ISM en
ISM en
net/publication/360836533
CITATIONS READS
0 217
1 author:
Lionel Pilorget
University of Applied Sciences and Arts Northwestern Switzerland
61 PUBLICATIONS 54 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Lionel Pilorget on 25 May 2022.
2
Various interactions with external agents
Data transfer
modes
Company
Partners Communities
Public organisations
3
Requirements for information and communication
• Accessibility
• Completeness
• Availability
• Response Time
• Easiness
• Privacy
• Compatibility
But…
4
Exercise
Define key elements to be protected for the following organizations
Group 3 Group 4
Group 2 Group 5
Group 1 Group 6
5
Why is Cybersecurity a major issue?
Cyberattacks are now the greatest operational risk to the financial system
«Cyberangriffe sind inzwischen das grösste operationelle Risiko für das Finanzsystem», Mark Branson
Source: www.finma.ch/de/dokumentation/dossier/dossier-cyberrisiken/
6
Cyber attack maps
Source: threatmap.bitdefender.com
7
The Cyber Kill Chain
8
Identify the weaknesses
Exploit, Identify the Weaknesses and Damage
1/ Introduce a virus
2/ Exploit vulnerabilities
Hackers Cyber attackers Black hats 3/ Introduce a virus and deploy the attack
4/ Execute the virus and get critical assets
ROP
Cryptographic Passwords/
Keys Credentials
Board Customer
papers data
Merger &
Acquisition Account
information balances,
positions
Batch
Utilize
files
OS Functions
10
Some statistics
Source: media.kasperskycontenthub.com
11
And the winner is
12
What is a computer virus?
A "virus" is the generic term for an unwanted program that spreads itself and causes
damage on the infected computer. Computer viruses generally require a host program,
where its own code is written and executed first.
Many viruses are programmed in such a way that after installation on a computer they
automatically spread to all addresses stored in the e-mail address book and according to
this snowball system they spread at lightning speed.
Often, the entire software of the infected computer has to be reinstalled to get rid of the
virus. If entire companies are affected by such an incident, the damage can be extensive.
Different types of virus:
File-infecting Virus
Ransomware
Macro Virus
Browser Hijacker
Web Scripting Virus
Boot Sector Virus
Polymorphic Virus
Resident Virus
Multipartite Virus
13
Computer worm
A computer worm is a standalone malware computer program that replicates itself in
order to spread to other computers. Worms do not passively wait to be spread by a user
on a new system, but actively try to penetrate new systems. They do it by exploiting
security problems on the target system, especially network services.
A helpful worm or anti-worm is a worm designed to do something that its author feels is
helpful, though not necessarily with the permission of the executing computer's owner.
Source: en.wikipedia.org/wiki/Computer_worm
14
A Trojan horse
A Trojan horse is a destructive program that looks as a genuine application. One function
could be to execute a virus. Unlike viruses, Trojan horses do not replicate themselves but
they can be just as destructive.
A Trojan only starts working once the user launches the program. Thus, once the
program starts, the Trojan can install other software on the computer.
15
Famous computer virus
• Sobig
Source: www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history
16
Phishing
Phishing is a variant of e-mail abuse. Phishing e-mails feign a reputable origin, e.g. from
banks, the post office, DHL, etc., and ask the recipient to enter personal data,
passwords, credit card numbers and PIN codes.
To do this, the recipient is either directed to a prepared website or a corresponding
form in the mail takes the data.
This is to notify all Students, Staffs of University that we are validating active accounts.
Kindly confirm that your account is still in use by clicking the validation link below:
Sincerely
IT Help Desk
17
Spam
Spam is a collective term for unsolicited advertising e-mails that are usually sent in bulk.
Virus e-mails are also often disguised as spam. Careful handling of unknown e-mails is
therefore extremely important. According to various studies, each person with an e-mail
connection needs around 5 minutes per working day to delete unwanted e-mails. The
productivity losses are in billions worldwide.
18
E-Mail ducks or hoaxes
Email ducks or hoaxes are messages that warn of imaginary viruses or dangers or
contain fake requests for help or similar. Most often, recipients of such emails are asked
to forward the message to as many addressees as possible. This leads not only to the
spread of misleading messages, but also to unnecessary load on the email system.
