Ism Notes Information System Management
Ism Notes Information System Management
2 MARKS
1. What is information security?
Information security in today’s enterprise is a “well-informed sense of assurance that the
information risks and controls are in balance.”
The protection of information and its critical elements, including the systems and
hardware that use, store, and transmit that information
Tools, such as policy, awareness, training, education, and technology are necessary
The C.I.A. triangle was the standard based on confidentiality, integrity, and availability
The C.I.A. triangle has expanded into a list of critical characteristics of information
4. What is Security? What are the security layers ,a successful organization should
have?ions security
“The quality or state of being secure--to be free from danger” .To be protected from
adversaries
Physical Security
Personal Security
Operations security
Communications security
Network security
Information security
30.What is SDLC?
The Systems Development Life Cycle
Information security must be managed in a manner similar to any other major system
implemented in the organization
Using a methodology
– ensures a rigorous process
– avoids missing steps
The goal is creating a comprehensive security posture/program
42.Write short notes on Logical & Physical Design phases of Security SDLC
Creates blueprints for security
Critical planning and feasibility analyses to determine whether or not the project should
continue
In physical design, security technology is evaluated, alternatives generated, and final
design selected
At end of phase, feasibility study determines readiness so all parties involved have a
chance to approve the project
49.Describe the information security roles to be played by Security Project Team in a typical
organization?
A number of individuals who are experienced in one or multiple requirements of both the
technical and non-technical areas:
– The champion
– The team leader
– Security policy developers
– Risk assessment specialists
– Security professionals
– Systems administrators
– End users
50.what are the three types of data ownership and their responsibilities?
Data Owner
Data Custodian
Data Users
62.What is ARPANET?
Department of Defense in US,started a research program on feasibility of a
redundant,networked communication system to support the military’s exchange of
information.Larry Robers,known as the founder if internet ,developed the project from its
inception.
ARPANET protocols (the rules of syntax that enable computers to communicate on a
network) were originally designed for openness and flexibility, not for security.
11 Marks
1. What is Security? What are the security layers ,a successful organization should
have?ions security (5 Marks)
“The quality or state of being secure--to be free from danger”
To be protected from adversaries
Physical Security – to protect physical items,objects or areas of organization from
unauthorized access and misuse
Personal Security – involves protection of individuals or group of individuals who are
authorized to access the organization and its operations
Operations security – focuses on the protection of the details of particular operations
or series of activities.
Communications security – encompasses the protection of organization’s
communicatons media ,technology and content
Network security – is the protection of networking components,connections,and
contents
Information security – is the protection of information and its critical
elements,including the systems and hardware that use ,store,and transmit the
information
Where it has been used?
Accuracy Information has accuracy when it is free from mistakes or errors and it has the value
that the end user expects. If information has been intentionally or unintentionally modified, it is
no longer accurate. Consider, for example, a checking account. You assume that the information
contained in your checking account is an accurate representation of your finances. Incorrect
information in your checking account can result from external or internal errors. If a bank teller,
for instance, mistakenly adds or subtracts too much from your account, the value of the
information is changed. Or, you may accidentally enter an incorrect amount into your account
register. Either way, an inaccurate bank balance could cause you to make mistakes, such as
bouncing a check.
Integrity Information has integrity when it is whole, complete, and uncorrupted. The integrity
of information is threatened when the information is exposed to corruption, damage, destruction,
or other disruption of its authentic state. Corruption can occur while information is being stored
or transmitted. Many computer viruses and worms are designed with the explicit purpose of
corrupting data. For this reason, a key method for detecting a virus or worm is to look for
changes in file integrity as shown by the size of the file. Another key method of assuring
information integrity is file hashing, in which a file is read by a special algorithm that uses the
value of the bits in the file to compute a single large number called a hash value. The hash value
for any combination of bits is unique. If a computer system performs the same hashing algorithm
on a file and obtains a different number than the recorded hash value for that file, the file has
been compromised and the integrity of the information is lost. Information integrity is the
cornerstone of information systems, because information is of no value or use if users cannot
verify its integrity. File corruption is not necessarily the result of external forces, such as hackers.
Noise in the transmission media, for instance, can also cause data to lose its integrity.
Transmitting data on a circuit with a low voltage level can alter and corrupt the data.
Redundancy bits and check bits can compensate for internal and external threats to the integrity
of information. During each transmission, algorithms, hash values, and the error-correcting codes
ensure the integrity of the information. Data whose integrity has been compromised is
retransmitted.
Utility The utility of information is the quality or state of having value for some purpose or end.
Information has value when it can serve a purpose. If information is available, but is not in a
format meaningful to the end user, it is not useful. For example, to a private citizen U.S. Census
data can quickly become overwhelming and difficult to interpret; however, for a politician, U.S.
Census data reveals information about the residents in a district, such as their race, gender, and
age. This information can help form a politician’s next campaign strategy.
It is now called the National Training Standard for Information security professionals.
While the NSTISSC model covers the three dimensions of information security, it omits discussion
of detailed guidelines and policies that direct the implementation of controls.
Another weakness of using this model with too limited an approach is to view it from a single
perspective.
The 3 dimensions of each axis become a 3x3x3 cube with 27 cells representing areas
that must be addressed to secure today’s Information systems.
To ensure system security, each of the 27 cells must be properly addressed during the
security process.
For example, the intersection between technology, Integrity & storage areas requires a
control or safeguard that addresses the need to use technology to protect the Integrity of
information while in storage.
4. What are the components of an information system? (6 Marks)
An information system (IS) is much more than computer hardware is the entire set of
software, hardware, data, people, procedures, and networks that make possible the use of
information resources in the organization. These six critical components enable information to be
input, processed, output, and stored. Each of these IS components has its own strengths and
weaknesses, as well as its own characteristics and uses. Each component of the information
system also has its own security requirements.
Software
The software component of the IS comprises applications, operating systems, and
assorted command utilities. Software is perhaps the most difficult IS component to secure. The
exploitation of errors in software programming accounts for a substantial portion of the attacks
on information. The information technology industry is rife with reports warning of holes, bugs,
weaknesses, or other fundamental problems in software. In fact, many facets of daily life are
affected by buggy software, from smart phones that crash to flawed automotive control
computers that lead to recalls.
Software carries the lifeblood of information through an organization. Unfortunately,
software programs are often created under the constraints of project management, which limit
time, cost, and manpower. Information security is all too often implemented as an afterthought,
rather than developed as an integral component from the beginning. In this way, software
programs become an easy target of accidental or intentional attacks.
Hardware
Hardware is the physical technology that houses and executes the software, stores and
transports the data, and provides interfaces for the entry and removal of information from the
system. Physical security policies deal with hardware as a physical asset and with the protection
of physical assets from harm or theft. Applying the traditional tools of physical security, such as
locks and keys, restricts access to and interaction with the hardware components of an
information system. Securing the physical location of computers and the computers themselves
is important because a breach of physical security can result in a loss of information.
Unfortunately, most information systems are built on hardware platforms that cannot guarantee
any level of
information security if unrestricted access to the hardware is possible. Before September 11,
2001, laptop thefts in airports were common. A two-person team worked to steal a computer as
its owner passed it through the conveyor scanning devices.
The first perpetrator entered the security area ahead of an unsuspecting target and quickly
went through. Then, the second perpetrator waited behind the target until the target placed
his/her computer on the baggage scanner. As the computer was whisked through, the second
agent slipped ahead of the victim and entered the metal detector with a substantial collection of
keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator
to grab the computer and disappear in a crowded walkway.While the security response to
September 11, 2001 did tighten the security process at airports,hardware can still be stolen in
airports and other public places. Although laptops and notebook computers are worth a few
thousand dollars, the information contained in them can be worth a great deal more to
organizations and individuals.
Data
Data stored, processed, and transmitted by a computer system must be protected. Data is
often the most valuable asset possessed by an organization and it is the main target of intentional
attacks. Systems developed in recent years are likely to make use of database management
systems. When done properly, this should improve the security of the data and the application.
Unfortunately, many system development projects do not make full use of the database
management system’s security capabilities, and in some cases the database is implemented in
ways that are less secure than traditional file systems.
People
Though often overlooked in computer security considerations, people have always been a
threat to information security. Legend has it that around 200 B.C. a great army threatened the
security and stability of the Chinese empire. So ferocious were the invaders that the Chinese
emperor commanded the construction of a great wall that would defend against the Hun invaders.
Around 1275 A.D., Kublai Khan finally achieved what the Huns had been trying for thousands
of years. Initially, the Khan’s army tried to climb over, dig under, and break through the wall. In
the end, the Khan simply bribed the gatekeeper—and the rest is history. Whether this event
actually occurred or not, the moral of the story is that people can be the weakest link in an
organization’s information security program. And unless policy, education and training,
awareness, and technology are properly employed to prevent people from accidentally or
intentionally damaging or losing information, they will remain the weakest link. Social
engineering can prey on the tendency to cut corners and the commonplace nature of human error.
It can be used to manipulate the actions of people to obtain access information about a system.
Procedures
Another frequently overlooked component of an IS is procedures. Procedures are written
instructions for accomplishing a specific task. When an unauthorized user obtains an
organization’s procedures, this poses a threat to the integrity of the information. For example, a
consultant to a bank learned how to wire funds by using the computer center’s procedures, which
were readily available. By taking advantage of a security weakness (lack of authentication), this
bank consultant ordered millions of dollars to be transferred by wire to his own account.
Lax security procedures caused the loss of over ten million dollars before the situation
was corrected. Most organizations distribute procedures to their legitimate employees so they
can access the information system, but many of these companies often fail to provide proper
education on the protection of the procedures. Educating employees about safeguarding
procedures is as important as physically securing the information system. After all, procedures
are information in their own right. Therefore, knowledge of procedures, as with all critical
information, should be disseminated among members of the organization only on a need-to-
know basis.
