Chapter 2
Chapter 2
Chapter 2
INTRODUCTION
Unlike any other information technology program, the primary mission of an information security
program is to ensure that systems and their contents remain the same. Organizations expend hundreds of
thousands of dollars and thousands of man-hours to maintain their information systems. If threats to
information and systems didn’t exist, these resources could be used to improve the systems that support the
information. However, attacks on information systems are a daily occurrence, and the need for information
security grows along with the sophistication of such attacks.
Organizations must understand the environment in which information systems operate so that their
information security programs can address actual and potential problems.
Protecting Data
One of the most valuable assets is data
Without data, an organization loses its record of transactions and/or its ability to deliver value to its
customers
An effective information security program is essential to the protection of the integrity and value of the
organization’s data
LESSON 2: THREATS
Management must be informed of the various kinds of threats facing the organization
A threat is an object, person, or other entity that represents a constant danger to an asset
By examining each threat category in turn, management effectively protects its information through
policy, education and training, and technology controls
Espionage/Trespass
Broad category of activities that breach confidentiality
Unauthorized accessing of information
Competitive intelligence vs. espionage
Shoulder surfing can occur any place a person is accessing confidential information
Controls implemented to mark the boundaries of an organization’s virtual territory giving notice to
trespassers that they are encroaching on the organization’s cyberspace
Hackers uses skill, guile, or fraud to steal the property of someone else
Generally two skill levels among hackers:
Expert hacker
develops software scripts and codes exploits
usually a master of many skills
will often create attack software and share with others
Script kiddies
1-3 IAS 101 – Information Assurance and Security 1
CHAPTER 2:
The Need for Security
hackers of limited skill
use expert-written software to exploit a system
do not usually fully understand the systems they hack
Other terms for system rule breakers:
Cracker - an individual who “cracks” or removes protection designed to prevent unauthorized
duplication
Phreaker - hacks the public telephone network
Information Extortion
Information extortion is an attacker or formerly trusted insider stealing information from a computer
system and demanding compensation for its return or non-use
Extortion found in credit card number theft
Individual or group who want to deliberately sabotage the operations of a computer system or business,
or perform acts of vandalism to either destroy an asset or damage the image of the organization
These threats can range from petty vandalism to organized sabotage
Organizations rely on image so Web defacing can lead to dropping consumer confidence and sales
Rising threat of hacktivist or cyber-activist operations – the most extreme version is cyber-terrorism
ADWARE
Main purpose is to determine a user’s purchasing habits so that Web browsers can display
advertisements tailored to that user.
1-5 IAS 101 – Information Assurance and Security 1
CHAPTER 2:
The Need for Security
Slow down the computer it’s running on.
Adware sometimes displays a banner that notifies the user of its presence
FORCES OF NATURE
Forces of nature, force majeure, or acts of God are dangerous because they are unexpected and can
occur with very little warning
Can disrupt not only the lives of individuals, but also the storage, transmission, and use of information
Include fire, flood, earthquake, and lightning as well as volcanic eruption and insect infestation
Since it is not possible to avoid many of these threats, management must implement controls to limit
damage and also prepare contingency plans for continued operations
Technological Obsolescence
When the infrastructure becomes antiquated or outdated, it leads to unreliable and untrustworthy
systems
Management must recognize that when technology becomes outdated, there is a risk of loss of data
integrity to threats and attacks
Ideally, proper planning by management should prevent the risks from technology obsolesce, but when
obsolescence is identified, management must take action
LESSON 3: Attacks
An attack is the deliberate act that exploits vulnerability
It is accomplished by a threat-agent to damage or steal an organization’s information or physical asset
An exploit is a technique to compromise a system
A vulnerability is an identified weakness of a controlled system whose controls are not present
or are no longer effective
An attack is then the use of an exploit to achieve the compromise of a controlled system
Malicious Code
This kind of attack includes the execution of viruses, worms, Trojan horses, and active web scripts with
the intent to destroy or steal information
The state of the art in attacking systems in 2002 is the multi-vector worm using up to six attack vectors
to exploit a variety of vulnerabilities in commonly found information system devices
Attack Descriptions
IP Scan and Attack – Compromised system scans random or local range of IP addresses and targets
any of several vulnerabilities known to hackers or left over from previous exploits
