360 Final Notes
360 Final Notes
▪ Risk appetite: The quantity and nature of risk that organizations are willing to accept as
they evaluate the trade-offs between perfect security and unlimited accessibility.
▪ Residual risk: The risk to information assets that remains even after current controls
have been applied.
❖ Justifying Controls:
- There are several ways to determine the advantages/disadvantages of a
specific control.
- Items that affect cost of a control or safeguard include cost of development
or acquisition, training fees, implementation cost, service costs, and cost of
maintenance.
▪ Asset valuation: involves estimating real costs associated with design,
development, installation, maintenance, protection, recovery, and defense
against loss.
• Expected loss per risk stated in the following equation:
“Annualized loss expectancy (ALE) = single loss expectancy (SLE) × annualized
rate of occurrence (ARO)”
• SLE = asset value × exposure factor (EF).
Chapter 5
❖ Feasibility Studies:
• Organizational: Assesses how well the proposed IS alternatives will
contribute to an organization’s efficiency, effectiveness, and overall
operation.
• Operational: Assesses user and management acceptance and support, and
the overall requirements of the organization’s stakeholders.
• Technical: Assesses if organization has or can acquire the technology
necessary to implement and support proposed control.
• Political: Defines what can/cannot occur based on the consensus and
relationships among communities of interest.
Chapter 5
❖ Documenting Results:
- each information asset-threat pair should have documented control strategy
that clearly identifying any remaining residual risk.
▪ Access Control: A selective method by which systems specify who may use a particular
resource and how they may use it.
▪ Mandatory access controls (MACs): A required, structured data classification scheme
that rates each collection of information as well as each user.
• Access control approaches:
- Discretionary access controls (DACs): Access controls that are implemented at the
discretion or option of the data user.
- Nondiscretionary controls: Access controls that are implemented by a central
authority.
- In general, all access control approaches rely on the following four mechanisms,
which represent the four fundamental functions of access control systems:
1. Identification: I am a user of the system.
▪ Identification: The access control mechanism that requires the
validation and verification of an unauthenticated entity’s purported
identity.
2. Authentication: I can prove I’m a user of the system.
▪ Authentication: The access control mechanism that requires the
validation and verification of an unauthenticated entity’s purported
identity.
• Authentication factors:
o Something you know:
▪ Password: a private word or a combination of
characters that only the user should know.
▪ Passphrase: a series of characters, typically longer than
a password, from which a virtual password is derived.
o Something you have:
▪ Dumb card: ID or ATM card with magnetic stripe.
▪ Smart card: contains a computer chip that can verify
and validate information.
o Something you are:
▪ Strong authentication.
3. Authorization: Here’s what I can do with the system.
• Authorization: The access control mechanism that represents the
matching of an authenticated entity to a list of information assets and
corresponding access levels.
• Authorization can be handled in one of three ways:
- Authorization for each authenticated user
- Authorization for members of a group
- Authorization across multiple systems
Chapter 6
❖ Firewall Architectures:
- Firewall devices can be configured in several network connection architectures.
• Best configuration depends on three factors:
1. Objectives of the network.
2. Organization’s ability to develop and implement architectures.
3. Budget available for function.
• Three common architectural implementations of firewalls:
1. Single bastion hosts: Usually implemented as a dual-homed host, which
contains two network interface cards (NICs): one that is connected to
external network and one that is connected to internal network.
2. Screened host: Combines packet-filtering router with a separate,
dedicated firewall.
3. Screened subnet: Commonly consists of two or more internal firewalls
behind packet-filtering router.
• Screened subnet performs two functions:
- Protects DMZ systems and information from outside
threats.
- Protects the internal networks by limiting how external
connections can gain access to internal systems.
▪ Content Filters: A software program that allows administrators to restrict content that
comes into or leaves a network.
- Primary purpose to restrict internal access to external material.
❖ Remote Access:
▪ War dialer: automatic phone-dialing program that dials every number in a
configured range and records number if a modem picks up.
▪ Remote Authentication Dial-In User Service (RADIUS): centralizes responsibility
for user authentication in a central RADIUS server.
▪ Diameter: emerging alternative derived from RADIUS.
▪ Terminal Access Controller Access Control System (TACACS): validates user’s
credentials at centralized server based on client/server configuration.
▪ Kerberos: Provides secure third-party authentication.
• Consists of three interacting services:
o Authentication server (AS)
o Key Distribution Center (KDC)
o Kerberos ticket granting service (TGS)
▪ SESAME.
❖ Virtual Private Networks (VPNs):
- Private and secure network connection between systems.
