Dis Notes
Dis Notes
History, what is Information Security? Critical Characteristics of Information,
NSTISSC Security Model, Components of an Information System, Securing
the Components, Balancing Security and Access, The SDLC, The Security
SDLC
Key Term
computer security In the early days of computers, this term specified the need to
secure the physical location of computer technology from outside threats. This term
later came to represent all actions taken to preserve computer systems from losses. It
has evolved into the current concept of information security as the scope of
protecting information in an organization has expanded.
The history of information security begins with the concept of computer security. The
need for computer security arose during World War II when the first mainframe computers
were developed
The 1960s
During the Cold War, many more mainframe computers were brought online to accomplish
more complex and sophisticated tasks. These mainframes required a less cumbersome process
of communication than mailing magnetic tapes between computer centers. In response to this
need, the Department of Defense’s Advanced Research Projects Agency (ARPA) began exam-
ining the feasibility of a redundant, networked communications system to support the mili-
tary’s exchange of information.
In 1968, Dr. Larry Roberts developed the ARPANET project. ARPANET evolved into
what we now know as the Internet, and Roberts became known as its founder.
The 1990s
At the close of the 20th century, networks of computers became more common, as did the
need to connect them to each other. This gave rise to the Internet, the first global network of
net- works. The Internet was made available to the general public in the 1990s after decades of
being the domain of government, academia, and dedicated industry professionals. The Internet
brought connectivity to virtually all computers that could reach a phone line or an Internet-
connected local area network (LAN).
In 1993, the first DEFCON conference was held in Las Vegas. Originally it was established
as a gathering for people interested in information security, including authors, lawyers, gov-
ernment employees, and law enforcement officials
2000 to Present
Today, the Internet brings millions of unsecured computer networks into continuous commu-
nication with each other. The security of each computer’s stored information is contingent on
the security level of every other computer to which it is connected. Recent years have seen a
growing awareness of the need to improve information security, as well as a realization that
information security is important to national defense.
Information security managers and professionals
• Information technology managers and professionals
• Nontechnical business managers and professionals These communities of interest fulfil
the following roles:
• The information security community protects the organization’s information assets
from the many threats they face.
• The information technology community supports the business objectives of the
organization by supplying and supporting information technology appropriate to the business’
needs.
• The nontechnical general business community articulates and communicates
organizational policy and objectives and allocates resources to the other groups.
INTRODUCTION
Information technology is the vehicle that stores and transports information—a company’s most
valuable resource—from one business unit to another.
But what happens if the vehicle breaks down, even for a little while?
As businesses have become more fluid, the concept of computer security has been replaced by
the concept of information security.
Because this new concept covers a broader range of issues, from the protection of data to the
protection of human resources, information security is no longer the sole responsibility of a
discrete group of people in the company; rather, it is the responsibility of every employee, and
especially managers.
Organizations must realize that information security funding and planning decisions involve
more than just technical managers:
Rather, the process should involve three distinct groups of decision makers, or
communities of interest:
What Is Security?
Key Terms
C.I.A. triangle The industry standard for computer security since the development of
the mainframe. The standard is based on three characteristics that describe the utility of
information: confidentiality, integrity, and availability.
communications security The protection of all communications media, technology,
and content.
information security Protection of the confidentiality, integrity, and availability of
information assets, whether in storage, processing, or transmission, via the application
of policy, education, training and awareness, and technology.
network security A subset of communications security; the protection of voice and
data networking components, connections, and content.
physical security The protection of physical items, objects, or areas from
unauthorized access and misuse.
security A state of being secure and free from danger or harm. Also, the actions taken
to make someone or something secure.
In general, security is defined as “the quality or state of being secure—to be free from danger.”
Security is often achieved by means of several strategies usually undertaken simultaneously or
used in combination with one another.
The Committee on National Security Systems (CNSS) defines information security as the pro-
tection of information and its critical elements, including the systems and hardware that use,
store, and transmit the information.11 Figure 1 shows that information security includes the
broad areas of information security management, data security, and network security. The
CNSS model of information security evolved from a concept developed by the computer
security industry called the C.I.A. triangle
Information
Security Governanc
e
Management
of Information
Security
POLICY
Confidentialit
y
Integrit
y
Security
Computer
Network
Security
Security
Dat
Data
a&
Servic
es
Accuracy
Accuracy of information refers to information which is free from mistakes or errors
and has the value the end user expects.
If the information has been intentionally or unintentionally modified , it is no longer
accurate.
Consider a checking account, for example. You assume that the information in your account is an
accurate representation of your finances. Incor- rect information in the account can result from
external or internal errors. If a bank teller, for instance, mistakenly adds or subtracts too much
money from your account, the value of the information is changed. Or, you may accidentally enter
an incorrect amount into your account register. Either way, an inaccurate bank balance could cause
you to make other mistakes, such as bouncing a check.
Authenticity
It refers to quality or state of being genuine or original, rather than
reproduction or fabrication.
