IFS 504 Lecture Note
IFS 504 Lecture Note
1
availability. This means that people who are authorized to get information
cannot get what they need. Availability is often the most important attribute in
service-oriented businesses that depend on information (for example, airline
schedules and online inventory systems).
Availability of the network itself is important to anyone whose business or
education relies on a network connection. When users cannot access the
network or specific services provided on the network, they experience a denial
of service. To make information available to those who need it and who can be
trusted with it, organizations use authentication and authorization.
Authentication is proving that a user is the person he or she claims to be. That
proof may involve something the user knows (such as a password), something
the user has (such as a “smartcard”), or something about the user that proves the
person’s identity (such as a fingerprint).
Authorization is the act of determining whether a particular user (or computer
system) has the right to carry out a certain activity, such as reading a file or
running a program. Authentication and authorization go hand in hand. Users
must be authenticated before carrying out the activity they are authorized to
perform. Security is strong when the means of authentication cannot later be
refuted—the user cannot later deny that he or she performed the activity. This is
known as nonrepudiation.
These concepts of information security also apply to the term information
security; that is, internet users want to be assured that • they can trust the
information they use • the information they are responsible for will be shared
only in the manner that they expect • the information will be available when
they need it • the systems they use will process information in a timely and
trustworthy manner In addition, information assurance extends to systems of all
kinds, including large-scale distributed systems, control systems, and embedded
systems, and it encompasses systems with hardware, software, and human
components. The technologies of information assurance address system
intrusions and compromises to information.
It is remarkably easy to gain unauthorized access to information in an insecure
networked environment, and it is hard to catch the intruders. Even if users have
nothing stored on their computer that they consider important, that computer
can be a “weak link,” allowing unauthorized access to the organization’s
systems and information. Seemingly innocuous information can expose a
computer system to compromise. Information that intruders find useful includes
which hardware and software are being used, system configuration, type of
network connections, phone numbers, and access and authentication procedures.
2
Security-related information can enable unauthorized individuals to access
important files and programs, thus compromising the security of the system.
Examples of important information are passwords, access control files and keys,
personnel information, and encryption algorithms. No one on the internet is
immune. Those affected include banks and financial companies, insurance
companies, brokerage houses, consultants, government contractors,
government agencies, hospitals and medical laboratories, network service
providers, utility companies, the textile business, universities, and wholesale
and retail trades. The consequences of a break-in cover a broad range of
possibilities: a minor loss of time in recovering from the problem, a decrease in
productivity, a significant loss of money or staff-hours, a devastating loss of
credibility or market opportunity, a business no longer able to compete, legal
liability, and the loss of life. Individuals may find that their credit card, medical,
and other private information has been compromised. Identity theft can affect
anyone.
3
iv. Remote-to-Local (R2L) attacks involve sending packets to the victim
machine. The cybercriminal learns the user's activities and obtains
privileges which an end-user could have on the computer system.
Within these broad categories, there are many different forms of computer
attacks. A summary of these attacks with a brief explanation, characteristics,
and examples are presented in Table 1.
Types of
Explanation Example
Attack
Long URL strings are a
Buffer Attacks the buffer's boundaries and overwrites
common input. Cowan,
Overflow memory area.
et al. (1998)
Reproduces itself on the local host or through SQL Slammer, Mydoom,
Worm
the network. CodeRed Nimda.
Programs appear attractive and genuine, but Zeus, SpyEye Alazab, et
Trojan
have malicious code embedded inside them. al. (2013)
A security event to disrupt the network
Buffer overflow, Ping of
Denial of services. It is started by forcing reset on the
death (PoD), TCP SYN,
service target computers. The users can no longer
smurf, teardrop Zargar,
(DoS) connect to the system because of
et al. (2013)
unavailability of service.
Common
Gateway The attacker takes advantage of CGI scripts to
Phishing email;
Interface create an attack by sending illegitimate inputs
Aljawarneh (2016)
(CGI) to the web server.
Scripts
Attacks the limited size of NIDS to handle
Denial of Service (Dos)
huge traffic loads and to investigate for
Traffic or Distributed Denial of
possible intrusions. If a cybercriminal can
Flooding Service (DDoS)
cause congestion in the networks, then NIDS
Zargar, et al. (2013)
will be busy in analyzing the traffic.
Physical Aims to attack the physical mechanisms of the Cold boot, evil maid
Attack computer system. (Pasqualetti et al., 2013).
Aims to break the password within a small A dictionary attack,
Password
time, and is noticed by a sequence of failures Rainbow attack (Das et
Attack
login. al., 2014).
Gathers information or finds weaknesses in
Information System scan, port scan,
computers or networks by sniffing or
Gathering (Bou-Harb et al., 2014).
searching.
4
Types of
Explanation Example
Attack
Intercept packets,
The cybercriminal accesses as a normal user
rainbow attack, social
User to Root in the beginning and then upgrades to a super-
engineering Rootkit, load
(U2R) attack user which may lead to exploitation of several
module, (Perl
vulnerabilities of the system.
Raiyn, 2014).
Warezclient, ftp write,
Remote to The cybercriminal sends packets to a remote
multihop,phf, spy,
Local (R2L) system by connecting to the network without
warezmaster, imap
attack having an account on the system.
(Raiyn, 2014).
Identifying the valid IP addresses by scanning Sweep, portsweep (So-In
Probe
the network to gather host data packets. et al., 2014)
5
Detection Method of IDS Deployment
Beyond their deployment location, IDS solutions also differ in how they
identify potential intrusions:
Intrusion Detection Systems and firewalls are both cybersecurity solutions that
can be deployed to protect an endpoint or network. However, they differ
significantly in their purposes.
6
network packets and allows or blocks traffic based upon predefined rules. This
creates a boundary over which certain types of traffic or protocols cannot pass.
The first step in creating and implementing the Threat Assessment process in
your school is to have a clear idea of the purpose, capabilities, and limitations of
threat assessment. In other words, knowing what it IS, and what it IS NOT.
