Professional Documents
Culture Documents
Chapter One Introduction To Information Security Definition of Information System Security
Chapter One Introduction To Information Security Definition of Information System Security
Chapter One Introduction To Information Security Definition of Information System Security
Chapter One
well-informed sense of assurance that the information risks and controls are in balance.
The terms information security, computer security and information assurance are
frequently incorrectly used interchangeably.
Information security is concerned with the confidentiality, integrity and availability
of data regardless of the form the data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of
a computer system without concern for the information stored or processed by the
computer.
Information security offers many areas for specialization including: securing network(s)
and allied/complete infrastructure, securing applications and databases, security testing,
information systems auditing, business continuity planning and digital forensics science,
etc.
Information systems security, more commonly referred to as INFOSEC, refers to the processes
and methodologies involved with keeping information confidential, available, and assuring its
integrity.
WHAT IS SECURITY?
In general, security is defined as “the quality or state of being secure—to be free from danger.”
Security is often achieved by means of several strategies usually undertaken simultaneously or
used in combination with one another.
1
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
2
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
Confidentiality: Also, be called privacy or secrecy and refers to the protection of information
from unauthorized disclosure.
Usually achieved either by restricting access to the information or by encrypting the information
so that it is not meaningful to unauthorized individuals or entities.
Information classification
Secure document storage
Application of general security policies
Education of information custodians/care and end users
Example, a credit card transaction on the Internet.
3
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
4
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
Is simply the process of identifying one's self to another entity or determining the identity
of the individual or entity with whom you are communicating?
It is able to recognize individual users. Identification and authentication are essential to
establishing the level of access or authorization that an individual is granted.
Authentication
Is the assurance that the communicating entity is the one that it claims to be.
Authentication occurs when a control provides proof that a user possesses the identity
that he or she claims.
Authentication is required when communicating over a network or logging onto a
network.
Access Control(Authorization): -
It refers to the ability to control the level of access that individuals or entities have to a
network or system and how much information they can receive.
Your level of authorization basically determines what you're allowed to do once
you are authenticated and allowed access to a network, system, or some other
resource such as data or information.
Access control is the determination of the level of authorization to a system,
network, or information (i.e., classified, secret, or top-secret).
After the identity of a user is authenticated, a process called authorization provides
assurance that the user (whether a person or a computer) has been specifically and
explicitly authorized by the proper authority to access, update, or delete the contents of an
information asset.
Accountability
It refers to the ability to track or audit what an individual or entity is doing on a network
or system.
The characteristic of accountability exists when a control provides assurance that every
activity undertaken can be attributed to a named person or automated process.
Does the system maintain a record of functions performed, files accessed, and
information altered?
For example, audit logs that track user activity on an information system provide accountability.
Accuracy
Information should have accuracy. Information has accuracy when it is free from
mistakes or errors and it has the value that the end users expects. If information contains
a value different from the user’s expectations, due to the intentional or unintentional
modification of its content, it is no longer accurate.
Utility:
5
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
Information has value when it serves a particular purpose. This means that if information
is available, but not in a format meaningful to the end user, it is not useful. Thus, the
value of information depends on its utility.
Possession
The possession of Information security is the quality or state of having ownership or
control of some object or item.
Non-Repudiation: -
It refers to the ability to prevent individuals or entities from denying (repudiating) that
information, data, or files were sent or received or that information or files were accessed
or altered, when in fact they were.
is crucial to e-commerce.
6
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
The 1960s
Advanced Research Procurement Agency (ARPA) began to examine
feasibility of redundant networked communications
Larry Roberts developed ARPANET from its inception
R-609
Information security began with Rand Report R-609 (paper that started the study of
computer security)
7
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
The 1990s
Networks of computers became more common; so too did the need to
interconnect networks
Internet became first manifestation of a global network of networks
In early Internet deployments, security was treated as a low priority
The Present
The Internet brings millions of computer networks into communication with each
other—many of them unsecured
Ability to secure a computer’s data influenced by the security of every computer
to which it is connected
The same problems apply for emerging networked computer systems, e.g.,
smartphones
Summary
Information security is a “well-informed sense of assurance that the information
risks and controls are in balance.”
