3 Module 1
3 Module 1
and Exposures (CVE). Elements of Information Security - Principles and Concepts – Data
• It leads to the mass investments and increases the GDP of the nation
• This industry has brought the doubled revenue in recent decades by enabling entrepreneurial
ventures
CLASSIFICATION
Influencing factors
• headquarters outside India but operate in multiple locations worldwide, including those in
India.
• most have a client base which is global as well as domestic, there are some that have focused
on serving only the Indian clients.
• needs of their parent company only and do not serve external clients.
• This model allows the organisation the option to keep IT Operations in-house and at the same
time, take advantage of expanding their global footprint and offering opportunities for
innovation in a cost effective manner.
Sub-Sectors within the IT-BPM Industry
IT Services (ITS)
Custom Application Development (CAD) Business Process Management (BPM)
Hardware Deployment and Support Customer Interaction and Support
Software Deployment and Support (CIS)
IT Consulting Finance and Accounting (F&A)
System Integration Human Resource Management
Information Systems Outsourcing (HRM)
Software Testing Knowledge Services
Network Consultation and Integration Procurement and Logistics
Education and Training
IT-BPM Industry
Vertical Profile:
BFSI is the largest driver in this space claiming half of the entire IT Services export.
Other industry verticals like Healthcare, Retail and Media have started making big investments
in IT services and are turning into key verticals for the IT Services sub-sector.
TRENDS IN IT SERVICES
OUTSOURCING
6%
SUPPORT AND
TRAINING
Trends in IT
TRENDS DESCRIPTION
• The core function is to ensure the confidentiality, integrity and availability of data to the
‘right’ users within/outside of the organisation.
• Application Security are responsible for ensuring stable and secure functioning of the
applications by knowing threats, Securing the network, host and application Incorporating
security into the software development process
RISK
• Risk Management roles are responsible for assessing, measuring, and managing the security
risks to information security of an organisation.
Audit
• conducting assessments for security threats and vulnerabilities, determine deviations from
acceptable pre-defined configurations, enterprise or local policy, assess the level of risk, develop
and/or recommend appropriate mitigation countermeasures in operational and non-operational
situations.
Compliance
• Key responsibilities also include measuring the maturity of an organisation to ensure that proper
security controls are incorporated when developing and running Information-security systems.
These also perform scheduled/unscheduled audits on the organisation’s security systems and
processes and ensure compliance.
Security Testing
• Security Testing involves devising testing standards and cases of confidentiality, integrity,
authentication, availability, authorisation and non-repudiation of information.
• Security Testing professionals perform scheduled and adhoc tests to assess vulnerability and/or safety
of anorganisation’s information systems.
Incident Management
• Incident Management roles work towards restoring normal service operations in an organisation to
minimize the adverse effect on business operations, thus ensuring that the best possible level of
service quality and availability is maintained.
• Incident management professionals manage and protect computer assets, networks and information
systems to answer the key question “what to do, when things go wrong.
• Business Continuity Management/Disaster Recovery (BCP/DR): BCP/DR roles are
responsible for improving system availability and integration of IT operational risk
management strategies for an organisation.
• Development, implementation, testing, and maintenance of the business
continuity management plan
• Recommendation and proof of concept for recovery options Assessments and
audits for BCP/DR
Network Security
• Network Security roles are responsible for defining and implementing overall
network security that includes baseline configuration, change control, security
standards and process implementation.
Privacy
• Privacy roles are responsible for defining and managing data/information/IP policies
etc. for an organisation. These roles require knowledge of information security norms
and data privacy norms and regulations. Note on Information Security occupation:
Information Security related job roles may be performed in any of the following
setups:
• Consulting
• Managed Services
• Internal function within the organisation
• In each of these set-ups, the essential functions and the highlighted tracks remain the
same, however, the delivery style and hence skills vary slightly, depending upon the
set-up. Privacy professionals help define and implement privacy standards, build
privacy awareness to protect an organisation’s information assets.
IT Forensics
• IT Forensics roles involve collect, process, preserve, analyse and present computer-
related evidence in support of network vulnerability mitigation, and/or criminal, fraud,
counter-intelligence or law-enforcement investigations.
Information Security
• They protects from the information theft , cyber attacks from hackers in private as
well as government organisations by using security tools and techniques.
• The security analysts are the responsible for keeping information from data
breaches and keeping track of those who can access and who have accessed data
with the special software.
• an entry level analyst may operate the software to monitor and analyze information.
• At senior level positions, one may carry out investigative work to determine
whether a security breach has occurred.
