Information Security Notes (ALL)
Information Security Notes (ALL)
Saquib Ali
Information Security
Unit-I
Information Security mitigating vulnerabilities. This practice generally refers to
The meaning of computer security The meaning of the software vulnerabilities in computing systems.
term computer security has evolved in recent years. Backdoors A backdoor in a computer system is a
Before the problem of data security became widely method of bypassing normal authentication, securing
publicized in the media, most people‘s idea of remote access to a computer, obtaining access to plaintext,
and so on, while attempting to remain undetected. The
computer security focused on the physical machine.
backdoor may take the form of an installed program (e.g.,
Traditionally, computer facilities have been physically
Back Orifice), or could be a modification to an existing
protected for three reasons: program or hardware device. It may also fake information
• To prevent theft of or damage to the hardware about disk and memory usage.
• To prevent theft of or damage to the information Denial-of-service attack unlike other exploits,
• To prevent disruption of service denials of service attacks are not used to gain unauthorized
access or control of a system. They are instead designed to
Computer security: render it unusable. Attackers can deny service to individual
victims, such as by deliberately entering a wrong password
is security applied to computing devices such as
enough consecutive times to cause the victim account to be
computers and smartphones, as well as computer
locked, or they may overload the capabilities of a machine
networks such as private and public networks, or network and block all users at once. These types of
including the whole Internet. The field covers all the attack are, in practice, very hard to prevent, because the
processes and mechanisms by which digital behavior of whole networks needs to be analyzed, not only
equipment, information and services are protected the behavior of small pieces of code. Distributed denial of
from unintended or unauthorized access, change or service (DDoS) attacks are common, where a large number
destruction, and are of growing importance in line of compromised hosts (commonly referred to as "zombie
with the increasing reliance on computer systems of computers", used as part of a botnet with, for example; a
most societies worldwide. It includes physical security worm, Trojan horse, or backdoor exploit to control them)
to prevent theft of equipment, and information are used to flood a target system with network requests,
thus attempting to render it unusable through resource
security to protect the data on that equipment. It is
exhaustion.
sometimes referred to as "cyber security" or "IT
security", though these terms generally do not refer to Direct-access attacks An unauthorized user gaining
physical access to a computer (or part thereof) can perform
physical security (locks and such).
many functions, install different types of devices to
compromise security, including operating system
Some important terms used in computer modifications, software worms, key loggers, and covert
security are: listening devices. The attacker can also easily download
Vulnerability Vulnerability is a weakness which large quantities of data onto backup media, for instance
allows an attacker to reduce a system's information CD-R/DVD-R, tape; or portable devices such as key
assurance. Vulnerability is the intersection of three drives, digital cameras or digital audio players. Another
elements: a system susceptibility or flaw, attacker access to common technique is to boot an operating system
the flaw, and attacker capability to exploit the flaw. To contained on a CD-ROM or other bootable media and read
exploit vulnerability, an attacker must have at least one the data from the hard drive(s) this way. The only way to
applicable tool or technique that can connect to a system defeat this is to encrypt the storage media and store the key
weakness. In this frame, vulnerability is also known as the separate from the system. Direct-access attacks are the only
attack surface. Vulnerability management is the cyclical type of threat to Standalone computers (never connect to
practice of identifying, classifying, remediating, and internet), in most cases.
Mr. Saquib Ali
Information Security
Unit-I
Eavesdropping Eavesdropping is the act of Principle security:
surreptitiously listening to a private conversation, typically There are five principles of security. They are as
between hosts on a network. For instance, programs such follows:
as Carnivore and NarusInsight have been used by the FBI Confidentiality: The principle of confidentiality
and NSA to eavesdrop on the systems of internet service
specifies that only the sender and the intended
providers.
recipient should be able to access the content of the
Spoofing Spoofing of user identity describes a situation message.
in which one person or program successfully masquerades
as another by falsifying data and thereby gaining an
illegitimate advantage.
Tampering Tampering describes an intentional Integrity: The confidential information sent by A to
modification of products in a way that would make them B which is accessed by C without the permission or
harmful to the consumer. knowledge of A and B.
Repudiation Repudiation describes a situation where
the authenticity of a signature is being challenged.
Information disclosure Information Disclosure
(Privacy breach or Data leak) describes a situation where
information, thought as secure, is released in an untrusted
environment. Authentication: Authentication mechanism helps in
Elevation of privilege Elevation of Privilege
establishing proof of identification.
describes a situation where a person or a program want to Non-repudiation:
gain elevated privileges or access to resources that are Access control: Access control specifies and control
normally restricted to him/it. who can access what.
Exploits An exploit is a piece of software, a chunk of Availability: It means that assets are accessible to
data, or sequence of commands that takes advantage of a authorized parties at appropriate times.
software "bug" or "glitch" in order to cause unintended or
unanticipated behavior to occur on computer software, Security Attacks
hardware, or something electronic (usually computerized). A vulnerable application could subject people and
This frequently includes such things as gaining control of a systems to several kinds of harm. An attack occurs
computer system or allowing privilege escalation or a when a malevolent actor takes advantage of security
denial of service attack. The term "exploit" generally refers flaws or vulnerabilities to harm others. In this article,
to small programs designed to take advantage of a software we‘ll examine various attack methods, so that you‘ll
flaw that has been discovered, either remote or local. The know what to watch out for when safeguarding your
code from the exploit program is frequently reused in application.
Trojan horses and computer viruses.
