Sdafsd
Sdafsd
Techniques
Master of Science
MSCCS - 103 Cyber Security
2021
Cyber Security
Post -Graduate Diploma in Cyber
Techniques
Securi ty Cyber Security Techniques
(PGDCS-02)
Content Editor
ISBN- 978-81-954113-8-2
Printed and published by: Dr. Babasaheb Ambedkar Open University, Ahmedabad While all efforts
have been made by editors to check accuracy of the content, the representation of facts, principles,
descriptions and methods are that of the respective module writers. Views expressed in the
publication are that of the authors, and do not necessarily reflect the views of Dr. Babasaheb
Ambedkar Open University. All products and services mentioned are owned by their respective
copyrights holders, and mere presentation in the publication does not mean endorsement by Dr.
Babasaheb Ambedkar Open University. Every effort has been made to acknowledge and attribute all
sources of information used in preparation of this learning material. Readers are requested to kindly
notify missing attribution, if any.
Dr. Babasaheb MSCCS-103
Ambedkar Open
University
Block-1
Cyber Security Techniques
Block-2
Block-4
Unit Structure
1.2. INTRODUCTION
1.3. DETAILED DESCRIPTION OF IT SECURITY POLICIES
1
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Definesecurity
Understand policy
Apply procedures for organizationalsecurity
1.2 INTRODUCTION
Organizations are becoming increasingly sophisticated in the way in which they organize and use
IT. They are spending too much on IT just to take benefits form latest technologies and to boost
their business and grow leaps and bounds. We can see it around us in real time. Now for booking
a cab we rarely have to tell the cab driver our pickup address manually, app detects it
automatically. Most of the providers use location based system (GPS) to track the user and set
that address as a pickup location. It‘s just matter of minutes that booked cab arrives at your
place. People have never thought of these 10 years ago. Even organizations are using technology
this much, still most of the organization are not having dedicated budget for security as they
don‘t see any direct return on investment. Once Organization goes through major attack then
they start thinking about security and start spending budget on securitythings.
As a company‘s part people should be aware of their security responsibility. For proper security
in organization people process and technology should be focus area of improvement. In these
days employees are most targeted, because they are easily exploitable. For example company
spends too much in technology and often believes if we are spending on these expensive and
advanced firewalls, IDS/IPS then we must be secure and protected. For this company, attacker
manipulated one employee of the company and got the credentials and other details of these
latest devices and in matter of seconds, this company was hacked, although they were using
latest technology and they were also spending forsecurity.
Now one question arises in one‘s mind, where to start if one wants its organization to secure its
assets. So the first step is to prepare and follow a security guideline document which includes all
the security procedures to be followed while carrying out different processes in the organization
as well as the disadvantage. Before discussing it further, let us familiarize ourselves with some of
the common terminologies that we are going throughout our discussion in this chapter.
1.2.1 Glossary
a. Policy: Policy is a high level document to represent corporate philosophy of a particular
organization. Policies are kept more clear and concise to keep them effective. Basic
elements of a policy are purpose, scope, responsibility andcompliance.
b. Asset management: Asset management is all about discovery, ownership, value,
acceptable use, protection, and disposal of information-relatedassets.
c. Owner: The information owner is the entity within the organization that has been
assigned the responsibility to exercise the organization‘s proprietary rights and grant
access privileges to those with a true businessneed.
2
d. Custodian: The custodian is the entity which is responsible for overseeing and
implementing the necessary safeguards to protect assets, at the level classified by the
informationowner.
e. User: User is the person who is responsible for viewing, amending, or updating the
content of the information assets. This can be any user of the information in the inventory
created by the informationowner.
3
processes.
It should be derived from and support all legislation and regulations applicable to
the company.
It should be reviewed and modified as a company changes, such as through adoption of
a new business model, a merger with another company, or change ofownership.
Each iteration of the policy should be dated and under versioncontrol.
The units and individuals who are governed by the policy must have easy access to it.
Policies are commonly posted on intranetportals.
It should be created with the intention of having the policies in place for several years at a
time. This will help ensure policies are forward-thinking enough to deal with potential
changes that mayarise.
The level of professionalism in the presentation of the policies reinforces their
importance as well as the need to adhere tothem.
It should not contain language that isn‘t readily understood by everyone. Use clear and
declarative statements that are easy to understand andadopt
It should be properly supported andadministered.
It should contribute in overall success oforganization.
While formulation of policies information system users should beinvolved.
Security policy must be approved by senior management and should be documented and
controlled. The success of an information resources protection program depends on the policies,
& on the attitude of management toward securing information on systems. The policy maker set
the tone and the emphasis on how important a role InfoSec will have within your agency. So the
policy maker should be having overall organizational picture so that policy designed by him can
cover the whole organization.
4
Ideas: Has the policy process been informed by evidence that is high quality and up to
date? Has account been taken of evaluations of previous policies? Has there been an
opportunity or license for innovative thinking? Have policy makers sought out and
analyzed ideas and experience from ‗t hf reo n t line‘, overseas and the devolved
administrations?
Design: Have policy makers rigorously tested or assessed whether the policy design is
realistic, involving implementers and/or end users? Have the policy makers addressed
common implementation problems? Is the design resilient to adaptation by
implementers?
External engagement: Have those affected by the policy been engaged in the process?
Have policy makers identified and responded reasonably to theirviews?
Appraisal: Have the options been robustly assessed? Are they cost-effective over the
appropriate time horizon? Are they resilient to changes in the external environment?
Have the risks been identified and weighed fairly against potentialbenefits?
Roles and accountabilities: Have policy makers judged the appropriate level of
involvement? Is it clear who is responsible for what, who will hold them to account, and
how?
Feedback and evaluation: Is there a realistic plan for obtaining timely feedback on how
the policy is being realized in practice? Does the policy allow for effective evaluation,
even if top management is not doingit?
Proper dissemination: There should be proper dissemination of policies So that people
can become aware of and contribute in adherence ofpolicy.
Read by the targeted staff/audience: Policies are only useful if the people for whomit‘s
targeted read thosepolicies.
o It‘s effective when people read the policies and understood thosepolicies.
o People should be agreed-to the formulated policies then only they will be
effective.
As in this dynamic environment upon the need policies should be updated from time to time, if
required to make them effective.
6
Acceptable UsePolicy
Minimum AccessPolicy
Network AccessPolicy
Remote AccessPolicy
Acceptable EncryptionPolicy
Web Server SecurityPolicy
Extranet Policy
Application Service ProviderPolicy
Authentication CredentialsPolicy
1.5 IT SECURITYPROCEDURES
Procedures consist of step by step instructions to assist workers in implementing the various
policies, standards and guidelines. Whilst the policies, standards and guidelines consist of the
controls that should be in place, a procedure gets down to specifics, explaining how to
implement these controls in a step by step fashion. For example, a procedure could be written to
explain how to install Windows securely, detailing each step that needs to be taken to
harden/secure the operating system so that it satisfies the applicable policy, standards and
guidelines.4
Figure 1: Spikes atop a barrier wall act as a deterrent to people trying to climb over the wall3
b. Natural surveillance: Another major form of deterrence that can be incorporated into the
design of facilities is natural surveillance, whereby architects seek to build spaces that are
more open and visible to security personnel and authorized users, so that
intruders/attackers are unable to perform unauthorized activity without being seen. An
example would be decreasing the amount of dense, tall vegetation in the landscaping so
thatattackerscannotconcealthemselveswithinit,orplacingcriticalresourcesinareaswhere
intruders would have to cross over a wide, open space to reach them (making it likely that
someone would notice them).
c. Security lighting: Security lighting is another effective form of deterrence. Intruders are
less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances,
in particular, should be well lit to allow close observation of people entering and exiting.
When lighting the grounds of a facility, widely-distributed low-intensity lighting is
generally superior to small patches of high-intensity lighting, because the latter can have
a tendency to create blind spots for security personnel and CCTV cameras. It is important
to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights
from tall poles), and to ensure that there is a backup power supply so that security lights
will not go out if the electricity is cutoff.
10
bank credential is not possible. This Secure Sockets Layer (SSL), succeeded by Transport
Layer Security (TLS) is used for webtraffic.
c. Internet Protocol Security (IPsec): IPsec is designed to protect TCP/IP communication
in a secure manner. It is a set of security extensions developed by the Internet Task Force
(IETF). It provides security and authentication at the IP layer by transforming data using
encryption.
Two main types of transformation that form the basis of IPsec:
1. Authentication Header (AH) and
2. ESP.
These two protocols provide data integrity, data origin authentication, and anti-replay
service. These protocols can be used alone or in combination to provide the desired set of
security services for the Internet Protocol (IP) layer.
The set of security services provided at the IP layer includes access control, data origin
integrity, protection against replays, and confidentiality. The algorithm allows these
setsto work independently without affecting other parts of the implementation. The IPsec
implementation is operated in a host or security gateway environment giving protection
to IPtraffic.
1.7.4 Security Token
For more secure infrastructure online sites offer customers the ability to use a code which
randomly changes every 30–60 seconds on a security token. Security token is device provided by
the online site. The keys on the security token have built in mathematical computations and
manipulate numbers based on the current time built into the device. Every thirty seconds there is
only a certain array of numbers possible which would be correct to validate access to the online
account.
12
Figure 3: Pretty Good Privacy5
For example, the organizations could establish a virtual private network (VPN) to encrypt the
communications between their mail servers over the Internet. Unlike methods that can only
encrypt a message body, a VPN can encrypt entire messages, including email header information
such as senders, recipients, and subjects. In some cases, organizations may need to protect
1.7.9 Firewall
Firewalls is network security system that monitors the incoming and outgoing network traffic
13
and allow or deny the packets based on predetermined security rules. A firewall typically
establishes a barrier between a trusted, secure internal network and another outside network,
such as the Internet, that is assumed to not be secure ortrusted.
In broader terms firewalls are of two types.
a. Networkfirewalls
b. Host-basedfirewalls.
1.7.12 Phishing
Phishing is another common threat to the Internet. "SA, the Security Division of EMC,
announced the findings of its January 2013 Fraud Report, estimating the global losses from
Phishing at $1.5 Billion in 2012." Filter evasion, website forgery, phone phishing, Covert
Redirect are some well-known phishing techniques.
Hackers use a variety of tools to conduct phishing attacks. They create forged websites that
pretend to be other websites in order for users to leave their personal information. These hackers
usually host these sites on legitimate hosting services using stolen credit cards while the last
trend is to use a mailing system and finding a mailing list of people which they can try andfraud.
1.8 SUMMARY
1. Policies are set with the objectives of reduced risk, compliance with laws & regulations,
& assurance of operational continuity, information integrity, &confidentiality.
2. Policies are important reference documents for internal audits & for resolution of legal
disputes about management‘s duediligence.
3. Security policy communicates a coherent security standard to users, management and
technicalstaff.
4. A security policy can be an organizational policy, an issue-specific policy, or a system-
specificpolicy.
5. In an organizational security policy, management establishes how a security program will
be set up, lays out the program‘s goals, assigns responsibilities, shows the strategic and
tactical value of security, and outlines how enforcement should be carriedout.
6. Physical security encompasses different threats, vulnerabilities and risks which should be
addressed by organization to keep themselvessecure.
15
7. Economic security or financial security is the condition of having stable income or other
resources to support a standard of living now and in the foreseeablefuture.
8. Data which is at rest is protected by applying secure encryption on hard drive/pen drive
and data at transit can be protected by communicating using secure channel which again
uses encryption and this provides online security.
16
Unit 2: Cyber Crime and Different Modes
of Attack 2
Unit Structure
17
2.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Know the basic terminologies ofattacks
Definition of word cybercrime
How to report a cyber-crime
Differentiate between insider and outsiderattacks
Defineattacks
2.2 INTRODUCTION
Attack is any attempt to destroy, expose, alter, disable, steal, gain unauthorized access, or to
make unauthorized use of an asset6. There are many definition of an attack found in literature.
Some of the popular onesare:
a. Internet Engineering Task Force defines attack: An assault on system security that
derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt
(especially in the sense of a method or technique) to evade security services and violate
the security policy of asystem.
b. Committee on National Security Systems of United States of America defines an attack
as: Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or
destroy information system resources or the informationitself.
The increasing dependencies of modern society on information and computers networks (both in
private and public sectors, including military) have led to new terms like cyber-attack
andCyber warfare.
It further defines―An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the
purpose of disrupting, disabling, destroying, or maliciously controlling a computing
environment/infrastructure; or destroying the integrity of the data or stealing controlled
information.”
Cyber-attacks can range from installing spyware on a PC to attempts to destroy the infrastructure
of entire nations. Cyber-attacks have become increasingly sophisticated and dangerous as the
Stuxnet worm recentlydemonstrated.
2.2.1 Glossary
The term attack relates with some other basic security terminologies as shown in the Figure 4
below. The current section defines some of the terms used frequently in context of cyber
security.
b. Passive attack: It is defined as an attempt to learn or make use of information which was
gathered from the system, but it does not affect the systemresources.
The attacks can be classified according to their origin. Based on whether the attacker is from
inside or outside the organization, an attack can further be classified as:
a. An "inside attack" is an attack initiated by an entity inside the security perimeter (an
"insider"), i.e., an entity that is authorized to access system resources but uses them in a
way not approved by those who granted the authorization. It can be any disgruntled
19
employee who wants to attack on thesystem.
b. An "outside attack" is initiated from outside the perimeter, by an unauthorized or
illegitimate user of the system (an "outsider"). In the Internet, potential outside attackers
range from amateur pranksters to organized criminals, international terrorists, and hostile
governments.
An attack usually is perpetrated by someone with bad intentions; Black hated attacks falls in this
category. An Ethical Hacker performs Penetration testing on an organization information system
to find out if all foreseen controls are in place. It can also be classified based on the fact whether
the attack is conducted using one or more computers in the last case is called a distributed attack.
Botnet are used to conduct distributed attacks.
Other classifications are according to the procedures used or the type of vulnerabilities exploited.
Attacks can be concentrated on network mechanisms or host features.
Some attacks are physical: i.e. theft or damage of computers and other equipment. Others are
attempts to force changes in the logic used by computers or network protocols in order to achieve
unforeseen (by the original designer) result but useful for the attacker. Software used to for
logical attacks on computers is calledmalware.
Passive
o Network
Wiretapping
Portscanner
Idlescan
Active
o Denial-of-serviceattack
o Spoofing
o Network
Man in themiddle
ARP poisoning
Pingflood
Ping ofdeath
Smurfattack
o Host
Bufferoverflow
Heapoverflow
Stackoverflow
Format stringattack
2.3.1 Insider Attack
20
An insider attack is a malicious attack perpetrated on a network or computer system by a person
with authorized system access such as employees, former employees, contractors or business
associates, who have inside information concerning the organization's security practices, data
and computersystems.
Insiders that perform attacks have a trenchant advantage over external attackers because they
have authorized system access and also familiar with network architecture and system
policies/procedures. In addition, there may be less security against insider attacks because many
organizations focus on protection from external attacks.
Knowing who is an insider is the first step to classifying internal attacks, and understanding what
constitutes an insider attack will be the next step. Some common attacks made by employees,
contractors, or students are:
Making an unintentionalmistake.
Trying to accomplish needed tasks – for example, in a cause in which the system does not
support a particular action or the insider is blocked from accessing certain data, the
insider may try workarounds to accomplish the samething.
Trying to make the system do something for which it was not designed, as a form of
innovation to make the system more useful orusable.
Checking the system for weaknesses, vulnerabilities or errors, with the intention of
reporting theproblems.
Acting with the intention of causing harm, for reasons such as fame, greed, capability,
divided loyalty ordelusion.
Types of InsiderAttack
a. Compromised actors: Insiders with access credentials or computing devices that have
been compromised by an outside threat actor. These insiders are more challenging to
address since the real attack is coming from outside, posing a much lower risk of being
identified.
b. Unintentional actors: Insiders who expose data accidentally, such as an employee who
accessescompanydatathroughpublicWi-Fiwithouttheknowledgethatit‘sunsecured.A large
number of data breach incidents result from employee negligence towards security measures,
policies, and practices.
c. Emotional Attackers: Insiders who steal data or destroy company networks
intentionally, such as a former employee who injects malware or logic bomb in corporate
computers on his last day atwork.
d. Tech savvy actors: Insiders who react to challenges. They use their knowledge of
weaknesses and vulnerabilities to breach clearance and access sensitive information.
Tech savvy actors can pose some of the most dangerous insider threats, and are likely to
sell confidential information to external parties or black marketbidders.
How to prevent InsiderAttack
21
If you consider the full attack path of an external hacker, the first step is to gain internal access.
Usually organizations expend an extra ordinary amount of resources on protecting their edge
specifically to counter insider threats. Every organization need to create an effective security
policy is understand your attack surface. Below are the steps for preventing insider attack:
e. Step 1: The first step in protecting a company‘s assets from internal attacks is to identify
and classify what those assets are and what controls are currently in place to protect those
assets. If a company‘s most important asset is money, then it will be important to note its
physical location, how it is accessed, how it is guarded, who currently protects it, how
much of it exists, and how the amount is recorded and maintained safe fromalteration.
If the most important asset is data, it will be important to note what form is it stored in
(electronic or physical), where it is stored (on a server, in a file cabinet), how it is
accessed (over the network, physically opening a file cabinet), who has access to it
(employees, managers), how changes are logged, and what controls are in place to secure
it (usernames & passwords, lock & key). After identifying the assets and all the means of
accessing them, the company should determine who, within the company, has access to
these assets. This list should be reviewed and re-evaluated against job roles to ensure that
only those employees that actually need access to conduct their daily responsibilities
continue to have access. For all other employees, regardless of rank or managerial
influence, their access should be removed.
f. Step 2- Assigning Owners: Classify your information so you can design and implement
the proper controls for different types of data. The owner should be typically a senior
ranking official, who have a solid understanding of the high level business processes but
he/she should not be involved in the daily routine of operations ormaintenance.
The owner should be responsible for making decisions about the assets including who
should have access to them, and for what purpose. The information supervisor should be
responsible for the maintenance and administration of the assets. The supervisor should
follow the directives of the information owner and provides the operational and security
aspects of maintaining the asset. If the owner defines the ―what and who‖, the supervisor
provides the ―how‖.
g. Step 3- Recognize Suspicious behaviour: It is difficult to prevent a malicious attack
from a motivated insider, there are ways to spot bad behaviour before it becomes a big
problem. Each employee has logical patterns of information usage, and the organization
should look for abnormal usage and investigate when this occurs. For example, if an
employee looks at 50 customer accounts each day and then one day looks at 100 or more,
there is a potential issue that should be investigated. You always need to understand if
unusual behaviour is warranted or malicious. Identifying potential issues or unauthorized
changes requires logging or record keeping of all changes so as to be able to identify who
made the change, when it happened, and the details of thechanges.
2.3.2 OutsiderAttack
Outsider threat occurs when an individual or a group seeks to gain protected information by
infiltrating and taking over profile of a trusted user from outside the organization.
23
Attacks perpetrated by adversaries that do not have access to direct access to any of the
authorized nodes in the network. However, the adversary may have access to the physical
medium, particularly if we are dealing with wireless networks. Therefore, attacks such as replay
messages and eavesdropping fall into this classification. However, coping with this attack is
fairly easy by using traditional security techniques such as encryption and digital signatures.
Malicious attackers use various method, tools, and techniques to enter, disrupt, and steal
information from asystem.
Antivirus programs, which can scan and keeps you alert aboutviruses
Firewall of your system, which can be configured for enabling you to transfer
selected information between your system andinternet.
Backup is another way of protecting your important files and documents, as this helps
to restore lost files because of virusattack.
Things to remember
Apart from the main security options for your data, there are some more points that you should
keep in mind. These are as follows:
Indentify the symptoms of threats, so that you can take proper measures to tacklethem
Keep the virus database of your antivirus programupdated
Scan your system once in a week, to look out for newbugs
Be alert of emails that ask for personalinformation
Scan USB devices that you use for transferringdata
25
Keep your web browser and OS up todate
27
personal information such as passwords and credit card information. Important data of a
company can also be hacked to get the secret information of the future plans of thecompany.
Viruses and worms: Viruses and worms are very major threat to normal users and companies.
Viruses are computer programs that are designed to damage computers. It is named virus
because it spreads from one computer to another like a biological virus. A virus must be attached
to some other program or documents through which it enters the computer. A worm usually
exploits loop holes in software's or the operating system. Trojan horse is dicey. It appears to do
onethingbutdoessomethingelse.Thesystemmayacceptitasonething.Uponexecution,itmay release a
virus, worm or logic bomb. A logic bomb is an attack triggered by an event, like computer clock
reaching a certain date. Chernobyl and Melissa viruses are the recent examples. Experts estimate
that the Mydoom worm infected approximately a quarter-million computers in a single day in
January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft
and a number of other very large companies to completely turn off their e-mail systems until the
virus could becontained.
Spamming– involves mass amounts of email being sent in order to promote and advertise
products and websites. Email spam is becoming a serious issue amongst businesses, due to the
cost overhead it causes not only in regards to bandwidth consumption but also to the amount of
time spent downloading/ eliminating spam mail. Spammers are also devising increasingly
advanced techniques to avoid spam filters, such as permutation of the emails contents and use of
imagery that cannot be detected by spam filters.
Financial Fraud- These are commonly called ―Phishing‘scams, and involve a level of social
engineering as they require the perpetrators to pose as a trustworthy representative of an
organization, commonly the victim‘s bank.
Identity Theft, Credit Card Theft, Fraudulent Electronic Mails (Phishing): Phishing is an
act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in
order to scam the user into surrendering private information that will be used for identitytheft.
Cyber harassment- is electronically and intentionally carrying out threatening acts against
individuals. Such acts include cyber-stalking.
Cyber laundering- is an electronic transfer of illegally-obtained monies with the goal of hiding
28
its source and possibly its destination.
Website Cloning: One recent trend in cyber-crime is the emergence of fake ‗copy-cat‘ web sites
that take advantage of consumers what are unfamiliar with the Internet or who do not know the
exact web address of the legitimate company that they wish to visit. The consumer, believing
that they are entering credit details in order to purchase goods from the intended company, is
instead unwittingly entering details into a fraudster‘s personal database. The fraudster is then
able to make use of this information at a later stage, either for his own purposes or to sell on to
others interested in perpetrating credit cardfraud.
Lack of National Functional Databases: National database could serve as a means of tracking
down the perpetrators of these heinous acts by checking into past individual records and tracing
their movements.
Proliferation of Cybercafés: As a means of making ends meet, many entrepreneurs have taken
to establishment of cybercafés that serve as blissful havens for the syndicates to practice their
acts through night browsing service they provide to prospective customers without being guided
ormonitored.
Porous Nature of the Internet: The Internet is free for all with no central control. Hence, the
state of anarchy presently experienced.
New technologies create new concepts that have no legal equivalence or standing. Nevertheless,
a virus utilizes the resources of the infected system without the owner‘s permission. Hence, even
a benign virus may be variously interpreted as a system penetration, a piece of electronic graffiti
or simply a nuisance prank. The major point however, is that the legal system and therefore the
29
definition of computer crime itself is reactive and unable to encompass behaviors or acts that
involve new computationalconcepts.
Information has several unique and abstract properties - for example its capacity to still be in the
owner‘s possession after it has been copied or stolen. The last decade has seen the legal system
struggle with the implications of this in a computer based context. Clearly, conventional notions
of copyright, patent rights and theft have been strained when applied to software and computer
based information, basically because existing concepts of theft and break-in for example, relate
to common notions of permanent deprivation or removal (theft) or physical damage(break-ins).
A related property of digital information is the ease and extent to which it can be transformed
and translated. That is, a piece of information (i.e., a program) can be represented in a huge
variety of informational forms. It can be represented as program text (source code), executable
code (binaries), or it can be transformed in a large number of ways - mathematically, by
encryption, or by conversion to say a holographic image or a piece of music. As long as the
method(s)oftransformationareknown,themusic,image,orencryptedtextcanbetranslated
back to its original form. Therefore, the informational form in which information exists may
eventually have no legal status. Instead, some measure of its value or functionality as
information itself may eventually determine its legal and commercialposition.
This malleability of information has implications in terms of system break-ins where information
may not be destroyed (as in corrupted or erased) but is encrypted or made temporarily
inaccessible. Such actions can hardly be classified as theft or even malicious damage.
Loss of reputation: Most companies that have been defrauded or reported to have been faced
with cybercriminal activities complain of clients losing faith in them.
Reduced productivity: This is due to awareness and more concentration being focused on
preventing cybercrime and not productivity. Vulnerability of their Information and
Communication Technology (ICT) systems and networks.
30
no new system is allowed online until it conforms to the security policy.
Establishment of Programs and IT Forums for Youths: Since the level of unemployment in
the country has contributed significantly to the spate of e-crime, the government should create
employments for these youths and set up IT laboratories/forum where these youths could come
together and display their skills. This can be used meaningfully towards developing IT at the
same time they could be rewarded handsomely for such novelty.
Address Verification System: Address Verification System (AVS) checks could be used to
ensure that the address entered on your order form matches the address where the cardholder‘s
billing statements are mailed.
Interactive Voice Response (IVR) Terminals: This is a new technology that is reported to
reduce charge backs and fraud by collecting a ―voice stamp‖ or voice authorization and
verification from the customer before the merchant ships the order.
IP Address tracking: Software that could track the IP address of orders could be designed. This
software could then be used to check that the IP address of an order is from the same country
included in the billing and shipping addresses in the orders.
Use of Video Surveillance Systems: The problem with this method is that attention has to be
paid to human rights issues and legal privileges.
Antivirus and Anti spyware Software: Antivirus software consists of computer programs that
attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti-
spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on
the computer.
Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls
may be hardware devices, software programs, or a combination of the two. A network firewall
typically guards an internal computer network against malicious access from outside the
network.
Cyber Ethics and Cyber legislation Laws: Cyber ethics and cyber laws are also being
formulated to stop cyber-crimes. It is a responsibility of every individual to follow cyber ethics
and cyber laws so that the increasing cyber-crimes will reduce. Security software like anti
viruses and anti-spy wares should be installed on all computers, in order to remain secure from
cyber-crimes. Internet Service Providers should also provide high level of security at their
servers in order to keep their clients secure from all types of viruses and maliciousprograms.
31
Access Device Fraud Statutes: 18 U.S.C. § 1029 outlines 10 different offenses under which an
offender could violate concerning device fraud. These offenses include:
Any organization or corporate using computer systems and networks may be confronted with
security breaches or computer security incidents. By reporting such computer security incidents
to CERT-In the System Administrators and users will receive technical assistance in resolving
these incidents. This will also help the CERT-In to correlate the incidents thus reported and
analyze them; draw inferences; disseminate up-to-date information and develop effective
security guidelines to prevent occurrence of the incidents infuture.
System Administrators can report an adverse activity or unwanted behaviour which they may
feel as an incident to CERT-In.
E-mail :[email protected]
Helpdesk :+91-1800-11-4949
Fax:+91-1800-11-6969
The following information (as much as possible) should be provided while reporting the incident.
Time of occurrence of theincident
Information regarding affectedsystem/network
Symptomsobserved
32
Relevant technical information such as security systems deployed, actions taken to
mitigate the damageetc.
CERT-In will then analyse the information provided by the reporting authority and identify the
existence of an incident. In case it is found that an incident has occurred, a tracking number will
be assigned to the incident. Accordingly, the report will be acknowledged and the reporting
authority will be informed of the assigned tracking number. CERT-In will designate a team as
needed.
The designated team will assist the concerned System Administrator in following broad aspects
of incident handling:
Identification: to determine whether an incident has occurred, if so analyzing the nature of such
incident, identification and protection of evidence and reporting of the same.
Containment: to limit the scope of the incident quickly and minimize the damage
Eradication: to remove the cause of the incident
Recovery: taking steps to restore normal operation
2.6 SUMMARY
1. Attack is any attempt to destroy, expose, alter, disable, steal, gain unauthorized access, or
to make unauthorized use of anasset.
2. The increasing dependencies of modern society on information and computers networks
(both in private and public sectors, including military) have led to new terms like cyber-
attack andCyberwarfare.
3. An attack usually is perpetrated by someone with badintentions.
4. The attacks can be classified according to their origin. Based on whether the attacker is
from inside or outside theorganization.
5. Insiders that perform attacks have a trenchant advantage over external attackers because
they have authorized system access and also familiar with network architecture and
systempolicies/procedures.
6. In addition, there may be less security against insider attacks because many organizations
focus on protection from externalattacks.
7. Cyber-crimes have gone beyond conventional crimes and now have threatening
ramifications to the national security of all countries, even to technologically developed
countries as the UnitedStates.
33
8. Cyber-space refers to the boundless space known as the internet. It refers to the
interdependent network of information technology components that underpin many of our
communications technologies in placetoday.
9. A computer security incident is any adverse event whereby some aspect of a computer
system is threatened like loss of confidentiality, disruption of data or system integrity,
denial of serviceavailability.
10. Cybercrime is difficult to prove as it lacks the traditional paper audit trail, which requires
theknowledgeofspecialistsincomputertechnologyandinternetprotocols;henceWe need to
educate citizens that if they are going to use the internet, they need to continually maintain and
update the security on their system.
35
Unit 3: Intrusion Detection System
3
Unit Structure
3.2 INTRODUCTION
3.8 SUMMARY
3.9 CHECK YOUR PROGRESS
36
3.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Know the basic terminologies of intrusion detectionsystem
Definition of word intrusion detectionsystem
Know the objectives of intrusion detectionsystem
Differentiate between intrusion detection system and intrusion preventionsystem
Define intrusion andintruders
Difference between vulnerability scanner and intrusion detectionsystem.
Difference between inbound and outbound networkactivities.
3.2 INTRODUCTION
An Intrusion Detection System (IDS) is a device or software application that monitors network
or system activities for malicious activities or policy violations and produces reports to a
management station11. In some cases the IDS may also respond to anomalous or malicious traffic
by taking action such as blocking the user or source IP address from accessing the network. An
Intrusion Prevention System (IPS) is a type of IDS that can prevent or stop unwanted traffic. The
IPS usually logs such events and relatedinformation.
a. Network Intrusion Detection system (NIDS)–It performs an analysis for a passing traffic
on the entire subnet. Works in a promiscuous mode, and matches the traffic that is passed
on the subnets to the library of knows attacks. Once the attack is identified, or abnormal
behaviour is sensed, the alert can be send to the administrator. Example of the NIDS
would be installing it on the subnet where you firewalls are located in order to see if
someone is trying to break into yourfirewall.
b. Network Node Intrusion detection system (NNIDS) – It performs the analysis of the
traffic that is passed from the network to a specific host. The difference between NIDS
and NNIDS is that the traffic is monitored on the single host only and not for the entire
subnet. The example of the NNIDS would be, installing it on a VPN device, to examine
37
the traffic once it was decrypted. This way you can see if someone is trying to break into
your VPN device.
c. Host Intrusion Detection System (HIDS) – It takes a snap shot of your existing system
files and matches it to the previous snap shot. If the critical system files were modified or
deleted, the alert is sent to the administrator to investigate. The example of the HIDS can
be seen on the mission critical machines that are not expected to change their
configuration.
The Figure 5 below shows various components of an IDS working together to provide network
monitoring.
Before discussing IDS/IPS in detail, let us first gear up with some common terminologiesused
frequently init.
3.2.2 Glossary
i. Sensors- These are deployed in a network or on a device to collect data. IT detects a
potential security breach, logs the information and signals an alert on the console or
owner. Input is collected, organized, and then forwarded to one or moreanalyzers.
ii. Analysers- Analysers in IDS collect data forwarded by sensors and then determine if an
intrusion has actually occurred. Output from the analyzers should include evidence
supporting the intrusion report. The analyzers may also provide recommendations and
guidance onmitigation steps.
iii. User interface- The user interface of the IDS provides the end user a view and way to
interact with the system. Through the interface the user can control and configure the
system. Many user interfaces can generate reports aswell.
iv. Honeypot- In an organization where IDS is fully deployed, some administrators may
choosetoinstalla―honeypot‖,essentially system component setup as hook or decoy for
intruders. Honeypots can be used as the systems which warns before an attack going to be
occurred, decoys from critical systems, and data collection sources for attack analyses.
Honeypots are used by many vendors for research purposes, and to develop new intrusion
38
signatures. Note that a honeypot should only be deployed when the organization has the
resources to maintain it. A honeypot left unmanaged may become a significant liability
because attackers may use a compromised honeypot to attack other systems.
v. Event or Signature-based Analysis- The event, or signature-based, systems function
much like the anti-virus software with which most people are familiar. The vendor
produces a list of patterns that it deems to be suspicious or indicative of an attack; the
IDS merely scan the environment looking for a match to the known patterns. The IDS can
then respond by taking a user-defined action, sending an alert, or performing additional
logging. This is the most common kind of intrusion detectionsystem.4
vi. Statistical Analysis- A statistical analysis system builds statistical models of the
environment, such as the average length of a telnet session, then looks for deviations
from ―normal‖.After over 10 years of government research, some products are just
beginning to incorporate this technology into marketableproducts.15
Adaptive Systems- The adaptive systems start with generalized rules for the
environment, then learn, or adapt to, local conditions that would otherwise be unusual.
After the initial learning period, the system understands how people interact with the
environment, and then warns operators about unusual activities. There is a considerable
amount of active research in thisarea.
Detection method describes the characteristics of the analyzer. When the intrusion-detection
39
system uses information about the normal behavior of the system it monitors, it will be
considered as behavior-based. When the intrusion-detection system uses information about the
attacks, it will be considered as knowledge-based.
The behavior on detection describes the response of the intrusion-detection system to attacks.
When it actively takes a necessary action to the attack by taking either corrective (closing holes)
or pro-active (logging out possible attackers, closing down services) actions, then the type of
intrusion-detection system is said to be active. If the intrusion-detection system simply generates
alarms (such as paging), it is said to be passive.
The audit source location separates intrusion-detection systems based on the kind of input
information they analyze. This input information can be audit trails (system logs, firewall logs)
on a host, network packets, application logs, or intruder alerts generated by other intrusion-
detectionsystems.
The detection paradigm describes the detection mechanism used by the intrusion-detection
system. Intrusion-detection systems can evaluate states (secure or insecure) or changeovers (from
secure to insecure).
The network IDS usually has two logical components: the sensor and the management station.
The sensor sits on a network segment, monitoring it for suspicious traffic. The management
station receives alarms from the sensor(s) and displays them to an operator. The sensors are
usually dedicated systems that exist only to monitor the network. They have a network interface
in promiscuous mode, which means they receive all network traffic, not just which destined for
their IP address, and they capture passing network traffic for analysis. If they detect something
that looks unusual, they pass it back to the analysis station. The analysis station can display the
alarms or do additional analysis. Some displays are simply an interface to a network
management tool, like HP Open view, but some are custom GUIs designed to help the operator
analyze theproblem.
40
3.4.2 Host based Intrusion Detection System
Host Intrusion Detection Systems are run on individual hosts or devices on the network. A HIDS
monitors the inbound and outbound packets from the device only and will alert the user or
administrator of suspicious activity is detected. These frequently use the host system‘s audit and
logging mechanism as a source of information for analysis. They look for unusual activity that is
confined to the local host such as logins, improper file access, unapproved privilege escalation,
or alterations on system privileges. This IDS architecture generally uses rule-based engines for
analyzing activity;anexampleofsucharule mightbe,―super-userprivilegecanonlybeattained
through the su command‖. Therefore successive login attempts to the root account might be
considered an attack.
41
Below mentioned are some point roles which cannot be expected by an IDS to be performed:
a. Placement of Sensor for a Network IDS: If you are deploying network IDS, you need
to plan out where to place the monitoring sensors. This will totally depend on the
significance of intrusion from which you want to protect your network. Let's start with a
detailed network diagram. First of all you need to evaluate the collection of systems
which are sensitive to business. If IDS is being used for monitoring a web server, then the
most useful points for placing sensors is in DMZ segment along with web server. If an
IDS is being used for monitoring a internal servers such as DNS server or mail servers,
then sensor should be placed just inside the firewall on the segment that directly connects
the firewall to the internal network. Logic behind implementing of sensor inside firewall
is that it will prevent the majority of attacks aimed at the organization, and the regular
monitoring of firewall logs will identify them easily. Then the IDS will detect some of
those attacks that manage to get through the firewall. This technique is called as "defence
in depth". If IDS is being used to monitor internal resources like sensitive collection of
machines, physical location or a specific department, then the most logical place for
sensor will be on the main point between those systems and the rest of whole
internalnetwork.
b. Host integration for Host IDS: The host IDS should be firstly installed on a
development system with the advance planning of installation on a production system.
