Assignment
Assignment
IT Security threats
Some It security threats include the following:
Since the Internet became available to the wider public, sufficient attention hasn’t
been paid to it to ensure that the encryption of sensitive data is completed and
access is fully restricted. But that only means that preventative measures need to
be made to ensure that the data continues to remain untouched.
Ransomware
Ransomware Trojans are a type of cyberware that is designed to extort money
from a victim. Often, Ransomware will demand a payment in order to undo
changes that the Trojan virus has made to the victim’s computer. These changes
can include:
Encrypting data that is stored on the victim’s disk – so the victim can no longer
access the information
Blocking normal access to the victim’s system
The most common ways in which Ransomware Trojans are installed are: Via
phishing emails, as a result of visiting a website that contains a malicious
program. While ransomware is less common in the world of IT, its impact is
growing.
This sort of attack encrypts data and renders it unusable until the victim pay the a
ransom. The best way to avoid an attack with ransomware is to have real-time
security protection, and hiring an IT security specialist to perform regular backup
routines. The best option is to act before cyber security is at risk and protect most
important data before it becomes an issue.
Spear Phishing
Spear phishing is an email or electronic communications scam targeted towards
a specific individual, organization or business. Although often intended to steal
data for malicious purposes, cybercriminals may also intend to install malware on
a targeted user’s computer.
The targeting of higher-ups in business is on the rise and cyber criminals are
accessing incredibly sensitive data through spear phishing at an unprecedented
rate. In an enterprise, security-awareness training for employees and executives
alike will help reduce the likelihood of a user falling for spear-phishing emails.
This training typically educates enterprise users on how to spot phishing emails
based on suspicious email domains or links enclosed in the message, as well as
the wording of the messages and the information that may be requested in the
email.
Cloud computing and storage solutions provide users and enterprises with
various capabilities to store and process their data in either privately owned or
third-party data centers that may be located far from the user–ranging in distance
from across a city to across the world.
Here are a few more reasons why IT security is more important than ever:
Vulnerabilities and attacks
Vulnerability is a system susceptibility or flaw. Vulnerabilities are documented in
the Common Vulnerabilities and Exposures (CVE) database. An exploitable
vulnerability is one for which at least one working attack or “exploit” exists.
Backdoors
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret
method of bypassing normal authentication or security controls. They may exist
for a number of reasons, including by original design or from poor configuration.
They may have been added by an authorized party to allow some legitimated
access or by an attacker for malicious reasons; but regardless of the motives for
their existence, they create vulnerability.
Denial-of-service attack
Denial of service attacks (DoS) are designed to make a machine or network
resource unavailable to its intended users. Attackers can deny service to
individual victims, such as by deliberately entering a wrong password enough
consecutive times to cause the victim account to be locked or they may overload
the capabilities of a machine or network and block all users at once.
While a network attack from a single IP address can be blocked by adding a new
firewall rule, many forms of Distributed Denial of Service (DDoS) attacks are
possible, where the attack comes from a large number of points and defending is
much more difficult. Such attacks can originate from the zombie computers of a
botnet, but a range of other techniques are possible including reflection and
amplification attacks, where innocent systems are fooled into sending traffic to
the victim.
Direct-access attacks
An unauthorized user gaining physical access to a computer is most likely able to
directly copy data from it. They may also compromise security by making
operating system modifications, installing software worms, key loggers, covert
listening devices or using wireless mice.
Even when the system is protected by standard security measures, these may be
able to be by-passed by booting another operating system or tool from a CD-
ROM or other bootable media. Disk encryption and Trusted Platform Module are
designed to prevent these attacks.
Eavesdropping
Eavesdropping is the act of secretly listening to a private conversation, typically
between hosts of a network. Even machines that operate as a closed system (i.e.
with no contact to the outside world) can be eavesdropped upon via monitoring
the faint electro-magnetic transmissions generated by the hardware.
