10 - Information & System Security
10 - Information & System Security
ST
13.3 Goals of Network Security
13.3.1 Confidentiality
13.3.2 Integrity
O
13.3.3 Availability
13.3.4 Accountability/non-repudiation
P
13.3.5 Authentication
13.4 Type of Security Threats
-D R
13.4.1 Access Threats
13.4.2 Modification Threats
O
13.4.3 Denial of Services Attack
13.4.4 Repudiation Threats
V
AF PY
13.5 Sources of Security Threats
13.5.1 Security Threats due to System Design
13.5.2 Software Security Holes
DR O
T
13.6 Countermeasures to Ensure Security
13.6.1 Access Control
T
13.7 Cryptography
NA
13.8 Conclusion
13.9 Key Terms
13.10 Questions and Exercises
13.11 Further Reading and References Management Information
System: 181
Information and System Security
13.0 Introduction
Information has emerged as one of the most critical assets of any organization in
modern world. It is thus very important to secure information in order to ensure
NOTES
commercial viability and effectiveness of an organization – irrespective of its nature
and size. This unit begins with discussion on why it is important to secure information
and information systems. The unit continues by examining the value that can be
ST
placed on information as an organisational asset. The unit further goes on to explain
the major security threats and how they can be countered.
O
13.1 Unit objectives
P
Upon completion of this unit, you should be able to:
-D R
• Understand what information security is and how it came to mean what it
does today.
O
• Comprehend the history of computer security and how it evolved into
information security.
V
• Understand the key terms and critical concepts of information security as
AF PY
presented in the chapter.
• Outline the phases of the security systems development life cycle
• Understand the role professionals involved in information security in an
DR O
organizational structure.
C
T
13.2 Meaning of Information and System Security
T
Information Systems are now an integral part of any enterprise today. It has now
NO
become critical for the success of any enterprise that these information systems
function flawlessly and process the valuable organizational data into invaluable
information. It is this very importance attached to the information which may result
into attempts to steal, misuse, disrupt or destroy the information system and other
components attached to it. Some attacks may be planned and specifically targeted,
DO
thus very important for the organization to take every possible step to guard their
NA
processing resources that may cause financial or operational hardships to the parties
to the information system. It is very important to analyze these security threats and
device proper policies to secure the information systems and data.
Management Information
System: 182
13.2.1 Importance Information and System Security Information and System Security
Some of the reasons why organizations need to devise effective information and
system security strategies may include the following:
1. Security breaches can be very expensive in terms of business disruption and NOTES
the financial losses that may result.
Check your progress
2. Increasing volumes of sensitive information are transferred across the internet • What is a security threat?
ST
or intranets connected to it.
3. Directors of business organizations are increasingly required to provide
effective information security.
O
4. For an organization to achieve the level of security that is appropriate and at
a cost that is acceptable, it must carry out a detailed risk assessment to
P
determine the nature and extent of existing and potential threats.
Countermeasures to the perceived threats must balance the degree of security
to be achieved with their acceptability to system users and the value of the
-D R
data systems to be protected.
O
13.3 Goals of Network Security
V
Information system, in modern day context, can broadly be defined as a system of
AF PY
computing infrastructure – including hardware, software, data and resources – that
capture, store, process and present information. These information systems and the
embedded information that they contain are critical for enterprise performance and
DR O
T
main goals.
13.3.1 Confidentiality
T
Confidentiality is the property that ensures that the information or the data stored on
the enterprise’s information infrastructure or transmitted through it is available to
NO
places where it might appear (in databases, log files, backups, printed receipts, and
NA
ST
used to access it must be functioning correctly. High availability systems aim to
remain available at all times, preventing service disruptions due to power outages,
hardware failures, and system upgrades.
O
13.3.4 Accountability/non-repudiation
This refers to the provisions that guarantee that none of the parties involved in an
P
operation can deny the operation at a later date. The parties to the information
systems may use digital signatures and encryption to ensure non-repudiation and
-D R
establish accountability of the transacting parties.
13.3.5 Authentication
O
Authentication consists in confirming a user’s identity, i.e. guaranteeing for each
party that their partners are truly who they think they are by proving controlled
V
access. An access control (e.g. an encrypted password) grants access to resources
AF PY
only to authorized individuals.