When the contents are original as it was created, placed or stored or
transmitted.
Attacks of Authenticity
Email Spoofing: sending E-mail with modified address field
Phishing: obtain personal or financial information in a fraudulent manner.
Confidentiality
Information has confidentiality when exposure to unauthorized individuals or systems
is prevented
To protect the confidentiality of information, a number of measures are used:
Information classification
Secure document storage
Application of general security policies
Education of information custodians end users
The value of information confidentiality is especially high for personal information about
employees, customers, or patients. People who transact with an organization expect that their
personal information will remain confidential, whether the organization is a federal agency,
such as the Internal Revenue Service, or a business
Integrity
The hosting organization is the Committee on National Security Systems, which is responsible
for coordinating the evaluation and publication of standards related to the protection of
National Security Systems (NSS). CNSS was originally called the National Security
Telecommunications and Information Systems Security Committee (NSTISSC) when
established in 1990 by National Security Directive
Confidentialit Confidentialit
y y
Integrit Integrit
y y
Availabilit Availabilit
y y
Storage Processing Storage Processing
Transmission Transmission
Figure 3 the McCumber Cube
The comprehensive information security model and has become a widely accepted evaluation standard
for the security of information systems. The CNSS standards are expected to be replaced by the new
NIST SP 800-16, “Information Technology Security Training Requirements: A Role-Based Model for
Federal Information Technology/Cyber Security Training,” in the near future.
The model, which was created by John McCumber in 1991, provides a graphical representation
of the architectural approach widely used in computer and information security; it is now
known as the McCumber Cube. As shown in Figure 3 the McCumber Cube shows three
dimensions. If extrapolated, the three dimensions of each axis become a 3×3×3 cube with 27
cells representing areas that must be addressed to secure today’s information systems. To
ensure system security, each of the 27 areas must be properly addressed during the security
process. For example, the intersection of technology, integrity, and storage requires a control
or safeguard that addresses the need to use technology to protect the integrity of information
while in storage. One such control might be a system for detecting host intrusion that protects
the integrity of information by alerting security administrators to the potential modification of
a critical file.
Key Term
information system (IS) The entire set of software, hardware, data, people, procedures,
and networks that enable the use of information resources in the organization.
Software
Hardware
Data
People
Procedures
Networks
Software
The software components of IS comprises applications, operating systems, and assorted
command utilities. Software programs are the vessels that carry the lifeblood of information
through an organization. These are often created under the demanding constraints of project
management, which limit time, cost, and manpower.
Hardware
Hardware is the physical technology that houses and executes the software, stores and carries
the data, and provides interfaces for the entry and removal of information from the system.
Physical security policies deal with hardware as a physical asset and with the protection of these
physical assets from harm or theft. Applying the traditional tools of physical security, such as
locks and keys, restricts access to and interaction with the hardware components of an
information system. Securing the physical location of computers and the computers themselves
is important because a breach of physical security can result in a loss of information.
Unfortunately, most information systems are built on hardware platforms that cannot guarantee
any level of information security if unrestricted access to the hardware is possible.
Data
Data stored, processed, and transmitted through a computer system must be protected.
Data is often the most valuable asset possessed by an organization and is the main target
of intentional attacks.
The raw, unorganized, discrete (separate, isolated) potentially-useful facts and figures
that are later processed (manipulated) to produce information.
Hardware
Networks
Software
People
Procedures Data
People
There are many roles for people in information systems. Common ones include
Systems Analyst
Programmer
Technician
Engineer
Network Manager
MIS ( Manager of Information Systems )
Data entry operator
Procedures
A procedure is a series of documented actions taken to achieve something. A procedure is more
than a single simple task. A procedure can be quite complex and involved, such as performing a
backup, shutting down a system, patching software.
Networks
When information systems are connected to each other to form Local Area Network
(LANs), and these LANs are connected to other networks such as the Internet, new security
challenges rapidly emerge.
Steps to provide network security are essential, as is the implementation of alarm and intrusion
systems to make system owners aware of ongoing compromises.
Securing Components
-Protecting the components from potential misuse and abuse by unauthorized users.
Subject of an attack – Computer is used as an active tool to conduct the attack.
Object of an attack – Computer itself is the entity being attacked
.Two types of attacks
- Direct attack
- Indirect attack
When a Hacker uses his personal computer to break into a system.[Originate from the threat
itself]
1. Indirect attack
When a system is compromised and used to attack other system.
[Originate from a system or resource that itself has been attacked, and is malfunctioning or
working under the control of a threat].
A computer can, therefore, be both the subject and object of an attack when, for
example, it is first the object of an attack and then compromised and used to attack other
systems, at which point it becomes the subject of an attack.
Internet Stolen
information
Hacker request
Hacker using a computer as Remote system that is the
the subject of an attack object of an attack
Has to provide the security and is also feasible to access the information for its
application.
