0% found this document useful (0 votes)
107 views3 pages

Cis Handout

The document discusses controls for operating systems and databases including access controls, password controls, malicious program controls, audit trails, backups and access authorization. It also covers risks from internal and external threats and controls for subversive threats such as firewalls, encryption, digital signatures, digital certificates, detection of denial of service attacks and ensuring integrity of electronic transactions.

Uploaded by

May-May Belleca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views3 pages

Cis Handout

The document discusses controls for operating systems and databases including access controls, password controls, malicious program controls, audit trails, backups and access authorization. It also covers risks from internal and external threats and controls for subversive threats such as firewalls, encryption, digital signatures, digital certificates, detection of denial of service attacks and ensuring integrity of electronic transactions.

Uploaded by

May-May Belleca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Nice R.

Dela Roca

§ Chapter 3
Security Part 1
§ Operating Systems
§ Perform three main tasks:
§ translates high-level languages into the machine-level language
§ allocates computer resources to user applications
§ manages the tasks of job scheduling and multiprogramming
§ Log-On Procedure
§ first line of defense – user IDs and passwords
§ Access Token
§ contains key information about the user
§ Access Control List
§ defines access privileges of users
§ Discretionary Access Control
§ allows user to grant access to another user
§ Operating Systems Controls
Access Privileges
§ Audit objectives: verify that access privileges are consistent with separation of incompatible
functions and organization policies
§ Audit procedures: review or verify…
§ policies for separating incompatible functions
§ a sample of user privileges, especially access to data and programs
§ security clearance checks of privileged employees
§ formal acknowledgements to maintain confidentiality of data
§ users’ log-on times
§ Operating Systems S Controls
Password Control
§ Audit objectives: ensure adequacy and effectiveness of password policies for controlling access to
the operating system
§ Audit procedures: review or verify…
§ passwords required for all users
§ password instructions for new users
§ passwords changed regularly
§ password file for weak passwords
§ encryption of password file
§ password standards
§ account lockout policies
§ Operating Systems Controls
Malicious & Destructive Programs
§ Audit objectives: verify effectiveness of procedures to protect against programs such as viruses,
worms, back doors, logic bombs, and Trojan horses
§ Audit procedures: review or verify…
§ training of operations personnel concerning destructive programs
§ testing of new software prior to being implemented
§ currency of antiviral software and frequency of upgrades
§ Operating System Controls
Audit Trail Controls
§ Audit objectives: used to (1) detect unauthorized access, (2) facilitate event reconstruction, and/or
(3) promote accountability
§ Audit procedures: review or verify…
§ how long audit trails have been in place
§ archived log files for key indicators
§ monitoring and reporting of security violations
§ Database Management Controls
Two crucial database control issues:
Access controls
§ Audit objectives: (1) those authorized to use databases are limited to data needed to perform their
duties and (2) unauthorized individuals are denied access to data
Backup controls
§ Audit objectives: backup controls can adequately recover lost, destroyed, or corrupted data
§ Access Controls
§ User views - based on sub-schemas
§ Database authorization table - allows greater authority to be specified
§ User-defined procedures - used to create a personal security program or routine
§ Data encryption - encoding algorithms
§ Biometric devices - fingerprints, retina prints, or signature characteristics
§ Database Authorization Table
§ Access Controls
Audit procedures: verify…
§ responsibility for authority tables & subschemas
§ granting appropriate access authority
§ use or feasibility of biometric controls
§ use of encryption
§ Subschema Restricting Access
§ Backup Controls
§ Database backup – automatic periodic copy of data
§ Transaction log – list of transactions that provides an audit trail
§ Checkpoint features – suspends data during system reconciliation
§ Recovery module – restarts the system after a failure
§ Backup Controls
§ Audit procedures: verify…
§ that production databases are copied at regular intervals
§ backup copies of the database are stored off site to support disaster recovery
Internal and external subversive activities
Audit objectives:
1. prevent and detect illegal internal and Internet network access
2. render useless any data captured by a perpetrator
3. preserve the integrity and physical security of data connected to the network
Equipment failure
Audit objective: the integrity of the electronic commerce transactions by determining that controls are in
place to detect and correct message loss due to equipment failure
§ Risks from Subversive Threats
§ Include:
§ unauthorized interception of a message
§ gaining unauthorized access to an organization’s network
§ a denial-of-service attack from a remote location
§ IC for Subversive Threats
Firewalls provide security by channeling all network connections through a control gateway.
§ Network level firewalls
§ Low cost and low security access control
§ Do not explicitly authenticate outside users
§ Filter junk or improperly routed messages
§ Experienced hackers can easily penetrate the system
§ Application level firewalls
§ Customizable network security, but expensive
§ Sophisticated functions such as logging or user authentication
§ Dual-Homed Firewall
§ IC for Subversive Threats
§ Denial-of-service (DOS) attacks
§ Security software searches for connections which have been half-open for a period of
time.
§ Encryption
§ Computer program transforms a clear message into a coded (cipher) text form using an
algorithm.
§ Controlling for three common forms of DOS attacks:
§ Smurf attacks—organizations can program firewalls to ignore an attacking site, once
identified
§ SYN flood attacks—two tactics to defeat this DOS attack
• Get Internet hosts to use firewalls that block invalid IP addresses
• Use security software that scan for half-open connections
§ DDos attacks–many organizations use Intrusion Prevention Systems (IPS) that employ
deep packet inspection (DPI)
• IPS works with a firewall filter that removes malicious packets from the flow
before they can affect servers and networks
• DPI searches for protocol non-compliance and employs predefined criteria to
decide if a packet can proceed to its destination
§ Encryption
§ The conversion of data into a secret code for storage and transmission
§ The sender uses an encryption algorithm to convert the original cleartext message into a coded
ciphertext.
§ The receiver decodes / decrypts the ciphertext back into cleartext.
§ Digital signature – electronic authentication technique to ensure that…
§ transmitted message originated with the authorized sender
§ message was not tampered with after the signature was applied
§ Digital certificate – like an electronic identification card used with a public key encryption
system
§ Verifies the authenticity of the message sender
§ IC for Subversive Threats
§ Message sequence numbering – sequence number used to detect missing messages
§ Message transaction log – listing of all incoming and outgoing messages to detect the efforts of
hackers
§ Request-response technique – random control messages are sent from the sender to ensure
messages are received
§ Call-back devices – receiver calls the sender back at a pre-authorized phone number before
transmission is completed

You might also like