not Focussed campaigns
• Who is the Target?
Thanks & Questions.
Block chains
Ensures confidentiality through encryption and integrity
through hashing
Hash functions are mathematical algorithms that generate
message summary/digest (hash value) to confirm message
identity and confirm no content has changed
Properties such as hiding, collision resistance helps block
chains make transactions permanent
Implemented as linked lists
Standards of Encryption
Data Encryption Standard (DES) was developed in 1977
by IBM and is based on the Data Encryption Algorithm
(DEA), which uses a 64-bit block size and a 56-bit key
DES is a federally approved standard for non-classified
data; it was cracked in 1997 when the developers of a
new algorithm, Rivest-Shamir-Aldeman, offered a $10,000
reward for the first person or team to crack the
algorithm
Fourteen thousand users collaborated over the Internet to
finally break the encryption
Triple DES (3DES) was developed as an improvement to
DES and uses three keys in succession
Advanced Encryption Standard (AES) developed with a
key length of either 128, 192, or 256 bits (NIST/ISO)
RSA standard developed based on the difficulty of figuring
the prime factors of a large number
Power of the keys
Security Models
Bell-LaPadula Model (1973) Confidentiality
Read down, write up
Confidentiality focus Integrity
Biba Model (1977)
Availability
Read up, write down
Integrity focus
Clark-Wilson Model (1987)
Constrained data item (CDI), transformation procedures
Useful for commercial applications
Chinese Wall Model (1989)
Resolves conflict of interest
Integrated cyber defense
Cyber Security and Privacy
MS6880
Foundations of privacy
Saji K Mathew, PhD
Professor, Management Studies
INDIAN INTITUTE OF TECHNOLOGY MADRAS
Encrypted chats vulnerable?
The context
The Narcotics Control Bureau’s (NCB) probe into the
drugs case in connection with actor Sushant Singh
Rajput’s death case has led to news channels reporting
WhatsApp chats reportedly between actor Rhea
Chakraborty and others and also part of a group chat
from 2017, allegedly between Deepika Padukone and her
manager Karishma.
How was end-to-end* encrypted WhatsApp chats read
by a third party?
How can private chat messages be displayed in public?
Privacy???
Surveillance nation
Michael Foucault, George Orwell
The poorest man may in his cottage bid defiance to all the force
of the Crown. It may be frail; its roof may shake; the wind may
blow through it; the storms may enter; the rain may enter - but
the King of England cannot enter; all his forces dare not cross
the threshold of the ruined tenement (William Pitt, 1763 cited in Hosein,
2004)
Public and private
Aristotle: poilis (public) and oikos (private)
Aristotle distinguished between the public sphere of
politics and political activity, the polis, and the private or
domestic sphere of the family, the oikos, as two distinct
spheres of life
Reductionism vs Coherentism
Privacy as a derivative of fundamental rights like property
rights, bodily security, right to freedom etc. (Thomson,1975)
There is nothing called privacy!
Cohenretism treats privacy as a distinct right
Economic view
Privacy is not important so long as there is no economic
consequence (Posner, 1975)
If privacy affects economic value of information, it must
be protected (eg. access to reco letter by applicants)
Privacy could reduce economic efficiency
Feminist view
Potential misuse in favor of dominant gender
(MacKinnon,1989)
Privacy and control over information
“the claim of individuals, groups or institutions to determine
for themselves when, how and to what extend information
about them is communicated to others”
-Westin 1967, Privacy and Freedom
Privacy as exclusive (restricted) access
Privacy vs information privacy
Fair Information Practice Principles
US Secretary's Advisory Committee on Automated Personal Data
Systems in a 1973 report, Records, Computers and the Rights of
Citizens
1. There must be no personal data record-keeping systems whose
very existence is secret.
2. There must be a way for a person to find out what information
about the person is in a record and how it is used.
3. There must be a way for a person to prevent information about
the person that was obtained for one purpose from being used or
made available for other purposes without the person’s consent.
4. There must be a way for a person to correct or amend a record
of identifiable information about the person.