Networks
The IS component that created much of the need for increased computer and information
security is networking. When information systems are connected to each other to form local area
networks (LANs), and these LANs are connected to other networks such as the Internet,new
security challenges rapidly emerge. The physical technology that enables network functions is
becoming more and more accessible to organizations of every size. Applying the traditional tools
of physical security, such as locks and keys, to restrict access to and interaction with the
hardware components of an information system are still important; but when computer systems
are networked, this approach is no longer enough. Steps to provide network security are essential,
as is the implementation of alarm and intrusion systems to make system owners aware of
ongoing compromises.
SECURING COMPONENTS
Protecting the components from potential misuse and abuse by unauthorized users.
Subject of an attack
Computer is used as an active tool to conduct the attack.
Object of an attack
Computer itself is the entity being attacked
1. Direct attack
2. Indirect attack
Internet
Stolen Information
REMOTE
SYSTEM
Hacker request
SYSTEM
1. Direct attack
When a Hacker uses his personal computer to break into a system.[Originate from
the threat itself]
2. Indirect attack
A computer can, therefore, be both the subject and object of an attack when ,for
example, it is first the object of an attack and then compromised and used to attack other
systems, at which point it becomes the subject of an attack.
The figure shows some of the competing voices that must be considered when balancing
information security and access. Because of today’s security concerns and issues, an information
system or data-processing department can get too entrenched in the management and protection
of systems. An imbalance can occur when the needs of the end user are undermined by too heavy
a focus on protecting and administering the information systems. Both information security
technologists and end users must recognize that both groups share the same overall goals of the
organization to ensure the data is available when, where, and how it is needed, with minimal
delays or obstacles. In an ideal world, this level of availability can be met even after concerns
about loss, damage, interception, or destruction have been addressed.
7.What is SDLC? Explain different phases of SDLC
The Systems Development Life Cycle
Information security must be managed in a manner similar to any other major system
implemented in the organization
Using a methodology
– ensures a rigorous process
– avoids missing steps
The goal is creating a comprehensive security posture/program
Investigation
The first phase, investigation, is the most important. What problem is the system being
developed to solve? The investigation phase begins with an examination of the event or plan that
initiates the process. During the investigation phase, the objectives, constraints, and scope of the
project are specified. A preliminary cost-benefit analysis evaluates the perceived benefits and the
appropriate levels of cost for those benefits. At the conclusion of this phase, and at every phase
following, a feasibility analysis assesses the economic, technical, and behavioural feasibilities of
the process and ensures that implementation is worth the organization’s time and effort. In
summary,
What is the problem the system is being developed to solve?
– The objectives, constraints, and scope of the project are specified
– A preliminary cost/benefit analysis is developed
– A feasibility analysis is performed to assesses the economic, technical, and
behavioral feasibilities of the process
Analysis
The analysis phase begins with the information gained during the investigation phase.
This phase consists primarily of assessments of the organization, its current systems, and its
capability to support the proposed systems. Analysts begin by determining what the new system
is expected to do and how it will interact with existing systems. This phase ends with the
documentation of the findings and an update of the feasibility analysis. In summary,
Consists primarily of
– assessments of the organization
– the status of current systems
– capability to support the proposed systems
Analysts begin to determine
– what the new system is expected to do
– how the new system will interact with existing systems
Ends with the documentation of the findings and a feasibility analysis update
Logical Design
In the logical design phase, the information gained from the analysis phase is used to
begin creating a systems solution for a business problem. In any systems solution, it is
imperative that the first and driving factor is the business need. Based on the business need,
applications are selected to provide needed services, and then data support and structures capable
of providing the needed inputs are chosen. Finally, based on all of the above, specific
technologies to implement the physical solution are delineated. The logical design is, therefore,
the blueprint for the desired solution. The logical design is implementation independent, meaning
that it contains no reference to specific technologies, vendors, or products. It addresses, instead,
how the proposed system will solve the problem at hand. In this stage, analysts generate a
number of alternative solutions, each with corresponding strengths and weaknesses, and costs
and benefits, allowing for a general comparison of available options. At the end of this phase,
another feasibility analysis is performed. In summary,
Based on business need, applications are selected capable of providing needed services
Based on applications needed, data support and structures capable of providing the
needed inputs are identified
Finally, based on all of the above, select specific ways to implement the physical solution
are chosen
At the end, another feasibility analysis is performed
Physical Design
During the physical design phase, specific technologies are selected to support the
alternatives identified and evaluated in the logical design. The selected components are evaluated
based on a make-or-buy decision (develop the components in-house or purchase them from a
vendor). Final designs integrate various components and technologies. After yet another
feasibility analysis, the entire solution is presented to the organizational management for
approval. In summary,
Specific technologies are selected to support the alternatives identified and evaluated in
the logical design
Selected components are evaluated based on a make-or-buy decision
Entire solution is presented to the end-user representatives for approval
Implementation
In the implementation phase, any needed software is created. Components are ordered,
received, and tested. Afterward, users are trained and supporting documentation created. Once all
components are tested individually, they are installed and tested as a system. Again a feasibility
analysis is prepared, and the sponsors are then presented with the system for a performance
review and acceptance test. In summary,
Components are ordered, received, assembled, and tested
Users are trained and documentation created
Users are then presented with the system for a performance review and acceptance test
Analysis
In the analysis phase, the documents from the investigation phase are studied. The
development team conducts a preliminary analysis of existing security policies or programs,
along with that of documented current threats and associated controls. This phase also includes
an analysis of relevant legal issues that could affect the design of the security solution.
Increasingly, privacy laws have become a major consideration when making decisions about
information systems that manage personal information. Recently, many states have implemented
legislation making certain computer-related activities illegal. A detailed understanding of these
issues is vital. Risk management also begins in this stage. Risk management is the process of
identifying, assessing, and evaluating the levels of risk facing the organization, specifically the
threats to the organization’s security and to the information stored and processed by the
organization. In summary,
Analysis of existing security policies or programs, along with documented current threats
and associated controls
Includes an analysis of relevant legal issues that could impact the design of the security
solution
The risk management task (identifying, assessing, and evaluating the levels of risk) also
begins
Implementation
The implementation phase in of SecSDLC is also similar to that of the traditional SDLC.
The security solutions are acquired (made or bought), tested, implemented, and tested again.
Personnel issues are evaluated, and specific training and education programs conducted. Finally,
the entire tested package is presented to upper management for final approval. In summary,
The security solutions are acquired (made or bought), tested, and implemented, and tested
again
Personnel issues are evaluated and specific training and education programs conducted
Finally, the entire tested package is presented to upper management for final approval
9. List the steps that are common between SDLC and Security SDLC and also write the
unique steps of Security SDLC
S.No Phases Steps common to both the Life cycle Steps unique to the
systems security systems development
development life cycle and the life cycle
security systems development life
cycle
1 Phase 1: Outline project scope and Management defines
Investigation goals project processes and
Estimate costs goals and documents
Evaluate existing resources these in the program
Analyze feasibility security policy
2 Phase 2: Assess current system Analyze existing
Analysis against plan developed in security policies and
Phase 1 programs
Develop preliminary system Analyze current threats
requirements and controls
Study integration of new Examine legal issues
system with existing system Perform risk analysis
Document findings and
update feasibility analysis
3 Phase 3: Logical Assess current business Develop security
Design needs against plan blueprint
developed in Phase 2 Plan incident response
Select applications, data actions
support, and structures Plan business response
Generate multiple solutions to disaster
for consideration Determine feasibility of
Document findings and continuing and/or
update feasibility analysis outsourcing the project
4 Phase 4: Select technologies to Select technologies
Physical Design support solutions developed needed to support
in Phase 3 security blueprint
Select the best solution Develop definition of
Decide to make or buy successful solution
components Design physical
Document findings and security measures to
update feasibility analysis support techno logical
solutions
Review and approve
project
5 Phase 5: Develop or buy software Buy or develop security
Implementation Order components solutions
Document the system At end of phase, present
Train users tested package to
Update feasibility analysis management for
Present system to users approval
Test system and review
performance
6 Phase 6: Support and modify system Constantly monitor,
Maintenance and during its useful life test, modify, update,
Change Test periodically for and repair to meet
compliance with business changing threats
needs
Upgrade and patch as
necessary
10. Write about Communities of Interest (6 Marks)
Each organization develops and maintains its own unique culture and values. Within each
organizational culture, there are communities of interest that develop and evolve. As defined
here, a community of interest is a group of individuals who are united by similar interests or
values within an organization and who share a common goal of helping the organization to meet
its objectives. While there can be many different communities of interest in an organization .
Information Security Management and Professionals
The roles of information security professionals are aligned with the goals and mission of
the information security community of interest. These job functions and organizational roles
focus on protecting the organization’s information systems and stored information from attacks.
Security as Science
Technology developed by computer scientists and engineers—which is designed for rigorous
performance levels—makes information security a science as well as an art. Most scientists agree
that specific conditions cause virtually all actions in computer systems. Almost every fault,
security hole, and systems malfunction is a result of the interaction of specific hardware and
software. If the developers had sufficient time, they could resolve and eliminate these faults. The
faults that remain are usually the result of technology malfunctioning for any one of a thousand
possible reasons. There are many sources of recognized and approved security methods and
techniques that provide sound technical security advice. Best practices, standards of due care,
and other tried-and-true methods can minimize the level of guesswork necessary to secure an
organization’s information and systems.
Dealing with technology designed to perform at high levels of performance
Specific conditions cause virtually all actions that occur in computer systems
Almost every fault, security hole, and systems malfunction is a result of the interaction of
specific hardware and software
If the developers had sufficient time, they could resolve and eliminate these faults
The chief information security officer (CISO) has primary responsibility for the
assessment, management, and implementation of information security in the organization. The
CISO may also be referred to as the manager for IT security, the security administrator, or a
similar title.The CISO usually reports directly to the CIO, although in larger organizations it is
not uncommon for one or more layers of management to exist between the two. However, the
recommendations of the CISO to the CIO must be given equal, if not greater, priority than other
technology and information-related proposals. The placement of the CISO and supporting
security staff in organizational hierarchies is the subject of current debate across the industry.
