Fundamentals of Information Systems Security
Fundamentals of Information Systems Security
Security
Information security means protecting information (data) and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction.
The level of security required to accomplish these principles differs per company, because
each has its own unique combination of business and security goals and requirements.
All security controls, mechanisms, and safeguards are implemented to provide one or more of
these principles.
All risks, threats, and vulnerabilities are measured for their potential capability to
compromise one or all of the CIA principles
Confidentiality
Ensures that the necessary level of secrecy is enforced at each junction of data
processing and prevents unauthorized disclosure. This level of confidentiality should
prevail while data resides on systems and devices within the network, as it is
transmitted and once it reaches its destination.
Threat sources
o Network Monitoring
o Shoulder Surfing- monitoring key strokes or screen
o Stealing password files
o Social Engineering- one person posing as the actual
Countermeasures
o Encrypting data as it is stored and transmitted.
o By using network padding
o Implementing strict access control mechanisms and data classification
o Training personnel on proper procedures.
1
Integrity
Threat sources
o Viruses
Countermeasures
o Strict Access Control
o Intrusion Detection
o Hashing
Availability
Availability ensures reliability and timely access to data and resources to authorized
individuals.
Threat sources
o Device or software failure.
o Environmental issues like heat, cold, humidity, static electricity, and
contaminants can also affect system availability.
o Denial-of-service (DoS) attacks
Countermeasures
o Maintaining backups to replace the failed system
o IDS to monitor the network traffic and host system activities
o Use of certain firewall and router configurations
Vulnerability
2
Threat
Risk
Risk is the likelihood of a threat agent taking advantage of vulnerability and the
corresponding business impact.
Reducing vulnerability and/or threat reduces the risk.
E.g.: If a firewall has several ports open, there is a higher likelihood that an intruder
will use one to access the network in an unauthorized method.
Exposure
Countermeasure or Safeguard
Example: If a company has antivirus software but does not keep the virus signatures
up-to-date, this is vulnerability. The company is vulnerable to virus attacks.
The threat is that a virus will show up in the environment and disrupt productivity.
The likelihood of a virus showing up in the environment and causing damage is the
risk.
If a virus infiltrates the company's environment, then vulnerability has been exploited
and the company is exposed to loss.
The countermeasures in this situation are to update the signatures and install the
antivirus software on all computers
Alternative Description:
A threat agent causes the realisation of a threat by exploiting a vulnerability. The
measurement of the extent that this exploitation causes damage is the exposure. The
3
organisational loss created within the exposure is the impact. Risk is the probability that a
threat event will generate loss and be realised within the organisation.
Example:
Security Controls
Administrative controls are commonly referred to as “soft controls” because they are more
management-oriented. Examples of administrative controls are security documentation, risk
management,
personnel security, and training.
Technical controls (also called logical controls) are software or hardware components, as in
firewalls, IDS, encryption, identification and authentication mechanisms.
Physical controls are items put into place to protect facility, personnel, and resources.
Examples of physical controls are security guards, locks, fencing, and lighting.
Governance is the set of responsibilities and practices exercised by the board and executive
management with the goal of providing strategic direction, ensuring that objectives are
achieved, ascertaining that risks are managed appropriately and verifying that the enterprise's
resources are used responsibly.
Policies
Types of Policies
5
Regulatory: This type of policy ensures that the organization is following standards
set by specific industry regulations. This policy type is very detailed and specific to a
type of industry. This is used in financial institutions, health care facilities, public
utilities, and other government-regulated industries. E.g.: TRAI.
Advisory: This type of policy strongly advises employees regarding which types of
behaviors and activities should and should not take place within the organization. It
also outlines possible ramifications if employees do not comply with the established
behaviors and activities. This policy type can be used, for example, to describe how to
handle medical information, handle financial transactions, or process confidential
information.
Informative: This type of policy informs employees of certain topics. It is not an
enforceable policy, but rather one to teach individuals about specific issues relevant to
the company. It could explain how the company interacts with partners, the
company's goals and mission, and a general reporting structure in different situations.
Organizational
o Management establishes how a security program will be set up, lays out the
program's goals, assigns responsibilities, shows the strategic and tactical value
of security, and outlines how enforcement should be carried out.
o Provides scope and direction for all future security activities within the
organization.
o This policy must address relative laws, regulations, and liability issues and
how they are to be satisfied.
o It also describes the amount of risk senior management is willing to accept.
o Characteristics
Business objectives should drive the policy's creation, implementation,
and enforcement. The policy should not dictate business objectives.
It should be an easily understood document that is used as a reference
point for all employees and management.
It should be developed and used to integrate security into all business
functions and processes.
It should be derived from and support all legislation and regulation
applicable to the company.