Information Security cannot be an absolute: it is a process, not a goal.
Should balance protection and availability.
User 1:
Encrypting e-
mail is a hassle.
CISO: Encryption is
needed to protect
secrets of the
organization.
User 2: Encrypting
e-mail slows me down.
Access
Security
Top-down Bottom-up
approach approach
CE
O
CF CI CO
O O O
Top-down-approach
Has higher probability of success.
Project is initiated by upper level managers who issue policy & procedures & processes.
Dictate the goals & expected outcomes of the project.
Determine who is suitable for each of the required action.
Analysis
- It begins with the information gained during the investigation phase.
- It consists of assessments (quality) of the organization, the status of current systems, and the
capability to support the proposed systems.
- Analysts begin by determining what the new system is expected to do, and how it will interact
with existing systems.
- This phase ends with the documentation of the findings and an update of the feasibility
analysis.
Logical Design
- In this phase, the information gained from the analysis phase is used to begin creating a
systems solution for a business problem.
- Based on the business need, applications are selected that are capable of providing needed
services.
- Based on the applications needed, data support and structures capable of providing the needed
inputs are then chosen.
- In this phase, analysts generate a number of alternative solutions, each with corresponding
strengths and weaknesses, and costs and benefits.
- At the end of this phase, another feasibility analysis is performed.
Physical design
- In this phase, specific technologies are selected to support the solutions developed in the
logical design.
- The selected components are evaluated based on a make-or-buy decision.
- Final designs integrate various components and technologies.
Investigation
Analysis
Logical Design
Physical Design
Implementation
Maintenanc
e and
Figure 7 SDLC waterfall methodology
Implementation
- In this phase, any needed software is created.
- Components are ordered, received and tested.
- Afterwards, users are trained and supporting documentation created.
- Once all the components are tested individually, they are installed and tested as a system.
- Again a feasibility analysis is prepared, and the sponsors are then presented with the system for
a performance review and acceptance test.
- It consists of the tasks necessary to support and modify the system for the remainder of its
useful life cycle.
- Periodically, the system is tested for compliance, with business needs.
- As the needs of the organization change, the systems that support the organization must also
change.
- When a current system can no longer support the organization, the project is terminated and a
new project is implemented.
Investigation
- This phase begins with a directive from upper management, dictating the process, outcomes,
and goals of the project, as well as its budget and other constraints.
- Frequently, this phase begins with an enterprise information security policy, which outlines
the implementation of a security program within the organization.
- Teams of responsible managers, employees, and contractors are organized.
- Problems are analyzed.
- Scope of the project, as well as specific goals and objectives, and any additional constraints not
covered in the program policy, are defined.
- Finally, an organizational feasibility analysis is performed to determine whether the
organization has the resources and commitment necessary to conduct a successful security
analysis and design.
Analysis
- In this phase, the documents from the investigation phase are studied.
- The developed team conducts a preliminary analysis of existing security policies or programs,
along with that of documented current threats and associated controls.
- The risk management task also begins in this phase.
-Risk management is the process of identifying, assessing, and evaluating the levels of risk
facing the organization, specifically the threats to the organization’s security and to the
information stored and processed by the organization.
Logical design
- This phase creates and develops the blueprints for information security, and examines and
implements key policies.
- The team plans the incident response actions.
- Plans business response to disaster.
- Determines feasibility of continuing and outsourcing the project.
Physical design
- In this phase, the information security technology needed to support the blueprint outlined in
the logical design is evaluated.
- Alternative solutions are generated.
- Designs for physical security measures to support the proposed technological solutions are
created.
- At the end of this phase, a feasibility study should determine the readiness of the organization
for the proposed project.
- At this phase, all parties involved have a chance to approve the project before implementation
begins.
Implementation
- Similar to traditional SDLC
- The security solutions are acquired (made or bought), tested, implemented, and tested again
- Personnel issues are evaluated and specific training and education programs are conducted.
- Finally, the entire tested package is presented to upper management for final approval.
• Team Leader
- Understands project management
- Personnel management
- And information Security technical requirements.
Security policy developers
- Individuals who understand the organizational culture,
- Existing policies
- Requirements for developing & implementing successful policies.
Risk assessment specialists
- Individuals who understand financial risk assessment techniques.
- The value of organizational assets,
- And the security methods to be used.
Security Professionals
- Dedicated
- Trained, and well educated specialists in all aspects of information security from both a
technical and non-technical stand point.
System Administrators
- Administrating the systems that house the information used by the organization.
End users
Three types of are used
Data owners
Data custodians
Data users
Data Owners
- Responsible for the security and use of a particular set of information.
- Determine the level of data classification
- Work with subordinate managers to oversee the day-to-day administration of the data.
Data Custodians
- Responsible for the storage, maintenance, and protection of the information.
- Overseeing data storage and backups
- Implementing the specific procedures and policies.
Risk
- Risk is the probability that something can happen. In information security, it could be the
probability of a threat to a system.
