DIS UNIT 2 PDF
DIS UNIT 2 PDF
PART A
1. Show with the help of points the 4 important functions for an
organization based on the information security.
Information security performs four important functions for an
organization:
1. Protecting the organization’s ability to function
2. Enabling the safe operation of applications running on the
organization’s IT systems
3. Protecting the data the organization collects and uses
4. Safeguarding the organization’s technology assets
3. Construct with the help of a table any 4 threats with its examples.
Threat Attack
Threat Attack
9. Express the logic behind using a license agreement window and the
use of online registration process to combat piracy
The term licensing agreement refers to a legal, written contract
between two parties wherein the property owner gives permission to
another party to use their brand, patent, or trademark.
To combat piracy is the online registration process. Individuals who
install software are often asked or even required to register their
software to obtain technical support or the use of all features. Some
believe that this process compromises personal privacy, because
people never really know exactly what information is obtained from
their computers and sent to the software manufacturer.
Basis of
Sr.No. WORMS VIRUS
Comparison
A Virus is a malicious
A Worm is a form of executable code
malware that replicates attached to another
1. Definition itself and can spread to executable file which
different computers via can be harmless or
Network. can modify or delete
data.
It is less harmful as
4. Harmful It is more harmful.
compared.
17. Interpret the following terms: Macro Virus & Boot Virus
The most common types of information system viruses are the macro
virus, which is embedded in automatically executing macro code used
by word processors, spread sheets, and database applications, and
the boot virus, which infects the key operating system files located in
a computer’s boot sector.
19. List any five attacks that is used against controlled systems.
ND 2023
Malware is the most common form of cybersecurity threat, primarily
because it comes in many forms.
These include ransomware, which is also part of the list. Other
examples are adware, spyware, trojan, and worms.
DOS DDOS
DOS DDOS
Victim PC is loaded from the packet Victim PC is loaded from the packet
of data sent from a single location. of data sent from Multiple location.
DOS Attacks are Easy to trace. DDOS Attacks are Difficult to trace.
o trade secrets
o copyrights
o trademarks
o patents
22. Express the logic behind the use of online registration process to
combat piracy ND 2023
To combat piracy is the online registration process.
Individuals who install software are often asked or even required to
register their software to obtain technical support or the use of all
features.
Some believe that this process compromises personal privacy,
because people never really know exactly what information is
obtained from their computers and sent to the software
manufacturer.
PART B
1. Discuss in detail about the need for Security, business need in information
security.
Need For Security
o Key reasons why information security is important:
o Business Needs First
o Protecting the Functionality of an Organization
o Enabling the Safe Operation of Applications
o Protecting Data that Organizations Collect and Use
o Safeguarding Technology Assets in Organizations
Types of Threats
Compromises to Intellectual Property
Deliberate Software Attacks
1. Virus
2. Worms
3. Trojan Horses
4. Back Door or Trap Door
5. Polymorphic Threats
6. Virus and Worm Hoaxes
Deviations in Quality of Service
Internet Service Issues
Communications and Other Service Provider Issues
Power Irregularities
Espionage or Trespass
Forces of Nature
1. Fire
2. Flood
3. Earthquake
4. Lightning
5. Landslide or mudslide
6. Tornado or severe windstorm
7. Hurricane or typhoon
8. Tsunami
9. Electrostatic discharge (ESD)
10. Dust contamination
Human Error or Failure
Information Extortion
The most common tool, a license agreement window that usually pops up
during the installation of new software, establishes that the user has read
and agrees to the license agreement.
Another effort to combat piracy is the online registration process.
Individuals who install software are often asked or even required to
register their software to obtain technical support or the use of all
features.
Some believe that this process compromises personal privacy, because
people never really know exactly what information is obtained from their
computers and sent to the software manufacturer.
Among the most common types of information system viruses are the
macro virus, which is embedded in automatically executing macro code
used by word processors, spread sheets, and database applications, and
the boot virus, which infects the key operating system files located in a
computer’s boot sector.
2. Worms
A worm is a malicious program that replicates itself constantly, without
requiring another program environment.
Worms can continue replicating themselves until they completely fill
available resources, such as memory, hard drive space, and network
bandwidth.
Code Red, Sircam, Nimda, and Klez are examples of a class of worms that
combines multiple modes of attack into a single package.
