Itsp 3C Lesson Summary 1 5
Itsp 3C Lesson Summary 1 5
What is Information Security? Confidentiality, integrity and availability, also known as the CIA triad, are at the
heart of information security. That said, there is a debate about whether or not
Information security or infosec is concerned with protecting information from the CIA triad sufficiently addresses the rapidly changing technology and business
unauthorized access. It's part of information risk management and involves requirements, as well as the relationship between security and privacy. Other
preventing or reducing the probability of unauthorized access, use, disclosure, principles such as accountability have been proposed and non-repudiation does
disruption, deletion, corruption, modification, inspect, or recording. not fit in well with the three core concepts.
If a security incident does occur, information security professionals are involved What is confidentiality?
with reducing the negative impact of the incident.
Confidentiality is about not making information available or disclosed to
While the primary focus of any information security program is protecting the unauthorized individuals, entities or processes. While similar to privacy the words
confidentiality, integrity and availability (the CIA triad) of information, should not be used interchangeably.
maintaining organizational productivity is often an important consideration
What is integrity?
This has led the information security industry to specific best-practice standards
in the following areas: Integrity or data integrity is concerned with the maintenance, assurance,
accuracy and completeness of data over its entire lifecycle. This means
implementing security controls that ensure data cannot be modified or deleted by
Information security policies, an unauthorized person or in an undetected manner.
Password strength
What is availability?
Access controls
Multi-factor authentication For any information system to be useful, it must be available when needed. This
Antivirus software, firewalls means computer systems that store and process information, the security
controls that protect it, and the communication channels that access it must
Cryptography
function on demand.
Legal liability
Security awareness What is non-repudiation?
Information security is achieved through a structured risk management Non-repudiation is a term borrowed from law that implies one's intention to fulfill
process that: their obligations in a contract and that one party cannot deny having received or
having sent a transaction.
• Identifies information, related assets and the threats, vulnerability and
impact of unauthorized access What is a threat?
• Evaluates risks
A threat is anything (incidental or deliberate) that could cause potential harm,
• Makes decisions about how to address or treat risks i.e. avoid,
loss or exposure to an information asset.
mitigate, share or accept
• When mitigated, selects, designs and implements security controls What is a vulnerability?
• Monitors activities and makes adjustments to address any new
A vulnerability is a weakness or exploit that could cause harm, loss or exposure
issues, changes, or improvements
to an information asset.
Types of InfoSec
What is risk?
Application security
Application security is a broad topic that covers software vulnerabilities in web
Risk is the likelihood that an event could cause harm, loss or exposure to an
and mobile applications and application programming interfaces (APIs). These
information asset.
vulnerabilities may be found in authentication or authorization of users, integrity
of code and configurations, and mature policies and procedures.
Cloud security
Cloud security focuses on building and hosting secure applications in cloud
environments and securely consuming third-party cloud applications. “Cloud”
simply means that the application is running in a shared environment.
Cryptography
Encrypting data in transit and data at rest helps ensure data confidentiality and
integrity. Digital signatures are commonly used in cryptography to validate the
authenticity of data. Cryptography and encryption has become increasingly
important.
Infrastructure security
Infrastructure security deals with the protection of internal and extranet networks,
labs, data centers, servers, desktops, and mobile devices.
Incident response
Incident response is the function that monitors for and investigates potentially
malicious behavior.
In preparation for breaches, IT staff should have an incident response plan for
containing the threat and restoring the network. In addition, the plan should
create a system to preserve evidence for forensic analysis and potential
prosecution. This data can help prevent further breaches and help staff discover
the attacker.
Vulnerability management
Threats can come in many forms including software attacks, identity theft,
sabotage, physical theft and information extortion:
Ransomware attacks
Ransomware attacks involve hacking into a user’s data and preventing them
from accessing it until a ransom amount is paid. Ransomware attacks are critical
for individual users but more so for businesses who can’t access the data for
running their daily operations.
2. IOT ATTACKS
IOT Attacks
IoT devices are computing, digital, and mechanical devices that can
autonomously transmit data over a network. Examples of IoT devices include
desktops, laptops, mobile phones, smart security devices, etc. As the adoption of
IoT devices is increasing at an unprecedented rate, so are the challenges of
Cyber Security. Attacking IoT devices can result in the compromise of sensitive
user data. Safeguarding IoT devices is one of the biggest challenges in Cyber
Security, as gaining access to these devices can open the doors for other
malicious attacks.