Indirect attacks An indirect attack is an attack Types of Security Attacks
launched by a third-party computer. By using someone Cyber security attacks can be of the following two
else's computer to launch an attack, it becomes far more types:
difficult to track down the actual attacker. There have also
been cases where attackers took advantage of public Active attacks
anonymizing systems, such as the tor onion router system. Passive attacks
Computer crime: Computer crime refers to any
crime that involves a computer and a network. Active Attacks:
Mr. Saquib Ali
Information Security
Unit-I
An active assault tries to change system resources or
interfere with their functionality. Active attacks entail
some form of data stream manipulation or false
statement generation. Active attacks can take the
following forms:
1.1 Masquerade
When one entity impersonates another, it commits a
masquerade attack. One of the other active attack
types is included in a masquerade attack. An
1.3. Repudiation
authorization process can become extremely
vulnerable to a disguised attack if it isn‘t always This attack happens when the login control gets
completely safeguarded. Masquerade attacks can be tampered with or the network is not totally secure.
carried out via stolen logins and passwords, by With this attack, the author‘s information can be
spotting holes in programmers, or by figuring out a altered by malicious user actions in order to save fake
way to get around the authentication procedure. data in log files, up to the broad alteration of data on
behalf of others, comparable to the spoofing of email
messages.
1.4. Replay
When the network is not completely secure or the
login control is tampered with, an attack occurs. With
this attack, the information of the author can be
changed by malicious user actions to save suspicious
data in log files, up to the widespread alteration of
1.2 Modification of Messages
data on behalf of others, similar to the spoofing of
Modification denotes that a communication has been email messages.
delayed, reordered, or had a piece of it changed to
achieve an unlawful effect. Modification compromises
the accuracy of the source data. In essence, it indicates
that unauthorised individuals not only access data but
also spoof it by initiating denial-of-service attacks,
such as modifying sent data packets or flooding the
network with false data. An assault on authentication
is manufacturing. A notification that originally said,
―Allow JOHN to view confidential file X,‖ for
instance, is changed to say, ―Allow Smith to read
confidential file X.‖
Mr. Saquib Ali
Information Security
Unit-I
1.5. Denial of Service jeopardises the confidentiality factor in a
conversation.
Denial of service hinders the regular use of
communication infrastructure. There may be a
specified target for this attack. An entity might, for
instance, suppress all messages sent to a specific
location. Another example of service denial is when
an entire network is disrupted, either by network
disablement or message overload that lowers
performance.
For example, suppose that it can have a Hill cipher Diffusion means that if it can change an individual bit
with an n x n matrix, and suppose that it can have a of the plaintext, therefore (statistically) half of the bits
plaintext-ciphertext pair of length n2 with which it is in the ciphertext must change, and likewise, if it can
able to solve for the encryption matrix. alter one bit of the ciphertext, thus relatively one half
of the plaintext bits should alter.
If it can change one character of the ciphertext, one
column of the matrix can change effectively. Of Because a bit can get only two states, when they are
course, it can be more desirable to have the complete all re-calculated and changed from one apparently
key change. When a situation like that appears, the random location to another, half of the bits will have
cryptanalyst can probably require to solve for the modified state.
complete key simultaneously, instead of piece by
piece. The concept of diffusion is to secret the relationship
among the ciphertext and the plain text. This will
Property of Confusion create it complex for an attacker who tries to discover
The property of confusion protect the out the plain text and it enhance the redundancy of
relationship between the ciphertext and the plain text by spreading it across the rows and
key. columns. It can be achieved through transposition of
This property creates it complex to find the algorithm and it can be used by block ciphers only.
key from the ciphertext.
If an individual bit in a key is changed, there
are several bits in the ciphertext will be
Asymmetric Encryption
changed. Asymmetric encryption (also known as asymmetric
Diffusion: cryptography) allows users to encrypt information
using shared keys.
Diffusion is an encryption process where the authority You need to send a message across the internet, but
of one plaintext symbol is spread over some ciphertext you don't want anyone but the intended recipient to
symbols with the objective of hiding statistical see what you've written. Asymmetric encryption can
properties of the plaintext. A simple diffusion element help you achieve that goal.
is the bit permutation, which can be used frequently Asymmetric cryptography techniques allow for
within DES. AES need the more advanced Mix- extremely secure communication between two parties.
column process. Chances are, you've encountered this technology
Mr. Saquib Ali
Information Security
Unit-I
before, even if you never knew what it was called. For the development of a pair of asymmetric keys. Other
example, each time you visit a website with an programs work in a similar manner.
address starting with "https," you're dealing with Imagine that someone wants to send an encrypted
asymmetric encryption. message to another person. The process looks like
Security in an asymmetric encryption environment this:
comes from two keys. Registration: The user and the sender have
1. Public key encryption: Anyone can see this connected with an official entity that generated
and access it. both public and private keys.
2. Private key encryption: Only the Lookup: The sender scours a public-key
authenticated recipient has access to it. directory for the recipient's public key
These two keys are separate but equal, and they're information.
both required to decode a message. If you have only Encrypt: The sender creates a message,
one, decryption is impossible. encrypts it with the recipient's public key, and
Symmetric encryption is asymmetric encryption's sends it.
counterpart. If you use symmetric encryption, one key Decode: The recipient uses the private key to
both encrypts and decrypts data. A hacker with access unscramble the message.
to that one key can do both functions. Reply: If the recipient wants to respond, the
Asymmetric encryption relies on two keys. One process moves in reverse.
encrypts, and the other decodes. The result is a
stronger level of security. Advantages of Asymmetric Encryption
Asymmetric encryption also known as public key
cryptography is a method of cryptography that uses
two different keys to encrypt and decrypt data, here
are some advantages of asymmetric encryption: –
Enhanced Security: Asymmetric encryption
provides a higher level of security compared to
symmetric encryption where only one key is used
for both encryption and decryption with
asymmetric encryption a different key is used for
each process and the private key used for
decryption is kept secret by the receiver making,
it harder for an attacker to intercept and decrypt
Sensitive messages move through a process of the data.
encryption and decryption with public and private Authentication: Asymmetric encryption can be
keys. used for authentication purposes which means
that the receiver can verify the sender s identity.
