Information Security
Information Security
POSTGRADUATE COURSE
M.Sc., Cyber Forensics and Information Security
FIRST YEAR
FIRST SEMESTER
INTRODUCTION TO INFORMATION
SECURITY
WELCOME
Warm Greetings.
I invite you to join the CBCS in Semester System to gain rich knowledge leisurely at
your will and wish. Choose the right courses at right times so as to erect your flag of
success. We always encourage and enlighten to excel and empower. We are the cross
bearers to make you a torch bearer to have a bright future.
DIRECTOR
(i)
M.Sc., Cyber Forensics and Information Security CORE PAPER - III
FIRST YEAR - FIRST SEMESTER INTRODUCTION TO
INFORMATION SECURITY
COURSE WRITER
EDITOR
Dr. N. Kala
Director i/c,
Centre for Cyber Forensics and Information Security
University of Madras, Chepauk,
Chennai – 600 005.
Dr. S. Thenmozhi
Associate Professor
Department of Psychology
Institute of Distance Education
University of Madras
Chepauk Chennnai - 600 005.
(ii)
M.Sc., Cyber Forensics and Information Security
FIRST YEAR
FIRST SEMESTER
Unit 3: Risk Analysis & Risk Management - Risk Analysis Process - Asset Definition -
Threat Identification - Determine Probability of Occurrence - Determine the Impact of the
Threat - Controls Recommended - Risk Mitigation - Control Types/Categories - Cost/
Benefit Analysis
Unit 4: Access Control - User Identity and Access Management - Account Authorization
- Access and Privilege Management - System and Network Access Control - Operating
Systems Access Controls - Monitoring Systems Access Controls - Intrusion Detection
System - Event Logging - Cryptography
(iii)
M.Sc., Cyber Forensics and Information Security
FIRST YEAR
FIRST SEMESTER
(v)
1
UNIT - 1
OVERVIEW OF INFORMATION SECURITY
Learning Objectives
After reading this lesson you will be able to understand the following
· Information security
· Threats
· Vulnerability
· Risk
· Security Definitions
Structure
1.1. Introduction
1.2. Information
1.2.4.1. Threats
1.2.4.2. Vulnerability
1.2.4.3. Risk
1.2.4.4. Exposure
1.2.4.5. Control
2
1.1. Introduction
In this lesson we are going to discuss about information security and more so on the
information security governance – so much so the program, and the components of information
security as such.The objective of information security is to protect the information.
1.2. Information
Data can be defined as something that represents a fact. This can be in many forms such
as text, numbers, graphics, sound, videos and the like. Some view information as processed
data. In fact information is data in context. Any communication or representation of knowledge
such as facts, data, or opinions in any medium or form, including textual, numerical, graphic,
cartographic, narrative, or audiovisual could be included in such a process. Information is used
at every level of the enterprise like operational, management and governance levels. Information
is one energizes every business function which relies on technological and other facets including
the field of information technology on itself. As such information contributes to the achievement
of overall organization’s objectives.
Information and information systems which helps us to store, process and retrieve the
right type of information to the right type of user of such information at the right time. This sort
of protection helps information and information systems from unauthorized access, use,
disclosure, disruption, modification or destruction in order to provide confidentiality, integrity
and availability. Thus it is evident that information is an asset and the same needs to be protected
from internal and external resources.
The CIA triad helps in protecting information within an organization in a secured manner
and there by safeguard the critical assets of the organization by protecting against disclosure
to unauthorized users (Confidentiality), improper modification (Integrity) and non-access when
required (Availability).
3
1.2.2.1.2. Integrity:Integrity deals with the provision of accuracy and reliability of the
information and systems. Information should not be modified in an unauthorized manner by
providing the necessary safety measures for timely detection of unauthorized changers.
Figure 1.1 depicts the CIA triangle which forms the core components of information security
as such.
Availability ensures timely and reliable access to and use of information to authorized
users when needed. Availability can be achieved by the following:
Clustering
Load balancing
Disk shadowing
Rollback functions
Failover configurations
On the other hand, a completely secure information system would not allow anyone to
access information. To achieve balance, operate an information system that satisfies the user
and the security professional—the security level must allow reasonable access, yet protect
against threats.
Figure 1.2 shows some of the competing voices that must be considered when balancing
information security and access.
Along with the CIA Triad other security related concepts and principles need to be
considered while designing security solutions. They include Identification, Authentication,
Authorization, Accountability (IAAA), Non-Repudiation.
6
1.2.4.1. IAAA
While on the other hand an object is any passive data within the system. They range from
documents on physical paper to database tables to text files. The important thing one should
remember about objects is that they are passive within the system as they do not manipulate
other objects. Object – (Passive) any passive data (both physical paper and data) – Objects
are manipulated by subject.
A computer can be either the subject of an attack—an agent entity used to conduct the
attack—or the object of an attack—the target entity. A computer can be both the subject and
object of an attack, when, for example it is compromised by an attack (object), and is then used
to compromise other systems (subject)
1.2.4.2.1. Access
It refers to the subject or object’s ability to use, manipulate, modify, or affect another
subject or object. Authorized users have legal access to a system, whereas hackers have
illegal access to a system. In this regard access controls regulates access.
1.2.4.2.2. Identification
1.2.4.2.3. Authentication
Providing mere identity does not imply access or authority. The identity must be proven or
verified before access can be granted to controlled resources. The process of verifying or
testing that the claimed identity being valid is authentication. The most common form of
authentication is using a password. Authentication verifies the identity of the subject by comparing
one or more factors against the database of valid identities. The capability of the subject and
the system to maintain the secrecy of authentication reflects the level of security of that system.
Identification and authentication are always used together. Providing an identity is the first step
and providing the authentication factors is the second step.
8
1.2.4.2.4. Authorization
1.2.4.2.5. Accountability
Security can be maintained provided the subjects are held accountable for their actions.
Accountability relies on the capability to prove subject’s identity and authentication factors.
1.2.4.2.6 Non-repudiation
Non-repudiation prevents a subject from claiming not to have performed an action or not
to have been the cause of an event. It ensures that an activity of a subject is held accountable
for the subject’s actions. The subject cannot deny later that the actions were not performed by
the subject. If non-repudiation is not built into the system and enforced, it is impossible to verify
and ascertain the action performed by that specific entity. It is an essential part of accountability.
· Vulnerability
· Threat
· Risk
· Exposure
· Control
However the words “vulnerability,” “threat,” “risk,” “exposure” and “control” are often
interchanged, even though they have different meanings.
operating systems, an unrestricted wireless access point, an open port on a firewall, lax physical
security that allows anyone to enter a server room, or unenforced password management on
servers and workstations.
1.3.2. Threat: It is any potential danger that is associated with the exploitation of
vulnerability. If the threat is that someone will identify a specific vulnerability and use it against
the company or individual, then the entity that takes advantage of vulnerability is referred to as
a threat agent. A threat agent could be an intruder accessing the network through a port on the
firewall, a process accessing data in a way that violates the security policy, or an employee
circumventing controls in order to copy files to a medium that could expose confidential
information.
1.3.3. Risk: It is the likelihood of a threat source exploiting a vulnerability and the
corresponding business impact. If a firewall has several ports open, there is a higher likelihood
that an intruder will use one to access the network in an unauthorized method. If users are not
educated on processes and procedures, there is a higher likelihood that an employee will make
an unintentional mistake that may destroy data. If an Intrusion Detection System (IDS) is not
implemented on a network, there is a higher likelihood an attack will go unnoticed until it is too
late. Risk ties the vulnerability, threat, and likelihood of exploitation to the resulting business
impact.
1.3.5. Control or countermeasure: It is put into place to mitigate (reduce) the potential
risk. A countermeasure may be a software configuration, a hardware device, or a procedure
that eliminates a vulnerability or that reduces the likelihood a threat agent will be able to exploit
a vulnerability. Examples of countermeasures include strong password management, firewalls,
a security guard, access control mechanisms, encryption, and security-awareness training.
10
1.4.2. Threat: It is a category of objects, persons, or other entities that presents a danger
to an asset. Threats are always present and can be purposeful or undirected. For example,
hackers purposefully threaten unprotected information systems, just like severe storms
incidentally threaten buildings and their contents.
1.4.3. Exploit: It is a technique used to compromise a system. Threat agents may attempt
to exploit a system or other information asset by using it illegally for their personal gain or an
exploit can be a documented process to take advantage of a vulnerability or exposure usually in
software that is either inherent in the software or is created by the attacker. Such an exploit is
done by making use of existing software tools or custom-made software components
11
1.4.5. Risk:It is a probability that something unwanted might happen. Organizations must
minimize risk to match their risk appetite—the quantity and nature of risk the organization is
willing to accept.
1.4.6. Attack: Attack is an intentional or unintentional act that can cause damage to or
otherwise compromise information and/or the systems that support it. Attacks can be active or
passive, intentional or unintentional, and direct or indirect. Someone casually reading sensitive
information not intended for his or her use is a passive attack. A hacker attempting to break into
an information system is essentially an intentional attack. A lightning strike that causes a fire in
a building is an unintentional attack. A direct attack is a hacker using a personal computer to
break into a system. An indirect attack is a hacker compromising a system and using it to attack
other systems, for example, as part of a botnet (slang for robot network).
This group of compromised computers, running software of the attacker’s choosing can
operate autonomously or under the attacker’s direct control to attack systems and steal user
information or conduct distributed denial-of-service attacks. Direct attacks originate from the
threat itself. Indirect attacks originate from a compromised system or resource that is
malfunctioning or working under the control of a threat.
Summary
· CIA ensures that within the organization, information is protected against disclosure
to unauthorized users, improper modification and non-access when required.
· A threat is any potential danger that is associated with the exploitation of vulnerability.
· What is IAAA?
· What is risk?
Reference
· National Security Telecommunications and Information Systems Security. National
UNIT 2
ATTACKS ON INFORMATION SECURITY
Learning Objectives
· Theft
· Fraud
· Malicious code
· Malicious hacker
· Denial of Services
· Social Engineering
Structure
2.1. Introduction
2.2. Theft
2.3. Fraud
2.4.1. Virus
2.4.2. Worms
2.4.3. Rootkit
2.4.5. Backdoor
2.4.7. Hoaxes
2.10. Ransomware
2.11. Sniffing
2.13.3. Hoaxes
2.14. Spoofing
2.16. Spam
2.17. Mailbombing
2.18. Sniffers
2.19. Malware
2.1. Introduction
Attacks on information security occur through the following:
2.2. Theft
The threat of theft, the illegal taking of another’s property, which can be physical, electronic,
or intellectual, is a constant. The value of information is diminished when it is copied without the
owner’s knowledge. Physical theft can be controlled quite easily by means of a wide variety of
measures, from locked doors to trained security personnel and the installation of alarm systems.
Electronic theft, however, is a more complex problem to manage and control. When someone
steals a physical object, the loss is easily detected; if it has any importance at all, its absence is
noted. When electronic information is stolen, the crime is not always readily apparent. If thieves
are clever and cover their tracks carefully, no one may ever know of the crime until it is far too
late.
2.3. Fraud
Fraud is a crime of gaining money or financial benefits by a trick or by lying. Fraud is
something or someone that deceives people in a way that is illegal or dishonest. It is deliberate
deception trickery or cheating or to gain an advantage. It is an act or instance of such deceptions.
It is something false or furious a fraud is a person in a deceitful way and is called an imposter or
a cheat.
Eg.Cheque fraud, Internet fraud, website redirection charities fraud, pyramid schemes,
identity threat, credit card fraud, insurance fraud, debt elimination
Some of the most common penalties for criminals who commit fraud include
code are viruses and worms, trojan horses, logic bombs, and back doors. Prominent among
the history of notable incidences of malicious code are the denial-of-service attacks.
2.4.1. Virus
A virus is a small application, or string of code, that infects software. The main function of
a virus is to reproduce and deliver its payload, and it requires a host application to do this. In
other words, viruses cannot replicate on their own. A virus infects a file by inserting or attaching
a copy of itself to the file. The virus is just the “delivery mechanism.” It can have any type of
payload (deleting system files, displaying specific messages, reconfiguring systems, stealing
sensitive data, installing a sniffer or back door).
The code behaves very much like a virus pathogen that attacks animals and plants, using
the cell’s own replication machinery to propagate the attack beyond the initial target. The code
attaches itself to an existing program and takes control of that program’s access to the targeted
computer. The virus-controlled target program then carries out the virus’s plan by replicating
itself into additional targeted systems. Many times users unwittingly help viruses get into a
system. Opening infected e-mail or some other seemingly trivial action can cause anything
from random messages popping up on a user’s screen to the complete destruction of entire
hard drives of data. Just as their namesakes are passed among living bodies, computer viruses
are passed from machine to machine via physical media, e-mail, or other forms of computer
data transmission. When these viruses infect a machine, they may immediately scan the local
machine for e-mail applications, or even send themselves to every user in the e-mail address
book.
One of the most common methods of virus transmission is via e-mail attachment files.