7
Threat Assessment IS: Threat Assessment IS NOT:
8
Threatening and other disturbing behaviour can come in a variety of forms. A
threat may be:
Expressed or communicated verbally, behaviourally, visually, in writing,
electronically, or through other means.
Expressed directly or indirectly.
Issued by someone known or unknown to the target.
Threat Assessment teams and programs are designed to address any behaviour
or communication that raises concern that a person or situation may pose a
danger to the safety of the school, campus, or workplace.
Now that we’ve briefly examined what threat assessment is, let’s identify what
it is not. Threat assessment is not a simple checklist of warning signs or red
flags that an administrator or school counselor completes based on a single
threat or incident. Threat assessment examines the whole picture, not just an
isolated event. The use of threat assessment principles is not a means to kick
kids out of school or label them as troublemakers, but instead to craft a plan for
effectively intervening and managing the individual.
Perhaps most importantly, threat assessment is not just about “finding the next
school shooter”. It goes far beyond just that single purpose. Threat assessment
can assist schools in identifying and intervening with a wide range of troubling
or potentially violent situations.
9
Impact of Security Breaches
10
Common Vulnerabilities and Exposures https://cve.mitre.org/
The MITRE Corporation maintains CVE and this public Web site, manages the
compatibility program, oversees the CVE Naming Authorities, and provides
impartial technical guidance to the CVE Editorial Board throughout the process
to ensure CVE serves the public interest. MITRE is not an acronym but is a
thought-about company name to represent the substantial cybersecurity
knowledge base funded by NIST (National Institute of Standards and
Technology). But the framework that it released by the name of ATT&CK
stands for Adversary Tactics, Techniques and Common Knowledge.
Application Testing/observations.
11
How would customer remediate the security vulnerability?
No matter how you detect the security vulnerability, customer should get the
security vulnerability assessed by their security team.
If the security team confirms that it is security threat to the product, open the
ticket with IBM detailing the security vulnerability and supporting
documentation.
Cross-Site Scripting
Reflected XSS, where the malicious script comes from the current HTTP
request.
12
Stored XSS, where the malicious script comes from the website's
database.
DOM-based XSS, where the vulnerability exists in client-side code rather
than server-side code.
The application doesn't perform any other processing of the data, so an attacker
can easily construct an attack like this:
https://insecure-
website.com/status?message=<script>/*+Bad+stuff+here...+*/</script>
<p>Status: <script>/* Bad stuff here... */</script></p>
If the user visits the URL constructed by the attacker, then the attacker's script
executes in the user's browser, in the context of that user's session with the
application. At that point, the script can carry out any action, and retrieve any
data, to which the user has access.
The data in question might be submitted to the application via HTTP requests;
for example, comments on a blog post, user nicknames in a chat room, or
contact details on a customer order. In other cases, the data might arrive from
13
other untrusted sources; for example, a webmail application displaying
messages received over SMTP, a marketing application displaying social media
posts, or a network monitoring application displaying packet data from network
traffic.
The application doesn't perform any other processing of the data, so an attacker
can easily send a message that attacks other users:
<p><script>/* Bad stuff here... */</script></p>
In the following example, an application uses some JavaScript to read the value
from an input field and write that value to an element within the HTML:
var search = document.getElementById('search').value;
If the attacker can control the value of the input field, they can easily construct a
malicious value that causes their own script to execute:
You searched for: <img src=1 onerror='/* Bad stuff here... */'>
In a typical case, the input field would be populated from part of the HTTP
request, such as a URL query string parameter, allowing the attacker to deliver
an attack using a malicious URL, in the same manner as reflected XSS.
14
What can XSS be used for?
The actual impact of an XSS attack generally depends on the nature of the
application, its functionality and data, and the status of the compromised user.
For example:
The vast majority of XSS vulnerabilities can be found quickly and reliably
using Burp Suite's web vulnerability scanner.
Manually testing for reflected and stored XSS normally involves submitting
some simple unique input (such as a short alphanumeric string) into every entry
point in the application, identifying every location where the submitted input is
returned in HTTP responses, and testing each location individually to determine
whether suitably crafted input can be used to execute arbitrary JavaScript. In
15
this way, you can determine the context in which the XSS occurs and select a
suitable payload to exploit it.
Manually testing for DOM-based XSS arising from URL parameters involves a
similar process: placing some simple unique input in the parameter, using the
browser's developer tools to search the DOM for this input, and testing each
location to determine whether it is exploitable. However, other types of DOM
XSS are harder to detect. To find DOM-based vulnerabilities in non-URL-based
input (such as document.cookie) or non-HTML-based sinks (like setTimeout),
there is no substitute for reviewing JavaScript code, which can be extremely
time-consuming. Burp Suite's web vulnerability scanner combines static and
dynamic analysis of JavaScript to reliably automate the detection of DOM-
based vulnerabilities.
Content security policy (CSP) is a browser mechanism that aims to mitigate the
impact of cross-site scripting and some other vulnerabilities. If an application
that employs CSP contains XSS-like behaviour, then the CSP might hinder or
prevent exploitation of the vulnerability. Often, the CSP can be circumvented to
enable exploitation of the underlying vulnerability.
Dangling markup injection is a technique that can be used to capture data cross-
domain in situations where a full cross-site scripting exploit is not possible, due
to input filters or other defenses. It can often be exploited to capture sensitive
information that is visible to other users, including CSRF tokens that can be
used to perform unauthorized actions on behalf of the user.
16
How to prevent XSS attacks?
Preventing cross-site scripting is trivial in some cases but can be much harder
depending on the complexity of the application and the ways it handles user-
controllable data.
Filter input on arrival. At the point where user input is received, filter
as strictly as possible based on what is expected or valid input.
Encode data on output. At the point where user-controllable data is
output in HTTP responses, encode the output to prevent it from being
interpreted as active content. Depending on the output context, this might
require applying combinations of HTML, URL, JavaScript, and CSS
encoding.
