Topic 21 Computer Security - Part I
Topic 21 Computer Security - Part I
Lecture 21
21.0 Overview
• Computers and networks are being misused at a growing rate. Spam, phishing, and
computer viruses are becoming multibillion-dollar problems, as is identity theft, which
poses a serious threat to the personal finances and credit ratings of users, and creates
liabilities for corporations. Thus, there is a growing need for broader knowledge of
computer security in society as well as increased expertise among information technology
professionals.
• This definition introduces three key objectives that are at the heart of computer security:
Confidentiality, Integrity and Availability. These three concepts form what is often
referred to as the CIA triad.
• A traditional hypertext document is similar to a text file because its text is encoded
character by character using a system such as ASCII or Unicode. The distinction is that a
hypertext document also contains special symbols, called tags, that describe how the
document should appear on a display screen, what multimedia resources (such as images)
should accompany the document, and which items within the document are linked to other
documents. This system of tags is known as Hypertext Markup Language (HTML) – refer
to Lecture 15.
Page 1 of 28
TINC101
Lecture 21
• The three concepts embody the fundamental security objectives for both data and for
information and computing services.
• Although the use of the CIA triad to define security objectives is well established, some in
the security field feel that additional concepts are needed to present a complete picture.
The two additional concepts are known as authenticity and accountability.
21.1.1 Confidentiality
• In the context of computer security, confidentiality is the avoidance of the unauthorized
disclosure of information. That is, confidentiality involves the protection of data, providing
access for those who are allowed to see it while disallowing others from learning anything
about its content.
• Keeping information secret is often at the heart of information security, and this concept,
in fact, predates computers. For example, in the first recorded use of cryptography, Julius
Caesar communicated commands to his generals using a simple cipher. In his cipher,
Caesar took each letter in his message and substituted D for A, E for B, and so on. This
cipher can be easily broken, making it an inappropriate tool for achieving confidentiality
today. But in its time, the Caesar cipher 1was probably fairly secure, since most of Caesar’s
enemies couldn’t read Latin anyway.
1
Caesar Cipher covered in detail in the Network Security course.
Page 2 of 28
TINC101
Lecture 21
Page 3 of 28
TINC101
Lecture 21
21.1.2 Integrity
• Another important aspect of information security is integrity, which is the property that
information has not be altered in an unauthorized way.
• There are a number of ways that data integrity can be compromised in computer systems
and networks, and these compromises can be benign or malicious.
o For example, a benign compromise might come from a storage device being hit
with a stray cosmic ray that flips a bit in an important file, or a disk drive might
simply crash, completely destroying some of its files.
o A malicious compromise might come from a computer virus that infects our system
and deliberately changes some the files of our operating system, so that our
computer then works to replicate the virus and send it to other computers. Thus,
it is important that computer systems provide tools to support data integrity.
Page 4 of 28
TINC101
Lecture 21
• The previously mentioned tools for protecting the confidentiality of information, denying
access to data to users without appropriate access rights, also help prevent data from
being modified in the first place.
• In addition, there are several tools specifically designed to support integrity, including the
following:
o Backups: the periodic archiving of data. This archiving is done so that data files
can be restored should they ever be altered in an unauthorized or unintended way.
o Checksums: the computation of a function that maps the contents of a file to a
numerical value. A checksum function depends on the entire contents of a file and
is designed in a way that even a small change to the input file (such as flipping a
single bit) is highly likely to result in a different output value. Checksums are like
trip-wires—they are used to detect when a breach to data integrity has occurred.
o Data correcting codes: methods for storing data in such a way that small
changes can be easily detected and automatically corrected. These codes are
typically applied to small units of storage (e.g., at the byte level or memory word
level), but there are also data-correcting codes that can be applied to entire files
as well.
21.1.3 Availability
• Besides confidentiality and integrity, another important property of information security is
availability, which is the property that information is accessible and modifiable in a timely
fashion by those authorized to do so.
• Information that is locked in a cast-iron safe high on a Tibetan mountain and guarded
round the clock by a devoted army of ninjas may be considered safe, but it is not practically
secure from an information security perspective if it takes us weeks or months to reach it.
