Module II Notes
Module II Notes
Module II Notes
At the most practical level, securing the information on your computer means:
Ensuring that your information remains confidential and only those who should access
that information, can.
Knowing that no one has been able to change your information, so you can depend on its
accuracy (information integrity).
Making sure that your information is available when you need it (by making back-up
copies and, if appropriate, storing the back-up copies off-site).
Decision makers in organizations must set policy and operate their organizations
in compliance with the complex, shifting legislation that controls the use of
technology.
1 DEPARTMENT OF CSE
The modern organization needs to create an environment that safeguards
applications using the organization’s IT systems, particularly those applications
that serve as important elements of the infrastructure of the organization.
It is essential for the protection of integrity and value of the organization’s data
Must add secure infrastructure services based on the size and scope of the
enterprise.
Organizational growth could lead to the need for public key infrastructure,
PKI, an integrated system of software, encryption methodologies.
2.3 THREATS
1. Know yourself
(i.e) be familiar wit the information to be protected, and the systems that store,
transport and process it.
A threat is an object, person, or other entity, that represents a constant danger to an asset.
2 DEPARTMENT OF CSE
2.3.1 Threats to Information Security
information
2.3.2 Threats
One of the greatest threats to an organization’s information security is the organization’s own
employees.
3 DEPARTMENT OF CSE
Failure to protect information can be prevented with
- Training
Intellectual Property is defined as the ownership of ideas and control over the tangible
or virtual representation of those ideas.
Intellectual property includes trade secrets, copyrights, trademarks, and patents.
Once intellectual property has been defined and properly identified, breaches to IP
constitute a threat to the security of this information.
Organization purchases or leases the IP of other organizations.
Most Common IP breach is the unlawful use or duplication of software based intellectual
property more commonly known as software Piracy.
Software Piracy affects the world economy.
U.S provides approximately 80% of world’s software.
In addition to the laws surrounding software piracy, two watch dog organizations
investigate allegations of software abuse.
Another effort to combat (take action against) piracy is the online registration
process.
Electronic and human activities that can breach the confidentiality of information.
When an unauthorized individual’s gain access to the information an organization is
trying to protect is categorized as act of espionage or trespass.
Attackers can use many different methods to access the information stored in an
information system.
2. Industrial espionage(spying)
4 DEPARTMENT OF CSE
3. Shoulder Surfing(ATM)
Trespass
Can lead to unauthorized real or virtual actions that enable information gatherers to enter
premises or systems they have not been authorized to enter.
Sound principles of authentication & authorization can help organizations protect
valuable information and systems.
Hackers-> “People who use and create computer software to gain access to information
illegally”
There are generally two skill levels among hackers.
Expert Hackers-> Masters of several programming languages, networking protocols,
and operating systems .
Unskilled Hackers
Destroy an asset or
5 DEPARTMENT OF CSE
These software components are designed to damage, destroy or deny service to the target
system.
“The British Internet Service Provider Cloudnine” be the first business “hacked out of
existence”
7.1 Virus
Boot Virus-> infects the key operating files located in the computer’s boot sector.
7.2 Worms
A worm is a malicious program that replicates itself constantly, without requiring another
program to provide a safe environment for replication.
Worms can continue replicating themselves until they completely fill available resources,
such as memory, hard drive space, and network bandwidth.
Eg: MS-Blaster, MyDoom, Netsky, are multifaceted attack worms.
Once the worm has infected a computer , it can redistribute itself to all e-mail addresses
found on the infected system.
Furthermore, a worm can deposit copies of itself onto all Web servers that the infected
systems can reach, so that users who subsequently visit those sites become infected.
Are software programs that hide their true nature and reveal their designed behavior only
when activated.
6 DEPARTMENT OF CSE
Trojan horse releases its
Trojan horse Trojan horse is
payload, monitors
arrives via E- activated when
computer activity,
mail or software the software or
installs back door, or
such as free attachment is
transmits information to
games executed.
hacker
Polymorphism
A Polymorphic threat is one that changes its apparent shape over time, making it
undetectable by techniques that look for preconfigured signatures.
These viruses and Worms actually evolve, changing their size, and appearance to elude
detection by antivirus software programs.
