0% found this document useful (0 votes)
2 views

Computer system security

The document outlines the importance of an Information Security Management System (ISMS) and the PDCA cycle for effective security management. It emphasizes that security relies more on people than technology, highlights critical success factors for ISMS, and details various threats, vulnerabilities, and countermeasures in computer security. Additionally, it discusses security principles, risk analysis, access restrictions, backup procedures, and protection against computer viruses.

Uploaded by

alexmunguti5
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Computer system security

The document outlines the importance of an Information Security Management System (ISMS) and the PDCA cycle for effective security management. It emphasizes that security relies more on people than technology, highlights critical success factors for ISMS, and details various threats, vulnerabilities, and countermeasures in computer security. Additionally, it discusses security principles, risk analysis, access restrictions, backup procedures, and protection against computer viruses.

Uploaded by

alexmunguti5
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Computer system security

PDCA CYCLE

 The Plan phase is about designing the ISMS, assessing information security risks and
selecting appropriate controls.
 The Do phase involves implementing and operating the controls.
 The Check phase objective is to review and evaluate the performance (efficiency and
effectiveness) of the ISMS.
 In the Act phase, changes are made where necessary to bring the ISMS back to peak
performance.

Security experts say and statistics confirm that:

 information technology security administrators should expect to devote approximately


one-third of their time addressing technical aspects. The remaining two-thirds should
be spent developing policies and procedures, performing security reviews and
analyzing risk, addressing contingency planning and promoting security awareness;
 security depends on people more than on technology;
 employees are a far greater threat to information security than outsiders;
 security is like a chain. It is as strong as its weakest link;
 the degree of security depends on three factors: the risk you are willing to take, the
functionality of the system and the costs you are prepared to pay;
 security is not a status or a snapshot but a running process.

Critical success factors for ISMS

To be effective, the ISMS must:[4]

 have the continuous, unshakeable and visible support and commitment of the
organization’s top management;
 be managed centrally, based on a common strategy and policy across the entire
organization;
 be an integral part of the overall management of the organization related to and
reflecting the organization’s approach to Risk Management, the control objectives and
controls and the degree of assurance required;
 have security objectives and activities be based on business objectives and
requirements and led by business management;
 undertake only necessary tasks and avoiding over-control and waste of valuable
resources;
 fully comply with the organization philosophy and mindset by providing a system that
instead of preventing people from doing what they are employed to do, it will enable
them to do it in control and demonstrate their fulfilled accountabilities;
 be based on continuous training and awareness of staff and avoid the use of
disciplinary measures and “police” or “military” practices;
 be a never ending process;
SECURITY
 Security is all the policies, procedures and technical tools used to
safeguard information systems from unauthorized access,
alteration, theft and physical damage.

DEFINITIONS

THREAT. -Any person, act, or object that poses a danger to computer security

COUNTERMEASURE - Any kind of policy, procedure, or action that recognizes,


minimizes, or eliminates a threat or risk.

RISK, -Any kind of analysis that ties-in specific threats to specific assets with an
eye toward determining the costs and/or benefits of protecting that asset or risk
assessment. Risk is always a calculated assumption made based on past
occurrences. Threat, on the other hand, is constant.

VULNERABILITY - Any kind of asset that is not working optimally and


is mission-critical or essential to the organization, such as data that
are not backed-up. For example, for fire vulnerability would be the
presence of inflammable materials (e.g. paper).

A WEAKNESS - is anything imperfect.

CONTROL -Any kind of countermeasure that becomes fairly automat-ed and


meets the expectations of upper management

These are the countermeasures for vulnerabilities. There are four


types:

 Deterrent controls reduce the likelihood of a deliberate attack


 Preventative controls protect vulnerabilities and make an attack
unsuccessful or reduce its impact
 Corrective controls reduce the effect of an attack
 Detective controls discover attacks and trigger preventative or
corrective controls.
THREATS IN COMPUTER SECURITY
 Hardware failure - extra hardware makes the system fault-tolerant
 Software failure - programs simply have bugs in them, period
 Program changes - any change or upgrade produces a new set of threats
 Users - from the good-hearted foolish ones to disgruntled super users
Terminal Access Penetration - unauthorized login at network workstations
 Theft of data, services, equipment - stealing, plain and simple
 Fire - nothing toasts computer circuitry or media more easily
 Human errors in system design and implementation
 Human errors in data capture and system inputs
 Hacking and other privacy violations
 Viruses and other system sabotage
 Criminal activities such as theft and fraud
 Vandalism and physical damage
 Electrical supply failures
 Accidental magnetic erase
 Fire destruction
 Water flooding and pollutant destruction
 Earthquakes, lightening strikes and other natural calamities
Electrical problems - not lightning, but the power company you depend on
Telecommunications problems - the carrier company you depend

PRINCIPLES OF SECURITY

The National Computing Centre specifies four principles of Security as:


 Extent
 Aim
 Steps
 Cover
EXTENT
Safeguarding information systems can be costly and complicated. A system that
has too many controls can be so unwieldy and difficult to use that people may be
discouraged from using it at all. Data security must be provided for both data
storage and data usage in on-line and batch systems.
Extensive security is never possible for several reasons:
 Cost is unacceptably high
 Processing becomes impractically slow
 It is counterproductive

AIM
The aim should be to achieve a reasonable balance between the risks and
the costs. Prevention of damage, loss of destruction alone is not sufficient
but it is important to decrease the probability of an occurrence but also to
minimise the effects to acceptable level.

STEPS
It is necessary to decide the areas which need protection by examining the
probability and consequences of particular occurrences like fire, flood, machine
failure etc. The steps to be taken are:
 Arrange appropriate levels of security and make sure all the activities meet
the requirement
 Set up effective recovery procedures

COVER
Security must cover:
 Hardware
 Data
 Software
People

RISKS TO INFORMATION SYSTEMS

* Destruction of physical assets or information


* Disclosure of confidential information
* Removal of physical assets or information (theft)
* Fraud or abuse of data or programs
* Delayed processing or interruption of service

SECURITY RISK ANALYSIS

Security risk analysis, otherwise known as risk assessment, is


fundamental to the security of any organization. It is essential in
ensuring that controls and expenditure are fully commensurate with
the risks to which the organization is exposed.

Divided into: -quantitative risk analysis

-qualitative risk analysis

SECURITY MEASURES

Two data security measures can be adopted:

• Access restriction

• Backup procedures

1.ACCESS RESTRICTION

Access restriction can be achieved through carefully designed and administered


password procedures. Employees can be assigned passwords that restrict them to
viewing a portion of data that concerns them, or a need to know basis and that
may or may not allow them to alter the data.

Passwords are used to gain access to:


* terminals;
* computer or parts of computers;
* areas in memory;
* programs or parts of programs;
* files or records;
* information categories;
* specific commands.
Various forms of password protection are available including:
* The simple single password;
* System that asks different specific characters from the password each time
the system is assessed;
* Systems that ask for one from a list of passwords;
* Systems that ask a random series of questions based on the particular user
(e.g. date of birth, mother's maiden name and so on)

Certain rules should apply to passwords:

 Passwords can give different access levels


 Passwords should not be too short
 Password display should be suppressed
 Files containing passwords should be encrypted
 Users should change their passwords regularly
 Passwords should not be easily guessed words
 Passwords are more secure if they consist of a mixture of upper and lower
case, letters and numbers
• After a set number of attempts any access to the system should be denied.

The purpose of access restriction using password is to check the validity of the user
via a key that he or she should know but most people are careless about
passwords.

Good passwords procedures require that you:

 Do not use your login name in any form (as is, reversed, capitalized,
doubled, etc.).
 Do not use your first, middle, or last name in any form or use your
spouse’s or children’s names.
 Do not use other information easily obtained about you. This
includes license plate numbers, telephone numbers, social security
numbers, the make of your automobile, the name of the street you
live on, etc.
 Do not use a password of all digits or the entire same letter.
 Do not use a word contained in English or foreign language
dictionaries, spelling lists, or other lists of words.
 Do not use a password shorter than six characters.
 Do use a password with mixed-case alphabetics.
 Do use a password with non-alphabetic characters (digits or
punctuation).
 Do use a password that is easy to remember, so you don’t have to
write it down.