Indeed, the quality of some information is directly associated with how available it is.
• For example, stock quotes are most useful when they are fresh. Also, imagine the damage
that could be caused if someone stole our credit card and it took weeks before our credit
card company could notify anyone, because its list of stolen numbers was unavailable to
merchants. Thus, as with confidentiality and integrity, computer security researchers and
system designers have developed a number of tools for providing availability, including the
following:
Page 5 of 28
TINC101
Lecture 21
• Because availability is so important, an attacker who otherwise doesn’t care about the
confidentiality or integrity of data may choose to attack its availability. For instance, a thief
who steals lots of credit cards might wish to attack the availability of the list of stolen credit
cards that is maintained and broadcast by a major credit card company. Thus, availability
forms the third leg of support for the vital C.I.A. triad of information security.
Page 6 of 28
TINC101
Lecture 21
a) Application Security
• When security features are introduced in the primary stage of the development process,
that is one it's known as application security. It is very well capable of protecting your
computer system from cyber security threats such as unauthorized access and data
breaches. Furthermore, it can also help your computer system to fight against SQL
breaches and denial of service attacks.
• Some of the major application tools techniques are used for installing the application
security feature, such as software encryption, antivirus, firewall, etc. and these help your
system to build a wall against cyber-attacks.
b) Information Security
• Information security is a type of cyber security that specially focuses on the methodology
and techniques that are built for ensuring computer security. Information security, as a
Process was developed to protect the availability, integrity, and confidentiality of computer
systems from Data thefts, unauthorized access, harm, and destruction. Information
security is commonly known as the CIA triad and this model is used for protecting the
integrity, availability, and confidentiality of organizational data so that productivity is
maintained.
c) Network Security
• Network security as the name suggests is another type of computer security that protects
your computer system from authorized intrusions and access to your computer networks.
It is similar to information security in a way that it also protects the integrity, availability,
and confidentiality of your computer networks. Network security is designed in a way with
a lot of configurations that it performs to its best abilities. it includes the safety of both
software and hardware.
d) Endpoint Security
• Any error that is committed by a human can be easily exploited by hackers or cyber
criminals. End users are facing a huge security risk in any organization. End users become
the victims of Cybercrimes because of their lack of knowledge about IT protection and
policies. Because they lack awareness, they can unknowingly give access to their computer
systems to Cyber criminals.
• So, it is important to understand the comprehensive security policies and procedures so
that you do not fall into the trap of cyber criminals and always stay alert. Awareness
Page 7 of 28
TINC101
Lecture 21
training programs should be arranged for enhancing their knowledge about computer
security and its threats.
e) Internet Security
• Internet security is the most recent type of computer security that has reached a boom
period in recent times. It is a method for creating a perfect set of rules and actions to
prevent any unauthorized use or harm to computer systems that are directly connected to
the internet.
• It is the newest branch of computer security that specifically deals with the risks and
threats that comes with the internet which is enumerated as follows:
• Hacking
• Computer viruses
• Malware
• Denial of service attacks
21.2.2 Importance
Page 8 of 28
TINC101
Lecture 21
Page 9 of 28
TINC101
Lecture 21
Page 10 of 28
TINC101
Lecture 21
Attack Threat
• An attack usually is perpetrated by • A threat can refer to anything that has the
someone with bad intentions on potential to cause serious harm to a
computer and computer networks. computer system.
• They try to destroy, expose, alter, • This can lead to attacks on computer
disable, steal or gain unauthorised systems, organisation networks and
access to or make unauthorised use of cause possible harm.
an asset. • Also known as internal attack.
Page 11 of 28
TINC101
Lecture 21
• Internal Attacks: An internal attack comes from sources that are within an organisation's
networks, such as a disgruntled employee with access privileges who attempts to perform
unauthorised activities. It includes any harmful actions with data that violate at least one of
the fundamental principles of information security (integrity, availability, and confidentiality)
and originate from within a company's information system. User error and ignorance play a
large role in trusted individuals, hence putting networks and systems at risk to outside
agents.
a) Unintentional file sharing, and file sharing programs are often referred to as point to point
programs and are intended to share files, movie, music and many more. Many of these
programs will scan for folders containing media files in a user's hard drive, and share these
folders out to the network. The outside users have not only access to media files but also
other files within the directory that may contain sensitive data. To avoid this problem, the
network connectivity can be controlled at the boundary via firewalls, and proper
configuration control of the end systems can detect installation of unauthorised software.