A photo taken of the sign, which was on MPS letterhead, has been widely circulated. The hoax claimed that a
popular drug, referred to as “Strawberry Quick” was being targeted toward children. The hoax claimed the drug
looked like “Pop Rocks” candy, was dark pink in color and has a strawberry scent.
Memorial Health System issued the following statement on its Facebook page: “To anyone who’s seen a photo of a
sign in one of our Memorial physican Services’ Clinics circulating on Facebook about ‘strawberry quick’ drugs being
given to children – the message on the sign is an internet hoax and is not true. We are sorry for the inconvenience.”
The website Snopes.com, which examines the validity of popular rumors and urban legends, confirms that the
information is false. The website quoted an official with the U.S. Drug Enforcement Administration who said that “we
checked with all of our labs, and there’s nothing to it.” The e-mail scare has been in circulation since around 2007.
19
E-mails getting into the wrong hands
Another problem is that e-mails may accidentally or intentionally reach the wrong
recipient. Confidential data and information in the hands of unintended addressees can
cause serious problems.
20
Social Engineering
21
Social engineering methods
There are three different methods of social engineering with which attackers try to obtain
information. Attackers always assume foreign roles and never reveal their actual identity.
Computer-Based/Online Social Engineering
Attackers use technical tools such as:
• Phishing: the sender of an email pretends to be someone else in order to trick the recipient into performing an
unintended action (e.g. entering passwords).
• SMiShing: same principle as above, but by means of SMS
• Abusive / manipulated websites: Websites that trick the victim into revealing confidential information, making
pseudo purchases.
22
Points of attack
Information carriers / technologies
Information carriers are generally considered to be anything that can be used to store and
transmit information, e.g.:
• CD
• USB stick
• External hard disk
• Notebooks
• Smartphones
Places
• Any place where people are present or where information data carriers are stored
represents a potential point of attack, depending on the situation.
Danger potential
The information data carriers themselves are of less interest to the social engineer,
but rather those persons who have access to information carriers, i.e., who
represent an interface to the information.
24
Who is Robin Sage?
Source: en.wikipedia.org/wiki/Robin_Sage
25
Threat radar from Swisscom
Identification and record of
potential threats
AI-Based Attacks
Destabilising/Centralisation
Subscriber Compromisation
Decentralised Development
Device Theft
Infrastructure Misconfiguration
Focal points
Blackout
Group 3 Group 4
Group 2 Group 5
Group 1 Group 6
27
How to protect?
28
Scope of IT Security
29
Passwords
Source: www.mcafee.com/blogs/enterprise/cloud-security/how-to-create-a-strong-password-you-actually-remember/
30
2 Factor Authentication (2FA)
2 FA is a method in which a user is granted access to a website or
application only after successfully presenting two pieces of evidence (or
factors) to an authentication mechanism
31
2FA Example for Mobile Banking
User identification
32
Antivirus
• Open attachments only if there are no doubts about the business use and the sender.
An antivirus software works by scanning incoming files or code being passed through
your network traffic. When files, programs, and applications are flowing in and out of
your computer, the antivirus compares them to its database to find matches.
Source: www.soscanhelp.com/blog/how-does-antivirus-work
33
Sandboxes
Sandboxing security techniques and tools enable to check suspicious software and files
into an isolated environment, a so-called sandbox.
Sandbox
User
WAN
Internet
White listing :
allows information traffic
with identified entities
Black listing :
prevents information traffic
with entity
Source: www.cisco.com/c/en_uk/products/security/firewalls/what-is-a-firewall.html
35
Encryption
Confidential data sent to external parties must
be protected.
Encryption is the method that encodes data
that can be read only by the receiver and not by
the third party as an algorithm is used to
scramble or encrypt data and then uses again in
reverse order to unscramble and decrypt the
information or data.
Various types of cryptographic systems exist that have different strengths and weaknesses. Typically, they are divided
into two classes: those that are strong, but slow to run and those that are quick, but less secure. Most often a
combination of the two approaches is used.
Symmetric Cryptography
Symmetric Cryptography is the most traditional form of cryptography. In a symmetric cryptosystem, the involved
parties share a common secret (password, pass phrase, or key). Data is encrypted and decrypted using the same key.
These algorithms tend to be comparatively fast, but they cannot be used unless the involved parties have already
exchanged keys.
