is unit-2 notes
is unit-2 notes
At the most practical level, securing the information on your computer means:
Ensuring that your information remains confidential and only those who should access
that information, can.
Knowing that no one has been able to change your information, so you can depend on its
accuracy (information integrity).
Making sure that your information is available when you need it (by making back-up
copies and, if appropriate, storing the back-up copies off-site).
Decision makers in organizations must set policy and operate their organizations
in compliance with the complex, shifting legislation that controls the use of
technology.
It is essential for the protection of integrity and value of the organization’s data
Must add secure infrastructure services based on the size and scope of the
enterprise.
Organizational growth could lead to the need for public key infrastructure,
PKI, an integrated system of software, encryption methodologies.
THREATS
1. Know yourself
(i.e) be familiar wit the information to be protected, and the systems that store,
transport and process it.
A threat is an object, person, or other entity, that represents a constant danger to an asset.
information
2.3.2 Threats
One of the greatest threats to an organization’s information security is the organization’s own
employees.
- Training
Intellectual Property is defined as the ownership of ideas and control over the tangible
or virtual representation of those ideas.
Intellectual property includes trade secrets, copyrights, trademarks, and patents.
Once intellectual property has been defined and properly identified, breaches to IP
constitute a threat to the security of this information.
Organization purchases or leases the IP of other organizations.
Most Common IP breach is the unlawful use or duplication of software based intellectual
property more commonly known as software Piracy.
Software Piracy affects the world economy.
U.S provides approximately 80% of world’s software.
In addition to the laws surrounding software piracy, two watch dog organizations
investigate allegations of software abuse.
Another effort to combat (take action against) piracy is the online registration
process.
Electronic and human activities that can breach the confidentiality of information.
When an unauthorized individual’s gain access to the information an organization is
trying to protect is categorized as act of espionage or trespass.
Attackers can use many different methods to access the information stored in an
information system.
2. Industrial espionage(spying)
Trespass
Can lead to unauthorized real or virtual actions that enable information gatherers to enter
premises or systems they have not been authorized to enter.
Sound principles of authentication & authorization can help organizations protect
valuable information and systems.
Hackers-> “People who use and create computer software to gain access to information
illegally”
There are generally two skill levels among hackers.
Expert Hackers-> Masters of several programming languages, networking protocols,
and operating systems .
Unskilled Hackers
Destroy an asset or
“The British Internet Service Provider Cloudnine” be the first business “hacked out of
existence”
Virus
Boot Virus-> infects the key operating files located in the computer’s boot sector.
Worms
A worm is a malicious program that replicates itself constantly, without requiring another
program to provide a safe environment for replication.
Worms can continue replicating themselves until they completely fill available resources,
such as memory, hard drive space, and network bandwidth.
Eg: MS-Blaster, MyDoom, Netsky, are multifaceted attack worms.
Once the worm has infected a computer , it can redistribute itself to all e-mail addresses
found on the infected system.
Furthermore, a worm can deposit copies of itself onto all Web servers that the infected
systems can reach, so that users who subsequently visit those sites become infected.
Trojan Horses
Are software programs that hide their true nature and reveal their designed behavior only
when activated.
Trojan horse releases its payload, monitors computer activity, installs back do
Trojan horse is activated when the software or attachment is executed.
Polymorphism
A Polymorphic threat is one that changes its apparent shape over time, making it
undetectable by techniques that look for preconfigured signatures.
These viruses and Worms actually evolve, changing their size, and appearance to elude
detection by antivirus software programs.
Types of Trojans
Proxy
Trojans
FTP Trojans
Virus
A program or algorithm that replicates itself over a computer network and usually
performs malicious actions.
Trojan Horse
Blended threat
Blended threats combine the characteristics of virus, worm, Trojan horses &
malicious code with server and Internet Vulnerabilities.
Antivirus Program
A Utility that searches a hard disk for viruses and removes any that found.