Implementing a least privileged policy for end-systems can mitigate many risks.
b) Device loss theft: The embarrassing and damaging form of attack is that of property loss.
Most newsworthy breaches involve stolen or lost laptops that contain millions of sensitive
customer records, technical documents or health records. To avoid this issue, full encryption
has gotten the attention and application it deserves. The HDD encryption works by requiring
user name and password to decrypt the hand-drive sectors and start up the operating
system.
External Internal
Page 12 of 28
TINC101
Lecture 21
Some of the threats and attacks that can compromise the network security goals:
i. Eavesdropping: the interception of information intended for someone else during its
transmission over a communication channel. Examples include packet sniffers, which monitor
nearby Internet traffic, such as in a wireless access location. This is an attack on confidentiality.
iv. Masquerading: the fabrication of information that is purported to be from someone who is
not actually the author. Examples of masquerading attacks include phishing, which creates a
web site that looks like a real bank or other e-commerce site, but is intended only for gathering
passwords, and spoofing, which may involve sending on a network data packets that have false
return addresses. Masquerading is an attack on authenticity, and, in the case of phishing, an
attempt to compromise confidentiality and/or anonymity.
v. Repudiation: the denial of a commitment or data receipt. This involves an attempt to back
out of a contract or a protocol that requires the different parties to provide receipts
acknowledging that data has been received. This is an attack on assurance.
vi. Correlation and traceback: the integration of multiple data sources and information flows to
determine the source of a particular data stream or piece of information. This is an attack on
anonymity.
• There are other types of attacks as well, such as military-level attacks meant to break
cryptographic secrets. In addition, there are composite attacks, which combine several of the
above types of attacks into one. But those listed above are among the most common types of
attacks.
Page 13 of 28
TINC101
Lecture 21
21.4 Network Security Issues involving the Users – Roles and Responsibilities
• No matter how advanced the technology is, it will ultimately be deployed in an environment
where humans exist. It is the human element that poses the biggest security challenge. It
is hard to compensate for all of the possible ways that humans can deliberately or
accidentally cause security problems or circumvent our security mechanisms. Despite all of
the technology, despite all of the security procedures we have in place, and despite all of
the security training we may provide, somebody will invariably fail to do what they are
supposed to do, or do something they are not supposed to do, and create a vulnerability
in the organization's security posture.
• Two main network security issues involving users are social engineering and poor security
practices.
21.2.1 Social Engineering
Social engineering is the process of convincing an authorized individual to provide
confidential information or access to an unauthorized individual. It is a technique in which
the attacker uses various deceptive practices to convince the targeted person to divulge
information they normally would not divulge or to convince the target of the attack to do
something they normally wouldn't do. Social engineering is very successful for several
reasons. The first is the basic desire of most people to be helpful. When somebody asks a
question for which we know the answer, our normal response is not to be suspicious but
rather to answer the question. The problem with this is that seemingly innocuous
information can be used either directly in an attack or indirectly to build a bigger picture
that an attacker can use to create an aura of authenticity during an attack—the more
information an individual has about an organization, the easier it will be to convince others
that this person is part of the organization and has a right to even sensitive information.
An attacker who is attempting to exploit the natural tendency of people to be helpful may
take one of several approaches:
o The attacker might simply ask a question, hoping to immediately obtain the desired
information. For basic information that is not considered sensitive, this approach
generally works. As an example, an attacker might call and ask who the IT manager
is.
o The attacker might first attempt to engage the target in conversation and try to evoke
sympathy so that the target feels sorry for the individual and is more prone to provide
the information. For information that is even slightly sensitive in nature, the request
Page 14 of 28
TINC101
Lecture 21
of which could possibly arouse suspicion, this technique may be tried. As an example,
an attacker might call and claim to be under some deadline from a supervisor who is
upset for some reason. The target, feeling sorry for an alleged fellow worker, might
give up the information, thinking they are helping them avoid trouble with the
supervisor.