It should be reviewed and modified as a company changes, such as
through adoption of a new business model, merger with another
company, or change of ownership.
Each iteration of the policy should be dated and under version control.
The units and individuals who are governed by the policy must have
access to the applicable portions and not be expected to have to read all
policy material to find direction and answers
Issue-specific
o Addresses specific security issues that management feels need more detailed
explanation and attention to make sure a comprehensive structure is built and
all employees understand how they are to comply with these security issues
o E.g.: An e-mail policy might state that management can read any employee's
e-mail messages that reside on the mail server, but not when they reside on the
user's workstation
System-specific
6
o Presents the management's decisions that are specific to the actual computers,
networks, applications, and data.
o This type of policy may provide an approved software list, which contains a
list of applications that may be installed on individual workstations.
o E.g.: This policy may describe how databases are to be used and protected,
how computers are to be locked down, and how firewalls, IDSs, and scanners
are to be employed.
Standards
Procedures
Baselines
A baseline can refer to a point in time that is used as a comparison for future changes.
Once risks have been mitigated, and security put in place, a baseline is formally
reviewed and agreed upon, after which all further comparisons and development are
measured against it.
A baseline results in a consistent reference point.
Baselines are also used to define the minimum level of protection that is required.
In security, specific baselines can be defined per system type, which indicates the
necessary settings and the level of protection that is being provided. For example, a
company may stipulate that all accounting systems must meet an Evaluation
Assurance Level (EAL) 4 baseline.
Guidelines
7
Guidelines can deal with the methodologies of technology, personnel, or physical
security.
A policy might state that access to confidential data must be audited. A supporting
guideline could further explain that audits should contain sufficient information to
allow for reconciliation with prior reviews. Supporting procedures would outline the
necessary steps to configure, implement, and maintain this type of auditing.
policies are strategical(long term) while standards, guidelines and procedures are
tactical(medium term).
Some of the best practices that facilitate the implementation of security controls include
Control Objectives for Information and Related Technology (COBIT), ISO/IEC 17799/BS
7799, Information Technology Infrastructure Library (ITIL), and Operationally Critical
Threat, Asset and Vulnerability Evaluation (OCTAVE).
COSO
The COSO framework defines internal control as a process, effected by an entity's board of
directors, management and other personnel, designed to provide reasonable assurance
regarding the achievement of objectives in the following categories:
According to the COSO framework, internal control consists of five interrelated components.
These components provide an effective framework for describing and analyzing the internal
control system implemented in an organization. The five components are the following:
8
Control Environment: The control environment sets the tone of an organization,
influencing the control consciousness of its people. It is the foundation for all other
components of internal control, providing discipline and structure. Control
environment factors include the integrity, ethical values, management's operating
style, delegation of authority systems, as well as the processes for managing and
developing people in the organization.
Risk assessment: Every entity faces a variety of risks from external and internal
sources that must be assessed. A precondition to risk assessment is establishment of
objectives and thus risk assessment is the identification and analysis of relevant risks
to achievement of assigned objectives. Risk assessment is a prerequisite for
determining how the risks should be managed.
Control activities: Control activities are the policies and procedures that help ensure
management directives are carried out. They help ensure that necessary actions are
taken to address risks to achievement of the entity's objectives. Control activities
occur throughout the organization, at all levels and in all functions. They include a
range of activities as diverse as approvals, authorizations, verifications,
reconciliations, reviews of operating performance, security of assets and Separation of
duties/segregation of duties.
ITIL
The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques
for managing information technology (IT) infrastructure, development, and operations.
reduced costs;
improved IT services through the use of proven best practice processes;
improved customer satisfaction through a more professional approach to service
delivery;
9
standards and guidance;
improved productivity;
improved use of skills and experience; and
improved delivery of third party services through the specification of ITIL or ISO
20000 as the standard for service delivery in services procurements.
ITIL v3
The ITIL v3 which was published in May 2007, comprises 5 key volumes:
1. . Service Strategy
2. . Service Design
3. . Service Transition
4. . Service Operation
5. . Continual Service Improvement
COBIT 4.X
The Control Objectives for Information and related Technology (COBIT 4.X) is a set of best
practices (framework) for information technology (IT) management created by the
Information Systems Audit and Control Association (ISACA), and the IT Governance
Institute (ITGI) in 1992. COBIT provides managers, auditors, and IT users with a set of
generally accepted measures, indicators, processes and best practices to assist them in
maximizing the benefits derived through the use of information technology and developing
appropriate IT governance and control in a company.
