Unit 2 DIS
Unit 2 DIS
• Some of the more common instances of malicious code are viruses and worms, Trojan
horses, logic bombs, back doors, and denial-of-services attacks.
• Computer viruses are segments of code that perform malicious actions.
• This code behaves very much like a virus pathogen attacking animals and plants, using
the cell’s own replication machinery to propagate and attack.
• The code attaches itself to the existing program and takes control of that program’s
access to the targeted computer.
• The virus-controlled target program then carries out the virus’s plan by replicating
itself into additional targeted systems.
• The macro virus is embedded in the automatically executing macro code, common in
office productivity software like word processors, spread sheets, and database
applications.
• The boot virus infects the key operating systems files located in a computer’s boot
sector.
• Worms - Malicious programs that replicate themselves constantly without requiring
another program to provide a safe environment for replication. Worms can continue
replicating themselves until they completely fill available resources, such as memory,
hard drive space, and network bandwidth.
• Trojan horses - Software programs that hide their true nature and reveal their
designed behavior only when activated. Trojan horses are frequently disguised as
helpful, interesting, or necessary pieces of software, such as readme.exe files often
included with shareware or freeware packages.
• Back door or Trap door - A virus or worm can have a payload that installs a back door
or trap door component in a system. This allows the attacker to access the system at
will with special privileges.
• Polymorphism - A threat that changes its apparent shape over time, representing a new
threat not detectable by techniques that are looking for a preconfigured signature.
These threats actually evolve, changing their size and appearance to elude detection by
antivirus software programs, making detection more of a challenge.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Virus and Worm Hoaxes - As frustrating as viruses and worms are, perhaps more time
and money is spent on resolving virus hoaxes. Well-meaning people spread the viruses
and worms when they send e-mails warning of fictitious or virus laden threats.
• In the U.S., buildings are “fed” 120-volt, 60-cycle power usually through 15 and
20 amp circuits.
• Voltage levels can:
• spike – momentary increase or surge – prolonged increase
• sag – momentary low voltage, or brownout – prolonged drop
• fault – momentary loss of power, or blackout – prolonged loss
• Since sensitive electronic equipment, especially networking equipment,
computers, and computer-based systems are susceptible to fluctuations,
controls can be applied to manage power quality.
Espionage or Trespass
• Deliberate Acts of Espionage or Trespass
• Access of protected information by unauthorized individuals
• Competitive intelligence (legal) vs. industrial
espionage (illegal)
• Shoulder surfing can occur anywhere a person accesses confidential
information
• Controls let trespassers know they are encroaching on organization’s
cyberspace
• Hackers use skill, guile, or fraud to bypass controls protecting others’
information
• This threat represents a well-known and broad category of electronic and
human activities that breach the confidentiality of information.
• When an unauthorized individual gains access to the information an
organization is trying to protect, that act is categorized as a deliberate act of
espionage or trespass.
• When information gatherers employ techniques that cross the threshold of
what is legal and/or ethical, they enter the world of industrial espionage.
• Instances of shoulder surfing occur at computer terminals, desks, ATM
machines, public phones, or other places where a person is accessing
confidential information.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• The threat of trespass can lead to unauthorized real or virtual actions that
enable information gatherers to enter premises or systems they have not been
authorized to enter.
• Controls are sometimes implemented to mark the boundaries of an
organization’s virtual territory.
• These boundaries give notice to trespassers that they are encroaching on the
organization’s cyberspace.
• The classic perpetrator of deliberate acts of espionage or trespass is the hacker.
• In the gritty world of reality, a hacker uses skill, guile, or fraud to attempt to
bypass the controls placed around information that is the property of someone
else. The hacker frequently spends long hours examining the types and
structures of the targeted systems.
Shoulder Surfing
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
Hacker Profiles
There are generally two skill levels among hackers.
