Is Unit1
Is Unit1
Is Unit1
INFORMATION SECURITY
VIII SEMESTER
UNIT – II
SECURITY INVESTIGATION: Need for Security - Business Needs - Threats - Attacks - Legal,
Ethical and Professional Issues.
UNIT – III
SECURITY ANALYSIS: Risk Management: Identifying and Assessing Risk - Assessing and
Controlling Risk - Trends in Information Risk Management - Managing Risk in an Intranet
Environment.
UNIT – IV
LOGICAL DESIGN: Blueprint for Security - Information Security Policy - Standards and Practices
- ISO 17799/BS 7799 - NIST Models - VISA International Security Model - Design of Security
Architecture - Planning for Continuity.
UNIT – V
PHYSICAL DESIGN: Security Technology - IDS, Scanning and Analysis Tools - Cryptography -
Access Control Devices - Physical Security - Security and Personnel issues.
Text Books:
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas Publishing
House, New Delhi, 2003.
Reference Books:
1. Micki Krause, Harold F. Tipton, “Handbook of Information Security Management”, Vol 1-3 CRC
Press LLC, 2004.
2. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGrawHill, 2003
INFORMATION SECURITY Page|2 DEPARTMENT OF CSE
.
UNIT- I
2 MARKS
1. What is information security?
Information security in today’s enterprise is a “well-informed sense of assurance that the
information risks and controls are in balance.”
The protection of information and its critical elements, including the systems and
hardware that use, store, and transmit that information
Tools, such as policy, awareness, training, education, and technology are necessary
The C.I.A. triangle was the standard based on confidentiality, integrity, and
availability
The C.I.A. triangle has expanded into a list of critical characteristics of information
4. What is Security? What are the security layers ,a successful organization should have?
ions security
“The quality or state of being secure--to be free from danger” .To be protected from
adversaries
Physical Security
Personal Security
Operations security
Communications security
Network security
Information security
27.Draw the diagrammatic representation of the two approaches used for implementing
information security
30.What is SDLC?
The Systems Development Life Cycle
Information security must be managed in a manner similar to any other major system
implemented in the organization
Using a methodology
– ensures a rigorous process
– avoids missing steps
The goal is creating a comprehensive security posture/program
31.List the different phases of SDLC
1. Investigation
2. Analysis
3. Logical Design
4. Physical Design
5. Implementation
6. Maintenance and Change
42.Write short notes on Logical & Physical Design phases of Security SDLC
Creates blueprints for security
Critical planning and feasibility analyses to determine whether or not the project should
continue
In physical design, security technology is evaluated, alternatives generated, and final
design selected
At end of phase, feasibility study determines readiness so all parties involved have a
chance to approve the project
50.what are the three types of data ownership and their responsibilities?
Data Owner
Data Custodian
Data Users
59.What is ARPANET?
Department of Defense in US,started a research program on feasibility of a
redundant,networked communication system to support the military’s exchange of
information.Larry Robers,known as the founder if internet ,developed the project from its
inception.
ARPANET protocols (the rules of syntax that enable computers to communicate on a
network) were originally designed for openness and flexibility, not for security.
11 Marks
1. What is Security? What are the security layers, a successful organization should have?
on its security (5 Marks)
“The quality or state of being secure--to be free from danger”
To be protected from adversaries
Physical Security – to protect physical items, objects or areas of organization from
unauthorized access and misuse
Personal Security – involves protection of individuals or group of individuals who are
authorized to access the organization and its operations
Operations security – focuses on the protection of the details of particular operations or
series of activities.