Overview
COBIT has 34 high level processes that cover 210 control objectives categorized in
four domains:
o Planning and Organization
o Acquisition and Implementation
o Delivery and Support
o Monitoring
COBIT provides benefits to managers, IT users, and auditors
o Managers benefit from COBIT because it provides them with a foundation
upon which IT related decisions and investments can be based. Decision
making is more effective because COBIT aids management in defining a
strategic IT plan, defining the information architecture, acquiring the
necessary IT hardware and software to execute an IT strategy, ensuring
continuous service, and monitoring the performance of the IT system.
o IT users benefit from COBIT because of the assurance provided to them by
COBIT's defined controls, security, and process governance.
o COBIT benefits auditors because it helps them identify IT control issues
within a company's IT infrastructure. It also helps them corroborate their audit
findings.
COBIT structure
10
Plan and Organize: The Planning and Organization domain covers the use of
information & technology and how best it can be used in a company to help achieve
the company's goals and objectives. It also highlights the organizational and
infrastructural form IT is to take in order to achieve the optimal results and to
generate the most benefits from the use of IT.
Acquire and Implement: The Acquire and Implement domain covers identifying IT
requirements, acquiring the technology, and implementing it within the company's
current business processes. This domain also addresses the development of a
maintenance plan that a company should adopt in order to prolong the life of an IT
system and its components.
Delivery and Support: The Delivery and Support domain focuses on the delivery
aspects of the information technology. It covers areas such as the execution of the
applications within the IT system and its results, as well as, the support processes that
enable the effective and efficient execution of these IT systems. These support
processes include security issues and training.
Monitor and Evaluate: The Monitoring and Evaluation domain deals with a
company's strategy in assessing the needs of the company and whether or not the
current IT system still meets the objectives for which it was designed and the controls
necessary to comply with regulatory requirements. Monitoring also covers the issue of
an independent assessment of the effectiveness of IT system in its ability to meet
business objectives and the company's control processes by internal and external
auditors.
BS 7799
11
o The 2002 version of BS 7799-2 introduced the Plan-Do-Check-Act (PDCA)
(Deming quality assurance model), aligning it with quality standards such as
ISO 9000.
o BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.
BS 7799 Part 3 was published in 2005, covering risk analysis and management. It
aligns with ISO/IEC 27001.
ISO 17799
12
The ISO/IEC 27000-series (also known as the 'ISMS Family of Standards' or 'ISO27k' for
short) comprises information security standards published jointly by the International
Organization for Standardization (ISO) and the International Electrotechnical Commission
(IEC).
The series is deliberately broad in scope, covering more than just privacy, confidentiality and
IT or technical security issues. It is applicable to organizations of all shapes and sizes. All
organizations are encouraged to assess their information security risks, then implement
appropriate information security controls according to their needs, using the guidance and
suggestions where relevant. Given the dynamic nature of information security, the ISMS
concept incorporates continuous feedback and improvement activities, summarized by
Deming's "plan-do-check-act" approach, that seek to address changes in the threats,
vulnerabilities or impacts of information security incidents.
Although the list of ISO 27000-series standards for information security management
continues to grow in number. ISO/IEC 27002 and ISO/IEC 27001 remain the most used
13
standards, because they provide the most basic guidance for an enterprise information
security program practices and processes and also because they are the most current versions
of their popular predecessors (BS 7799 and ISO 17799).
Organizational Behavior
Job Rotation
Job rotation is also practiced to allow qualified employees to gain more insights into the
processes of a company and to increase job satisfaction through job variation.
Separation of Duties
Separation of duties (SoD) is the concept of having more than one person required to
complete a task. It is alternatively called segregation of duties or, in the political realm,
separation of powers.
This approach can lead to a high level of difficulty when trying to determine what the
underlying causes of errors or failures in large scale entity's production automation as no
person will be able to view the information flow process from the "big picture" and how an
automated program starts an application that is not creating the correct output data but not
clearly failing to an error message alert running on a Virtual Server client that transports the
data file that is created to an outside client and etc. etc. etc. Especially as each separated
department individual will just glance at their application software used to manage their
specified section on their monitor screen and seeing no obvious errors assume the unknown
error causing complete system or process failure problem is not within their section and go
back to the practice of effective communicating while writing all the great accomplishments
they delivered that furthered the entity's stated goals to have available for their next review
with management because that's what HR told them to do. (Not that this behavior is faulty or
wrong in any sense and it is actually doing what the entity's incentives are geared to
encourage not only for advancement but to keep a job as well.)
Without those few and far between expert level techs who can have (or get) the
administration rights to view all aspects of any given production process it will be nearly
impossible to determine the underlying cause and can lead to outrageous decisions as to what
the problem must of been. (For example: deciding to quit using all virtual servers and go back
to multiple actual server machines with each connected to it's on monitor all because no error
handling was encoded in the in-house written .net program.) (Or nobody realizing the
automated software machine was running into RAM issues because every automated job was
set to auto start at exactly 6:00 and MS Windows has a built in limit of a maximum of 10
14
network connections at one time even at the enterprise level and so forth.) ***These SOD
positions are of no interest to those high level technical experts who seek to be constantly
challenged.***
Overview
SoD in basic terms that is no single individuals should have controls over two or more
phases of a transaction or operation, so that a deliberate fraud is more difficult to
occur because it requires collusion of two or more individuals or parties.