7.5 Virus & Worm Hoaxes
Types of Trojans
Proxy Trojans
FTP Trojans
Virus
7 DEPARTMENT OF CSE
Worm
A program or algorithm that replicates itself over a computer network and usually
performs malicious actions.
Trojan Horse
Blended threat
Blended threats combine the characteristics of virus, worm, Trojan horses &
malicious code with server and Internet Vulnerabilities.
Antivirus Program
A Utility that searches a hard disk for viruses and removes any that found.
8. Forces of Nature
Fire: Structural fire that damages the building. Also encompasses smoke damage
from a fire or water damage from sprinkles systems.
Flood: Can sometimes be mitigated with flood insurance and/or business
interruption Insurance.
Earthquake: Can sometimes be mitigated with specific causality insurance
and/or business interruption insurance, but is usually a separate policy.
Lightning: An Abrupt, discontinuous natural electric discharge in the
atmosphere.
Landslide/Mudslide: The downward sliding of a mass of earth & rocks directly
damaging all parts of the information systems.
Tornado/Severe Windstorm
Huricane/typhoon
Tsunami
Electrostatic Discharge (ESD)
Dust Contamination
Since it is not possible to avoid force of nature threats, organizations must implement
controls to limit damage.
They must also prepare contingency plans for continued operations, such as disaster
recovery plans, business continuity plans, and incident response plans, to limit losses in
the face of these threats.
8 DEPARTMENT OF CSE
9. Deviations in Quality of Service
Other utility services can affect the organizations are telephone, water, waste water, trash
pickup, cable television, natural or propane gas, and custodial services.
The loss of these services can impair the ability of an organization to function.
For an example, if the waste water system fails, an organization might be prevented from
allowing employees into the building.
This would stop normal business operations.
Power Irregularities
This can pose problems for organizations that provide inadequately conditioned
power for their information systems equipment.
9 DEPARTMENT OF CSE
11. Technical software failures or errors
This category involves threats that come from purchasing software with unknown, hidden
faults.
Large quantities of computer code are written, debugged, published, and sold before all
their bugs are detected and resolved.
These failures range from bugs to untested failure conditions.
2.4 ATTACKS
The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information.
The state –of-the-art malicious code attack is the polymorphic or multivector, worm.
These attack programs use up to six known attack vectors to exploit a variety of
vulnerabilities in commonly found information system devices.
2. Web browsing
3. Virus
4. Unprotected shares
5. Mass mail
10 DEPARTMENT OF CSE
1. IP scan & attack
The infected system scans a random or local range of IP addresses and targets any of
several vulnerabilities known to hackers.
2. Web browsing
If the infected system has write access to any Web pages, it makes all Web content files
(.html,.asp,.cgi & others) infectious, so that users who browse to those pages become
infected.
3. Virus
Each infected machine infects certain common executable or script files on all computers
to which it can write with virus code that can cause infection.
4. Unprotected shares
Using vulnerabilities in file systems and the way many organizations configure them, the
infected machine copies the viral component to all locations it can reach.
5. Mass Mail
By sending E-mail infections to addresses found in the address book, the infected
machine infects many users, whose mail -reading programs also automatically run the
program & infect other systems.
By using the widely known and common passwords that were employed in early versions
of this protocol, the attacking program can gain control of the device. Most vendors have
closed these vulnerabilities with software upgrades.
2.4.3 Examples
Hoaxes
A more devious approach to attacking the computer systems is the transmission of a virus
hoax with a real virus attached.
Even though these users are trying to avoid infection, they end up sending the attack on
to their co-workers.
Backdoors
11 DEPARTMENT OF CSE
A trap door is hard to detect, because very often the programmer who puts it in place also
makes the access exempt from the usual audit logging features of the system.
Password Crack
Brute Force
The application of computing & network resources to try every possible combination of
options of a password is called a Brute force attack.
This is often an attempt to repeatedly guess passwords to commonly used accounts, it is
sometimes called a password attack.