Chief Information Officer
– the senior technology officer
– primarily responsible for advising the senior executive(s) for strategic planning
Chief Information Security Officer
– responsible for the assessment, management, and implementation of securing the
information in the organization
– may also be referred to as the Manager for Security, the Security Administrator,
or a similar title
Data Responsibilities
The three types of data ownership and their respective responsibilities are outlined below:
Data owners: Those responsible for the security and use of a particular set of information.They
are usually members of senior management and could be CIOs. The data owners usually
determine the level of data classification (discussed later), as well as the changes to that
classification required by organizational change. The data owners work with subordinate
managers to oversee the day-to-day administration of the data.
Data custodians: Working directly with data owners, data custodians are responsible for the
storage, maintenance, and protection of the information. Depending on the size of the
organization, this may be a dedicated position, such as the CISO, or it may be an additional
responsibility of a systems administrator or other technology manager. The duties of a data
custodian often include overseeing data storage and backups, implementing the specific
procedures and policies laid out in the security policies and plans, and reporting to the data
owner.
Data users: End users who work with the information to perform their assigned roles supporting
the mission of the organization. Everyone in the organization is responsible for the security of
data, so data users are included here as individuals with an information security role.
13.What are the approaches used for implementing information security?(6 Marks)
Bottom Up Approach
Security from a grass-roots effort - systems administrators attempt to improve the
security of their systems
Key advantage - technical expertise of the individual administrators
Seldom works, as it lacks a number of critical features:
– participant support
– organizational staying power
Top-down Approach
Initiated by upper management:
– issue policy, procedures, and processes
– dictate the goals and expected outcomes of the project
– determine who is accountable for each of the required actions
This approach has strong upper management support, a dedicated champion, dedicated
funding, clear planning, and the chance to influence organizational culture
May also involve a formal development strategy referred to as a systems development
life cycle
– Most successful top-down approach
14. Key Terms in Information Security Terminology
Asset
-An asset is the organizational resource that is being protected. -An Asset can be
logical ,such asWebsite, information or data . Asset can be physical, such asperson ,
computer system
Attack
- An attack is an intentional or unintentional attempt to cause damage to or otherwise
compromise the information and /or the systems that support it. If someone casually reads
sensitive information not intended for his use, this is considered a passive attack. If a
hacker attempts to break into an information system, the attack is considered active.
Risk
- Risk is the probability that something can happen. In information security, it could be the
probability of a threat to a system.
Security Blueprint
- It is the plan for the implementation of new security measures in the organization.
Sometimes called a frame work, the blueprint presents an organized approach to the
security planning process.
Security Model
- A security model is a collection of specific security rules that represents the implementation
of a security policy.
Threats
- A threat is a category of objects, persons, or other entities that pose a potential danger to
an asset. Threats are always present. Some threats manifest themselves in accidental
occurrences, while others are purposeful. For example, all hackers represent potential
danger or threat to an unprotected information system. Severe storms are also a threat to
buildings and their contents.
Threat agent
- A threat agent is the specific instance or component of a threat. For example, you can
think of all hackers in the world as a collective threat, and Kevin Mitnick, who was
convicted for hacking into phone systems, as a specific threat agent. Likewise, a specific
lightning strike, hailstorm, or tornado is a threat agent that is part of the threat of severe
storms.
Vulnerability
- Weaknesses or faults in a system or protection mechanism that expose information to
attack or damage are known as vulnerabilities. Vulnerabilities that have been examined,
documented, and published are referred to as well-known vulnerabilities.
Exposure
- The exposure of an information system is a single instance when the system is open to
damage. Vulnerabilities can cause an exposure to potential damage or attack from a threat.
Total exposure is the degree to which an organization’s assets are at risk ofattack from a
threat.
UNIT – II
SECURITY INVESTIGATION: Need for Security - Business Needs - Threats - Attacks - Legal,
Ethical and Professional Issues.
2 Marks
1.List the four important functions ,the information security performs in an organization?
Business Needs First, Technology Needs Last
Information security performs four important functions for an organization:
o Protects the organization’s ability to function
o Enables the safe operation of applications implemented on the organization’s IT systems
o Protects the data the organization collects and uses
o Safeguards the technology assets in use at the organization
27.What is an attack?
An attack is the deliberate act that exploits vulnerability
It is accomplished by a threat-agent to damage or steal an organization’s information or physical
asset
o An exploit is a technique to compromise a system
o A vulnerability is an identified weakness of a controlled system whose controls are not
present or are no longer effective
o An attack is then the use of an exploit to achieve the compromise of a controlled system
28. What is a malicious code?
This kind of attack includes the execution of viruses, worms, Trojan horses, and active web
scripts with the intent to destroy or steal information
The state of the art in attacking systems in 2002 is the multi-vector worm using up to six attack
vectors to exploit a variety of vulnerabilities in commonly found information system devices
33.What is Virus
Each infected machine infects certain common executable or script files on all computers to which it can
write with virus code that can cause infection
35.What is Hoaxes
A more devious approach to attacking computer systems is the transmission of a virus hoax, with a
real virus attached
The purpose of information security management is to ensure business continuity and reduce
business damage by preventing and minimizing the impact of security incidents. The Audit Commission
Update report (1998) shows that fraud or cases of IT abuse often occur due to the absence of basic
controls, with one half of all detected frauds found by accident. An Information Security Management
System (ISMS) enables information to be shared, whilst ensuring the protection of information and
computing assets.
At the most practical level, securing the information on your computer means:
Ensuring that your information remains confidential and only those who should access that
information, can.
Knowing that no one has been able to change your information, so you can depend on its
accuracy (information integrity).
Making sure that your information is available when you need it (by making back-up copies and,
if appropriate, storing the back-up copies off-site).
2.What are the four important functions ,the information security performs in an organization?
(BUSINESS NEEDS FIRST)
Business Needs First, Technology Needs Last
Information security performs four important functions for an organization:
o Protects the organization’s ability to function
o Enables the safe operation of applications implemented on the organization’s IT systems
o Protects the data the organization collects and uses
o Safeguards the technology assets in use at the organization
Protecting Data
Without data, an organization loses its record of transactions and/or its ability to deliver value to
its customers. Any business, educational institution, or government agency operating within the modern
context of connected and responsive services relies on information systems. Even when transactions are
not online, information systems and the data they process enable the creation and movement of goods and
services. Therefore, protecting data in motion and data at rest are both critical aspects of information
security. The value of data motivates attackers to steal, sabotage, or corrupt it. An effective information
security program implemented by management protects the integrity and value of the organization’s data.
In summary
One of the most valuable assets is data
Without data, an organization loses its record of transactions and/or its ability to deliver value to
its customers
An effective information security program is essential to the protection of the integrity and value
of the organization’s data
To protect the organization’s information, one should be familiar with the information to
be protected, and the systems that store,transport,and process it; and the threats to be identified.
Threats
A threat is an object, person, or other entity that represents a constant danger to an asset
Management must be informed of the various kinds of threats facing the organization
By examining each threat category in turn, management effectively protects its information
through policy, education and training, and technology controls
Categories of threat:
One of the greatest threats to an organization’s information security is the organization’s own employees.
Entry of erroneous data
Accidental deletion or modification of data
Storage of data in unprotected areas.
Failure to protect information can be prevented with
- Training
- Ongoing awareness activities
-Verification by a second party
- Many military applications have robust, dual- approval controls built in .
Intellectual Property is defined as the ownership of ideas and control over the tangible or virtual
representation of those ideas.
Intellectual property includes trade secrets, copyrights, trademarks, and patents.
Once intellectual property has been defined and properly identified, breaches to IP constitute a
threat to the security of this information.
Organization purchases or leases the IP of other organizations.
Most Common IP breach is the unlawful use or duplication of software based intellectual property
more commonly known as software Piracy.
Software Piracy affects the world economy.
U.S provides approximately 80% of world’s software.
In addition to the laws surrounding software piracy, two watch dog organizations investigate
allegations of software abuse.
Electronic and human activities that can breach the confidentiality of information.
When an unauthorized individual’s gain access to the information an organization is trying to
protect is categorized as act of espionage or trespass.
Attackers can use many different methods to access the information stored in an information
system.
1. Competitive Intelligence[use web browser to get information from market research]
2. Industrial espionage(spying)
3. Shoulder Surfing(ATM)
Trespass
Can lead to unauthorized real or virtual actions that enable information gatherers to enter
premises or systems they have not been authorized to enter.
Sound principles of authentication & authorization can help organizations protect valuable
information and systems.
Hackers-> “People who use and create computer software to gain access to information illegally”
There are generally two skill levels among hackers.
Expert Hackers-> Masters of several programming languages, networking protocols, and
operating systems .
Unskilled Hackers
4. Deliberate Acts of information Extortion (obtain by force or threat)
Possibility of an attacker or trusted insider stealing information from a computer system and
demanding compensation for its return or for an agreement not to disclose the information.
5. Deliberate Acts of sabotage or Vandalism
Destroy an asset or
Damage the image of organization
Cyber terrorism-Cyber terrorists hack systems to conduct terrorist activities through network or
internet pathways.
6. Deliberate Acts of Theft
Illegal taking of another’s property-- is a constant problem.
Within an organization, property can be physical, electronic, or intellectual.
Physical theft can be controlled by installation of alarm systems.
Trained security professionals.
Electronic theft control is under research.
7. Deliberate Software Attacks
Because of malicious code or malicious software or sometimes malware.
These software components are designed to damage, destroy or deny service to the target system.
More common instances are
Virus, Worms, Trojan horses, Logic bombs, Backdoors.
