System Security
System Security
UNIT-I
Introduction to IT system
security
• IT system security covers everything from prevention, detection and
response to improper access from within and outside an
organization, to protect information and systems.
• As the critical importance of IT systems grows daily, so does the
volume of targeted attacks, internal fraud and other security risks
from which IT systems need to be defended.
• Elements of IT system
security Vulnerability
Threat
Risk
Exposure
Countermeasure or Safeguard
The Relation Between the Security Elements
Goals of IT System Security
• IT security generally is comprised of five main goals:
Integrity: guaranteeing that the data are those that they
are believed to be
Confidentiality: ensuring that only authorized individuals
have access to the resources being exchanged
Availability: guaranteeing the system's proper operation
Non-repudiation: guaranteeing that an operation cannot
be denied
Authentication: ensuring that only authorized individuals
have access to the resources
Elements of IT System Security
• Vulnerability
• Threat
• Risk
• Exposure
Threats to IT systems
Threats to IT systems
Threats to IT systems
Technical controls in IT system
security
Technical controls in IT system
security
Technical controls in IT system
security
System security coverage
System security risk management
The process of risk assessment involves following activities:
– determining the assessment's scope and methodology
– collecting and analyzing data
– interpreting the risk analysis results
Chapter-3
What is Endpoint Security
• Security is top of mind for today’s CIO/CISO and endpoints are the new
target.
• Criminals are targeting employees and using their devices to gain access
to networks.
• Compromise is inevitable but a breach can be prevented. Anti-virus
solutions are important but they no longer offer complete protection to
the organization.
• The terms Endpoint Security or Endpoint Protection are generally used to
refer to corporate products that include a range of security features.
These typically include:
• Malware removal based on existing signature files and heuristic algorithms
• Built-in antispyware protection
• Ingress/Egress firewall
• IPS/IDS sensors and warning systems
• Application control and user management
• Data input/output control, including portable devices
Endpoint Security
• Endpoint security products may contain features and
functionality such as:
• Data loss prevention
• Insider threat protection
• Disk, endpoint, and email encryption
• Application whitelisting or control
• Network access control
• Data classification
• Endpoint detection and response
• Privileged user control
Critical Components of Endpoint
Security
• Endpoint encryption fully encrypts your enterprise data on
endpoints, including laptops, mobile devices, and other
endpoints, as well as in individual folders, files, and removable
storage devices like CDs and USB drives.
• Application control prevents the execution of unauthorized
applications on endpoints, a core component of comprehensive
endpoint security measures.
• Application control solves the challenge of employees
downloading unauthorized or dangerous applications on
mobile devices, which could create network vulnerabilities and
lead to unauthorized access.
Endpoint security perspectives:
Consumer versus corporate
there is no central administration:
•Signature and application updates are received from the
developer's control servers via the Internet.
• Endpoint security apps are configured on each computer.
• Alert and log entries are only available on the affected computer.
Centralized administration allows:
• Single sign-on web interface for configuring endpoints.
•All log entries and alerts to be sent to one location, the controlling
server.
•Downloading of signature and application updates once, then the
server application pushes the files out to all endpoints.
Pillars of Endpoint Security
• Four Pillars of Endpoint Security include:
• Endpoint hardening - protect the endpoint from attack
• Endpoint resiliency - make the endpoint auto-healing
• Network prioritization - guard network bandwidth
• Network resiliency - make the network auto-healing
There are four tenets of security: identity, authentication, access control,
and authorization.
• Identity - how principals, such as users, are represented.
• Authentication - how identity is established. For example, a user in
possession of a smartcard provisioned with a trusted X.509 certificate,
plus knowledge of the smartcard PIN, will use the card to
authenticate, thereby establishing his or her identity within the system.
• Access control - the ability of the system to selectively allow or
deny principals to perform actions on protected objects. Access
control enforces authorization rules.
• Authorization - the process by which access control rules are expressed.
• Endpoint Hardening: The goal of the first pillar - endpoint
hardening - is to ensure that network assets are using the latest
technologies to defend against threats. Typical threats include
unsafe email attachments, worm-like viruses that propagate
over the network, and related threats to your web browsers.
• Objective: Reduce the attack surface and minimize
vulnerabilities on individual devices.