The biggest problem with information and system security is that you cannot create
a full secure system. There are some things about information systems and the
C
T
computing infrastructure which change over time, sometimes very rapidly over a
very short period of time. For instance, two years ago “phishing” was largely unheard
of. Before that, wireless network security was not on the radar. Now these are
T
common, everyday security concerns. But, there are also aspects of security which
NO
more or less transcend time and remain as core fundamentals even while the rest of
the technology changes.
There are four primary categories of threats to computer networks:
• Access
• Modification
DO
• Denial of service
L
• Repudiation
NA
information. This unauthorized access may be by hacking into storage areas of the
information or may exist during the course of transmission. This can be achieved by
capturing any data while travelling across the network by using Network capture
programs that can capture data in a network (some network vendors provide these
programs) or Sniffers which are electronic devices that can intercept and capture
Management Information electronic messages.
System: 184
These attacks are directed towards the breach of confidentiality. The main threats Information and System Security
that can be grouped under this category are:
• Snooping: Snooping is looking through information files at a particular location
in the hope of finding something interesting. Network snooping is one of the
NOTES
most serious threats to corporations. As the network is a shared media, data
packets go everywhere within the network as they transmit from the origin to
the destination. Due to this shared nature of the network, data packets are
ST
vulnerable to snooping/sniffing.
• Eavesdropping: Eavesdropping is another security risk posed to information.
Because of the way some networks are built, anything that gets sent out is
O
broadcast to everyone. Under normal circumstances, only the computer that
the data was meant for will process that information. However, some computer
P
programs can capture all data being broadcast over the network. By carefully
examining the data, hackers can often reconstruct real data that was never
meant for them. Some of the most damaging things that get sniffed include
-D R
passwords and credit card information.
O
• Interception: Interception is another form of access threat to the computer
networks but unlike eavesdropping, interception is an active attack against
the information. When an attacker intercepts information, she is inserting
V
AF PY
herself in the path of the information and capturing it before it reaches its
destination. After examining the information, the attacker may allow the
information to continue to its destination or not.
DR O
T
However, the data in transit is also not safe from such attacks. Such attacks are
primarily directed against the integrity of the information. The main modification
security threats are:
T
When an insertion attack is made, information that did not previously exist is
L
Management Information
System: 185
Information and System Security 13.4.3 Denial of Services Attack
A “denial-of-service” attack is characterized by an explicit attempt by attackers to
prevent legitimate users of a service from using that service. Examples include
NOTES 1. attempts to “flood” a network, thereby preventing legitimate network traffic
2. attempts to disrupt connections between two machines, thereby preventing
access to a service
ST
3. attempts to prevent a particular individual from accessing a service
4. attempts to disrupt service to a specific system or person
Not all service outages, even those that result from malicious activity, are necessarily
O
denial-of-service attacks. Other types of attack may include a denial of service as a
component, but the denial of service may be part of a larger attack.
P
Illegitimate use of resources may also result in denial of service. For example, an
intruder may use your anonymous ftp area as a place to store illegal copies of
-D R
commercial software, consuming disk space and generating network traffic
O
Denial-of-service attacks come in a variety of forms and aim at a variety of services.
There are three basic types of attack:
1. Consumption of scarce, limited, or non-renewable resources
V
AF PY
2. Destruction or alteration of configuration information
3. Physical destruction or alteration of network components
Denial-of-service attacks can result in significant loss of time and money for many
DR O
T
with the risk.
13.4.4 Repudiation Threats
T
when actually it did not happened. This can mean that repudiation threats can come
from actual parties involved in exchange of information or by someone impersonating
an innocent user’s credentials. As such there are two main threats which can be
clubbed under repudiation threats.
DO
someone else or some other system. This attack can occur in personal
NA
ST
their sub-types, if any.
The very design that has organized different loose components into a coherent system
of computing devices for an information system can pose the threat to its security. A
lack of unambiguous system blueprint, new developments and subsequent additions
O
of components to the system as a response to changed needs or deficiencies may
render the information system open to security loopholes and resultant vulnerabilities.
P
Inconsistencies may arise due to attempts to interconnect incompatible components
which might be deemed to be useful by the designer or the users of the information
-D R
system. Such practices may leave the system to some serious security loopholes.
Problems like these become very difficult to isolate once they are implemented and
O
put to routine use.