News-making attacks, such as MS-Blaster, MyDoom, and Netsky, are
variants of the multifaceted attack worms and viruses that exploit
weaknesses in the leading operating systems and applications.
The complex behaviour of worms can be initiated with or without the user
downloading or executing the file.
Once the worm has infected a computer, it can redistribute itself to all e-
mail addresses found on the infected system.
Furthermore, a worm can deposit copies of itself onto all Web servers that
the infected system can reach, so that users who subsequently visit those
sites become infected.
Worms also take advantage of open shares found on the network in which
an infected system is located, placing working copies of the worm code
onto the server so that users of those shares are likely to become infected.
3. Trojan Horses
Trojan horses are software programs that hide their true nature and
reveal their designed behaviour only when activated.
Figure 2.1 outlines a typical Trojan horse attack.
Around January 20, 1999, Internet e-mail users began receiving e-mail
with an attachment of a Trojan horse program named Happy99.exe.
When the e-mail attachment was opened, a brief multimedia program
displayed fireworks and the message ―Happy 1999.‖ While the fireworks
display was running, the Trojan horse program was installing itself into
the user’s system. The program continued to propagate itself by following
up every e-mail the user sent with a second e-mail to the same recipient
that contained the Happy99 Trojan horse program.
5. Polymorphic Threats
One of the biggest challenges to fighting viruses and worms has been the
emergence of polymorphic threats.
A polymorphic threat is one that over time changes the way it appears
to antivirus software programs, making it undetectable by techniques
that look for preconfigured signatures.
These viruses and worms actually evolve, changing their size and other
external file characteristics to elude detection by antivirus software
programs.
Espionage or Trespass
Espionage or trespass is a well-known and broad category of electronic
and human activities that can breach the confidentiality of information.
When an unauthorized individual gains access to the information an
organization is trying to protect, that act is categorized as espionage or
trespass.
Attackers can use many different methods to access the information
stored in an information system. Some information gathering techniques
are quite legal, for example, using a Web browser to perform market
research. These legal techniques are called, collectively, competitive
intelligence.
When information gatherers employ techniques that cross the threshold
of what is legal or ethical, they are conducting industrial espionage.
Some forms of espionage are relatively low tech.
One example, called shoulder surfing, is pictured in Figure 2.2.
In the real world, a hacker frequently spends long hours examining the
types and structures of the targeted systems and uses skill, guile, or
fraud to attempt to bypass the controls placed around information that is
the property of someone else.
There are generally two skill levels among hackers.
The first is the expert hacker, or elite hacker, who develops software
scripts and program exploits used by those in the second category, the
novice or unskilled hacker.
The expert hacker is usually a master of several programming languages,
networking protocols, and operating systems and also exhibits a mastery
of the technical environment of the chosen targeted system.
Forces of Nature
Forces of nature, can present some of the most dangerous threats,
because they usually occur with very little warning and are beyond the
control of people.
These threats, which include events such as fires, floods, earthquakes,
and lightning as well as volcanic eruptions and insect infestations, can
disrupt not only the lives of individuals but also the storage,
transmission, and use of information.
Some of the more common threats are
1. Fire:
Usually a structural fire that damages a building housing computing
equipment that comprises all or part of an information system, as well
as smoke damage and/or water damage from sprinkler systems or fire
fighters.
Information Extortion
Information extortion occurs when an attacker or trusted insider steals
information from a computer system and demands compensation for its
return or for an agreement not to disclose it.
Extortion is common in credit card number theft.
Sabotage or Vandalism
This category of threat involves the deliberate sabotage of a computer
system or business, or acts of vandalism to either destroy an asset or
damage the image of an organization.
These acts can range from petty vandalism by employees to organized
sabotage against an organization.
Vandalism to a Web site can erode consumer confidence, thus
diminishing an organization’s sales and net worth, as well as its
reputation.
Compared to Web site defacement, vandalism within a network is more
malicious in intent and less public.
A much more sinister form of hacking is cyber terrorism.
Theft
The threat of theft—the illegal taking of another’s property, which can be
physical, electronic, or intellectual—is a constant.
The value of information is diminished when it is copied without the
owner’s knowledge.