Asymmetric Cryptography (also called Public/Private Key Cryptography)
Asymmetric algorithms use two keys, one to encrypt the data, and either key to decrypt. These inter-dependent keys
are generated together. One is labeled the Public key and is distributed freely. The other is labeled the Private Key and
must be kept hidden.
Source: wiki.owasp.org/index.php/Guide_to_Cryptography#Cryptographic_Algorithms
36
Is it enough?
37
What is Cybersecurity?
Cyber attacks are unwelcome attempts to steal, expose, alter, disable or destroy
information through unauthorized access to computer systems.
Criminal organizations, state actors and private persons can launch cyber attacks
against enterprises. One way to classify cyber attack risks is by outsider versus
insider threats. Source: www.ibm.com/topics/cyber-attack
38
Cybersecurity Threats
Source: techbootcamps.utexas.edu/blog/the-beginners-guide-to-cybersecurity/
39
Build cyber resilience
“Cyber-Attacken sind wie Radioaktivität”
"Cyber attacks are like radioactivity"
Source: www.wired-gov.net/wg/news.nsf/articles/Cyber+resilience+How+important+is+your+reputation+How+effective+are+your+people+03082016161500?open
40
Detect and Prevent
Detect
• Definition of use cases to detect
anomalies
• Applying detection rules to detect
anomalies in systems or running
processes
• Management of alerts
Prevent
41
Security information and event management
Security information and event management (SIEM) technology supports threat detection,
compliance and security incident management through the collection and analysis (both
near real time and historical) of security events, as well as a wide variety of other event
and contextual data sources. The core capabilities are a broad scope of log event
collection and management, the ability to analyze log events and other data across
disparate sources, and operational capabilities (such as incident management, dashboards
and reporting).
Source: www.gartner.com/en/information-technology/glossary/security-information-and-event-management-siem
42
SIEM Functionalities
43
Example of a SIEM Use Case
Successful Host Login after Brute Force Attempts from a Single Source
If after at least 10 failed login attempts, there is a successful one, this rule gets triggered.
This rule detects a successful login after brute force login attempts on a local host from a single source IP address.
Brute Force is a common attack method to "guess" login credentials. The attacker automates a process to send login
requests using a long list of common and inferred usernames and passwords. The attacker enumerates each possibility,
running the process until they find a match and are granted access. It's a rapidfire process, sometimes sending hundreds
or thousands of requests per second. In this case, a brute force login attempt on a host was detected, followed by a
successful login from the same source IP address.
Possible Action:
Immediately block access to the account and system, notifying the authorized user who to contact to restore their
credentials and reset their password. Review your security policy's number of maximum failed login attempts before a user
is locked out for the system accessed, revising if necessary. Investigate the characteristics of the attack and be able to
prevent similar ones in the future.
44
Vulnerability
Vulnerability management is the process of identifying, evaluating, treating, and
reporting on security vulnerabilities in systems and the software that runs on them.
This, implemented alongside with other security tactics, is vital for organizations to
prioritize possible threats and minimizing their "attack surface.“
Scanners rely on declared and constantly updated lists of recognized vulnerabilities.