Spoofing
192.168.0.25 100.0.0.75
Original IP packet
100.0.0.80 100.0.0.75
Spoofed (modified)
IP packet
12 DEPARTMENT OF CSE
Hacker modifies Spoofed packet
source address sent to target
to spoof firewall
Dictionary
This is another form of the brute force attack noted above for guessing passwords.
The dictionary attack narrows the field by selecting specific accounts to attack and uses
a list of commonly used passwords instead of random combinations.
Man-in-the –Middle
SPAM
13 DEPARTMENT OF CSE
Mail Bombing
Another form of E-mail attack that is also a DOS called a mail bomb.
Attacker routes large quantities of e-mail to the target.
The target of the attack receives unmanageably large volumes of unsolicited e-mail.
By sending large e-mails, attackers can take advantage of poorly configured e-mail
systems on the Internet and trick them into sending many e-mails to an address chosen by
the attacker.
The target e-mail address is buried under thousands or even millions of unwanted e-
mails.
Sniffers
A sniffer is a program or device that can monitor data traveling over a network.
Unauthorized sniffers can be extremely dangerous to a network’s security, because they
are virtually impossible to detect and can be inserted almost anywhere.
Sniffer often works on TCP/IP networks, where they are sometimes called “packet
Sniffers”.
Social Engineering
It is the process of using social skills to convince people to reveal access credentials or
other valuable information to the attacker.
An attacker gets more information by calling others in the company and asserting his/her
authority by mentioning chief’s name.
Buffer Overflow
A buffer overflow is an application error that occurs when more data is sent to a buffer
than it can handle.
Attacker can make the target system execute instructions.
Timing Attack
14 DEPARTMENT OF CSE
2.5 LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY
Laws are rules that mandate or prohibit certain behavior in society; they are drawn from
ethics, which define socially acceptable behaviors. The key difference between laws and
ethics is that laws carry the sanctions of a governing authority and ethics do not. Ethics in
turn are based on Cultural mores.
Types of Law
Civil law
Criminal law
Constitutional Law
Privacy
The issue of privacy has become one of the hottest topics in information
The ability to collect information on an individual, combine facts from separate sources,
and merge it with other information has resulted in databases of information that were
previously impossible to set up
The aggregation of data from multiple sources permits unethical organizations to build
databases of facts with frightening capabilities
15 DEPARTMENT OF CSE
Table 2.5.2.1 Key U.S Laws of Interest to Information Security Professionals
16 DEPARTMENT OF CSE
impact on the privacy of
personal information used
by these industries.
17 DEPARTMENT OF CSE
US Copyright Law
The Freedom of Information Act provides any person with the right to request access to
federal agency records or information, not determined to be of national security
There are exceptions for information that is protected from disclosure, and the Act does
not apply to state or local government agencies or to private businesses or individuals,
although many states have their own version of the FOIA
It is the responsibility of the information security professional to understand state laws and
regulations and insure the organization’s security policies and procedures comply with those
laws and regulations
18 DEPARTMENT OF CSE
Digital Millennium Copyright Act (DMCA) Digital Millennium Copyright Act (DMCA)
To some degree the United Nations Charter provides provisions for information
security during Information Warfare
Information Warfare (IW) involves the use of information technology to conduct
offensive operations as part of an organized and lawful military operation by a sovereign
state
IW is a relatively new application of warfare, although the military has been conducting
electronic warfare and counter-warfare operations for decades, jamming, intercepting,
and spoofing enemy communications
Differences in cultures cause problems in determining what is ethical and what is not
ethical
Studies of ethical sensitivity to computer use reveal different nationalities have different
perspectives
Difficulties arise when one nationality’s ethical behavior contradicts that of another
national group
Employees must be trained and kept aware of a number of topics related to information
security, not the least of which is the expected behaviors of an ethical employee
19 DEPARTMENT OF CSE
This is especially important in areas of information security, as many employees may not
have the formal technical training to understand that their behavior is unethical or even
illegal
Proper ethical and legal training is vital to creating an informed, well prepared, and low-
risk system user
Dissemination (distribution): The organization must be able to demonstrate that the policy has been
made readily available for review by the employee. Common dissemination techniques include hard
copy and electronic distribution.
Mnemonic Method. A user selects a phrase and extracts a letter of each word in the phrase (such as
the first letter or second letter of each word), adding numbers or special characters or both.