3. CLOUD ATTACKS
Cloud attacks
Most of us today use cloud services for personal and professional needs. Also,
hacking cloud-platforms to steal user data is one of the challenges in Cyber
Security for businesses. We are all aware of the infamous iCloud hack, which
exposed private photos of celebrities. If such an attack is carried out on
enterprise data, it could pose a massive threat to the organization and maybe
even lead to its collapse.
4. PHISHING ATTACKS
Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers. Unlike ransomware attacks,
the hacker, upon gaining access to confidential user data, doesn’t block it.
Instead, they use it for their own advantages, such as online shopping and illegal
Lesson Proper for Week 3 • A trojan is a program that cannot reproduce itself but masquerades as
something the user wants and tricks them into activating it so it can do its
Threats to Information Security damage and spread.
1. Infection Methods • A rootkit is, as described by TechTarget, "a program or, more often, a
2. Malware Actions collection of software tools that gives a threat actor remote access to and
control over a computer or other system." It gets its name because it's a kit
Malware on the basis of Infection Method are following: of tools that (generally illicitly) gain root access (administrator-level control,
in Unix terms) over the target system, and use that power to hide their
presence.
Virus – They have the ability to replicate themselves by hooking them to the
program on the host computer like songs, videos etc and then they travel all over
the Internet.
• Adware is malware that forces your browser to redirect to web
advertisements, which often themselves seek to download further, even
more malicious software. As The New York Times notes, adware often
Worms – Worms are also self replicating in nature but they don’t hook
piggybacks onto tempting "free" programs like games or browser
themselves to the program on host computer. Biggest difference between virus
extensions.
and worms is that worms are network aware. They can easily travel from one
computer to another if network is available and on the target machine they will
not do much harm, they will for example consume hard disk space thus slowing
• Ransomware is a flavor of malware that encrypts your hard drive's files
down the computer. and demands a payment, usually in Bitcoin, in exchange for the decryption
key. Several high-profile malware outbreaks of the last few years, such as
Petya, are ransomware. Without the decryption key, it's mathematically
Trojan – The Concept of Trojan is completely different from the viruses and
impossible for victims to regain access to their files. So-called scareware is
worms. The name Trojan derived from the ‘Trojan Horse’ tale in Greek
a sort of shadow version of ransomware; it claims to have taken control of
mythology.
your computer and demands a ransom, but actually is just using tricks like
browser redirect loops to make it seem as if it's done more damage than it
Their purpose is to conceal themselves inside the software that seem legitimate
really has, and unlike ransomware can be relatively easily disabled.
and when that software is executed they will do their task of either stealing
information or any other purpose for which they are designed.
• Cryptojacking is another way attackers can force you to supply them with
Bitcoin—only it works without you necessarily knowing. The crypto mining
Bots –: can be seen as advanced form of worms. They are automated processes
malware infects your computer and uses your CPU cycles to mine Bitcoin
that are designed to interact over the internet without the need of human
for your attacker's profit. The mining software may run in the background
interaction. They can be good or bad. Malicious bot can infect one host and after
on your operating system or even as JavaScript in a browser window.
infecting will create connection to the central server which will provide commands
to all infected hosts attached to that network called Botnet.
• Malvertising is the use of legitimate ads or ad networks to covertly deliver
Malware on the basis of Actions: malware to unsuspecting users’ computers. For example, a cybercriminal
might pay to place an ad on a legitimate website. When a user clicks on the
Adware – Adware is not exactly malicious but they do breach privacy of the ad, code in the ad either redirects them to a malicious website or installs
users. They display ads on computer’s desktop or inside individual programs. malware on their computer. In some cases, the malware embedded in an
They come attached with free to use software, thus main source of revenue for ad might execute automatically without any action from the user, a
such developers. They monitor your interests and display relevant ads. An
attacker can embed malicious code inside the software and adware can monitor Malware examples
your system activities and can even compromise your machine We've already discussed some of the current malware threats looming large
today. But there is a long, storied history of malware, dating back to infected
Spyware – It is a program or we can say a software that monitors your activities floppy disks swapped by Apple II hobbyists in the 1980s and the Morris Worm
on computer and reveal collected information to interested party. Spyware are spreading across Unix machines in 1988. Some of the other high-profile
generally dropped by Trojans, viruses or worms. Once dropped they installs malware attacks have included:
themselves and sits silently to avoid detection.