Complying with Regulations: Many industries, such as healthcare, finance, and government,
are subject to strict regulations and laws that require them to protect sensitive data. Failure to
comply with these regulations can result in legal and financial penalties, as well as damage to
the organization’s reputation.
Maintaining Business Continuity: Information security helps ensure that critical business
operations can continue in the event of a disaster, such as a cyber-attack or natural disaster.
Without proper security measures in place, an organization’s data and systems could be
compromised, leading to significant downtime and lost revenue.
Protecting Customer Trust: Customers expect organizations to keep their data safe and secure.
Breaches or data leaks can erode customer trust, leading to a loss of business and damage to the
organization’s reputation.
Threats
To protect an organization’s information, you must
1. Know yourself (i.e) be familiar with the information to be protected, and the systems that
store, transport and process it.
2. Know the threats you face
To make sound decisions about information security, management must be informed about the
various threats facing the organization, its application, data and information systems.
3. A threat is an object, person, or other entity, that represents a constant danger to an asset.
is defined as the ownership of ideas and control over the tangible or virtual
representation of those ideas.
• Intellectual property includes trade secrets, copyrights, trademarks, and patents.
Electronic and human activities that can breach the confidentiality of information.
• When an unauthorized individual’s gain access to the information an organization is
trying to protect is categorized as act of espionage or trespass.
• Attackers can use many different methods to access the information stored in an
information system.
1. Competitive Intelligence[use web browser to get information from market research]
2. Industrial espionage(spying)
3. Shoulder Surfing(ATM)
Trespass
Can lead to unauthorized real or virtual actions that enable information gatherers to enter
premises or systems they have not been authorized to enter.
Sound principles of authentication & authorization can help organizations protect
valuable information and systems.
Hackers-> “People who use and create computer software to gain access to information
illegally”
There are generally two skill levels among hackers.
Expert Hackers-> Masters of several programming languages, networking protocols,
and operating systems.
Unskilled Hackers
“The British Internet Service Provider Cloud nine” be the first business “hacked out of
existence”
Virus
Segments of code that performs malicious actions.
Virus transmission is at the opening of Email attachment files.
Macro virus-> Embedded in automatically executing macrocode common in word
processors, spreadsheets and database applications.
Boot Virus-> infects the key operating files located in the computer’s boot sector.
Worms
A worm is a malicious program that replicates itself constantly, without requiring
another program to provide a safe environment for replication.
Worms can continue replicating themselves until they completely fill available
resources, such as memory, hard drive space, and network bandwidth.
Eg: MS-Blaster, MyDoom, Netsky, are multifaceted attack worms.
Once the worm has infected a computer, it can redistribute itself to all e-mail addresses
found on the infected system.
Furthermore, a worm can deposit copies of itself onto all Web servers that the infected
systems can reach, so that users who subsequently visit those sites become infected.
Trojan Horses
Are software programs that hide their true nature and reveal their designed behaviour
only when activated.
Polymorphism
A Polymorphic threat is one that changes its apparent shape over time, making it undetectable
by techniques that look for preconfigured signatures. hese viruses and Worms actually evolve,
changing their size, and appearance to elude detection by antivirus software programs.
Trojan horse
• A destructive program that masquerade on beginning application, unlike viruses, Trojan
horse do not replicate themselves.
Blended threat
• Blended threats combine the characteristics of virus, worm, Trojan horses & malicious
code with server and Internet Vulnerabilities.
Antivirus Program
• A Utility that searches a hard disk for viruses and removes any that found.
Forces of Nature
Fire: Structural fire that damages the building. Also encompasses smoke damage from a
fire or water damage from sprinkles systems.
Flood: Can sometimes be mitigated with flood insurance and/or business interruption
Insurance.
Earthquake: Can sometimes be mitigated with specific causality insurance and/or
business interruption insurance, but is usually a separate policy.
Lightning: An Abrupt, discontinuous natural electric discharge in the atmosphere.
Landslide/Mudslide: The downward sliding of a mass of earth & rocks directly
damaging all parts of the information systems.
They must also prepare contingency plans for continued operations, such as disaster
recovery plans, business continuity plans, and incident response plans, to limit losses in the face
of these threats
Other utility services can affect the organizations are telephone, water, waste water,
trash pickup, cable television, natural or propane gas, and custodial services.
The loss of these services can impair the ability of an organization to function.
For an example, if the waste water system fails, an organization might be prevented
from allowing employees into the building.
This would stop normal business operations.
Power Irregularities
• Fluctuations due to power excesses.
• Power shortages &
• Power losses
• When voltage levels spike (experience a momentary increase),or surge ( experience prolonged
increase ), the extra voltage can severely damage or destroy equipment.
The more expensive uninterruptible power supply (UPS) can protect against spikes and
surges.
The web hosting services are usually arranged with an agreement providing minimum
service levels known as a Service level Agreement (SLA).
