Cyber Security
Cyber Security
Jocelyn O. Padallan
ARCLER
P r e s s
www.arclerpress.com
Cyber Security
Jocelyn O. Padallan
Arcler Press
2010 Winston Park Drive,
2nd Floor
Oakville, ON L6H 5R7
Canada
www.arclerpress.com
Tel: 001-289-291-7705
001-905-616-2116
Fax: 001-289-291-7601
Email: [email protected]
This book contains information obtained from highly regarded resources. Reprinted material
sources are indicated and copyright remains with the original owners. Copyright for images and
other graphics remains with the original owners as indicated. A Wide variety of references are
listed. Reasonable efforts have been made to publish reliable data. Authors or Editors or Publish-
ers are not responsible for the accuracy of the information in the published chapters or conse-
quences of their use. The publisher assumes no responsibility for any damage or grievance to the
persons or property arising out of the use of any materials, instructions, methods or thoughts in
the book. The authors or editors and the publisher have attempted to trace the copyright holders
of all material reproduced in this publication and apologize to copyright holders if permission has
not been obtained. If any copyright holder has not been acknowledged, please write to us so we
may rectify.
Notice: Registered trademark of products or corporate names are used only for explanation and
identification without intent of infringement.
Arcler Press publishes wide variety of books and eBooks. For more information about
Arcler Press and its products, visit our website at www.arclerpress.com
ABOUT THE AUTHOR
viii
Review Questions .................................................................................. 140
Choose The Correct Option ................................................................... 140
References ............................................................................................. 143
ix
8.2. Guideline For Dependable Automation........................................... 203
8.3. Honeypot Front-End Interface ......................................................... 208
8.4. Event Monitor ................................................................................. 211
8.5. Usage Of SNMP In Scada Environments ......................................... 213
8.6. Automatic Operation Of Security Controls ...................................... 214
8.7. The Security Content Automation Protocol ...................................... 217
8.8. Summary ........................................................................................ 219
Review Questions .................................................................................. 220
Choose The Correct Option ................................................................... 220
References ............................................................................................. 223
xi
LIST OF ABBREVIATIONS
AD active directory
CALEA Communications Assistance for Law Enforcement Act
CCE common configuration enumeration
CCM configuration compliance manager
CIA confidentiality, integrity, and availability
CIS customer information system
COTS customary business off-the-rack
CPE common platform enumeration
CPU focal handling unit
CSPs cloud specialist co-ops
CVE common vulnerabilities and exposures
CVSS common vulnerability scoring system
DCS distributed control systems
DHS Department of Homeland Security
DMS distribution management system
DNSBL DNS blacklisting technique
ED Enterprise Edition
FTP File Transfer Protocol
HMI human-machine interface
ICJ International Court of Justice
ICSs industrial control systems
IP internet protocol
ITAM IT asset management
LSH locality sensitive hashing
NIAG National Information Assurance Glossary
NIST National Institute of Standards and Technology
OSSIM Open Source Security Information Management
OVAL Open Vulnerability and Assessment Language
PLC programmable logic controllers
PUK pin unlock key
RISI repository for industrial security incidents
ROI rate of profitability
RTOS frequently utilize exclusive continuous working frameworks
RTU remote terminal units
SCADA Supervisory Control and Data Acquisition
SD secure digital
SIM subscriber identity module
SMS Systems Management Server
SNMP Simple Network Management Protocol
SQL Structured Query Language
SRTP secure real-time transfer protocol
VCS Veritas cluster server
VPN Virtual Private Network
WMS work management system
XCCDF Extensible Configuration Checklist Description Format
xiv
PREFACE
Cybercrime is a field that is, unfortunately, booming across the world due to
various mischievous elements that have a criminal mindset to cause an imbalance
in the society. The cyber-attacks by such elements result in heavy losses, not
only in terms of financial terms but also in terms of information leaks that may
affect the security of a nation and privacy and integrity of an organization. In
this book, I have tried to dwell upon various aspects that concern the cyber
world, the crime related to it, and the methods that have or are being adopted to
combat the issue.
Starting with the introduction of cybercrime to the readers, the book takes them
through the various dangers regarding the problem and the importance of having
cyber security as a tool to combat the issue. The book talks to the readers about
the various vulnerabilities that exist in the cyber world which make it easy for
the attackers to make their way into the cyberspace that belongs to someone
else. Then follows the various goals and objectives that drive the topic of cyber
security.
The readers are then informed in depth about the fundamentals of cyber security,
differentiating effectively between the cyberspace, the web, and the internet.
The book also dwells upon the various qualities that an ideal cyberspace should
possess followed by the various methods that can be used to cryptograph a piece
of code.
Then, the book takes the readers through the importance of management of
cyber security and the mistakes that might be made in the digital security of an
entity. This part also focuses on the topics that management of cyber security
should comprise of and the various levels into which a cyber security model may
be divided. The readers are imparted with the knowledge on the most important
subject in the cyber security management; that is, the one that concerns risk.
After the management of cyber security, the readers are informed about the
various investigative techniques and the methods that are used to examine
cybercrime along with the various obstacles the experts tend to face during the
process. The very hot topic in the field of cyber investigation ‘digital forensics,’
is also talked about in the book.
The book also throws light on the occurrence of botnets and how they tend
to invade the systems of the users. The various methods to detect the botnets
are also listed in the corresponding part. Having studied about the botnets,
the next step that the book takes is to consider the subject of the widely used
industrial controlled systems and the way in which any harm to these systems is
catastrophic for the industries.
The readers are also informed about the subject of legality in the cyber security
framework. The international laws that concern the cyber security, the laws that
curb the cyber wars that might take place on the cyberspace around the world
and disrupt certain activities, are all very important and a brush up on these
subjects is done in the corresponding chapter. The laws regarding the defense
systems of the armed forces are also discussed in brief. The laws also prevent
various attackers from attacking the industrial control systems of various
organizations, thus ensuring them of their security and privacy, helping them
work in a good atmosphere.
Lastly, the book covers the cyber security and its effect in the automation
field. The book lays down the guidelines for dependable automation and the
importance of such automation in the industrial context. This book gives a core
in-depth knowledge about cybercrime and its security and should interest all
the enthusiasts that want to contribute to the cyber security of the digital world.
xvi
CHAPTER
1
CYBER CRIME: A MARKET OF
VULNERABILITY
LEARNING OBJECTIVES:
• Know about the dangers of cybercrime
• Get accustomed to the vulnerabilities in the cyber world
• Understand the essential goals regarding the security
and privacy of the data
• Learn the ways on how to support the development of
a digital society
KEYWORDS
• availability • security misconfiguration
• buffer overflow • selective methodology
• confidentiality • session management
• injection vulnerabilities • vulnerabilities
• integrity • worldwide dimension
• privacy goals
2 Cyber Security
1.1. INTRODUCTION
Cybercrime may be put down as a case of typical
kind of criminal flowchart that involves a cycle,
where the computer with the incorporation of
the various programs and data and the different
kinds of networks it makes use of, is capable of
both, conducting a type of attack and falling prey
to one. The advantages of cybercrime are taken
by the ones who are interested in supplying the
resources for its propagation.
