Inf 407 Course Note
Inf 407 Course Note
A Computing environment in every organization, is made up of components which enable the organization
to sustain competitive advantage over its competitors.
People
Activities
The figure above depicts a computing environment in which there is interacting between each components
with itself and the other components within the information system (environment). For instance people can
interact with people, likewise people can interact with other components. For example, an information
owner hiring a security administrator to manager the security of a given information resource, and likewise
when an information owner authorizes a given activity to be performed on a given Data resource using a
given technology.
In our earlier study of information system we were made to understand the various components an
information system. In order to secure an organization information system, the various resources/
components that make up a computing environment need to be properly protected. Securing an
organization is achieved by securing its computing environment.
1
1. People Security
The figure shows that an information system consist of five components – people (human),
activities(process), technology, data and network. The figure depicts that the security of information system
is said to be the security of all its components: The security of its people, the security of its activities, the
security of its data, the security of its technology and the security of its network.
Activities such as procedure or policies are essentially implemented to explain and define to computers
how to interact with the rest of the components in the computing environment in order to achieve its
security objectives.
Literatures over the past, uses the terms information security, information system security, computer
security and information assurance interchangeably. No matter how these terms are used interchangeably,
what really matters is if it aim at protecting the confidentiality, integrity and availability of information in
the computing environment. Information security means protecting information from unauthorized
interactions. Interaction includes access to the information and its use, disclosure, Disruption, modification
or destruction.
Information security is achieved by implementing managerial, operation and technical controls that deliver
information confidentiality, information integrity and information availability.
An organization computing environment can be protected by protecting all the components. It can be done
by the following. We have:
1. PERSONNEL SECURITY – Information Security is the result of the work of people, processes, and
activities. If a good security mechanism is not employed by security staff, it gives rise to insecurity and
failure. In order to prevent insecurity in an organization, there is need to prescribe personnel security.
WHAT IS PERSONNEL SECURITY? Personnel Security simply refer to those practices and tools that are
accepted and adopted by the human resources unit to ensure that personnel security safeguard are applied.
(i) Qualification Assurance: Making sure the employees hired matches both the specification of the job and
the security clearance for the job.
(ii) Screening assurance: Screening and background check of candidates have to be conducted thoroughly
to make sure that candidates with history of poor behavior cannot infiltrate into system
(iii) Authorizing of process: This consists of granting or taking away physical or system access privileges
at the time of hiring, or at the termination of his or her duties. All privileges of an employee’s system
access may be granted, or revoked following a formal and auditable process.
(iv) Security training: Security training programs are made available to employees in accordance with the
security requirements of their position.
(v) Nondisclosure agreements: All employees who are involved in security matters have to sign
nondisclosure agreements appropriate to their positions. The nondisclosure agreements have to be signed
by all individuals who need access to sensitive/confidential information, prior to granting access to that
information.
3. INFORMATION SECURITY: As previously stated, data is defined as all basic/raw facts that are
process into information. Information is in simple terms referred to as processed data (i.e data that have
been processed). Information describes the meaning and interpretations that users associate with these
facts. Information security is the protection of information resources against unauthorized access.
Conceptual resources, such as programs, data and information can properly secured by the use of password
and digital certificates. With the unsure state of password usage, especially not knowing who enters the
password. Digitals certificates and biometric techniques can be employed to authenticate the user and
control access to authenticate the user and control access to information resources, but security can still be
compromised due to violations such as eavesdropping.
Digital certificate, similar to identification cards are electronic credentials that are used to certify the online
identities of individuals, organization, and computer. They are issued by recognized authority/government.
3
4. TECHNOLOGY SECURITY: Technology entails the use of both software and hardware to support to
an organization. If software and hardware are compromised, then their function is also said to be
compromised. And this will weaken the organization and its security will be compromised.
5. NETWORK SECURITY: A Network is the connection of two or more devices - such as computers,
router, switches etc for the purpose of communication and sharing of resources. Network security is the
protection of an organization networks and their services from unauthorized modification, destruction, or
disclosure.Its main aim is to provide assurance such that the network is performing critical security-related
functions and has not been compromised in any way.
Adequate security measures need to be attached to workstation on the network, because they may contain
malicious data which might attack other computer on the network. Devices such as router, switches, hubs
and other network equipment should be properly check, because they may be used as an access point to
your network.
SECURITY INTERDEPENDENCE
Information System components such as people security, activities, data, technology and network security
are not independent of themselves, but they are interdependent. i.e depend on each other. For example one
cannot secure a network without securing its resources (data, technology, people or activities), all
components are interrelated. Personnel security requires the services of a network administrators to assign
to he or she a security clearance. Computer hardware and operating system need to be properly checked so
as to secure the network.
WHAT IS SECURITY? Security is, on a general perspective defined as the quality or state of being
secured (being free from danger). Security can in order words be defined as protection against adversaries
from those who would do harm, intentionally or otherwise.
WHAT IS INFORMATION SECURITY? Information Security can be defined according to the committee
on National Security System (CNSS) as the protection of information and its critical elements including the
system and hardware that use, store and transmit information. Information Security protects the
confidentiality, integrity and availability of information asset whether in storage, processing or
transmission. It is achieved via the application of policy, education, training and awareness, and
technology.
Information security includes the broad areas of information security management, computer and security,
and network security. The CNSS model of information security, evolved from a concept developed by the
computer Security Industry called C.I.A triangle. The C.I.A has been the industry standard for computer
security since the development of the mainframe. It is based on three characteristic of information that
gives value to organizations: Confidentiality, integrity and Availability.