Most organizations block e-mail attachments of certain types and also filter all e-mail for known
viruses. In earlier times, viruses were slow-moving creatures that transferred viral payloads
through the cumbersome movement of diskettes from system to system. Now, computers are
networked, and e-mail programs prove to be fertile ground for computer viruses unless suitable
controls are in place.
Among the most common types of information system viruses are the macro virus, which
is embedded in automatically executing macro code used by word processors, spread sheets,
and database applications, and the boot virus, which infects the key operating system files
located in a computer’s boot sector.
18
If they cannot self-replicate they do not fall into the subcategory of “virus.” Several viruses
have been released that achieved self-perpetuation by mailing themselves to every entry in a
victim’s personal address book. The virus masqueraded as coming from a trusted source.
Macros are programs are generally used with Microsoft Office products. Macros automate
tasks that users would otherwise have to carry out themselves. Users can define a series of
activities and common tasks for the application to perform when a button is clicked, instead of
doing each of those tasks individually. A macro virus is a virus written in one of these macro
languages and is platform independent. Macro viruses infect and replicate in templates and
within documents. They are common because they are extremely easy to write and are used
extensively in commonly used products (i.e., Microsoft Office).
Some viruses infect the boot sector (boot sector viruses) of a computer and either move
data within the boot sector or overwrite the sector with new information. Some boot sector
viruses have part of their code in the boot sector, which can initiate the viruses when a system
boots up, and the rest of their code in sectors on the hard drive that the virus has marked off as
bad. Because the sectors are marked as bad, the operating system and applications will not
attempt to use those sectors; thus, they will not get overwritten.
A stealth virus hides the modifications it has made to files or boot records. This can be
accomplished by monitoring system functions used to read files or sectors and forging the
results. This means that when an anti-malware program attempts to read an infected file or
sector, the original uninfected form will be presented instead of the actual infected form. The
virus can hide itself by masking the size of the file it is hidden in or actually move itself temporarily
to another location while an anti-malware program is carrying out its scanning process.
So a stealth virus is a virus that hides its tracks after infecting a system. Once the system
is infected, the virus can make modifications to make the computer appear the same as before.
The virus can show the original file size of a file it infected instead of the new, larger size to try
to trick the antimalware software into thinking no changes have been made.
A polymorphic virus produces varied but operational copies of itself. This is done in the
hopes of outwitting a virus scanner. Even if one or two copies are found and disabled, other
copies may still remain active within the system. These viruses can also vary the sequence of
their instructions by including noise, or bogus instructions, with other useful instructions. They
can also use a mutation engine and a random-number generator to change the sequence of
19
their instructions in the hopes of not being detected. A polymorphic virus has the capability to
change its own code, enabling the virus to have hundreds or thousands of variants. These
activities can cause the virus scanner to not properly recognize the virus and to leave it alone.
2.4.2. Worms
A worm is a malicious program that replicates itself constantly, without requiring another
program environment. Worms can continue replicating themselves until they completely fill
available resources, such as memory, hard drive space, and network bandwidth. Worms are
different from viruses in that they can reproduce on their own without a host application, and are
self-contained programs.
The newer worm variants contain multiple exploits that can use any of the many predefined
distribution vectors to programmatically distribute the worm and deliver a double-barreled payload:
it has an attachment that contains the worm, and if the e-mail is viewed on an HTML-enabled
browser, it attempts to deliver a macro virus.
The complex behavior of worms can be initiated with or without the user downloading or
executing the file. Once the worm has infected a computer, it can redistribute itself to all e-mail
addresses found on the infected system. Furthermore, a worm can deposit copies of itself onto
all web servers that the infected system can reach, so that users who subsequently visit those
sites become infected. Worms also take advantage of open shares found on the network in
which an infected system is located, placing working copies of the worm code onto the server
so that users of those shares are likely to become infected.
In the digital world, worms are just little programs, and like viruses they are used to
transport and deliver malicious payloads. One of the most famous computer worms is Stuxnet,
which targeted Supervisory Control and Data Acquisition (SCADA) software and equipment. It
has a highly specialized payload that was used against Iran’s uranium enrichment infrastructures
with the goal of damaging the country’s nuclear program.
2.4.3. Rootkit
time without having to go through any authentication steps. The other common tools in a rootkit
allow for credential capturing, sniffing, attacking other systems, and covering the attacker’s
tracks.
The rootkit is just a set of tools that is placed on the compromised system for future use.
Once the rootkit is loaded, the attacker can use these tools against the system or other systems
it is connected to whenever he wants to. The attacker usually replaces default system tools with
new compromised tools, which share the same name. They are referred to as “Trojan programs”
because they carry out the intended functionality but do some malicious activity in the background.
This is done to help ensure that the rootkit is not detected.
Trojan horses are software programs that hide their true nature and reveal their designed
behavior only when activated. Trojan horses are frequently disguised as helpful, interesting, or
necessary pieces of software, such as readme.exe files often included with shareware or freeware
packages. Once Trojan horses are brought into a system, they become activated and can
wreak havoc on the unsuspecting user.
A Trojan horse is a program that is disguised as another program. Trojan horses are one
of the fastest growing malware types in the world. Users are commonly tricked into downloading
some type of software from a website that is actually malicious. The Trojan horse can then set
up a back door, install keystroke loggers, implement rootkits, upload files from the victim’s
system, install boot software, and perform many other types of malicious acts. Trojan horses
are commonly used to carry out various types of online banking fraud and identity theft activities.
Remote Access Trojans (RATs) are malicious programs that run on systems and allow
intruders to access and use a system remotely. They mimic the functionality of legitimate remote
control programs used for remote administration, but are used for sinister purposes instead of
helpful activities. They are developed to allow for stealth installation and operation, and are
usually hidden in some type of mobile code, such as Java applets or ActiveX controls, that are
downloaded from websites.
Several RAT programs are available to the hacker. Once the RAT is loaded on the victim’s
system, the attacker can download or upload files, send commands, monitor user behaviors,
install zombie software, activate the webcam, take screenshots, alter files, and use the
compromised system as he pleases.
21
A virus or worm can have a payload that installs a backdoor or trap door component in a
system, which allows the attacker to access the system at will with special privileges.
One of the biggest challenges to fighting viruses and worms has-been the emergence of
polymorphic threats. A polymorphic threat is one that over time techniques that look for
preconfigured signatures. These viruses and worms actually evolve, changing their size and
other external file characteristics to elude detection by antivirus software programs.
As frustrating as viruses and worms are, perhaps more time and money is spent on
resolving virus hoaxes. Well-meaning people can disrupt the harmony and flow of an organization
when they send group e-mails warning of supposedly dangerous viruses that don’t exist. When
people fail to follow virus-reporting procedures, the network becomes overloaded, and much
time and energy is wasted as users forward the warning message to everyone they know, post
the message on bulletin boards, and try to update their antivirus protection software.
• Payload Carries out its function (that is, deletes files, and installs a back door, exploits
a vulnerability, and so on).
As you identify the vulnerabilities that are inherent to your organization and its systems, it
is important to also identify the sources that could attack them. The International Organization
for Standardization in their ISO/IEC standard 27000 define a threat as a “potential cause of an
unwanted incident, which may result in harm to a system or organization.
Perhaps the most obvious threat source is the malicious attacker who intentionally pokes
and prods our systems looking for vulnerabilities to exploit. In the past, this was a sufficient
description of this kind of threat source. Increasingly, however, organizations are interested in
profiling the threat in great detail. Many organizations are implementing teams to conduct
cyberthreat intelligence that allows them to individually label, track, and understand specific
cybercrime groups. This capability enables these organizations to more accurately determine
which attacks are likely to originate from each group based on their capabilities as well as their
tactics, techniques, and procedures (TTP).
Another important threat source is the insider, who may be malicious or simply careless.
The malicious insider is motivated by a number of factors, but most frequently by disgruntlement
and/or financial gain. In the wake of the massive leak of classified data attributed to Edward
Snowden in 2012, there’s been increased emphasis on techniques and procedures for identifying
and mitigating the insider threat source. While the deliberate insider dominates the news, it is
important to note that the accidental insider can be just as dangerous, particularly if they fall into
one of the vulnerability classes described in the preceding section.
and passwords, the computer is told to execute a program that connects it to a command and
control (C&C) network. At this point, the cybercriminals can issue commands, such as “start
sending SYN packets as fast as you can to this IP address,” to it and to thousands of other
similarly infected machines on the same C&C network. Each of these computers is called a
zombie or a bot, and the network they form is called a botnet.
Not too long ago, attackers who aspired to launch DDoS attacks had to build their own
botnets, which is obviously no small task. We have recently seen the commercialization of
botnets. The current model seems to be that a relatively small number of organizations own
and rent extremely large botnets numbering in the hundreds of thousands of bots. If you know
where to look and have a few hundred dollars to spare, it is not difficult to launch a massive
DDoS attack using these resources.
Spyware is “any technology that aids in gathering information about a person or organization
without their knowledge.
Spyware is placed on a computer to secretly gather information about the user and report
it. The various types of spyware include (1) a Web bug, a tiny graphic on a Web site that is
referenced within the Hypertext Markup Language (HTML) content of a Web page or e-mail to
collect information about the user viewing the HTML content (2) a tracking cookie, which is
placed on the user’s computer to track the user’s activity on different Web sites and create a
detailed profile of the user’s behavior.”
Adware is “any software program intended for marketing purposes such as that used to
deliver and display advertising banners or pop-ups to the user’s screen or tracking the user’s
online usage or purchasing activity.” Each of these hidden code components can be used to
26
collect information from or about the user which could then be used in a social engineering or
identity theft attack. Adware automatically generates (renders) advertisements. The ads can be
provided through pop-ups, user interface components, or screens presented during the
installation of updates of other products. The goal of adware is to generate sales revenue, not
carry out malicious activities, but some adware uses invasive measures, which can cause security
and privacy issues.
The logic bomb software can have many types of triggers that activate its payload execution,
as in time and date or after a user carries out a specific action. For example, many times
compromised systems have logic bombs installed so that if forensics activities are carried out
the logic bomb initiates and deletes all of the digital evidence. This thwarts the investigation
team’s success and helps hide the attacker’s identity and methods.
2.10. Ransomware
There has been an uptick in the use of ransomware for financial profit in recent years.
This attack works similarly to the process by which a computer is exploited and made to join a
botnet. However, in the case of ransomware, instead of making the computer a bot (or maybe
in addition to doing so), the attacker encrypts all user files on the target. The victim receives a
message stating that if they want their files back they have to pay a certain amount. When the
victim pays, they receive the encryption key together with instructions on how to decrypt their
drives and go on with their lives. Interestingly, these cybercriminals appear to be very good at
keeping their word here. Their motivation is to have their reliability be spread by word of mouth
so that future victims are more willing to pay the ransom.
There is no unique defense against this type of attack, because it is difficult for an attacker
to pull off if you are practicing good network hygiene. The following list of standard practices is
not all-inclusive, but it is a very solid starting point:
Keep your software’s security patches up to date. Ideally, all your software gets
patched automatically.
27
Use host-based anti-malware software and ensure the signatures are up to date.
Never open attachments from unknown sources. As a matter of fact, even if you
know the source, don’t open unexpected attachments without first checking with
that person. (It is way too easy to spoof an e-mail’s source address.)
Before clicking a link in an e-mail, float your mouse over it (or right-click the link) to
see where it will actually take you. If in doubt (and you trust the site), type the URL
in the web browser yourself rather than clicking the link.
2.11. Sniffing
Network eavesdropping, or sniffing, is an attack on the confidentiality of our data. The
good news is that it requires a sniffing agent on the inside of our network. That is to say, the
attacker must first breach the network and install a sniffer before he is able to carry out the
attack. The even better news is that it is possible to detect sniffing because it requires the NIC
to be placed in promiscuous mode, meaning the NIC’s default behavior is overridden and it no
longer drops all frames not intended for it. The bad news is that network breaches are all too
common and many organizations don’t search for interfaces in promiscuous mode.
Sniffing plays an important role in the maintenance and defense of our networks, so it’s
not all bad. It is very difficult to troubleshoot many network issues without using this technique.
The obvious difference is that when the adversary (or at least an unauthorized user) does it, it
is quite possible that sensitive information will be compromised.
harvesting useful information and uploading it to the malicious site, or encrypting the contents
of the hard-drive in the case of a ransomware attack.
Drive-by downloads are one of the most common and dangerous attack vectors, because
they require no user interaction besides visiting a website. From there, it takes fractions of a
second for the infection to be complete. So what can we do about them? The key is that the
most common exploits attack the browser plug-ins. To protect users from this type of attack,
ensure that all plug-ins are patched and (here is the important part) disabled by default. If a user
visits a website and wants to watch a video, this should require user interaction (e.g., clicking a
control that enables the plug-in). Similarly, Java (another common attack vector) should require
manual enabling on a case-by-case basis. By taking these steps, the risk of infection from
drive-by downloads is reduced significantly.