Example: “May the force be with you always, young Jedi” becomes Mtfbwya-yJ
Altered Passphrases. A user selects a phrase and alters it to form a derivation of that phrase. This
method supports the creation of long, complex passwords. Passphrases can be easy to remember due
to the structure of the password: it is usually easier for the human mind to comprehend and
remember phrases within a coherent structure than a string of random letters, numbers, and special
characters.
Example: Never Give Up! Never Surrender! becomes Nv.G.Up!-Nv.Surr!
Combining and Altering Words. A user can combine two or three unrelated words and change some
of the letters to numbers or special characters.
21 DEPARTMENT OF CSE
Example: Jedi Tribble becomes J3d13bbl
Finally, procedures are step-by-step instructions for accomplishing the task specified in the policy.
Procedures: To change your log-in password on our system, perform the following steps:
1) Log in using your current (old) password.
2) On your organizational portal home page, click the [Tools] Menu option.
3) Select [Change Password].
4) Enter your old password in the first field and your new password in the second. The system will ask you
to confirm your new password to prevent you from mistyping it.
5) The system will then report that your password has been updated, and ask you to log out and log back in
with your new password.
Enterprise Information Security Policy
An enterprise information security policy (EISP) is also known as a general security policy,
organizational security policy, IT security policy, or information security policy. The EISP is an
executive-level document, usually drafted by or in cooperation with the organization’s chief
information officer.
This policy is usually 2 to 10 pages long and shapes the philosophy of security in the IT environment.
The EISP usually needs to be modified only when there is a change in the strategic direction of the
organization.
The EISP guides the development, implementation, and management of the security program. It sets
out the requirements that must be met by the information security blueprint or framework.
It defines the purpose, scope, constraints, and applicability of the security program. It also assigns
responsibilities for the various areas of security, including systems administration, maintenance of
the information security policies, and the practices and responsibilities of users.
According to NIST, the EISP typically addresses compliance in two areas:
1. General compliance to ensure that an organization meets the requirements for establishing a program and
assigning responsibilities therein to various organizational components
2. The use of specified penalties and disciplinary action7 When the EISP has been developed, the CISO
begins forming the security team and initiating necessary changes to the information security program.
EISP Elements Although the specifics of EISPs vary among organizations, most EISP documents should
include the following elements:
● An overview of the corporate philosophy on security Information on the structure of the information
security organization and people who fulfill the information security role
22 DEPARTMENT OF CSE
● Fully articulated responsibilities for security that are shared by all members of the organization
(employees, contractors, consultants, partners, and visitors)
● Fully articulated responsibilities for security that are unique to each role within the organizationIssue-
Specific Security PolicyAn ISSP may cover the following topics, among others:
● E-mail
● Use of the Internet and World Wide Web
● Specific minimum configurations of computers to defend against worms and viruses
● Prohibitions against hacking or testing organization security controls
● Home use of company-owned computer equipment
● Use of personal equipment on company networks (BYOD: bring your own device)
● Use of telecommunications technologies, such as fax and phone
● Use of photocopy equipment
● Use of portable storage devices such as USB memory sticks, backpack drives, game players, music
players, and any other device capable of storing digital files
● Use of cloud-based storage services that are not self-hosted by the organization or engaged under contract;
such services include Google Drive, Dropbox, and Microsoft Live Several approaches are used to create
and manage ISSPs within an organization.
Three of the most common are:
1. Independent ISSP documents, each tailored to a specific issue
2. A single comprehensive ISSP document that covers all issues
3. A modular ISSP document that unifies policy creation and administration while maintaining each
specific issue’s requirements
Components of an ISSP
1. Statement of policy
a. Scope and applicability
b. Definition of technology addressed
c. Responsibilities
2. Authorized access and usage of equipment
a. User access
b. Fair and responsible use
c. Protection of privacy
3. Prohibited use of equipment
a. Disruptive use or misuse
b. Criminal use
c. Offensive or harassing materials
d. Copyrighted, licensed, or other intellectual property
23 DEPARTMENT OF CSE
e. Other restrictions
4. Systems management
a. Management of stored materials
b. Employee monitoring
c. Virus protection
d. Physical security
e. Encryption
5. Violations of policy
a. Procedures for reporting violations
b. Penalties for violations
6. Policy review and modification
a. Scheduled review of policy procedures for modification
b. Legal disclaimers
7. Limitations of liability
a. Statements of liability
b. Other disclaimers as needed
Each technology and process is provided for business operations. Use for any other purpose
constitutes misuse of equipment.