The whole group of the criminals that take
law in their hands regularly for a living has started
to realize the ways they can take advantage from
the activities involving regular communication
and information exchange. They do it by using
the technology the best of its use to pass the
messages, plan the criminal activities and lastly,
know more about the kind of people they can
attack and target and the opportunities that keep
popping up from time to time (Figure 1.1).
Source: https://cdn.pixabay.com/photo/2015
/10/29/18/30/cyber-crime–1012751_960_720.jpg
4 Cyber Security
Source: https://c1.staticflickr.com/6/5595/31042771
335_75e3fcf363_b.jpg
Cyber Crime: A Market of Vulnerability 13
1.6.1. Confidentiality
Confidentiality is an essential security highlight
in IoT; however, it may not be mandatory in a
few situations where information is introduced
openly. In any case, much of the time and
situations touchy information must not be
unveiled or perused by unapproved substances.
For example, quiet information, private business
information, and additional military information
and security certifications and mystery keys,
must be avoided by unapproved elements.
1.6.2. Integrity
To give solid administrations to IoT clients,
trustworthiness is a compulsory security property
much of the time. Diverse frameworks in IoT
have different honesty prerequisites. Misfortune
or control of information may happen because
of correspondence, conceivably causing loss of
Cyber Crime: A Market of Vulnerability 19
human lives.
For example, a remote patient observing
framework will have high respectability
checking against arbitrary blunders because of
data sensitivities.
1.6.4. Availability
A client of a gadget (or the gadget itself) must be
equipped for getting to administrations whenever
at whatever point required. Distinctive equipment
and programming segments in IoT gadgets must
be hearty in order to give benefits even within
sight of pernicious elements or unfavorable
circumstances. Different frameworks have
diverse accessibility necessities.
For example, fire observing or human
services checking frameworks would almost
20 Cyber Security
1.6.5. Accountability
When creating security strategies to be utilized
in a safe system, account-capacity includes
excess and obligation of specific activities,
obligations, and arranging of the execution of
system security approaches. Responsibility
itself can’t stop assaults however is useful in
guaranteeing the other security systems are
working legitimately.
Center security issues like trustworthiness
and confidentiality might be pointless if not
exposed to accountability. Also, in the event
of a renouncement occurrence, a substance
would be followed for its activities through a
responsibility procedure that could be helpful
for checking within the story of what occurred
and who was really in charge of the episode.
1.6.6. Auditing
A security review is a methodical assessment
of the security of a gadget or administration
by estimating how well it complies with an
arrangement of set up criteria. Because of
numerous bugs and vulnerabilities in many
frameworks, security inspecting assumes a vital
job in deciding any exploitable shortcomings
that put the information in danger. In IoT, a
frameworks requirement for inspecting relies
upon the application and its esteem.
Cyber Crime: A Market of Vulnerability 21
1.6.7. Non-Renouncement
The property of non-renouncement delivers
certain proof in situations where the client or
gadget can’t deny an activity. Non-revocation
isn’t viewed as an imperative security property
for a large portion of IoT. It might be relevant
in specific settings. For example, installment
frameworks where clients or suppliers can’t
deny an installment activity (Figure 1.4).
Learning Activity:
Try getting known to at
least five cases of different
types of vulnerabilities in
the real world and how
they affected the concerned
people or organization.
1.8. SUMMARY
The problem of cybercrime is engulfing in its
own sense, and it is important to know about the
various vulnerabilities such as buffer overflow,
injection vulnerabilities and so on. This is
essential for carrying out various services such
as e-governance, e-learning, and e-trainings.
The various goals from the security and privacy
perspective may be defined as confidentiality,
integrity, availability, and so on, which drive the
subject of cyber security. In the next chapter,
the readers will be taken through the various
fundamentals of cyber security.
24 Cyber Security
REVIEW QUESTIONS
1. Explain the dangers of cybercrime.
2. Communicate the necessity of having cyber security.
3. Enumerate the various vulnerabilities of the cyber world.
4. List the various goals regarding security and privacy.
5. Explain how to build up and support the various advancements
in cyber security.
6. What are the main dimensions of dangers that have been
identified with cybercrime?
7. Elaborate on few human faults that may result in cyber-attacks.
8. What do you understand by buffer overflow?
9. What are the main privacy objectives in the cyber world?
10. In what ways a user could get its sensitive data exposed outside
the digital world?
c. Piracy
d. Accountability
4. The companies have a squeezing obligation to secure
everything except:
a. Frameworks
b. Profits
c. Privileged Rights
d. Information
5. The advantages of the cybercrimes are taken by the people
such as those who do not:
a. Instill fear in the people to disturb the stability, sell the
products, or manipulate or try to affect the process of
decision making to serve their personal goals
b. Provide resources to various terrorist and criminal
organizations or individuals for attacks across the globe,
to get the security budget of the countries increased, so
that they can have some of it as their share
c. Reap direct benefits from the excess amount of
information that goes beyond the scope of secure storage
due to spamming
d. Like spreading peace in the world
6. Once the criminals have access to the database, they can
do all except:
a. Closing administrations
b. Robbing the information
c. Leaking of organizational secrets
d. Bidding for an object
7. The faults that humans may commit in the cyber security
may be all except:
a. Inadequacy
b. Lacking administration
c. Excessive workload
d. Carelessness
26 Cyber Security
REFERENCES
1. Abomhara, M., & Koien, G., (2015). Cyber security and the internet
of things: Vulnerabilities, threats, intruders and attacks. Journal of
Cyber Security and Mobility, [online] 4(1), pp. 65–88. Available
at: https://www.researchgate.net/publication/277718176_Cyber_
Security_and_the_Internet_of_Things_Vulnerabilities_Threats_
Intruders_and_Attacks [Accessed 13 November 2018].
2. O’Shea, K., Steele, J., Hansen, J. R., Jean, B., & Ralph, T., (2007).
Cyber Crime Investigations: Bridging the Gaps Between, Security
Professionals, Law Enforcement, and Prosecutors. Syngress
Publishing Inc.
3. Senki.org. (n.d.). Cyberspace Threats and Vulnerabilities. [online]
Available at: http://www.senki.org/wp-content/uploads/2015/03/
case_for_action.pdf [Accessed 13 November 2018].