Use appropriate response headers. To prevent XSS in HTTP responses
that aren't intended to contain any HTML or JavaScript, you can use
the Content-Type and X-Content-Type-Options headers to ensure that
browsers interpret the responses in the way you intend.
Content Security Policy. As a last line of defense, you can use Content
Security Policy (CSP) to reduce the severity of any XSS vulnerabilities
that still occur.
How common are XSS vulnerabilities? XSS vulnerabilities are very common,
and XSS is probably the most frequently occurring web security vulnerability.
How common are XSS attacks? It is difficult to get reliable data about real-
world XSS attacks, but it is probably less frequently exploited than other
vulnerabilities.
17
What is the difference between XSS and CSRF? XSS involves causing a web
site to return malicious JavaScript, while CSRF involves inducing a victim user
to perform actions they do not intend to do.
What is the difference between XSS and SQL injection? XSS is a client-side
vulnerability that targets other application users, while SQL injection is a
server-side vulnerability that targets the application's database.
How do I prevent XSS in PHP? Filter your inputs with a whitelist of allowed
characters and use type hints or type casting. Escape your outputs
with htmlentities and ENT_QUOTES for HTML contexts, or JavaScript
Unicode escapes for JavaScript contexts.
How do I prevent XSS in Java? Filter your inputs with a whitelist of allowed
characters and use a library such as Google Guava to HTML-encode your
output for HTML contexts, or use JavaScript Unicode escapes for JavaScript
contexts.
Cross-site scripting
In this section, we'll explain what cross-site scripting is, describe the different
varieties of cross-site scripting vulnerabilities, and spell out how to find and
prevent cross-site scripting.
18
application, then the attacker might be able to gain full control over all of the
application's functionality and data.
Incident Response
In the event that our risk management efforts fail, incident response exists to
react to such events. Incident response should be primarily oriented to the items
that we feel are likely to cause us pain as an organization, which we should now
know based on our risk management efforts. Reaction to such incidents should
be based, as much as is possible or practical, on documented incident response
plans, which are regularly reviewed, tested, and practiced by those who will be
expected to enact them in the case of an actual incident. The actual occurrence
of such an emergency is not the time to (attempt to) follow documentation that
has been languishing on a shelf, is outdated, and refers to processes or systems
that have changed heavily or no longer exists.
The incident response process, at a high level, consists of:
Preparation
Containment
Eradication
Recovery
Preparation
The preparation phase of incident response consists of all of the activities that
we can perform, in advance of the incident itself, in order to better enable us to
19
handle it. This typically involves having the policies and procedures that govern
incident response and handling in place, conducting training and education for
both incident handlers and those who are expected to report incidents,
conducting incident response exercises, developing and maintaining
documentation, and numerous other such activities.
The importance of this phase of incident response should not be underestimated.
Without adequate preparation, it is extremely unlikely that response to an
incident will go well and/or in the direction that we expect it to go. The time
determines what needs to be done, who needs to do it, and how to do it, is not
when we are faced with a burning emergency.
The detection and analysis phase is where the action begins to happen in
our incident response process. In this phase, we will detect the occurrence of an
issue and decide whether or not it is actually an incident so that we can respond
to it appropriately.
The detection portion of this phase will often be the result of monitoring of or
alerting based on the output of a security tool or service. This may be output
from an Intrusion Detection System (IDS), Anti Virus (AV) software, firewall
logs, proxy logs, alerting from a Security Information and Event Monitoring
(SIEM) tool if program is internal or Managed Security Service
Provider (MSSP) if program is external, or any of a number of similar sources.
20
Containment, Eradication, and Recovery
The containment, eradication, and recovery phase is where the majority of the
work takes place to actually solve the incident, at least in the short term.
Containment involves taking steps to ensure that the situation does not cause
any more damage than it already has, or to at least lessen any ongoing harm. If
the problem involves a malware infected server actively being controlled by
a remote attacker, this might mean disconnecting the server from the network,
putting firewall rules in place to block the attacker, and updating signatures or
rules on an Intrusion Prevention System (IPS) in order to halt the traffic from
the malware.
During eradication, we will attempt to remove the effects of the issue from our
environment. In the case of our malware infected server, we have already
isolated the +system and cut it off from its command and control network. Now
we will need to remove the malware from the server and ensure that it does not
exist elsewhere in our environment. This might involve additional scanning of
other hosts in the environment to ensure that the malware is not present, and
examination of logs on the server and activities from the attacking devices on
the network in order to determine what other systems the infected server had
been in communication with.
With malware, particularly very new malware or variants, this can be a tricky
task to ensure that we have properly completed. The adversary is constantly
developing countermeasures to the most current security tools and
methodologies. Whenever doubt exists as to whether malware or attackers have
been truly evicted from our environment, we should err to the side of caution
while balancing the impact to operations. Each event requires a risk assessment.
Lastly, we need to recover to a better state that were in which we were prior to
the incident, or perhaps prior to the issue started if we did not detect the
problem immediately. This would potentially involve restoring devices or data
from backup media, rebuilding systems, reloading applications, or any of a
number of similar activities.
Additionally we need to mitigate the attack vector that was used. Again, this can
be a more painful task than it initially sounds to be, based on potentially
incomplete or unclear knowledge of the situation surrounding the incident and
what exactly did take place. We may find that we are unable to verify that
backup media is actually clean and free or infection, backup media may be bad
entirely, application install bits may be missing, configuration files may not be
available, and any of a number of similar issues.
21
Post incident activity
Post incident activity, as with preparation, is a phase we can easily overlook, but
should ensure that we do not. In the post incident activity phase, often referred
to as a postmortem (latin for after death), we attempt to determine specifically
what happened, why it happened, and what we can do to keep it from happening
again. This is not just a technical review as policies or infrastructure may need
to be changed. The purpose of this phase is not to point fingers or place blame
(although this does sometimes happen), but to ultimately prevent or lessen the
impact of future such incidents.
