Security: Challenges/Threats To Is Security
Security: Challenges/Threats To Is Security
Security: Challenges/Threats To Is Security
“Security refers to the policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems.”
-Laudon
CHALLENGES/THREATS TO IS SECURITY:
Threats to computerized information systems include hardware and software failure; user
errors; physical disasters such as fire or power failure; theft of data, services, and
equipment; unauthorized use of data; and telecommunications disruptions. On-line
systems and telecommunications are especially vulnerable because data and files can be
immediately and directly accessed through computer terminals or at points in the
telecommunications network.
Viruses
A computer virus is a software code that can multiply and propagate itself. A virus can
spread into another computer via e-mail, downloading files from the Internet, or opening
a contaminated file. It is almost impossible to completely protect a network computer
from virus attacks;
Programmed threats are computer programs that can create a nuisance, alter or damage
data, steal information, or cripple system functions. Programmed threats include,
computer viruses, Trojan horses, logic bombs, worms, spam, spyware, and adware.
Spyware is a computer program that secretly gathers users’ personal information and
relays it to third parties, such as advertisers.
e-mail and Internet connections are available in almost all offices to improve
productivity, but employees may use them for personal reasons, such as online shopping,
playing games, and sending instant messages to friends during work hours.
Denial of Service
System Penetration
Hackers penetrate systems illegally to steal information, modify data, or harm the system.
The following factors are related to system penetration:
Port scanning: a hacking technique used to check TCP/IP ports to reveal the
services that are available and to identify the weaknesses of a computer or network
system in order to exploit them.
Back door/trap door: a hole in the security of a computer system deliberately left
in place by designers or maintainers.
Information is a commodity in the e-commerce era, and there are always buyers for
sensitive information, including customer data, credit card information, and trade secrets.
Data theft by an insider is common when access controls are not implemented. Outside
hackers can also use “Trojan” viruses to steal information from unprotected systems
Various tools and technologies used to help protect against or monitor information
system include authentication tools, firewalls, intrusion detection systems, and antivirus
and encryption software.
Access control consists of all the policies and procedures a company uses to prevent
improper access to systems by unauthorized insiders and outsiders.
Authentication refers to the ability to know that a person is who he or she claims to be.
Access control software is designed to allow only authorized persons to use systems or to
access data using some method for authentication.
Smart card: A device about the size of a credit card that contains a chip formatted
with access permission and other data.
A CORPORATE FIREWALL
The firewall is placed between the firm’s private network and the public Internet or
another distrusted network to protect against unauthorized traffic.
Intrusion detection systems feature full-time monitoring tools placed at the most
vulnerable points of corporate networks to detect and deter intruders continually.
Antivirus software is designed to check computer systems and drives for the presence of
computer viruses. However, to remain effective, the antivirus software must be
continually updated.
Encryption is the coding and scrambling of messages to prevent their access by
unauthorized individuals.
Data is encrypted by applying a secret numerical code, called an encryption key, so that
the data are transmitted as a scrambled set of characters. To be read, the message must be
decrypted (unscrambled) with a matching key. There are two alternative methods of
encryption:
Symmetric key encryption: The sender and receiver create a single encryption
key that is shared.
Public key encryption: A more secure encryption method that uses two different
keys, one private and one public.
Digital certificates are data files used to establish the identity of users and electronic
assets for protection of online transactions. A digital certificate system uses a trusted third
party known as a certificate authority (CA) to validate a user's identity.
SECURITY TESTING
Security testing is a process to determine that an information system protects data and
maintains functionality as intended.
“The exhaustive and thorough process that determines whether the system produces the
desired results under known conditions.”- laudon
Because security testing provides input into and can be a part of multiple system
development life cycle phases, a number of IT and system security staff may be
interested in its execution and result. This section provides a list of those roles and
identifies their responsibilities related to security testing. These roles
may vary with the organization, however, and not all organizations will have the
identical roles described here.
