BIS Chapter Four
BIS Chapter Four
BIS Chapter Four
● In November 2014, hackers successfully penetrate the SPE information systems and
copied terabytes of data that included confidential personal information about SPE
employees and theirdependents.The hackers also accessed unreleased movies and other
corporate data.The hack was accompanied by threats of terrorist action around the release
of a film called “The Interview.”
Responses:
The FBI launched an investigation and claimed that the North Korean government was
responsible for the attack. Sony pulled the movie and canceled showings of scheduled dates.
Large cinema chains followed suit, canceling their release of the movie. It was later released to
independent theaters and online movie services.
The Results:
There are many “open ends' ' around the responsibilities of SOE and the U.S. government.
Neither appear to be capable of protecting data from hackers.
Questions:
● Information security refers to all of the processes and policies designed to protect an
organization's information and information systems (IS) from unauthorized access, use,
disclosure, disruption,modification, or destruction.
● A threat to an information resource is any danger to which a system may be exposed.
● Exposure is the harm, loss or damage to a compromised resource.
● An information resource’s vulnerability is the possibility that the system will be harmed
by a threat.
INFORMATION SECURITY
● Five key factors that affect the vulnerability and security organizational information
resources:
○ Today’s interconnected, interdependent, wirelessly networked business
environment;
○ Smaller, faster, cheaper computers and storage devices;
○ Decreasing skills necessary to be a computer hacker;
○ International organized crime taking over cybercrime;
○ Lack of management support.
SECURITY THREATS:
HUMAN ERRORS:
SOCIAL ENGINEERING:
● Social engineering is an attack in which the perpetrator uses social skills to trick or
manipulate a legitimate employee into providing confidential company information such
as passwords
● Techniques include:
○ Impersonation: pretending to be a company manager of an information systems
employee
○ Tailgating: following behind an employee to enter restricted areas
○ Shoulder surfing: watching over someone’s shoulder to view data or passwords
1. Espionage or trespass
2. Information extortion
3. Sabotage or vandalism
4. Theft of equipment or information
5. Identity theft
6. Compromises to intellectual property
7. Software attacks
8. Alien software
9. Supervisory control and data acquisition(SCADA) attacks
10. Cyberterrorism and cyberwarfare
1. ESPIONAGE OR TRESPASS:
● Small, powerful devices with increased storage such as laptops, smart phones, digital
cameras,thumb drives, and iPods are becoming easier to steal and easier for attackers to
use to steal information.
● Example: dumpster diving involves the practice of rummaging through commercial or
residential trash to find information that has been discarded so that passwords or
technical manuals to devices can be obtained.
3. IDENTITY THEFT
● Remote attacks requiring user action: virus, worm,phishing attack, spear phishing attack
● Remote attacks needing no user action: denial-of-service attack, distributed
denial-of-service attack
● Attacks by a programmer developing a system:Trojan horse, back door, logic bomb
6. Alien Software:
● Alien software: clandestine software that is installed on your computer without your
knowledge, also known as pestware
● Adware: software that causes pop-up advertisements to appear on your screen.
● Spyware: collects personal information about users without their consent.
○ Keystroke loggers (keyloggers): record your individual keystrokes [including
passwords] and your browsing history
○ Screen scrapers (screen grabbers): record your screen activity
● SCADA systems, such as those provided by Bentek Systems are used to monitor or to
control chemical, physical, and transport processes used in:
○ oil refineries
○ water and sewage treatment plants
○ electrical generator
○ nuclear power plants
○ other sensor-based systems, such as baby monitors.