Even on a inactive system, there will be some files that will change regularly (for
example, the audit files), then the installed IDS will report some changes. In some host-
based systems, the IDS will report when a user process of altering the system password
file. This would happen if an intruder or a new user adds an account. It also happens,
however, when a user changes his or her password. That time the IDS analyst needs to
become familiar with the correct operation of each system, so that he or she can properly
diagnose deviations from "normal" alarms. Important point: Host based IDS should be
42
monitored frequently i.e. at least twice aday.
c. Alarm Configuration: IDSs come with a configurable alarm levels in which some will
integrate with network management stations, some allow paging, some send e-mail, and
some can interoperate with firewalls to shut down all traffic from the network that
originated the attack. IDS Manager should have. In fact, we suggest you to be very
cautious about using these features for the first month or two, turn off allalarms.
Manager should have to analyze the output from the system for monitoring that what it is
detecting. You need to be familiar with your particular system before you start turning on
alarms.
d. Integration Schedule: Install one sensor at a time. A sensor in a DMZ may see a given
set of behaviours, while a sensor on the internal network may see another set of
behaviours, with a very smallintersection.
Phase 1 Preparation: The Preparation phase involves readying the UCIRT to handle incidents.
Some required elements for incident handling are indicated below:
Communications
Data
Documentation
People
Policy
43
Software/Hardware
Space
Supplies
Training
Transportation
Preparation should be done at regular intervals prior an actual incident occurring.
Phase 2 Detection: Incident detection occurs internally in all areas and at all levels of the
University, as well as externally, through reports from non-University incident handlers. All
High-Risk incidents should immediately be reported to ITSO once detected. Administrators and
users must be familiar with their systems to determine if an event constitutes an incident.
Effective incident detection occurs when:
Phase 3 Containment: The first priority of Organization, in every incident, is to contain the
incident as quickly as possible. An incident is considered contained when no additional harm can
be caused and the incident handler is able to focus on remediation. Containment consists of three
stages:
Phase 4 Remediation: The goal of the Remediation phase is to clean up a system and remove
any artifacts (e.g., rootkits) left from the attacker. During the Remediation phase, the team must
also determine and document the cause and symptoms of the incident: isolating the attack based
on information gathered during the detection phase, and determining how the attack was
executed.
Phase 5 Resolution: During the Resolution phase, the Team restores normal business
operations. It is critical to carefully handle incident Resolution and verify system performance
and security before being brought back online. Tests must be completed and baseline system
activity (gathered in the Preparation phase) must be compared to ensure the system is verified
before operations arerestored.
44
Phase 6 Closure: and Lessons Learned In the Closure and Lessons Learned phase, the ITSO
documents findings from the incident and the handling of the incident is reviewed by the
Organization’s Security Incident handling Team. The expected outcome of this phase is
improved operations and improved incident responseprocedures.The incident handling process
has many phases. It describes the sequence of steps that begin when an incident reaches your
team. It could follow a very simple or very sophisticated model. Start planning your incident
handling process with a simple set of tasks and subsequently expand it to new ones according to
your real work and needs. You can use the set of tasks discussed below as a framework for your
incident handling procedure. This is the same set of tasks that form the workflow shown in
Figure 7.
3.8 SUMMARY
1. An Intrusion Detection System (IDS) is a device or software application that monitors
networkorsystemactivitiesformaliciousactivitiesorpolicyviolationsandproduces
reports to a management station.
2. Network Intrusion Detection system (NIDS) performs an analysis for a passing traffic
on the entiresubnet.
3. A statistical analysis system builds statistical models of the environment, such as the
averagelength ofatelnetsession,then looks fordeviations from ―normal‖.
4. Detection method describes the characteristics of theanalyzer.
5. Intrusion-detection systems can evaluate states (secure or insecure) or changeovers (from
45
secure toinsecure).Network Intrusion Detection Systems are placed at a strategic point or
points within the network to monitor traffic to and from all devices on thenetwork.
6. Once an attack is identified, or abnormal behavior is sensed, the alert can be sent to the
administrator.
7. Host Intrusion Detection Systems are run on individual hosts or devices on thenetwork.
8. A HIDS monitors the inbound and outbound packets from the device only and will alert
the user or administrator of suspicious activity isdetected.
9. The Organization’s Incident Response Plan is documented to provide a well-defined,
consistent, and organized approach for handling security incidents, as well as taking
appropriate action when an incident at an external organization is traced back to and
reported to theOrganization.
47
Unit 4: Assets and Wireless Security
4
Unit Structure
4.2 INTRODUCTION
4.5 FIREWALL
48
4.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Know the meaning of the termasset
Understand assetmanagement
Explain theCIA
Definerisk
Understand riskanalysis
4.2 INTRODUCTION
In information security, computer security and network security an asset is any data, device, or
other component of the environment that supports information-related activities. Assets generally
include hardware (e.g. servers and switches), software (e.g. mission critical applications and
support systems) and confidential information. Assets should be protected from illicit access,
use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization18.IT asset
management (ITAM) is the set of business practices that join financial, contractual and inventory
functions to support life cycle management and strategic decision making for the IT
environment. Assets include all elements of software and hardware that are found in the business
environment.2 Any security standard or best practice should be founded on a solid foundation of
an asset classification. To ensure proper protection of our information resources, it is necessary
to define what an owner is and how that entity has ultimate responsibility for the information
assets within its business unit, and this includes classification and assigning retention
requirements.
4.2.1 Glossary
a. Asset: Any physical or logical resource OR Anything which has value to the
organization.
b. Asset management: Asset management is all about discovery, ownership, value,
acceptable use, protection, and disposal of information-relatedassets.
c. Owner: The information owner is the entity within the organization that has been
assigned the responsibility to exercise the organization‘s proprietary rights and grant
access privileges to those with a true businessneed.
d. Custodian: The custodian is the entity which is responsible for overseeing and
implementing the necessary safeguards to protect assets, at the level classified by the
informationowner.
e. User: User is the person who is responsible for viewing, amending, or updating the
content of the information assets. This can be any user of the information in the inventory
created by the informationowner.
49
4.3 SECURING AN ASSET
An IT asset is any company-owned information, system or hardware that is used in the course of
business activities. The goal of Information Security is to ensure the Confidentiality, Integrity
and Availability of assets from various threats. For example, a hacker might attack a system in
order to steal credit card numbers by exploiting vulnerability. Information Security experts must
assess the likely impact of an attack and employ appropriate countermeasures. In this case they
might put up a firewall and encrypt their credit card numbers. Broadly assets can be classifiesas:
a. Tangible Assets: Tangible assets are those assets which we can touch, see and feel. All
fixed assets are tangible. Hardware is also a tangibleasset.
b. Intangible Assets: Intangible assets cannot be seen, felt or touched physically by us.
Some examples of intangible assets are like software, data, goodwill, franchise
agreements, patents, copyrights, brands, trademarksetc.
4.3.1 Steps of securing anasset
1. Create an action plan. Bring together everyone who needs to be involved—IT, legal and
office management staff, and even C-level executives. Consider creating a
decommissioning and asset management plan that makes data removal from hardware
devices your highest priority19. Evaluate the costs of managing an IT asset disposition
plan—as well as the potential costs (legal and otherwise) of not doing it. And when these
issues start to stump you, consider getting help from a third-party disposition expert with
the expertise you need to address your data destruction and asset dispositionneeds.
2. Ask: “It’s demolished, but is it gone?” Before you get rid of your old hardware, you
must ensure that all the data on it has been permanently destroyed and is non-recoverable.
A trusted partner can help you establish a defensible, documented and repeatable process
to prepare, handle or transport, and destroy data both onsite or offsite, using methods that
comply with the latest U.S. and internationalstandards.
3. Ensure that offsite, secure disposition processes are in place. It‘s 10 p.m. - do you
know where your equipment is? You need to know the where about of your assets
throughout their destruction process. That secure chain of custody is vital to
proveyou‘vecomplied with regulations. A trusted partner can provide auditable verification and
strict security practices that include GPS tracking, protected transportation and a documented
chain of custody. That means peace of mind (and a good night‘s sleep) for you.
4. Keep an eye on the prize: your bottom line. Getting managerial buy-in for an
environmentally friendly philosophy usually doesn‘t work in the corporate arena. Focus
instead on the bottom line, making the case for the cost savings and risk management you
can achieve by clearing out the old to make way for the new while also guarding against
data breaches or thefts. Retiring old assets at the right time cuts maintenance costs,
software licensing costs and even leasingoverages.
5. Publicize your compliance achievements. When you choose a partner that conducts
electronics recycling in accordance you know that your equipment is going to be
destroyed or recycled without being exported, improperly incinerated, or land filled in a
50
way that could harm the local water supply or affect other natural resources. That matters
not only because regulations demand it, but also because recycling the right way gives
your company green credibility. Go ahead and brag about it make it part of your
corporate responsibilitymessage.
HSMs are typically housed in a secure environment and managed with additional procedural
controls external to the device. An HSM is a dedicated hardware device that is managed
separately from the operating system. These modules provide a secure hardware store for CA
keys, as well as a dedicated cryptographic processor to accelerate signing and encrypting
operations. Windows utilizes the HSM through the CryptoAPI interfaces—the HSM functions as
a cryptographic service provider (CSP) device.
An HSM can provide secure operational management - protected by multi-layered hardware and
software tokens - as well as a number of other key features, including:
◻ Hardware-based, cryptographic operations (such as random number generation, key
generation, digital signatures, and key archive andrecovery).
◻ Hardware protection of valuable private keys used to secure asymmetric cryptographic
operations.
◻ Secure management of privatekeys.
◻ Acceleration of cryptographic operations. (This relieves the host server of having
to perform processor-intensive, cryptographiccalculations.)
◻ Load balancing and failover in hardware modules using multiple HSMs linked together
through a daisychain.
Another important function of an HSM is key management. With any type of system that uses
cryptographic keys, it is imperative that the tools that generates, backup and hold these keys do
so in a secure manner. To be optimally secure, the HSM should store all of the keys on the
physical device itself. The key backups should be done using a secure connection to another
HSM or to one or more smart cards (preferably more than one). The card reader should attach
directly to the HSM to prevent the data fromintercepted.
The key generator and safe key storage facility for a certificateauthority.
A tool to aid in authentication by verifying digitalsignatures.
An accelerator for SSL connections. (When the new IPSec standard begins replacing
IP, the demand for server-side cryptographic acceleration will likely increasefurther).
A tool for securely encrypting sensitive data for storage in a relatively unsecure location
such as adatabase.
A tool for verifying the integrity of data stored in adatabase.
A secure key generator for smartcardproduction.
52
4.5 FIREWALL
A firewall is a network security system that monitors and controls the incoming and outgoing
network traffic based on predetermined security rules. A firewall typically establishes a barrier
between a trusted, secure internal network and another outside network, such as the Internet, that
is assumed to not be secure or trusted. A firewall is a protective system that lies, in essence,
between your computer network and the Internet. When used correctly, a firewall prevents
unauthorized use and access to your network. Without a firewall, all the traffic directly moves
from the Internet to your computer. In this diagram, the "valid" traffic is colored green, and the
"malicious" traffic is colored red.
Figure 8: A firewall20
The job of a firewall is to carefully analyze data entering and exiting the network based on your
configuration. It ignores information that comes from unsecured, unknown or
suspiciouslocations. A firewall plays an important role on any network as it provides a protective
barrier against most forms of attack coming from the outside world.
Windows Firewall adds an additional level of security by examining each piece of data. If the
data is good, it passes through the firewall and reaches the computer. If the data is identified as
bad traffic, the network packets are simply dropped and never make their way to the computer.
Although this diagram shows the Window Firewall as a separate icon, the Windows Firewall is
software that physically runs on your computer.
53
Figure 9: Firewall in an organization21
As this diagram shows, Windows Firewall intercepts all network communication to provide
protection against unauthorized network traffic. This protection exists if this traffic enters your
computer through a modem, a wired network adapter, or a wireless network connection.
Windows Firewall protects your computer regardless of its connection to the Internet!8
a. Network layer/Packet filters: Network layer firewalls, also called packet filters. They
operate at a comparatively low level of the TCP/IP protocol stack, which doesn‘t allow
packets to pass through the firewall unless they match the established rule set. The
firewall administrator may define the rules; or default rules may apply. Network layer
firewalls consists of two sub-categories, stateful and stateless. Stateful firewalls maintain
records about active sessions, and use that "state information" to speed packet processing.
Stateless firewalls require less memory, and can be faster for simple filters which require
less time to filter than to look up a session. It should also be necessary for filtering
stateless network protocols that have no concept of asession.
have user defined controls for setting up safe file and printer sharing and to block
unsafe applications from running on yoursystem.
A good software firewall will run in the background on your system and use only a small amount of
system resources. It is important to monitor a software firewall once installed and to download
any updates available from the developer. Personal firewalls have the advantage of identifying which
applications on the computer are creating security risks. If a worm infects your system and attempts to
55
open your computer to the world, a software-based firewall will identify this new application service.
The personal firewall will prompt you to confirm the new application or to prevent its use. Your
personal firewall may be your first warning that a malicious program is attempting to use thenetwork.
A hardware firewall uses packet filtering to examine the header of a packet to determine its
source and destination. This information is compared to a set of predefined or user-created rules
that determine whether the packet is to be forwarded or dropped.
Hardware Firewall are typically good for small or medium business owners, with 5 or more PC
or a co-operate environment. The main reason is that it then becomes cost-effective, because if
you purchase Internet Security/Firewall software licenses for 10 to 50 copies, and that too on an
annual subscription basis, it will cost a lot of money and deployment could also be an issue. The
users will have better control over the environment. If the user is not tech savvy and if they
choose to inadvertently allow a connection that has Malware behavior, it could ruin the entire
network and put the company in risk with datasecurity.
These six measures can help in securing cardholder information while allowing normal network
data flow:
1. Never click on a link which was not expected by you to receive: One of the important
rules. The main way criminals infect PCs with malware is by tempting users to click on a
link or open an attachment. "Most of the time phishing emails contain obvious spelling
mistakes and poor grammar and are easy to spot," says Sideway ofIntegrals.
2. Use different passwords on different websites: If individuals typically having up to100
online accounts, the tendency has become to share one or two passwords across accounts
or use very simple ones, such as loved ones' names, pets names or favorite sports teams
and many more commonterms.
3. Avoid reusing your main email/accounts password: Any hacker who has cracked or
anyhow get entered into your main email password has the keys to your [virtual]
kingdom because passwords from the other sites you visit can be reset via your main
emailaccount.
4. Use updated antivirus and Conduct regular scans of your entire network: The best
way to determine if your systems have been compromised is to scan them regularly for
vulnerabilities. For relatively low budget, a security vendor will remotely scan all of your
external systems/access points to determine if any of them are vulnerable tointrusion.
5. Limit remote access and make some rules: Most of the organizations leave their
firewalls open to outsider‘s entry by mangers who are working remotely or vendors who
routinely perform maintenance on systems. Create strong passwords instead of using the
default ones, and change them after a particular set of time. Similarly, always change
default firewall settings to allow only necessary access, and limit remote access to secure
methods such asVPN.
6. Ensure all sensitive data is encrypted using a strong encryption algorithm: If you
have older POS equipment that sends raw credit card data to a back-office server, it‘s
time to upgrade that equipment. Modern, secure POS systems encrypt credit card data as
soon as a card is swiped, and they immediately send that data to the payment processor
without any temporary storing of data. Double-check your POS system to make sure it
complies with PCIstandards.
7. Maintain a strong firewall for securing your network: The PCI data security standards
prescribe firewalls for compliance. Make sure your firewall is hardened according to new
rules and updated with recent intruder‘s definition and is supported by virus protection
software.
8. Segment your network into necessary divisions: For example, make sure your POS
data traffic is separate from your Wi-Fi system, security cameras, digital menu boards,
57
other connections, etc. If you want to enable managers to connect to the POS via Wi-Fi,
connect them through a virtual LAN that differentiates authorized traffic into a security
zone.
9. Keep your software updated/upgraded with latest updates: Manufacturers frequent
update their operating systems and POS software to tighten security and eliminate the
weaknesses vulnerable to hackers. Make sure you have downloaded the latest operating
system patches and keep all POS softwareup-to-date.
10. System Hardening: This can also be referred as lockdown or security tightening, and
involves activities such as configuring software for optimum use, deactivating
unnecessarysoftwarethatcanleadtosomesimpleattacks,andconfiguringtheoperating
system for optimum security. Usually the system-hardening process is carried out in a
mannered step by step approach to iteratively increase the number of defensive layers and
reduce the exposed attack surfaces.
Wireless devices communicate through radio transmissions, without physical connections and
without network or peripheral cabling. Wireless systems include local area networks, personal
networks, cell phones, and devices such as wireless headphones, microphones, and other devices
that do not process or store information. Other wireless devices being widely used include
infrared (IR) devices such as remote controls, cordless computer keyboards, mouse devices, and
wireless hi-fi stereo headsets, all of which require a direct line of sight between the transmitter
and the receiver.
Authentication: Only clients who know a shared secret may connect to the network.WEP was
the first cryptographic protocol developed for Wi-Fi to enable privacy and authentication. WEP,
however, was not secure after all. To rectify the security issues with WEP, the Wi-Fi Alliance
pushed a new cryptographic protocol, WPA. Since then, a common practice of securing a WPA
58
enabled network with passwords has been discovered to be vulnerable to an offline dictionary-
attack. Even though WPA itself is thought to be secure, apart from the dictionary-attack, it was a
quick fix to the problems in WEP.
WEP: WEP stands for Wired Equivalent Privacy. WEP was designed to provide the same level
of security as wired networks. When you enable WEP, you set up a network security key. This
key encrypts the information that one computer sends to another computer across your network.
However, WEP security is relatively easy to crack.
When using WEP, all clients and APs on a wireless network use the same key to encrypt and
decrypt data. The key resides in the client computer and in each AP on the network. Since the
802.11 standard does not specify a key management protocol.15
The shared key can be used for client authentication. This requires a four step process between
the AP and the client. This process is as follows:
1. The use of static WEP keys: Many users in a wireless network potentially sharing the
identical key for long periods of time, is well-known security vulnerability. This is in part
due to the lack of any key management provisions in the WEP protocol. If a computer
such as a laptop were to be lost or stolen, the key could become compromised along with
59
all the other computers sharing thatkey.
2. Caffe Latte attack: The Caffe Latte attack is another way to defeat WEP. It is not
necessary for the attacker to be in the area of the network using this exploit. By using a
process that targets the Windows wireless stack, it is possible to obtain the WEP key
from a remote client. By sending a flood of encrypted ARP requests, the assailant takes
advantage of the shared key authentication and the message modification flaws
in802.11WEP. The attacker uses the ARP responses to obtain the WEP key in less than 6
minutes.16
3. WEP provides no cryptographic integrity protection. However, the 802.11 MAC
protocol uses a no cryptographic Cyclic Redundancy Check (CRC) to check the integrity
of packets, and acknowledge packets with the correct checksum. The combination of no
cryptographic checksums with stream ciphers is dangerous and often introduces
vulnerabilities, as is the case for WEP. There is an active attack that permits the attacker
to decrypt any packet by systematically modifying the packet and CRC sending it to the
AP and noting whether the packet is acknowledged. These kinds of attacks are often
subtle, and it is now considered risky to design encryption protocols that do not include
cryptographic integrity protection, because of the possibility of interactions with other
protocol levels that can give away information about ciphertext.12
4. Authentication is not enabled; only simple SSID identification occurs. Identity-based
systems are highly vulnerable particularly in a wireless system because signals can be
more easilyintercepted.
5. Device authentication is simple shared-key challenge-response. One-way challenge-
responseauthenticationissubjectto―man-inthe-middle‖attacks.Mutualauthentication is
required to provide verification that users and the network arelegitimate.
4.7.3 WPA
WPA stands for Wi-Fi Protected Access. WPA is introduced as an interim security enhancement
over WEP while the 802.11i wireless security standard was being developed. Most current WPA
implementations use a pre shared key (PSK), commonly referred to as WPA Personal, and the
Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. WPA Enterprise
uses an authentication server to generate keys or certificates.
WPA's encryption method is the Temporal Key Integrity Protocol (TKIP). TKIP addresses the
weaknesses of WEP by including a per-packet mixing function, a message integrity check, an
extended initialization vector, and a re-keying mechanism. WPA provides "strong" user
authentication based on 802.1x and the Extensible Authentication Protocol (EAP). WPA depends
on a central authentication server such as RADIUS to authenticate each user.
WPA also includes a message integrity check, which is designed to prevent an attacker from
altering and resending data packets. This replaces the cyclic redundancy check (CRC) that was
60
used by the WEP standard. CRC's main flaw was that it did not provide a sufficiently strong data
integrity guarantee for the packets it handled. Well tested message authentication codes existed
to solve these problems, but they required too much computation to be used on old network
cards. WPA uses a message integrity check algorithm called Michael to verify the integrity of the
packets. Michael is much stronger than a CRC, but not as strong as the algorithm used
inWPA2.Researchers have since discovered a flaw in WPA that relied on older weaknesses in
WEP and the limitations of Michael to retrieve the key stream from short packets to use for re-
injection andspoofing.
WPA also implements something called the Extensible Authentication Protocol (EAP) for
authorizing users. Instead of authorizing computers based solely on their MAC address, WPA
can use several other methods to verify each computer's identity. This makes it more difficult for
unauthorized systems to gain access to the wirelessnetwork.
1. Weak Password: Pre-shared key WPA and WPA2 remain vulnerable to password cracking
attacks if users rely on a weak password or passphrase. To protect against a brute force attack, a
truly random passphrase of 20 characters (selected from the set of 95 permitted characters) is
probably sufficient. Brute forcing of simple passwords can be attempted using the Aircrack Suite
starting from the four-way authentication handshake exchanged during association or periodic
re-authentication.
2. WPS PIN recovery: Most recent models have this feature and enable it by default. Many
consumer Wi-Fi device manufacturers had taken steps to eliminate the potential of weak
passphrase choices by promoting alternative methods of automatically generating and
distributing strong keys when users add a new wireless adapter or appliance to a network. These
methods include pushing buttons on the devices or entering an 8-digit PIN. The Wi-Fi Alliance
standardized these methods as Wi-Fi Protected Setup; however the PIN feature as widely
implemented introduced a major new security flaw. The flaw allows a remote attacker to recover
the WPS PIN and, with it, the router's WPA/WPA2 password in a fewhours.
Secure communications: Encrypt data that travels on the network, and authenticate users
to be sure you know who is using the WLAN. Cisco supports all industry-standard
encryption and authentication methods for the broadest client devicecompatibility.
Use strong encryption: As soon as you install your network, set up the strongest wireless
encryption you can. Wired Equivalent Privacy (WEP) encryption is adequate, but WPA
and WPA2 give you strongeroptions.
Change the default network name: When you set up your network equipment, change the
default name to make it more difficult for hackers to find. Do not choose your company
name, company phone number, or other information about your company that is easy to
61
guess or find on the Internet.
Use VLANs or MAC address control lists combined with encryption to restrict useraccess.
Implement Cisco secure guest access features to allow visitors to connect to the network or
Internet while keeping your business network and resources separate andsecure.Be sure
that management ports aresecured.
Physically hide or secure access points to prevent tampering. In many buildings, Cisco
access points can be installed in the plenum space above the ceiling, providing optimal
coverage in a securelocation.
Use video surveillance cameras to monitor your office building and site for suspicious
activity.
4.8 SUMMARY
1. In information security, computer security and network security an asset is any data,
device, or other component of the environment that supports information-related
activities.
2. IT asset management (ITAM) is the set of business practices that join financial,
contractual and inventory functions to support life cycle management and strategic
decision making for the ITenvironment.
3. An IT asset is any company-owned information, system or hardware that is used in the
course of businessactivities.
4. Consider creating a decommissioning and asset management plan that makes data
removal from hardware devices your highest priority.
5. Before you get rid of your old hardware, you must ensure that all the data on it has been
permanently destroyed and isnon-recoverable.
6. A Hardware Security Module is defined as a combination of hardware and associated
software that usually binds inside the PC or server and it provides at least minimum
number of cryptographicfunctions.
7. If the MAC verification fails, the program would know that the data has been tampered
with and can perform the appropriate action such as auditing, logging, generating alarms,
etc.
8. A firewall typically establishes a barrier between a trusted, secure internal network and
another outside network, such as the Internet, that is assumed to not be secure ortrusted.
9. A proxy server (running either on dedicated hardware or as software on a general-
62
purpose machine) will act as a firewall by responding to input packets (connection
requests, for example) in the manner of an application, while blocking otherpackets.
10. Firewalls often have network address translation (NAT) functionality, and the hosts
protected behind a firewall commonly have addresses in the "private address range", as
defined in RFC1918.
11. A good software firewall will run in the background on your system and use only a small
amount of systemresources.
12. Usually the system-hardening process is carried out in a mannered step by step approach
to iteratively increase the number of defensive layers and reduce the exposed attack
surfaces.
13. Wireless Internet access technology is being increasingly deployed in both office and
public environments, as well as by the Internet users athome.
14. Wireless technologies, in the simplest sense, enable one or more devices to communicate
without physical connections—without requiring network or peripheralcabling.
63
8. technologies use radio frequency transmissions as the means for
transmitting data, whereas wired technologies usecables.
9. WEPstands for .
64
Block-2
65
Unit 1: Cyber Security Assurance
Framework 1
Unit Structure
66
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the concept of cyber securityassurance.
Know the difference between Network Security and Web applicationsecurity.
Understand the Cyber security maturity and self-assessment
Know the different type of cyberexercises.
Conduct basic cyber exercises.
The concept of this model is, in developing information assurance systems organizations must
consider the interconnectedness of all the different factors that impact them. The McCumber
model helps to remind about considering all important design aspects without becoming too
focused on any one in particular.
1.2.1 Dimensions of McCumberCube
Objectives
Confidentiality: assurance that sensitive information is not intentionally or
accidentally disclosed to unauthorizedindividuals.
Integrity: assurance that information is not intentionally or accidentally modified in
67
such a way as to call into question itsreliability.
Availability: ensuring that authorized individuals have both timely and reliable access to
data and other resources whenneeded.
Information states
Storage: Data at rest (DAR) in an information system, such as that stored in memory
or on a magnetic tape ordisk.
Transmission: transferring data between information systems - also known as data in
transit(DIT).
Processing: performing operations on data in order to achieve a desiredobjective.
Safeguards
Policy and practices: administrative controls, such as management directives, that
provide a foundation for how information assurance is to be implemented within an
organization.
Human factors: ensuring that the users of Information System are aware of their roles
and responsibilities regarding the protection of Information System and are capable
of following thestandards.
Technology: software and hardware-based solutions designed to protect Information
System.
In this unit we will discuss cyber security assurance program in India, Security maturity for
organizations and method of self-assessment. It will be followed by the section on providing
guidelines for conducting cyber exercises in an Organization- which is considered to be one of
the useful tools for assurance.
1.3.1 StrategicApproach
Consistent with the need, the primary objectives for securing country's cyber space are:
Preventing cyber-attacks against the country's criticalinfrastructures
Reduce National vulnerability to cyberattacks
Minimize damage and recovery time from cyberattacks
1.3.2 Actions
Actions to secure cyberspace include:
Forensics and attackattribution
Protection of networks and systems critical to Nationalsecurity
Early watch andwarnings
Protection against organized attacks capable of inflicting debilitating damage to the
economy
68
Research and technology development that will enable the critical infrastructure
organizations to secure their ITassets
1.3.3 Strategic Objectives
To pursue the strategic objectives the following major initiatives have been identified:
a) Critical Information Infrastructure Protection: Many of the critical services that are
essential to the well-being of the economy are increasingly becoming dependent on IT.
As such, the Government is making efforts to identify the core services that need to be
protected from electronic attacks and is seeking to work with organizations responsible
for these systems so that their services are secured in a way that is proportional to the
threat perception. The primary focus of these efforts is to secure the information
resources belonging to Government as well as those in the critical sectors. The critical
sectors include Defense, Finance, Energy, Transportation and Telecommunications.
Consequently, many experts from the industry and critical infrastructure organizations
have come to recognize that their continued ability to gain consumer confidence will
depend on improved software development, systems engineering practices and the
adoption of strengthened security models and bestpractices.
b) Cyber Security Assurance Framework: Cyber Security Assurance Framework is a
National framework for "Cyber Security Assurance" to assist National level efforts in
protecting critical information infrastructure. It aims to cater to the security assurance
needs of Government and critical infrastructure organizations through "Enabling and
Endorsing" actions. Enabling actions are essentially Promotional/Advisory/Regulatory in
nature and are best done by Govt. or its authorized entity that can be seen and perceived
asindependentofbiasand/orcommercialinterests.Theseactioninvolvespublicationof
"National Security Policy Compliance requirements" and IT security guidelines and
supporting documents to facilitate IT security implementation and compliance. Endorsing
actions are essentially commercial in nature and may involve more than one service
provider offering commercial services after having fulfilled requisite qualification criteria
and demonstrated ability prior to empanelment. These include
o Assessment and certification of compliance to IT security best practices,
69
standards and guidelines (Ex. ISO 27001/BS 7799 ISMS certification, IS system
auditsetc)
o IT Security product evaluation and certification as per 'Common Criteria' standard
ISO 15408 and Crypto module verificationstandards
o IT security manpower training and other services to assist user in IT security
implementation andcompliance.
Trusted company certification: With India emerging as a leading outsourcing partner,
there is a need to address perceptible gap among Indian IT/ITES/BPOs in respect of
compliance to international standards and best practices on security and privacy. Today,
although increasing number of organizations in India have aligned their internal
processes and practices to international standards such as ISO 9000, CMM, Six Sigma,
Total Quality Management, ISO 27001 etc., it is to be noted that existing models such as
SEI CMM levels cover exclusively software development processes and do not address
security issues. As such, there is a need for a comprehensive assurance framework that
can enable compliance within the country and provide assurance on compliance to
outsourcing organizations and rest of the world. Accordingly, efforts are on to create a
model that is based on self-certification concept and on the lines of Software capability
maturity model (SW-CMM) of CMU,USA.
c) Rapid identification, information exchange, and remediation can often mitigate the
damage caused by malicious cyberspace activity. For those activities to take place
effectively at a national level, it requires a partnership between government and industry
to perform analyses, issue warnings, and coordinate response efforts. Because no cyber
security plan can be impervious to concerted and intelligent attacks, information systems
must be able to operate while under attack and also have the resilience to restore full
operations in their wake. The National Cyber Alert System will involve critical
infrastructure organizations, public and private institutions to perform analysis, conduct
watch and warning activities, enable information exchange, and facilitate restoration
efforts.
The essential actions under National Cyber Alert Systeminclude:
o Identification of focal points in the criticalinfrastructure
o Establish a public-private architecture for responding to national - level
cyber incidents
o Tactical and strategic analysis of cyber-attacks and vulnerabilityassessments;
o Expand the Cyber Warning and Information Network to support the role of
Government in coordinating crisis management for cyberspacesecurity;
o Improve national incident response capabilities (CERT-In and SectoralCERTs)
70
o Exercise cyber security continuity plans anddrills
d) Creation and Augmentation of ResponseCapabilities
(i) Augmentation of CERT-In: CERT-In is operational since January 2004
and is catering to the security needs of Indian Cyber community,
especially the Critical Information Infrastructure. In line with the
expectation of the user community and various stake holders, there is a
need to augment the facilities at CERT-In in terms of Manpower,
Communication systems, tools, etc. for vulnerability prediction, analysis
& mitigation, Cyber forensics/artifact analysis, Cyber space monitoring
& interception Capabilities and Critical information infrastructure
Security health check. The National Information Board and National
Security Council have endorsed the need for augmentation of facilities
atCERT-In.
(ii) Creation/augmentation of Sectoral CERTs: For an effective National
Cyber Security Alert System, there is a need to create sectoral CERTs to
cater to the very specific domain needs of different sectors. In this
direction sectoral CERTs have been established by Army, Air force and
Navy in Defense sector, IDRBT in Finance sector. But the facilities of
these sectoral CERTs are at primitive levels and need to be augmented
to meet the needs of respective sectors. Similarity sectoral CERTs with
state- of-the-art facilities need to be created in other critical sectors such
as Aviation, Energy, Telecommunication, Railwaysetc.
e) International cooperation and information sharing: The cyber threat sources and attacks
span across countries. As such as there is a need to enhanced global cooperation among
security agencies, CERTs and Law Enforcement agencies of various countries to
effectively mitigate cyber threats. Accordingly it vital to have well developed Cyber
Security and Information Assurance research and development program which is
executed through different government agencies in broad collaboration with private
sectors, partners and stakeholders in academia, national and internationalagencies.
In this context the priorities for collaboration are:
1.3.3.2 SecurityR&D
The focus of security R&D is on Facilitating Basic research, Technology demonstration and
Proof-of concept and R&D test bed projects. Indigenous R&D is an essential component of
national information security measure due to various reasons- a major one being export
restrictions on sophisticated products by advanced countries. Second major reason for
undertaking R&D is to build confidence that an imported IT security product itself does not turn
out to be a veiled security threat. Other benefits include creation of knowledge and expertise to
face new and emerging security challenges, to produce cost-effective, tailor-made indigenous
security solutions and even compete for export market in information security products and
services. Success in technological innovation is significantly facilitated by a sound
S&Tenvironment. Resources like skilled manpower and infrastructure created through pre-
competitive public funded projects provide much needed inputs to entrepreneurs to be globally
competitive through further R&D. Private sector is expected to play a key role in meeting needs
of short term R&D leading to commercially viable products. Besides in-house R&D, this sector
may find it attractive to undertake collaborative R&D with leading researchorganizations.
c. Data security and privacy protection for ‘Trust and Confidence’: In order to stay
competitive in the global market place, business entities have to continually generate
adequate levels of trust & confidence in their services in terms of privacy and data
protection through the use of internationally accepted best practices and ability to
demonstrate wherenecessary.
d. Quality and protection of electronic records: Organizations need to ensure that
important data/records are protected from loss, destruction and falsification, in
accordance with statutory, regulatory, contractual, and business requirements. Where
a follow-up action against a person or organization involves legal action (either civil
or criminal), electronic evidence needs to be properly collected, retained, and
presented to conform to the rules for evidence laid down in the relevant
jurisdiction(s). It is a good practice to have audit logs recording user activities,
exceptions, and information security events and retained for an agreed period to assist
in futureinvestigations.
III. E-governance: All e-governance initiatives in the country should be based on best
information security practices. Government should encourage wider usage of Public Key
Infrastructure (PKI) in its own departments. There is a need to empanel Information
Security professionals/ organizations to assist E-Governance initiatives and monitor
quality of their performance/service through appropriate qualitystandards.
IV. Secure software development: Application Software development process whether in-
house or outsourced, needs to be supervised and monitored using a system development
life cycle methodology that includes information security considerations and selection of
appropriate security controls andcountermeasures.
V. Open standards: To minimize the risk of dependency on proprietary IT products, open
standards need to be encouraged. A consortium of government and private sector needsto
be created for enhancing the use of validated and certified IT products based on open
standards.
75
1.4 CYBER SECURITY MATURITY AND SELF ASSESMENT
A maturity model is a set of characteristics, attributes or indicators that represent capability and
progress in a particular area. Model content typically exemplifies best practices and may
incorporate standards or other codes of practice of the discipline. A maturity model thus provides
a benchmark against which an organization can evaluate the current level of capability of its
practices, processes, and methods and set goals and priorities for improvement. An industry can
determine how well it is performing overall by examining the capability of its member
organizations.