CHAPTER
2
CYBER SECURITY AND ITS
FUNDAMENTALS
LEARNING OBJECTIVES:
• Get an insight about the cyberspace
• Know about the difference between cyberspace, web,
and the net
• Dwell on the fundamentals of information assurance
• Learn about the basic kind of cryptography
KEYWORDS
• authentication • internet
• authorization • network
• confidentiality • speed
• cryptography • storage
• cyberspace • web
• fundamentals
30 Cyber Security
2.1. INTRODUCTION
Digital security is an inexorably relevant and squeezing subject of
concern for people, organizations, and governments, and one that
is difficult to disregard. Hence, it becomes important to look at the
essential factors that indicate that cyber security is both critical
and hard to accomplish. The investigation starts by looking at the
advancing digital condition, proceeds with an examination of elements
that make digital security so difficult, and finishes up with a glance at
conceivable fates.
The objective is to slice through the publicity that encompasses
cyber security and to furnish the people with an unmistakable yet
nuanced point of view of what is essential and why. It may be a
challenge when crucial ideas are regularly inadequately comprehended
and where there are solid business and political motivators to overstate
apparent threats. To comprehend what is implied by ‘cyber security’ it
is useful to start by looking at a definition of the cyberspace:
“Cyberspace is an interactive domain made up of digital networks
that are used to store, modify, and communicate information. It
includes the internet, but also the other information systems that
support our companies, infrastructure, and services.”
The cyberspace can be partitioned into a model with many layers
involved:
• Physical establishments, for example, land, and submarine
links, and satellites that serve as correspondence pathways,
alongside routers that guide data to its destination.
• Logical building blocks that include programmed software,
for example, cell phone applications, working frameworks,
or internet browsers enable physical establishments to work
and convey.
• Data that travels the cyberspace, for example, web-based
social posts, writings, monetary exchanges or video
downloads. Prior to and after the transmission, this data is
regularly put away on (and altered by) PCs and cell phones,
or open or private cloud storage devices or networks.
Cyber security and Its Fundamentals 31
Source: https://cdn.pixabay.com/photo/2016/10/21/11/10/
cyberspace–1757801_960_720.png
Cyber security and Its Fundamentals 33
2.3.1. Network
Almost 40 percent of the total populace is
associated with the internet, through various
devices, for example, PCs, laptops, tablets,
and cell phones. Likewise, there are billions of
other associated ‘things.’ For example, sensors
implanted in automobiles, processing plants,
buildings, planes, TVs, and toasters.
34 Cyber Security
2.3.2. Speed
The question that arises frequently is that what
is the reason that the cyberspace appears to
Cyber security and Its Fundamentals 35
2.3.3. Storage
More prominent network and speed are pleasant,
yet they mean little without storage. There is no
prominent use of an email, content, spreadsheet
or report in the event that it may very well
be sent and received, but cannot be stored or
recovered. The limit of the storage has verged
on coordinating Moore’s Law, for example,
generally multiplying every couple of years,
as hard drives have moved from gigabytes to
terabytes and keep on developing.
36 Cyber Security
2.4.1. Authentication
Validation is imperative to any safe framework,
as it is the way to checking the source of a
message or that an individual is whom he or
she asserts. The NIAG characterizes validation
as a “security measure intended to build up
the legitimacy of a transmission, message, or
originator, or a method for checking a person’s
approval to get particular classifications of data.
There are numerous techniques accessible
to verify a man. In every technique, the
authenticator issues a test that a man must
answer. This test ordinarily contains asking
for a snippet of data that just real clients can
Cyber security and Its Fundamentals 39
2.4.2. Authorization
While verification identifies with checking
characters, approval centers on figuring out
40 Cyber Security
2.4.3. Non-Repudiation
Envision a situation wherein Alice is purchasing
an auto from Bob and signs an agreement
expressing that she will pay $20,000 for the auto
and will take responsibility for on Thursday. If
Alice later chooses not to purchase the auto,
she may guarantee that somebody fashioned
her mark and that she isn’t in charge of the
agreement. To disprove her case, Bob could
demonstrate that a legal official open checked
Alice’s personality and stepped the report to
show this verification.
For this situation, the public accountant’s
stamp has given the agreement the property of
nonrepudiation, which the NIAG characterizes
as “confirmation the sender of information is
furnished with verification of conveyance and
the beneficiary is given evidence of the sender’s
personality, so neither can later deny having
prepared the information.”
Cyber security and Its Fundamentals 41
2.4.4. Confidentiality
The term privacy is natural to a great many
people, even those not in the security business.
The NIAG characterizes classification as
“affirmation that data isn’t unveiled to
unauthorized people, procedures, or gadgets.”
Guaranteeing that unapproved parties
don’t approach a snippet of data is an intricate
undertaking. It is least demanding to comprehend
when separated into three noteworthy advances.
To start with, the data must have protections
equipped for keeping a few clients from getting
to it.
Second, limitations must be set up to confine
access to the data to just the individuals who
42 Cyber Security
2.4.5. Integrity
In the data security domain, honesty typically
alludes to information uprightness, or
guaranteeing that put-away information is
precise and contain no unapproved changes.
The NIAG characterizes uprightness as pursues:
Nature of an IS (Information System)
mirroring the coherent rightness and unwavering
quality of the working framework; the legitimate
culmination of the equipment and programming
actualizing the insurance instruments; and the
consistency of the information structures and
event of the put away information.
Note that, in a formal security mode,
trustworthiness is deciphered more narrowly to
mean assurance against unapproved change or
destruction of information.
This central, which depends on verification,
approval, and nonrepudiation as the keys to
looking after respectability, is keeping those
without approval from adjusting information.
By bypassing a confirmation framework or
raising benefits past those regularly allowed to
them, an assailant can undermine the honesty of
information.
Programming blemishes and vulnerabilities
can prompt unplanned misfortunes in information
respectability and can open a framework to
unapproved modification. Projects regularly
firmly control when a client has perused to-
44 Cyber Security
2.4.6. Availability
Data frameworks must be open to clients for
these frameworks to give any esteem. On the
off chance that a framework is down or reacting
too gradually, it can’t give the administration it
should. The NIAG characterizes accessibility as
“opportune, dependable access to information
and data administrations for approved clients.”
Attacks on accessibility are to some degree not
quite the same as those on integrity and secrecy.
The best-known assault on accessibility is a
forswearing of administration (DoS) assault. A
DoS can come in numerous structures; however,
each frame upsets a framework in a way that
keeps real clients from getting to it. One type of
DoS is asset weariness, whereby an aggressor
Cyber security and Its Fundamentals 45
‘abcdefghijklmnopqrstuvwxyz’
‘nopqrstuvwxyzabcdefghijklm’
Utilizing this figure, the message “the
demonstration begins at midnight” would be
composed as
“gurnpgfgnegf ng zvqavtug.”
The content above, demonstrating to
translate the message, is known as the key. This
is an extremely straightforward substitution
figure known as the Caesar figure (after Julius
Caesar, who utilized it for military interchanges)
or ROT13 on the grounds that the characters in
the key are pivoted thirteen spaces to one side.
