0% found this document useful (0 votes)
56 views

Controls For Information Security Instructor's Manual Learning Objectives

Northwest Industries employs various controls to secure its accounting system, including preventative, detective, and corrective controls. Preventative controls restrict access through authentication and authorization of users and devices. Detective controls monitor the system for security incidents, while corrective controls have procedures to respond to issues that arise. Together these controls provide reasonable assurance of information security at Northwest Industries.

Uploaded by

ym5c2324
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Controls For Information Security Instructor's Manual Learning Objectives

Northwest Industries employs various controls to secure its accounting system, including preventative, detective, and corrective controls. Preventative controls restrict access through authentication and authorization of users and devices. Detective controls monitor the system for security incidents, while corrective controls have procedures to respond to issues that arise. Together these controls provide reasonable assurance of information security at Northwest Industries.

Uploaded by

ym5c2324
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CHAPTER 5

CONTROLS FOR INFORMATION SECURITY

Instructors Manual

Learning Objectives:

1. Explain the factors that influence information systems


reliability.

2. Describe how a combination of preventive, detective, and


corrective controls can be employed to provide reasonable
assurance about information security.

Questions to be addressed in this chapter:

1. What controls does Northwest Industries employ to prevent


unauthorized access to its accounting system?

2. How can successful and unsuccessful attempts to compromise the


companys accounting system be detected in a timely manner?

3. What procedures are in place to respond to security incidents?

Learning Objective One

Explain the factors that influence information


systems reliability.

One basic function of an accounting information system is to


provide information useful for decision making.

Figure 8-1 on page 230 shows the five fundamental principles that
contribute to the overall objective of systems reliability:

1. SecuritySecurity procedures restrict access to authorized


users only.

2. ConfidentialityBy restricting access, the confidentiality


of sensitive organizational information is protected.

3. PrivacyAlso, by restricting access, the privacy of personal


identifying information collected from customers is
protected.

4. Processing integritySecurity procedures provide for


processing integrity by preventing submission of
unauthorized or fictitious transactions as well as
preventing unauthorized changes to stored data or programs.

5. AvailabilitySecurity procedures provide protection against


a variety of attacks, including viruses and worms, thereby
ensuring that the system is available when needed.

Multiple Choice 1

The five principles that contribute to the overall objective of systems


reliability include:
a. Effectiveness
b. Processing integrity
c. Plan and organize
d. Reliability

Learning Objective Two

Describe how a combination of preventive,


detective, and corrective controls can be
employed to provide reasonable assurance about
information security.

Before discussing the preventive, detective, and corrective controls, it


is helpful to understand the basic steps used by criminals to attack an
organizations information system:

1. Reconnaissance. Computer attackers begin by collecting information


about their target. Much valuable information can be obtained by
perusing an organizations financial statements, SEC filings,
Website, and press releases.

2. Attempt social engineering. Why go through all the trouble of


trying to break into a system if you can get someone to let you
in? Attackers will often try to use the information obtained
during their initial reconnaissance to socially engineer (i.e.,
trick) an unsuspecting employee into granting them access.

An attack known as spear phishing involves sending e-mails


purportedly coming from someone else in the organization that the
victim knows, or should know.

3. Scan and map the target. If an attacker cannot successfully


penetrate the target system via social engineering, the next step
is to conduct more detailed reconnaissance to identify potential
points of remote entry.

4. Research. Once the attacker has identified specific targets and


knows what versions of software are used, the next step is to find
known vulnerabilities for those programs.

5. Execute the attack and obtain unauthorized access to the system.

6. Cover tracks. After penetrating the victims information system,


most attackers will try to cover their tracks and come up with
back doors just in case their initial attack is discovered.
Preventive Controls

Five major types of preventive controls are listed in Table 8-1 on


page 233.

Preventive controls consist of two related functions:


authentication and authorization controls.

User Access Controls: Authentication and Authorization

Authentication focuses on verifying the identity of the person or


device attempting to access the system.

Users can be authenticated by verifying:

1. Something they know, such as passwords or personal


identification (PINs)

2. Something they have, such as smart cards or ID


badges

3. Some physical characteristic (referred to as a


biometric identifier), such as their fingerprints or
voice

Focus 8-1 on page 236 discusses some of the requirements for


creating strong passwords

1. Length

Most security experts recommend that strong passwords


include at least eight characters.