“The British Internet Service Provider Cloudnine” be the first business “hacked out of existence”
7.1 Virus
Segments of code that performs malicious actions.
Virus transmission is at the opening of Email attachment files.
Macro virus-> Embedded in automatically executing macrocode common in word processors,
spreadsheets and database applications.
Boot Virus-> infects the key operating files located in the computer’s boot sector.
7.2 Worms
A worm is a malicious program that replicates itself constantly, without requiring another
program to provide a safe environment for replication.
Worms can continue replicating themselves until they completely fill available resources, such as
memory, hard drive space, and network bandwidth.
Eg: MS-Blaster, MyDoom, Netsky, are multifaceted attack worms.
Once the worm has infected a computer , it can redistribute itself to all e-mail addresses found on
the infected system.
Furthermore, a worm can deposit copies of itself onto all Web servers that the infected systems
can reach, so that users who subsequently visit those sites become infected.
7.3 Trojan Horses
Are software programs that hide their true nature and reveal their designed behavior only when
activated.
Polymorphism
A Polymorphic threat is one that changes its apparent shape over time, making it undetectable
by techniques that look for preconfigured signatures.
These viruses and Worms actually evolve, changing their size, and appearance to elude
detection by antivirus software programs.
7.5 Virus & Worm Hoaxes
Types of Trojans
Data Sending Trojans
Proxy Trojans
FTP Trojans
Security software disabler Trojans
Denial of service attack Trojans(DOS)
Virus
A program or piece of code that be loaded on to your computer, without your
knowledge and run against your wishes.
Worm
A program or algorithm that replicates itself over a computer network and usually
performs malicious actions.
Trojan Horse
A destructive program that masquerade on beginning application, unlike viruses, Trojan
horse do not replicate themselves.
Blended threat
Blended threats combine the characteristics of virus, worm, Trojan horses & malicious
code with server and Internet Vulnerabilities.
Antivirus Program
A Utility that searches a hard disk for viruses and removes any that found.
7.8 Forces of Nature
Fire: Structural fire that damages the building. Also encompasses smoke damage from a
fire or water damage from sprinkles systems.
Flood: Can sometimes be mitigated with flood insurance and/or business interruption
Insurance.
Earthquake: Can sometimes be mitigated with specific causality insurance and/or
business interruption insurance, but is usually a separate policy.
Lightning: An Abrupt, discontinuous natural electric discharge in the atmosphere.
Landslide/Mudslide: The downward sliding of a mass of earth & rocks directly damaging
all parts of the information systems.
Tornado/Severe Windstorm
Huricane/typhoon
Tsunami
Electrostatic Discharge (ESD)
Dust Contamination
Since it is not possible to avoid force of nature threats, organizations must implement controls to limit
damage.
They must also prepare contingency plans for continued operations, such as disaster recovery
plans, business continuity plans, and incident response plans, to limit losses in the face of these
threats.
7.9 Deviations in Quality of Service
A product or service is not delivered to the organization as expected.
The Organization’s information system depends on the successful operation of many
interdependent support systems.
It includes power grids, telecom networks, parts suppliers, service vendors, and even the janitorial
staff & garbage haulers.
This degradation of service is a form of availability disruption.
Internet Service Issues
Internet service Provider(ISP) failures can considerably undermine the availability of information.
The web hosting services are usually arranged with an agreement providing minimum service
levels known as a Service level Agreement (SLA).
When a Service Provider fails to meet SLA, the provider may accrue fines to cover losses
incurred by the client, but these payments seldom cover the losses generated by the outage.
Communications & Other Service Provider Issues
Other utility services can affect the organizations are telephone, water, waste water, trash pickup,
cable television, natural or propane gas, and custodial services.
The loss of these services can impair the ability of an organization to function.
For an example, if the waste water system fails, an organization might be prevented from
allowing employees into the building.
This would stop normal business operations.
Power Irregularities
Virus A computer virus consists of segments of code that perform malicious actions. This code behaves
very much like a virus pathogen that attacks animals and plants, using the cell’s own replication
machinery to propagate the attack beyond the initial target. The code attaches itself to an existing
program and takes control of that program’s access to the targeted computer. The virus-controlled target
program then carries out the virus’s plan by replicating itself into additional targeted systems.
computer viruses are passed from machine to machine via physical media, e-mail, or other forms
of computer data transmission. When these viruses infect a machine, they may immediately scan the local
machine for e-mail applications, or even send themselves to every user in the e-mail address book.
One of the most common methods of virus transmission is via e-mail attachment files. Most
organizations block e-mail attachments of certain types and also filter all e-mail for known viruses
The current software marketplace has several established vendors, such as Symantec Norton Anti-
Virus and McAfee VirusScan, that provide applications to assist in the control of computer viruses.
Among the most common types of information system viruses are the macro virus, which is
embedded in automatically executing macro code used by word processors, spread sheets, and database
applications, and the boot virus, which infects the key operating system files located in a computer’s
boot sector.
Worms a worm is a malicious program that replicates itself constantly, without requiring another
program environment. Worms can continue replicating themselves until they completely fill available
resources, such as memory, hard drive space, and network bandwidth. Code Red, Sircam, Nimda
(“admin” spelled backwards), and Klez are examples of a class of worms that combines multiple modes
of attack into a single package.
Trojan Horses Trojan horses are software programs that hide their true nature and reveal their designed
behavior only when activated. Trojan horses are frequently disguised as helpful, interesting, or necessary
pieces of software, such as readme.exe files often included with shareware or freeware packages.
Unfortunately, like their namesake in Greek legend, once Trojan horses are brought into a system, they
become activated and can wreak havoc on the unsuspecting user.
Back Door or Trap Door A virus or worm can have a payload that installs a back door or trap door
component in a system, which allows the attacker to access the system at will with special privileges.
Examples of these kinds of payloads include Subseven and Back Orifice.
Polymorphic Threats - A polymorphic threat is one that over time changes the way it appears to
antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
These viruses and worms actually evolve, changing their size and other external file characteristics to
elude detection by antivirus software programs.
Virus and Worm Hoaxes As frustrating as viruses and worms are, perhaps more time and money is
spent on resolving virus hoaxes. Well-meaning people can disrupt the harmony and flow of an
organization when they send group e-mails warning of supposedly dangerous viruses that don’t exist.
When people fail to follow virus-reporting procedures, the network becomes overloaded, and much time
and energy is wasted as users forward the warning message to everyone they know, post the message on
bulletin boards, and try to update their antivirus protection software. A number of Internet resources
enable individuals to research viruses to determine if they are fact or fiction.
Acts of trespass can lead to unauthorized real or virtual actions that enable information gatherers
to enter premises or systems they have not been authorized to enter.
The classic perpetrator of espionage or trespass is the hacker. Hackers are “people who use and
create computer software [to] gain access to information illegally .
A hacker frequently spends long hours examining the types and structures of the targeted systems
and uses skill, guile, or fraud to attempt to bypass the controls placed around information that is the
property of someone else.
There are generally two skill levels among hackers. The first is the expert hacker, or elite hacker,
who develops software scripts and program exploits used by those in the second category, the novice or
unskilled hacker.
The expert hacker is usually a master of several programming languages, networking protocols,
and operating systems and also exhibits a mastery of the technical environment of the chosen targeted
system. These programs are automated exploits that allow novice hackers to act as script kiddies—
hackers of limited skill who use expertly written software to attack a system—or packet monkeys—
script kiddies who use automated exploits to engage in distributed denial-of-service attacks .A
phreaker hacks the public telephone network to make free calls or disrupt services.
Fire: In this context, usually a structural fire that damages a building housing computing equipment that
comprises all or part of an information system, as well as smoke damage and/or water damage from
sprinkler systems or firefighters. This threat can usually be mitigated with fire casualty insurance and/or
business interruption insurance.
Flood: An overflowing of water onto an area that is normally dry, causing direct damage to all or part of
the information system or to the building that houses all or part of the information system. A flood might
also disrupt operations through interruptions in access to the buildings that house all or part of the
information system. This threat can sometimes be mitigated with flood insurance and/or business
interruption insurance.
Earthquake: A sudden movement of the earth’s crust caused by the release of stress accumulated along
geologic faults or by volcanic activity. Earthquakes can cause direct damage to all or part of the
information system or, more often, to the building that houses it, and can also disrupt operations through
interruptions in access to the buildings that house all or part of the information system. This threat can
sometimes be mitigated with specific casualty insurance and/or business interruption insurance, but is
usually a separate policy.
Lightning: An abrupt, discontinuous natural electric discharge in the atmosphere. Lightning usually
directly damages all or part of the information system an/or its power distribution components. It can also
cause fires or other damage to the building that houses all or part of the information system, and disrupt
operations by interfering with access to the buildings that house all or part of the information system.
This threat can usually be mitigated with multipurpose casualty insurance and/or business interruption
insurance.
Landslide or mudslide: The downward sliding of a mass of earth and rock directly damaging all or part
of the information system or, more likely, the building that houses it. Land- or mudslides also disrupt
operations by interfering with access to the buildings that house all or part of the information system.
This threat can sometimes be mitigated with casualty insurance and/or business interruption insurance.
Tornado or severe windstorm: A rotating column of air ranging in width from a few yards to more than
a mile and whirling at destructively high speeds, usually accompanied by a funnel-shaped downward
extension of a cumulonimbus cloud. Storms can directly damage all or part of the information system or,
more likely, the building that houses it, and can also interrupt access to the buildings that house all or part
of the information system. This threat can sometimes be mitigated with casualty insurance and/or
business interruption insurance.
Hurricane or typhoon: A severe tropical cyclone originating in the equatorial regions of the Atlantic
Ocean or Caribbean Sea or eastern regions of the Pacific Ocean (typhoon), traveling north, northwest, or
northeast from its point of origin, and usually involving heavy rains. These storms can directly damage
all or part of the information system or, more likely, the building that houses it. Organizations located in
coastal or low-lying areas may experience flooding (see above). These storms may also disrupt
operations by interrupting access to the buildings that house all or part of the information system. This
threat can sometimes be mitigated with casualty insurance and/or business interruption insurance.