• Three VPN technologies defined:
1. Trusted VPN.
2. Secure VPN.
3. Hybrid VPN.
• VPN must accomplish:
1. Encapsulation of incoming and outgoing data
2. Encryption of incoming and outgoing data
3. Authentication of remote computer.
• VPN modes:
1. Transport mode:
- Data within IP packet are encrypted, but header information is
not.
- Allows user to establish secure link directly with remote host.
2. Tunnel mode:
- Establishes two perimeter tunnel servers to encrypt all traffic that
will traverse an unsecured network.
ITIS360-Chapter 7
Chapter 7:
Intrusion: occurs when an attacker attempts to gain entry into or disrupt the normal
operations of an organization’s information systems.
Intrusion prevention: consists of activities that deter an intrusion.
Intrusion detection: consists of procedures and systems that identify system intrusions.
Intrusion reaction: encompasses actions an organization undertakes when intrusion event is
detected.
Intrusion correction: activities complete restoration of operations to a normal state and seek to
identify source and method of intrusion.
Intrusion detection systems detect a violation of its configuration and activate alarm.
Many IDPSs enable administrators to configure systems to notify them directly of trouble via e-
mail or pagers.
Systems can also be configured to notify an external security service organization of a “break-
in.”
Some IDPS terminology:
Alarm clustering and compaction • Alarm filtering • Alert/alarm • Confidence value •
Evasion • False attack stimulus • False negative • False positive • Noise
Why use IDPS?
1. Intrusion detection:
o Primary purpose to identify and report an intrusion
o Can quickly contain an attack and prevent/mitigate the loss or damage
o Detect and deal with preambles to attacks
2. Data collection allows the organization to examine what happened after an intrusion
and why.
3. Serves as a deterrent by increasing the fear of detection.
4. Can help management with quality assurance and continuous improvement
Types of IDPSs:
1. Network-based IDPSs: focused on protecting network information assets , it has two
subtypes
Wireless IDPS focuses on wireless networks
Monitors and analyzes wireless network traffic
Issues associated with it include physical security, sensor range, access point
and wireless switch locations, wired network connections, cost, AP, and
wireless switch locations
Network behavior analysis (NBA) IDPS examines traffic flow on a network in an
attempt to recognize abnormal patterns.
Identify problems related to the flow of traffic
Types of events commonly detected include denial-ofservice (DoS) attacks,
scanning, worms, unexpected application services, and policy violations
Offer intrusion prevention capabilities that are passive, inline, and both
passive and inline
ITIS360-Chapter 7
Disadvantages:
2. Host-based systems:
Resides on a particular computer or server (host) and monitors activity only on that system
Benchmarks and monitors the status of key system files and detects when intruder creates,
modifies, or deletes files
Advantage over NIDPS: can access encrypted information traveling over network and make
decisions about potential/actual attacks
Most HIDPSs work on the principle of configuration or change management
Advantages of HIDPSs:
1. Can detect local events on host systems and detect attacks that may elude a network-based
IDPS
2. Functions on host system, where encrypted traffic will have been decrypted and is available
for processing
3. Not affected by use of switched network protocols
4. Can detect inconsistencies in how applications and systems programs were used by
examining records stored in audit logs
Disadvantages of HIDPSs:
3. Does not detect multihost scanning, nor scanning of non-host network devices
4. Susceptible to some DoS attacks
5. Can use large amounts of disk space
6. Can inflict a performance overhead on its host systems
IDPS Detection Methods:
1. Signature-based detection (or knowledge-based detection or misuse detection):
Examines network traffic in search of patterns that match known signatures
Widely used because many attacks have clear and distinct signatures
Problem with this approach is that new attack patterns must continually be added to
the IDPS’s database of signatures
Slow, methodical attack involving multiple events might escape detection
2. Anomaly-based detection (or behavior-based detection):
Anomaly-based detection collects statistical summaries by observing traffic known to be
normal
When measured activity is outside the baseline parameters or clipping level, IDPS sends
an alert to the administrator
IDPS can detect new types of attacks
Requires much more overhead and processing capacity than signature-based detection
May generate many false positives
3. Anomaly-based detection:
SPA: process of comparing known normal/benign protocol profiles against observed
traffic
Stores and uses relevant data detected in a session to identify intrusions involving
multiple requests /responses; allows IDPS to better detect specialized, multisession
attacks (also called deep packet inspection)
Drawbacks: analytical complexity, heavy processing overhead, may fail to detect
intrusion unless protocol violates fundamental behavior, may interfere with normal
operations of the protocol
4. Log file monitors:
Log file monitor (LFM) is similar to NIDPS
Reviews log files generated by servers, network devices, and even other IDPSs for patterns
and signatures
Patterns that signify an attack may be much easier to identify when the entire network and
its systems are viewed as a whole
Requires considerable resources since it involves the collection, movement, storage, and
analysis of large quantities of log data
IDPS Response Behavior:
IDPS response to external stimulation depends on the configuration and function; many
response options are available.
