Cnss Security Model
Cnss Security Model
Cnss Security Model
File corruption is not necessarily the result of external forces, such as hackers. Noise in the
transmission media, for instance, can also cause data to lose its integrity. Transmitting 1
data on a circuit with a low voltage level can alter and corrupt the data. Redundancy bits
and check bits can compensate for internal and external threats to the integrity of informa-
tion. During each transmission, algorithms, hash values, and the error-correcting codes
ensure the integrity of the information. Data whose integrity has been compromised is
retransmitted.
Utility The utility of information is the quality or state of having value for some purpose
or end. Information has value when it can serve a purpose. If information is available, but is
not in a format meaningful to the end user, it is not useful. For example, to a private citizen
U.S. Census data can quickly become overwhelming and difficult to interpret; however, for a
politician, U.S. Census data reveals information about the residents in a district, such as
their race, gender, and age. This information can help form a politician’s next campaign
strategy.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 Chapter 1
Software
The software component of the IS comprises applications, operating systems, and assorted
command utilities. Software is perhaps the most difficult IS component to secure. The exploi-
tation of errors in software programming accounts for a substantial portion of the attacks on
information. The information technology industry is rife with reports warning of holes, bugs,
weaknesses, or other fundamental problems in software. In fact, many facets of daily life are
affected by buggy software, from smartphones that crash to flawed automotive control com-
puters that lead to recalls.
Software carries the lifeblood of information through an organization. Unfortunately, soft-
ware programs are often created under the constraints of project management, which limit
time, cost, and manpower. Information security is all too often implemented as an after-
thought, rather than developed as an integral component from the beginning. In this way,
software programs become an easy target of accidental or intentional attacks.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction to Information Security 17
Hardware
Hardware is the physical technology that houses and executes the software, stores and trans-
ports the data, and provides interfaces for the entry and removal of information from the
system. Physical security policies deal with hardware as a physical asset and with the protection
of physical assets from harm or theft. Applying the traditional tools of physical security, such as
locks and keys, restricts access to and interaction with the hardware components of an informa-
tion system. Securing the physical location of computers and the computers themselves is impor-
tant because a breach of physical security can result in a loss of information. Unfortunately,
most information systems are built on hardware platforms that cannot guarantee any level of
information security if unrestricted access to the hardware is possible.
Before September 11, 2001, laptop thefts in airports were common. A two-person team
worked to steal a computer as its owner passed it through the conveyor scanning devices.
The first perpetrator entered the security area ahead of an unsuspecting target and quickly
went through. Then, the second perpetrator waited behind the target until the target placed
his/her computer on the baggage scanner. As the computer was whisked through, the second
agent slipped ahead of the victim and entered the metal detector with a substantial collection
of keys, coins, and the like, thereby slowing the detection process and allowing the first per-
petrator to grab the computer and disappear in a crowded walkway.
While the security response to September 11, 2001 did tighten the security process at air-
ports, hardware can still be stolen in airports and other public places. Although laptops and
notebook computers are worth a few thousand dollars, the information contained in them
can be worth a great deal more to organizations and individuals.
Data
Data stored, processed, and transmitted by a computer system must be protected. Data is
often the most valuable asset possessed by an organization and it is the main target of
intentional attacks. Systems developed in recent years are likely to make use of database
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
18 Chapter 1
management systems. When done properly, this should improve the security of the data and
the application. Unfortunately, many system development projects do not make full use of
the database management system’s security capabilities, and in some cases the database is
implemented in ways that are less secure than traditional file systems.
People
Though often overlooked in computer security considerations, people have always been a
threat to information security. Legend has it that around 200 B.C. a great army threatened
the security and stability of the Chinese empire. So ferocious were the invaders that the
Chinese emperor commanded the construction of a great wall that would defend against
the Hun invaders. Around 1275 A.D., Kublai Khan finally achieved what the Huns had been
trying for thousands of years. Initially, the Khan’s army tried to climb over, dig under, and
break through the wall. In the end, the Khan simply bribed the gatekeeper—and the rest is
history. Whether this event actually occurred or not, the moral of the story is that people
can be the weakest link in an organization’s information security program. And unless policy,
education and training, awareness, and technology are properly employed to prevent people
from accidentally or intentionally damaging or losing information, they will remain the
weakest link. Social engineering can prey on the tendency to cut corners and the common-
place nature of human error. It can be used to manipulate the actions of people to obtain
access information about a system. This topic is discussed in more detail in Chapter 2, “The
Need for Security.”
Procedures
Another frequently overlooked component of an IS is procedures. Procedures are written
instructions for accomplishing a specific task. When an unauthorized user obtains an organiza-
tion’s procedures, this poses a threat to the integrity of the information. For example, a consul-
tant to a bank learned how to wire funds by using the computer center’s procedures, which
were readily available. By taking advantage of a security weakness (lack of authentication),
this bank consultant ordered millions of dollars to be transferred by wire to his own account.
Lax security procedures caused the loss of over ten million dollars before the situation was cor-
rected. Most organizations distribute procedures to their legitimate employees so they can
access the information system, but many of these companies often fail to provide proper educa-
tion on the protection of the procedures. Educating employees about safeguarding procedures is
as important as physically securing the information system. After all, procedures are informa-
tion in their own right. Therefore, knowledge of procedures, as with all critical information,
should be disseminated among members of the organization only on a need-to-know basis.
Networks
The IS component that created much of the need for increased computer and information
security is networking. When information systems are connected to each other to form local
area networks (LANs), and these LANs are connected to other networks such as the Internet,
new security challenges rapidly emerge. The physical technology that enables network func-
tions is becoming more and more accessible to organizations of every size. Applying the tra-
ditional tools of physical security, such as locks and keys, to restrict access to and interaction
with the hardware components of an information system are still important; but when com-
puter systems are networked, this approach is no longer enough. Steps to provide network
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction to Information Security 19
security are essential, as is the implementation of alarm and intrusion systems to make system
owners aware of ongoing compromises. 1
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.