Forces of Nature
Fire: Structural fire that damages the building. Also encompasses smoke damage
from a fire or water damage from sprinkles systems.
Flood: Can sometimes be mitigated with flood insurance and/or business
interruption Insurance.
Earthquake: Can sometimes be mitigated with specific causality insurance
and/or business interruption insurance, but is usually a separate policy.
Lightning: An Abrupt, discontinuous natural electric discharge in
the atmosphere.
Landslide/Mudslide: The downward sliding of a mass of earth & rocks directly
damaging all parts of the information systems.
Tornado/Severe Windstorm
Huricane/typhoon
Tsunami
Electrostatic Discharge (ESD)
Dust Contamination
Since it is not possible to avoid force of nature threats, organizations must implement
controls to limit damage.
They must also prepare contingency plans for continued operations, such as disaster
recovery plans, business continuity plans, and incident response plans, to limit losses in
the face of these threats.
Other utility services can affect the organizations are telephone, water, waste water, trash
pickup, cable television, natural or propane gas, and custodial services.
The loss of these services can impair the ability of an organization to function.
For an example, if the waste water system fails, an organization might be prevented from
allowing employees into the building.
This would stop normal business operations.
Power Irregularities
This can pose problems for organizations that provide inadequately conditioned
power for their information systems equipment.
This category involves threats that come from purchasing software with unknown, hidden
faults.
Large quantities of computer code are written, debugged, published, and sold before all
their bugs are detected and resolved.
These failures range from bugs to untested failure conditions.
Technological obsolescence
ATTACKS
Malicious code
The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information.
The state –of-the-art malicious code attack is the polymorphic or multivector, worm.
These attack programs use up to six known attack vectors to exploit a variety of
vulnerabilities in commonly found information system devices.
2. Web browsing
3. Virus
4. Unprotected shares
5. Mass mail
The infected system scans a random or local range of IP addresses and targets any of
several vulnerabilities known to hackers.
2. Web browsing
If the infected system has write access to any Web pages, it makes all Web content files
(.html,.asp,.cgi & others) infectious, so that users who browse to those pages become
infected.
3. Virus
Each infected machine infects certain common executable or script files on all computers
to which it can write with virus code that can cause infection.
4. Unprotected shares
Using vulnerabilities in file systems and the way many organizations configure them, the
infected machine copies the viral component to all locations it can reach.
5. Mass Mail
By sending E-mail infections to addresses found in the address book, the infected
machine infects many users, whose mail -reading programs also automatically run the
program & infect other systems.
By using the widely known and common passwords that were employed in early versions
of this protocol, the attacking program can gain control of the device. Most vendors have
closed these vulnerabilities with software upgrades.
Examples
Hoaxes
A more devious approach to attacking the computer systems is the transmission of a virus
hoax with a real virus attached.
Even though these users are trying to avoid infection, they end up sending the attack on
to their co-workers.
Backdoors
Password Crack
Brute Force
The application of computing & network resources to try every possible combination of
options of a password is called a Brute force attack.
This is often an attempt to repeatedly guess passwords to commonly used accounts, it is
sometimes called a password attack.
Spoofing
192.168.0.25 100.0.0.75
Original IP packet
100.0.0.80 100.0.0.75
Spoofed (modified)
IP packet
Dictionary
This is another form of the brute force attack noted above for guessing passwords.
The dictionary attack narrows the field by selecting specific accounts to attack and uses
a list of commonly used passwords instead of random combinations.
Man-in-the –Middle
SPAM
Another form of E-mail attack that is also a DOS called a mail bomb.
Attacker routes large quantities of e-mail to the target.
The target of the attack receives unmanageably large volumes of unsolicited e-mail.
By sending large e-mails, attackers can take advantage of poorly configured e-mail
systems on the Internet and trick them into sending many e-mails to an address chosen by
the attacker.
The target e-mail address is buried under thousands or even millions of unwanted e-
mails.