Incident response processes can thus be categorized into two specific
approaches, based on the degree to which these triggers are addressed:
Hybrid incident response processes that attempt to do both front-end and back-
end processing of available information are certainly possible, but the real
decision point is whether to invest the time, resources, and money necessary for
front-loaded prevention. These two types of processes can be illustrated on the
time line of information that becomes available to the security team as an attack
proceeds. For front-loaded prevention, the associated response costs and false
positive rates are high, but the associated risk of missing information that could
signal an attack is lower; for a back-loaded response, these respective values are
the opposite (see Figure 1).
22
Figure 1. Comparison of front-loaded and back-loaded response processes
Scripting is a critical part of the incident response (IR) process. In this chapter
we will touch on the different elements required to start an IR collection script
as well its analysis counterpart. When starting off there are a number of
decisions that need to be made such as picking which language to use, what
tools need to be carried over to the victim system, and what tools need to be
ready on our analysis system to start diving into collected artifacts. The
23
collection process is critical to the investigation and depending on the size of
your environment, you may only get one convenient shot to collect that data.
Therefore, you want to be as thorough as possible. To state the obvious, you
can’t analyze data that you didn’t collect in the first place. The good news is
that there are a massive amount of tools already built into OS X. This book aims
to use those tools to the best of their abilities so that fewer tools need to be
carried over to the victim system.
Detection
One of the most important steps in the incident response process is the detection
phase. Detection (also called identification) is the phase in which events are
analyzed in order to determine whether these events might comprise a security
incident. Without strong detective capabilities built into the information systems,
the organization has little hope of being able to effectively respond to
information security incidents in a timely fashion. Organizations should have a
regimented and, preferably, automated fashion for pulling events from systems
and bringing those events into the wider organizational context. Often when
events on a particular system are analyzed independently and out of context,
then an actual incident might easily be overlooked. However, with the benefit of
seeing those same system logs in the context of the larger organization, patterns
indicative of an incident might be noticed. An important aspect of this phase of
incident response is that during the detection phase it is determined as to
whether an incident is actually occurring or has occurred. It is a rather common
occurrence for potential incidents to be deemed strange, but innocuous after
further review.
Methodology
Different books and organizations may use different terms and phases
associated with the incident response process; this section will mirror the terms
associated with the examination. Many incident-handling methodologies treat
containment, eradication, and recovery as three distinct steps, as we will in this
book. Other names for each step are sometimes used; the current exam lists a
seven-step lifecycle but curiously omits the first step in most incident handling
methodologies: preparation. Perhaps preparation is implied, like the
identification portion of AAA systems. We will therefore cover eight steps,
mapped to the current exam.
Preparation
The preparation phase includes steps taken before an incident occurs. These
include training, writing incident response policies and procedures, and
24
providing tools such as laptops with sniffing software, crossover cables, original
OS media, removable drives, etc. Preparation should include anything that may
be required to handle an incident or that will make incident response faster and
more effective.
Detection (identification)
One of the most important steps in the incident response process is the detection
phase. Detection, also called identification, is the phase in which events are
analyzed in order to determine whether these events might comprise a security
incident. Without strong detective capabilities built into the information systems,
the organization has little hope of being able to effectively respond to
information security incidents in a timely fashion.
Response (containment)
25
attempts to keep further damage from occurring as a result of the incident.
Responses might include taking a system off the network, isolating traffic,
powering off the system, or other items to control both the scope and severity of
the incident. This phase is also typically where a binary (bit-by-bit) forensic
backup is made of systems involved in the incident. An important trend to
understand is that most organizations will now capture volatile data before
pulling the power plug on a system.
Mitigation (eradication)
Reporting
Recovery
26
dictate when the system will go back online. Remember to be cognizant of the
possibility that the infection, attacker, or other threat agent might have persisted
through the eradication phase. For this reason, close monitoring of the system
after it returns to production is necessary. Further, to make the security
monitoring of this system easier, strong preference is given to the restoration of
operations occurring during off-peak production hours.
Remediation
Lessons learned
The goal of this phase is to provide a final report on the incident, which will be
delivered to management. Important considerations for this phase should
include detailing ways in which the compromise could have been identified
sooner, how the response could have been quicker or more effective, which
organizational shortcomings might have contributed to the incident, and what
other elements might have room for improvement. Feedback from this phase
feeds directly into continued preparation, where the lessons learned are applied
to improving preparation for the handling of future incidents.
The day-to-day tasks you can expect to perform as a security engineer will vary
depending on your company, industry, and the size of your security team.
Identifying security measures to improve incident response
Responding to security incidents
Coordinating incident response across teams
Performing security assessments and code audits
Developing technical solutions to security vulnerabilities
Researching new attack vectors and developing threat models
Automating security improvements
27
As information security grows in importance across industries, so does the need
for security engineers. This means you can find jobs in health care, finance, non-
profit, government, manufacturing, or retail, to name a few.
Risk assessments are a lot like stargazing. You can wave your telescope at the
sky and hope you see something. Or, you can make a plan to focus on specific
areas of the sky where there’s a greater likelihood of spotting a comet flying
past.
Similarly, you can get a general idea of your corporate risk by evaluating risk
events and breaches as they happen. Or, you can proactively use tools and
technology to gain a more informed view of your existing—and yet-to-be-
known— levels of risk.
28
What Is a Risk Assessment Framework?
It also examines how this flaw might affect other baseline operations like sales,
inventory, and employee productivity. The 10,000-foot-view option of these
baseline risk assessments touches almost every function, from people, HR, and
tools to processes, materials, environment, and finances.
29
2. Issue-based risk assessments
While baseline assessments cover problems with regular, consistent processes,
issue-based risk assessments take things a step further. They look at the risk
created as a domino effect from issues identified in the baseline assessment.
Let’s go back to our brick-and-mortar store with the security-free back door.
That back door was just used as an entry point for a successful burglary. Now,
it’s time to run an issue-based assessment and examine how situational changes
contributed to this incident. Have shift changes contributed to the door being
unlocked for longer than usual during business hours? Is the ordinarily
operational security camera by that door out of service?