4
THE CIA TRIAD
Information classification
Security documents storage
Application of general security policies
Education of information custodians and end users
For example, in order to protect the confidentiality is said to protect the confidentiality of your Social
Security Number in an online session the transmission of your Social security Number has to be encrypted
2. INTEGRITY: Information is said to have integrity when it is whole, complete and uncorrupted. The
integrity of information is threatened when the information is exposed to corruption, damage, destruction
or other disruption of its authentic state. Corruption can occur while information is being stored or
transmitted. Most computer viruses and worm are designed with the explicit purpose of corrupting data.
Virus infection can also lead to corruption of information if a file of its record is modified or deleted.
1. AUTHENTICITY: Authenticity of information is the quality or state of being genuine or original, rather
than a reproduction or fabrication. Information is said to be Authentic when it is in the same state in which
it was created, placed, stored, or transferred. Authentication is a mechanism designed to verify the identity
of an agent, human or system before access is granted. Authentication process usually requests a user ID
and password. It is necessary for effective security management. It may also be implemented with the aid
of smart cards, public key infrastructure, or biometrics.
2. NON- REPUDIATION: Non- Repudiation generally refers to a party’s intention to fulfill accepted
obligations. Non- repudiation in information simply implies that both ends of a transmission cannot deny
their involvement in a particular transmission. Meaning the sender of information cannot deny sending it
and the recipient cannot deny receiving if in fact received. Digital signature may be used to enforce non-
repudiation on the internet.
5
RISK MANAGEMENT
Risk is the probability that something unwanted will happen. Risk can also be defined as the chance that
some undesired events; such as information leakage, information corruption or denial of service, would
take place and produce based consequences that are associated with financial losses. Risks are usually links
to opportunities, threat agents might see link in exploiting asset vulnerabilities. Organization must
minimize risk to match their risk appetite – i.e the quantity and nature of risk, they are willing to accept.
For a given asset, if the security risk is smaller than its tolerant risk, no security control will be adopted to
protect it. For an asset with a security risk higher than its tolerated risk, you should not invest in more
security controls than are needed to reduce current risk down to the asset’s tolerated risk.
Risk have to be identified, assessed and mitigated by a group of people (including – information owners,
business experts, and security experts.
Risk Management is the process of identifying vulnerabilities and threats to the information resources used
by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in
reducing risk to an acceptable level, based on the value of the information resource to the organization.
Risk Management is a sequential process that starts with the identification of risk, then risk assessment and
finally, risk mitigation by selecting the appropriate security controls. Risk is identified by identifying
threats and asset vulnerabilities, it is assessed by studying the effect of the threats on those assets; and it is
mitigated by recommending security controls measure that can reduce current risks to acceptable level.
6
1. Authenticity: Authenticity of information is the quality or state of being authentic. And information is
said to be Authentic when it is in the same state in which it is created, placed or transferred. Authenticity is
aimed at ensuring the origin of the transmitted document is valid.
?this information is not useful to you, receiving a message or a warning written in a foreign language that
you cannot read is breach of utility. Utility of information is the quality or state of having value for some
purpose. Information have value when it can serve a purpose.
SECURITY CONTROLS
In terms of security control, it is understood that there are thousands of different attacks, and there are also
thousands of ways we can counter such attack. Most times such attacks remain undetected and un-
countered, but there are many known countermeasures that can be deployed to secure the target assets. A
risk-driven security program is usually written in terms of three different sets of security controls. They
include: Managerial Security Control, Operational Security Controls and Technical Security Control.
1. MANAGERIAL SECURITY CONTROL: It focuses on the management of the information system and
the management of risk for a system. There are techniques and concerns that are normally addressed by
management. They include the following Managerial Security Controls:
Risk assessment
Planning
System and Service acquisition
Certification, accreditation and security assessment
2. OPERATIONAL CONTROL: This addresses security methods that focuses on mechanism which are
basically implemented and executed by people (as opposed to systems). These set of controls are put in
7
place to improve the security of a particular system (or group of systems). They do require technical or
specialized expertise. The following are operational security controls.
Personnel Security
Physical and environmental protection
Contingency planning
Configuration management
Maintenance
System & information integrity
Media protection
Incident response
Awareness and training
3. TECHNICAL CONTROLS: Focus on security controls that the computer system executes. The control
can provide automated protection for unauthorized access or misuse, facilitate detection of security
violations and support security requirements for applications and data. This control uses software and data
to monitor and control access to information and computing systems. For example, passwords, network –
and – host –based firewalls, network intrusion detection system, access control list and data encryption are
logical controls. The following are examples of Technical Control:
Personnel security
Physical and environment protection
Contingency planning
Configuration
1. Security
Planning
8
6. Continual
The Information Security Life Cycle
The figure above (information Security Life Cycle) shows how the security of an information asset is
achieved. The security is initially planned in terms of the asset security policy, its scope, its security
objectives, a limited preliminary impact analysis, and a limited risk analysis. And once the plan is defined,
the security of information asset is analyzed to define its security requirements.
The basis of the security requirements are established from information about the level of impact the asset
has on the organization’s mission and also on information generated through thorough risk assessment of
the asset. Security analysis often requires information on current threats, current security controls, and asset
vulnerabilities and their exposure. Once the initial set of security requirements are obtained, the design of
the information asset is carried out. Security design stage conducts a more detailed risk-driven security
assessment in order to obtain information on the design of a feasible risk-driven security program. After the
security design is ready, the design of the risk-driven security program is ready for implementation.
And once the security program has been designed and implemented. The security review process has to
start. The security review process consist of the certification, accreditation, and authorization of the
security program is authorized.; Security audit may take place in a periodic manner.
The final process of the security Life cycle is the continual security process, where the security of
information asset is continuously monitored. If risk changes, then corrective actions have be taken to
restore the security of the asset to its accepted state, as prescribed in its security policy. However, if
changes occur in the security objectives, security policy and computing environment, that would
necessitate a new scope for the security of the asset (meaning a new security planning phase is started).