With the concept of SoD, business critical duties can be categorized into four types of
functions, authorization, custody, record keeping and reconciliation. In a perfect
system, no one person should handle more than one type of function.
In information systems, segregation of duties helps reduce the potential damage from
the actions of one person. IS or end-user department should be organized in a way to
achieve adequate separation of duties
There are several control mechanisms that can help to enforce the segregation of duties:
Audit trails enable IT managers or Auditors to recreate the actual transaction flow
from the point of origination to its existence on an updated file. Good audit trails
should be enabled to provide information on who initiated the transaction, the time of
day and date of entry, the type of entry, what fields of information it contained, and
what files it updated.
Reconciliation of applications and an independent verification process is ultimately
the responsibility of users, which can be used to increase the level of confidence that
an application ran successfully.
Exception reports are handled at supervisory level, backed up by evidence noting that
exceptions are handled properly and in timely fashion. A signature of the person who
prepares the report is normally required.
Manual or automated system or application transaction logs should be maintained,
which record all processed system commands or application transactions.
Supervisory review should be performed through observation and inquiry and the
trust built with directory one-level up managers.
To compensate repeated mistakes or intentional failures by following a prescribed
procedure, independent reviews are recommended. Such reviews can help detect
errors and irregularities but are usually expensive can raise questions as to how much
can an outside independent review once a quarter know about your processes
compared to people within and what level of trust can be built with those independent
reviewers.
The principle of least privilege, also known as the principle of minimal privilege or just least
privilege, requires that in a particular abstraction layer of a computing environment every
module (such as a process, a user or a program on the basis of the layer we are considering)
15
must be able to access only such information and resources that are necessary to its legitimate
purpose.
Note: This principle is a useful security tool, but it has never been successful at enforcing
high assurance security on a system.
Benefits
Better system stability. When code is limited in the scope of changes it can make to a
system, it is easier to test its possible actions and interactions with other applications.
In practice for example, applications running with restricted rights will not have
access to perform operations that could crash a machine, or adversely affect other
applications running on the same system.
Better system security. When code is limited in the system-wide actions it may
perform, vulnerabilities in one application cannot be used to exploit the rest of the
machine. For example, Microsoft states “Running in standard user mode gives
customers increased protection against inadvertent system-level damage caused by
"shatter attacks" and malware, such as root kits, spyware, and undetectable viruses.”
Ease of deployment. In general, the fewer privileges an application requires the easier
it is to deploy within a larger environment. This usually results from the first two
benefits, applications that install device drivers or require elevated security privileges
typically have addition steps involved in their deployment, for example on Windows a
solution with no device drivers can be run directly with no installation, while device
drivers must be installed separately using the Windows installer service in order to
grant the driver elevated privileges
Mandatory Vacations
Mandatory vacations of one to two weeks are used to audit and verify the work tasks and
privileges of employees. This often results in easy detection of abuse, fraud, or negligence.
Levels of Responsibilities
Senior management and other levels of management understand the vision of the
company, the business goals, and the objectives.
Functional management, whose members understand how their individual
departments work, what roles individuals play within the company, and how security
affects their department directly.
Operational managers and staff. These layers are closer to the actual operations of the
company. They know detailed information about the technical and procedural
requirements, the systems, and how the systems are used. The employees at these
layers understand how security mechanisms integrate into systems, how to configure
them, and how they affect daily productivity.
16
Data Owner
Data Custodian
Security Administrator
A security administrator's tasks are many, and include creating new system user
accounts, implementing new security software, testing security patches and
components, and issuing new passwords.
The security administrator role needs to make sure that access rights that are given to
users support the policies and data owner directives.
Security Analyst
This role works at a higher, more strategic level than the previously described roles
and helps to develop policies, standards, and guidelines and set various baselines.
Whereas the previous roles are "in the weeds" and focusing on their pieces and parts
of the security program, a security analyst helps define the security program elements
and follows through to ensure that the elements are being carried out and practiced
properly. This person works more at a design level than at an implementation level.
Application Owner
An application owner, usually the business unit managers, are responsible for
dictating who can and cannot access their applications, like the accounting software,
software for testing and development etc.
17
Supervisor
This role, also called user manager, is ultimately responsible for all user activity and
any assets created and owned by these users like ensuring that all his employees
understand their responsibilities with respect to security, distributing initial
passwords, making sure that the employees' account information is up-to-date, and
informing the security administrator when an employee is fired, suspended, or
transferred.