An algorithm starts the process. A mathematical This is achieved by the sender encrypting a
function generates a key pair. Each key is different, message with their private key which can only be
but they are related to one another mathematically. decrypted with their public key if the receiver can
Key generation protocols differ, and the keys they successfully decrypt the message, it proves that it
was sent by the sender who has the corresponding
create are different too. In the Microsoft environment,
private key.
for example, you need about four lines of code to start Non-repudiation: Asymmetric encryption also
provides non-repudiation which means that the
Mr. Saquib Ali
Information Security
Unit-I
sender cannot deny sending a message or altering 1. The initial permutation (IP) function receives
its contents this is because the message is the 64-bit plaintext block.
encrypted with the sender s private key and only 2. The IP is performed on plaintext.
their public key can decrypt it . Therefore, the 3. The IP then makes two halves of the block that
receiver can be sure that the message was sent by has been permutated. The two halves are
the sender and has not been tampered with. known as left plan text (LPT) and right text
Key distribution: Asymmetric encryption (RPT).
eliminates the need for a secure key distribution 4. All LPTs and RPTs are encrypted 16 times.
system that is required in symmetric encryption 5. The LPT and RPT are joined, and then the
with symmetric encryption, the same key is used final permutation (FP) is performed on this
for both encryption and decryption and the key block.
needs to be securely shared between the sender 6. The 64-bit cipher text is now ready.
and the receiver asymmetric encryption, on the
other hand, allows the public key to be shared
openly and the private key is kept secret by the
receiver.
Versatility: Asymmetric encryption can be used
for a wide range of applications including secure
email communication online banking transactions
and e-commerce it is also used to secure
SSL/TSL connections which are commonly used
to secure internet traffic.
1. Username/Password
Every user contains a unique username and password
that should be input correctly before accessing a
system.
2. User Attribution
These techniques usually include biometric verification,
such as fingerprints, retina scans, etc. This
authentication is based on user uniqueness and is
compared to database samples already in the system. A fence defines a boundary on one side and
Users can only allow access if there is a match. restricts the user.
The fence address location is fixed. The
3. User card and Key
operating system resides on one side and the
To login into the system, the user must punch a card
user works on the other side of the fence.
into a card slot or enter a key produced by a key
generator into an option provided by the operating
system.
Password-based authentication Users provide their digital certificates when they sign in
Passwords are the most common methods of to a server. The server verifies the credibility of the
authentication. Passwords can be in the form of a string digital signature and the certificate authority. The server
of letters, numbers, or special characters. To protect then uses cryptography to confirm that the user has a
yourself you need to create strong passwords that correct private key associated with the certificate.
include a combination of all possible options.
Biometric authentication
However, passwords are prone to phishing attacks and Biometrics authentication is a security process
bad hygiene that weakens effectiveness. An average that relies on the unique biological
person has about 25 different online accounts, but characteristics of an individual. Here are key
only 54% of users use different passwords across their advantages of using biometric authentication
accounts. technologies:
Biological characteristics can be easily
The truth is that there are a lot of passwords to compared to authorized features saved in a
remember. As a result, many people choose database.
convenience over security. Most people use simple Biometric authentication can control physical
passwords instead of creating reliable passwords access when installed on gates and doors.
because they are easier to remember. You can add biometrics into your multi-factor
authentication process.
The bottom line is that passwords have a lot of Biometric authentication technologies are used
weaknesses and are not sufficient in protecting online by consumers, governments and private
information. Hackers can easily guess user credentials corporations including airports, military bases,
by running through all possible combinations until they and national borders. The technology is
find a match. increasingly adopted due to the ability to
achieve a high level of security without creating
Multi-factor authentication friction for the user. Common biometric
Multi-Factor Authentication (MFA) is an authentication authentication methods include:
method that requires two or more independent ways to
identify a user. Examples include codes generated from Facial recognition—matches the different face
the user’s smartphone, Captcha tests, fingerprints, voice characteristics of an individual trying to gain access
biometrics or facial recognition. to an approved face stored in a database. Face
recognition can be inconsistent when comparing
MFA authentication methods and technologies increase faces at different angles or comparing people who
the confidence of users by adding multiple layers of look similar, like close relatives. Facial liveness like
security. MFA may be a good defense against most ID R&D’s passive facial liveness prevents spoofing.
account hacks, but it has its own pitfalls. People may Fingerprint scanners—match the unique patterns
lose their phones or SIM cards and not be able to on an individual’s fingerprints. Some new versions
generate an authentication code. of fingerprint scanners can even assess the vascular
patterns in people’s fingers. Fingerprint scanners are
currently the most popular biometric technology for
Mr. Saquib Ali
Information Security
Unit-II
everyday consumers, despite their frequent
inaccuracies. This popularity can be attributed to
iPhones.
Speaker Recognition —also known as voice
biometrics, examines a speaker’s speech patterns for
the formation of specific shapes and sound qualities.
A voice-protected device usually relies on
standardized words to identify users, just like a
password.
Eye scanners—include technologies like iris
recognition and retina scanners. Iris scanners project
a bright light towards the eye and search for unique
patterns in the colored ring around the pupil of the
eye. The patterns are then compared to approved
information stored in a database. Eye-based
authentication may suffer inaccuracies if a person
wears glasses or contact lenses.
Token-based authentication
Token-based authentication technologies enable users
to enter their credentials once and receive a unique
encrypted string of random characters in exchange. You
can then use the token to access protected systems
instead of entering your credentials all over again. The
digital token proves that you already have access
permission. Use cases of token-based authentication
include RESTful APIs that are used by multiple
frameworks and clients.