The problem is compounded by the current tendency in favoring open-source
V
AF PY
applications which may add to the plight of the security specialists. The open source
applications, and the tendency of the system designers to make the system user-
friendly and easy to serve as many users as possible, has attracted all sorts of
people who may try to exploit the loopholes and vulnerabilities of the system design
DR O
T
Apart from the security vulnerabilities due to badly designed and maintained systems,
the software used on various computer systems hooked on to the information system
T
and those used to govern the transmission of data (protocols) can also be sources of
security threats to the information systems.
NO
designed and ill-deployed communication protocols are session attacks, packet sniffing,
L
One of the biggest threats to the computer systems from software front comes from
the operating systems and other software packages that communicate over these
networks.
13.5.3 Hostile software
FI
Hostile software programs may have several different types of functions. These
functions may cause damage or allow unauthorized access to be gained allowing the
program to be spread or information may be compromised. These are some functions
that hostile software may perform:
Management Information
• Damaging operating systems. System: 187
Information and System Security • Damaging or destroying data.
• Sniffing the network for any data or passwords.
• Installing itself or some other hostile software on computer systems for later
NOTES use.
• Acquisition of unencrypted passwords on the network.
• Forwarding compromised information to hostile parties through the firewall.
ST
• Harvesting e-mail addresses.
• Putting unsolicited advertisements on infected computer systems. These
programs are called adware and may come with other “useful” applications.
O
• Spyware - A type of program that usually comes with a useful application but
sends information to its creator about what the computer user is doing on the
P
internet. Some of these programs creators actually tell the user that the
program comes with ability to see what the user is doing on the internet,
while others do not.
-D R
You should be aware that all types of hostile programs such as viruses and trojans
O
can perform any of the above functions. There is a tendency for viruses to only
damage systems or data, and trojan programs to send compromised data to other
parties, but either type of program can perform any of the functions. This is why all
V
AF PY
unauthorized programs are a very serious matter.
Viruses:Viruses reproduce themselves by attaching themselves to other files that
the used does not realize are infected. Viruses are spread today mainly through E-
DR O
mail attachments. The attachment may be a file that is a legitimate file but the virus
may be attached as a macro program in the file. An example is a Microsoft word
C
file. These files can contain macro programs which can be run by Microsoft Word.
T
A virus may infect these files as a macro and when they get on the next user’s
computer, they can infect other files. These virus programs normally take advantage
T
directly affect executable files or Dynamic Link Library (.dll) files that the operating
systems and applications use to run. Usually the virus will spread before it will do
anything that may alert the user to its presence.
Trojan Horse Software: The name “Trojan horse” comes from the historical incident
DO
where the Greeks built a horse statue as a tool to take the city of Troy. They hid
L
soldiers inside the horse statue. The people of Troy thought that they were victorious
NA
and the gods had given them the horse as a gift, they pulled the horse inside the city.
At night the soldiers inside the horse snuck out and opened the gates of the city
letting the main Greek army into the city. Similarly, the users are lured into installing
a software using some functional bait while hiding the true malicious and hostile
FI
ST
a result of some form of human error. Some examples of the ways in which human
errors can occur include:
• Inaccurate data entry: Wrong entries or modification of data in the databases
O
used by the information system will result in wrong functioning of the
information systems. Further, proper framing of the contents of the query to
P
retrieve and process data is also important as any incorrect query might
produce error within all of the data manipulated by the query. Although
extreme, significant problems might be caused by adding or removing even a
-D R
single character to a query.
O
• Attempts to carry out tasks beyond the ability of the employee: In
smaller computer-based information systems, a common cause of accidental
damage involves users attempting to install new hardware items or software
V
AF PY
applications. In the case of software applications, existing data may be lost
when the program is installed or the program may fail to operate as expected.
• Failure to comply with procedures for the use of organisational
DR O
T
• Failure to carry out backup procedures or verify data backups: In
addition to carrying out regular backups of important business data, it is also
T
necessary to verify that any backup copies made are accurate and free from
errors.
NO
been identified, putting the proper security policies and safeguards in place becomes
L
intrusion detection systems, to provide protection for all areas of the system.
After such solutions are installed, tools can be deployed that periodically detect
security vulnerabilities in the system providing ongoing, proactive security. In addition,
professional security consultants can be engaged to help design the proper security
FI
solution for the information system or to ensure that the existing security solution is
up to date and safe. With all of the options currently available, it is possible to
implement a security infrastructure that allows sufficient protection without severely
compromising the need for quick and easy access to information.