• Risk assessment
• Vulnerability assessment
• Defense planning
Major Skills of Security Analyst
Understanding security policy
Data & Traffic Analysis
Identifying Security Events –> How & when to alarm
Incident Response
Foundation and Background
Network infrastructure knowledge
Diverse device configuration ability
Security configuration knowledge
Data management & teamwork
Challenges for Security Analyst
Not tied to a product or solution
Complex knowledge – Not one specific process is correct or product solution
Diverse set of skills are needed
INFORMATION ASSETS
& THREATS
INFORMATION ASSETS & THREATS
• Risk is the potential threat, and process of understanding and responding to factors that may lead to
a failure in the confidentiality, integrity or availability of an information system constitute risk
management.
• theft
• fraud/ forgery
• ‘Threat agent or actor’ refers to the intent and method targeted at the intentional exploitation of the
vulnerability or a situation and method that may accidentally trigger the vulnerability.
• A ‘threat vector’ is a path or a tool that a threat actor uses to attack the target.
• ‘Threat targets’ are anything of value to the threat actor such as PC, laptop, PDA, tablet, mobile
phone, online bank account or identity.
THREAT CLASSIFICATION
Microsoft has proposed a threat classification called STRIDE from the initials of threat categories:
• Tampering
• Repudiation
• Elevation of privilege
THREAT AGENTS CLASSIFICATION
• Non-Target specific: Non-Target specific threat agents are computer viruses, worms, Trojans and logic
bombs.
• Employees: staff, contractors, operational/ maintenance personnel or security guards who are annoyed
with the company.
• Organized crime and criminals: criminals target information that is of value to them, such as bank
accounts, credit cards or intellectual property that can be converted into money. Criminals will often
make use of insiders to help them.
Trapdoors
Worm Zombie
Logic Bombs
Trojan Horses
Viruses
TYPES OF SECURITY ATTACKS
• VIRUS
• WORM
• TROJAN
VIRUS
• Virus is a malicious program able to inject its code into other programs/ applications or data files
and the targeted areas become "infected".
• Installation of a virus is done without user's consent, and spreads in form of executable code
transferred from one host to another.
Types of viruses include
Resident virus; embeds itself in the memory on a target host. In such way it
becomes activated every time the OS starts or executes a specific action.
Boot sector virus; infects storage device’s master boot record (MBR).
File-infecting virus (file infector); When the infected file is being executed, the
virus seeks out other files on the host and infects them with malicious code
Stealth virus; memory resident virus that utilizes various mechanisms to avoid
detection
Companion virus – does not modify any files instead creates a copy of the file
and places a different extension on it, usually .com
Cavity virus - uses the empty spaces within the program files itself.
This way the length of the program code is not being changed and the
virus can more easily avoid detection
WORM
• Worm is a malicious program category, exploiting operating system vulnerabilities to spread itself.
• In its design, worm is quite similar to a virus - considered even its sub-class.
• Unlike the viruses though worms can reproduce/ duplicate and spread by itself.
WORM (Continued..)
Types of Worms
The most common categorization of worms relies on the method how they spread:
Email worms:
spread directly over the internet by exploiting access to open ports or system vulnerabilit
Network worms:
• Computer Trojan or Trojan Horses are named after the mythological Trojan horse owing to their
similarity in operation strategy.
• Trojans are a type of malware software that masquerades itself as a not-malicious even useful
application but it will actually do damage to the host computer after its installation.
• Unlike virus, Trojans do not self-replicate unless end user intervene to install.
Types of Trojan
• Remote Access Trojans (RAT) aka Backdoor. Trojan
• Trojan-Proxy – Hijacks and turns the host computer into a proxy server
• Trojan-FTP
• Info Stealer (Data Sending/ Stealing Trojan) – log key strokes, screen shots and web cam image
monitoring internet activity
• Trojan Mail Finder - harvest any emails found on the infected computer.
• Trojan Dropper – different types of standalone malware (trojans, worms and backdoor) compressed.
• Trojan Arcbomb – flood the disk with large amount of empty data
• Trojan Spy – tracking data via keystrokes, collecting screenshots, listing active processes/services on
the host or stealing passwords.
.
Other security threats
Malware
• Malware refers to software viruses, spyware, adware, worms, Trojans, ransomeware etc.
• They are designed to cause damage to a targeted computer or cause a certain degree of operational
disruption.
Rootkit
• Rootkit are malicious software designed to hide certain processes or programs from detection.
• Usually acquires and maintains privileged system access while hiding its presence in the same
time.
• Spyware is a software that monitors and collects information about a particular user, computer or
organization without user’s knowledge.