Tomeasureprogressmaturitymodelstypicallyhave―levelslongaladderorscale.Asetof attributes
defines each level. If an organization demonstrates these attributes, it has achieved both that level
and the capabilities that the level represents. Having measurable transition states between the
levels enables an organization to use the scaleto:
There are various maturity models in domain of cyber security and mostly customized as per the
need of the specific sector and industry. In this section we will discuss the Cyber Security
Capability Maturity Model developed by the Global Cyber Security Capacity Centre
(http://www.oxfordmartin.ox.ac.uk/cybersecurity). As per the website a Global Cyber Security
Capacity Centre (Capacity Centre) is created with the goal to increase the scale and effectiveness
of effective cyber security capacity building internationally. The Centre makes knowledge
available to governments, communities and organizations to underpin their cyber capacity in
ways appropriate to ensuring a cyber space which can continue to grow and innovate in support
of well-being, human rights and prosperity for all.
Global Cyber Security Capacity Centre considers cyber security capacity as being comprised of
five dimensions:
Start-up: At this level either nothing exists, or it is very embryonic in nature. It could also
include initial discussions about cyber capacity building, but no concrete actions have been
taken. It also includes a lack of observed evidence in this particularindicator.
Formative: Some features of the indicators have begun to grow and be formulated, but may
be ad-hoc, disorganized, poorly defined - or simply "new". However, evidence of this activity
can be clearlyevidenced.
Established: The elements of the sub-factor are in place, and working. There is not,
however, well-thought out consideration of the relative allocation of resources. Little trade-
off decision making has been made concerning the *relative* investment in the various
elements of the sub-factor. But the indicators are functional anddefined.
Strategic: Choices have been made about which parts of the indicator are important, and
which are less important for the particular organization/nation. Of course, we would all like
everything to be as important as everything else, but with finite resources, choices must be
made. The strategic level reflects the fact that these choices have been made. They should
have been made contingent on the nation/organization's particularcircumstances.
Dynamic: At the Dynamic level, there are clear mechanisms in place to alter strategy
depending on the prevailing circumstances. For example, the technology of the threat
environment, global conflict, a significant change in one area of concern. Dynamic
organizations have developed methods for changing strategies in stride, in a "sense-and-
respond" way. Rapid decision-making, reallocation of resources, and constant attention to the
changing environment are feature of thislevel.
Model such as CMM model allows an organization to self-assess its current cyber security state.
In each case, understanding the requirements to achieve higher levels of capacity should directly
indicate areas requiring further improvement, and the data required to evidence such capacity
levels. This means that the CMM could also be used to build business cases for investment
andexpected performance enhancements. Necessarily there are relationships that exist between
the factors both within and between dimensions.
77
This material sought to ensure that the cyber security CMM developed by the Capacity Centre is
as scientifically rigorous as possible. Such material includes, but is not limited to, content
produced by: the International Telecommunications Union (ITU), the European Network and
Information Security Agency (ENISA), Hathaway Global Strategies LLC., the National Institute
of Standards and Technologies (NIST), the Economist Intelligence Unit (EIU), the Organization
for Economic Co-Operation and Development (OECD), the Australian Strategic Policy Institute
(ASPI), and the World Economic Forum (WEF). These diverse organizations (among others)
have all conducted significant research into various factors contributing to cyber capacity
building. The Capacity Centre has attempted to incorporate the thinking behind these various
research initiatives into the development of its cyber security CMM.
In addition, in order to collect as diverse and credible input as possible, the Capacity Centre
consulted with various stakeholders with diverse geographic, organizational and disciplinary
perspectives. These stakeholders are all regarded as experts in their respective fields, which
encompass the five dimensions of cyber security capacity building identified by the Capacity
Centre. Stakeholders routinely contributed the collection of cyber capacity building material.
Once the initial broad collection of cyber security capacity building material had been conducted,
the Capacity Centre proceeded to prioritize these factors based on a defined methodology.
Prioritization is deemed necessary in order to prevent an over-abundance of information during
the implementation phase. In order to conduct this prioritization, the Capacity Centre developed
a survey which proposed the followingquestions:
DimensionName
Factor Name
78
Category
Indicators
At the Global Cyber Security Capacity Centre, cyber capacity is assessed in five dimensions,
which have been described previously. These five dimensions cover the broad expanse of issue
areas that need to be considered when looking to enhance cyber capacity. Within each
dimension, there are several factors. These factors are all important aspects of capacity building
within each dimension. Each factor is further divided into the categories. Each category is a
different component of the overall factor. For example, when putting together a national cyber
security, one needs to consider the strategy development, organizational components, and the
content of the strategy. Finally, in order to determine what level of maturity a nation or
organization is currently placed, each category has a set of indicators across all five levels of
maturity. These indicators are concrete steps that have either been conducted by the nation, or
have not yet been completed. Therefore, when reading the model, a nation or organization must
conclude whether they have implemented all of the indicator lists for each factor‘s category. If a
organization cannot provide support for all of these assertions, then that organization has not yet
reached that stage of maturity. In order to increase the level of maturity, all of the indicator
criteria must be met. For example, if a country has an outline of a national cyber strategy
competed, but was done so without key stakeholder participation, then the country will remain at
the start-up level of maturity. Readers are advised to refer CMM model available at
https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/CMM%20Version%201_2_0.pdf.
There are various types of cyber security exercises ranging from simple quiz based discussion
cyber exercises to full-scale simulation based cyber drills. Discussion based exercises such as
Tabletop exercises are usually having players from senior-level management and focuses on the
governing and strategic decisions. This type of exercises do have importance in improving
preparedness, coordination & cooperation but discussion based exercises alone is ineffective in
assessing real-ground level situation; how organization will respond to cyber events. Functional
exercises- Action based technical exercises are required to access the preparedness by simulating
attack or crisis scenario to the security team or employees of the organization and improving
security posture based on the learned lessons of exercises. Discussion based exercises may
follow Action-based technical exercises to discuss strategy and policy based on the outcome of
79
action based technicalexercises.
In this section we will discuss importance of conducting functional exercises, the methods of
conducting two type of functional exercises viz. Simulated-attack-based and Hypothetical-
Scenario-based exercises. We will also discuss parameters for evaluating the performance of the
exercise participants.
CyberSecurity
Exercisetypes
Discussionbased Functional
exercises exercises
Real time
Artifact based simulation of
attacks on drills
Cyber security exercises of different natures are conducted around the world, each with different
set of requirement, format and challenges. There is no fix standard to distinguish exercise in one
or another category, however based on the focus of the exercises; we divided them in two broad
categories:
Discussion based cyber security exercises like walk-through, quizzes, table-top exercises, etc.and
i. Functional or Action-based exercises like simulated attack-based exercises and
Hypothetical scenario basedexercises.
Functional exercises are important for drilling the People, Process and Technology implemented
at the organization from security viewpoint. We will discuss two type of functional exercises
Hypothetical scenario based exercises are focused on accessing the effectiveness of security
plan, coordination and communication and Standard Operating Procedures (SOPs) of the
participating organization. It usually contains hypothetical crisis situation which by means of
injects unfold through followingphases:
Artifacts based cyber security exercises are exercises in which artifacts like packet
captures, infected machine, and malware sample are injected to participants with a main
scenario/theme.
Real-time simulation based exercises: In this kind of exercises participants are provided
with virtual images to protect from cyber attacks. During the drill attacker team launch
announced or un-announced attacks on the setup and try to exploit the vulnerability that
was present in the drill setup hosted by the organization. Organization needs to respond
to the attacks according to their security plans/ SOPs/ coordination plan.
Evaluator/observer monitors the actions of the participatingteams.
Designing the cyber security exercises is a challenging task and requires proper planning and
analysis of maturity level of security program implemented in organization. Matrix below is
useful to make decision in selecting the type of exercise based on the maturity of information
security program at the organization and degree of expectation from exercise to access ground-
level response capabilities.
Organization should start with discussion-based exercises like quizzes and walk-through and by
improving security posture should move toward the full-attack-simulation based functional
exercises. Organization can develop a comprehensive security exercises plan in which exercises
should be planned with increasing complexity. Outcomes and learning's of a exercise should be
used as guiding principle for designing next level of the exercises.
This section discusses indicative components that could be used by organization for conducting
Simulated-attack-based and Scenario-based cyber security exercises. Figure 14 below provide a
overview of the components involved in conducting scenario-based cyber security exercises.
Unfolding scenario can be divided into the different stages and assigned to moderators/
81
evaluators for executing that particular stage of exercise, which mainly includes sending injects,
controlling flow of exercise and collecting and evaluating the responses from the participants.
Tools such as the EXercise event Injection TOolkit (EXITO) can be used for developing master
inject list, trial-run andexercise-management.
Organization exercise planning team should design and finalize parameters to be captured during
82
the exercise before commencement of the exercises, so to effectively evaluate the desired
objectives. Evaluation parameters should be discussed with exercise evaluators, participants
coordinator and subject matter experts. In this section we will discuss list of parameters against
example scenarios.
Expected actions to be taken by security Team and senior management during steady
stage of scenario (Actions for virus alert in steadystage).
Expected actions to be taken by Incident Response Team during the attack stage ofthe
scenario(when infection is detected in criticalsystem).
Coordination and communication with internalTeams.
83
Coordination and communication with externalstakeholders.
85
Unit 2: Desktop Security and
Malware 2
Unit Structure
2.2 INTRODUCTION
2.3 VIRUS
2.4 WORM
2.5 TROJAN HORSE
2.6 BOTS AND BOTNETS
2.7 RANSOMWARE
2.8 ROOTKITS
2.9 EXPLOIT KITS
2.10 CYBER WEAPONS
2.15 SUMMERY
86
2.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand different types of Malware & theirClassification
Understand PropagationMechanisms
Know Perpetrators and Motivation
Detect and RemoveMalware
Safeguard Ourselves from different types ofattacks
2.2 INTRODUCTION
Malware is short for ―Malicioussoftware‖- computer programsdesigned to infiltrate and
damage computers without the users consent. They are used by cybercriminals, hacktivists and
nation states to steal personal or professional data, bypass access controls and otherwise cause
harm to the host system. Appearing in the form of executable code, scripts, active content or
other software variants, there are many different classes of malware which possess varying
means of infecting machines and propagatingthemselves.
This unit explains, what malware is, the types of malware and how they operate, recent trends in
malware capabilities, behaviors, and incidents, and what makes systems vulnerable to malware
infection.
The ―adverse impact‖is not limited only to loss of confidentiality, integrity, availability, it
includes loss of any required property of the targeted information system, including
dependability, usability, performance, and privacy. Perhaps the most sophisticated types of
threats to computer systems are presented by programs that exploit vulnerabilities in computing
systems.
The chapter begins with discussion on different categories of malware- although being
functionally different you can always find them in hybrid mode, we will talk that later - with a
survey of various types of malware, with a more detailed look at the nature and characteristics.
We then look into various classification based on the nefarious capabilities they possess and
their surviving mechanisms. We will further learn the threats they pose in the contemporary
malware realm the safe guard and best practices /countermeasures. At the end of this chapter
you will definitely become“malAware”
2.3 VIRUS
A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of the hard
87
drive. When this replication succeeds, the affected areas are then said to be "infected".
Whenever the host programs are executed, the virus instructions get activated along with the
program.
A virus cannot perform its task of harming and replication unless it is allowed to execute. This is
the reason why viruses often choose an executable file as its host and get attached to them.
Viruses are mainly classified into two types:
a. Non-Resident Viruses: This kind of virus will execute along with its host, perform the
needful action of finding and infecting the other possible files and eventually transfers the
control back to the main program (host). The operation of the virus will terminate along
with that of itshost.
b. Resident Viruses: In case of resident viruses, whenever the infected program is run by
the user, the virus get activated, loads its replication module into the memory and then
transfer the control back to the main program. In this case, the virus still remains active in
the memory waiting for an opportunity to find and infect other files even after the main
program(host) has beenterminated.
88
Macrovirus
Written in the macro scripting languages of word processing, accounting, editing, or project
applications, it propagates by exploiting the macro language‘s properties in order to transfer
itself from the infected file containing the macro script to another file. The most widespread
macro viruses are for Microsoft Office applications (Word, Excel, PowerPoint, Access). Because
they are written in the code of application software, macro viruses are platform independent and
can spread between Mac, Windows, Linux, and any other system running the targeted
application.
Multi-variantvirus
The same core virus but implemented with slight variations, so that an anti-virus scanner that can
detect one variant will not be able to detect the other variants. Polymorphic Virus is the virus
which changes their characteristic after each infection. There are various techniques which are
employed to achieve polymorphism by self-modification of code and hence infected files are
infected with different variants. And in other cases, the virus encrypts itself with different key for
different file. Metamorphic Virus is the virus that is rewritten such that, with each iteration so
that each succeeding version of the code is different from the preceding one.
89
Figure 17: Melissa Virus
Microsoft Office documents- Word, Excel, PowerPoint, and other types of documents -
can contain embedded code written in a programming language known as Visual Basic
for Applications (VBA). With few exceptions, macro viruses are spread when a user
opens or closes an infected document. Documents are spread between users using email,
Internet, and removable media. After a malicious macro is loaded into an Office
applicationlikeWordviaaninfecteddocument,itcanusefeatureslike―AutoExec‖to
automaticallystartwithWordor―AutoOpen‖toautomaticallyrunwheneveryouopena
document. In this way, the macro virus can integrate itself into Word, infecting future
documents. It can corrupt data, create new files, move text, flash colors, insert pictures,
send files across the Internet, and format hard drives. Not simply limited to the already
powerful macro language commands, macro viruses are increasingly used as transport
mechanisms to drop off even nastier bugs. Macro viruses can use the
VBA SHELL command or utilize the operating system's kernel API to run any external
command they want. The VBA KILL command can be used to delete files. Macro viruses
modify registries, use email to forward copies of itself to others, look for passwords, copy
documents, and infect otherprograms.
2. ILOVEYOU virus: The ILOVEYOU virus initially traveled the Internet by e-mail, just
like the Melissa virus. The subject of the e-mail said that the message was a love letter
from a secret admirer. An attachment in the e-mail was what caused all the trouble. The
original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The infection
thenreplicatesitselftoeveryoneinyourOutlookaddressbook.Finally,theinfection
corrupts files ending with .vbs, .vbe, .js, .css, .wsh, .sct, .hta, .jpg, .jpeg, .mp2, .mp3 by
overwriting them with a copy of itself.
90
Figure 18: ILOVEYOU virus
o It copies itself several times and hides the copies in several folders on the
victim's harddrive.
o It added new files to the victim's registrykeys.
o It replaced several different kinds of files with copies of itself.
o It sent itself through Internet Relay Chat clients as well ase-mail.
o It downloaded a file called WIN-BUGSFIX.EXE from the Internet and
execute it. Rather than fix bugs, this program is a password-stealing
application that e-mailed secret information to the hacker's e-mailaddress.
3. Sality Virus: It infects executable files on local, removable and remote shared drives. It
replaces the original host code at the entry point of the executable to redirect execution to
thepolymorphicviralcode,whichhasbeenencryptedandinsertedinthelastsectionofthe host
file. Sality can communicate over a peer-to-peer (P2P) network for the purpose of
relaying spam, proxying of communications, exfiltrating sensitive data, compromising
web servers and/or coordinating distributed computing tasks for the purpose of
91
processing intensive tasks (e.g. password cracking). It also lowers the computer's security
by changing firewall settings, terminates security-related processes and services, and
disables monitoring software and SystemRestore.
2.4 WORM
A computer worm is a standalone malware computer program that replicates itself in order to
spread to other computers. Often, it uses a computer network to spread itself, relying on security
weakness on the target computer to access it. Unlike a computer virus, it does not need to attach
itself to an existing program (or clicking on the Web link for a malware Web site) for replication,
dissemination, or execution. They can run independently and can propagate a complete working
version of itself onto other hosts on a network. Each subsequent copy of the worm can also self-
replicate, therefore infection can spread very rapidly. Computer worms can exploit network
configuration errors (for example, to copy themselves onto a fully accessible disk) or exploit
loopholes in operating system and application security. Many worms will use more than one
method in order to spread copies via networks. One of the many mechanisms used by the worm
to propagateis:
Some worms are spread as network packets. They directly penetrate the computer memory, and
the worm code is then activated. There are many different types of computer worms and many
can cause high levels of destruction. Worms can be broadly categorized as:
2. CodeRED: It spreads via flaws in Microsoft IIS. Once it infects a system, it multiplies
itself and it begins scanning random IP addresses at TCP port 80 looking for other IIS
servers to infect. At the same time, the home page of infected machines will also be
defaced. In addition, it does a denial of service attack on a particular IP address,
previously was www.whitehouse.govwithin certain timeframe, but later a variant were
discovered that does not deface webpage on the infectedhost.
3. Storm: The Storm Worm began infecting thousands of (mostly private) computers in
Europe and the United States on Friday, January 19, 2007, using an e-mail message with
a subject line about a recent weather disaster, "230 dead as storm batters Europe".
During the weekend there were six subsequent waves of the attack. As of January 22,
2007, the Storm Worm accounted for 8% of all malware infectionsglobally.
4. Koobface: This worm originally targeted users of the networking websites like
Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail,
and AOL Mail. It also targets other networking websites, such as MySpace, Twitter, and
it can infect other devices on the same local network. This infection allows an attacker to
access users' personal information such as banking information, passwords, or personal
identity (IP address). It is considered a security risk and should be removed from the
network. The Koobface computer worm targets users of Facebook andMyspace.
Trojans do not replicate by infecting other files or computers. Instead, Trojans survive by going
unnoticed; they may sit quietly in your computer, collecting information or setting up holes in
your security, or they may just take over your computer and lock you out.
94
Once installed, the software can be controlled remotely by hackers for criminal or other
malicious purposes, such as extracting money, passwords, or other sensitive information, or to
create a zombie from which to disseminate spam, phishing emails, the same Trojans can be hard
to detect because they can appear to be legitimate while sneaking harmful software into your
computer. Trojans are especially dangerous because of their wide range of capabilities. They can
locate personal information stored on your computer, weaken your computer system to allow the
hacker‘s future access, destroy programs or data that are located on your hard drive and even
allow a hacker to remotely control your computer. Trojans often hide in free game downloads or
other utilities. Without running thorough anti-virus software, Trojans may stay on your computer
for a long period of time, collecting your personal and financial information without you even
knowing about it. Many categorised according to the functionalities they posses, but mostly they
are of hybridnature.
95
2.5.1 Banking Trojan
They obtain confidential information about customers and clients using online banking and
payment systems. Banking Trojan infects a Web browser and lay dormant, waiting for the
computer user to visit his or her online banking website. Once that happens, the Trojan silently
steals the bank-account username and password and sends it to a computer controlled by
cybercriminals, sometimes halfway around the world. They perform what's called a "man-in-the-
middle" attack, getting in between the user and the bank and subtly changing what the user's
browser displays so that it appears as if a user's transactions are proceeding normally, even while
the password and money theft is taking place. Possibly the most successful and widespread
banking Trojan has been the Zeus Trojan, which has infected a reported 13 million computers in
the past several years. One of the major characteristics of banking Trojans are HTML injection
wherein web elements are injected on the page being rendered on the fly to an unwitting user.
Infected users may see, pages from their banking sites, added with extra fields like ATM pin,
ATM no, expiration date.
◻ Redirecting the intended queries to malicious servers and hence further downloading
of malware , potentially unwanted programs or conducting phishingattacks
◻ Eavesdropping the usersessions
◻ Man in the Middle attack(MITM)
◻ Serving advertisements with the attackerschoice
◻ Prevent downloading operating system and Antivirusupdates.
Malware Infection has been confirmed by local or ADSL / VoIP router DNS server
settings against the identified rouge DNS servers which are listedbelow:
◻ 64.28.176.0 -64.28.191.255
◻ 67.210.0.0 -67.210.15.255
◻ 77.67.83.0 -77.67.83.255
◻ 93.188.160.0 -93.188.167.255
◻ 85.255.112.0 -85.255.127.255
◻ 213.109.64.0 -213.109.79.255
96
2.6 BOTS AND BOTNETS
A "bot" is a type of malware that allows an attacker to surreptitiously gain complete control of
the infected machine. A botnet is a group of computers that are controlled from a single source
andrunrelatedsoftwareprogramsand scriptscontrolledbya botherder. Alsoknownas―Web
robots‖,bots are usually part of a network of infected machines,known as a―botnet‖,whichis
typically made up of victim machines that stretch across the globe. A computer that has been
infected by a bot is referred to as a zombie or, sometimes, a drone. Botnet is a networked group
of zombies controlled by hackers known as Bot herders, usually through Trojan software that
users have downloaded (either unknowingly, or believing it to be something other than
malware). Bots sneak onto a person‘s computer in many ways. Bots often spread themselves
across the Internet by searching for vulnerable, unprotected computers to infect. When they find
an exposed computer, they quickly infect the machine and then report back to their master. Their
goal is then to stay hidden until they are instructed to carry out a task. Luring users into making a
drive-by download, exploiting web browser vulnerabilities, or tricking the user into running a
Trojan, are all means of executing the malicious software needed to recruit a computer into a
botnet. The malware will then usually install modules that allow the computer to be
commandedand controlled by the botnet's operator. Using various Internet-based
communications methods (e.g., Internet RelayChat, Instant Messaging) the hacker can ―wake
up‖tens of thousands of zombies and direct them to perform actions on the hacker‘s behalf, such
as delivering spam, phishing, or serving crimeware. After a computer is taken over by a bot, it
can be used to carry out a variety of automated tasks, including thefollowing:
Table 1:Various tasks carried by a bot
97
Bots may be further subcategorized according to their delivery mechanism. For example, a Spam
bot is similar to an email virus or mass-mailing worm in that it relies on the intended victim‘s
action to activate it, either by opening an attachment affixed to a spam email, or by clicking on a
Web link within a spam email which points to a Web site from which the bot is downloaded to
the victim‘s computer. If the bot clones or otherwise replicates itself and exports those clones to
other machines, all of the bot instances can communicate and interact with each other, thereby
creating a cooperative network of bots, referred to as a botnet. Typical configurations include:
Star (a), Multi-server (b), Hierarchical (c), and P2P depicted below:
Figure 22: Typical C2 botnet configurations: (a) Star, (b) Multi-server, (c) Hierarchical, (d) Random
Spambots capture email addresses from website contact forms, address books, and email
programs, then add them to a spam mailing list. Site scrapers download entire websites, enabling
unauthorized duplication of a website's contents. DoS bots send automated requests to websites,
making them unresponsive.
2.7 RANSOMWARE
Ransomware is a type of malware used as a digital mechanism for extortion. It is a type of
software to block access to a computer system until a ransom is paid. They reach the system via
malicious hyperlinks shared via spam emails, social media, malicious email attachments (Income
Tax repay, fake FedEx and UPS tracking notices), drive-by-download or as a part of dropped file
from other malwares. They encrypt files located within local drives, shared network drives, USB
drives, external hard drives, network file shares and even some cloud storage drives with the
private key stored only on the malware's control servers. Subsequently, displays ransom
messages about the files being encrypted, and demand payment against the private key. These
messages in Windows 10 ransomware scam mimic the emails sent by Microsoft, along with
some text mistakes and changes. However, scammers have managed to spoof the address of
origin as [email protected]. To make the messages look more authentic, attackers are using
the same color scheme used by Microsoft to fool the users. Thus, these emails look more
legitimate.
The mail is also coupled with a Microsoft disclaimer and a message that files are virus-free.
Crowti (also known as Cryptowall) and Tescrypt (also known as Teslacrypt) are two ransomware
families that have infected over half a million PCs running Microsoft security software in the
first half of 2015. CryptoWall, CoinVault, TorLocker, CoinVault, and CTB-Locker are all
examples of ransomware. Some forms of ransomware encrypt files on the system's hard drive
(cryptoviral extortion), while others will simply lock the system and display messages intended
to coax the user into paying the fee and propagates itself in a manner comparable to a
conventional computer worm. Once a machine is infected, the program will then run a payload
that begins to encrypt personal files on the hard drive, with the malware author being the only
individualwithaccesstothenecessarydecryptionkey.Recentdevelopmentseeincarnationsof
―Onion‖ ransomware(aka CTB-Locker), which uses anonymous TOR(The Onion
99
Router) network and Bitcoinsto better protect criminals, their funds and keys to victims‘ files
from law enforcement.
2.8 ROOTKITS
A rootkit is a form of software which enables other malicious processes or programs to continue
to benefit from privileged access to a computer by masking their existence from normal detection
methods. They use system hooking or modification to hide files, processes, registry keys, and
other objects in order to hide programs and behaviors. Malware hidden by rootkits often monitor,
filter, and steal your data or abuse your computer‘s resources. The sole idea behind installing this
collection is to be able to gain administrator-level access on the target machine, so that it can
either be remotely controlled to harvest secret data, or used to attack other vulnerable machines,
toreplicatetherootkitonthose,andsubsequently―own‖thosesystemstoo.Rootkitscaneither be
100
installed automatically or manually once an attacker has gained root or administrator access.
After the infection has taken place, a rootkit provides the remote user with access to all of the
folders on a system, including private data and system files, without the knowledge of the
primary user(s). Rootkits may also go deeper to infect the basic input/output system (BIOS), a
chip located on all motherboards that contains instructions for how the system should boot-up
andoperate.
A key characteristic of an exploit kit is the ease with which it can be used even by attackers who
are not IT or security experts. The attacker doesn‘t need to know how to create exploits to benefit
from infecting systems. Further, an exploit pack typically provides a user-friendly web interface
that helps the attacker track the infection campaign. Some exploit kits offer capabilities for
delivering payload that remotely controls the exploited system, allowing the attacker to create an
Internet crimeware platform for further malicious activities. There are a number of ways how
exploit kits arrive in a computer. Blackhole exploit kit, one of the many known exploit kits in
existence, is known to spread via spam. Some other exploit kits arrive via malicious ads.
2.11CYBER WEAPONS
Cyber weapon is intuitively considered any software, virus, and intrusion device that can
penetrate another nation‘s computers / networks for causing unlawful damage/devastation of
infrastructure. Their prime characteristics include PRECISION, INTRUSION, VISIBILITY,
EASINESS TO IMPLEMENT, REMAIN LOW PROFILE etc. They are diligent to perform
Espionage, sabotage, Surveillance, theft of Intellectual property, physical damage of the assets
etc. Real world examples include Stuxnet, Duqu, flame, gauss which were extremely powerful
malware/cyber weapons. For instance, Stuxnet was the first publicly identified malware to target
an industrial control system (SIEMENS PLC‘s) that targets Iranian Uranium Enrichment
Programme, later went rampant and infect worldwide. It Targets Siemens S7/WinCC products,
102
and compromises S7 PLC's to sabotage physical process. It Exploited 4 Windows zero-day
vulnerabilities and basically Spreads via USB/Removable Media, Via Network, S7 Project Files,
WinCC Database Connections.
2.12 POSMALWARE
The latest arsenal in attackers Armor, point of sale (POS) malware that targets payment card
processing, point-of-sale (POS) /check out systems / equipment retail check out systems. Earlier
skimming is one of the more popular methods to exfiltrate payment cards information. However,
this involves installing additional hardware onto the POS terminal which is then used to
readtrack 2 data from cards which requires physical access to POS devices. POS malware
circumvent this problem. While card data is encrypted as it‘s sent for payment authorization, it‘s
not encrypted while the payment is actually being processed, i.e. the moment when you swipe
the card at the POS to pay for your goods. POS malware are memory scrappers as it looks in
memory for data, which matches the pattern of the Track1/ Track 2 data. Once it finds this data
in memory, which occurs as soon as a card is swiped, it saves it in a file on the POS, which the
attacker can later retrieve. The most well-known pieces of POS malware includes BlackPOS,
BrutePOS, Backoff POS, Dexteretc.
1. The Innovators: Focused individuals who devote their time to finding security holes in
systems or exploring new environments to see if they are suitable for malicious code to
challenge and embrace the challenge of overcoming existing protectionmeasures.
2. The Amateur Fame Seekers: Novices of the game with limited computing and
programming skills seeking media attention using ready-made tools andtricks.
3. The Copy-Catters: They are hackers and malware authors desire for celebrity status in
the cybercrimecommunity.
4. The Insider: Disgruntled or ex-employees, contractors and consultants intended to
revenge or theft by taking advantage of inadequate security aided by privileges given to
their position within theworkplace.
5. Organized Crime: They are highly motivated highly organized, real-world cyber-
crooks; Limited in number but limitless in power. Money motivated tight core of
masterminds concentrated on profiteering by whichever means possible- surrounding
themselves with the human and computer resources to make thathappen.
a. Spam emails /Attachments: Malware authors often use tricks to try to entice you to
download malicious files. This can be an email -―from known person‖- with a file
103
attached that tells you it is a secret document, income tax refund, feedback for a recent
seminar youattend.
b. Drive by downloads / compromised genuine webpages: Malware leverages client side
vulnerabilities to infect. Drive by downloads tricks your browser to lead to a page that
hosts exploit kits and deliveraccordingly.
c. Infected removable drives: One of the culprits in high profiled / targeted attacks is the
non-judicious use of removable drives. The same drive shuttled betweenhome
environments (mostly insecure) to office premises without any hassle that brings a
whole lot of malware to and fro.
d. Trojanized software / Warez / keygen /torrents: Some malware can be installed at the
same time as other programs that you download. This includes software from third-party
websites or files shared through peer-to-peer networks. Some programs will also install
other applications that we detect as potentially unwanted software. This can include
toolbars or programs that show you extra ads as you browse the web. Usually you can
opt-out and not install these extra applications by unticking a box during the installation.
We have also found programs used to generate software keys (keygens) often install
malware at the same time. Microsoft security software finds malware on more than half
of PCs with keygens installed. Keeping in mind that, no consumer Anti-Virus / security
software give full protection against the threats discussed earlier, it is recommended to
install them to reduce the impact. Some of the popular antivirus are listed below:
Kaspersky:http://www.kaspersky.co.in/
Symantec: http://www.symantec.com/en/in/
GDATA: https://www.gdatasoftware.com/
Avira: https://www.avira.com/
For instance, you could accidentally download a malicious application that accesses your
personal information and sends it to a cybercriminal. Or, you could download a dangerous app
that dials premium-rate numbers from your phone, leaving you with expensive charges on your
mobile bill. Other malicious programs can potentially alter your phone's functionality, rendering
104
it useless. You may also receive text messages or voicemails from seemingly legitimate
companies, asking for personal information. The current state of threat level is prevalent and
increasingly more sophisticated malware attacks, as well as OS vulnerabilities that put data at
risk by facilitating device compromise. Moreover, bypassing the inherent mechanisms in place
also causes OS compromise and devicesecurity.
Let‘s see the current threats imposed on iOS and Android platforms in the next section.
App Basedthreats
1. XAgent: spyware having capabilities to steal sensitive data from compromised devices
including SMS, contacts, photos, and GPS locations. It can also remotely activate audio-
recording functionality on compromiseddevices.
2. WireLurker: Wirelurker is iOS surveillanceware delivered via USB connections to
infected OS X devices. Wirelurker can capture contacts and SMS messages from
compromiseddevices.
3. Unflod: monitors SSL connections in an attempt to Jailbroken devices steal the device‘s
Apple ID and password.
OS based Threats and vulnerabilities
4. Jailbreak: Jailbreaking removes hardware restrictions on the iOS operating system and
many iOS users, estimated to be nearly 8% globally, intentionally jailbreak their device
to access restricted content and device functionality and enable extended customization.
Jailbreaking, however, compromises the integrity of the operating system and can make
security technologies such as containers, which depend on the operating system,
vulnerable toattack.
5. OS vulnerabilities: In addition to app-based threats, operating system vulnerabilities in
outdated iOS devices also pose security risk. Several unpatched iOS devices having
version 7.1.1, 7.1.2, 8.0, and 8.1 were vulnerable to Masque Attack that lets attackers to
compromise non-jailbroken devices via enterprise provisioning abuse, replacing
legitimate apps with trojanized versions while evadingdetection.
Android Security threats
6. OS vulnerabilities: Operating system vulnerabilities in outdated Android devices also
pose hefty amount security risks. Malware authors leverage them to take complete
control of the infecteddevices.
7. Stagefright vulnerability: The Stagefright vulnerabilities affect all Android devices
running Froyo 2.2 to Lollipop 5.1.1. The vulnerability exists in Stagefright, a native
Android media player, that lets attackers remotely control and steal data from a device
by sending a victim a multimedia message (MMS) packaged with anexploit.
8. MasterKeyVulnerability:AnAndroidOSvulnerabilitythatallowsattackerstomodify
.apk files(apps) without breaking their cryptographic signature, giving attackers the
ability to maliciously update apps on devices and evade detection on devices with
vulnerable OSversions.
105
9. AOSP Browser Vulnerability: Affects mobile browsers using the Android Open Source
Project‘s (AOSP) browser code. This vulnerability could allow attackers to direct victims
toamaliciouswebpageandaccessdatainotheropenwebpagesinthebrowsingsession,
even taking control of an online account that a victim has logged into on another
webpage.
Android AppThreats
10. Android/OpFake: Android/OpFake is an Android based SMS Trojan and premium
service toll abuser family malware that arrives bundled with repackaged legitimate
applications or hosted on malicious sites spammed from compromised social media
accounts.
11. Android.Dendroid: Dendroid is a Toolkit/HTTP RAT having a sophisticated PHP
administration panel, and an application APK binder package. The malware is created by
modifying the required permissions by any clean APK( Android Application Package)
with Dendroid RAT functionality that allows detailed management of the infected
devices.
What we cando?
A mobile device is a computer and should be protected like one. Users must recognize that
applications or games could be malicious, and always consider the source. A good rule of thumb
is to check if an app is asking for more than what it needs to do its job, you shouldn‘t install it.
The risk of losing a device is still higher than the risk of malware infection. Protecting your
devices by fully encrypting the device makes it incredibly difficult for someone to break in and
steal the data. Setting a strong password for the device, as well as for the SIM card, is a must.
Similarly, take caution while using over the air networks (Free Wi Fi). You should only permit
the installation of apps from trusted sources, such as Google Play and Apple App Store.
Although malware exists for iOS and BlackBerry, however, the risk of infection is highest for
Android, where security software is already available. Make sure all your Android devices are
protected by anti-malwaresoftware.
FutureFocus
Unfortunately, cybercriminals continue to adapt the malware they use in the face of increased
security measures and target awareness. The new trends tip off the cyber space is multi-folded
including rise of mobile malware, malware leverages cloud computing and thwart virtualization
technologies.
2.16 SUMMERY
The evolution of malware represents an ongoing arms race between cybercriminals, hacktivists,
nation states and network defenders, with the continual emergence of new threats and techniques
to evade existing security measures. Whether you are an IT professional, entrepreneur, or
individual user, defending against these new attacks requires everyone to become more aware
and increase their understanding of malware operations . You can reduce the potential avenues
106
for attack by applying a range of mitigations, such as limiting user privileges, removing unused
platforms, installing patches/updates, enabling suitable antivirus software and ensuring your staff
know what to look outfor.
As they said, the weakest link in the security chain is that between keyboard and the chair.
―Staysafewhileonline‖
1. Malicioussoftware
2. Virus
3. Execute
4. Trojanhorses
5. Botnet
6. Ransomware
7. Rootkit
107
Unit 3: E-Commerce and Web-
Application Security 3
Unit Structure
3.8 SUMMERY
3.9 CHECK YOUR PROGRESS
108
3.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the business need of ecommerce and Web applicationsecurity.
Understand the Web applications attacksurface.
Know vulnerabilities and attacks on web-applications
Understand the exploit.
Able to secureweb-applications.
3.2 INTRODUCTION
Today almost for every organization web-applications are the integral part of information
infrastructure to allow information exchange with employee, customers, partners, etc.
Ecommerce is also grown rapidly and everything is moving up on computer network from
vegetables to electronics, today customer is free to shop online at a click of mouse. Web-
applications are the low-hanging fruits for the attacker and custom developed insecure code
brings new set of vulnerabilities which cannot be prevented solely by network security devices
like firewall, IDS/IPS and traditional approaches. Web-applications have been continuously
targeted by attackers for various interests. Cross Site Scripting Attack (XSS), SQL injection, File
Inclusion, Malicious File Uploads is few attacks to name in web-applicationdomain.
