Cryptography Module 5
Cryptography Module 5
Risk management is crucial for protecting an organization’s information assets and ensuring its long-term
competitiveness. The process involves identifying, assessing, and controlling risks that could impact
information security. This is essential in an environment where information technology (IT) is central to
business operations. Proper risk management allows organizations to balance the costs of security measures
with the benefits they bring, ensuring that their systems remain secure and operational.
2. Risk Assessment: This involves evaluating the exposure or risk level to the organization's
information assets. It assesses how vulnerable these assets are to various threats.
3. Risk Control: Implementing controls to mitigate the identified risks and reduce them to an
acceptable level. This is the final step in protecting the organization’s assets and ensuring continued
operations.
The relationship between these components is critical for a robust risk management strategy, as shown in the
figure of risk management components.
The first principle of effective risk management is to "know yourself," which means identifying and
understanding the organization's information systems. You must know what assets (data, systems, etc.) the
organization has, how they add value, and which vulnerabilities they are susceptible to. Once the assets are
identified, it's crucial to review the security controls already in place. Just having controls is not enough;
regular maintenance and updating are necessary to ensure they remain effective.
The second principle from Sun Tzu's strategy is to "know the enemy." This involves understanding the
threats that could harm the organization's information assets. These threats could range from cyberattacks to
natural disasters. Each threat should be evaluated based on its potential impact on the organization's
information and assets. Identifying and ranking these threats is crucial for prioritizing responses and
defenses.
Risk management is not just the responsibility of the IT department; it involves three key communities of
interest:
1. Information Security Team: They are the leaders in managing and addressing the risks due to their
expertise in identifying and mitigating threats.
2. Management: Responsible for allocating sufficient resources (time, money, personnel) to implement
security controls and ensure that the organization’s assets are protected.
3. Users: They interact directly with the systems and understand the value of the information assets.
Users play an important role in identifying vulnerabilities and threats.
These communities must collaborate to evaluate and apply the appropriate risk controls, determine their
cost-effectiveness, and ensure that these controls remain effective over time. Regular reviews of risk
controls and their effectiveness are vital to keeping the organization secure.
Risk Identification
Risk identification is a critical component of any risk management strategy, particularly in information
security. It requires a thorough understanding of an organization’s information assets and potential risks that
could affect these assets. Identifying these risks helps in understanding the threats facing each asset, which is
essential for prioritizing actions and developing appropriate controls.
The risk identification process involves several key steps:
1. Identify and Classify Assets: The first step is identifying all the information assets that the
organization possesses. These assets can include:
o People: Employees, contractors, and other personnel who interact with systems.
o Procedures: Business processes and workflows that govern the use and protection of assets.
o Data: Critical business and operational data that need to be protected.
o Software: Applications and systems used to process data.
o Hardware: The physical devices that support business operations.
2. Prioritize Assets: Once the assets are identified, it’s important to classify them based on their
criticality to the organization. Some assets are more valuable than others and require higher levels of
protection. This process helps in understanding which assets need immediate protection and which
ones can be managed with less stringent controls.
1. Asset Categorization
Assets are categorized as follows:
• People: Employees and non-employees. Employees are divided into trusted roles (with more
authority and accountability) and non-trusted roles. Non-employees include contractors, consultants,
and strangers.
• Procedures: Business and IT procedures, divided into standard procedures and sensitive procedures.
Sensitive procedures may be targeted by threat agents.
• Data: Includes all information in its different states—transmission, processing, and storage.
• Software: Categorized into applications, operating systems, and security components.
• Hardware: Divided into systems devices and peripherals, and those part of information security
control systems.
2. Military Classification:
The U.S. military uses a more complex classification system with five levels:
• Unclassified: Publicly available information.
• Sensitive But Unclassified (SBU): Information whose unauthorized disclosure could affect national
interests.
• Confidential: Information that could damage national security if disclosed.
• Secret: Information whose unauthorized disclosure could cause serious damage to national security.
