Security Threats
Security Threats
5.1 Introduction
This unit covers the competencies required to provide ICT security. They include
identification of security threats, installation of security control measures, implementation of
security measures, testing of system vulnerability and monitoring of the security system.
These are the key learning outcomes, which make up workplace function:
om
104
5.3.2.2 Information Sheet
A threat, in the context of computer security, refers to anything that has the potential to
cause serious harm to a computer system. A threat is something that may or may not happen,
but has the potential to cause serious damage. Threats can lead to attacks on computer
systems, networks and more.
The computer and network security is concerned with the integrity, protection and safe access
t.c
meaningful manner.
s
ea
For competitive advantage: Developing an effective security system for networks will give
the organization a competitive edge. In the arena of Internet financial services and e-
commerce, network security assumes prime importance. The customers would avail the
services of Internet banking only if the networks are secured.
Fraud and theft have a lot in common. Both are criminal acts, and both are forcibly taking
something from others without asking permission. Both are all about stealing and both are
bad things.
105
Identification of common threats: It is important to identify and appropriately manage
common threats to an organization.
o Employee sabotage: Employees are most familiar with their employer's computers and
applications, this include knowing what actions might cause the most damage, mischief,
or sabotage.
o The loss of supporting infrastructure includes power failures (outages, spikes, and
brownouts), loss of communications, water outages and leaks, sewer problems, lack of
transportation services, fire, flood, civil unrest, and strikes.
o The term malicious hackers, sometimes called crackers, refer to those who break into
computers without authorization. They can include both outsiders and insiders. Much of
the rise of hacker activity is often attributed to increases in connectivity in both
government and industry.
o Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other
"uninvited" software. Sometimes mistakenly associated only with personal computers,
malicious code can attack other platforms.
o Industrial espionage is the act of gathering proprietary data from private companies or
the government for the purpose of aiding another company(ies). Industrial espionage can
be perpetrated either by companies seeking to improve their competitive advantage or by
governments seeking to aid their domestic industries.
om
governments, credit bureaus, and private companies, combined with the ability of
s
ea
User responsibility
o Use computer and information systems in an ethical and legal manner.
o Agree not to duplicate or use copyrighted or proprietary software without proper
authorization.
The challenge of integration between physical and cyber security creates a number of
challenges. First, no single system exists to confirm a person's identity because each
functional security department controls its own identity database. Second, the lack
of integration increases the potential for theft.
106
Case studies - Cyber Crime around the world
It was only stopped when a 22-year-old security researcher from Devon managed to find the
kill switch, after the NHS had been down for a number of days.
which allowed them to manipulate stock prices and make enormous financial gain.
t.c
ve
yt
In late 2014, major entertainment company Sony Pictures were hit with a crippling virus.
Cyber crime group Guardians of Peace (GOP) were behind the apparent blackmail attempt,
which saw around 100 terabytes of sensitive data stolen from the company.
107
Source: https://www.nation.co.ke
Figure 61: Cyber crime in Kenya
om
5.3.2.3 Self-Assessment
t.c
ve
108
E.
xii. What are common security threats?
A. File Shredding
B. File sharing and permission
C. File corrupting
D. File integrity
xiii. What is not a good practice for user administration ?
A. Isolating a system after a compromise
B. Perform random auditing procedures
C. Granting privileges on a per host basis
D. Using telnet and FTP for remote access.
xiv. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
xvi. Conduct secondary analysis and share in group discussion regarding challenges of
data hacking on social media site.
5.3.2.5 References
s
ea
• https://www.avalan.com/blog/bid/385189/Importance-Of-Network-Security-For-
Business-Organization
• https://www.yourdictionary.com/external-threat
• https://www.coursehero.com/file/11659891/Employee-sabotage/
• http://www.differencebetween.net/miscellaneous/difference-between-fraud-and-
theft/#ixzz5qRVXtQ00
• Cyber Security, authored by John G. Voeller published by Wiley, 2014
109
5.3.3 Learning Outcome 2: Establish and install security measures
Risk is the possibility of something adverse happening. Risk management is the process of
assessing risk, taking steps to reduce risk to an acceptable level and maintaining that level of
risk. Though perhaps not always aware of it, individuals manage risks every day. Actions as
routine as buckling a car safety belt, carrying an umbrella when rain is forecast, or writing
down a list of things to do rather than trusting to memory fall into the purview of risk
management. People recognize various threats to their best interests and take precautions to
guard against them or to minimize their effects.