Admittedly, the users are not going to like this extra step, which is where an awareness
campaign comes in handy. If you are able to show your users the risk in an impactful way, they
may be more willing to go along with the need for an extra click next time they want to watch a
video of a squirrel water-skiing.
2.13.1.E-mail Threats
bank account credentials. Sometimes, the e-mail messages contain a link of a known website
when it is actually a fake website used to trick the user into revealing his information.
E-mail spoofing is done by modifying the fields of e-mail headers, such as the From,
Return-Path, and Reply-To fields, so the e-mail appears to be from a trusted source. This
results in an e-mail looking as though it is from a known e-mail address. Mostly the from field is
spoofed, but some scams have modified the Reply-To field to the attacker’s e-mail address. E-
mail spoofing is caused by the lack of security features in SMTP. When SMTP technologies
were developed, the concept of e-mail spoofing didn’t exist, so countermeasures for this type of
threat were not embedded into the protocol. A user could use an SMTP server to send e-mail to
anyone from any e-mail address.
The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information. The state-of-the-art malicious
code attack is the polymorphic, or multivector, worm. These attack programs use upto six known
attack vectors to exploit a variety of vulnerabilities in commonly found information system devices.
A bot (an abbreviation of robot) is “an automated software program that executes certain
commands when it receives a specific input. Bots are often the technology used to implement
Trojan horses, logic bombs, back doors and spyware.
2.13.3. Hoaxes
A more devious attack on computer systems is the transmission of a virus hoax with a real
virus attached. When the attack is masked in a seemingly legitimate message, unsuspecting
users more readily distribute it. Even though these users are trying to do the right thing to avoid
infection, they end up sending the attack on to their coworkers and friends and infecting many
users along the way.
30
The application of computing and network resources to try every possible password
combination is called a brute force attack. Since the brute force attack is often used to obtain
passwords to commonly used accounts, it is sometimes called a password attack. If attackers
can narrow the field of target accounts, they can devote more time and resources to these
accounts. That is one reason to always change the manufacturer’s default administrator account
names and passwords.
Password attacks are rarely successful against systems that have adopted the
manufacturer’s recommended security practices. Controls that limit the number of unsuccessful
access attempts allowed per unit of elapsed time are very effective against brute force attacks.
The dictionary attack is a variation of the brute force attack which narrows the field by
selecting specific target accounts and using a list of commonly used passwords (the dictionary)
instead of random combinations. Organizations can use similar dictionaries to disallow passwords
during the reset process and thus guard against easy-to-guess passwords. In addition, rules
requiring numbers and/or special characters in passwords make the dictionary attack less
effective.
2.14. Spoofing
2.15. Man-in-the-Middle
This type of attack uses IP spoofing to enable an attacker to impersonate another entity
on the network. It allows the attacker to eavesdrop as well as to change, delete, reroute, add,forge,
or divert data. A variant of TCP hijacking, involves the interception of an encryption key exchange,
which enables the hacker to act as an invisible man-in-the-middle—that is, an eaves dropper—
on encrypted communications.
2.16 Spam
Spam is unsolicited commercial e-mail. While many consider spam a trivial nuisance
rather than an attack, it has been used as a means of enhancing malicious code attacks. The
most significant consequence of spam, however, is the waste of computer and human resources.
Many organizations attempt to cope with the flood of spam by using e-mail filtering technologies.
Other organizations simply tell the users of the mail system to delete unwanted messages.
2.18 Sniffers
A sniffer is a program or device that can monitor data traveling over a network. Sniffers
can be used both for legitimate network management functions and for stealing information.
Unauthorized sniffers can be extremely dangerous to a network’s security, because they are
virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite
weapon in the hacker’s arsenal. Sniffers often work on TCP/IP networks, where they’re sometimes
32
called packet sniffers. Sniffers add risk to the network, because many systems and users send
information on local networks in clear text. A sniffer program shows all the data going by, including
passwords, the data inside files—such as word-processing documents—and screens full of
sensitive data from applications.
Adhering to the usual rules of not opening an e-mail attachment or clicking on a link that
comes from an unknown source is one of the best ways to combat malicious code. However,
recent viruses and worms have infected personal e-mail address books, so this precaution is
not a sure thing to protect systems from malicious code. If an address book is infected and
used during an attack, the victim gets an e-mail message that seems to have come from a
person he knows. Because he knows this person, he will proceed to open the e-mail message
and double-click the attachment or click on the link. And Bam! His computer is now infected and
uses the e-mail client’s address book to spread the virus to all his friends and acquaintances.
There are many infection channels other than through e-mail, but it is a common one
since so many people use and trust these types of messages coming into and out of their
systems on a daily basis. In fact, by many estimates, upward of 95 percent of all compromises
use e-mail as the principal attack vector.
Manual attacks on systems do not happen as much as they did in the past. Today hackers
automate their attacks by creating a piece of malicious software (malware) that can compromise
thousands of systems at one time with more precision. While malware can be designed to carry
out a wide range of malicious activities, most malware is created to obtain sensitive information
(credit card data, Social Security numbers, credentials, etc.), gain unauthorized access to
systems, and/or carry out a profit-oriented scheme.
The proliferation of malware has a direct relationship to the large amount of profit individuals
can make without much threat of being caught. The most commonly used schemes for making
money through malware are as follows:
33
· Systems are compromised with bots and are later used in distributed denial-of-
service (DDoS) attacks, spam distribution, or as part of a botnet’s command and
control system.
· Ransomware encrypts some or all of the users’ files with keys that are only given to
the users after they pay a ransom, typically using cryptocurrencies.
· Spyware collects personal data for the malware developer to resell to others.
· Malware redirects web traffic so that people are pointed toward a specific product
for purchase.
· Malware installs key loggers, which collect sensitive financial information for the
malware author to use.
· Malware is used to carry out phishing attacks, fraudulent activities, identity theft
steps, and information warfare activities.
The sophistication level of malware continues to increase at a rapid pace. Years ago you
just needed an anti-malware product that looked for obvious signs of an infection (new files,
configuration changes, system file changes, etc.), but today’s malware can bypass these
simplistic detection methods.
Some malware is stored in RAM and not saved to a hard drive, which makes it harder to
detect. The RAM is flushed when the system reboots, so there is hardly any evidence that it
was there in the first place. Malware can be installed in a “drive-by-download” process, which
means that the victim is tricked into clicking something malicious (web link, system message,
pop-up window), which in turn infects his computer.
As discussed earlier, there are many web browser and web server vulnerabilities that are
available through exploitation. Many websites are infected with malware, and the website owners
do not know this because the malware encrypts itself, encodes itself, and carries out activities
in a random fashion so that its malicious activities are not easily replicated and studied.
We will cover the main categories of malware in the following sections, but the main
reasons that they are all increasing in numbers and potency are as follows:
Many environments are homogeneous, meaning that one piece of malware will
work on many or most devices.
34
More people and companies are storing all of their data in some digital format.
More people and devices are connecting through various interfaces (phone apps,
Facebook, websites, e-mail, texting, e-commerce, etc.).
Many accounts are configured with too much privilege (administrative or root access).
More people who do not understand technology are using it for sensitive purposes
(online banking, e-commerce, etc.).
The digital world has provided many ways to carry out various criminal activities with a
low risk of being caught
This is the process of getting a person to violate a security procedure or policy, and
usually involves human interaction or e-mail/text messages. It is a non-technical attack carried
out to manipulate a person into providing sensitive data to an unauthorized individual.
Attackers can trick people into providing their cryptographic key material through various
social engineering attack types. Social engineering attacks are carried out on people with the
goal of tricking them into divulging some type of sensitive information that can be used by the
attacker. The attacker may convince the victim that he is a security administrator that requires
the cryptographic data for some type of operational effort. The attacker could then use the data
to decrypt and gain access to sensitive data. The attacks can be carried out through persuasion,
coercion (rubber-hose cryptanalysis), or bribery (purchase-key attack).
35
Phishing is a social engineering attack that is commonly carried out through maliciously
crafted e-mail. The goal is to get someone to click a malicious link or for the victim to send the
attacker some confidential data (Aadhaar Number, account number, etc.). The attacker crafts
an e-mail that seems to originate from a trusted source and sends it out to many victims at one
time.
A spear phishing attack zeroes in on specific people. So if an attacker wants your specific
information because he/she wants to break into your bank account, he/she could gather
information about you via Facebook, LinkedIn, or other resources and create an e-mail purporting
to be from someone he/she thinks you will trust.
A similar attack is called whaling. In a whaling attack an attacker usually identifies some
“big fish” in an organization (CEO, CFO, COO, CSO) and targets them because they have
access to some of the most sensitive data in the organization. The attack is finely tuned to
achieve the highest likelihood of success.
Summary
Threats are the vulnerabilities that are inherent to your organization and its
systems.ISO/IEC standard 27000 define a threat as a “potential cause of an
unwanted incident, which may result in harm to a system or organization.
A virus is a small application, or string of code, that infects software. The main
function of a virus is to reproduce and deliver its payload, and it requires a host
application to do this. It cannot self-replicate and it needs human interaction to
replicate.
Ransomware is a type of malware in which the attacker encrypts all user files on the
target. The victim receives a message stating that if they want their files back they
have to pay a certain amount.
36
The malicious code attack includes the execution of viruses, worms, Trojan horses,
and active Web scripts with the intent to destroy or steal information.
The application of computing and network resources to try every possible password
combination is called a brute force attack.
Social engineering is when one person tricks another person into sharing confidential
information, for example, by posing as someone authorized to have access to that
information.
……………………………… are software programs that hide their true nature and
reveal their designed behavior only when activated.
Reference
ISO (International Organization for. standards.iso.org.
SATTER, RAPHAEL (28 March 2017). ”What makes a cyberattack? Experts lobby
to restrict the term”.
World Economic Forum (2018). ”The Global Risks Report 2018 13th Edition”. World
Economic Forum.
Linden, Edward. Focus on Terrorism. New York: Nova Science Publishers, Inc.,
2007. Web
Wright, Joe; Jim Harmening (2009). “15”. In Vacca, John. Computer and Information
Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 257. ISBN 978-
0-12-374354-1.
Krebs, Brian. ”Security Fix - Avoid Windows Malware: Bank on a Live CD”.
Voices.washingtonpost.com.
Wright, Joe; Jim Harmening. Vacca, John. (2009). Computer and Information
Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 257. ISBN 978-
0-12-374354-1.
38
UNIT 3
INFORMATION SECURITY GOVERNANCE
Learning Objectives
Structure
3.1. Introduction
3.2.6.1. Policy
3.2.6.2. Standards
3.2.6.3. Procedures
3.2.6.4. Guidelines
3.2.6.5. Baselines
39
3.1 Introduction
Information security governance plays a pivotal role in the process of achieving effective
and efficient information security and thereby provides the requisite security governance through
proper documentation, classification, training and governance thereof.
Recognizing the pain points and trigger events is often the first step in implementation of
governance. This will improve the buy-in, quick wins can be identified and value can be
demonstrated in the most visible areas of the enterprise.
The following are the pain points that could act as a stumbling block and trigger an event
and hence recognizing the pain points are crucial for an organization.
Board members, executives or senior managers who are reluctant to engage with
IT
The following are the other events in the enterprise’s internal and external environment
that can trigger a focus on the governance.
The organization should ensure the need for security. The organization should include
this in its mission statement and thereby satisfy the stakeholders through their vision. This is
where security governance comes into play. Security governance is a framework that allows for
the security goals of an organization to be set and expressed by senior management
communicated throughout the different levels of the organization. It grants power to the entities
needed to implement and enforce security and provides a way to verify the performance of
these security activities.
The following are the aspects that are required for establishing effective security
governance.
41
CEO, CFO, CIO, CISO, and business unit managers participate in a risk management
committee that meets each month, and information security is always on the agenda
to review.
Executive management sets an acceptable risk level that is the basis for the
organization’s security policies and all security activities.
Executive management holds business unit managers responsible for carrying out
risk management activities for their specific business units.
Employees are held accountable for any security breach they participate in, either
maliciously or accidentally.
Security products, managed services, and consultants are purchased and deployed
in a formal manner. They are also constantly reviewed to ensure they are cost
effective.
The organization is continuing to review its processes, including security, with the
goal of continued improvement.
Providing assurance that critical decisions are not based on faulty information
Providing a firm foundation for efficient and effective risk management, process
improvement, rapid incident response and continuity management
Ineffective bureaucracies
Aging Institutions
Quality security programs begin and end with policy. Information security is primarily a
management problem, not a technical one, and policy is a management tool that obliges
personnel to function in a manner that preserves the security of information assets. Security
policies are the least expensive control to execute, but the most difficult to implement properly.
They have the lowest cost in that their creation and dissemination requires only the time and
effort of the management team. Even if the management team hires an outside consultant to
help develop policy, the costs are minimal compared to those of technical controls. However,
shaping policy is difficult because policy must:
43
For a company’s security plan to be successful, it must start at the top level and be useful
and functional at every single level within the organization. Senior management needs to define
the scope of security and identify and decide what must be protected and to what extent.
