1
Geethanjali College of Engineering and Technology
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
(Name of the Subject/Lab Course):Information Security Management
(JNTU CODE: ) Programme: UG/PG
Branch: CSE Version No: 1
Year: III Document Number : GCET/CSE
Semester: II No. of Pages:136
Classification status (Unrestricted/Restricted ) :
Distribution List:
Prepared by :
1) Name : M. Vijay Bhasker Reddy
2) Sign :
3) Design : Assistant Professor
4) Date :
Updated by :
1) Name :
2) Sign :
3) Design :
4) Date :
Verified by : *For Q.C only
1) Name : 1)Name :
2) Sign : 2) Sign :
3) Design : 3) Design :
4) Date : 4) Date :
Approved by (HOD) :
1) Name: Prof. Dr. Nagender Kumar Suryadevara
2) Sign :
3) Date :
2
Contents
S. No Topic Page. No.
1 Cover Page 1
2 Syllabus copy 3
3 Vision of the Department 4
4 Mission of the Department 4
5 PEOs and POs 5
6 Course objectives and outcomes 6
7 Course mapping with POs 7
8 Brief notes on the importance of the course and how it fits into the curriculum 8
9 Prerequisites if any 8
10 Instructional Learning Outcomes 9
11 Class Time Table 11
12 Individual Time Table 13
13 Lecture schedule with methodology being used/adopted 14
14 Detailed notes 21
15 Question Bank 129
16 Discussion topics , if any 130
17 References, Journals, websites and E-links if any 130
18 Student List 131
19 Group-Wise students list for discussion topic 134
3
2. SYLLABUS
UNIT-I
Information Security Management:
Information Security Overview, Threat and Attack Vectors, Types of Attacks, Common
Vulnerabilities and Exposure (CVE), Security Attacks, Fundamentals of Information Security,
Computer Security Concerns, Information Security Measures etc.
Manage Your Work to Meet Requirements (NOS 9001)
UNIT-II
Fundamentals of Information Security:
Key Elements of Networks, Logical Elements of Networks, Critical Information
Characteristics, Information States etc.
Work Effectively with Colleagues (NOS 9002)
UNIT-III
Data Leakage:
What is Data Leakage and Statistics, Data Leakage Threats, Reducing the Risk of Data Loss,
Key Performance Indicators (KPI), Database Security etc.
UNIT-IV
Information Security Policies, Procedures and Audits:
Information Security Policies-Necessity-Key Elements and Characteristics, Security Policy
Implementation, Configuration, Security Standards-Guidelines and Frameworks etc.
UNIT-V
Information Security Management- Roles and Responsibilities:
Security Roles and Responsibilities, Accountability, Roles and Responsibilities of Information
Security Management, Team Responding to Emergency Situation- Risk Analysis Process etc.
TEXT BOOKS:
1. Management of Information Security by Michael E.Whilman and Herbert J.Mattord
REFERENCE BOOKS:
1. http://www.iso.org/iso/home/standards/management-standards/iso27001.html
2. http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf
4
3. Vision of the Department
To produce globally competent and socially responsible computer science engineers
contributing to the advancement of engineering and technology which involves
creativity and innovation by providing excellent learning environment with world class
facilities.
4. Mission of the Department
1. To be a center of excellence in instruction, innovation in research and scholarship,
and service to the stake holders, the profession, and the public.
2. To prepare graduates to enter a rapidly changing field as a competent computer
science engineer.
3. To prepare graduate capable in all phases of software development, possess a firm
understanding of hardware technologies, have the strong mathematical background
necessary for scientific computing, and be sufficiently well versed in general theory
to allow growth within the discipline as it advances.
4. To prepare graduates to assume leadership roles by possessing good communication
skills, the ability to work effectively as team members, and an appreciation for their
social and ethical responsibility in a global setting.
5
5. Program Educational Objectives (PEOs) of C.S.E.
1. To provide graduates with a good foundation in mathematics, sciences and
engineering fundamentals required to solve engineering problems that will facilitate
them to find employment in industry and / or to pursue postgraduate studies with an
appreciation for lifelong learning.
2. To provide graduates with analytical and problem solving skills to design algorithms,
other hardware / software systems, and inculcate professional ethics, inter-personal
skills to work in a multi-cultural team.
3. To facilitate graduates to get familiarized with the art software / hardware tools,
imbibing creativity and innovation that would enable them to develop cutting-edge
technologies of multi-disciplinary nature for societal development.
Program Outcomes (CSE)
1. An ability to apply knowledge of mathematics, science and engineering to develop and
analyze computing systems.
2. An ability to analyze a problem and identify and define the computing requirements
appropriate for its solution under given constraints.
3. An ability to perform experiments to analyze and interpret data for different
applications.
4. An ability to design, implement and evaluate computer-based systems, processes,
components or programs to meet desired needs within realistic constraints of time
and space.
5. An ability to use current techniques, skills and modern engineering tools necessary to
practice as a CSE professional.
6. An ability to recognize the importance of professional, ethical, legal, security and
social issues and addressing these issues as a professional.
7. An ability to analyze the local and global impact of systems /processes /applications
/technologies on individuals, organizations, society and environment.
8. An ability to function in multidisciplinary teams.
9. An ability to communicate effectively with a range of audiences.
6
10. Demonstrate knowledge and understanding of the engineering, management and
economic principles and apply them to manage projects as a member and leader in a
team.
11. A recognition of the need for and an ability to engage in life-long learning and
continuing professional development
12. Knowledge of contemporary issues.
13. An ability to apply design and development principles in producing software systems
of varying complexity using various project management tools.
14. An ability to identify, formulate and solve innovative engineering problems.
6. Course Objectives
1. To introduce the terminology, technology and its applications.
2. To introduce the concept of Security Analyst.
3. To introduce the tool, technologies and programming languages which is used in day
to day security analyst job role.
Course Outcomes
Students will able to
CO 1: Understand the difference between threats and attacks.
CO 2: Understand the Security Issues and Measures.
CO 3: Know the KEY Elements and Logical Elements of Networks
CO 4: Understand the Data Leakage, its Threats and Mitigation.
CO 5: Understand the Database Security.
CO 6: Understand the Policies, Guideline and Framework of Information Security.
CO 7: Understand the Roles and Responsibilities of ISM.
7
7. Course Mapping with POs
MAPPING OF COURSE TO PEOS
Pos 1 2 3 4 5 6 7 8 9 10 11 12 13 14
ISM
CO1: Understand
the difference
between threats
and attacks.
M M M H M M
CO2: Understand
the Security
Issues and
Measures.
M M M H M M M M H
CO3: Know the
KEY Elements and
Logical Elements
of Networks
L H H H M M H M
CO4: Understand
the Data Leakage,
its Threats and
Mitigation.
M M H H M M H M
CO5: Understand
the Database
Security.
M L L H L M M
CO6: Understand
the Policies,
M L H L M
Course PEOS POs Teaching Aids
Information
Security
Management
PEO1,PEO2,
PEO3
PO 2, PO 4, PO
5, PO 6, PO 7,
PO 8, PO 10, PO
12, PO 13
Chalk & Talk, OHP/LCD Projector,
Internet, Q&A , Group Tasks ,Etutorials,
8
Guideline and
Framework of
Information
Security.
CO7: Understand
the Roles and
Responsibilities
of ISM.
M M M H M M M M
8. Brief Notes on the Importance of the Course
An ISMS is a systematic approach to managing sensitive company information so that it
remains secure. It includes people, processes and IT systems by applying a risk
management process.
It can help small, medium and large businesses in any sector keep information assets
secure.
The ISO 27000 family of standards helps organizations keep information assets secure.
Using this family of standards will help your organization manage the security of assets
such as financial information, intellectual property, employee details or information
entrusted to you by third parties.
ISO/IEC 27001 is the best-known standard in the family providing requirements for an
information security management system (ISMS).
9. Prerequisites
Data Communication and Computer Networks, Information Security, Database
Management Systems.
9
10. Instructional Learning Outcomes
S. No. Topic Topic Outcomes
UNIT-1
1
Information Security
Management
2
Information Security
Overview Basic Understanding of IS
3 Threat and Attack Vectors Differences between Threats and Attacks
4 Types of Attacks Types of Attacks
5
Common Vulnerabilities
and Exposure (CVE) Vulnerabilities and its Impact
6
Fundamentals of
Information Security Basic Understanding of IS
7
Computer Security
Concerns Issues of CS
8
Information Security
Measures Measures of IS
9
Manage Your Work to Meet
Requirements (NOS 9001) Task to be done to meet the requirements for IS
UNIT-II
10
Fundamentals of
Information Security
11 Key Elements of Networks Understanding the Key Elements of Networks
12
Logical Elements of
Networks Understanding the Logical Elements of Networks
13
Critical Information
Characteristics Understanding the Char. Of Critical Information
14 Information States Understanding the States of Information
15
Work Effectively with
Colleagues (NOS 9002) Task to be done
UNIT-III
16 Data Leakage:
17
What is Data Leakage and
Statistics Understanding Data Leakage and its Statistics
18 Data Leakage Threats Understanding DL Threats
10
19
Reducing the Risk of Data
Loss Understanding DL Mitigations
20
Key Performance
Indicators (KPI) Understanding the KPI of DL
21 Database Security Understanding DB Sec
UNIT-IV
22
Information Security Policies,
Procedures and Audits
23
Information Security
Policies Understanding Policies
24
Necessity-Key Elements
and Characteristics Understanding Char of IS
25
Security Policy
Implementation Implementation of Security Policy
26 Configuration Understanding Configuration of IS Policies
27
Security StandardsGuidelines and
Frameworks
Understanding the Standards, Guidelines and
Frameworks
UNIT-V
28
Information Security
Management- Roles and
Responsibilities Understanding the Roles and Responsibilities of ISM
29
Security Roles and
Responsibilities Understanding the Roles and Responsibilities of ISM
30 Accountability
31
Roles and Responsibilities
of Information Security
Management Understanding the Roles and Responsibilities of ISM
32
Team Responding to
Emergency Situation
33 Risk Analysis Process Understanding Intruders and Detection system
11
11. Class Time Tables
3 CSE A
Time 09.30-
10.20
10.20-
11.10
11.10-
12.00
12.00-
12.50
12.50-
1.30
1.30-
2.20 2.20-3.10 3.10-4.00
Period 1 2 3 4
LUNCH
5 6 7
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
3 CSE-B
Time 09.30-
10.20
10.20-
11.10
11.10-
12.00
12.00-
12.50
12.50-
1.30
1.30-
2.20 2.20-3.10 3.10-4.00
Period 1 2 3 4
LUNCH
5 6 7
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
12
3 CSE-C
Time 09.30-
10.20
10.20-
11.10
11.10-
12.00
12.00-
12.50
12.50-
1.30
1.30-
2.20 2.20-3.10 3.10-4.00
Period 1 2 3 4
LUNCH
5 6 7
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
3 CSE D
Time 09.30-
10.20
10.20-
11.10
11.10-
12.00
12.00-
12.50
12.50-
1.30
1.30-
2.20 2.20-3.10 3.10-4.00
Period 1 2 3 4
LUNCH
5 6 7
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
13
12. Individual Time Tables
Lokeshwari Subject :III YR ISM
Time 09.30-
10.20
10.20-
11.10
11.10-
12.00
12.00-
12.50
12.50-
1.30
1.30-
2.20
2.20-
3.10
3.10-
4.00
Period 1 2 3 4
LUNCH
5 6 7
Monday
Tuesday
Wednesda
y
Thursday
Friday
Saturday
M Vijay Bhasker Reddy Subject :III YR ISM
Time 09.30-
10.20
10.20-
11.10
11.10-
12.00
12.00-
12.50
12.50-
1.30
1.30-
2.20
2.20-
3.10
3.10-
4.00
Period 1 2 3 4
LUNCH
5 6 7
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
14
13. Lecture schedule with methodology being used/adopted
Lesson plan
S. No.
Period
No. Topic
Regular/
Additional
Teaching
aids
used
PPT/
OHP/ BB Remarks
UNIT-1
1 1
Information Security
Management Regular BB
2 2
Information Security
Overview Regular BB
3 3,4
Threat and Attack
Vectors Regular BB
4 5,6 Types of Attacks Regular
BB, PPT
5 7
Common
Vulnerabilities and
Exposure (CVE) Regular BB
6 8,9
Fundamentals of
Information Security Regular BB
7 10,11
Computer Security
Concerns Regular BB,
8 12
Information Security
Measures Regular BB
9 13
Manage Your Work to Meet
Requirements (NOS 9001) Regular BB
UNIT-II
10 14,15
Fundamentals of
Information Security Regular BB
11 16,17
Key Elements of
Networks Regular BB
12 18,19
Logical Elements of
Networks
20
Critical Information
Characteristics Regular BB
13 21 Information States Regular BB,
14 22,23
Work Effectively with
Colleagues (NOS 9002) Regular BB
UNIT-III
15
15 24 Data Leakage: Regular BB
16 25,26
What is Data Leakage
and Statistics Regular BB
17 27,28 Data Leakage Threats Regular BB
18 29,30
Reducing the Risk of
Data Loss Regular BB
19 31
Key Performance
Indicators (KPI) Regular BB
20 32,33,34 Database Security Regular BB, PPT
UNIT-IV
21 35
Information Security
Policies, Procedures and
Audits Regular BB
22 36,37
Information Security
Policies Regular BB
23 38,39
Necessity-Key Elements
and Characteristics Regular BB
24 40,41
Security Policy
Implementation Regular BB
25 42 Configuration Regular BB, PPT
26 43,44
Security StandardsGuidelines and
Frameworks Regular BB, PPT
UNIT-V
28 45
Information Security
Management- Roles and
Responsibilities Regular BB
29 46,47
Security Roles and
Responsibilities Regular BB, PPT
30 48 Accountability Regular BB, PPT
31 48,49
Roles and
Responsibilities of
Information Security
Management Regular BB, PPT
32 50,51
Team Responding to
Emergency Situation Regular BB
33 52,53 Risk Analysis Process Regular BB, PPT
**Tentative Classes ***Excluding Tutorials, Internals and Revision Classes
16
14. Lesson schedule
Geethanjali College of Engineering & Technology
Department of Computer Science andEngineering
Lesson Plan & Schedule
Year & Sem: III year Sem-II(Sec-A, B) Sub: ISM
Faculty Name:
S. No. Date Topic to be Covered
Total No. of
Periods
UNIT-1
1 07.12.15 Information Security Management 1
2 08.12.15 Information Security Overview 1
3
09.12.15
10.12.15 Threat and Attack Vectors 2
4
11.12.15
14.12.15 Types of Attacks 2
5 15.12.15 Common Vulnerabilities and Exposure (CVE) 1
6
16.12.15
17.12.15 Fundamentals of Information Security 2
7
18.12.15
19.12.15 Computer Security Concerns 2
8 20.12.15 Information Security Measures 1
9 21.12.15
Manage Your Work to Meet Requirements (NOS
9001) 1
Total No. of Periods 13
UNIT-II
13
24.12.15
26.12.15 Fundamentals of Information Security 2
14
27.12.15
28.12.15 Key Elements of Networks 2
17
15
29.12.15
30.12.15 Logical Elements of Networks 2
16 31.12.15 Critical Information Characteristics 1
17 02.01.16 Information States 1
18
04.01.16
05.01.16 Work Effectively with Colleagues (NOS 9002) 2
Total No. of Periods 10
UNIT-III
24 06.01.16 Data Leakage: 1
25
07.01.16
08.01.16 What is Data Leakage and Statistics 2
26
11.01.16
12.01.16 Data Leakage Threats 2
27
18.01.16
19.01.16 Reducing the Risk of Data Loss 2
28 20.01.16 Key Performance Indicators (KPI) 1
29
21.01.16
22.01.16
23.01.16 Database Security 3
Total No. of Periods 11
UNIT-IV
33 25.01.16
Information Security Policies, Procedures and
Audits 1
34
27.01.16
28.01.16 Information Security Policies 2
35
29.01.16
30.01.16 Necessity-Key Elements and Characteristics 2
36
08.02.16
09.02.16 Security Policy Implementation 2
37 10.02.16 Configuration 1
38
11.02.16
12.02.16
Security Standards-Guidelines and
Frameworks 2
Total No. of Periods 10
UNIT-V
18
40 15.02.16
Information Security Management- Roles and
Responsibilities
41
16.02.16
17.02.16 Security Roles and Responsibilities 1
42
18.02.16
19.02.16 Accountability 2
43 01.03.16
Roles and Responsibilities of Information
Security Management 2
44
02.03.16
03.03.16 Team Responding to Emergency Situation 2
45
04.03.16
05.03.16 Risk Analysis Process 2
Total No. of Periods 09
Total No. of Periods 53
**Tentative Dates Subject to Change *** Excluding Tutorial, Internals and Revision Classes
Geethanjali College of Engineering & Technology
Department of Computer Science andEngineering
Lesson Plan & Schedule
Year & Sem: III year Sem-1(Sec-C, D) Sub: IS
Faculty Name:
S. No. Date Topic to be Covered
Total No. of
Periods
UNIT-1
1 07.12.15 Information Security Management 1
2 08.12.15 Information Security Overview 1
3
09.12.15
10.12.15 Threat and Attack Vectors 2
4
11.12.15
14.12.15 Types of Attacks 2
5 15.12.15 Common Vulnerabilities and Exposure (CVE) 1
19
6
16.12.15
17.12.15 Fundamentals of Information Security 2
7
18.12.15
19.12.15 Computer Security Concerns 2
8 20.12.15 Information Security Measures 1
9 21.12.15
Manage Your Work to Meet Requirements (NOS
9001) 1
Total No. of Periods 13
UNIT-II
13
24.12.15
26.12.15 Fundamentals of Information Security 2
14
27.12.15
28.12.15 Key Elements of Networks 2
15
29.12.15
30.12.15 Logical Elements of Networks 2
16 31.12.15 Critical Information Characteristics 1
17 02.01.16 Information States 1
18
04.01.16
05.01.16 Work Effectively with Colleagues (NOS 9002) 2
Total No. of Periods 10
UNIT-III
24 06.01.16 Data Leakage: 1
25
07.01.16
08.01.16 What is Data Leakage and Statistics 2
26
11.01.16
12.01.16 Data Leakage Threats 2
27
18.01.16
19.01.16 Reducing the Risk of Data Loss 2
28 20.01.16 Key Performance Indicators (KPI) 1
29
21.01.16
22.01.16
23.01.16 Database Security 3
Total No. of Periods 11
20
UNIT-IV
33 25.01.16
Information Security Policies, Procedures and
Audits 1
34
27.01.16
28.01.16 Information Security Policies 2
35
29.01.16
30.01.16 Necessity-Key Elements and Characteristics 2
36
08.02.16
09.02.16 Security Policy Implementation 2
37 10.02.16 Configuration 1
38
11.02.16
12.02.16
Security Standards-Guidelines and
Frameworks 2
Total No. of Periods 10
UNIT-V
40 15.02.16
Information Security Management- Roles and
Responsibilities
41
16.02.16
17.02.16 Security Roles and Responsibilities 1
42
18.02.16
19.02.16 Accountability 2
43 01.03.16
Roles and Responsibilities of Information
Security Management 2
44
02.03.16
03.03.16 Team Responding to Emergency Situation 2
45
04.03.16
05.03.16 Risk Analysis Process 2
Total No. of Periods 09
Total No. of Periods 53
**Tentative Dates Subject to Change *** Excluding Tutorial, Internals and Revision Classes
21
15. Detailed Notes
UNIT –I
Information Security Management:
Information Security Overview, Threat and Attack Vectors, Types of Attacks, Common
Vulnerabilities and Exposure (CVE), Security Attacks, Fundamentals of Information
Security, Computer Security Concerns, Information Security Measures etc.
Manage Your Work to Meet Requirements (NOS 9001)
INFORMATION SECURITY OVERVIEW
Computer data often travels from one computer to another, leaving the safety of
its protected physical surroundings. Once the data is out of hand, people with bad
intention could modify or forge your data, either for amusement or for their own benefit.
Cryptography can reformat and transform our data, making it safer on its trip between
computers. The technology is based on the essentials of secret codes, augmented by
modern mathematics that protects our data in powerful ways.