In this unit we will discuss Web-application attacks and how to counter those attacks. We will
study impact of vulnerability and case studies of the vulnerability and exploit.
The third tier is the Common Gateway Interface (CGI) which is a set of standards that defines
how a dynamic document is written, how data are input to the program and how the output
resultis used. CGI allows programmers to use any of several languages such as C, C++, Bourne
shell, C Shell, Tcl or Perl. The web server interacts with the CGI to provide dynamiccontent.
109
Figure 25: 2-tier and 3-tier architecture
These days the term URL is more commonly used in place of URI. The URL defines four things:
protocol, host computer, port and path, for example http:://www.uou.ac.in:81/example.html. The
protocol (http in example) is the client/server program used to retrieve the document. Common
protocols which can retrieve a document are FTP and HTTP. The host (UOU.ac.in) is the
computer on which the information is located. The URL can optionally contain the port number
(default is port 80 in example it is 81) of the server; it is inserted between the host and the path
and it is separated by a colon. Path is the pathname of the file (example.html) where the
information is located. The path can itself contain directories, subdirectories and files.
112
A9-Using Components, such as libraries, frameworks, and other software modules, almost
Components with always run with full privileges. If a vulnerable component is exploited, such an
8 Known attack can facilitate serious data loss or server takeover. Applications using
Vulnerabilities components with known vulnerabilities may undermine application defences and
enable a range of possible attacks and impacts.
Web applications frequently redirect and forward users to other pages and
A10-Unvalidated
websites, and use un-trusted data to determine the destination pages. Without
10 Redirects and
proper validation, attackers can redirect victims to phishing or malware sites, or
Forwards
use forwards to access unauthorized pages.
Readers are advised to explore OWASP resources including latest top ten and SANS Top 25
programming error.
Stored or persistent XSS is more severe type as all the users of website will get impacted. No
input validation or weak input validation, when accepting data from the user and improper output
coding, when reflecting data back to the user is reason for the XSS vulnerability. Pie-chart in
Figure 26 reveals that XSS is having the highest percent in web-application vulnerabilities
followed by SQL injection.
Figure 26 : Percent of vulnerabilities out of total number of vulnerabilities (% Vulns ALL) (Source:
WASC25)
XSS is Critical Vulnerability even if one don't have anything like login, session management or
sensitive data over his website. It is required to patch XSS vulnerability even when website is not
dealing with anything sensitive. The next section discusses demonstrating XSS impact such as
injecting iframe and distributing malwares exist and demonstrate compromising client machine
using the Browser Exploitation Framework (BeEF).
113
114
3.5.1 The Browser Exploitation Framework (BeEF)
BeEF is short for The Browser Exploitation Framework 26. It is a penetration testing tool that
focuses on the web browser. Amid growing concerns about web-borne attacks against clients,
including mobile clients, BeEF allows the professional penetration tester to assess the actual
security posture of a target environment by using client-side attack vectors. Unlike other security
frameworks, BeEF looks past the hardened network perimeter and client system, and examines
exploitability within the context of the one open door i.e. the web browser. BeEF will hook one
or more web browsers and use them as beachheads for launching directed command modules and
further attacks against the system from within the browsercontext.
The Browser Exploitation Framework (BeEF) is a security tool that can be used to hook the
browser of the client/victim machine by executing Cross Site Scripting (XSS) through vulnerable
web-application, to further conduct the attack on the client system. BeEF can be used to
demonstrate impact magnitude of the XSS attack. BeEF provides command and control facility
to control and launch attack on the zombie browsers/system. Zombie browser can also be used to
launch further attacks like key logging and portscanning.
3.6 VULNERABLITY STUDY: MALICIOUS FILE UPLOAD
AND WEBSHELLS
Abusing file upload is widely exploited flaw in web application. Web shell code, a preferred
choice for attacker creates a backdoor on vulnerable web server accessible via the web browser
and provides functionalities such as system command execution and file access. Webshells
access which typically allows complete control of the system and lead to malicious activities like
defacement, phishing, espionage, malware distribution and Command & Control hosting post-
exploitation of the web-applications byattacker.
Perimeter security devices like firewalls, IPS/IDS and anti-virus applications are ineffective in
detecting web shells if either the webshell is a customized program developed by attacker for
particular malicious purpose or attacker is using some kind of obfuscation techniques in the
webshells. Analysis of web-intrusion incidents, involving webshell upload, reveals the
methodologies adopted by the attackers for uploading the webshells and common vulnerabilities
exploited. Web-intrusions can be classified broad categories of vulnerabilities exploited by
attackers for uploading the web shells to the vulnerable web-application.
Unrestricted File Upload: File can be uploaded to the server via file-upload feature without
any filtering or control implemented by the developer, any type of file can be uploaded to the
server which may latter allow execution, if directory permission of uploaded folder is set to
execute. Attacker can simply upload a webshell using a webbrowser.
File extension type check based filters: In this type of control checks web-application
developers implement mechanism to match file extension like jpeg, png, pdf and only allow
extension type which is valid as per application requirement. Only relying on file extension
to validate file type is a weak control and can be easily bypassed by the attackers with little
effort.
Content-Type check based filters: Content-Type field of HTTP header which specify
MIME type of the GET/POST request, sometimes used by developers as a check for
validating the file type like Content-Type: image/jpeg to validate file type is jpeg. Content-
Type field can easily be modified by intercepting proxy to bypass the control to upload the
malicious file.
Java-script based filters: Javascript based validation or client-side based validation for the
data supplied by the user only provides false sense of security, data supplied by user must be
validated by web-application at server end. Client side based validation control on type of
file can be bypassed using simple capture-and-modify httprequest.
MIME Type check based filters: Web-application developers also make use of
Multipurpose Internet Mail Extensions (MIME) based check to verify the type of file. This
control also can be bypassed by the attacker or attack can be mounted using the header of the
valid filetype.
During Implementation phase application developers are responsible for writing secure code and
follow do‘s and don‘ts of particular application development language/software and platform.
Attacks like buffer overflow, SQL Injection, XSS are due to sloppy programming.
Testing stage of SDLC must use automated tools as well as manual code review. Automated
tools cannot discover logical errors of the applications, manual testing ismust.
After application development in operation phase we also need to take care of attacks such as
Denial-of-Service (DOS), weak/default password. Even if we cannot completely stop these
attacks with in application but we can limit their impact.
3.7.2 Inputvalidation
The common root cause of Buffer Overflow, XSS and SQL Injection attack is improper input
validation. Attacker uses the applications in such a way they are not meant for. Web applications
take inputs from user, from other web services or from machine environment variables. Web-
applications should not accept or execute any input without first validating it. ―Trust no one‖ is
a principle to write web-application without input validation error. There are two approaches to
filter/ validate user supplied data
Security is job of IT department. Security hampers application development time. Security create
burden on the servers mindsets of application developers need to be changed. Application
designers and developers are responsible for security of application. Management should
schedule security budget keeping in mind application security. Application developers must
118
understand dos and don‘ts of particular technology and their impact, attack trends and top
vulnerabilities reported by organizations such as SANS and OWASP. Application developers
must ensure that their applications are free from the known vulnerabilities.
119
Unit 4: Social Engineering 4
Unit Structure
4.2 INTRODUCTION
120
4.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Know socialengineering
Understand social engineering attack cycle
Defend against social engineering attacks
Understand reverse socialengineering
4.2 INTRODUCTION
“It's not always what you know, it's who you know.”
Information System (IS) security management depends not only on technological measures that
are put in place but also on managerial endeavors as well. Large numbers of technical defense
have been implemented but less importance has been given to non-technical factors like Social
Engineering. It is the art of psychologically manipulating people to obtain confidential
information with or without the use of technology. According to Merriam Webster's dictionary,
social engineering is the "management of human beings in accordance with their place and
function in society, applied social science. It is the practical application of sociological principles
to particular social problems‖. Social engineering techniques are based on specific attributes of
human decision-making known as cognitive biases. These biases, sometimes called "bugs in the
human hardware", are exploited in various combinations to create attack techniques. Social
engineering is so prolific because of the human tendency to TRUST, and the TRUST factor is
often exploited. Social engineering is most commonly attributed to when talking about computer
system and network security. In fact, social engineering can be both technical and non-technical
in nature & most social engineers are also proficient at using computers (which isn‘t a
requirement of being a social engineer) as well as being a skilled social engineer which can be a
verylethalcombination.―Takedown‖isafamousmoviethatfeaturesstoryofthecapture ofone of the
greatest hackers of all time, ―Kevin Mitnick‖whose social engineering capabilities are highly
narrated throughout. According to him, ―Social Engineering usesinfluence and persuasion to
deceive people by convincing them that the social engineer is someone he is not, or by
manipulation. As a result, the social engineer is able to take advantage of people to obtain
information with or without the use of technology‖.
Criminals use social engineering tactics because it is usually easier to exploit your natural
inclination to trust than it is to discover ways to hack your software. For example, it is much
easier to fool someone into giving you their password than it is for you to try hacking their
password (unless the password is really weak). Ask any security professional and they will tell
you that the weakest link in the security chain is the human who accepts a person or scenario at
face value. Social Engineering is essentially using human relationships to attain a goal. It is used
121
by the most effective of law enforcement agencies, such as a local undercover police officer
posing as a drug user to arrest a drug dealer, or spies oversees trying to gain intelligence about
the next terroristattack.
evolve Research
/regress
Cloak
Activite Developing
s rapport &
trust
Utilise Exploiting
information Trust facor
122
a. Research: It is an information gathering process where information about the target is
retrieved. The attacker gathers as much information as possible about the target before
starting the attack. Some methods are obvious and require no great cunning or planning,
while others require certain skill or knowledge. If industrial espionage is the aim, the
attacker learns everything about the victim/ organisations with the help of all available
resources, social networking sites etc. Typical information that may be gathered could be
an internal phone directory, birth dates, organisational charts, personnel records, social
activities, relationships,etc.
b. Developing Rapport and Trust: The social engineer capitalises on the psychological
aspect of trust. The target is more likely to divulge requested information to an attacker if
he trusts the attacker. Rapport and trust development can be done by using insider
information, misrepresenting an identity, citing those known to the victim, showing a
need for assistance, or occupying an authoritative role. Once trust is established, the
hacker will be able to start acquiring sensitive information and access necessary to break
into a system. The skilled hacker will gain information very slowly asking only for small
favours or gaining information through seemingly innocent conversations. The hacker
will work hard to maintain an apparently innocent relationship, while learning company
lingo, names of key personnel, names of important servers and applications, and a host of
other valuable information. If an attacker feels hesitation in the voice on the other end of
the phone, he or she will stick to simple questions and hope to gain more information
from the next individual he or she chooses to call. The larger the organization, the easier
it is to establish trust. In a smaller environment the target is much more likely to know
whether or not the attacker is who they say they are. Trust is important to establish both
as a technique on its own as well as in combination with othertechniques.
c. Exploiting Trust Factor: When a target appears to trust an attacker, the attacker exploits
the trust to elicit information from the target. This can either take the form of a request
for information, a request for a specified action from the victim or, alternatively, to
manipulate the victim into asking the attacker for help. This phase is where the
previously established relationship is abused to get the initially desired information or
action.
d. Utilise & Execute: The outcome of the previous phase is utilised to reach the goal of the
attack or to move on to further steps which may be required to reach the goal. The
execute-step is where the attacker does something that is clearly illegal or not allowed,
for instance when the target is asked to submit his log-in information, or when the
nefarious e-mails aresent.
e. Recruit & Cloak: Cloak is the actions performed after the execution, actions performed
in order to hide the illegal activities. It can be to continue with the ―friendship‖ to
normalize the actions, moves to make the victim seem untrustworthy, or more advanced
techniques to hide the crime. In some cases the victim can be recruited to either work for
the attacker or as an ambassador/reference for theattacker.
123
f. Evolve/Regress: This is where the attacker learns from the process and creates an
internal justification for what has happened. There are basically two choices for the
attacker here. Either the attack evolves, moving into another phase of the attack if the
process has been successful up to this step. The other choice if the results to this point
have been unsuccessful is to regresses, which can either be to stop the attack or to move
to a more basic level of attack in order to be successful again. The gathered information
can then be used to target and explore more deeper into the victim , until finally attackers
convince their targets to divulge the information they need to achieve thegoal.
124
these social engineering attacks remotely such as by phone, email, social media, instant
messaging and even from search engine results Physical honeypots are found wide impact as
well with CD's & USB Keys - This uses items planted to lure employees to runpayloads.
4.4.4 Computer-based Social Engineering
Computer based social engineering is implemented by using software or programming
applications like E-Mails, IM, websites, pop-ups.
Phishing
Phishing emails typically take the form of fake notifications purporting to be from a well known
organization (often banks, payment systems, Software vendors for possible upadate), asking for
the recipient‘s personal information including user credentials, credit card numbers, or banking
information. Some examples are an email looking like it's from your bank asking you to verify
details or a phone call pretending to be from a company that you trust (including your own
company) requesting you to divulge confidential information like a pin number.
125
Phishing attacks are, essentially, a bait-and-hook approach wherein the email is the bait, used to
lure unsuspecting victims in before hooking information from them. The social engineering
really takes place during the bait, which should be enticing enough to convince the intended
victims to open the message and follow the instructions within it. The hook is the method
whereby the social engineer gets information from their victims, either a link to a malicious
website or a telephone number that the victim is asked to call, forexample.
Phishing messages used to be easy to identify, thanks to bad grammar and spelling, poorly
formatted emails, and obviously fake links. However, they are becoming more sophisticated and
more convincing because they have been increasingly personalized with more background
research. Phishing attacks that are customized and targeted at particular individuals are known
as spear phishing. When targeted toward rich or powerful targets, they are sometimes
called whale phishing. And phishing is not limited to email. You can get phishing messages via
social networks, SMS (SMiShing), or voicemail (vishing). Some of the common techniques to
identifyphishing:
a. Poorly formatted mails and body elements: A common practice of many hackers is
to use misspelled words on purpose. While it may seem that this would easily reveal
an illegitimate email, it is actually a tactic used to find less savvy users. Spammers
have learned that if they get a response from a poorly written email, they are on to an
easy target and will focus their efforts to bring that userdown.
b. Request for personal information: One tactic that is commonly used by hackers is
to alert you that you must provide and/or update your personal information about an
account (e.g., Social Security number, bank account detailsand account password).
Phishers will use this tactic to drive urgency for someone to click on a malicious URL
or download an attachment aiming to infect the user‘s computer or steal their
information.
c. Suspicious attachments: Is this new email in your inbox the first time your bank has
sent you an attachment? The majority of financial institutions or retailers will not
send out attachments via email, so be careful about opening any from senders or
messagesthatseemsuspicious.Highriskattachmentsfiletypesinclude:.exe,.scr,
.zip, .com, .bat.
d. Look at the From /To addresses: Check the mail id which it is claimed originated
from. At times your mail address has been the originator and the To field shows a
large list of recipients, you should also be cautious. Legitimate emails will most likely
be sent directly to you and you only. You may see “undisclosed recipients” and this
is something to keep an eye on as well. It could be a valid send, but double check.
e. Check for the U R ‟Ls present: Ensure the link is legitimate as it claims ( uses
encryption (https://). Hover over the hyper links can surely reveal you the purpose of
the mail. However, in order to be extra cautious, it is best practice to always open a
new window and go to the site directly without using the email link provided in an
email.
126
f. IP Reputation: Verify the IP reputation of the email sender obtained from email
headers. Feed the IP to Return Path‟s Sender Score site. This tool will al a score (0-
100) and will be able to give you some insight into the sending IPs historical
performance. The lower the score, the more likely the email is a phishing or spoofing
attempt.
You can't always count on cybercriminals getting the details wrong. In this case, the email
address looks legitimate, as does the first link in the email. The second link reveals the actual
threat. Clicking it would download a .zip file containing malicious code. To avoid the
consequences of this type of attack, navigate to the UPS website and enter your tracking number
there.
Nigerian 419 or advance-fee fraudscam
An Advanced-fee scam is a type of fraud and one of the most common types of confidence trick.
The scam typically involves promising the victim a significant share of a large sum of money,
which the fraudster requires a small up-front payment to obtain. Or E-mail messages are sent to
addresses taken from large mailing lists. The letters promise rich rewards for helping officials of
that government (or bank, or quasi-government agency or sometimes just members of a
particular family) out of an embarrassment or a legal problem. Typically, the pitch includes
mention of multi-million dollar sums, with the open promise that you will be permitted to keep a
startlingpercentageofthefundsyou'regoingtoaidinsquirrelingawayforthesedisadvantaged
foreigners. If a victim makes the payment, the fraudster either invents a series of further fees for
the victim, or simply disappears. It is named after the article of the Nigerian penal code under
which the perpetrator can be prosecuted.
4.4.3.2 POP-up windows / browserinterceptions
Pop-ups messages informing the user that he/ she has lost his/her network connection and needs
to re-enter his/ her username and password or the system has been infected with malware. Need
to download asoftware to get them cleaned and further divulge sensitive information and are sent
to attackers.
4.4.5 Social Engineering byPhone
The social engineer attempts to get the victim to disclose sensitive information or to pe rform an
action such as visiting a malicious website or granting the social engineer access to a certain
system. The caller generally assumes a false identity and may use various techniques to convince
the victim, such as being overly friendly, acting in an authoritative manner, or applying pressure.
The caller may purport to be from tech support or an anti-virus organization, a financial
institution, or even a charity. In many business cultures, challenging someone‘s identity is not
socially acceptable and may be seen as impolite, so getting away with assuming a false identity
may be easier than you think.
127
Figure 29: Online scams
MumbleAttack
Mumble attacks are telephonic social engineering attacks targeted at call center agents. The
social engineer poses as a speech-impaired customer or as a person calling on behalf of the
speech-impaired customer. Victims of the attack are often made to feel awkward or embarrassed
and release information as aresult.
IVR or phone phishing (aka.vishing)
The use of an interactive voice response (IVR) system to create an official-sounding bank IVR
system to trick people into providing their personal information28. An example is where a hacker
will pose as a bank employee or even use another IVR message to advise the target they have
tocall into the bank to correct an issue. They provide a number (not the bank's) for the target to
call in on and when he/she does, they record their account information as it is entered into the
phone. A hacker could even perform something similar in that they use the same method, but
instead attack a company employee in order to have them attempt to enter their password via the
telephone.
Tools of theTrade
There exits tons of phishing and social engineering techniques and tools and One of the premier
tool available is python based freely available ―Social engineer Tool Kit (SET)‖ included with
many pen-testing platforms. The attacks built into the toolkit are designed to be targeted and
focused attacks against a person or organization used during a penetration test.
SET allows you to specially craft email messages and send them to your targeted victims with
attached File Format malicious payloads for example (sending malicious PDF document which if
the victim opens it, it will compromise the system). Detailed description of the tool is out of the
scope and the reader may refer to http://www.social-engineer.org/framework/se-tools/computer-
based/social-engineer-toolkit-set/ for further information.
“Treat your password like your toothbrush. Don't let anybody else use it, and
get a new one every six months”. Clifford Stoll
Users should be well aware about the password policies and enforce herself. The
windows password should be complex that can foil attempts from crackers andtools.
Your passwords should be long (min 12+) and also use upper and lowercase, digits and
alphanumeric symbols. The best way is to create passphrases like ―I learn diploma
from
U.O.U which can betranslated to ―Ile@rn-d1pl0mafr0mU0U‖
PS: There is also a hidden account called ―Administrator‖ which you should also protect with a
password, but it first has to be enabled, as it is disabled by default. So enable the Administrator
account, set a password, remember to disable it later.
Don‘t use same password everywhere. If one of the passwords is discovered (by a
keylogger) and if you use the same in email services, you can guess theresults.
132
Fromwindowscommandprompt,type―secpol.msc‖and whichleadstoyou thelocal security
133
policy window. Select the account policies > password policy and configure according
to yourneed.
Note:
Try using PASSWORD MANAGEMENT PROGRAMS LIKEKEEPASS
password protect your BIOS, so that people cannot boot your PC. you should change the
boot order in the BIOS so that it boots the hard drive first, rather than the CD/DVD. If an
attacker can insert a Linux Live CD and start up your PC, then they will be able to mount
your hard drive and read all data from it, and all Windows security will be bypassed
4.6 SUMMARY
Social engineering is a very real threat and one that currently has fairly free reign. This will not
always be true. Once businesses start taking social engineering seriously and applying the social
sciences to protect against this threat with a multi-layered defense, social engineering will
become a much more difficult, if not impossible, avenue for a hacker to employ.
Social engineering is a serious problem. A company must not only establish good policies to
guard against it, but must have an effective security awareness program to communicate those
policies. The program should not just reiterate the policies but educate the users to the methods
used by social engineers and the risks involved if they succeed. As one of the major points of
vulnerability is people, education is an important factor. Although awareness and training can
―harden‖your staff, it may not prevent all social engineering attacksfrom being successful.
Convincing social engineers may still be able to mislead your staff; therefore, you need to
implement physical and technical controls to minimize the damagedone.
Albeit a low-tech level attack, SE can manipulate victims to divulge confidential information due
to our illogical understanding or misconception triggered by inherent personality traits.
Therefore, in addition to advanced technologies counterattacking various security intrusions,
human factors must be equally accounted for effective IS security management. Exploiting the
134
cognitive biases of humans and corporate policies to obtain access to desired resources, SE
aggressorscancircumventorganization‘snetworkinfrastructurewhichhoweverisvulnerabletothis
seemingly old-fashioned manipulation. To be able to defend themselves from being victimized,
employees must withhold commitments from potential SE threats through the consistent
implementation of SETA which organizations must continuously instigate with vigilance.
4.9 MODELQUESTIONS
1. Whatissocialengineering?IfmynameisSaniAbhilash,andImworkingatMinstryof
I.T. Explain the tools and techniques you could possibly use to get information to
perform social engineering attack onme?
2. What is reverse socialengineering?
3. What is spear phishing? How successful it as compared to generic phishingmails?
4. Explain different types of social engineeringattacks.
5. How to defend against social engineeringattack?
135
Block-3
136
Unit 1: Cyber Security Risk Management 1
Unit Structure
1.2 INTRODUCTION
1.6 SUMMERY
137
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the risk management.
Understand risk assessmentmethodologies.
Know cyber securityframework.
Perform riskassessment
Implement risk mitigationtechniques.
1.2 INTRODUCTION
Organizations are increasingly reliant on information technology assets to achieve business
objectives. Failure of these assets has a direct, negative impact on the business objectives. Cyber
security risks are a constantly evolving threat to an organization's ability to achieve its objectives
and deliver its core functions. The domain of cyber security needs to move from being in the
domain of the IT professional to that of the senior management, where its consideration and
mitigation can be commensurate with the risk posed. A holistic approach to cyber security risk
management across the organization, its network, supply chains and the ecosystem is required for
effective cyber security. In this unit we will discuss about cyber security risk management, risk
assessment methodologies, standards andguidelines.
Risk=Probability X Impact
ClassifyInformation
Identifythreats
Identifyvulnerabilities
Analyze risk to informationassets
Select amethod
Summarize and communicaterisk
2. Risk Mitigation: It consistsof-
Identifyoptions
Choose anoption
Implement
Accept the risk
Transfer therisk
Limit the risk by putting control inplace
Avoid therisk
3. Evaluation: The objective of performing risk management is to enable the system to
accomplish its objective by better securing the system components that store, process, or transmit
information; by enabling management to make well-informed risk management decisions; and to
assist management in justifying expenses for cyber security. The risk management processes that
are most important to cyber security are the risk assessment and risk mitigation. A Risk
Assessment is the process, which includes identification and evaluation of risks and risk impacts,
and concludes with recommended risk-reducing measures. Risk Mitigation is the process of
prioritizing, implementing, and maintaining the appropriate risk-reducing measures
recommended from the output of the risk assessmentprocess.
A. Risk Assessment: Risk assessment is the process of identifying threats to information or
information systems, determining the likelihood of occurrence of the threat, and
identifying system vulnerabilities that could be exploited by the threat. Risk assessment is
the first phase in the Risk Management process. Risk is assessed by identifying threats
and vulnerabilities, and then determining the likelihood and impact for eachrisk.
139
a. Assets identification and Information classification: To assess the risk, organizations
identify the assets and classify the information assets in the organization.
Classification is the designation given to information from a defined category on the
basis of its sensitivity. Information assets include all categories of information
including data contained in records, files, and databases. Information assets usually
include public records mission-critical systems, customer interfaces, internal tools,
source code, and confidential records. The organization is responsible for protecting
the confidentiality, integrity and availability of the information assets. The value of an
asset will be determined by the information owner - an individual or a group of
individuals responsible for making classification and control decisions regarding use
of information. An information asset can mean many different things depending on
what the organization is trying to accomplish; therefore, it is important to identify
each information asset. Information may be stored onsite or offsite, on hard drives,
CDs and tapes. Some information may be transferred with partners and to contractors.
It is best to create a of list of all information assets and classify each asset as
confidential, restricted or public information. The classification of the information
should be included on the information itself and on a centrallist.
b. Threats Identification: A threat is a force, organization or person, which seeks to gain
access to, or compromise information. By looking at the nature of the threat, its
capability and resources, one can determine the likelihood of occurrence, as in risk
assessment. A threat can be assessed in terms of the probability of an attack. There
are many types of information security threats, some examples are listedbelow:
Internal threats like malicious employees
Physicalthreats
Natural disasters like fire, floods, andearthquakes
Networkattacks
Socialengineering
Malware
Information security threats must be identified for risk assessment.
In other words, the higher the likelihood of a threat occurring and affecting an asset
and the higher the value of that asset, the higher the risk. If a threat has less or no
chance of occurring, or if the asset has no value, the risk is either very low or zero.
141
Figure 33: The relationship between risk assessment and selection of controls
There are three steps to risk mitigation: identify, choose and implement controls.
a. Identify Options: After the risk to information assets has been measured, a decision
must be made about how to mitigate that risk. There are four options available for
mitigatingrisk:
i. Accept the risk,
ii. Transfer therisk,
iii. Limit therisk,
iv. Avoid therisk
i. Accept the Risk: An organization may choose to simply accept risk under
thesescenarios:
The risk is consideredlow.
The cost of accepting the risk is found to be lower than the cost of
transferring or limiting therisk.
If the cost of accepting the risk is high or more than the cost of transfer
or limiting it, then the organisation should not accept therisk.
ii. Transfer the Risk: When the risk is transferred, the risk is shared with a
third party in part or in whole. This is typically seen in the use of
insurance. Third party insurance organizations, for a fee, agree to accept
the risk and compensate the information owner for the full damage of a
particular risk. This is appropriate for hardware or when the recoup value
is received if the asset is destroyed or where an organization wants to limit
liability.
iii. Limit the Risk: When a risk is high for a particular asset, and the risk
cannotbetransferredthentheriskshouldbelimitedinpartorinfull.The
142
process includes identifying the most probable threats to a given asset and
identifying, researching, or developing an acceptable control to that threat.
In the case of limiting risks such as a malware infection, spam and
unauthorized Internet access, the organisation may decide to order the
purchase of software for all computer devices to reduce the impact of
those risks. Limiting risk will mean controlling access to the network, by
installing antivirus, Intrusion prevention systems and a firewall where
none exists. Training employees and contractors to be aware of
information security will also help reduce therisks.
In some cases, limiting the risk can be fast, inexpensive and sometimes
free. Information systems suppliers may provide free security patches and
may even provide mechanisms that perform automatic updates to these
systems. Applying security updates or bug fixes may simply involve the
time and skills of the internal staff. Keeping software updated is a critical
defense to recently discovered vulnerabilities.
iv. Avoid the Risk: Risk avoidance may be used to protect those assets which
are at high risk. Some examples of this optioninclude:
Building a facility outside earthquakezone
Making core network air gapped from internet
b. Choose and implement the risk mitigation method: Once the organization has
identified the various options for mitigating risk, one must be selected. Implementing
the option involves putting into action the choice that has been made for mitigating
the risk. As discussed, the possible actions are to accept the risk, transfer the risk,
limit the risk, or avoid the risk. Each information asset now has an assigned risk and
the option for mitigating the risk has been chosen. Implementing the chosen option
will result in certain procedures being followed and/or new controls put in place.
Limiting the risk by putting a control in place will be the most commonly chosen
option to protect your information assets and systems. Continual monitoring and
regular updating is part of the implementation to keep the risk at an acceptablelevel.
C. Evaluation: Audit and evaluation of the risk assessment and risk treatment plan should be
performed by organizations periodically. Evaluation should ensure that the controls put in
place are still functional and viable to protect a given information asset. A technical security
review would consist of reviewing the controls built into a system or application to ensure
they still perform as designed and are in compliance with documented security policies and
procedures.
a. Residual Risk: Residual risk is the threat that remains after all efforts to identify and
eliminate risk have been made. As discussed there are four basic ways of dealing with
risk:reduceit,avoidit,acceptitortransferit.Sinceresidualriskisunknown,many
143
organizations choose to either accept residual risk or transfer it. The formula to calculate
residual risk is
(inherent risk) x (control risk) where inherent risk is (threats × vulnerability).
The appendices provide guidance on using qualitative and quantitative approaches. The standard
is not prescriptive about which should be used. It refers out to IEC 31010:2009 (―Risk
management - Risk assessment techniques‖) to inform the choice of risk assessment technique.
ISO 27005 requires that a risk assessment takes into account threats, vulnerabilities, and impacts.
They must be contextualized to the business, and then fed into the risk evaluation process, which
informs the decisions made on how to treat risks. As a framework the principles of ISO 27005
can be applied to a variety of types and sizes of organization. Given the broad and generic nature
of the guidance, specialist skilled resources will be needed to tailor the implementation to the
requirements of the business.
144
assessment. It is freely available at NIST website 30. The guidance itself is comprehensive and
clear. The methodology should be usable by organizations of all sizes in both the private and
public sectors. It is designed to be consistent with the ISO standards, and flexible enough to be
used with other risk management frameworks.
The risk assessment process in SP 800-30 takes inputs from a preparatory step that establishes
the context, scope, assumptions, and key information sources for the process, and then uses
identified threats and vulnerabilities to determine likelihood, impact and risk. The process next
requires that the results are communicated and the assessment maintained, including monitoring
effectiveness of controls and verifyingcompliance.
1.4.3 OCTAVEAllegro
The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methodology
originates from Carnegie Mellon University in the USA. OCTAVE is one of the best known risk
management methodologies. It is a structured approach to evaluating risk that addresses
operational risk, security practices and the technology that is used to mitigate the recognized risk.
The goal of this approach, compared to others, is that it takes a more strategic approach
compared to a tactical one. It not only focuses on the technology but the practices and processes
also. This is also a methodology that a company can learn and use in-house instead of requiring
security consultants to run this type of program. It is primarily intended as a qualitative
assessment, although may be used for simple quantitative analysis. OCTAVE is intended to be
managed in a workshop style, with a small group of participants from the operational and IT
areas of the business, not requiring extensive expertise. The resources to perform a risk
assessment can be downloaded for free and are integral to the process. Octave Allegro is an
asset-focused method. The first step is establishing consistent, qualitative risk measurement
criteria specific to the organization‘s drivers and objectives. After assets have been profiled,
threats and impacts are considered in light of real world scenarios to identify risks. These risks
are then prioritized according to the risk measurement criteria and mitigationsplanned.
Organizations that seek to implement COBIT will need to choose a suitable way to assess risks
that takes into account threats, impacts and vulnerabilities. COBIT is aligned with other well-
known standards such as ISO 27005. An organization looking to implement COBIT will
alsoneed to take into account the specialist resources that will be necessary to implement this
large framework, and ensure their chosen risk assessment method appropriately reflects their
145
threats, vulnerabilities and impacts.
1.4.5 COBRA
The Consultative, Objective and Bi-functional Risk Analysis (COBRA) takes the approach that
risk assessment is a business issue rather than a technical issue. It consists of tools that can be
purchased and then utilized to perform self-assessments of risk, while drawing on the expert
knowledge embedded in the tools. The primary knowledge bases are:
IT Security
OperationalRisk
'Quick Risk' or 'high levelrisk'
e-Security
There are two primary products, Risk Consultant and ISO Compliance. Risk Consultant is a tool
with knowledge bases and built in templates that allow the user to create questionnaires to gather
the information about the types of assets, vulnerabilities, threats, and controls. From this
information, risk consultant can create reports and make recommendations, which can then be
customized.
COBRA
CORAS Tool
AcuityStream
ASSET
Countermeasures
CRAMM
EAR/PILAR
Ebios tool
EISA
FAIRlite
FAIRiq
GxSGSI
ISAMM
ISMS ToolBox
Secu-Max
OCTAVE AutomatedTool
RealISMS
Riskwatch
RMStudio
SISMSE-2
147
organization‘s management of cyber security risk. The Framework Core then identifies
underlying key Categories and Subcategories for each Function, and matches them with example
Informative References such as existing standards, guidelines, and practices for each
Subcategory.
b. FrameworkImplementationTiers: FrameworkImplementationTiersprovide context on
how an organization views cyber security risk and the processes in place to manage that
risk. Tiers describe the degree to which an organization‘s cyber security risk management
practices exhibit the characteristics defined in the Framework (e.g., risk and threat aware,
repeatable, and adaptive). The Tiers characterize an organization‘s practices over a range,
from Partial (Tier 1) to Adaptive (Tier 4). These Tiers reflect a progression from
informal, reactive responses to approaches that are agile and risk-informed. During the
Tier selection process, an organization should consider its current risk management
practices, threat environment, legal and regulatory requirements, business/mission
objectives, and organizationalconstraints.
c. Framework Profile: A Framework Profile (―Profile‖) represents the outcomes based on
business needs that an organization has selected from the Framework Categories and
Subcategories. The Profile can be characterized as the alignment of standards, guidelines,
and practices to the Framework Core in a particular implementation scenario. Profiles can
beusedtoidentifyopportunitiesforimprovingcyber securityposturebycomparinga
―Current‖ Profile (the ―as is‖ state) with a ―Target‖ Profile (the ―to be‖ state). To
develop a Profile, an organization can review all of the Categories and Subcategories and,
based on business drivers and a risk assessment, determine which are most important;
they can add Categories and Subcategories as needed to address the organization‘s risks.
The Current Profile can then be used to support prioritization and measurement of
progress toward the Target Profile, while factoring in other business needs including cost-
effectiveness and innovation. Profiles can be used to conduct self-assessments and
communicate within an organization or between organizations.
FAIR is not another methodology to deal with risk management, but it complements existing
methodologies. Although the basic taxonomy and methods have been made available for non-
commercial use under a creative commons license, FAIR itself is proprietary. Using FAIR to
148
analyze someone else‘s risk for commercial gain requires a license from RMI.
FAIR underlines that risk is an uncertain event and one should not focus on what is possible, but
on how probable is a given event. This probabilistic approach is applied to every factor that is
analyzed. The risk is the probability of a loss tied to an asset.
Asset: An asset‘s loss potential stems from the value it represents and/or the liability it introduces
to an organization. For example, customer information provides value through its role in
generating revenue for a commercial organization. That same information also can introduce
liability to the organization if a legal duty exists to protect it, or if customers have an expectation
that the information about them will be appropriately protected.
149
Misuse – use the asset without authorization and or differently form the intendedusage
Disclose – the agent let other people to access thedata
Modify – change the asset (data or configurationmodification)
Deny access – the threat agent do not let the legitimate intended users to access theasset
These actions can affect different assets in different ways: the impact varies in relationship with
the characteristics of the asset and its usage. Some assets have high criticality but low sensitivity.
Denial of access has a much higher impact than disclosure on such assets. On the other hand an
asset with highly sensitive data can have a low productivity impact if not available, but huge
embarrassment and legal impact if that data is disclosed. For example the availability of former
patient health data does not affect a healthcare organization's productivity but can cost millions
of dollars if disclosed. https://en.wikipedia.org/wiki/Factor_analysis_of_information_risk -
cite_note-5 a single event can involve different assets- a [laptop theft] has an impact on the
availability of the laptop itself but can lead to the potential disclosure of the information stored
on it. The key point is that it is the combination of an asset's characteristics and the type of action
against that asset that determines the fundamental nature and degree ofloss.