Management Information
System: 189
Information and System Security 13.6.1 Access Control
A secure information system should allow only the legitimate users of the data and
network to access and utilize the information system resources. This will ensure
NOTES that the basic goals of creating a secure information system (confidentiality, integrity,
availability, non-repudiation and authentication) are realized.
Check your progress
• List various sources of An access control mechanism ensures, along with the pre-defined identification
security threats to
ST
information like passwords and other rules, that only those who are authorized to
information systems.
use the information system resources will be able to access and use them. Based
upon the security policy the access to the information system and its resources can
be controlled implemented using various forms of hardware and software.
O
13.6.1.1 Hardware-based Access Control Systems
P
The need for secured information systems and the rapid advances in technology has
resulted in development of many hardware based access control systems which can
be efficiently put into place to ensure system security. These access systems are
-D R
marked by their openness and flexibility to be adopted over multiple platforms.
O
Following are some of the major tools that can be categorized as hardware based
access control mechanisms.
Access terminal: Terminal access points have become very sophisticated,
V
•
AF PY
and now they not only carry out user identification but also verify access
rights, control access points, and communicate with host computers. These
activities can be done in a variety of ways including fingerprint verification
and real-time anti-break-in sensors. Network technology has made it possible
DR O
T
• Visual event monitoring: This is a combination of many technologies into
one very useful and rapidly growing form of access control using a variety of
real-time technologies including video and audio signals, aerial photographs,
T
also been developed which even removes the need to swipe these cards
through card readers.
NA
Using passwords to restrict the access to the data is one of the simplest and most
common ways to ensure that only those having the permission can access and/or
process the data. Traditionally, the authentication mechanism that has been used for NOTES
computers is the password attached to the user IDs. The identity of the individual is
Check your progress
linked via a user ID that was established by a system administrator. It is assumed
• What is access control?
that the administrator had some proof that the individual receiving the user ID was
ST
in fact the individual being identified.
Passwords alone are a single factor of authentication and thus inherently weak.
Unlike in the physical world, there is no guarantee of the physical presence of the
O
individual. That is why two-factor authentication is advocated for use with computer
systems. A two-factor authentication is generally referred to the mechanisms wherein
P
the passwords are used in combination with certain other authentication tools such
as smart cards or biometric identifications. Such a combination of authentication is
-D R
much more difficult to forge and thus provides a stronger authentication mechanism.
Passwords have a broad range of applications. Here are a few examples of systems
O
that should be secured with a password.
• Workstation
V
AF PY
• An application: e-mail, Word, Excel, etc.
• Server login
• Router (other device) login
DR O
• Web sites
• A PDA (Personal Digital Assistant)
C
T
Some strategies to create effective passwords
• Add complexity by mixing uppercase and lowercase letters and numbers.
T
• If you’re a phrase collector from movies or songs, you can take a great line and
make it into a password. You can take the phrase: “May the Force Be With You” and
use the first character from each word to create the password “MTFBWY”.
• You can use a number or sign in substitution for a word.
• Test your new password. Password Checker is a non-recording featured by the
DO
Microsoft Website that helps determine your password’s strength as you type.
L
ST
• How can you generate
“strong” passwords? information, passwords may not provide sufficient protection. In these cases, dynamic
passwords or some form of two-factor authentication should be used.
O
13.6.1.3 Firewalls: A Special Access Control Mechanism
Firewalls are a special case of network access control mechanisms that can protect
organization’s internal networks from external security threats. The firewalls derive
P
their name from the provisions made in buildings to keep accidental fires from spreading
to other parts of the building. Analogous to this, network firewalls are border security
-D R
products, meaning that they exist on the border between the organization’s internal
network and the external network and ensure that there is no damage or threat to
O
the internal network from the external one.
The computer firewalls are hardware or software, but usually a combination of
V
AF PY
both, that controls the access to a computer by means of denying all data traffic to
the network except that which is explicitly allowed. The permission for the incoming
data traffic can be allowed on the basis of the services requesting the data, the IP
address of the source or destination of the transmission, or the user requesting the
DR O
data. These firewalls can also be configured to log all traffic and can perform a
centralized security management function.
C
T
T
NO
DO
L
NA
The primary task of the firewalls is to regulate the data traffic. The firewalls may
use one or more of following methods to control traffic flowing in and out of the
network:
FI
Packet Filtering: The most common firewall method is known as packet filtering.