1. SECURITY PLANNING
The security planning process is the foundation on which the development of a security program rest; it
should not be skipped, but should be initiated and approved by the organization’s top management and it
has to satisfy the corporate security policy and constantly remain aligned with the organization’s strategic
plan.
The security policy of an information asset contains a detailed description of the acceptable behaviour of
the asset and any deviation from such behavior is a violation of the asset security policy.
The following are steps needed for planning the security of the information asset throughout the entire
security life-cycle project.
(i) Asset definition
(ii) Security Policy
9
(iii) Security objectives
(iv) Security scope
(i) Asset definition – The identification and definition of asset is the first step to be considered in security
because in order to protect the information asset, we need to identify the information asset for which an
approved budget is made. The corporate security policy identifies the information assets that are to be
secured. There are basically two approaches used in the initial identification of the information asset that
are candidates for a security project: Project- based approach and Objective-based approach.
In a problem-based approach, an information asset may be identified as a candidate for a security project if
it (asset) has been involved in an undesired incident that has been blamed compromising one of the security
objectives of the organization or one of its information systems – Confidentiality, Integrity or availability.
The identified information asset has become, if it is not adequately protected, its business mission will be
compromised. The Objective-based approach for asset identification is based on top management or
executive directives. Security project for any information asset in an organization, in real life, will be
initiated of preempting malicious attack, we would be waiting until an undesired event occur, before
planning a corrective action. Detecting undesired incidents, planning a response and recovering from the
resulting damage caused by discovered undesired incident may be considerably more expensive and riskier
than initiating a security project to protect the information asset.
Assets within the computing environment are being identified by most literatures, as information asset,
software asset, physical asset and people. Information asset include data/information and data stores (files,
database etc.). Software assets include any version of computer programs. Physical assets include any
tangible asset in the organization. People include employees, users, customers and partners. An
information asset is always associated with people, activities, data, technology and networks.
(ii) Security Policy – The security asset of an organization should define the acceptable asset interaction
with the rest of the components in the computing environment. For example, the security policy defines
which users and processes are authorized to access the information asset, and once granted access, it
defines the operations they are authorized to perform. The security of information asset can only be
achieved with strict enforcement of its security policy. And any violation of the information asset
undermines its business value-generation capability. If an unauthorized user succeeds in accessing the
information asset; its security will be compromised, if an authorized user accesses the information asset
and performs an unauthorized activity.
All members of the security planning team have to understand the security policy of the information asset
for which a security project is initiated. Likewise the security requirement of an information asset cannot be
defined by staff members who do not fully understand the working of its security policy.
(iii) Security Objective –The most common security objective set for the security of an information assets
are simply those security objectives (goals) defined on the security star model, discussed earlier. (i)
Confidentiality, ii Integrity, Availability, Authentication and Non –Repudiation. These security objectives
may further be tailored to the security policy of the information asset, on how much availability is
sufficient to maintain an acceptable business – value- generation capability for an information asset? And
under what conditions should non – repudiation be verified in order to achieve the business goal set for an
information asset? The security requirements for an information asset also depend on its security
objectives.These requirements will obviously change if we drop old security objective, add a new one or
10
modify an existing one. And it is important that these security objectives be closely linked to the business
security mission of the information asset and should also be well defined.
Any incompleteness in their definition will translate into deficient security requirements that will lead to
inadequate security for the target information asset
(iv) Security Scope – The scope of the asset security project simply defines the security depth and breadth
of the project. The scope defines the depth of the security design and the breadth of the security
requirements that must be addressed in order to achieve the security objectives set for the information asset.
It is understood that not all security requirement can be met, but enough should be satisfied to establish the
acceptable security risk level established by the asset security policy.
There are also some other constraints that influence the definition of the scope of the security project for an
information asset. This project has to respect budget constraints and any feasibility conditions established
by the project feasibility study. A preliminary impact analysis for an information asset defines its criticality
in terms of any impact on confidentiality Integrity, availability, authentication and non – repudiation. For
example unauthorized disclosure, modification or destruction could be expected to have limited, serious or
severe adverse effect on organizational operation and assets.
The preliminary impact analysis indicates the level of impact the target information asset has on the
organization’s business mission. In addition to the preliminary impact analysis, preliminary risk assessment
may be needed to prioritize security tasks constituting the scope of the security project. A preliminary risk
analysis defines the threat environment in which the target information asset operates. This risk assessment
activity will guide the security planning team in defining a scope that is sufficient to provide for the
protection of operational environment.
2. SECURITY ANALYSIS
The objective of security analysis in a security life cycle is to define the security requirements needed to
adequately project the target information asset. And the security requirements should reflect on the results
of risk to the confidentiality, integrity and availability of the system and its information.
The security analysis of an information asset phase basically start with simple questions such as, Why is
Security needed for this asset? The security of information asset is obviously required to: first enforce the
corporate security policy so as to protect the organization’s business mission and secondly, to enforce the
asset security policy to make sure the security of this asset is not compromised in any way that threatens
the overall business value-generation capability of the organization. For example, what are the valuable
components of the information asset that are require protection? What are the threats to the information
asset? How is this asset vulnerable? What are the risks or threats that can cause harm to the asset,
considering the asset vulnerabilities and the resulting impacts of the damage? What are the acceptable risks
for the information asset? Finding answers to these questions might be time consuming, depending on the
complexity of the asset, and might be costly or even infeasible. Security analysis is a huge investment for
the organization. It includes assessing the threats and risks, managing the risks, and revising or establishing
a security policy for the information asset. Security analysis identifies existing and potential threats that
may affect the information asset and estimates the risk that these threats will compromise the security of
the information asset and harm the organization.