Cryptography is driven by the steady battle
between individuals who need to keep messages
mystery and the individuals who work to reveal
their implications. Substitution figures are
extremely defenseless against cryptanalysis, the
act of breaking codes.
With enough content, it is easy to start
supplanting characters in the ‘ciphertext’ with
their possible ‘cleartext’ partners. Indeed, even
without thinking about the Caesar figure, it is
anything but difficult to figure that a three-letter
word toward the start of a sentence is probably
going to be the. By supplanting all occurrences
of the letters ‘g,’ ‘u,’ and ‘r’ with ‘t,’ ‘h,’ and ‘e,’
the ‘ciphertext’ changes to
‘the nptftnetfntzvqavtht’
Next, the expert may see that the fourth word
is just two letters in length and finishes with ‘t.’
There are two likely conceivable outcomes for
this word: ‘at’ and ‘it.’ He picks ‘at’ and replaces
all events of ‘n’ in the sentence with ‘a.’
‘the able ftaetf at zvqavtht’
48 Cyber Security
2.6. SUMMARY
The cyberspace is a wide subject that involves
all the components including the web and the
internet. It is significant that the components
on which the cyberspace runs, like those of
network, speed, and storage are looked after
very closely, in order to ensure that there are no
obstacles in the working of cyberspace.
The fundamentals on which the cyber
security is dependent are authentication,
authorization, nonrepudiation, confidentiality,
integrity, and availability (CIA), wherein the
CIA remain the most sorted after fundamentals
and focused on.
Cyber security also depends a lot on the way
the messages are cryptographed. The criminals
try to break the norm of cryptography in any
50 Cyber Security
REVIEW QUESTIONS
1. Explain the meaning of cyberspace.
2. Differentiate clearly between cyberspace, web, and the
internet.
3. Enlist the various fundamentals of Cyber security.
4. Define the process of basic cryptography.
5. Dwell on the concept of Confidentiality, Integrity, and
Availability.
6. What are the three essential qualities of cyberspace?
7. Explain Moore’s Law.
8. What is nonrepudiation of data?
9. What are the main characteristics that have been outlined by
main National Information Assurance Glossary (NIAG)?
10. Define that one approach that would help in securing data.
b. Non-Technical Way
c. Industrial Way
d. both a and b
4. When was Moore’s Law formulated?
a. 1956
b. 1976
c. 1975
d. 1989
5. Network, Speed, and _______________ are the three
important qualities that are found in the four parts of
cyberspace.
a. Data
b. Storage
c. Security
d. None of the above
6. Employing more transistors onto a chip implies
_______________.
a. Security
b. Storage
c. Prominent speed
d. Strong Network
7. Which framework is dependent upon cryptographic
marks, which comprise of a process or hash of the message
produced with a mystery key.
a. Validity
b. Confirmation
c. Message Verification
d. None of the above
8. _______________ can prompt unplanned misfortunes in
information respectability and can open a framework to
unapproved modification.
a. Programming Blemishes
b. Cyber Crime
Cyber security and Its Fundamentals 53
c. Data Misuse
d. Hacking
9. _______________ work by substituting each letter in the
letter set with another when composing a message.
a Validity
b. Substitution Figure
c. Symbols
d. None of the above
10. Which alphabet is the most well-known letter in the English
dialect?
a. E
b. A
c. S
d. I
54 Cyber Security
REFERENCES
1. Clemente, D., (n.d.). Fundamentals of Cyber Security. [ebook]
Available at: http://www.vertic.org/media/assets/VI%202015/
VI%20Chapter%2010.pdf [Accessed 13 November 2018].
2. Graham, J., Howard, R., & Olson, R., (2011). Cyber Security
Essentials. Taylor and Francis Group, LLC.
3. O’Shea, K., Steele, J., Hansen, J. R., Jean, B., & Ralph, T., (2007).
Cyber Crime Investigations: Bridging the Gaps Between, Security
Professionals, Law Enforcement, and Prosecutors. Syngress
Publishing Inc.
CHAPTER
3
MANAGEMENT OF CYBER
SECURITY
LEARNING OBJECTIVES:
• Learn about the management of cyber security
• Know about the mistakes that are commonly committed
while dealing with cyber security
• Get an insight into a suggested model for an approach
to cyber security
• Understand the different levels of cyber security
• Learn the concept of risk management in cyber security
KEYWORDS
• administration • risk
• cyber security levels • risk assessment
• cyber security management • risk communication
• information assets • risk management
• management model
• mistakes
56 Cyber Security
Discussion Question
1 What are the mistakes that the company could have avoided
on their part?
2. Is there a need for a management system for cyber security?
The above vignette offers a scenario about the need for a
management model for the security in the cyber world. The vignette
focuses on various ways in which an entity can fail if they do not
employ a cyber security management model. The chapter further
elaborates on what this model may mean and the need of it in the
cyber world.
Source: https://upload.wikimedia.org/wikipedia/
commons/1/1d/Cyber security_Strategy_5_Layer_
CS5L.png
58 Cyber Security
3.5.1. Risk
Misfortune means
The likelihood of enduring mischief or
bad luck or the state
of having bad luck. misfortune. It alludes to an activity, occasion
or a characteristic event that could cause a
bothersome result, bringing about a negative
effect or outcome.
• Select a philosophy
• Summarize and impart risk
Risk assessment is a
term used to describe
the overall process or
method where you:
Identify hazards and
risk factors that have
the potential to cause
harm (hazard identifi-
cation).
3.8. ASSESSMENT
An assigned group or individual ought to
finish to guarantee that the choice moderated
the risk for each distinguished data resource
has been actualized. At least, a yearly audit
should likewise be performed to guarantee that
the controls set up are yet useful and suitable
to ensure a given data resource. A specialized
security audit would comprise of checking on
the controls incorporated with a framework or
application to guarantee regardless they execute
as structured and are in consistency with
archived security strategies and techniques.
It would likewise incorporate checking on
security patches to guarantee they have been
introduced and are operational, auditing security
guidelines, for example, get to control records
Management of Cyber Security 83
REVIEW QUESTIONS
1. Explain the management of cyber security.
2. Enlist the various mistakes of digital security.
3. Form a Cyber Security Management Model.
4. Enlist the various levels of cyber security.
5. Explain the whole process of Risk Management.
6. How do you manage cyber security through model formation?
7. In what ways false reasoning results in digital security lapse?
8. Describe the security culture that would help to achieve the
cyber security model.
9. What are the main points which fall under risk assessment to
manage risk in the cyber security world?