Risk assessment often produces an important side benefit in depth knowledge about
system and an organization as risk analyst tries to figure out how system and functions are
interrelated. Risk assessment, the process of analyzing and interpreting risk, is comprised of
three basic activities:
Risk mitigation involves the selection and implementation of security controls to reduce risk
110
to a level acceptable to management, within applicable constraints.
Assess
Risk
Risjk
Identify Management Control
Risk Risk
Process
Review
Controls
om
t.c
Source: www.123rf.com
ve
yt
Interdependencies: Risk management touches on every control it is, however, most closely
related to life cycle management and the security planning process. The requirement to
perform risk management is often discussed in organizational policy and is an issue for
organizational oversight.
Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of
documents over a network. Developed by Netscape, SSL technology creates a secure link
between a Web server and browser to ensure private and integral data transmission. SSL uses
Transport Control Protocol (TCP) for communication.
111
Cloud
IaaS
Cloud
VPN apps
MFA
Chared
On- resource
premises
s
Server
login BYOD
Source: www.centrify.com
Figure 63: Multi-factor authentication (MFA)
Malware detection focuses on detecting intrusions by monitoring the activity of systems and
ve
yt
• Strange emails
• Files wont open
• Programs acting weird
• Pop-up
Source: thelatesttechnews.com
Figure 64: Malware infection symptoms
Watch: Prevention and detection of malware: https://youtu.be/Ces7UeMQ7ic
Site monitoring is the process of testing and verifying that end-users can interact with a
website or web application as expected. Website monitoring is often used by businesses to
ensure website uptime, performance, and functionality is as expected.
Some common backup frequencies you'll see offered include continuous, once per minute,
every x minutes (e.g. every 15 minutes), hourly, daily, weekly, monthly, and manually.
Continuous backup means that the software is constantly backing up data.
112
Application security encompasses measures taken to improve the security of an application
often by finding, fixing and preventing security vulnerabilities.
5.3.3.3 Self-Assessment
i. What is meant by risk assessment of an organization’s ICT department?
ii. What is SSL?
A. Source socket layer
B. Secure socket lay
C. Socket secure layer
D. Secure socket layer
iii. What is Multi-factor authentication?
iv. What is site monitoring?
v. Evaluation of security control measures is done as per the ICT Security policy in the
lab
vi. Installation of Security control measures is done as per the ICT Security policy in
the lab.
vii. Case situation: How can you help an organization to set multi-factor authentication
when making any changes on their system administration settings?
om
access only after successfully presenting two or more pieces of evidence to support
ve
yt
credibility.
s
ea
A. Multi-factor authentication
B. Cost
C. Monitoring
5.3.3.5 References
• http://www.davidsalomon.name/CompSec/auxiliary/handbook.pdf
• https://www.keycdn.com/blog/website-monitoring-tools
• Cyber Security, authored by John G. Voeller published by Wiley 2014
113
5.3.4 Learning Outcome 3: Deploy security measures
The network security audit is a process that many managed security service providers
114
(MSSPs) offer to their customers. In this process, the MSSP investigates the customer's cyber
security policies and the assets on the network to identify any deficiencies that put the
customer at risk of a security breach.
5.3.4.3 Self-Assessment
i. What is corrective action?
ii. Define network security audit?
iii. Review the computer lab and prepare a report if it conforms to the ICT Security Act
2018.
iv. Security levels should be _________ to risks involved.
A. Equal
B. Great
C. Appoximate
v. National security of Kenya is govern by ___________ .
A. ICT Authority
B. Police
C. Network of ICT
5.3.4.5 References
ve
yt
• https://www.computerworld.com/article/2572970/10-steps-to-a-successful-security-
s
ea
policy.html
• https://www.nyu.edu/about/policies-guidelines-compliance/policies-and-guidelines/data-
and-system-security-measures.html
• Cyber Security, authored by John G. Voeller published by Wiley 2014
115
o System vulnerability test report
Computer vulnerability is a cyber security term that refers to a defect in a system that can
leave it open to attack. This vulnerability could also refer to any type of weakness present in a
computer itself, in a set of procedures, or in anything that allows information security to be
exposed to a threat.
A System test schedule includes the testing steps or tasks, the target start and end dates, and
responsibilities. It should also describe how the test will be reviewed, tracked, and approved.