Communications security – encompasses the protection of organization’s
communications media, technology and content
Network security – is the protection of networking components, connections, and contents
Information security – is the protection of information and its critical elements, including the
systems and hardware that use, store, and transmit the information
Accuracy Information has accuracy when it is free from mistakes or errors and it has the value
that the end user expects. If information has been intentionally or unintentionally modified, it is
no longer accurate. Consider, for example, a checking account. You assume that the information
contained in your checking account is an accurate representation of your finances. Incorrect
information in your checking account can result from external or internal errors. If a bank teller,
for instance, mistakenly adds or subtracts too much from your account, the value of the
information is changed. Or, you may accidentally enter an incorrect amount into your account
register. Either way, an inaccurate bank balance could cause you to make mistakes, such as
bouncing a check.
e-mail spoofing lures victims to a Web server that does not represent the organization it
purports to, in an attempt to steal their private data such as account numbers and passwords.
The most common variants include posing as a bank or brokerage company, e-commerce
organization, or Internet service provider.
Integrity Information has integrity when it is whole, complete, and uncorrupted. The integrity
of information is threatened when the information is exposed to corruption, damage,
destruction, or other disruption of its authentic state. Corruption can occur while information is
being stored or transmitted. Many computer viruses and worms are designed with the explicit
purpose of corrupting data. For this reason, a key method for detecting a virus or worm is to
look for changes in file integrity as shown by the size of the file. Another key method of assuring
information integrity is file hashing, in which a file is read by a special algorithm that uses the
value of the bits in the file to compute a single large number called a hash value. The hash value
for any combination of bits is unique. If a computer system performs the same hashing
algorithm on a file and obtains a different number than the recorded hash value for that file, the
file has been compromised and the integrity of the information is lost. Information integrity is
the cornerstone of information systems, because information is of no value or use if users
cannot verify its integrity. File corruption is not necessarily the result of external forces, such as
hackers. Noise in the transmission media, for instance, can also cause data to lose its integrity.
Transmitting data on a circuit with a low voltage level can alter and corrupt the data.
Redundancy bits and check bits can compensate for internal and external threats to the
integrity of information. During each transmission, algorithms, hash values, and the error-
correcting codes ensure the integrity of the information. Data whose integrity has been
compromised is retransmitted.
Utility The utility of information is the quality or state of having value for some purpose or end.
Information has value when it can serve a purpose. If information is available, but is not in a
format meaningful to the end user, it is not useful. For example, to a private citizen U.S. Census
data can quickly become overwhelming and difficult to interpret; however, for a politician, U.S.
Census data reveals information about the residents in a district, such as their race, gender, and
age. This information can help form a politician’s next campaign strategy.
Software
The software component of the IS comprises applications, operating systems, and
assorted command utilities. Software is perhaps the most difficult IS component to secure. The
exploitation of errors in software programming accounts for a substantial portion of the attacks
on information. The information technology industry is rife with reports warning of holes, bugs,
weaknesses, or other fundamental problems in software. In fact, many facets of daily life are
affected by buggy software, from smart phones that crash to flawed automotive control
computers that lead to recalls.
INFORMATION SECURITY P a g e | 16 DEPARTMENT OF CSE
.
Hardware
Hardware is the physical technology that houses and executes the software, stores and
transports the data, and provides interfaces for the entry and removal of information from the
system. Physical security policies deal with hardware as a physical asset and with the protection
of physical assets from harm or theft. Applying the traditional tools of physical security, such as
locks and keys, restricts access to and interaction with the hardware components of an
information system. Securing the physical location of computers and the computers themselves
is important because a breach of physical security can result in a loss of information.
Unfortunately, most information systems are built on hardware platforms that cannot
guarantee any level of
information security if unrestricted access to the hardware is possible. Before September 11,
2001, laptop thefts in airports were common. A two-person team worked to steal a computer as
its owner passed it through the conveyor scanning devices.
The first perpetrator entered the security area ahead of an unsuspecting target and
quickly went through. Then, the second perpetrator waited behind the target until the target
placed his/her computer on the baggage scanner. As the computer was whisked through, the
second agent slipped ahead of the victim and entered the metal detector with a substantial
collection of keys, coins, and the like, thereby slowing the detection process and allowing the
first perpetrator to grab the computer and disappear in a crowded walkway.While the security
response to September 11, 2001 did tighten the security process at airports,hardware can still
be stolen in airports and other public places. Although laptops and notebook computers are
worth a few thousand dollars, the information contained in them can be worth a great deal
more to organizations and individuals.