[NOTE: The security analysis phase produces the security requirement needed to protect the target
information asset]
The outcome of the security analysis should always be the security requirements of the target information
asset, which defines the appropriate level of protection required, and the security program, which consist of
11
cost-effective and feasible controls. Any security analysis methodology adopted by an organization should
include at least the following activities mentioned below.
1. Asset analysis: The asset has to be studied in terms of its acquisition cost, operating cost, maintenance
cost, its benefit and its contribution in generating business value of the enterprise.
2. Impact analysis: Estimating the potential harm that might be inflicted on the asset as well as the resulting
impact level on the information asset and the organization if the threats occur.
3. Threat analysis: Identifying and defining threats to the target information asset, and estimating their
likelihood of occurrence (how likely they would occur). Threats are usually organized into two main
category – natural and man-made threats. Man-made may be done accidentally or intentionally.
4. Exposure analysis: This deal with analyzing the level to which an information asset is exposed to threat.
5. Vulnerability analysis: Analyzing asset vulnerabilities and estimating asset exposure levels. In
estimating the current risk position of the organization, one needs to identify system vulnerabilities and the
current security controls that are in place. Information asset vulnerability describes a characteristics of
weakness in an asset or one of its components that tends to support the occurrence of a threat.
6. Analyzing current security control that will in determining whether or not adequate protection against
specific threat is in place. Estimating the effectiveness of the current security controls. Identification of
existing security controls for each asset, threat impact scenario. Once the appropriate asset vulnerabilities
and security controls are identified, the effectiveness of existing security control need to be assessed in
order to get an estimate of the risk level associated with each (asset, threat, impact, exposure,
vulnerabilities existing security controls) scenario.
7. Risk analysis: Measuring the risk using exposure rating, asset vulnerabilities and the effectiveness of
current security controls. Risk can be defined as a measure indicating the likelihood and consequences of
threats events or undesired events that could compromise the security of the information asset considering
the asset vulnerabilities and given the effectiveness of existing security control. The outcome of this
process should indicate to the organization, the degree of risk associated with the target information asset.
8. Security Requirement: Defining the security requirements to use in designing the security of the
information asset. The security requirement section is the last step in the security analysis phase.
(i) defining the target information asset of the security project
(ii) identifying existing threats and estimating their likelihood.
(iii) estimating impacts and impacts levels for the information asset
(iv) estimating asset exposure based on threats likelihood and impact.
(v) estimating asset vulnerabilities
(vi) estimatinglevels of effectiveness for the existing security controls.
(vii) estimating risk levels based on threat likelihood, threat vulnerabilities
3. SECURITY DESIGN: Security Design phase is aimed at devising security to meet the security
objectives defined for the target information asset. The five security objective as earlier stated in the
security star model ( Confidentiality, Integrity, availability, authentication and non-repudiation with these
security objectives, we can then design a risk-driven security program that consists of a variety of security
controls that are cost effective and can collectively provide for the security of the information asset. The
security design activity consist of five security desk task
(i) Security design for Confidentiality
(ii) Security design for integrity
(iii) Security design for availability
(iv) Security design authentication
12
(v) Security design for Non-repudiation
And the security design activity are performed based on the outcome (information) obtained from the
security analysis phase of the security life cycle, such as
(a) information about the information asset
(b) information about current threats
© information about impacts and impact level
(d) information about asset security expose levels
(e) information about asset vulnerabilities
(f) information about the effectiveness of existing security controls
(g) information about security risk level.
i. Risk Mitigation: This process is aimed at reducing the security of the asset to its acceptable risk level as
specified in its security policy. Risk mitigation may be performed by selecting the most appropriate
security controls that is capable of reducing the asset security risk. In determining the security controls that
need to be selected for risk mitigation, we absolutely have to compute the current risk position of the
information asset. The basic risk of the asset is the current risk of the asset before any new security controls
for risk mitigation have been implemented.
The process of selecting security controls for an information asset needs to put into account the
effectiveness of the security control and their cost implementation and also other factors such as the
corporate security policy, legislation and regulation, safety and regulation, safety and reliability
requirement, technical requirement. And a security control that would reduce the basic risk for the asset to
a risk level that is still above the accepted risk level of the asset security policy should not be selected.
As soon as the security program is devised for the purpose of mitigating the asset risk below the acceptable
risk level of the asset, it still have to be approved by the top management before it is accepted for final use.
13
Even the low level staffs (operation level) are trained in physical security matters related to the operations
of the information asset.
iv. Design of the Risk-driven Security program. At this point, a fully documented program with
recommended security controls, its security policy, identified security threats, the effectiveness of current
security controls, asset vulnerability levels and exposures, and basic risk level is being compiled, which is
capable of mitigating basic risk levels below the asset’s accepted level specified in the asset security policy.
All steps that lead to the selection of the security controls can mitigate basic risk level below the
information asset’s accepted risk level specified in the asset security policy, have to be fully documented
4. SECURITY IMPLEMENTATION: This phase basically consists of the implementation of the risk-
driven security program. The risk-driven security program is designed and approved by top management
official. The authorization of the security program is only determined after it is certified (certification) and
accredited (accreditation). This phase (implementation phase) must ensure both usability and sustainability
of the security program. The security implementation staffs should discontinue the implementation process
if the security-tested mechanism found incomplete or vulnerable.
5. SECURITY REVIEW
The security review phase consists of two main steps.
1. Security review for authorization
2. Security auditing
This phase ensure that the authorizing official and asset owners have to agree on the proposed program. In
this phase, the authorizing officials and the system owners are authorized by top management to administer
the certification and accreditation steps needed before the information asset can operate.