Tsunami: A very large ocean wave caused by an underwater earthquake or volcanic eruption. These
events can directly damage all or part of the information system or, more likely, the building that houses
it. Organizations located in coastal areas may experience tsunamis. Tsunamis may also cause disruption
to operations through interruptions in access or electrical power to the buildings that house all or part of
the information system. This threat can sometimes be mitigated with casualty insurance and/or business
interruption insurance.
Electrostatic discharge (ESD): Usually, static electricity and ESD are little more than a nuisance.
Unfortunately, however, the mild static shock we receive when walking across a carpet can be costly or
dangerous when it ignites flammable mixtures and damages costly electronic components. Static
electricity can draw dust into clean-room environments or cause products to stick together. The cost of
ESD-damaged electronic devices and interruptions to service can range from only a few cents to several
millions of dollars for critical systems. Loss of production time in information processing due to ESD
impact is significant. While not usually viewed as a threat, ESD can disrupt information systems, but it is
not usually an insurable loss unless covered by business interruption insurance.
Dust contamination: Some environments are not friendly to the hardware components of information
systems. Because dust contamination can shorten the life of information systems or cause unplanned
downtime, this threat can disrupt normal operations.
Leaving classified information in unprotected areas, such as on a desktop, on a Web site, or even
in the trash can, is as much a threat to the protection of the information as is the individual who seeks to
exploit the information, because one person’s carelessness can create a vulnerability and thus an
opportunity for an attacker. However, if someone damages or destroys data on purpose, the act belongs to
a different threat category.
Much human error or failure can be prevented with training and ongoing awareness activities, but
also with controls, ranging from simple procedures, such as requiring the user to type a critical command
twice, to more complex procedures, such as the verification of commands by a second party. An example
of the latter is the performance of key recovery actions in PKI systems. Many military applications have
robust, dual-approval controls built in.
Some systems that have a high potential for data loss or system outages use expert systems to
monitor human actions and request confirmation of critical inputs.
9.Explain Attacks.
ATTACKS
An attack is an act of or action that takes advantage of a vulnerability to compromise a controlled
system.
It is accomplished by a threat agent that damages or steals an organization’s information or
physical asset.
Vulnerability is an identified weakness in a controlled system, where controls are not present or
are no longer effective.
Attacks exist when a specific act or action comes into play and may cause a potential loss.
i. Malicious code
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active
Web scripts with the intent to destroy or steal information.
The state –of-the-art malicious code attack is the polymorphic or multivector, worm.
These attack programs use up to six known attack vectors to exploit a variety of vulnerabilities in
commonly found information system devices.
ii. Attack Replication Vectors
1. IP scan & attack
2. Web browsing
3. Virus
4. Unprotected shares
5. Mass mail
6. Simple Network Management Protocol(SNMP)
1. IP scan & attack
The infected system scans a random or local range of IP addresses and targets any of several
vulnerabilities known to hackers.
2. Web browsing
If the infected system has write access to any Web pages, it makes all Web content files
(.html,.asp,.cgi & others) infectious, so that users who browse to those pages become infected.
3. Virus
Each infected machine infects certain common executable or script files on all computers to
which it can write with virus code that can cause infection.
4. Unprotected shares
Using vulnerabilities in file systems and the way many organizations configure them, the infected
machine copies the viral component to all locations it can reach.
5. Mass Mail
By sending E-mail infections to addresses found in the address book, the infected machine infects
many users, whose mail -reading programs also automatically run the program & infect other
systems.
6. Simple Network Management Protocol (SNMP)
By using the widely known and common passwords that were employed in early versions of this
protocol, the attacking program can gain control of the device. Most vendors have closed these
vulnerabilities with software upgrades.
iii. Examples
Hoaxes
A more devious approach to attacking the computer systems is the transmission of a virus hoax
with a real virus attached.
Even though these users are trying to avoid infection, they end up sending the attack on to their
co-workers.
Backdoors
Using a known or previously unknown and newly discovered access mechanism, an attacker can
gain access to a system or network resource through a back door.
Sometimes these entries are left behind by system designers or maintenance staff, and thus
referred to as trap doors.
A trap door is hard to detect, because very often the programmer who puts it in place also makes
the access exempt from the usual audit logging features of the system.
Password Crack
Attempting to reverse calculate a password is often called cracking.
A password can be hashed using the same algorithm and compared to the hashed results, If they
are same, the password has been cracked.
The (SAM) Security Account Manager file contains the hashed representation of the user’s
password.
Brute Force
The application of computing & network resources to try every possible combination of options
of a password is called a Brute force attack.
This is often an attempt to repeatedly guess passwords to commonly used accounts, it is
sometimes called a password attack.
Spoofing
It is a technique used to gain unauthorized access to computers, where in the intruder sends
messages to a computer that has an IP address that indicates that the messages are coming from a
trusted host.
192.168.0.25 100.0.0.75
Original IP packet
100.0.0.80 100.0.0.75
Spoofed (modified)
IP packet
Dictionary
This is another form of the brute force attack noted above for guessing passwords.
The dictionary attack narrows the field by selecting specific accounts to attack and uses a list of
commonly used passwords instead of random combinations.
Mail Bombing
Another form of E-mail attack that is also a DOS called a mail bomb.
Attacker routes large quantities of e-mail to the target.
The target of the attack receives unmanageably large volumes of unsolicited e-mail.
By sending large e-mails, attackers can take advantage of poorly configured e-mail systems on the
Internet and trick them into sending many e-mails to an address chosen by the attacker.
The target e-mail address is buried under thousands or even millions of unwanted e-mails.
Sniffers
A sniffer is a program or device that can monitor data traveling over a network.
Unauthorized sniffers can be extremely dangerous to a network’s security, because they are
virtually impossible to detect and can be inserted almost anywhere.
Sniffer often works on TCP/IP networks, where they are sometimes called “packet
Sniffers”.
Social Engineering
It is the process of using social skills to convince people to reveal access credentials or other
valuable information to the attacker.
An attacker gets more information by calling others in the company and asserting his/her
authority by mentioning chief’s name.
Buffer Overflow
A buffer overflow is an application error that occurs when more data is sent to a buffer than it can
handle.
Attacker can make the target system execute instructions.
Timing Attack
Types of Law
Civil law
Criminal law
Tort law
Private law
Public law
Privacy
The issue of privacy has become one of the hottest topics in information
The ability to collect information on an individual, combine facts from separate sources, and
merge it with other information has resulted in databases of information that were previously
impossible to set up
The aggregation of data from multiple sources permits unethical organizations to build databases
of facts with frightening capabilities
US Copyright Law
- the use to support news reporting, teaching, scholarship, and a number of other related
permissions
- the purpose of the use has to be for educational or library purposes, not for profit, and
should not be excessive
The Freedom of Information Act provides any person with the right to request access to federal
agency records or information, not determined to be of national security
There are exceptions for information that is protected from disclosure, and the Act does not apply
to state or local government agencies or to private businesses or individuals, although many states
have their own version of the FOIA
In addition to the national and international restrictions placed on an organization in the use of
computer technology, each state or locality may have a number of laws and regulations that
impact operations
It is the responsibility of the information security professional to understand state laws and regulations
and insure the organization’s security policies and procedures comply with those
laws and regulations
Recently the Council of Europe drafted the European Council Cyber-Crime Convention,
designed
- to create an international task force to oversee a range of security functions associated
with Internet activities,
- to standardize technology laws across international borders
It also attempts to improve the effectiveness of international investigations into breaches of
technology law
This convention is well received by advocates of intellectual property rights with its emphasis on
copyright infringement prosecution
Digital Millennium Copyright Act (DMCA) Digital Millennium Copyright Act (DMCA)
The Digital Millennium Copyright Act (DMCA) is the US version of an international effort to
reduce the impact of copyright, trademark, and privacy infringement
The European Union Directive 95/46/EC increases protection of individuals with regard to the
processing of personal data and limits the free movement of such data
The United Kingdom has already implemented a version of this directive called the Database
Right
Information Warfare (IW) involves the use of information technology to conduct offensive
operations as part of an organized and lawful military operation by a sovereign state
IW is a relatively new application of warfare, although the military has been conducting
electronic warfare and counter-warfare operations for decades, jamming, intercepting, and
spoofing enemy communications
Only when all conditions are met, does the organization have a reasonable expectation of
effective policy
Software License Infringement The topic of software license infringement, or piracy, is routinely
covered by the popular press. Among study participants, attitudes toward piracy were generally similar;
however, participants from the United States and the Netherlands showed statistically significant
differences in attitudes from the overall group. Participants from the United States were significantly less
tolerant of piracy, while those from the Netherlands were significantly more permissive.
This could mean that the individuals surveyed understood what software license infringement
was, but felt either that their use was not piracy, or that their society permitted this piracy in some way.
Peer pressure, the lack of legal disincentives, the lack of punitive measures, and number of other reasons
could a explain why users in these alleged piracy centers disregarded intellectual property laws despite
their professed attitudes toward them.
Illicit Use The study respondents unilaterally condemned viruses, hacking, and other forms of system
abuse. There were, however, different degrees of tolerance for such activities among the groups. The
low overall degree of tolerance for illicit system use may be a function of the easy correspondence
between the common crimes of breaking and entering, trespassing, theft, and destruction of property and
their computer-related counterparts.
Misuse of Corporate Resources The scenarios used to examine the levels of tolerancefor misuse of
corporate resources each presented a different degree of noncompany use of corporate assets without
specifying the company’s policy on personal use of company resources. In general, individuals displayed
a rather lenient view of personal use of company equipment.
Many people, regardless of cultural background, believe that unless an organization explicitly
forbids personal use of its computing resources, such use is acceptable.