IDPS responses can be classified as active or passive.
Active response: collecting additional information about the intrusion,
modifying the network environment, and taking action against the intrusion
ITIS360-Chapter 7
Passive response: setting off alarms or notifications, and collecting passive data
through SNMP traps
Many IDPSs can generate routine reports and other detailed documents.
Failsafe features protect an IDPS from being circumvented.
Selecting IDPS Approaches and Products:
Technical and policy considerations
Organizational requirements and constraints
IDPSs product features and quality
Strengths and Limitations of IDPSs:
Strengths:
1. Monitoring and analysis of system events and user behaviors
2. Testing the security states of system configurations
3. Baselining the security state of a system and tracking changes
4. Recognizing patterns of system events corresponding to known attacks
5. Recognizing activity patterns that vary from normal activity
Limitations:
1.
Detecting new attacks or variants of existing attacks
2.
Effectively responding to attacks by sophisticated attackers
3.
Automatically investigating attacks without human intervention
4.
Resisting attacks intended to defeat or circumvent them
5.
Dealing effectively with switched networks
Deployment and Implementation of an IDPS:
Implementation:
1. Centralized: All IDPS control functions are implemented and managed in a central location.
2. Fully distributed: All control functions are applied at the physical location of each IDPS
component.
3. Partially distributed: Combines the two; while individual agents can still analyze and respond to
local threats, they report to a hierarchical central facility to enable organization to detect
widespread attacks.
Deployment:
Introduction:
√ All popular Web browsers use built-in encryption features for secure e-commerce
applications.
Terminology:
• Algorithm
• Code
• Decipher
• Encipher
– Bit stream: each plaintext bit is transformed into a cipher bit one bit at a time.
– Block cipher: message is divided into blocks and each is transformed into encrypted
block of cipher bits using algorithm and key.
Vigenère cipher: advanced type of substitution cipher that uses a simple polyalphabetic
code; made up of 26 distinct cipher alphabets
Chapter 8
Plaintext=Ali
Ciphertext = DOL
Vernam Cipher: This cipher uses a set of characters for encryption operations only one
time and then discards it.
To perform:
• The pad values are added to numeric values that represent the
• plaintext that needs to be encrypted
• Each character of the plaintext is turned into a number and a pad value for
that position is added
• If the sum of the two values exceeds 26, then 26 is subtracted from the
total
-Book cipher: ciphertext consists of a list of codes representing page, line, and word
-Running key cipher: uses a book for passing the key to cipher similar to Vigenère
cipher; sender provides encrypted message with sequence of numbers from
predetermined book to be used as an indicator block.
√ A cryptographic method in which the same algorithm and “secret” are used both to
encipher and decipher the message; also known as private-key encryption
Chapter 8
Symmatric encryption
3- Advanced Encryption Standard (AES): developed to replace both DES and 3DES
Cryptographic Tools
• To be useful
– Tools must embody cryptographic capabilities so that they can be applied to
the everyday world of computing.
– Public-Key Infrastructure
– Digital Signatures
– Digital Certificates
– Hybrid Cryptography Systems
Chapter 8
– Authentication
– Integrity
– Privacy
– Authorization
– Nonrepudiation
Typical PKI solution protects the transmission and reception of secure information by
integrating:
Nonrepudiation: the process that verifies the message was sent by the sender and
thus cannot be refuted.
Digital Signature Standard (DSS): is the NIST standard for digital signature algorithm
usage by federal information systems.
Digital Signature: Created in response to rising the need to verify information transferred
via electronic systems.
Pretty Good Privacy (PGP): uses IDEA Cipher for message encoding.
• Organization’scommunitiesroles:
▪ Secure facility: physical location with controls implemented to minimize the risk of
attacks from physical threats.
▪ It takes advantage of natural terrain, local traffic flow, and surrounding development
and can complement these with protection mechanisms (fences, gates, walls, guards,
alarms).
▪ Walls, fencing, and gates - Some of the oldest and most reliable elements of physical
security; the essential starting point for perimeter control.
▪ Guards - Can evaluate each situation as it arises to make reasoned responses; most
have standard operating procedures.