The change control analyst is responsible for approving or rejecting requests to make
changes to the network, systems, or software.
This role needs to make sure that the change will not introduce any vulnerability, that
it has been properly tested, and that it is properly rolled out.
The change control analyst needs to understand how various changes can affect
security, interoperability, performance, and productivity.
Data Analyst
The data analyst is responsible for ensuring that data is stored in a way that makes the
most sense to the company and the individuals who need to access and work with it.
The data analyst role may be responsible for architecting a new system that will hold
company information or advising in the purchase of a product that will do this.
The data analyst works with the data owners to help ensure that the structures that are
set up coincide with and support the company's business objectives.
Process Owner
Security should be considered and treated like just another business process. The
process owner is responsible for properly defining, improving upon, and monitoring
these processes.
A process owner is not necessarily tied to one business unit or application. Complex
processes involve a lot of variables that can span across different departments,
technologies, and data types.
Solution Provider
This role is called upon when a business has a problem or requires that a process be
improved upon.
A solution provider works with the business unit managers, data owners, and senior
management to develop and deploy a solution to reduce the company's pain points.
User
The user is any individual who routinely uses the data for work-related tasks.
The user must have the necessary level of access to the data to perform the duties
within their position and is responsible for following operational security procedures
to ensure the data's confidentiality, integrity, and availability to others.
18
Product Line Manager
Reporting Model
Business Relationships
Reporting to the CEO
Reporting to the Information Technology (IT) Department
Reporting to Corporate Security
Reporting to the Administrative Services Department
Reporting to the Insurance and Risk Management Department
Reporting to the Internal Audit Department
Reporting to the Legal Department
Determining the Best Fit
Personnel Security
19
There are many facets of personnel responsibilities that fall under management's umbrella
and several of these facets have a direct correlation to the overall security of the environment
such as
Hiring Practices
Depending on the position that needs to be filled, a level of screening should be done by
human resources to ensure that the company hires the right individual for the right job.
Skills should be tested and evaluated, and the caliber and character of the individual
should be examined.
Nondisclosure agreements need to be developed and signed by new employees to
protect the company and its sensitive information.
Any conflicts of interests need to be addressed, and there should be different
agreements and precautions taken with temporary and contract employees.
References should be checked, military records should be reviewed, education should
be verified, and if necessary, a drug test should be administered.
Many times, important personal behaviors can be concealed, and that is why hiring
practices should include scenario questions, personality tests, and observations of the
individual, instead of just looking at a person's work history.
Employee Controls
A management structure must be in place to make sure that everyone has someone to
report to and that the responsibility for another person's actions is spread equally and
intelligently.
Consequences for noncompliance or unacceptable behavior must be communicated
before an event takes place.
Proper supervisory skills need to be acquired and used to ensure that operations go
smoothly and any out-of-the-ordinary activities can be taken care of before they get
out of control.
Rotation of duties should be employed in order keep control of each department in a
healthy and productive state. No one person should stay in one position for a long
period of time because they may end up having too much control over a segment of
the business thus resulting in a fraud, data modification, and misuse of resources.
Employees in sensitive areas should be forced to take their vacation, which is known
as a mandatory vacation policy, giving the scope for the other individual in his place
who can usually detect any fraudulent errors or activities.
Two variations of separation of duties and control are split knowledge and dual
control.
o In both cases, two or more individuals are authorized and required to perform
a duty or task.
o In the case of split knowledge, no one person knows or has all the details to
perform a task.
20
o In the case of dual control, two individuals are again authorized to perform a
task, but both must be available and active in their participation to complete
the task or mission.
Termination
Companies should have a specific set of procedures to follow with each and every
termination.
21
Access Control
Access controls are security features that control how users and systems communicate and
interact with other systems and resources.
A subject is an active entity that requests access to an object or the data within an object. e.g.:
user, program, process etc.
An object is a passive entity that contains the information. e.g.: Computer, Database, File,
Program etc.
Access controls give organization the ability to control, restrict, monitor, and protect
resource availability, integrity and confidentiality
Principle of Least Privilege: States that if nothing has been specifically configured for an
individual or the groups, he/she belongs to, the user should not be able to access that
resource i.e.Default no access
Need to know : It is based on the concept that individuals should be given access only to the
information that they absolutely require in order to perform their job duties
Roles
Groups
Location
Time
Transaction Type
Security Principles
Identification
Authentication
Authorization
Non Repudiation/Accountability
22
Identification, Authentication, and Authorization
Identification describes a method of ensuring that a subject is the entity it claims to be. e.g.:
A user name or an account no.