The security certification phase aims at determining the extent to which the security controls in the
information are implemented correctly, operating as intended and producing the desired outcomes. And
when the certification and accreditation steps are completed, the information asset owner will either have
authorization to operate the information asset, a provisional authorization to operate the information asset
under specific terms and conditions, or a denial of authorization to operate the information asset.
The authorizing officials are assigned by the upper management to review the information that is needed
from the security certification to determine the risk to asset operations, and which enable the official to
arrive at an appropriate security accreditation decision for the information system. The accreditation step
will determine if the remaining known vulnerabilities in the information asset pose an acceptable level of
risk to asset operation and the organization.
CONTINUAL SECURITY:
The Continual Security phase consists of continuous monitoring activities intended to ensure that the
security risks stay at the accepted levels and that if the effectiveness of current security controls diminish
and cause the accepted risk level to be violated, corrected action are planned to bring the risk levels to their
accepted levels
14
Continual security can be achieved through the following steps
(i) Configuration management and control
(ii) Monitoring of security controls
(iii) Monitoring of the computing environment for any changes
(iv) Reporting of changes and documentation
The purpose of the continual security phase is simply to monitor the security controls in the information
asset on a continuous basis and informing the authorized officials and the asset owner when changes that
may impact negatively on security of the asset and the organization occur. The activities in this phase are
performed continuously throughout the security life cycle of the information asset.
The following activities are carried out in this phase:
Periodic assessment of risk – magnitude of harm that could result from unauthorized access, use,
disclosure, disruption, modification or destruction of information and information systems.
Periodic review of policies and procedures that are based on risk assessments, cost-effectively reduce
information security risk to acceptable level and ensure that information security is addressed
throughout the security life cycle of the information asset.
Security awareness training to inform personnel of the information security risk associated with their
activities and their responsibilities in complying with organization’s policies and procedures designed
to reduce these risks
Periodic testing and evaluation of the effectiveness of information security policies, procedures,
practices. And security controls to be periodically performed
A process for planning, implementing, evaluating and documenting remedial actions to address any
deficiencies in the information security policies, procedures, and practices of the agency
Procedures for detecting, reporting and responding to security incident
BUSINESS CONTINUITY
WHAT IS BUSINESS CONTINUITY? Business Continuity is the ability of an organization to respond to
disaster or business disruption through the timely detection of disruption event, the accurate measurement
of risk and business losses, and the efficient resumption of business operations.
According to the National Fire Protection Association (NFPA), Business continuity is an ongoing process
support by senior management and funded to ensure the necessary steps are taken to identify the impact of
potential losses, maintain viable recovery strategies, recovery plans and continuity of service.
This definition of Business continuity requires management to fund and support the business continuity
effort. The continuity process is an ongoing process that keeps track of all possible losses and their impacts
on the organization. The Continuity process is also responsible for maintaining viable safeguard capable of
facilitating an effective and quick recovery and ensuring continuity of business services.
DISASTER RECOVERY: Disaster Recovery is the activity of resuming computing operations after a
disaster such as floods, serene storms, or geologic incident takes place. Restoring the computing
environment is achieved through the duplication of computer operations. The quality of disaster recovery
can be evaluated by the organization’s ability to recover information system quickly after disaster.
The scope of design of a disaster recovery plan depends on many factors which includes; the type of
incident. Data affected and business losses.
15
The world trade center attack in New York in 2001, can attest to the fact that recovery plans depends on
many factors such as the type of incident, data affected and business losses. Recovery has been slow and
very costly. Some business are still recovering others are yet to recover, and some cannot be recovered.
4. CORRECTIVE SAFEGUARD: For corrective action to be initiated, we need to gather all the
information needed about the current attack, the business components that have been attacked and the
damage caused to them. As soon as these information have been gathered, the following activities can be
initiated.
(i) Rank affected business components in terms of criticality
(ii) Rank affected business components in terms of damage extent
(iii) Identify alternate corrective action
(iv) select the most feasible alternate correction safeguard
16
(v) Apply the selected corrective actions to the selected business components
CONTINGENCY PLAN – Establish policies and procedures for responding to an emergency (i.e fire,
system failure, natural disaster, e.t.c), that damages the system. Contingency plan includes three mandatory
implementation specifications.
(a) Data backup plan – develop procedures to maintain retrievable, exact copies
(b) Disaster recovery plan – procedure must be established to restore any loss of data
© emergency mode operation plan – establishing procedures to protect the security of the system while
operating in an emergency mode.
17
Radiofrequency(RF) weapons, which are a series of smooth radio waves causing the target to generate heat
and burn up
Transient electromagnetic device (TEDs) – characterized by emission of a large burst of energy that targets
a large spectrum of space. It can be the size of a briefcase, van, or a large satellite dish.
Electromagnetic bomb/ pulse weapon, which involves the creation of an electromagnetic pulse, that is, an
electromagnetic shock wave that creates an enormous current many times that of a lightning strike
TEMPEST monitoring devices.
Computer virus, logic bombs and Trojan horse
Denial of service (zombie) attack send an overload of e-mail to the target system, causing the system to
crash.
Hackers use a variety of means to further their agenda. Among the means are the following:
Virus – A piece of code attached to a program that becomes active when the program is activated
Worm – A separate program that replicates itself on computers without changing the underlying or other
programs
Trojan horse – A program fragment that appear to be a worm or a virus and permit the hacker to gain
access to the system
Logic bomb – A type of Trojan horse that remains dormant until condition arise for its activation
Trap doors – These permit a programmer to access the user’s software without the user being aware of the
access
Chipping – These are similar to trap doors but remain dormant until access is desired
Denial of Service – The hacker send almost innumerable request for information, which causes computer
systems to shut down.