When data is being transmitted there is possibility of EAVESDROPPING.


Eavesdropping involves the tapping into an electronic signal at any point in the
telecommunication link. One way to counter eavesdroppers is through encryption
which is the coding or scrambling of data, messages or programs. Only the sender
and the receiver are supposed to know the particular coding technique used thus
locking out any attempt by a third party to decipher the code.

PHYSICAL SECURITY
Access restrictions related to physical security are:

• Detach keyboard and lock it in a cupboard or safe;

• Store all removable secondary storage devices like diskettes, tapes etc in
lockable boxes which should be put in a fire proof safe or taken off the
premises at night;

• Restrict distribution of information if it contains sensitive information;

• Offices need to be locked at night at all times and also burglar proofed;

• Insure all your machines and keep a copy of the serial numbers as you may
need them in the event of fire or theft;

• If possible station guards outside the premises that restricts access to


computer installations;

• Equipment can also be bolted into place and connected to a central alarm
system and the place where the equipment is placed can be monitored by a
closed circuit TV;

• Fire detection equipment can be installed;

• Sites can be selected that minimizes the risk of damage from natural
disasters such as floods and earthquakes;
• Security badges can also be used on personnel entering computer
installations;

• To protect against electrical fluctuations, the computer and it's peripherals


must be properly grounded and equipped with devices that protect the
hardware from sudden surges in power e.g. Use of Uninterrupted Power
Supply (UPS).

• Vet all those personnel that are to work in computer installations;

• A supervisor with knowledge about computer system should be recruited.

BACKUP PROCEDURE (DATA & SOFTWARE SECURITY)

The purpose of backup is to cope with the situation when one or more aspects of system security
have failed. Thus backup may be as simple as allowing a file that has been accidentally overwritten
to be recovered or it may be designed to cope with the complete destruction of a computer
installation.

The method of backup depends to a large extent on the nature of the data that is
being backed up. If the data never or rarely changes as is the case with
applications software, then it would be sufficient to keep copies on tape or disc in
a safe place - for example in a fire proof safe, possibly in a separate building. Any
occasional updates or changes could be copied and similarly stored.

Backing up your data files and programs is vital to an organisation survival and the
following backup procedures can be adopted:

• Programs should be copied and stored in a safe location remote from


computer installations and if amendments are made new copies must be
made;

• Master data files can be copied weekly;

• Transaction data files can be copied daily;


• Master and transaction files should be copied using the grandfather -father-
son principles which rotating three set of diskettes;

• Copies of all documentation should be made.

METHODS OF BACKUP

a)DISK MIRRORING
If access to the data is critical then the file may be mirrored. This is when an
exact copy of the file is maintained on a different disk. Both files are
changed together. If the disk fails, corrupting or making the file
unavailable then processing can continue using the image. This protects
against loss of the file due to disk failure. It does not however allow recovery
from situations where invalid data has been processed or records accidentally
deleted. Mirroring would normally be used in conjunction with a regular backup
procedure .

b)MERGING MASTER AND TRANSACTIONS FILES


Random access files can be backed up by regularly copying the entire file to a
tape or to another disk. Special tape devices called tape streamers are available
for this. The frequency of copying would depend on how active the file was. This
in itself does not allow the file to be recovered since the copy is a snapshot of
the file and the data will have changed since the copy was made. In addition to
the copy a transaction log must be maintained. This is simply a file containing
details of every transaction made since the copy was done. If the file is lost or
corrupted then it can be restored by merging the transaction log with the copy to
reproduce the original.

c) RAID (Redundant Array of Inexpensive Drives)

This is a system whereby every transaction is saved onto more than one HDD, so
that records are backed up as soon as they are created. One of the disks can be
in a remote location.
Lastly it is relevant that standby processing arrangements should be made with
another organisation having similar hardware in the event of your computer being
unusable, you can continue processing especially if you are running a payroll
system since your staff needs to be paid.
d)OTHER SECURITY MEASURES
If a thief manages to evade the physical security measures and password
measures, another level of protection can be applied. For example within the
software a user can be allowed read only, read/write privileges or a file would have
a password protection. Another method that can be used is encryption using
sophisticated coding methods.