Source: www.rapid7.com/fundamentals/vulnerability-management-and-scanning/
45
Types of Vulnerability Scanners
Network-Based Scans Host-Based Scans Wireless Scans Application Scans Database Scans
Identifies possible Finds vulnerabilities in Identifies rogue access Detects known Identifies weak
network security workstations, servers, points and validate that software vulnerabilities points in a database
attacks and vulnerable or other networks hosts, a company’s network is and mis-configurations
systems on networks and provides visibility securely configured in network or web apps
into configuration
settings and patch
history
Source: www.balbix.com/insights/what-to-know-about-vulnerability-scanning-and-tools/
46
Number of Vulnerabilities and Exposures over time
Source: www.cvedetails.com
47
Main Vulnerabilities known
Source: www.cvedetails.com
48
Use of Vulnerabilities Management Services
Malware
No
Execution
Yes Protection
rules
49
Methods to exploit vulnerabilities
Adversarial Tactics, Techniques, and Common Knowledge (ATT &CK)
Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Execution Collection Exfiltration Command and Control
Source: attack.mitre.org/matrices/enterprise/
50
Zero Trust Access (ZTA)
never trust, always verify
Cloud
Services
TLS
Trust relationship
Authentication/
SSO Service
Source: en.wikipedia.org/wiki/Secure_access_service_edge#cite_note-:0-2
52
Recognized frameworks
53
Content of the ISO 27002 standard
Source: www.iso27001security.com/html/27002.html
54
Norms and Standards
ISMS Supporting Guidelines and Code of Practice
• ISO/IEC 27002: Code of practice for information security management
• ISO/IEC 27003: ISMS implementation guidelines
• ISO/IEC 27004: Information security management measurements
• ISO/IEC 27005: Information security risk management
ISMS Accredited Certification and Auditing Standards
• ISO/IEC 27006: International accreditation guidelines for the accreditation of bodies operating
certification/registration of information security management systems
• ISO/IEC 27007: Guidelines for information security management systems auditing
• ISO/IEC 27008: Guidelines for auditors on ISMS controls
• ISO/IEC 27009: Sector-specific application of ISO/IEC 27001—requirements
• ISO/IEC 27021: Competence requirements information security management professionals
ISMS Sector Specific
• ISO/IEC 27010: Information security management for intersector and interorganisational
communications
• ISO/IEC 27011: Information security management guidelines for telecommunications organisations
based on ISO/IEC 27002
• ISO/IEC 27013: Guidelines on the integrated implementation of ISO/ IEC 27001 and ISO/IEC 20000-1
• ISO/IEC 27015: Information security management guidelines for financial services
• ISO/IEC 27017: Guidelines on information security controls for the use of cloud computing services
based on ISO/IEC 27002
Function Category
Identifier Function Category
Identifier
CYBERSECURITY
ID.AM Asset Management FRAMEWORK
ID.BE Business Environment VERSION 1.1
ID.GV Governance
ID Identify ID.RA Risk Assessment
ID.RM Risk Management Strategy
ID.SC Supply Chain Risk Management
PR.AC Identity Management and Access Control
PR.AT Awareness and Training
PR.DS Data Security
PR Protect
PR.IP Information Protection Processes and Procedures
PR.MA Maintenance
PR.PT Protective Technology
DE.AE Anomalies and Events
DE Detect DE.CM Security Continuous Monitoring
DE.DP Detection Processes
RS.RP Response Planning
RS.CO Communications
RS Respond RS.AN Analysis
RS.MI Mitigation
RS.IM Improvements
RC.RP Recovery Planning
RC Recover RC.IM Improvements
RC.CO Communications
Source: www.nist.gov/news-events/news/2018/04/nist-releases-version-11-its-popular-cybersecurity-framework
56
CIS Controls
Source: www.cisecurity.org/spotlight/cybersecurity-spotlight-cis-controls
57
Assessing the Maturity Level
a periodic basis.
Data protection Data is a formally defined The environments is Protection standards are
Asset protection is mechanisms are proactively monitored
t
reactive and ad hoc. implemented across the accordance with its via protective automation and
environment. technologies.
Pro
Anomalies or events are Anomaly detection is A baseline of “normal” Continuous monitoring Direction and
activity is established monitoring solutions are
t
not detected or not established through and applied against program is established
tec
Detected in a timely detection tools and to detect threats in real- continuously learning
tools/procedures to behaviors and adjusting
De
incident updated.
The process for Resiliency and recovery A Continuity & Disaster Recovery times and The capabilities of all IT
capabilities are applied Recovery Plan defines personnel, procedures,
r
incidents is reactive or consistently to incidents steps to continue critical monitored and technologies are
co
non-existent. impacting business functions and recover to minimized. regularly tested and
Re
Source: www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-report-a-guide-to-assessing-security-maturity.pdf
58
Security Architecture – As-Is
Single Sign-on
Application User Mgmt 2-factor login in workstation and User Awareness
Allocation of authorizations for core automatic, secure login in applications Sensitization of users to security
application and peripheral systems) issues
Patch Mgmt
Closing known vulnerabilities
24/7 ISMS
Monitoring (Eramba) Application Security / User Mgmt Server / Database / Client Security
#3 Endpoint Single Patch Mgmt Remote
Directory Application Protection Sign-on Access
User Mgmt PAM
Services
#1
Endpoint Vulnerabilit User
Behaviour
Monitoring y Mgmt Awareness
Recertification File -based AV
#2 Monitoring
#6 #4 White-/black
listing #9
#1 Implement a Privileged Access Solution #6 Analyze a Software-supported solution to manage access rights
#2 Put a Vulnerability Management in place #7 Introduce sandboxing, which can be used in the internal and external
network boundaries
#3 Monitor SIEM 7/24 #8 Evaluate a secure mail system and a secure file transfer system
#4 Check accesses on file directories #9 Evaluate the possibilities for blacklisting / whitelisting of applications
60
Protection policy
Source: www.wrc.noaa.gov
61
Corporate Policies
Use of Emails
• Look for the following characteristics before you open an email: Do you know the
sender? Does the subject make sense? Are there programs disguised as documents
in the attachment, for example ending with .exe or .vbs?