• Top Secret: Information whose unauthorized disclosure could cause exceptionally grave damage to
national security.
3. Cost of Recovery:
o The cost of recovering from a successful attack is a crucial factor in prioritizing threats. A
threat that would cause minimal damage or that has a low cost of recovery may be less of a
priority compared to a threat that would disrupt business operations and incur high costs.
4. Cost of Prevention:
o Preventing threats requires financial and resource investment. The cost of protection against
some threats, like viruses or malicious software, is relatively low, while others, like natural
disasters, may require large investments. The cost of implementing security measures
influences the level of protection required for each identified threat
Vulnerability Identification
• Vulnerability Identification:
o Vulnerabilities are weaknesses in an organization's information assets, security procedures,
design, or controls that can be exploited to breach security.
o Vulnerabilities can come in various forms, such as flaws in software, hardware, procedures, or
human error.
• Threats and Vulnerabilities:
o The process involves identifying the threats an organization faces and mapping them to the
vulnerabilities of specific information assets.
o Vulnerabilities can be categorized based on the assets they affect. Some threats might create
multiple vulnerabilities for an asset.
• Group Brainstorming:
o The identification of vulnerabilities should ideally be done through group brainstorming sessions
with experts from different areas within the organization (e.g., networking, systems management,
information security).
• TVA Worksheet:
o The Threats-Vulnerabilities-Assets (TVA) worksheet is a tool used to visualize the relationship
between threats, vulnerabilities, and assets.
o Assets are placed along the horizontal axis, and threats are placed along the vertical axis of a
grid. Each cell in the grid represents the vulnerabilities between specific threats and assets.
• Risk Assessment Preparation:
o The TVA worksheet helps prioritize assets and threats and provides a starting point for the risk
assessment process.
o Vulnerabilities are categorized using a notation system (e.g., T1V1A1 for the first vulnerability
between the first threat and the first asset).
• Control Identification:
o During the risk assessment phase, the team evaluates not only the vulnerabilities but also existing
controls that may mitigate the risk. These controls are cataloged and categorized.
1. Identifying Assets, Threats, and Vulnerabilities: The first step involves identifying the
organization's information assets (e.g., intellectual property, networks, software) and the potential
threats and vulnerabilities they face (e.g., espionage, natural disasters, technical failures).
2. Risk Rating: Each vulnerability is assigned a risk rating or score, which helps prioritize which
vulnerabilities need the most attention. This rating is not absolute but provides a comparative
measure of risk across the organization’s assets.
3. Likelihood of Vulnerability Occurrence: Risk assessment involves evaluating the likelihood that a
specific vulnerability will be exploited. Likelihood is rated on a scale from 0.1 (low) to 1.0 (high).
Factors like industry research, external sources, and organizational data can help in determining this
likelihood.
4. Risk Determination: The overall risk is calculated by multiplying the asset value by the likelihood
of vulnerability occurrence, adjusted for current controls, with an element of uncertainty factored in.
This gives a numerical value for each vulnerability's relative risk, guiding decisions on where to
focus resources.
5. Identification of Controls: Once risks are identified, controls are put in place to mitigate these risks.
Controls can be policies (like general security policies), programs (such as training), or technologies
(like firewalls). Effective controls aim to reduce residual risks (risks that remain after initial
controls).
6. Documentation of Results: A key deliverable from the risk assessment process is the "ranked
vulnerability risk worksheet." This document lists the identified assets, their impact values,
vulnerabilities, their likelihood, and the calculated risk-rating factor, allowing the organization to
prioritize mitigation efforts.
7. Risk Control Strategies: Once risks are identified, the organization must select strategies to manage
them. The five basic strategies are:
1. Defend
The Defend strategy aims to prevent the exploitation of vulnerabilities. It is the preferred method and
includes:
• Application of Policy: Setting rules and guidelines to control risks.
• Education and Training: Raising awareness and improving skills to recognize and mitigate threats.
