Security : the degree of protection against criminal activity, danger, damage, and/or loss
There are some videos publishers make to educate people about the benefits and importance of security to organizations and individuals. CLICK THE COLOURED TEXT BELOW TO SEE THE RELATED VIDEO.
Information security: all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
Information and information systems can be compromised by deliberate criminal actions and by anything that can impair the proper functioning of an organization’s information systems
Organizations collect huge amounts of information and employ numerous information systems that are subject to myriad threats
INFORMATION SECURITY.. WHAT YOU NEED TO KNOW
Threat:
|
any danger to which a system may be exposed
|
Exposure:
|
the harm, loss or damage that can result if a threat compromises that
resource
|
Vulnerability:
|
the possibility that the system will suffer harm by a threat
|
Threats to Information Security :
Today five key factors are contributing to the increase vulnerability of organizational information resources, making it much more difficult to source them :
1)Today’s interconnected, interdependent, wirelessly-networked
business environment
|
-complex, interconnected, interdependent, wirelessly networked
business environment. The internet now
enables millions of computers and computer networks to communicate freely and
seamlessly with one another. Organizations
and individuals are exposed to a world of untrusted networks and potential
attackers.
-A trusted network, in general, is any network within your organization
-An untrusted network, in general, is any network external to your
organization.
-Wireless technologies enable employees to compute, communicate, and
access the internet anywhere and anytime.
Significantly, wireless is an inherently nonsecure broadcast
communications medium
|
2) Smaller, faster, cheaper computers and storage devices (flash
drives).
|
It reflects the fact that modern computers and storage devices( e.g.,
thumb drives or flash drives ) continue to become smaller, faster, cheaper,
and more portable, with greater storage capacity. These characteristics make it much easier
steal or lose a computer or storage device that contains huge amounts of
sensitive information. Also, far more
people are able to afford powerful computers and connect inexpensively to the
internet, thus raising the potential of an attack on information assets
|
3)Decreasing skills necessary to be a computer hacker
|
-Is that the computing skills necessary to be a hacker are
decreasing. The reason is that the
internet contains information and computer programs called scripts that users
with few skills can download and use to attack any information system
connected to the internet.
-( security experts can also use these scripts for legitimate
purposes, such as testing the security of various systems).
Hacker: a person who finds out weaknesses in the computer
system and exploits it
|
4)International organized crime turning to cybercrime
|
-Is that international organized crime is taking over cybercrime
-Cybercrime: refers to
illegal activities conducted over computer networks,
particularly the internet.
iDefense
|
5)Lack of management support
|
For the entire organization to take security policies and procedures
seriously, senior managers must set the tone.
Ultimately, however lower-level managers may be even more important.
These managers are in close contact
with employees every day and thus are in a better position to determine
whether employees are folloeing security procedures
|
Unintentional Threats to Information Systems :
Information systems are vulnerable to many potential hazards and threats
* The two major categories of threats are :
1) unintentional threats
2) Deliberate threats
· Unintentional threats are acts performed without malicious intent that nevertheless represent a serious threat to information security
· A major category of unintentional threats is human error

Human Errors:
- Carelessness with laptops and portable computing devices
- Opening questionable e-mails
- Careless Internet surfing
- Poor password selection
Social Engineering:
It’s an attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information such as passwords.
The most common example of social engineering occurs when the attacker impersonates someone else on the telephone, such as a company manager or an information systems employee. The attacker claims he forgot his password and asks the legitimate employee to give him a password to use. Other common ploys include posing as an exterminator, an air-conditioning technician, or a fire marshal. Examples of social engineering abound.
In one company, a perpetrator entered a company building wearing a company ID card that looked legitimate. He walked around and put up signs on bulletin boards reading “ The help desk telephone number has been changed. The new number is 555-1234.” He then exited the building and began receiving calls from legitimate employees thinking they were calling the company help desk. Naturally, the first thing the perpetrator asked for was user name and password. He now had the information necessary to access the company’s information systems.
Two other social engineering techniques:
Tailgating:Is a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry. The perpetrator follows closely behind legitimate employee, and ,when the employee gains entry, the attacker asks him or her to “ hold the door.”