• Expert hacker
– Develops software scripts and program exploits
– Usually a master of many skills
– Will often create attack software and share with others
• Unskilled hacker
– Many more unskilled hackers than expert hackers
– Use expertly written software to exploit a system
– Do not usually fully understand the systems they hack
• The first is the expert hacker, who develops software scripts and codes exploits used by
the second category, the novice, or unskilled hacker.
• The expert hacker is usually a master of several programming languages, networking
protocols, and operating systems and also exhibits a mastery of the technical
environment of the chosen targeted system.
• However, expert hackers have now become bored with directly attacking systems and
have turned to writing software.
• The software they are writing are automated exploits that allow novice hackers to
become script kiddies, hackers of limited skill who use expert-written software to
exploit a system but do not fully understand or appreciate the systems they hack.
• As a result of preparation and continued vigilance, attacks conducted by scripts are
usually predictable and can be adequately defended against.
• There are other terms for system rule breakers:
• The term cracker is now commonly associated with an individual who “cracks” or
removes the software protection from an application designed to prevent unauthorized
duplication.
• A phreaker hacks the public telephone network to make free calls, disrupt services, and
generally wreak havoc.
Other terms for system rule breakers:
• Cracker: “cracks” or removes software protection designed to prevent unauthorized
duplication
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Today, security experts are noticing a rise in another form of online vandalism
in what are described as hacktivist or cyberactivist operations. A more extreme
version is referred to as cyberterrorism.
These attack programs use up to six known attack vectors to exploit a variety of
vulnerabilities in commonly found information system devices.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
successfully along with other, legitimate requests for service. This may result in a system
crash or merely an inability to perform ordinary functions.
Spam - Unsolicited commercial e-mail. While many consider spam a nuisance rather than
an attack, it is emerging as a vector for some attacks.
Mail Bombing - Another form of e-mail attack that is also a DoS, in which an attacker
routes large quantities of e-mail to the target.
Sniffers - A program and/or device that can monitor data travelling over a network.
Sniffers can be used both for legitimate network management functions and for stealing
information from a network.
Phishing - An attempt to gain personal or financial information from an individual, usually
by posing as a legitimate entity.
Pharming – “The redirection of legitimate Web traffic (e.g., browser requests) to an
illegitimate site for the purpose of obtaining private information.
Social Engineering - Within the context of information security, the process of using
social skills to convince people to reveal access credentials or other valuable information
to the attacker.
“People are the weakest link. You can have the best technology; firewalls, intrusion-
detection systems, biometric devices...and somebody can call an unsuspecting employee.
That's all she wrote, baby. They got everything.”
Timing Attack - Relatively new, works by exploring the contents of a Web browser’s
cache. This could allow the designer to collect information to access to password-protected
sites. Another attack by the same name involves attempting to intercept cryptographic
elements to determine keys and encryption algorithms.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
– Information leakage
– Integer bugs (overflows/underflows)
– Race conditions
– SQL injection
– Trusting network address resolution
– Unauthenticated key exchange
– Use of magic URLs and hidden forms
– Use of weak password-based systems
– Poor usability
Summary
• Unlike any other aspect of IT, information security’s primary mission to ensure things
stay the way they are
• Information security performs four important functions:
– Protects organization’s ability to function
– Enables safe operation of applications implemented on organization’s IT
systems
– Protects data the organization collects and uses
– Safeguards the technology assets in use at the organization
• Threat: object, person, or other entity representing a constant danger to an asset
• Management effectively protects its information through policy, education, training,
and technology controls
• Attack: a deliberate act that exploits vulnerability
• Secure systems require secure software
Law and Ethics in Information Security
• Laws: rules that mandate or prohibit certain societal behavior
• Ethics: define socially acceptable behavior
• Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on
these
• Laws carry sanctions of a governing authority; ethics do not
• As individuals we elect to trade some aspects of personal freedom for social order.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Laws are rules adopted for determining expected behavior in modern society and are
drawn from ethics, which define socially acceptable behaviors.
