Information Security UNIT-1 Notes
Information Security UNIT-1 Notes
UNIT-I
Syllabus:
Introduction: History, critical characteristics of information, NSTISSC security
model, Components of an information system, Securing the components,
balancing security, and access, The SDLC, The security SDLC
Need for Security: Business needs, Threats, Attacks, Secure software
development
Objective:
Outcome: Describe the steps in Security Systems development life cycle
(SecSDLC) and understand the common threats and attack to information
systems
HISTORY
Julius Caesar-Caesar Cipher c50 B.C., which was created in order to prevent
his secret messages from being, read should a message fall into the wrong hands.
The end of the 20th century and early years of the 21st century saw rapid
advancements in telecommunications, computing hardware and software, and data
encryption.
Introduction
Because this new concept covers a broader range of issues, from the protection of
data to the protection of human resources, information security is no longer the sole
responsibility of a discrete group of people in the company; rather, it is the
responsibility of every employee, and especially managers.
Organizations must realize that information security funding and planning decisions
involve more than just technical managers: Rather, the process should involve three
distinct groups of decision makers, or communities of interest:
WHAT IS SECURITY?
Understanding the technical aspects of information security requires that you know
the definitions of certain information technology terms and concepts. In general,
security is defined as “the quality or state of being secure—to be free from danger.”
Security is often achieved by means of several strategies usually undertaken
simultaneously or used in combination with one another.
CIA Triangle
The C.I.A. triangle - confidentiality, integrity, and availability - has expanded into a
more comprehensive list of critical characteristics of information. At the heart of the
bases, log files, backups, printed receipts, and so on), and by restricting access
to the places where it is stored.
➢ Giving out confidential information over the telephone is a breach of
confidentiality if the caller is not authorized to have the information, it could
result in a breach of confidentiality.
Integrity: It is the quality or state of being whole, complete, and uncorrupted. The
integrity of information is threatened when it is exposed to corruption, damage,
destruction, or other disruption of its authentic state. Corruption can occur while
information is being compiled, stored, or transmitted.
➢ Integrity means that data cannot be modified without authorization.
➢ Eg: Integrity is violated when an employee deletes important data files, when a
computer virus infects a computer, when an employee is able to modify his own
salary in a payroll database, when an unauthorized user vandalizes a website,
when someone is able to cast a very large number of votes in an online poll,
and so on.
While the NSTISSC model covers the three dimensions of information security, it
omits discussion of detailed guidelines and policies that direct the implementation of
controls.
Another weakness of using this model with too limited an approach is to view it from
a single perspective.
➢ The 3 dimensions of each axis become a 3x3x3 cube with 27 cells representing
areas that must be addressed to secure today’s Information systems.
➢ To ensure system security, each of the 27 cells must be properly addressed
during the security process.
➢ For example, the intersection between technology, Integrity & storage areas
requires a control or safeguard that addresses the need to use technology to
protect the Integrity of information while in storage.
Software
➢ The software components of IS comprises applications, operating systems, and
assorted command utilities.
➢ Software programs are the vessels that carry the lifeblood of information
through an organization. These are often created under the demanding
constraints of project management, which limit time, cost, and manpower.
Hardware
➢ Hardware is the physical technology that houses and executes the software,
stores, and carries the data, and provides interfaces for the entry and removal
of information from the system.
➢ Physical security policies deal with hardware as a physical asset and with the
protection of these physical assets from harm or theft. Applying the traditional
tools of physical security, such as locks and keys, restricts access to and
interaction with the hardware components of an information system.
➢ Securing the physical location of computers and the computers themselves is
important because a breach of physical security can result in a loss of
information. Unfortunately, most information systems are built on hardware
platforms that cannot guarantee any level of information security if
unrestricted access to the hardware is possible.
Data
➢ Data stored, processed, and transmitted through a computer system must be
protected.
➢ Data is often the most valuable asset possessed by an organization and is the
main target of intentional attacks.
➢ The raw, unorganized, discrete(separate, isolated) potentially useful facts and
figures that are later processed(manipulated) to produce information.
People
There are many roles for people in information systems. Common ones include
➢ Systems Analyst
➢ Programmer
➢ Technician
➢ Engineer
➢ Network Manager
➢ MIS ( Manager of Information Systems )
➢ Data entry operator
Procedures
➢ A procedure is a series of documented actions taken to achieve something. A
procedure is more than a single simple task. A procedure can be quite complex
and involved, such as performing a backup, shutting down a system, patching
software.