PHYSICAL ACCESS CONTROL

To protect against a person outside the organisation committing these crimes the
above measures would be more appropriate as part of the overall security strategy
but many of computer crimes are perpetrated by insiders who are employees of
the organisation

Potential threats can be minimised by using various procedures such as:


 Vetting potential employees
 Immediate removal of sacked employees from the computer system
 Separation of duties
 Physical security e.g. locks, ID badges
 Passwords
 Education and training of staff (e.g. lock doors, log-off computers,
challenge strangers)
 Software to monitor all terminal activity

The other methods are to set up adequate procedures either by physical access
control or auditing to minimise fraud.

Physical access control procedures should be worked out for handling the following
categories:

* Organisation employees
* Contract or temporary employees
* Visitors

The following physical access control methods can be used:

* 'Something carried' approach - use of magnetically coded badges or use of


tokens with unique personal codes based on radio signals that can be used
to open doors for authorized persons.
* 'Something known' approach - this can be an employee I.D. Number, use
personal statistics (e.g. date of birth etc).

* 'Physical characteristics' approach - use of fingerprints, voiceprints, lip


prints, hand geometry, signature verification etc.

* Movement detection - use of closed circuit television cameras to detect movements using infrared
alarms.

COMPUTER VIRUSES

The biggest threat to information systems are the destructive codes written by
knowledgeable computer brains . These destructive codes are known by various
terms such as Worms, logic bombs, Trojan Horses, Viruses etc.

ANATOMY OF A COMPUTER VIRUS

A computer virus is a tiny program that can attach to a computer operation system
codes that are normally passed to diskettes when being formatted or copied. It
consists of a code that infects other programs, it is self replicating and requires a
host or executable disk segment. Once in the system it can damage or destroyed
data media, the system itself and any attached peripherals.

Phases of a virus
A virus has four phases:
• Dormancy
• Propagation
• Triggering
• Damaging

PROTECTION AGAINST VIRUSES

Though viruses have limited effects on standalone machines they can cause havoc
on networks and in order to protect yourself against viruses:
• Maintain at least several generations of backup copies of your most
important data files.

• Do not use new programs or updated versions unless they have been in the
public domain for at least four weeks.

• Use anti-virus (vaccines) programs to check whether your diskettes have


been infected by viruses;

• Do not allow computer media from outside computer installations to enter


into the computer room.

NOTE : Most viruses are transmitted through computer games!!!

POSSIBLE VIRAL INFECTIONS

* A virus may destroy the file allocation table (FAT) rendering the disk
unreadable thus effectively destroying the information on the disk.

* A virus may alter disk assignments resulting in files being written to the
wrong disk.

* A virus may erase specific executable files or data files.

* A virus may alter data in files

* A virus may specifically format specific tracks of a disk or even the entire
disk.

* A virus may suppress the execution of programs resident in RAM.

* A virus may reduce the amount of free space available on disk.

* A virus may cause the system to crash or to 'hang' so that it does not
respond to any keystrokes and requires a cold boot.
Information Security Components:
or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems
are decomposed in three main portions, hardware, software and communications
with the purpose to identify and apply information security industry standards, as
mechanisms of protection and prevention, at three levels or layers: Physical,
personal and organizational. Essentially, procedures or policies are implemented to
tell people (administrators, users and operators)how to use products to ensure
information security within the organizations.

Information security
means protecting information and information systems from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection, recording or
destruction.[1]

Controls

three different types of controls.

a)Administrative

Administrative controls (also called procedural controls) consist of approved written


policies, procedures, standards and guidelines. Administrative controls form the
framework for running the business and managing people. They inform people on
how the business is to be run and how day to day operations are to be conducted.
Laws and regulations created by government bodies are also a type of administrative
control because they inform the business. Some industry sectors have policies,
procedures, standards and guidelines that must be followed - the Payment Card
Industry (PCI) Data Security Standard required by Visa and Master Card is such an
example. Other examples of administrative controls include the corporate security
policy, password policy, hiring policies, and disciplinary policies.