This can pose problems for organizations that provide inadequately conditioned power for their
information systems equipment.
Technical Hardware Failures or Errors
Resulting in unreliable service or lack of availability
Some errors are terminal, in that they result in unrecoverable loss of equipment.
Some errors are intermittent, in that they resulting in faults that are not easily repeated.
Technical software failures or errors
This category involves threats that come from purchasing software with unknown,
hidden faults.
Large quantities of computer code are written, debugged, published, and sold before all
their bugs are detected and resolved.
These failures range from bugs to untested failure conditions.
Technological obsolescence
Outdated infrastructure can lead to unreliable and untrustworthy systems.
Management must recognize that when technology becomes outdated, there is a risk of
loss of data integrity from attacks.
Attacks
Malicious code
The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information.
The state –of-the-art malicious code attack is the polymorphic or multivector, worm.
These attack programs use up to six known attack vectors to exploit a variety of
vulnerabilities in commonly found information system devices.
By using the widely known and common passwords that were employed in early versions of this
protocol, the attacking program can gain control of the device. Most vendors have closed these
vulnerabilities with software upgrades
Virus and Worm Hoaxes As frustrating as viruses and worms are, perhaps more time and
money are spent resolving virus hoaxes. Well-meaning people can disrupt the harmony and flow of an
organization when they send group e-mails warning of supposedly dangerous viruses that don’t exist.
When people fail to follow virus-reporting procedures in response to a hoax, the network becomes
overloaded and users waste time and energy forwarding the warning message to everyone they know,
posting the message on bulletin boards, and trying to update their antivirus protection software. One of
the most prominent virus hoaxes was the 1994 “Goodtimes virus,” which reportedly was
transmitted in an e-mail with the header “Good Times” or “goodtimes.”42 The virus never existed, and
thou- sands of hours of employee time were wasted retransmitting the e-mail, effectively creating a
denial of service.
At one time, hoaxes amounted to little more than pranks, although occasionally a sting was
attached. For example, the Teddy Bear hoax tricked users into deleting necessary operating
system files, which made their systems stop working. Recently, criminals have been able to
monetize the hoax virus by claiming that systems are infected with malware and then selling a
cure for a problem that does not exist. The perpetrator of the hoax may then offer to sell a fake
antivirus program to correct the fake malware
Password Attacks
Password attacks fall under the category of espionage or trespass just as lock-picking falls
under breaking and entering. Attempting to guess or reverse-calculate a password is often
called cracking. There are a number of alternative approaches to password cracking:
●
Brute force
●
Dictionary
●
Rainbow tables
●
Social engineering
Brute Force The application of computing and network resources to try every possible password
combination is called a brute force password attack. If attackers can narrow the field of target accounts,
they can devote more time and resources to these accounts. This is one reason to always change the
password of the manufacturer’s default administrator account.
Brute force password attacks are rarely successful against systems that have adopted the
manufacturer’s recommended security practices. Controls that limit the number of
unsuccessful access attempts within a certain time are very effective against brute force
attacks.
Pharming Pharming attacks often use Trojans, worms, or other virus technologies
to attack an Internet browser’s address bar so that the valid URL the user types is modified
to be that of an illegitimate Web site. A form of pharming called Domain Name System
(DNS) cache poisoning targets the Internet DNS system, corrupting legitimate data tables.
The key difference between pharming and the social engineering attack called phishing is
that the latter requires the user to actively click a link or button to redirect to the
illegitimate site, whereas pharming attacks modify the user’s traffic without the user’s
knowledge or active participation.
1) Company A
attempts to
establish an
encrypted session
with Company B.
●
In furtherance of a criminal act
Area Act Date Description
Telecommu- Telecommunications 1934 Regulates interstate and foreign
nications Deregulation and Competition Act telecommunications (amended in 1996
of 1996—an update to and 2001)
Communications Act of 1934 (47
USC 151 et seq.)
Civil legal Federal Rules for Civil Procedure 1938 As updated in 2006, specifies
evidence (FRCP) requirements for the storage, protection,
and surrender of discoverable electronic
data as used in federal civil proceedings
Freedom of Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously
information unreleased information and
documents controlled by the U.S.
government
Privacy Federal Privacy Act of 1974 1974 Governs federal agency use of personal
information
Copyright Copyright Act of 1976—an update 1976 Protects intellectual property, including
to publications and software
U.S. Copyright Law (17 USC)
Cryptography Electronic Communications Privacy 1986 Regulates interception and disclosure
Act of 1986 (Update to 18 USC) of electronic information; also referred
to as the Federal Wiretapping Act
Access to Unlawful Access to Stored 1986 Provides penalties for illegally accessing
stored Communications (18 USC 2701) communications (such as e-mail and
communications voicemail) stored by a service provider
Threats to Computer Fraud and Abuse Act 1986 Defines and formalizes laws to counter
computers (also known as Fraud and Related threats from computer-related acts and
Activity in Connection with offenses (amended in 1996, 2001, and
Computers; 18 USC 1030) 2006)
Federal agency Computer Security Act of 1987 1987 Requires all federal computer systems
information that contain classified information to have
security security plans in place, and requires
periodic security training for all people
who operate, design, or manage such
systems
Trap and trace General prohibition on pen 1993 Prohibits the use of electronic pen
restrictions register and trap and trace registers and trap and trace devices
device use; exception (18 USC without a court order
3121 et seq.)