• ILOVEYOU, a worm that spread like wildfire in 2000 and did more than $15
Ransomware – It is type of malware that will either encrypt your files or will lock billion in damage
your computer making it inaccessible either partially or wholly. Then a screen will
be displayed asking for money i.e. ransom in exchange. • SQL Slammer, which ground internet traffic to a halt within minutes of its
first rapid spread in 2003
Scareware – It masquerades as a tool to help fix your system but when the
software is executed it will infect your system or completely destroy it. The
software will display a message to frighten you and force to take some action like
• Conficker, a worm that exploited unpatched flaws in Windows and
pay them to fix your system. leveraged a variety of attack vectors – from injecting malicious code to
phishing emails – to ultimately crack passwords and hijack Windows
devices into a botnet.
Rootkits – are designed to gain root access or we can say administrative
privileges in the user system. Once gained the root access, the exploiter can do
anything from stealing private files to private data. • Zeus, a late '00s keylogger Trojan that targeted banking information
Lesson Proper for Week 4 worldwide but only did real damage in one place: the Iranian nuclear facility
at Natanz, where it destroyed uranium-enriching centrifuges, the mission it
Malware definition was built for by U.S. and Israeli intelligence agencies
Malware, short for malicious software, is a blanket term for viruses, worms,
trojans and other harmful computer programs hackers use to wreak destruction
and gain access to sensitive information. As Microsoft puts it, "[malware] is a
catch-all term to refer to any software designed to cause damage to a single Cryptomining attacks decline
computer, server, or computer network." In other words, software is identified as The Malwarebyte Labs report has seen a shift away from cryptomining starting in
malware based on its intended use, rather than a particular technique or the second quarter of 2018, due largely to the decline in cryptocurrency values.
technology used to build it. Still, the number of cryptomining detections increased for the year by 7 percent.
This means that the question of, say, what the difference is between malware Instead, cyber criminals are turning to information stealing malware like Emotet
and a virus misses the point a bit: a virus is a type of malware, so all viruses are to turn a profit. “Overall, it seems as though criminals have reached the
malware (but not every piece of malware is a virus). consensus that sometimes stealing is better than mining,” the report stated.
3- Secure Networks and Systems: So now we're at the biggest question of all: "How do I make sure my computer or
This layer of security is very widespread, which includes all measures, network is malware-free?"
equipment, etc., which cause the security of the system and the network to be
integrated,m and prevent any threatening factors from entering your system, and The answer has two parts: Personal vigilance, and protective tools. One of the
ultimately provide security for you. most popular ways to spread malware is by email, which may be disguised to
look as if it is from a familiar company such as a bank, or a personal email from a
Network security has 3 types, which we are going to discuss in the friend.
following.
Be wary of emails that ask you to provide passwords. Or emails that seem to be
· Physical Network Security: from friends, but have only a message such as "check out this cool website!"
This type of network security control is to protect information and prevent illegal followed by a link.
access to the system.
Personal vigilance is the first layer of protection against malware, but simply
· Technical Network Security: being careful is not enough. Because business security is not perfect, even
downloads from legitimate sites can sometimes have malware attached. Which
This type is so important and protects all the data that is in the computer,
means that even the most prudent user is at risk, unless you take additional
including the one that is being transferred from the computer or the data that is
measures.
entering the computer, in order to establish the security of this layer, you must
pay attention to many points.
What is Malware Protection?
· Administrative Network Security: Malware security protection provides that second vital layer of protection for your
As you know, the behaviors of users who have access to information, cannot be computer or network. A robust antivirus software package is the primary
controlled, and you must provide facilities in advance, so that you can prevent component of technological defenses that every personal and business computer
any event that affects the security structure of the network, one of the things that system should have.
can be done in this section, is restricting people's access to all information, which
is an effective way to prevent a series of unfortunate events. Well-designed antivirus protection has several characteristics. It checks any
newly downloaded program to ensure that it is malware-free. It periodically scans
In general, in this layer of security , you can do the following: the computer to detect and defeat any malware that might have slipped through.
· Network Access Control It is regularly updated to recognize the latest threats.