10. How do you characterize information in order to assess the
risk?
b. Physical
c. Network
d. Emotional
4. Segments of the cyber security management model
comprise of all except:
a. Lawful direction
b. Security culture
c. Social togetherness
d. Innovative administration
5. The three parts of risk management are all except:
a. Risk assessment
b. Risk forecasting
c. Risk mitigation
d. Assessment
6. Strategies of cyber security management involve:
a. Network
b. Firewall
c. Security Training
d. All the above
7. Risk assessment involves:
a. Classifying data
b. Identifying dangers
c. Identifying vulnerabilities
d. All the above
8. The false beliefs that usually occupy people’s minds are all
except:
a. Supposing that hiring experts will be enough
b. That every organization can be made safe from any kind
of vulnerability
c. That criminals can be in any form
d. That the best gadgets in the market are enough to fight
cyber crime
86 Cyber Security
REFERENCES
1. Cyber Security: Risk Management a Non-Technical Guide Essential
for Business Managers Office Managers Operations Managers,
(2012). [ebook] Available at: https://its.ny.gov/sites/default/
files/documents/risk-management-guide–2012.pdf [Accessed 13
November 2018].
2. Jenab, K., & Moslehpour, S., (2016). Cyber Security Management:
A Review. [online] Available at: https://www.researchgate.net/
publication/305220294_Cyber_Security_Management_A_Review
[Accessed 13 November 2018].
3. Limba, T., Plėta, T., Agafonov, K., & Damkus, M., (2017).
Cyber security management model for critical infrastructure.
Entrepreneurship and Sustainability Issues, [online] 4(4),
pp. 559–573. Available at: https://www.researchgate.net/
publication/317715298_Cyber_security_management_model_for_
critical_infrastructure [Accessed 13 November 2018].
CHAPTER
4
CYBER INVESTIGATORS AND
DIGITAL FORENSICS
LEARNING OBJECTIVES:
• Learn the art of detecting a cybercrime
• Know about the ways in which the conclusions are
drawn
• Get to understand the concept of Digital Forensics
• Dwell upon the processing of a cybercrime scene
• Know about the obstacles that are usually faced which
extracting evidences
KEYWORDS
• anonymization • pursuit & seizure
• cybercrime examination • scene processing
• digital forensics • stored communications
• encryption • stored communications
• forensic services
• jumbling
90 Cyber Security
Discussion Questions
1. How important is digital forensics for the field of cyber
security?
2. What is the scope of cyber investigations?
The above vignette offers a scenario about the forensics in the
digital world. The vignette brings out the importance of forensics in
tracing the path to the defaulters and criminals, who break cyber laws
and ethical boundaries to cause harm to others. The chapter elaborates
on the use of such forensic methods and their importance.
Source: https://cdn.pixabay.com/pho-
to/2017/05/16/23/32/spyware–2319403_960_720.
jpg
A noteworthy errand looked by the more
extensive criminal equity network is conveying
a common understanding in regards to the
fundamental specialized aptitudes, learning,
and jobs performed amid examinations and
indictments (Graycar, 2001). Numerous
digital violations are advanced and effectively
thought out, expecting police to apply industrial
aptitude and deductive thinking to disentangle
complex ‘usual methodology’ and substantiate
components of an offense (Bromby, 2006).
Data security’s accentuation on equipment Anchoring is a
and programming answers for checking cognitive bias
activity and anchoring information is entirely where an individual
depends too heav-
deficient when setting against creatively mixed
ily on an initial
assault vectors (Ghosh, 2002). Composed and piece of informa-
determined digital assaults have dodged security tion offered when
insurances inside major worldwide partnerships making decisions.
and stolen data and cash without hardly lifting
a finger (Robertson et al., 2014). Progressed
mixed assaults use vulnerabilities in settled and
92 Cyber Security
Source: https://encrypted-tbn0.gstatic.com/images?
q=tbn:ANd9GcRPDd7o8NeZbUDckM0jbwawoUN
rHmmDBA9VbK0Fx_gdY-tgGSP_
‘Content information’ isn’t characterized
in the Budapest Convention “however alludes
to the substance of the correspondence, that is,
the importance of the correspondence, or the
message or data being passed on (other than
100 Cyber Security
Source: https://upload.wikimedia.org/wikipedia/
commons/b/b4/Digital_forensics_lab.jpg
The goal of advanced legal sciences is
to pursue the institutionalized examination
process while archiving any proof that is put
away carefully which may demonstrate to the
individual in charge of the crime.
The examiners utilize different systems
and scientific applications to seek concealed
envelopes, recover erased information, decode
the information or reestablish harmed documents
and so on. An exhaustive examination can
disclose to us when any record was made,
altered, printed, spared or erased.
There are a few issues that can be looked by
advanced crime scene investigation analysts like
the documents that are encoded take additional
time, the quickly changing PC innovation,
and hostile to legal sciences apparatuses
can signify additional time and cash for the
examining association. Be that as it may, as the
crime’s recurrence rises so does its need to get
researched. Along these lines, the procedure
which should be pursued must be intensive and
Cyber Investigators and Digital Forensics 105
4.4.4. Anonymization
Email information is regularly a fundamental
source of proof for police examinations. Header Criminal ac-
data inside email strings can help police in tion is a proce-
dure by which a
recognizing the root of a correspondence and person accused
may even pinpoint to the physical area of a of committing
suspect. a crime is charged,
brought to trial and
Message substance and email connections can
judged. Main part of
likewise uncover individual about criminals and a criminal action is
co-backstabbers, including monetary exchanges the trial where
and direct proof identified with criminal action, innocence or guilt
and point by point records of correspondences of accused is
determined.
among culprits and unfortunate casualties. Cul-
prits that utilize advanced strategies for culpable
are very much aware of vulnerabilities related
with typical email transmissions.
Rather, they will utilize secure online
email administrations, remailers, and other
anonymizing strategies to convey discretely.
110 Cyber Security
4.5. SUMMARY
The investigation of cybercrime is a tedious
task and requires special kinds of skills to be
accomplished. It ranges from examining the
crime to processing the crime scene and using
digital forensics for the required assistance.
There are various obstacles that the experts
encounter in detecting a crime scene and
examining it like a distributed form of data,
different forms of communication, anonymous
messages and encryptions and that too in
jumbled form and many more. Digital forensics
helps to deal with all such kinds of obstacles and
result in smooth functioning of the system. In
the next chapter, the intrusion from the botnets
is discussed, which strengthens the argument of
the above chapter.
Cyber Investigators and Digital Forensics 113
REVIEW QUESTIONS
1. Explain how a cybercrime is examined.
2. Enlist the points on what happens in the processing of a scene
of cybercrime.
3. Dwell on the concept of digital forensics.
4. Enlist various obstacles that the investigators must face while
analyzing the evidence and detecting them.
5. Explain the process of anonymization.
6. How do deductive and inductive thinking help in building the
arrangement of occasions?
7. What do you understand by enquiry and seizure in the cyber
world?