• If one or more of these characteristics occur, report the e-mail in question to Security
using the "Report Phishing Mail Lucy" button
• Phishing e-mails pretend to be from a legitimate source
• Never reply to spam e-mails
Access Management
• Grant Access to information, applications and systems appropriately to a user’s
responsibilities
• Access will be controlled at least once a year
62
Having IT Security in place
Major functions of IT Security
63
IT Security covers different areas
8:00
Working
hours
18:00
Non-working
hours
8:00
65
Threats and Answers from ISM
Threats Answers from ISM
• Unauthorized access • Access Control for Mobile Devices
• Unauthorized remote access • Role-Based Security Training
• System admin access • Penetration Testing
• Mobile device • Configuration Change Control
• Login Attempts • Information System Backup
• Logon Attempts • Information System Recovery
• Wireless access • Identification and Authentication
• Wrong application accesses • Privileged Access Management (PAM)
• Unauthorized network access • Restricted Media Use
• Data loss • Rules of Behavior
• Unpermitted Data Download • System Maintenance Life Cycle
• Malicious e-mails • Patching
• Wrong level of SW protection • Public Key Infrastructure Certificates
• Sending confidential information • Client SW Engineering
• User-Installed Software • Anti-Spam Software
• Virus, Worms, Bots • Honeypots (trap for bots or hackers)
• Buffer overflow • Session Locking and Termination
• Head Spray • Sandboxes
• Whitelisting / Blacklisting
66
A battle lost in advance?
Zero-day Attack
"Zero-day" is a broad term that describes recently discovered security vulnerabilities that hackers
can use to attack systems. The term "zero-day" refers to the fact that the vendor or developer has
only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes
place when hackers exploit the flaw before developers have a chance to react.
Source: www.kaspersky.com/resource-center/definitions/zero-day-exploit
Dark web
The widespread availability of dark web
forums dedicated to freely sharing privacy-
enabling technologies, intrusion software and
exploitable code means global law
enforcement agencies face an uphill struggle.
There’s a growing number of technically-savvy
‘amateur hackers’ carrying out cyber-attacks,
though as yet they’ve had little impact. But for
businesses that means even the average
customer could buy a cyber-attack service
anonymously – or possibly learn to conduct
their own cyber-attack – without being caught.
Source: www.paconsulting.com/insights/why-the-dark-web-is-becoming-a-cyber-security-nightmare-for-businesses
67
Be alert
68
Take away and must know!
69
Literature
• Dotson C. (2019) Practical Cloud Security - A Guide for Secure Design and Deployment.
O´REILLY, Sebastopol - CA
• Humphreys E (2016) Implementing the ISO/IEC 27001 ISMS Standard. ARTECH HOUSE,
Boston-London
• Jarpey G, Scott McCoy R. (2017) Security Operations Center Guidebook. Elsevier
• National Institute of Standards and Technology (2013) Security and Privacy Controls for
Federal Information Systems and Organizations, NIST Special Publication 800-53,
Gaithersburg
----------------------------------------------------------------------------------
• www.ncsc.admin.ch
• www.ebas.ch
• www.swisscom.ch/de/magazin/datensicherheit-infrastruktur/
• www.broadcom.com/support/security-center
• www.cisecurity.org
• www.itsecdb.com/oval/
• www.cvedetails.com
• attack.mitre.org/matrices/enterprise
70
www.know-ledge.ch
View publication stats