• Computer Security - generic name for the collection of tools designed to protect data
and to thwart hackers
• Network Security - measures to protect data during their transmission
• Internet Security - measures to protect data during their transmission over a collection
of interconnected networks
THE OSI SECURITY ARCHITECTURE
To assess effectively the security needs of an organization and to evaluate and
choose various security products and policies, the manager responsible for security
needs some systematic way of defining the requirements for security and characterizing
the approaches to satisfying those requirements. The OSI security architecture was
developed in the context of the OSI protocol architecture, which is described in Appendix
H. However, for our purposes in this chapter, an understanding of the OSI protocol
architecture is not required. For our purposes, the OSI security architecture provides a
22
useful, if abstract, overview of many of the concepts. The OSI security architecture focuses
on security attacks, mechanisms, and services. These can be defined briefly as follows:
Threat
A potential for violation of security, which exists when there is a circumstance,
capability, action, or event that could breach security and cause harm. That is, a
threat is a possible danger that might exploit a vulnerability.
Attack
An assault on system security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system.
Information Security: It can be defined as “measures adopted to prevent the
unauthorized use, misuse, modification or denial of use of knowledge, facts, data or
capabilities”. Three aspects of IS are:
Security Attack: Any action that comprises the security of information
Security Mechanism: A mechanism that is designed to detect, prevent, or recover
from a security.
Security Service: It is a processing or communication service that enhances the
security of the data processing systems and information transfer. The services are
intended to counter security attacks by making use of one or more security
mechanisms to provide the service.
SECURITY ATTACK
any action that compromises the security of information owned by an
organization
information security is about how to prevent attacks, or failing that, to detect
attacks on information-based systems
often threat & attack used to mean same thing
have a wide range of attacks
can focus of generic types of attacks
23
Passive
Active
PASSIVE ATTACK
A Passive attack attempts to learn or make use of information from the system, but does
not affect system resources.
Two types:
Release of message content
It may be desirable to prevent the opponent from learning the contents (i.e
sensitive or confidential info) of the transmission.
Traffic analysis
A more subtle technique where the opponent could determine the location and
identity of communicating hosts and could observe the frequency & length of encrypted
messages being exchanged there by guessing the nature of communication taking place.
Passive attacks are very difficult to detect because they do not involve any alternation of
the data. As the communications take place in a very normal fashion, neither the sender
24
nor receiver is aware that a third party has read the messages or observed the traffic
pattern. So, the emphasis in dealing with passive attacks is on prevention rather than
detection.
ACTIVE ATTACK
Active attacks involve some modification of the data stream or creation of a false
stream. An active attack attempts to alter system resources or affect their operation.
Four types:
Masquerade: Here, an entity pretends to be some other entity. It usually includes
one of the other forms of active attack.
Replay: It involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Modification of messages: It means that some portion of a legitimate message is
altered, or that messages are delayed to produce an unauthorized effect.
Ex: “John’s acc no is 2346” is modified as “John’s acc no is 7892”
Denial of service: This attack prevents or inhibits the normal use or management
of communication facilities.
Ex: a: Disruption of entire network by disabling it
b: Suppression of all messages to a particular destination by a third party. Active
attacks present the opposite characteristics of passive attacks. Whereas passive attacks
are difficult to detect, measures are available to prevent their success. On the other hand,
it is quite difficult to prevent active attacks absolutely, because of the wide variety of
potential physical, software and network vulnerabilities. Instead, the goal is to detect
active attacks and to recover from any disruption or delays caused by them.
25
INTERRUPTION
An asset of the system is destroyed or becomes unavailable or unusable. It is an attack
on availability.
Examples:
Destruction of some hardware
Jamming wireless signals
Disabling file management systems
INTERCEPTION
An unauthorized party gains access to an asset. Attack on confidentiality.
Examples:
Wire tapping to capture data in a network.
Illicitly copying data or programs
Eavesdropping
MODIFICATION
When an unauthorized party gains access and tampers an asset. Attack is on Integrity.
26
Examples:
Changing data file
Altering a program and the contents of a message
FABRICATION
An unauthorized party inserts a counterfeit object into the system. Attack on
Authenticity. Also called impersonation
Examples:
Hackers gaining access to a personal email and sending message
Insertion of records in data files
Insertion of spurious messages in a network
SECURITY SERVICES
It is a processing or communication service that is provided by a system to give a
specific kind of production to system resources. Security services implement security
policies and are implemented by security mechanisms.
Confidentiality
Confidentiality is the protection of transmitted data from passive attacks. It is used
to prevent the disclosure of information to unauthorized individuals or systems. It has
been defined as “ensuring that information is accessible only to those authorized to have
access”.
The other aspect of confidentiality is the protection of traffic flow from analysis.
Ex: A credit card number has to be secured during online transaction.
27
Authentication
This service assures that a communication is authentic. For a single message
transmission, its function is to assure the recipient that the message is from intended
source. For an ongoing interaction two aspects are involved. First, during connection
initiation the service assures the authenticity of both parties. Second, the connection
between the two hosts is not interfered allowing a third party to masquerade as one of
the two parties. Two specific authentication services defines in X.800 are
Peer entity authentication: Verifies the identities of the peer entities involved in
communication. Provides use at time of connection establishment and during data
transmission. Provides confidence against a masquerade or a replay attack
Data origin authentication: Assumes the authenticity of source of data unit, but
does not provide protection against duplication or modification of data units. Supports
applications like electronic mail, where no prior interactions take place between
communicating entities.
Integrity
Integrity means that data cannot be modified without authorization. Like
confidentiality, it can be applied to a stream of messages, a single message or selected
fields within a message. Two types of integrity services are available. They are
Connection-Oriented Integrity Service: This service deals with a stream of
messages, assures that messages are received as sent, with no duplication, insertion,
modification, reordering or replays. Destruction of data is also covered here. Hence, it
attends to both message stream modification and denial of service.
Connectionless-Oriented Integrity Service: It deals with individual messages
regardless of larger context, providing protection against message modification only.
An integrity service can be applied with or without recovery. Because it is related to
active attacks, major concern will be detection rather than prevention. If a violation is
detected and the service reports it, either human intervention or automated recovery
machines are required to recover.
Non-repudiation
Non-repudiation prevents either sender or receiver from denying a transmitted
message. This capability is crucial to e-commerce. Without it an individual or entity can
deny that he, she or it is responsible for a transaction, therefore not financially liable.
28
Access Control
This refers to the ability to control the level of access that individuals or entities
have to a network or system and how much information they can receive. It is the ability
to limit and control the access to host systems and applications via communication links.
For this, each entity trying to gain access must first be identified or authenticated, so that
access rights can be tailored to the individuals.
Availability
It is defined to be the property of a system or a system resource being accessible
and usable upon demand by an authorized system entity. The availability can significantly
be affected by a variety of attacks, some amenable to automated counter measures i.e
authentication and encryption and others need some sort of physical action to prevent or
recover from loss of availability of elements of a distributed system.
SECURITY MECHANISMS:
According to X.800, the security mechanisms are divided into those implemented
in a specific protocol layer and those that are not specific to any particular protocol layer
or security service. X.800 also differentiates reversible & irreversible encipherment
mechanisms. A reversible encipherment mechanism is simply an encryption algorithm
that allows data to be encrypted and subsequently decrypted, whereas irreversible
encipherment include hash algorithms and message authentication codes used in digital
signature and message authentication applications
SPECIFIC SECURITY MECHANISMS:
Incorporated into the appropriate protocol layer in order to provide some of the
OSI security services,
Encipherment: It refers to the process of applying mathematical algorithms for
converting data into a form that is not intelligible. This depends on algorithm used and
encryption keys.
Digital Signature: The appended data or a cryptographic transformation applied
to any data unit allowing to prove the source and integrity of the data unit and protect
against forgery.
Access Control: A variety of techniques used for enforcing access permissions to
the system resources.
29
Data Integrity: A variety of mechanisms used to assure the integrity of a data unit
or stream of data units.
Authentication Exchange: A mechanism intended to ensure the identity of an
entity by means of information exchange.
Traffic Padding: The insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts.
Routing Control: Enables selection of particular physically secure routes for
certain data and allows routing changes once a breach of security is suspected.
Notarization: The use of a trusted third party to assure certain properties of a
data exchange
PERVASIVE SECURITY MECHANISMS:
These are not specific to any particular OSI security service or protocol layer.
Trusted Functionality: That which is perceived to b correct with respect to some
criteria
Security Level: The marking bound to a resource (which may be a data unit) that
names or designates the security attributes of that resource.
Event Detection: It is the process of detecting all the events related to network
security.
Security Audit Trail: Data collected and potentially used to facilitate a security
audit, which is an independent review and examination of system records and activities.
Security Recovery: It deals with requests from mechanisms, such as event
handling and management functions, and takes recovery actions.
MODEL FOR NETWORK SECURITY
30
Data is transmitted over network between two communicating parties, who must
cooperate for the exchange to take place. A logical information channel is established by
defining a route through the internet from source to destination by use of communication
protocols by the two parties. Whenever an opponent presents a threat to confidentiality,
authenticity of information, security aspects come into play. Two components are present
in almost all the security providing techniques.
A security-related transformation on the information to be sent making it unreadable
by the opponent, and the addition of a code based on the contents of the message, used to
verify the identity of sender.
Some secret information shared by the two principals and, it is hoped, unknown to
the opponent. An example is an encryption key used in conjunction with the transformation
to scramble the message before transmission and unscramble it on reception
A trusted third party may be needed to achieve secure transmission. It is
responsible for distributing the secret information to the two parties, while keeping it
away from any opponent. It also may be needed to settle disputes between the two parties
regarding authenticity of a message transmission. The general model shows that there
are four basic tasks in designing a particular security service:
1. Design an algorithm for performing the security-related transformation. The
algorithm should be such that an opponent cannot defeat its purpose
2. Generate the secret information to be used with the algorithm
3. Develop methods for the distribution and sharing of the secret information
4. Specify a protocol to be used by the two principals that makes use of the security
algorithm and the secret information to achieve a particular security service
Various other threats to information system like unwanted access still exist. The
existence of hackers attempting to penetrate systems accessible over a network remains
a concern. Another threat is placement of some logic in computer system affecting various
applications and utility programs. This inserted code presents two kinds of threats.
Some basic terminologies used:
CIPHER TEXT - the coded message
CIPHER - algorithm for transforming plaintext to ciphertext
KEY - info used in cipher known only to sender/receiver
31
ENCIPHER (ENCRYPT) - converting plaintext to ciphertext
DECIPHER (DECRYPT) - recovering ciphertext from plaintext
CRYPTOGRAPHY - study of encryption principles/methods
CRYPTANALYSIS (CODEBREAKING) - the study of principles/ methods of deciphering
ciphertext without knowing key
CRYPTOLOGY - the field of both cryptography and cryptanalysis
CRYPTOGRAPHY
Cryptographic systems are generally classified along 3 independent dimensions:
Type of operations used for transforming plain text to cipher text
All the encryption algorithms are abased on two general principles: substitution,
in which each element in the plaintext is mapped into another element, and
transposition, in which elements in the plaintext are rearranged.
The number of keys used
If the sender and receiver uses same key then it is said to be symmetric key (or)
single key (or) conventional encryption. If the sender and receiver use different keys
then it is said to be public key encryption.
The way in which the plain text is processed
A block cipher processes the input and block of elements at a time, producing
output block for each input block. A stream cipher processes the input elements
continuously, producing output element one at a time, as it goes along.
CRYPTANALYSIS
The process of attempting to discover X or K or both is known as cryptanalysis. The strategy
used by the cryptanalysis depends on the nature of the encryption scheme and the
information available to the cryptanalyst. There are various types of cryptanalytic attacks
based on the amount of information known to the cryptanalyst.
Cipher text only – A copy of cipher text alone is known to the cryptanalyst.
Known plaintext – The cryptanalyst has a copy of the cipher text and the corresponding
plaintext.
32
Chosen plaintext – The cryptanalysts gains temporary access to the encryption machine.
They cannot open it to find the key, however; they can encrypt a large number of suitably
chosen plaintexts and try to use the resulting cipher texts to deduce the key.
Chosen cipher text – The cryptanalyst obtains temporary access to the decryption machine,
uses it to decrypt several string of symbols, and tries to use the results to deduce the key.
COMMON VULNERABILITIES AND EXPOSURE (CVE)
Common Vulnerabilities and Exposures (CVE) is a dictionary-type reference
system or list for publicly known information-security threats. Every exposure or
vulnerability included in the CVE list consists of one common, standardized CVE name.
CVE is maintained by the MITRE Corporation and sponsored by the National Cyber
Security Division (NCSD) of the Department of Homeland Security. The CVE dictionary, a
shared information security vulnerability data list, may be viewed by the public.
In information security,
A VULNERABILITY is a software coding error that is used by hackers to enter an
information system and perform unauthorized activities while posing as an authorized
user.
AN EXPOSURE is a software error that allows hackers to break into a system. During an
exposure, attackers may gain information or hide unauthorized actions.
Items in the CVE list get names based on the year of their formal inclusion and the
order in which they were included in the list that year. The CVE helps computer security
tool vendors identify vulnerabilities and exposures. Before CVE, tools had proprietary
vulnerability databases, and no common dictionary existed. The key objective of CVE is
to help share data across different vulnerable databases and security tools.
CVE is used by the Security Content Automation Protocol, and CVE IDs are listed on
MITRE's system as well as the US National Vulnerability Database.
CVE IDENTIFIERS
33
MITRE Corporation's documentation defines CVE Identifiers (also called "CVE
names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for
publicly known information-security vulnerabilities in publicly released software
packages. Historically, CVE identifiers had a status of "candidate" ("CAN-") and could then
be promoted to entries ("CVE-"), however this practice was ended some time ago and all
identifiers are now assigned as CVEs. The assignment of a CVE number is not a guarantee
that it will become an official CVE entry (e.g. a CVE may be improperly assigned to an
issue which is not a security vulnerability, or which duplicates an existing entry).
CVEs are assigned by a CVE Numbering Authority (CNA);[3] there are three primary types
of CVE number assignments:
1. The MITRE Corporation functions as Editor and Primary CNA
2. Various CNAs assign CVE numbers for their own products (e.g. Microsoft, Oracle,
HP, Red Hat, etc.)
3. A third-party coordinator such as CERT Coordination Center may assign CVE
numbers for products not covered by other CNAs
When investigating a vulnerability or potential vulnerability it helps to acquire a
CVE number early on. CVE numbers may not appear in the MITRE or NVD CVE databases
for some time (days, weeks, months or potentially years) due to issues that are
embargoed (the CVE number has been assigned but the issue has not been made public),
or in cases where the entry is not researched and written up by MITRE due to resource
issues. The benefit of early CVE candidacy is that all future correspondence can refer to
the CVE number. Information on getting CVE identifiers for issues with open source
projects is available from Red Hat.[4]
CVEs are for software that has been publicly released; this can include betas and
other pre-release versions if they are widely used. Commercial software is included in the
"publicly released" category, however custom-built software that is not distributed
would generally not be given a CVE. Additionally services (e.g. a Web-based email
provider) are not assigned CVEs for vulnerabilities found in the service (e.g. an XSS
vulnerability) unless the issue exists in an underlying software product that is publicly
distributed.
34
What is the new CVE-ID Syntax?
The new CVE-ID syntax is variable length and includes:
CVE prefix + Year + Arbitrary Digits
NOTE: The variable length arbitrary digits will begin at four (4) fixed digits and expand
with arbitrary digits only when needed in a calendar year, for example, CVE-YYYY-NNNN
and if needed CVE-YYYY-NNNNN, CVE-YYYY-NNNNNNN, and so on. This also means there
will be no changes needed to previously assigned CVE-IDs, which all include 4 digits.
This is a standardized text description of the issue(s). One common entry is:
“** RESERVED ** This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the candidate has been
publicized, the details for this candidate will be provided.”
This means that the entry number has been reserved by Mitre for an issue or a CNA
has reserved the number. So in the case where a CNA requests a block of CVE numbers in
advance (e.g. Red Hat currently requests CVEs in blocks of 500), the CVE number will be
marked as reserved even though the CVE itself may not be assigned by the CNA for some
time. Until the CVE is assigned AND Mitre is made aware of it (e.g. the embargo passes
and the issue is made public), AND Mitre has researched the issue and written a
description of it, entries will show up as "** RESERVED **"
CVE attempts to assign one CVE per security issue, however in many cases this would
lead to an extremely large number of CVEs (e.g. where several dozen cross-site scripting
vulnerabilities are found in a PHP application due to lack of use of htmlspecialchars() or
the insecure creation of files in /tmp). To deal with this there are guidelines (subject to
change) that cover the splitting and merging of issues into distinct CVE numbers. As a
general guideline consider issues to be merged, then split them by the type of
vulnerability (e.g. buffer overflow vs. stack overflow), then by the software version
affected (e.g. if one issue affects version 1.3.4 through 2.5.4 and the other affects 1.3.4
through 2.5.8 they would be SPLIT) and then by the reporter of the issue (e.g. Alice
reports one issue and Bob reports another issue the issues would be SPLIT into separate
CVE numbers). Another example is Alice reports a /tmp file creation vulnerability in
version 1.2.3 and earlier of ExampleSoft web browser, in addition to this issue several
35
other /tmp file creation issues are found, in some cases this may be considered as two
reporters (and thus SPLIT into two separate CVEs, or if Alice works for ExampleSoft and
an ExampleSoft internal team finds the rest it may be MERGE'ed into a single CVE).
Conversely issues can be merged, e.g. if Bob finds 145 XSS vulnerabilities in
ExamplePlugin for ExampleFrameWork regardless of the versions affected and so on they
may be merged into a single CVE.
COMPUTER SECURITY CONCERNS
People who fall in love with the Net do so for different reasons. Many love the
ability to quickly and cheaply keep up with friends and loved ones via e-mail, while others
love the vast oceans of information or the rush of playing Internet games.
However, it's likely that most Internet users share one thing in common as they
surf: the last thing on their minds is computer security.
While that's understandable, it's also a big mistake. It is important to remember
that surfing the Net comes with certain inherent risks. When you log onto the Net, you
step into the public arena, even if you're surfing from a bedroom computer while lounging
around in your skivvies!
There are as many bad guys in cyberspace as there are in everyday life, and those
shady characters are constantly prowling the Internet in search of new victims to scam.
However, the media often exaggerate these dangers. It is extremely unlikely
(though not impossible) that anyone reading this article will fall prey to an Internet crime,
and in truth the risks are not much greater than those associated with many fun activities.
Does the potential of breaking a bone keep you from enjoying your favorite ski
slope or bike trail? Of course not. Instead, the smart person uses the necessary caution
that will allow for a safe and enjoyable experience.
That ethos also applies to those who want to surf the Web safely. There are
countless ways that thieves and mischief makers can wreak havoc with your sense of
security, but there are just as many ways to keep intruders at bay via safe-surfing
techniques or security software.
Some of the Concerns/Issues of Computer Security
36
Hacking unauthorized access to or use of data, systems, server or networks, including any
attempt to probe, scan or test the vulnerability of a system, server or network or to breach
security or authentication measures without express authorization of the owner of the
system, server or network. Members of the University should not run computer programs
that are associated with hacking without prior authorisation. Obtaining and using such
programs is not typical of normal usage and may therefore otherwise be regarded as misuse.
Use of University owned computer equipment, including the network, for illegal activities
including copying Copyright material without permission. The vast majority of files shared
on P2P (peer-to-peer) networks violate copyright law because they were posted without
permission of the artist or label.
Sending abusive e-mails or posting offensive Web pages.
Creation or transmission of any offensive or indecent images.
Giving unauthorized access to University computing resources e.g. allowing an account to
be used by someone not authorized to use it.
Deliberately creating or spreading computer viruses or worms.
Unauthorized running of applications that involve committing the University to sharing its
computing resources, e.g. network bandwidth, in an uncontrolled and unlimited way.
To secure a computer system, it is important to understand the attacks that can be
made against it, and these threats can typically be classified into one of the categories
below:
Backdoors
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret
method of bypassing normal authentication or security controls. They may exist for a
number of reasons, including by original design or from poor configuration. They may
also have been added later by an authorized party to allow some legitimate access, or by
an attacker for malicious reasons; but regardless of the motives for their existence, they
create a vulnerability.
Denial-of-service attack
Denial of service attacks are designed to make a machine or network resource
unavailable to its intended users. Attackers can deny service to individual victims, such
37
as by deliberately entering a wrong password enough consecutive times to cause the
victim account to be locked, or they may overload the capabilities of a machine or
network and block all users at once. While a network attack from a single IP address can
be blocked by adding a new firewall rule, many forms of Distributed denial of
service (DDoS) attacks are possible, where the attack comes from a large number of
points – and defending is much more difficult. Such attacks can originate from the zombie
computers of a botnet, but a range of other techniques are possible including reflection
and amplification attacks, where innocent systems are fooled into sending traffic to the
victim.
Direct-access attacks
Common consumer devices that can be used to transfer data surreptitiously.
