Module 1 - IAS
Module 1 - IAS
INFORMATION
AND SECURITY 1
ASSURANCE
Name of Student:
Course/Year/Section:
COURSE OVERVIEW
Name of
Instructor/ Rene C. Radaza, MSIT
Professor
Knowledge (think)
Examine the relationship between threats, vulnerabilities,
countermeasures, attacks, compromises and remediation throughout
the entire system life cycle
Skills (Do)
Course Outcomes
Adopt the key factors involved in authentication and how they are
used to verify identity and grant access to the systems
Values (Feel)
Practice the legal and ethical considerations related to the handling
and management of enterprise information assets.
SLSU will:
a. Develop Science, Technology and Innovation leaders and
professionals;
SLSU Mission b. Produce high-impact technologies from research and innovations;
c. Contribute to sustainable development through responsive
community engagement programs;
d. Generate revenues to be self-sufficient and financially-viable;
INTRODUCTION
Year by year the importance of Information Security (InfoSec) and Information Assurance
(IA) grows. In 2012, security budgets received higher priority worldwide compared with 2011. The
spending on security is expected to grow from $55 billion in 2011 to $86 billion in 2016 . The
What is IA?
“…the practice of assuring information and managing risks related to the use,
processing, storage, and transmission of information or data and the systems
and processes used for those purposes. Information assurance includes
protection of the integrity, availability, authenticity, non-repudiation and
confidentiality of user data. It uses physical, technical and administrative
controls to accomplish these tasks. While focused predominantly on
information in digital form, the full range of IA encompasses not only digital
but also analog or physical form as well. These protections apply to data in
transit, both physical and electronic forms as well as data at rest in various
types of physical and electronic storage facilities”
In line with this, DFCSC stated that “IA practitioners must consider corporate
governance issues such as privacy, regulatory and standards compliance, auditing,
business continuity, and disaster recovery as they relate to information systems.”
The cryptology components of IA primarily concentrate on the last four pillars, namely: “…
integrity, authentication, confidentiality, and non-repudiation. These pillars are applied in
accordance with the mission needs of particular organizations.”
Tyler cybersecurity.com defines these pillars as follows:
Integrity, which means protecting against improper information modification or damage,
and includes ensuring information nonrepudiation and authenticity;
Confidentiality, which means preserving, authorized restrictions on access and disclosure,
including means for protecting personal privacy and proprietary information;
Authentication is the process of determining whether someone (or something) is, in fact,
who (or what) it is declared to be.
Non-repudiation, on the other hand, is defined by www.cryptomathic.com as “a legal
concept that is widely used in information security and refers to a service, which provides
proof of the origin of data and the integrity of the data. In other words, non-repudiation
makes it very difficult to successfully deny who/where a message came from as well as the
authenticity and integrity of that message.”
Information Security (INFOSEC)
Information security, shortened to InfoSec, is the practice of defending information from
unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or
destruction. It is a general term that can be used regardless of the form the data may take
(electronic, physical, etc...).”
The two (2) aspects of information security are explained in below.
Information assurance is an act of ensuring that data is not lost when critical
issues arise. IT security is sometimes referred to as information security applied to
technology (most often used some form of computer system).
IT security specialists are responsible for keeping all of the 6 technology within
the company secure from malicious cyber-attacks that often attempt to breach into critical
private information or gain control of the internal systems.
All institutions, both public and private, deal with a lot of confidential information. With
the advent of modern technology, most of this information is now gathered, processed
7 | SLSU CCSIT MAIN CAMPUS
and saved digitally and transmitted over computer networks. Write ways on how this
information shall be secured properly to prevent loss of sensitive or confidential
information, prevent hostile use of data or avoid damage to the organization’s
WHY SECURITY?
PRINCIPLES OF SECURITY
The CIA triad embodies the three concepts on “fundamental security objectives for both
data, information and computing services.”
Additional qualifications like “being authorized to do what one does or following the correct
procedures have also been included under the term integrity ensuring that users of a system, even if
authorized, are not permitted to modify data items in such a way that assets(i.e., accounting records)
of the company are lost or corrupted.
3. Availability
Assignment:
Why do we need to keep important corporate information confidential? What kinds of abuses
can you think of in the absence of controls on confidentiality? What criminal activities could
be reduced or eliminated if confidentiality controls were effectively implemented?