When a packet filter firewall receives a packet from the Internet, it checks information
held in the IP Address in the header of the packet and checks it against a table of
access control rules to determine whether or not the packet is acceptable.
Management Information
System: 192
In this case, a set of rules established by the firewall administrator serves as the Information and System Security
guest list. These rules may specify certain actions when a particular source or
destination IP address or port number is identified. For example, access to a
pornographic web site can be blocked by designating the IP address of that site as a
non-permitted connection (incoming or outgoing) with the users’ computer. When NOTES
the packet filter firewall encounters a packet from the porn site, it examines the
packet. Since IP address of the porn site is contained in the header of the packet, it
ST
meets the conditions that specifically deny such a connection and the web traffic is
not permitted to go through.
Although packet filters are fast, they are also relatively easy to circumvent. One
O
method of getting around a packet filter firewall is known as IP spoofing, in which
hackers adopt the IP address of a trusted source, thereby fooling the firewall into
thinking that the packets from the hacker are actually from a trusted source. The
P
second fundamental problem with packet filter firewalls is that they allow a direct
connection between source and destination computers. As a result, once an initial
-D R
connection has been approved by the firewall, the source computer is connected
directly to the destination computer, thereby potentially exposing the destination
O
computer and all the computers to which it is connected to attack.
Stateful Packet Inspection (SPI): A second method utilized by firewalls is known
V
AF PY
as stateful packet inspection popularly known as SPI. Stateful packet inspection is a
form of super-charged packet filtering. It examines not just the headers of the packet,
but also the contents, to determine more about the packet than just its source and
destination information. It is called a ‘stateful’ packet inspection because it examines
DR O
the contents of the packet to determine what the state of the communication is, that
is, it ensures that the stated destination computer has previously requested the current
C
T
communication. This is a way of ensuring that all communications are initiated by
the recipient computer and are taking place only with sources that are known and
trusted from previous interactions. Such an approach allows relatively unrestricted
T
transmission from within the network, and selective but flexible access from the
outside.
NO
conditions. For example, packets are allowed to pass only if associated with a valid
L
session initiated from within the network. This allows an added layer of protection
NA
servers used to act as the middlemen between the clients in organization’s internal
network and the web servers located outside the purview of the organization’s
network. They were basically used for content filtering and performance enhancement
(such as caching) purposes. But the increasing need of providing security to the
internal networks from external threats, these proxies were started to be used as Management Information
advance firewalls also. System: 193
Information and System Security These proxy firewalls run a very program on themselves that can be secured and
trusted. They act on the behalf of the inside clients and outside servers. No data can
be transmitted out of the internal network or be channeled inside the internal network
without passing through these proxy firewalls. In this kind of setup, the internal
NOTES client and the external server are never in direct communication with each other.
The proxy interacts with the external server with its external address, on the behalf
of the internal client, to send request for the data and uses its internal address, on
ST
behalf of external server, to interact with the internal client to send requested data.
For example, if the internal client has to access a HTTP resource located on an
external server, the client’s software sends a request to the proxy. The proxy then
O
makes a connection with the HTTP server and forwards the request for the resource
from the server on the behalf of the client. The HTTP server reply to the request by
forwarding a copy of the resource requested to the proxy. The proxy then forwards
P
this copy of resource to the internal client requesting the resource. In this fashion all
ongoing traffic between the internal user and the external server is being routed
-D R
through the proxy.
O
Since only the proxy is visible to the outside network, the stringent security measures
can be implemented it to protect it from external threats. Proxy servers are usually
dual-homed, that is, there are no direct connections between the internal users and
V
AF PY
the external servers and that there is no IP forwarding. This ensures that the internal
network is always veiled from direct outside access ensuring that there is no passive
fingerprinting (operating system detection by studying default settings of data
packets).
DR O
The proxy firewalls mainly consist of two variants: circuit level gateways or application
level gateways.
C
T
A circuit-level gateway is that form of firewall which blocks all incoming traffic to
any host but itself. Internally, the client machines run software to allow them to
T
establish a connection with the circuit-level gateway machine. To the outside world
it appears that all communication from your internal network is actually originating
NO
data contained in the packet headers for the Internet’s TCP session-layer protocol.