• There are different types of spyware, namely system monitors, trojans (keyloggers, banker trojans,
inforstealers), adware, tracking cookies etc.
Tracking cookies
• Tracking cookies are a specific type of cookies that are distributed, shared and read across two or
more unrelated websites for the purpose of gathering information or potentially to present.
Other security threats (Continued…)
Riskware
• Riskware is a term used to describe potentially dangerous software whose installation may pose a
risk to the computer.
Adware
• Adware in general term adware is software generating or displaying certain advertisements to the
user.
• This kind of adware is very common for freeware and shareware software and can analyze end user
internet habits and then tailor the advertisements directly to users’ interests.
Other security threats (Continued…)
Creepware
• Creepware is a term used to describe activities like spying others through webcams (very often
combined with capturing pictures), tracking online activities of others and listening to
conversation over the computer's microphone and stealing passwords and other data.
Blended threat
• Blended threat defines an exploit that combines elements of multiple types of malware
components.
• Usage of multiple attack vectors and payload types targets to increase the severity of the
damage causes and as well the speed of spreading.
NETWORK ATTACKS
Network attack is usually defined as an intrusion on the network infrastructure that will first analyze
the environment and collect information in order to exploit the existing open ports or vulnerabilities.
Spear
Social Phishing Social Watering hole
phishing
engineering attack phishing attack
attack
Vishing (voice
Network
Whaling phishing or Port scanning Spoofing
sniffing
VoIP phishing
Session Cross-side
SQL injection Bluetooth
hijacking scripting attack
attack related attacks
attack (XSS attack)
SPOOFING
It is a technique used to masquerade a person, program or an address as another by falsifying
the data with purpose of unauthorized acces
• ARP spoofing (ARP Poisoning) – process of sending fake ARP messages in the network.
• The purpose of this spoofing is to associate the MAC address with the IP address of another
legitimate host causing traffic redirection to the attacker host.
• DNS spoofing (DNS Cache Poisoning) – an attack where the wrong data is inserted into DNS
Server cache, causing the DNS server to divert the traffic by returning wrong IP addresses as results
for client queries.
• Email spoofing – a process of faking the email's sender "from" field in order to hide real origin of
the email. This type of spoofing is often used in spam mail or during phishing attack.
• Search engine poisoning – attackers take advantage of high profile news items or popular events
that may be of specific interest for certain group of people to spread malware and viruses.
NETWORK SNIFFING (Packet Sniffing)
• A process of capturing the data packets travelling in the network.This may include unauthorized
access to organization resources.
• Network sniffing can be used both by IT professionals to analyse and monitor the traffic for
example, in order to find unexpected suspicious traffic, but as well by perpetrators to collect data
send over clear text that is easily readable with use of network sniffers (protocol analysers).
• Best counter measure against sniffing is the use of encrypted communication between the hosts.
Denial of Service Attack (DoS Attack) and Distributed Denial of Service
Attack (DDoS Attack
• When the DoS attack succeeds the server is not able to answer even to legitimate requests
anymore, this can be observed in numbers of ways – slow response of the server, slow network
performance, unavailability of software or web page, inability to access data, website or other
resources.
• Distributed Denial of Service Attack (DDoS) occurs where multiple compromised or infected
systems (botnet) flood a particular host with traffic simultaneously.
Few of the most common DoS attack types:
• ICMP flood attack (Ping Flood) – attacker sends ICMP ping request to the host
• Smurf attack – works similar to ping flood with difference that source IP address of
the attacker host is spoofed with IP address of other legitimate non-malicious computers.
• ICMP Smurf Denial of Service SYN flood attack [TCP SYN packet sent by the attacker
• Botnet - multiple systems submit as many request as possible to the victim machine in order to overload it
with incoming packets.
• spread viruses and spyware and as well to steal personal and confidential information
• Session hijacking attack - exploit of the valid computer session in order to gain unauthorized access to
information on a computer system
• Cross-side scripting attack (XSS attack) - exploits the XSS vulnerabilities found in web server
applications in order to inject a client side script onto the webpage
• SQL injection attack - inject a code/ string for execution that exceeds the allowed and expected input to the
SQL database
Bluetooth related attacks
• Bluesnarfing - allows the malicious user to gain unauthorized access to information on a
device through its bluetooth connection
• Bluejacking - allows the malicious user to send unsolicited (often spam) messages over
bluetooth enabled devices.
• Bluebugging - attacker to initiate phone calls on the victim's phone as well as read
through the address book, messages and eavesdrop on phone conversations.
Common Vulnerabilities
and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE) is a catalogue of known security threats. Threats
are divided into two categories:
• Vulnerabilities and
• Exposures.