1.7 SUMMERY
In this unit we discussed about the risk management process and its importance. Cyber security
risk management is an integral part of a company‘s management process that deals with the
identification, treatment, communication and acceptance of IT security risks. It involves the
selection and implementation of countermeasures justified by the identified IT security risks and
the reduction of those risks to acceptable levels. It also comprises continuous monitoring of risks
and risk communication. We had discussed common methodologies for conducting the risk
assessment. Unit is concluded with the introduction to the NIST cyber security framework and
Factor analysis of information risk (FAIR).
Activity
Activity 1: Explore NIST cyber security framework and risk assessment methodology.
CHECK YOURPROGRESS
1. Fill in theblanks
i. Risk
ii. RiskManagement
iii. Riskmitigation
iv. Riskassessment
v. Threat
vi. Vulnerabilities
vii. Transferring
viii. Factor Analysis of InformationRisk
ix. Threat Agent RiskAssessment
x. Operationally Critical Threat, Asset and VulnerabilityEvaluation
151
Unit 2: Computer Forensics Fundamentals
and Collection of Digital Evidence 2
Unit Structure
2.8 SUMMARY
2.8 CHECK YOUR PROGRESS
152
2.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand cyber forensicsprocedures
Understand first responderprocedure
Prepare first respondertoolkit
Analyzedata
Infer conclusion from thedata
2.2 INTRODUCTION
Computer forensics or cyber forensics is a branch of digital forensic science pertaining to
evidence found in computers and digital storage media. The goal of computer forensics is to
examine digital media in a forensically sound manner with the aim of identifying, recovering,
analysing and presenting facts and opinions about the digital information. A computer may be a
tool of the offense, target of the crime or a storage container holding evidence of the offense.
Investigation of any such criminal activity may produce digital evidence. Digital evidence is
fragile in nature and its handling requires prior knowledge of the computer parts and equipment.
The categorical roles of a computer in cybercrime can be as a ―target‖as ―tool‖or as an
incidental‖to other crimes. As a target, the contents of the computer are being targeted and being
victim of several types of attacks including malware, Distributed Denial of Service(DDOS),
Identity/Personally Identifiable (PII) Theft etc. Whilst as a tool, computer and its contents can be
used for promotion/ enhancement/ aid of a crime. For instance, the computer is used as a tool in
Cyber Stalking, Cyber theft, Espionage, Net Extortion, Financial Frauds, Botnet Management
etc. Typical traditional crimes are leveraged in case of computer as
―incidental‖ in crime such as online gambling, pornography, Cyber Terrorism, Drug Trafficking
etc. In all these cases you will be stumbled upon with a PC that has been used in any of such
activities and your job majorly involves initiating forensic procedures on the suspect system as a
cyber sleuth. This unit introduces to good practices of evidence acquisition and handling such
evidence from a PC. Analysis and report finding is out of the scope of this unit and shall be
covered in details in advances topics in the coming units.
Collectio
(Medi
examinati
on
Analysis
(Informatio
Reportin
g
The forensic process transforms media into evidence, whether evidence is needed for law
enforcement or for an organization‘s internal usage. Specifically, the first transformation occurs
when collected data is examined, which extracts data from media and transforms it into a format
that can be processed by forensic tools. Second, data is transformed into information through
analysis. Finally, the information transformation into evidence is analogous
totransferringknowledge into action using the information produced by the analysis in one or
more ways during the reportingphase.
Data acquisition can be performed locally / over network. Although it is generally preferable to
154
acquire data locally because there is greater control over the system and data, local data
collection is not always feasible (e.g., system in locked room, system in another location). When
acquiring data over a network, decisions should be made regarding the type of data to be
collected and the amount of effort to use.
“ The general process for acquiring data involves using forensic tools to
collect volatile data, duplicating non-volatile data sources to collect their data,
and securing the original non-volatile data sources. “
After the data has been acquired, its integrity should be verified. It is particularly important for
an analyst to prove that the data has not been tampered with if it might be needed for legal
reasons. We will dive in deep about the necessary data collection process and procedure as a first
responder in the latersections.
2.3.2 Examination
After data has been collected, the next phase is to examine the data, which involves assessing
and extracting the relevant pieces of information from the collected data. This phase may also
involve bypassing or mitigating OS or application features that obscure data and code, such as
data compression, encryption, and access control mechanisms. An acquired hard drive may
contain hundreds of thousands of data files; identifying the data files that contain information of
interest, including information concealed through file compression and access control, can be a
daunting task. In addition, data files of interest may contain extraneous information that should
be filtered. For example, yesterday’s firewall log might hold millions of records, but only five of
the records might be related to the event of interest. Fortunately, various tools and techniques can
be used to reduce the amount of data that has to be sifted through. Text and pattern searches can
be used to identify pertinent data, such as finding documents that mention a particular subject or
person, or identifying e-mail log entries for a particular e-mailaddress.
Another helpful technique is to use a tool that can determine the type of contents of each data
file, such as text, graphics, music, or a compressed file archive. Knowledge of data file types can
beusedtoidentifyfilesthatmeritfurtherstudy,aswellastoexcludefilesthatareofnointerestto the
examination. There are also databases containing information about known files, which can also
be used to include or exclude files from furtherconsideration
2.3.3 Analysis
Once the relevant information has been extracted, the analyst should study and analyze the data
to draw conclusions from it. The foundation of forensics is using a methodical approach to reach
appropriate conclusions based on the available data or determine that no conclusion can yet be
drawn.
The analysis should include identifying people, places, items, and events, and determining how
155
these elements are related so that a conclusion can be reached. Often, this effort will include
correlating data among multiple sources. For instance, a network intrusion detection system
(IDS) log may link an event to a host, the host audit logs may link the event to a specific user
account, and the host IDS log may indicate what actions that user performed. Tools such as
centralized logging and security event management software can facilitate this process by
automatically gathering and correlating the data. Comparing system characteristics to known
baselines can identify various types of changes made to thesystem.
2.3.4 Reporting
The final phase is reporting, which is the process of preparing and presenting the information
resulting from the analysis phase. While preparing the forensic analyst can consider the intended
audience of the report, actionable information on which some can acted upon, Alternative
explanations (When an event has two or more plausible explanations, each should be given due
consideration in the reportingprocess).
The elaborate process and procedure for all the aforementioned four steps would detailed be
collecting in later modules.
The overall forensics investigation methodology will remain the same from all operating
systems. You proceed with verifying the legitimacy of the incident and ensure that the incident
has taken place. Verification process includes the type of the system and the role of the system in
the environment. The major step involves evidence gathering-volatile and non-volatile evidence
from the system. Once the evidence has been gathered, the investigator can work on offline
analysis. The investigator can go about time-line analysis of the whole system which includes
date and time of the notification, using this time line one can step through . The generic steps
followed are concisely listed below, the order of the steps can vary from case to case and to
investigators toinvestigators.
156
Incident verification, detailed study of the system, its environment and its roles of the
system.
Evidence gathering- volatile , non-volatileevidences
Obtain time line details of the entire system. This time line would include the date and
time of notification as well as a listing of all files and their modification, access, etc.
Using this time line, one could step through file by file discovering additional files and
artefacts that the investigator would need to examine closer. Closer look at the files or
entries and determine what they are used for and if they are relevant to the investigation
and finding the strings, bytes ofrelevance.
Once the strings and bytes are located, additional steps to locate and recover the data that
were discovered. After discovery, the steps are repeated starting from time line for the
next interesting entry and proceed with the subsequent steps until all data has been
collected and analysed from the suspectedsystem.
The final step is reporting, that detail the investigation, the acquisition, analysis steps and
conclusive results from theanalysis.
157
Internet history
LogInformation
MACAddress
Registryvalues
Maildatabases
To prevent the alteration of digital evidence during collection:
Document any activity on the computer, components, ordevices.
Confirm the power state of the computer. Check for flashing lights, running fans, and other
sounds that indicate the computer or electronic device is switched on. If the power state cannot be
determined from these indicators, observe the monitor to determine if it is on, off, or in
sleepmode.
Forensic investigators need to be absolutely certain that the data they obtain as evidence has not
been altered in any way during the capture, analysis, and control. According to the National
Institute of Standards and Technology (NIST), the investigator follows a set of procedures
designed to prevent the execution of any program that might modify the disk contents. These
procedures involve a layered defence against any modifications to the source disk using the
following strategies:
Where possible, set a hardware jumper to make the disk readonly.
Use an operating system and other software that are trusted not to write to the disk unless
given explicit instructions.
Use a hard disk write block tool to intercept any inadvertent diskwrites.
The third point clearly defines the need for write protection of the original evidences, and the
best method in practice is use of Write Blockers. A write blocker is any tool that permits read-
only access to data storage devices without compromising the integrity of the data. A write
blocker, when used properly, can guarantee the protection of the data chain of custody. NIS‗Ts
general write blocking requirements hold that:
There exists software/hardware write blockers-the main difference between the two types is
software write blockers are installed on a forensic computer workstation, whereas hardware write
158
blockers have write blocking software installed on a controller chip inside a portable physical
device.
The act of creating a toolkit makes the first responder familiar with computer forensic tools and
their functionalities. The first responder has to select trusted computer forensic tools that provide
output-specific information and determine system dependencies. For example, any program
running on the victim‘s computer generally uses common libraries for routine system commands.
If the first responder starts collecting evidence with the trusted tools, it will be easy to determine
the system dependencies.Create a forensic workstation /toolkit to test the tools that we use during
incident handling. Install clean OS (all the platforms) on a sanitize hard disk (Wiped) and use
File integrity tools to monitor the file integrity of the system and document them accordingly
(Name and type of the OS, Software installed, hardware devices installed etc.). Document in
detail the summary of the tools. Although several commercial tools exit, basic operations can be
performed with free and open source counterparts such as SANS SIFTToolkit.
Disk Forensics Tools – These tools are used to seize and acquire non-volatile data from
computersystems.
Live Forensic Tools – These tools are used for seizing and acquiring volatile data from
live or running computersystems.
159
Device Forensics Tools – These tools are used to seize and acquire data from
devices such as Mobile Phones, PDA‘setc.
Evidence can be defined as anything that can be collected from the system under investigation. It
includes image of the entire system, process information, network connections, log files and user
information. It is best to obtain evidence in a forensically sound manner by avoiding data loss
during any actions that you perform even the order you collect data. Collecting evidence in the
wrong order could potentially result in evidence loss.
2.4.5 Evidencecollection
Any item having any tendency to make the existence of any fact that is of consequence to the
determination of the action more probable or less probable than it would be without the evidence
and yes computer would hold a great deal of information about our thoughts and actions. It is a
step that needs to be performed and your results from these steps need to be clear. Not only you
need to describe the tools used, you also need to explain how you ensure the integrity of the
collected evidence. Forensic methodologies are broadly classified into two categories:
Thefirstisthe―pure‖pull-the-plugtraditionalforensicmethodology advocatedformany years
by most of the law enforcement community. This method is great for preserving data on
disk, but you lose a lot of volatile data which may be useful. A skillful attacker may never
even write their files to disk. A real world example of this is the code red worm.The
second methodology, live forensics, recognizes the value of the volatile data that may be
lost by a power down and seeks to collect it from a running system. As any such action
will in some minor ways alter the system, it is not pure in forensic terms. Many people
feel this is an acceptable trade-off given the value of the data that can be collected from a
running system (with minimalimpacts).
Data on a system has an order of volatility. In general, data from the memory, swap space,
network processes, and running systems processes is the most volatile and will be lost on system
reboot. Raw file system information and data within the raw disk blocks are generally the least
volatile. Whenever you collect data, you want to collect the most volatile first before proceeding
to the least volatile. The order of volatility is as follows:
160
Most
volatile
•Memory
• Swapfile
• NetworkProcesses
• SystemProcesses
• File systemprocesses
Least volatile • Raw diskblocks
We can collect non-volatile data such as the system event logs in an easily readable format, for
instance, instead of the raw binary files in which Microsoft Windows saves them. Of course, this
data would exist in a forensic duplication, but it would be difficult to save the data in a better
format after the machine has been powered off. The live acquisition data is collected by running
161
a series of commands , each command produces data that, under normal circumstances, would be
sent to the console. Because we must save the data for further analysis, we want to transmit the
data to our forensic workstation (a machine that the forensic investigator considers trusted)
instead of the local victim‘s hard drive. If we were to save the data locally to the victim‘s hard
drive, there would be a significant chance that we would be overwriting evidence, if we chose to
acquireaforensicduplicationatalaterdate.Likemostthings,thereisgenerallya―rightway‖ and
a―wrongway‖to live forensics. The―right way‖will generallyexhibitfour traits:
Maintain forensicintegrity
Require minimal userinteraction
Gather all pertinent information to determine if an incident occurred for lateranalysis
Enforce sound data and evidencecollection
One of the keys to any such responses is, the data collection process should be consistent and
verifiable. Therefore, it is highly recommended that the response be automated. There are a
number of common toolkits which will assist with this on a windows system.
ACCORDING TO RFC 3227, THINGS TO AVOID WHILE PERFORMING LIVE
INCIDENT RESPONSE,
162
volatile memory depicts the current state of the system by detailing the processes, information
about open files and registry handles, network information, passwords & cryptographic keys,
unencrypted content that is encrypted (and thus unavailable) on disk, hidden data, worm and
rootkits written to run solely in memory are stored there. This section will slightly glean about
how to capture forensically sound volatile memoryimages.
NOTE: Hardware based memory capture techniques are out of the scope of this course and it is
not covered. The reader may refer to Internet for resources on hardware based memory capture
techniques. This unit will focus on software based image capturing.
There are several free tools to facilitate Image Capturing on Windows™ 10 such as FTK imager
Lite, Belkasoft Live RAM Caputer, Moonsools Dumpit, Win32dd.exe
FTK imager lite is a commercial tool from Access Data that makes memory imaging a simple
task. From the ribbon, select the memory icon and proceed to capture the memory after entering
the location to store the image.
163
Figure 38: FTK imager lite tool for image acquisition
Figure 39 shows the basic usage of command line tools Mantech’s mdd(1), Belkasoft RAM
capturer(2) and Moonsool’s Dumpit(3) to perform imaging task. All are easy to use and quite
self-explanatory. The users are advised to experiment this tools to understand their usage.
164
Professional for analysis and interested learners may find reference resources in them from
Internet. Figure 40 below shows the screenshot of an analysis tool, Volatility framework.
There exist several free tools that can facilitate the same. Windows built-in command line
utilities, Microsoft SYSINTERNALS utilities, audtpol.exe, drivers.exe, fport.exe, dd.exe,
dumpel.exe (dump event log), Efsinfo.exe, hostname.exe, RootkitRevealer.exe, openports.exe and
many more exits. Most of the tools are found on native OS, but it is always advised use tools
that you got from trusted sources, such as newly installed Windows OS or trusted site. For
instance the windows command tasklist can be subverted by rootkits and produce
giveerroneousresults. Therefore, it is advised to carry your own tools/utilities from an external device
and run the utilities from an external device (USB, CD ROM) and collect the results there itself. The tools
165
/ utilities used to capture the live data are tabled below for your reference. You can create a batch script
(.bat) that fires-up the utilities one-by-one, perform the action and store the results to the externaldevice.
Table 3: Commands, tools and utilities for capturing live data
These tasks are easily and effectively be automated in this free tool ―Triage_IR‖. Download the
tool from https://code.google.com/p/triage-ir/downloads/list. Please read the instruction manual
166
thoroughly before proceeding. Run Traige Incident Response.exe as Administrator. There are
several tabs available. You can skip the ―collect memory image‖ if memory image has
already been taken.
167
This tool will run for a while and effectively collect all the necessary live information from the
machine under examination.
By using this command, any data sent to TCP port mentioned on our forensic workstation will be
saved to output.txt. On the victim computer, run a command to collect live response data. The
output of the command is sent over our TCP channel on specified port and saved in the forensic
workstation instead of the victim‘s hard drive. The data can be sent from the victim computer
with the following command:
After these commands are executed and produced the output, you need to press CTRL-C (^C) to
break the netcat session, and the resulting file output.txt will contain all of the data from
thecommand that was executed. A simple MD5 checksum of command.txt can be calculated so
that you may prove its authenticity at a later date using the following command:
-b option tells md5sum to calculate the MD5 hash of the contents of the command.txt
file in binary mode.
There are some secure variants of netcat are also available like cryptcat (the utility could be
downloaded from http://sourceforge.net/projects/cryptcat). It encrypts all of the data across the
TCP channel. The cryptcat uses all of the same command-line switches as netcat. The cryptcat
offers two advantages: secrecy and authentication. Because the data is encrypted, intruders will
not be able to see what you are collecting. Due to the encryption, any bit manipulation by an
intruder is detectable as it will be unencrypted on the forensic workstation. If the bits are altered
when traversing the network, your output will be garbled. You can choose the password used in
the encryption algorithm by issuing the -k command-line flag provided to cryptcat. You must
have the same encryption password on both sides of the connection for this process to work.
168
2.6 INTRODUCTION TO DISK IMAGE
Disk image is an exact bit-level copy of the original evidence, which preserves the data and later
this image of data can be used for performing analysis. Images can be a physical or a logical
copy of a hard drive, memory dump, or copies of removable media like a CD- ROM.
A bit-by-bit copy is different from a simple backup copy of a disk, which can‘t copy deleted
files or e-mails or recover file fragments. On the other hand, a bit-by-bit image is a file
containing a bit-stream copy of all data from a suspect disk. A bit-stream copy is a bit-by-bit
copy of the original storage medium. A bit-stream copy is an exact duplicate of the originaldisk,
while a backup copy is nothing but a compressed file stored in a folder. Disk imaging takes
sector-by-sector copy usually for forensic purposes and as such it will contain some mechanism
(internal verification) to prove that the copy is exact and has not been altered. It does not
necessarily need the same geometry as the original as long as arrangements are made to simulate
the geometry if it becomes necessary to boot into the acquiredimage.
Disk imaging is also be used for taking backup of the disk. Disc imaging creates a exact copy of
the source disk but in backup only copies the active file. In backup, ambient data (data stored in
Windows swap file, unallocated space and file slack) is not copied which is one of the important
sources for the evidence.
Evidence must be handled properly and very easily destroyed. With only one strike on keyboard
evidence could be accidentally destroyed or
modified.
FTK Imager opens up as shown in Error! Reference source not found.. From File Option (Alt-
) in the Menu, select Create Disk Image option (1). Select appropriate evidence from the list as
source. I have chosen physical Drive as the source (2)
170
Select appropriate drive (3). I the above example, we are trying to take image of a USB device
for demonstration purpose. From the list it is clearly visible that the Windows machine in
question has two SCSI local hard disks of total size (3TB), identified as
\\.\PHYSICALDRIVE0and \\.\PHYSICALDRIVE1. And two USB devices attached.
In the Create Image window,as shown in Figure 46 click Add. "Verify images after they are
created" option isselected by default(1). In the ―Image Type select‖ dialogue box, select RAW
(dd) format as the file format(2). The rest are custom types (ENCASE, advanced forensic format
) and often cases they need special software to operate them.
―Evidence Item information‖ asked you to enter information relevant to the case, such as case
no, evidence no, examiner details (3) etc. In the Image Filename field, specify the name of the
image WITHOUT SPECIFYING EXTENSION (default extension provided by FTK). Set the
Image Fragment Size to 0 to avoid fragmenting the image and click Finish(4). Ensure that
sufficient space (equal to the size of the drive being imaged) is present on the drive on which the
disk image has to be saved.
171
Selecting the above options will start the process of disk imaging. Once the imaging process
completes, FTK Imager will read through the image file and confirm the hash value is the same
as the suspect drive or volume. The image summary option shows us details about the image
created. Click Close. If successfully created, the disk image is found in the location you
specified.
When you acquire a physical disk, you are creating an image of the entire physical hard drive
from sector 0 to the last sector on the drive. Doing this means you will also acquire all of the
logical volumes on the disk. The advantages of acquiring a physical disk is that you capture
everything including the all-important master boot record (MBR). The disadvantage to this
approach is that it takes longer and requires more space on your evidence drive. Acquiring a
logical drive means you are going to image a single logical volume (e.g. C:\). The only thing you
will have on your evidence drive is the data space allocated to that particular volume. This means
the space starting with the volume boot record (VBR) to the last sector allocated to the volume.
172
Figure 48: Verifying checksum value
2.8 SUMMARY
Computer forensics is important. The procedures are important to follow, because doing so
ensures evidence will be admitted and suspects will be more likely to face the consequences, if
found guilty. Following these procedures also means using the proper forensic tools to analyze
data correctly. The tools used depend on what is being analyzed. Smaller companies or an
individual user might not need many resources to secure their computers but perhaps a big
Organization might need many different types of applications to monitor hundreds of computers
and dozens of sub-networks. This might require a digital evidence bag for more efficient
Computer Forensics Procedures, Tools, and Digital Evidence Bags for collection of data. Also,
173
certain technologies would benefit from a digital evidence bag such as magnetic card readers due
to specific programs associated with the device to operate and process information.
174
Unit 3: Cyber Security Initiatives in India
3
Unit structure
3.2 INTRODUCTION
175
3.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Know about cyber security initiatives inIndia.
Understand the intent of securing cyberspace.
Know various agencies involved in information and cybersecurity.
3.2 INTRODUCTION
Digital India' and Make in India are two initiatives launched by the Government of India
recently. Digital India‘ aims to transform India into a digitally empowered society and
knowledge economy‘ whereas Make in India‘ is to facilitate investment, foster innovation,
enhance skill development, protect intellectual property and build best in class manufacturing
infrastructure‘. Cyber Security is integrated part of the Digital India program. In this unit we will
discuss some initiative in cyber security and various agencies involved for creating secure cyber
ecosystem in India, which is critical for success of the Digital Indiaprogram.
The objective of this policy is to create a secure cyber space ecosystem and strengthen the
regulatory framework and enhance adoption of IT in all sectors of the economy. A National and
Sectoral 24 X 7 mechanisms has been envisaged to deal with cyber threats through National
Critical Information Infrastructure Protection Centre (NCIIPC). The policy also aims to improve
visibility of the integrity of ICT products and services, to create a workforce of 500,000
professionals skilled in cyber security in the next 5 years. The policy directs to enable protection
oftransmitteddataandstoreddataandtoenableeffectiveprevention,investigation&prosecution of
cyber-crime and enhancement of law enforcement capabilities through appropriate legislative
intervention.
In the later sections, the strategy of the policy is discussed. The policy document aims at
176
encouraging all organizations whether public or private to designate a person to serve as Chief
Information Security Officer (CISO) who will be responsible for cyber security initiatives.
Organizations are required to develop their information security policies properly dovetailed into
their business plans and implement such polices as per international best practices. Provisions of
fiscal schemes and incentives have been incorporated in the policy to encourage entities to install
trustworthy ICT products and continuously upgrade information infrastructure with respect to
cyber security.
The policy directs to create an assurance framework, encourage open standards, strengthening
the regulatory framework, creating mechanisms for security threat early warning, vulnerability
management & response to security threats, securing E-Governance services, protection &
resilience of Critical Information Infrastructure. The policy also emphasizes on promoting
research & development in cybersecurity.
HighlyComplex
Distributed
Interconnected
Interdependent
The Types of threat to CII, the threat vectors andactors
We have several possible threats to CII that can be listed as Internal and External Threats.
a. InternalThreat-Itisdefinedas―Oneormoreindividualswiththeaccessand/orinside knowledge
of a company, organization, or enterprise that would allow them to exploit the
vulnerabilities of that entity‘s security, systems, services, products, or facilities with the
intent to cause harm‖. Insider betrayals cause losses due to IT sabotage, Fraud, and Theft
of Confidential or proprietary information. This may be intentional or due toignorance.
b. External Threat arise from outside of the organization by individuals, hackers,
organizations, terrorists , foreign Government agents, non-state actors and pose risk like
CripplingCII,Espionage,Cyber/Electronicwarfare,CyberTerrorismetc.Individuals,Disgrunt
led or ex-employee, Rivals (Industrial Espionage), Hackers, Script kiddies, Crackers, Hactivists,
CyberMercenaries, Terrorist groups (CyberJihadi)majority act as threat actors against the CII.
Malware Attacks, Email attachments, Smartphones, Removable media, Web, Social Engineering
Attacks, Social network, Wireless attacks, DOS/DDOS, Botnet are major threat vectors used to
177
exploit CII.
National Critical Information Infrastructure Protection Centre(NCIIPC)
Under Section 70A of IT act, NCIIPC, under National Technical Research Organization(NTRO),
is being declared as the nodal agency for the protection of Critical Information Infrastructure of
India. Gazette notification for NCIIPC under section 70A (1) is underway. NCIIPC under its
mandate from section 70A(2) of IT Act is responsible for all measures including R&D for
protection of Critical Information Infrastructure.
The mission of NCIIPC is‗To take all necessary measures to facilitate protection of Critical
Information Infrastructure from unauthorized access, modification, use, disclosure, disruption,
incapacitation or destruction through coherent coordination, synergy and raising information
Security awareness among all stakeholders‘. So the basic objective of the Centre Goverment is
to protect CII and create security awareness amongstakeholders.
The NCIIP follow a simple strategy to meet its mission that includes:
1. Introduction
2. Scope
3. Objective
4. Roles specified for implementation of thepolicy
5. Basic Requirements of GOI e-mailService
179
6. Responsibilities of userorganisations
7. Responsibilities of aUser
8. Service level agreement
9. Security of emails/ Release oflogs
10. Security incident managementprocess
11. Intellectual property
12. Enforcement
13. Deactivation
14. Exemption
15. Audit of E-mailservices
16. Review
As per Information Technology Amendment Act 2008, CERT-In has been designated to serve as
the national agency to perform the following functions in the area of cyber security.
180
Objectives
e-Government: Providing e-infrastructure for delivery ofe-services
e-Industry: Promotion of electronics hardware manufacturing and IT-ITESindustry
e-Innovation / R&D: Implementation of R&D Framework - Enabling creation of
Innovation/ R&D Infrastructure in emerging areas of ICT&E/Establishment of
mechanism for R&Dtranslation
e-Learning: Providing support for development of e-Skills and Knowledgenetwork
e-Security: Securing India‘s cyber space
e-Inclusion: Promoting the use of ICT for more inclusivegrowth
Internet Governance: Enhancing India‘s role in Global Platforms of InternetGovernance.
Cyber Security
Objectives and Targets- The following primary objectives had been identified in cyber security:
Securing cyberspace
Preventing cyberattacks
Reducing national vulnerability to cyber-attacks.
Minimizing damage and recovery time from cyberattacks
Capacitybuilding
As such, the cyber security initiatives had the following focus:
Enabling LegalFramework
Security Policy, Compliance andAssurance
SecurityR&D
Security Incident – Early Warning andResponse
National Cyber AlertSystem
CERT-In and SectoralCERTs
Information Exchange with International CERTs
Securitytraining
Skill & Competencedevelopment
Domain Specific training – Cyber Forensics, Network & System SecurityAdministration
Collaboration - International and National
Table 4: Memorandum Of Understanding (MoU) in cyber Security signed with various countries
181
1 US CERT-In and To promote closer cooperation and exchange of Information in the
US-CERT following areas : -
2 Korea CERT-In and To promote closer cooperation and exchange of information pertaining to
Internet Security Agency Cyber Security.
(KISA)
3 France Min. of Comm. & IT and To promote closer cooperation and facilitate exchange of information in IT
Ministry of Economy, sector in the following areas:
Finance, Industry of the a) Softwaredevelopment;
Govt. of the Republic of b) IT EnabledServices;
France c) Tele-medicine;
d) Cybereducation;
e) ElectronicCommerce;
f) ElectronicGovernance;
g) Information Security & CyberCrime;
h) HRD;
i) R&D;
j) Exploring third countrymarkets.
4 Malaysia GOI To promote and develop IT and services cooperation in the following
and areas:
Govt. of Malaysia a) Electronic commerce and multimediadevelopment;
b) Electronic government;
c) Information security and cybercrime;
5 Brazil Min. of Comm. & IT and To create bilateral Task Force to explore mutual cooperation in the
Ministry of Science and following areas:
Technology of the a) R&D of ITs;
Republic of Brazil b) Exploring Third CountryMarkets;
c) Electronic Commerce;
d) Electronic Government;
e) HRD through virtualeducation;
f) Information Security and CyberCrime;
g) BankingAutomation.
6 Columbia Min. of Comm. & IT To promote closer cooperation and to facilitate exchange of information in
and IT sector in the following areas:-
Minister for a) Design, development and research in the area ofInformation
Communications of Technology;
Govt. of Colombia b) Exploring third country markets;
c) ElectronicsCommerce;
d) ElectronicsGovernance;
e) ElectronicsHealth;
f) HRD through capacitybuilding;
g) Training inIT;
h) Cyber Security and Cybercrime;
Readers are advised to refer latest list of MoUs from Department of Electronics and IT website
(http://www.deity.gov.in)
182
3.4.3 Institute for Defense Studies and Analysis (IDSA)
The Institute for Defense Studies and Analyses (IDSA) is a non-partisan, autonomous body
dedicated to objective research and policy relevant studies on all aspects of defense & security.
Its mission is to promote National and International security through the generation and
dissemination of knowledge on defense and security-relatedissues.
Preamble
The Institute for Defense Studies and Analyses is a non-partisan, autonomous body dedicated to
objective research and policy relevant studies on all aspects of defense & security. To achieve its
goals, the Institute undertakes:
a. Scholarlyresearch;
b. Policy-orientedresearch;
c. Dissemination of researchfindings;
d. Training and capacity building;and
e. Publiceducation.
Mission Statement
To promote National and International security through the generation and dissemination of
knowledge on defense and security-related issues. IDSA has a well-qualified multi-disciplinary
research faculty drawn from academia, defense forces and the civil services, representing a
diversity of views. Research at the Institute is driven by a comprehensive agenda and by the need
to provide impartial analyses and policy recommendations. IDSA‘s journals, monographs, briefs,
and books are the principal mediums through which these analyses and policy recommendations
are disseminated. In addition, the news media also carry the views of IDSA experts in the form
of interviews and participation indebates.
Objectives
1. Make the Police functioning citizen friendly and more transparent by automatingthe
functioning of PoliceStations.
2. Improve delivery of citizen-centric services through effective usage ofICT.
3. Provide the Investigating Officers of the Civil Police with tools,
technologyand information to facilitate investigation of crime and detection
ofcriminals.
4. Improve Police functioning in various other areas such as Law and Order,Traffic
Managementetc.
5. Facilitate Interaction and sharing of Information among Police
Stations,Districts, State/UT headquarters and other PoliceAgencies.
6. Assist senior Police Officers in better management of PoliceForce.
7. Keep track of the progress of Cases, including inCourts.
8. Reduce manual and redundant Records keeping.
The system includes nationwide online tracking system by integrating more than 14,000 police
stations across the country. The project is implemented by NCRB. CCTNS aims to integrate all
184
the data and records of crime into a Core Application Software (CAS), which is presently
185
spreading across 29 states and 7 union territories of India. CAS was developed by the Bangalore
based IT firm, Wipro. It needs to integrate different software and platforms followed by different
states and to digitize records of those states which have not digitized their police records. The
project also involves training of police personnel and setting up of citizen portal to provide
services to citizens.
Objectives
To prepare an enabling IT environment policy framework guideline, architecture,
best practices for Police Forces throughout thecountry.
To promote knowledge based pro-active policing with the use of Information Technology
for improving internal efficiency, effectiveness and public servicedelivery.
To lead and coordinate development of IT products and build a National Resource Center
of IT solutions for PoliceOrganizations.
To create and maintain secure sharable National Database on crimes, criminals, property
and organized criminal gangs for law enforcement agencies and promote their use for
public servicedelivery.
To obtain, process and disseminate fingerprint records of criminals including foreign
criminals to establish their identity; promote automation of State Finger Print Bureau and
encourage research for the development of Finger PrintScience.
To provide training in IT and Finger Print Science for capacity building in Police Forces.
ACTIVITY:
187
3.7 ANSWERS TO CHECK YOUR PROGRESS
1. Indian Computer Emergency Response Team (CERT-In) is operational since January
2004. CERT-In has been designated under Section 70B of Information Technology
(Amendment) Act 2008 as a national nodal agency for countering cyber attacks.It act as
mother CERT for India. The constituency of CERT-In is the Indian Cyber Community.
CERT-In is the national nodal agency for responding to computer security incidents as
and when theyoccur.
2. Roles and function of CERT-In: As per Information Technology Amendment Act 2008,
CERT-In has been designated to serve as the national agency to perform the following
functions in the area of cybersecurity.
a. collection, analysis and dissemination of information on cyberincidents;
b. forecast and alerts of cyber securityincidents;
c. emergency measures for handling cyber securityincidents;
d. coordination of cyber incidents responseactivities;
e. issue guidelines, advisories, vulnerability notes and whitepapers relating to
information security practices, procedures, prevention, response and reporting of
cyberincidents;
f. such other functions relating to cyber security as may beprescribed.
3. Vision of Department of Electronics and IT is e-Development of India as the engine for
transition into a developed nation and an empoweredsociety.
4. National Crime Records Bureau.
5. National Critical Information Infrastructure ProtectionCentre.
8. What isNCIIPC.
188
Unit 4: Cyber Security Strategies and
Policies 4
Unit Structure
4.1 LEARNING OBJECTIVES
4.2 INTRODUCTION
4.3 GLOBAL CYBERSECURITY INDEX AND CYBERWELLNESS PROFILES
4.4 NATIONAL CYBER SECURITY POLICY- INDIA
4.5 NATIONAL CYBER SECURITY STRATEGIES AND POLICIES OF
VARIOUS NATIONS
4.6 SUMMARY
4.7 CHECK YOUR PROGRESS
4.8 MODEL QUESTIONS
189
4.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the Cyber security index and wellnessprofile.
Know cyber security policy ofIndia.
Know cyber security strategies and policies of variouscountries.
Understand the vision and role of government in securing cyberspace.
4.2 INTRODUCTION
Today due to increasing impact of Internet in day to day life of citizens and along with
increasing cyber threats to cyber space, Nations around the globe are preparing to defend interest
of country by means of National cyber security strategies and cyber security policies. This unit
will discuss cyber security strategies and policies of various countries including India and
highlight the importance of such framework at the National level. We will also discuss ITU
global cyber security index and cyber wellness profiles, which measures country's commitment
towards cybersecurity.
RANK 1 2 3 4 5 5
190
build a secure and resilient cyberspace for citizens, businesses and government.
The policy document begins with the preamble in which it defines the cyberspace and highlights
the importance of Information Technology in driving the economic growth of the nation. It also
discuss about the role of IT in making India an International player in providing IT solutions.
Later in the preamble the challenges faced in the cyber world are being discussed which can be
natural, technical, incidental or accidental and the data which is transmitted in the cyber space is
vulnerable to attacks by both nation-states and non-state actors. The policy gives an overview
that how effectively information, information systems and networks can be protected and what is
the government‘s approach and strategy to protect cyber space in thecountry.
The objective of this policy is to create a secure cyber space ecosystem and strengthen the
regulatory framework and enhance adoption of IT in all sectors of the economy. A National and
sectoral 24X7 mechanism has been envisaged to deal with cyber threats through National
Critical Information Infrastructure Protection Centre (NCIIPC). The policy also aims to improve
visibility of the integrity of ICT products and services, to create a workforce of 500,000
professionals skilled in cyber security in the next 5 years. The policy directs to enable protection
of transmitted data and the stored data and to enable effective prevention, investigation and
prosecution of cyber-crime and enhancement of law enforcement capabilities through
appropriate legislativeintervention.
In the later section, the strategy of the policy is discussed. The policy document aims at
encouraging all organizations whether public or private to designate a person to serve as Chief
Information Security Officer (CISO) who will be responsible for cyber security initiatives.
Organizations are required to develop their information security policies properly dovetailed into
their business plans and implement such polices as per international best practices. Provisions of
fiscal schemes and incentives have been incorporated in the policy to encourage entities to install
trustworthy ICT products and continuously upgrade information infrastructure with respect to
cyber security.