L
when session information matches an entry in the table. When the session is
completed, the gateway removes the associated entry in the table and closes the
circuit this session used. This ensures that no sessions are left idle and thus vulnerable
to security of the network.
FI
ST
forward information across the gateway, and functions as a proxy server, preventing
any direct connection between a trusted server or client and an untrusted host.
However, the proxies that an application-level gateway runs differ in two important
O
ways from the pipe proxies that a circuit-level gateway uses:
• The proxies are application specific.
P
• The proxies can filter packets at the application layer of the OSI model.
Application-specific proxies accept only packets generated by services they are
-D R
designed to copy, forward, and filter. For example, only a Telnet proxy can copy,
forward, and filter Telnet traffic. If a network relies only on an application-level
O
gateway, incoming and outgoing packets cannot access services for which there is
not a proxy. For example, if an application-level gateway ran FTP and Telnet proxies,
only packets generated by these services could pass through the firewall. All other
V
AF PY
services would be blocked.
An application-level gateway, unlike a circuit-level gateway, runs proxies that examine
and filter individual packets, rather than simply copying them and blindly forwarding
DR O
them across the gateway. Application-specific proxies check each packet that passes
through the gateway, verifying the contents of the packet up through the application
layer (which is the highest layer) of the OSI model. These proxies can filter particular
C
T
kinds of commands or information in the application protocols the proxies are designed
to copy, forward, and filter.
T
An application-level gateway is one of the most secure firewalls available, but many
users claim that the security an application-level gateway offers has a drawback—
NO
ST
resources on a computer
network? once per week.
• Keep software security patches updated - Get on computer security advisory
mailing lists and update applicable software. With some systems such as
O
Windows systems you can set up a server to automatically update systems
on your network. One way to do thin in Windows 2000 systems and above is
P
to use a systems update server (SUS) and set your Windows domain policies
to have all computers regularly updated with approved updates as they are
-D R
released by Microsoft.
• Only allow approved software to be run on your computer systems so hostile
O
trojan programs are not run. This may involve locking your users down so
they cannot install software on their computer systems.
V
• Limit services on all servers and workstations to the minimum required. Be
AF PY
sure the network administrator is aware of all operating services especially
on all servers.
• Run vulnerability scanners both inside and outside your network to find
DR O
computers with vulnerabilities so you will know which ones need patched.
The cost of this should be weighed against the security need.
C
T
13.6.2.1 Running Virus Scan Software
Virus scan software should be run on every computer within the organization. This
will detect known viruses when they attempt to infiltrate the system if the virus scan
T
software is setup correctly. However, it should be kept into consideration that virus
NO
scan software can only detect viruses that are defined in their database. This raises
at least two concerns:
• Viruses not defined in the virus scan software will not be identified and stopped
by the scanner.
DO
• In order to keep virus scan software effective, it is must that the virus database
L
• Scan all files when a scan is performed and donot allow any exclusions of
any directories such as the Recycle Bin.
• Be sure to prompt for user action when a virus is found. This way the user is
more likely to be aware of where the virus came from and they can call for
Management Information expert’s assistance if required.
System: 196
• Set the system to scan files when a file is run, copied, renamed or created. Information and System Security
• Set up e-mail scanning to scan e-mail attachments. This can also be done at
the firewall, but should be done at least either at the firewall or on all client
computers. Scanning at both locations may be a good idea, if it is feasible.
NOTES
• Scanning of the web content for hostile content either at the firewall or client
Check your progress
computer depending on your setup. It should be kept in mind that scanning • How to ensure that your
for hostile e-mail or web content on the firewall may overburden the firewall. virus scan software remain
ST
effective
All virus incidents should be logged for future reference.
13.6.2.2 Update Software Security Patches
O
There are a wide variety of reasons for which the vendors or developers of software
routinely release updates for their software. Software updates, occasionally referred
to as patches, may be to address certain performance issues or might be to improve
P
the stability of the software. Many a times these patches are meant to plug security
holes (also known as bugs) that the developer of the software have identified or are
-D R
brought to their notice. These bugs leave the software vulnerable to the attacks by
hostile software or unauthorised access. It is thus very important to keep all of your
O
software – including operating system, application software and drivers – updated
to the latest versions.
V
AF PY
Patches can be installed on the individual computers linked to the information system
or may be applied via server from where the updates can be loaded the next time
users boot or use the applications.