· Antivirus and Antimalware Software
· Firewall Protection Good antivirus protection can also recognize — and warn against — even
· Virtual Private Networks previously unknown malware threats, based on technical features (such as
attempting to "hide" on a computer) that are characteristic of malware. In
4- Vulnerability Programs: addition, robust antivirus software detects and warns against suspicious
Despite the spread of cyber attacks and loss of information which they cause, websites, especially those that may be designed for "phishing" (a technique that
and the daily progress of hackers, security layers have received more attention tricks users into entering passwords or account numbers).
from users, and they try to study and search in this field to have control over
each layer and implement all the necessary strategies to protect their Finally, malware protection needs to be usable. Effective antivirus software must
information, hackers are constantly scrutinizing the weaknesses of a system and be simple to download and install, so you don't need to be a Ph.D. in computer
use these weak points to attack the system and its information, so they get their science in order to use it. Look for antivirus software solutions that have the
desired results through them. characteristics outlined above — and follow through by installing it.
In this layer of security, you must pay more attention to the vulnerabilities of a
Robust malware protection specifically guards your finances. These tools
system, all of these weak points have to be identified through various tools, then
safeguard your account information, and can also provide passwordmanagement
you should try to do your best to solve the problem because that weak points
tools so that frustration over forgotten passwords does not lead you to skip over
must be strengthened in order to increase security in general, so you can
this essential component of protection.
improve your system security by paying attention to all points.
No protection is absolute. But a combination of personal awareness and
5- Strong Access Control Measures: welldesigned protective tools will make your computer as safe as it can be.
This layer of security has a great impact on establishing security in general, and
all the actions that are taken in this layer, ultimately, are aimed at controlling Workspace security
people's access to information, to achieve this goal, various solutions can be
taken, including the solution of setting passwords which are hard to be guessed, Each group you add to a workspace can have vastly different permissions than
which should include more than 8 characters, so it is hard for people to guess others. You can also copy an existing group’s permissions to save time on
this password, as a result they cannot access your information easily. configuring them.
This layer of security contains the following 3 types:
· Discretionary Access Control (DAC) · Limit access to your workspace
Managed Access Control (MAC)
· Role-Based Access Control (RBAC) Slack allows for transparency, and sometimes that means sharing proprietary
information or sensitive details. Here are some tips to ensure only the right
6- Protect and Backup Data: people have access to information in your workspace:
This layer of security helps you to have no worries about the stored information,
and it is constantly recommended in this layer to provide backup information, so
that in case of unexpected events, your information won’t be damaged and will
be protected as much as possible, there are a number of ways you can get help
Only invite people you know
from them in order to implement this layer properly, including keeping information For total control, keep the default setting to only let Workspace Owners
in a safe place other than the current information system that helps you maintain and Admins send invitations to new members. If you do allow others to
your information safe. It should be noted that it is necessary to establish the send invites, review pending and accepted invitations periodically.
security for the information from which you have made a backup.
Deactivate members’ accounts who no longer need access
7- Monitor and Test Your Systems:
Change is constant, and people come and go. Don’t forget to deactivate a
In this layer, you should review all the actions you have taken and examine all
member’s account when they leave. Workspace Owners on the Business+ and
the aspects, so that you can identify the possible dangers that threaten your
Enterprise Grid plans can streamline deactivation with an identity provider
information and system, in general, the system monitoring process helps you
using SCIM provisioning.
Add people from other companies to a channel Maintain a reasonable climate within the room: A good rule of thumb is that if
To work with external partners who don’t need access to all the information in people are comfortable, then equipment is usually comfortable--but even if
your workspace, you can use Slack Connect to invite them to channels. This lets people have gone home for the night, room temperature and humidity cannot be
you collaborate securely and productively in one centralized place, all from your allowed to reach extremes (i.e., it should be kept betwessl
own workspaces. en 50 and 80 degrees Fahrenheit and 20 and 80 percent humidity). Note that it's
Use guest accounts and limit the channels they're invited to Some not freezing temperatures that damage disks, but the condensation that forms
members of your Slack workspace (like contractors, interns, or clients) may when they thaw out.
only need access to certain channels. Guest accounts are a great way to Be particularly careful with non-essential materials in a secure computer room:
manage who has access to the information they need in your workspace. Technically, this guideline should read "no eating, drinking, or smoking near
Manage email display computers," but it is quite probably impossible to convince staff to implement
Members can find each others' email addresses in their profiles, but some people such a regulation. Other non-essential materials that can cause problems in a
may prefer to keep this info private. Workspace Owners and Admins can choose secure environment and, therefore, should be eliminated include curtains,
if members’ email addresses are displayed in their Slack profiles. reams of paper, and other flammables.