Test II.
Now that we have already defined the main objective of this course, we will be discussing the
Common Body of Knowledge in the areas of Information Assurance and Security.
ASSETS
Crown Jewels refer to a precious ornament or jewelries worn by a sovereign on certain state occasions.
Simply, crown jewels are particularly valuable or prized possession or something we secure to a safe
place.
This analogy will give us what an ASSET is. In every Information System we develop, we treat every
data as a “crown jewels”.
In Information Security, ASSET refers to any pieces of information, device or some other parts
related to them that supports business activities. Assets are either components of a computer
and/or the data that are stored in it. Basically, assets are the stuff that should be put under strict
security measure because failure to do so may result into losses to the organization.
To put is simply, assets are the main reason why we need to secure and assure our information
system, that once these are exposed, it may lead to problems leading to the organizations’ losses.
On a detailed part, mismanagement on the assets may lead into attacks. Attacks refer to activities
that are intended to snatch assets for the intention of using them for bad interests. This attacks are
everywhere whether on public or private sectors. One example of attacks is Data Breaches.
Data Breaches is an event wherein an information is accessed without the consent of the
authorized. This data breach is widely observed on the Web-based Information Systems because
many assets exposed over the internet are attacker’s apple of the eye. In fact, victims rise at 80% in
India in 2019. The chart below shows the different types of attacks happened in the web recorded
in the Month of September, 2019.
On the other hand, the person with a bad intention to attack one’s asset is a Hacker. Hackers refer
to anyone with a professional skill to access assets without any authorization. Their intention is
basically to commit crimes, mostly to steal and destroy systems. Sometimes, systems were being
hacked to hold the assets of the system in hostage wherein ransom is being collected in condition
to bringing back the assets.
However, good hackers also exist. They are the one who uses their skills in hardware and software
to bypass security of a device or a network. Their intention is to provide service to the victims of
attacks. Either public or private sectors are hiring good hackers to help them keep their systems
safe.
Computer Security Professional named hackers metaphorically using hat colors such as White,
Black and Gray. This name comes from the old spaghetti in the western country sides where black
has been worn by bad cowboys, white has been worn by the good ones and gray in neutral.
Black Hat Hackers
Black Hat Hackers basically have an advanced knowledge in destroying networks. They perform
the hacking through bypassing the security measures of the networks. This type of hacker also has
a knowledge in creating malware which intends to gain access to the systems to steal personal and
financial assets.
White Hat Hackers
Hackers who utilizes their skills to do good is referred to as White Hat Hackers. Most of the big
companies intentionally employs white hat hackers to work for them. Their main responsibility is
to check and find ditch in their systems through hacking. The main difference of White Hat Hackers
to the Black ones is that, white hat performs hacking with the owner’s permission while the black
one, doesn’t. In fact, they are some trainings and certifications for ethical hacking.
Grey Hat Hackers
Grey can neither be white or black. This analogy applies with the Grey Hat Hackers. They are
combinations of ethical and unethical hackers. Sometimes, they will find for a system or
organizations’ weakness without authorized access and report it to the company. Companies then
will hire them to secure the asset. However, if they do not employ the Grey Hat Hackers, they will
exploit the said assets online for the other Black Hat Hackers perform their intentions.
The term hacker always means not good to us. However, it is very important for us to understand
that our judgement to them shall always depend on their intentions.
Aside from hackers, we also have someone who violate or breaks the security of the remote
machines. They are known as Crackers. Initially, crackers get unauthorized access to the vital data
and deprive it to the original user or owner.
Crackers can be identified as fortunately few and far between—experts who discovers security
ditch and exploit them and/or the script kiddie—one who knows how to get programs and run
them legitimately.
13 | SLSU CCSIT MAIN CAMPUS
These hackers and crackers are the one whom Information Security is trying to catch.
Every Attacker, whether a Hacker or a Cracker, uses tools to perform their attacks. The following
are the tools they utilize to do their intentions;
1. Protocol Analyzers (Sniffers). These applications put the host NIC into mode that
passes all traffic to the CPU rather than to the controller it is designed to receive.