Notes
Information Security
Module III
Database security: Oxley Act (SAO) or Payment Card Industry
Security of databases refers to the array of controls, Data Security Standard (PCI DSS) specific to
tools, and procedures designed to ensure and safeguard industry regulations on data privacy, like
confidentiality, integrity, and accessibility. This tutorial HIPAA or regional privacy laws like the
will concentrate on confidentiality because it's a European Union's General Data Protection
component that is most at risk in data security breaches. Regulation (GDPR) could be a major problem
with fines in worst cases in excess of many
Security for databases must cover and safeguard the million dollars for each violation.
following aspects: o Costs for repairing breaches and notifying
o The database containing data. consumers about them: Alongside notifying
o Database management systems (DBMS) customers of a breach, the company that has
o Any applications that are associated with it. been breached is required to cover the
investigation and forensic services such as crisis
o Physical database servers or the database server
management, triage repairs to the affected
virtual, and the hardware that runs it.
systems, and much more.
o The infrastructure for computing or network that
is used to connect to the database. Common Threats and Challenges:
Security of databases is a complicated and challenging Numerous software configurations that are not correct,
task that requires all aspects of security practices and weaknesses, or patterns of carelessness or abuse can
technologies. This is inherently at odds with the lead to a breach of security. Here are some of the most
accessibility of databases. The more usable and prevalent kinds of reasons for security attacks and the
accessible the database is, the more susceptible we are reasons.
to threats from security. The more vulnerable it is to
attacks and threats, the more difficult it is to access and Insider Dangers
utilize. An insider threat can be an attack on security from any
three sources having an access privilege to the database.
Why Database Security is Important? o A malicious insider who wants to cause harm
According to the definition, a data breach refers to a
o An insider who is negligent and makes mistakes
breach of data integrity in databases. The amount of
that expose the database to attack. vulnerable to
damage an incident like a data breach can cause our
attacks
business is contingent on various consequences or
elements. o An infiltrator is an outsider who acquires
o Intellectual property that is credentials by using a method like phishing or
compromised: Our intellectual property--trade accessing the database of credential information
secrets, inventions, or proprietary methods -- in the database itself.
could be vital for our ability to maintain an
advantage in our industry. If our intellectual Insider dangers are among the most frequent sources of
property has been stolen or disclosed and our security breaches to databases. They often occur as a
competitive advantage is lost, it could be consequence of the inability of employees to have
difficult to keep or recover. access to privileged user credentials.
o The damage to our brand's
reputation: Customers or partners may not Human Error:
want to purchase goods or services from us (or The unintentional mistakes, weak passwords or sharing
deal with our business) If they do not feel they passwords, and other negligent or uninformed
can trust our company to protect their data or behaviours of users remain the root causes of almost
their own. half (49 percent) of all data security breaches.
o The concept of business continuity (or lack of
it): Some businesses cannot continue to function Database Software Vulnerabilities can be Exploited
until a breach has been resolved.
o Penalties or fines to be paid for not
Hackers earn their money by identifying and exploiting
complying: The cost of not complying with vulnerabilities in software such as databases
international regulations like the Sarbanes- management software. The major database software
Notes
Information Security
Module III
companies and open-source databases management deployment, management, and administration of
platforms release regular security patches to fix these security solutions more difficult.
weaknesses. However, failing to implement the patches o More stringent requirements for regulatory
on time could increase the risk of being hacked. compliance: The worldwide regulatory
compliance landscape continues to increase by
SQL/NoSQL Injection Attacks complexity. This makes the compliance of every
A specific threat to databases is the infusing of untrue mandate more challenging.
SQL as well as other non-SQL string attacks in queries
for databases delivered by web-based apps and HTTP Best use of Database Security
headers. Companies that do not follow the safe coding
practices for web applications and conduct regular As databases are almost always accessible via the
vulnerability tests are susceptible to attacks using these. network, any security risk to any component or part of
the infrastructure can threaten the database. Likewise,
Buffer Overflow is a way to Exploit Buffers any security attack that impacts a device or workstation
could endanger the database. Therefore, security for
Buffer overflow happens when a program seeks to copy databases must go beyond the limits of the database.
more data into the memory block with a certain length
than it can accommodate. The attackers may make use In evaluating the security of databases in our workplace
of the extra data, which is stored in adjacent memory to determine our organization's top priorities, look at
addresses, to establish a basis for they can begin each of these areas.
attacks.
o Security for physical security: If the database
DDoS (DoS/DDoS) Attacks servers are on-premises or the cloud data centre,
In a denial-of-service (DoS) attack in which the attacker they should be placed in a secure, controlled
overwhelms the targeted server -- in this case, the climate. (If our server for database is located in
database server with such a large volume of requests a cloud-based data centre, the cloud provider
that the server is unable to meet no longer legitimate will handle the security on our behalf.)
requests made by actual users. In most cases, the server o Access to the network and administrative
is unstable or even fails to function. restrictions: The practical minimum number of
users granted access to the database and their
Malware access rights should be restricted to the
Malware is software designed to exploit vulnerabilities minimum level required to fulfil their tasks.
or cause harm to databases. Malware can be accessed Additionally, access to the network is limited to
via any device that connects to the databases network. the minimum permissions needed.
o End security of the user account or device: Be
Attacks on Backups aware of who has access to the database and
Companies that do not protect backup data using the when and how data is used. Monitoring tools for
same rigorous controls employed to protect databases data can notify you of data-related activities that
themselves are at risk of cyberattacks on backups. are uncommon or seem to be dangerous. Any
device that connects to the network hosting the
The following factors amplify the threats: database must be physically secured (in the sole
control of the appropriate person) and be subject
o Data volumes are growing: Data capture, to security checks throughout the day.
storage, and processing continue to increase DATA
o Security: ALL data--including data stored in
exponentially in almost all organizations. Any
databases, as well as credential information
tools or methods must be highly flexible to meet
should be secured using the highest-quality
current as well as far-off needs.
encryption when in storage and while in
o The infrastructure is sprawling: Network
transport. All encryption keys must be used in
environments are becoming more complicated,
accordance with the best practices guidelines.
especially as companies shift their workloads
into multiple clouds and hybrid cloud o Security of databases using software: Always
architectures and make the selection of use the most current version of our software to
Notes
Information Security
Module III
manage databases and apply any patches compliance. This could require tokenization
immediately after they're released. (data concealing) or advanced key management
o Security for web server applications and of security keys.
websites: Any application or web server that o Optimization of Data Security and Risk
connects to the database could be a target and Analysis: An application that will provide
should be subjected to periodic security testing contextual insights through the combination of
and best practices management. security data with advanced analytics will allow
o Security of backups: All backups, images, or users to perform optimizing, risk assessment,
copies of the database should have the identical and reporting in a breeze. Select a tool that is
(or equally rigorous) security procedures as the able to keep and combine large amounts of
database itself. recent and historical data about the security and
state of your databases. Also, choose a solution
o Auditing: Audits of security standards for
that provides data exploration, auditing, and
databases should be conducted every few
reporting capabilities via an extensive but user-
months. Record all the logins on the server as
friendly self-service dashboard.
well as the operating system. Also, record any
operations that are made on sensitive data, too.