Spoofing
Spoofing, in general, is a fraudulent or malicious practice in which
communication is sent from an unknown source disguised as a source known to
the receiver. Spoofing is most prevalent in communication mechanisms that lack
a high level of security.
Tampering
Tampering describes a malicious modification of products. So-called “Evil Maid”
attacks and security services planting of surveillance capability into routers are
examples.
Privilege escalation
Privilege escalation describes a situation where an attacker with some level of
restricted access is able to, without authorization, elevate their privileges or
access level. So for example a standard computer user may be able to fool the
system into giving them access to restricted data; or even to “become root” and
have full unrestricted access to a system.
Phishing
Phishing is the attempt to acquire sensitive information such as usernames,
passwords, and credit card details directly from users. Phishing is typically
carried out by email spoofing or instant messaging and it often directs users to
enter details at a fake website whose look and feel are almost identical to the
legitimate one.
Click jacking
Click jacking, also known as “UI redress attack” or “User Interface redress
attack”, is a malicious technique in which an attacker tricks a user into clicking on
a button or link on another webpage while the user intended to click on the top
level page. This is done using multiple transparent or opaque layers. The
attacker is basically “hijacking” the clicks meant for the top level page and routing
them to some other irrelevant page, most likely owned by someone else.
Social engineering
Social engineering aims to convince a user to disclose secrets such as
passwords, card numbers, etc. by, for example, impersonating a bank, a
contractor, or a customer.
Here’s an example of organizing threats, attacks, vulnerabilities and
countermeasures for Input/Data validation:
Buffer overflows
Cross-site scripting
SQL injection
Query string manipulation
Form field manipulation
Cookie manipulation
HTTP header manipulation Vulnerabilities for Input/Data Validation
Using non-validated input in the Hypertext Markup Language (HTML) output
stream
Using non-validated input used to generate SQL queries
Relying on client-side validation
Using input file names, URLs, or user names for security decisions
Using application-only filters for malicious input
Looking for known bad patterns of input
Trusting data read from databases, file shares, and other network resources
Failing to validate input from all sources including cookies, query string
parameters, HTTP headers, databases, and network resources Countermeasures for
Input/Data Validation
Do not trust input
Validate input: length, range, format, and type
Constrain, reject, and sanitize input
Encode output
BB Guideline on Information System Audit
Bangladesh Bank issued ‘Guidelines on Internal Control & Compliance in Banks’
for Banks on March 8, 2016 through BRPD Circular No. 03. As per guideline:
Installing controls are necessary but not sufficient to provide adequate security.
People responsible for security must consider if the controls are installed as
intended, if they are effective if any breach in security has occurred and if so,
what actions can be done to prevent future breaches.
Nobody likes surprises. Involve the business and IT unit managers of the audited
systems early on. This will smooth the process as a dispute over the auditor’s
access. Consider the case of one respected auditing firm that requested that
copies of the system password and firewall configuration files be e-mailed to
them.
1. Team Leaders should specify restrictions, such as time of day and testing
methods to limit impact on production systems. Most organizations concede that
denial-of-service or social engineering attacks are difficult to counter, so they
may restrict these from the scope of the audit.
The Audit officer will be responsible for internal Audit within the department and
operations of branches. When requested and for the purpose of performing an
audit, any access needed will be provided to members of Internal Audit team.
This access may include:
User level and/or system level access to any computing or communications device
Access to information (electronic, hardcopy, etc.) that may be produced,
transmitted or stored on respective Dept. equipment or premises
Access to work areas (Data Center, DR site, NOC, labs, offices, cubicles, storage
areas, etc.)
Access to reports / documents created during internal audit.
Interactively monitor and log traffic on the Bank’s corporate network in
conjunction with Bank’s WAN connectivity provider
Moving machines involved in an incident to a safe location for analysis or to
ensure evidence is captured and preserved securely
All sorts of System(s) and user activity logs/ audit trails to verify that privileges
were used only for their intended and approved purposes.