An unauthorized user gaining physical access to a computer is most likely able to directly
download data from it. They may also compromise security by making operating
system modifications, installing software worms, key loggers, or covert listening devices.
Even when the system is protected by standard security measures, these may be able to
be by passed by booting another operating system or tool from a CD-ROM or other
bootable media. Disk encryption and Trusted Platform Module are designed to prevent
these attacks.
Eavesdropping
Eavesdropping is the act of surreptitiously listening to a private conversation,
typically between hosts on a network. For instance, programs such
as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the
systems of internet service providers. Even machines that operate as a closed system (i.e.,
with no contact to the outside world) can be eavesdropped upon via monitoring the
faint electro-magnetic transmissions generated by the hardware; TEMPEST is a
specification by the NSA referring to these attacks.
Spoofing
Spoofing of user identity describes a situation in which one person or program
successfully masquerades as another by falsifying data.
38
Tampering
Tampering describes a malicious modification of products. So-called "Evil Maid"
attacks and security services planting of surveillance capability into routers[6] are
examples.
Privilege escalation
Privilege escalation describes a situation where an attacker with some level of
restricted access is able to, without authorization, elevate their privileges or access level.
So for example a standard computer user may be able to fool the system into giving them
access to restricted data; or even to "become root" and have full unrestricted access to a
system.
Phishing
Phishing is the attempt to acquire sensitive information such as usernames,
passwords, and credit card details directly from users. Phishing is typically carried out by
email spoofing or instant messaging, and it often directs users to enter details at a fake
website whose look and feel are almost identical to the legitimate one. Preying on a
victim's trusting, phishing can be classified as a form of social engineering.
INFORMATION SECURITY MEASURES
Information is one of the most valuable assets. The use of proper preventive
measures and safeguards can reduce the risk of potentially devastating security attacks,
which could cost you the future of your business. Some losses might be irrecoverable,
such as the loss of a business deal due to leaks of confidential data to your competitor.
CYBER CRIME SYNDICATES
Although the lone criminal mastermind still exists, these days most malicious
hacking attacks are the result of organized groups, many of which are professional.
Traditional organized crime groups that used to run drugs, gambling, prosecution, and
extortion have thrown their hats into the online money grab ring, but competition is
fierce, led not by mafiosos but several very large groups of professional criminals aimed
specifically at cybercrime.
39
Many of the most successful organized cybercrime syndicates are businesses that
lead large affiliate conglomerate groups, much in the vein of legal distributed marketing
hierarchies. In fact, today's cybercriminal probably has more in common with an Avon or
Mary Kay rep than either wants to admit.
Small groups, with a few members, still hack, but more and more, IT security pros
are up against large corporations dedicated to rogue behavior. Think full-time employees,
HR departments, project management teams, and team leaders.
SMALL-TIME CONS -- AND THE MONEY MULES AND LAUNDERS SUPPORTING THEM
Not all cybercriminal organizations are syndicates or corporations. Some are
simply entrepreneurial in nature, small businesses after one thing: money.
These malicious mom-and-pop operations may steal identities and passwords, or
they may cause nefarious redirection to get it. In the end, they want money. They initiate
fraudulent credit card or banking transactions and convert their ill-gotten gains into local
currency using money mules, electronic cash distribution, e-banking, or some other sort
of money laundering.
It's not hard to find money launders. There are dozens to hundreds of entities
competing to be the one that gets to take a large percentage cut of the illegally procured
loot. In fact, you'd be surprised at the competitive and public nature of all the other people
begging to do support business with Internet criminals. They advertise "no questions
asked," "bulletproof" hosting in countries far from the reaches of legal subpoenas, and
they offer public bulletin boards, software specials, 24/7 telephone support, bidding
forums, satisfied customer references, antimalware avoidance skills, and all the servicing
that helps others to be better online criminals. Many of these groups make tens of millions
of dollars each year.
Many of these groups and the persons behind them have been identified (and
arrested) over the past few years. Their social media profiles show happy people with big
houses, expensive cars, and content families taking foreign vacations. If they're the
slightest bit guilty from stealing money from others, it doesn't show.
40
Imagine the neighborhood barbeques where they tell neighbors and friends that
they run an "Internet marketing business" -- all the while social engineering their way to
millions to the consternation of IT security pros who have done just about everything you
can to protect users from themselves.
HACKTIVISTS
Whereas exploit bragging was not uncommon in the early days, today's cyber
criminal seeks to fly under the radar -- with the exception of the growing legions of
hacktivists.
These days IT security pros have to contend with an increasing number of loose
confederations of individuals dedicated to political activism, like the infamous
Anonymous group. Politically motivated hackers have existed since hacking was first
born. The big change is that more and more of it is being done in the open, and society is
readily acknowledging it as an accepted form of political activism.
Political hacking groups often communicate, either anonymously or not, in open
forums announcing their targets and hacking tools ahead of time. They gather more
members, take their grievances to the media to drum up public support, and act
astonished if they get arrested for their illegal deeds. Their intent is to embarrass
and bring negative media attention to the victim as much as possible, whether that
includes hacking customer information, committing DDoS (distributed denial of service)
attacks, or simply causing the victim company additional strife.
More often than not, political hacktivism is intent on causing monetary pain to its
victim in an attempt to change the victim's behavior in some way. Individuals can be
collateral damage in this fight, and regardless of whether one believes in the hacktivist's
political cause, the intent and methodology remain criminal.
INTELLECTUAL PROPERTY THEFT AND CORPORATE ESPIONAGE
While the likelihood of dealing with hacktivists may be low, most IT security pros
have to contend with the large group of malicious hackers that exist only to steal
intellectual property from companies or to perform straight-up corporate espionage.
41
The method of operations here is to break into a company's IT assets, dump all the
passwords, and over time, steal gigabytes of confidential information: patents, new
product ideas, military secrets, financial information, business plans, and so on. Their
intent is to find valuable information to pass along to their customers for financial gain,
and their goal is to stay hidden inside the compromised company's network for as long
as possible.
To reap their rewards, they eavesdrop on important emails, raid databases, and
gain access to so much information that many have begun to develop their own malicious
search engines and query tools to separate the fodder from the more interesting
intellectual property.
This sort of attacker is known as an APT (advanced persistent threat) or DHA
(determined human adversary). There are few large companies that have not been
successfully compromised by these campaigns.
MALWARE MERCENARIES
No matter what the intent or group behind the cybercrime, someone has to make
the malware. In the past, a single programmer would make malware for his or her own
use, or perhaps to sell. Today, there are teams and companies dedicated solely to writing
malware. They turn out malware intended to bypass specific security defenses, attack
specific customers, and accomplish specific objectives. And they're sold on the open
market in bidding forums.
Often the malware is multiphased and componentized. A smaller stub program is
tasked with the initial exploitation of the victim's computer, and once securely placed to
ensure it lives through a reboot, it contacts a "mothership" Web server for further
instructions. Often the initial stub program sends out DNS queries looking for the
mothership, itself often a compromised computer temporarily acting as a mothership.
These DNS queries are sent to DNS servers that are just as likely to be innocently infected
victim computers. The DNS servers move from computer to computer, just as the
mothership Web servers do.
42
Once contacted, the DNS and mothership server often redirect the initiating stub
client to other DNS and mothership servers. In this way, the stub client is directed over
and over (often more than a dozen times) to newly exploited computers, until eventually
the stub program receives its final instructions and the more permanent malicious
program is installed.
All in all, the setup used by today's malware writers makes it very difficult for IT
security pros to defend against their wares.
THE INCREASINGLY COMPROMISED WEB
At the most basic level, a website is simply a computer, just like a regular end-user
workstation; in turn, Webmasters are end-users like everyone else. It's not surprising to
find the legitimate Web is being increasingly littered with malicious JavaScript
redirection links.
But it's not entirely a matter of Webmasters' computers being exploited that's
leading to the rise in Web server compromises. More often, the attacker finds a weakness
or vulnerability in a website that allows them to bypass admin authentication and write
malicious scripts.
Common website vulnerabilities include poor passwords, cross-site scripting
vulnerabilities, SQL injection, vulnerable software, and insecure permissions. TheOpen
Web Application Security Project Top 10 list is the authority on how most Web servers
get compromised.
Many times it isn't the Web server or its application software but some link or
advertisement that gets hacked. It's fairly common for banner ads, which are often placed
and rotated by general advertising agencies, to end up infected. Heck, many times the
malware guys simply buy ad space on popular Web servers.
ALL-IN-ONE MALWARE
Today's sophisticated malware programs often offer all-in-one, soup-to-nuts
functionality. They will not only infect the end-user but also break into websites and
modify them to help infect more victims. These all-in-one malware programs often come
43
with management consoles so that their owners and creators can keep track of what the
botnet is doing, who they are infecting, and which ones are most successful.
Most malicious programs are Trojan horses. Computer viruses and worms have
long since ceased to be the most popular types of malware. In most cases, the end-user is
tricked into running a Trojan horse that's advertised as a necessary antivirus scan, disk
defragmentation tool, or some other seemingly essential or innocuous utility. The user's
normal defenses are fooled because most of the time the Web page offering the rogue
executable is a trusted site they've visited many times. The bad guys simply compromised
the site, using a host of tricks, and inserted a few lines of JavaScript that redirect the user's
browsers to the Trojan horse program.
Because many of the evildoers present themselves as businessmen from
legitimate corporations, complete with corporate headquarters, business cards, and
expense accounts, it's not always so easy to separate the legitimate ad sources from the
bad guys, who often begin advertising a legitimate product only to switch out the link in
the ad to a rogue product after the ad campaign is under way. One of the more interesting
exploits involved hackers compromising a cartoon syndicate so that every newspaper
republishing the affected cartoons ended up pushing malware. You can't even trust a
cartoon anymore.
Another problem with hacked websites is that the computers hosting one site can
often host multiple sites, sometimes numbering in the hundreds or thousands. One
hacked website can quickly lead to thousands more.
No matter how the site was hacked, the innocent user, who might have visited this
particular website for years without a problem, one day gets prompted to install an
unexpected program. Although they're surprised, the fact that the prompt is coming from
a website they know and trust is enough to get them to run the program. After that, it's
game over. The end-user's computer (or mobile device) is yet another cog in someone's
big botnet.
44
CYBER WARFARE
Nation-state cyber warfare programs are in a class to themselves and aren't
something most IT security pros come up against in their daily routines. These covert
operations create complex, professional cyber warfare programs intent on monitoring
adversaries or taking out an adversary's functionality, but as Stuxnet andDuqu show, the
fallout of these methods can have consequences for more than just the intended targets.
Crime and no punishment
Some victims never recover from exploitation. Their credit record is forever scarred by a
hacker's fraudulent transaction, the malware uses the victim's address book list to
forward itself to friends and family members, victims of intellectual property theft spend
tens of millions of dollars in repair and prevention.
The worst part is that almost none of those who use the above malicious attacks are
successfully prosecuted. The professional criminals on the Internet are living large
because the Internet isn't good at producing court-actionable evidence. It's anonymous
by default, and tracks are lost and covered up in milliseconds. Right now we live in the
"wild, wild West" days of the Internet. As it matures, the criminal safe havens will dry up.
Until then, IT security pros have their work cut out for them.
Definitions: Risk = Threat X Vulnerability
Being “at risk" is being exposed to threats.
Risks are subjective -- the potential to incur consequences of harm or loss
of target assets.
A Risk Factor is the likelihood of resources being attacked.
Threats are dangerous actions that can cause harm. The degree of
threat depends on the attacker's Skills, Knowledge, Resources, Authority, and
Motives.
Vulnerabilities are weaknesses in victims that allow a threat to become effective.
45
Who They Are
A rogue user is an authorized user who, without permission, accessing restricted
assets.
A bogie is an unauthorized user who subverts security systems.
A cracker breaks into others' computing facilities for their own personal gain - be
it financial, revenge, or amusement.
A hacktivistis a cracker with a cause. (Example of hactivism: Building Peekabooty
to get around governments blocking websites)
A terrorist uses fear to blackmail others into doing what they want.
White Hats are also called “ethical" hackers, such as the Axent (now Symantec)
Tiger Team
Black Hats disregard generally accepted social conventions and laws.
Script kiddie is a derogatory term for a wannabe cracker who lacks programming
skills and thus relies on prewritten scripts and toolkits for their exploits.
Journeyman is an experienced hacker: someone who has collected many tools
and made many connections.
A Puppet Master (wizard) produces exploits.
Malware is a generic term for malicious software such as trojan horses, worms,
and viruses.
Warez is a nickname for pirated software (illegal copies of copyrighted software).
Serialz are serial numbers illegally shared used to unlock software.
46
UNIT-2
Fundamentals of Information Security:
Key Elements of Networks, Logical Elements of Networks, Critical Information
Characteristics, Information States etc.
Work Effectively with Colleagues (NOS 9002)
KEY ELEMENTS OF NETWORKS
Computer networks share common devices, functions, and what features
including servers, clients, transmission media, shared data, shared printers and other
hardware and software resources, network interface card(NIC), local operating
system(LOS), and the network operating system (NOS).
Servers - Servers are computers that hold shared files, programs, and the network
operating system. Servers provide access to network resources to all the users of the
network. There are many different kinds of servers, and one server can provide several
functions. For example, there are file servers, print servers, mail servers, communication
servers, database servers, fax servers and web servers, to name a few.
Clients - Clients are computers that access and use the network and shared network
resources. Client computers are basically the customers (users) of the network, as they
request and receive services from the servers.
Transmission Media - Transmission media are the facilities used to interconnect
computers in a network, such as twisted-pair wire, coaxial cable, and optical fiber cable.
Transmission media are sometimes called channels, links or lines.
Shared data - Shared data are data that file servers provide to clients such as data files,
printer access programs and e-mail.
Shared printers and other peripherals -Shared printers and peripherals are hardware
resources provided to the users of the network by servers. Resources provided include
data files, printers, software, or any other items used by clients on the network.
Network Interface Card - Each computer in a network has a special expansion card
called a network interface card (NIC). The NIC prepares (formats) and sends data,
47
receives data, and controls data flow between the computer and the network. On the
transmit side, the NIC passes frames of data on to the physical layer, which transmits the
data to the physical link. On the receiver's side, the NIC processes bits received from the
physical layer and processes the message based on its contents.
Local Operating System - A local operating system allows personal computers to access
files, print to a local printer, and have and use one or more disk and CD drives that are
located on the computer. Examples are MS-DOS, UNIX, Linux, Windows 2000, Windows
98, Windows XP etc.
Network Operating System - The network operating system is a program that runs on
computers and servers, and allows the computers to communicate over the network.
Hub - Hub is a device that splits a network connection into multiple computers. It is like
a distribution center. When a computer requests information from a network or a specific
computer, it sends the request to the hub through a cable. The hub will receive the request
and transmit it to the entire network. Each computer in the network should then figure
out whether the broadcast data is for them or not.
Switch - Switch is a telecommunication device grouped as one of computer network
components. Switch is like a Hub but built in with advanced features. It uses physical
device addresses in each incoming messages so that it can deliver the message to the right
destination or port.
Like a hub, switch doesn't broadcast the received message to entire network, rather
before sending it checks to which system or port should the message be sent. In other
words, switch connects the source and destination directly which increases the speed of
the network. Both switch and hub have common features: Multiple RJ-45 ports, power
supply and connection lights.
LOGICAL ELEMENTS OF NETWORKS
A network element is usually defined as a manageable logical entity uniting one
or more physical devices. This allows distributed devices to be managed in a unified way
using one management system. According to Telecommunications Act of 1996, the term
`network element' means a facility or equipment used in the provision of a
telecommunications service. Such term also includes features, functions, and capabilities
48
that are provided by means of such facility or equipment, including subscriber numbers,
databases, signaling systems, and information sufficient for billing and collection or used
in the transmission, routing, or other provision of a telecommunications service.
With development of distributed networks, network management had become an
annoyance for administration staff. It was hard to manage each device separately even if
they were of the same vendor. Configuration overhead as well as misconfiguration
possibility were quite high. A provisioning process for a basic service required complex
configurations of numerous devices. It was also hard to store all network devices and
connections in a plain list. Network structuring approach was a natural solution.
CRITICAL INFORMATION CHARACTERISTICS
Availability
Availability enables users who need to access information to do so without
interference or obstruction, and to receive it in the required format.
Availability of information
Is accessible to any user.
Requires the verification of the user as one with authorized access to the
information.
The information, then, is said to be available to an authorized user when and
where needed and in the correct format.
Example:-
Consider the contents of a library
Research libraries that require identification before
entrance.
Librarians protect the contents of the library, so that it is
available only to authorized patrons.
49
The librarian must see and accept a patron’s proof of
identification before that patron has free and easy access to
the contents available in the bookroom.
Accuracy
Information is accurate
when it is free from mistakes or errors and
It has the value that the end user expects.
Information contains a value different from the user’s expectations due to
the intentional or unintentional modification of its content, it is no longer
accurate.
Example :-
Consider the checking account
Inaccuracy of the information in your checking account can
be caused by external or internal means.
If a bank teller, for instance, mistakenly adds or subtracts too
much from your account, the value of the information has
changed.
In turn, as the user of your bank account, you can also
accidentally enter an incorrect amount into your account
register. This also changes the value of the information.
Authenticity
Authenticity of information is the quality or state of being genuine or original,
rather than a reproduction or fabrication.
Information is authentic when it is the information that was originally
Created,
Placed,
Stored, or
Transferred.
Example :-
Consider for a moment some of the assumptions made about e-mail.
50
When you receive e-mail, you assume that a specific individual or group of
individuals created and transmitted the e-mail—you assume know the
origin of the e-mail. This is not always the case.
E-Mail spoofing, the process of sending an e-mail message with a modified
field, is a problem for many individuals today, because many times the field
modified is the address of the originator.
Spoofing the address of origin can fool the e-mail recipient into thinking
that the message is legitimate traffic.
In this way, the spoofer can induce the e-mail readers into opening e-mail
they otherwise might not have opened.
The attack known as spoofing can also be applied to the transmission of
data across a network, as in the case of user data protocol (UDP) packet
spoofing, which can enable unauthorized access to data stored on
computing systems.
Confidentiality
The confidentiality of information is the quality or state of preventing disclosure
or exposure to unauthorized individuals or systems.
Confidentiality of information is ensuring that only those with the rights and
privileges to access a particular set of information are able to do so, and that those
who are not authorized are prevented from obtaining access.
When unauthorized individuals or systems can view information, confidentiality
is breached.
To protect the confidentiality of information, you can use a number of measure:
Information classification
Secure documents storage
Application of general security policies
Education of information custodians and end users
Example:-
Ex: 1 A security is an employee throwing away a document containing
critical information without shredding it.
51
Ex: 2 A hacker who successfully breaks into an internal database of a Webbased organization and steals sensitive information about the clients such as
Names
Addresses and
Credit card numbers.
Integrity
The quality or state of being whole, complete, and uncorrupted is the integrity
of information.
The integrity of information is threatened when the information is exposed to
Corruption,
Damage,
Destruction, or
Other disruption of its authentic state.
The threat of corruption can occur while information is being stored or
transmitted.
Many computer viruses and worms have been created with the specific purpose
of corrupting data.
For this reason the key method for detecting the virus or worm
1. First Key methodology is to look for changes in file integrity as shown by the size
of the file.
2. Another key methodology for assuring information integrity is through file
hashing.
With file hashing, a file is read by a special algorithm that uses the value
of the bits in the file to compute a single large number called a Hash value.
The hash value for any combination of bits is different for each
combination.
Utility
The Utility information is the quality or state of having value for some purpose or
end.
52
Information has value when it serves a particular purpose. This means that if
information is available, but not in a format meaningful to the end user, it is not
useful.
Possession
The Possession of information is the quality or state of having ownership or
control of some object or item.
Information is said to be in possession if one obtains it, independent of format or
other characteristic.
A breach of confidentiality always results in a breach of possession, a breach of
possession does not always result in a breach of confidentiality.
Example:-
Assume a company stores its critical customer data using an encrypted file
system.
An employee, who has quit, decides to take a copy of the tape backups to
sell the customer records to the competition.
The removal of the tapes from their secure environment is a breach of
possession, because the data is encrypted, neither the employee nor
anyone else can read it without the proper decryption methods, therefore
there is no breach of confidentiality.
INFORMATION STATES
Different States of the Information that is processed between two or more
Communication entities.
53
UNIT-3
Data Leakage:
What is Data Leakage and Statistics, Data Leakage Threats, Reducing the Risk of Data Loss,
Key Performance Indicators (KPI), Database Security etc.
WHAT IS DATA LEAKAGE?