ACCESS CONTROL
WHAT IS ACCESS CONTROL? Access Control is the mechanism that systems use to identify users and
grant them their assigned privileges to access information system or resources. The protection of private
and confidential information from unauthorized users cannot be achieved without the appropriate access
control process to systems in place. Most access control methodologies are based on the same fundamental
principle of least privileges. This concept applies to access control for any product, system or technologies.
Access control devices properly identify people and verify their identity through identification and
authentication processes so they can stop any attempt of unauthorized access, catch intruder and hold them
accountable for their actions.
Smart Cards are plastic cards that have integrated circuit embedded in them, which is capable of
executing transactions which are configured in the circuits. The card may be used to authenticate users
to domain, system and networks. Personal identification numbers are also added to the configured
smart card. Two- factor authentication features may be configured on the system.
A Token is a hand held device that has a built-in challenge response scheme that authenticates with an
enterprise server. Token use time-based challenge and response algorithms that constantly change and
expires after a prescribed length of time. In token, when a password is entered, it cannot be reused.
Encrypted keys: These are mathematical algorithms that are employed to secure confidential
information and verify the authenticity of the people sending and receiving the information standards
such as X. 509 for encrypted keys have been created to make sure that security requirements are taken
in account and to allow technologies made by different vendors to work together.
Passwords are used to access control more than any other type of solution because they are easy to
implement and are extremely flexible. Passwords can be used to write-protect document, files and
directories and to allow access to systems and resources. Passwords are unfortunately among the
weakest of the access control solutions that can be implemented.
There are many password- cracking utilities that can be downloaded free from the internet. If a hacker
obtains an encrypted password, file he/she can run the password file or document through a password-
tracking utility, obtain the password, and then access the system using a legitimate user’s account, or
event modify the existing password by a new one not know to the victim, thus preventing the victim
user form accessing, his/her account for prolong period.
Alternatively, by using a protocol analyzer, hackers can easily obtain the network traffic on the wire
and obtain password in plaintext rather easily. Due to password weakness, some organization also
routinely runs password-crackers on their user accounts to check, if users are using easily to guess
password or more secure password choices.
19
ELEMENTARY CRYPTOGRAPHY: SUBSTITUTION CIPHER
Encryption is the process of encoding a message so that its meaning is not obvious; decryption is the
reverse process, transforming an encrypted message back into its normal, original form. Alternatively, the
terms encode and decode or encipher and decipher are used instead of encrypt and decrypt.That is, we say
that we encode, encrypt, or encipher the original message to hide its meaning. Then, we decode, decrypt, or
decipher it to reveal the original message. A system for encryption and decryption is called a cryptosystem.
The original form of a message is known as plaintext, and the encrypted form is called cipher text. For
convenience, we denote a plaintext message P as a sequence of individual characters P = <p1, p2, …,pn>.
Similarly, cipher text is written as C = <c1, c2, …,cm>.
For instance, the plaintext message "I want cookies" can be denoted as the message string
<I, ,w,a,n,t,c,o,o,k,i,e,s>. It can be transformed into cipher text<c1, c2, …,c14>, and the encryption
algorithm tells us how the transformation is done.
20
We use this formal notation to describe the transformations between plaintext and cipher text. For example:
we write C = E (P) and P = D(C), where C represents the cipher text, E is the encryption rule, P is the
plaintext, and D is the decryption rule. P = D (E(P)). In other words, we want to be able to convert the
message to protect it from an intruder, but we also want to be able to get the original message back so that
the receiver can read it properly. The cryptosystem involves a set of rules for how to encrypt the plaintext
and how to decrypt the cipher text. The encryption and decryption rules, called algorithms, often use a
device called a key, denoted by K, so that the resulting cipher text depends on the original plaintext
message, the algorithm, and the key value. We write this dependence as C =E (K, P). Essentially, E is a set
of encryption algorithms, and the key K selects one specific algorithm from the set. There are many types
of encryption. In the next sections we look at two simple forms of encryption: substitutions in which one
letter is exchanged for another and transpositions, in which the order of the letters is rearranged.
Cryptanalyst: cryptanalyst is a person who studies encryption and encrypted message and tries to find the
hidden meanings (to break an encryption).
Confusion: it is a technique for ensuring that ciphertext has no clue about the original message.
Diffusion: it increases the redundancy of the plaintext by spreading it across rows and columns.
Substitutions Cipher: It basically consists of substituting every plaintext character for a different cipher
text character.
It is of two types- I. Mono alphabetic substitution cipher
II. Poly alphabetic substitution cipher
Mono alphabetic substitution cipher:
Relationship between cipher text symbol and plain text symbol is 1:1.
Additive cipher:
Key value is added to plain text and numeric value of key ranges from 0 – 25.
Example: Plain text(P)- H E L LO (H=7,E=4,L=11,L=11,O=14)
Key (K)=15
Cipher text (C)= 7+15,4+15,11+15,11+15,14+15
= 22,19, 26,26,(29%26)=3
= W T A AD
CRYPTOGRAPHY
Cryptography is the science or art of writing in secret code. Cryptography remains the most effective
method of enforcing confidentiality. The plaintext message is transformed using a set of mathematical
algorithm into a new message in cipher text form that reveals no meaningful information to a viewer who
does not know how to decrypt it.
Cryptography is the use of mathematical technique to enhance information security such as confidentiality,
data integrity, authentication and non-repudiation.
Two Cryptographic methods are very popular, private-key (symmetric cryptography) and public-key
(asymmetric cryptography) methods
Private-key algorithm utilize a simple key when encrypting or decrypting information. The sender encrypts
the message and send its cipher text form to the receiver who should know the secret key and the
encryption algorithm in order to be able to decrypt it.
A Public –key encryption uses a pair of keys to encrypt and decrypt messages exchanged between senders
and receivers. Both keys are independent in terms of that one cannot be feasibly computed (1) a public key
21
that should be published and is useful to encrypt the message and (2) a private key that remains private to
the receiver and that is used to decrypt the message.