DR O
so hostile programs cannot gain access to the network. As earlier discussed, hostile
T
programs may be written with some useful functionality, but may perform a hidden
task that the user is not aware of (for example Trojan horses). The ways to help
T
• Is there proof that the program came from the source such as a digital
signature?
• If the source code is available for the program, the code may be checked to
be sure there is no hostile content.
DO
• A reliable third party may be able to check out the software and certify that
it is safe.
NA
• Does the author of the program attempt to hide their identity? If the author of
the program attempts to hide their identity then there may be reason for
suspicion. If the program author does not hide their identity and can be
reached, it is less likely that the program is a hostile program.
FI
• Has this program been run by other people or organizations for some period
of time with no adverse consequences?
Some of the above issues are not proof that a program is safe, but are merely
indicators. As mentioned earlier, computer security is not an exact science and it is Management Information
a matter of reducing the chance of an intrusion. Probably the best method of being System: 197
Information and System Security sure of the reliability of a program is to allow a reliable third party to check the
program.
13.7 Cryptography
NOTES
Until modern times, cryptography referred almost exclusively to encryption, the
process of converting ordinary information (plaintext) into unintelligible gibberish
ST
(i.e., ciphertext). Decryption is the reverse, moving from unintelligible ciphertext to
plaintext. A cipher (or cypher) is a pair of algorithms which creates the encryption
and the reversing decryption. The detailed operation of a cipher is controlled both by
the algorithm and, in each instance, by a key. This is a secret parameter (ideally,
O
known only to the communicants) for a specific message exchange context. Keys
are important, as ciphers without variable keys are trivially breakable and therefore
P
less than useful for most purposes. Historically, ciphers were often used directly for
encryption or decryption, without additional procedures such as authentication or
-D R
integrity checks.
Encryption is the transformation of data into some unreadable form. Its purpose is to
O
ensure privacy by keeping the information hidden from anyone for whom it is not
intended, even those who can see the encrypted data. Decryption is the reverse of
V
encryption ; it is the transformation of encrypted data back into some intelligible form.
AF PY
Encryption and decryption require the use of some secret information, usually referred
to as a key. Depending on the encryption mechanism used, the same key might be
used for both encryption and decryption, while for other mechanisms, the keys used
DR O
T
decryption. Authentication is as fundamental a part of our lives as privacy. We use
authentication though out our everyday life, when we sign our name to some document
for instance, and as we move to a world where our decisions and agreements are
T
But the field of cryptography contains even more when we include some of the
things cryptography enables us to do. With just a few basic tools it is possible to build
elaborate schemes and protocols which allow us to pay using electronic money, to
prove we know certain information without revealing the information itself, and to
DO
share a secret quantity in such a way that no fewer than three from a pool of five
L
ST
vulnerability?
• Privacy/confidentiality: Ensuring that no one can read the message except • List various mechanisms to
control software
the intended receiver. vulnerability.
O
• Integrity: Assuring the receiver that the received message has not been
altered in any way from the original.
Non-repudiation: A mechanism to prove that the sender really sent this
P
•
message.
-D R
Cryptography, then, not only protects data from theft or alteration, but can also be
used for user authentication. There are, in general, three types of cryptographic
O
schemes typically used to accomplish these goals: secret key (or symmetric)
cryptography, public-key (or asymmetric) cryptography, and hash functions, each of
which is described below. In all cases, the initial unencrypted data is referred to as
V
AF PY
plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted
into usable plaintext.
13.7.1 Types of Cryptographic Algorithms
DR O
There are several ways of classifying cryptographic algorithms. Here they will be
categorized based on the number of keys that are employed for encryption and
C
decryption, and further defined by their application and use. The three types of
T
algorithms that will be discussed here are:
• Secret Key Cryptography (SKC): Uses a single key for both encryption
T
and decryption
NO
• Public Key Cryptography (PKC): Uses one key for encryption and another
for decryption
• Hash Functions: Uses a mathematical transformation to irreversibly
“encrypt” information
DO
L
NA
FI
ST
With this form of cryptography, it is obvious that the key must be known to both the
sender and the receiver; that, in fact, is the secret. The biggest difficulty with this
approach, of course, is the distribution of the key.
O
Secret key cryptography schemes are generally categorized as being either stream
ciphers or block ciphers.