Guard Equipment:
Workspace permissions
Keep critical systems separate from general systems: Prioritize equipment
workspace permissions into five categories based on its criticality and its role in processing sensitive information. Store it in
secured areas based on those priorities.
· Object security House computer equipment wisely: Equipment should not be able to be seen or
· Tab visibility reached from window and door openings, nor should it be housed near radiators,
· Browsers heating vents, air conditioners, or other duct work. Workstations that do not
· Mass operations routinely display sensitive information should always be stored in open, visible
· Admin operations spaces to prevent covert use.
Protect cabling, plugs, and other wires from foot traffic: Tripping over loose wires
is dangerous to both personnel and equipment.
Object security Keep a record of your equipment: Maintain up-to-date logs of equipment
manufacturers, models, and serial numbers in a secure location. Be sure to
workspace objects with their related item-level permissions. Item-level rights include a list of all attached peripheral equipment. Consider videotaping the
include: equipment (including close-up shots) as well. Such clear evidence of ownership
can be helpful when dealing with insurance companies.
· None - denies users access to the object. Maintain and repair equipment: Have plans in place for emergency repair of
· View - view the object. This is the lowest level object permission. critical equipment. Either have a technician who is trained to do repairs on staff
· Edit - edit and view the object. or make arrangements with someone who has ready access to the site when
· Delete - delete, edit, and view the object. repair work is needed. If funds allow, consider setting up maintenance
· Add - add new objects. This icon turns blue when the setting is unsaved; contracts for your critical equipment. Local computer suppliers often offer
once you click Save, the blue icon becomes grey. service contracts for equipment they sell, and many workstation and mainframe
· Edit Security - grants users the ability to edit the security of objects. vendors also provide such services. Once you've set up the contract, be sure
that contact information is kept readily available. Technical support telephone
Tab visibility numbers, maintenance contract numbers, customer identification numbers,
Tab Visibility lists all parent and child tabs to which you can grant groups access. equipment serial numbers, and mail-in information should be posted or kept in a
Combine object security permissions and tab visibility access to give users the log book near the system for easy reference. Remember that computer repair
tools they need to complete their tasks. Select a tab to make it visible for a technicians may be in a position to access your confidential information, so
group. make sure that they know and follow your policies regarding outside employees
and contractors who access your system.
Mass operations
In the Mass Operations section, you control which types of mass action rights the
group can access. This section also lists any custom mass operations that you Rebuff Theft:
have added to Relativity or that are available in applications currently installed in
your environment. Identify your equipment as yours in an overt way: Mark your equipment in an
obvious, permanent, and easily identifiable way. Use bright (even fluorescent)
paint on keyboards, monitor backs and sides, and computer bodies. It may
Browsers
decrease the resale value of the components, but thieves cannot remove these
In the Browsers section, you control which browsers are visible to a group. Select
types of identifiers as easily as they can adhesive labels.
a browser type to make it visible for the group.
Losing a computer to theft has both financial costs (the replacement
Admin operations value of the equipment) and information costs (the files contained on the hard
You can secure several admin operations separately. To assign permissions to a drive).
group, select checkboxes for any combination of these operations.
Identify your equipment as yours in a covert way: Label the inside of equipment
Physical Security with the organization's name and contact information to serve as powerful
Most people think about locks, bars, alarms, and uniformed guards when they evidence of ownership.
think about security. While these countermeasures are by no means the only
precautions that need to be considered when trying to secure an information Make unauthorized tampering with equipment difficult: Replace regular body
system, they are a perfectly logical place to begin. case screws with Allen-type screws or comparable devices that require a special
Physical security is a vital part of any security plan and is fundamental to all tool (e.g., an Allen wrench) to open them.
security efforts--without it, information security software security, user access
security and network security are considerably more difficult, if not impossible, to Limit and monitor access to equipment areas: Keep an up-to-date list of
initiate. Physical security refers to the protection of building sites and equipment personnel authorized to access sensitive areas. Never allow equipment to be
(and all information and software contained therein) from theft, vandalism, moved or serviced unless the task is pre-authorized and the service personnel
natural disaster, manmade catastrophes, and accidental damage (e.g., from can produce an authentic work order and verify who they are. Require picture or
electrical surges, extreme temperatures, and spilled coffee). It requires solid other forms of identification if necessary. Logs of all such activity should be
building construction, suitable emergency preparedness, reliable power supplies, maintained. Staff should be trained to always err on the cautious side (and the
adequate climate control, and appropriate protection from intruders. organization must support such caution even when it proves to be inconvenient).