Prohibited Use of Equipment Unless a particular use is clearly prohibited, the organization cannot
penalize its employees for misuse.
The following can be prohibited:
personal use, disruptive use or misuse, criminal use, offensive or harassing materials, and
infringement of copyrighted, licensed, or other intellectual property.
Systems Management The systems management section of the ISSP policy statement focuses on the
users’ relationship to systems management.
Specific rules from management include regulating the use of e-mail, the storage of materials, the
authorized monitoring of employees, and the physical and electronic scrutiny of e-mail and other
electronic documents.
As the organization’s needs and technologies change, so must the policies that govern their use.
Limitations of Liability If an employee is caught conducting illegal activities with the organization’s
equipment or assets, management does not want the organization held liable.
The policy should state that if employees violate a company policy or any law using company
technologies, the company will not protect them, and the company is not liable for their actions.
It is assumed that such violations occur without knowledge or authorization by the organization.
Systems-Specific Security Policy (SysSP)
SysSPs often function as standards or procedures to be used when configuring or maintaining
systems. For example, a SysSP might describe the configuration and operation of a network firewall.
This document could include a statement of managerial intent; guidance to network engineers on the
selection, configuration, and operation of firewalls; and an access control list that defines levels of
access for each authorized user.
SysSPs can be separated into two general groups, managerial guidance SysSPs and technical
specifications SysSPs, or they can be combined into a single policy document that contains elements
of both.
Managerial Guidance SysSPs A managerial guidance SysSP document is created by management to
guide the implementation and configuration of technology and to address the behavior of employees
in ways that support information security.
24 DEPARTMENT OF CSE
Each type of equipment requires its own set of policies, which are used to translate management’s
intent for the technical control into an enforceable technical approach.
There are two general methods of implementing such technical controls: access control lists and
configuration rules.
Configuration Rule Policies Configuration rules (or policies) govern how a security system reacts to
the data it receives.
Rule-based policies are more specific to the operation of a system than ACLs, and they may or may
not deal with users directly.
Many security systems—for example, firewalls, intrusion detection and prevention systems (IDPSs),
and proxy servers—use specific configuration scripts that represent the configuration rule policy to
determine how the system handles each data element they process.
Combination SysSPs Many organizations create a single document that combines the managerial
guidance SysSP and the technical specifications SysSP. While this document can Policy
Management Policies are living documents that must be managed.
It is unacceptable to create such an important set of documents and then shelve them. These
documents must be properly distributed, read, understood, agreed to, uniformly applied, and
managed.
Good management practices for policy development and maintenance make for a more resilient
organization.
Responsible Manager Just as information systems and information security projects must have
champions and managers, so must policies.
The policy manager is often called the policy administrator. Note that the policy administrator does
not necessarily have to be proficient in the relevant technology. While practicing information
security professionals require extensive technical knowledge, policy management and policy
administration require only a moderate technical background.
The policy administrator must be clearly identified in the policy document as the primary point of
contact for additional information or suggested revisions to the policy.
Schedule of Reviews Policies can only retain their effectiveness in a changing environment if they
are periodically reviewed for currency and accuracy and then modified accordingly.
To demonstrate due diligence, an Review Procedures and Practices To facilitate policy reviews, the
policy manager should implement a mechanism by which people can comfortably make
recommendations for revisions, whether via e-mail, office mail, or an anonymous drop box.
When policies are drafted and published without dates, confusion can arise. If policies are not
reviewed and kept current, or if members of the organization are following undated versions,
disastrous results and legal headaches can ensue.
Establishing a policy end date prevents a temporary policy from mistakenly becoming permanent,
and it also enables an organization to gain experience with a given policy before adopting it
permanently.
25 DEPARTMENT OF CSE