Shoulder surfing:
Occurs when a perpetrator watches an employee’s computer screen over the employee’s shoulder. This technique is particularly successful in public areas such as in airports and on commuter trains and airplanes
Deliberate Threats to Information Systems:
Espionage or trespass:
Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information. It is important to distinguish between competitive intelligence and industrial espionage.
- competitive intelligence consists of legal information-gathering techniques, such as studying a company’s website and press releases. Attending trade shows, and so on.
- industrial espionage, in contrast, it crosses the legal boundary
Information extortion:
Information extortion occurs when an attacker either threatens to steal, or actually steals, information from a company.
The perpetrator demands payment for not stealing the information, for returning stolen information, or for agreeing not to disclose the information
Sabotage or vandalism:Sabotage or vandalism are deliberate acts that involve defacing an organization’s website, possibly damaging the organization’s image and causing its customers to lose faith. One form of online vandalism is a hacktivist or cyberactivist operation. These are cases og high-tech civil disobedience to protest the operations, policies, or actions of an organization or government agency
Theft of equipment or information
Computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage (for example, laptops, BlackBerry units, personal digital assistants, smartphones, digital cameras, thumb drives, and iPods). As a result, these devices are becoming easier to steal and easier for attackers to use to steal information.
One type of human mistake is carelessness with laptops. In fact, many laptops have been stolen due to such carelessness. The cost of stolen laptop includes the loss of data, the loss of intellectual property, laptop replacement, legal and regulatory costs, investigation fees, and loss productivity.
One form of theft, known as dumpster diving, involves the practice of rummaging through commercial or residential trash to find information that has been discarded. Paper files, letters, memos, photographs, IDs, passwords, credit cards, and other forms of information can be found in dumpsters. Unfortunately, many people never consider that the sensitive items they throw in the trash may be recovered. Such information, when recovered, can be used for fraudulent purposes.
Dumpster diving is not necessarily theft, because the legality of this act varies. Because dumpsters are usually located on private premises, dumpster diving is illegal in some parts of the United states. Even in these cases, however, these laws are enforced with varying degrees of rigot.
Pod slurping: perpetrator plugs portable device into a USB port in a computer and downloads sensitive information
Dumpster diving: rummaging through commercial or residential trash to find information that has been discarded
Identity theft :
Identify theft is the deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime. Techniques for illegally obtaining personal information include:
· Stealing mail or dumpster diving
· Stealing personal information in computer databases
· Infiltrating organizations that store large amounts of personal information(e.g., data aggregators such as Acxiom)
· Impersonating a trusted organization in an electronic communication (phishing)
Recovering from identity theft is costly, time consuming, and difficult. Victims also report problems in obtaining credit and obtaining or holding a job, as well as adverse effects on insurance or credit rates. In addition, victims state that it is often difficult to remove negative information from their records, such as their credit reports.
Your personal information can be compromised in other ways. For example, your identity can be uncovered just by examining your searches in a search engine. The ability to analyze all searches by a single user can enable a criminal to identify who the user is and what he or she is doing. To demonstrate this fact, The New York Times tracked down a particular individual based solely on her AOL searches
Compromises to Intellectual Property (IP):
- Trade secret: an intellectual work such as business plan, that is a company secret and not based on public information
- Patent: a document that grants the holder exclusive rights on an invention or process for 20 years.
- Copyright: a statuary grant that provides the creator of IP with ownership of the property for the life of the creator plus 70 years
- Piracy: the illegal copying of software
Software attacks :
Virus:
a segment of computer code that performs malicious actions by attaching to another computer program.
Worm:
a segment of computer code that spreads by itself and performs malicious actions without requiring another computer program
Trojan horse:
a software program that hides in other computer programs and reveal its designed behavior only when it is activated. A typical behavior of a Trojan horse is to capture your sensitive information (e.g., passwords, account numbers, etc.) and send them to the creator of the Trojan horse.
Logic Bomb:
a segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time and date.
Phishing attacks
use deception to acquire sensitive personal information by masquerading as official-looking e-mails
Denial-of-service attack
Attackers sends so many information requests to a target computer system that the system cannot handle them successfully, and typically crashes .