8. Explain resourcing and liability.
9. What is data mapping?
10. What is the use of Steg Analysis?
REFERENCES
1. Brown, S. D. C., (2015). Investigating and Prosecuting Cyber Crime:
Forensic Dependencies and Barriers to Justice. [eBook] Available
at: https://www.cybercrimejournal.com/Brown2015vol9issue1.pdf
[Accessed 13 November 2018].
2. Computer Forensics, Part 1: An Introduction to Computer Forensics,
(2004). [eBook] Available at: http://www.isfs.org.hk/publications/
ComputerForensics_part1.pdf [Accessed 13 November 2018].
3. Rana, N., Khatter, K., Sansanwal, G., & Singh, S., (n.d.). Taxonomy
of Digital Forensics: Investigation Tools and Challenges. [eBook]
Available at: https://arxiv.org/ftp/arxiv/papers/1709/1709. 06529.
pdf [Accessed 13 November 2018].
CHAPTER
5
SOCIAL MEDIA, BOTNET, AND
INTRUSION DETECTION
LEARNING OBJECTIVES:
• Get an insight about the intrusion processes of botnets
• Know about the lifecycle of a bot
• Learn about the different methods of detecting and
discovering botnets
• Know the various methods in which the intrusion
contaminates the clients
• Understand the relation of botnets with social media
channels and their adverse effects
KEYWORDS
• spamming
• botnet
• twitter
• contamination
• drive-by-download
• honeypots
• social media
118 Cyber Security
Discussion Questions
1. Are the botnets all that bad?
2 What are the various ways to prevent the botnet intrusion into
cyberspace?
The above vignette offers a scenario about the vicious use of
botnets in the digital world. The vignette brings forth the various ways
in which botnets can harm the security of certain systems and breach
the privacy of certain entities. The chapter explains the various types
of botnets and the vulnerabilities they use to get into the cyberspace
and the ways in which they can be avoided.
5.1. INTRODUCTION
Today, our reliance on the web has developed a complex. So, needs
to secure our immense individual data open through web interfaces,
for example, online passwords, privileged corporate insights, web-
based keeping money records, and person to person communication
accounts like Facebook.
The presence of botnets in the web scene in the course of the most
recent decade and their regularly changing conduct has caused genuine
Social Media, Botnet, and Intrusion Detection 119
Source: https://upload.wikimedia.org/wikipedia/
commons/thumb/c/c6/Botnet.svg/2000px-Botnet.
svg.png
A portion of the noticeable noxious
assignments that can be credited to botnets
incorporates DDoS (Distributed denial of-
benefit), spam, phishing, ransom wares, and data
fraud. In a botnet DDoS assault, the botmaster
can direction every one of its bots to assault a
specific server (precedent: update.microsoft.
com) at a specific date, time, and for a span by
means of a noxious or mysterious intermediary
utilized as a venturing stone to shroud the
genuine instructing hub.
In a spam crusade, the hubs that shape the bot
organize oversee sending spam by carrying on
120 Cyber Security
Source: https://upload.wikimedia.org/wikipedia/
commons/1/1d/Intrusion_Kill_Chain_-_v2.png
5.5.1. Drive-by-Downloads
As noted in various papers (Provos et al.,
2007, 2008; Wang et al., 2006; Ikinciand et al.,
2008; Siefert et al., 2007) drive-by-downloads
have turned into a new danger that misuse
shortcomings regularly found in internet
browsers and program modules.
In this procedure, the client is tainted by a per-
nicious connection inserted in the webpage that
126 Cyber Security
REVIEW QUESTIONS
1. Explain what botnet offense is.
2. Explain the structure of botnet correspondence.
3. Enlist the ways in which the botnets can be detected.
4. Establish a relationship between the botnets and their effect on
social media channels.
5. Explain how a botnet can be investigated using its location.
6. What is bot lifecycle?
7. How many stages are there in the lifecycle of a bot? Explain.
8. Explain various stages of kill chain by the intrusion.
9. What do you understand by the term noxious connections?
10. How do you discover botnets by using honeypots?
b. Vulnerable hosts
c. Noxious Connection
d. None of the above
10. LHS, in the cyber world, stands for _______________.
a. Locality Sensitive Hashing
b. Leftover Sensitive Hashing
c. Locality Side Hashing
d. Locality Stable Hashing
Social Media, Botnet, and Intrusion Detection 143
REFERENCES
1. Burghouwt, P., Spruit, M., & Sips, H., (n.d.). Towards the Detection
of Botnet Communication through Social Media by Monitoring User
Activity. [ebook] Available at: https://pdfs.semanticscholar.org/
eb9b/ae26deca34640139e462e0eec10ad17c1c77.pdf [Accessed 13
November 2018].
2. Vuong, S., & Alam, M., (n.d.). Advanced Methods for Botnet
Intrusion Detection Systems. [ebook] Available at: https://cdn.
intechopen.com/pdfs/14357.pdf [Accessed 13 November 2018].
3. Walsh, Terrorism on the Cheap. Rollie Lal, “Terrorists and Organized
Crime Join Forces,” International Herald Tribune, May 25, 2005,
at [http://www.iht.com/articles/2005/ 05/23/opinion/edlal.php].
Barbara Porter, “Forum Links Organized Crime and Terrorism,” By
George! summer 2004 [http://www2.gwu.edu/~bygeorge/060804/
crimeterrorism.html].
CHAPTER
6
CYBER SECURITY AND
INDUSTRIALC ONTROL
SYSTEMS
LEARNING OBJECTIVES:
• Get to know the Industrial controlled systems
• Understand the problems that the ICS cyber security
face
• Dwell on the possible effects on the ICS
• Know about the industry’s response to limit the risk
• Learn about the obstructions that block the improvement
of cyber security
KEYWORDS
• risk limitation
• anchoring
• SCADA
• ICS
• information robbery
• IT systems
146 Cyber Security
Discussion Questions
1. What is the role of cyber security in the ICSs?
2. What is the path that enables the attackers to creep into the
cyberspace of the ICSs?
3. What all can be done to make the attempts of such attackers
redundant?
The above vignette offers an insight into the threats that some
industries may be susceptible to. Once a criminal manages to inject
some virus into the control systems of the industries, they may create
havoc in the concerned sector or to the related ones too. This chapter
dwells further upon the dangers posed by such attacks on the working
of ICSs.
Source: http://www.doncio.navy.mil/FileHandler.
ashx?id=4910
They frequently utilize exclusive,
continuous working frameworks (RTOS) or
148 Cyber Security
Source: https://upload.wikimedia.org/wikipedia/
commons/f/f6/Kozloduy_Nuclear_Power_Plant_-_
Control_Room_of_Units_3_and_4.jpg
Source: https://upload.wikimedia.org/wikipedia/
commons/2/23/SCADA_Systems_Layout.png
6.5. VULNERABILITIES OF
INDUSTRIAL CONTROL SYSTEMS
(ICSS)
Vulnerabilities may have different beginnings,
and it isn’t the reason for this manual for
list them. The expanding requirement for a
combination of organization information and
access to it progressively from any point on
the planet, and the cutting of advancement and
ownership expenses and arranging limitations
have encouraged the intermingling of the
industrial and administration IT fields.