Criminal intent National Information 1996 Categorizes crimes based on criminal
Infrastructure Protection Act of intent and a defendant’s authority to
1996 (update to 18 USC 1030) access a protected computer system
Trade secrets Economic Espionage Act of 1996 1996 Prevents abuse of information gained
while employed elsewhere
Personal health Health Insurance Portability and 1996 Requires medical practices to ensure the
information Accountability Act of 1996 (HIPAA) privacy of personal medical information
protection
Intellectual No Electronic Theft Act amends 17 1997 Amends copyright and criminal statutes
property USC 506(a)—copyright to provide greater copyright protection
infringement, and 18 USC 2319— and penalties for electronic copyright
criminal (Public Law 105- 147) infringement
infringement of copyright
Copy Digital Millennium Copyright Act 1998 Provides specific penalties for removing
protection (update to 17 USC 101) copyright protection from media
The preceding law and many others were further modified by the USA PATRIOT Act of
2001,
which provides law enforcement agencies with broader latitude to combat terrorism-related activ-
ities.
In response to the pressure for privacy protection, the number of statutes that address individual rights
to privacy has grown. To help you better understand this rapidly evolving issue, some of the more
relevant privacy laws are presented here.
Web
cookies
Phon
e
survey
Some regulations in the U.S. legal code stipulate responsibilities of common carriers (organiza-
tions that process or move data for hire) to protect the confidentiality of customer information.
The Privacy of Customer Information Section of the common carrier regulation states
that any proprietary information shall be used explicitly for providing services, and not for
marketing purposes.
While common carrier regulation oversees public carriers to protect individual privacy, the
Federal Privacy Act of 1974 regulates government agencies and holds them
accountable if they release private information about individuals or businesses without
permission. The following agencies, regulated businesses, and individuals are exempt from
some of the regulations so they can perform their duties:
●
Bureau of the Census
●
National Archives and Records Administration
●
Congress
●
Comptroller General
●
Federal courts with regard to specific issues using appropriate court orders
●
Credit reporting agencies
●
Individuals or organizations that demonstrate information is
necessary to protect the health or safety of an individual party
Intellectual property is a protected asset in the United States. The U.S. Copyright Law
extends this privilege to published works, including electronic formats. Fair use allows copy
righted materials to be used to support news reporting, teaching, scholarship, and similar
activities, as long as the use is for educational or library purposes, is not for profit, and is not
excessive.
Financial Reporting
The Sarbanes-Oxley Act of 2002, also known as SOX or the Corporate and Auditing
Accountability and Responsibility Act, is a critical piece of legislation that affects the
execu- tive management of publicly traded corporations and public accounting firms. The law
seeks to improve the reliability and accuracy of financial reporting, as well as increase the
account- ability of corporate governance, in publicly traded companies.
Misuse of Corporate Resources The scenarios examined levels of tolerance for misuse of
corporate resources, and each presented a different situation in which corporate assets were used for
nonbusiness purposes without specifying the company’s policy on personal use of its resources. In
general, participants displayed a rather lenient view of personal use of company equipment. Only
students from Singapore and Hong Kong viewed this personal use as unethical.
Ethics and Education
Attitudes toward the ethics of computer use are affected by many factors other than national- ity.
Differences are found among people within the same country, within the same social class, and within
the same company. Key studies reveal that education is the overriding factor in leveling ethical
perceptions within a small population. Employees must be trained and kept aware of many topics
related to information security, not the least of which is the expected behavior of an ethical employee.
1. Cyber Security: Cyber security means securing our computers, electronic devices,
networks, programs, systems from cyber-attacks. Cyber-attacks are those attacks that
happen when our system is connected to the Internet.
2. Information Security: Information security means protecting our system’s
information from theft, illegal use and piracy from unauthorized use. Information
security has mainly three objectives: confidentiality, integrity, and availability of
information.
3. Application Security: Application security means securing our applications and
data so that they don’t get hacked and also the databases of the applications remain
safe and private to the owner itself so that user’s data remains confidential.
4. Network Security: Network security means securing a network and protecting the
user’s information about who is connected through that network. Over the network
hackers steal, the packets of data through sniffing and spoofing attacks, man in the
middle attack, war driving, etc, and misuse the data for their benefits.
8. Polymorphic Attacks: Poly means “many” and morph means “form”, polymorphic
attacks are those in which attacker adopts multiple forms and changes them so that
they are not recognized easily. These kinds of attacks are difficult to detect due to their
changing forms.