Database Security Requirements:
Data protection tools and platforms • Database security is the protection of data
Today, a variety of companies provide data protection against unauthorized access, use, disclosure,
platforms and tools. A comprehensive solution should modification, or destruction.
have all of the following features: • Security requirements are essential for any
database system to ensure that data is secure and
o Discovery: The ability to discover is often
protected.
needed to meet regulatory compliance
• There are several security requirements that a
requirements. Look for a tool that can detect and
database system must meet to be considered
categorize weaknesses across our databases,
secure, including confidentiality, integrity,
whether they're hosted in the cloud or on-
availability, and accountability
premises. It will also provide recommendations
to address any vulnerabilities that are Confidentiality:
discovered. Confidentiality is the requirement to ensure that
o Monitoring of Data Activity: The solution sensitive data is not disclosed to unauthorized
should be capable of monitoring and analysing individuals or entities. It is a critical aspect of database
the entire data activity in all databases, whether
security, especially for databases that contain personal
our application is on-premises, in the cloud, or
inside a container. It will alert us to suspicious or sensitive information.
activity in real-time to allow us to respond more
quickly to threats. It also provides visibility into How to ensure database confidentiality:
the state of our information through an • Implementing access controls to restrict access
integrated and comprehensive user interface. It to the database to authorized personnel only.
is also important to choose a system that
• Using encryption to protect sensitive data stored
enforces rules that govern policies, procedures,
and the separation of duties. Be sure that the in the database from unauthorized access.
solution we select is able to generate the reports • Implementing data masking or redaction
we need to comply with the regulations. techniques to hide sensitive data from
o The ability to Tokenize and Encrypt Data: In unauthorized personnel.
case of an incident, encryption is an additional • Regularly auditing and monitoring access to the
line of protection against any compromise. Any database to detect any unauthorized attempts to
software we choose to use must have the
access sensitive data.
flexibility to protect data cloud, on-premises
hybrid, or multi-cloud environments. Find a tool Reliability:
with volume, file, and application encryption Reliability refers to the ability of a database to perform
features that meet our company's regulations for its functions accurately and consistently over time. A
Notes
Information Security
Module III
reliable database ensures that the data it stores is always organization, or society as a whole. This includes data
available when needed and is not corrupted or lost due that is confidential, personal, or proprietary in nature.
to hardware or software failures, power outages, or Examples of sensitive data include financial records,
other technical issues. such as credit card numbers, bank account information,
or tax identification numbers; health records, such as
How to ensure database reliability: medical history or diagnoses; intellectual property, such
• Implementing a backup and recovery plan to as trade secrets, patents, or copyrights; and personal
prevent data loss in the event of hardware or identifiers, such as social security numbers or driver's
software failures. license numbers.
• Using redundant hardware and software
configurations to ensure that the database Types of Data based on Sensitivity:
remains operational even if one component Public Data: This type of data is considered non-
sensitive and can be freely disclosed without any
fails.
restrictions. Examples of public data include press
• Monitoring the database for errors and issues, releases, promotional materials, and other information
and taking proactive measures to address them that is intended for public consumption.
before they become critical. Internal Use Data: This type of data is intended for
• Implementing failover systems to ensure that the internal use within an organization and is generally not
database can switch to an alternative system if shared with the public. Examples of internal use data
include employee records, customer lists, and financial
the primary system fails. reports.
Confidential Data: This type of data is highly sensitive
Integrity: and is intended for use only by authorized personnel
Integrity refers to the accuracy and consistency of the within an organization. Examples of confidential data
data stored in a database. An integral database ensures include trade secrets, product development plans, and
that the data it stores is correct and consistent, and that financial information.
it is not modified or tampered with without Restricted Data: This type of data is considered the
authorization. most sensitive and is subject to strict access controls.
Examples of restricted data include classified
government information, national security secrets, and
How to ensure database integrity: highly sensitive corporate data.
• Implementing access controls to restrict access
to the database to authorized personnel only. Protection of Sensitive Data:
Protecting sensitive data is a critical aspect of database
• Using encryption to protect sensitive data stored
security. Sensitive data should be encrypted when
in the database from unauthorized access.
stored and transmitted, and access to it should be
• Implementing auditing and logging mechanisms
restricted to authorized users only. Access controls
to track changes made to the database and detect
should be implemented to ensure that users only have
any unauthorized
access to the data they need to perform their job
• Implementing data validation checks to ensure
functions.
that data entered into the database meets certain
In addition to technical controls, organizations
criteria or standards, such as ensuring that phone
should have policies and procedures in place to govern
numbers are in the correct format, or that dates
the handling of sensitive data. This includes training
are entered in the correct format.
employees on security best practices, performing
regular risk assessments and audits, and having incident
Sensitive Data:
Sensitive data is any type of information that, if response plans in place to address security breaches or
disclosed, could cause harm to an individual, incidents involving sensitive data.
Notes
Information Security
Module III
Inference: can help prevent inference attacks by ensuring that
security measures are up-to-date and effective.
• Inference is a method of deducing sensitive Education and Training: Employees and users should
information from non-sensitive data through a be educated and trained on security best practices and
series of logical or statistical analyses. the risks associated with inference attacks. This can
• Inference attacks can be carried out by an help prevent unintentional disclosures of sensitive data
attacker who has access to a database that and improve overall security awareness within the
contains both sensitive and non-sensitive data. organization.