Definition: Data Leakage is the unauthorized transmission of data (or
information) from within an organization to an external destination or recipient. This
may be electronic, or may be via a physical method. Data Leakage is synonymous with the
term Information Leakage. The reader is encouraged to be mindful that unauthorized
does not automatically mean intentional or malicious. Unintentional or inadvertent data
leakage is also unauthorized.
Definition: Data leakage is defined as the accidental or unintentional distribution
of private or sensitive data to an unauthorized entity.
Sensitive data in companies and organizations include intellectual property (IP),
financial information, patient information, personal credit-card data, and other
information depending on the business and the industry.
Data leakage poses a serious issue for companies as the number of incidents and
the cost to those experiencing them continue to increase. Data leakage is enhanced by the
fact that transmitted data (both inbound and outbound), including emails, instant
messaging, website forms, and fi le transfers among others, are largely unregulated and
unmonitored on their way to their destinations.
Furthermore, in many cases, sensitive data are shared among various
stakeholders such as employees working from outside the organization’s premises (e.g.,
on laptops), business partners, and customers. This increases the risk that confidential
information will fall into unauthorized hands. Whether caused by malicious intent or an
inadvertent mistake by an insider or outsider, exposure of sensitive information can
seriously hurt an organization.
54
The potential damage and adverse consequences of a data leakage incident can be
classified into two categories: direct and indirect losses.
Direct losses refer to tangible damage that is easy to measure or to estimate
quantitatively.
Indirect losses, on the other hand, are much harder to quantify and have a much
broader impact in terms of cost, place, and time [Bunker, 2009].
Direct losses include violations of regulations (such as those protecting customer
privacy) resulting in fines, settlements or customer compensation fees; litigation
involving lawsuits; loss of future sales; costs of investigation and remedial or restoration
fees.
Indirect losses include reduced share price as a result of negative publicity;
damage to a company’s goodwill and reputation; customer abandonment; and exposure
of intellectual property (business plans, code, financial reports, and meeting agendas) to
competitors.
Data leakage can occur in many forms and in any place. In a 2009 Data Breach
Investigation Report (by the Verizon Business RISK team), 90 data breaches occurring in
2008 were analyzed. In addition to the significant number of compromised records (285
million), the investigation revealed other interesting aspects of this problem as well. One
of the most intriguing aspects revealed by the compiled data is that most breaches have
been caused by external parties (74%). However, the number of breaches resulting
exclusively from the actions of insiders is still significant (20%). Incidents in which
business partners have been involved account for 32% of the total. According to the
nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199
individual records containing sensitive personal information were involved in security
breaches in the United States between January 2005 and May 2008.
STATISTICS
Some recent high-profile leakage incidents, selected from www.datalossdb.org,
are presented in Table 3.1. This sample of recent leakage incidents emphasizes the
55
difficulty of providing a “one-stop-shop” silver-bullet solution for preventing all data
leakage scenarios.
TABLE 3.1 DATA LEAKAGE INCIDENTS
Date Organization Description
Oct. 2008 UPS A UPS employee’s laptop
containing payroll
information for 9000 U.K.
employees was stolen. In
response UPS announced
that it will encrypt all data
stored on all the company’s
mobile devices.
Sept. 2011 Science Applications
International Corp
Backup tapes stolen from a
car containing 5,117,799
patients’ names, phone
numbers, Social Security
numbers, and medical
information.
Oct. 2009 U.S. National Archive U.S. National Archive and
Records administration
improperly disposed of
hard drives containing 76
million names, addresses,
and SSNs of US military
veterans.
July 2008 Google Data were stolen, not from
Google offices, but from the
headquarters of an HR
outsourcing company, Colt
56
Express. The thieves broke
in and stole company
computers containing
unencrypted data
including names, addresses
and SSNs of Google
employees. As a result,
Google terminated its
partnership with Colt
Express.
Jan. 2008 Stockport Primary Care
Trust (U.K.)
A member of staff lost a
USB memory stick
containing data extracted
from the medical records of
patients. The data were
being carried personally to
avoid sending them by email because the employee
thought that they would be
more secure.
June 2004 AOL An employee of America
Online Inc. stole the
computerized employee
identification code of
another AOL worker to
gain access to AOL’s
subscriber data. He then
stole 92 million email
addresses belonging to 30
million subscribers and
sold them to spammers.
57
July 2009 American Express DBA stole a laptop
containing thousands of
American Express card
numbers. The DBA
reported it stolen, “…he
(DBA) was one of the few
who could have possibly
downloaded all their
account holders’
information, including the
PIN numbers used to
access money from ATM
machines at various
banks.”
2007 Wagner Resource Group An employee of a McLean
investment firm decided to
trade some music using a
file-sharing network while
using the company
computer. In doing so, he
inadvertently opened the
private files of his firm,
Wagner Resource Group, to
the public. Social Security
numbers, dates of birth,
and names of 2,000 clients
were exposed.
Aug. 2007 Nuclear Laboratory in Los
Alamos
An employee of the U.S.
nuclear laboratory in Los
Alamos transmitted
confidential information by
58
email. The incident was
classified as a serious
threat to the country’s
nuclear safety
Feb. 2008 Eli Lilly & Co. One of Eli Lilly & Co.’s
subcontracted lawyers at
Philadelphia-based Pepper
Hamilton mistakenly
emailed confidential Eli
Lilly discussions to Times
reporter Alex Berenson
(instead of to Bradford
Berenson, her co-counsel),
costing Eli Lilly nearly $1
billion.
Sep. 2007 Scarborough & Tweed The Web servers of
Scarborough & Tweed, a
company that sells
corporate gifts online, were
compromised and
information about 570
customers may have been
accessed using an SQL
injection attack. The
information included
customers’ names,
addresses, telephone
numbers, account
numbers, and credit card
numbers.
59
May 2009 Alberta Health Services Personal health
information on thousands
of Albertans was skimmed
from the Alberta Health
Services Edmonton
network as a computer
virus infected the network
and stole medical
information on 1,582
people, including
laboratory test results and
diagnostic imaging reports.
The virus captured
information from a
computer screen and then
transmitted it to an
external website.
Apr. 2009 Prague hotel (Czech
Republic)
A data leakage incident
occurred in a Prague hotel
(Czech Republic). The fl
ight details and passport
numbers of approximately
200 EU leaders were
leaked by accident. The
data was related to an EUUS summit held in Prague
and attended by U.S.
President Obama.
Jan. 2009 Heartland Payment
Systems
Malicious software/hack
compromised tens of
millions of credit and debit
60
card transactions. “The
data include the digital
information encoded onto
the magnetic stripe …
thieves can fashion
counterfeit credit cards…”
2003 British Intelligence A British intelligence
report in the form of a
Word document containing
the names of the authors of
a paper in its revision log
metadata was cited by the
United States in a speech to
the United Nations. The
metadata showed that the
report was in fact written
by U.S. researchers
DATA LEAKAGE THREATS
The above sample also indicates that enterprises should broaden the focus of their
security efforts beyond merely securing network perimeters and internal hosts from
classic threats i.e., viruses, Trojan horses, worms, D/DoS attacks and intrusions.
Classified into two types:
1. Internal threats –or inadvertent?
2. External threats.
61
INTERNAL THREATS – INTENTIONAL OR INADVERTENT?
According to data compiled from EPIC.org and PerkinsCoie.com, 52% of Data
Security breaches are from internal sources compared to the remaining 48% by external
hackers.
The noteworthy aspect of these figures is that, when the internal breaches are examined,
the percentage due to malicious intent is remarkably low, at less than 1%. The corollary
of this is that the level of inadvertent data breach is significant (96%). This is further
deconstructed to 46% being due to employee oversight, and 50% due to poor business
process.
INTENTIONAL INTERNAL DATA LEAKAGE OR SABOTAGE
Whilst the data presented suggests the main threat to internal data leakage is from
inadvertent actions, organizations are nevertheless still at risk of intentional
unauthorized release of data and information by internal users. The methods by which
insiders leak data could be one or many, but could include mediums such as Remote
Access; Instant Messaging; email; Web Mail; Peer-to-Peer; and even File Transfer
Protocol. Use of removable media, hard copy, etc is also possible.
Motivations are varied, but include reasons such as corporate espionage, financial
reward, or a grievance with their employer. The latter appears to be the most likely.
According to a study conducted by The US Secret Service and CERT, 92% of insider
related offences was following a “negative work-related event”. Of these, the offenders
were predominantly male (96%) and the majority held technical roles (86%). Whilst the
consequences of these attacks related not just to data, of the attacks studied, 49%
included the objective of “sabotaging information and/or data”. An example of such an
attack is described in the USSS/CERT study as follows, note how the characteristics match
the findings above (highlighted in bold):
“An application developer, who lost his IT sector job as a result of company
downsizing, expressed his displeasure at being laid off just prior to the Christmas
holidays by launching a systematic attack on his former employer’s computer network.
………. He also sent each of the company’s customers an email message advising that the
62
Web site had been hacked. Each email message also contained the customer’s usernames
and passwords for the Web site.”
UNINTENTIONAL INTERNAL DATA LEAKAGE
A significant amount of data security breaches are due to either employee
oversight or poor business process. This presents a challenge for businesses as the
solution to these problems will be far greater than simply deploying a secure content
management system. Business processes will need to be examined, and probably reengineered; personnel will need to be retrained, and a cultural change may be required
within the organization. These alone are significant challenges for a business. A recent
example of what is probably unintentional featured an Australian employment agency’s
web site publishing “Confidential data including names, email addresses and passwords
of clients” from its database on the public web site. An additional embarrassing aspect of
this story was the fact that some of the agency’s staff made comments regarding
individuals, which were also included. For instance, “a client is referred to as a ‘retard’
and in another a client is called a ‘lazy good for nothing’”. This alone raises the possibility
of legal action from those clients.
INTERNAL DATA LEAKAGE VECTORS
INSTANT MESSAGING / PEER-TO-PEER
Many organizations allow employees to access Instant Messaging from their
workstations or laptops, with a 2005 estimate suggesting 80% of large companies in the
US having some form of Instant Messaging. This includes products such as MSN
Messenger; Skype; AOL; GoogleTalk; ICQ; and numerous others. Many of the clients
available (and all of those mentioned here) are capable of file transfer. It would be a
simple process for an individual to send a confidential document (such as an Excel file
containing sensitive pricing or financial data) to a third party. Equally a user could divulge
confidential information in an Instant Messaging chat session.
63
Instant Messaging is also increasingly becoming a vector for Malware. For example the
highly popular Skype has been targeted in recent times.Recent examples of malware
targeting Skype include W32/Pykse.worm.b, W32/Skipi.A and W32.Pykspa.D
Instant Messaging Data Leakage Vector
Peer-to-peer (P2P) also presents a significant threat to data confidentiality. Popular P2P
clients include eDonkey and BitTorrent, with the latter appearing to have between 50 and
75% share of global P2P traffic.It has recently been described as “new national security
risk” by Retired General Wesley K. Clark, who is a board member with an organization
that scans through peer-to-peer networks for confidential or sensitive data. He
commented “We found more than 200 classified government documents in a few hours
search over P2P networks” and “We found everything from Pentagon network server
secrets to other sensitive information on P2P networks that hackers dream about”. A few
moments consideration regarding the implications of these findings will yield the issue
of potential widespread distribution and availability of the data. The number of potential
users on P2P networks that could access the confidential or sensitive data is enormous.
64
EMAIL
Traditional email clients, such as Microsoft Outlook, Lotus Notes, Eudora, etc are
ubiquitous within organizations. An internal user with the motivation could email a
confidential document to an unauthorized individual as an attachment. They may also
choose to compress and / or encrypt the file, or embed it within other files in order to
disguise its presence. Steganography may also be utilized for this purpose. Alternatively,
instead of attaching a document, text could be copied into the email message body.
Email also represents a vector for inadvertent disclosure due to employee
oversight or poor business process. An employee could attach the wrong file
inadvertently, select the wrong recipient in the email, or even be tricked into sending a
document through social engineering.
Email Data Leakage Vector
WEB MAIL
Web Mail is well entrenched with users. Gmail, Yahoo, and Hotmail are popular
examples. It represents another way for an individual to leak confidential data, either as
an attachment or in the message body. Because Web Mail runs over HTTP/S a firewall
may allow it through un-inspected as port 80 or 443 will in most organizations be
65
allowed, and the connection is initiated from an internal IP address. HTTPS represents a
more complex challenge due to the encryption of the traffic.
WEB LOGS / WIKIS
Web Logs (Blogs) are web sites where people can write their thoughts, comments,
opinions on a particular subject. The blog site may be their own, or a public site, which
could include the input from thousands of individuals. Blogs could be used by someone
to release confidential information, simply through entering the information in their blog.
However, they would most likely be able to be tracked, so this is perhaps a less likely
medium. A wiki site is “a collaborative website which can be directly edited by anyone
with access to it”, such as wikipedia.org. These sites are often available to most internet
users around the world, and contain the possibility that confidential information may be
added to a wiki page.
MALICIOUS WEB PAGES
Web sites that are either compromised or are deliberately malicious, present the
risk of a user’s computer being infected with malware, simply by visiting a web page
containing malicious code with an OS/browser that contains a vulnerability. The malware
could be in the form of a key logger, Trojan, etc. With a key logger the risk of data theft is
introduced. A recent example was the Miami Dolphin’s (host to the NFL Super Bowl XLI)
web site being compromised. Users with vulnerabilities MS06-014 and MS07-004 would
download a key logger/backdoor, “providing the attacker with full access to the
compromised computer”.
FILE TRANSFER PROTOCOL (FTP)
FTP is included in this discussion as it represents another (perhaps less likely)
method for an individual to release information. It is straightforward to install and
configure a basic FTP server external to the organization (or it may be a special folder on
a competitor’s FTP server). The individual then merely has to install a publicly available
FTP client and upload the file or files to the server. This method could even utilize a “dead
drop” public FTP site hosted off-shore, where the third party also has access. As FTP is a
popular protocol there is the likelihood it will be allowed through the firewall. FTP is
66
probably more likely to be used in intentional leakage than unintentional leakage, due to
the fact that uploading a file to an FTP server is generally not something an average user
performs on a daily basis, nor would do inadvertently, as compared to attaching a file to
an email.
FTP Data Leakage Vector
REMOVABLE MEDIA / STORAGE
Symantec reported in March 2007 that “Theft or loss of a computer or data storage
medium, such as a USB memory key, made up 54 percent of all identity theft-related data
breaches”. In March 2007, the price for a 2GB USB Flash Drive (brand withheld) was
US$23.19 on Amazon.com (roughly 1.1c per MB). This is very cheap removable storage.
Copying a large spreadsheet or document (say 500MB) onto a USB key is effortless. The
user merely needs to insert the device, open Windows Explorer, and drag and drop the
target files to the device. The key is then removed, placed in the employees pocket and
walked out of the building. Alternatively, if the user has a CD or DVD burner on their
laptop or desktop, they can copy the information that way. Due to their small size, USB
keys are also easy to lose. Even if the copying of data onto the key is legitimate, the risk
67
exists that the key could be lost by the user and found by a third party. Other forms of
USB mass storage include portable hard drives, digital cameras, and even musical devices
such as an Apple iPod – one model contains an 80GB hard drive. A proof-of-concept
application called slurp.exe, written by Abe Usher, has the ability to automatically copy
all business documents (e.g. .doc, .xls, .ppt, etc) from a PC connected to a device such as
an iPod that is running the application. Various Firewire and Bluetooth devices are also
capable of holding corporate data. Are companies going to ban employees from bringing
their iPod to work because of the threat of data leakage? It seems unlikely.
EXTERNAL THREATS
According to the Privacy Rights Clearinghouse, in 2005 US companies exposed the
personal information of over 53 million people.
DATA THEFT BY INTRUDERS
An ever-popular topic in the media is the electronic break-in to an organization by
intruders including the theft of sensitive information. There have been numerous stories
in the press of the theft of credit card information by intruders (note that the press often
refer to intruders as hackers). In 2005 it was estimated that as many as 40 Million credit
card numbers were stolen by intruders from MasterCard, VISA, American Express, and
other credit card brands.
More recently, Monster.com lost hundreds of thousands (potentially as many as
1.3 million) of job site users’ IDs to intruders “…hackers grabbed resumes and used
information on those documents to craft personalized "phishing" e-mails to job seekers.”
This particular event holds significant concern, because resumes contain a significant
amount of information about an individual, including their full name, address, phone
number(s), employment history, interests, and possibly contact details of third parties,
such as referees. This allows for particularly targeted, and if crafted well, believable
phishing attacks, or perhaps even more audacious social engineering attacks such as
phone calls. Another scenario to consider is that phishers may start developing
fraudulent employment web sites, and attempt to attract users to send their resumes
68
directly to them. This is slightly outside the scope of this paper however it is important
that this possibility is pointed out, as I believe it is a vector yet to emerge.
SQL INJECTION
Web sites that use an SQL server as the back end database may be vulnerable to
SQL Injection attacks, if they fail to correctly parse user input. This is usually a direct
result of poor coding. SQL Injection attacks can result in content within the database
being stolen. For example, a site that does not correctly sanitize user input may cause a
server error to occur. For example:
The initial action of the attack could be to enter a single quote within the input
data in a POST element on a website, which may generate an SQL statement as follows:
SELECT info
FROM table
WHERE search = ‘mysearch’’
Note the additional quote mark. Should the application not sanitize the user input
correctly a server error may occur. This indicates to the attacker that the user input is not
being sanitized and that the site is vulnerable to further exploitation. Further trial and
error by the attacker could eventually reveal table names, field names, and other
information, that, once obtained, will allow them to construct an SQL query within the
POST element that yields sensitive data
MALWARE
In recent years, the SirCam worm would, after infecting a computer, scan through
the My Documents folder and send a file at random out via email to the user’s email
contacts. If malware is classified as a zero day threat, and there is no signature yet
available, there is a higher likelihood that the malware will evade inbound gateway
protection measures and desktop anti-virus. Once this malware infects a PC, it may then
initiate outbound communications, potentially sending out files which may contain
sensitive data. One aspect to be mindful of is that to a firewall, the traffic is from an
69
internal source. This is an important point, because most firewalls will not restrict traffic
that is initiated internally via an acceptable protocol.
Malware Data Leakage Vector
PHISHING AND PRE-PHISHING
Phishing sites, and the spam email that solicits visits to them, pose a threat to
organizations, and not just individuals. Phishing spam may be received at peoples’ work
email address. Should they be fooled into visiting the phishing site, then they may lose
personal information and or financial information. It is also possible that the spam
received directs them to a site hosting malware, which could download a key logger (as
previously discussed). Phishers have recently been using the lure of tax returns from
various taxation offices as a means to fool people. For example in Australia, the Australian
Tax Office has been targeted by phishers.29 Phishing is of course a form of social
70
engineering (which will be discussed shortly). Phishing activity has increased
significantly in the past ten months, to a peak of almost 45,000 validated phishing sites in
May 2007. There was a significant decline after May 2007 (back to November / December
2006 levels). Figures obtained from phishtank.com follow on the next page.
PRE-PHISHING
Pre-phishing is emerging as a new method used by phishers, initially as a
reconnaissance attack. Instead of attempting to directly obtain credentials for a financial
site, social networking and email sites are targeted. The attack seeks to obtain username
and password combinations, on the (likely) assumption that in many cases, users will use
the same or similar combinations on other web sites. The second part of the attack is to
conduct a CSS History Hack, where the phishers can determine whether the user has
visited specified sites.31 The CSS History Hack uses the ‘a: visited’ component in CSS
which alters the behavior of links that have been visited.32 Banking sites visited by users
may be obtained, and the phishers can then visit these and attempt to gain access using
the compromised credential combinations.
SOCIAL ENGINEERING
Without going into excessive detail about Social Engineering, some of the common
scenarios and risks include:
• Phone calls to Help Desk from a social engineer claiming to be an employee in
another office, desperate for a password reset.
• Phone calls to unsuspecting employees from social engineer tricking them into
sending out sensitive information. Individuals that would not recognize the fact
that the information is sensitive are prime targets.
• Phishing emails and similar scams which rely on ignorance, stupidity, gullibility,
greed, and many other human frailties, to trick people into divulging private data.
The sad reality is that they do work. We would not be deluged by so much spam if
they didn’t.
71
PHYSICAL THEFT
Physical theft of computer systems, laptops, backup tapes, and other media also
presents a data leakage risk to organizations. This may be due to poor physical security
at an organization’s premises or poor security practice by individuals. For instance, a
laptop may be left unattended in the back seat of a car whilst the owner pays for petrol,
allowing an opportunistic theft to occur. Also possible is the mass theft of laptops from
within an organizations premises after hours, should the business fail to secure the
laptops overnight.