3
Ethics and Education
Attitudes toward the ethics of computer use are affected by many factors other than nationality.
Differences are found among individuals within the same country, within the same social class, and
within the same company. Key studies reveal that the overriding factor in levelling the ethical perceptions
within a small population is education.
Employees must be trained and kept aware of a number of topics related to information security,
not the least of which are the expected behaviors of an ethical employee. This is especially important in
information security, as many employees may not have the formal technical training to understand that
their behavior is unethical or even illegal. Proper ethical and legal training is vital to creating an informed,
well prepared, and low-risk system user.
Whatever the cause of illegal, immoral, or unethical behavior, one thing is certain: it is the
responsibility of information security personnel to do everything in their power to deter these acts and to
use policy, education and training, and technology to protect information and systems. However, laws
and policies and their associated penalties only deter if three conditions are present:
Fear of penalty—Potential offenders must fear the penalty. Threats of informal reprimand or
verbal warnings may not have the same impact as the threat of imprisonment or forfeiture of pay.
Probability of being caught—Potential offenders must believe there is a strong possibility of
being caught. Penalties will not deter illegal or unethical behavior unless there is reasonable fear
of being caught.
Probability of penalty being administered—Potential offenders must believe that the penalty will
in fact be administered.
Deterrence to Unethical and Illegal Behavior
Information Extortion
Information extortion occurs when an attacker or trusted insider steals information from a
computer system and demands compensation for its return or for an agreement not to disclose it.
Extortion is common in credit card number theft.
For example, Web-based retailer CD Universe was the victim of a theft of data files containing
customer credit card information.
The culprit was a Russian hacker named Maxus, who hacked the online vendor and stole several
hundred thousand credit card numbers. When the company refused to pay the $100,000 blackmail, he
posted the card numbers to a Web site, offering them to the criminal community. His Web site became so
popular he had to restrict access.
Sabotage or Vandalism
This category of threat involves the deliberate sabotage of a computer system or business, or acts
of vandalism to either destroy an asset or damage the image of an organization. These acts can range
from petty vandalism by employees to organized sabotage against an organization. Although not
necessarily financially devastating, attacks on the image of an organization are serious. Vandalism to a
Web site can erode consumer confidence, thus diminishing an organization’s sales and net worth, as well
as its reputation.
Today, security experts are noticing a rise in another form of online vandalism, hacktivist or
cyberactivist operations, which interfere with or disrupt systems to protest the operations, policies, or
actions of an organization or government agency.
Theft
The threat of theft—the illegal taking of another’s property, which can be physical, electronic, or
intellectual—is a constant. The value of information is diminished when it is copied without the owner’s
knowledge.
Physical theft can be controlled quite easily by means of a wide variety of measures, from locked
doors to trained security personnel and the installation of alarm systems. Electronic theft, however, is a
more complex problem to manage and control. When someone steals a physical object, the loss is easily
detected; if it has any importance at all, its absence is noted. When electronic information is stolen, the
crime is not always readily apparent. If thieves are clever and cover their tracks carefully, no one may
ever know of the crime until it is far too late.
Technological Obsolescence
Antiquated or outdated infrastructure can lead to unreliable and untrustworthy systems.
Management must recognize that when technology becomes outdated, there is a risk of loss of data
integrity from attacks. Management’s strategic planning should always include an analysis of the
technology currently in use. Ideally, proper planning by management should prevent technology from
becoming obsolete, but when obsolescence is manifest, management must take immediate action. IT
professionals play a large role in the identification of probable obsolescence.
Recently, the software vendor Symantec retired support for a legacy version of its popular
antivirus software, and organizations interested in continued product support were obliged to upgrade
immediately to a different antivirus control software. In organizations where IT personnel had kept
management informed of the coming retirement, these replacements were made more promptly and at
lower cost than at organizations where the software was allowed to become obsolete.
11.What are different acts of Human error or failure and how it can be prevented?(5 Marks)
Acts of Human Error or Failure
Includes acts done without malicious intent
Caused by:
o Inexperience
o Improper training
o Incorrect assumptions
o Other circumstances
Employee mistakes can easily lead to the following:
o revelation of classified data
o entry of erroneous data
o accidental deletion or modification of data
o storage of data in unprotected areas
o failure to protect information
Much human error or failure can be prevented with training and ongoing awareness activities,but
also with controls,ranging from simple procedures like asking users to type a critical command twice,to
more complex procedures ,such as the verification of the commands by a second party(Eg key recovery
actions in PKI systems)
2 MARKS
1. What is Risk Management?
Risk management is the process of identifying vulnerabilities in an organization’s information systems and
taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of all the
components in the organization’s information system.
2. Describe Accountability for Risk Management?
It is the responsibility of each community of interest to manage risks; each community has a role to
play:
a. Information Security - best understands the threats and attacks that introduce risk into the
organization
b. Management and Users – play a part in the early detection and response process - they also
insure sufficient resources are allocated
c. Information Technology – must assist in building secure systems and operating them safely
3. Draw components of risk identification?
11 MARKS
1. Explain Risk identification?
A risk management strategy calls on us to “know ourselves” by identifying, classifying, and
prioritizing the organization’s information assets
These assets are the targets of various threats and threat agents and our goal is to protect them from
these threats
Next comes threat identification:
– Assess the circumstances and setting of each information asset
– Identify the vulnerabilities and begin exploring the controls that might be used to manage
the risks
a)Asset Identification and Valuation
This iterative process begins with the identification of assets, including all of the elements of an
organization’s system: people, procedures, data and information, software, hardware, and
networking elements
Then, we classify and categorize the assets adding details as we dig deeper into the analysis
Acceptance
Acceptance of risk is doing nothing to close a vulnerability and to accept the outcome of its
exploitation
Acceptance is valid only when:
– Determined the level of risk
– Assessed the probability of attack
– Estimated the potential damage
–Performed a thorough cost benefit analysis
–Evaluated controls using each appropriate feasibility
–Decided that the particular function, service, information, or asset did not justify the cost of
protection
Risk appetite describes the degree to which an organization is willing to accept risk as a trade-off to
the expense of applying controls
By preparing for the unknown, organizations will have the flexibility to withstand unexpected, high
impact security events."
2. Big data will lead to big problems
Organizations are increasingly embedding big data in their operations and decision-making process.
But it's essential to recognize that there is a human element to data analytics. Organizations that fail
to respect that human element will put themselves at risk by overvaluing big data output, noting
that poor integrity of the information sets could result in analyses that lead to poor business
decisions, missed opportunities, brand damage and lost profits
3. Mobile applications and the IoT
Smartphones and other mobile devices are creating a prime target for malicious actors in the
Internet of Things (IoT).
The rapid uptake of bring-your-own-device (BYOD), and the introduction of wearable
technologies to the workplace, will increase an already high demand for mobile apps for work and
home in the coming year. To meet this increased demand, developers working under intense
pressure and on razor-thin profit margins will sacrifice security and thorough testing in favor of
speed of delivery and low cost, resulting in poor quality products more easily hijacked by criminals
or hacktivists.
4. Cybercrime causes the perfect threat storm
Cybercrime topped the list of threats in 2015, and it's not going away in 2016. Cybercrime, along
with an increase in hacktivism, the surge in cost of compliance to deal with the uptick in regulatory
requirements and the relentless advances in technology against a backdrop of under investment in
security departments, can all combine to cause the perfect threat storm. Organizations that adopt a
risk management approach to identify what the business relies on most will be well placed to
quantify the business case to invest in resilience.
Cyberspace is an increasingly attractive hunting ground for criminals, activists and terrorists
motivated to make money, cause disruption or even bring down corporations and governments
through online attacks. Organizations must be prepared for the unpredictable so they have the
resilience to withstand unforeseen, high impact events.
5. Skills gap becomes an abyss for information security
The information security professionals are maturing just as the increasing sophistication of cyber-
attack capabilities demand more increasingly scarce information security professionals. While
cybercriminals and hacktivists are increasing in numbers and deepening their skillsets, the "good
guys" are struggling to keep pace. CISOs need to build sustainable recruiting practices and develop
and retain existing talent to improve their organization's cyber resilience.
The problem is going to grow worse in future as hyper connectivity increases. CISOs will have to
become more aggressive about getting the skill sets the organization needs.
Sphere of Protection
The sphere of protection illustrates that between each layer of the sphere of use there must exist
a layer of protection to prevent access to the inner layer from the outer layer.
People in the organization must become a layer of security, a human firewall that protects the
information from unauthorized access and use.
Information security is, therefore, designed and implemented in three layers: policies, people
(education, training, and awareness programs), and technology.
Controls
Management controls cover security processes that are designed by strategic planners and
performed by the security administration of the organization.
Management controls address the design and implementation of the security planning process
and security program management.
Operational controls deal with the operational functionality of security in the organization.
They include management functions and lower-level planning, such as disaster recovery and
incident response planning.
Operational controls also address personnel security, physical security, and the protection of
production inputs and outputs.
Technical controls address those tactical and technical issues related to designing and
implementing security in the organization.
Technical controls include logical access controls, such as identification, authentication,
authorization, and accountability.
3. Write about Security Architecture Design?
Security Architecture Components
Defenses in Depth,
• Implementation of security in layers, policy, training, technology.