Create a Secure Environment: Building and Room Construction Laptops and other expensive equipment that leave the office often never
return.
· Don't arouse unnecessary interest in your critical facilities: A secure room
should have "low" visibility (e.g., there should not be signs in front of the building something you should do (icon)
and scattered throughout the hallways announcing "expensive equipment and
sensitive information this way"). Attend to Portable Equipment and Computers:
· Select only those countermeasures that meet percuived needs as · Never leave a laptop computer unattended: Small, expensive things often
indentified during risk assessment and support security policy. disappear very quickly--even more quickly from public places and vehicles!
· Maximize structural protection: A secure room should have full height walls Store laptop computers wisely: Secure laptops in a hotel safe rather than a hotel
and fireproof ceilings. room, in a hotel room rather than a car, and in a car trunk rather than the back
seat.
· Minimize external access (doors): A secure room should only have one or Stow laptop computers appropriately: Just because a car trunk is safer than its
two doors--they should be solid, fireproof, lockable, and observable by assigned back seat doesn't mean that the laptop won't be damaged by an unsecured tire
security staff. Doors to the secure room should never be propped open. jack. Even if the machine isn't stolen, it can be ruined all the same. Stow the
laptop and its battery safely!
· Minimize external access (windows): A secure room should not have Don't leave a laptop computer in a car trunk overnight or for long periods of
excessively large windows. All windows should have locks. time: In cold weather, condensation can form and damage the machine. In
warm weather, high temperatures (amplified by the confined space) can also
· Maintain locking devices responsibly: Locking doors and windows can be damage hard drives.
an effective security strategy as long as appropriate authorities maintain the keys
and combinations responsibly. If there is a breach, each compromised lock
should be changed. Regulate Power Supplies:
· Investigate options other than traditional keyhole locks for securing areas · Be prepared for fluctuations in the electrical power supply:
as is reasonable: Based on the findings from your risk assessment consider
alternative physical security strategies such as window bars, anti-theft cabling Do so by (1) plugging all electrical equipment into surge suppressors or electrical
(i.e., an alarm sounds when any piece of equipment is disconnected from the power filters;
system), magnetic key cards, and motion detectors.
and (2) using Uninterruptible Power Sources (UPSs) to serve as auxiliary
Recognize that some countermeasures are ideals and may not be feasible electrical supplies to critical equipment in the event of power outages
if, for example, your organization is housed in an old building.
Pay attention to the manufacturer's recommendations for storing portable
Be prepared for fire emergencies: In an ideal world, a secure room should be computer batteries--they carry live charges and are capable of igniting fires if not
protected from fire by an automatic fire-fighting system. Note that water can handled properly.
damage electronic equipment, so carbon dioxide systems or halogen agents are
recommended. If implemented, staff must be trained to use gas masks and other · Protect power supplies from environmental threats: Consider having a
protective equipment. Manual fire fighting equipment (i.e., fire extinguishers) professional electrician design or redesign your electrical system to better
should also be readily available and staff should be properly trained in their use. withstand fires, floods, and other disasters.
· Select outlet use carefully: Although little thought generally goes into outside users who enter your network from the Internet. The second deals with
plugging equipment into an outlet, machines that draw heavily from a power safeguarding information as it is being transmitted over the Internet.
source can affect, and be affected by, smaller equipment that draws energy from
the same outlet. Protect Your Network from Outsiders:
· Guard against the negative effects of static electricity in the office place: Implement applicable security recommendations as raised in previous
Install anti-static carpeting and anti-static pads, use anti-static sprays, and chapters: Solid defense against external Internet threats includes the
encourage staff to refrain from touching metal and other static-causing agents proper implementation of relatively straightforward security measures like
before using computer equipment. encryption software, virus scanners , remote access regulations, and
passwords.