Ethical penetration is a broader term that includes all hacking methods, and other related
cyber attack methods. The goal of ethical hacking is still to identify vulnerabilities and fix
om
them before criminals can exploit them, but the approach is much wider in scope than simple
t.c
testing. In other words, ethical hacking is more of an umbrella term, while penetration testing
ve
yt
5.3.5.3 Self-Assessment
i. What is ethical penetration?
ii. Define computer vulnerability.
iii. Explain level system vulnerability.
iv. Identify the vulnerability levels of a system. Prepare a case study using an example.
v. Prepare report at a worksite on the security system on their computers and network.
vi. _______ is a broader term that includes all hacking methods, and other related cyber
attack methods.
A. Vulnerability
B. Ethical penetration
C. A System test schedule
vii. When is it better to perform a vulnerability assessment versus a penetration test?
A. It is necessary to perform them together
B. When you seek a larger overview of the environment, versus a smaller view
C. Penetration tests are full of false positives and should not be used
116
D. Penetration tests are potentially damaging to devices and should not be used
viii. ___________ is a weakness that can be exploited by attackers.
A. System with virus
B. System without firewall
C. System with vulnerabilities
D. System with strong password
5.3.5.5 References
• https://www.hudsoncourses.com/ethical-hacker-vs-penetration-tester/
• https://www.atlassian.com/trust/security/security-severity-levels
• Cyber Security, authored by John G. Voeller published by Wiley 2014
o Security systems are updated or overhauled based on the security system report
yt
s
ea
Given the ubiquitous, unavoidable nature of security risks, quick response time is essential to
maintaining system security and automated, continuous security monitoring is the key to
quick threat detection and response. Monitoring criteria should be for hackers and malware,
to disgruntled or careless employees, to outdated or otherwise vulnerable devices and
operating systems, to mobile and public cloud computing, to third-party service providers.
117
o Acquisition: Provides customers a standard for specifying acquisition requirements and
identifying systems that meet those requirements.
o Security policy: The rules and procedures by which a trusted system operates.
o Discretionary access control (DAC): Owners of objects are able to assign permissions
to other subjects.
o Mandatory access control (MAC): Permissions to objects are managed centrally by an
administrator.
o Object reuse: Protects confidentiality of objects that are reassigned after initial use. For
example, a deleted file still exists on storage media; only the file allocation table (FAT)
and first character of the file have been modified. Thus residual data may be restored,
which describes the problem of data remanence. Object-reuse requirements define
procedures for actually erasing the data.
o Labels: Sensitivity labels are required in MAC-based systems.
o Assurance: Guarantees that a security policy is correctly implemented.
o System integrity: Hardware and firmware operate properly and are tested to verify
proper operation.
o Updating and overhauling of Security systems : When a company needs new data
security practices, an external viewpoint can prove invaluable. Remember, a data security
auditor has experience helping many different kinds of companies find what they need to
change, and that experience can prove invaluable in creating the right kind of overhaul
om
plan. Third party intervention provided broader view of the problem at hand for an
t.c
organization.
ve
syt
ea
5.3.6.3 Self-Assessment
i. Define monitoring criteria?
ii. Explain evaluation of system security?
iii. What is overhauling of security?
iv. _______ identifies standard security requirements that vendors must build into
systems to achieve a given trust level.
A. System integrity
B. Assurance
C. Guidance
D. Acquisition
v. _____Hardware and firmware operate properly and are tested to verify proper
operation.
A. System integrity
B. System architecture
C. Covert channel analysis
vi. ______ provides a metric for assessing comparative levels of trust between different
computer systems.
A. Guidance
118
B. Measurement
C. Security policy
D. Monitoring criteria
vii. You are a Network security administrator and your company. Your company has been
attacked by hackers, how will you identify what sort of information have been
hacked?
viii. You are an ICT manager of a hotel. The General Manager of your hotel called you
this afternoon, since he is having difficulty in accessing past customer details. The
files are randomly opening and there is gibberish. What are the possibilities that
customer data have been hack? What are your suggestion actions?
5.3.6.5 References
• https://www.dummies.com/programming/certification/evaluation-criteria-systems-
security-controls/
• https://www.infiniwiz.com/planning-a-security-overhaul-here-are-key-tips-on-how-to-
start/
• https://pdfs.semanticscholar.org/45a2/775770d870b8675fb1301919224c9bcb7361.pdf
om
119