5. Any organization creating, maintaining, using, or disseminating
records of identifiable personal data must assure the reliability of
the data for their intended use and must take precautions to
prevent misuses of the data
Stakeholders
1st Era of Privacy Rise of information privacy as an explicit social, political, and legal
(1961-1979) issue. Early recognition of potential dark sides of the new
technologies (Brenton 1964). Fair Information Practice
2nd Era of Rise of computer and network systems, database capabilities.
Privacy European nations move to national data protection laws for private
(1980-1989) and public sectors.
3rd Era of Rise of the Internet, Web 2.0, terrorist attack of 9/11 dramatically
Privacy changed the landscape of information exchange. Privacy concerns rose
(1990-2002) to new highs.
2005 Onwards - Social media, cloud computing, big data, location based services
are the dominant drivers for new privacy concerns and research
Why organizations should worry?
Since January 2005 (In US)
▪ 857 million records with sensitive personal information
exposed
▪ 4,586 data breaches
Lawsuits against popular websites like Facebook Beacon,
Google Buzz for violation of online privacy
▪ ChoicePoint ~ $30 million fine
o Fraudulent access of 145,000 consumer reports
▪ TJX Companies ~ $156 million fine
o Unfair practices that resulted in compromise of 46.2 million credit
cards data
International Significance
▪ 70 out of 400 grants given by National Science Foundation (USA), related
to privacy.
Why individuals should worry?
A super market faced with a lawsuit from one of its
customers, who had slipped and fallen, threatened to use
the fact that the customer was a frequent purchaser of
alcohol, to damage his reputation in the court
-Simson Garfinkel (2000), Database Nation
Class work
What should the Hathway Jones do: hire/not hire
Give rationale (three bullets)
What should they do post decision? (three bullets)
Cyber Security and Privacy
MS6880
Introduction
Saji K Mathew, PhD
Professor, Management Studies
INDIAN INTITUTE OF TECHNOLOGY MADRAS
Are cyber attacks real?
What should I do?
} Kaseya is a company which provides software tools for IT
outsourcing
} One of those tools was subverted
} The hackers who claimed responsibility for the breach
have demanded $70 million to restore all the affected
businesses
Nov-Dec’22
Drones attack Saudi oil refinery (Sept 16, 2019)
Slide 20
Cyber confusion
Which is correct?
A. cyber security
B. cyber-security
C. cybersecurity
} Cyber security form is common in Europe
} Cybersecurity form common in the America’s
Risk Management
Saji K Mathew, PhD
Professor, Management Studies
INDIAN INTITUTE OF TECHNOLOGY MADRAS
Do you know?
} If you know the enemy and know yourself, you need not
fear the result of a hundred battles
} If you know yourself but not the enemy, for every victory
gained you will also suffer a defeat
} If you know neither the enemy nor yourself, you will
succumb in every battle
-- Sun Tzu
Risk management
} Knowing yourself: Identifying, examining, and
understanding the information and how it is processed,
stored, and transmitted
} Knowing the enemy: Identifying, examining, and
understanding the threats facing the organization’s
information assets
} Risk management: The process of identifying, assessing,
and reducing risks facing an organization
Slide 3
Threats, attack, vulnerability, risk
Attack surface
Residual risk
Risk identification
} Risk identification begins with the process of self-
examination
} Managers identify the organization’s information assets,
classify them into useful groups, and prioritize them by
their overall importance
} Identify information assets, including people, procedures,
data and information, software, hardware, and networking
elements
} This step should be done without pre-judging the value of
each asset; values will be assigned later in the process
Slide 8
Organizational assets used in systems
Slide 9
Identifying hardware, software, and
network assets
} Whether automated or manual, the inventory process
requires a certain amount of planning
} Determine which attributes of each of these information
assets should be tracked
} That will depend on the needs of the organization and its
risk management efforts
Slide 10
Attributes for assets
} When deciding which attributes to track for each
information asset, consider the following list of potential
attributes:
} Name
} IP address
} MAC address
} Asset type
} Serial number
} Manufacturer name
} Manufacturer’s model or part number