Data
Data stored, processed, and transmitted by a computer system must be protected. Data is
often the most valuable asset possessed by an organization and it is the main target of
intentional attacks. Systems developed in recent years are likely to make use of database
management systems. When done properly, this should improve the security of the data and the
application. Unfortunately, many system development projects do not make full use of the
database management system’s security capabilities, and in some cases the database is
implemented in ways that are less secure than traditional file systems.
People
Though often overlooked in computer security considerations, people have always been
a threat to information security. Legend has it that around 200 B.C. a great army threatened the
security and stability of the Chinese empire. So ferocious were the invaders that the Chinese
emperor commanded the construction of a great wall that would defend against the Hun
invaders. Around 1275 A.D., Kublai Khan finally achieved what the Huns had been trying for
thousands of years. Initially, the Khan’s army tried to climb over, dig under, and break through
the wall. In the end, the Khan simply bribed the gatekeeper—and the rest is history. Whether
this event actually occurred or not, the moral of the story is that people can be the weakest link
in an organization’s information security program. And unless policy, education and training,
awareness, and technology are properly employed to prevent people from accidentally or
intentionally damaging or losing information, they will remain the weakest link. Social
engineering can prey on the tendency to cut corners and the commonplace nature of human
error. It can be used to manipulate the actions of people to obtain access information about a
system.
Procedures
Another frequently overlooked component of an IS is procedures. Procedures are
written instructions for accomplishing a specific task. When an unauthorized user obtains an
organization’s procedures, this poses a threat to the integrity of the information. For example, a
consultant to a bank learned how to wire funds by using the computer center’s procedures,
which were readily available. By taking advantage of a security weakness (lack of
authentication), this bank consultant ordered millions of dollars to be transferred by wire to his
own account.
Lax security procedures caused the loss of over ten million dollars before the situation
was corrected. Most organizations distribute procedures to their legitimate employees so they
can access the information system, but many of these companies often fail to provide proper
education on the protection of the procedures. Educating employees about safeguarding
procedures is as important as physically securing the information system. After all, procedures
are information in their own right. Therefore, knowledge of procedures, as with all critical
information, should be disseminated among members of the organization only on a need-to-
know basis.
Networks
The IS component that created much of the need for increased computer and
information security is networking. When information systems are connected to each other to
form local area networks (LANs), and these LANs are connected to other networks such as the
Internet,new security challenges rapidly emerge. The physical technology that enables network
functions is becoming more and more accessible to organizations of every size. Applying the
traditional tools of physical security, such as locks and keys, to restrict access to and interaction
with the hardware components of an information system are still important; but when
computer systems are networked, this approach is no longer enough. Steps to provide network
security are essential, as is the implementation of alarm and intrusion systems to make system
owners aware of ongoing compromises.
The figure shows some of the competing voices that must be considered when balancing
information security and access. Because of today’s security concerns and issues, an information
system or data-processing department can get too entrenched in the management and
protection of systems. An imbalance can occur when the needs of the end user are undermined
by too heavy a focus on protecting and administering the information systems. Both information
security technologists and end users must recognize that both groups share the same overall
goals of the organization to ensure the data is available when, where, and how it is needed, with
minimal delays or obstacles. In an ideal world, this level of availability can be met even after
concerns about loss, damage, interception, or destruction have been addressed.