The following technologies can aid in endpoint hardening:
• Antivirus and anti-malware software
• Mandatory integrity levels: Least Privilege Principle
• Auditing of network resource access: Helps detecting
and responding to unauthorized access
Endpoint Resiliency
• The goal of endpoint resiliency is to ensure that health information on devices
and applications is continuously gathered and monitored. That way failed
devices or applications can be automatically repaired, thus allowing operations
to continue.
• Objective: Ensure that endpoints can resist, recover from, and adapt to security
incidents effectively.
The following technologies can make endpoints more resilient:
• Network access control (NAC): NAC enhances endpoint resilience by
preventing unauthorized or compromised devices from accessing the
network, reducing the risk of attacks and limiting the potential impact of
security incidents
• Configuration baselining: Configuration baselining enhances endpoint
resilience by maintaining a consistent and secure configuration, reducing
the attack surface and vulnerabilities.
• Patching: Patching contributes to endpoint resilience by proactively
addressing vulnerabilities and reducing the likelihood of successful attacks.
• Antivirus and anti-malware software: Detect and mitigate threats
• Centralized policy and confirmation management: Ensuring uniform
security policies, reducing the risk of misconfigurations.
Network Prioritization
• The goal of network prioritization is to ensure that the available
infrastructure can always meet application bandwidth needs.
This consideration applies not only at well-known peak demand
times, but also when there are unexpected surges on network
loads and distributed external and internal attacks.
• Objective: Optimize network resources, enhance performance,
and prioritize critical activities.
Network Resiliency
• The goal of network resiliency is to allow for seamless asset
failover. Techniques in this area ideally afford reconfiguring the
network in real-time as performance degrades.
• This pillar is similar to endpoint resiliency in that the goal is to
facilitate network self-healing in order to minimize the
management burden.
• Objective: Ensure the network can resist disruptions, adapt to
changes, and maintain continuous operation.
Endpoint Security in BYOD
• Four Pillars of Endpoint Security in Bring your own device (BYOD)
• Endpoint hardening - Technologies like platform attestation allow server-
side resources to extract high-assurance security claims from mobile
devices.
• This helps to keep sensitive data off malware and rootkit infested devices
and can also be used to enforce client attributes, such as the use of
hardware-based disk encryption.
• The latest generation of mobile devices supports a variety of high-integrity
security features, including TPMs (Trusted Platform Module, a secure
cryptoprocessor), SIMs (Subscriber Identity Modules, a smart cards that
store cryptographic identifiable information of subscribers ), and other
hardened cryptographic and data protection features.
• Endpoint reliability -Enforcing patching and platform updates is key to
maintaining endpoint reliability; technologies exist to do this across all
platforms.
Endpoint Security in BYOD
• Network prioritization
• link encryption is a must-have.
• All web applications should enforce Transport Layer Security
(TLS); all clients support it.
• Bandwidth waste is on unencrypted or untrusted requests is avoided.
• Network Resiliency –
• Implementing advanced threat protection measures to detect
and mitigate security threats arising from various devices.
• Segmenting the network to isolate BYOD devices from critical
infrastructure, reducing the potential impact of a security incident.
Endpoint Encryption
Defining endpoint encryption and its difference modes
Disk Encryption: Endpoint encryption (which typically includes disk
encryption and removable media encryption) protects this data,
rendering it unreadable to unauthorized users. Endpoint encryption
describes the differences between disk encryption and file
encryption, details how disk encryption and removable media
encryption work, and addresses recovery mechanisms.
– Removable Media Encryption: Removable media encryption
software provides the ability to encrypt files on removable storage
devices. When a user copies files of a system onto a removable
storage device, each file is encrypted to a password, a shared key or
a certificate. At the same time, utilities for Windows or Mac
systems can be copied (if permitted by policy) allowing authorized
access to data without the endpoint client installed on a machine.
Driver influence endpoint security
• Explaining the business drivers that influence the
endpoint security
Correct and reliable operation
Service-level agreements
IT asset value
Protection of the business asset value or brand image
Legal and regulatory compliance
Contractual obligation
Financial loss and liability
Critical infrastructure
Safety and survival
Driver influence endpoint security
• Explaining the IT drivers that influence the endpoint security
– Internal threats and threat agents
– External threats and threat agents
– IT service management commitments
– IT environment complexity
– Business environment complexity
– Audit and traceability
– IT vulnerabilities: Configuration
– IT vulnerabilities: Flaws
– IT vulnerabilities: Exploits
– End User Complexity
– Fast-Growing Web Threats
– VPN Security Challenges
Challenges of Endpoint Security
– Complacency and Risk: Complacency among users and
organizations regarding security practices can lead to increased
risk. Users may neglect security protocols, such as updating
software or avoiding risky behavior, assuming that security
measures are foolproof.
