Session 2
Session 2
9
Threat Categories (continued)
10
Threat Categories
(continued)
• Deliberate Software Attacks:
– Malware:
• Malicious code or malicious software
components designed to damage,
destroy, or deny service to the target
system
• Includes viruses, worms, Trojan horses,
logic bombs, backdoors, denial of
service (DoS), and distributed denial of
service (DDoS) attacks
11
Threat Categories
(continued)
• Viruses:
– Segments of code that perform malicious actions
– Attached to existing programs
– Macro virus: embedded in automatically executing
macrocode; common in word processing
documents, spreadsheets, database applications
– Boot virus: infects key operating system files
• Worms:
– Malicious programs that replicate themselves
without requiring another program
– Can replicate through email, Web servers, network
shares
12
Threat Categories
(continued)
• Backdoors and Trapdoors:
– A payload carried by a virus or worm that
installs on a system allowing penetration
and control of the system remotely
– Examples: Subseven, Back Orifice
• Polymorphism:
– Virus or worm that evolves, changing its
size and appearance over time
13
Threat Categories (continued)
• Propagation Vectors:
– Ways that malicious code is spread from one system to
another
– Trojan: a common propagation method in which the
infected program appears to be a desirable program
– Social engineering: getting the user to perform an
action that enables the attack or infection
• Virus and Worm Hoaxes:
– Require as much time and effort to combat as real
virus and worm threats
14
Threat Categories (continued)
16
THE ROLE OF INFORMATION SECURITY
POLICY IN DEVELOPING CONTINGENCY
PLANS
Policy represents a formal statement of the organization’s managerial
philosophy—in the case of information security policies, the
organization’s InfoSec philosophy. This policy then becomes the basis for
planning, operation, and maintenance of the InfoSec profile.
• Key Policy Components. Policies comprise a set of rules that dictate
acceptable and unacceptable behavior within an organization. Policies
should not specify the proper operation of equipment or software—this
information should be placed in other documents called standards,
procedures, practices, and guidelines. Policies define what you must
do and not do, whereas the other documents focus on the how.
• Types of InfoSec Policies:
– Enterprise information security policy (EISP)
– Issue-specific security policies (ISSP)
– Systems-specific security policies (SysSP)
Information Security Policy in
Developing Contingency Plans
• Policy:
– A plan or course of action used to convey
instructions from senior management to those
who make decisions, take actions, and perform
duties
– An organizational law that dictates acceptable
and unacceptable behavior, and defines
penalties for violations
• Standard:
– Detailed statement of what must be done to
comply with policy
– De facto standard – informal standard
– De jure standard – formal standard
Key Policy Definitions (continued)
Key Policy Definitions
(continued)
• ACL Policies:
– Are translated into sets of configurations to
control access to systems
– Regulate who, what, when, and where
access can occur
– Also called capability tables, user profiles, or
user policies
• Rule Policies:
– Specific to the operation of a system, such
as configuration for firewalls, intrusion
detection systems, and proxy servers
Policy Management
All managers are expected to play a role in the risk management process, but
information security managers are expected to play the largest roles. Very often,
the chief information officer (CIO) will delegate much of the responsibility for
risk management to the CISO.
Posing the following questions can help you find an answer by understanding
the various threats the organization faces and their potential effects on an
information asset:
Risk Likelihood Scale Using this scale, the likelihood of a system being
damaged by a water leak could be rated as 1, while the likelihood of receiving
at least one e-mail that contains a virus or worm in the next year would be
rated as 5.
Risk Treatment Strategies
When an organization’s general management team determines that risks from
Info-Sec threats are creating a competitive disadvantage, it empowers the
InfoSec and IT communities of interest to treat those risks. After the project
team for InfoSec development has identified the information assets with
unacceptable levels of risk, the team must choose one of five basic strategies to
treat the risks for those assets:
• Defense—Applying controls and safeguards that eliminate or reduce the
remaining uncontrolled risk
• Transference—Shifting risks to other areas or to outside entities
• Mitigation—Reducing the impact to information assets should an attacker
successfully exploit a vulnerability
• Acceptance—Understanding the consequences of choosing to leave an
information asset’s vulnerability facing
• the current level of risk, but only after a formal evaluation and intentional
acknowledgment of this decision
• Termination—Removing or discontinuing the information asset from the
organization’s operating environment
Managing Risk