▪ Dogs - Keen sense of smell and hearing can detect intrusions that human guards cannot
▪ ID cards and badges:
- Locks fail and alternative procedures for controlling access must be put in place.
- Fail-secure lock: a door lock that fails and causes the door to remain locked.
▪ Mantraps
- Small enclosure that has an entry point and a different exit point.
- Individual enters mantrap, requests access, and, if verified, is allowed to exit
mantrap into facility.
- Otherwise, when individual denied entry, the person cannot leave the mantrap
until a security official
- overrides the enclosure’s automatic locks
▪ Electronic monitoring - Equipment can record events in areas where other types of
physical controls are impractical
Fire detection
three types of fire detection systems: thermal detection, smoke detection, flame detection.
- Temperature
- Filtration
- Humidity
- Static electricity
- Direct observation
- Interception of data transmission
- Electromagnetic interception
Mobile computing systems
Social engineering: use of people skills to obtain information from employees that should not
be released
• Organization translates its blueprint for information security into a project plan.
- Work to be accomplished
- The people or skill sets assigned to perform the task
- Start and end dates for the task
- Amount of effort required for completion
- Estimated capital expenses for the task
Financial consideration
• In general, the most important information security controls should be scheduled first
• Implementation of controls is guided by the prioritization of threats and value of
threatened information assets
Staffing consideration
• Need for qualified, trained, and available personnel constrains project plan
Procurement consideration
• Size of an organization and the normal conduct of business may preclude a large training
program for new security procedures/technologies.
• If so, the organization should conduct a phased-in or pilot implementation.
Scope consideration
• Project scope: description of project’s features, capabilities, functions, and quality level,
used as the basis of a project plan.
• The need for project management
Supervised implementation
Executing plan
A project manager can adjust one of three planning parameters for the task being corrected:
Project wrap-up
• Direct changeover
- stopping the old method and beginning the new one
• Phased implementation
- only part of the system being brought out and disseminated across an organization
before the next piece is implemented
• Pilot implementation
- the entire security system is put in place in a single office, department, or division
before expanding to the rest of the organization.
• Parallel operations
- involves running two systems concurrently
Relies on the process of project plan evaluation in four layers:
1. Policies
2. Networks
3. Systems
4. Applications
2-System Development Life Cycle: the overall process of developing, implementing, and retiring
information systems through a multistep process.
5-Interconnecting systems
– The direct connection of two or more information systems for sharing data and other
information resources
6-Performance measures
– Metrics should be used for monitoring the performance of information security controls
7-Security planning
9-Risk management
• – Ongoing effort
• – Tasks include performing risk identification, analysis, and management
The Security Maintenance Model: Designed to focus the organizational effort on maintaining
systems
1- External monitoring
Chapter 12
2- Internal monitoring
3- anning and risk assessment Pl
4- Vulnerability assessment and remediation
5- Readiness and review
Monitoring the External Environment
• Entails collecting intelligence from data sources and then giving the intelligence
context and meaning for use by decision makers in the organization.
DataSources
– Turning data into information decision makers can use is the challenge
– Over time, external monitoring processes should capture information about external
environment in appropriate formats
– External monitoring collects raw intelligence, filters for relevance, assigns a relative
risk impact, and communicates to decision makers in time to make a difference
Detecting differences
-Coordinating with IT project teams to introduce risk assessment and review for all IT
projects
Large projects should be broken into smaller projects for several reasons
– Smaller projects tend to have more manageable impacts on networks and users
– Larger projects tend to complicate the change control process in the implementation phase
– RA identifies and documents the risk that a project, process, or an action introduces to the
organization and offers suggestions for controls
1- Penetration testing
Documenting vulnerabilities
Remediating vulnerabilities
– Objective is to repair flaw causing a vulnerability instance
Threat removal
Vulnerability repair
Digital Forensics
• Used to document what happened during attack on assets and how attack occurred
• It is based on the field of traditional forensics
Affidavit
• – Sworn testimony that certain facts are in the possession of the investigating officer;
can be used to request a search warrant
• – It summarizes the facts of the case, the items, and the place must be specified
In digital forensics, all investigations follow the same basic methodology once permission
obtained
• – Identify relevant EM
• – Acquire (seize) the evidence without alteration or damage
• – Take steps to assure that the evidence is at every step verifiably authentic
• – Analyze the data without risking modification or unauthorized access
• – Report the findings to the proper authority
Evidentiary Procedures
Strong procedures for handling potential evidentiary material can minimize the probability of
an organization losing a legal challenge.