Networks
➢ When information systems are connected to each other to form Local Area
Network (LANs), and these LANs are connected to other networks such as the
Internet, new security challenges rapidly emerge Steps to provide network
security are essential, as is the implementation of alarm and intrusion systems
to make system owners aware of ongoing compromises.
Securing Components
Protecting the components from potential misuse and abuse by unauthorized users.
➢ Subject of an attack
o Computer is used as an active tool to conduct the attack.
➢ Object of an attack
o Computer itself is the entity being attacked
➢ Project is initiated by upper level managers who issue policy & procedures &
processes.
➢ Dictate the goals & expected outcomes of the project.
➢ Determine who is suitable for each of the required action.
Investigation
➢ It is the most important phase and it begins with an examination of the event
or plan that initiates the process.
➢ During this phase, the objectives, constraints, and scope of the project are
specified.
➢ At the conclusion of this phase, a feasibility analysis is performed, which
assesses the economic, technical and behavioral feasibilities of the process
and ensures that implementation is worth the organization’s time and effort.
Analysis
➢ It begins with the information gained during the investigation phase.
Logical Design
➢ In this phase, the information gained from the analysis phase is used to begin
creating a systems solution for a business problem.
➢ Based on the business need, applications are selected that are capable of
providing needed services.
➢ Based on the applications needed, data support and structures capable of
providing the needed inputs are then chosen.
➢ In this phase, analysts generate a number of alternative solutions, each with
corresponding strengths and weaknesses, and costs and benefits.
➢ At the end of this phase, another feasibility analysis is performed.
Physical design
➢ In this phase, specific technologies are selected to support the solutions
developed in the logical design.
➢ The selected components are evaluated based on a make-or-buy decision.
➢ Final design integrate various components and technologies.
Implementation
➢ In this phase, any needed software is created.
➢ Components are ordered, received and tested.
➢ Afterwards, users are trained and supporting documentation created.
➢ Once all the components are tested individually, they are installed and tested
as a system.
➢ Again a feasibility analysis is prepared, and the sponsors are then presented
with the system for a performance review and acceptance test.
The same phases used in the traditional SDLC can be adapted to support the
implementation of an information security project.
Analysis
➢ In this phase, the documents from the investigation phase are studied.
➢ The developed team conducts a preliminary analysis of existing security policies
or programs, along with that of documented current threats and associated
controls.
➢ The risk management task also begins in this phase.
Risk management is the process of identifying, assessing, and evaluating the levels
of risk facing the organization, specifically the threats to the organization’s security
and to the information stored and processed by the organization.
Logical design
➢ This phase creates and develops the blueprints for information security, and
examines and implements key policies.
➢ The team plans the incident response actions.
➢ Plans business response to disaster.
➢ Determines feasibility of continuing and outsourcing the project.
Physical design
➢ In this phase, the information security technology needed to support the
blueprint outlined in the logical design is evaluated.
➢ Alternative solutions are generated.
➢ Designs for physical security measures to support the proposed technological
solutions are created.
➢ At the end of this phase, a feasibility study should determine the readiness of
the organization for the proposed project.
➢ At this phase, all parties involved have a chance to approve the project before
implementation begins.
Implementation
➢ Similar to traditional SDLC
➢ The security solutions are acquired ( made or bought ), tested, implemented,
and tested again
➢ Personnel issues are evaluated and specific training and education programs
are conducted.
➢ Finally, the entire tested package is presented to upper management for final
approval.
➢ Data Owner
- Responsible for the security and use of a particular set of information.
- Determine the level of data classification
- Work with subordinate managers to oversee the day-to-day administration of
the data.
➢ Data Custodians
- Responsible for the storage, maintenance, and protection of the information.
- Overseeing data storage and backups
- Implementing the specific procedures and policies.
➢ Data Users (End users)
- Work with the information to perform their daily jobs supporting the mission
of the organization.
- Everyone in the organization is responsible for the security of data, so data
users are included here as individuals with an information security role.
➢ Threats
-A threat is a category of objects, persons, or other entities that pose a potential
danger to an asset. Threats are always present. Some threats manifest
themselves in accidental occurrences, while others are purposeful. For
example, all hackers represent potential danger or threat to an unprotected
information system. Severe storms are also a threat to buildings and their
contents.