Web Browsing - If the infected system has write access to any Web pages, it makes all Web content
files infectious, so that users who browse to those pages become infected
Virus - Each infected machine infects certain common executable or script files on all computers to
which it can write with virus code that can cause infection
Unprotected Shares - using file shares to copy viral component to all reachable locations
Mass Mail - sending e-mail infections to addresses found in address book
Simple Network Management Protocol - SNMP vulnerabilities used to compromise and infect
Hoaxes - A more devious approach to attacking computer systems is the transmission of a virus hoax,
with a real virus attached
Back Doors - Using a known or previously unknown and newly discovered access mechanism, an
attacker can gain access to a system or network resource
Password Crack - Attempting to reverse calculate a password
Brute Force - The application of computing and network resources to try every possible combination of
options of a password
The protection of information in computer systems […and] the usefulness of a set of protection
mechanisms depends upon the ability of a system to prevent security violations. In practice, producing
a system at any level of functionality that actually does prevent all such unauthorized acts has proved
to be extremely difficult. Sophisticated users of most systems are aware of at least one way to crash
the system, denying other users authorized access to stored information. Penetration exercises
involving a large number of different general-purpose systems all have shown that users can construct
programs that can obtain unauthorized access to information stored within. Even in systems designed
and implemented with security as an important objective, design and implementation flaws provide
paths that circumvent the intended access constraints. Design and construction techniques that
systematically exclude flaws are the topic of much research activity, but no complete method applicable
to the construction of large general-purpose systems exists yet…49 This statement could be about
software development in the early part of the 21st century, but actually dates back to 1975, before
information security and software assurance became critical factors for many organizations.
In this same article, the authors provide insight into what are now commonplace security principles: Economy
of mechanism:
Economy of mechanism: Keep the design as simple and small as possible.
Fail-safe defaults: Base access decisions on permission rather than exclusion.
Complete mediation: Every access to every object must be checked for authority.
Open design: The design should not be secret, but rather depend on the possession of keys or
passwords.
Separation of privilege: Where feasible, a protection mechanism should require two keys to unlock,
rather than one.
Buffer Overruns: Buffers are used to manage mismatches in the processing rates between two entities
involved in a communication process. A buffer overrun (or buffer overflow) is an application error that occurs
when more data is sent to a program buffer than it is designed to handle. During a buffer overrun, an attacker
can make the target system execute instructions, or the attacker can take advantage of some other unintended
consequence of the failure. Sometimes this is limited to a denial-of-service attack. In any case, data on the
attacked system loses integrity
Command Injection: Command injection problems occur when user input is passed directly to a compiler or
interpreter. The underlying issue is the developer’s failure to ensure that command input is validated before it is
used in the program.
Cross-site Scripting: Cross site scripting (or XSS) occurs when an application running on a Web server
gathers data from a user in order to steal it. An attacker can use weaknesses in the Web server environment to
insert commands into a user’s browser session, so that users ostensibly connected to a friendly Web server
are, in fact, sending information to a hostile server.
Failure to Handle Errors: Failure to handle errors can cause a variety of unexpected system behaviors.
Programmers are expected to anticipate problems and prepare their application code to handle them.
Failure to Protect Network Traffic: Traffic on a wired network is also vulnerable to interception in some
situations. On networks using hubs instead of switches, any user can install a packet sniffer and collect
communications to and from users on that network. Periodic scans for unauthorized packet sniffers,
unauthorized connections to the network, and general awareness of the threat can mitigate this problem.
Failure to Store and Protect Data Securely: Storing and protecting data securely is a large enough
issue to be the core subject of this entire text. Programmers are responsible for integrating access controls
into, and keeping secret information out of, programs. Failure to properly implement sufficiently strong access
controls makes the data vulnerable.
Failure to Use Cryptographically Strong Random Numbers: Most modern cryptosystems, like many
other computer systems, use random number generators. However, a decision support system using random
and pseudo-random numbers for Monte Carlo method forecasting does not require the same degree of rigor
and the same need for true randomness as a system that seeks to implement cryptographic procedures.
