Information Security Notes & Ebook
Information Security Notes & Ebook
com powers Engineers, Doctors, Managers & Lawyers in India by providing 'free'
resources for aspiring students of these courses as well as students in colleges.
You get FREE Lecture notes, Seminar presentations, guides, major and minor projects.
Also, discuss your career prospects and other queries with an ever-growing community.
ALL FILES ON STUDYNAMA.COM ARE UPLOADED BY RESPECTIVE USERS WHO MAY OR MAY NOT BE THE OWNERS OF THESE FILES. FOR ANY SUGGESTIONS OR FEEDBACK, EMAIL US AT [email protected]
CS1015 – INFORMATION SECURITY
UNIT 1 FUNDAMENTALS 9
History − What is Information Security? − Critical characteristics of information − NSTISSC
security model − Components of an information system − Securing the components −
Balancing security and access − SDLC − Security SDLC.
UNIT II SECURITY INVESTIGATION 9
Need for security − Business needs − Threats − Attacks − Legal, Ethical and professional
issues.
UNIT III SECURITY ANALYSIS 9
Risk management − Identifying and assessing risk − Assessing and controlling risk.
UNIT IV LOGICAL DESIGN 9
Blueprint for security − Information security policy − Standards and practices – ISO
17799/BS 7799 − NIST Models − VISA International Security Mode l − Design of Security
architecture − Planning for continuity.
UNIT V PHYSICAL DESIGN 9
Security technology − IDS − Scanning and analysis tools − Cryptography – Access Control
devices − Physical security − Security and personnel.
Total: 45
TEXT BOOKS
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas
Publishing House, 2003.
2. Micki Krause and Harold F.Tipton, “Handbook of Information Security Management”, Vol 1-
3 CRC Press LLC,2004
REFERENCES
1. Stuart Mc Clure, Joel Scrambray and George Kurtz, “Hacking Exposed”, Tata McGraw-Hill,
2003.
2. Matt Bishop, “Computer Security Art and Science”, Pearson/PHI, 2002.
3. Patel, “Information Security : Theory and Practice”, PHI, 2006.
4. Straub, “Information Security: Policy, Processes and Practices”, PHI, 2009.
UNIT 1 FUNDAMENTALS
UNIT - 1 : INTRODUCTION
I. . History
Introduction
Information security: a ―well-informed sense of assurance that the information risks and
controls are in balance.‖ — Jim Anderson, Inovant (2002)
Necessary to review the origins of this field and its impact on our understanding of
information security today
The 1970s and 80s
The 1990s
Networks of computers became more common; so too did the need to interconnect
networks
Internet became first manifestation of a global network of networks
In early Internet deployments, security was treated as a low priority
The Present
The Internet brings millions of computer networks into communication with each other—
many of them unsecured
Ability to secure a computer‘s data influenced by the security of every computer to which
it is connected
What is Security?
―The quality or state of being secure—to be free from danger‖
A successful organization should have multiple layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
Information system (IS) is entire set of software, hardware, data, people, procedures, and
networks necessary to use information as a resource in the
organization
Data Ownership
Data owner: responsible for the security and use of a particular set of information
Data custodian: responsible for storage, maintenance, and protection of information
Data users: end users who work with information to perform their daily jobs supporting
the mission of the organization
Information Security: Is it an Art or a Science?
Implementation of information security often described as combination of art and science
―Security artesan‖ idea: based on the way individuals perceive systems technologists
since computers became commonplace
Security as Art
No hard and fast rules nor many universally accepted complete solutions
No manual for implementing security through entire system
Security as Science
Dealing with technology designed to operate at high levels of performance
Specific conditions cause virtually all actions that occur in computer systems
Nearly every fault, security hole, and systems malfunction are a result of interaction of
specific hardware and software
If developers had sufficient time, they could resolve and eliminate faults
Need for security − Business needs − Threats − Attacks − Legal, Ethical and professional
issues.