• IT management bandwidth: IT teams are often overwhelmed
by the sheer volume of endpoints they need to manage
• More flexible and mobile workforce: Endpoints can
connect from various locations and networks, making it
challenging to enforce consistent security measures.
• Lack of integration: Security solutions may not be
fully integrated across the organization's IT
infrastructure.
• Fast moving security threats: Cyber threats evolve rapidly,
with attackers constantly developing new techniques and
exploiting vulnerabilities.
Challenges of Endpoint Security
– Business Challenges: The business challenges of endpoint security
reflect the difficulties organizations face in adequately securing their
endpoints due to various constraints.
• Lack of IT resources: May lack the necessary IT resources, including
personnel, budget, and infrastructure, to implement and maintain
robust endpoint security measures.
• No in-house expertise: May not have dedicated cybersecurity experts
or professionals with specialized knowledge in endpoint security on
their staff.
• Ad-hoc PC management: Ad-hoc PC management refers to an
approach where the management and maintenance of personal
computers (PCs) are carried out in an unplanned, reactive, and often
inconsistent manner.
• Focus on more important tasks: Endpoint security may not be
prioritized adequately due to competing demands for other tasks.
• – The Threats Keep Coming
Endpoint Security Solutions
General aspects covered by an Endpoint Solution
Personal Firewall: Monitors and controls incoming and outgoing network traffic on the
endpoint device.
Wireless Security: Guards against unauthorized access to Wi-Fi networks and protects
data transmitted over wireless connections.
Port Control: Prevents unauthorized devices or data transfers through specific ports.
Data Encryption: Protects sensitive information from being intercepted or accessed by
unauthorized individuals.
USB and Storage Device Security: Controls and monitors the use of USB and other storage
devices.
Application Control: Prevents the execution of malicious or unauthorized applications,
enhancing overall system security.
Integrity and Remediation: Detects and addresses unauthorized changes to system files
or settings, ensuring the system's integrity.
Client Self-Defense: Enhances the resilience of the endpoint security solution against
tampering or disabling attempts.
Alerts Monitoring: Monitors security events and issues alerts in response to potential
threats.
Endpoint Security Solutions
Gartner’s Magic Quadrant
Endpoint protection platforms capabilities & things include in EPP
Antimalware
Personal firewall
Port and device control
EPP solutions also often include:
• Vulnerability assessment
• Application control and application sandboxing
• Memory protection
• Behavioral monitoring of application code
• Endpoint detection and remediation technology
• Full-disk and file encryption, also known as mobile data protection
• Endpoint data loss prevention (DLP)
• Enterprise mobility management (EMM), typically in a parallel non -
integrated product
Quadrant Descriptions
Explaining the quadrant descriptions
Leaders: Leaders demonstrate balanced progress and effort in all
execution and vision categories.
• Challengers: Challengers are good at competing on basic functions,
rather than on advanced features.
• Visionaries: Visionaries can affect the course of technological
developments in the market, but they haven't yet demonstrated
execution.
• Niche Players: Niche Players have not demonstrated sufficient
focus on the core needs of buyers, despite long tenures in this
market.
Evaluation Criteria Definitions
Ability to Execute
Product/Service, Overall Viability, Sales Execution/Pricing
Market Responsiveness/Record
Marketing Execution
Customer Experience
Operations
Completeness of Vision Market Understanding
Marketing Strategy
Sales Strategy
Offering (Product) Strategy
Business Model
Innovation
Vendor Strengths and Limitations
• Bitdefender: Bitdefender still generates the majority of its revenue from
consumer sales, but the gap between consumer sales and enterprise sales
narrowed in 2015.
• The company is investing heavily into its sales operations in Europe
and the U.S. Updates to the enterprise offering included improvements
in security event feeds from endpoints to the management console,
formulating better insights into the presence of malware, unwanted
applications, advanced threats and remediation.
Strengths
• Bitdefender provides very good malware detection capabilities,
including a sandboxed application emulation environment, automatic
unknown file analysis and continuous behavior monitoring, resulting in
very good public test scores.