Each user need to keep private his/her own private key. This is very different from the case of symmetric
cryptography where the sender and the receiver share the same secret key used for both encryption and
decryption.
The Data Encryption Standard (DES) is the most well-known cryptographic mechanism in history. It
remains the standard means for securing electronic commerce in many financial institution around the
world.
Public key cryptography is certainly better in terms of key management than private-key cryptography
because the method has to process an extremely smaller number of keys, especially when the number of
communicating users is high. In order to be more efficient, the network using the public key cryptography
has to make easier the retrieval of user’s public keys.
TYPES OF IDSs
The two general types of intrusion detection systems are signature based and heuristic. Signature-based
intrusion detection systems perform simple pattern-matching and report situations that match a pattern
corresponding to a known attack type. Heuristic intrusion detection systems, also known as anomaly based,
build a model of acceptable behavior and flag exceptions to that model; for the future, the administrator can
mark a flagged behavior as acceptable so that the heuristic IDS will now treat that previously unclassified
behavior as acceptable.
Intrusion detection devices can be network based or host based. A network-based IDS is a stand-alone
device attached to the network to monitor traffic throughout that network; a host-based IDS runs on a
single workstation or client or host, to protect that one host.
Stealth Mode:
An IDS is a network device (or, in the case of a host-based IDS, a program running on a network device).
Any network device is potentially vulnerable to network attacks. How useful would an IDS be if it itself
were deluged with a denial-of-service attack? If an attacker succeeded in logging in to a system within the
protected network, wouldn't trying to disable the IDS be the next step? To counter those problems, most
IDSs run in stealth mode, whereby an IDS has two network interfaces: one for the network (or network
segment) being monitored and the other to generate alerts and perhaps other administrative needs. The IDS
uses the monitored interface as input only; it never sends packets out through that interface. Often, the
interface is configured so that the device has no published address through the monitored interface; that is,
a router cannot route anything to that address directly, because the router does not know such a device
exists. It is the perfect passive wiretap. If the IDS needs to generate an alert, it uses only the alarm interface
on a completely separate control network.
Senior Management
The senior technology officer is typically the chief information officer (CIO), although other titles such as
vice president of information, VP of information technology, and VP of systems may be used. The CIO is
primarily responsible for advising the chief executive officer, president, or company owner on the strategic
planning that affects the management of information in the organization. The CIO translates the strategic
plans of the organization as a whole into strategic information plans for the information systems or data
processing division of the organization. Once this is accomplished, CIOs work with subordinate managers
to develop tactical and operational plans for the division and to enable planning and management of the
systems that support the organization.
The chief information security officer (CISO) has primary responsibility for the assessment, management,
and implementation of information security in the organization. The CISO may also be referred to as the
manager for IT security, the security administrator, or a similar title. The CISO usually reports directly to
the CIO, although in larger organizations it is not uncommon for one or more layers of management to
exist between the two. However, the recommendations of the CISO to the CIO must be given equal, if not
greater, priority than other technology and information-related proposals. The placement of the CISO and
supporting security staff in organizational hierarchies is the subject of current debate across the industry.
● Champion: A senior executive who promotes the project and ensures its support, both financially and
administratively, at the highest levels of the organization.
● Team leader: A project manager, who may be a departmental line manager or staff unit manager, who
understands project management, personnel management, and information security technical requirements.
● Security policy developers: People who understand the organizational culture, existing policies, and
requirements for developing and implementing successful policies.
● Risk assessment specialists: People who understand financial risk assessment techniques, the value of
organizational assets, and the security methods to be used.
● Security professionals: Dedicated, trained, and well-educated specialists in all aspects of information
security from both a technical and nontechnical standpoint.
● Systems administrators: People with the primary responsibility for administering the systems that house
the information used by the organization.
26
● End users: Those whom the new system will most directly affect. Ideally, a selection of users from
various departments, levels, and degrees of technical knowledge assist the team in focusing on the
application of realistic controls applied in ways that do not disrupt the essential business activities they
seek to safeguard.
Data Responsibilities
The three types of data ownership and their respective responsibilities are outlined below:
● Data owners: Those responsible for the security and use of a particular set of information. They are
usually members of senior management and could be CIOs. The data owners usually determine the level of
data classification (discussed later), as well as the changes to that classification required by organizational
change. The data owners work with subordinate managers to oversee the day-to-day administration of the
data.
● Data custodians: Working directly with data owners, data custodians are responsible for the storage,
maintenance, and protection of the information. Depending on the size of the organization, this may be a
dedicated position, such as the CISO, or it may be an additional responsibility of a systems administrator or
other technology manager. The duties of a data custodian often include overseeing data storage and
backups, implementing the specific procedures and policies laid out in the security policies and plans, and
reporting to the data owner.
● Data users: End users who work with the information to perform their assigned roles supporting the
mission of the organization. Everyone in the organization is responsible for the security of data, so data
users are included here as individuals with an information security role.
Communities of Interest
Each organization develops and maintains its own unique culture and values. Within each organizational
culture, there are communities of interest that develop and evolve. As defined here, a community of interest
is a group of individuals who are united by similar interests or values within an organization and who share
a common goal of helping the organization to meet its objectives. While there can be many different
communities of interest in an organization, this book identifies the three most common and that have roles
and responsibilities in information security. In theory, each role must complement the other; in practice,
this is often not the case.
27
The organization’s general management team and the rest of the resources in the organization make up the
other major community of interest. This large group is almost always made up of subsets of other interests
as well, including executive management, production management, human resources, accounting, and
legal, to name just a few. The IT community often categorizes these groups as users of information
technology systems, while the information security community categorizes them as security subjects. In
fact, this community serves as the greatest reminder that all IT systems and information security objectives
exist to further the objectives of the broad organizational community. The most efficient IT systems
operated in the most secure fashion ever devised have no value if they are not useful to the organization as
a whole.