1. Always keep your Operating System up to date. Keeping it up to date reduces the
risk of their getting attacked by malware, viruses, etc.
2. Always use a secure network connection. One should always connect to a secure
network. Public wi-fi’s and unsecured networks should be avoided as they are at risk of
being attacked by the attacker.
3. Always install an Antivirus and keep it up to date. An antivirus is software that scans
your PC against viruses and isolates the infected file from other system files so that
they don’t get affected. Also, we should try to go for paid anti-viruses as they are more
secure.
6. Don’t trust someone easily. You never know someone’s intention, so don’t trust
someone easily and end up giving your personal information to them. You don’t know
how they are going to use your information.
7. Keep your personal information hidden. Don’t post all your personal information on
social media. You never know who is spying on you. As in the real world, we try to
avoid talking to strangers and sharing anything with them. Similarly, social media also
have people whom you don’t know and if you share all your information on it you may
end up troubling yourself.
8. Don’t download attachments that come along with e-mails unless and until you know
that e-mail is from a genuine source. Mostly, these attachments contain malware
which, upon execution infect or harms your system.
9. Don’t purchase things online from anywhere. Make sure whenever you are shopping
online you are doing so from a well-known website. There are multiple fraud websites
that may steal your card information as soon as you checkout and you may get
bankrupt by them.
10. Learn about computer security and ethics. You should be well aware of the safe
computing and ethics of the computing world. Gaining appropriate knowledge is
always helpful in reducing cyber-crime.
11. If you are attacked, immediately inform the cyber cell so that they may take
appropriate action and also protect others from getting attacked by the same person.
Don’t hesitate to complain just because you think people may make your fun.
12. Don’t use pirated content. Often, people try to download pirated movies, videos or
web series in order to get them for free. These pirated content are at major risk of
being infected with viruses, worms, or malware, and when you download them you end
up compromising your system security.
It represents the access control mechanism that specifies which actions (e.g., read,
write, execute) are allowed or denied for each subject on each object.
Read- This is a right given to a process in a domain that allows it to read the
file.
Write- Process in the domain can be written into the file.
Execute- The process in the domain can execute the file.
Print- Process in the domain only has access to a printer.
Sometimes, domains can have more than one right, i.e. combination of rights
mentioned above.
Let us now understand how an access matrix works from the example given below.
F1 F2 F3 Printer
D1 read read
D2 Print
D3 read execute
D4 read read D4
write write
Switch operation: When we switch a process from one domain to another, we execute
a switch operation on an object (the domain). We can control domain switching by
including domains among the objects of the access matrix. Processes should be able to
switch from one domain (Di) to another domain (Dj) if and only if a switch right is given
to access (i, j). This is explained using an example below:
F1 F2 F3 Printe D1 D2 D3 D4
r
D1 Read read switch
D2 Print switch switch
D3 read execute
D4 read read switch D4 read
write write write
According to the above matrix, a process executing in domain D2 can switch to domain
D3 and D4. A process executing in domain D4 can switch to domain D1 and process
executing in domain D1 can switch to domain D2.
Policy/Policies:
WE have to follow certain policies for securing data and information. Those policies are
1. Security Policies
2. Confidentiality Policies
3. Integrity Policies
4. Hybrid Policies
1. Security Policies
A security policy is a written document that outlines an organization's rules,
expectations, and approach for protecting its systems, information, and people:
Purpose
A security policy defines how an organization will maintain the confidentiality,
integrity, and availability of its data. It also protects employees and the organization as
a whole.
Users.
It all starts with users, otherwise known as the subjects. The subjects which will access the
objects. Users are the ones that need the information. I think the books call users the “active
agents”.
Transformation Procedures (TPs)
Then we have Transformation Procedures. Think of them as operations the subject is trying
to perform.
Constrained Data Items (CDIs)
There’s Constrained Data Items and Unconstrained Data Items.
Objects which belong in the subset of Constrained Data Items are at a higher level of
protection.
In a Clark-Wilson Model, there are two types of protections given to data items, constrained
and unconstrained.
In order to read an object located in the Constrained Data Items subset, we have to go
through a transformation procedure.
Constrained Data Items can only be manipulated by a Transformation Procedure.
Objects within a Constrained Data Items are so valuable, that in a Clark-Wilson model, a
subject has to go through an intermediary to even just access it.
Unconstrained Data Items (UDIs)
Now objects in an Unconstrained Data Item subset, well they probably aren’t that important.
These can be accessed by the subject directly, it doesn’t need to go through an intermediary
like a Transformation Procedure.
The subject can perform their own read and write operations without going through a
Transformation Procedure.
Subjects access objects in a UDI like how they would normally access an object in a
networked environment, as if they weren't using a Clark-Wilson Model. Like how we access
files or objects in Windows operating systems.