• Ethics in turn are based on cultural mores: fixed moral attitudes or customs of a
particular group.
• Some ethics are recognized as universal among cultures.
Organizational Liability and the Need for Counsel
• Liability: legal obligation of an entity extending beyond criminal or contract law;
includes legal obligation to make restitution
• Restitution: to compensate for wrongs committed by an organization or its employees
• Due care: insuring that employees know what constitutes acceptable behavior and
know the consequences of illegal or unethical actions
• Due diligence: making a valid effort to protect others; continually maintaining level of
effort
• Jurisdiction: court's right to hear a case if the wrong was committed in its territory or
involved its citizenry
• Long arm jurisdiction: right of any court to impose its authority over an individual or
organization if it can establish jurisdiction
Policy versus Law
• Policies: body of expectations that describe acceptable and unacceptable employee
behaviours in the workplace
• Policies function as laws within an organization; must be crafted carefully to ensure
they are complete, appropriate, fairly applied to everyone
• Difference between policy and law: ignorance of a policy is an acceptable defence
• Criteria for policy enforcement:
• Dissemination (distribution)
• Review (reading)
• Comprehension (understanding)
• Compliance (agreement)
• Uniform enforcement
Types of Law
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Civil law represents a wide variety of laws that are recorded in volumes of legal “code”
available for review by the average citizen.
• Criminal law addresses violations harmful to society and is actively enforced through
prosecution by the state.
• Tort law allows individuals to seek recourse against others in the event of personal,
physical, or financial injury.
• Private law regulates the relationship between the individual and the organization,
and encompasses family law, commercial law, and labor law.
• Public law regulates the structure and administration of government agencies and
their relationships with citizens, employees, and other governments, providing careful
checks and balances. Examples of public law include criminal, administrative, and
constitutional law.
Relevant U.S. Laws
• United States has been a leader in the development and implementation of information
security legislation
• Implementation of information security legislation contributes to a more reliable
business environment and a stable economy
• U.S. has demonstrated understanding of problems facing the information security field;
has specified penalties for individuals and organizations failing to follow requirements
set forth in U.S. civil statutes
General Computer Crime Laws
• Computer Fraud and Abuse Act of 1986 (CFA Act): cornerstone of many computer-
related federal laws and enforcement efforts
• National Information Infrastructure Protection Act of 1996:
o Modified several sections of the previous act and increased the penalties for
selected crimes
o Severity of penalties judged on the purpose
▪ For purposes of commercial advantage
▪ For private financial gain
▪ In furtherance of a criminal act
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• USA PATRIOT Act of 2001: provides law enforcement agencies with broader latitude in
order to combat terrorism-related activities
• USA PATRIOT Improvement and Reauthorization Act: made permanent fourteen of the
sixteen expanded powers of the Department of Homeland Security and the FBI in
investigating terrorist activity
• Computer Security Act of 1987: one of the first attempts to protect federal computer
systems by establishing minimum acceptable security practices
• It was amended in October 1996 with the National Information Infrastructure
Protection Act of 1996, which modified several sections of the CFA and increased the
penalties for selected crimes.
• The USA Patriot Act of 2001 modified a wide range of existing laws to provide law
enforcement agencies with a broader latitude of actions to combat terrorism-related
activities.
• The Communication Act of 1934 was revised by the Telecommunications Deregulation
and Competition Act of 1996, which attempts to modernize the archaic terminology of
the older act.
• These much-needed updates of terminology were included as part of the
Communications Decency Act (CDA).
• The CDA was immediately ensnared in a thorny legal debate over the attempt to define
indecency, and ultimately rejected by the Supreme Court.
• Another key law that is of critical importance for the information security profession is
the Computer Security Act of 1987.
• It was one of the first attempts to protect federal computer systems by establishing
minimum acceptable security practices.
• The National Bureau of Standards, in cooperation with the National Security Agency,
became responsible for developing these security standards and guidelines.