A continuous risk assessment should be run all the time—including before and
after an incident. Continuing the brick-and-mortar store example, a store
manager would likely already have information from a baseline assessment and
recognize their employee entrance is a potential vulnerability. They could then
take steps to fortify that entrance and reduce security risks, like adding a
password keypad or ID scanning or replacing the broken security camera to
deter thieves from entering. If an event does occur, they could use the
information provided by the issue-based assessment to fix the issues that caused
that problem in the first place. Either way, in a continuous assessment, the
potential vulnerability will continue to be monitored and assessed to see if fixes
prevent future incidents or if a new strategy or protocol needs to be
implemented.
The invaluable information from these assessments will mitigate potential risks
before they become events and offer risk event-related information to make
further mitigation efforts more effective.
30
Common Risk Assessment Frameworks
There are many different assessment frameworks available. The one you choose
will depend on your area of risk management and security, your industry, and
the type of risk you need to address. Many respected organizations offer
standardized RAFs for specialized industries to ease the assessment process.
Here are some common frameworks and the industries they serve:
31
Steps to Build Your First Customized Risk Assessment Framework
Knowing what you should do to assess risk is pointless without knowing how to
do it. So, now that you know the assessment type and RAF your company could
most benefit from, it’s time to build and implement your customized framework
to start seeing results.
Here are five foundational steps your company should take to establish its first
customized risk assessment.
Once you’ve established your ideal risk identification process, it’s time to
engage your workforce. Ask knowledgeable or seasoned employees from
various departments what risks or control areas are a significant struggle for
them. Use these results to create an internal risk scale to prioritize your more
urgent security needs over less pressing ones.
It may seem obvious, but you won’t be able to address them all at once. Once
you have a list of your risks, you’ll need to prioritize them. Evaluate each one
based on how likely it is to happen and how catastrophic it would be if it
happened. Something that has a high impact should it happen, but a low chance
of taking place isn’t as important to fix as something with an increased
likelihood of occurring and a significant impact if it does. Plot each risk on a
risk matrix with the probability of the event happening along one axis and
32
consequence severity on the other.
From here, you can create a risk matrix—we like the bow-tie method—to
analyze the likelihood and consequences of potential risks.
Use the risk matrix created in step one to assess which risks pose the most
urgent threat and should be addressed by your risk management strategy first.
Then separate those risks into core functions and non-essential ones. Some risks
are inevitable. Software bugs up. Machinery needs maintenance. Firewalls can
fail. Any business that wants to keep running and growing has to accept an
inherent amount of enterprise risk. You must accept core risks to develop and
maintain operations, though you should try to mitigate them as much as
possible.
Non-essential risks that don’t affect core operations could be eliminated entirely.
However, some risks (like a company accepting risk beyond its tolerance
because its last risk assessment is out-of-date) can be avoided by better
processes. Eliminating small, easy-to-address risks lets you focus on the big
ones without compromising overall security or worrying about other processes
breaking down.
33
happen gradually to save time and resources you would otherwise need to
execute an all-in process. For example, tweaking a new hire’s job description or
operation is far simpler than asking a long-time employee to alter their
workload or process.
34
RMF provides a process that integrates security, privacy, and supply chain risk
management activities into the system development lifecycle, according to NIST.
It can be applied to new and legacy systems, any type of system or technology
including internet of things (IoT) and control systems, and within any type of
organization regardless of size or sector. The seven RMF steps are:
NIST has produced several risk-related publications that are easy to understand
and applicable to most organizations, says Mark Thomas, president of Escoute
Consulting and a speaker for the Information Systems Audit and Control
Association (ISACA). “These references provide a process that integrates
security, privacy, and cyber supply chain risk management activities that assists
in control selection and policy development,” he says. “Sometimes thought of as
guides for government entities, NIST frameworks are powerful reference for
government, private, and public enterprises.”
OCTAVE
35
structures. The other is OCTAVE Allegro, which is a more comprehensive
framework suitable for large organizations or those that have complex structures.
The flexibility of the methodology “allows teams from operations and IT to work
together to address the security needs of the organization,” Thomas says.
COBIT
The latest version, COBIT 2019, offers more implementation resources, practical
guidance and insights, as well as comprehensive training opportunities, according
to ISACA. It says implementation is now more flexible, enabling organizations to
customize their governance via the framework.
The framework “is the only model that addresses the governance and
management of enterprise information and technology, which includes an
emphasis [on] security and risk,” Thomas says. “Although the primary intent of
COBIT is not specifically in risk, it integrates multiple risk practices throughout
the framework and refers to multiple globally accepted risk frameworks.”
36
TARA
FAIR
Factor Analysis of Information Risk (FAIR) is a taxonomy of the factors that
contribute to risk and how they affect each other. Developed by Jack Jones,
former CISO of Nationwide Mutual Insurance, the framework is mainly
concerned with establishing accurate probabilities for the frequency and
magnitude of data loss events.
37
computational engine for calculating risk, and a model for analyzing complex
risk scenarios.
FAIR “is one of the only methodologies that provides a solid quantitative model
for information security and operational risk,” Thomas says. “This pragmatic
approach to risks provides a solid foundation to assessing risks in any enterprise.”
However, while FAIR provides a comprehensive definition of threat,
vulnerability, and risk, “it’s not well documented, making it difficult to
implement,” he says.
The model differs from other risk frameworks “in that the focus is on quantifying
risks into actual dollars, as opposed to the traditional ‘high, medium, low’ scoring
of others,” Retrum says. “This is gaining traction with senior leaders and board
members, enabling a more thoughtful business discussion by better quantifying
risks in a meaningful way.”
Encryption Algorithms
Encryption algorithms are mathematical methods of transforming data into an
unreadable form, using a secret key. These algorithms can be divided into two
categories: symmetric encryption, which uses the same key for both encryption
and decryption (e.g. AES, DES, or RC4), and asymmetric encryption, which
uses a pair of keys (e.g. RSA, ECC, or DH). The implementation of these
algorithms can be done either in hardware or software, depending on the desired
balance between performance, power consumption, and flexibility.