By analyzing patterns in the non-sensitive data,
an attacker can make inferences about the Multilevel Security:
sensitive data. • Multilevel security (MLS) is a security model
• For example, if a database contains medical that allows for the simultaneous access of
records that include a patient's age, gender, and information with different levels of sensitivity,
zip code, an attacker could use statistical while enforcing strict access controls to ensure
analysis to deduce information about the that each user can only access information at
patient's medical condition or treatment history. their level of clearance.
• Inference attacks can also be carried out through • MLS is commonly used in government and
a combination of data from multiple sources. By military settings, where different levels of
correlating data from different sources, an security clearance are required to access
attacker can make inferences about sensitive classified information.
data that may not be present in any single source • MLS works by assigning security levels to data
• Inference attacks can be difficult to detect and users based on their level of clearance. Each
because they do not involve direct access to security level is defined by a set of security
sensitive data. Instead, they rely on patterns and controls and policies that restrict access to the
correlations in non-sensitive data to deduce data based on the user's clearance level.
sensitive information. • For example, a government database might
contain classified information at different levels
Measures to prevent inference attacks: of sensitivity, such as top secret, secret, and
Data Masking and Perturbation: Organizations can confidential.
use data masking and perturbation techniques to add • Users with top secret clearance would be able to
noise or randomization to non-sensitive data to make it access all levels of classified information, while
more difficult for attackers to deduce sensitive users with secret clearance would only be able
information. For example, a medical database might use to access secret and confidential information.
a technique called k-anonymization to group patients
with similar demographic data and medical conditions, Implementation of MLS:
making it more difficult for an attacker to identify an • MLS can be implemented through a variety of
individual patient's medical history. technical controls, such as mandatory access
Data Partitioning and Separation: Organizations can controls (MAC) or discretionary access controls
partition data into smaller subsets and separate sensitive (DAC). In MAC, access controls are enforced
data from non-sensitive data to limit the amount of by the operating system or database, while in
information available in any single source. This can DAC, access controls are left to the discretion of
reduce the likelihood of an attacker being able to make the user or administrator.
inferences by correlating data from multiple sources. • MLS can be challenging to implement and
Access Controls and Auditing: Access controls can be maintain, as it requires strict security policies
used to restrict access to sensitive data and limit the and procedures, as well as specialized training
ability of attackers to make inferences from non- for users and administrators. Additionally, MLS
sensitive data. Auditing can be used to monitor access can have a significant impact on performance
to sensitive data and detect any unauthorized attempts and usability, as users may be required to
to access or manipulate the data. undergo multiple authentication and
Regular Security Reviews: Regular security reviews authorization processes to access information at
can help organizations identify potential vulnerabilities different levels of clearance.
and gaps in their security controls and procedures. This
Notes
Information Security
Module III
• However, MLS can provide a high level of Message Integrity: Data integrity means that the data
security and control over sensitive information, must arrive at the receiver exactly as it was sent. There
making it an important tool for organizations must be no changes in the data content during
that deal with classified or sensitive data. transmission, either maliciously or accident, in a transit.
As there are more and more monetary exchanges over
Network Security: the internet, data integrity is more crucial. The data
Network Security protects your network and data from integrity must be preserved for secure communication.
breaches, intrusions and other threats. This is a vast and End-point authentication: Authentication means that
overarching term that describes hardware and software the receiver is sure of the sender?s identity, i.e., no
solutions as well as processes or rules and imposter has sent the message.
configurations relating to network use, accessibility, Non-Repudiation: Non-Repudiation means that the
and overall threat protection. receiver must be able to prove that the received
Network Security involves access control, virus and message has come from a specific sender. The sender
antivirus software, application security, network must not deny sending a message that he or she send.
analytics, types of network-related security (endpoint, The burden of proving the identity comes on the
web, wireless), firewalls, VPN encryption and more. receiver. For example, if a customer sends a request to
transfer the money from one account to another
Advantages of Network Security account, then the bank must have a proof that the
o Network security is essential for safeguarding customer has requested for the transaction.
client data and information, maintaining the
security of shared data, guaranteeing dependable How is Network Security Implemented?
network performance, and defending against
online attacks. 1. Secret Key Cryptography:
o An effective network security solution lowers
The sender and the receiver share one secret key. The
overhead costs and protects businesses from data is encrypted at the sender's end using this secret
significant losses brought on by a data breach or key. Data is encrypted before being transferred to the
other security event. recipient via a public network. The recipient may
readily decipher the encrypted data packets because
o Ensuring appropriate access to systems, they are both aware of and possess the Secret Key.
applications, and data facilitates company The Data Encryption Standard (DES) is an illustration
operations and customer service. of secret key encryption. It is challenging to administer
Secret Key encryption since each computer on the
Aspects of Network Security network needs a unique key.
Following are the desirable properties to achieve
secure communication:
Limitations of Firewall
When it comes to network security, firewalls are
considered the first line of defense. But the question is
whether these firewalls are strong enough to make our
devices safe from cyber-attacks. The answer may be
"no". The best practice is to use a firewall system when
using the Internet. However, it is important to use other
defense systems to help protect the network and data
A firewall system analyzes network traffic based on stored on the computer. Because cyber threats are
pre-defined rules. It then filters the traffic and prevents continually evolving, a firewall should not be the only
any such traffic coming from unreliable or suspicious consideration for protecting the home network.