Limitations
Bitdefender does not offer full feature parity between Windows, OS X
and Linux. The Windows offering supports anti-malware, firewall,
content control and device control. OS X and Linux have only anti-
malware capabilities.
Vendor Strengths and Limitations
Check Point Software Technologies
• Check Point Software Technologies is a well-known network
security company. Its venture into the EPP market, starting
with the 2004 acquisition of ZoneAlarm, continues to suffer
from poor marketing and channel execution.
Strengths
• Endpoint's URL filtering capability enables an off-LAN
URL filtering security policy synchronized with a firewall
blade policy.
Limitations
• Check Point's application control capabilities (which it calls
"program control") remain largely unchanged for this year.
Application control capabilities continue to rely on URL
filtering, anti-bot and anti-malware for restricting
unapproved and suspicious applications.
Application Server Security
Chapter-4
Application Server Security Overview
Application Server Security Overview
Security is a system issue, not a single-product issue. Each
component of system application affects the security of the entire
system. Proper security requires careful configuration of all
system components, including the following third-party
components:
• Web Browsers: Must support specific communication
protocols and security technologies.
• Firewalls: A firewall is only as secure as its maintenance.
• Load Balancers: Moving an SSL session from one server
to another is complicated.
• Virtual Private Networks (VPNs): A VPN prevents a
third party from monitoring or altering communications
but cannot prevent the transmission of viruses.
SSL Keys and Certificates
• When an SSL session is negotiated, the following steps take place:
• The server sends the client its public key.
• The client creates a bulk encryption key, often a 128 bit RC4
(symmetric key encryption) key, using a specified encryption
suite.
• The client encrypts the bulk key with the server's public key, and
sends the encrypted bulk key to the server.
• The server decrypts the bulk encryption key using the
server’s private key.
• This set of operations is called key exchange. After key exchange
has taken place, the client and the server use the bulk
encryption key to encrypt all exchanged data.
Web Traffic Security Approaches
7-73
Need of Security
• Application Server Threats and Countermeasures
– Network Eavesdropping:
– Unauthorized Access
– Viruses, Worms, and Trojan Horses
Introduction to Oracle Application Server
Introduction to Oracle Application Server and security objectives
Providing Basic Security Services
Supporting Standards
Ensuring Deployment and Configuration Flexibility
Minimizing Application Development and Deployment Cost
Providing Security in Depth
Security architecture of oracle
application server
Oracle Application Server Security
Best
Practices
Best practices for HTTPS Use
Best Practices for Cookie Security
Best Practices for Certificates Use
Review Code and Content Against Already Known Attack
Follow Common Sense Firewall Practices
Leverage Declarative Security
Use Switched Connections in DMZ
Place Application Server in the DMZ
Secure Sockets Layer
Web Application Server Security best
practices
– Use separate servers for internal and external applications
– Use Separate Development Server for Testing and Debugging Apps
– Audit Website activity and store logs in a secure location
– Education of developers on sound security coding practices
– Patching Operating System and Web Server
– Use of Application Scanners
Introduction to OWASP
The Open Worldwide Application Security Project (OWASP) is a
nonprofit foundation dedicated to improving software security.
It operates under an “open community” model, which means
that anyone can participate in and contribute to OWASP-related
online chats, projects, and more.
Top 10 OWASP
Insecure Data Storage: Leading to unauthorized access or data compromise.
Weak Server-Side Controls: May allow unauthorized access and manipulation of sensitive data.
Insufficient Transport Layer Protection: May expose information to interception and
manipulation.
Client-Side Injection: May enable attacks like Cross-Site Scripting (XSS) and compromising user
data.
Poor Authorization and Authentication: May potentially lead to unauthorized access and data
breaches.
Improper Session Handling: May potentially allow unauthorized users to gain access to
sensitive information.
Security Decisions via Untrusted Inputs: May lead to security decisions based on unreliable or
manipulated data.
Side Channel Data Leakage: Data Is Obtained from Web caches, Keystroke logging, Screenshots,
Logs, Temp directories
Broken Cryptography: May risk confidentiality and integrity of sensitive data.
Sensitive Information Disclosure: May potentially expose critical data to unauthorized
individuals or entities.
Mobile Application Security Testing
Dynamic Analysis: Involves testing an application while it's running
to assess its behavior, performance, and security.
Black Box Security Testing: Evaluates the security of an application
without knowledge of its internal code or structure. The tester
feeds the application with inputs and observes the response.