} Software version, update revision, or FCO number
} Physical location
} Logical location
} Controlling entity
Slide 11
Identifying people, procedures, and
data assets
} Responsibility for identifying, describing, and evaluating
these information assets should be assigned to managers
who possess the necessary knowledge, experience, and
judgment
} As these assets are identified, they should be recorded via
a reliable data-handling process like the one used for
hardware and software
Slide 12
Suggested attributes for people,
procedures, and data assets
} People } Data
} Position name/number/ID ▶ Owner/creator/manager
} Supervisor name/number/ID ▶ Size of data structure
▶ Data structure used
} Security clearance level ▶ Online or offline
} Special skills ▶ Location
▶ Backup procedures
} Procedures
} Description
} Intended purpose
} Software/hardware/networking elements to which it is tied
} Location where it is stored for reference
} Location where it is stored for update purposes
Slide 13
Data classification model
} Example
} Public
} For official use only
} Sensitive
} Classified
Slide 15
Knowing the enemy:
Identify and prioritize threats and threat agents
} Each threat presents a unique challenge to information
security and must be handled with specific controls that
directly address the particular threat and the threat
agent’s attack strategy
} Before threats can be assessed in the risk identification
process, however, each threat must be further examined
to determine its potential to affect the targeted
information asset
} In general, this process is referred to as a threat
assessment
Slide 16
Threats
} Back doors
} Brute force
} Dictionary
} Man-in-the –middle
} Password crack
} Social engineering
} Phishing
} Spear phishing
} Vishing
Threat categories
Weighted ranks of threats to
information security
Slide 19
Vulnerability assessment
} Once you have identified the information assets of the
organization and documented some threat assessment criteria,
you can begin to review every information asset for each
threat
} This review leads to the creation of a list of vulnerabilities that
remain potential risks to the organization
} Vulnerabilities are specific avenues that threat agents can
exploit to attack an information asset
} At the end of the risk identification process, a list of assets and their
vulnerabilities has been developed
} This list serves as the starting point for the next step in the
risk management process: risk assessment
Vulnerability assessment of a DMZ
router
Slide 21
Threat-Vulnerability-Asset (TVA) worksheet
} At the end of the risk identification process, a list of
assets and their vulnerabilities has been developed
} Another list prioritizes threats facing the organization
based on the weighted table discussed earlier
} These lists can be combined into a single worksheet
Slide 22
Sample TVA Spreadsheet
Slide 23
Determining the loss frequency
} Describes an assessment of the likelihood of an attack
combined with expected probability of success
} Use external references for values that have been
reviewed/adjusted for your circumstances.
} Assign numeric value to likelihood, typically annual value.
} Eg.: Targeted by hackers once every five years: 1/5,
20 percent
} Determining an attack’s success probability by estimating
quantitative value (e.g., 10 percent) for the likelihood of a
successful attack; value subject to uncertainty
Evaluating loss magnitude
} The next step is to determine how much of an
information asset could be lost in a successful attack.
} Also known as loss magnitude or asset exposure
} Combines the value of information asset with the
percentage of asset lost in event of a successful attack
} Difficulties involve:
} Valuating an information asset
} Estimating percentage of information asset lost during best-
case, worst-case, and most likely scenarios
Calculating residual risk
} For the purpose of relative risk assessment, risk equals:
Slide 27
Example
Q: An ecommerce database has 10% chance of an attack
this year based on industry reports (one attack in ten
years). InfoSec dept reports if the infrastructure is attacked
there is 50% chance of success based on current asset
vulnerabilities and protection. The asset is values at 50 in a
0-100 scale, and InfoSec informs that 80% asset will be
compromised by a successful attack. Measurements are 75%
accurate. Estimate risk
A: Likelihood: 0.1; Attack success probability: 0.5
Loss frequency: 0.1*0.5=0.05
Loss magnitude= 0.8*50=40
Risk=0.05*40+error=2+2*0.25=2.5
Slide 28