Physical theft can be controlled quite easily by means of a wide variety of
measures, from locked doors to trained security personnel and the
installation of alarm systems.
Electronic theft, however, is a more complex problem to manage and
control.
E-Theft means the transfer of the Client's or insured entity's money,
securities, or other property of value to a person, place, or account
beyond the Client's or insured entity's control as a direct result of a Data
Security Event
When someone steals a physical object, the loss is easily detected; if it
has any importance at all, its absence is noted.
When electronic information is stolen, the crime is not always readily
apparent.
If thieves are clever and cover their tracks carefully, no one may ever
know of the crime until it is far too late.
Technological Obsolescence
Antiquated or out dated infrastructure can lead to unreliable and
untrustworthy systems.
Management must recognize that when technology becomes outdated,
there is a risk of loss of data integrity from attacks.
Management’s strategic planning should always include an analysis of
the technology currently in use. Ideally, proper planning by management
should prevent technology from becoming obsolete, but when
obsolescence is manifest, management must take immediate action.
IT professionals play a large role in the identification of probable
obsolescence.
Attacks
1. Malicious Code
2. Hoaxes
3. Back Doors
4. Password Crack
5. Brute Force
6. Dictionary
7. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
8. Spoofing
9. Man-in-the-Middle
Attack
An attack is an act that takes advantage of a vulnerability to
compromise a controlled system.
It is accomplished by a threat agent that damages or steals an
organization’s information or physical asset.
A vulnerability is an identified weakness in a controlled system,
where controls are not present or are no longer effective.
Types of attacks
1. Malicious Code
The malicious code attack includes the execution of viruses,
worms, Trojan horses, and active Web scripts with the intent to
destroy or steal information.
The malicious code attack is the polymorphic, or multivector,
worm.
These attack programs use up to six known attack vectors to
exploit a variety of vulnerabilities in commonly found information
system devices.
Other forms of malware include covert software applications—bots,
spyware, and adware.
A bot (an abbreviation of robot) is ―an automated software program
that executes certain commands when it receives a specific input.
Bots are often the technology used to implement Trojan horses,
logic bombs, back doors, and spyware.‖
Spyware is ―any technology that aids in gathering information
about a person or organization without their knowledge.
Spyware is placed on a computer to secretly gather information
about the user and report it.
The various types of spyware include
(1) a Web bug, a tiny graphic on a Web site that is referenced
within the Hypertext Markup Language (HTML) content of a
Web page or e-mail to collect information about the user
viewing the HTML content;
(2) a tracking cookie, which is placed on the user’s computer to
track the user’s activity on different
So many requests are made that the target system becomes overloaded
and cannot respond to legitimate requests for service.
The system may crash or simply become unable to perform ordinary
functions.
DOS DDOS
DOS DDOS
8. Spoofing
Spoofing is a technique used to gain unauthorized access to computers,
wherein the intruder sends messages with a source IP address that has
been forged to indicate that the messages are coming from a trusted host.
To engage in IP spoofing, hackers use a variety of techniques to obtain
trusted IP addresses, and then modify the packet headers (see Figure 2-5)
to insert these forged addresses.
Newer routers and firewall arrangements can offer protection against IP
spoofing.
9. Man-in-the-Middle
In the man-in-the-middle or TCP hijacking attack, an attacker
monitors (or sniffs) packets from the network, modifies them, and inserts
them back into the network.
This type of attack uses IP spoofing to enable an attacker to impersonate
another entity on the network.
It allows the attacker to eavesdrop as well as to change, delete,
reroute, add, forge, or divert data.
A variant of TCP hijacking, involves the interception of an encryption
key exchange, which enables the hacker to act as an invisible man-in-
the-middle—that is, an eavesdropper—on encrypted communications.
10. Spam
Spam is unsolicited commercial e-mail.
While many consider spam a trivial nuisance rather than an attack, it
has been used as a means of enhancing malicious code attacks.
The most significant consequence of spam, however, is the waste of
computer and human resources.
Many organizations attempt to cope with the flood of spam by using e-
mail filtering technologies.
Other organizations simply tell the users of the mail system to delete
unwanted messages.
11. Mail Bombing
Another form of e-mail attack that is also a DoS is called a mail
bomb, in which an attacker routes large quantities of e-mail to the
target.