• Various attacks related to social engineering include phishing, pharming, vishing, spam
and shoulder surfing.
Page 15 of 28
TINC101
Lecture 21
Page 16 of 28
TINC101
Lecture 21
uses all of the center numbers on a standard numeric pad on a telephone. Attackers
know this, and guessing PINs follows the same sort of process that guessing a
password does.
Password selection is an individual activity, and ensuring that individuals are
making good selections is the realm of the entity's password policy. In order for users
make appropriate choices, they need to be aware of the issue and their personal role
in securing accounts. An effective password policy conveys both the user's role and
responsibility associated with password usage and does so in a simple enough manner
that it can be conveyed via screen notes during mandated password change events.
Security Awareness
• Probably the single most effective method to counter potential social engineering attacks,
after establishment of the organization's security goals and policies, is an active security
awareness program. The extent of the training will vary depending on the organization's
environment and the level of threat, but initial employee training on social engineering at the
time a person is hired is important, as well as periodic refresher training.
• An important element that should be stressed in training about social engineering is the type
of information that the organization considers sensitive and may be the target of a social
engineering attack. There are undoubtedly signs that the organization could point to as
indicative of an attacker attempting to gain access to sensitive corporate information. All
employees should be aware of these indicators. The scope of information that an attacker
may ask for is very large, and many questions attackers pose might also be legitimate in
another context (asking for someone's phone number, for example). Employees should be
taught to be cautious about revealing personal information and should especially be alert for
questions regarding account information, personally identifiable information, or passwords.
Page 17 of 28
TINC101
Lecture 21
Page 18 of 28
TINC101
Lecture 21
faced with a questionable situation, will not hesitate to call the security office. In situations
like this, security offices should remember the old adage of "don't shoot the messenger."
21.4.1 10 Principles
• Limiting an object's privileges limits the amount of harm that can be caused, thus limiting an
organization's exposure to damage. Users may have access to the files on their workstations
and a select set of files on a file server, but no access to critical data that is held within the
Page 19 of 28
TINC101
Lecture 21
database. This rule helps an organization protect its most sensitive resources and helps ensure
that whoever is interacting with these resources has a valid reason to do so.
• The security concept of least privilege is not unique to computer security. It has been practiced
by organizations such as financial institutions and governments for centuries. Basically it
simply means that individuals are given only the absolute minimum of privileges that are
required to accomplish their assigned job. Examine the security policies that your organization
has in place and see if you can identify examples of where the principle of least privilege has
been used.
• The concept of least privilege applies to more network security issues than just providing users
with specific rights and permissions. When trust relationships are created, they should not be
implemented in such a way that everyone trusts each other simply because it is easier. One
domain should trust another for very specific reasons, and the implementers should have a
full understanding of what the trust relationship allows between two domains. If one domain
trusts another, do all of the users automatically become trusted, and can they thus easily
access any and all resources on the other domain? Is this a good idea? Is there a more secure
way of providing the same functionality? If a trusted relationship is implemented such that
users in one group can access a plotter or printer that is available on only one domain, it might
make sense to simply purchase another plotter so that other, more valuable or sensitive
resources are not accessible by the entire group.
• Another issue that falls under the least privilege concept is the security context in which an
application runs. All applications, scripts, and batch files run in the security context of a specific
user on an operating system. They execute with specific permissions as if they were a user.
The application may be Microsoft Word and run in the space of a regular user, or it may be a
diagnostic program that needs access to more sensitive system files and so must run under
an administrative user account, or it may be a program that performs backups and so should
operate within the security context of a backup operator. The crux of this issue is that a
program should execute only in the security context that is needed for that program to perform
its duties successfully. In many environments, people do not really understand how to make
programs run under different security contexts, or it may just seem easier to have all programs
run under the administrator account. If attackers can compromise a program or service
running under the administrator account, they have effectively elevated their access level and
have much more control over the system and many more ways to cause damage.