Vulnerabilities
• A vulnerability is a mistake in software code that provides an attacker with direct access to a
system or network.
• The catalogue’s main purpose is to standardize the way each known vulnerability or exposure is
identified. This is important because standard IDs allow security administrators to quickly access
technical information about a specific threat across multiple CVE-compatible information sources.
ELEMENTS OF INFORMATION
SECURITY
Elements of Information Security
Network Security
Network security refers to any activity designed to protect your network. Specifically, these activities protect
the usability, reliability, integrity and safety of your network and data.
Network security is accomplished through hardware and software. The software must be constantly updated
and managed to protect you from emerging threats.
The mobility factor for Wireless networks adds more challenges to security, namely monitoring and
maintenance of secure traffic transport of mobile nodes. This concerns both homogenous and heterogeneous
mobility (inter technology), the latter requires homogenization of the security level of all networks visited by
the mobile
From the terminal’s side, it is important to protect its resources (battery, disk, CPU) against misuse and
ensure the confidentiality of its data. In an ad hoc or sensor network, it becomes essential to ensure terminal’s
integrity as it plays a dual role of router and terminal.
A network security system usually consists of many components. Ideally, all components work together,
which minimizes maintenance and improves security.
Network security components often include:
• Communication security
Application Security
• Application security (AppSec) is the use of software, hardware and procedural methods to protect
• AppSec helps identify, fix and prevent security vulnerabilities in any kind of software application
irrespective of the function, language or platform.
As a best practice, AppSec employs proactive and preventative methods to manage software risk, and
align an organization’s security investments with the reality of today’s threats. It has three distinct
elements:
• Begin with software security testing to find and assess potential vulnerabilities:
Transmission
Information
States
Transmission Transmission
Basic information security concepts:
• Identification
• Authentication
• Authorization
• Confidentiality
• Integrity
• Availability
• Non-repudiation
Identification
Identification is the first step in the ‘identify-authenticate-authorize’ sequence that is performed
every day countless times by humans and computers alike when access to information or
information processing resources are required.
While particulars of identification systems differ depending on who or what is being identified,
some intrinsic properties of identification apply regardless of these particular. Just three of these
properties are the scope, locality, and uniqueness of IDs.
Two user accounts should never use the same name on the same system — not only because
you would not be able to enforce access controls based on non-unique and ambiguous user
names, but also because you would not be able to establish accountability for user actions.
Authentication
Authentication happens right after identification and before authorization. It
verifies the authenticity of the identity declared at the identification stage. In other words, it
is at the authentication stage that you prove you are indeed the person or the system you
claim to be.
The following types of non-repudiation services are defined in international standard ISO
14516:2002 (guidelines for the use and management of trusted third party services).
Approval: non-repudiation of approval provides proof of who is responsible for approval of the
contents of a message.
Submission: non-repudiation of submission provides proof that a delivery agent has accepted the
message for transmission.
Receipt:
Non-repudiation of receipt provides proof that the recipient received the message.
Knowledge:
Non-repudiation of knowledge provides proof that the recipient recognized the content of
the received message.
Delivery:
Non-repudiation of delivery is a combination of receipt and knowledge, as it provides proof
that the recipient received and recognized the content of the message.
Transport:
Non-repudiation of transport provides proof for the message originator that a delivery agent
has delivered the message to the intended recipient.
Types of Controls
Types of Controls
Central to information security is the concept of controls, which may be categorized by
their functionality and plane of application.
By functionality:
• Preventive controls
• Detective controls
• Corrective controls
• Deterrent controls
• Recovery controls
• Compensating controls
Preventive controls
Preventive controls are the first controls met by an adversary. These try to prevent
security violations and enforce access control.
Like other controls, these may be physical, administrative or technical.
Examples:
• Doors,
• Security procedures and
• Authentication requirements
Detective controls
Detective controls
• Detective controls are in place to detect security violations and alert the defenders.
• They come into play when preventive controls have failed
Detective controls include,
• cryptographic checksums
• file integrity checkers
• audit trails
• logs and
• similar mechanisms.
Corrective controls
Corrective controls try to correct the situation after a security violation has occurred. Although a
violation occurred, but the data remains secure, so it makes sense to try and fix the situation.
Examples:
• Monitoring and logging as well as the visible practice of sound information security
management.
Recovery controls
Recovery controls are somewhat like corrective controls, but they are applied in more serious
situations to recover from security violations and restore information and information processing
resources.
Recovery controls may include,
• disaster recovery and business continuity mechanisms
• backup systems and data
• emergency key management arrangements and similar controls.