This can be accomplished by means of social engineering or by
exploiting various technical flaws in the Simple Mail Transport
Protocol (SMTP).
The target of the attack receives an unmanageably large volume of
unsolicited e-mail.
By sending large e-mails with forged header information, attackers
can take advantage of poorly configured e-mail systems on the
Types of Law
1. Civil law comprises a wide variety of laws that govern a nation or
state and deal with the relationships and conflicts between
organizational entities and people.
2. Criminal law addresses activities and conduct harmful to society,
and is actively enforced by the state. Law can also be categorized
as private or public.
3. Private law encompasses family law, commercial law, and labor
law, and regulates the relationship between individuals and
organizations.
4. Public law regulates the structure and administration of
government agencies and their relationships with citizens,
employees, and other governments. Public law includes criminal,
administrative, and constitutional law.
The previous law, along with many others, was further modified by the
USA PATRIOT Act of 2001, which provides law enforcement agencies
with broader latitude in order to combat terrorism-related activities.
Another key law is the Computer Security Act of 1987.
It was one of the first attempts to protect federal computer systems by
establishing minimum acceptable security practices.
The National Bureau of Standards, in cooperation with the National
Security Agency, is responsible for developing these security
standards and guidelines.
Privacy
Many organizations are collecting, swapping, and selling personal
information as a commodity, and many people are looking to
governments for protection of their privacy.
The ability to collect information, combine facts from separate
sources, and merge it all with other information has resulted in
databases of information that were previously impossible to set up.
One technology that was proposed in the past was intended to
monitor or track private communications. Known as the Clipper Chip,
it used an algorithm with a two-part key that was to be managed by
two separate government agencies, and it was reportedly designed to
protect individual communications while allowing the government to
decrypt suspect transmissions.
Privacy of Customer Information
o Some regulations in the U.S. legal code stipulate the
responsibilities of common carriers (organizations that process or
move data for hire) to protect the confidentiality of customer
information, including that of other carriers.
o The Privacy of Customer Information Section of the common
carrier regulation states that any proprietary information shall be
used explicitly for providing services, and not for any marketing
purposes, and that carriers cannot disclose this information except
when necessary to provide their services.
o The only other exception is when a customer requests the
disclosure of information, and then the disclosure is restricted to
that customer’s information only.
This law does allow for the use of aggregate information.
Aggregate information is created by combining pieces of non
private data—often collected during software updates and via
cookies—that when combined may violate privacy.
Financial Reporting
The Sarbanes-Oxley Act of 2002 is a critical piece of legislation that
affects the executive management of publicly traded corporations and
public accounting firms.
This law seeks to improve the reliability and accuracy of financial
reporting, as well as increase the accountability of corporate
governance, in publicly traded companies.
Penalties for non-compliance range from fines to jail terms.
Executives working in firms covered by this law seek assurance on the
reliability and quality of information systems from senior information
technology managers.
In turn, IT managers are likely to ask information security managers
to verify the confidentiality and integrity of those information systems
in a process known in the industry as sub-certification.
The low overall degree of tolerance for illicit system use may be a
function of the easy correspondence between the common crimes of
breaking and entering, trespassing, theft, and destruction of
property and their computer-related counterparts.
3. Misuse of Corporate Resources
The scenarios used to examine the levels of tolerance for misuse of
corporate resources each presented a different degree of non
company use of corporate assets without specifying the company’s
policy on personal use of company resources.
In general, individuals displayed a rather lenient view of personal
use of company equipment.
Only students from Singapore and Hong Kong view personal use of
company equipment as unethical.
There were several substantial differences in this category, with
students from the Netherlands revealing the most lenient views.
With the exceptions of those from Singapore and Hong Kong, it is
apparent that many people, regardless of cultural background,
believe that unless an organization explicitly forbids personal use
of its computing resources, such use is acceptable.
It is interesting to note that only participants among the two Asian
samples, Singapore and Hong Kong, reported generally intolerant
attitudes toward personal use of organizational computing
resources.
Assurance
Trust cannot be quantified precisely.
System specification, design, and implementation can provide a
basis for determining ―how much‖ to trust a system. This aspect of
trust is called assurance.