Isolate your network through the use of a firewall: Installing a firewall enables
the organization to decide which types of messages should be allowed into the
system from external sources (e.g., "nothing with identifiable virus coding" and
"nothing with decryptor coding structures"). The actual installation and operation
of the complex features requires expert technical assistance, but policy-makers
Protect Output: can make informed decisions about product features all the same. Locate
equipment and information that is intended for external users outside of the
Keep photocopiers, fax machines, and scanners in public view: These types of firewall: If an organization's Web server is intended to provide information and
equipment are very powerful tools for disseminating information--so powerful, in services to the public, it should not be located on the private side of the firewall.
fact, that their use must be monitored. Nor should it be able to access confidential information that resides inside the
firewall. This way, if the public Web server should ever be compromised,
Assign printers to users with similar security clearances: You don't want confidential information is still protected. Protect Transmissions Sent over
employees looking at sensitive financial information (e.g., staff salaries) or the Internet:
confidential student information (e.g., individual records) while they are waiting
for their documents to print. It is better to dedicate a printer to the Director of Use Secure Sockets Layer (SSL) Servers to secure financial and information
Finance than to have sensitive data scattered around a general use printer. Don't transactions made with a Web browser: In a secure Web session, your Web
hesitate to put printers in locked rooms if that is what the situation demands. browser generates a random encryption key and sends it to the Web site host to
be matched with its public encryption key. Your browser and the Web site then
Label printed information appropriately: Confidential printouts should be clearly encrypt and decrypt all transmissions.
identified as such.
Authenticate messages through the use of digital signatures: A digital
signature amounts to a "fingerprint" of a message. It depicts the message such
Demand suitable security procedures of common carriers when
that if the message were to be altered in any way, the "fingerprint" would reflect
shipping/receiving confidential information: Mail, delivery, messenger, and courier
it--thus making it possible to detect counterfeits. The converse, of course, is that
services should be required to meet your organization's security standards when
if the "fingerprint" does not change during transmission, you can be confident
handling your confidential information.
that the message was not altered.
Dispose of confidential waste adequately: Print copies of confidential information Authenticate messages through the use of time stamps or sequence numbers:
should not be placed in common dumpsters unless shredded. Another way to recognize when messages have been modified is to challenge
the "freshness" of the message. This is done by embedding time stamps,
Electronic Mail Policy sequence numbers, or random numbers in the message to indicate precisely
when and in what order the message was sent. If a received message's time and
User Responsibilities sequence are not consistent, you will be alerted that someone may have
tampered with the transmission.
These guidelines are intended to help you make the best use of the electronic Authenticate message "receivers" through the use of digital certificates: By
mail facilities at your disposal. You should understand the following: requiring an authentication agent or digital certificate, you force the person on the
other end of the transmission to prove his or her identity. In the digital world,
The agency provides electronic mail to staff to enable them to communicate trusted third parties can serve as certificate authorities--entities that verify who
effectively and efficiently with other members of staff, other companies, and a user is for you. In this way, digital certificates are analogous to a state-issued
partner organizations. driver's license. If you trust the party that issues the certificate (e.g., the state or
the certificate authority), then you don't need to try to verify who the user is
When using the agency's electronic mail facilities you should comply with the yourself.
following guidelines. Encrypt all messages sent over the Internet: As more and more messages
are sent over larger and larger networks, information becomes increasingly
If you are in any doubt about an issue affecting the use of electronic mail, you vulnerable to assault. Encryption has become a leading tool to combat this
should consult the IT Services Manager. vulnerability. Like other countermeasures, it can be very effective if used
properly and regularly
Any breach of the agency's Electronic Mail Policy may lead to disciplinary action.
DO
Do check your electronic mail daily to see if you have any messages.
Do include a meaningful subject line in your message.
Do check the address line before sending a message and check you are
and licenses.
Do take care not to express views that could be regarded as defamatory or
libelous.
Do use an "out of the office assistant" to automatically reply to messages
Network Security
Policy Issues
Connecting to the Internet doesn't necessarily raise its own security policy issues
as much as it focuses attention on the necessity of implementing security
strategies properly. Internet security goals fall within two major domains. The first
centers around protecting your networks, information, and other assets from