Format String Problems: Computer languages often are equipped with built-in capabilities to reformat data
while they’re outputting it. The formatting instructions are usually written as a “format string.” Unfortunately,
some programmers may use data from untrusted sources as a format string.
Neglecting Change Control: Developers use a process known as change control to ensure that the
working system delivered to users represents the intent of the developers. Once the system is in production,
change control processes ensure that only authorized changes are introduced and that all changes are
adequately tested before being released.
Improper File Access: If an attacker changes the expected location of a file by intercepting and modifying
a program code call, the attacker can force a program to use files other than the ones the program is supposed
to use. The potential for damage or disclosure is great, so it is critical to protect not only the location of the files
but also the method and communications channels by which these files are accessed.
Improper Use of SSL: Programmers use Secure Sockets Layer (SSL) to transfer sensitive data, such as
credit card numbers and other personal information, between a client and server. While most programmers
assume that using SSL guarantees security, unfortunately they more often than not mishandle this technology.
Failure to use Hypertext Transfer Protocol Secure (HTTPS), to validate the certificate authority and then
validate the certificate itself, or to validate the information against a certificate revocation list (CRL), can
compromise the security of SSL traffic.
Information Leakage: One of the most common methods of obtaining inside and classified information is
directly or indirectly from an individual, usually an employee. By warning employees against disclosing
information, organizations can protect the secrecy of their operation.
Integer Bugs (Overflows/Underflows): Although paper and pencil can deal with arbitrary numbers of
digits, the binary representations used by computers are of a particular fixed length.
Race Conditions: A race condition is a failure of a program that occurs when an unexpected ordering of
events in the execution of the program results in a conflict over access to the same system resource. A race
condition can also occur when information is stored in multiple memory threads if one thread stores information
in the wrong memory location, by accident or intent.
SQL Injection: SQL injection occurs when developers fail to properly validate user input before using it to
query a relational database.
1-11 IAS 101 – Information Assurance and Security 1
CHAPTER 2:
The Need for Security
Trusting Network Address Resolution: The Domain Name System (DNS) is a function of the World Wide
Web that converts a URL (Uniform Resource Locator) like www.course.com into the IP address of the Web
server host. This distributed model is vulnerable to attack or “poisoning.” The client accepts the first set of
information it receives and is directed to that IP address.
Unauthenticated Key Exchange : One of the biggest challenges in private key systems, which involve two
users sharing the same key, is securely getting the key to the other party. Sometimes an “out of band” courier
is used, but other times a public key system, which uses both a public and private key, is used to exchange the
key.
Use of Magic URLs and Hidden Forms: HTTP is a stateless protocol where the computer programs on
either end of the communication channel cannot rely on a guaranteed delivery of any message. This makes it
difficult for software developers to track a user’s exchanges with a Web site over multiple interactions.
Use of Weak Password-Based Systems: Failure to require sufficient password strength, and to control
incorrect password entry, is a serious security issue. Password policy can specify the number and type of
characters, the frequency of mandatory changes, and even the reusability of old passwords. Similarly, a
system administrator can regulate the permitted number of incorrect password entries that are submitted and
further improve the level of protection. Systems that do not validate passwords, or store passwords in easy-to-
access locations, are ripe for attack.
SUMMARY
Information security performs four important functions:
o Protecting an organization’s ability to function
o Enabling the safe operation of applications implemented on the organization’s IT systems
o Protecting the data an organization collects and uses
o Safeguarding the technology assets in use at an organization
To make sound decisions about information security, management must be informed about threats to its
people, applications, data, and information systems.
Threats or dangers facing an organization’s people, information, and systems fall into the following fourteen
general categories:
Replace list with:
o Compromises to intellectual property
o Deliberate software attacks
o Deviations in quality of service
o Espionage or trespass
o Forces of nature
o Human error or failure
o Information extortion
o Missing, inadequate, or incomplete organizational policy or planning
o Missing, inadequate, or incomplete controls
o Sabotage or vandalism
2. Why is data the most important asset an organization possesses? What other assets in the
organization require protection?
3. Which management groups are responsible for implementing information security to protect the
organization’s ability to function?
1. How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort?
2. How will Fred measure success when he evaluates Gladys’ performance for this project? How will he
evalute Charlie’s performance?
3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning
process?