2. Multiple character types

Mixture of alphabetic, numeric, special characters,


uppercase, and lowercase

3. Randomness

Should not be found in dictionary

Words should not be preceded or followed by a number

Should not be employees personal interest, hobbies,


or other information

4. Change frequently

At least every 90 days and possibly every 30 days

Multifactor authentication is when two or all three


basic authentication methods are used

Authorization Controls
Authorization restricts access of authenticated users to
specific portions of the system and specifies what actions
they are permitted to perform.

Access control matrix is a table specifying which portions


of the system users are permitted to access and what actions
they can perform (See Figure 8-4 on page 237).

When an employee attempts to access a particular information


systems resource, the system performs a compatibility test
that matches the users authentication credentials against
the access control matrix to determine whether that employee
should be allowed to access that resource and perform the
requested action.

Authentication and authorization should also apply to


devices.

Every workstation, printer, or other computing device


needs a Network Interface Card (NIC) to connect to the
organizations internal network.

Each NIC has a unique identifier, referred to as its


Media Access Control (MAC) address.

Training

Training is a critical preventive control as employees must


understand and follow the organizations security policies.

All employees should be taught why security measures are


important to the organizations long-run survival.

Some good security measures include:

1. Never open unsolicited e-mail attachments

2. Only use approved software

3. Never share or reveal your passwords

4. Take steps to physically protect laptops

Training is especially needed to educate employees about


social engineering attacks, which use deception to obtain
unauthorized access to information resources.

Employees also need to be trained not to allow other people


to follow them through restricted access entrances. This
social engineering attack, called piggybacking, can take
place not only at the main entrance to the building but also
at any internal locked doors, especially to rooms that
contain computer equipment.
Controlling Physical Access

Controlling physical access to the system is absolutely


essential.

Within minutes a skilled attacker can gain physical


access to the system and obtain sensitive data.

Focus 8-3 on page 245 describes an especially elaborate set


of physical access controls referred to as a man-trap.

This technique involves the use of specially designed


rooms that serve as an entryway to the data center.

They typically contain two doors, each of which


uses multiple authentication methods to control
access.

Laptops, cell phones, and Personal Digital Assistant (PDA)


devices require special attention. A PDA is a handheld
computer that has had a significant impact on personal
productivity. Laptop theft is a large problem. The major
cost is not the price of replacing the laptop, but the loss
of the confidential information it contains and the costs of
notifying those affected.

Below is an excerpt from the Internet involving hackers


obtaining personal credit card information:

120 million accounts exposed?

Just how common is a source of heated debate in the credit card fraud
world, which has always been shrouded in secrecy. But one firm that
provides security services to merchants says its been told by the card
associations that last year, 60 million accounts were compromised, and
this year, that figure will double to around 120 million.
And everyone I talk to says that number is conservative, says Julie
Ferguson, co-founder of ClearCommerce Corp., which sells products
designed to stop data theft. Ferguson also chairs the Merchant Risk
Council, which studies credit card fraud and advocates for merchant
rights.

Visa, MasterCard, and American Express all dispute the numbers as an


exaggeration.

IT Solutions: Controlling Remote Access

Perimeter Defense: Routers, Firewalls, and Intrusion


Prevention Systems

Figure 8-6 on page 239 shows the relationship between an


organizations information system and the Internet.

A border router connects an organizations information


system to the Internet.

Behind the border router is the main firewall, which is


either a special-purpose hardware device or software running
on a general-purpose computer.

Firewall is a combination of security algorithms and router


communications protocols that prevents outsiders from
tapping into corporate databases and e-mail systems.

The organizations Web servers and e-mail servers are placed


in a separate network, called the demilitarized zone (DMZ)
because it sits outside the corporate network yet is
accessible from the Internet.

Overview of TCP/IP and Routers

Information travels throughout the Internet and internal


local area networks in the form of packets.

So, its not documents or files that are sent to the


printer. Instead they are broken down into packets and
then sent to the printer.

Well-defined rules and procedures called protocols dictate


how to perform these activities.

Figure 8-7 on page 240 shows how two important protocols,


referred to as TCP/IP, govern the process for transmitting
information over the Internet.
The Transmission Control Protocol (TCP) specifies the
procedures for dividing files and documents into
packets to be sent over the Internet and the methods
for reassembly of the original document or file at the
destination.

The Internet Protocol (IP) specifies the structure of


those packets and how to route them to the proper
destination.

Every IP packet consists of two parts: a header and a body.


The header contains the packets origin and destination
addresses, as well as information about the type of data
contained in the body of the packet.

Special-purpose devices called routers are designed to read


the destination address fields in IP packet headers to
decide where to send (route) the packet next.