5.What are the approaches used for implementing information security?(6 Marks)
Bottom Up Approach
Security from a grass-roots effort - systems administrators attempt to improve the
security of their systems
Key advantage - technical expertise of the individual administrators
Seldom works, as it lacks a number of critical features:
– participant support
– organizational staying power
Top-down Approach
Initiated by upper management:
– issue policy, procedures, and processes
– dictate the goals and expected outcomes of the project
– determine who is accountable for each of the required actions
This approach has strong upper management support, a dedicated champion, dedicated
funding, clear planning, and the chance to influence organizational culture
May also involve a formal development strategy referred to as a systems development
life cycle
– Most successful top-down approach
Investigation
The first phase, investigation, is the most important. What problem is the system being
developed to solve? The investigation phase begins with an examination of the event or plan
that initiates the process. During the investigation phase, the objectives, constraints, and scope
of the project are specified. A preliminary cost-benefit analysis evaluates the perceived benefits
and the appropriate levels of cost for those benefits. At the conclusion of this phase, and at every
phase following, a feasibility analysis assesses the economic, technical, and behavioural
feasibilities of the process and ensures that implementation is worth the organization’s time
and effort. In summary,
What is the problem the system is being developed to solve?
– The objectives, constraints, and scope of the project are specified
– A preliminary cost/benefit analysis is developed
– A feasibility analysis is performed to assesses the economic, technical, and
behavioral feasibilities of the process
Analysis
The analysis phase begins with the information gained during the investigation phase.
This phase consists primarily of assessments of the organization, its current systems, and its
capability to support the proposed systems. Analysts begin by determining what the new
system is expected to do and how it will interact with existing systems. This phase ends with the
documentation of the findings and an update of the feasibility analysis. In summary,
Consists primarily of
– assessments of the organization
– the status of current systems
– capability to support the proposed systems
Analysts begin to determine
– what the new system is expected to do
– how the new system will interact with existing systems
Ends with the documentation of the findings and a feasibility analysis update
Logical Design
In the logical design phase, the information gained from the analysis phase is used to
begin creating a systems solution for a business problem. In any systems solution, it is
imperative that the first and driving factor is the business need. Based on the business need,
applications are selected to provide needed services, and then data support and structures
capable of providing the needed inputs are chosen. Finally, based on all of the above, specific
technologies to implement the physical solution are delineated. The logical design is, therefore,
the blueprint for the desired solution. The logical design is implementation independent,
meaning that it contains no reference to specific technologies, vendors, or products. It
addresses, instead, how the proposed system will solve the problem at hand. In this stage,
analysts generate a number of alternative solutions, each with corresponding strengths and
weaknesses, and costs and benefits, allowing for a general comparison of available options. At
the end of this phase, another feasibility analysis is performed. In summary,
Based on business need, applications are selected capable of providing needed services
Based on applications needed, data support and structures capable of providing the
needed inputs are identified
Finally, based on all of the above, select specific ways to implement the physical solution
are chosen
At the end, another feasibility analysis is performed
Physical Design
During the physical design phase, specific technologies are selected to support the
alternatives identified and evaluated in the logical design. The selected components are
evaluated based on a make-or-buy decision (develop the components in-house or purchase
them from a vendor). Final designs integrate various components and technologies. After yet
another feasibility analysis, the entire solution is presented to the organizational management
for approval. In summary,
Specific technologies are selected to support the alternatives identified and evaluated in
the logical design
Selected components are evaluated based on a make-or-buy decision
Entire solution is presented to the end-user representatives for approval
Implementation
In the implementation phase, any needed software is created. Components are ordered,
received, and tested. Afterward, users are trained and supporting documentation created. Once
all components are tested individually, they are installed and tested as a system. Again a
feasibility analysis is prepared, and the sponsors are then presented with the system for a
performance review and acceptance test. In summary,
Components are ordered, received, assembled, and tested
Users are trained and documentation created
Users are then presented with the system for a performance review and acceptance test
Investigation
The investigation phase of the SecSDLC begins with a directive from upper management,
dictating the process, outcomes, and goals of the project, as well as its budget and other
constraints. Frequently, this phase begins with an enterprise information security policy
(EISP),which outlines the implementation of a security program within the organization. Teams
of responsible managers, employees, and contractors are organized; problems are analyzed; and
the scope of the project, as well as specific goals and objectives and any additional constraints
not covered in the program policy, are defined. Finally, an organizational feasibility analysis is
performed to determine whether the organization has the resources and commitment
necessary to conduct a successful security analysis and design. In summary,
Identifies process, outcomes and goals of the project, and constraints
Begins with a statement of program security policy
Teams are organized, problems analyzed, and scope defined, including objectives, and
constraints not covered in the program policy
An organizational feasibility analysis is performed
Analysis
In the analysis phase, the documents from the investigation phase are studied. The
development team conducts a preliminary analysis of existing security policies or programs,
along with that of documented current threats and associated controls. This phase also includes
an analysis of relevant legal issues that could affect the design of the security solution.