• Requires that organization establish sufficient security controls and safeguards
so that an intruder faces multiple layers of controls
Security Perimeter
• Point at which an organization’s security protection ends and outside world
begins
• Does not apply to internal attacks from employee threats or on-site physical
threats
Security Architecture Components
First level of security – protects all internal systems from outside threats
Multiple technologies segregate the protected information
Security domains or areas of trust
Key Technology Components
Firewall
Device that selectively discriminates against information flowing in and out
Specially configured computer
Usually on parameter part of or just behind gateway router
DMZ
Buffer against outside attacks
No mans land between computer and world
Web servers often go here
Proxy Server
Performs actions of behalf of another system
Configured to look like a web server
Assigned the domain name
Retrieves and transmits data
Cache server
IDS
Intrusion Detection System
Host based
Installed on machines they protect
Monitor host machines
Network based
Look at patterns of network traffic
Attempt to detect unusual activity
Requires database of previous activity
Uses “machine learning” techniques
Can use information form similar networks
SETA
Security education, training and awareness
Employee errors among top threats
Purpose
• Improve awareness of need to protect
• Develop skills and knowledge
• Build in-depth knowledge to design, implement, or operate security programs
4. Explain VISA International security model?
Visa International promotes strong security measures in its business associates and has
established guidelines for the security of its information systems.
Visa has developed two important documents that improve and regulate its information
systems: Security Assessment Process and Agreed Upon Procedures
Using the two documents, a security team can develop a sound strategy for the design of good
security architecture.
The only downside to this approach is the specific focus on systems that can or do integrate
with Visa systems with the explicit purpose of carrying the aforementioned cardholder
information.
It promotes strong security measures in its business associates and has established guidelines for the
security of its information systems.
It has developed two important documents
1. Security Assessment Process
2. Agreed Upon Procedures.
Both documents provide specific instructions on the use of the VISA Cardholder Information
Security Program.
The Security Assessment Process document is a series of recommendations for the detailed
examination of an organization’s systems with the eventual goal of integration into the VISA
systems.
The Agreed upon Procedures document outlines the policies and technologies required for security
systems that carry the sensitive card holder information to and from VISA systems.
Using the two documents, a security team can develop a sound strategy for the design of good
security architecture.
The only downside to this approach is the specific focus on systems that can or do integrate with
VISA’s systems with the explicit purpose of carrying the aforementioned cardholder information.
Baselining and best practices are solid methods for collecting security practices, but provide less
detail than a complete methodology
Possible to gain information by baselining and using best practices and thus work backwards to an
effective design
The Federal Agency Security Practices (FASP) site (fasp.nist.gov) designed to provide best
practices for public agencies and adapted easily to private institutions.
The documents found in this site include specific examples of key policies and planning documents,
implementation strategies for key technologies, and position descriptions for key security personnel.
Of particular value is the section on program management, which includes the following:
- A summary guide: public law, executive orders, and policy documents
- Position description for computer system security officer.
- Position description for information security officer
- Position description for computer specialist.
- Sample of an information technology(IT) security staffing plan for a large service
application(LSA)
- Sample of an information technology(IT) security program policy
- Security handbook and standard operating procedures.
- Telecommuting and mobile computer security policy.
ISO/IEC 17799
Purpose – “give recommendations for information security management for use by
those who are responsible for initiating, implementing, or maintaining security in their
organization.
Provides a common basis
Must pay for these
Several countries have not adopted 17799 claiming there are fundamental problems:
– The global information security community has not defined any justification for a code of
practice as identified in the ISO/IEC 17799
– There is no reason to believe that 17799 is more useful than any other approach currently
available
– 17799 is perceived to have been hurriedly prepared given the tremendous impact its
adoption could have on industry information security controls
iii. Objectives of ISO 17799
2 MARKS
1. What is IDS?
An intrusion detection system (IDS) is a type of security software designed to automatically
alert administrators when someone or something is trying to compromise information
system through malicious activities or through security policy violations.
2. Why use an IDS?
To prevent problem behaviors by increasing the perceived risk of discovery and
punishment
To detect attacks and other security violations not prevented by other security
measures
To detect and deal with the preambles to attacks
To document existing threat to an organization
To act as quality control for security design and administration
To provide useful information about intrusions that do take place
3. Give classification of IDS
All IDSs use one of two detection methods:
o Signature-based
o Statistical anomaly-based
IDSs operate as:
o network-based
o host-based
o application-based systems
11 MARKS
1. Explain Intrusion Detection and Prevention Systems(IDS)?
•The term intrusion detection/prevention system (IDPS) can be used to describe current
anti-intrusion technologies
• Can detect an intrusion
• Can also prevent that intrusion from successfully attacking the organization by means of
an active response
• IDPSs work like burglar alarms
• Administrators can choose the alarm level
• Can be configured to notify administrators via e-mail and numerical or text
paging
• Like firewall systems, IDPSs require complex configurations to provide the level of
detection and response desired
• The newer IDPS technologies
• Different from older IDS technologies
• IDPS technologies can respond to a detected threat by attempting to
prevent it from succeeding
• Types of response techniques:
• The IDPS stops the attack itself
• The IDPS changes the security environment
• The IDPS changes the attack’s content
IDPSs are either
• host based to protect server or host information assets
• network based to protect network information assets, or
IDPS detection methods
• Signature based
• Statistical anomaly based
Host-based IDPS
• Resides on a particular computer or server and monitors activity only on that system
• Benchmark and monitor the status of key system files and detect when intruder creates,
modifies, or deletes files
• Most HIDPSs work on the principle of configuration or change management
• Advantage over NIDPS: can usually be installed so that it can access information
encrypted when traveling over network
• Configures and classifies various categories of systems and data files
• HIDPSs provide only a few general levels of alert notification
• Unless the HIDPS is very precisely configured, benign actions can generate a large
volume of false alarms
• HIDPSs can monitor multiple computers simultaneously
Advantages of HIDPSs
• Can detect local events on host systems and detect attacks that may elude a network-
based IDPS
• Functions on host system, where encrypted traffic will have been decrypted and is
available for processing
• Not affected by use of switched network protocols
• Can detect inconsistencies in how applications and systems programs were used by
examining records stored in audit logs
Disadvantages of HIDPSs
• Pose more management issues
• Vulnerable both to direct attacks and attacks against host operating system
• Does not detect multi-host scanning, nor scanning of non-host network devices
• Susceptible to some denial-of-service attacks
• Can use large amounts of disk space
• Can inflict a performance overhead on its host systems
Network-Based IDPS
• Resides on computer or appliance connected to segment of an organization’s network;
looks for signs of attacks
• Installed at specific place in the network where it can watch traffic going into and out of
particular network segment
• Monitor network traffic
– When a predefined condition occurs, notifies the appropriate administrator
• Looks for patterns of network traffic
• Match known and unknown attack strategies against their knowledge base to determine
whether an attack has occurred
• Yield many more false-positive readings than host-based IDPSs
Advantages of NIDPSs
• Good network design and placement of NIDPS can enable organization to use a few
devices to monitor large network
• NIDPSs are usually passive and can be deployed into existing networks with little
disruption to normal network operations
• NIDPSs not usually susceptible to direct attack and may not be detectable by attackers
Disadvantages of NIDPSs
• Can become overwhelmed by network volume and fail to recognize attacks
• Require access to all traffic to be monitored
• Cannot analyze encrypted packets
• Cannot reliably ascertain if attack was successful or not
• Some forms of attack are not easily discerned by NIDPSs, specifically those involving
fragmented packets
Signature-Based IDPS
• Examines data traffic for something that matches the preconfigured, predetermined attack
pattern signatures
– Also called knowledge-based IDPS
– The signatures must be continually updated as new attack strategies emerge
– A weakness of this method:
• If attacks are slow and methodical, they may slip undetected through the
IDPS, as their actions may not match a signature that includes factors
based on duration of the events
Statistical Anomaly-Based IDPS
• Also called behavior-based IDPS
• First collects data from normal traffic and establishes a baseline
– Then periodically samples network activity, based on statistical methods, and
compares the samples to the baseline
– When activity falls outside the baseline parameters (clipping level), The IDPS
notifies the administrator
Advantages:
• Able to detect new types of attacks, because it looks for abnormal activity of any type
• IDPS can detect new types of attacks
Disadvantages
• Requires much more overhead and processing capacity than signature-based
• May generate many false positives
2. Write about Scanning and Analysis Tools
Used to find vulnerabilities in systems, holes in security components, and other
unsecured
aspects of the network
• Port mappers
• Network mappers
• Firewall analysis
• OS detection tools
• Vulnerability scanners
• Packet sniffers
• Wireless sniffers
• Password crackers
Port Scanners
• A port is a network channel or connection point in a data communications system
• Port scanning utilities (port scanners)
– Identify computers that are active on a network, as well as their active ports and
services, the functions and roles fulfilled by the machines, and other useful
information
• Well-known ports
– Those from 0 through 1023
– Registered ports are those from 1024 through 49151
– Dynamic and private ports are those from 49152 through 65535
• Open ports must be secured
– Can be used to send commands to a computer, gain access to a server, and exert
control over a networking device
Network mappers
• Mostly use ICMP ping
• Most port scanners can be used as network mappers, e.g. Nmap, LanState
Firewall Analysis
• Several tools automate remote discovery of firewall rules and assist the administrator in
analyzing them
• Administrators who feel wary of using the same tools that attackers use should remember:
– It is intent of user that will dictate how information gathered will be used
– In order to defend a computer or network well, it is necessary to understand ways
it can be attacked
• A tool that can help close up an open or poorly configured firewall will help network
defender minimize risk from attack
``Firewalking’’ steps
• Network discovery – apply traceroute to a host inside network (finds TTL count to
firewall)
• Scanning – TCP/UDP packets with TTL of 1-hop past firewall sent; if the firewall allows
packets in, ICMP TTL Expired message will be sent by binding host
• E.g. Firewalk
OS Detection Tools
• Detecting a target computer’s operating system (OS) is very valuable to an attacker
• There are many tools that use networking protocols to determine a remote computer’s OS,
e.g. Nmap, Xprobe
• Strategies: passive fingerprinting, active fingerprinting
Active fingerprinting
• Find out more about host from TCP/IP characteristics
• TCP FIN probing: TCP RFC specifies that a FIN packet to an open port should be
ignored. MS Windows responds with a RST packet
• TCP Initial Sequence Number: Some OS choose random values. Windows generates it
from the system clock
• TCP Initial window size: Linux 2.4 5840 bytes, 2.2 32120 bytes
• IP ID sampling: MSWin uses a predictable sequence, Linux chooses random numbers.