Filtering Packets

A set of rules, called an Access Control List (ACL),


determines which packets are allowed entry and which are
dropped.

Border routers typically perform what is called static


packet filtering, which screens individual IP packets based
solely on the contents of the source or destination fields
in the IP packet header.

A stateful packet filtering maintains a table that lists all


established connections between the organizations computers
and the Internet.

Stateful packet filtering is still limited to


examining only information in the IP packet header.

Clearly, control over incoming mail would be more effective


if each envelope or package were opened and inspected.

Deep Packet Inspection

Stateful packet filtering is still limited to examining only


information in the IP packet header.

Undesirable mail can get through if the return address is


not on the list of unacceptable sources. Clearly, control
over incoming mail would be more effective if each envelope
or package were opened and inspected.

Such a process, called deep packet inspection, provides this


added control.

Intrusion prevention systems (IPS) are designed to identify


and drop packets that are part of an attack.
Defense-in-Depth

The use of multiple perimeter filtering devices is actually


more efficient than trying to use only one device.

Dial-Up Connections

The Remote Authentication Dial-In User Service (RADIUS) is a


standard method that verifies the identity of users
attempting to connect via dial-in-access.

Modems are cheap and easy to install. If an employee


installs their own personal modem that they purchased for
the office computer, the modem is called a rogue modem. This
in turn creates a back door in which a hacker could easily
gain access to the companys system.

To detect these unauthorized, rogue modems, either


computer security or internal auditing uses war
dialing software. This software calls every telephone
number assigned to the organization to identify those
which are connected to modems; which in turn
identifies the rogue modems.

Wireless Access

The following procedures need to be followed to adequately


secure wireless access:

1. Turn on available security features.

2. Authenticate all devices attempting to establish


wireless access to the network before assigning them
an IP address.

3. Configure all authorized wireless Network Interface


Cards (NICs) to operate only in infrastructure mode,
which forces the device to connect only to wireless
access points.

4. Use noninformative names for the access points


address, which is called a Service Set Identifier
(SSID).

5. Predefine a list of authorized Media Access Control


(MAC) addresses and configure wireless access points
to only accept connections if the devices MAC
address is on the authorized list.

6. Reduce the broadcast strength of wireless access


points to make unauthorized reception off-premises
more difficult.

7. Locate wireless access points in the interior of the


building and use directional antennas to make
unauthorized access and eavesdropping more difficult.
Focus 8-2 on page 244 identifies major issues and
solutions of security relating to mobile devices.

Host and Application Hardening

Routers, firewalls, and intrusion prevention systems are


designed to protect the network perimeter.

However, information system security is enhanced by


supplementing preventive controls.

Three areas deserve special attention:

1. Host configuration

2. User accounts

3. Software design

1. Host Configuration

Hosts can be made more secure by modifying their


configurations. Every program running on a host
represents a potential point of attack because it
probably contains flaws, called vulnerabilities, that can
be exploited to either crash the system or take control
of it.

Microsoft Baseline Security Analyzer and vulnerability


scanners can be used to identify unused and, therefore,
unnecessary programs that represent potential security
threats. This process of turning off unnecessary features
is called hardening.

2. Managing User Accounts and Privileges

Users who need administrative powers on a particular


computer should be assigned two accounts: one with
administrative rights and another that has only limited
privileges.

It is especially important that they be logged into


their limited regular user account when browsing the
Web or reading their e-mail.

3. Software Design

As organizations have increased the effectiveness of


their perimeter security controls, attackers have
increasingly targeted vulnerabilities in application
programs.

The most common input-related vulnerability is referred


to as a buffer overflow attack, in which an attacker
sends a program more data than it can handle.
Most programs set aside a fixed amount of memory,
referred to as a buffer, to hold user input.

However, if the program does not carefully check the size


of data being input, an attacker may enter many times the
amount of data that was anticipated and overflow the
buffer.

Multiple Choice 2

Social engineering attacks that take place via e-mail are known as:
a. bluesnarfing
b. spear phishing
c. phreaking
d. vishing

Multiple Choice 3

An example of preventive controls would include:


a. log analysis
b. authorization controls
c. encryption
d. A and B
e. B and C

Multiple Choice 4

A biometric identifier includes:


a. passwords
b. fingerprints
c. smart cards
d. PINs

Answer to Multiple Choice Questions:

Multiple Choice Question Answers


Number Answer
1 B
2 B
3 E
4 B

You might also like