Ensuring that critical systems are identified and scheduled for periodic testing
according to the security policy requirements of each respective system.
2.3.3 Information Systems Security Officers (ISSO)
Information Systems Security Officers (ISSOs) are responsible for overseeing all
aspects of information security within a specific organizational entity. They ensure
that the organization's information security practices comply with organizational and
departmental policies, standards, and procedures. ISSOs are responsible for the
following activities associated with security testing:
System and network administrators must address the security requirements of the
specific system(s) for which they are responsible on a daily basis. Security issues and
solutions can originate from either outside (e.g., security patches and fixes from the
vendor or computer security incident response teams) or within the organization (e.g.,
the Security Office). The administrators are responsible for the following activities
associated with security testing:
Managers and owners of a system oversee the overall compliance of their assets
with their defined/identified security requirements. They are also responsible for
ensuring that test results and recommendations are adopted as appropriate.
CONCEPT:
The six basic security concepts that need to be covered by security testing are:
Confidentiality
Integrity
Authentication
Authorization
Availability
Non-repudiation
Confidentiality
Integrity
A measure intended to allow the receiver to determine that the information which
it is providing is correct.
Authentication
Authentication can take many forms including but not limited to:
passwords, biometrics, radio frequency identification, etc.
Authorization
Assuring information and communications services will be ready for use when
expected.
Information must be kept available to authorized persons when they need it.
Non-repudiation
VULNERABILITY
The term vulnerability is a weakness which allows an attacker to reduce a
system's Information Assurance. Vulnerability is the intersection of three elements: a
system susceptibility or flaw, attacker access to the flaw, and attacker capability to
exploit the flaw .
Causes:
Unchecked user input: The program assumes that all user input is safe. Programs
that do not check user input can allow unintended direct execution of commands
or SQL statements (known as Buffer overflows, SQL injection or other non-
validated inputs).
Vulnerability disclosure:
From the security perspective, a free and public disclosure is only successful if the
affected parties get the relevant information prior to potential hackers, if they did not the
hackers could take immediate advantage of the revealed exploit. The disadvantage here is
that there is a lower number of people with full knowledge of the vulnerability who can
aid in finding similar or related scenarios.
It should be unbiased to enable a fair dissemination of security critical information. Most
often a channel is considered trusted when it is a widely accepted source of security
information in the industry (e.g. CERT, SecurityFocus, and Secunia). Analysis and risk
rating ensure the quality of the disclosed information. The analysis must include enough
details to allow a concerned user of the software to assess his individual risk or take
immediate action to protect his or her assets.
The vulnerability has undergone analysis by experts such that risk rating
information is included upon disclosure
Examples of vulnerabilities
Vulnerabilities may result from weak passwords, software bugs, a computer virus or
other malware, a script code injection, a SQL injection or misconfiguration. Three
examples: an attacker finds and uses an overflow weakness to install malware to export
sensitive data; an attacker convinces a user to open a email message with attached
malware; an insider copies a hardened, encrypted program onto a thumb drive and cracks
it at home.
Buffer overflows
Dangling pointers
SQL injection
Code injection
E-mail injection
Clickjacking
CONTROL
Definition:
“All of the methods, policies, and procedures that ensure protection of the organization's
assets, accuracy and reliability of its records, and operational adherence to management
standards.”- Laudon
1.General Controls:
Completeness checks - controls that ensure all records were processed from
initiation to completion.
Validity checks - controls that ensure only valid data is input or processed.
Identification - controls that ensure all users are uniquely and irrefutably
identified.
Authentication - controls that provide an authentication mechanism in the
application system.
Authorization - controls that ensure only approved business users have access to
the application system.
Problem management - controls that ensure all application problems are recorded
and managed in a timely manner.
Change management - controls that ensure all changes on production
environment are implemented with preserved data integrity.
Input controls - controls that ensure data integrity fed from upstream sources into
the application system.