REDUCING THE RISK OF DATA LOSS/ MITIGATION
1. TECHNOLOGY BASED MITIGATION
SECURE CONTENT MANAGEMENT / INFORMATION LEAK PROTECTION
This approach utilizes a number of techniques including lexical analysis of traffic
passing through a specific device on the network, and fingerprinting. A gateway based
device examines the content of the message looking for specific keywords, patterns, and
regular expressions. It and then categorizes the traffic and acts on it accordingly (e.g. pass,
quarantine, notify, block, etc).
Keyword filtering will detect specific words or phrases. For example, an email
exchange between two employees in conflict with one another could trigger a
“Threatening Language” alert. Confidential information being sent out as an attachment
may be detected with the word “Confidential” or phrase “Commercial in confidence” for
instance.
Dictionaries extend keyword filtering through the inclusion of pre-built wordlists.
Regular Expressions will detect patterns of characters or digits. For example a
sixteen digit sequence could represent a credit card number. It is essential that an
organization have a clear understanding of the format of data contained within its
databases in order to develop appropriate expression lists. For example, a customer
72
record within a database will have a number of fields. Each field will have a specified
maximum length and will have a name.
Regular Expressions can be tailored to identify such fields being transmitted. This
may also mitigate the risk of SQL injection attacks from retrieving confidential
information from databases accessible via the web.
Data fingerprinting is a technology that will analyze data at rest and build a
database of fingerprints. Fingerprinting involves the creation of a number of hashes for a
given document. This collection of hashes forms the document “fingerprint” and will be
stored in a database. Fingerprinting is done initially on a document “at rest”, and is
achieved by either having a user drop a document into a special network folder, or by
agents deployed on workstations which catalogue and fingerprint documents on the
workstations. If a user attempts to send out a document that has been fingerprinted, the
outbound document will be fingerprinted and compared to the database of known
hashes. Detection should extend to replicas of the document, or if the document has been
modified.
Clustering is a technique which focuses on groups of documents which are similar,
by correlating words, word counts, and patterns across the group of documents.
Implementation of a Secure Content Management Solution will help mitigate the
threat of confidential information being released through electronic channels (including
email, FTP, HTTP, Web mail, IM) and also, with some vendors, removable media, for both
intentional and inadvertent activity. For instance Australian software developer Lync
Software, produces a suite of products which control the ability of users to copy files to
removable media37. These products provide sufficient granularity to define policies for
specific users or computers, groups, or Active Directory domains, and what file types they
can copy to removable media (e.g. USB thumb drive). For example it is then possible to
prevent a specific computer user from copying Microsoft Word documents onto a USB
device.
As an example, the screenshot below displays the creation of a rule to prevent MS
Word files (.doc) from being copied onto a USB. Having selected the appropriate file type
the ‘Write’ permission can then be set to Block, as seen below:
73
USB Protection 1
The administrator may then specify the type of device. As can be seen below, some of the
possibilities include USB Storage, iPods, DVD/CDR, Scanners, etc.
USB Protection 2
Solutions such as LyncRMS utilize an agent based approach, where software
agents are installed on desktops and laptops and run in the background, quietly enforcing
company policy. When selecting a Secure Content Management solution it is important to
give consideration to the following:
74
• Rate of False Positives. High rates of FP will result in increased workload in analyzing
and responding to events. They may also result in reduced productivity due to the
prevention of legitimate documents and messages from reaching employees.
• Rate of False Negatives. As with other security measures, a high rate of false negatives
will lead to a false sense of security, plus potentially placing the organization in jeopardy
from confidential data which is leaked without being identified.
• Ability to scan attachments. Solutions that merely analyze the content of email or web
pages will fail to detect confidential data leaked via file attachments.
• Range of file formats able to be scanned.
• Ability to fingerprint data at rest and in motion.
• Ability to detect data flooding, file type/format manipulation, hidden or embedded data,
and graphical files (e.g. print screens)
Other considerations include
• Provision of in-built compliance mechanisms, for SOX, HIPAA, and GLBA. Certain
vendors provide this capability, where the product will look for general and related
terms, and codes relevant to any or all of these compliance programs.
• Whether or not an agent based approach is used.
• Inspection of all content – i.e. Headers, body, attachments
• Communication mediums – i.e. email (including platforms), IM/P2P, FTP, HTTP (Web
mail and Blogs), and VOIP.
• Automated enforcement of policy – i.e. the solution should automatically block any
traffic that violates the policies, preventing the protected data being leaked.
• Reporting and auditing capabilities – these are essential as they provide management
with the knowledge of any unauthorized activity (be it intentional or inadvertent), and
provides a mechanism to demonstrate the compliance with any relevant regulations.
75
Advantages: High granularity of control; pre-defined compliance requirements built-in;
wide range of coverage.
Disadvantages: Initial cost may be high; ongoing management may require dedicated
resources, so ongoing costs may also be high.
REPUTATION SYSTEMS
A growing solution to Spam/Phishing/etc is to deploy a Reputation based solution
where the email sender must have an acceptable reputation score in order to be allowed.
This type of system effectively supersedes older Black-list / White-list systems (including
Real Time varieties from organizations such as ORBS.org). Reputation solutions will
mitigate the risk of receiving email from untrustworthy or unknown sources.
A definition of ‘reputation’: “the estimation in which a person or thing is held,
especially by the community or public generally”.
A key point with this definition is the use of the phrase “community or public
generally”. This conveys the sense that reputation is achieved by widespread assessment,
rather than one or two individual’s opinions (which in the past is how a company could
be added to a Blacklist).
Today, we now have a number of vendors offering what are called “Reputation
Services” and it is certain that more vendors will follow suit.
One of the key differences with the current generation is the use of legitimate
corporate email to build a positive reputation, as well as building negative reputations
for poor behavior. Blacklists and ORBS essentially only provide half the picture - negative
reputation. They may also block entire domains or net blocks rather than one offending
IP address.
To achieve this, Reputation Services capture and analyze billions of email every
month from customer reporting nodes (the thousands of appliances deployed worldwide). This email is correlated and analysis performed to determine a number of
behavioral attributes for each sender. The more email received from a sender the better
the reputation score can become – or – the worse the reputation can become.
76
Now is an appropriate time to reflect upon the earlier point with regard to reputation
– “community or public generally”. Traffic from thousands of sources worldwide is
correlated to determine the behavior and then reputation of sender IP addresses. For
example, IronPort’s Reputation Filters features a network of over 100,000 organizations
that feed email data into their reputation service correlation engines.
If the behavior deviates from what is normal, the reputation of the sender will be
updated, and distributed to the vendor’s customer base. For example if a cable modem
home user is infected with a spam engine, their email activity will jump significantly. The
traffic from their IP address will be detected as being unusually high (as previously it
would have been negligible) and the reputation score altered. This information is then
distributed back to the customer base. After this point, any requests for connection from
the offending IP address will be denied (subject to the configuration of customer
appliances). Should the infected system then be cleaned, the traffic will fall back to a
minimal level, and reputation systems will detect this change and improve the reputation
score, to the point where the IP address will be accepted.
Advantages: Remove additional processing by identifying which IP addresses to
terminate connections with; reduce spam and malicious email and web sites. Reputation
services can detect malicious traffic emerging from new IP addresses and domains. It will
complement existing AntiVirus/AntiSpyware products.
Disadvantages: May involve additional cost, probably on a subscription basis.
THIN CLIENT / VIRTUAL DESKTOP INFRASTRUCTURE
Companies should consider the possibility of utilizing thin clients, which provide
users with a ‘walled garden’ containing only the applications they need to do their work,
via a diskless (and USBless) terminal. This will prevent a user from copying data to
portable media, however if they have email or web access as an application (most likely),
it will still be possible for them to send information out via email, web mail, or blog.
Examples of vendors that provide Thin Client systems are hp, Sun, and Wyse Technology.
Another solution is Application Streaming, featuring a cut-down virtual operating system
that includes authorized applications being streamed to a users PC, either within the
77
network or from a remote location. This may also be used within a Thin Client
environment.
MINIMIZING LEAKAGE VIA CD OR DVD
To prevent data being copied onto CD or DVD an organization could have a policy
of providing systems without these devices. Laptops may present more of a challenge, as
most are supplied with a DVD writer nowadays. However one solution could be to
implement a Standard Operating Environment which removes burning media from
systems, and monitor for systems that have unauthorized installation of burning software
by users.
ANTIVIRUS / ANTISPYWARE / ANTIPHISHING
Traditional AntiVirus / AntiSpam / AntiPhishing products should prevent, in most
cases, users from either being infected by malicious code which may steal data, or from
visiting a Phishing site. All products in this space feature malware signature databases,
and some feature some form of “intelligence” - a heuristic detection mechanism to
identify malware which does not have a known signature - aimed at capturing zero day
threats
PROTECTIVE MARKINGS
Some vendors develop products that provide Protective Markings. Protective
Markings address the issue of Security Classification errors (or intentional actions).
This solution requires the sender of an email to explicitly state what level of
classification the email they are sending belongs to, and the recipient must have a security
clearance of at least the level of classification specified. This helps to protect data from
inadvertent or intentional unauthorized release. An email marked Top Secret will not be
able to be sent to a user with a classification of Secret or below.
Often used by Governments (for example the UK and Australian Governments),
different classification models are available. For example, in the UK, the classification
model includes the classifications TOP SECRET, SECRET, CONFIDENTIAL, and
RESTRICTED.45 The Australian Government has a more elaborate list, including
78
PERSONAL, UNCLASSIFIED, IN-CONFIDENCE, PROTECTED, HIGHLY-PROTECTED,
RESTRICTED, CONFIDENTIAL, SECRET, and TOP SECRET. Some further definitions are
also available for some of these classification levels.
Corporations may also benefit from this, especially with regard to protection of
intellectual property and confidential communications via email. A classification model
including PERSONAL, UNOFFICIAL, UNCLASSIFIED, X-IN-CONFIDENCE, PROTECTED,
and HIGHLY PROTECTED may be suitable for business.
Protective Markings are implemented via modification of the subject line, and Internet
message header (X-Protective-Marking). Protective Markings are also available for
Microsoft Office products.
Advantages: Enforces the flow of email between classification levels, preventing
inadvertent or intentional sending of classified information to unauthorized recipients.
Disadvantages: Cost will be involved; initial deployment cost involved; users may be
resistant to change.
APPLICATION PROXY FIREWALLS
Stateful Inspection firewalls will examine traffic at the Transport or Network layer
and either allow it to pass through, or block it based on its rule set. For example a rule
that allows inbound SMTP connections to a mail server may look something like this:
access-list 101 permit tcp any host 10.1.2.3 eq smtp
This rule will examine the packet headers to ensure that the conditions in the rule
are satisfied, however this type of firewall does not examine the payload. As such Stateful
Inspection does not apply the same rigor as a genuine Application Proxy Firewall, which
works on all seven layers of the OSI model, and examines the payload of each packet.
Application Proxy Firewalls in essence strip down the traffic, and re-assemble it again,
analyze the behavior, only sending it to its destination if acceptable. A number of popular
protocols are understood by the Application Proxy Firewall, based on RFCs, and should
an application not comply with the expected behavior, the traffic will stop. The
connection from the source is terminated at the Application Proxy Firewall, analyzed, and
if acceptable another connection is made between the Application Proxy Firewall and the
79
destination. Hence there is no direct connection established between source and
destination (which is not the case with Stateful Inspection). Examples of Application
Proxy Firewalls include Secure Computing’s Sidewinder48. Readers should be aware of
the difference between a true Application Proxy Firewall, and a Stateful Inspection
Firewall that also utilizes application attack signatures. The latter may not prevent a zeroday application attack as there will be no signature, whereas the Application Proxy
Firewall will prevent the attack despite the signature of the attack being unknown,
because the behavior does not comply with acceptable standards. When deciding
between these types of firewall readers should carefully evaluate the performance of an
application proxy firewall against a stateful inspection firewall with application
signatures enabled, rather than a stateful inspection firewall without application
signatures.
80
KEY PERFORMANCE INDICATORS (KPI)
A Key Performance Indicator is a measurable value that demonstrates how
effectively a company is achieving key business objectives. Organizations use KPIs at
multiple levels to evaluate their success at reaching targets. High-level KPIs may focus on
the overall performance of the enterprise, while low-level KPIs may focus on processes
in departments such as sales, marketing or a call center.
What makes a KPI effective?
A KPI is only as valuable as the action it inspires. Too often, organizations blindly
adopt industry-recognized KPIs and then wonder why that KPI doesn't reflect their own
business and fails to affect any positive change. One of the most important, but often
81
overlooked, aspects of KPIs is that they are a form of communication. As such, they abide
by the same rules and best-practices as any other form of communication. Succinct, clear
and relevant information is much more likely to be absorbed and acted upon.
In terms of developing a strategy for formulating KPIs, your team should start with
the basics and understand what your organizational objectives are, how you plan on
achieving them, and who can act on this information. This should be an iterative process
that involves feedback from analysts, department heads and managers. As this fact
finding mission unfolds, you will gain a better understanding of which business processes
need to be measured with KPIs and with whom that information should be shared.
Being SMART about your KPIs
One way to evaluate the relevance of a KPI is to use the SMART criteria. The letters
are typically taken to stand for specific, measurable, attainable, relevant,time-bound.
In other words:
Is your objective Specific?
Can you Measure progress towards that goal?
Is the goal realistically Attainable?
How Relevant is the goal to your organization?
What is the Time-frame for achieving this goal?
Seven Characteristics of effective KPIs
NonFinancial
They are non-financial measures (not expressed in dollars, yen, pounds, Euro, etc.)
Timely They are measured frequently (e.g., 24/7, daily or weekly)
CEO focus They are acted upon by the CEO and senior management team
82
Simple All staff understand the measure and what corrective action is required
Team-based
Responsibility can be assigned to a team or a cluster of teams who work closely
together
Significant
impact
They affect more than one of the organization’s top Critical Success Factors and
more than one balanced scorecard perspective
Limited dark
side
They encourage appropriate action - i.e., they have been tested to ensure they have
a positive impact on performance (whereas poorly thought through measures can
lead to dysfunctional behaviour)
IDENTIFYING KPIS OF ORGANIZATION
Performance indicators differ from business drivers and aims (or goals). A school might
consider the failure rate of its students as a key performance indicator which might help
the school understand its position in the educational community, whereas a business
might consider the percentage of income from returning customers as a potential KPI.
The key stages in identifying KPIs are:
Having a pre-defined business process (BP).
Having requirements for the BPs.
Having a quantitative/qualitative measurement of the results and comparison with
set goals.
Investigating variances and tweaking processes or resources to achieve short-term
goals.
Key performance indicators (KPIs) are ways to periodically assess the
performances of organizations, business units, and their division, departments and
employees. Accordingly, KPIs are most commonly defined in a way that is
understandable, meaningful, and measurable. They are rarely defined in such a way such
83
that their fulfillment would be hampered by factors seen as non-controllable by the
organizations or individuals responsible. Such KPIs are usually ignored by organizations.
A KPI can follow the SMART criteria. This means the measure has a Specific purpose for
the business, it is Measurable to really get a value of the KPI, the defined norms have to
be Achievable, the improvement of a KPI has to be Relevant to the success of the
organization, and finally it must be Time phased, which means the value or outcomes are
shown for a predefined and relevant period.
In order to be evaluated, KPIs are linked to target values, so that the value of the measure
can be assessed as meeting expectations or not.
DATABASE SECURITY
All organizations-public, governmental or private, small or large-depend on
computerized information systems for carrying out their daily activity. At the heart of
each such information system, there is a database. At a very general level, we can define
a database as a persistent collection of related data, where data are facts that have an
implicit meaning. For instance, an employee's name, social security number, or date of
birth are all facts that can be recorded in a database. Typically, a database is built to store
logically interrelated data representing some aspects of the real world, which must be
collected, processed, and made accessible to a given user population. The database is
constructed according to a data model which defines the way in which data and
interrelationships between them can be represented. The collection of software
programs that provide the functionalities for defining, maintaining, and accessing data
stored in a database is called a database management system (DBMS).
A database can be seen at different abstraction levels. Typically a three-level view
is adopted (see Figure 1) containing an internal level , describing the physical storage of
the database; a conceptual (or logical level ) providing the users with a high level
description of the real world that the database represents; and an external level
describing the views that different users or applications have on the stored data. The
internal level maps the logical objects supported by the data model to the physical objects
(files) of the underlying operating system (see Figure 2).
84
Beside access and processing functionalities, each DBMS must also provide
security functionalities to ensure the secrecy, integrity, and availability of the stored data.
Providing secrecy means ensuring that data will not be disclosed to unauthorized users.
Providing integrity means ensuring that data will not be modified in an unauthorized or
improper way.
In particular, integrity ensures that the stored data correctly reflect the real world.
85
Providing availability means ensuring that the database will always be accessible by
legitimate users for the accesses they are authorized for.
Since ultimately a database is mapped to (i.e., stored as) files of the underlying
operating system, one may think that a DBMS does not need to deal with security as
security functionalities of the operating system would suffice. This is not true, however,
since at the operating system level the data interrelationships and their semantics are
lost and therefore security restrictions exploiting concepts of the data model cannot be
enforced. Some of the differences between databases and operating systems that make it
necessary for a DBMS to support security features are as follows.
Protection level: A DBMS usually needs to protect data at a fine granularity level
(e.g., a record of a file), while an operating system protects data at the file level.
Object differences: There is a greater variety of object types in a DBMS than in an
operating system. The typical object type in an operating system is a file; in a DBMS there
can be relations (tables), tuples (rows within a table), attributes (columns within a table),
indexes, metadata, and others.
Data interrelationships: A database may include many logical objects with complex
semantic interrelationships that must be protected. By contrast, the number of physical
objects that the operating system protects is less and no semantic interrelationships are
supported.
Dynamic versus static objects: Data objects in a DBMS can be obtained by
dynamically aggregating data from different physical objects in an operating system. By
contrast, files tend to be more static making their protection easier.
Lifetime of data: The lifetime and frequency of access of data in a DBMS is quite
different than the lifetime of data stored as files in an operating system.
User views of data: While in an operating system, users are either granted or
denied access to data (files), in a DBMS it is possible to give access to a portion of an object
by defining different views for different users.
Because of these differences, it is clear that some security requirements must be
supported by the DBMS itself. Of course, the DBMS can rely on basic security services
86
provided by the underlying operating system. Typical security services provided by the
operating system that can be exploited by the DBMS are physical security controls,
authentication and auditing. Physical security protects against intentional or accidental
threats, like fire or natural disasters. Physical security measures also control the physical
access to the computer system on which the database is hosted. Examples of physical
measures are the use of locks, security guards, badges, and alarms. Authentication is a
means of verifying the identity of a party to another, and is a prerequisite for DBMS
security controls to ensure that the correct identity of users is being considered (i.e., users
are who they claim to be). The simplest form of authentication is based on the use of
passwords: users state their identity with a login identifier and provide a secret
password. Finally, auditing is the post facto evaluation of a system's activities, which must
therefore be properly logged. Auditing services can be used to perform online analysis to
determine possible security violations and to recover the correct state of the database in
the case integrity has been compromised.
The overall DBMS/OS architecture is depicted in Figure 3. In this chapter, we
mainly concentrate on basic security services that are available to users in commercial
DBMSs for access control and integrity constraints enforcement. Since these controls
cannot cope with Trojan horse attacks, we include a brief description of the multilevel
secure DBMSs.
87
ACCESS CONTROL POLICIES
Access control policies define the rules according to which access to the database
objects is regulated. The most popular class of access control policies is represented by
discretionary access control (DAC) policies, where the word discretionary characterizes
the fact that users can be given the ability of passing their privileges to others.
Discretionary access control policies are based on authorizations rules. An authorization
rule states that a subject has the privilege to exercise a given action on a given object. The
kind (and granularity) of subjects, objects, and actions that can be referenced in
authorizations may be different in different systems.
Subjects: Subjects are the entities to which authorizations can be granted.
Typically, subjects are users (i.e., identifiers corresponding to human entities). User
groups can also be defined to which authorizations can be granted; authorizations
granted to a group can be enjoyed by all its members. Discretionary access control can be
extended with role-based capabilities allowing the definition of roles to which privileges
can be granted. Roles are granted to users, and users can dynamically activate and
deactivate the roles received, thereby turning on and off the corresponding privileges.