Management must understand the regulations, laws, and liability issues it is responsible for
complying with regarding security and ensure that the company as a whole fulfills its obligations.
Senior management also must determine what is expected from employees and what the
consequences of non-compliance will be. A security policy is an overall general statement
produced by senior management that dictates what role security plays within the organization.
A security policy can be an organizational policy, an issue-specific policy, or a system-specific
policy.
Policy means different things to different people. The term policy is defined as a high level
statement of an organization is beliefs, goals, objectives, and the general means to attain a
specific subject area. A policy is brief and set at a high level.
A policy is not specific and a detailed description of the problem and each step is needed
to implement the policy. A policy on requiring access control for remote users has exceeded its
scope if there is a discussion about passwords, password length and password history.
The meaning of the term security policy depends on the context in which it is used.
Governmental agencies view security policy in terms of national security and national policies
to deal with foreign states. A security policy can also communicate a credit card agency’s method
for processing credit card numbers. In general, a security policy is a set of rules that protect an
organization’s assets. An information security policy provides rules for the protection of the
information assets of the organization.
For a policy to be effective and thus legally enforceable, it must meet the following criteria:
Dissemination (distribution). The organization must be able to demonstrate that the policy
has been made readily available for review by the employee. Common dissemination techniques
include hard copy and electronic distribution.
Review (reading). The organization must be able to demonstrate that it disseminated the
document in an intelligible form, including versions for illiterate, non-English reading, and reading-
impaired employees. Common techniques include recording the policy in English and other
languages.
Compliance (agreement). The organization must be able to demonstrate that the employee
agrees to comply with the policy, through act or affirmation. Common techniques include logon
banners which require a specific action (mouse click or keystroke) to acknowledge agreement,
or a signed document clearly indicating the employee has read, understood, and agreed to
comply with the policy.
45
Uniform enforcement. The organization must be able to demonstrate that the policy has
been uniformly enforced, regardless of employee status or assignment.
Management must define three types of security policy, according to the National Institute
of Standards and Technology’s Special Publication 800-14
The EISP guides the development, implementation, and management of the security
program. It sets out the requirements that must be met by the information security blueprint or
framework. It defines the purpose, scope, constraints, and applicability of the security program.
It also assigns responsibilities for the various areas of security, including systems administration,
maintenance of the information security policies, and the practices and responsibilities of the
users. Finally, it addresses legal compliance. According to the National Institute of Standards
and Technology (NIST), the EISP typically addresses compliance in the following two areas:
2. The use of specified penalties and disciplinary action when the EISP has been developed,
the CISO begins forming the security team and initiating the necessary changes to the information
security program.
46
EISP Elements
Although the specifics of EISPs vary from organization to organization, most EISP
documents should include the following elements:
Fully articulated responsibilities for security that are shared by all members of the
organization (employees, contractors, consultants, partners, and visitors)
Fully articulated responsibilities for security that are unique to each role within the
organization
3. Assigns responsibilities.
6. Address relative laws, regulations, and liability issues, and how they are to be
satisfied.
7. Provides scope and direction for all future security activities within the organization.
Component Description
Information Security Elements Def ines inf ormation security. For example:
”Protecting the confidentiality, integrity, and availability
of information while in processing, transmission, and
storage, through the use of policy, education and
training, and technology…” This section can also lay
out security definitions or philosophies to clarify the
policy.
Reference to Other Information Lists other standards that influence and are
influenced by this policy document, perhaps including
Standards and Guidelines relevant laws (federal and state) and other policies.
48
1. Email
2. Use of internet
There are a number of approaches to creating and managing ISSPs within an organization.
Three of the most common are:
3. A modular ISSP document that unifies policy creation and administration, while
maintaining each specific issue’s requirements
The independent ISSP document typically has a scattershot effect. Each department
responsible for a particular application of technology creates a policy governing its use,
management, and control. This approach may fail to cover all of the necessary issues and can
lead to poor policy distribution, management, and enforcement.
The single comprehensive ISSP is centrally managed and controlled. With formal
procedures for the management of ISSPs in place, the comprehensive policy approach
establishes guidelines for overall coverage of necessary issues and clearly identifies processes
49
for the dissemination, enforcement, and review of these guidelines. Usually, these policies are
developed by those responsible for managing the information technology resources.
Unfortunately, these policies tend to overgeneralize the issues and skip over vulnerabilities.
The optimal balance between the independent and comprehensive ISSP is the modular
ISSP. It is also centrally managed and controlled but is tailored to individual technology issues.
The modular approach provides a balance between issue orientation and policy management.
The policies created with this approach comprise individual modules, each created and updated
by people responsible for the issues addressed. These people report to a central policy
administration group that incorporates specific issues into an overall comprehensive policy.
Statement of Policy : The policy should begin with a clear statement of purpose. Consider
a policy that covers the issue of fair and responsible use of the Internet. The introductory
section of this policy should outline these topics: What is the scope of this policy? Who is
responsible and accountable for policy implementation? What technologies and issues does it
address? Authorized Access and Usage of Equipment This section of the policy statement
addresses who can use the technology governed by the policy, and what it can be used for.
Remember that an organization’s information systems are the exclusive property of the
organization, and users have no particular rights of use. Each technology and process is provided
for business operations. Use for any other purpose constitutes misuse of equipment. This section
defines “fair and responsible use” of equipment and other organizational assets and should
also address key legal issues, such as protection of personal information and privacy. Prohibited
Use of Equipment Unless a particular use is clearly prohibited, the organization cannot penalize
its employees for misuse. The following can be prohibited: personal use, disruptive use or
misuse, criminal use, offensive or harassing materials, and infringement of copyrighted, licensed,
or other intellectual property. As an alternative approach, categories 2 and 3 of Table 5-2 can be
collapsed into a single category—appropriate use. Many organizations use an ISSP section
titled “Appropriate Use” to cover both categories.
Systems Management : The systems management section of the ISSP policy statement
focuses on the users’ relationship to systems management. Specific rules from management
include regulating the use of e-mail, the storage of materials, the authorized monitoring of
employees, and the physical and electronic scrutiny of e-mail and other electronic documents.
It is important that all such responsibilities are designated as belonging to either the systems
administrator or the users; otherwise both parties may infer that the responsibility belongs to
the other party.
50
Violations of Policy : The people to whom the policy applies must understand the penalties
and repercussions of violating the policy. Violations of policy should carry appropriate, not
draconian, penalties. This section of the policy statement should contain not only the specifics
of the penalties for each category of violation but also instructions on how individuals in the
organization can report observed or suspected violations. Many people think that powerful
individuals in the organization can discriminate, single out, or otherwise retaliate against someone
who reports violations. Allowing anonymous submissions is often the only way to convince
users to report the unauthorized activities of other, more influential employees.
Policy Review and Modification : Because any document is only useful if it is upto-
date, each policy should contain procedures and a timetable for periodic review. As the
organization’s needs and technologies change, so must the policies that govern their use. This
section should specify a methodology for the review and modification of the policy to ensure
that users do not begin circumventing it as it grows obsolete.
Components of ISSP
Statement of policy
· Responsibilities
· User access
· Protection of privacy
51
· Criminal use
· Other restrictions
Systems management
· Employer monitoring
· Virus protection
· Physical security
· Encryption
Violations of policy
· Legal disclaimers
Limitations of liability
· Statements of liability
For example, while the method for implementing a firewall belongs in the technical
specifications SysSP, the firewall’s configuration must follow guidelines established by
management. An organization might not want its employees to access the Internet via the
organization’s network, for instance; in that case, the firewall should be implemented accordingly.
Firewalls are not the only technology that may require system-specific policies. Any system
that affects the confidentiality, integrity, or availability of information must be assessed to evaluate
the trade-off between improved security and restrictions.
System-specific policies can be developed at the same time as ISSPs, or they can be
prepared in advance of their related ISSPs. Before management can craft a policy informing
users what they can do with the technology and how they are supposed to do it, it might be
necessary for system administrators to configure and operate the system. Some organizations
may prefer to develop ISSPs and SysSPs in tandem, so that operational procedures and user
guidelines are created simultaneously.
Technical Specifications SysSPs While a manager can work with a systems administrator
to create managerial policy as described in the preceding section, the system administrator
may in turn need to create a policy to implement the managerial policy. Each type of equipment
requires its own set of policies, which are used to translate the management intent for the
technical control into an enforceable technical approach. For example, an ISSP may require
53
that user passwords be changed quarterly; a systems administrator can implement a technical
control within a specific application to enforce this policy. There are two general methods of
implementing such technical controls: access control lists and configuration rules.
· This policy type is directed to one or a group of similar systems and outlines how
they should be protected.
Policies are written in broad terms to cover many subjects in a general fashion. Much
more granularity is needed to actually support the policy, and this happens with the use of
procedures, standards, guidelines, and baselines. The policy provides the foundation. The
procedures, standards, guidelines, and baselines provide the security framework.
And the necessary security controls (administrative, technical, and physical) are used to
fill in the framework to provide a full security program.
3.2.6.2. Standards
Standards are mandatory requirements that support individual policies. Standards can
range from what software or hardware can be used to what remote access protocol is to be
implemented, to who is responsible for approving what. When developing a information security
policy, it will be necessary to establish a set of supporting standards that Can give a policy its
support and reinforcement in direction. They can also be used to indicate expected user behavior.
They provide a means to ensure that specific technologies, applications, parameters, and
procedures are implemented in a uniform (standardized) manner across the organization. An
organizational standard may require that all employees wear their company identification badges
at all times, that they challenge unknown individuals about their identity and purpose for being
in a specific area, or that they encrypt confidential information. These rules are compulsory
within a company, and if they are going to be effective, they must be enforced.
54
3.2.6.3. Procedures
Procedures spell out how the policy, standards, and guidelines will actually be implemented
in an operating environment. If a policy states that all individuals who access confidential
information must be properly authenticated, the supporting procedures will explain the steps for
this to happen by defining the access criteria for authorization, how access control mechanisms
are implemented and configured, and how access activities are audited. If a standard state that
backups should be performed, then the procedures will define the detailed steps necessary to
perform the backup, the timelines of backups, the storage of backup media, and so on.
Procedures should be detailed enough to be both understandable and useful to a diverse group
of individuals.
3.2.6.4. Guidelines
Guidelines are more general statements designed to achieve the policy’s objectives but
by providing a framework within which to implement procedures. Where standards are mandatory,
guidelines are recommendations. Guidelines are recommended actions and operational guides
to users, IT staff, operations staff, and others when a specific standard does not apply. They
can also be used as a recommended way to achieve specific standards when those do apply.
Guidelines can deal with the methodologies of technology, personnel, or physical security. Life
is full of gray areas, and guidelines can be used as a reference during those times. Whereas
standards are specific mandatory rules, guidelines are general approaches that provide the
necessary flexibility for unforeseen circumstances. Guidelines can be used as a reference; a
policy might state that access to confidential data must be audited. A supporting guideline could
further explain that audits should contain sufficient information to allow for reconciliation with
prior reviews. Supporting procedures would outline the necessary steps to configure, implement,
and maintain this type of auditing.
3.2.6.5. Baseline
Baselines are used to define the minimum level of protection required. Baseline refers to
a point in time that is used as a comparison for future changes. Once risks have been mitigated
55
and security put in place, a baseline is formally reviewed and agreed upon. All further comparisons
and development are measured against it. A baseline results in a consistent reference point. In
security, specific baselines can be defined per system type, which indicates the necessary
settings and the level of protection being provided. Security personnel must assess the systems
as changes take place and ensure that the baseline level of security is always being met. If a
technician installs a patch on a system and does not ensure the baseline is still being met, there
could be new vulnerabilities introduced into the system that will allow attackers easy access to
the network.
Summary
Information security governance plays a pivotal role in the process of achieving
effective and efficient information security and thereby provides the requisite security
governance through proper documentation, classification, training and governance
thereof.
Policy means different things to different people. The term policy is defined as a
high level statement of organization beliefs, goals, objectives and the general means
to attain a specific subject area. A policy is brief and set at a high level.
The systems management section of the ISSP policy statement focuses on the
users’ relationship to systems management.
Guidelines are more general statements designed to achieve the policy’s objectives
but by providing a framework within which to implement procedures. Where standards
are mandatory, guidelines are recommendations.
Baselines are used to define the minimum level of protection required. Baseline
refers to a point in time that is used as a comparison for future changes
56
What is a policy?
What is a procedure?
What is a guideline?
References
Julia Allen.2007Characteristics of Effective Security Governance.
o Cylab Survey Reveals Gap in Board Governance of Cyber Security. 2008. Richard
Power.
o Governance of Enterprise Security: Cylab 2008 Report. 2008. Jody Westby and
Richard Power.
Pauline Bowen, Joan Hash and Mark Wilson.2006. Information Security Handbook:
A Guide for Managers (NIST Special Publication 800-100).