Protecting Data
One of the most valuable assets is data
Without data, an organization loses its record of transactions and/or its ability to deliver
value to its customers
An effective information security program is essential to the protection of the integrity
and value of the organization‘s data
Organizations must have secure infrastructure services based on the size and scope of the
enterprise
Additional security services may have to be provided
More robust solutions may be needed to replace security programs the organization has
outgrown
Threats
Management must be informed of the various kinds of threats facing the organization
A threat is an object, person, or other entity that represents a constant danger to an asset
By examining each threat category in turn, management effectively protects its
information through policy, education and training, and technology controls
The 2002 CSI/FBI survey found:
– 90% of organizations responding detected computer security breaches within the
last year
– 80% lost money to computer breaches, totaling over $455,848,000 up from
$377,828,700 reported in 2001
– The number of attacks that came across the Internet rose from 70% in 2001 to
74% in 2002
– Only 34% of organizations reported their attacks to law enforcement
The 2002 CSI/FBI survey found:
– 90% of organizations responding detected computer security breaches within the
last year
– 80% lost money to computer breaches, totaling over $455,848,000 up from
$377,828,700 reported in 2001
– The number of attacks that came across the Internet rose from 70% in 2001 to
74% in 2002
– Only 34% of organizations reported their attacks to law enforcement
– Inexperience
– Improper training
– Incorrect assumptions
– Other circumstances
Employees are greatest threats to information security – They are closest to the
organizational data
When an organization outsources its web servers, the outsourcer assumes responsibility
for
– All Internet Services
– The hardware and operating system software used to operate the web site
Services
Other utility services have potential impact
Among these are
– telephone
– water & wastewater
– trash pickup
– cable television
– natural or propane gas
– custodial services
The threat of loss of services can lead to inability to function properly
Power Irregularities
Voltage levels can increase, decrease, or cease:
– spike – momentary increase
– surge – prolonged increase
– sag – momentary low voltage
– brownout – prolonged drop
– fault – momentary loss of power
– blackout – prolonged loss
Electronic equipment is susceptible to fluctuations, controls can be applied to manage
power quality
Espionage/Trespass
Broad category of activities that breach confidentiality
– Unauthorized accessing of information
– Competitive intelligence (the legal and ethical collection and analysis of
information regarding the capabilities, vulnerabilities, and intentions of business
competitors) vs. espionage
– Shoulder surfing can occur any place a person is accessing confidential
information
Controls implemented to mark the boundaries of an organization‘s virtual territory giving
notice to trespassers that they are encroaching on the organization‘s cyberspace
Hackers uses skill, guile, or fraud to steal the property of someone else
Espionage/Trespass
Generally two skill levels among hackers:
– Expert hacker
• develops software scripts and codes exploits
• usually a master of many skills
• will often create attack software and share with others
– Script kiddies
• hackers of limited skill
• use expert-written software to exploit a system
• do not usually fully understand the systems they hack
Other terms for system rule breakers:
– Cracker - an individual who ―cracks‖ or removes protection designed to prevent
unauthorized duplication
– Phreaker - hacks the public telephone network
Information Extortion
Information extortion is an attacker or formerly trusted insider stealing information from
a computer system and demanding compensation for its return or non-use
Extortion found in credit card number theft
Sabotage or Vandalism
Individual or group who want to deliberately sabotage the operations of a computer
system or business, or perform acts of vandalism to either destroy an asset or damage the
image of the organization
These threats can range from petty vandalism to organized sabotage
Organizations rely on image so Web defacing can lead to dropping consumer confidence
and sales
Rising threat of hacktivist or cyber-activist operations – the most extreme version is
cyber-terrorism
Attack Descriptions
IP Scan and Attack – Compromised system scans random or local range of IP addresses
and targets any of several vulnerabilities known to hackers or left over from previous
exploits
Web Browsing - If the infected system has write access to any Web s, it makes all
Web content files infectious, so that users who browse to those s become infected
Virus - Each infected machine infects certain common executable or script files on all
computers to which it can write with virus code that can cause infection
Unprotected Shares - using file shares to copy viral component to all reachable locations
Mass Mail - sending e-mail infections to addresses found in address book
Simple Network Management Protocol - SNMP vulnerabilities used to compromise and
infect
Hoaxes - A more devious approach to attacking computer systems is the transmission of a
virus hoax, with a real virus attached
Back Doors - Using a known or previously unknown and newly discovered access
mechanism, an attacker can gain access to a system or network resource
Password Crack - Attempting to reverse calculate a password
Brute Force - The application of computing and network resources to try every possible
combination of options of a password
Dictionary - The dictionary password attack narrows the field by selecting specific
accounts to attack and uses a list of commonly used passwords (the dictionary) to guide
guesses
Denial-of-service (DoS) –
– attacker sends a large number of connection or information requests to a target
– so many requests are made that the target system cannot handle them
successfully along with other, legitimate requests for service
– may result in a system crash, or merely an inability to perform ordinary functions
Distributed Denial-of-service (DDoS) - an attack in which a coordinated stream of
requests is launched against a target from many locations at the same time
Spoofing - technique used to gain unauthorized access whereby the intruder sends
messages to a computer with an IP address indicating that the message is coming from a
trusted host
Man-in-the-Middle - an attacker sniffs packets from the network, modifies them, and
inserts them back into the network
Spam - unsolicited commercial e-mail - while many consider spam a nuisance rather than
an attack, it is emerging as a vector for some attacks
Mail-bombing - another form of e-mail attack that is also a DoS, in which an attacker
routes large quantities of e-mail to the target
Sniffers - a program and/or device that can monitor data traveling over a network.