Authentication is the method of proving the subjects identity. E.g.: Password, Passphrase,
PIN
Authorization is the method of controlling the access of objects by the subject. E.g.: A user
cannot delete a particular file after logging into the system
Note: There must be a three step process of Identification, Authentication and Authorization
in order for a subject to access an object
Authentication Factors
Something a person knows- E.g.: passwords, PIN- least expensive, least secure
Something a person has – E.g.: Access Card, key- expensive, secure
Something a person is- E.g.: Biometrics- most expensive, most secure
Note: For a strong authentication to be in process, it must include two out of the three
authentication factors- also referred to as two-factor authentication.
23
Corrective- Correct undesirable events that have occurred
Deterrent- Discourage security violations
Recovery- Restore resources and capabilities
Compensative- Provide alternatives to other controls
Overview
A DoS attack can be perpetrated in a number of ways. There are five basic types of attack:
Countermeasures
Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS
attack, but there are steps you can take to reduce the likelihood that an attacker will use your
computer to attack other computers:
Buffer Overflows
24
Overview
Countermeasure
25
Stack-smashing protection which refers to various techniques for detecting buffer
overflows on stack-allocated variables.The most common implementation being
StackGuard, and SSP
Executable space protection which is the marking of memory regions as non-
executable, such that an attempt to execute machine code in these regions will cause
an exception. It makes use of hardware features such as the NX bit (Non Execute bit).
Address space layout randomization: A technique which involves arranging the
positions of key data areas, usually including the base of the executable and position
of libraries, heap, and stack, randomly in a process' address space.
Deep packet inspection:It is a form of computer network packet filtering that
examines the data and/or header part of a packet as it passes an inspection point,
searching for non-protocol compliance, viruses, spam, intrusions or predefined criteria
to decide if the packet can pass or if it needs to be routed to a different destination, or
for the purpose of collecting statistical information. It also called Content Inspection
or Content Processing.
Malicious Software
Password Crackers
Spoofing/Masquerading
Overview
26
o Caller ID spoofing :This allows callers to lie about their identity, and present
false names and numbers, which could of course be used as a tool to defraud
or harass
o E-mail address spoofing:A technique commonly used for spam e-mail and
phishing to hide the origin of an e-mail message by changing certain
properties of the e-mail, such as the From, Return-Path and Reply-To fields.
o Login spoofing : A technique used to obtain a user's password. The user is
presented with an ordinary looking login prompt for username and password,
which is actually a malicious program, usually called a Trojan horse under the
control of the attacker. When the username and password are entered, this
information is logged or in some way passed along to the attacker, breaching
security.
Countermeasures
Be skeptical of e-mails indicating that you need to make changes to your accounts or
warnings indicating that accounts will be terminated without you doing some type of
activity online.
Call the legitimate company to find out if this is a fraudulent message.
Review the address bar to see if the domain name is correct.
When submitting any type of financial information or credential data, an SSL
connection should be set up, which is indicated in the address bar (https://) and a
closed-padlock icon in the browser at the bottom-right corner.
Do not click on an HTML link within an e-mail. Type the URL out manually instead.
Do not accept e-mail in HTML format.
Emanations
Overview
All electronic devices emit electrical signals. These signals can hold important
information, and if an attacker buys the right equipment and positions himself in the
right place, he could capture this information from the airwaves and access data
transmissions as if he had a tap directly on the network wire.
Countermeasure
Tempest: Tempest is the name of a program, and now a standardized technology that
suppresses signal emanations with shielding material. Vendors who manufacture this
type of equipment must be certified to this standard. In devices that are Tempest rated,
other components are also modified, especially the power supply, to help reduce the
amount of electricity that is used unlike the normal devices which have just an outer
metal coating, referred to as a Faraday cage. This type of protection is usually needed
only in military institutions, although other highly secured environments do utilize
this type of safeguard.
o Tempest Technologies: Tempest technology is complex, cumbersome, and
expensive, and therefore only used in highly sensitive areas that really need
this high level of protection. Two alternatives to Tempest exist
27
White Noise: White noise is a uniform spectrum of random electrical
signals. It is distributed over the full spectrum so that the bandwidth is
constant and an intruder is not able to decipher real information from
random noise or random information.
Control Zone: Some facilities use material in their walls to contain
electrical signals. This prevents intruders from being able to access
information that is emitted via electrical signals from network devices.
This control zone creates a type of security perimeter and is
constructed to protect against unauthorized access to data or
compromise of sensitive information.
Shoulder Surfing
Overview
Shoulder surfing refers to using direct observation techniques, such as looking over
someone's shoulder, to get information. Shoulder surfing is particularly effective in
crowded places because it's relatively easy to observe someone as they:
o Fill out a form
o Enter their PIN at an automated teller machine or a POS Terminal
o Use a calling card at a public pay phone
o Enter passwords at a cybercafe, public and university libraries, or airport
kiosks.
o Enter a digit code for a rented locker in a public place such as a swimming
pool or airport.