ISM3 Consortium.
o Maturity Model
o ISM3, ISO, Cobit and Parkerian Hexad Information Security Criteria Mapping
PricewaterhouseCoopers. 2010.
https://spaces.at.internet2.edu/display/2014infosecurityguide/
InformationSecurityGovernance
59
UNIT 4
INFORMATION ASSET CLASSIFICATION
Learning Objectives
· Information Asset
o Owner
o Custodian
o User
· Information Classification
o Secret
o Confidential
o Methodology
§ Declassification
§ Reclassification
o Owner
o Custodian
o User
Structure
4.1. Introduction
4.1.2.1.Software Assets
4.1.2.2.Physical Assets
4.1.2.3.Services
4.4. Custodians
4.5. Users
4.7.1. Secret
4.7.2. Confidential
4.7.3. Private
4.7.4. Public
4.8. Methodology
4.8.1. Declassification
4.8.2. Reclassification
4.11.4. Authorization
4.11.4.1. Owner
4.11.4.2. User
4.11.4.3. Custodian
4.1. Introduction
The classification of information asset rests with business or mission owners, data owners,
system owners, custodians and users within the realm of agreed and accepted information
security norms. Each of the stakeholders in this regard plays a different role in securing the
assets of the organizations as such.
All Institutional Information should be classified into one of three sensitivity tiers, or
classifications.
Data and information assets are classified respective of the risk of unauthorized disclosure
(e.g., lost or stolen inadvertently or nefariously). High risk data, typically classified “Confidential”,
requires a greater level of protection, while lower risk data, possibly labeled “internal” requires
proportionately less protection.
Business Owners and Mission Owners (senior management) create the information security
program and ensure that it is properly staffed, funded, and has organizational priority. They are
responsible for ensuring that all organizational assets are protected.
The Data Owner (also called information owner) is a management employee responsible
for ensuring that specific data is protected. Data owners determine data sensitivity labels and
the frequency of data backup. They focus on the data itself, whether in electronic or paper form.
A company with multiple lines of business may have multiple data owners. The data owner
performs management duties; Custodians perform the hands-on protection of data.
The System Owner is a manager responsible for the actual computers that house data.
This includes the hardware and software configuration, including updates, patching, etc. They
63
ensure the hardware is physically secure, operating systems are patched and up to date, the
system is hardened, etc.
4.3.2. Custodian
The term “custodian” refers to any individual in the organization who has the responsibility
to protect an information asset as it is stored, transported, or processed in line with the security
requirements defined by the information asset owner. Technical hands-on responsibilities are
delegated to Custodians.
A Custodian provides hands-on protection of assets such as data. They perform data
backups and restoration, patch systems, configure antivirus software, etc. The Custodians follow
detailed orders; they do not make critical decisions on how data is protected. The Data Owner
may dictate, “All data must be backed up every 24 hours.” The Custodians would then deploy
and operate a backup solution that meets the Data Owner’s requirements.
4.3.3. Users
Users must follow the rules such as mandatory policies, procedures, standards they must
comply with. For example, they must not write their passwords down or share accounts. Users
must be made aware of these risks and requirements. Organizations cannot take for granted
that the users will know what to do, nor assume they are already doing the right thing. The
users must be informed via information security awareness programmes. They must also be
made aware of the penalty for failing to comply with mandatory directives such as policies.
4.4.2. Secret
4.4.3 Confidential
Information is said to be “confidential” when highly sensitive data is intended for limited,
specific use by a workgroup, department, or group of individuals with a legitimate need-to-
know. Explicit authorization by the Data Steward is required for access because of legal,
contractual, privacy, or other constraints. Confidential data has a very high level of sensitivity.
Examples include:
•Privacy
4.4.4 Private
Information is said to be “private” when data is meant for internal use only whose
significance is great and whose disclosure may lead to a significant negative impact on an
organization. All data and information which is being processed inside an organization is to be
handled by employees only and should not fall into the hands of outsiders.
4.4.5 Official
Official material forms the generality of government business, public service delivery and
commercial activity. This includes a diverse range of information, of varying sensitivities, and
with differing consequences resulting from compromise or loss. OFFICIAL information must be
secured against a threat model that is broadly similar to that faced by a large private company.
4.4.6 Unclassified
Unclassified is technically not a classification level, but this is a feature of some classification
schemes, used for government documents that do not merit a particular classification or which
have been declassified. This is because the information is low-impact, and therefore does not
require any special protection, such as vetting of personnel.
65
4.4.7 Public
Information is said to be “public” when it may or must be open to the general public. It is
defined as information with no existing local, national, or international legal restrictions on access
or usage. Public data, while subject to Secure State disclosure rules, is available to all Secure
State employees and all individuals or entities external to the corporation. Examples include:
4.5. Methodology
4.5.1. Declassification
States that if nothing has been specifically configured for an individual or the groups, he/
she belongs to, the user should not be able to access that resource i.e. Default no access
It is based on the concept that individuals should be given access only to the information
that they absolutely require in order to perform their job duties
4.8.4 Authorization
Authorization for access for owner, custodian and users are given below:
· Something a person knows- E.g.: passwords, PIN- least expensive, least secure
Summary
Information Asset classification, in the context of Information Security, is the
classification of Information based on its level of sensitivity and the impact to the
University should that Information be disclosed, altered, or destroyed without
authorization. The classification of Information helps determine what baseline
Security Controls are appropriate for safeguarding that Information.
The System Owner is a manager responsible for the actual computers that house
data. This includes the hardware and software configuration, including updates,
patching, etc. They ensure the hardware is physically secure, operating systems
are patched and up to date, the system is hardened, etc.
Users must follow the rules such as mandatory policies, procedures, standards
they must comply with.
68
Information Asset
Information Classification
Methodology of classification
Reference
Abdallah, Z. Information Security on a Budget: Data Classification & Data Leakage
Prevention. Available at http://www.takesecurityback.com/tag/data-classification/
Stewart, J., Chapple, M., Gibson, D. (2015). Certified Information Systems Security
Professional Study Guide (7th Edition).
UNIT 5
RISK ANALYSIS AND RISK MANAGEMENT
Learning Objectives
Asset Definition
Threat Identification
Risk Avoidance
Risk mitigation
Cost/Benefit analysis
Risk Management
Structure
5.1. Introduction
5.1. Introduction
Risk management is the identification, assessment and prioritization of risks and the
subsequent coordinated and economical application of resources to minimize, monitor and
control the probability and impact of losses. Effective risk management activities create value
and should be an integral part of the decision-making process.
A common definition of risk is an uncertain event that if it occurs, can have a positive
or negative effect on a project’s goals. The Risk Impact/Probability Chart is based on the principle
that a risk has two primary dimensions:
Probability – A risk is an event that “may” occur. The probability of it occurring can
range anywhere from just above 0 percent to just below 100 percent.
Impact: A risk, by its very nature, always has a negative impact. However, the size
of the impact varies in terms of cost and impact on health, human life, or some
other critical factor.
Figure 5.2
72
Low impact/low probability – Risks in the bottom left corner are low level, and you
can often ignore them.
Low impact/high probability – Risks in the top left corner are of moderate importance
– if these things happen, you can cope with them and move on. However, you
should try to reduce the likelihood that they’ll occur.
High impact/low probability – Risks in the bottom right corner are of high importance
if they do occur, but they’re very unlikely to happen. For these, however, you should
do what you can to reduce the impact they’ll have if they do occur, and you should
have contingency plans in place just in case they do.
High impact/high probability – Risks towards the top right corner are of critical
importance. These are your top priorities, and are risks that you must pay close
attention to.
Step 1: Identify the Risk. You and your team uncover that which might affect your project
or its outcomes. There are a number of techniques you can use to find project risks. During this
step you start to prepare your Project Risk Register.
Step 2: Analyze the risk. Once risks are identified you determine the likelihood and
consequence of each risk. You develop an understanding of the nature of the risk and its
potential to affect project goals and objectives. This information is also input to your Project
Risk Register.
Step 3: Evaluate or Rank the Risk. You evaluate or rank the risk by determining the risk
magnitude, which is the combination of likelihood and consequence. You make decisions about
whether the risk is acceptable or whether it is serious enough to warrant treatment. These risk
rankings are also added to your Project Risk Register.
Step 4: Treat the Risk. This is also referred to as Risk Response Planning. During this
step you assess your highest ranked risks and set out a plan to treat or modify these risks to
73
achieve acceptable risk levels. You create risk mitigation strategies, preventive plans and
contingency plans in this step. And you add the risk treatment measures for the highest ranking
or most serious risks to your Project Risk Register.
Step 5: Monitor and Review the risk. This is the step where you take your Project Risk
Register and use it to monitor, track and review risks.
Every piece of information about your organization falls in this category. This information
has been collected, classified, organized and stored in various forms.
Data files: - Transactional data giving up-to-date information about each event.
Operational and support procedures: These have been developed over the years
and provide detailed instructions on how to perform various activities.
Archived information: Old information that may be required to be maintained by law.
(a) Application software: Application software implements business rules of the organization.
(b) System software: An organization would invest in various packaged software programs
like operating systems, DBMS, development tools and utilities, software packages, office
productivity suites etc.
74
These are the visible and tangible equipment and could comprise of:
5.3.4. Services
c) Environmental conditioning services like heating, lighting, air conditioning and power.
Once you’ve identified the risks that can pose a probable threat to your company, and
determined how much loss can be expected from an incident, you are then prepared to make
decisions on how to protect your company. After performing a risk assessment, you may find a
considerable number of probable threats that can affect your company. These may include
intrusions, vandalism, theft, or other incidents and situations that may vary from business to
business. This may make any further actions dealing with risk management seem impossible.
The process in determining risk controls includes, assessing the risk, assessing risk
appetite and evaluating how to treat the risk through mitigating actions. In assessing a risk, we
firstly must give consideration of our risk appetite by making a risk assessment, this could
include:
A process should then be followed to identify efficient and effective ways to mitigate
against the risk, this can occur by either:
The best risk control measure is avoidance. For example, a factory owner who learns that
a chemical used in the manufacturing process is dangerous to workers might avoid the risk
entirely by eliminating that step from the manufacturing process or by finding a safe substitute
chemical. Risk avoidance might work in some cut-and-dry scenarios, but being risk-averse also
can cause you to miss out on benefits, such as innovation, that derive from overcoming
challenges. Loss Control has two basic incarnations. First, loss prevention is taking reasonable
steps to lower risk probability. For example, the factory owner in the previous scenario might
alter the manufacturing process to isolate the dangerous chemical from workers. Second, loss
reduction minimizes the severity of a negative outcome. The factory owner might design
mechanical shutdown procedures to quarantine dangerous chemical leaks, for instance, as
well as publish evacuation procedures for worst-case scenarios. Risk Financing at a certain
point, taking further risk control measures becomes infeasible. For example, if the factory owner
has no option but to use the dangerous chemical and has taken appropriate safety measures in
accordance with governmental regulations and best practices within the industry, nothing more
can be done to avoid risk other than shut down the business. Risk financing then becomes a
viable means of risk control. This can take the form of reserving money in your budget for
worst-case scenarios or, if possible, purchasing insurance to help your business recover from a
loss
Risk mitigation, the second process according to SP 800-30, the third according to ISO
27005 of risk management, involves prioritizing, evaluating, and implementing the appropriate
risk-reducing controls recommended from the risk assessment process. Risk mitigation can be
achieved through any of the following risk mitigation options:
77
Risk Assumption: -To accept the potential risk and continue operating the IT system
or to implement controls to lower the risk to an acceptable level
Risk Avoidance: - To avoid the risk by eliminating the risk cause and/or consequence
(e.g., forgo certain functions of the system or shut down the system when risks are
identified)
Risk Limitation: - To limit the risk by implementing controls that minimize the adverse
impact of a threat’s exercising a vulnerability (e.g., use of supporting, preventive,
detective controls)
Risk Planning: - To manage risk by developing a risk mitigation plan that prioritizes,
implements, and maintains controls
Risk Transference: - To transfer the risk by using other options to compensate for
the loss, such as purchasing insurance.
The transfer control strategy attempts to shift risk to other assets, other processes, or
other organizations. This can be accomplished by rethinking how services are offered, revising
deployment models, outsourcing to other organizations, purchasing insurance, or implementing
service contracts with providers. This allows the organization to transfer the risks associated
with the management of these complex systems to another organization that has experience in
dealing with those risks. A side benefit of specific contract arrangements is that the provider is
responsible for disaster recovery, and through service level agreements is responsible for
availability.
The accept control strategy is the choice to do nothing to protect a vulnerability and to
accept the outcome of its exploitation. This may or may not be a conscious business decision.
The only industry-recognized valid use of this strategy occurs when the organization has done
the following:
Decided that the particular function, service, information, or asset did not justify the
cost of protection
This strategy is based on the conclusion that the cost of protecting an asset does not
justify the security expenditure. It is not acceptable for an organization to adopt a policy that
ignorance is bliss and hope to avoid litigation by pleading ignorance of its obligation to protect
employee and customer information. It is also unacceptable for management to hope that if
they do not try to protect information, the opposition will assume that there is little to be gained
by an attack.