39
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography
based on the algebraic structure of elliptic curves over finite fields.
This key can then be used to encrypt subsequent communications using a
symmetric-key cipher. Diffie–Hellman is used to secure a variety of Internet
services.
Encryption Modes
Encryption modes are ways of applying encryption algorithms to data,
depending on the size and structure of the data. These modes can be divided
into two categories: block encryption and stream encryption. Block encryption
uses a block cipher, such as AES or DES, to encrypt data in fixed-size chunks,
such as 128 bits or 256 bits. Stream encryption uses a stream cipher, such as
RC4 or ChaCha20, to encrypt data in a continuous stream. The security and
efficiency of the encryption process is affected by how the encryption mode
handles the initialization vector, padding, and chaining of the data blocks or
streams.
Key Management
Key management is the process of generating, storing, distributing, and
updating the keys used for encryption and decryption. It can be difficult to
manage keys in integrated circuit design due to the limited resources and
capabilities of the hardware devices. Key management includes key generation,
which is the process of creating random and secure keys using sources of
entropy such as PUFs or noise generators. Key storage involves storing them in
a secure and accessible way using memory devices like ROM, EEPROM, or
flash memory. Key distribution is the process of transferring the keys to
intended recipients through communication protocols such as SSL/TLS, SSH,
or NFC. Lastly, key update is changing the keys periodically or after an event
like a breach or compromise.
Security Protocols
Security protocols are sets of rules and procedures that govern the
communication and interaction between different entities in a system, such as
devices, servers, or users. These protocols can provide several functions, such
as authentication by verifying the identity of the entities involved with
passwords, certificates, or biometrics; authorization by granting or denying
access to certain resources or operations based on roles and privileges;
confidentiality by ensuring data exchanged is encrypted and protected from
40
eavesdropping; and integrity by making sure data is not modified or corrupted
during transmission or storage. To achieve these functions, security protocols
may use methods such as access control lists, tokens, policies, encryption
algorithms, encryption modes, key management, checksums, hashes, or digital
signatures.
Security Challenges and Threats
Security challenges and threats are the potential risks and vulnerabilities that
can compromise the security and functionality of integrated circuits and their
data. These can be divided into passive attacks, which involve attempts to
observe or analyze the data or hardware without affecting them (e.g. snooping,
sniffing, or side-channel analysis), and active attacks, which attempt to alter or
manipulate the data or hardware (e.g. injection, modification, deletion, or
physical damage). Countermeasures exist to mitigate these threats, such as
encryption, obfuscation, anti-tamper mechanisms, or security protocols.
Security Protocols
A sequence of operations that ensure protection of data. Used with a
communications protocol, it provides secure delivery of data between two
parties. The term generally refers to a suite of components that work in tandem
(see below). For example, the 802.11i standard provides these functions for
wireless LANs.
Access Control
Encryption Algorithm
The cryptographic cipher combined with various methods for encrypting the
text.
Cryptography
41
Cryptography is a major driver behind Bitcoin and blockchains, which hide the
coin owner's identity in an encrypted address.
BitLocker
A utility in Windows, starting with Vista, that encrypts the entire contents of the
storage drive (hard disk or SSD). If the computer's motherboard has a Trusted
Platform Module (TPM) chip, the operation is entirely transparent to the user.
Non-TPM Operation
If the motherboard does not have a TPM chip, BitLocker can be used in two
ways. In User Authentication Mode, a PIN or password must be entered when
the computer is turned on. In USB Key Mode, either a USB drive or a smart
card with a USB interface is inserted at startup.
Two encryption systems come with Windows. BitLocker encrypts the entire
storage drive, whereas Encrypting File System (EFS) is used to encrypt specific
files.
ScramDisk
42
No longer supported, ScramDisk for Linux (SD4L) was also created. An
enhanced, commercial version called DriveCrypt is available from SecurStar
GmbH .
Waggle Mouse to Select CipherThis dialog was used to select the encryption
algorithm (for a brief explantion of each, Waggle means "shake," and the more
the mouse was shaken, the more randomness was introduced into the key
creation.
Digital signature
Signed Certificates
Signed Executables
Code signing verifies the integrity of executables downloaded from the Internet
(see code signing).
Bitcoin and other blockchain networks use digital signatures to verify the
integrity of their transactions.
Transmitted in the ClearIn this example, the message is tamperproof but can
be read
43
-by an eavesdropper.
Transmitted in SecretIn this example, the message is both tamperproof and
transmitted in secret.
Crypto Addresses
The private key is used to withdraw digital coins and must be backed up and
kept secret. The public key is used to receive coins and can be freely shared in a
manner similar to a bank account number for a wire transfer.
Every transaction that a person makes on the blockchain, no matter how long
ago, can be viewed by anyone via the public address. However, with sufficient
effort by a hacker or government agency, a public address can eventually be
matched with the name of a person or entity.
There are several systems that translate human readable addresses to public
crypto addresses
44
Bitcoin Public Address: A public address can be freely published to receive
bitcoins. For quick scanning, QR codes of public addresses are commonly
available in wallets and on exchanges. To generate a Bitcoin public key, there
are several steps; for details,
Steganographic
Social Steganography
Hiding messages that are published online. The topic was popularized in an
article by Microsoft researcher Danah Boyd in 2010. She cited an example of a
young girl posting lyrics to Monty Python's "Always Look on the Brighter Side
of Life" to keep her mother from knowing she broke up with her boyfriend and
getting overly involved. In the Monty Python movie, people were about to be
killed when the song played, and the girl's friends, hip to the movie, contacted
her independently.
There are two types of access control: physical and logical. Physical access
control limits access to campuses, buildings, rooms and physical IT assets.
Logical access control limits connections to computer networks, system files
and data.
To secure a facility, organizations use electronic access control systems that rely
on user credentials, access card readers, auditing and reports to track employee
access to restricted business locations and proprietary areas, such as data centers.