● Cyberterrorism and cyberwarfare refer to malicious acts in which attackers use a target’s
computer systems, particularly via the Internet, to cause physical real-world harm or
severe disruption,usually to carry out a political agenda
● The Canadian government has an explanation of cyber security and a description of
Canada’sCyber Security Strategy at
https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-eng.aspx
● 100’s of threats
● Many locations of computing resources
● Broad access to information assets
● Difficult to protect distributed networks
● Rapid technological changes
● Crimes can go undetected for long periods of time
● Violation of “inconvenient”security procedures
● Minimal knowledge needed to commit crimes
● High costs of prevention
● Difficult to conduct a cost-benefit justification
RISK MANAGEMENT:
Risk Analysis:
Risk Mitigation:
1. Risk acceptance: Accept the potential risk, continue operator with no controls, and
absorb any damages that occur.
2. Risk limitation: Limit the risk by implementing controls that minimize the impact of the
threat.
3. Risk transference: Transfer the risk by using other means to compensate for the loss,
such as by purchasing insurance.
CONTROLS EVALUATION:
● The organization identifies security deficiencies and calculates the cost of implementing
controls.
● If the costs of implementing a control are greater than the value of the asset being
protected, the control is not cost effective.
● Effective management reporting improves an organization's ability to design and evaluate
controls.
● Enterprise risk management software from SAPRick Management are touted as assisting
with review risk management solutions.
CONTROLS:
• Categories of controls:
Security is only one aspect of operational controls (which are part of general controls).
CONTROL ENVIRONMENT:
● Physical: walls, doors, fencing, gates, locks,badges, guards, alarm systems, pressure
sensors,and motion detectors.
● Access Controls: can be physical (e.g. locks) or logical (e.g. passwords)
● Communication: firewalls, anti-malware systems,whitelisting and blacklisting,
encryption, virtual private networks (VPNs), transport layer security(TLS), and employee
monitoring systems.
Authentication:
● To authenticate (verify the identify of) authorized personnel, an organization can use one
or more of the following types of methods:
○ something the user is (biometrics)
○ something the user has
○ something the user does
○ something the user knows
BASIC GUIDELINES FOR CREATING STRONG PASSWORDS:
● Difficult to guess•
● Long rather than short
● Uppercase letters, lowercase letters, numbers,and special characters
● Do not use recognizable words
● Do not use the name of anything or anyone familiar (family names or names of pets)
● Do not use a recognizable string of numbers(Social Insurance Number or a birthday)
AUTHORIZATION:
● Authorization determines which actions, rights, or privileges the person has, based on his
or her verified identify.
● Privilege (also known as profile): the computer operations that a user is allowed to
perform
● Least privilege: users are granted the privilege for activities only if they need it for their
job.
COMMUNICATIONS CONTROLS:
● Firewalls
● Anti-malware systems, for example Norton:
○ http://symantec-norton.com/default.aspx?lang=en-CA&par=goo_caenbroad_norto
n&gclid=CKLX5I-u-bkCFfFDMgod4k0AJg
APPLICATION CONTROLS:
● Controls that apply to individual applications(functional areas), e.g. payroll. Examples for
functional areas include:
○ Input: Edits that check for reasonable data ranges(accuracy)
○ Processing: Automatically check that each line of an invoice adds to the total
(accuracy for total and completeness of line items)
○ Output: Supervisor reviews payroll journal for unusual amounts (exceptions)
before cheques are printed (authorization).
● BCP – purpose
● Provide continuous availability
● Be able to recover in the event of a hardware or software failure
● Ensure that critical systems are available and operating
● In the event of a major disaster, organizations can employ several strategies for business
continuity including:
○ hot sites
○ warm sites
○ old sites
○ off-site data storage
1. There are five factors that contribute to the increasing vulnerability of information
resources such as smaller, faster, cheaper computers and storage devices.
2. Human mistakes are unintentional errors. Social Engineering is an attack where the
perpetrator uses social skills to trick or manipulate a legitimate employee into providing
confidential company information.
3. There are ten types of deliberate attacks to information systems such as espionage.
4. The three risk mitigation strategies are risk acceptance, risk limitation and risk
transference.
5. Information systems are protected with a wide variety of controls such as security
procedures,physical guards, and detection software.