Computer system security
Computer system security
PDCA CYCLE
The Plan phase is about designing the ISMS, assessing information security risks and
selecting appropriate controls.
The Do phase involves implementing and operating the controls.
The Check phase objective is to review and evaluate the performance (efficiency and
effectiveness) of the ISMS.
In the Act phase, changes are made where necessary to bring the ISMS back to peak
performance.
have the continuous, unshakeable and visible support and commitment of the
organization’s top management;
be managed centrally, based on a common strategy and policy across the entire
organization;
be an integral part of the overall management of the organization related to and
reflecting the organization’s approach to Risk Management, the control objectives and
controls and the degree of assurance required;
have security objectives and activities be based on business objectives and
requirements and led by business management;
undertake only necessary tasks and avoiding over-control and waste of valuable
resources;
fully comply with the organization philosophy and mindset by providing a system that
instead of preventing people from doing what they are employed to do, it will enable
them to do it in control and demonstrate their fulfilled accountabilities;
be based on continuous training and awareness of staff and avoid the use of
disciplinary measures and “police” or “military” practices;
be a never ending process;
SECURITY
Security is all the policies, procedures and technical tools used to
safeguard information systems from unauthorized access,
alteration, theft and physical damage.
DEFINITIONS
THREAT. -Any person, act, or object that poses a danger to computer security
RISK, -Any kind of analysis that ties-in specific threats to specific assets with an
eye toward determining the costs and/or benefits of protecting that asset or risk
assessment. Risk is always a calculated assumption made based on past
occurrences. Threat, on the other hand, is constant.
PRINCIPLES OF SECURITY
AIM
The aim should be to achieve a reasonable balance between the risks and
the costs. Prevention of damage, loss of destruction alone is not sufficient
but it is important to decrease the probability of an occurrence but also to
minimise the effects to acceptable level.
STEPS
It is necessary to decide the areas which need protection by examining the
probability and consequences of particular occurrences like fire, flood, machine
failure etc. The steps to be taken are:
Arrange appropriate levels of security and make sure all the activities meet
the requirement
Set up effective recovery procedures
COVER
Security must cover:
Hardware
Data
Software
People
SECURITY MEASURES
• Access restriction
• Backup procedures
1.ACCESS RESTRICTION
The purpose of access restriction using password is to check the validity of the user
via a key that he or she should know but most people are careless about
passwords.
Do not use your login name in any form (as is, reversed, capitalized,
doubled, etc.).
Do not use your first, middle, or last name in any form or use your
spouse’s or children’s names.
Do not use other information easily obtained about you. This
includes license plate numbers, telephone numbers, social security
numbers, the make of your automobile, the name of the street you
live on, etc.
Do not use a password of all digits or the entire same letter.
Do not use a word contained in English or foreign language
dictionaries, spelling lists, or other lists of words.
Do not use a password shorter than six characters.
Do use a password with mixed-case alphabetics.
Do use a password with non-alphabetic characters (digits or
punctuation).
Do use a password that is easy to remember, so you don’t have to
write it down.
PHYSICAL SECURITY
Access restrictions related to physical security are:
• Store all removable secondary storage devices like diskettes, tapes etc in
lockable boxes which should be put in a fire proof safe or taken off the
premises at night;
• Offices need to be locked at night at all times and also burglar proofed;
• Insure all your machines and keep a copy of the serial numbers as you may
need them in the event of fire or theft;
• Equipment can also be bolted into place and connected to a central alarm
system and the place where the equipment is placed can be monitored by a
closed circuit TV;
• Sites can be selected that minimizes the risk of damage from natural
disasters such as floods and earthquakes;
• Security badges can also be used on personnel entering computer
installations;
The purpose of backup is to cope with the situation when one or more aspects of system security
have failed. Thus backup may be as simple as allowing a file that has been accidentally overwritten
to be recovered or it may be designed to cope with the complete destruction of a computer
installation.
The method of backup depends to a large extent on the nature of the data that is
being backed up. If the data never or rarely changes as is the case with
applications software, then it would be sufficient to keep copies on tape or disc in
a safe place - for example in a fire proof safe, possibly in a separate building. Any
occasional updates or changes could be copied and similarly stored.
Backing up your data files and programs is vital to an organisation survival and the
following backup procedures can be adopted:
METHODS OF BACKUP
a)DISK MIRRORING
If access to the data is critical then the file may be mirrored. This is when an
exact copy of the file is maintained on a different disk. Both files are
changed together. If the disk fails, corrupting or making the file
unavailable then processing can continue using the image. This protects
against loss of the file due to disk failure. It does not however allow recovery
from situations where invalid data has been processed or records accidentally
deleted. Mirroring would normally be used in conjunction with a regular backup
procedure .
This is a system whereby every transaction is saved onto more than one HDD, so
that records are backed up as soon as they are created. One of the disks can be
in a remote location.