• Application of Technology: Using technical controls like firewalls, encryption, and intrusion
detection systems to secure assets.
The goal of defending is to eliminate exposure or counter threats. For example, McDonald’s mitigated risks
from cyber-attacks by changing egg supplier conditions to reduce exposure to animal rights activists.
2. Transfer
The Transfer strategy shifts risk to other assets or organizations. This can involve:
• Outsourcing: Hiring third-party services, such as web hosting, to transfer the risk associated with
managing certain systems.
• Purchasing Insurance: Transferring the financial burden of potential damage from a security
breach.
Example: A company outsourcing its website management to specialists rather than handling it in-house.
The risk of downtime or cyber-attacks is transferred to the service provider, who assumes responsibility.
3. Mitigate
The Mitigate strategy reduces the impact of a security breach by preparing for potential incidents through
various plans:
• Incident Response Plan (IRP): Provides steps to follow during an active security breach.
• Disaster Recovery Plan (DRP): Focuses on actions needed to recover from a major incident,
ensuring the organization can restore operations.
• Business Continuity Plan (BCP): Ensures that the business can continue operating if a disaster
affects critical systems, such as activating secondary data centers.
These plans enable rapid response to minimize damage and downtime.
4. Accept
The Accept strategy involves recognizing a vulnerability but choosing to take no action. This decision is
typically made after:
• Assessing risk levels.
• Estimating potential damage.
• Conducting a cost-benefit analysis.
For example, if the cost of securing a server exceeds the potential loss from a breach, an organization might
choose to accept the risk. However, consistently relying on acceptance can lead to negligent security
practices.
5. Terminate
The Terminate strategy seeks to eliminate activities or systems that introduce uncontrollable risks. For
example, an organization may choose not to pursue an e-commerce strategy if the risks outweigh the
benefits. This approach can significantly reduce exposure to certain vulnerabilities by discontinuing risky
activities.
Access Control
• Definition: Determines whether and how a user gains access to systems or physical areas.
• Components: Combination of policies, programs, and technologies.
• Types:
o Mandatory Access Control (MAC):
▪ Based on data classification and user clearance (e.g., Top Secret, Confidential).
▪ Uses sensitivity levels and lattice-based access control (access matrix: ACL for
objects, capabilities table for subjects).
o Nondiscretionary Access Control:
▪ Centralized control.
▪ Role-Based (RBAC): Access tied to job roles.
▪ Task-Based: Access linked to specific responsibilities.
o Discretionary Access Control (DAC):
▪ Set by resource owner/user.
▪ Example: Windows file sharing permissions.
Access Control Mechanisms What is access control, and what are the commonly used mechanisms for
implementing it?
• Identification:
o Supplicant presents an identifier (ID) to the system.
o Can include names, department codes, or generated random IDs.
• Authentication:
o Verifies identity using:
▪ Something you know: Passwords, PINs, passphrases.
▪ Something you have: ID cards, smart cards, tokens (synchronous/asynchronous).
▪ Something you are: Biometrics (fingerprint, iris, voice, etc.).
o Two-Factor Authentication (2FA): Combines two types (e.g., card + PIN).
• Authorization:
o Matches authenticated user to a set of access rights.
o Methods:
▪ Per-user authorization
▪ Group-based authorization
▪ Single Sign-On (SSO) via systems like LDAP.
• Accountability:
o Tracks user actions using logs and audits.
o Ensures actions are traceable to authenticated users.
o Supports intrusion detection, troubleshooting, and resource tracking.
1. Packet-Filtering Routers
• Located at the network boundary between internal and external networks.
• Filters incoming and outgoing packets based on rules (ACLs).
• Pros: Simple, cost-effective, reduces exposure to external attacks.
• Cons: No strong authentication or logging; ACLs can be complex and impact performance.
What is a content filter? Where is it placed in the network to gain the best result for the
Content Filters organization?