Page 20 of 28
TINC101
Lecture 21
• Protection mechanisms can be employed to grant access based on a variety of factors. One
of the key principles is to base decisions on more than a single piece of information. The
principle of separation of privilege states that the protection mechanism should be constructed
so that it uses more than one piece of information to make access decisions. Applying this
principle to the people side of the security function results in the concept of separation of
duties.
• While separation of duties provides a certain level of checks and balances, it is not without its
own drawbacks. Chief among these is the cost required to accomplish the task. This cost is
manifested in both time and money. More than one individual is required when a single person
could accomplish the task, thus potentially increasing the cost of the task. In addition, with
more than one individual involved, a certain delay can be expected because the task must
proceed through its various steps.
• The principle of open design holds that the protection of an object should not rely upon secrecy
of the protection mechanism itself. This principle has been long proven in cryptographic circles,
where hiding the algorithm ultimately fails and the true protection relies upon the secrecy and
complexity of the keys. The principle does not exclude the idea of using secrecy, but merely
states that, on the face of it, secrecy of mechanism is not sufficient for protection.
• Another concept in security that should be discussed in this context is the idea of security
through obscurity. In this case, security is considered effective if the environment and
protection mechanisms are confusing or thought to be not generally known. Security through
obscurity uses the approach of protecting something by hiding it. Non-computer examples of
Page 21 of 28
TINC101
Lecture 21
this concept include hiding your briefcase or purse if you leave it in the car so that it is not in
plain view, hiding a house key under a doormat or in a planter, and pushing your favourite ice
cream to the back of the freezer so that everyone else thinks it is all gone. The idea is that if
something is out of sight, it is out of mind. This approach, however, does not provide actual
protection of the object. Someone can still steal the purse by breaking into the car, lift the
doormat and find the key, or dig through the items in the freezer to find your favourite ice
cream. Security through obscurity may make someone work a little harder to accomplish a
task, but it does not prevent anyone from eventually succeeding.
• Similar approaches are seen in computer and network security when attempting to hide certain
objects. A network administrator may, for instance, move a service from its default port to a
different port so that others will not know how to access it as easily, or a firewall may be
configured to hide specific information about the internal network in the hope that potential
attackers will not obtain the information for use in an attack on the network.
• In most security circles, security through obscurity is considered a poor approach, especially
if it is the only approach to security. Security through obscurity simply attempts to hide an
object; it doesn't implement a security control to protect it. An organization can use security
through obscurity measures to try to hide critical assets, but other security measures should
also be employed to provide a higher level of protection. For example, if an administrator
moves a service from its default port to a more obscure port, an attacker can still actually find
this service; thus, a firewall should be used to restrict access to the service. Most people know
that even if you do shove your ice cream to the back of the freezer, someone may eventually
find it.
• The terms security and complexity are often at odds with each other, because the more
complex something is, the harder it is to understand, and you cannot truly secure something
if you do not understand it. Another reason complexity is a problem within security is that it
usually allows too many opportunities for something to go wrong. If an application has 4000
lines of code, there are a lot fewer places for buffer overflows, for example, then in an
application of two million lines of code. The principle of economy of mechanism is described
as always using simple solutions when available.
• An example of the principle concerns the number of services that you allow your system to
run. Default installations of computer operating systems often leave many services running.
Page 22 of 28
TINC101
Lecture 21
The keep-it-simple principle tells us to eliminate or disable those services we don't need. This
is also a good idea from a security standpoint because it results in fewer applications that can
be exploited and fewer services that the administrator is responsible for securing. The general
rule of thumb is to eliminate or disable all nonessential services and protocols. Ideally, you
should know what your computer system or network is being used for, and thus you should
be able to identify and activate only those elements that are essential. For a variety of reasons,
this is not as easy as it sounds. Alternatively, a stringent security approach that one can take
is to assume that no service is necessary and activate services and ports only as they are
requested. Whatever approach is taken, there is a never-ending struggle to try to strike a
balance between providing functionality and maintaining security.
v) Fail-safe Defaults
• Today, the Internet is no longer the friendly playground of researchers that it once was. This
has resulted in different approaches that might at first seem less than friendly but that are
required for security purposes. Fail-safe defaults is the concept that when something fails, it
should do so to a safe state. One approach is that a protection mechanism should deny access
by default and should grant access only when explicit permission exists. This is sometimes
called default deny, and the common operational term for this approach is implicit deny.