Increasingly, privacy laws have become a major consideration when making decisions about
information systems that manage personal information. Recently, many states have
implemented legislation making certain computer-related activities illegal. A detailed
understanding of these issues is vital. Risk management also begins in this stage. Risk
management is the process of identifying, assessing, and evaluating the levels of risk facing the
organization, specifically the threats to the organization’s security and to the information stored
and processed by the organization. In summary,
Analysis of existing security policies or programs, along with documented current
threats and associated controls
Includes an analysis of relevant legal issues that could impact the design of the security
solution
The risk management task (identifying, assessing, and evaluating the levels of risk) also
begins
Next, a feasibility analysis determines whether or not the project should be continued or be
outsourced.
The physical design phase evaluates the information security technology needed to
support the blueprint outlined in the logical design generates alternative solutions, and
determines a final design. The information security blueprint may be revisited to keep it in line
with the changes needed when the physical design is completed. Criteria for determining the
definition of successful solutions are also prepared during this phase. Included at this time are
the designs for physical security measures to support the proposed technological solutions. At
the end of this phase, a feasibility study determines the readiness of the organization for the
proposed project, and then the champion and sponsors are presented with the design. At this
time, all parties involved have a chance to approve the project before implementation begins. In
summary,
Creates blueprints for security
Critical planning and feasibility analyses to determine whether or not the project should
continue
In physical design, security technology is evaluated, alternatives generated, and final
design selected
At end of phase, feasibility study determines readiness so all parties involved have a
chance to approve the project
Implementation
The implementation phase in of SecSDLC is also similar to that of the traditional SDLC.
The security solutions are acquired (made or bought), tested, implemented, and tested again.
Personnel issues are evaluated, and specific training and education programs conducted.
Finally, the entire tested package is presented to upper management for final approval. In
summary,
The security solutions are acquired (made or bought), tested, and implemented, and
tested again
Personnel issues are evaluated and specific training and education programs conducted
Finally, the entire tested package is presented to upper management for final approval
8. List the steps that are common between SDLC and Security SDLC and also write the
unique steps of Security SDLC
S.No Phases Steps common to both the systems Life cycle Steps unique to the
development life cycle and the security systems development
security systems development life life cycle
cycle
1 Phase 1: Outline project scope and goals Management defines
Investigation Estimate costs project processes and
Evaluate existing resources goals and documents
Analyze feasibility these in the program
security policy
2 Phase 2: Assess current system against Analyze existing security
Analysis plan developed in Phase 1 policies and programs
Develop preliminary system Analyze current threats
requirements and controls
Study integration of new system Examine legal issues
with existing system Perform risk analysis
Document findings and update
feasibility analysis
3 Phase 3: Assess current business needs Develop security
Logical Design against plan developed in Phase blueprint
2 Plan incident response
Select applications, data support, actions
and structures Plan business response to
Generate multiple solutions for disaster
consideration Determine feasibility of
Document findings and update continuing and/or
feasibility analysis outsourcing the project
4 Phase 4: Select technologies to support Select technologies
Physical solutions developed in Phase 3 needed to support
Design Select the best solution security blueprint
Decide to make or buy Develop definition of
components successful solution
Document findings and update Design physical security
feasibility analysis measures to support
techno logical solutions
Review and approve
project
5 Phase 5: Develop or buy software Buy or develop security
Implementatio Order components solutions
n Document the system At end of phase, present
Train users tested package to
Update feasibility analysis management for approval
Present system to users
Test system and review
performance
6 Phase 6: Support and modify system Constantly monitor, test,
Maintenance during its useful life modify, update, and
and Test periodically for compliance repair to meet changing
Change with business needs threats
Upgrade and patch as necessary
INFORMATION SECURITY P a g e | 24 DEPARTMENT OF CSE
.