To provide a basis for comparing projects – which involves comparing the total
expected cost of each option against its total expected benefits.
2. List stakeholders(is a member of the “groups without whose support the organization
would cease to exist).
Risk management involves three major undertakings: risk identification, risk assessment,
and risk control.
80
Risk assessment is the determination of the extent to which the organization’s information
assets are exposed or at risk.
Risk control is the application of controls to reduce the risks to an organization’s data
and information systems. The various components of risk management and their relationship
to each other are shown in Figure: 5.2.
Risks to an organization come in different forms, and they are not all computer related.
When a company purchases another company, it takes on a lot of risk in the hope that this
move will increase its market base, productivity, and profitability. If a company increases its
product line, this can add overhead, increase the need for personnel and storage facilities,
require more funding for different materials, and maybe increase insurance premiums and the
expense of marketing campaigns. The risk is that this added overhead might not be matched in
sales; thus, profitability will be reduced or not accomplished.
Physical damage: -Fire, water, vandalism, power loss, and natural disasters
Threats must be identified, classified by category, and evaluated to calculate their damage
potential to the organization. Real risk is hard to measure, but prioritizing the potential risks in
order of which ones must be addressed first is obtainable.
Not enough people inside or outside of the security profession really understand risk
management. Even though information security is big business today, the focus is more on
applications, devices, viruses, and hacking. Although these items all must be considered and
weighed in risk management processes, they should be considered small pieces of the overall
security puzzle, not the main focus of risk management.
Security is a business issue, but businesses operate to make money, not just to be secure.
A business is concerned with security only if potential risks threaten its bottom line, which they
82
can in many ways, such as through the loss of reputation and customer base after a database
of credit card numbers is compromised; through the loss of thousands of dollars in operational
expenses from a new computer worm; through the loss of proprietary information as a result of
successful company espionage attempts; through the loss of confidential information from a
successful social engineering attack; and so on. It is critical that security professionals understand
these individual threats, but it is more important that they understand how to calculate the risk
of these threats and map them to business drivers.
In order to properly manage risk within an organization, you have to look at it holistically.
Risk, after all, exists within a context. NIST SP 800-39 defines three tiers to risk management:
· Organizational tier- Concerned with risk to the business as a whole, which means
it frames the rest of the conversation and sets important parameters such as the
risk tolerance level.
· Business process tier -Deals with the risk to the major functions of the organization,
such as defining the criticality of the information flows between the organization
and its partners or customers. The bottom tier.
Carrying out risk management properly means that you have a holistic understanding of
your organization, the threats it faces, the countermeasures that can be put into place to deal
with those threats, and continuous monitoring to ensure the acceptable risk level is being met
on an ongoing basis.
Summary
Each of the three elements in the C.I.A. triangle, is an essential part of every IT
organization’s ability to sustain long-term competitiveness. Risk identification is the examination
and documentation of the security posture of an organization’s information technology and the
risks it faces.
83
Reference
https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=908030
Thomas R. Peltier. 2010. Information Security Risk Analysis (3rd ed.). Auerbach
Publications, Boston, MA, USA.
Thomas R. Peltier and Justin Peltier. 2006. Complete Guide to CISM Certification.
Auer Bach Publications, Boston, MA, USA.
Thomas R. Peltier, Justin Peltier, and John A. Blackley. 2005. Information Security
Fundamentals On-Line Self-Study Course. CRC Press, Inc., Boca Raton, FL, USA.
https://its.ny.gov/sites/default/files/documents/risk-management-guide-2012.pdf
Thomas R. Peltier, Justin Peltier, and John Blackley. 2003. Information Security
Fundamentals. Auerbach Publications, Boston, MA, USA.
84
Thomas R. Peltier and Patrick D. Howard. 2002. Total Cissp Exam Prep Book:
Practice Questions, Answers, and Test Taking Tips and Techniques. Auerbach
Publications, Boston, MA, USA.
Thomas R. Peltier. 2000. Information Security Risk Analysis (1st ed.). CRC Press,
Inc., Boca Raton, FL, USA.
Thomas R. Peltier. 1991. Policies and Procedures for Data Security: A Complete
Manual for Computer Systems and Networks. Backbeat Books.
Thomas R. Peltier. 1991. Policies and Procedures for Data Security: A Complete
Manual for Computer Systems and Networks. Miller Freeman, Inc., Lawrence, KS,
USA.
UNIT 6
ACCESS CONTROL
Learning Objectives
Access Control
Account Authorization
Event Logging
Cryptography
Structure
6. Introduction
6.5.2 Privileges
86
6.11 Cryptography
6. Introduction
The goal of access control is to minimize the risk of unauthorized access to physical and
logical systems. Access control is a fundamental component of security compliance programs
that ensures security technology and access control policies are in place to protect confidential
information, such as customer data. Most organizations have infrastructure and procedures
that limit access to networks, computer systems, applications, files and sensitive data, such as
personally identifiable information and intellectual property.
Access control is a security technique that can be used to regulate who or what can view
or use resources in a computing environment. There are two main types of access control:
1. physical and
2. logical.
(1) The pure identity function: Creation, management and deletion of identities without
regard to access or entitlements;
(2) The user access (log-on) function: For example: a smart card and its associated
data used by a customer to log on to a service or services (a traditional view);
(3) The service function: A system that delivers personalized, role-based, online, on-
demand, multimedia (content), presence-based services to users and their devices.
(4) Identity Federation: A system that relies on federated identity to authenticate a user
without knowing his or her password.
IAM products:- One Identity Manager from Dell combines easy installation, configuration
and use. The system is compatible with Microsoft SQL and Oracle database systems. According
to Dell, the self-service product is so user-friendly that employees can manage all stages in the
IAM life cycle without requiring help from the IT department. The product suite also includes
Cloud Access Manager, which enables single sign-on capabilities for a variety of Web application
access scenarios.
a bank can create and use an identity (e.g., a user name) to log into that bank’s online service
but the bank’s authorization policy must ensure that only you are authorized to access your
individual account online once your identity is verified.
Authorization can be applied to more granular levels than simply a web site or company
intranet. Your individual identity can be included in a group of identities that share a common
authorization policy. For example, imagine a database that contains both customer purchases
and a customer’s personal and credit card information. A merchant could create an authorization
policy for this database to allow a marketing group access to all customer purchases but prevent
access to all customer personal and credit card information, so that the marketing group could
identify popular products to promote or put on sale.
We implicitly create authorization policies when we use social media: Facebook, LinkedIn,
or Twitter may authenticate hundreds of millions of users, but to some extent we can authorize
whether or how these users engage with us. The same is true when you share files, videos, or
photos from sites like Google Docs, Dropbox, Instagram, Pinterest, Flickr or even when you
create a “shared” folder on your laptop.
A PAM solution offers a secure, streamlined way to authorize and monitor all privileged
users for all relevant systems. PAM lets you: Grant privileges to users only for systems on
which they are authorized. Grant access only when it’s needed and revoke access when the
need expires. Avoid the need for privileged users to have or need local/direct system passwords.
Centrally and quickly manage access over a disparate set of heterogeneous systems. Create
an unalterable audit trail for any privileged operation.
89
(1) Create a policy that specifies how super user accounts will be managed and what
the account holders should and should not be able to do.
(2) Develop a management model that identifies a responsible party to ensure that the
above policies are followed.
(3) Inventory privileged accounts to determine how extensive the population is and to
identify them.
(4) Establish tools and processes for management, such as provisioning tools or
specialized PIM products.
Privileged Access Management solutions vary in their architectures, but most offer the
following components working in concert: Access Manager – This PAM module governs access
to privileged accounts. It is a single point of policy definition and policy enforcement for privileged
access management. A privileged user requests access to a system through the Access Manager.
The Access Manager knows which systems the user can access and at what level of privilege.
A super admin can add/modify/delete privileged user accounts on the Access Manager. This
approach reduces the risk that a former employee will retain access to a critical system. (This
situation is far more common than most IT manager would like to admit)
Password Vault – The best PAM systems prevent privileged users from knowing the
actual passwords to critical systems. This prevents a manual override on a physical device, for
example. Instead, the PAM system keeps these password in a secure vault and opens access
to a system for the privileged user once he has cleared the Access Manager.
Session Manager – Access control is not enough. You need to know what a privileged
user actually did during an administrative session. A Session Manager tracks actions taken
during a privileged account session.
90
System Access Control authorizes the establishment of a session (i.e., login) and its
continuation until logout. Before granting a session, the TL1 Agent validates and authenticates
the session requester. In addition, the NE/NS also ensures that the communication path between
the NE/NS and the session requester is trusted so that no intruder can enter the channel. The
main objective of System Access Control feature is to reduce the risk of unauthorized access to
the NE/NS. User-Related Security View and Channel-Related Security View help in achieving
system access control Commands that are available for System Access Control. This is explained
in User-Related Security View and Channel-Related Security View.
6.5.2. Privileges
Security in TL1 uses the concept of Privileges. Privilege here means the access level for
a User. By default, there are a few access levels. You can also define you own access level.
The option Configure Privilege in Protocols "TL1" Security panel displays a list of privileges
as given below:
The user can add a new privilege or delete an existing privilege from the list by using the
Add/Delete options. While configuring user-related security parameters, the user access privilege
(UAP) can be configured for each user by adding one or more privileges from the list. When an
input message is received from a user, Agent checks if the user privilege matches the channel
privilege and also the command privilege before processing the command.
User-Related Security View is essential for identification and authentication of the users
accessing the TL1 Agent. The User-Related Security View contains the security parameters
and their values associated with all the users authorized to access the TL1 Agent. Using the
91
User-Related Security View system access control is possible. The user details and various
other privileges associated with the user are entered in the User-related Security View.
The channel-related security view contains details related to security for each of the
protocols. Using the Channel-related Security View System Access control is possible. Using
this view, the administrator can restrict certain channels to certain users or certain resource of
a system can be made accessible only through certain channels. The Channel-Related Security
View contains the security parameters associated with all channels. Channels dealt with here
are the Transport Protocols, such as the TCP, Craft Interface, etc.
bugs and take control of the process. From this point of view, buggy software becomes Trojan
horses when the attacker is able to feed inputs to them. Exploiting this weakness of DAC,
attackers are able to execute malicious code under the privileges of legitimate users,
compromising end hosts. Host compromise further leads to a wide range of other computer
security problems. Computer worms propagate by first compromising vulnerable hosts and
then propagating to other hosts. Compromised hosts may be organized under a common
command and control infrastructure, forming botnets. Botnets can then be used for carrying out
attacks such as phishing, spamming, and distributed denial of service. This project aims at
developing Mandatory Access Control (MAC) techniques to enhance existing DAC mechanism
to prevent host compromise. This project has several important differences from previous projects
with a similar goal. First, usability is treated as a top priority. The usability goals are as follows:
Configuring such a MAC system should not be more difficult than installing and configuring an
operating system; and existing applications and common usage practices can still be used.
This resulted in design choices that trade off security for simplicity and the introduction of novel
exception mechanisms to the MAC rules. Second, the security objective is clearly defined and
limited. The goal is to protect end host and user files against network attackers, malicious
websites, and user errors. Third, the project closely integrates DAC and MAC, rather than
viewing them as disjoint components. For example, MAC labels for files are inferred from their
DAC permissions.
numerous safety features and benefits offered by security and monitoring systems, they are
also a great tool when it comes to health and safety within the business, and quality control.
An IDS works by monitoring system activity through examining vulnerabilities in the system,
the integrity of files and conducting an analysis of patterns based on already known attacks. It
also automatically monitors the Internet to search for any of the latest threats which could result
in a future attack. There are multiple ways in which detection is performed by an IDS. In signature-
based detection, a pattern or signature is compared to previous events to discover current
threats. This is useful for finding already known threats, but does not help in finding unknown
threats, variants of threats or hidden threats. Another type of detection is anomaly-based
detection, which compares the definition or traits of a normal action against characteristics
marking the event as abnormal.
(1) Network Intrusion Detection System (NIDS): This does analysis for traffic on a whole
subnet and will make a match to the traffic passing by to the attacks already known in a library
of known attacks.
(2)Network Node Intrusion Detection System (NNIDS): This is similar to NIDS, but the
traffic is only monitored on a single host, not a whole subnet.
(3)Host Intrusion Detection System (HIDS): This takes a “picture” of an entire system’s
file set and compares it to a previous picture. If there are significant differences, such as missing
files, it alerts the administrator.
logs. Entries in the main panel of Event Viewer provide a quick overview of when, where, and
how an event occurred. The event type precedes the date and time of the event. Event types
include:
Ø Warning : A warning. Details for warnings are often useful in preventing future system
problems.
Ø Error: An error, such as the failure of a service to start. Note : Warnings and errors
are the two types of events that you’ll want to examine closely. Whenever these
types of events occur and you’re unsure of the cause, double-click the entry to view
the detailed event description.
In addition to type, date, and time, the summary and detailed event entries provide the
following information:
Ø Category : The category of the event, which is sometimes used to further describe
the related action.