Notes
Information Security
Module III
The importance of using firewalls as a security system Next-Generation Firewall
is obvious; however, firewalls have some limitations: According to Gartner, Inc.’s definition, the next-
o Firewalls cannot stop users from accessing generation firewall is a deep-packet inspection firewall
malicious websites, making it vulnerable to that adds application-level inspection, intrusion
internal threats or attacks. prevention, and information from outside the firewall to
o Firewalls cannot protect against the transfer of go beyond port/protocol inspection and blocking.
virus-infected files or software. Unified Threat Management (UTM) Firewall
o Firewalls cannot prevent misuse of passwords. A UTM device generally integrates the capabilities of a
o Firewalls cannot protect if security rules are stateful inspection firewall, intrusion prevention, and
misconfigured. antivirus in a loosely linked manner. It may include
o Firewalls cannot protect against non-technical additional services and, in many cases, cloud
security risks, such as social engineering. management. UTMs are designed to be simple and easy
o Firewalls cannot stop or prevent attackers with to use.
modems from dialing in to or out of the internal Threat-Focused NGFW
network. These firewalls provide advanced threat detection and
o Firewalls cannot secure the system which is mitigation. With network and endpoint event
already infected. correlation, they may detect evasive or suspicious
Therefore, it is recommended to keep all Internet- behavior.
enabled devices updated. This includes the latest
operating systems, web browsers, applications, and
Intruder:
other security software (such as anti-virus). Besides, the
A intruder is anyone or anything that tries to get access
security of wireless routers should be another practice.
to any part of your computer system. An intruder is
The process of protecting a router may include options
typically referred to as a hacker. Hackers are known to
such as repeatedly changing the router's name and
use automated computer programs to compromise your
password, reviewing security settings, and creating a
computer’s security system.
guest network for visitors.
The Nature of Risk: In our everyday lives, we take Arguments For and against risk analysis: Risk
risks. In crossing the road, eating oysters, or playing the analysis is a well-known planning tool, used often by
lottery, we take the chance that our actions may result in auditors, accountants, and managers. In many situations,
some negative result such as being injured, getting sick, such as obtaining approval for new drugs, new power
or losing money. Consciously or unconsciously, we plants, and new medical devices, a risk analysis is
weigh the benefits of taking the action with the possible required by law in many countries. There are many good
losses that might result. Just because there is a risk to a reasons to perform a risk analysis in preparation for
certain act we do not necessarily avoid it; we may look creating a security plan.
both ways before crossing the street, but we do cross it. • Improve awareness. Discussing issues of security
In building and using computing systems, we must take can raise the general level of interest and concern
a more organized and careful approach to assessing our among developers and users. Especially when the
risks. Many of the systems we build and use can have a user population has little expertise in computing,
dramatic impact on life and health if they fail. For this the risk analysis can educate users about the role
reason, risk analysis is an essential part of security security plays in protecting functions and data
planning. that are essential to user operations and products.
We cannot guarantee that our systems will be risk free; • Relate security mission to management
that is why our security plans must address actions objectives. Security is often perceived as a
needed should an unexpected risk become a problem. financial drain for no gain. Management does not
And some risks are simply part of doing business; for always see that security helps balance harm and
example, as we have seen, we must plan for disaster control costs.
recovery, even though we take many steps to avoid • Identify assets, vulnerabilities, and controls.
disasters in the first place. When we acknowledge that a Some organizations are unaware of their
significant problem cannot be prevented, we can use computing assets, their value to the organization,
controls to reduce the seriousness of a threat. For and the vulnerabilities associated with those
example, you can back up files on your computer as a assets. A systematic analysis produces a
defense against the possible failure of a file storage comprehensive list of assets, valuations, and
device. But as our computing systems become more risks.
complex and more distributed, complete risk analysis • Improve basis for decisions. A security manager
becomes more difficult and time consuming and more can present an argument such as "I think we need
essential. a firewall here" or "I think we should use token-
based authentication instead of passwords." Risk
Steps of a Risk Analysis: Risk analysis is performed in analysis augments the manager's judgment as a
many different contexts; for example, environmental and basis for the decision. Justify expenditures for
health risks are analyzed for activities such as building security. Some security mechanisms appear to be
dams, disposing of nuclear waste, or changing a very expensive and without obvious benefit. A
manufacturing process. Risk analysis for security is risk analysis can help identify instances where it
adapted from more general management practices, is worth the expense to implement a major
placing special emphasis on the kinds of problems likely security mechanism. Justification is often derived
to arise from security issues. By following well-defined
Notes
Information Security
Module IV
from examining the much larger risks of not describe the nature of each audience and their security
spending for security. goals. Several other sections are required, including the
purpose of the computing system, the resources needing
Organizational Security Policies: A security policy is a protection, and the nature of the protection to be
high-level management document to inform all users of supplied.
the goals of and constraints on using a system. A policy • Purpose
document is written in broad enough terms that it does • Protected resources
not change frequently. The information security policy is • Nature of protection
the foundation upon which all protection efforts are
built. It should be a visible representation of priorities of Characteristics of a Good Security Policy: If a
the entire organization, definitively stating underlying security policy is written poorly, it cannot guide the
assumptions that drive security activities. The policy developers and users in providing appropriate security
should articulate senior management's decisions mechanisms to protect important assets. Certain
regarding security as well as asserting management's characteristics make a security policy a good one.
commitment to security. To be effective, the policy must • Durability
be understood by everyone as the product of a directive • Realism
from an authoritative and influential person at the top of • Usefulness
the organization.
Purpose: Security policies are used for several Physical security: Physical security is the term used to
purposes, including the following: describe protection needed outside the computer system.
• recognizing sensitive information assets Typical physical security controls include guards, locks,
• clarifying security responsibilities and fences to deter direct attacks. In addition, there are
• promoting awareness for existing employees other kinds of protection against less direct disasters,
• guiding new employees such as floods and power outages; these, too, are part of
physical security.