Lastly it is relevant that standby processing arrangements should be made with
another organisation having similar hardware in the event of your computer being
unusable, you can continue processing especially if you are running a payroll
system since your staff needs to be paid.
d)OTHER SECURITY MEASURES
If a thief manages to evade the physical security measures and password
measures, another level of protection can be applied. For example within the
software a user can be allowed read only, read/write privileges or a file would have
a password protection. Another method that can be used is encryption using
sophisticated coding methods.
To protect against a person outside the organisation committing these crimes the
above measures would be more appropriate as part of the overall security strategy
but many of computer crimes are perpetrated by insiders who are employees of
the organisation
The other methods are to set up adequate procedures either by physical access
control or auditing to minimise fraud.
Physical access control procedures should be worked out for handling the following
categories:
* Organisation employees
* Contract or temporary employees
* Visitors
* Movement detection - use of closed circuit television cameras to detect movements using infrared
alarms.
COMPUTER VIRUSES
The biggest threat to information systems are the destructive codes written by
knowledgeable computer brains . These destructive codes are known by various
terms such as Worms, logic bombs, Trojan Horses, Viruses etc.
A computer virus is a tiny program that can attach to a computer operation system
codes that are normally passed to diskettes when being formatted or copied. It
consists of a code that infects other programs, it is self replicating and requires a
host or executable disk segment. Once in the system it can damage or destroyed
data media, the system itself and any attached peripherals.
Phases of a virus
A virus has four phases:
• Dormancy
• Propagation
• Triggering
• Damaging
Though viruses have limited effects on standalone machines they can cause havoc
on networks and in order to protect yourself against viruses:
• Maintain at least several generations of backup copies of your most
important data files.
• Do not use new programs or updated versions unless they have been in the
public domain for at least four weeks.
* A virus may destroy the file allocation table (FAT) rendering the disk
unreadable thus effectively destroying the information on the disk.
* A virus may alter disk assignments resulting in files being written to the
wrong disk.
* A virus may specifically format specific tracks of a disk or even the entire
disk.
* A virus may cause the system to crash or to 'hang' so that it does not
respond to any keystrokes and requires a cold boot.
Information Security Components:
or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems
are decomposed in three main portions, hardware, software and communications
with the purpose to identify and apply information security industry standards, as
mechanisms of protection and prevention, at three levels or layers: Physical,
personal and organizational. Essentially, procedures or policies are implemented to
tell people (administrators, users and operators)how to use products to ensure
information security within the organizations.
Information security
means protecting information and information systems from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection, recording or
destruction.[1]
Controls
a)Administrative
Administrative controls form the basis for the selection and implementation of logical
and physical controls. Logical and physical controls are manifestations of
administrative controls. Administrative controls are of paramount importance.
b)Logical
Logical controls (also called technical controls) use software and data to monitor and
control access to information and computing systems. For example: passwords,
network and host based firewalls, network intrusion detection systems, access
control lists, and data encryption are logical controls.
c) Physical
Physical controls monitor and control the environment of the work place and
computing facilities. They also monitor and control access to and from such facilities.
For example: doors, locks, heating and air conditioning, smoke and fire alarms, fire
suppression systems, cameras, barricades, fencing, security guards, cable locks,
etc. Separating the network and work place into functional areas are also physical
controls.
Security controls can also be categorized according to their nature, for example:
defense depth
For businesses to create effective plans they need to focus upon the following key
questions. Most of these are common knowledge, and anyone can do a BCP.
1. Should a disaster strike, what are the first few things that I should do? Should
I call people to find if they are OK or call up the bank to figure out my money
is safe? This is Emergencey Response. Emergency Response services help
take the first hit when the disaster strikes and if the disaster is serious enough
the Emergency Response teams need to quickly get a Crisis Management
team in place.
2. What parts of my business should I recover first? The one that brings me
most money or the one where I spend the most, or the one that will ensure I
shall be able to get sustained future growth? The identified sections are the
critical business units. There is no magic bullet here, no one answer satisfies
all. Businesses need to find answers that meet business requirements.
3. How soon should I target to recover my critical business units? In BCP
technical jargon this is called Recovery Time Objective, or RTO. This
objective will define what costs the business will need to spend to recover
from a disruption. For example, it is cheaper to recover a business in 1 day
than in 1 hour.
4. What all do I need to recover the business? IT, machinery, records...food,
water, people...So many aspects to dwell upon. The cost factor becomes
clearer now...Business leaders need to drive business continuity. Hold on. My
IT manager spent $200000 last month and created a DRP (Disaster Recovery
Plan), whatever happened to that? a DRP is about continuing an IT system,
and is one of the sections of a comprehensive Business Continuity Plan. Look
below for more on this.
5. And where do I recover my business from... Will the business center give me
space to work, or would it be flooded by many people queuing up for the
same reasons that I am.
6. But once I do recover from the disaster and work in reduced production
capacity, since my main operational sites are unavailable, how long can this
go on. How long can I do without my original sites, systems, people? this
defines the amount of business resilience a business may have.
7. Now that I know how to recover my business. How do I make sure my plan
works? Most BCP pundits would recommend testing the plan at least once a
year, reviewing it for adequacy and rewriting or updating the plans either
annually or when businesses change.