2. Port Scanner is an application that intends to probe a host for open port.
3. Finger scanning, is a way to acquire human biometric like fingerprints.
4. Vulnerability Scanning Tools are automated tools that scans web-based applications and
finds vulnerability. Examples are Cross-site scripting, SQL Injection, Command Injection,
Path Traversal and insecure server configuration.
5. Exploit Software is a bit of technology, a chunk of data or a series of commands that
compromises a bug or vulnerability to trigger unintended or unforeseen behavior to
occur on computer software, hardware or anything electronic.
6. Wardialers. This can be used to find backdoors into your network. This dials telephones
to check if there is a line that contains data through a modem and the like.
7. Password Cracker. This software is used to retrieve a forgotten password or other
network resources. Sometimes, these are used to access resources without permission.
8. Keystroke Loggers. Keylogger refers to a surveillance application that has the ability to
record every keystroke that is made on the system. This intends to record log file that is
usually encrypted.
Security Breach
Security breaches happen a lot — not at your house necessarily, but in large and small
organizations. Intention to destroy a company’s standing and finances is one concrete reason why
Security Breach exists.
This happens when an attacker or intruder gains access without the permission of the asset’s
owner or keeper. They use bypass mechanism that typically can reach the restricted areas. Security
breach is a violation that can lead to damage and even loss of assets.
Simply, Security Breaches refers to any action that would result in a violation of any rules of the
Central Intelligence Agency. Most of these breaches disrupt services intentionally. However, some
of them are accidental but both can cause hardware or software failures.
1. Attack through Denial of Service (DoS). This refers to an attack that kills a machine or
network, resulting for a legitimate user not to use the destroyed asset.
2. Distributed denial-of-service (DDoS). This happens when an attacker floods network
traffic to the target making it impossible for a legitimate user be denied to use the
network or a node.
3. Unacceptable Web Browsing. Acceptable web browsing is defined in an Acceptable Use
Policy (AUP) like finding for a file in the directory or browsing restricted sites.
4. Wiretapping. Wiretapping refers to the practice of connecting a listening device to a
telephone line to secretly monitor a conversation.
5. Backdoors. This refers to the hidden access included by the developers. Backdoors are
used to obtain exposure to the data repositories.
6. Data Modifications. Refers to the change in data that happens purposely or accidentally. It
may also include incomplete and truncated data.
Risk, Threats and Vulnerabilities are some characteristics that describes something that is needs to
be taken care. Failing to do so may lead into an attack,
Risk refers to the probability that bad things will happen to a specific asset.
Threat is defined as any action that might compromise or destroy an asset.
Vulnerability is a weakness that may harm systems or networks.
There are a wide variety of threats that spread out specially in the internet. Many call the internet
as marketplace of threats.
Malicious Attacks can be regarded according to the intent of actions. These may include the
following:
The following enlists types of threats that is currently active that developers or Information
Security Professional shall be aware of:
1. Birthday Attacks
2. Brute-Force Password Attacks
3. Dictionary Password Attacks
4. IP Addressing Spoofing
5. Hijacking
6. Replay Attacks
7. Man-In-The-Middle Attacks
8. Masquerading
9. Social Engineering
10. Phishing
11. Phreaking
In the context of installing before, during and after installing software to our systems, we can say
that is it malicious if it;
1. Causes damage
2. Escalates security privileges
3. Divulges private data
4. Modifies or deletes data
Virus
Like human being, our systems or assets can be infected by a virus too. In computing, virus comes
into another program or application. Basically, it contaminate a program and can cause it to be
copied to other computers themselves. Most of the time, when the user uses an infected
application, the virus triggers.
Worm
Worm refers to a program that is self-contained. This also duplicates and send itself to other hosts
without any user intervention. One scary thing about worm is that, it does not need an application
that is installed to contaminate the whole system.
Trojan Horse
Trojan Horse is a malware that hides into a useful program. This collects sensitive information, and
may open backdoors into computers. Trojan Horse can actively upload and download files.
Rootkit
A rootkit is a group of software that is malicious. Basically, these applications gets access to a
machine unauthorizedly and hides their existence on the other applications.
Spyware
Spywares are type of malwares. They target the confidential data. Mostly, they can monitor the
actions and even can do a course of actions like scanning, snooping and installing another spyware.