Security should be considered a balance between protection and availability.
Computer security began immediately after first mainframes were developed
Computer Security
Computer Systems today have some of the best security systems ever, they are more
vulnerable than ever before.
Computer Security generic name for the collection of tools designed to protect data and
to hackers from attacking the organizational assets.
Computer and network security comes in many forms, including encryption algorithms,
access to facilities, digital signatures, and using fingerprints and face scans as passwords.
The OSI security architecture provides a systematic frame work for defining security
attacks, mechanisms and services.
8
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
The OSI security architecture focuses on security attacks, mechanisms and services.
1. To protect company assets: - One of the primary goals of computer and network
security is the protection of company assets (hardware, software and/or information).
o Such policies and procedures are necessary not only to protect company assets but
also to protect the organization from liability
4. To keep your job: - Security should be part of every network or systems administrator's
job. Failure to perform adequately can result in termination.
Vulnerabilities are weak points or loopholes in security that an attacker can exploit in
order to gain access to the network or to resources on the network. Vulnerability is not
the attack, but rather the weak point that is exploited.
9
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
Fig Threat agents, attack vectors, weakness, controls, IT asset and business impact
Vulnerability Classification: Classified according to the asset class they related to:
1. Hardware
o Susceptibility to humidity
o Susceptibility to dust
o Susceptibility to soiling
2. Software
Insufficient testing
Lack of audit trail
10
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
3. Network
4. Personnel
5. Site
6. Organizational
The primary protocol used in operating systems today is the TCP/IP protocol stack.
The wide use of this protocol helps to integrate different operating system architectures
such as Microsoft and UNIX.
Many organizations make use of this interoperability and use various TCP/IP utilities to
run programs, transfer information, and reveal/describe information.
Due to the nature of these utilities, various security risks and threats exist.
Users often use the same passwords for mixed environments.
Sometimes, passwords are automatically synchronized.
If hackers can crack the password on systems other than Microsoft systems, they could
also use that password to logon to a Microsoft system.
Telnet
Telnet protocol allows a user to log onto a system over the network and use that system
as though the user was sitting at a terminal that was directly connected.
The telnet command provides a user interface to a remote system.
When using the Microsoft telnet client to log on to the Microsoft Windows 2000 Telnet
service, it uses the NTLM (NT LAN Manager) protocol to log the client on.
NTLM protocol was the default for network authentication in the Windows 4.0 operating
system.
11
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
When logging on to a system from a Microsoft telnet client to UNIX TELNET daemon
(A daemon (pronounced DEE-muhn) is a program that runs continuously and exists for
the purpose of handling periodic service requests that a computer system expects to
receive. The daemon program forwards the requests to other programs (or processes) as
appropriate.) service or vice versa, the user name and password are sent over the network
in plain text.
Since the user name and password characters are not encrypted, it is possible for an
electronic eavesdropper to capture a user name and password for a system for which a
telnet connection is being established.
It allows users to connect to remote systems and transfer files back and forth.
As part of establishing a connection to a remote computer, FTP relies on a user name and
password combination for authentication.
Use of FTP poses a security problem similar to use of the Telnet protocol because
passwords typed to FTP are transmitted over the network in plain text, one character per
packet. These packets can be intercepted.
This capability is particularly useful for software or document distribution to the public.
To use anonymous FTP, a user passes a remote computer name as an argument to FTP
and then specifies "anonymous" as a user name. It is a common way to get access to a
server in order to view or download files that are publicly available. If someone tells you
to use anonymous FTP and gives you the server name, just remember to use the word
"anonymous" for your user ID. Usually, you can enter anything as a password.
Problems with anonymous FTP are:
The threat of denial-of-service attacks. That is, for deliberate or accidental denial-
of-service attacks, authorized users may be denied access to a system if too many
file transfers are initiated simultaneously.
It is important to securely set up the anonymous FTP account on the server because
everyone on the network will have potential access.