Privacy
• One of the hottest topics in information security
• Is a “state of being free from unsanctioned intrusion”
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Balance of public responsibility for the use of medical information for the greater good
measured against impact to the individual
• Security of health information
Export and Espionage Laws
• Economic Espionage Act of 1996 (EEA)
• Security And Freedom Through Encryption Act of 1999 (SAFE)
• The acts include provisions about encryption that:
– Reinforce the right to use or sell encryption algorithms, without concern of key
registration
– Prohibit the federal government from requiring it
– Make it not probable cause in criminal activity
– Relax export restrictions
– Additional penalties for using it in a crime
• Intellectual property recognized as protected asset in the U.S.; copyright law extends to
electronic formats
• With proper acknowledgment, permissible to include portions of others’ work as
reference
• U.S. Copyright Office Web site: www.copyright.gov
• Intellectual property is recognized as a protected asset in the U.S. U.S. copyright law
extends this right to the published word, including electronic formats.
• Fair use of copyrighted materials includes the use to support news reporting, teaching,
scholarship, and a number of other related permissions, so long as the purpose of the
use is for educational or library purposes, not for profit, and is not excessive.
Financial Reporting
• Sarbanes-Oxley Act of 2002
• Affects executive management of publicly traded corporations and public accounting
firms
• Seeks to improve reliability and accuracy of financial reporting and increase the
accountability of corporate governance
• Penalties for noncompliance range from fines to jail terms
• Reliability assurance will require additional emphasis on confidentiality and integrity
Freedom of Information Act of 1966 (FOIA)
• Allows access to federal agency records or information not determined to be matter of
national security
• U.S. government agencies required to disclose any requested information upon receipt
of written request
• Some information protected from disclosure
State and Local Regulations
• Restrictions on organizational computer technology use exist at international, national,
state, local levels
• Information security professional responsible for understanding state regulations and
ensuring organization is compliant with regulations
International Laws and Legal Bodies
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Difficulties arise when one nationality’s ethical behavior conflicts with ethics of another
national group
• Scenarios are grouped into:
– Software License Infringement
– Illicit Use
– Misuse of Corporate Resources
• Cultures have different views on the scenarios
Ethics and Education
• Overriding factor in levelling ethical perceptions within a small population is education
• Employees must be trained in expected behaviors of an ethical employee, especially in
areas of information security
• Proper ethical training is vital to creating informed, well prepared, and low-risk system
user
Deterring Unethical and Illegal Behavior
• Three general causes of unethical and illegal behavior: ignorance, accident, intent
• Deterrence: best method for preventing an illegal or unethical activity; e.g., laws, policies,
technical controls
• Laws and policies only deter if three conditions are present:
– Fear of penalty
– Probability of being caught
– Probability of penalty being administered
Codes of Ethics and Professional Organizations
• Several professional organizations have established codes of conduct/ethics
• Codes of ethics can have positive effect; unfortunately, many employers do not
encourage joining these professional organizations
• Responsibility of security professionals to act ethically and according to policies of
employer, professional organization, and laws of society
Definitions
• Policy: course of action used by an organization to convey instructions from management to
those who perform duties
– Organizational rules for acceptable/unacceptable behavior
– Penalties for violations
– Appeals process
• Standards: more detailed statements of what must be done to comply with policy
• Practices, procedures and guidelines effectively explain how to comply with policy
For a policy to be effective it must be
– Properly disseminated
– Read
– Understood
– Agreed to by all members of organization
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
Types of Policies
1. Enterprise information Security program Policy(EISP)
2. Issue-specific information Security Policy ( ISSP)
3. Systems-specific information Security Policy (SysSP)
1. Enterprise Information Security Policy (EISP)
• Also Known as a general Security policy, IT security policy, or information security
policy.
• Sets strategic direction, scope, and tone for all security efforts within the organization
• Assigns responsibilities to various areas of information security
• Guides development, implementation, and management of information security
program