Static Analysis & Code Review: Examines the source code and its
structure without executing the program. With static analysis, the
business logic and the security of the application are covered.
Identifying and protecting
Every piece of data is sensitive. Data cannot be classified as sensitive and
non-sensitive. Users enter data into an application under the assumption that
security will not be compromised. Considering the importance users give to
data, applications should be designed to treat every little piece of user data
as sensitive.
Chapter-5
Introduction to Database Server
Security
• A database can be defined as a collection of data that is saved
on a computer system’s hard drive.
• Databases allow any authorized user to access, enter and
analyse data quickly and easily. It’s a collection of queries,
tables and views.
• The data stored in the databases are usually organised to
model aspects that support processes that require information
storage and retrieval.
• These layers are: database administrator system
administrator, security officer, developers and employee and
security can be breached at any of these layers by an attacker.
Importance of Database Server
Security
• Database servers are the foundation of virtually every Electronic
Business, Financial, and Enterprise Resource Planning (ERP)
system, and frequently include sensitive information from
business partners and customers.
• Data integrity and improper access can be compromised by
many factors, including complexity, insecure password usage,
misconfigurations, and unrecognized system backdoors, making
imperative regular use of an adaptive database server security
solution.
• Database security concerns the use of a broad range of information
security controls to protect databases (potentially including the
data, the database applications or stored functions, the database
systems, the database servers and the associated network links)
against compromises of their confidentiality, integrity and
availability.
Architecture for Database Systems
• Explaining the Architecture for Database Systems and it provide:
Independence of data and programs
Ease of system design
Ease of programming
Powerful query facilities
Protection of data
Architecture for Database Systems
• As new computing methods have evolved, different methods of
transferring the data between the database systems and the end
users have been also evolved. For database-backed up systems,
there are three most common architectures as follows:
• A direct link to the computer which performs all the work
• A client/server (two-tier) architecture
• A thin client (three-tier) architecture
In general, the goals of database security are:
• Confidentiality and secrecy: Data should not ever be revealed to anyone
who is not authorized to access it
• Authentication, accuracy and integrity: It means that data cannot
be modified maliciously or corrupted intentionally.
• Recoverable and availability: Systems should continue working, and
the lost data could be recovered easily, efficiently and in the original
form
Database attacks, security & lifecycle
• Attacks on Database
• Two kinds of attack can be made to the databases; physical
attack and the logical attack. Physical attacks can include forced
disclosure of sensitive information like passwords, demolition of
storage devices in system, complete power failure, and theft of
secured information. While logical threats are intentionally or
unauthorized access to sensitive information.
– Insider Threat
– Login Attacks
Need of Database Server Security
• Following are the database vulnerabilities
– Lack of security feature maturity Login Attacks
– Database Password Management
– Oracle Internal Password
– Oracle Listener Process password
– Oracle Internal Password - “orapw” File Permission Control
– Operating system back doors
– Auditing
– TrojanHorses
Database Vulnerabilities
• Risks associated with vendor-supplied software
• Risks associated with administration
• Risks associated with user activity
Database security lifecycle
Database Server threats &
countermeasures
• Following are the database
vulnerabilities SQL Injection – Network
Eavesdropping
Unauthorized Server Access Password Cracking
•
Acquiring Database and Server Security
Chapter-6
Identification of risk
Organizational Assets Used in
Systems
Threat Identification
Prioritizing System Vulnerabilities
Prepare for Selecting Security Controls
Initial Security Control Baseline
Apply Scoping Guidance
Apply Scoping Guidance
The application of appropriate scoping guidance to the initial
baseline
• – Apply Security Objective-related Considerations
• – Apply Common Control-related Considerations
• – System Component Allocation-related Considerations
• – Apply Scalability-related Considerations
• – Document the Decisions in the Security Plan
Analyzing System Environment
A brief description of the technical system is provided which
includes any environmental or technical factors that raise special
security concerns, such as:
The system is connected to the Internet;
It is located in a harsh or overseas environment;
Software is rapidly implemented;
The software resides on an open network used by the general
public or with overseas access;
The application is processed at a facility outside of the
organization's control; or
The general support mainframe has dial-up lines.
Planning for security in the system
lifecycle
Few basic phases of IT system lifecycle
Initiation Phase
Development/Acquisition Phase
Implementation Phase
Operation/Maintenance Phase
Applying Operational Controls
• Personnel Security
• Physical and Environmental Protection