If the anonymous FTP account is not securely configured and administered, crackers may
be capable of adding and modifying files.
12
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
It is a file transfer program that is frequently used to allow diskless hosts to boot over the
network.
Microsoft Windows 2000 implements a client utility to make use of TFTP services on
UNIX flavors.
Because TFTP has no user authentication, it may be possible for unwanted file transfer to
occur.
The use of TFTP to steal password files is a significant threat.
Finger
The finger client utility on Windows NT and Windows 2000 can be used to connect to a
finger daemon service running on a UNIX-based computer to display information about
users.
When the finger client utility is invoked with a name argument, the password file is
searched on a UNIX server.
Every user with a first name, last name, or user name that matches the name argument is
returned.
When the finger program is run with no arguments, information for every user currently
logged on to the system is displayed.
User information can be displayed for remote computers as well as for the local
computer.
The output of finger typically includes logon name, full name, home directory, last logon
time, and in some cases when the user received mail and/or read mail.
Personal information, such as telephone numbers, is often stored in the password file so
that this information is available to other users.
Making personal information about users available poses a security threat because a
password cracker can make use of this information.
In addition, finger can reveal logon activity.
Rexec
The rexec utility is provided as a client on Microsoft Windows NT and Windows 2000.
13
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
The rexec client utility allows remote execution on UNIX-based systems running the
rexecd service.
A client transmits a message specifying the user name, the password, and the name of a
command to execute.
The rexecd program is susceptible to abuse because it can be used to probe a system for
the names of valid accounts.
In addition, passwords are transmitted unencrypted over the network.
Protocol Design
Communication protocols sometimes have weak points. Attackers use these to gain
information and eventually gain access to systems. Some known issues are:
TCP/IP: - The TCP/IP protocol stack has some weak points that allows:
IP address spoofing
TCP connection request (SYN) attacks
ATM: - Security can be compromised by what is referred to as "manhole
manipulation “, direct access to network cables and connections in underground
parking garages and elevator shafts.
Frame relay: - Similar to the ATM issue.
Weak Password
Password selection will always be a contentious point as long as users have to select one.
Users usually select commonly used passwords because they are easy to remember, like
anything from birthday to the names of loved ones. This creates a vulnerability.
A password is the key to a computer, a key much sought-after by hackers, as a means of
getting a foothold into a system.
A weak password may give a hacker access not only to a computer, but to the entire
network to which the computer is connected.
Users should treat their passwords like the keys to their homes.
Switches and routers are easily managed by an HTTP Web interface or through a
command line interface.
Coupled to the use of weak passwords it allows anybody with some technical knowledge
to take control of the device.
Modem
If a computer has a modem connected to the Internet, the user needs to take appropriate
precautions because modem connections can be a significant vulnerability.
Hackers commonly use a tool known as a "war dialer" to identify the modems at a target
organization.
14
IAS Chapter 1 Lecture Note Prepared by Abraham A
Wolkite University College of Computing and Informatics Department of IT
A war dialer is a computer program that automatically dials phone numbers within a
specified range of numbers.
Most organizations have a block of sequential phone numbers.
By dialing all numbers within the targeted range, the war dialer identifies which numbers
are for computer modems and determines certain characteristics of those modems.
The hacker then uses other tools to attack the modem to gain access to the computer
network.
Anyone can download effective war dialers from the Internet at no cost.
Security in Action
NETWORK
Client
DNS Network Services FTP/Telnet SMTP/POP Web Server
Configuration
VULNERABILITAS
IP & Port Web Server Sniffing KeyStroke Password
Email Exploit DoS Attack Trojan Attack MITM Attack
Scanning Exploit Traffic Logging Cracking
PREVENT
Hardening AntiVirus Using Using Using
Using SSH Using IPSec
Host Applications Firewall GPG/PGP Certificate
DETECTION
Intrusion Spyware
System Log Backup and Finding
Detection HoneyPot Detection and
Analysis Restore Hidden Data
System Removal
Internal External
attacker attacker
15
IAS Chapter 1 Lecture Note Prepared by Abraham A