Shoulder surfing is also be done at a distance using binoculars or other vision-
enhancing devices. Inexpensive, miniature closed-circuit television cameras can be
concealed in ceilings, walls or fixtures to observe data entry. To prevent shoulder
surfing, it is advised to shield paperwork or the keypad from view by using one's body
or cupping one's hand.
Recent automated teller machines now have a sophisticated display which discourages
shoulder surfers. It grows darker beyond a certain viewing angle, and the only way to
tell what is displayed on the screen is to stand directly in front of it.
Certain models of credit card readers have the keypad recessed, and employ a rubber
shield that surrounds a significant part of the opening towards the keypad. This makes
shoulder-surfing significantly harder, as seeing the keypad is limited to a much more
direct angle than previous models. Taken further, some keypads alter the physical
location of the keys after each keypress. Also, security cameras are not allowed to be
placed directly above an ATM.
Object Reuse
Overview
Object reuse issues pertain to reassigning to a subject media that previously contained
one or more objects.
The sensitive information that may be left by a process should be securely cleared
before allowing another process the opportunity to access the object. This ensures that
information not intended for this individual or any other subject is not disclosed.
28
For media that holds confidential information, more extreme methods should be taken
to ensure that the files are actually gone, not just their pointers.
Countermeasures
Data Remanence
Overview
Data remanence is the residual representation of data that has been in some way been
nominally erased or removed. This residue may be due to data being left intact by a
nominal delete operation, or through physical properties of the storage medium.
Data remanence may make inadvertent disclosure of sensitive information possible,
should the storage media be released into an uncontrolled environment.
Countermeasures
Classes of Countermeasures
o Clearing
Clearing is the removal of sensitive data from storage devices in such a
way that there is assurance, proportional to the sensitivity of the data,
that the data may not be reconstructed using normal system functions.
The data may still be recoverable, but not without unusual effort.
Clearing is typically considered an administrative protection against
accidental disclosure within an organization. For example, before a
floppy disk is re-used within an organization, its contents may be
cleared to prevent their accidental disclosure to the next user.
o Purging
Purging or sanitizing is the removal of sensitive data from a system or
storage device with the intent that the data can not be reconstructed by
any known technique.
Purging is generally done before releasing media outside of control,
such as before discarding old media, or moving media to a computer
with different security requirements.
Methods to Countermeasure
o Overwriting
A common method used to counter data remanence is to overwrite the
storage medium with new data. This is often called a wiping or
shredding a file or disk. Because such methods can often be
implemented in software alone, and may be able to selectively target
only part of a medium, it is a popular, low-cost option for some
applications.
29
The simplest overwrite technique writes the same data everywhere --
often just a pattern of all zeros. At a minimum, this will prevent the
data from being retrieved simply by reading from the medium again,
and thus is often used for clearing.
o Degaussing
Degaussing is the removal or reduction of a magnetic field. Applied to
magnetic media, degaussing may purge an entire media element
quickly and effectively. A device, called a degausser, designed for the
media being erased, is used.
Degaussing often renders hard disks inoperable, as it erases low-level
formatting which is only done at the factory, during manufacture.
Degaussed floppy disks can generally be reformatted and reused.
o Encryption
Encrypting data before it is stored on the medium may mitigate
concerns about data remanence. If the decryption key is strong and
carefully controlled (i.e., not itself subject to data remanence), it may
effectively make any data on the medium unrecoverable. Even if the
key is stored on the medium, it may prove easier or quicker to
overwrite just the key, vs the entire disk.
Encryption may be done on a file-by-file basis, or on the whole disk.
o Physical destruction
Physical destruction of the data storage medium is generally
considered the most certain way to counter data remanence, although
also at the highest cost. Not only is the process generally time-
consuming and cumbersome, it obviously renders the media unusable.
Further, with the high recording densities of modern media, even a
small media fragment may contain large amounts of data.
Specific destruction techniques include:
Physically breaking the media apart, by grinding, shredding,
etc.
Incinerating
Phase transition (i.e., liquification or vaporization of a solid
disk)
Application of corrosive chemicals, such as acids, to recording
surfaces
For magnetic media, raising its temperature above the Curie
point
Backdoor/Trapdoor
Overview
30
o spy on a user,
o manage files,
o install additional software or dangerous threats,
o control the entire system including any present applications or hardware
devices,
o shutdown or reboot a computer or
o attack other hosts.
Often a backdoor has additional harmful capabilities like keystroke logging,
screenshot capture, file infection, even total system destruction or other payload. Such
parasite is a combination of different privacy and security threats, which works on its
own and doesn’t require to be controlled at all.