Audience: A security policy addresses several different
audiences with different expectations. That is, each Natural Disasters: It is impossible to prevent natural
group users, owners, and beneficiaries uses the security disasters, but through careful planning it is possible to
policy in important but different ways. reduce the damage they inflict. Some measures can be
Users: Users legitimately expect a certain degree of taken to reduce their impact. Because many of these
confidentiality, integrity, and continuous availability in perils cannot be prevented or predicted, controls focus
the computing resources provided to them. Although the on limiting possible damage and recovering quickly
degree varies with the situation, a security policy should from a disaster. Issues to be considered include the need
reaffirm a commitment to this requirement for service. for offsite backups, the cost of replacing equipment, the
Users also need to know and appreciate what is speed with which equipment can be replaced, the need
considered acceptable use of their computers, data, and for available computing power, and the cost or difficulty
programs. For users, a security policy should define of replacing data and programs. Some of them are
acceptable use. • Flood
Owners: Each piece of computing equipment is owned • Fire
by someone, and the owner may not be a system user. • Other natural disasters
An owner provides the equipment to users for a purpose,
such as to further education, support commerce, or Power loss: Computers need their food electricity and
enhance productivity. A security policy should also they require a constant, pure supply of it. With a direct
reflect the expectations and needs of owners. power loss, all computation ceases immediately.
Beneficiaries: A business has paying customers or Because of possible damage to media by sudden loss of
clients; they are beneficiaries of the products and power, many disk drives monitor the power level and
services offered by that business. At the same time, the quickly retract the recording head if power fails. For
general public may benefit in several ways: as a source certain time-critical applications, loss of service from the
of employment or by provision of infrastructure. system is intolerable; in these cases, alternative complete
power supplies must be instantly available.
Contents: A security policy must identify its audiences:
the beneficiaries, users, and owners. The policy should
Notes
Information Security
Module IV
Human vandals: Because computers and their media they cannot be quickly substituted from another source.
are sensitive to a variety of disruptions, a vandal can Let us look what to do after a crisis occurs.
destroy hardware, software, and data. Human attackers • Back-up
may be disgruntled employees, bored operators, • Off-site backup
saboteurs, people seeking excitement, or unwitting • Network storage
bumblers. If physical access is easy to obtain, crude • Cold site
attacks using axes or bricks can be very effective. One • Hot site
man recently shot a computer that he claimed had been
in the shop for repairs many times without success. Physical security backup: We have to protect the
Physical attacks by unskilled vandals are often easy to facility against many sorts of disasters, from weather to
prevent; a guard can stop someone approaching a chemical spills and vehicle crashes to explosions. It is
computer installation with a threatening or dangerous impossible to predict what will occur or when. The
object. When physical access is difficult, more subtle physical security manager has to consider all assets and
attacks can be tried, resulting in quite serious damage. a wide range of harm. Malicious humans seeking
People with only some sophisticated knowledge of a physical access are a different category of threat agent.
system can short-circuit a computer with a car key or The primary physical controls are strength and
disable a disk drive with a paper clip. These items are duplication. Strength means overlapping controls
not likely to attract attention until the attack is implementing a defense-in-depth approach so that if one
completed. control fails, the next one will protect. People who built
• Unauthorized access and use ancient castles practiced this philosophy with moats,
• Theft walls, drawbridges, and arrow slits. Duplication means
• Preventing access eliminating single points of failure. Redundant copies of
• Preventing portability data protect against harm to one copy from any cause.
• Detecting theft Spare hardware components protect against failures.
Computer Crime: Cyber laws: also known as internet laws or digital laws,
Crimes involving computers are an area of the law that are laws that govern the use of the internet and other
is even less clear than the other areas. Computer crime digital technologies. These laws address a wide range of
consider why new laws are needed to address some of its issues, including intellectual property, privacy,
problems. Issues in computer crime are: cybercrime, and liability for online activities. Cyber laws
• Rules of property vary from country to country, but most countries have
• Rules of evidence laws that address issues such as hacking, identity theft,
• Threats to integrity and confidentiality and online fraud.
• Value of data There are several key cyber laws that govern online
• Acceptance of computer terminology activity and protect individuals and organizations from
cybercrime. Some of the most important laws include:
Why Computer crime is hard to define? The Computer Fraud and Abuse Act (CFAA): This
Some people in the legal process do not understand law criminalizes unauthorized access to computer
computers and computing, so crimes involving systems and networks, as well as unauthorized access to
computers are not always treated properly. Main reasons sensitive information stored on those systems.
are The Electronic Communications Privacy Act
• Lack of understanding (ECPA): This law regulates the interception and
• Lack of physical evidence disclosure of electronic communications, including
• Lack of recognition assets email and text messages.
• Lack of political impacts The Health Insurance Portability and Accountability
• Complexity of case Act (HIPAA): This law regulates the use and disclosure
• Juveniles of protected health information (PHI) in electronic form.
The Children’s Online Privacy Protection Act (COPPA):
Privacy: In particular, we want to investigate the This law regulates the collection of personal information
privacy of sensitive data about the user. The user should from children under the age of 13.
be protected against the system’s misuse of the private The General Data Protection Regulation (GDPR):
data and the system’s failure to protect its user’s private This EU regulation regulates the collection and
data against outside attack and disclosure. This is termed processing of the personal data of EU citizens.
as privacy in computer ethics. The Personal Data Protection Bill (PDPB): In India,
this bill regulates the collection, storage, and processing
Ethical Issues In Computer Security: of personal data of Indian citizens.
The primary purpose of this section is to explore some These are just a few examples of the many cyber laws
of ethical issues associated with computer security and that exist to protect individuals and organizations from
to show how ethics functions as a control. cybercrime. It’s important for individuals and
organizations to stay informed about these laws and to
Difference between Law and Ethics: comply with them in order to avoid legal repercussions.
Law Ethics The relationship between information security and cyber
Described by formal, written Described by unwritten laws is close, as both fields are concerned with
documents principles protecting sensitive information and preventing
Interpreted by courts Interpreted by each unauthorized access to that information. Cyber laws help
individual to define what constitutes a security breach and the
Established by legislature Presented by philosophers, penalties for committing such a breach, while
representing all people religions, professional groups information security practices help to prevent breaches
Notes
Information Security
Module IV
from occurring in the first place. Cyber laws also help to
ensure that organizations are accountable for protecting
sensitive information and that individuals are able to
take legal action if their personal information is
mishandled.