The policy directs to create an assurance framework, encourage open standards, strengthening
the regulatory framework, creating mechanisms for security threat early warning, vulnerability
management and response to security threats, securing E-Governance services, protection and
resilience of Critical Information Infrastructure. The policy also emphasizes on promoting
research and development in cybersecurity.
192
To develop bilateral and multilateral relationship in the area of cyber security
with other country. (Information sharing andcooperation)
Prioritized approach forimplementation.
Operationalization ofPolicy
194
national assets as necessary and appropriate.
e. Development: Building Prosperity andSecurity
According to the policy, The United States will continue to demonstrate our conviction
that the benefits of a connected world are universal.
Development Objective-The United States will facilitate cyber security capacity-building
abroad, bilaterally and through multilateral organizations, so that each country has the
means to protect its digital infrastructure, strengthen global net-works, and build closer
partnerships in the consensus for open, interoperable, secure, and reliable networks.
PolicyPriorities
The U.S. cyber security policy has certain priorities listed within which extend from areas like
economy, network protection, enforcement of law, advancement of military, promoting internet
governance, internet freedom and international development of cyberspace.
The main focus is on
f. Economy: Promoting International Standards and Innovative, OpenMarkets
For tradeenvironment
Protect intellectual property fromtheft
Ensure proper interoperability and promote use of secure technicalstandards.
g. Protecting our Networks: The focus is on enhancing security, reliability, and resiliencyto
Promote cyberspacecooperation
Reduce intrusions into and disruptions of U.S.networks
Ensure robust incident management, resiliency, and recovery capabilities for
informationinfrastructure
Improve the security of the high-tech supplychain
h. Law Enforcement: The focus is on extending collaboration and the rule of lawto
Participate fully in international cybercrime policydevelopment
Harmonize cybercrime laws internationally by expanding accession to the Budapest
convention
Focus cybercrime laws on combating illegal activities, not restricting access to the
Internet
Deny terrorists and other criminals the ability to exploit the Internet for operational
planning, financing, orattacks.
195
Prioritize openness and innovation on theInternet
Preserve global network security andstability
Promote and enhancemulti-stakeholders
k. International Development: Building Capacity. Security, and Prosperityto
Provide the unnecessary knowledge, training, and other resources to countries
seeking to build technical and cyber securitycapacity.
Continually develop and regularly share international cyber security bestpractices.
Enhance states‘ ability to fight cybercrime – including training for law enforcement,
forensic specialists, jurists, andlegislators.
Develop relationships with policymakers to enhance technical capacity building,
providing regular and ongoing contact with experts and their United States
Governmentcounterparts.
l. Internet Freedom: Supporting Fundamental Freedom and Privacyto
Support civil society actors in achieving reliable, secure, and safe platforms for
freedoms of expression andassociation.
Partners with civil society and NGOs to protect their Internet activity from
unlawful digitalintrusions.
Encourage international cooperation for effective commercial data privacyprotections.
Ensure the end-to-end interoperability of an Internet accessible toall.
MovingForward
m. The advantage of networked technology should not be given to few privileged and
developnations.
n. Dependence of Internet by common mass has crossed alllimits.
Strategy is a roadmap allowing the United States Government‘s departments and agencies to
better define and coordinate their role in our international cyberspace policy, to execute a
specific way forward, and to plan for future implementation. It is a call to the private sector, civil
society, and end-users to reinforce these efforts through partnership, awareness, and action. Most
importantly,itisaninvitationtootherstatesandpeoplestojoinusinrealizingthisvisionofprosperity,
security, and openness in our networked world. These ideals are central to preserving the
cyberspace we know, and to creating, together, the future we seek.
4.5.2 Canada
The Cyber Security policy is built upon three pillars.
1. Securing Government systems- The people of Canada expect the Government to protect
their personal information and provide service to them according to this pillar. The protection
of Cyber Sovereignty is also a priority. The Government will put in place the necessary
structures, tools and personnel to meet its obligations for cybersecurity.
2. Partnering to secure vital cyber systems outside the federal Government- This pillar
covers the cyber security of organisations other then the government ones as mentioned in
pillar 1. According to it the Government will support initiatives and take steps to strengthen
196
Canada‘s cyber resiliency, including that of its critical infrastructuresectors.
3. Helping Canadians to be secure online- This pillar talks about providing resources to law
enforcement agencies to protect citizens of Canada from any kind of online fraud. The
Government will assist Canadians in getting the information they need to protect themselves
and their familiesonline.
So, basically the Cyber Security Policy of Canada focuses on the security of Cyber Assets of
Canadian Government as well as private organisations. It also has protection of citizens in cyber
world as a priority, strengthening the ability of law enforcement agencies to combat cybercrimes
also a part of the policy. The main idea of the policy is:
―Canada‘s Cyber Security Strategy will strengthen our cyber systems and critical infrastructure
sectors, support economic growth and protect Canadians as they connect to each other and to the
world. We all have a role to play as we take full advantage of cyberspace to build a safe, resilient
and innovative Canada‖.
From the three pillars and the idea, it‘s quite clear that the policy focuses on Cyber Security of
Canada, Canadian Government, Organizations and Citizens however Canada will support efforts
to build the cyber security capacity of less developed states and foreign partners to the extent
possible. It is not a policy drafted for the sake of entire world. The policy though has taken lights
from the policies of US, Australia and UK.
The main characteristics of the policy are:
Reflects Canadian values such as the rule of law, accountability andprivacy;
Allows continual improvements to be made to meet emergingthreats;
Integrates activity across the Government ofCanada;
Emphasizes partnerships with Canadians, provinces, territories, business and academe;
and
Builds upon our close working relationships with ourallies.
The policy is to be implemented with cooperation from the organisations, society and
individuals. The policy hence demands a joint effort from the individuals, governments and non-
government organisation for proper implementation. Now the policy has specific initiatives for
every pillar, the role of each initiatives being the protection of the pillar from cyberthreats.
So the intent of government is clear to continually improve with evolving cyber world
and take all the necessary steps required for thesame.
198
is largely dependent on its employees. As countless incidents in all segments of society
have shown, even the most sophisticated security systems can be undermined by simple
human error. In Government, as elsewhere, people can fail to follow basic cyber security
practicesby:
Not changing their passwords on a regularbasis;
Assuming that an office email system is more secure than itis;
Importing malicious viruses into workplace computers by visiting corruptedwebsites.
Specific initiatives for Pillar 2- Partnering to secure vital cyber systems outsidethe
federalGovernment
Economy of a country is driven by business, it may be agriculture, industries etc. Here in
policy, several aspects to protect organizations other then the government ones as mentioned in
pillar 1.
1. Combating Cybercrimesby-
Equipping our police to protect us in cyberspace requires that we provide them with
199
new legislative authorities and supporting financialresources.
200
The Royal Canadian Mounted Police will be given the resources required to establish
a centralized Integrated Cyber Crime Fusion Centre. This team will increase the
ability of the Royal Canadian Mounted Police to respond, using a risk-based analysis
approach, to requests from the Canadian Cyber Incident Response Centre regarding
cyber-attacks against Government or Canada‘s criticalinfrastructure.
2. The cybercrime would be prosecutedby-
Making it a crime to use a computer system to sexually exploit achild;
Requiring Internet service providers to maintain intercept capable systems, so that
law enforcement agencies can execute judicially authorizedinterceptions;
Requiring Internet service providers to provide police with basic customer
identification data, as this information is essential to combating online crimes that
occur in real time, such as child sexual abuse; and increasing the assistance that
Canada provides to its treaty partners in fighting seriouscrimes.
3. Protecting Canadians Online- The best practices for every individual are listedbelow:
All need to follow basic cyber security practices, such as changing our passwords
frequently,updatingantivirusprotectionandusingonlyprotectedwirelessnetworks.
The Government will increase Canadians‘ awareness of common online crimes and
will promote safe cyber security practices through the use of web sites, creative
materials and outreachefforts.
4.5.3 Malaysia
The National Cyber Security Policy has been designed to facilitate Malaysia‘s move towards a
knowledge-based economy (K-economy). The Policy was formulated based on a National Cyber
Security Framework that comprises legislation and regulatory, technology, public-
privatecooperation, institutional, and international aspects. The National Cyber Security Policy
seeks to address the risks to the Critical National Information Infrastructure (CNII) which
comprises the networked information systems of ten critical sectors. The CNII sectors are:
The Policy recognizes the critical and highly interdependent nature of the CNII and aims to
201
develop and establish a comprehensive program and a series of frameworks that will ensure the
effectiveness of cyber security controls over vital assets. It has been developed to ensure that the
CNII are protected to a level that commensurate the risks faced. Eight policy thrusts are:
Implementation approach
The implementation of the policy is divided into 3 phases-
(i) National Cyber Security Policy Implementation: Defines, communicates and updates
(when necessary) the national cyber security programs to all theCNII.
(ii) National Coordination: Closely coordinates cyber security initiatives of variouskey
Agencies and organisations inMalaysia.
(iii)Outreach: Promote and facilities formal and informal mechanism for information
202
sharing across the CNII. This includes promoting cyber security awareness, training and
education programs to grow the competency of information security professionals and
the industry as awhole.
(iv) Compliance Monitoring: Facilities the monitoring of compliance to cyber security
policies and standards across the CNII.
(v) Risk Assessment: Assesses and identifies cyber security threats exploiting
vulnerabilities and risks across theCNII.
Establishment of the Malaysia cyber securitycentre
The Malaysia Cyber Security Centre is envisioned to become a one-stop coordination centre for
national cyber security initiatives by adopting a coordinated and focused approach, with the key
objective of strengthening the country‘s cyber security arena. The centre will be under the
purview of the Ministry of Science, Technology and Innovation (MOSTI), and overseen by the
National IT Council for policy direction and the National Security Council in times of national
crisis.
With such high Internet usage, cyber attacks are becoming more advanced and sophisticated and
this have given rise to an increasing and evolving global threat. Year 2010 has been marked by
some of the most high-profile, targeted attacks that the cyber industry has ever witnessed. With
such emerging cyber threats, government must play a key role in protecting its own systems and
critical infrastructure. The government must ensure help to provide a safe digital environment to
businesses and individuals to operate in. Government units have already started to tackle
problems such as scams, spam, identity theft, electronic crime and critical national infrastructure
protection. The New Zealand government provides support to NetSafe which is an independent
203
non-profit organisation, which works for cyber safety education and awareness programs in
schools. The government is also focusing on international security partners on cyber security
issues.
The common cyber security threats to New Zealanders are attackers who exploit vulnerabilities
in software, hardware and user behavior. Attackers take advantage of users who fail to follow
basic cyber security practices such as regularly changing their passwords, updating antivirus
software and using protected wireless networks. In a survey, it was foundthat:
54% of New Zealanders feel they know little or nothing at all about computer security risks
and solutions.
59% of New Zealanders do not secure their mobile phones, PDAs or smart phones by using,
and regularly changing, a password orPIN.
International data suggests 133,000 New Zealanders per annum are victims of identity fraud
(the majority of cases having a cyber-element), with around one third falling victim to
identity theft and two thirds falling victim to credit or bank cardfraud
Cyber criminals are highly using social networking sites to access user‘s personal
information (birth dates, phone numbers, employment details etc) to perform cyber-crimes.
• raise the cyber security awareness and understanding of individuals and smallbusinesses;
• improve the level of cyber security across government;and
• build strategic relationships to improve cyber security for critical national
infrastructure and otherbusinesses.
The Government has appointed the Ministry of Economic Development as the lead policy
agency responsible for coordinating cyber security policy and implementing thisStrategy.
204
establish a National Cyber Security Centre within the Government Communications Security
Bureau.
Key initiatives:
Establish a National Cyber Security Centre within the Government Communications
SecurityBureau.
Implement steps to improve cyber security practices in government agencies
3. Incident Response and Planning: Through the establishment of a National Cyber Security
Centre, the Government will build on New Zealand‘s existing cyber security capability to
plan for and respond to cyber incidents. The National Cyber Security Centre will absorb the
current functions of the Centre for Critical Infrastructure Protection (CCIP). The Government
will work with critical national infrastructure providers and other businesses to support them
to further develop their cyber security responses. This will include assessing the need for a
New Zealand Computer Emergency Response Team (CERT).
Keyinitiatives:
Establish a National Cyber Security Centre, which will absorb the functions of theCCIP.
Revise the Government‘s national cyber incident responseplan.
Expand work with industry, including critical national infrastructure providers
and businesses to support them to review their cyber securityresponses.
Longer-term initiatives:
• Work with interested parties to determine the need for a New ZealandCERT.
OtherInitiatives
Research and development is a key component in improving New Zealand‘s response to cyber
security threats. The Government will work with industry, academia, government agencies and
other relevant organisations to explore further opportunities to enhance New Zealand‘s cyber
security response.
Longer-term initiatives:
Work with educational and training institutions to determine an appropriate solution to
meet the need for cyber security professionals in NewZealand.
Work with international partners on initiatives to combat cyber crime and determine New
Zealand‘s alignment with the Council of Europe Convention onCybercrime.
At the end of this strategy, glossary of terms is given which defines the terms like Botnet, CERT,
Critical national infrastructure, cyber attack, cyber crime, etc.
4.5.5 Estonia
Today, Estonia is widely regarded as a leader in Information Technology in general, and cyber
security in particular. Estonia ranks fifth with cyber security index 0.706 according to Global
2014 results.
The Cyber Security Strategy 2014-2017 is the basic document for planning Estonia‘s cyber
security and a part of Estonia‘s broader security strategy. The strategy highlights important
205
recent developments, assesses threats to Estonia‘s cyber security and presents measures to
manage threats. Whole policy is divided into five parts; Analysis of current situation, principles
of ensuring cyber security, General objectives of the strategy for 2017, sub goals, and parties
related to thestrategy.
A cyber security council was added to the Security Committee of the Government of the
Republic in2009.
The Estonian Informatics Centre was given government agency status in 2010. The renamed
Estonian Information System Authority (Riigi Infosüsteemi Amet – hereinafter RIA)
received additional powers and resources for organizing protection of the state‘s information
and communication technology (hereinafter ICT) infrastructure, and exercising supervision
over the security of informationsystems.
In 2011, a CIIP commission was formed to promote public-privatecooperation.
The cybercrime investigation capabilities of the Police and Border Guard Board (hereinafter
PBGB) were consolidated into a single department in2012.
Estonian Defense League‘s Cyber Unit (hereinafter EDL CU) was created to improve the
security of Estonian state agencies‘ and companies‘ information systems through coordinated
exercises, testing of solutions, training, etc.. The EDL CU can also be engaged to support
civilian institutions and protect critical infrastructure in a crisissituation.
The Estonian government has always given very high importance to awareness and training
programs for cyber security. HITSA training is offered to pre-schoolers as well as older children,
while also involving parents and teachers in the process. A state-private partnership project was
launched in 2013 to raise the skills and security awareness of smart device users, developers and
vendors.
In 2014, TUT (Tallinn University of Technology), in cooperation with the Estonian Centre
2CENTRE, opened a Master‘s program in Digital Forensics. Estonia‘s 2CENTRE Cybercrime
Centre of Excellence is part of the European Union‘s network of 2CENTRE competency centers.
Cyber criminals are ill motivated and their increased development has become a critical issue.
Cyber security of a nation is affected by the actors operating in cyberspace with their various
skills, targets and motivations. It is often difficult to distinguish between the actors or determine
their relationship to national or international organizations. National defense and internal security
are dependent on the private sector‘s infrastructure and resources, while at the same time the
state can assist vital service providers and guarantors of national critical information
infrastructure as a coordinator and balancer of variousinterests.
There are various challenges faced by the Estonian government and they have identified that the
main cyber security risks arise from the extensive and growing dependence on ICT infrastructure
and e-services by the Estonian state, the economy and the population.
206
The Estonian state has no option for effectively supervising services or parts of services
which are provided outside of the Republic of Estonia. All vital services and their
dependencies must be mapped, alternatives must be developed and operational readiness to
implement them must beachieved.
Cybercrime undermines the functioning of the economic space, reduces trust in digital
services, and, in a worst-case scenario, could lead to incidents causing loss of life. Competent
personnel and modern technical tools are needed in order to ensure prevention, detection and
prosecuting ofcybercrime.
The state‘s civilian and military resources must be able to be integrated under the guidance of
civilian authorities and also interoperable with international partners. This is done to ensure
the ability to provide national defense incyberspace.
Constantly developing cyber security related know-how and to invest in technology will
prevent and decrease future securitythreats.
A modern legal framework must be ensured to provide complete solutions to the above
challenges as a supportingactivity.
1. Cyber security is an integral part of national security; it supports the functioning of the
state and society, the competitiveness of the economy andinnovation.
2. Cyber security is guaranteed by respecting fundamental rights and freedoms as well as by
protecting individual liberties, personal information, andidentity.
3. Cyber security is ensured on the basis of the principle of proportionality while taking into
account existing and potential risks andresources.
4. Cyber security is ensured in a coordinated manner through cooperation between the
public- private- and third sectors, taking into account the interconnectedness and
interdependence of existing infrastructure and services incyberspace.
5. Cyber security starts with individual responsibility for safe use of ICTtools.
6. A top priority in ensuring cyber security is anticipating as well as preventing potential
threats and responding effectively to threats thatmaterialize.
7. Cyber security is supported by intensive and internationally competitive research
and development.
8. Cyber security is ensured via international cooperation with allies and partners.
Through Cooperation, Estonia promotes global cyber security and enhances its
owncompetence.
208
(i) Subgoal 1: Ensuring the protection of information systems underlyingimportant
Services
Ensuring alternative solutions for importantservices
Managing cross-dependency between importantservices
Ensuring the security of ICT infrastructure andservices
Managing cyber threats to the public and privatesector
Introduction of a national monitoring system for cybersecurity
Ensuring digital continuity of thestate
Promotion of international cooperation in the protection of the infrastructure of
criticalinformation
(ii) Subgoal 2: Enhancing of the fight againstcybercrime
Enhancing detection ofcybercrime
Raising public awareness of cyberrisks
Promoting international cooperation against cybercrime
(iii)Subgoal 3: Development of national cyber defensecapabilities
Synchronizing military planning and preparation for civilemergencies
Developing collective cyber defense and internationalcollaboration
Developing military cyber defensecapabilities
Ensuring a high level of awareness concerning the role of cyber security in national
defense
(iv) Subgoal 4: Estonia manages evolving cyber securitythreats
Ensuring the next generation cyber securityprofessionals
Developing smart contracting for cyber securitysolutions
Supporting development of enterprises providing cyber security and national
cyber securitysolutions
Preventing security risks in newsolutions
(v) Subgoal 5: Estonia develops cross-sectoralactivities
Development of a legal framework to support cybersecurity
Promoting international cyber securitypolicy
Closer cooperation with allies andpartners
Enhancing the capability of the EuropeanUnion
Estonian government has given proper attention to the policy making and now taking care of the
implementation of the strategy. The Ministry of Economic Affairs and Communications directs
cyber security policy and coordinates the implementation of the strategy. The strategy will be
implemented by involving all ministries and government agencies, especially the Ministry of
Defense, the Information System Authority, the Ministry of Justice, Police and Border Guard
Board, the Government Office, the Ministry of Foreign Affairs, the Ministry of the Interior and
the Ministry of Education and Research. NGOs, business organizations, governments, and
educational institutions will cooperate in the implementation and assessment of the strategy.
209
4.6 SUMMARY
In this unit we discussed about the ITU Global Cyber security index and wellness profile. We
discussed India's National cyber security policy and finally had discussion on the cyber security
strategies and policies of the various countries. Due to the increasing threats from cyber space
nations are considering it important to develop national level cyber security strategies and policy.
These strategies and policy provides framework for actions to be taken for safe cyber space in
country.
Activity:
Activity 1: Go through latest global cybersecurity index & cyberwellness profiles from ITU
website.
Activity 2: Study national cyber security policy India available at www.deity.gov.in.
210
Block-4
211
Unit 1: Network Security Threats
1
Unit Structure
1.2. INTRODUCTION
212
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the network securityneed.
Understand the threatlandscape.
Understand the current threat scenario.
Know the different weaknesses of the computernetworks.
Understand the different attacks on computer networks.
Understand the emerging threats to networktechnologies.
Understand the impact of the different networkattacks.
1.2 INTRODUCTION
Organizations of all types and sizes which deals with information for meeting its objectives, faces a
range of risks that may affect the functioning of information assets. Computer Networks are used to
store, transfer and process information for meeting variety of objectives of the organization. Network
security is a technology and methods to protect confidentiality, integrity and availability of the network.
Network security involves all activities that organizations do to protect the value and ongoing usability
of assets and the integrity and continuity of operations. An effective network security strategy requires
identifying threats and then choosing the most effective set of tools to combat them. In this unit we are
going to discuss network attacks, threat landscape - current threats and emerging threats and possible
risks to computer networks associated with these threats. We will conclude unit with the attack case
study.
Man-in-the-Middle (MITM)Attack
Man-In-The-Middle (MITM) attack occurs when someone between user and the entity with whom user
are communicating is actively monitoring, capturing, and controlling the communication. For example,
the attacker can read the data exchanged or modify the capture data before forwarding. Figure 1 below
explains the MITM attack Victim was connected to the server by original connection which is then
somehow modified by attacker and connection is routed through the attacker system. Now attacker can
actively monitor, capture and control the network traffic between victim and server.
213
Figure 1: Man-In-The-Middle (MITM) attack
Replay Attack
Replay attack occurs when a message, or part of a message, is repeated to produce an malicious impact.
A replay attack is a form of network attack in which a valid data transmission is maliciously or
fraudulently repeated. This is carried out either by the originator or by attacker who intercepts the data
and retransmits it. For example a valid username & password combination packet of victim can be
replayed by attacker in order to authenticate itself.
Consider the following scenario to understand replay attack: (i) Suppose Alice wants to prove her
identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides. (ii)
Meanwhile, Eve was eavesdropping on the conversation and keeps the password.
(iii)Aftertheinterchangeisover,Eve(posingasAlice)connectstoBob;whenaskedforaproof of identity, Eve
sends Alice's password read from the last session, which Bob accepts thus granting access toEve.
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
Denial of Service (DoS) is an attempt to make a computer resource unavailable to its intended users. A
distributed denial of service attack (DDoS) occurs when multiple compromised computer systems flood
the communication link (called bandwidth) or resources of a targeted system. DDoS attacks are
generally launched through a Botnet which is a network of compromised computer systems called
‗Bots‘. NTP based Distributed Reflected Denial of Service (DrDoS) Attacks are new techniques of
conducting DDoS attacks on the target.
Denial-of-service (or DoS) attacks are usually launched to make a particular service unavailable to
someone who is authorized to use it. These attacks may be launched using one single computer or many
computers across the world. In the latter scenario, the attack is known as adistributed denial of service
attack. The attack is initiated by sending excessive demands to the victim‘sresources,exceeding the limit
that the victim‘s infrastructurecansupport.PingofDeath,SYN attacks, UDP flooding are some methods of
conducting DoS/DDoS attacks. A Ping of Death attack involves a very large Internet Control Messaging
Protocol (ICMP) packet and the receiving computer gets it in the form of data packets. Reassembled
packetat the target cause buffer overflow due to improper routine for handling large size of
data.Theimpactcauseservice crash and henceDoS.
In SYN flooding attack implementation of three-way handshake of the TCP/IP protocol is
exploited.Inthree-wayhandshake(1)firsttheclientsendsaSYNpackettotheserver,(2)server
thenrespondswithaSYN-ACK.(3)thentheclientrespondstothisSYN-ACKandhandshakeis completed and
214
data transfer starts. In SYN flood attack the attacker does not respond to the SYN-ACK. Server keep up
waiting for attacker response and in this manner sending multiple syn request to the server consume
resources of the server causing DoS/DDoS attack. There are three means of achieving theDoS/DDoS:
Consumption of resources like server computing capacity, bandwidth of network,etc.
Exploitation of vulnerability to crash theservice.
Destruction or alteration of configuration information of thesystem.
physical destruction or alteration of information processing assets.
Attacks on password based authentication include eavesdropping, password stealing, brute force and
dictionary attack. Objective of these attacks are to get the valid password of system. When attacker finds
a valid user account, the attacker has the same rights as the real user. So, if the compromised account has
administrator-level rights, the attacker will have same rights.
Brute-force password attack involves trying every password combination until the correct
passwordisfound.Duetothenumberofpossiblecombinationsofletters, numbers andsymbols, a brute force
attackmay take a long time tocomplete.
Dictionary based password attacks are method of breaking into a password-protected resource by
systematically entering every word in a dictionary as a password. Dictionary is prepared by the attacker
based on the knowledge and information of resources and itsenvironment.
Spoofing
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP)
packets with a forged source IP address, with the purpose of concealing the identity of the sender or
impersonating another computing system. Similar concept applies to Media Access Control (MAC)
address spoofing or hardware address spoofing. Most networks and operating systems use the IP address
215
of a computer to identify a valid entity. An attacker can use packet craftingtooltoconstruct
IPpacketsthatappeartooriginatefromothersource.InMACspoofing factory-assigned Media Access Control
(MAC) address of a network interface on a networked device is modified to hide identity of the device
or to impersonate another device. There are packet crafting and other similar tools available, which can
be used for IP spoofing or MAC spoofing.
Eavesdropping
In cases, where communication on computer networks happen in unsecured or cleartext format
allowsanattackertoreadthetraffic.Whenanattackeriseavesdroppingoncommunications,itis
referredtoassniffingorsnooping.Withoutstrongencryptionservicesdatacanbereadbyothers
asittraversesthenetwork.Attackermayfocusonreadingthesecretinformationlikepasswords, keys or
financial details like credit card information on vulnerablenetwork.
Installation of malicious programs - Backdoor orrooting
A backdoor or rooting is a malicious means of access to a network that bypasses security mechanisms in
place. An insider may install a backdoor so that he can access the network remotely. Attackers also often
use backdoors that they as part of an exploit. Backdoor provide complete control of the system to the
attacker that to in many cases remotely. Using backdoor attacker can access the resources remotely.
Many computer worms, such as Sobig and Mydoom, install a backdoor on the affected computer. Such
backdoors appear to be installed so that spammers can send junk e-mail from the infected machines.
DDoSAttacks
A large scale Domain Name Server (DNS) and Network Time Protocol (NTP) based Distributed
Reflection Denial of Service (DrDoS) attacks were reported onto reputed ecommerce, banking and
public/private sector websites all over the world. The Domain Name System (DNS) is a hierarchical
distributed naming system for computers, services, or any resource connected to the Internet or a private
216
network. It associates various information with domain names assigned to each of the participating
entities. DNS translates domain names, which can be easily memorized by humans, to the numerical IP
addresses needed for the purpose of computer services and
devicesworldwide.AttackersareusingtechniqueknownasDNSamplificationattacktoconduct DdoS on
target. Network Time Protocol (NTP) is a networking protocol used for clock synchronization, server
administration, maintenance, and monitoring. Certain NTP implementations that use default unrestricted
query configuration are susceptible to a reflected denial-of-service (DrDoS) attack. In a reflected denial-
of-service attack, the attacker spoofs the source address of attack traffic, replacing the source address
with the target's address. These
attackswerebeingcarriedoutbyexploitingvulnerabilityinthe―monlist‖featureofNTPwhich allows
unauthenticated remote attackers to misuse the vulnerable NTP servers to carryout large scale reflected
denial of service (DrDoS) attacks. NTP servers that respond to MONLIST Mode 7 command requests
will generate responses that are more than 5000 times bigger in size than the requests. With the help of
IP address spoofing this attack allows the attacker to send a huge number of requests toward a number of
known public NTP servers and solicit a huge response toward the spoofed address of the (source)victim.
TOR- OnionRouting
Tor is an implementation of the concept of onion routing, where a number of nodes located on the
Internet that serve as relays for Internet traffic. TOR client in user system would contact a Tor directory
server, where it gets a list of nodes. The user‘s Tor client would select a path for the network traffic via
the various Tor nodes to the destination server. Attackers are making use of TOR for hiding their track
of malicious activities. TOR help attacker to conduct the attack while remaining anonymous posing
challenge for law enforcement and other investigation agencies. Malwares are also making use of TOR
networks to hide their communications to the master server.
Web applicationattacks
The website of organization is its primary mass communication medium enabled through cyber space.
Websites are favorite targets for cyber criminals and a hacked website is used in several ways to cause
disruption of services and damage of reputation. The number of websites is increasing at rapid rate and
proportionately the web intrusions and defacements are also rising. In most of web intrusions, the
vulnerabilities being exploited at the application level are relatively high compared to those in other
layers of network. Unsecured coding , Mis- configurations make the web applications vulnerable to
various types of attacks such as SQL Injection, Cross site scripting (XSS), Malicious file upload, Abuse
of the functionality etc.
217
TargetedAttacks
Target attacks are on rise.Recently new category of targeted attack watering hole attack is discovered.
Watering hole is an attack vector using the technique of determining surfing habits of target
persons/organizations and compromising the same and hosting exploits of client side application to
compromise systems of potential visitors.
If the payloads happened to be backdoor, attackers can perform spying and monitoring the activities of
the target organization. Because an attacker was able to infiltrate a targeted organization‘s network, they
can also initiate attacks that are harmful to the organization‘s operations, which include modifying or
deleting files with crucial information. Recently observed Operation Snowman was leveraging zero day
vulnerability in IE (CVE-2014-0322), attacker after compromising a target (watering hole) website
added an iframe into the website‘s HTML code which redirect user browser to the exploit code.
Exploit PackToolkit
An exploit pack is a toolkit that facilitates the automation of client-side vulnerability exploitation. The
modus operandi normally revolves around targeting browsers and programs that a website can invoke
through the browser.
The exploit kits typically conceals client side software vulnerabilities in Adobe reader, java, Adobe flash
Player, Media Players, browsers etc. Some of the notable noted exploit packs are WhiteLotus,
InCognito, Magnitude / Death Touch , Sakura , Whitehole, Blackhole, Phoenix, Redkit, etc.
Ransomware
A Malware type, that restricts access to PC and files/resource until being paid to decrypt the files. The
ransom ware generally encrypts personal files/folders. Files are deleted once they are encrypted and
generally there is a text file in the same folder as the now-inaccessible files with instructions for
payment. CryptoLocker is a file encryptor that recently reported with large infections. On the other hand,
WinLocker variants- 'Locks' the screen (presents a full screen image that blocks all other windows) and
demands payment.
Attacks targeting Industrial Control SystemsNetworks
Attackers are targeting Industrial Control Systems Network. Stuxnet malware is one of the most
complex threats analyzed so far. It is a large, complex piece of malware with many different components
and functionalities. It was primarily written to target industrial control systems or set of similar systems.
Its final goal is to reprogram industrial control systems (ICS) by modifying code on programmable logic
controllers (PLCs) to make them work in a manner the attacker intended and to hide those changes from
the operator of the equipment. It is the first to exploit 4 zero-day vulnerabilities, compromise two digital
certificates, and inject code into industrial control systems and hide the code from the operator. Stuxnet
is of such great complexity—requiring significant resources to develop—that few attackers will be
capable of producing a similar threat, unless backed by sources with clear ulterior motives.
Anothermalwarecalled―Duqu‖ wasreportedthathassomeportionsofcodeof―Stuxnet‖.This malware was
delivered to specific targeted organizations in Industrial sector through spear phishing and exploitation
of zero-day vulnerability in parsing of certain fonts by MS Word. The malware gathers information
about Industrial engineering and control systems, though does not disrupt their functionality. This threat
is perceived as a pre-cursor to more destructive malware that can affect Industrial Control Systems.
Nitro, another malware was observed primarily targeting chemical sector. These attacks used emails
convincing target users to open password protected zip files (pretending to be software updates)
218
followed by installation of Remote Administration Tools (RATs) on infected system. These RATs
facilitate attackers to access the target system and steal business critical data. Flame malware shares
many characteristics with cyber weapons Stuxnet and Duqu which specifically targets certain sectors. It
is basically a backdoor with worm like features allowing it to spread in local network and removable
devices. Flame is capable of performing several complex operations including network traffic sniffing,
Scanningnetworkresources,collectinglistsofvulnerablepasswords,capturingscreen,capturing
video,recordingaudio,capturingkeystrokes,scanningdiskforspecificfileextension&content,and
information stealing. If Bluetooth is available, it could collect information about discoverable devices in
range of infected system.
Social Network Sites (SNS)Threats
Hacktivist, Scammers and malware creators target this massive and committed user based with diverse
and steadily growing attacks. Social networking site data are useful for the attackers. Attackers are
abusing social media data for various malicious activities such as identity theft, fake social accounts,
fake news, misinformation, command & control for botnets, drive-by- download etc. Additionally series
of malware attacks creates pandemonium on the SNS sites such as My Webcam Thingy (Twitter),
FireFoxed (click jacking intrusions), Dislike Scam(Facebook), Over The rainbow(Twitter).
Threats to Mobile Devices and Mobile Communication
Usage of mobile phones is exponentially rising globally as well as in the country. It is predicted
thatsignificantamountofmobilephoneswillbereplacedbysmartphoneswhichhavealmostall features of
typical desktop computer systems. In most of the organizations, business processes are spreading to
mobile devices and tablets. As such, security of data residing on mobile devices is gaining importance
from user and organizational perspective. Malicious methods/techniques are migrating to the mobile
computing. There need to be change in organizations protection strategy due to introduction of mobile
computing. Adversaries are focusing on discovering new vulnerabilities in mobileecosystem.Recent
malware trend indicates that malware targeting operating systems used in mobile devices such as
Android, Symbian, Apple iOS etc. Some of the mobile malware distribution methods are: Automated
App repackaging, Browser Attacks, Visiting 3rd party app stores, Mal- Advertising, Clicking on a
shortened URL (e.g. bitly link) in an SMS message or on a social networking site. Due to the high
prevalence of Android enabled mobile devices, they tend to become primary target.Mobile counterparts
for the banking Trojans were came into existence on major platforms such as Zitmo (Zeus in the
mobile), Spitmo (Spyeye in the mobile), carberp etc. The android malware families prevalent were
Opfake, Android Kungfu, Plangton, FakeInst, SMSreg, GAMEX, RootSmart, Lotoor capable of
performing premium based texting / subscribe the user to expensive services, install backdoors, exfiltrate
confidential data, reading and intercepting SMS‘es and send it to remote servers and wait for the
command from cybercriminals and effectively becoming part of botnets. Generally mobile malware are
interested in: MITM and snoops sensitive information, Send location coordinates (fine location), Send
device identifiers (IMEI and IMSI), Download and prompt the user to install/unistall an app and
Enumerate and send a list of installed apps to the server. A myriad number of andoid exploit were found,
capable of rooting the devices and taking completely control of the infected devices. Some ofthe
vulnerabilities reported were: KillingintheNameof, RageAgainstTheCage(RATC), Exploid
and Zimperlich.
219
Mobile Botnet that targets mobile devices such as smartphones, attempting to gain complete access to
the device and its contents as well as providing control to the botnet creator. Mobile botnets take
advantage of un-patched exploits to provide hackers with root permissions over thecompromised mobile
device, enabling hackers to send e-mail or text messages, make phone calls, access contacts and photos,
and more. Most mobile botnets go undetected and are able to spread by sending copies of themselves
from compromised devices to other devices via text messages or e-mail messages. Some of the known
botnet families were: Android Bmaster, SpamSoldier, Tigerbot, Geinimi etc.
Threats to ClientSystem
Thesecurityrisksandchallengesmostusersfaceonadailybasisarefromtheproductstypically found on end
point PCs and related vulnerabilities. The variety and prevalence of programmes found on typical end
point PCs, coupled with unpredictable usage patterns of users, make end point PCs an attractive attack
vector for cyber criminals. Vulnerabilities on end point PCs are commonly exploited when the user of
the vulnerable computer visits a malicious site, or opens data, files or documents with one of the
numerous programmes and plug-ins installed on the PCs. The endpoints PCs contain most valuable data
but continue to be least protective.Complexityof security patching on the end point PC is the biggest
contributor for the infections. This issue is complicated by the fact that barring few vendors, most of the
software product vendors do not imply easy to use and effective security patch updating mechanism,
neglecting the end point PC and leaving the issue of updating to the enduser.