Ø User: The user account that was logged on when the event occurred.
Ø Data: In the detailed entries, any data or error code output by the event.
6.11. Cryptography
Cryptography involves creating written or generated codes that allows information to be
kept secret. Cryptography converts data into a format that is unreadable for an unauthorized
user, allowing it to be transmitted without anyone decoding it back into a readable format, thus
compromising the data. Information security uses cryptography on several levels. The information
cannot be read without a key to decrypt it. The information maintains its integrity during transit
and while being stored. Cryptography also aids in non-repudiation. This means that neither the
95
creator nor the receiver of the information may claim they did not create or receive it. Cryptography
is also known as cryptology.
Cryptography also allows senders and receivers to authenticate each other through the
use of key pairs. There are various types of algorithms for encryption, some common algorithms
include:
(1)Secret Key Cryptography (SKC) - Here only one key is used for both encryption and
decryption. This type of encryption is also referred to as symmetric encryption.
(2)Public Key Cryptography (PKC): Here two keys are used. This type of encryption is
also called asymmetric encryption. One key is the public key and anyone can have access to it.
The other key is the private key, and only the owner can access it. The sender encrypts the
information using the receiver’s public key. The receiver decrypts the message using his/her
private key. For non-repudiation, the sender encrypts plain text using a private key, while the
receiver uses the sender’s public key to decrypt it. Thus, the receiver knows who sent it.
(3)Hash Functions: These are different from SKC and PKC. They have no key at all and
are also called one-way encryption. Hash functions are mainly used to ensure that a file has
remained unchanged.
2) Integrity (the information cannot be altered in storage or transit between sender and
intended receiver without the alteration being detected)
3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his
or her intentions in the creation or transmission of the information)
4) Authentication (the sender and receiver can confirm each others identity and the origin/
destination of the information)
Summary
Access control is a security technique that can be used to regulate who or what can
view or use resources in a computing environment.
96
Physical access control, limits access to campuses, buildings, rooms and physical
IT assets.
Logical access control, limits connections to computer networks, system files and
data.
The four main categories of access control are Mandatory access control,
Discretionary access control, Role-based access control, Rule-based access control.
Identity management, also known as identity and access management (IAM) is, in
computer security, the security and business discipline that enables the right
individuals to access the right resources at the right times and for the right reasons.
Password Vault – The best PAM systems prevent privileged users from knowing
the actual passwords to critical systems. This prevents a manual override on a
physical device, for example. Instead, the PAM system keeps these password in a
secure vault and opens access to a system for the privileged user once he has
cleared the Access Manager.
Session Manager – Access control is not enough. You need to know what a privileged
user actually did during an administrative session. A Session Manager tracks actions
taken during a privileged account session.
The main objective of System Access Control feature is to reduce the risk of
unauthorized access to the NE/NS.
Network access control (NAC), also called network admission control, is a method
of bolstering the security of a proprietary network by restricting the availability of
network resources to endpoint devices that comply with a defined security policy.
Event logging provides a standard, centralized way for applications (and the operating
system) to record important software and hardware events.
97
…………………….. Access control is not enough. You need to know what a privileged
user actually did during an administrative session.
98
The main objective of System Access Control feature is to reduce the risk of
……………………. to the NE/NS.
Reference
Federal Financial Institutions Examination Council (2008). ”Authentication in an
Internet Banking Environment”(PDF).
”NFC access control: cool and coming, but not close”. Security Systems News.
”Ditch Those Tacky Key Chains: Easy Access with EC Key”. Wireless Design and
Development. 2012-06-11.
“Kisi And KeyMe, Two Smart Phone Apps, Might Make House Keys Obsolete”. The
Huffington Post. The Huffington Post.
”Opening new doors with IP access control Secure Insights”. Secure Insights.
”Smart access control polices for residential & commercial buildings”. Archived from
the original on 4 July 2017.
99
”SP 800-162, Guide to Attribute Based Access Control (ABAC) Definition and
Considerations” (PDF). NIST. 2014.
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&
p = 1 & u = %2 F n e ta h t m l % 2 F PTO % 2 F s e a r c h - bo o l . h t m l & r = 1 & f = G & l = 5 0
&co1=AND&d=PTXT&s1=8,984,620.PN.&OS=PN/8,984,620&RS=PN/8,984,620
”Controlling Access to Members of a Class (The Java™ Tutorials > Learning the
Java Language > Classes and Objects)”. docs.oracle.com.
Satish Talim / Original design: Erwin Aligam -. ”Ruby Access Control: Ruby Study
Notes - Best Ruby Guide, Ruby Tutorial”. rubylearning.com.
100
UNIT – 7
PHYSICAL SECURITY
Learning Objective
Physical Security
Perimeter Security
Security Guards
Structure
7.1. Physical Security
7.4.1 Recycling
7.4.2 Tracking
7.8.2 Sensors
(1) Deter potential intruders (e.g. Warning signs and perimeter markings)
(2) Detect intrusions and monitor/record intruders (e.g. Intruder alarms and CCTV systems)
(3) Trigger appropriate incident responses (e.g. By security guards and police).
102
Physical access security measures that are appropriate for a high security prison or a
military site may be inappropriate in an office, a home or a vehicle, although the principles are
similar.
Identify Assets to be protected: - Identifying the critical assets is essential for many reasons.
You will come to know what is critical and essential for the business. You will be able to take
appropriate decisions regarding the level of security that should be provided to protect the
assets. You will also be able to decide about the level of redundancy that is necessary by
keeping an extra copy of the data or an extra server that you should procure and keep as a hot
standby. Not all information is created equal. Some information is more important to the profitable
operation of a business than other information. This is not my opinion, it is an undeniable fact
for every organization, and one of the few universal truths in the information security world.
Every organization likely has three distinct types of information: information that can be shared
freely, often referred to as public information, information that can be shared with certain
audiences in specific ways, often referred to as sensitive information, and information that
should remain confidential to the company and should not be shared, often referred to as
secret or internal information. We can broadly classify assets in the following categories:
1. Information assets Every piece of information about your organization falls in this
category. This information has been collected, classified, organized and stored in various forms.
Data files: Transactional data giving up-to-date information about each event.
Operational and support procedures: These have been developed over the years
and provide detailed instructions on how to perform various activities.
3. Physical assets: These are the visible and tangible equipment and could comprise of:
4. Services
c) Environmental conditioning services like heating, lighting, air conditioning and power.
These critical information assets should become the focus of more resource intensive
detection and response capabilities. Technologies like Data Loss Prevention and Security
104
Information and Event Management systems. Those systems would form the foundation that
allows an organization to deploy next-level technologies to protect their assets within a defined
scope that is justifiable from a cost/benefit analysis perspective.
(2) Firewalls
(3) IDSs
(4) IPSs
7.2.1. Border Routers: - Routers are the traffic cops of networks. They direct traffic into,
out of, and within our networks. The border router is the last router you control before an
untrusted network such as the Internet. Because all of an organization’s Internet traffic goes
through this router, it often functions as a network’s first and last line of defense through initial
and final filtering.
7.2.2. Firewalls: - A firewall is a chokepoint device that has a set of rules specifying what
traffic it will allow or deny passing through it. A firewall typically picks up where the border router
leaves off and makes a much more thorough pass at filtering traffic. Firewalls come in several
different types, including static packet filters, tasteful firewalls, and proxies. You might use a
static packet filter such as a Cisco router to block easily identifiable “noise” on the Internet, a
tasteful firewall such as a Check Point FireWall-1 to control allowed services, or a proxy firewall
such as Secure Computing Sidewinder to control content. Although firewalls aren’t perfect,
they do block what we tell them to block and allow what we tell them to allow.
105
7.2.3. Intrusion Detection Systems: -AN IDS is like a burglar alarm system for your
network that is used to detect and alert on malicious events. The system might comprise many
different IDS sensors placed at strategic points in your network. Two basic types of IDS exist:
network-based (NIDS), such as Snort or Cisco Secure IDS, and host-based (HIDS), such as
Tripwire or ISS Black ICE. NIDS sensors monitor network traffic for suspicious activity. NIDS
sensors often reside on subnets that are directly connected to the firewall, as well as at critical
points on the internal network. HIDS sensors reside on and monitor individual hosts.
7.2.5. Virtual Private Networks:-A VPN is a protected network session formed across
an unprotected channel such as the Internet. Frequently, we reference a VPN in terms of the
device on the perimeter that enables the encrypted session, such as Cisco VPN Concentrator.
The intended use might be for business partners, road warriors, or telecommuters. A VPN
allows an outside user to participate on the internal network as if connected directly to it. Many
organizations have a false sense of security regarding their remote access just because they
have a VPN. However, if an attacker compromises the machine of a legitimate user, a VPN can
give that attacker an encrypted channel into your network. You might trust the security of your
perimeter, but you have little control over your telecommuters’ systems connecting from home,
a hotel room, or an Internet café. Similar issues of trust and control arise with the security of
nodes connected over a VPN from your business partner’s network.
(1)The web front end that is responsible for how the application is presented to the user
(2)The application code that implements the business logic of the application
(3)The back-end databases that store underlying data for the application
We typically use the terms DMZ and screened subnet in reference to a small network
containing public services connected directly to and offered protection by the firewall or other
filtering device. A DMZ and a screened subnet are slightly different, even though many people
use the terms interchangeably. The term DMZ originated during the Korean War when a strip of
land at the 38th parallel was off-limits militarily. A DMZ is an insecure area between secure
areas. Just as the DMZ in Korea was in front of any defenses, the DMZ, when applied to
networks, is located outside the firewall. A firewall or a comparable traffic-screening device
protects a screened subnet that is directly connected to it.
1) Use caution around flammable materials. Things that seem innocuous — boxes and
other packaging items, for example — can pose a fire hazard. Experts recommend using staging
areas, or “breakdown rooms,” where equipment is removed from boxes and unwrapped before
it ever enters the actual data center. This eliminates many potentially hazardous materials from
ever reaching the data center. Any flammable materials that do need to be in the data center
should be stored in fire-retardant cabinets.
2) Create multiple power rooms. Many data centers have a single power room to house
electrical buses, including back-up, or “catcher” buses. In the event of a fire, and the use of
water to fight a blaze, it’s likely the water could shut down an entire room. Smoke also can
107
dictate a complete power room shut down, in turn shutting down the entire data center. Experts
recommend, if at all possible, having each bus in a separate room with its own emergency
power off (EPO) switch. The uninterruptible power supply (UPS) for each bus would also be in
its own room.
3) Regularly inspect and maintain all fire-safety systems. Following a regular service and
inspection routine for all fire-prevention systems and equipment ensures they remain operational.
4) Monitor changes within the facility as a whole. Facility renovations and upgrades can
affect how a fire-safety system could interact with data center equipment. One such example:
more sophisticated computer equipment could require containment strategies to keep the data
center at an appropriate temperature. The equipment, such as screens to contain a hot or cold
aisle, could have an effect on sprinkler and fire-suppression-system discharge patterns. Thus,
changes not only drive facility design but also fire-safety considerations.
5) Prepare for the worst. Facilities professionals and data center managers need to be
prepared for a fire. A solid emergency plan informs local firefighters about the building. It’s also
essential to let them know how the data center operates to help first responders understand
that fire hoses aren’t always the best solution in this space.
Fire detection: - Fire detectors sense one or more of the products or phenomena resulting
from fire, such as smoke, heat, infrared and/or ultraviolet light radiation, or gas.
A heat detector is a fire alarm device designed to respond when the convicted thermal
energy of a fire increases the temperature of a heat sensitive element. The thermal mass and
108
conductivity of the element regulate the rate of flow of heat into the element. All heat detectors
have this thermal lag. Heat detectors have two main classifications of operation, “rate-of-rise”
and “fixed temperature”. The Heat detector is used to help in the reduction of damaged property.
It is triggered when temperature increases.
A flame detector is a sensor designed to detect and respond to the presence of a flame
or fire, allowing flame detection. Responses to a detected flame depend on the installation, but
can include sounding an alarm, deactivating a fuel line (such as a propane or a natural gas
line), and activating a fire suppression system. When used in applications such as industrial
furnaces, their role is to provide confirmation that the furnace is properly lit; in these cases they
take no direct action beyond notifying the operator or control system. A flame detector can often
respond faster and more accurately than a smoke or heat detector due to the mechanisms it
uses to detect the flame.