Intuitively, a role identifies a task, and corresponding privileges, that users need to
execute to perform organizational activities. While groups are set of users, roles are set
of privileges. Note the difference between groups and roles. Groups are static: users
cannot enable and disable group memberships (and corresponding privileges) at their
will. By contrast, roles are dynamic and can be activated and deactivated upon explicit
request by users.
Objects: Objects are the entities to be protected. Typically, objects correspond to
information container (tables or portion of it) or procedures. In DBMS systems, different
granularity levels can be supported spanning from the whole database to the single
element (e.g., a specific employee's salary) in it.
Actions: Actions define the specific operations that subjects can execute on
objects. Actions to be supported include the operations corresponding to the basic read,
write, delete, create, and execute, which can take on different names in relational
database systems (for instance, read operations correspond to SELECT actions).
88
Authorizations: Authorizations define which accesses are to be allowed. The
simplest form of authorization is a triple (subject, object, action) specifying that subject
is authorized to exercise action on object.
89
UNIT-4
Information Security Policies, Procedures and Audits:
Information Security Policies-Necessity-Key Elements and Characteristics, Security Policy
Implementation, Configuration, Security Standards-Guidelines and Frameworks etc.
INFORMATION SECURITY POLICIES-NECESSITY-KEY ELEMENTS AND CHARACTERISTICS
INFORMATION SECURITY POLICIES
Information Security Policy /ISP/ is a set or rules enacted by an organization to
ensure that all users or networks of the IT structure within the organization’s domain
abide by the prescriptions regarding the security of data stored digitally within the
boundaries the organization stretches its authority.
An ISP is governing the protection of information, which is one of the many assets
a corporation needs to protect. The present writing will discuss some of the most
important aspects a person should take into account when contemplates developing an
ISP. Putting to work the logical arguments of rationalization, one could say that a policy
can be as broad as the creators want it to be: Basically, everything from A to Z in terms of
IT security, and even more. For that reason, the emphasis here is placed on a few key
elements, but you should make a mental note of the liberty of thought organizations have
when they forge their own guidelines.
ELEMENTS OF INFORMATION SECURITY POLICY
PURPOSE
Institutions create ISPs for a variety of reasons:
To establish a general approach to information security
To detect and forestall the compromise of information security such as misuse of
data, networks, computer systems and applications.
To protect the reputation of the company with respect to its ethical and legal
responsibilities.
90
To observe the rights of the customers; providing effective mechanisms for
responding to complaints and queries concerning real or perceived noncompliances with the policy is one way to achieve this objective.
SCOPE
ISP should address all data, programs, systems, facilities, other tech infrastructure,
users of technology and third parties in a given organization, without exception.
The four components of security documentation are policies, standards,
procedures, and guidelines. Together, these form the complete definition of a mature
security program. The Capability Maturity Model (CMM), which measures how robust
and repeatable a business process is, is often applied to security programs. The CMM
relies heavily on documentation for defining repeatable, optimized processes. As such,
any security program considered mature by CMM standards needs to have well-defined
policies, procedures, standards, and guidelines.
• Policy is a high-level statement of requirements. A security policy is the primary way in
which management’s expectations for security are provided to the builders, installers,
maintainers, and users of an organization’s information systems.
• Standards specify how to configure devices, how to install and configure software, and
how to use computer systems and other organizational assets, to be compliant with the
intentions of the policy.
• Procedures specify the step-by-step instructions to perform various tasks in accordance
with policies and standards.
• Guidelines are advice about how to achieve the goals of the security policy, but they are
suggestions, not rules. They are an important communication tool to let people know how
to follow the policy’s guidance. They convey best practices for using technology systems
or behaving according to management’s preferences.
SECURITY POLICIES
A security policy is the essential foundation for an effective and comprehensive
security program. A good security policy should be a high-level, brief, formalized
91
statement of the security practices that management expects employees and other
stakeholders to follow. A security policy should be concise and easy to understand so that
everyone can follow the guidance set forth in it.
In its basic form, a security policy is a document that describes an organization’s
security requirements. A security policy specifies what should be done, not how; nor does
it specify technologies or specific solutions. The security policy defines a specific set of
intentions and conditions that will help protect an organization’s assets and its ability to
conduct business. It is important to plan an approach to policy development that is
consistent, repeatable, and straightforward.
A top-down approach to security policy development provides the security
practitioner with a roadmap for successful, consistent policy production. The policy
developer must take the time to understand the organization’s regulatory landscape,
business objectives, and risk management concerns, including the corporation’s general
policy statements. As a precursor to policy development, a requirements mapping effort
may be required in order to incorporate industry-specific regulation. Chapter 3 covered
several of the various regulations as well as best practice frameworks that security policy
developers may need to incorporate into their policies.
A security policy lays down specific expectations for management, technical staff,
and employees. A clear and well-documented security policy will determine what action
an organization takes when a security violation is encountered. In the absence of clear
policy, organizations put themselves at risk and often flounder in responding to a
violation.
• For managers, a security policy identifies the expectations of senior management
about roles, responsibilities, and actions that should be taken by management with
regard to security controls.
• For technical staff, a security policy clarifies which security controls should be
used on the network, in the physical facilities, and on computer systems.
• For all employees, a security policy describes how they should conduct
themselves when using the computer systems, e-mail, phones, and voice mail.
92
A security policy is effectively a contract between the business and the users of its
information systems. A common approach to ensuring that all parties are aware of the
organization’s security policy is to require employees to sign an acknowledgement
document. Human Resources should keep a copy of the security policy documentation on
file in a place where every employee can easily find it.
SECURITY POLICY DEVELOPMENT
When developing a security policy for the first time, one useful approach is to focus on
the why, who, where, and what during the policy development process:
1. Why should the policy address these particular concerns? (Purpose)
2. Who should the policy address? (Responsibilities)
3. Where should the policy be applied? (Scope)
4. What should the policy contain? (Content)
For each of these components of security policy development, a phased approach is used.
PHASED APPROACH
If you approach security policy development in the following phases, depicted in Figure
5-1, the work will be more manageable:
1. Requirements gathering
• Regulatory requirements (industry specific)
• Advisory requirements (best practices)
• Informative requirements (organization specific)
2. Project definition and proposal based on requirements
3. Policy development
4. Review and approval
5. Publication and distribution
93
6. Ongoing maintenance (and revision)
After the security policy is approved, standards and procedures must be
developed in order to ensure a smooth implementation. This will require the policy
developer to work closely with the technical staff to develop standards and procedures
relating to computers, applications, and networks.
SECURITY POLICY CONTRIBUTORS
Security policy should not be developed in a vacuum. A good security policy forms
the core of a comprehensive security awareness program for employees, and its
development shouldn’t be the sole responsibility of the IT department. Every department
that has a stake in the security policy should be involved in its development, not only
because this enables them to tailor the policy to their requirements, but also because they
will be responsible for enforcing and communicating the policies related to each of their
specialties. Different groups and individuals should participate and be represented in
order to ensure that everyone is on board, that all are willing to comply, and that the best
interests of the entire organization are represented. Figure 5-2 shows some example
contributors to the security policy.
When creating a security policy, the following groups may be represented:
94
• Human Resources The enforcement of the security policy, when it involves
employee rewards and punishments, is usually the responsibility of the HR department.
HR implements discipline up to and including termination when the organization’s
policies are violated. HR also obtains a signature from each employee certifying that they
have read and understood the policies of the organization, so there is no question of
responsibility when employees don’t comply with the policy.
• Legal Often, an organization that has an internal legal department or outside
legal representation will want to have those attorneys review and clarify legal points in
the document and advise on particular points of appropriateness and applicability, both
in the organization’s home country and overseas. All organizations are advised to have
some form of legal review and advice on their policies when those policies are applied to
individual employees.
• Information Technology Security policy tends to focus on computer systems,
and specifically on the security controls that are built into the computing infrastructure.
IT employees are generally the largest consumers of the policy information.
• Physical Security Physical Security (or Facilities) departments usually
implement the physical security controls specified in the security policy. In some cases,
the IT department may manage the information systems components of physical security.
95
SECURITY POLICY AUDIENCE
The intended audience for the security policies is all the individuals who handle
the organization’s information, such as:
• Employees
• Contractors and temporary workers
• Consultants, system integrators, and service providers
• Business partners and third-party vendors
• Employees of subsidiaries and affiliates
• Customers who use the organization’s information resources
Figure 5-3 shows a representation of some example security policy audience
members. Technology-related security policies generally apply to information resources,
including software, web browsers, e-mail, computer systems, workstations, PCs, servers,
mobile devices, entities connected on the network, software, data, telephones, voice mail,
fax machines, and any other information resources that could be considered valuable to
the business.
Organizations may also need to implement security policy contractually with
business partners and vendors. They may also need to release a security policy statement
to customers.
96
POLICY CATEGORIES
Security policies can be subdivided into three primary categories:
• Regulatory For audit and compliance purposes, it is useful to include this
specific category. The policy is generally populated with a series of legal statements
detailing what is required and why it is required. The results of a regulatory requirements
assessment can be incorporated into this type of policy.
• Advisory This policy type advises all affected parties of business-specific policy
and may include policies related to computer systems and networks, personnel, and
physical security. This type of policy is generally based on security best practices.
• Informative This type of policy exists as a catch-all to ensure that policies not
covered under Regulatory and Advisory are accounted for. These policies may apply to
specific business units, business partners, vendors, and customers who use the
organization’s information systems.
The security policy should be concise and easy to read, in order to be effective. An
incomprehensible or overly complex policy risks being ignored by its audience and left to
gather dust on a shelf, failing to influence current operational efforts. It should be a series
of simple, direct statements of senior management’s intentions.
The form and organization of security policies can be reflected in an outline format
with the following components:
• Author The policy writer
• Sponsor The Executive champion
• Authorizer The Executive signer with ultimate authority
• Effective date When the policy is effective; generally when authorized
• Review date Subject to agreement by all parties; annually at least
• Purpose Why the policy exists; regulatory, advisory, or informative
• Scope Who the policy affects and where the policy is applied
97
• Policy What the policy is about
• Exceptions Who or what is not covered by the policy
• Enforcement How the policy will be enforced, and consequences for not
following it
• Definitions Terms the reader may need to know
• References Links to other related policies and corporate documents
FRAMEWORKS
The topics included in a security policy vary from organization to organization
according to regulatory and business requirements. We refer to these topics together as
a framework.
Organizations may prefer to take a control objective–based approach to creating
a security policy framework. For instance, government agencies may take a FISMA-based
approach. The Federal Information Security Management Act of 2002 imposes a
mandatory set of processes that must follow a combination of Federal Information
Processing Standards (FIPS) documents, the NIST Special Publications 800 series, and
other legislation pertinent to federal information systems.
POLICY CATEGORIES
NIST Special Publication 800-53, Recommended Security Controls for Federal
Information Systems and Organizations, control objectives are organized into 18 major
categories.
Control objective subsets exist for each major control category and equal at least
170 control objectives. NIST SP 800-53 is a good starting point for any organization
interested in making sure that all the basic control objectives are met regardless of the
industry and whether it is regulated.
ADDITIONAL REGULATIONS AND FRAMEWORKS
An organization that must comply with HIPAA (described in Chapter 3) may map
NIST SP 800-53 control objectives to the HIPAA Security Rule. HIPAA categorizes security
98
controls (referred to as safeguards) into three major categories: Administrative, Physical,
and Technical. As an example, CFR Part 164.312 section (c)(1), which requires protection
against improper alteration or destruction of data, is a HIPAA required control that maps
to NIST 800-53 System and Information Integrity controls.
Some organizations may wish to select a framework based on COBIT (Control
Objectives for Information and related Technology). COBIT is an IT governance
framework and supporting toolset that allows managers to bridge the gap between
control requirements, technical issues, and business risks. Developing policy from a
COBIT framework may take considerable collaboration with the Finance and Audit
departments. Other organizations may need to combine COBIT with ITIL (IT
Infrastructure Library) to ensure that service management objectives are met. ITIL is a
cohesive best-practices framework drawn from the public and private sectors
internationally. It describes the organization of IT resources to deliver business value,
and documents processes, functions, and roles in IT service management.
Still other organizations may wish to follow the OCTAVE (Operationally Critical
Threat, Asset, and Vulnerability Evaluation) framework. OCTAVE is a risk-based strategic
assessment and planning technique for security from CERT (Carnegie Mellon University).
And yet others may need to incorporate the ISO Family (27001 and 27002) from the
International Standards Organization. ISO is a framework of standards that provides best
practices for information security management.
Depending on which regulated industry an organization finds itself in, it is
important to take the time to select an appropriate framework and to map out the
regulatory and business requirements in the first phase of development.
SECURITY MANAGEMENT POLICIES
Managers have responsibilities for security just as employees do. Detailing
expectations for managers is crucial to ensure compliance with senior management’s
expectations.
Employee Nondisclosure Agreements All employees must sign a nondisclosure
agreement that specifies the types of information they are prohibited from revealing
outside the organization. The agreement must be signed before the employee is allowed
99
to handle any private information belonging to the organization. Employees must be
made aware of the consequences of violating the agreement, and signing the agreement
must be a condition of employment, such that the organization may not employ anyone
who fails to sign the agreement.
Nondisclosure Agreements All business partners wishing to do business with
the organization must sign a nondisclosure agreement that specifies the types of
information they are prohibited from revealing outside the organization. The agreement
must be signed before the business partner is allowed to view, copy, or handle any private
information belonging to the organization.
System Activity Monitoring All internal information system servers must be
constantly monitored, 24×7×365, by trained security analysts. At least the following
activities must be monitored:
• Unauthorized access attempts
• Root or Administrator account usage
• Nonstandard behavior of services
• Addition of modems and peripherals to systems
• Any other relevant security events
Software Installation Monitoring All software installed on all servers and enduser systems must be inventoried periodically. The inventory must contain the following
information:
• The name of each software package installed on each system
• The software version
• The licensing status
System Vulnerability Scanning
All servers and end-user systems must be periodically scanned for known
vulnerabilities. The vulnerability scan must identify the following:
100
• Services and applications running on the system that could be exploited to
compromise security
• File permissions that could grant unauthorized access to files
• Weak passwords that could be easily guessed by people or software
Security Document Lifecycle All security documents, including the corporate
security policy, must be regularly updated and changed as necessary to keep up with
changes in the infrastructure and in the industry.
Security Audits Periodic security audits must be performed to compare existing
practices against the security policy.
Penetration Testing Penetration testing must be performed on a regular basis to
test the effectiveness of information system security.
Security Drills Regular “fire drills” (simulated security breaches, without advance
warning) must take place to test the effectiveness of security measures.
Extranet Connection Approval All extranet connections require management
approval before implementation.
Non-Employee Access to Corporate Information Non-employees (such as
spouses) are not allowed to access the organization’s information resources.
New Employee Access Approval Manager approval is required for new
employee access requests.
Employee Access Change Approval Manager approval is required for employee
access change requests.
Contractor Access Approval Manager approval is required for contractor access
requests.
Employee Responsibilities The following categories of responsibilities are
defined for corporate employees. These categories consist of groupings of
responsibilities that require differing levels of access to computer systems and networks.
101
They are used to limit access to computers and networks based on job requirements, to
implement the principles of least privilege and separation of duties.
• General User
• Operator
• System Administrator
• Customer Support Staff
• Customer Engineer
• Management
Security Personnel Responsibilities The following categories of responsibilities
are defined for security personnel. These categories consist of groupings of
responsibilities within the security organization that require differing levels of access to
security information and systems based on job function, in order to implement the
principles of least privilege and separation of duties.
• Security Architect
• Facility Security Officer
• Security Manager
• Technical Security Administrator
Employee Responsibility for Security All corporate employees are responsible
for the security of the computer systems they use and the physical environment around
them.
Sensitive HR Information Sensitive HR information (such as salaries and
employee records) must be separated and protected from the rest of the corporate
network.
Security Policy Enforcement Enforcement of this corporate security policy is the
responsibility of the corporate Human Resources department.
102
HR New Hire Reporting HR must report required information about new hires
to system administrators one week in advance of the new employee’s start date.
HR Termination Reporting HR must report required information about
terminations to system administrators one week before the termination date, if possible,
and no later than the day of termination.
Contractor Information Reporting HR is responsible for managing contractor
information and providing this information to system administrators.
Background Checks HR must perform background checks on new employee
applicants.
Reference Checks HR must perform reference checks on new employee
applicants.
SECURITY STANDARDS
A standard is somewhat more detailed than a policy. Standards describe how to
comply with the policy, and because they are associated with policies, they should be
considered mandatory. Standards are the extension of the policy into the real world—
they specify technology settings, platforms, or behaviors. Security managers responsible
for IT infrastructure will usually spend more time writing standards than they spend on
policy.
Much of the information contained in Chapter 21 and 22 of this book pertains to
settings for Unix and Windows systems. Those settings would typically be the level of
detail that is included in standards. Compare the information in those chapters against
the set of policy statements listed in the previous section of this chapter. You’ll see that
policy statements are simple, direct, and somewhat general. Standards interpret the
policy to the level of specifics needed by a subject matter expert.
SECURITY STANDARD EXAMPLE
The following is a sample of a security standard. This is part of a standard for
securing Linux servers. It is intended to establish a baseline set of configurations that
would establish common settings across all Linux platforms on the network. Notice that
103
the level of detail is very deep—only an experienced system administrator would be able
to understand some of these instructions. That is typical of a standard, as opposed to a
policy, which everyone should be able to understand regardless of their level of expertise.
1. PURPOSE
1.1. The purpose of this standard is to define the software and hardware
configurations required to secure Linux servers. It defines security settings for operating
system and software that are required by policy.
2. SCOPE
2.1. This standard is to be used by system administrators responsible for
administration of computers using the Red Hat Enterprise Linux operating system.
3. RESPONSIBILITIES
3.1. The Security Manager is responsible for defining this standard. 3.2. The Server
team is responsible for following this standard.
4. STANDARD
4.1. SERVICES
4.1.1. Specific services that are required for general operation of the
systems and resident vendor applications services are to be reviewed for security
risks and approved by the Security Manager.
4.1.2. Services that are not needed are to be disabled during boot.
4.2. INITIAL PASSWORD AND LOGIN SETTINGS
4.2.1. All accounts for system administrators are to be added as local
accounts in the /etc/passwd and /etc/shadow files. NIS is not to be used for
password verification.
4.2.2. Privileged user accounts require IT system operations and
applications manager approval before being placed on system.
4.2.3. No developer accounts are allowed on production servers.
104
4.2.4. All administration user accounts are to be set with 90 day password
aging, 7 day notification of password expiration, and 7 day password minimum.
4.2.5. All root and application administrator accounts are to be reviewed
and will have a scheduled password change by operations administrators once
every 90 days.
4.2.6. The default login setting is to be set to lock out the session after 3
failed password login attempts.
4.2.7. Default password settings must enforce a minimum of 8 characters.
4.2.8. The ability to log in directly over the network to the root account
must be disabled.
4.3. SENDMAIL
4.3.1. The sendmail service is to be disabled on all non-mail servers unless
required by an application running on the system. Applications requiring
Sendmail services must first be approved by IT system operations manager.
4.4. BANNER/NOTICE
4.4.1. Configure the login banner with the standard warning notice.
4.5. LOGGING
4.5.1. Turn on logging for Internet standard services.
4.5.2. Turn on logging for LOG_AUTHPRIV facility.
4.5.3. Log connection tracing to inetd/xinetd and messages sent to AUTH
facility. 4.5.4. Set logging for sudo activities.
4.5.5. Send all kernel authorization, debug, and daemon notices to a syslog
server for monitoring, reviewing, and archiving
SECURITY PROCEDURES
Procedures are step-by-step instructions to perform a specific task.
105
SECURITY PROCEDURE EXAMPLE
In this example, notice that the level of detail is more specific than that found in
both policies and standards. The procedure is a set of instructions that a system
administrator would perform when sitting at the keyboard of the computer being built.
Most people will not understand this information—it is very specialized, and intended
only for someone who is a system administrator. The type of specialized information
found in a security procedure is usually very job-specific.
1. PURPOSE
1.1. This procedure is intended for the security installation of Apache web servers.
It defines the steps necessary to ensure a secure installation that complies with
security policy.
2. SCOPE
2.1. This procedure is to be used by system administrators responsible for
installing the Apache HTTP server.
3. RESPONSIBILITIES
3.1. The Security Manager is responsible for defining this procedure.
3.2. Any system administrator installing Apache HTTP server on the network is
responsible for following this procedure.