The best ways to reduce the risks that people are exposed to by using software and the Internet would
certainly be by reducing the number of vulnerabilities and the window of opportunity to exploit
vulnerabilities. Two major steps towards this goal are: (1) Increasing general awareness
amongtheusersontheriskofthirdpartyprogramsand(2)Adoptingunifiedpatchingtechniques to reduce the
complexity of patching end point systems, as a security patch in time provides better security by
eliminating the rootcause.
Attacks on Certifying Authorities - TrustInfrastructure
Trust infrastructure components such as Digital certificates and cryptographic keys are used at various
levels of cyber space ranging from products, applications and networks.
Trust infrastructures are extremely important for information security as they build the basis for securing
information at many levels; and help authenticating partners or systems by establishing trusted
interactions. With the introduction of electronic identity systems for the identification of people, trust
infrastructures play a significant role in the overall internet transactions. Compromise of infrastructure of
Certifying authority or key management systems of product/application owners may result in breakdown
of trust of users and misuse of
authenticationmechanisms.Recenttrendindicatesthatadversariesaretargetinginfrastructureof Certifying
Authorities and authentication mechanism to steal sensitive key related information that facilitates
creation of Rogue Certificates. Sophisticate malware such as Stuxnet and Duqu used stole certificates to
create fake drivers to thwart detection by security systems. Implementations of trust functions and
security of associated infrastructure need to be reviewed regularly. Providers of App stores will need to
pay special attention to implementation of trust and security functions in order to avoid serious impact
on the user trust. In the emerging areaofcloud computing, cryptographic functions and corresponding
key material will need to be better protected.
220
Emerging Threats
Emerging threats targeting Industrial Control Systems (ICS)
Different vulnerabilities were reported in ICS systems and devices. Trends indicate that focus of
adversariesisonfindingnewvulnerabilitiesandcreatingexploitsforthesame.Further,attempts to scan and
probe the SCADA systems are also reported in the wild. Future hold great degree of cyber threats to the
Industrial Control Systems (ICS).This emphasizes the need for conducting comprehensive risk
assessment for the critical infrastructure and devise appropriate controls to isolate critical systems for
general businessnetworks.
Emerging Threats to cloud computingenvironment
Cloudcomputingistheuseofcomputingresources(hardwareandsoftware)thataredeliveredas
aserviceoveranetwork(typicallytheInternet).Organizationsusethecloudcomputingfacilities through virtual
resources allotted tothem.
Primary models of Cloud services are as follows:
Infrastructure as a service(IaaS)
Platform as a service(PaaS)
Software as a service(SaaS)
Network as a service(NaaS)
Storage as a service(STaaS)
Security as a service(SECaaS)
221
have access to a network, system or data. The service provider's Policy, procedures, physical
access to systems, monitoring of employeesandcompliancerelated issue
shouldbemadetransparenttothecustomer.
As the Cloud computing gains wider adoption due to the benefits, the focus of adversaries to exploit the
vulnerabilities in the same is also rising. The concentration of large amount ofdata in a connected logical
location makes cloud infrastructure a favorite target for the cyber criminals. The integration of cloud
service on mobile devices increased the attack and risk surface. Cloud computing services provide both
business and technical benefits. Risk assessments help organizations identify, manage and reduce risk
associated with cloud computing. Risk assessment able organization to achieve the benefits
ofcloudatthelowestlevel ofrisk.
Prominently perceived threats to cloud computing are:
Application levelattacks
Malware andBotnets
Drive-by-download attacks
Data breaches by internal or external threat agents affecting multipleusers
Denial of Serviceattacks
Targeted attacks using cloud infrastructure for Command &Control
Attacks on the virtual systems performing security jobs such asencryption
Attacks on Insecure interfaces and authentication system
222
Malware andBotnet
Data breach & Informationdisclosure
Phishing &Spam
Denial ofService
IdentityTheft
Targeted attacks
223
Figure 4: Symbol of operation payback
This possesses challenge of tracking attacker location for law enforcement and other organizations who
might like to identify repeat protestors.
TOR - Onion Routing is used by anonymous to keep attacking devices anonymous. The Onion
Router was first developed by
theU.S.NavalResearchLaboratoryasameanstokeepInternettrafficanonymous.Itwasmade available to the
public and now ensures secure Internet access and communications for anyone. TOR service works by
utilizing a number of pre-designated Tor routing nodes around the world. Internet traffic is made up of
data packets and routing headers. The routing headers contain information on the source of the request,
the destination, the size of the packets, etc. By using traffic analysis, one‘s origin can be tracked by
examining the headers. Tor helps to reduce the risks of both simple and sophisticated traffic analysis by
distributing transactions over several places on the Internet, so no single point can link you to original
source. Instead of taking a direct route from source to destination, data packets on the Tor network take a
random pathway through several relays that cover tracks so no observer at any single point can tell
where the data came from or where it's going. By installing the Tor client software on device and using
the service exclusively for all transactions, anonymity can be maintained. The Tor software will obtain a
list of current Tor nodes around the world when logged into theservice.
Flooding Tools
Reportedly LOIC and HOIC are used by group for conducting DDoS attack; in some cases modified
versions of these tools are used.
i. LowOrbitIonCannon(LOIC):LOICperformsadenial-of-service(DoS)attack(or when used by
multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP
packets with the intention of disrupting the service of a
particularhost.PeoplehaveusedLOICtojoinvoluntarybotnetsinanonymousDDoS attacks. The
LOIC allows someone who has zero technical ability to participate in collective attacks. LOIC is
point and click tool, which with just click on button, point
the―cannon‖ataparticularURLorIPaddress,andthesoftwaredoestherestjobof flooding thetarget.
ii.
217
Figure 5: Low Orbit Ion Cannon
iii. HighOrbitIonCannon(HOIC):isanopensourcenetworkstresstestinganddenial- of-service attack
application written in BASIC designed to attack as many as 256 URLs at the same time. HOIC
is tool for launching HTTP POST and GET requests at a targeted server. According to the
documentation, it can be used to open up 256 attack sessions simultaneously either targeting a
single server, or going after multiple targets. The user can control the number of threads used
perattack.
iv.
LET US SUM UP
In this unit we discussed common attacks on the networks, current threat landscape and
emergingthreatstonewtechnologies.Threatlandscapeisdynamicandchangesregularlyasnew
vulnerabilitiesandexploitsarediscovered.Itisadvisedtostudenttokeeplearningasnewthreats and
vulnerabilities emerge to keep themselves updated. It is utmost important to understand
attackandthreatlandscapetobetterprotectthenetwork. Inremainingunits ofthisblockwewill be discussing
securing the network against threats andattacks.
Activities:
Activity 1: Explore and write note on five network attacks, other than listed in this section. Activity 2:
218
write note on spoofing and password attacks with examples.
Activity 3: Write brief on some recent attacks on computer network reported in news. Activity 4:
Prepare a write-up on security issues in cloud computing.
Activity 5: Prepare case study on cyber attack on Estonia.
MODEL QUESTIONS
1. Write a short note networksecurity.
2. Discuss Current threat landscape.
3. Discuss emerging threats to Cloud computing and Internet ofThings.
4. Discuss five common attacks possible on computer networks withexample.
5. What is MITM attack, discuss impact ofMITM.
6. Write note on DoS/DDoS attack.
7. Discuss SYN flooding and UDP flooding.
8. Discuss tools and communication methods used by hackergroups.
9. ―Websiteasavectorforpropagatingmalware,discuss.
10. Discuss possible attacks on Internet trustinfrastructure.
219
Unit 2: Network Security
Technologies 2
Unit Structure
1.2. INTRODUCTION
1.3. FIREWALL
220
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the network securitytechnology.
Understand the concept and requirement of firewall.
Understand the application of Intrusion Detection and Prevention System(IDPS).
Know impact of the different network attacks. Andhoneypot.
Understand importance of logmanagement.
Know Security Information and Event Management(SIEM).
1.2 INTRODUCTION
Network security is a technology and methods to protect confidentiality, integrity and availability of the
network. Network security technology refers to the technological safeguards and managerial procedure
which can ensure that organizational assets and individual privacy are protected over the network.
Network security is needed to secure the data and protect the network from attacks. In this unit we are
going to discuss technological methods to secure the network, sometimes also referred as perimeter
security devices. We will discuss firewall,
IntrusionDetectionandPreventionSystem(IDPS),SecurityInformationandEventManagement
(SIEM),Honeypots.
1.3 FIREWALL
A firewall refers to a network system (hardware or software) which blocks certain kinds of network
traffic, forming a barrier between a trusted and un-trusted network. It is analogous to a physical firewall
in the sense that firewall security attempts to block the spread of computer attacks. Firewall allows or
blocks the network traffic between devices based on the set of rules, by the administrator. Each rule
defines a specific traffic pattern and the action to be taken, when the pattern is detected.
.
Figure8:FirewallinaComputer
221
A firewall can only operate on the traffic that physically passes through it. It has no impact on the traffic
between the devices on the same side of the firewall.hen an organization is connected
tointernetwithoutfirewall(asshowninFigure8),theexposuretoattackiscalledthe―zoneof risk. Every host on
the internet is accessible and can attack every host on the private network.
As an analogy we can say that job of networking firewall is similar to a physical firewall that keeps a
fire from spreading from one area to the next. A firewall is actually a device or program that blocks
undesired Internet traffic, including known viruses, from accessing protected computers. Firewalls make
it possible to filter incoming and outgoing traffic that flows through the network. The rules of a firewall
inspect one or more characteristics of the packets, including but not limited to the protocol type, the
source or destination host address and the source or destination port. Based on the set rule firewall take
action on the packet such as forward the packet, drop the packet, etc. By default firewall should drop all
packets, if it is not specially allowed in ruleset.
Table 1: Example rule for firewall
Rule states that, it is rule no 3 in access list of firewall, it is applicable to outbound traffic,traffic with
source IP 192.168.4.10, destination IP address 192.168.4.25 and destination port 80 is allowed through
the firewall.
Firewalls can greatly enhance the security of a host or a network. They can be used to do one or more of
the followingthings:
To protect and insulate the applications, services and machines of internal network from unwanted
222
traffic coming in from the publicInternet.
To limit or disable access from hosts of the internal network to services of the public Internet.
To support network address translation (NAT), which allows internal network to use private
IP addresses and share a single connection to the publicInternet.
In packet filtering, protocol and address information in each packet is considered, this type of filtering
pays no attention to the existing stream of packets. Instead, it filters depending on
examiningincomingoroutgoingpackets,itallowsordenythepackets,relyingontheacceptance policy in the
configuration rules. Packet filtering firewall operates at the IP layer of the protocol stack. Traffic is
filtered in this layer, based on the characteristics including source address, destination address and port
numbers. Filtering policies rely completely on allowing or disallowing the IP address, Port orProtocol.
Application LayerFirewall
These firewall understand and work on layer 7 of OSI i.e; application layer of the network stack.
Application firewall inspect the payload of the IP packet that contains a TCP/UDP segment within which
it inspects the application layer data.
NAT Firewalls
Network Address Translation (NAT) is method to translate the current IP address to a new IP address at
the firewall, to represent the packet receiver that as though it were coming from a single IP address. This
prevents the attacker to know the original IP addresses in the network. The NAT creates a table in
memory that holds all these information of translation Firewalls and connections. The ability of mapping
the entire network behind a single ip is based on the port number assigned by NAT firewall.
Example of the NAT IP address:
Source IP Source Port NATIP NAT port Destination IP DestinationPort
192.168.0.1 3144 172.28.230.553144 10.100.100.4480
223
Here, when a packet is originated from source IP (192.168.4.10), NAT changes the source IP address to
192.168.4.40 in each packet and forwarded to destination IP. The destination IP can never trace the
original source IP address.
Circuit LevelFirewall
Circuit level filtering works at the session layer of OSI model. Traffic to the remote compute is made as
though the traffic is originated from a circuit level firewall. This modification will partially allow to hide
the information about the protected network but has a drawback that it does not filter individual packets
in a given connection.
2.3.1.4 Stateless and Statefull Firewall
Statefull filtering are the most modern approach of firewall, it combines the capabilities of NAT
firewalls, circuit level firewalls and application firewalls into a common system. This approach
validatesconnectionbeforeallowingdatatobetransferred.Thesefirewallsfilterstrafficinitially with packet
characteristics and rules and also includes the session validation check to make sure that the specific
session isallowed.
Stateless firewalls watch the traffic packet by packet and filter them based on Firewalls individual rules.
Each packet is individually checked and filtered. They do not attempt to
correlatethepacketsthatcamebeforeandthenjudgeifthereisamalicious potential or intention.However,it is
necessary to watch as set of packets between a source and a destination to infer any malicious intent.
Statefull firewalls can watch traffic streams from end to end.Theyareawareofcommunicationpaths.
Thisimpliesthatthefirewallcanidentifyflows.A flow table that provides the source and destination IP
addresses is built dynamically in the firewall. The firewall then monitors packets pertaining to each flow
in both directions and applies filteringrules.
Firewall Types - Based ondeployment
Based on the place of deployment, there are two main types of firewalls: network firewalls and host-
based firewalls. Network firewalls are deployed at network perimeter while host based firewalls are
deployed at host system.
NetworkFirewalls
Network firewalls protect an entire network by guarding the perimeter of that network. Network
firewalls forward traffic to and from computers on an internal network and filter that traffic based on the
criteria the administrator has set. Network firewalls come in two flavors: hardware firewalls and
software firewalls. Network firewalls such as from CISCO, Juniper, etc. Firewall System, protect the
perimeter of a network by watching traffic that enters and leaves. Linux box can also be converted into
the firewall using the IP tables.
224
Figure 9: Network Based Firewall2
Host-Based Firewalls
Host-based firewalls are usually software firewalls installed on each individual system. Depending on
the software user choose, a host-based firewall can offer features beyond those of network firewalls,
such as protecting computer from malware infection and data leakage. Today generally all Operating
systems have inbuilt software features that user can enable to act as host based firewall. Apart from
inbuilt firewall features third party firewall software (In both categories open source and commercial)
like zoneAlarm, personal firewall, softwall etc. are available
To Do
Activity 1: Enable inbuilt firewall on your system and understand the
rules.
Activity 2: Write a rule to block access to google.com, test the rule and
clean the rule after activity is done.
Activity 3: Download and setup any third party open source firewall in
your system.
225
1.4 INTRUSION DETECTION AND PREVENTION SYSTEM
An Intrusion Detection and Prevention system (IDPS) is a device or software application that monitors
network or system activities for malicious activities or policy violations and react produces reports to a
management station, prevention component of IDPS react based on the incident/event and try to thwart
the intrusion attempt. Intrusion detection is the process of monitoring the events occurring in a computer
system or network and analyzing them for signs of possible incidents, which are violations or imminent
threats of violation of computer security policies, acceptable use policies, or standard security practices.
Intrusion prevention is the process of performing intrusion detection and attempting to stop detected
possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on
identifying possible incidents, logging information about them, attempting to stop them, and reporting
them to security administrators.
There are many reasons that make Intrusion Detection and Prevention System important component of
the network. One important reason is to have the capability to detect attacks against network devices.
These devices include our routers, switches, hubs, servers, and workstations. By utilizing effective
analysis processes administrator have the capability to stopa hacker dead in their tracks. Intrusion
detection systems allow detecting ahead of time a potential attack. Most if not all organizations who are
connected to the Internet accept that people will attempt to explore and possibly attack their networks.
For this reason organizations deploy network security devices such as filtering routers and firewalls.
Intrusion detection allows authorities or administrator to see who is attempting to penetrate network, and
also allows to measure the security effectiveness of network connected devices. Some literature discuss
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) as the different
technologies,you should understand here that IPSorIDPSin prevention mode is device which is
configured to react to the events and if device is simply monitoring and detecting but there is no reaction
the mode or application is called IDS or detectionmode.
IDPS systems may enable reactive component that allows the owner of the system to set a desired
reaction to an event. Below is a list of possible actions that can be taken by the system.
Reconfigure firewall: Configure the firewall to filter out the IP address of theintruder.
NT Event: Send an event to the WinNT event log.
Syslog: Send an event to the UNIX syslog eventsystem.
Send e-mail: Send e-mail to an administrator to notify of theattack.
Page: Page (using normal pagers) the systemadministrator.
Execute attack handling program: Launch a separate program to handle the event/incident.
IDPS – DetectionTechnologies
Intrusion Detection and Prevention system (IDPS) uses different technologies to detect intrusion. In
following paragraphs we will be discussing different methods used by IDPS for detection and prevention
fromintrusion.
Signature BasedDetection
Signature based detection involves searching network traffic for a series of bytes or packet sequences
226
known to be malicious (signature). A signature is a pattern that corresponds to a known threat.
Signature-based detection is the process of comparing signatures against observed events to identify
possible incidents. Signature-based detection is very effective at detecting known threats but largely
ineffective at detecting previously unknown threats or zero day exploits, threats disguised by the use of
evasion techniques, and many variants of known threats. They also lack the ability to remember previous
requests when processing the current request. This limitation prevents signature-based detection methods
from detecting attacks that comprise multiple events if none of the events contains a clear indication of
an attack. Signature based detection work similarly as virus scanner which search for virus infected files
based on the signature in its database. One of the challenges with signature based detection is to keep it
updated with new threat signatures.
Anomaly-BasedDetection
The anomaly detection techniques adopt the concept of a baseline for network behavior. This baseline is
a description of accepted network behavior, which is learned or specified by the network administrators,
or both. Anomaly-based detection is the process of comparing definitions of what activity is considered
normal against observed events to identify significant deviations. An IDPS using anomaly-based
detection has profiles that represent the normal behavior of such things as users, hosts, network
connections or websites. The profiles are developed by monitoring the characteristics of typical activity
over a period of time known as learning.The IDPS the nuses statistical methods to compare the
characteristics of currentactivity to thresholds related to the profile, such as detecting when mail server
activity comprises significantly more bandwidth than expected and alerting an administrator of the
anomaly. The major benefit of anomaly-based detection methods is that they can be very effective at
detecting previously unknown threats. However, drawback of this technique of detection is that
anomaly- based IDPS products often produce many false positives because of benign activity that
deviates significantly from profiles, especially in more diverse or dynamicenvironments.
Stateful ProtocolAnalysis
This method identifies deviations of protocol states by comparing observed events with predetermined
profiles of generally accepted definitions of benign activity. Unlike anomaly- based detection, which
uses host or network-specific profiles, stateful protocol analysis relies on vendor-developed universal
profiles that specify how particular protocols should and should not be used. IDPS with Stateful Protocol
Analysis is capable of understanding and tracking the state of network, transport, and application
protocols that have a notion of state. Stateful protocol analysis methods use protocol models, which are
typically based primarily on protocolstandardsfrom software vendors and standards bodies like Internet
Engineering Task Force [IETF]. The protocol models also typically take into account variances in each
protocol‘s implementation. The primary drawback to stateful protocol analysis methods is that they are
very resource- intensive because of the complexity of the analysis and the overhead involved in
performing state tracking for many simultaneous sessions. Another serious problem is that stateful
protocol analysis methods cannot detect attacks that do not violate the characteristics of generally
acceptable protocol behavior.
IDPS usually implement more than one above mentioned technique to detect and respond to the attempt
of intrusion.
227
Types of Intrusion Detection and Prevention system (IDPS)
IDPS can be classified into following four types.
Network Based Intrusion Detection and Prevention Systems(NBIDPS)
Network Based Intrusion Detection and Prevention Systems (NBIDPS) is a network security/threat
detection and prevention technology that examines network traffic flows to detect and prevent attacks on
network. Vulnerability exploits usually come in the form of malicious inputs to a target application or
service that attackers use to interrupt and gain control of network resource. The NIPS monitors the
network for malicious activity or suspicious traffic by analyzing the traffic activity. NBIDPS can be
placed either only in detection mode (NBIDS) and prevention mode (inline) (NBIPS) in the network
segment to be monitored. Figures below display placement of NBIDPS sensors placement in detection
and preventionmode.
230
actions or departures from normal operation. NBA solutions watch what's happening inside the network,
aggregating data from many points to support offline analysis also. After establishing a benchmark for
normal traffic, the NBA program passively monitors network activity and flags unknown, new or
unusual patterns that might indicate the presence of a threat. The program can also monitor and record
trends in bandwidth and protocol use. Network behavior analysis is particularly good for detecting new
malwares and zero day exploits.
Before understanding the SIEM we must understand the concept of log and Log Management.
Operating systems, devices and applications all generate logs of some sort that contain system-specific
events and notifications. The logs can provide valuable information about the happening in network,logs
are important specially from security point of view.In order to drive value from logs it must be enabled in
resources, transported and stored for the analysis. Log Management is an approach to deal with large
volumes of computer-generated logs messages. Log management typically consist process of log
collection, centralized aggregation,log retention,log analysis and reporting. However there are several
challenges with the effectiveness of traditional log management solutions and it was difficult for the
analyst to have complete security picture through log management solutions. SIEM is termed coined by
Mark Nicolett and Amrit Williams of Gartner to describes the product capabilities of gathering analyzing
and presenting information from network and security devices, database and application logs , threat data,
identity and access management applications, vulnerability & patch management solution, operating
systems and policy compliance toolsdeployed.
SIEMproductshaveoneormorelogserversthatperformloganalysis, and one or more database servers that
store the logs. Most SIEM products support two ways of collecting logs from log generators (example
operating systems, applicationserver):
a. Agent-Based Logcollection:An agent or client program is installed on the log generating host to
perform event filtering and aggregation and log normalization for a particular type of log, then
transmit the normalized log data to an SIEM server, usually on a real-time or near-real-time basis
for analysis and storage. A generic agent is used primarily to get log data from a source for which a
format-specific agent and an agentless method are not available. Some products also allow
administrators to create custom agents to handle unsupported logsources.
b. Agentless log collection: The SIEM server receives data from the individual log generating hosts
without needing to have any special software installed on those hosts. Some servers pull logs from
the hosts, which is usually done by having the server authenticate to each host and retrieve its logs
regularly. In other cases, the hosts push their logs to the server, which usually involves each host
authenticating to the server and transferring its logs regularly. Regardless of whether the logs are
pushed or pulled, the server then performs event filtering and aggregation and log normalization
and analysis on the collected logs.
There are advantages and disadvantages to each method. The primary advantage of the agentless
approach is that agents do not need to be installed, configured, and maintained on each logging host. The
primary disadvantage is the lack of filtering and aggregation at the individual host level, which can cause
231
significantly larger amounts of data to be transferred over networks and increasetheamountoftimeittakes
to filter and analyze the logs.Another potential disadvantage of the agentless method, is that the SIEM
server may need credentials for authenticating to each logging host.
SIEM server analyzes the data from all the different log sources, correlates events among the log entries,
identifies and prioritize significant events, and initiates responses to events if desired.
SIEM products usually include several features such as incident tracking mechanism, Graphical user
interfaces (GUI) for analysis of log, report generation, knowledgebase of threats and others. SIEM
products typically provide many of the features required for log management but add event-reduction,
alerting and real-time analysis capabilities. They provide the layer of technology that gives the
confidence that not only are logs being gathered but they are also being reviewed.SIEM also allows for
the importation of data that isn't necessarilyevent-drivensuchas vulnerability scanning reports and output
of the compliancetools.
1.6 HONEYPOT
A honeypot is a system which is designed to entice intruders to probe, attack and compromise the
system, while their motives, moves and techniques are being monitored and studied, all without the
intruders knowledge in other words it is as a closely monitored computing resource
thatweintendtobeprobed,attacked,orcompromisedbyadversaries.Thevalueofahoneypotis determined by
the information that we can obtain from it. Monitoring the data that enters and leaves a honeypot lets us
gather information.Honeypotscandetectvulnerabilitiesthatarenotyet discovered, it also help in understand
attacker's methods. Because a honeypot has no production value, any attempt to contact it issuspicious.
Based on the depth of interaction honeypot provides to the attacker, honeypots are classified in
following two categories 1) high-interaction honeypot and 2) low-interaction honeypot. A high-
interaction honeypot simulates all aspects of an operating system while a low-interaction honeypot
simulates only some parts.
a. High-Interaction Honeypots: A high-interaction honeypot can be
compromised completely, allowing an adversary to gain full
access to the system and use it to launch further networkattacks.
b. Low-Interaction Honeypots: Low-interaction honeypots simulate
only services that cannot be exploited to get complete access to
the honeypot. Low-interaction honeypots are more limited, but
they are useful to gather information at a higherlevel.
Honeypot systems are also classified as physical and virtual based on the way it is deployed as a
physical hardware or in virtual environment. A physical honeypot is a real machine on the network with
its own IP address. A virtual honeypot is simulated machine that responds to network traffic sent to the
virtual honeypot. Physical honeypots are often high-interaction, so allowing the system to be
compromised completely, they are expensive to install and maintain. For large address spaces, it is
impractical or impossible to deploy a physical honeypot for each IP address. In that case, we need to
deploy virtual honeypots.
232
Based on the usage of honeypot are classified as 1) production and 2) research. The purpose of a
production honeypot is to help mitigate security risks in an organization by detecting and dealing with
the intruders. Research honeypot is to gain information of the intruders’ methods and unknown
vulnerabilities. Research honeypot provide counter intelligence data for the security community.
Value of Honeypot in Prevention, Detection and reactive activities: Honeypot can contribute in useful
manner in prevention, detection and reactive activities of the organisation.
Prevention:Honeypotsarenotdesignedtopreventintruder‘sattacks.Howeverdeception, a honeypot by-
product, which works by luring intruders away from real production systems, may sometimes
provide some degree ofprevention.
Detection: Honeypots can complement intrusion detection capabilities of the
organisation,itevenhelp organizationstounderstandthemethodsofattackersanddetect unknown
vulnerabilities/zero-day vulnerabilities. Since, honeypots detect intrusion by monitoring activities,
instead of relying on an attack signature database it provides valuable information for undiscovered
exploits.
Reactive activities: Honeypots can help incident response team to analyze the security incident and
control the impact of the attack by applying appropriate controls on productionenvironment.
HoneypotUtilities:This section discuss some of the honey potutilities.you can download and
experiment with them, for furthering exploringhoneypot.
Honeyd: this OpenSource honeypot offers a mid-high level of interaction, by constantly monitoring
un-assigned and un-used IP addresses, and through ARP spoofing, it assumes IP address of the
victim, and interacts with intruders through emulated services; this is a
verypowerfultoolbecauseitcanemulatemorethan400differentoperatingsystems,and assume
thousands of IP addresses simultaneously, it can also emulate operating systems at either the
application or network stack level, which means both would behave like the emulated operating
system if intruders run nmap on thehoneypot.
BackOfficer Friendly (BOF): this OpenSource honeypot offers a low level ofinteraction; it
emulates basic services (like http, ftp, telnet, mail etc.), logs intrusion attempts, and fakes replies,
but there is not much else the intruder cando.
Honey stick is a portable honey net demonstration and incident response tool-an complete os
platform,geniiihoneywall and one or more honeypots on a single boot a bleusb stick.
Honeynet: this OpenSource honeypot project offers the high level of interaction, it is essentially a
network of real production systems, where there is absolutely no emulation, as one can imagine,
great deal of care has to be taken not to let one compromised honeypot launch attacks to the others,
and that is why it is mostly used in research environments.
To Do
Activity 4: Install and configure Snort - Intrusion Prevention system in
your system.
Activity 5: Install and interact with Honeyd in your system.
2.Network Address Translation (NAT) is a way to map an entire network (or networks) to a single IP
address. NAT is necessary when the number of IP addresses assigned to you by your Internet Service
Provider is less than the total number of computers that you wish to provide Internet access for.
3.Security information and event management (SIEM) is a term for software products and services
combining security information management (SIM) and security event management (SEM). SIEM
technology provides real-time analysis of security alerts generated by network hardware and
applications. Students may explore further about its implementation and how it works.
4. Network Behavior Analysis (NBA) is approach of detecting intrusion attempt, anomalies, advanced
threats and undesirable behavior which is based on continuous evaluation and analysis of network traffic
statistics.
234
6.A honeypot is a system which is designed to entice intruders to probe, attack and compromisethe
system,while their motives, moves and techniques are being monitored and studied, all without the
intruders knowledge in other words it is as a closely monitored computing resource that we intend to be
probed, attacked, or compromised by adversaries. Based on operations honeypots can be of two types
high-Interaction Honeypots and low-Interaction Honeypots. A high-interaction honeypot simulates all
aspects of an system while a low-interaction honeypot simulates only some parts. A high-interaction
honeypot can be compromised completely, allowing an adversary to gain full access to the system and
use it to launch further network attacks, however low-interaction honeypots simulateonly services that
cannot be exploited to get complete access to the honeypot. Low-interaction honeypots are limited, but
they are useful to gather information at a higherlevel.
235
Unit 3: Network Security – Controls
and Best Practices 3
Unit Structure
1.2. INTRODUCTION
236
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Know the network security best practices.
Understand the network security controls.
Understand design of securenetwork.
Know the critical security controls for cyberdefense.
1.2 INTRODUCTION
In previous units i.e unit I and unit II, you studied about network threats and network security
technologies,this unit focus on network security best practices and security controls.Thecontent of this
unit is divided into two main parts first we will discuss network infrastructure security best practices
followed by critical security controls for cyber defense. Critical Security Controls (CSC) is a prioritized
list designed to provide maximum benefits toward improving risk posture against real-world threats.
This unit is derived from the industry best practices as provided in documents and framework of CISCO,
SANS, IEEE andMitre.
237
In following paragraphs we will discuss and understand best practices for network infrastructure
security. Students are advised to refer to CISCO SAFE reference guide for the details.
Secure the Network Infrastructure Edge
Network Infrastructure edge like the Internet edge which provides connectivity to the Internet and that
acts as the gateway for the organisation to the rest of the cyberspace and WAN edge of infrastructure
provides geographically remote users with access to the organization network and services are important
to consider when designing secure network infrastructure. At the edge, data usually flow from one trust
zone to another trust zone, which exposes networktothethreats also failure of network infrastructure edge
can impact availability of the network. The availability and overall security of the infrastructure edge is
the key for business continuity. Following are good practices to secure the network infrastructureedge:
1. Isolate and Encrypt WAN Traffic: Segment organization WAN traffic from other traffic on the
WAN to enable the confidentiality and integrity of data. This may be achieved through a dedicated
point-to-point link, a corporate managed VPN, a client- originated VPN or a service provider-
managed MPLS service. If data loss and data manipulation are possible threat on WAN traffic, data
in-transit over the WAN may be encrypted.
2. Authenticate WAN Access: Access to the organization WAN should include strong authentication
mechanism to prevent unauthorized access to the network and data.
3. Threat Detection and Mitigation: Intrusion prevention and network telemetry to identify and
mitigate threats. IPS based global correlation, reputation-based filtering, botnet and malware
blockingsolutions.
4. Edge Protection: Traffic filtering, routing security, firewall integration, and IP spoofing protection
to discard anomalous traffic flows, prevent unauthorized access and block illegitimatetraffic.
5. Network Foundation Protection: Device hardening, control and management plane protection
throughout the entire infrastructure to maximize availability and resiliency.
6. SecureMobility:Always-onVPN protection for PC-based and smartphone mobile users. Persistent
and consistent policy enforcement independent of user location. Enforcement of Client Firewall
Policies. Optimal gateway selection to ensure best connectivity. Integration with web security and
malware threat defense systems deployed at the enterprisepremises.
7. Enhanced Availability and Resiliency: Hardened devices and high-availability design to ensure
optimal service availability. Design leverages redundant systems, stateful failover, and
topologicalredundancy.
Protect Infrastructure Device Access
It is critical to secure the access to the network infrastructure devices like router, firewall, and switch es
to protect the network infrastructure. Uncontrolled or unmanaged access to theinfrastructure devices can
lead to serious network security compromise and operational glitches. Following are some important
points to be kept in mind:
1. Restrict device accessibility: Limit the accessible ports and restrict the permitted communicators
238
and the permitted methods ofaccess.
2. Present legal notification: Display legal notice developed in conjunction with company legal
counsel for interactive sessions.
3. Authenticate access: Ensure access is only granted to authenticated users, groups, and services.
4. Authorize actions: Restrict the actions and views permitted by any particular user, group,
orservice.
5. Ensure the confidentiality of data: Protect locally stored sensitive data from viewing and
copying. Consider the vulnerability of data in transit over a communication channel to sniffing,
session hijacking, and man-in-the-middle (MITM) attacks.
6. Log and account for all access: Record who accessed the device, what occurred, and when for
auditingpurposes.
7. Password Protection: Passwords should generally be maintained and controlled by a centralized
Authentication, Authorization and Accounting (AAA) server.
Routing infrastructure Security
Routing is one of the most important parts of the infrastructure that keeps a network running, and as
such, it is absolutely critical to take the necessary measures to secure it. There are different ways routing
can be compromised, from the injection of illegitimate updates to DoS specially designed to disrupt
routing. Attacks may target the router devices, the peering sessions, and/or the routinginformation.
1. Restrict routing protocol membership: Limit routing sessions to trusted peers, validates origin,
and integrity of routing updates. Many dynamic routing protocols, particularly interior gateway
protocols, implement automatic peer discovery mechanisms that facilitate the deployment and
setup of routers. By default, these mechanisms operate under the assumption that all peers are to be
trusted, making it possible to establish peering sessions from bogus routers and to inject false
routing data. It is required to enable features designed to restrict routing sessions to trusted peers
and that help validate the origin and integrity of routing updates.
2. Control route propagation: Enforce route filters to ensure only valid routing information is
propagated. Control routing information exchange between routing peers and between
redistributing processes. Route filtering is important tool to secure the routing infrastructure. Most
routing protocols allow the configuration of route filters that prevent specific routes from being
propagated throughout the network. In terms of security, these filters are useful because they help
ensure that only legitimate networks areadvertised;and networks that are not supposed to be
propagated are never advertised.
3. Log status changes: Log the status changes of adjacency or neighbor sessions. Frequent neighbor
status changes (up or down) and resets are common symptoms of networkconnectivity and network
stability problems that should be investigated. These symptoms may also indicate ongoing attacks
against the routing infrastructure. Logging the status changes of neighbor sessions is a good
practice that helps identify such problems and that facilitates troubleshooting. In most routing
239
protocols, status change message logging is enabled by default. When enabled, every time a router
session goes down, up, or experiences a reset, the router generates a log message. If syslog is
enabled, the message is forwarded to the syslog server; otherwise is kept in the router's internal
buffer.
Network Device Resiliency and Survivability
Network devices may be subject to attacks designed to affect the network availability. Possible attacks
include Distributed DoS, DoS , flood attacks, reconnaissance and unauthorized access. Following are the
recommended for preserving the resiliency and survivability of network:
1. Disable unnecessary services and ports: Devices are having list of services turned on in default
installation. Services and port not required by the environment must be disable to reduce the
attacksurface.
2. Implement Infrastructure protection Access Control List (ACLs): Infrastructure ACLs
(iACLs) are designed to explicitly permit authorized control and management traffic bound to the
infrastructure equipment such as routers and switches, while denying any other traffic directed to
the infrastructure address space. ACLs shields the network infrastructure from internal and
externalattacks.
3. Port security consideration-Access based on MAC address: attacker can mount
attackssuchasDoSattackagainstinfrastructuredevicesbyusingMACfloodingtocause MAC address
table exhaustion. This type of attack can be addressed with a feature calledPort Security. Port
Security helps mitigate attacks by restricting the MAC addresses that are allowed to send traffic on
a particular port. Once Port Security is enabled on a port, only packets with a permitted source
MAC address are allowed to passthrough the port.
4. Redundancy to survive the failure or overloading of the device: Networks are built out of
numerous hardware and software components that may fail or that may be subject to attacks.
Implementing redundant designs helps eliminate single points-of-failure, improving the availability
of the network and making it more resistant to attacks. Different ways of implementing redundancy
varies from deploying simple backup interfaces up to building complete redundanttopologies.
