Unit - III Class Notes Cyber Security
Unit - III Class Notes Cyber Security
RUC-201
[Unit – III]
Syllabus:
Developing Secure Information Systems, Application Development Security, Information Security, Governance & Risk Management, Security
Architecture & Design, Security Issues in Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets, Access Control,
CCTV and intrusion Detection Systems, Backup Security Measures.
Information system Development
• An information system goes through a series
of phases from conception to implementation.
– This process is called the Software-Development
Life-Cycle.
• Software-development life-cycle is used to
facilitate the development of a large software
product in a systematic, well-defined, and
cost-effective way.
Secure information system development
• Secure information system are developed by
integrating risk analysis and management
activities at the start of the system development
(SDLC) and continuing throughout.
• Security can be integrated into any (and ideally
all) of these phases.
• In most organizations that use a variant of the
waterfall model,
• security is included with the toll gate style
mentioned previously, often at the end of each
phase before moving to the next one.
Secure information system
development
• Integrating security at the initial phase
• Integrity security at the Development Phase
• Integrity security at the Implementation Phase
• Integrity security at the Maintenance Phase
• Integrity security at the Disposal Phase
Secure SDLC
Integrating Security at Initial Phase
• Initial phase is where the decision is taken to develop a system.
• In this phase security consideration primarily involves business risk related to
confidentiality, integrity and availability.
• security is looked at more in terms of business risks with input from the
information security office.
• This phase include initiating project security planning, processes,
assessing the business impact of an activity
• Framing: Framing the risk means to sense the threat and inform all the
related activities that execute in a sequential manner to be ready to control
and avert a possible damage.
• In this activity we analyze the possible risk associated with the security of
information system and organization, and then try to define certain action
for individual case.
• Monitoring: It involves continuously checking the information system and
keeping an eye on other threat and vulnerability that maybe encountered by
the organization.
• It also helps in analyzing whether the system is continuously secure or not.
• Responding: Responding to risk means to take preventive or corrective
measures so that system can kept protected from any kind of threats, whether
internal or external.
Differences between Risk Management, Risk
Assessment, and Risk Analysis
Risk Management
Risk management is the continuing process to identify, analyze,
evaluate, and treat loss exposures and monitor risk control and
financial resources to mitigate the adverse effects of loss.
Risk Assessment
Risk assessment includes processes and technologies that identify,
evaluate, and report on risk-related concerns. the risk assessment
process is a “key component” of the risk management process. it is
primarily concerned with the Identification and Analysis phases.
Risk Analysis
Risk analysis can be considered the evaluation component of the
broader risk assessment process, which determines the significance of
the identified risk concerns.
Security architecture and Design
• Security Architecture and Design of a system means a
bundle of following components:-hardware, software
and operating system and how to use those
component to design, architect, and evaluate secure
computer systems
– Layering
– Abstraction
– Security domains
– The ring model
– Open-closed systems
• Layering
• Layering separates hardware and software functionality into
modular tiers.
• A generic list of security architecture layers is as follows :
Risk Analysis
Risk analysis can be considered the evaluation component of the
broader risk assessment process, which determines the significance of
the identified risk concerns.
Types of Malwares
• Adware:. The least dangerous and most lucrative Malware. Adware
displays ads on your computer.
• Spyware:. Spyware is software that spies on you, tracking your internet
activities in order to send advertising (Adware) back to your system.
• Virus: A virus is a contagious program or code that attaches itself to
another piece of software, and then reproduces itself when that software
is run. Most often this is spread by sharing software or files between
computers.
• Worm: A program that replicates itself and destroys data and files on the
computer. Worms work to “eat” the system operating files and data files
until the drive is empty.
• Trojan: The most dangerous Malware. Trojans are written with the
purpose of discovering your financial information, taking over your
computer’s system resources, and in larger systems creating a “denial-of-
service attack ” Denial-of-service attack: an attempt to make a machine or
network resource unavailable to those attempting to reach it. Example:
AOL, Yahoo or your business network becoming unavailable.
• Rootkit: It is the hardest of all Malware to detect and therefore to remove; many
experts recommend completely wiping your hard drive and reinstalling everything from
scratch. It is designed to permit the other information gathering Malware in to get the
identity information from your computer without you realizing anything
• Back doors: Back doors are much the same as Trojans or worms, except that they
open a “backdoor” onto a computer, providing a network connection for hackers or other
Malware to enter or for viruses or SPAM to be sent.
• Key loggers: Records everything you type on your PC in order to glean your log-in
names, passwords, and other sensitive information, and send it on to the source of the
key logging program. Many times key loggers are used by corporations and parents to
acquire computer usage information.
• Ransom ware: If you see this screen that warns you that you have been locked
out of your computer until you pay for your cyber crimes. Your system is severely
infected with a form of Malware called Ransom ware
• Browser Hijacker: This dangerous Malware will redirect your normal search
activity and give you the results the developers want you to see. Its intention is to make
money off your web surfing.
Access Control
• Access Control is the process or mechanism
for giving the authority to access the specific
resources, applications and system.
• Access control defines a set of conditions or
criteria to access the system and its resources.
• There are three main accesses Control model
first is Mandatory access control model,
second is Discretionary access control model
and third is Role based access control models.
Types of Access control
• Mandatory access control (MAC) :
• in this security policy users do not have the
authority to override the policies and it totally
controlled centrally by the security policy
administrator.
• The security policy administrator defines the
usage of resources and their access policy, which
cannot be overridden by the end users, and the
policy, will decide who has authority to access the
particular programs and files.
• MAC is mostly used in a system where priority is
based on confidentiality.
Types of Access control
• Discretionary access control (DAC) :
• This policy Contrast with Mandatory Access
Control (MAC) which is determined by the
system administrator while DAC policies are
determined by the end user with permission.
• In DAC, user has the complete authority over
the all resources it owns.
• and also determines the permissions for other
users who have those resources and
programs.
Types of Access control
• Role-based access control (RBAC) :
• This policy is very simple to use.
• In RBAC roles are assigned by the system administrator
statically. In which access is controlled depending on
the roles that the users have in a system.
• (RBAC) is mostly used to control the access to
computer or network resources depending on the roles
of individual users within an organization.
• Due to the static role assignment it does not have
complexity. Therefore it needs the low attention for
maintenance .
Advantages of CCTV
• • CCTV surveillance cameras provide enhanced security with utmost
clarity and with ease of access.
• • You can keep a track of production processes and other processes in
industries and other production units.
• • They are a must for every retail stores, boutique, super markets and
other shopping areas.
• • The CCTV surveillance systems are not easily damaged by dust, and
severe climatic conditions.
• • During holidays they can be installed at your property thus they
ensure the security of a home without making you worry anymore about
your property when you are away.
• • For people who employ a babysitter at home, this CCTV system
gives you utmost satisfaction about your concerns about your younger
one at home while looked after by a baby sitter.
• • You can connect the CCTV surveillance system to your mobile
phone and can easily access the live streaming of the recordings.