Security as Science
Technology developed by computer scientists and engineers—which is designed for
rigorous performance levels—makes information security a science as well as an art. Most
scientists agree that specific conditions cause virtually all actions in computer systems. Almost
every fault, security hole, and systems malfunction is a result of the interaction of specific
hardware and software. If the developers had sufficient time, they could resolve and eliminate
these faults. The faults that remain are usually the result of technology malfunctioning for any
one of a thousand possible reasons. There are many sources of recognized and approved
security methods and techniques that provide sound technical security advice. Best practices,
standards of due care, and other tried-and-true methods can minimize the level of guesswork
necessary to secure an organization’s information and systems.
Dealing with technology designed to perform at high levels of performance
Specific conditions cause virtually all actions that occur in computer systems
Almost every fault, security hole, and systems malfunction is a result of the interaction of
specific hardware and software
If the developers had sufficient time, they could resolve and eliminate these faults
Senior Management
The senior technology officer is typically the chief information officer (CIO), although
other titles such as vice president of information, VP of information technology, and VP of
systems may be used. The CIO is primarily responsible for advising the chief executive officer,
president, or company owner on the strategic planning that affects the management of
information in the organization. The CIO translates the strategic plans of the organization as a
whole into strategic information plans for the information systems or data processing division
of the organization. Once this is accomplished, CIOs work with subordinate managers to develop
tactical and operational plans for the division and to enable planning and management of the
systems that support the organization.
The chief information security officer (CISO) has primary responsibility for the
assessment, management, and implementation of information security in the organization. The
CISO may also be referred to as the manager for IT security, the security administrator, or a
similar title.The CISO usually reports directly to the CIO, although in larger organizations it is
not uncommon for one or more layers of management to exist between the two. However, the
recommendations of the CISO to the CIO must be given equal, if not greater, priority than other
technology and information-related proposals. The placement of the CISO and supporting
security staff in organizational hierarchies is the subject of current debate across the industry.
Chief Information Officer
– the senior technology officer
– primarily responsible for advising the senior executive(s) for strategic planning
Chief Information Security Officer
– responsible for the assessment, management, and implementation of securing the
information in the organization
– may also be referred to as the Manager for Security, the Security Administrator, or
a similar title
Data Responsibilities
The three types of data ownership and their respective responsibilities are outlined
below:
Data owners: Those responsible for the security and use of a particular set of information.They
are usually members of senior management and could be CIOs. The data owners usually
determine the level of data classification (discussed later), as well as the changes to that
classification required by organizational change. The data owners work with subordinate
managers to oversee the day-to-day administration of the data.
INFORMATION SECURITY P a g e | 27 DEPARTMENT OF CSE
.
Data custodians: Working directly with data owners, data custodians are responsible for the
storage, maintenance, and protection of the information. Depending on the size of the
organization, this may be a dedicated position, such as the CISO, or it may be an additional
responsibility of a systems administrator or other technology manager. The duties of a data
custodian often include overseeing data storage and backups, implementing the specific
procedures and policies laid out in the security policies and plans, and reporting to the data
owner.
Data users: End users who work with the information to perform their assigned roles supporting
the mission of the organization. Everyone in the organization is responsible for the security of data,
so data users are included here as individuals with an information security role.
INFORMATION SECURITY P a g e | 28 DEPARTMENT OF CSE