Administrative controls form the basis for the selection and implementation of logical
and physical controls. Logical and physical controls are manifestations of
administrative controls. Administrative controls are of paramount importance.

b)Logical

Logical controls (also called technical controls) use software and data to monitor and
control access to information and computing systems. For example: passwords,
network and host based firewalls, network intrusion detection systems, access
control lists, and data encryption are logical controls.

An important logical control that is frequently overlooked is the principle of least


privilege. The principle of least privilege requires that an individual, program or
system process is not granted any more access privileges than are necessary to
perform the task. A blatant example of the failure to adhere to the principle of least
privilege is logging into Windows as user Administrator to read Email and surf the
Web. Violations of this principle can also occur when an individual collects additional
access privileges over time. This happens when employees' job duties change, or
they are promoted to a new position, or they transfer to another department. The
access privileges required by their new duties are frequently added onto their
already existing access privileges which may no longer be necessary or appropriate.

c) Physical

Physical controls monitor and control the environment of the work place and
computing facilities. They also monitor and control access to and from such facilities.
For example: doors, locks, heating and air conditioning, smoke and fire alarms, fire
suppression systems, cameras, barricades, fencing, security guards, cable locks,
etc. Separating the network and work place into functional areas are also physical
controls.

An important physical control that is frequently overlooked is the separation of


duties. Separation of duties ensures that an individual can not complete a critical
task by himself. For example: an employee who submits a request for
reimbursement should not also be able to authorize payment or print the check. An
applications programmer should not also be the server administrator or the database
administrator - these roles and responsibilities must be separated from one another

Security controls can also be categorized according to their nature, for example:

 Physical controls e.g. fences, doors, locks and fire extinguishers;


 Procedural controls e.g. incident response processes, management oversight,
security awareness and training;
 Technical controls e.g. user authentication (login) and logical access controls,
antivirus software, firewalls;
 Legal and regulatory or compliance controls e.g. privacy laws, policies and
clauses.

defense depth

For businesses to create effective plans they need to focus upon the following key
questions. Most of these are common knowledge, and anyone can do a BCP.

1. Should a disaster strike, what are the first few things that I should do? Should
I call people to find if they are OK or call up the bank to figure out my money
is safe? This is Emergencey Response. Emergency Response services help
take the first hit when the disaster strikes and if the disaster is serious enough
the Emergency Response teams need to quickly get a Crisis Management
team in place.
2. What parts of my business should I recover first? The one that brings me
most money or the one where I spend the most, or the one that will ensure I
shall be able to get sustained future growth? The identified sections are the
critical business units. There is no magic bullet here, no one answer satisfies
all. Businesses need to find answers that meet business requirements.
3. How soon should I target to recover my critical business units? In BCP
technical jargon this is called Recovery Time Objective, or RTO. This
objective will define what costs the business will need to spend to recover
from a disruption. For example, it is cheaper to recover a business in 1 day
than in 1 hour.
4. What all do I need to recover the business? IT, machinery, records...food,
water, people...So many aspects to dwell upon. The cost factor becomes
clearer now...Business leaders need to drive business continuity. Hold on. My
IT manager spent $200000 last month and created a DRP (Disaster Recovery
Plan), whatever happened to that? a DRP is about continuing an IT system,
and is one of the sections of a comprehensive Business Continuity Plan. Look
below for more on this.
5. And where do I recover my business from... Will the business center give me
space to work, or would it be flooded by many people queuing up for the
same reasons that I am.
6. But once I do recover from the disaster and work in reduced production
capacity, since my main operational sites are unavailable, how long can this
go on. How long can I do without my original sites, systems, people? this
defines the amount of business resilience a business may have.
7. Now that I know how to recover my business. How do I make sure my plan
works? Most BCP pundits would recommend testing the plan at least once a
year, reviewing it for adequacy and rewriting or updating the plans either
annually or when businesses change.

Good practices for protecting data


 Regularly backup important files, documents and emails.
 Do not use the administrator account for day-to-day activities.
 Keep software up-to-date with the latest versions.
 Keep antivirus and antispyware up-to-date with latest versions.
 Use different passwords
 Disable auto run feature from USB flash drives. Some viruses, specially worms,
spread automatically through USB flash drives [6]
 Always connect to the Internet behind a firewall

You might also like