• Frequently in the network world, administrators make many decisions concerning network
access. Often a series of rules will be used to determine whether or not to allow access (which
is the purpose of a network firewall). If a particular situation is not covered by any of the other
rules, the implicit deny approach states that access should not be granted. In other words, if
no rule would allow access, then access should not be granted. Implicit deny applies to
situations involving both authorization and access.
• One of the fundamental tenets of a protection system is to check all access requests for
permission. Each and every time a subject requests access to an object, the permission must
be checked; otherwise, an attacker might gain unauthorized access to an object. Complete
mediation refers to the concept that each and every request should be verified. When
permissions are verified the first time, and the result is cached for subsequent use,
performance may be increased, but this also opens the door to permission errors. Should a
permission change subsequent to the first use, this change would not be applied to the
operations after the initial check.
Page 23 of 28
TINC101
Lecture 21
• Complete mediation also refers to ensuring that all operations go through the protection
mechanism. When security controls are added after the fact, it is important to make certain
that all process flows are covered by the controls, including exceptions and out-of-band
requests. If an automated process is checked in one manner, but a manual paper backup
process has a separate path, it is important to ensure all checks are still in place. When a
system undergoes disaster recovery or business continuity processes, or backup and/or
restore processes, these too require complete mediation.
• The principle of least common mechanism states that mechanisms used to access resources
should be dedicated and not shared. Sharing of mechanisms allows a potential 50 cross-over
between channels, resulting in a protection failure mode. For example, if there is a module
that enables employees to check their payroll information, a separate module should be
employed to change the information, lest a user gain access to change versus read access.
Although sharing and reuse are good in one sense, they can represent a security risk in
another.
• Common examples of the least common mechanism and its isolation principle abound in
ordinary systems. Sandboxing is a means of separating the operation of an application from
the rest of the operating system. Virtual machines perform the same task between operating
systems on a single piece of hardware. Instantiating shared libraries, in which separate
instantiation of local classes enables separate but equal coding, is yet another. The key is to
provide a means of isolation between processes so information cannot flow between separate
users unless specifically designed to do so.
• Psychological acceptability refers to the users’ acceptance of security measures. Another name
for psychological acceptability is least astonishment, referring to the role that security
measures should play with respect to usability. Users play a key role in the operation of a
system, and if security measures are perceived to be an impediment to the work a user is
responsible for, then a natural consequence may be that the user bypasses the control.
Although a user may understand that this could result in a security problem, the perception
that it does result in their performance failure will present pressure to bypass it.
Page 24 of 28
TINC101
Lecture 21
x) Compromise Recording
• Finally, this principle states that sometimes it is more desirable to record the details of an
intrusion than to adopt more sophisticated measures to prevent it. Internet-connected
surveillance cameras are a typical example of an effective compromise record system that can
be deployed to protect a building in lieu of reinforcing doors and windows. The servers in an
office network may maintain logs for all accesses to files, all emails sent and received, and all
web browsing sessions. Again, the compromise recording principle does not hold as strongly
on computer systems, since it may be difficult to detect intrusion and adept attackers may be
able to remove their tracks on the compromised machine (e.g., by deleting log entries).
Page 25 of 28
TINC101
Lecture 21
Collectively, these documents provide the guidance needed to determine how security will be
implemented in the organization. Given this guidance, the specific technology and security
mechanisms required can be planned for.
• Policies are high-level, broad statements of what the organization wants to accomplish. They
are made by management when laying out the organization's position on some issue.
• Standards are mandatory elements regarding the implementation of a policy. They are
accepted specifications that provide specific details on how a policy is to be enforced. Some
standards are externally driven. Regulations for banking and financial institutions, for example,
require certain security measures be taken by law. Other standards may be set by the
organization to meet its own security goals.
• Guidelines are recommendations relating to a policy. The key term in this case is
recommendations—guidelines are not mandatory steps.