Some of these systems incorporate access control panels to restrict entry to
rooms and buildings, as well as alarms and lockdown capabilities, to prevent
unauthorized access or operations.
45
Logical access control systems perform
identification authentication and authorization of users and entities by
evaluating required login credentials that can include passwords, personal
identification numbers, biometric scans, security tokens or other authentication
factors. Multifactor authentication (MFA), which requires two or more
authentication factors, is often an important part of a layered defense to protect
access control systems.
46
Types of access control
The main models of access control are the following:
47
Attribute-based access control. This is a methodology that manages
access rights by evaluating a set of rules, policies and relationships
using the attributes of users, systems and environmental conditions.
Implementing access control
Access control is integrated into an organization's IT environment. It can
involve identity management and access management systems. These systems
provide access control software, a user database and management tools for
access control policies, auditing and enforcement.
The best practice of least privilege restricts access to only resources that
employees require to perform their immediate job functions.
48
assets out over physical locations and over a variety of unique devices, and
require dynamic access control strategies.
Authorization is the act of giving individuals the correct data access based on
their authenticated identity. One example of where authorization often falls
short is if an individual leaves a job but still has access to that company's assets.
This creates security holes because the asset the individual used for work -- a
smartphone with company software on it, for example -- is still connected to the
company's internal infrastructure but is no longer monitored because the
individual is no longer with the company. Left unchecked, this can cause major
security problems for an organization. If the ex-employee's device were to be
hacked, for example, the attacker could gain access to sensitive company data,
change passwords or sell the employee's credentials or the company's data.
One solution to this problem is strict monitoring and reporting on who has
access to protected resources so, when a change occurs, it can be immediately
identified and access control lists and permissions can be updated to reflect the
change.
49
Access Control Software
Many types of access control software and technology exist, and multiple
components are often used together as part of a larger identity and access
management (IAM) strategy. Software tools may be deployed on premises, in
the cloud or both. They may focus primarily on a company's internal access
management or outwardly on access management for customers. Types of
access management software tools include the following:
Microsoft Active Directory is one example of software that includes most of the
tools listed above in a single offering. Other IAM vendors with popular
products include IBM, Idaptive and Okta.
50
What are the main advantages and disadvantages of biometrics? Which
biometric systems are the most accurate? What is the difference between
behavioural systems and static ones? Let's try to understand the principles of
work and areas of application of biometrics.
It is easy to list a wide range of industries that require fast, reliable, and
convenient user authentication: access to a personal computer or smartphone,
access to email, banking transactions, opening doors and starting your car's
engine, controlling access to premises, crossing state borders, and any
interaction with government authorities that requires identification. Thus, faster
and more secure authentication mechanisms are essential for preventing fraud
and crime.
There are verification systems on the other end of the spectrum; as a rule, they
make only one comparison in a 1: 1 mode. That is, the presented biometric
feature is compared with one biometric part from the database. Therefore, the
system answers the question of whether you are who you claim to be.
In biometrics, two authentication methods are used:
51
Two Main Types of Biometrics
Physical Biometrics
The main goal of biometrics is to create a registration system that would very
rarely deny access to legitimate users and, at the same time, completely exclude
unauthorized intruders... Compared to passwords and cards, such a system
53
provides much more reliable protection: after all, your own body can neither be
stolen nor lost.
Physical biometrics analyze data such as facial features, eye structure (retina or
iris), finger parameters (papillary lines, relief, length of joints, etc.), palm (print
or topography), hand shape, vein pattern on the wrist, and heat pattern.
Pros:
54
Cons:
behavioural Biometrics
behavioural biometrics are also called passive because users do not need to take
any additional steps when operating. They don't need to put their finger on a
dedicated button or speak into a microphone. They just behave as usual.
behavioural biometrics can also detect fraud early, even before the attacker's act
(for example, stealing from stores or making a purchase).
Now, behavioural biometrics are most often used by banks and financial
institutions. Experts also see the potential for technology applications in e-
commerce, online services, healthcare, government, and consumer electronics.
55
Pros & Cons of behavioural Biometrics
Pros:
Cons:
User behaviour can be applied to identify someone, and it does require storing
large amounts of data. Stored data is used to develop a median behaviour for a
person, so it will increase identification accuracy when the user is tired, drunk,
56
hasty, or in other states.
After creating a normal behaviour portrait, all the redundant data can be
removed, but most of it remains for identification purposes. Verification can be
done only with one set of data (instead of using a database of million examples),
but still, a lot of information will be collected and stored in the process.
DNA Matching
Category: Chemical
Industry Leaders: Innocence Project, 23andMe, Family Tree, Ancestry
Use-Cases: Forensic science, calculating family ties between people and
determining their predisposition to various diseases based on their DNA
samples
Security Level: Very High
Integration Costs:
57
Pros:
Cons:
Category: Auditory
Industry Leaders: NEC Corporation, Yahoo Labs
Use-Cases: Smartphone authentication, protection of phone calls, personal
voice messages, wireless radios, and other audio information
Security Level: Very High
Integration Costs:
Pros:
Cons:
58
Technology is under development
Category: Visual
Industry Leaders: TechNavio, EyeLock, EyeVerify
Use-Cases: Mobile phones, online banking apps authentication
Security Level: Very High
Pros:
Cons:
Facial Recognition
59
Category: Visual & Spatial
Industry Leaders:
20 major vendors, namely, NEC (Japan), Aware (US), Gemalto (Netherlands),
Ayonix (Japan), Idemia (France), Cognitec (Germany), nVviso SA
(Switzerland), Daon (US), Stereovision Imaging (US), Techno Brain (Kenya),
Neurotechnology (Lithuania), Innovatrics (Slovakia), id3 Technologies (France),
Herta Security (Spain), Animetrics (US), Megvii {Face++} (China), FaceFirst
(US), Sightcorp (Netherlands), FacePhi (Spain), and SmilePass (UK).