Operational Issues
Any useful policy and mechanism must balance the benefits of the
protection against the cost of designing, implementing, and using the
mechanism.
o Cost-Benefit Analysis
Like any factor in a complex system, the benefits of computer
security are weighed against their total cost (including the
additional costs incurred if the system is compromised).
If the data or resources cost less, or are of less value, than their
protection, adding security mechanisms and procedures is not
cost effective because the data or resources can be
reconstructed more cheaply than the protections themselves.
Unfortunately, this is rarely the case.
o Risk Analysis
To determine whether an asset should be protected, and to
what level, requires analysis of the potential threats against
that asset and the likelihood that they will materialize.
Human Issues
o Organizational Problems
Security provides no direct financial rewards to the user.
It limits losses, but it also requires the expenditure of resources
that could be used elsewhere.
Unless losses occur, organizations often believe they are
wasting money and effort on security.
After a loss, the value of these controls suddenly becomes
appreciated.
Furthermore, security controls often add complexity to
otherwise simple operations.
o People Problems
The heart of any security system is people.
This is particularly true in computer security, which deals
mainly with technological controls that can usually be
bypassed by human intervention.
People who might attack an organization and are not authorized
to use that organization’s systems are called outsiders and can
pose a serious threat.
Experts agree, however, that a far more dangerous threat comes
from disgruntled employees and other insiders who are
authorized to use the computers.
Figure 2.8 An access control matrix. The system has two processes and two
files. The set of rights is (read, write, execute, append, own).
Figure 2–9 shows an example access control matrix for three systems on a
local area network (LAN).
Figure 2–9 Rights on a LAN. The set of rights is fftp, mail, nfs, owng.
At the micro level, access control matrices can model programming language
accesses; in this case, the objects are the variables and the subjects are the
procedures (or modules).
The access control matrix is shown in Figure 2–10.
Verbs have a default rule, either ―closed‖ (access denied unless explicitly
granted; represented by the 0 rule) or ―open‖ (access granted unless
explicitly denied; represented by the 1 rule):
If p does not have c rights over f, this command will not copy the r rights to
q.
Own Right
The own right is a special right that enables possessors to add or delete
privileges for themselves.
Security Policies
A security policy defines “secure” for a system or a set of systems.
Security policies can be informal or highly mathematical in nature.
The Nature of Security Policies
A security policy is a statement that partitions the states of the system
into a set of authorized, or secure, states and a set of unauthorized, or
non secure, states.
A secure system is a system that starts in an authorized state and
cannot enter an unauthorized state.
Consider the finite-state machine in Figure 2.11.
Policy Languages
A policy language is a language for representing a security policy.
o High-Level Policy Languages
High-level policy languages express policy constraints on
entities using abstractions
A high-level policy language is an unambiguous expression
of policy.
Such precision requires a mathematical or programmatic
formulation of policy; common English is not precise
enough.
It provides support for several different types of policies:
authorization policies, delegation policies, information
filtering policies, obligation policies, and refrain
policies.
Confidentiality Policies
o Goals of Confidentiality Policies
A confidentiality policy, also called an information flow policy,
prevents the unauthorized disclosure of information
o The Bell-LaPadula Model
The Bell-LaPadula Model corresponds to military-style
classifications.
Informal Description
The simplest type of confidentiality classification is a set of security
clearances arranged in a linear (total) ordering (see Figure 2.12).
Let C(S) be the category set of subject S, and let C(O) be the category
set of object O.
Simple Security Condition:
S can read O if and only if S dom O and S has discretionary read
access to O.
*-Property:
S can write to O if and only if Odom S and S has discretionary write
access to O.
Low-Water-Mark Policy
Whenever a subject accesses an object, the low-water-mark policy
changes the integrity level of the subject to the lower of the subject
and the object.
Ring Policy
The ring policy ignores the issue of indirect modification and
focuses on direct modification only.
Subject affects:
a. Once a subject reads any object in a COI class, the only other objects that
the subject can read in that class are the same objects, i.e. once one object
is read, no other objects in another class can be read.
b. The minimum number of subjects needed to access each object in a class
is the number of objects in that class.
CW-*-Property
A subject S may write to an object O iff both of the following conditions hold
1. The CW-Simple security conditions permits S to read O
2. unsanitized objects O’, S can read O’ CD(O’) = CD(O)
This prevents one subject from writing sensitive information in the shared
common object from an unshared object.