P
• Stream ciphers operate on a single bit (byte or computer word) at a time
and implement some form of feedback mechanism so that the key is constantly
-D R
changing.
O
• Block cipher is called so because the scheme encrypts one block of data at
a time using the same key on each block.
In general, the same plaintext block will always encrypt to the same ciphertext
V
AF PY
when using the same key in a block cipher whereas the same plaintext will encrypt
to different ciphertext in a stream cipher.
13.7.1.2 Public-Key Cryptography
DR O
Public-key cryptography has been said to be the most significant new development
in cryptography in the last 300-400 years. Modern public key cryptography was first
C
T
described publicly by Stanford University professor Martin Hellman and graduate
student Whitfield Diffie in 1976. Their section describes a two-key crypto system in
which two parties could engage in a secure communication over a non-secure
T
of one key does not allow someone to easily determine the other key. One key is
L
used to encrypt the plaintext and the other key is used to decrypt the ciphertext. The
important point here is that it does not matter which key is applied first, but that both
NA
keys are required for the process to work. Because a pair of keys are required, this
approach is also called asymmetric cryptography.
In PKC, one of the keys is designated the public key and may be advertised as
widely as the owner wants. The other key is designated the private key and is never
FI
revealed to another party. It is straight forward to send messages under this scheme.
Suppose A wants to send B a message. A encrypts some information using B public
key, B decrypts the ciphertext using his private key. This method could be also used
to prove who sent a message; A, for example, could encrypt some plaintext with her
Management Information private key, when B decrypts using A’s public key, he knows that A sent the message
System: 200
and A cannot deny having sent the message (non-repudiation).
13.7.1.3 Hash Functions Information and System Security
Hash functions, also called message digests and one-way encryption, are algorithms
that, in some sense, use no key. Instead, a fixed-length hash value is computed
based upon the plaintext that makes it impossible for either the contents or length of NOTES
the plaintext to be recovered. Hash algorithms are typically used to provide a digital
fingerprint of a file’s contents, often used to ensure that the file has not been altered
by an intruder or virus. Hash functions are also commonly employed by many
ST
operating systems to encrypt passwords. Hash functions, then, provide a measure
of the integrity of a file.
Hash functions are sometimes misunderstood and some sources claim that no two
O
files can have the same hash value. This is, in fact, not correct. Consider a hash
function that provides a 128-bit hash value. There are, obviously, 2128 possible hash
P
values. But there are a lot more than 2128 possible files. Therefore, there have to be
multiple files – in fact, there have to be an infinite number of files – that can have the
-D R
same 128-bit hash value.
O
13.8 Summary
The topics covered in this unit aimed at providing the sedimentary knowledge of
V
AF PY
various issues related to security of information systems and information resources.
The information systems designed for businesses must include provisions and features
to assure security of information resources and allied infrastructure. Information
security is the ongoing process of exercising due care and due diligence toprotect
DR O
T
13.9 Key Terms
T
NO
• Block cipher: Cryptographic keys that encrypt one block of data at a time
using the same key on each block.
• Confidentiality: is the property that ensures that the information or the data
FI
ST
cryptographic techniques. • Encryption: Process of converting plaintext into ciphertext.
• Firewalls: Special case of network access control mechanisms that can
protect organization’s internal networks from external security threats.
O
• Hash Functions: Cryptographic methods which use a mathematical
transformation to irreversibly (one-way) encrypt information.
P
• Hostile software: Malicious software code having potential to adversely
affect the information system and allied resources.
-D R
• Information Security Threat: any condition that may result or is having the
potential to result in a condition that might lead to loss, misuse, fraud,
O
misrepresentation, destruction, modification or denial of data and other
information processing resources that may cause financial or operational
hardships to the parties to the information system.
V
AF PY
• Integrity: Refers to verifying that the data is not modified without requisite
permissions.
• Interception: Unauthorized and active monitoring of information systems
DR O
other system.
T
• Modification threat: Any unauthorized attempt of modification of information
system resources.
T
scan and monitor the incoming and outgoing data traffic of an organization.
L
ST
so that the key is constantly changing.
• Trojan: Hostile software which disguise themselves as having certain desirable utility.
Viruses: Hostile software which attaches itself to a host program and have
O
•
potential to replicate and self-propagate.
P
-D R
O
V
AF PY
DR OC
T
T
NO
DO
L
NA
FI
Management Information
System: 203