• Definition: Software tools that restrict access to specific types of online content or protocols.
• Not a firewall, but often used alongside firewalls to limit internal users' access to external
content.
• Sometimes referred to as "reverse firewalls".
Use Cases
• Block non-business sites (e.g., pornography).
• Prevent spam from entering.
• Ensure employee productivity and reduce bandwidth abuse.
Examples
• Home/Small Office Tools: NetNanny, SurfControl.
• Corporate Tools: Novell Border Manager.
Modern Solutions
• Some filters now come with auto-updating services, similar to antivirus software.
• Use keyword matching (e.g., “nude”, “sex”) to block or filter content.
VPN Types
The Virtual Private Network Consortium (VPNC) categorizes VPNs into three main types:
1. Trusted VPNs (Legacy VPNs):
Advantages
• Diverts attackers from actual systems.
• Grants time to security teams to react.
• Enables detailed monitoring and analysis.
• May catch internal threats (insiders snooping).
Disadvantages
• Legal risks (unclear laws, risk of entrapment).
• Limited widespread success or validation.
• May provoke more aggressive attacks.
• Requires high technical skill to manage.
Trap-and-Trace Systems
• Definition: Systems that lure attackers and then trace their origin.
• Components:
o Honeypot/padded cell (trap).
o Alarm and tracking software (trace).
• Purpose:
o Distract attackers while admins trace them.
o Identify insiders or external intruders.
Vulnerability Scanners What is a vulnerability scanner? Describe the types of vulnerability scanner
1. Active Scanners
o Initiate traffic to detect exposed usernames, shares, ports, services, misconfigurations.
o Examples:
▪ GFI LANguard – Free for non-commercial use.
▪ Nessus – Scans for services, OS versions, firewalls; has a destructive mode for exploit
testing.
2. Fuzzers (Blackbox Scanners)
o Feed random inputs to detect program/protocol weaknesses.
o Example: SPIKE
▪ SPIKE Proxy collects web usage patterns.
▪ Tests for SQL injection, buffer overflow, XSS, etc.
▪ SPIKE core can fuzz any TCP/IP-based protocol.
3. Exploit Frameworks (Penetration Testing Tools)
o Simulate real attacks by exploiting vulnerabilities.
o Examples:
▪ Core Impact (Paid)
▪ CANVAS (Paid)
▪ Metasploit Framework (Free) – Automates exploits with customization (e.g., adding
users, modifying data).
4. Passive Scanners
o Monitor network traffic without generating packets.
o Detect client- and server-side vulnerabilities.
o Examples:
▪ Tenable PVS
▪ Sourcefire RNA
Packet Sniffers: What kind of data and information can be found using a packet sniffer?
Packet sniffers, also known as network protocol analyzers, are tools that capture and analyze network
packets. These tools are crucial for diagnosing network issues but can also be misused for eavesdropping if
in the wrong hands. Commercial sniffers like Sniffer and open-source alternatives like Snort are available. A
widely used, free, and powerful sniffer is Wireshark, formerly Ethereal, which can inspect both live and
saved network traffic. It offers features like protocol filters and TCP session reconstruction.
Legal Usage Conditions:
To legally use a packet sniffer, administrators must:
1. Be on a network owned by their organization.
2. Have direct authorization from network owners.
Biometric Access Controls What is biometric authentication? What does the term biometric mean?
Biometric access control authenticates a user (supplicant) by recognizing unique human traits. Unlike
passwords or ID cards, biometrics rely on inherent characteristics, making them difficult to fake. These
systems compare live input (like a fingerprint) with a stored, encrypted template during login attempts.
Accuracy Metrics:
1. False Reject Rate (FRR): Type I error—valid users wrongly denied access. A nuisance, but not a
security risk.
2. False Accept Rate (FAR): Type II error—unauthorized users wrongly granted access. A critical risk.
3. Crossover Error Rate (CER): The point where FAR and FRR are equal. A lower CER indicates a
better biometric system.