➢ Threat agent
-A threat agent is the specific instance or component of a threat. For example,
you can think of all hackers in the world as a collective threat, and Kevin
Mitnick, who was convicted for hacking into phone systems, as a specific threat
agent. Likewise, a specific lightning strike, hailstorm, or tornado is a threat
agent that is part of the threat of severe storms.
➢ Vulnerability
-Weaknesses or faults in a system or protection mechanism that expose
information to attack, or damage are known as vulnerabilities. Vulnerabilities
that have been examined, documented, and published are referred to as well-
known vulnerabilities.
➢ Exposure
-The exposure of an information system is a single instance when the system
is open to damage. Vulnerabilities can cause an exposure to potential damage
or attack from a threat. Total exposure is the degree to which an organization’s
assets are at risk of attack from a threat.
At the most practical level, securing the information on your computer means:
➢ Ensuring that your information remains confidential and only those who
should access that information, can.
➢ Knowing that no one has been able to change your information, so you can
depend on its accuracy (information integrity).
➢ Making sure that your information is available when you need it (by making
back-up copies and, if appropriate, storing the back-up copies off-site).
THREATS
To protect an organization’s information, you must
1. Know yourself: (i.e.) be familiar with the information to be protected, and the
systems that store, transport, and process it.
2. Know the threats you face: To make sound decisions about information security,
management must be informed about the various threats facing the organization, its
application, data, and information systems.
In addition to the laws surrounding software piracy, two watch dog organizations
investigate allegations of software abuse.
•Another effort to combat (take action against) piracy is the online registration
process.
4. Trespass
➢ Can lead to unauthorized real or virtual actions that enable information
gatherers to enter premises or systems they have not been authorized to enter.
➢ Sound principles of authentication & authorization can help organizations
protect valuable information and systems.
➢ Hackers-> “People who use and create computer software to gain access to
information illegally”
➢ There are generally two skill levels among hackers.
➢ Expert Hackers-> Masters of several programming languages, networking
protocols, and operating systems.
➢ Unskilled Hackers
9. Virus
➢ Segments of code that performs malicious actions.
➢ Virus transmission is at the opening of Email attachment files.
➢ Macro virus-> Embedded in automatically executing macrocode common in
word processors, spreadsheets and database applications.
➢ Boot Virus-> infects the key operating files located in the computer’s boot
sector.
10. Worms
➢ A worm is a malicious program that replicates itself constantly, without
requiring another program to provide a safe environment for replication.
➢ Worms can continue replicating themselves until they completely fill available
resources, such as memory, hard drive space, and network bandwidth.
o Eg: MS-Blaster, MyDoom, Netsky, are multifaceted attack worms.
➢ Once the worm has infected a computer , it can redistribute itself to all e-mail
addresses found on the infected system.
➢ Furthermore, a worm can deposit copies of itself onto all Web servers that the
infected systems can reach, so that users who subsequently visit those sites
become infected.
Worm
➢ A program or algorithm that replicates itself over a computer network and
usually performs malicious actions.
Types of Trojans
➢ Data Sending Trojans
➢ Proxy Trojans
➢ FTP Trojans
➢ Security software disabler Trojans
➢ Denial of service attack Trojans(DOS)
Trojan Horse
➢ A destructive program that masquerade on beginning application, unlike
viruses, Trojan horse do not replicate themselves.
Blended threat
➢ Blended threats combine the characteristics of virus, worm, Trojan horses &
malicious code with server and Internet Vulnerabilities.
Antivirus Program
➢ A Utility that searches a hard disk for viruses and removes any that found.
Forces of Nature
➢ Fire: Structural fire that damages the building. Also encompasses smoke
damage from a fire or water damage from sprinkles systems.
➢ Flood: Can sometimes be mitigated with flood insurance and/or business
interruption Insurance.
➢ Earthquake: Can sometimes be mitigated with specific causality insurance
and/or business interruption insurance but is usually a separate policy.
➢ Lightning: An Abrupt, discontinuous natural electric
discharge in the atmosphere.
➢ Landslide/Mudslide: The downward sliding of a mass of earth & rocks directly
damaging all parts of the information systems.
➢ Tornado/Severe Windstorm
➢ Hurricane/typhoon
➢ Tsunami
➢ Electrostatic Discharge (ESD)
➢ Dust Contamination
Since it is not possible to avoid force of nature threats, organizations must implement
controls to limit damage.