• ICMP Error message quoting: Linux quotes more than required
Passive fingerprinting
Information gathered through sniffing
• TTL in IP packets: normally Linux TTL= 64, MS Windows TTL = 128
• Don’t fragment bit in IP header: most OS 1, OpenBSD 0
• Type of service field in IP header: normally 0, some OS non-zero
Generally less useful. Dependent on traffic pattern
OS detection countermeasures
• Modify responses to various network events/packets
• Morph, IP Scrubber: “scrubs” clean any outgoing packets of OS relates information
• IP personality (http://ippersonality.sourceforge.net)
(patch for Linux kernel)
Vulnerability Scanners
• Capable of scanning networks for very detailed information
• Variants of port scanners
• Identify exposed user names and groups, show open network shares, and expose
configuration problems and other server vulnerabilities
• Nessus – freeware
• Used by over 75000 companies
• Different versions for Unix, Mac, Windows
• Detects open ports, mis-configurations (e.g. missing patches), default passwords,
presence of viruses, back-door programs
Packet Sniffers
• A network tool that collects and analyzes packets on a network
– It can be used to eavesdrop on network traffic
• Connects directly to a local network from an internal location
• To use a packet sniffer legally, you must:
– Be on a network that the organization owns
– Be directly authorized by the network’s owners
– Have the knowledge and consent of the users
– Have a justifiable business reason for doing so
• Any network card can be switched to “promiscuous” mode to sniff all LAN packets
• Simply tapping into the Internet is a violation of wiretapping laws
• Example: Wireshark
Wireless Sniffers
• Wireless sniffing is much easier than wired sniffing
• Very difficult to detect – leaves no traceable evidence
• Example: NetStumbler
Password Crackers
Most systems store encrypted passwords.
• MS Windows typically uses C:\Windows\System32\config folder
• Cannot be accessed directly by users, BUT can be accessed by installing LCP, pwdump
or FGDUMP (require Admin privilege to install).
• Encryption algorithm known (NT LAN Manager in Win 7)
• Case sensitive (unlike older versions of MSWin), applies MD4
Attack types
• Brute force – very slow
• Dictionary attack – only common disctionary words used
• Precomputed dictionary attack – saves time required for encryption
• E.g. Cain and Able or “Cain” (some virus scanners detect it as malware! Microsoft
Security Essentials “Tool: This program has potentially unwanted behavior”)
3. Explain about different cipher methods? (Cryptography)
Plaintext can be encrypted through bit stream or block cipher method
Bit stream: each plaintext bit transformed into cipher bit one bit at a time
Block cipher: message divided into blocks (e.g., sets of 8- or 16-bit blocks) and each is
transformed into encrypted block of cipher bits using algorithm and key
Substitution cipher
Transposition cipher
Exclusive OR (XOR)
Vernam Cipher
Book or Running Key Cipher
Hash Functions
Substitution cipher
In a substitution cipher, you substitute one value for another.
The type of substitution based on a monoalphabetic substitution only uses one alphabet. More
advanced substitution ciphers use two or more alphabets, and are referred to as
polyalphabetic substitutions.
An advanced type of substitution cipher that uses a simple polyalphabetic code is the Vigenere
cipher. The cipher is implemented using the Vigenere Square, which is made up of
twenty-six distinct cipher alphabets.
for example, a letter in the alphabet with the letter three values to the right.
Initial alphabet yields ABCDEFGHIJKLMNOPQRSTUVWXYZ
Encryption alphabet DEFGHIJKLMNOPQRSTUVWXYZABC
Transposition cipher
Transposition cipher: rearranges values within a block to create ciphertext
For example
Exclusive OR (XOR)
Exclusive OR (XOR): function of Boolean algebra; two bits are compared
If two bits are identical, result is binary 0
If two bits not identical, result is binary 1
Perform an XOR cipher on the following bits.
Message 01100001 01100010 01100011
Cypher Key 01111111 01111111 01111111
01100001 = a
01100010 = b
01100011 = c
Message 01100001 01100010 01100011
Key 01111111 01111111 01111111
Cypher text 00011110 00011101 00011100
Vernam Cipher
To perform the Vernam cipher encryption operation, the pad values are added to numeric
values
that represent the plaintext that needs to be encrypted. So, each character of the plaintext is
turned
into a number and a pad value for that position is added to it. The resulting sum for that character
is
then converted back to a ciphertext letter for transmission.
When the two are added, if the values exceed 26, then 26 is subtracted from the total. (This is
referred to as Modulo 26.). The corresponding results are then converted back to text
Book or Running Key Cipher
Another method, made popular by spy movies, involves using of text in a book as the key to
decrypt a
message. The cyphertext consists of a list of codes representing the page number, line number,
and
word number of the plaintext word. The receiver must know which book to use. Dictionaries and
thesauruses make the most popular sources as they guarantee every word needed, although
almost
any book will suffice.
Hash Functions
Mathematical algorithms that generate message summary/digest to confirm message
identity and confirm no content has changed
Hash algorithms: publicly known functions that create hash value
Use of keys not required; message authentication code (MAC), however, may be attached
to a message
Used in password verification systems to confirm identity of user
4. Explain Cryptographic algorithms?
Often grouped into two broad categories, symmetric and asymmetric; today’s popular
cryptosystems use hybrid combination of symmetric and asymmetric algorithms
Symmetric and asymmetric algorithms distinguished by types of keys used for encryption
and decryption operations
Symmetric encryption: uses same “secret key” to encipher and decipher message
Encryption methods can be extremely efficient, requiring minimal processing
Both sender and receiver must possess encryption key
If either copy of key is compromised, an intermediate can decrypt and read
messages
Data Encryption Standard (DES): one of most popular symmetric encryption
cryptosystems
64-bit block size; 56-bit key
Adopted by NIST in 1976 as federal standard for encrypting non-classified
information
Steganography
Process of hiding information; in use for a long time
Most popular modern version hides information within files appearing to contain digital
pictures or other images
Some applications hide messages in .bmp, .wav, .mp3, and .au files, as well as in unused
space on CDs and DVDs
i. Introduction
When implementing information security, there are many human resource issues that
must be addressed
- Positioning and naming
- Staffing
- Evaluating impact of information security across every role in IT function
- Integrating solid information security concepts into personnel practices
Employees often feel threatened when organization is creating or enhancing overall
information security program
ii. Positioning and Staffing the Security Function
Many information security professionals enter the field through one of two career paths:
- Law enforcement and military
- Technical, working on security applications and processes
Today, students select and tailor degree programs to prepare for work in information
security
Organizations can foster greater professionalism by matching candidates to clearly
defined expectations and position descriptions
Information Security Positions
Use of standard job descriptions can increase degree of professionalism and improve the
consistency of roles and responsibilities between organizations
Charles Cresson Wood’s book Information Security Roles and Responsibilities Made
Easy offers set of model job descriptions
Chief Information Security Officer (CISO or CSO)
- Top information security position; frequently reports to
Security Technology
What is Security?
Firewalls
Internet Firewalls
The Internet Protocol Stack
What Firewalls do
1.Packet filtering:
examine the header information of data packets that come into a network.
a packet filtering firewall installed on TCP/IP based network and determine wether to
drop a packet or forward it to the next network connection based on the rules programmed
in the firewall.
Packet filtering firewalls scan network data packets looking for violation of the rules of
the firewalls database.
Filtering firewall inspect packets on at the network layers.
If the device finds a packet that matches a restriction it stops the packet from traveling
from network to another.
filters packet-by-packet, decides to Accept/Deny/Discard packet based on
certain/configurable criteria – Filter Rule sets.
Typically stateless: do not keep a table of the connection state of the various traffic that
flows through them
- Not dynamic enough to be considered true firewalls.
- Usually located at the boundary of a network.
- Their main strength points: Speed and Flexibility.
1. static filtering
2. dynamic filtering
3. stateful inspection
1. static filtering:
requires that the filtering rules coverning how the firewall decides which packets are
allowed and which are denied.
This type of filtering is common in network routers and gateways.
2. Dynamic filtering
- They cannot pre vent attacks that employ application-specific vulnerabilities or functions.
- Logging function ality present in packet filter firewalls is limited
- Most packet filter firewalls do not support advanced user authent ication schemes.
- Vulnerable to attacks and exploits that take advantage of pro blems within the TCP/IP
specification and protocol stack, such as network layer ad dress spoofing.
- Susceptible to sec urity breaches caused by improper configurations.
Advantages:
- One packet filter can protect an entire network
- Efficient (require s little CPU)
Filtering Hostile Code: Proxies can analyze the payload of a packet o f data and
make decision as to whether thiis packet should be passed or dropped.
4.Circuit gateways:
companied the elements of other types of firewalls , example the elements of packet filtering and
proxy services, or a packet filtering and circuit gateways.
That means a hybrids firewalls may actually of two separate firewall devices; each is a separate
firewall system, but they are connected so that they work together.
Types of Firewalls
Finally, Types depending on whether the firewalls keeps track of the state of network connections
or treats each packet in isolation, two additional categories of firewalls exist:
- Stateful firewall
- Stateless firewall
Stateful firewall
keeps track of the state of network connections (such as TCP streams) traveling across it.
Stateful firewall is able to hold in memory significant attributes of each connection, from
start to finish. These attributes, which are collectively known as the state of the connection, may
include such details as the IP addresses and ports involved in the connection and the sequence
numbers of the packets traversing the connection.
Stateless firewall
Treats each network frame (Packet) in isolation. Such a firewall has no way of knowing if any
given packet is part of an existing connection, is trying to establish a new connection, or is just a
rogue packet.
The classic example is the File Transfer Protocol, because by design it opens new
connections to random ports.
Advantages of a Firewall