Ethernet systems are currently utilized
in ICSs and even as field buses. They offer
functionalities, for example, a mutual system
framework and the likelihood of utilizing
IP layers (for instance, for remote support).
Advancement, upkeep, and remote support are
as of now altogether created on conventional
stages made from administration IT (Net
or Java stages, for instance). Frameworks
institutionalization and new functionalities
have driven vulnerabilities from the domain of
administration IT to ICSs.
The frameworks, alluded to as restrictive,
regularly ailing in security instruments,
are not insusceptible to vulnerabilities that
160 Cyber Security
6.9. SUMMARY
ICSs are an integral part of any industry and are
widely known in the forms of SCADA, PLC,
and other such ways. The whole industry is
dependent on their smooth functioning, and any
sort of illegal intrusion in these systems may
prove to be very harmful for the whole industry.
The various harms that can come out of their
non-working may involve materialistic damage,
166 Cyber Security
REVIEW QUESTIONS
1. Explain what the Industrial Control Systems are.
2. Elaboration the anchoring of ICSs and IT systems.
3. Enlist the various issues that surround the ICS cyber security.
4. Enumerate the various possible effects on ICSs.
5. Explain about the various boundaries that exist in improving
the cyber security.
6. Describe the Maroochy wastewater wireless SCADA attack.
7. What are the main challenges that are encountered in the ICS?
8. What are the impacts of attacks on ICS on the environment?
9. What are the challenges that may be encountered in fixing
cyber security?
10. How does the excessive mindfulness prove to be a barrier in
improving cyber security?
REFERENCES
1. Fernandez, I., (2013). Cyber Security for Industrial Automation
& Control Environments Protection and Prevention Strategies
in the Face of Growing Threats. [eBook] Available at: http://
www2.schneider-electric.com/documents/support/white-papers/
white-paper-cyber security-for-industrial-automation-control.pdf
[Accessed 13 November 2018].
2. Managing Cyber Security for Industrial Control Systems, (2014).
[eBook] Available at: https://www.ssi.gouv.fr/uploads/2014/01/
Managing_Cybe_for_ICS_EN.pdf [Accessed 13 November 2018].
3. Weiss, J., (2013). Industrial control system (ICS) cyber security
for water and wastewater systems. Securing Water and Wastewater
Systems, [online] pp. 87–105. Available at: https://www.researchgate.
net/publication/289881199_Industrial_Control_System_ICS_
Cyber_Security_for_Water_and_Wastewater_Systems [Accessed
13 November 2018].
CHAPTER
7
LEGAL FRAMEWORK FOR
CYBER SECURITY
LEARNING OBJECTIVES:
• Know about the various cyber attacks
• Understand how a problem related to cyber-attack got
invented
• Dwell upon the restrictions imposed by law on
Cyberwar
• Know about how to attain legit cyber security
• Have an insight about the transnational law as well as
cyber warfare
• Understand the Importance of the Law of Armed
Conflict in guarding Cyber Operations
KEYWORDS
• law enforcement
• armed conflict
• legal framework
• cyber hygiene
• legality
• cyberwar
• transparency
• international law
172 Cyber Security
Discussion Questions
1. What are the laws that restrict this kind of cyber criminality?
2. What are the legislative procedures to claim that a fraud or
crime has taken place with an individual in digital space?
The above vignette offers an insight into the threats that some anti-
social elements and criminals may pose to the financial institutions.
This calls for the implementation of strict laws and design of a suitable
legal framework which discourages the people from getting involved
in such criminal activities. This chapter discusses about the various
Legal Framework for Cyber Security 173
7.1. INTRODUCTION
Cyber security has always been acknowledged
as a peppery topic in terms of the transnational
law and thus, is very relevant to the discussions
related to the issues of security. Therefore, it
becomes quite essential for the civil society
to acquire the internet which is safe as well as
secure or encrypted.
The General of US also possesses this
belief that the US is much unprotected today in
comparison to that of the previous years with
respect of the security along with one major
cause, in accordance to his respective perception,
is the likelihood of those cyber attacks (Figure
7.1).
Source: https://slideplayer.com/slide/7976731/
174 Cyber Security
Source: https://www.open.edu/openlearn/society-
politics-law/the-use-force-international-law/con-
tent-section–1
The document belonging to the outcome of
World Summit has provided with the statement
regarding the assistance or the support from the
community at an international level for the strict
or stern compliance along with the rules being
made by Charter on the utilization of the force.
Moreover, the transnational court belonging
to the justice within the six cases has specified
essential rules related to the customary law at an
international level as well as the usual principles
which all are pertaining to the lawful retreat to
the utilization of the force.
In accordance to the sayings in the case of
Nicaragua, the forbidding or the prohibition
182 Cyber Security
Source: https://cyprus-mail.com/2018/10/12/top-
resources-websites-to-prepare-for-cyber-security-
certifications-with-practice-tests/
In usual terms, the transnational law
provides with the assistance for the regulation of
the cyberspace being an economic as well as the
184 Cyber Security
Source: https://pjp-eu.coe.int/en/web/eap-pcf/
criminal-justice-action-on-cyber-crime/-/asset_
publisher/09DmhuF7y5vF/content/assessing-law-
enforcement-and-service-provider-cooperation-in-
fighting-cybercrime?inheritRedirect=false
186 Cyber Security
7.10. SUMMARY
The legal frameworks of the various nations about
cyber security have been quite encouraging, in
the sense that they need to eradicate the problem
192 Cyber Security
REVIEW QUESTIONS
1. Explain Cyber-attacks and cyber security.
2. Explain the importance of International law on the utilization
of the force.
3. Describe a good hygiene cyber.
4. How cyber-attacks cause physical disruption.
5. Explain the concept of cyber law enforcement cooperation.
6. What was the opinion that was provided by the Cyber Mania
in the context of cyber security?
7. In what year was the problem of cyberwar discovered?
8. Describe the situation of the first cyberwar.
9. What laws restrict cyberwar?
10. What is the importance of a legal framework in armed conflict?
REFERENCES
1. Adams, M., & Reiss, M., (2018). International Law and Cyberspace:
Evolving Views. [online] Lawfare. Available at: https://www.
lawfareblog.com/international-law-and-cyberspace-evolving-
views [Accessed 2 November 2018].
2. Lang, A., Licker, M., Krishnamurthy, V., Muyl, C., Lang, A., Ahern,
S., et al., (2018). Cyber Security 2018 – The Year in Preview:
International Law and Cyber Warfare | Security, Privacy and the
Law. [online] Securityprivacyandthelaw.com. Available at: http://
www.securityprivacyandthelaw.com/2017/12/cyber security–
2018-the-year-in-preview-international-law-and-cyber-warfare/
[Accessed 2 November 2018].