Sniffers
A sniffer is a program or device that can monitor data traveling over a network.
Unauthorized sniffers can be extremely dangerous to a network’s security, because they
are virtually impossible to detect and can be inserted almost anywhere.
Sniffer often works on TCP/IP networks, where they are sometimes called “packet
Sniffers”.
Social Engineering
It is the process of using social skills to convince people to reveal access credentials or
other valuable information to the attacker.
An attacker gets more information by calling others in the company and asserting his/her
authority by mentioning chief’s name.
Buffer Overflow
A buffer overflow is an application error that occurs when more data is sent to a buffer
than it can handle.
Attacker can make the target system execute instructions.
Timing Attack
Laws are rules that mandate or prohibit certain behavior in society; they are drawn from
ethics, which define socially acceptable behaviors. The key difference between laws and
ethics is that laws carry the sanctions of a governing authority and ethics do not. Ethics in
turn are based on Cultural mores.
Types of Law
Civil law
Criminal law
Tort law
Private law
Public law
Privacy
The issue of privacy has become one of the hottest topics in information
The ability to collect information on an individual, combine facts from separate sources,
and merge it with other information has resulted in databases of information that were
previously impossible to set up
The aggregation of data from multiple sources permits unethical organizations to build
databases of facts with frightening capabilities
The Freedom of Information Act provides any person with the right to request access to
federal agency records or information, not determined to be of national security
There are exceptions for information that is protected from disclosure, and the Act does
not apply to state or local government agencies or to private businesses or individuals,
although many states have their own version of the FOIA
It is the responsibility of the information security professional to understand state laws and
regulations and insure the organization’s security policies and procedures comply with those
laws and regulations
41
Digital Millennium Copyright Act (DMCA) Digital Millennium Copyright Act (DMCA)
To some degree the United Nations Charter provides provisions for information
security during Information Warfare
Information Warfare (IW) involves the use of information technology to conduct
offensive operations as part of an organized and lawful military operation by a sovereign
state
IW is a relatively new application of warfare, although the military has been conducting
electronic warfare and counter-warfare operations for decades, jamming, intercepting,
and spoofing enemy communications
Differences in cultures cause problems in determining what is ethical and what is not
ethical
Studies of ethical sensitivity to computer use reveal different nationalities have different
perspectives
Difficulties arise when one nationality’s ethical behavior contradicts that of another
national group
Employees must be trained and kept aware of a number of topics related to information
security, not the least of which is the expected behaviors of an ethical employee
42
This is especially important in areas of information security, as many employees may not
have the formal technical training to understand that their behavior is unethical or even
illegal
Proper ethical and legal training is vital to creating an informed, well prepared, and low-
risk system user
SECURITY
Then, selection or creation of information security architecture and the development and
use of a detailed information security blueprint creates plan for future success
Security education and training to successfully implement policies and ensure secure
environment
Why Policy?
Policies are least expensive means of control and often the most difficult to implement
– Stand up in court
Definitions
43
– Organizational rules for acceptable/unacceptable behavior
– Appeals process
Standards: more detailed statements of what must be done to comply with policy
Practices, procedures and guidelines effectively explain how to comply with policy
44
For a policy to be effective it must be
– Properly disseminated
– Read
– Understood
Types of Policies
45
Overview of Computer security:-
Computer security refers to protecting and securing computers and their related data, networks,
software, hardware from unauthorized access, misuse, theft, information loss, and other security
issues. The Internet has made our lives easier and has provided us with lots of advantages but it has
also put our system’s security at risk of being infected by a virus, of being hacked, information
theft, damage to the system, and much more.
Technology is growing day by day and the entire world is in its grasp. We cannot imagine even a
day without electronic devices around us. With the use of this growing technology, invaders,
hackers and thieves are trying to harm our computer’s security for monetary gains, recognition
purposes, ransom demands, bullying others, invading into other businesses, organizations, etc. In
order to protect our system from all these risks, computer security is important.
48