Copyrights:
Copyrights are designed to protect the expression of ideas. Thus it is applicable to a creative work, such as
story, photographs, song or pencil sketch. The right to copy an expression of an idea is protected by
copyright. The idea of copyright is to allow regular and free exchange of ideas. Copyright gives the author
the exclusive right to make copies of the expression and sell them in public. That is, only the author can
sell the copies of the author’s book.
Patents:
Patents are unlike copyrights in that they protect inventions, tangible objects, or ways to make them, not
works of the mind. The distinction between patents and copyrights is that patents were intended to apply to
the results of science, technology, and engineering, whereas copyrights are meant to cover works in the
arts, literature, and written in the scholarship. A Patent is designed to protect the device or process for
carrying out an idea itself.
Trade Secrets:
A trade secret is unlike a patent and copyright in that it must kept secret. The information has value only as
secret, and an infringer is one who divulges the secret. Once divulged, the information usually cannot be
made secret. A trade secret is information that gives one company a competitive edge over others. For
example the formula of a soft drink is a trade secret, as is a mailing list of customer or information about a
product due to be announced in a few months
CODES OF ETHICS
A written set of guidelines issued by an organization to its workers and management to help them conduct
their actions in accordance with its primary values and ethical standards.
As an ISSO (Information system security Officer) professional, you must behave in a professional manner
at all times and therefore, comply with the professional code of ethics. It is quite possible that members of
associations with a code of ethics have actually never read the code of ethics, even though as an ISSO
professional and member of one or more security-related associations, you are required to comply with the
associations’ codes of ethics. In fact, it can even be considered unethical not to have ever read the codes of
ethics for the various associations to which you as an ISSO professional belong. What does that say about
28
you and your professionalism? One may counter by saying that he or she always acts in an ethical manner
and doesn’t have to read any codes of ethics. This “know-it-all” attitude is a symptom of possibly a more
serious matter: the idea that one has no more to learn about an InfoSec-related topic. That is not only
impossible but will end up costing the corporation in terms of effectiveness and efficiency. How? Because
the ISSO who is not continuously learning and applying new and better techniques does not take advantage
of new (and possibly better and cheaper) ways of protecting assets. Now is a good time to take the
opportunity to read some codes of ethics from security-related professional associations. Please take the
time to read, understand, and apply the codes of ethics that follow.
Code of Ethics
I. A member shall perform professional duties in accordance with the law and the highest moral principles.
II. A member shall observe the precepts of truthfulness, honesty, and integrity.
III. A member shall be faithful and diligent in discharging professional responsibilities.
IV. A member shall be competent in discharging professional responsibilities.
V. A member shall safeguard confidential information and exercise due care to prevent its improper
disclosure.
VI. A member shall not maliciously injure the professional reputation or practice of colleagues, clients, or
employers.
Article I
A member shall perform professional duties in accordance with the law and the highest moral principles.
Ethical Considerations
I-1 A member shall abide by the law of the land in which the services are rendered and perform all duties in
an honorable manner.
I-2 A member shall not knowingly become associated in responsibility for work with colleagues who do
not conform to the law and these ethical standards.
I-3 A member shall be just and respect the rights of others in performing professional responsibilities.
Article II
A member shall observe the precepts of truthfulness, honesty, and integrity.
Ethical Considerations
II-1 A member shall disclose all relevant information to those having the right to know.
II-2 A right to know is a legally enforceable claim or demand by a person for disclosure of information by
a member. Such a right does not depend upon prior knowledge by the person of the existence of the
information to be disclosed.
29
II-3 A member shall not knowingly release misleading information nor encourage or otherwise participate
in the release of such information.
Article III
A member shall be faithful and diligent in discharging professional responsibilities.
Ethical Considerations
III-1 A member is faithful when fair and steadfast in adherence to promises and commitments.
III-3 A member shall not act in matters involving conflicts of interest without appropriate disclosure and
approval.
Article IV
A member shall be competent in discharging professional responsibilities.
Ethical Considerations
IV-1 A member is competent who possesses and applies the skills and knowledge required for the task.
IV-2 A member shall not accept a task beyond the member’s competence nor shall competence be claimed
when not possessed.
Article V
A member shall safeguard confidential information and exercise due care to prevent its improper
disclosure.
Ethical Considerations
V-1 Confidential information is nonpublic information, the disclosure of which is restricted.
V-2 Due care requires that the professional must not knowingly reveal confidential information, or use a
confidence to the disadvantage of the principal or to the advantage of the member or a third person, unless
the principal consents after full disclosure of all the facts. This confidentiality continues after the business
relationship between the member and his principal has terminated.
V-3 A member who receives information and has not agreed to be bound by confidentiality is not bound
from disclosing it. A member is not bound by confidential disclosures made of acts or omissions which
constitute a violation of the law.
V-4 Confidential disclosures made by a principal to a member are not recognized by law as privileged in a
legal proceeding. The member may be required to testify in a legal proceeding to the information received
in confidence from his principal over the objection of his principal’s counsel.
V-5 A member shall not disclose confidential information for personal gain without appropriate
authorization.
Article VI
A member shall not maliciously injure the professional reputation or practice of colleagues, clients, or
employers.
30
Ethical Considerations
VI-1 A member shall not comment falsely and with malice concerning a colleague’s competence,
performance, or professional capabilities.
VI-2 A member who knows, or has reasonable grounds to believe, that another member has failed to
conform to the Society’s Code of Ethics shall present such information to the Ethical Standards Committee
in accordance with Article VIII of the Society’s bylaws.
31