3. O’Connell, M., Arimatsu, L., & Wilmshurst, E., (2012). Cyber
Security and International Law (p. 12). [ebook]. Available at:
http://www.securityprivacyandthelaw.com/2017/12/cyber security–
2018-the-year-in-preview-international-law-and-cyber-warfare/
[Accessed 2 November 2018].
4. Volkov, M., (2018). Cyber Security: The Law and Regulatory
Framework – Corruption, Crime & Compliance. [online]
Corruption, crime & compliance. Available at: https://blog.
volkovlaw.com/2018/01/cyber security-law-regulatory-framework/
[Accessed 2 November 2018].
CHAPTER
8
CYBER SECURITY AND
AUTOMATION
LEARNING OBJECTIVES:
• Understand the guidelines for dependable automation
• Know about how to create a model through business
analysis
• Learn how Honeypot Front-End Interface is used
• Get to know the purpose of Event Monitor
• Understand the usage of SNMP
• Dwell upon the protocol of security content automation
KEYWORDS
• information systems
• automation
• orchestration
• automation protocol
• security management
• data flow
• security tool
• dependability models
• SNMP
• vulnerability assessment
198 Cyber Security
8.1. INTRODUCTION
The “security automation” which is also known as security automation
solution is defined as the utilization of identical protocols and
specifications to perform precise security functions. These days, the
technologies under security automation are an essential part of the
operations of information technology within various organizations.
Most of the functions that are described in this chapter refer to
the cooperative effort among U.S. government agencies mainly
the Department of Homeland Security (DHS), the Department of
Commerce, National Institute of Standards and Technology (NIST)
and the Department of Defense (DoD), and among product vendors of
the commercial security.
A huge number of individual computer systems are maintained by
the federal government. Every day, the government also deals with
various substantial challenges of information security. The scale and
intricacy of attaining efficient risk management on the computer
systems lead the government to sponsor a great number of research
and development projects.
To recognize the importance of utilizing automation in the first
position, consider the equivalence of the industrial assembly line
development, for example by Ford Motor Company in the early
20th century. The previously used manufacturing steps were not
replaced by this assembly line. Instead, it took benefit of automation,
standardization, and consistent process.
Improved quality and increased efficiency can be attained by
using the specifications for mechanisms of automated delivery
and interchangeable parts. In the same way, by using explicit
interchangeable assessment and reporting the precisions, attaining the
requirements of security becomes more accurate, more effective and
less costly. An example of this is patch management software
The patch management software accomplishes various tasks that
Cyber Security and Automation 199
Security man-
agement is the
identification of
an organization›s
assets (including
people, buildings,
machines, systems
and information
assets), followed by
the development,
Figure 8.1: Examples of automated components.
documentation, and
implementation Following are the few conducts that common
of policies and
processes of business and security automation
procedures for
protecting these complement each other:
assets. • IT Asset Management (ITAM):
The process of automation gathers
the information about different
components of an information
system and some relatable data
such as purpose, location, and
owing organization of the asset. The
automated process provides support
to the complete understanding of what
requires to be secured. For example,
the tools of automation provide NRT
that is near-real-time information
regarding the licenses that are being
utilized or report of a new network
host.
Consecutively, the ITAM processes offer
significant information back to the management
of the security and tools of monitoring, for
example by informing monitoring tools
or assessment of which the host check for
compliance.
• Configuration Management:
Various organizations depend upon
Cyber Security and Automation 201
Source: https://link.springer.com/chap-
ter/10.1007/978–3–319–18302–2_15
The use case begins with the smart meter
which reports about a problem. The need of
business is to allocate a crew of workforce
to resolve the issue or problem. The Work
Management System (WMS) get a repair order
from the system and then dispatch the crew of
workforce to resolve the issue or problem.
Then, WMS reports back to the system and
inform the status of the repair work. The WMS
and smart meter are the technical information,
but from the integration solution aspect, they are
a kind of external systems. This model is easy
and spontaneous to hold for the non-electricity
professionals. This model does not specify the
functioning of the system internally.
Cyber Security and Automation 205
Source: https://link.springer.com/chap-
ter/10.1007/978–3–319–18302–2_16
210 Cyber Security
8.8. SUMMARY
As the world advances and looks forward to
the digital age, it becomes significant to focus
on the element of cyber security in the world
of automation. The machines need to secure
themselves against any kind of cyber attacks,
and the best way to initiate that is by laying
down certain guidelines for the manufacturing
of these machines.
There needs to be a protocol for the security
in the automation industry and periodical
monitoring of the working and functioning of
the machines. These methods help to prevent
the cyber attacks on the automated processes of
various industries, keeping them safe from the
foreign digital intrusions.
220 Cyber Security
REVIEW QUESTIONS
1. Explain the guidelines for dependable automation.
2. Explain the usage of SNMP.
3. The protocol of security content automation.
4. Define Honeypot Front-End Interface.
5. Define the components of automation.
6. What is the security automation solution?
7. What is the importance of patch management software?
8. What is vulnerability assessment?
9. How to create an essential model through business analysis?
10. What are the main security controls that can be automated?
b. APC Infrastructure
c. VMware vSphere
d. All the above
4. The module of event monitor is further sub-divided into
_______________.
a. Filter and Event Assembly
b. Event reduction and aggregation
c. Event transmission (Event Tx)
d. All the above
5. The automated components are _______________.
a. IT asset management
b. Vulnerability management
c. Security management
d. Both a & b
6. The patch management software accomplishes various
tasks that are completely related to _______________.
a. Patching
b. Management
c. Security
d. Automation
7. A form of security automation technology is
_______________.
a. Vulnerability assessment
b. Automation assessment
c. Patching
d. Security implementation
8. Which is not a step under the guideline for dependable
automation _______________.
a. Defining the use case
b. Defining and implementing the processes
c. Defining the data flows
d. None of the above
222 Cyber Security
REFERENCES
1. Lehto, M., & Neittaanmäki, P., (2015). Cyber Security: Analytics,
Technology, and Automation (pp. 215–251). [ebook] Springer.
Available at: http://file.allitebooks.com/20151011/Cyber%20
Security-%20Analytics,%20Technology%20and%20Automation.
pdf [Accessed 2 November 2018].
2. Montesino, R., & Fenz, S., (n.d.). Automation Possibilities in
Information Security Management (p. 4). [ebook]. Available at:
https://www.sba-research.org/wp-content/uploads/publications/
PID1947709.pdf [Accessed 2 November 2018].
3. Security Automation Essentials, (2018). [ebook] (p. 27). Available
at: https://resources.infosecinstitute.com/wp-content/uploads/
Security-Automation-Essentials.pdf [Accessed 2 November 2018].
INDEX