Most backdoors are autonomic malicious programs that must be somehow installed to
a computer. Some parasites do not require the installation, as their parts are already
integrated into particular software running on a remote host. Programmers sometimes
left such backdoors in their software for diagnostics and troubleshooting purposes.
Hackers often discover these undocumented features and use them to break into the
system.
Countermeasure
Dictionary Attacks
Overview
Dictionary attacks are launched by programs which are fed with a lists (dictionaries)
of commonly used words or combinations of characters, and then compares these
values to capture passwords.
Once the right combination of characters is identified, the attacker can use this
password to authenticate herself as a legitimate user.
Sometimes the attacker can even capture the password file using this kind of activity.
Countermeasures
To properly protect an environment against dictionary and other password attacks, the
following practices should be followed:
31
Bruteforce Attacks
Overview
Brute force is defined as “trying every possible combination until the correct one is
identified.”
The most effective way to uncover passwords is through a hybrid attack, which
combines a dictionary attack and a brute force attack
A brute force attack is also known as an exhaustive attack.
These are usually used for wardialing in hopes of finding a modem that can be
exploited to gain unauthorized access.
Countermeasures
For phone brute force attacks, auditing and monitoring of this type of activity should be in
place to uncover patterns that could indicate a wardialing attack:
Social Engineering
Overview
At work Place
o In the workplace, the hacker can simply walk in the door, like in the movies,
and pretend to be a maintenance worker or consultant who has access to the
organization. Then the intruder struts through the office until he or she finds a
few passwords lying around and emerges from the building with ample
information to exploit the network from home later that night
32
o Another technique to gain authentication information is to just stand there and
watch an oblivious employee type in his password.
On Phone/Help Desk
o It its the most prevalent type of social engineering attack.
o A hacker will call up and imitate someone in a position of authority or
relevance and gradually pull information out of the user.
o Help desks are particularly prone to this type of attack. Hackers are able to
pretend they are calling from inside the corporation by playing tricks on the
PBX or the company operator, so caller-ID is not always the best defense
o Help desks are particularly vulnerable because they are in place specifically to
help, a fact that may be exploited by people who are trying to gain illicit
information
Dumpster Diving
o Dumpster diving, also known as trashing, is another popular method of social
engineering. A huge amount of information can be collected through company
dumpsters (trash can).
o The following items turn to be a potential security leaks in our trash:
company phone books which can give the hackers names and numbers
of people to target and impersonate
organizational charts contain information about people who are in
positions of authority within the organization
memos provide small tidbits of useful information for creating
authenticity
company policy manuals show hackers how secure (or insecure) the
company really is
calendars of meetings may tell attackers which employees are out of
town at a particular time
system manuals, printouts of sensitive data or login names and
passwords may give hackers the exact keys they need to unlock the
network.
disks and tapes can be restored to provide all sorts of useful
information.
company letterhead and memo forms
Online
o One way in which hackers can obtain online passwords is through an on-line
form: they can send out some sort of sweepstakes information and ask the user
to put in a name (including e-mail address – that way, she might even get that
person’s corporate account password as well) and password.
o E-mail can also be used for more direct means of gaining access to a system.
For instance, mail attachments sent from someone of authenticity can carry
viruses, worms and Trojan horses
Persuasion
o This a technique where the hackers themselves teach social engineering from a
psychological point-of-view, emphasizing how to create the perfect
psychological environment for the attack.
o Basic methods of persuasion include: impersonation, ingratiation, conformity,
diffusion of responsibility, and plain old friendliness.Regardless of the method
used, the main objective is to convince the person disclosing the information
that the social engineer is in fact a person that they can trust with that sensitive
information. The other important key is to never ask for too much information
33
at a time, but to ask for a little from each person in order to maintain the
appearance of a comfortable relationship
Impersonation generally means creating some sort of character and
playing out the role.Some common roles that may be played in
impersonation attacks include: a repairman, IT support, a manager, a
trusted third party or a fellow employee
Conformity is a group-based behavior, but can be used occasionally in
the individual setting by convincing the user that everyone else has
been giving the hacker the same information requested. When hackers
attack in such a way as to diffuse the responsibility of the employee
giving the password away, that alleviates the stress on the employee.
Reverse Social Engineering
o This is when the hacker creates a persona that appears to be in a position of
authority so that employees will ask him for information, rather than the other
way around. If researched, planned and executed well, reverse social
engineering attacks may offer the hacker an even better chance of obtaining
valuable data from the employees; however, this requires a great deal of
preparation, research, and pre-hacking to pull off.
Countermeasures
Having proper security policies in place which addresses both physical and
psychological aspects of the attack
Providing proper training to employees, helpdesk personnel
34