Use-Cases: Controlling access to objects or systems, identification for video
management systems, determining the profile of the customer, identification in
the banking sector, time attendance systems, biometric authentication, payment
for services
Security Level: High
Pros:
Cons:
60
Category: Visual & Spatial
Industry Leaders: Fujitsu, Hitachi, NEC Corporation, Safran, Agnitio
Use-Cases: Identification in the banking sector and in medical institutions
Security Level: Very High
Pros:
High reliability
Almost impossible to counterfeit
Contactless scanning
Convenience of integration
Affordable price
Cons:
Fingerprint Recognition
61
Pros:
Easy to use
Convenience and reliability
Low cost of devices that scan a fingerprint image
Cons:
Inability to read the print with some scanners with excessively dry skin
Violation of the papillary pattern by small scratches, cuts, chemical
reagents can affect recognition
Pros:
High accuracy
Almost impossible to counterfeit
Contactless scanning
Cons:
62
Hand Geometry
Pros:
Cons:
Iris Recognition
Description: With this form of biometric identification, the pattern of the iris is
scanned by photographing the face with a high-resolution camera. The iris,
which is unique, is highlighted and converted into a digital code. Since the iris'
appearance of age spots or discoloration is possible, a black and white image is
used.
Category: Visual
Industry Leaders: EyeLock, Apple, Samsung, Fujitsu Ltd
Use-Cases: Integration in the access control system, identifying persons in
special areas (airports, border control areas, passport offices)
Security Level: High
63
Pros:
Fast scanning
Contactless
Safe for users
Recognition does not depend on glasses or contact lenses
Impossibility of counterfeiting
Cons:
Description: Body odor characteristics are so unique to each person that they
can be used for biometric authentication. This conclusion was reached in 2017
by a group of scientists consisting of Juliana Agudelo, Vladimir Privman, and
Jan Halamek. Their idea was very simple: the composition of amino acids in
sweat is unique for each person. If you design a smartphone to determine this
composition and distinguish it from others, the user can be authenticated using
their sweat. Unlike other biometric authentication methods, it is not easy to
counterfeit the unique chemical makeup of sweat. According to scientists, body
odor recognition can be used in practice in the next 5-10 years.
Category: Olfactory
Industry Leaders: IIia Sistemas SL, Universidad Politécnica de Madrid
Use-Cases: Unlocking smart devices to protecting data inside applications can
be used even by people with disabilities, unable to remember the password or
unable to control their limbs
Security Level: High
Pros:
Cons:
64
Accuracy Level: High
Pros:
Cons:
65
access to objects or systems.
Security Level: Very High
Pros:
Excellent security
Contactless scanning
Convenience of integration
Affordable price
Cons:
Retinal Scan
Description: The retinal scan allows capillaries deep inside the eye to be
scanned using near-infrared cameras. The resulting image is first preprocessed
to improve its quality. It is then converted into a biometric template for
registration of a new user and subsequent verification with the template during
attempts to recognize the user. The high cost and the need to place the eye close
to the camera hinder such scanners' wider use.
Pros:
Cons:
66
Skin Reflection
Category: Visual
Industry Leaders: Apple Inc, Trinamix, Qualcomm
Use-Cases: General identity verification, observation, human-computer
interaction
Security Level: Low
Pros:
Cons:
Thermography Recognition
Category: Visual
Industry Leaders: Estone Technology, TAMRON Europe GmbH, Axis
Communications (UK Ltd), FLIR Commercial Systems, LYNRED
Use-Cases: Used for recognition in airports, public transit hubs, offices, retail
businesses, health facilities, and on public streets
Security Level: High
67
Pros:
Cons:
Keystroke Dynamics
Category: behavioural
Industry Leaders: TypingDNA, ID Control, BehavioSec
Use-Cases: Device user identification, part of multifactor authentication, used
for observation
Security Level: High
Pros:
68
Hard to copy by observation
Cons:
Typing rhythm can change because of fatigue, illness, the effects of drugs
or alcohol, keyboard changes, etc.
Can't identify the same person using different keyboard layouts
Signature Recognition
Category: behavioural
Industry Leaders: Aerial, Redrock Biometrics, Sense, University of Oxford,
Mobbeel
Use-Cases: Document verification and authorization, identification in the
banking sector
Security Level: High
Pros:
Cons:
High recognition error rate until user get used to signing pad
Hand injuries can affect recognition accuracy
Speaker Recognition
Description: For this method, the user needs to speak a word or phrase into the
microphone. This is necessary to acquire a sample of a person's speech. The
69
microphone's electrical signal is converted to a digital signal using an analog-to-
digital converter (ADC). It is recorded in the computer memory as a digitized
sample. The computer then compares and tries to match the person's input voice
with the stored digitized voice sample and identifies the person. Speaker
recognition focuses on the context of the spoken phrase by the user, as opposed
to voice recognition.
Pros:
Convenience of integration
Fast recognition time
Contactless scanning
Cons:
Voice Recognition
Physiological aspects are based on the size and shape of the mouth, throat,
larynx, nasal cavity, each person's body weight, and other factors. behavioural
traits are based on language, educational level, and place of residence, which
can lead to the appearance of specific intonations, accents, and dialects.
70
Use-Cases: Online Banking sector, emergency services, call centers recognition,
high demand for voice recognition in healthcare
Security Level: Low
Pros:
Convenience of integration
Fast recognition time
Contactless scanning
Cons:
Risk of counterfeit
Inability to suppress external noise
Recognition accuracy problems
Gait Recognition
Description: Gait biometrics capture step patterns using video and then convert
the matched data into a mathematical equation. This type of biometrics is
discreet and unobtrusive, making it ideal for mass crowd surveillance. It is also
an advantage that these systems can quickly identify people from afar.
Category: behavioural
Industry Leaders: SFootBD, Watrix, Cometa Srl
Use-Cases: In the medical and forensic sectors
Security Level: Low
Pros:
Contactless scanning
Possibility to cover a large area
Fast recognition time
Technology is developing rapidly
Cons:
71
Lip Motion
Pros:
Contactless scanning
Fast recognition time
Improves recognition accuracy when combined with other forms of
biometrics
Cons:
72