4. APACHE WEB SERVER SECURITY PROCEDURE
4.1. Compile and install the server software as follows:
4.1.1. ./configure --prefix=/usr/local/apache --disable-module=all --
serveruid=apache --server-gid=apache --enable-module=access --enablemodule=log_ config --enable-module=dir --enable-module=mime --enablemodule=auth
4.1.2. make
4.1.3. su
106
4.1.4. umask 022
4.1.5. make install
4.1.6. chown -R root:sys /usr/local/apache
4.2. The next step is to limit Apache processes’ access to the filesystems. Start this
process by creating a new root directory structure under the /chroot/httpd directory:
4.2.1. mkdir -p /chroot/httpd/dev
4.2.2. mkdir -p /chroot/httpd/etc
4.2.3. mkdir -p /chroot/httpd/var/run
4.2.4. mkdir -p /chroot/httpd/usr/lib
4.2.5. mkdir -p /chroot/httpd/usr/libexec
4.2.6. mkdir -p /chroot/httpd/usr/local/apache/bin
4.2.7. mkdir -p /chroot/httpd/usr/local/apache/logs
4.2.8. mkdir -p /chroot/httpd/usr/local/apache/conf
4.2.9. mkdir -p /chroot/httpd/www
4.3. Next, create the special device file: /dev/null:
4.3.1. ls -al /dev/null
4.3.2. crw-rw-rw- 1 root wheel 2, 2 Mar 14 12:53 /dev/null
4.3.3. mknod /chroot/httpd/dev/null c 2 2
4.3.4. chown root:sys /chroot/httpd/dev/null
4.3.5. chmod 666 /chroot/httpd/dev/null
4.4. Add the following line to the /etc/rc.conf file:
4.4.1. syslogd_flags=“-l /chroot/httpd/dev/log”
4.5. Restart the system.
107
4.6. Copy the main httpd program into the new directory tree with all
necessary binaries and libraries, as follows:
4.6.1. localhost# ldd /usr/local/apache/bin/httpd
4.7. Copy the files to the new root directory structure:
4.7.1. cp /usr/local/apache/bin/httpd
/chroot/httpd/usr/local/apache/ bin/
4.7.2. cp /var/run/ld-elf.so.hints /chroot/httpd/var/run/
4.7.3. cp /usr/lib/libcrypt.so.2 /chroot/httpd/usr/lib/
4.7.4. cp /usr/lib/libc.so.4 /chroot/httpd/usr/lib/
4.7.5. cp /usr/libexec/ld-elf.so.1 /chroot/httpd/usr/libexec/
SECURITY GUIDELINES
Guidelines give advice. They are not mandatory—they are just suggestions on how
to follow the policy. Guidelines are meant to make life easier for the end user, as well as
for the security manager who wrote the policy, because they help people understand how
to meet the goals set by the security policy.
SECURITY GUIDELINE EXAMPLE
In this example, the password complexity rules of the password policy are
translated into a set of easy-to-follow suggestions. There may be other ways to select a
password to be compliant with the policy, but these guidelines are intended to simplify
the process for the end users while at the same time allowing them to make strong
passwords. Notice that unlike standards and procedures, the material is easy for
everyone to read and understand.
1. PURPOSE
1.1. These guidelines are meant to give you some ideas about how to create a good
password. Our password policy requires a certain amount of complexity, which can result
in difficult-to-remember passwords, but these guidelines should help you comply with
108
our password policy while at the same time making it easier for you to choose a
memorable password.
2. SCOPE
2.1. These guidelines are for all people who have computer accounts on our
network. 3. RESPONSIBILITIES
3.1. The Security Manager is responsible for defining, maintaining, and publishing
these guidelines.
4. PASSWORD SELECTION GUIDELINES
4.1. Do:
4.1.1. Use as many different characters as possible including numbers,
punctuation characters, and mixed upper- and lowercase letters. Choosing
characters from the largest possible range will make your password more secure.
4.1.2. Use both upper- and lowercase letters.
4.1.3. Use at least one number and one punctuation mark.
4.1.4. Select passwords that are easy to remember, so they do not have to
be written down.
4.2. Don’t use any of the following easily guessed items in your password:
4.2.1. Your name, the names of any family or friends, names of fictional
characters
4.2.2. Phone number, license or social security numbers
4.2.3. Any date
4.2.4. Any word in the dictionary
4.2.5. Passwords of all the same letter or any variation on the word
“password”
4.2.6. Simple patterns on the keyboard, like qwerty
109
4.2.7. Any word spelled backwards
4.3. Suggestions:
4.3.1. Use the first one or two letters of each word in a phrase, song, or
poem you can easily remember. Add a punctuation mark and a number.
4.3.2. Or, use intentionally misspelled words with a number or punctuation
mark in the middle.
4.3.3. You can also alternate between one consonant and one or two
vowels, and include a number and a punctuation mark. This provides a
pronounceable nonsense word that you can remember.
4.3.4. Or you can choose two short words and concatenate them together
with a punctuation character between them,
4.3.5. Or, interlace two words or a word and a number (like a year) by
alternating characters.
110
UNIT-5
Information Security Management- Roles and Responsibilities:
Security Roles and Responsibilities, Accountability, Roles and Responsibilities of Information
Security Management, Team Responding to Emergency Situation- Risk Analysis Process etc.
INTRODUCTION TO INFORMATION SECURITY MANAGEMENT SYSTEM
An information security management system (ISMS) is a set of policies
concerned with information security management or IT related risks. The governing
principle behind an ISMS is that an organization should design, implement and maintain
a coherent set of policies, processes and systems to manage risks to its information assets,
thus ensuring acceptable levels of information security risk.
As with all management processes, an ISMS must remain effective and efficient in
the long term, adapting to changes in the internal organization and external
environment. ISO/IEC 27001:2005 therefore incorporated the "Plan-Do-Check-Act"
(PDCA), or Deming cycle, approach:
The Plan phase is about designing the ISMS, assessing information security risks and
selecting appropriate controls.
The Do phase involves implementing and operating the controls.
The Check phase objective is to review and evaluate the performance (efficiency and
effectiveness) of the ISMS.
In the Act phase, changes are made where necessary to bring the ISMS back to peak
performance.
ISO/IEC 27001:2005 is a risk based information security standard, which means
that organizations need to have a risk management process in place. The risk
management process fits into the PDCA model given above.
However, the latest standard, ISO/IEC 27001:2013, does not emphasise the
Deming cycle anymore. The ISMS user is free to use any management process
(improvement) approach like PDCA or Six Sigmas DMAIC.
111
Another competing ISMS is Information Security Forum's Standard of Good
Practice (SOGP). It is more best practice-based as it comes from ISF's industry
experiences.
Some best-known ISMSs for computer security certification are the Common
Criteria (CC) international standard and its predecessors Information Technology
Security Evaluation Criteria (ITSEC) and Trusted Computer System Evaluation
Criteria (TCSEC).
Some nations publish and use their own ISMS standards, e.g. the Department of
Defense (DoD) Information Technology Security Certification and Accreditation Process
(DITSCAP) of USA, the Department of Defense Information Assurance Certification and
Accreditation Process (DIACAP) of USA, the German IT baseline protection, ISMS of Japan,
ISMS of Korea, Information Security Check Service (ISCS) of Korea.
Other frameworks such as COBIT and ITIL touch on security issues, but are mainly
geared toward creating a governance framework for information and IT more generally.
COBIT has a companion framework Risk IT dedicated to Information security.
NEED FOR ISMS
Information technology security administrators should expect to devote
approximately one-third of their time addressing technical aspects. The remaining
two-thirds should be spent developing policies and procedures, performing
security reviews and analyzing risk, addressing contingency planning and
promoting security awareness;
Security depends on people more than on technology;
Employees are a far greater threat to information security than outsiders;
Security is like a chain. It is only as strong as its weakest link;
The degree of security depends on three factors: the risk you are willing to take,
the functionality of the system and the costs you are prepared to pay;
Security is not a status or a snapshot, but a running process.
These facts inevitably lead to the conclusion that security administration is a
management issue, and not a purely technical issue.
112
The establishment, maintenance and continuous update of an ISMS provide a strong
indication that a company is using a systematic approach for the identification,
assessment and management of information security risks.
CRITICAL FACTORS OF ISMS:
Confidentiality: Protecting information from unauthorized parties.
Integrity: Protecting information from modification by unauthorized users.
Availability: Making the information available to authorized users.
The chief objective of information security management is to implement the
appropriate measurements in order to eliminate or minimize the impact that various
security related threats and vulnerabilities might have on an organization. In doing so,
information security management will enable implementing the desirable qualitative
characteristics of the services offered by the organization (i.e. availability of services,
preservation of data confidentiality and integrity etc.). By preventing and minimizing the
impacts of security incidents, ISMS ensures business continuity, customer confidence,
protect business investments and opportunities, or reduce damage to the business.
Large organizations, banks and financial institutes, telecommunication operators,
hospital and health institutes and public or governmental bodies have many reasons for
addressing information security very seriously. Legal and regulatory requirements which
aim at protecting sensitive or personal data as well as general public security
requirements impel them to devote the utmost attention and priority to information
security risks.
Under these circumstances, the development and implementation of a separate and
independent management process - namely an ISMS - is the only alternative.
The development of an ISMS framework based on ISO/IEC 27001:2005 entails the
following six steps:
1. Definition of security policy,
2. Definition of ISMS scope,
3. Risk assessment (as part of risk management),
4. Risk management,
113
5. Selection of appropriate controls
6. Statement of applicability
CRITICAL SUCCESS FACTORS OF ISMS
To be effective, the ISMS must:
have the continuous, unshakeable and visible support and commitment of the
organization’s top management;
be managed centrally, based on a common strategy and policy across the entire
organization;
be an integral part of the overall management of the organization related to and
reflecting the organization’s approach to risk management, the control objectives and
controls and the degree of assurance required;
have security objectives and activities be based on business objectives and
requirements and led by business management;
114
undertake only necessary tasks and avoiding over-control and waste of valuable
resources;
fully comply with the organization philosophy and mindset by providing a system
that instead of preventing people from doing what they are employed to do, it will
enable them to do it in control and demonstrate their fulfilled accountabilities;
be based on continuous training and awareness of staff and avoid the use of
disciplinary measures and “police” or “military” practices;
be a never ending process;
Information security is no longer simply about patch management and firewalls.
It requires a holistic risk management approach. As organizations increasingly rely on
global networks for supply chain and communications, and amass distributed data in
terabyte amounts, it has become apparent that the old models for computer security are
no longer effective. The exploitation points have correspondingly increased
exponentially. The old model of hiring a couple of security analysts or engineers and
throwing them into the Information Technology department is no longer sufficient to
address the growing needs of data and communications protection. Security can no
longer be left in the hands of the technologists. It must be acknowledged, considered,
embraced, and championed at the highest levels of the organization. In other words, it
must be aligned to the business objectives of the organization to maintain or improve its
value.
What is now required is a risk management approach to security that addresses
the organization as a whole. Risk management cannot be conducted in a silo. It requires
a coordinated and collaborative approach throughout the organization and must be
lifecycle oriented. It is not enough to form a “security department” by putting somebody
in charge, hiring a few security technologists, and calling it a day. Security risk
management must now evolve into a highly defined, quantifiable, justifiable approach to
securing the organization’s assets and reputation against loss. That “ultimate
responsibility” lands on the shoulders of top executives.
So why the change? Now that the Information Age has permeated all aspects of the
business world, the business environment and the information that drives it have become
increasingly dynamic. The information landscape changes daily, and organizations need
to adapt to that change to protect their assets—in other words, manage their risk.
115
ROLES AND RESPONSIBILITIES
At the executive level, there must be overall and/or ultimate responsibility (or
accountability, if you prefer) for risk management. The size of the risk management
organization headed by that executive will vary based on the size of the business. Large
organizations may have all the roles that are defined in this chapter, whereas smaller
organizations may employ a security organization that consists of a few individuals (who
may also share other responsibilities, as long as those responsibilities don’t conflict with
their security roles). Midsize organizations need several security positions ranging from
the technical security administrators who configure firewalls, routers, antivirus software,
and the like, to security engineers who design security controls, managed by a security
manager, director, or senior executive. Large organizations need a complete security
organization. All organizations, large or small, need an executive decision maker who has
been designated as being responsible for security risk.
In addition, the distinctions between large and small organizations and what
security positions they require vary according to what the organization does. Financial
companies typically require a larger and more robust security organization due to the
capital financial risk involved in an event or incident that negatively impacts their
integrity, confidentiality, and availability. Healthcare organizations, along with
businesses in other highly regulated sectors such as publicly traded companies that must
comply with Sarbanes-Oxley rules, and financial companies that are regulated by the
Gramm-Leach-Bliley Act, also require a substantial security organization. Technology
companies may require a midsize or smaller security organization, depending on how
exposed they are to threats, vulnerabilities, and risks from an attack and how much their
security posture is improved by aligning security to business objectives. Every
organization is different.
SECURITY POSITIONS
The following positions are recommended for security organizations. Other
positions also exist outside the formal security organization, because everyone in the
business has some level of responsibility for security. For example, every employee is
responsible for protecting their passwords, their login sessions, and any confidential
116
information they handle. General managers, department heads, and operational leads are
responsible for being familiar with security policy and keeping an eye on the security
practices of their subordinates. They are responsible for ensuring that violations are
reported, and may carry out enforcement policies.
Figure 6-1 shows an example security responsibility hierarchy, with some
descriptions of responsibilities that might pertain to each position.
CHIEF SECURITY RISK OFFICER (CSRO) OR CHIEF INFORMATION SECURITY OFFICER
(CISO)
This position is an executive staff member, with ultimate accountability for all
security efforts for the business. The CSRO oversees all aspects of risk management
across the enterprise, or in organizations without a formal risk management department,
the CISO oversees the information security function and incorporates risk management
into that function. In organizations where the CSRO is responsible for all types of risks
across the business (including financial risks, business risks, and other non-IT risks), the
person in that role will generally establish an IT risk function to oversee IT-related risks
in particular, since the management of IT risks represents a unique discipline requiring
specialized knowledge. Otherwise, the CISO performs that role. The CSRO or CISO should
report to the chief executive officer (CEO), chief operating officer (COO), or the Board of
Directors.
117
While some organizations may consider it controversial to elevate the position to
equal par with chief executives, the criticality of addressing corporate risk and legal
compliance justifies the decision. The CSRO or CISO is a champion and defender of
security and risk initiatives for the business, bearing overall responsibility for risk
assessment and risk management. The CRSO or CISO may hold certifications related to
information security, audit, risk management, and disaster recovery.
In collaboration with the executive staff, the CSRO or CISO should:
• Ensure the business has risk management skills in its human capital
• Establish an organizational structure that supports a risk management strategy
• Implement an integrated risk management framework
• Define the business’ risk appetite in terms of loss tolerance
• Ensure the business can absorb the risk in terms of human and financial
resources
• Establish risk assessment, management, response, mitigation, and audit
procedures
• Influence the business’ risk culture and provide organizational learning
opportunities
SECURITY DIRECTOR
The security director works with the executive team to accomplish business goals.
This position requires expert communication, negotiation, and leadership skills, as well
as technical knowledge of IT and security hardware. While a person who has experience
as a vice president may already possess these skills, the focus of the security director
should be security-oriented and they should be experienced in information security
decision making. The security director has responsibility to oversee and coordinate
security efforts across the business, including IT, HR, Communications, Legal, Facilities,
and other departments, to identify needed security initiatives and standards.
The security director, among other responsibilities:
118
• Coordinates the security-related strategic and visionary goals of the business
• Oversees security management and vendors who safeguard the business’ assets,
intellectual property, and computer systems, as well as the physical safety of employees
and visitors
• Identifies protection goals and objectives consistent with corporate strategic
plans
• Manages the development and implementation of global security policy (rules),
standards (minimum requirements), guidelines (recommendations), and procedures
(step-by-step instructions) to ensure ongoing maintenance of security
• Maintains relationships with local, state, and federal law enforcement and other
related government agencies
• Oversees the investigation of security breaches and assists with disciplinary and
legal matters associated with such breaches as necessary
• Works with outside consultants as appropriate for independent security audits
• Participates in the business’ change management process at the organizational
and strategic level
• Is fluent with the various aspects of the risk management framework
SECURITY MANAGER
The security manager has day-to-day responsibility for all security-related
activities and incidents. All operational security positions report to this position. The
security manager is responsible for management and distribution of the security policy,
policy adherence and coordination, and security incident coordination.
The security manager also assigns and determines ownership of data and
information systems. In addition, this person also ensures that audits take place to
determine compliance with policy. The security manager also makes sure that all levels
of management and administrative and technical staff participate during planning,
development, and implementation of policies and procedures.
119
Many of the security manager’s functions can be delegated, depending on the
staffing requirements and individual skill sets of the security organization. However, the
security manager bears accountability for ensuring that these functions take place
effectively.
Certifications that a security manager may hold include Information Assurance
Manager (IAM) or equivalent and Certified Information Security Manager (CISM) from
ISACA. In addition to other roles, the security manager:
• Develops and maintains a comprehensive security program
• Develops and maintains a business resumption plan for information resources
• Approves access and formally assigns custody of the information resources
• Ensures compliance with security controls
• Plans for contingencies and disaster recovery
• Ensures that adequate technical support is provided to define and select cost
effective security controls
SECURITY ARCHITECT
This person has ultimate responsibility for the security architecture, including
conducting product testing and keeping track of new bugs and security vulnerabilities as
they arise. The security architect produces a detailed security architecture for the
network based on identified requirements and uses this architecture specification to
drive efforts toward implementation. In addition to other roles, the security architect:
• Identifies threats and vulnerabilities
• Identifies risks to information resources through risk analysis
• Identifies critical and sensitive information resources
• Works with the data owner to assess and classify information
• Works with technical management to specify cost-effective security controls and
convey security control requirements to users and custodians
120
• Assists the security manager in evaluating the cost-effectiveness of controls
SECURITY ENGINEER
The primary role of this position is the technical implementation of the architect’s
designs. The security engineer works directly with the architect on design decisions and
with the administrator on device management decisions. Security engineers generally
have a degree in engineering or computer science, along with extensive technical training
or experience, and they often hold Certified Information Systems Security Professional
(CISSP) certification and other technical certifications in their field of expertise. A
security engineer may perform the following duties:
• Installation and configuration of networks and network devices such as web
application firewalls, network firewalls, switches, load balancers, and routers
• Security configuration of Unix, Linux, or Windows servers
• Security configuration of applications and databases
• Installation, configuration, and design of security tools, including development
and coding
• Security incident investigation, including network packet capture
• Maintenance and monitoring of network and host intrusion detection and
prevention technologies
SECURITY ADMINISTRATOR
Every security organization has security administrators, as many as needed to
implement security on a day-to-day, operational/tactical basis at the facility. The security
administrator executes all actions directed by the security architect, security engineer,
security manager, or as required by security policy or incident response procedures. The
security administrator is responsible for ensuring all appropriate security requirements
are met and maintained on all computers, networks, and network technologies, including
patch management and operating system upgrades. The security administrator is often
the first person contacted whenever there is a suspected or known security problem. This
person has the operational/tactical responsibility for ensuring that the business, its
121
reputation, and its assets are protected and has the authority to take any and all action
necessary to accomplish this goal. Among other duties, the security administrator:
• Implements the security controls specified by the security architect, security
engineer, and security manager
• Implements physical and procedural safeguards for information resources
within the facility
• Administers access to the information resources and makes provisions for timely
detection, reporting, and analysis of actual and attempted unauthorized access to
information resources
• Provides assistance to the individuals responsible for information security
• Assists with acquisition of security hardware/software
• Assists with identification of vulnerabilities and other data gathering activities
and log file analysis
• Develops and maintains access control rules
• Maintains user lists, passwords, encryption keys, and other authentication and
security-related information and databases
• Develops and follows procedures for reporting on monitored controls
SECURITY ANALYST
The primary role of this position is to support the security architect, security
engineer, security administrator, and security management in analyzing and producing
reports required for the assessment and smooth functioning of security operations. The
security analyst may hold vendor-oriented certifications such as those offered by Cisco,
Microsoft, Enterasys, Symantec, Oracle, and McAfee. Among other duties, the security
analyst:
• Monitors alerts and reports generated by security systems
122
• Reviews log files as generated by security devices and servers, making note of
anomalies
• Compiles reports as required by management or as specified by security policy
• Maintains security metrics
• Collaborates with security organization team members to assess and analyze
security operations and suggests improvement
• Manages quality control and change management initiatives for the security
organization
• Maintains security policy documentation and ensures that necessary changes are
incorporated as directed by the architect or management
SECURITY INVESTIGATOR
This position is responsible for Legal, HR, and internal investigations into security
incidents, breaches, attacks, and violations. The security investigator often works closely
with law enforcement agencies as needed. Skills required include technical expertise as
well as evidence handling and forensic procedures. The security investigator may hold
industry related certifications in forensics and incident response. Among other duties,
the security investigator:
• Responds to requests from HR, Legal, and other internal departments to
investigate incidents
• Coordinates with outside attorneys or law enforcement representatives
• Collects and preserves evidence from computer systems
• Performs e-discovery and forensic searches for keywords and patterns
• Produces detailed reports on investigations
• Provides information to the HR and Legal departments for action
• Maintains strict secrecy about ongoing investigations
123
SECURITY AWARENESS TRAINER
The primary role of this position is to develop and deliver security awareness
training to the business based on corporate security policy, standards, procedures, and
guidelines. The trainer generally has a background in security as well as in education and
training. The trainer coordinates and collaborates with the security department subject
matter experts to ensure that the training is both comprehensive and accurate. This
position may alternatively reside in another department within the business, typically
Human Resources or Communications.