Confidentiality Policy:
A confidentiality policy is a set of guidelines that establishes how to handle and protect
sensitive information. It's an important part of an organization's activities, and it helps to
prevent the risks of confidential data leakage.
Three main categories of confidential information exist: business, employee and
management information.
The general statement of the requirement for multilevel security is that a subject (e.g
military-field marshal –the highest rank) at a high level may not convey information to a
subject at a lower(e.g. subedar) or incompatible level unless that flow accurately reflects the
will of an authorized user.
Types of confidentiality
Accountant confidentiality
Accountants work with confidential information and must be professional and trustworthy.
Equitable confidentiality
This doctrine protects confidential information that one party provides to another, with the
expectation that the information will not be disclosed or used without authorization.
Data confidentiality
This refers to protecting data from unauthorized access or disclosure, including personal
privacy and proprietary information.
Bell-LaPadula Model:
The BLP Security Model is
• A computer system is modeled as a state-transition system there is a set of subjects; some are
designated as trusted.
– Each state has objects, an access matrix, and the current access information.
– There are state transition rules describing how a system can go from one state to another
– Each subject s has a maximal security level Lm(s), and a current security level Lc(s)
– Each object has a classification level
• There are security classifications or security levels
– Users/principals/subjects have security clearances
– Objects have security classifications
It also supports discretionary access control by checking access rights from an access matrix. The Bell-
LaPadula model is defined by the following properties:
Simple security property (ss property)
—This property states that a subject at one level of confidentiality is not allowed to read information at a
higher level of confidentiality. This is sometimes referred to as ―no read up. ‖ A person in one
classification level, cannot read data in a higher classification level. If you have a Secret clearance, then
you cannot read objects with a label of Top Secret. This is also known as No Read Up.
Star * security property—This property states that a subject at one level of confidentiality is not
allowed to write information to a lower level of confidentiality. This is also known as ―no write down.‖
A person in a higher classification level cannot write messages to someone in a lower classification level.
If you have a clearance of Top Secret, then you cannot write messages to someone with a Secret
clearance. This is known as No Write Down.
The Discretionary Security Property (ds-property) - An individual (or role) may grant to another
individual (or role) access to a document based on the owner‘s discretion, constrained by the MAC rules.
INTEGRITY POLICIES
Integrity refers to the trustworthiness of data or resources. Integrity is usually defined in terms
of preventing improper or authorized change to data.
There are three main policies of integrity:
preventing unauthorized users from making modifications to data or programs.
Preventing authorized users from making improper or unauthorized modifications.
Maintaining internal and external consistency of data and programs.
Integrity Levels Integrity levels are defined by labels, consisting of two parts:
a classification
a set of categories.
Integrity levels are given to the subjects and objects in the system. Integrity labels tell the degree of
confidence that may be placed in the data.
Classification of Integrity
A classification is an element of hierarchical set of elements. It consists of these elements:
Crucial (c)
Very Important (VI)
Important (I)
The relationship of elements is:
C > VI > I
Each integrity level will be represented as L = (C, S)
where:
L is the integrity level
C is the classification
S is the set of categories.
BIBA MODEL
The Biba integrity model was published in 1977 at the Mitre Corporation, one year after the Bell La-
Padula model was published.
The primary motivation for creating this model is the inability of the Bell-LaPadula model to deal with
integrity of data.
The Biba model addresses the problem with the star property of the Bell-LaPadula model, which does
not restrict a subject from writing to a more trusted object. The Biba model on the other hand ignores
confidentiality all together and deals only with integrity. So, the main goal of the Biba model is to
prevent unauthorized users from making modifications to a particular document.
Subjects and Objects
Like other models, the Biba model supports the access control of both subjects and objects.
Subjects are the active elements in the system that can access information (processes acting on
behalf of the users).
Objects are the passive system elements for which access can be requested (files, programs,
etc.).
Each subject and object in the Biba model will have a integrity level associated with it. Access Modes The
Biba model consists of the following access modes:
Modify: the modify right allows a subject to write to an object. This mode is similar to the write mode in
other models.
Observe: the observe right allows a subject to read an object. This command is synonyms with the read
command of most other models.
Invoke: the invoke right allows a subject to communicate with another subject.
Execute: the execute right allows a subject to execute an object. The command essentially allows a
subject to execute a program which is the object.
Hybrid Policies:
A hybrid work policy is a written document that outlines how a company balances
remote and in-person work. It can help with recruiting, building company culture, and
running a more efficient business.
A hybrid work policy can include:
Guidelines: How, when, and where employees work
Expectations: In-office expectations, remote work options, and working hours
Best practices: Collaboration and communication best practices, processes, and
tools
Technology: Technology, equipment, and office access guidelines and resources
Safety: Workplace safety procedures and security and compliance regulations
Contact details: Contact details for follow-up questions related to the policy
Benefits of hybrid work include:
Collaboration
Innovation
Building culture
Quiet
Lack of commuting