User level and/or Admin level access to any computing or communications
devices
Network or host scans and obtain any applicable information
Audit rights of access to any Service level agreement or Annual maintenance
contract with External parties or Internal parties as when appropriate
External or internal parties premises to justify the ability of the service provider
before engaging them to provide any service for the Bank(s) interest.
All types of licenses/IPR (intellectual property rights) related documents or logs
aligned with any software or hardware used in Bank’s ICT infrastructure.
Risk Analysis and Assessment
The auditor(s) will perform a risk analysis and assessment on the overall ICT
system of the organization. This risk analysis and assessment will include all
systems and subsystems directly or indirectly involved in the production of
financial and critical information of Bank.
Based on these results, the auditor will rank the systems according to the risks
attached to them. This will form the basis for prioritizing the audit frequency.
Personnel interviews
Files and documentations verifications
Justifications of IT inventories
Reviews of Service Level Agreement and Annual Maintenance Contract(s)
Health checkup of Server & workstations
Network scans, Vulnerability scanning &
Business impact analysis of respective Information system(s)
Audit Requests for Specific Cause
A request may be made for an audit for a specific cause. The request may come
from a variety of sources including, but not limited to, Branches, Human
Resources, Risk Management, IT Security Officer and/or a member of Board
Audit
A request for an audit for specific cause must include time frame, frequency, and
nature of the request. The request must be reviewed and approved by Head of
ICCD.
The reporting process shall allow for meaningful communication of the audit
findings to those departments/units sponsoring the activity.
IT security Audit team must audit internal back-up, storage and data recovery
processes to ensure that the information is readily available in the manner
required. Auditing of data back-up processes should be carried out on a periodic
basis.
Information system audit ensures control over the entire banking operational
process from the initial idea or proposal to acceptance of a fully operational
system is to be complied satisfactorily with the aspect of system capability that
leads to effective use of ICT resources.
Types of IT audits
Various authorities have created differing classifications to distinguish the various
types of IT audits. Goodman & Lawless state that there are three specific
systematic approaches to carry out an IT audit:
Technological innovation process audit. This audit constructs a risk profile for
existing and new projects. The audit will assess the length and depth of the company’s
experience in its chosen technologies, as well as its presence in relevant markets, the
organization of each project, and the structure of the portion of the industry that deals
with this project or product, organization and industry structure.
Innovative comparison audit. This audit is an analysis of the innovative abilities of
the company being audited, in comparison to its competitors. This requires
examination of company’s research and development facilities, as well as its track
record in actually producing new products.
Technological position audit: This audit reviews the technologies that the business
currently has and that it needs to add. Technologies are characterized as being either
“base”, “key”, “pacing” or “emerging”.
Others describe the spectrum of IT audits with five categories of audits:
Systems and Applications: An audit to verify that systems and applications are
appropriate, are efficient, and are adequately controlled to ensure valid, reliable,
timely, and secure input, processing, and output at all levels of a system’s activity.
System and process assurance audits form a subtype, focusing on business process-
centric business IT systems. Such audits have the objective to assist financial auditors.
Information Processing Facilities: An audit to verify that the processing facility is
controlled to ensure timely, accurate, and efficient processing of applications under
normal and potentially disruptive conditions.
Systems Development: An audit to verify that the systems under development
meet the objectives of the organization and to ensure that the systems are developed in
accordance with generally accepted standards for systems development
Management of IT and Enterprise Architecture: An audit to verify that IT
management has developed an organizational structure and procedures to ensure a
controlled and efficient environment for information processing.
Client/Server, Telecommunications, Intranets, and Extranets: An audit to verify
that telecommunications controls are in place on the client (computer receiving
services), server, and on the network connecting the clients and servers.
In an Information Security (IS) system, there are two types of auditors and audits:
internal and external. IS auditing is usually a part of accounting internal auditing,
and is frequently performed by corporate internal auditors.
IT SECURITY AND INFORMATION SYSTEM AUDIT IN BANKS
by Mohammad Ziaullah Khan - June 17, 2017