An important characteristic of this position is that the skill set required for the
delivery of effective security awareness training is not often found within an IT
department, yet the position requires detailed security knowledge. Assigning security
engineers and security administrators to produce training materials can be ineffective,
due to the highly technical nature of their work and the requirement for delivering
training in “plain English.” The trainer must be skilled in interpreting technical
information for the business’ employees in a way that is understandable, fresh,
interesting, and highly relevant.
FACILITY SECURITY OFFICER
The primary role of this position is to enforce the business’ physical security policy
at each building location. Each major facility location should have a security officer
responsible for coordinating all physical security–related activities and incidents at the
facility. The person in this position is not the same person who is operationally
responsible for the computer equipment at the facility. The facility security officer has the
authority to take action without the approval of the management at the facility when
required to ensure physical security. This position also typically works within a Facilities
department rather than IT.
All physical security reports are reviewed by the facility security officer. For
example, this position reviews log files of facility access records, such as key card logs.
The facility security officer is responsible for coordinating all activities related to security
incidents at the facility and has the authority to decide what actions are to be taken as
124
directed by the incident response procedures. The facility security officer coordinates all
activities with the corporate security manager, director, or vice president.
SECURITY INCIDENT RESPONSE
Team Security incident response teams are known by several names. Some are
called SRT for security response team, some are called CIRT for computer incident
response team, and some are called IRT for incident response team (which is the term
used in the following discussion). Regardless of the specific terminology, these teams are
collections of individuals from various parts of the business who are brought together to
handle emergencies. They join the team apart from their daily responsibilities in order to
prepare, practice, and drill for potential emergencies and, in the event of an actual
emergency, handle the situation.
Examples of the types of incidents a response team might handle include
• Hostile intrusions into the network by unauthorized people
• Damaging or hostile software loose on a system or on the network
• Unauthorized access or acceptable use violations resulting in the need for
investigations of personnel
• Virus activity
• Software failures, system crashes, and network outages
• Participation in external investigations by law enforcement, government
regulators, or international watchdog and legal organizations
• Court-ordered discovery, evidentiary, or investigative legal action
• Illegal activities such as software piracy
Every business performs incident response, whether or not they have an official
IRT established. In many businesses where there is no IRT, individual employees perform
incident response by dealing with incidents in their own way. A software virus outbreak
is one example. In businesses without an IRT, employees may choose to install antivirus
software, run specialized virus cleaning software, or just live with a virus infestation. In
125
these situations, no coordination happens and virus response varies with each individual,
usually without enterprise-wide success. One advantage of an organized IRT is that it can
deal with incidents like this on a higher level, with more comprehensive success.
Members of an IRT should include technical experts who can evaluate incidents
like network intrusions, software failures, and virus outbreaks on a technical level;
administrators who can keep logs and maintain the paperwork and electronic
information associated with an incident investigation; managers who coordinate the
work of the IRT members; and, if available, IRT specialists who have served on prior IRTs.
None of these individuals necessarily needs to be assigned to the IRT as a full-time
position. Typically, businesses that establish an IRT leverage employees from many other
parts of the business and ask them to share their responsibilities between their regular
job and the IRT.
An IRT can be assigned individuals with specific technical expertise in a variety of
areas. Depending on the business and the types of technologies used in the infrastructure,
this expertise may include
• Virus management
• Hostile software detection and management
• Vulnerability analysis
• Specific hardware platforms
• Specific operating systems
• Commercial off-the-shelf or open source tools and applications
• Custom-developed or in-house-developed software and/or scripts
SECURITY COUNCIL, STEERING COMMITTEE, OR BOARD OF DIRECTORS
The security organization should be included in all efforts that involve corporate
data and resources. Many different departments handle data, not just IT. For example, the
HR department handles confidential employee information. The Legal department
handles confidential business and customer information. The Facilities department may
126
handle badging and physical access. Generally speaking, every major department in the
business has some level of interaction with business resources and data. All of these
departments should coordinate with the security organization. In most businesses, the
security team meets with almost every manager of the business, and sometimes with
most of the employees.
A security council or steering committee, whose members include representatives
from each major business department, provides a forum for information exchange that
facilitates the job of the security practitioner and identifies business requirements to
which the security organization should be privy. Each Security Council representative
provides status updates of initiatives within that representative’s organization, and each
receives information from the security organization about initiatives and practices that
impact each of them.
The Security Council can be used in a variety of ways. Information gathering is one
important opportunity. Members of the Security Council have unique visibility into the
operation of their part of the business. This visibility is important to the
comprehensiveness of the security practitioner’s focus. For example, a department that
is considering a new technology initiative may not have considered the security impact
on the rest of the network, but the security practitioner, upon hearing about the initiative,
may make conceptual connections overlooked by the individual department.
A Security Council or steering committee can also be an effective risk management
tool. The purpose of a risk analysis is to identify as many business risks as possible, and
then either accept, mitigate, or transfer those risks. Any risks that are overlooked by a
risk analysis put the business in jeopardy if any of those risks become realized. Members
of the Security Council can be polled to identify specific business risks in each of their
specialties, and this provides a risk analysis with a greater scope and better coverage.
Another advantage is that it gives a sense of participation and teamwork to
business departments that may otherwise act independently without consulting each
other, or even compete for resources or produce conflicting infrastructures.
INTERACTION WITH HUMAN RESOURCES
127
Human Resources departments need to provide required information about new
hires to security administrators before the new hires’ start date. This is an important
interaction between HR and IT, even if the security organization is not part of the hiring
procedure. Security administrators need to know at any point in time whose employment
with the business is valid, so they can properly maintain and monitor accounts on
systems and on the network. Perhaps even more important, HR also reports required
information about terminations to system administrators before the final termination
occurs. The security organization is always involved in terminations to some extent,
because employee terminations result in the revocation of trust. When trust is revoked,
assurance must be provided that all access has been revoked, and activity must be
monitored to ensure the maintenance of that revocation.
HR manages contractor information and provides this information to security
administrators. Contractors, as temporary employees, present special problems to
security administrators. They often work for only a short time and sometimes come and
go, resulting in a constant process of granting and revoking physical access and system
and network accounts. It’s hard to tell when seeing a contractor in the hallways whether
they should be there or not. The security of the network relies heavily on the timely
transfer of information from HR to the security organization. HR, in turn, requires timely
information from individual managers regarding the status of their contractors hired
directly and managed individually.
HR performs background checks, credit checks, and reference checks on new
employee applicants. Exit interviews are conducted with terminating employees to
recover portable computers, telephones, smart cards, business equipment, keys, and
identification badges and to identify morale problems if they exist. Employees discharged
for cause must be escorted from the premises immediately and prohibited from
returning, both to reduce the threat of retaliation and to forestall any questions if
unexpected activity occurs on the network or on the premises.
Monitoring the activities of employees is a matter of corporate culture—those
organizations that want to do it differ in the extent and type of response they choose.
Likewise, the treatment of confidential and private information differs from business to
business, but these are issues that should be dealt with by every organization. If an
128
organization hasn’t gotten around to a formal policy on these issues, the best time to start
is now, before a policy violation occurs when there is no clear, documented policy that
has been communicated to all employees. Communication is truly the key to successful
security management. Physical security should not be overlooked, and periodic fire drills
can be used to test security measures, help close any gaps, and avoid the danger of having
a false sense of security.
129
16. Question Bank
130
17. Discussion Topic
o Manage Your Work to Meet Requirements (NOS 9001)
o Work Effectively with Colleagues (NOS 9002)
18. References, Journals, websites and E-links if any
http://www.iso.org/iso/home/standards/managementstandards/iso27001.html
http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf
131
19. Student List
Class/ Section: CSE 3-2, C
S. No. Roll No. Student Name
1 13R11A05B5 AKKINENI SAI LAKSHMI
2 13R11A05B6 AMBAVARAPU SRI SAI JAYA MADHURI
3 13R11A05B7 ANJANI A
4 13R11A05B8 ASHISH MISRA
5 13R11A05B9 AYYAGARI VIJAYA SINDHU
6 13R11A05C0 B POOJA AISHWARYA
7 13R11A05C1 BHARATH CHANDRA KAKANI
8 13R11A05C2 BHIMA SAINATH
9 13R11A05C3 CHRISTO VIJAY
10 13R11A05C4 G APOORVA
11 13R11A05C5 G NIKITHA
12 13R11A05C6 G PRIYESH KUMAR
13 13R11A05C7 G SRIHITHA
14 13R11A05C8 GADILA AKHILA
15 13R11A05C9 GADAGONI SAI CHARAN
16 13R11A05D1 GUNTUKU GIRISH
17 13R11A05D2 JINNA SRIDHAR REDDY
18 13R11A05D4 K PAVAN KUMAR
19 13R11A05D5 KASULA SWAPNA PRIYA
20 13R11A05D7 KADIRE SATHWIKA
21 13R11A05D8 KADIYALA SRIHARSHA
22 13R11A05D9 KASHETTY MADHURI
23 13R11A05E0 KOTHAPALLY LOKESH
24 13R11A05E1 LAKSHMI INDUJA YENNISETTI
25 13R11A05E2 M SHIVA KUMAR
26 13R11A05E3 M LAKSHMI PRAVALLIKA
27 13R11A05E4 MALLARAPU MANASA
28 13R11A05E5 MERUGU SRAVAN KUMAR
29 13R11A05E8 N VAMSHI KRISHNA
30 13R11A05E9 P LAKSHMI SRUTI VEDA
31 13R11A05F0 P POOJITHA REDDY
32 13R11A05F1 P SAI KIRAN REDDY
33 13R11A05F2 PANDA SUSHMA RAJESHWARI
34 13R11A05F3 PARUCHURI DIVYA
35 13R11A05F4 PEDDI REDDY AKHILA REDDY
36 13R11A05F5 PRATYUSH SHARMA
132
37 13R11A05F6 R BHAVANI
38 13R11A05F7 RAGIRI NAVYA
39 13R11A05F8 RAMA HIMA BINDU
40 13R11A05F9 REVATHI SIMHADRI
41 13R11A05G0 RUDHARARAJU MAGADH SAI VARMA
42 13R11A05G1 SHRAVYA ACHA
43 13R11A05G2 SINGARAJU MONICA
44 13R11A05G4 TEJASWEE VEERAVALLI
45 13R11A05G5 TUNGA JAYASREE
46 13R11A05G6 VEERANKI SREE DIVYA
47 13R11A05G7 GANGJI VANDANA
48 13R11A05G8 VELAGAPUDI ANUHYA
49 13R11A05G9 VELAMARTHI RAJKOUSHIK
50 13R11A05H0 VENKATA PATHI RAJU K
51 13R11A05H1 VUCHALA PRASHANTH RAJ
52 13R11A05H2 VUNNAM TARUN SEKHAR
53 13R11A05H3 VUTHPALA ANUDEEP
54 13R11A05H4 GOLLIPALLI JITHENDAR REDDY
Total: 54 Males: 24 Females: 30
Class/ Section: CSE 3-2, D
1 13R11A05H5 A MARY PRISCILLA
2 13R11A05H6 ABHINAY T
3 13R11A05H7 ABHISHEK PAWAR
4 13R11A05H8 ANKEM LAXMI PRASANNA
5 13R11A05H9 AUSULA ANUSHA
6 13R11A05J0 BARELLA SRINIVAS REDDY
7 13R11A05J1 BANTU MUKESH RAJ
8 13R11A05J2 CH V SESHA SAI LALITHA PRIYANKA
9 13R11A05J3 CHANDRA KANTH REVOORI
10 13R11A05J4 AASHISH REDDY D
11 13R11A05J5 DATLA DEEPAK VARMA
12 13R11A05J6 DESHAM HARATHI
13 13R11A05J7 EMANI VENKATA SESHA SAI RAM
14 13R11A05J8 GADDAM ALEKHYA
15 13R11A05J9 G PRATHAM
16 13R11A05K0 GATTU KALKINATH
17 13R11A05K1 SRIKANTH R B
18 13R11A05K2 GOLLAMUDI PRANAV SURYA
133
19 13R11A05K3 GORENTA RAMYA
20 13R11A05K4 GOTETI LALITHA PRIYANKA
21 13R11A05K5 GUDURU UMESH
22 13R11A05K6 KAMBALAPALLY JAYAVARDHAN REDDY
23 13R11A05K7 KAMARAJU SAHASRA
24 13R11A05K8 K SUHAS REDDY
25 13R11A05K9 KANDADAI ABHIRAMAN
26 13R11A05L0 KOVELAMUDI RAMYASRI
27 13R11A05L1 MANVITHA REDDY DONTHI
28 13R11A05L2 MARSAKATLA SARITHA
29 13R11A05L3 N SRI CHINNA SURYA NAGA SAI MANIKAN
30 13R11A05L4 NANDAGIRI AKHILESH
31 13R11A05L5 P SREEKRISHNA KASHYAP
32 13R11A05L6 PATSA VISWA ANVESH
33 13R11A05L7 PEDDI MANASWI
34 13R11A05L8 POLEPALLI DHANUSH
35 13R11A05L9 R SRUTHI REDDY
36 13R11A05M1 SADDI RADHA
37 13R11A05M2 SAHITHI JAGARLAMUDI
38 13R11A05M3 SEELAM VAMSI ROMITH
39 13R11A05M4 SHRAVANI BAJJURI
40 13R11A05M5 SINGURI AKSHITA
41 13R11A05M6 STOTRABHASHYAM SHRUTHY
42 13R11A05M7 T JAGAN
43 13R11A05M8 T MOUNIKA
44 13R11A05M9 T RAVI THEJA
45 13R11A05N0 U SAI AARATI
46 13R11A05N1 U V SATYA SUNANDA
47 13R11A05N2 V P S PRASHANTH
48 13R11A05N3 V TRISHA
49 13R11A05N4 VODELA SAI SANKEERTH
50 13R11A05N5 PRANAV NANDURI
Total: 50 Males: 27 Females: 23
134
20. Group-Wise students list for discussion topic
Class/ Section: CSE 3-2, C
G1
13R11A05B5 AKKINENI SAI LAKSHMI
13R11A05B6 AMBAVARAPU SRI SAI JAYA MADHURI
13R11A05B7 ANJANI A
13R11A05B8 ASHISH MISRA
13R11A05B9 AYYAGARI VIJAYA SINDHU
G2
13R11A05C0 B POOJA AISHWARYA
13R11A05C1 BHARATH CHANDRA KAKANI
13R11A05C2 BHIMA SAINATH
13R11A05C3 CHRISTO VIJAY
13R11A05C4 G APOORVA
G3
13R11A05C5 G NIKITHA
13R11A05C6 G PRIYESH KUMAR
13R11A05C7 G SRIHITHA
13R11A05C8 GADILA AKHILA
13R11A05C9 GADAGONI SAI CHARAN
G4
13R11A05D1 GUNTUKU GIRISH
13R11A05D2 JINNA SRIDHAR REDDY
13R11A05D4 K PAVAN KUMAR
13R11A05D5 KASULA SWAPNA PRIYA
13R11A05D7 KADIRE SATHWIKA
G5
13R11A05D8 KADIYALA SRIHARSHA
13R11A05D9 KASHETTY MADHURI
13R11A05E0 KOTHAPALLY LOKESH
13R11A05E1 LAKSHMI INDUJA YENNISETTI
13R11A05E2 M SHIVA KUMAR
G6
13R11A05E3 M LAKSHMI PRAVALLIKA
13R11A05E4 MALLARAPU MANASA
13R11A05E5 MERUGU SRAVAN KUMAR
13R11A05E8 N VAMSHI KRISHNA
13R11A05E9 P LAKSHMI SRUTI VEDA
G7
13R11A05F0 P POOJITHA REDDY
13R11A05F1 P SAI KIRAN REDDY
13R11A05F2 PANDA SUSHMA RAJESHWARI
13R11A05F3 PARUCHURI DIVYA
13R11A05F4 PEDDI REDDY AKHILA REDDY
G8
13R11A05F5 PRATYUSH SHARMA
13R11A05F6 R BHAVANI
13R11A05F7 RAGIRI NAVYA
13R11A05F8 RAMA HIMA BINDU
13R11A05F9 REVATHI SIMHADRI
135
G9
13R11A05G0 RUDHARARAJU MAGADH SAI VARMA
13R11A05G1 SHRAVYA ACHA
13R11A05G2 SINGARAJU MONICA
13R11A05G4 TEJASWEE VEERAVALLI
13R11A05G5 TUNGA JAYASREE
G10
13R11A05G6 VEERANKI SREE DIVYA
13R11A05G7 GANGJI VANDANA
13R11A05G8 VELAGAPUDI ANUHYA
13R11A05G9 VELAMARTHI RAJKOUSHIK
13R11A05H0 VENKATA PATHI RAJU K
G11
13R11A05H1 VUCHALA PRASHANTH RAJ
13R11A05H2 VUNNAM TARUN SEKHAR
13R11A05H3 VUTHPALA ANUDEEP
13R11A05H4 GOLLIPALLI JITHENDAR REDDY
Class/ Section: CSE 3-2, D
G1
13R11A05H5 A MARY PRISCILLA
13R11A05H6 ABHINAY T
13R11A05H7 ABHISHEK PAWAR
13R11A05H8 ANKEM LAXMI PRASANNA
13R11A05H9 AUSULA ANUSHA
G2
13R11A05J0 BARELLA SRINIVAS REDDY
13R11A05J1 BANTU MUKESH RAJ
13R11A05J2 CH V SESHA SAI LALITHA PRIYANKA
13R11A05J3 CHANDRA KANTH REVOORI
13R11A05J4 AASHISH REDDY D
G3
13R11A05J5 DATLA DEEPAK VARMA
13R11A05J6 DESHAM HARATHI
13R11A05J7 EMANI VENKATA SESHA SAI RAM
13R11A05J8 GADDAM ALEKHYA
13R11A05J9 G PRATHAM
G4
13R11A05K0 GATTU KALKINATH
13R11A05K1 SRIKANTH R B
13R11A05K2 GOLLAMUDI PRANAV SURYA
13R11A05K3 GORENTA RAMYA
13R11A05K4 GOTETI LALITHA PRIYANKA
G5
13R11A05K5 GUDURU UMESH
13R11A05K6 KAMBALAPALLY JAYAVARDHAN REDDY
13R11A05K7 KAMARAJU SAHASRA
13R11A05K8 K SUHAS REDDY
13R11A05K9 KANDADAI ABHIRAMAN
136
G6
13R11A05L0 KOVELAMUDI RAMYASRI
13R11A05L1 MANVITHA REDDY DONTHI
13R11A05L2 MARSAKATLA SARITHA
13R11A05L3 N SRI CHINNA SURYA NAGA SAI MANIKAN
13R11A05L4 NANDAGIRI AKHILESH
G7
13R11A05L5 P SREEKRISHNA KASHYAP
13R11A05L6 PATSA VISWA ANVESH
13R11A05L7 PEDDI MANASWI
13R11A05L8 POLEPALLI DHANUSH
13R11A05L9 R SRUTHI REDDY
G8
13R11A05M1 SADDI RADHA
13R11A05M2 SAHITHI JAGARLAMUDI
13R11A05M3 SEELAM VAMSI ROMITH
13R11A05M4 SHRAVANI BAJJURI
13R11A05M5 SINGURI AKSHITA
G9
13R11A05M6 STOTRABHASHYAM SHRUTHY
13R11A05M7 T JAGAN
13R11A05M8 T MOUNIKA
13R11A05M9 T RAVI THEJA
13R11A05N0 U SAI AARATI
G10
13R11A05N1 U V SATYA SUNANDA
13R11A05N2 V P S PRASHANTH
13R11A05N3 V TRISHA
13R11A05N4 VODELA SAI SANKEERTH
13R11A05N5 PRANAV NANDURI
137
0 Comments