Sniffers can be used both for legitimate network management functions and for stealing
information from a network
Social Engineering - within the context of information security, the process of using
social skills to convince people to reveal access credentials or other valuable information
to the attacker
People are the weakest link. You can have the best technology; firewalls, intrusion-
detection systems, biometric devices ... and somebody can call an unsuspecting employee.
That's all she wrote, baby. They got everything.‖
―brick attack‖ – the best configured firewall in the world can‘t stand up to a well placed
brick
Buffer Overflow –
– application error occurs when more data is sent to a buffer than it can handle
– when the buffer overflows, the attacker can make the target system execute
instructions, or the attacker can take advantage of some other unintended
consequence of the failure
Timing Attack –
– relatively new
– works by exploring the contents of a web browser‘s cache
– can allow collection of information on access to password-protected sites
– another attack by the same name involves attempting to intercept cryptographic
elements to determine keys and encryption algorithms
UNIT-III
SECURITY ANALYSIS
Risk management − Identifying and assessing risk − Assessing and controlling risk.
Risk management
Risk Management
If you know the enemy and know yourself, you need not fear the result of a hundred
battles.
If you know yourself but not the enemy, for every victory gained you will also suffer a
defeat.
If you know neither the enemy nor yourself, you will succumb in every battle.‖ (Sun Tzu)
Know Ourselves
First, we must identify, examine, and understand the information, and systems, currently
in place
In order to protect our assets, defined here as the information and the systems that use,
store, and transmit it, we have to understand everything about the information
Once we have examined these aspects, we can then look at what we are already doing to
protect the information and systems from the threats
For information security this means identifying, examining, and understanding the threats
that most directly affect our organization and the security of our organization‘s
information assets
We then can use our understanding of these aspects to create a list of threats prioritized
by importance to the organization
Risk Identification
A risk management strategy calls on us to ―know ourselves‖ by identifying, classifying,
and prioritizing the organization‘s information assets
These assets are the targets of various threats and threat agents and our goal is to protect
them from these threats
Next comes threat identification:
– Assess the circumstances and setting of each information asset
– Identify the vulnerabilities and begin exploring the controls that might be used to
manage the risks
Classification
Many organizations already have a classification scheme
Examples of these kinds of classifications are:
– confidential data
– internal data
– public data
Informal organizations may have to organize themselves to create a useable data
classification model
The other side of the data classification scheme is the personnel security clearance
structure
Risk Assessment
We can determine the relative risk for each of the vulnerabilities through a process called
risk assessment
Risk assessment assigns a risk rating or score to each specific information asset, useful in
gauging the relative risk introduced by each vulnerable information asset and making
comparative ratings later in the risk control process
Access Controls
One particular application of controls is in the area of access controls
Access controls are those controls that specifically address admission of a user into a
trusted area of the organization
There are a number of approaches to controlling access
Access controls can be
– discretionary
– mandatory
– nondiscretionary
Lattice-based Control
Another type of nondiscretionary access is lattice-based control, where a lattice structure
(or matrix) is created containing subjects and objects, and the boundaries associated with
each pair is contained
This specifies the level of access each subject has to each object
In a lattice-based control the column of attributes associated with a particular object are
referred to as an access control list or ACL
The row of attributes associated with a particular subject (such as a user) is referred to as
a capabilities table