Spyware: software that collect personal information about users without their consen.
- Keystroke loggers: record your keystrokes and your Web browsing history
- Screen scrapers: record a continuous “movie” of what you do on a screen
Cookies
Supervisory Control and Data Acquisition (SCADA) Attacks:SCADA refers to a large-scale, distributed measurement and control system. SCADA systems are used to monitor or to control chemical, physical, and transport processes such as those used in oil refineries, water and sewage treatment plants, electrical generators, and nuclear power plants. Essentially, SCADA systems provide a link between the physical world and the electronic world.
SCADA systems consist of multiple sensors, a master computer, and communications infrastructure. The sensors connect to physical equipment. They read status data such as the open/closed status of a switch or a valve, as well as measurements such as pressure, flow, voltage, and current. They control the equipment by sending signals to it, such as opening or closing a switch or value or setting the speed of a pump.
The sensors are connected in a network, and each sensor typically has an internet address( Internet Protocol, or IP, address ). If attackers gain access to the network, they can cause serious damage, such as disrupting the power grid over a large area or upsetting the operations of a large chemical or nuclear plant. Such actions could have catastrophic results
Cyber-terrorism and Cyber-warfare :
Attackers use a target’s computer systems, particularly via the Internet, to cause physical, real-world harm or sever disruption, usually to carry out a political agenda
In 2008, the Cyber- invasion of Georgia by the Russian
What Organizations Are Doing to Protect Information Resources:
Risk: the probability that a threat will impact an information resource
Risk management: to identify, control and minimize the impact of threats.
Risk analysis: to assess the value of each asset being protected, estimate the probability it might be compromised, and compare the probable costs of it being compromised with the cost of protecting it.
Risk mitigation: is when the organization takes concrete actions against risk.
It has two functions:
(1) implement controls to prevent identified threats from occurring.
(2) develop a means of recovery should the threat become a reality.
Risk Acceptance: accept the potential risk, continue operating with no controls, and absorb any damages that occur.
Risk limitation: Limit the risk by implementing controls that minimize the impact of threat.
Risk transference: Transfer the risk by using other means to compensate for the loss, such as purchasing insurance and having off-site backups
Physical controls: physical protection of computer facilities and resources (Guards, doors, alarm systems)
Access controls: restriction of unauthorized user access to computer resources
Communications (network) controls: protect the movement of data across networks and include border security controls, authentication and authorization.
(1) Authentication
Determines/confirms the identity of the person requiring access
Something the user is: access controls that examine a user's physiological or behavioral characteristics
Biometrics
- Voice verification
- Fingerprints
- Retina scan
Something the user does : these access controls include voice and signature recognitio
Something the user knows
- Password : a private combination of characters that only the user should know example: nam3-beeS
- Passphrases: a series of characters that is longer than a password but can be memorized easily example: omanFT2brazilworldcup
(2) Authorization Determines which actions, rights or privileges the person has to do certain activities with information resources, based on his/her verified identity
Privilege: a collection of related computer system operations that can be performed by users of the system
Least privilege: a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization
Application controls: protect specific applications
Communications control ( network controls )
Secure the movement of data across networks. Communications control consist of firewalls, anti-malware systems, whitelisting and blacklisting, encryption, virtual private networks (VPNs), secure socket layer (SSL), employee monitoring systems.
· Firewalls :
System that enforces access-control policy between two networks.
· Anti-malware Systems :
software packages that attempt to identify and eliminate viruses, worms, and other malicious software .
· Whitelisting and Blacklisting:
Whitelisting :
a process in which a company identifies the software that it will allow to run and does not try to recognize malware
Blacklisting :
a process in which a company allows all software to run unless it is on the blacklist
· Encryption : Process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Digital Certificate: an electronic document attached to a file certifying that the file is from the organization that it claims to be from and has not been modified from its original format.
Certificate authorities: trusted intermediaries between two organizations, issue digital certificates
· Virtual Private Networking.
· Secure Socket Layer (SSL).
· Employee Monitoring Systems.