Compensating controls
Compensating controls are intended to be alternative arrangements for other controls when the
original controls have failed or cannot be used.
• When a second set of controls addresses the same threats that are addressed by another set of
controls, it acts as a compensating control.
Types of controls (Continued..)
By plane of application:
• Physical controls
• Administrative controls
• Technical controls
Physical controls include doors, secure facilities, fire extinguishers, flood protection and air
conditioning.
Administrative controls are the organization’s policies, procedures and guidelines intended to
facilitate information security.
Technical controls are the various technical measures, such as firewalls, authentication systems,
intrusion detection systems and file encryption among others.
Access Control Structures
Logical access control models are the abstract foundations upon which actual access control
mechanisms and systems are built.
Access control is among the most important concepts in computer security. Access control
models define how computers enforce access of subjects (such as users, other computers,
applications, servers and devices).
The Discretionary Access Control model is the most widely used of the three models.
In the DAC model, the owner (creator) of information (file or directory) has the discretion to decide
about and set access control restrictions on the object in question.
Mandatory access control, as its name suggests, takes a stricter approach to access control. In systems
utilizing MAC, users have little or no discretion as to what access permissions they can set on their
information.
Use of MAC:
Data classification levels (such as public, confidential, secret and top secret) and
Security clearance labels corresponding to data classification levels
Role-Based Access Control (RBAC)
• In the role based access control model, rights and permissions are assigned to roles instead of
individual users.
• This added layer of abstraction permits easier and more flexible administration and
enforcement of access controls.
Centralized vs. Decentralized Access Control
• In environments with centralized access control, a single, central entity makes access control
decisions and manages the access control system whereas in distributed access control
environments, these decisions are made and enforced in a decentralized manner.
• Both approaches have their pros and cons, and it is generally inappropriate to say that one is
better than the other.
• The selection of a particular access control approach should be made only after careful
consideration of an organization’s requirements and associated risks.
Security Vulnerability Management
• Security vulnerability management is the current evolutionary step of vulnerability assessment systems that
began in the early 1990s with the advent of the network security scanner S.A.T.A.N.
• (Security Administrator’s Tool for Analysing Networks) followed by the 1st commercial vulnerability
scanner from ISS.
• A vulnerability can occur anywhere in the IT environment, and can be the result of many different root
causes.
• Security vulnerability management is a closed-loop workflow that generally includes identifying networked
systems and associated applications, auditing (scanning) the systems and applications for vulnerabilities and
remediating the vulnerabilities.
Security Vulnerability Management (Continued..)
• Any IT infrastructure components may present existing or new security concerns and weaknesses i.e.
vulnerabilities.
• It may be product/ component faults or it may be inadequate configuration.
• Vulnerability management is the process of identifying those vulnerabilities and reacting appropriately to
mitigate the risk.
Vulnerability Assessment
Includes assessment the environment for known vulnerabilities, and to assess IT
components, using the security configuration policies (by device role) that have been defined for
the environment.
Network based vulnerability assessment (VA) has been the primary method employed to
baseline networks, servers and hosts. The primary strength of VA is breadth of coverage. Thorough
and accurate vulnerability assessments can be accomplished for managed systems via credentialed
access.
Database scanners check database configuration and properties to verify whether they comply
with database security best practices.
Web application scanners test an application’s logic for “abuse” cases that can break or exploit
the application. Additional tools can be leveraged to perform more in-depth testing and analysis.
All three scanning technologies (network, application and database) assess a different class of
security weaknesses, and most organizations need to implement all three.
Risk assessment
• Larger issues should be expressed in the language of risk (e.g. ISO 27005), specifically expressing impact
in terms of business impact.
• The business case for any remedial action should incorporate considerations relating to the reduction of risk
and compliance with policy.
Risk analysis
“Fixing” the issue may involve acceptance of the risk, shifting of the risk to another party or reducing the risk by
applying remedial action, which could be anything from a configuration change to implementing a new
infrastructure. e.g.
• Data loss prevention,
• Firewalls
• Host intrusion prevention software
Vulnerability enumeration
• Common Vulnerabilities and Exposures (CVE)
• Common Vulnerability Scoring System (CVSS)
• Common Weakness Enumeration (CWE)
Remediation Planning
Prioritization
• An RCA is an analysis of a failure to determine the first (or root) failure that cause the
ultimate condition in which the system finds itself.
• For example, in an application crash one should be thinking, why did it crash this way?
• A security analyst’s job in performing an RCA is to keep asking the inquisitive "why" until
one runs out of room for questions, and then they are faced with the problem at the root of
the situation.