Monitoring, Analysis andCorrelation
Monitoring of the network events, central correlation and analysis capabilities, troubleshooting and
identifying security incidents and threats in the network is vital part of the network infrastructure
security. It is critical to have visibility and awareness into what is occurring on the network at any given
time. Collecting, trending, and correlating logging, flow, and event information help identify the
presence of security threats, compromises, and data leak. Network telemetry offers extensive and useful
detection capabilities that can be coupled with dedicated analysis systems to collect, trend, and correlate
observed activity.
Monitoring, Analysis and correlation solution helps in:
identify the presence of security threats, compromises, and dataleak
240
Confirm securitycompromises
Reduce falsepositives
Reduce volume of eventinformation
Determinetheseverityofanincident
Reduce incident responsetimes
241
Network policy enforcement is primarily concerned with ensuring that traffic entering a network
conforms to the network policy, including the IP address range and traffic types. Anomalous packets
should be discarded as close to the edge of the network as possible, thereby minimizing the risk of
exposure. Key steps to implementing baseline network policy enforcement are:
1. Access Edge Filtering: Network Security Baseline is focused on securing the network
infrastructure itself, the control and management planes. Access edge filtering in this context is
implemented to enforce policy on what traffic is permitted to be directed towards the network
infrastructure devicesthemselves.
2. IP Spoofing Protection: Spoofing protection involves discarding traffic that has an invalid source
address. Network security baseline includes source IP spoofing protection based on RFC 2827
ingress traffic filtering. Packets with spoofed source IP addresses represent a security risk as they
are often used to conduct an attack, in order to evade traceability and bypass accesscontrols.
242
deployed to protect network infrastructure. It is recommended to have
following capabilities and features in selected threat control and
containment solution.
Endpoints Security
Network endpoints are defined as any systems that connect to the network and communicate with other
entities over the network infrastructure such as servers, desktop computers, laptops, printers, handheld
devices and IP phones. The vulnerability of any particular endpoint can impact the security and
availability of an entire enterprise. Common threats to these endpoints include malware, adware,
spyware, viruses, worms, botnets, and E-Mail spam. Thus, endpoint security is a critical element of an
integrated, defense-in-depth approach to protecting both clients and servers themselves and the network
to which they connect. The first step in properly securing the endpoints requires end-user awareness and
the adoption of the appropriate technical controls like antimalware software, Host based firewall, Host-
based IPS/IDS, Patch and update policy enforcement.
1. Secure WAN/Internet Connectivity: Data confidentiality and integrity through a rangeof VPN
options and PKI for strong, scalable authentication.
2. Granular Access Control: Extranet edge firewall and filtering rules should provide granular
access control to necessary resources of the network to the third-party site.
243
1.4 CRITICAL SECURITYCONTROLS
Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security
risks to information systems. Controls help to reduce the risk of damage or loss by stopping, deterring,
or slowing down an attack against an information asset. The Council on CyberSecurity is
an independent, expert, not-for-profit organization with a global scope committed to the security of an
open Internet. The Council is committed to the ongoing development, support, and adoption of the
Critical Controls for effective cyber defence; to elevating the competencies of the cyber security work
force;and to the development of policies that lead to measurable improvements in our ability to operate
safely, securely and reliably in cyberspace. (for more information visithttp://www.cisecurity.org/)
The SANS20 Critical Security Controls (CSC) is a prioritized list designed to provide maximum benefits
toward improving risk posture against real-world threats. This list of 20 control areas grew out of an
international consortium of U.S and international agencies and experts, sharing from actual incidents and
helping to keep it current against evolving global cyber security threats. Additionally, the SANS Top 20
CSC are mapped to NIST controls. Objective of prioritizing controls is to select the controls that would
have the greatest impact in improving risk posture of organizations against real-worldthreats.
It is recommended that organizations should examine all twenty control areas against their
currentstatusanddevelopanorganization-specificplantoimplementthecontrols.Organizations
withlimitedinformation securityprogramsmaychoosetoaddress certainaspectsofthecontrols in order to
make rapid progress and to build momentum within their information security program.
In following paragraphs, we will discuss 20 critical security controls in brief, for the details of why
control is important, how to implement and how to measure effectiveness of the control students should
explore SANS 20 critical security controls listed in SANS website at http://www.sans.org. Students are
further advised to visit SANS (http://www.sans.org) and Center for Information Security
(http://www.cisecurity.org/) website for updated list of controls to explore and understand new critical
security controls as it is updated and modified as per the threat perception and other related parameters.
244
6. Application SoftwareSecurity
7. Wireless AccessControl
8. Data RecoveryCapability
9. Security Skills Assessment and Appropriate Training to FillGaps
10. Secure Configurations for Network Devices such as Firewalls, Routers, andSwitches
11. Limitation and Control of Network Ports, Protocols, and Services
12. Controlled Use of AdministrativePrivileges
13. BoundaryDefense
14. Maintenance, Monitoring, and Analysis of AuditLogs
15. Controlled Access Based on the Need to Know
16. Account Monitoring andControl
17. DataProtection
18. Incident Response andManagement
19. Secure NetworkEngineering
20. Penetration Tests and Red TeamExercises
245
been released by the software vendor. Those that do not enforce white lists of authorized
applications make their systems more vulnerable. Such machines are more likely to be running
software that is unneeded for business purposes, introducing security flaws. Furthermore, machines
without white lists of authorized applications provide an easier target for attackers to exploit to run
their own unauthorized software. Once a single machine is exploited, the attackers use it as a
staging point for collecting sensitive information from the compromised system and from other
systems connected to it. In addition, compromised machines are used as a launching point for
movement throughout the network and partnering networks. Organizations that do not have
complete software inventories are unable to find systems running software likely to have been
compromised by exploits, because they do not know which systems are running what software.
3. Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices,
Laptops, Workstations, and Servers: On both the Internet and internal networks that attackers
have already compromised, automated computer attack programs constantly search target networks
looking for systems that were configured with vulnerable software installed the way that it was
delivered from manufacturers and resellers, thereby being immediately vulnerable to exploitation.
Attackers attempt to exploit both network-accessible services and browsing client software using
such techniques. The two possible defenses against these automated exploits are to ask every
computerusertoreconfiguresystemstobemoresecurelyconfiguredortobuyandinstall computer and
network components with the secure configurations already implemented and to update these
configurations on a regular basis. Despite a majority of organisations that still use the former
approach, only the latter approach (i.e., updating configurations on a regular basis)is
effective.Establishing and monitoring secure configurations provide the motivation to the
organisation to ensure systems are purchased with secure configurations bakedin.
4. Critical Control 4: Continuous Vulnerability Assessment and Remediation: Soon after new
vulnerabilities are discovered and reported by security researchers or vendors, attackers develop
exploit code and then launch that code against targets of interest. Any significant delays in finding
or fixing software with critical vulnerabilities provides ample opportunity for persistent attackers to
break through, gaining control over the vulnerable machines and getting access to the sensitive data
they contain. Attackers take advantage of the fact that network devices may become less securely
configuredover Time as users demand exceptions for specific and temporary business needs, the
exceptions are deployed, and those exceptions are not undone when the business need is no longer
applicable. Making matters worse, in some cases, the security risk of the exception is never
properly analyzed, nor is this risk measured against the associated business need. Attackers search
for electronic holes in firewalls, routers, and switches and use those to penetrate defenses. Attackers have
exploited flaws in these network devices to redirect traffic on a network (to a malicious system
masquerading as a trusted system), and to intercept and alter information while in transmission. Through
such actions, the attacker gains access to sensitive data, alters important information, or even uses one
compromised machine to pose as another trusted system on the network.
246
5. Critical Control 5: Malware Defenses: Tens of thousands of viruses and other malicious code are
circulating on the Internet either in email attachments or downloaded from web sites or through
other means of delivery. Malicious software is an integral and dangerous aspect of Internet threats,
and can be designed to attack systems, devices and data. Modern malware can be designed to avoid
defenses, detection, or to attack or disabledefense.
6. Critical Control 6: Application Software Security: Attacks against vulnerabilities in
applications have been a top priority for criminal organizations since 2005. In that year the
attackers focused on exploiting vulnerabilities in ubiquitous products such as anti- virus tools and
back-up systems. These attacks continue with new vulnerabilities in security products and in back-
up tools being discovered and exploited each week. Many more web and non-web application
attacks are emerging. On average more than 70 new vulnerabilities are found every week in
commercial applications - and many more are waiting to be found (or have already been exploited
without public recognition) in custom applications written by programmers for individual sites in
government, commercial, and privateenterprises.
7. Critical Control 7: Wireless Access Control: One of the largest data thefts in history was
initiated by an attacker sitting in a car in a parking lot and breaking through the organization's
security perimeter by connecting wirelessly to an access point inside the organization. Other
wireless devices accompanying travelling officials are being infected every day through remote
exploitation during air travel or in a cyber cafe. Such exploited systems are then being used as back
doors when they are reconnected to the network of a target organization. Still other organizations
have reported the discovery of unauthorized wireless access points discovered on their network,
planted and sometimes hidden for unrestricted access to an internal network. Because they do not
require direct physical connections, wireless devices are a convenient attackvector.
8. Critical Control 8: Data Recovery Capability: When attackers compromise machines, they often
make significant changes to configurations and software. Sometimes attackers also make subtle
alterations of data stored on compromised machines, potentially jeopardizing organizational
effectiveness with polluted information. When theattackers' presence is discovered, organizations
without a trustworthy data recovery capability can have extreme difficulty removing all aspects of the
attacker's presence on the machine.
9. Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps: The
skills of four groups of people are constantly being tested byattackers:
End users are fooled into opening attachments and loading software from untrusted sites,
visiting web sites where they are infected andmore.
System administrators are also fooled like normal users but are also tested when unauthorized
accounts are set up on their systems, when unauthorized equipment is attached, when large
amounts of data areexfiltrated.
Security operators and analysts are tested with new and innovative attacks with sophisticated
247
privilege escalation, with redirection and other attacks along with a continuous stream of
more traditionalattacks.
Application programmers are tested by criminals who find and exploit the vulnerabilities they
leave in theircode.
It is tempting to think of cyber defense primarily as a technical challenge, but the actions of people
also play a critical part in the success or failure of an enterprise. People fulfill important functions
at every stage of system design, implementation, operation, use, and oversight. Examples include:
the actions of end users (who can fall prey to social engineering schemes such as phishing); IT
operations (who may not recognize the security implications of IT artifacts and logs); security
analysts (who struggle to keep up with an explosion of new information); system developers and
programmers (who don't understand the opportunity to resolve root cause vulnerabilities early in
the system life- cycle); and executives and system owners (who struggle to quantify the role that
cybersecurity plays in overall operational/mission risk, and have no reasonable way to make
relevant investment decisions). Attackers are very conscious of these issues and use them to plan
their exploitationsby, for example: carefully crafting phishing messagesthat look like routine and
expected traffic to an unwary user; exploiting the gaps or seams between policy and technology
(e.g., policies that have no technical enforcement); working within the time window of patching or
log review; using nominally non- security-critical systems as jump points or bots.
No cyber defense approach can begin to address cyber risk without a means to address this
fundamental vulnerability. Conversely, empowering people with good cyber defense habits can
significantly increase readiness.
10. Critical Control 10: Secure configurations of network devices such as firewalls, Routers, and
Switches: Attackers take advantage of the fact that network devices may become less securely
configured over time as users demand exceptions for specific and temporary business needs, the
exceptions are deployed, and those exceptions are not undone when the business need is no longer
applicable. Making matters worse, in some cases, the security risk of the exception is never
properly analyzed, nor is thisriskmeasured against the associated business need. Attackers search
for electronic holes in firewalls, routers, and switches and use those to penetrate defenses.
Attackers have exploited flaws in these network devices to redirect traffic on a network (to a
malicious system masquerading as a trusted system), and to intercept and alter information while in
transmission. Through such actions, the attacker gains access to sensitive data, alters important
information, or even uses one compromised machine to pose as another trusted system on the
network.
11. Critical Control 11: Limitation and Control of Ports, Protocols and Services: Attackers search
for services that have been turned on and that can be exploited. Common examples are web
servers, mail servers, file and print services, and DNS servers. Many software packages
automatically install services and turn them on as part of the installation of the main software
248
package without ever informing the user that the services have been enabled. Because the user does
not know about the services, it is highly unlikely that the user will actively ensure the services are
disabled if they are not being used or regularly patched if they are beingused.
12. Critical Control 12: Controlled Use of Administrative Privileges: Two very common attacker
techniques take advantage of uncontrolled administrative privileges. In the first, a workstation user
is fooled into opening a malicious email attachment, downloading and opening a file from a
malicious web site, or simply surfing to a website hosting attacker content that can automatically
exploit browsers. The file or exploit contains executable code that runs on the victim's machine. If
the victim's computer is running with administrative privileges, the attacker can take over the
victim's machine completely and install keystroke loggers, sniffers, and remote control software to
find administrator passwords and other sensitive data. The second common technique used by
attackers is elevation of privileges after using a vulnerable service or a guessed password to gain
access to a server. If administrative privileges are loosely and widely distributed, the
attackerhasamucheasiertimegainingfullcontroloftheservers,because there are many more accounts
that can act as avenues for the attacker to compromise administrative privileges. One of the most
common of these attacks involves the domain administration privileges in large Windows
environments, giving the attacker significant control over large numbers of machines and access to
the data theycontain.
13. Critical Control 13: Boundary Defense: Attackers target Internet-facing systems
becausetheyareaccessible.Theyuseweaknessestheyfindthereasjumpingoffpointsto get inside the
boundary to steal or change information or to set up persistent presence for later attacks.
Additionally, many attacks occur between business partner networks, sometimes referred to as
extranets, as attackers hop from one organization's network to another, exploiting vulnerable
systems on extranet perimeters. Boundary defenses tostop these types of attack have multiple
dimensions: all Internet and extranet traffic passes through managed, authenticated proxies,a DMZ
is employed that is separated from internal systems either physically or through tightly monitored
filtering, and securely configured firewalls and intrusion detection systems are to deploy at each
gateway.
14. Critical Control 14: Maintenance, Monitoring and Analysis of Complete Audit Logs:
Deficiencies in security logging and analysis allow attackers to hide their location, malicious
software used for remote control, and activities on victim machines.Even if the victims know that
their systems were compromised, without protected and complete logging records, the victim is
blind to the details of the attack and to the subsequent actions taken by the attackers after they
gained the initial foothold. Sometimes logging records are the only evidence of a successful attack.
Many organizations keep audit records for compliance purposes but attackers rely on the fact that
such organizations rarely look at the audit logs so they do not know that their systems have been
compromised. Because of poor or non-existent log analysis techniques, attackers sometimes
249
control victim machines for months or years without anyone in the target organization knowing,
even though the evidence of the attack has been recorded in unexamined log files.
15. Critical Control15:Controlled Access Based On Need to Know:Onceanattackerhas penetrated a
sensitive network, if users have access to all or most of the information, the
attacker'sjoboffindingandexfiltratingimportantinformationisgreatlyfacilitated.Users of the systems
should only be provided the access rights as per need of functions they need to access on
thesystems.
16. Critical Control 16: Account Monitoring and Control: Attackers frequently discover and
exploit legitimate but inactive user accounts to impersonate legitimate users, thereby making
discovery of attacker behavior difficult for network watchers. Accounts of contractors and
employees who have been terminated have often been misused in this way. Additionally, some
malicious insiders or former employees have accessed accounts left behind in a system long after
contract expiration, maintaining their access to an organization's computing system and sensitive
data for unauthorized and sometimes malicious purposes.
17. Critical Control 17: Data Protection: Attackers could exfiltrate sensitive data from critical sector
organizations. Yet, in most cases, the victims may not have any clue that such data is leaving their
site - because they were not monitoring data outflows. The movement of data across network
boundaries both electronically and physically must be carefully scrutinized to minimize its
exposure toattackers.
18. Critical Control 18: Incident Response and Management: A great deal of damagehas been done
to organizational reputations and a great deal of information has been lost in organizations that do
not have fully implement effective incident response management in place. Any organization that
hopes to be ready to find and respond to attacks effectively owes it to their employees and
contractors to find the gaps in their knowledge and to provide exercises and training to fill those
gaps. A solid security skills assessment program can provide actionable information to decision
makers about where security awareness needs to be improved, and can also help determine proper
allocation of limited resources to improve securitypractices.
19. CriticalControl19:Secure Network Engineering: Many controls in this document are effective
but can be circum ventedinnetworksthatarebadlydesigned.However eventhe best designed networks
constantly evolve, new business imperatives appear, attackers develop new techniques, and new
technologies emerge to complicate the security problem. In such an environment, attackers take
advantage of missing security features, time gaps in deploying newdefenses.
20. Critical Control 20: Penetration Tests and Red Team Exercises: Attackers penetrate networks
and systems through social engineering and by exploiting vulnerable software and hardware. Once
they get access, they burrow deep and expand the number of systems over which they have control.
Most organizations do not exercise their defenses so they are uncertain about its capabilities and
unprepared for identifying and responding to attack. This control goes beyond traditional
250
penetration testing, which typically has the goal of identifying vulnerabilities and showing their
business risks. Red Team Exercises are exercise in the traditional sense of military exercises where
the three goals are improved readiness of the organization, better training for defensive
practitioners,as well as inspection of current performance levels. Independent red teams can
provide valuable objectivity regarding both the existence of vulnerabilities and the efficacy of
defenses and mitigating controls already in place and even those planned for future
implementation.
251
Unit 4: Network Security (Physical
and Environment Security) 4
Unit Structure
1.2 INTRODUCTION
252
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Understand the Physical and environment securityneed.
Know the threats from manmadedisasters.
Know the physical security good practices andguidelines.
Understand the physical and environment securitycontrols.
Know data centersecurity.
1.2 INTRODUCTION
The risk from adversaries and natural or man-made disasters such as earthquake is important to control
in order to achieve overall objective of organization's information security. All security mechanisms can
be defeated if a attacker has physical access to them. It is important to secure the organization's assets by
implementing physical protection systems like boundary, barriers, locks, access controls, CCTV
cameras, alarms, intrusion detectors etc.
Similar to physical security, environmental security elements like power and backup sites, Heating,
Ventilation and Air Conditioning systems(HVAC)systems,and fire detection also play an important role
in information security system of theorganization.
In this unit we will discuss physical security, environment security and data center guidelines with
respect to information and communications technology. This unit is derived from various industry good
practices and guidelines refer the reference section of the unit for more details.
253
Ensure that a significant level of centralized visibility exists over physical security initiatives,
activities, functions, solutions, processes and current state of maturity of all locations
Create a map of physical security solutions, techniques and architectural elements deployed across
all thefacilities
Create an inventory of compliance regulations in regard to physical security and map them into in-
scope facilities andsystems
Ensure that the physical security requirements are defined and documented considering facts such
as the threat landscape of an organization, vicinity and compliance requirements
Ensurethatthephysicalsecuritymeasuresarederivedoutofawelldefinedframeworkor structure for
physicalsecurity.
Ensure that the selection of physical protection measures is derived from thorough threat analysis
of facilities and zones within thefacilities.
Establish an enterprise level standards or guidelines for physical security- site selection, perimeter
controls, entry & interior controls, access provisioning and revocation, intrusion detection, incident
management, monitoring and policy exceptions- for all self owned and leasedfacilities
Definetherolesandresponsibilitiesofphysicalsecurityorganizationatthecorporateand regional
facilitylevel.
Ensure that a strategy exists for integrating physical security function with other security initiatives
of theorganization
Develop a strategic roadmap for physical security for adoption of emerging technical solutions
Physical Security – BestPractices
DSCI security framework listed following best practices for physical security that organizations may
choose when implementing security controls against physical intrusions.
Create a map of physical security activities, processes, technologies and operations at geographical
vicinity, campus perimeter, and work area entry andinterior.
Create a visibility over all access points, their criticality and access control measures deployed at
all these points
Ensure that the facility is divided into security zones, based on the criticality of each function,
project or task being carried out. Derive a map of access requirements for each zone and user
groups that require access to thesezones
Ensure that the physical security processes are established for all physical security elements such
as campus entry, zone entry, interior operations, access granting & revocation, visitors access,
physical security monitoring, incident management and emergencyoperations
Ensure that the entry to a facility is restricted to only those users who provide proof of their
organizationalidentity.
Ensure that a mechanism exists to identify, authenticate and authorize access tousers.
Ensure that a physical access process is integrated with user life cycle management of the
organization that entails physical access provisioning, access management and revocation
Ensure that a process exists for allowing and revoking access of visitors, partners, third
party service providers and supportservices
Create an inventory of instances that may introduce securityvulnerabilities.
254
Ensure that a security authorization is performed for all changes pertaining to physical
security,instancesthatmayintroducesecurityvulnerabilitiesandexceptiontothepolicy
Ensure that an adequate number of security guards are deployed at the facilities. Ensure that
background checks and credibility of contractor organization they belong to, has been considered
while sourcing or recruitingguards
Ensure that an adequate level of security measures are implemented for vehicle entry & exit,
vehicle parking areas, loading/unloading docks, storage areas, and any other area that may provide
easy passage for physicalintrusion
Ensure that the incoming data and telecom lines, Customer Premises Equipments (CPEs) from
service providers and electric distribution systems are protected from physical intrusion
Create an inventory of alarm system installations across the facilities, external and internal
installations. Map the inventory with the detection requirements of an organization
Ensure that a mechanism exists to facilitate detection of physical intrusion, confirmation of the
incident, escalation to respective officials, tracking of the corrective actions and recording of
theincidents
Ensure that the physical security function is integrated with information securityteam
Ensure that a mechanism exists for reporting the physical securityincident.
Ensure that a significant level of efforts are dedicated to assess the vulnerability of organization‘s
facilities and conduct a routine survey or audit to review and test preparedness of physical
securityfunction
Ensure that a significant level of coordination exists with local law enforcement bodies for
handling physical securitybreaches
Physical Security -Guidelines
Physical security guidelines are divided into the following three sections:
Physical security of Information and communications Technology (ICT) equipment.
Physical security of Information and communications Technology (ICT) systems.
Physical security of Information and communications Technology (ICT) facilities.
The period between audits should be based on the organization's risk assessment with higher risk
items audited on a more regular basis. Organizations should, based on their risk assessment,
consider visually inspecting ICT equipment as part of their asset control audit to ensure that non-
approved devices have not been installed.
e. Tamperevidentseals: Organizations may seal ICT equipmentwithtamperevidentseals suitable for
application to hard surfaces. The use of seals may give a visual indication of unauthorised access
into the equipment if the seals are removed orbroken.
Some of the precautions that need to be taken for ensuring physical security of ICT system equipment
are:
256
a. Physical security of servers and network devices: Servers and network devices are to be located
in security rooms/containers. The level of room/container used should be determined by the
business impact of the compromise, loss of integrity or unavailability of the aggregated
information accessible from the servers and network devices. Organizations should keep servers
and communication network devices in dedicated Physical security of ICT facilities.
Organizations using shared gateways are to apply controls to the gateway appropriate to the highest
level of information passing through the gateway. Organizations are to prevent unauthorised access
to gateway devices. It is recommended that these devices be located in dedicated 4.3.3.3 Physical
security of ICT facilities.
Physical security of ICTfacilities
Organizations may use dedicated ICT facilities to house ICT systems, components of their ICT Systems
or ICT equipment. These facilities include, but are not limited to:
server and gateway rooms
datacentres
257
backup repositories
storage areas for ICT equipment that hold official information,and
Communications and patch rooms.
Organizations should pay particular attention to the security of any access points to an ICT facility- for
example, cabling and ducting. Where an agency outsources its ICT facilities, or uses shared facilities, the
agency is required to ensure their information is held in a Security Zone appropriate for the information.
Some of the precautions that need to be taken for ensuring physical security of ICT facilities are:
a. Access control to ICT facilities and equipment within ICT facilities: Organizations are to
control access to ICT facilities.Access to ICT facilities holding information should be controlled
by:
◻ A dedicated section of the CCTV cameras,security alarm system(SAS), or electronic access
control system (EACS) where used,or
◻ A person provided with a list of people with a need to know or need to gointo the ICT
facility.
Organizations are to keep ICT facilities, and security containers within ICT facilities holding ICT
equipment, secured when the facilities are not occupied.
b. Access Control to delivery and loading area: Organization should limits on access to the
delivery and loading areas, and to other public access areas, to the degree consistent with required
operations; inspection of incoming and outgoing materials, and separation of incoming and
outgoing shipments, where possible; and isolation of these areas from information processing
facilities and areas where information isstored.
c. Outsourced ICT facilities: Organizations are to ensure that outsourced ICT facilities meet any
controls identified in these guidelines for the protection of the aggregation of information held in
the facilities. Security requirements should be mentioned in contracts for outsourcedfunctions.
d. Datacentres: Organizations using datacentres are to assess the aggregation of all information that
is held in the datacentre. Organizations employing a shared datacentre arrangement are to liaise
with all other organizations using the same datacentre to assess the business impact of the loss of
integrity or unavailability of the aggregate of the combined information before being
usedoperationally.
Data storage devices are to be given protection commensurate with the business impact of the
compromise of the aggregate of the information stored on the devices. Datacentres are selected not
only for their ability to provide security of information, but also for their ability to provide
continuous availability to information. ANSI/TIA-942 Telecommunications Infrastructure
Standard for Data Centers provides four tiers of availability in data centres. Datacentres that
comply with the Standard are available more than 99% of the time. Section 4.4 discusses the data
center security guidelines.
258
1.4 DATA CENTER SECURITY-GUIDELINES
Data centers are critical for business. Due to rapid advances taking place in technology, businesses and
users are demanding secure, continuous, reliable operation in the data center which provide high
availability and peak performance, 7 days a week, 365days a year.
Data Centre Energy Management has defined a data center as a special facility that perform sone or
more of the following functions:
A data center physically houses various equipment, such as computers, servers (e.g., web
servers, application servers, database servers), switches, routers, data storage devices,load
balancers,wire cages or closets,vaults,racks,and related equipment.
Data centers store, manage, process, and exchange digital data andinformation;
Provide application services or management for various data processing, such as web hosting
internet, intranet, tele-communication and information technology.
Other terms used to describe data centers include: Computer center, data centre, datacenter, data storage
and hosting facility, data processing center, computer room, server room, server farm, data farm, data
warehouse, co-location facility, co-located server hosting facility, corporate data
center,manageddatacenters,internetserviceprovider(ISP),applicationserviceprovider(ASP), full service
provider (FSP), wireless application service provider (WASP), telecommunications carriers, etc.
While designing data center particular emphasis on the following factors should be kept in mind:
Adequate facility space (present andfuture)
Power (operational andbackup)
Cooling (general andrack-specific)
Cabling path ways
Equipment racks
Cabling system (components anddesign)
The Telecommunications Industry Association (TIA) has issued a standard called ANSI/TIA- 942:
Telecommunications Infrastructure Standard for Data Centers. Similarly the international ISO/IEC
24764 standard and the European EN 50173-5 standard are also available and all these standards define
the basic infrastructure in data centers. TIA 942 is currently the most comprehensive body of standards
for data centers and includes contributions from various organizations, including data center
owners,consultants,andproductmanufacturers.Thecriteria for data centre addressed by the TIA 942
standard includes: Structure, Cabling performance, Redundancy, Grounding/potential equalization,
Cable routing, Ceilings and double floors, Floor load,Space requirements(ceiling height,door
width),Power supply/UPS,Fire protection/safety, Cooling, Lighting, Administration/labeling,
Temperature/humidity and availability Tier classification.
Table 2: Tier classification
259
The different tier data centers have strict standards for reliability and availability
Tier1: composed of a single path for power andcooling distribution, with out redundant
components, providing 99.671% availability: 28 hours of down time/year.
TierII: composed of a single path for power and cooling distribution, with redundant components,
providing 99.749% availability: 22 hours ofdowntime/year.
TierIII: composed of multiple active power and cooling distribution paths, but only one path
active, has redundant components, and is concurrently maintainable, providing 99.982%
availability: 1.5 hours ofdowntime/year.
Tier IV: composed of multiple active power and cooling distribution paths, has redundant
components, and is fault tolerant,providing 99.995% availability:26minutes of down time/year
The data centre structures also need to be protected from physical damage by considering the risk of Fire
Risk, Water Risk, Smoke Risk, Power Supply Risk, Air-Conditioning Risk, Dust Risk, Unauthorized
Access Risk, Explosion Risk, etc.to ensure availability:
Some of the other points that need to be considered for availability are:
Security systems such as burglaralarms, access control, video surveillance,building
security,security personnel,security lighting,central building controls systems,etc.
Choice of telecommunication carriers and redundantconnections
Green IT and Energyefficiency
Short response times for upgrades andextensions
Low latencies to meet the growing requirements in terms of internetpresence
According to the TIA 942 standard the data centre (DC) should include five key functional areas as
shown in the diagram below, where growth is anticipated and helps upgrading or adding servers or
applications with minimal downtime or disruption.
The five key functional areas are:
Entrance Room(ER)
Main Distribution Area(MDA)
Horizontal Distribution Area(HDA)
Zone Distribution Area (ZDA)
260
Equipment Distribution Area(EDA)
Ideally separate rooms should be earmarked for each of these functional areas but it may not be practical
for normal organizations and hence these can be consolidated with clearly defined areas:
262
j. Cabling
In a data centre, everything has to work when moving bits into, around, and out of it - and the cabling
infrastructure is where the bits move. Cabling is expected to serve multiple generations of devices
over a period of 10 to 25 years. Therefore, the biggest challenge is to design the connectivity
architecture between horizontal distribution areas (HDAs), zone distribution areas (ZDAs), and
equipment distribution areas (EDAs). A multi level cable tray system (3 Layer) may be adopted
where: Bottom layer is copper cable, Middle layer is fiber and Top layer is power. Data center cabling
system example is provided in the diagram below:
k. Spaces
The relationship of spaces in a data centre can be shown as depicted in the figure below:
263
Figure 17: Standards for space
While some basic details for data centre have been provided here, students are advised to understand
TIA-942 requirements and processes.
TIA-942 standard, specifically addresses data centre infrastructure including telecom infrastructure
standard and facility requirements. It provides a flexible and manageable structured cabling system
using standard media while building on existing standards. It helps provide guidelines on a wide
range of areas useful in designing or managing a data centre. It also serves as a tier standard for
determining the standard quality of a data centre and compares them.
264
Use HTTPS for device access. Disable HTTPaccess.
Configure Authentication, Authorization, and Accounting (AAA) for role-based access control and
logging. Use a local fallback account in case the AAA server is unreachable.
Limit the types of traffic allowed over the managementinterface(s).
Use Secure Shell (SSH). DisableTelnet.
Use Network Time Protocol (NTP)servers
Following table provides matrix of threats mitigated by taking care of factors impacting data centre
security:
IPS Y Y Y Y Y
Integration e e e e e
s s s s s
Switching Security Y Yes Y Y
e e e
s s s
265
Endpoint Security Y Y Yes Y Y Y Y Y
e e e e e e e
s s s s s s s
Secure Device Access Yes Y Y Y Y
e e e e
s s s s
Telemetry Y Y Yes Y Y
e e e e
s s s s
Create an inventory of electric supply arrangements, power back up arrangements, fire safety
provisions, fire detection mechanisms, fire exits, Heating Ventilating and Air- Conditioning
(HVAC) equipment systems across all thefacilities.
Ensure that there exists a complete visibility over adequacy of measures deployed for environment
security, their current state against geographical and local conditions and historical incidents
pertaining to environmentalmeasures.
Ensure that a significant level of resources and efforts are dedicated for continual operation of
facilities, protection of environment at facilities, deterring fire incidents at facilities and protecting
human life at facilities in case ofincidents.
Ensurethatanenterprisewidestandardsandguidelinesareestablishedforenvironmental protection.
Ensure that a strategy exists for availing services in facility management, adoption of emerging
technical solutions, tracking the state of equipments and devices and integrating them with incident
management system to address environmental devices specific events
266
DSCI security framework listed following best practices for environmental security that organizations
may choose when implementing security controls against environmental threats to ICT.
Create a map of fire safety provisions in the facility – fire sensor or smoke detector map
ofthefacility, fire alarming and command control system and fire protection measures.
Ensure that a sufficient amount of efforts are dedicated for routine fire safety operations that
include testing of fire detectors, routine maintenance of equipments and fire safety drills.
Ensure that the responsibilities are defined for fire drills, emergency operations and routine training
is conducted for the designatedpeople.
Ensure that a significant level of efforts are dedicated for training and awareness of the
employees, with proper sign age and direction maps provided for guidance in emergency.
Ensure that a significant level of capacity of power systems, standby power supply and HVAC is
available to with stand current load of the facility and its likely expansion.
Ensure that significant levels of resources are dedicated for maintenance of all supporting
equipments to keep their capacity intact and avoid any failuresthereof.
Ensure that a mechanism exists to monitor the performance of power and HVACsystem.
Ensure that the incident management system is capable enough to address the incidents detected by
environmental security devices.
a. Preservation of ICT equipment: ICT equipment may require a controlled atmosphere to ensure
the integrity of the information held on the equipment. ICT equipment holding information may
also require a controlled environment to prevent failure of the equipment and potential loss of
information. This may include, but not limited to, controlling:
◻ temperature
◻ humidity
◻ air quality—for example smoke anddust
◻ water, or
◻ light.
Organizations should apply controls to meet any ICT equipment manufacturer‘s identified
requirements.
b. Uninterruptable and backup power supplies: Organizations may lose information if ICT
systems are unexpectedly shutdown. An uninterruptable power supply (UPS) will allow the agency
to turn off systems in a controlled manner or provide power until power to the ICT system
267
isrestored.
Any UPS used by an organisation should provide at least enough power to allow:
◻ the controlled shutdown of ICT systems,or
◻ the startup of an backup powersupply.
ICT equipment also needs protection from power surges (relatively lengthy increases in voltage),
power sags and spikes (short very large increases in voltage). Most UPS also give some protection
from surges and sags. As most environmental systems rely on mains electricity, a
backup power supply may assist in maintaining environmental controls. Backup power supplies
should be maintained in accordance with the manufacturer‘sdirections.
c. Protection from natural and man-made disasters: Organizations should identify any threats
from natural and man-made disasters to their ICT equipment in their security risk assessment.
Examples of natural and manmade disasters include earthquake, flooding, cyclone, fire, terrorism,
etc. Business continuity plan of organization should be prepared, implemented and testedregularly.
Protection against damages from earthquake, explosion, terrorism, civil unrest and other forms of
natural and man-made risk should be designed and implemented. This could include:
◻ Consideration of probabilities of various categories of risks and value of assets to be
protected against thoserisks.
◻ Consideration of security threats posed by neighboring facilities andstructures.
◻ Appropriate equipment (e.g., fire-fighting devices) and other counter-measures provided and
suitably located onsite.
◻ Appropriate off-site/remote location for backup facilities and datacopies.
We discuss here some common threats and backup for continuity of operations.
i. Flooding: Water is one of the major threats to any system that uses electricity, including ICT
systems. Organizations should site server rooms so that they are protected from flooding.
Flooding may be from external sources—for example swollen rivers, or internal sources—for
example burst pipes. Organizations considering locating server rooms in basement
shouldassesstheriskofflooding from external or internalsources.
ii. Fire: Organizations should also protect ICT equipment from fire. ICTequipment can be
damaged either through direct exposure to flames, or the effects of smoke (poor air quality)
and increases in temperature in the generalenvironment.
An additional concern to ICT equipment during building fires is the potential for flooding
during fire fighting operations. An organisation may be able to use alternatives to water-
based sprinkler systems, such as CO2 or other gaseous agents, in critical ICT facilities.
d. Backup ICT systems: Backup ICT systems can provide an organisation with a recover
pointiftheirprimaryICTsystemsfail,which can form part of an organisation‘sbusiness continuity and
disaster recovery plans. Any backup systems should be, as far as possible, fully independent of the
supporting infrastructure used for the primary system so that in case of a failure of the primary ICT
system the secondary ICT system does not also fail . Backup ICT systems should be regularly tested to
ensure their continued operation.
Organizations may use off-site or commercial backup facilities. Organizations should consider dual
268
redundancy—that is using two backup facilities, for business critical information and ICT systems.
Environmental security requirements should be mentioned in contracts for outsourced functions.
269
Website : www.baou.edu.in | Email : offi[email protected]