• Just as the network itself constantly changes, the policies, procedures, standards, and
guidelines should be living documents that are periodically evaluated and changed as
necessary. The constant monitoring of the network and the periodic review of the relevant
documents are part of the process that is the operational model. When applied to policies,
this process results in what is known as the policy lifecycle. This operational process and policy
lifecycle roughly consist of four steps in relation to your security policies and solutions:
1. Plan (adjust) for security in your organization.
2. Implement the plans.
3. Monitor the implementation.
4. Evaluate the effectiveness.
• In the first step, you develop the policies, procedures, and guidelines that will be implemented
and design the security components that will protect your network. A variety of governing
instruments—from standards to compliance rules—will provide boundaries for these
documents. Once these documents are designed and developed, you can implement the plans.
Part of the implementation of any policy, procedure, or guideline is an instruction period during
Page 26 of 28
TINC101
Lecture 21
which those who will be affected by the change or introduction of this new document can
learn about its contents. Next, you monitor to ensure that both the hardware and the software,
as well as the policies, procedures, and guidelines, are effective in securing your systems.
Finally, you evaluate the effectiveness of the security measures you have in place. This step
may include a vulnerability assessment (an attempt to identify and prioritize the list of
vulnerabilities within a system or network) and a penetration test (a method to check the
security of a system by simulating an attack by a malicious individual) of your system to ensure
the security is adequate. After evaluating your security posture, you begin again with Step 1,
this time adjusting the security mechanisms you have in place, and then continue with this
cyclical process.
• Regarding security, every organization should have several common policies in place (in
addition to those already discussed relative to access control methods). These include, but
are not limited to, security policies regarding change management, classification of
information, acceptable use, due care and due diligence, due process, need to know, disposal
and destruction of data, service level agreements, human resources issues, codes of ethics,
and policies governing incident response.
o Security Policies
In keeping with the high-level nature of policies, the security policy is a high-level
statement produced by senior management that outlines both what security means to
the organization and the organization's goals for security. The main security policy can
then be broken down into additional policies that cover specific topics. Statements such
as "this organization will exercise the principle of least access in its handling of client
information" would be an example of a security policy. The security policy can also
describe how security is to be handled from an organizational point of view (such as
describing which office and corporate officer or manager oversees the organization's
security program).
o Data Policies
System integration with third parties frequently involves the sharing of data. Data can
be shared for the purpose of processing or storage. Control over data is a significant
issue in third-party relationships. Numerous questions need to be addressed. For
example, the question of who owns the data—both the data shared with third parties
and subsequent data developed as part of the relationship—is an issue that needs to
be established.
Page 27 of 28
TINC101
Lecture 21
A key component of IT security is the protection of the information processed and stored
on the computer systems and network. Organizations deal with many different types of
information, and they need to recognize that not all information is of equal importance
or sensitivity. This requires classification of information into various categories, each
with its own requirements for its handling. Factors that affect the classification of
specific information include its value to the organization (what will be the impact to the
organization if this information is lost?), its age, and laws or regulations that govern its
protection. The most widely known system of classification of information is the one
implemented by the U.S. government (including the military), which classifies
information into categories such as Confidential, Secret, and Top Secret. Businesses
have similar desires to protect information and often use categories such as Publicly
Releasable, Proprietary, Company Confidential, and For Internal Use Only. Each policy
for the classification of information should describe how it should be protected, who
may have access to it, who has the authority to release it (and how), and how it should
be destroyed. All employees of the organization should be trained in the procedures for
handling the information they are authorized to access.
REFERENCES
Ciampa, M. D., & Computing Technology Industry Association. (2018). CompTIA Security+ Guide
to Network Security Fundamentals (7th ed.). Boston [Mass.] Cengage Learning.
Goodrich, M. T., & Tamassia, R. (2014). Introduction to computer security. Pearson Education
Limited.
Morley, D. & Parker, C.S. (2017). Understanding Computers: Today and Tomorrow:
Comprehensive (16th Ed.). Cengage Learning. ISBN: 9781305656314.
Stallings, W., & Brown, L. (2018). Computer Security : Principles and Practice (4th ed.). Pearson
Education.
Page 28 of 28