A carbon monoxide detector or CO detector is a device that detects the presence of the
carbon monoxide (CO) gas in order to prevent carbon monoxide poisoning. CO is a colorless,
tasteless and odorless compound produced by incomplete combustion of carbon-containing
materials. It is often referred to as the “silent killer” because it is virtually undetectable without
using detection technology. Elevated levels of CO can be dangerous to humans depending on
the amount present and length of exposure. Smaller concentrations can be harmful over longer
periods of time while increasing concentrations require diminishing exposure times to be harmful.
all data it stores and can face serious consequences if this data is breached — especially if the
reason for the breach is negligence. Deleting documents and files stored on a computer cannot
always remove all of the data. In fact, there are special programs specifically designed to pull
deleted data from a hard drive. The only way to ensure data remains safe is to have a drive
professionally wiped or destroyed. A small business’s physical assets usually include computers,
printers, copiers, tablets, and phones. All IT equipment must be disposed of correctly if you are
to preserve the confidentiality of your data. Third-party services are available to wipe hard
drives and eliminate any residual information on your IT equipment before it is thrown out. You
may be surprised to discover even a copier or a fax machine may contain confidential documents
within its hard drive. Thus, these machines also need to be disposed of carefully. Often, the
hard drives can be shredded so important company data is not compromised. Refurbishing
companies often accept old IT equipment, as long as it is still functioning. This can be an
excellent way to recapture some value from the IT equipment without having to sell it or worry
about it falling into the wrong hands. These companies wipe out the hard drives and fully restore
the equipment before reselling the items.
7.4.1 Recycling
Recycling assets is an excellent way to support the environment and remove your
company’s old assets. Contacting companies who perform recycling of electronic equipment
will educate you as to both your responsibilities and what you can expect from their services. If
you want to ensure the safety of your data, remove hard drives for shredding beforehand.
Another method for recycling assets involves using the components of older equipment within
other machines or simply breaking the equipment down for raw materials.
7.4.2 Tracking
assess your physical assets on a regular basis and to properly dispose of any and all obsolete
equipment quickly.
Below mentioned are the some of the commonly used security devices worldwide.
o Smart Locks
o Control Panel
o Keypads
o Sensors
o Motion Detectors
o Smoke Detectors
o Security Cameras
o Key Fobs
It doesn’t seem like the most high-tech part of the security system, but it can be. Smart
locks are all the rage these days. Some tie into a larger home security setup, while others work
nicely alone—or at least in conjunction with a Smartphone or other web-enabled device. When
choosing a smart lock, consider the size of the lock, the functionality, and of course, the price.
If this is going to be a high-tech system, it’s going to need a brain. The control panel
monitors the activity from the various components that you’ll see on this list. Once something
like a sensor or camera is triggered, the control panel can notify you or a monitoring company
(if you have that option). While not all of the products on this list require a control panel, it does
tie together a complete system. There are plenty of hardwired and wireless options. ADT has
specific control panels that can tie into other products and the company’s 24/7 monitoring service.
Elk has the M1, a control panel that’s designed to work with several third-party systems. Honeywell
also has a slew of its own options, including the pictured VISTA-21iP, which provides up to 48
zones of protection.
111
7.4.2.3 Keypads
If you’re going to have a control panel, you’ll need ways to access it. Sometimes, running
down to the main control panel isn’t convenient—or safe. Instead, you can add keypads
throughout the house so the system can be accessed almost anywhere. Of course, you probably
wouldn’t need one inside the bathroom, but having one in the garage and another in your
bedroom will allow you to arm and disarm the system, check the status, or alert the monitoring
company at a moment’s notice. There are plenty of keypads for the DIYer, but every professionally
installed system also has its own selection of keypads.
7.4.2.4. Sensors
There are several different types of sensors. These are basically “switches,” which can
trigger the alarm system in case of an emergency. Some sensors are designed to alert the
system when a door or window has been opened. Some can even alert you to breaking glass or
when water is present in a place where it shouldn’t be present. Once a sensor is triggered, it
can alert your system to sound an alarm, send a text message, or even notify authorities. In
some cases, the sensor can trigger cameras to start recording. Despite being the smallest part
of a security system, sensors are the most crucial. Just be aware that some sensors do require
wiring knowledge to be installed and/or integrated into a whole-house system. Of course, there
are easy alternatives like the pictured Swann Magnetic Window/Door Alarm, which doesn’t
require wiring and operates like a stand-alone security device with its own built-in audible alarm
What happens if an intruder slips past those window and door sensors? You may want
to think about a motion detector. This is very similar to a sensor, except that it detects motion
and body heat. Pets can actually trigger some motion sensors, so you may want to take that
into consideration when buying one. (In other words, a few extra bucks could save you a lot of
chest pains.) However, if you don’t have a pet or need an inexpensive alternative, Belkin’s
WeMo Switch + Motion makes for an affordable ($79.99), easy alternative. Just plug in the
device and pair it with the lamp and the free WeMo app. Users can set up the system to turn on
a light, fan or other device once motion is detected. The system can also send out alerts,
making it a nice compliment for a web-enabled camera.
112
Smoke detectors aren’t just convenient; they’re also required by law. They can even be
pretty high-tech. If the smoke detector is tied into a security system with monitoring, you can get
a super-speedy response from police and fire departments. The newly released Nest Protect
doesn’t work with larger security systems, but it does work with the Nest thermostat and a
variety of web-enabled devices. The combination smoke and carbon monoxide alarm also has
audible alerts, the option to silence the alarm with the wave of a hand, and a Path light feature
for lighting your way in the middle of the night.
Cameras have become a vital part of the home security setup. After all, who doesn’t
want a peek at their home while away from home? There are plenty of hardwired options, but
stand-alone, web-enabled cameras have recently become a very popular security option. Both
the Drop cam HD and Samsung’s upcoming Smart Cam HD PRO offer an easy alternative.
Just place the camera wherever you want it, plug it in, connect it to your home network, and you
can get a live peek at your property from any device with a web connection. Some stand-alone
cameras even offer cloud-based storage for a small monthly fee.
This tiny device may not seem as essential as the others on our list—until your
Smartphone runs out juice, anyway. A key fob is a tiny device with built-in access to your
security system. No web connection is needed. Instead, it has limited access built into a something
that can double as a keychain. It’s also a nice backup plan or even an easy way to give someone
limited access to your home security system. Key fobs are also very easy to store in the glove
compartment or in a kitchen drawer. The one pictured is Vivint’s key fob, which allows users to
arm and disarm the security system, as well as call the monitoring station, all without having to
enter the home.
an emergency action plan to guide everyone in the workplace when immediate action is
necessary. Planning in advance helps ensure that everyone knows what to do when an
emergency occurs.
An emergency action plan (EAP) is intended to facilitate and organize employer and
worker actions during workplace emergencies and is recommended for all employers. Well-
developed emergency plans and proper worker training (i.e., so that workers understand their
roles and responsibilities within the plan) will result in fewer and less severe worker injuries and
less damage to the facility during emergencies. A poorly prepared plan may lead to a disorganized
evacuation or emergency response, resulting in confusion, injury, illness (due to chemical,
biological and/or radiation exposure), and/or property damage.
If a business is required to have an EAP, the plan must include a way to alert workers,
including disabled workers, to evacuate or take other action. These standards require:
1. Employers to ensure that alarms are distinctive and recognized by all workers as a
signal to evacuate the work area or perform actions identified in the plan; and
coordinator is and understand that the coordinator has the authority to make decisions during
emergencies.
1. Assessing the situation to determine whether an emergency exists and if so, requiring
activation of emergency procedures;
3. Ensuring that external emergency services, such as the local fire department or
emergency medical service, are available and notified when necessary; and coordinating these
services when they arrive on site; and
6. Ensuring that routes for emergency vehicles and paths for emergency responder access
are clear;
7. Informing arriving emergency responders of the incident location, conditions, and status
of occupants; and
Most buildings these days incorporate RFID badges in some capacity. The badges, which
contain two crucial pieces of information – the site code and the individual badge ID –, allow
employees to swipe their card in close proximity to a scanner in order to gain access to certain
areas.
Video surveillance has been around for quite some time now, but it has improved drastically
since its inception. Video surveillance is now sophisticated enough to incorporate facial recognition
and higher quality cameras are creating footage that is sharper than ever.
116
No longer do we need to rely solely on walls or fences for guarding a facility’s perimeter,
thanks to the advances in perimeter monitoring systems. Some systems now use microwaves
or radio waves to establish a perimeter and can alert security teams when the protected area is
being encroached upon.
Striking a balance between being both accurate and non-invasive, iris recognition now
allows security teams to identify people based solely on the pattern of their eye.
There’s something to be said for a good, old-fashioned pair of eyes. With the use of RFID
cards and outsourced access systems, the human element of security is being lost. Knowing
who has been coming into the building for years – or perhaps noticing that a person is using
someone else’s photo ID badge simply because their face isn’t the one on the card – are things
a machine can’t do, but a human can.
It’s not uncommon these days to have security systems – especially home security systems
– linked to a mobile device. Smart sensors, wireless deadbolts, and remote control security/
utility systems can all be controlled by a user’s mobile device.
Fingerprint scanning not only ups the level of security at an access point by requiring
identification that is unique to each person, but also allows security systems to keep track of
who is entering the facility.
Part of the advancements that have been made in video surveillance is facial recognition
coding. Facial recognition has become so advanced that it can not only be used to verify that
somebody is who they say they are, it can also be used to pick a person out of the crowd and
even determine if they’re up to no good.
117
Some alarm systems serve a single purpose of burglary protection; combination systems
provide both fire and intrusion protection. Intrusion alarm systems may also be combined with
closed-circuit television surveillance (CCTV) systems to automatically record the activities of
intruders, and may interface to access control systems for electrically locked doors. Systems
range from small, self-contained noisemakers, to complicated, militaries systems with computer
monitoring and control. It may even include two-way voice which allows communication between
the panel and Monitoring station.
The most basic alarm consists of one or more sensors to detect intruders, and an alerting
device to indicate the intrusion. However, a typical premises security alarm employs the following
components:
Premises control unit (PCU), Alarm Control Panel (ACP), or simply panel: The “brain” of
the system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In modern
systems, this is typically one or more computer circuit boards inside a metal enclosure, along
with a power supply.
7.8.2. Sensors
7.8.2.1. Devices which detect intrusions
Sensors may be placed at the perimeter of the protected area, within it, or both. Sensors
can detect intruders by a variety of methods, such as monitoring doors and windows for opening,
or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances.
118
These indicate an alarm condition. Most commonly, these are bells, sirens, and/or flashing
lights. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially
scaring off burglars. These devices may also be used to warn occupants of a fire or smoke
condition.
7.8.2.3. Keypads
Interconnections between components. This may consist of direct wiring to the control
unit, or wireless links with local power supplies.
In addition to the system itself, security alarms are often coupled with a monitoring service.
In the event of an alarm, the premises control unit contacts a central monitoring station. Operators
at the station see the signal and take appropriate action, such as contacting property owners,
notifying police, or dispatching private security forces. Such signals may be transmitted via
dedicated alarm circuits, telephone lines, or the internet.
Summary
Physical security describes security measures that are designed to deny unauthorized
access to facilities, equipment and resources and to protect personnel and property
from damage or harm (such as espionage, theft, or terrorist attacks).
A perimeter is the fortified boundary of the network that might include the following
aspects: Border routers, Firewalls, IDSs, IPSs, VPN devices, Software architecture,
DMZs and screened subnets.
Sensors may be placed at the perimeter of the protected area, within it, or both.
Sensors can detect intruders by a variety of methods, such as monitoring doors
and windows for opening, or by monitoring unoccupied interiors for motion, sound,
vibration, or other disturbances.
119
Reference
1. ”Chapter 1: Physical Security Challenges”. Field Manual 319.30: Physical Security.
Headquarters, United States Department of Army. 2001
2. Garcia, Mary Lynn (2007). Design and Evaluation of Physical Protection Systems.
Butterworth-Heinemann. pp. 1–11. ISBN 9780080554280.
3. ”Chapter 2: The Systems Approach”. Field Manual 319.30: Physical Security.
Headquarters, United States Department of Army. 2001.
4. Anderson, Ross (2001). Security Engineering. Wiley. ISBN 9780471389224.
5. For a detailed discussion on natural surveillance and CPTED, see Fennelly,
Lawrence J. (2012). Effective Physical Security. Butterworth-Heinemann. pp. 4–
6. ISBN 9780124158924.
6. Task Committee; Structural Engineering Institute (1999). Structural Design for
Physical Security. ASCE. ISBN 978-0-7844-0457-7.
7. Baker, Paul R. (2012). “Security Construction Projects”. In Baker, Paul R.; Benny,
Daniel J. The Complete Guide to Physical Security. CRC Press.
ISBN 9781420099638.
8. ”Chapter 4: Protective Barriers”. Field Manual 319.30: Physical Security.
Headquarters, United States Department of Army. 2001.
9. Talbot, Julian & Jakeman, Miles (2011). Security Risk Management Body of
Knowledge. John Wiley & Sons. pp. 72–73. ISBN 9781118211267.
10. Kovacich, Gerald L. & Halibozek, Edward P. (2003). The Manager’s Handbook for
Corporate Security: Establishing and Managing a Successful Assets Protection
Program. Butterworth-Heinemann. pp. 192–193. ISBN 9780750674874.
120
PAPER-III
Section-A
1. What is CIA?
3. Explain MITM.
5. What is a policy?
9. Define Risk.
Section-B
a) Standards b) Guidelines
SECTION – C
2. What are the three tiers of Information security policies? Discuss in detail about
enterprise information security policy.