➢ They must also prepare contingency plans for continued operations, such as
disaster recovery plans, business continuity plans, and incident response
plans, to limit losses in the face of these threats.
➢ Other utility services can affect the organizations are telephone, water,
wastewater, trash pickup, cable television, natural or propane gas, and
custodial services.
➢ The loss of these services can impair the ability of an organization to function.
➢ For an example, if the wastewater system fails, an organization might be
prevented from allowing employees into the building.
➢ This would stop normal business operations.
Power Irregularities
➢ Fluctuations due to power excesses.
➢ Power shortages &
➢ Power losses
This can pose problems for organizations that provide inadequately conditioned
power for their information systems equipment.
➢ When voltage levels spike (experience a momentary increase),or surge (
experience prolonged increase ), the extra voltage can severely damage or
destroy equipment.
➢ The more expensive uninterruptible power supply (UPS) can protect against
spikes and surges.
Technological obsolescence
➢ Outdated infrastructure can lead to unreliable and untrustworthy systems.
➢ Management must recognize that when technology becomes outdated, there is
a risk of loss of data integrity from attacks.
ATTACKS
➢ An attack is an act of or action that takes advantage of a vulnerability to
compromise a controlled system.
➢ It is accomplished by a threat agent that damages or steals an organization’s
information or physical asset.
1. Malicious code
➢ The malicious code attack includes the execution of viruses, worms, Trojan
horses, and active Web scripts with the intent to destroy or steal information.
➢ The state –of-the-art malicious code attack is the polymorphic or multivector,
worm.
➢ These attack programs use up to six known attack vectors to exploit a variety
of vulnerabilities in commonly found information system devices.
Web browsing: If the infected system has write access to any Web pages, it makes all
Web content files (.html,.asp,.cgi & others) infectious, so that users who browse to
those pages become infected.
Virus: Each infected machine infects certain common executable or script files on all
computers to which it can write with virus code that can cause infection.
Unprotected shares: Using vulnerabilities in file systems and the way many
organizations configure them, the infected machine copies the viral component to all
locations it can reach.
Mass Mail: By sending E-mail infections to addresses found in the address book, the
infected machine infects many users, whose mail -reading programs also
automatically run the program & infect other systems.
Simple Network Management Protocol (SNMP): By using the widely known and
common passwords that were employed in early versions of this protocol, the
attacking program can gain control of the device. Most vendors have closed these
vulnerabilities with software upgrades.
3. Hoaxes
4. Backdoors
➢ Using a known or previously unknown and newly discovered access
mechanism, an attacker can gain access to a system or network resource
through a back door.
➢ Sometimes these entries are left behind by system designers or maintenance
staff, and thus referred to as trap doors.
➢ A trap door is hard to detect, because very often the programmer who puts it
in place also makes the access exempt from the usual audit logging features of
the system.
5. Password Crack
➢ Attempting to reverse calculate a password is often called cracking.
➢ A password can be hashed using the same algorithm and compared to the
hashed results, If they are same, the password has been cracked.
➢ The (SAM) Security Account Manager file contains the hashed representation
of the user’s password.
6. Brute Force
➢ The application of computing & network resources to try every possible
combination of options of a password is called a Brute force attack.
➢ This is often an attempt to repeatedly guess passwords to commonly used
accounts, it is sometimes called a password attack.
7. Spoofing
➢ It is a technique used to gain unauthorized access to computers, where in the
intruder sends messages to a computer that has an IP address that indicates
that the messages are coming from a trusted host.
Figure IP spoofing
Firewall allows packet in, mistaking it for legitimate traffic
8. Dictionary
➢ This is another form of the brute force attack noted above for guessing
passwords.
➢ The dictionary attack narrows the field by selecting specific accounts to attack
and uses a list of commonly used passwords instead of random combinations.
11. Spam
➢ Spam is unsolicited commercial E-mail.
➢ It has been used to make malicious code attacks more effective.
➢ Spam is considered as a trivial nuisance rather than an attack.
➢ It is the waste of both computer and human resources it causes by the flow of
unwanted E-mail.
13. Sniffers
➢ A sniffer is a program or device that can monitor data traveling over a network.
➢ Unauthorized sniffers can be extremely dangerous to a network’s security
because they are virtually impossible to detect and can be inserted almost
anywhere.
➢ Sniffer often works on TCP/IP networks, where they are sometimes called
“packet Sniffers”.