They can even change the default browser of a computer.
COUNTERMEASURES
As our Old English Saying states, prevention is better than cure, in information security we can also
cure, if not prevent these attacks to happen. There are suggested activities and tools so that we, as
Information Security Professional can do as an antidote or defense from the said attacks.
The following are countermeasures that can help in preventing and/or curing malware:
On the other hand, Firewall can defend your system from various forms of attacks too. Basically,
firewall is a program or a dedicated device that inspects network traffic present in a network. It’s
purpose is to deny or permit traffic depending on protocols.
Assessment 3:
Test I.
TEST III.
1. Define the concepts of risk management, specific response strategies and issues related to
IT systems recovery;
What is Risk Management?
The risk management process involves identifying and taking measures to reduce this risk to
an acceptable level, as represented by vulnerabilities, to the information resources and
infrastructure of an organization.
Risk management aim is to detect potential issues before they arise so that risk-handling
measures can be prepared and used as required during the product or project life to minimize
adverse impacts on achieving goals.
Risk identification
Asset Categorization
• Practical hazards call for investigation; minor risks are put aside.
• Assessment of the threat:
– What are the risks to assets that pose danger?
– Which threats pose the greatest risk to information?
– How much does the successful attack cost to recover?
– Which threat needs the greatest preventive expenditure?
Risk Assessment
Likelihood
• The next move is to determine how much of the information resources might be lost in a
successful attack.
• Combines the valuation of the intelligence asset with the amount of data destroyed in the
event of a successful attack.
• Issues include:
– Value of the information resources
– Measure the amount of information destroyed in best-case scenarios, worst-case
scenarios and most probable scenarios
Risk Calculation
• For the purposes of relative risk assessment, the risk is equal to:
– probability of occurrence of vulnerability Times value (or impact)
– minus percentage of risk already controlled
– plus an element of insecurity
Risk response is the process of developing strategic options and identifying actions, enhancing
opportunities and reducing threats to the objectives of the project.
The four basic strategies for dealing with negative risks or threats are as follows:
Mitigate - Attempts to reduce the attack's impact rather than mitigate the
attack's effectiveness itself.
Transfer - Threat attempts at shifting to other properties, structures or
organizations
Accept - Accept-is the choice to do little to protect a vulnerability, and to
allow the product between abuses. It may or may not be a deliberate business
judgment.
Avoid - acts to eliminate the threat or protect the project from its impact.
Choosing Countermeasures
Project risk management and risk analysis is where you keep track of how the risk
responses are being conducted against the schedule, as well as where new project risks are being
handled.
Make sure that you provide a response plan for each identified risk. It's not very helpful if the risk
becomes a reality or an issue and you don't have an alternate execution path or any other
emergency procurement plan.
Backing up data allows you to retrieve the data you've lost. It’s like hitting the rewind
button and making your computer go back to the previous state before a tragic accident took place.
So how do we classify the files needed and where do we find them? As a rule of thumb, files
you make are the sort of files you are expected to backup. System files, directories for the
Operating System, installed programs, and temporary files are files not needed for backup.
Backup Frequency
Media option will rely on multiple factors including backup size, setup complexity, portability and
security requirements, budget, on-site or off-site backup.
Some Example:
Full backups - All data is copied to another location in a complete data or device backup.
Incremental Backup - This type only supports the information that has been altered since
the recent backup.
Differential backups - Similar to incremental backup, a differential backup copies all data
that has changed from the last full back up each time it is run.
Recovery Alternatives
Three choice usually are considered if a business (or some part of it) has to be moved for recovery:
A dedicated business location, such as a secondary distribution center;
Commercially leased installations, such as hot sites or mobile facilities;
POST TEST:
REFERENCE
1. Cherdantseva, Y., & Hilton, J. (2013, September). A reference model of information
assurance & security. In 2013 International Conference on Availability, Reliability and
Security (pp. 546-555). IEEE.
2. Stamp, M. (2011). Information security: principles and practice. John Wiley & Sons.
3. Taylor, A., Finch, A., Alexander, D., & Sutton, D. (2013). Information security management
principles. BCS Learning & Development.
4. Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage
Learning.
5. Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage
Learning.