Notes 139
Notes 139
Notes 139
Information assurance and security are related but separate concepts. “The
terms are inherently linked and share an ultimate goal of preserving the integrity of
information,” Information assurance is about protecting information assets while
Information assurance and security is the management and protection of knowledge,
information, and data.
Information assurance, which focuses on ensuring the availability, integrity,
authentication, confidentiality, and non-repudiation of information and systems.
These measures may include providing for restoration of information systems by
incorporating protection, detection, and reaction capabilities. Focuses on
gathering data.
2. Errors and Negligence- People are prone to make errors when using
computers, especially after long hours of work. Typographical errors can occur
when entering data, and if these errors are not checked, validated, and corrected
they affect the accuracy and integrity of information. Even the most advanced
programs may not detect all input errors or negligence. A thorough awareness
program for all employees is beneficial in reducing or eliminating employee error
and neglect. Another source of errors is misconfigured systems and failures to
patch software in a timely fashion. While a technical error, a misconfigured
system may leave vulnerable services running. These services are ripe for
hackers to exploit.
3. Fraudulent and Theft Activities- Fraud and theft activities are common in the
business world. In modern financial systems using IT, fraud involving checks,
credit cards, and automatic teller machine (ATM) networks can add up to
multimillion-dollar losses. With technical advancement and downloadable
materials from the Internet, anyone with basic knowledge of system penetration
may successfully trespass sensitive areas of financial information systems.
How to avoid: An example is transferring large amounts of money into personal
accounts online. Someone internal or external to the organization can carry out
this type of crime. Internal parties are more familiar with the targeted system.
These internal threats are not limited to technical employees. These threats can
be exploited by administrative or even suspended employees whose access
rights have not been revoked appropriately. As long as the IT infrastructure
connects to the outside world, external exploits can come from anywhere
including wireless communications.
Capabilities of Attackers:
Elite hackers- These highly technical individuals seek new vulnerabilities
in systems and can create scripts and programs to exploit vulnerabilities. These
actors are often sponsored by terrorists, nation states, military, or organized
crime, or they are engaged in industrial espionage.
Script writers- are the next step down on the family tree of attackers.
Although less technically qualified in finding vulnerabilities, they are capable of
building and executing scripts to exploit known vulnerabilities.
Script kiddies who possess neither the expertise to find vulnerabilities
nor the skills to exploit them. Their knowledge is limited to downloading and
executing scripts and tools that others have developed. These individuals
constitute the majority of the threat community. Despite their lack of skills, large
numbers of script kiddies constitute a threat. When large numbers of script
kiddies are active, they provide sufficient traffic and increased risks for defensive
systems by masking activities of the elite hackers.
Motivation of Attackers: Attackers have diverse motivations. Some are
motivated by greed and money; others are motivated by prestige or revenge.
A. Hackers and hacktivist- Hackers use technical and social means to gain
authorized/unauthorized access to information assets, computer systems,
and networks. Some of the technical means include delving deep into the
code and protocols used in computer systems and networks.
a. White-hat hackers who use their skills to determine whether
systems are in fact secure. White hats operate within strict rules of
engagement and with the explicit permission of a system’s owner.
They also often subscribe to professional codes of ethics as part of
their professional credentialing.
b. Black-hat hackers who are motivated by using their skills to
penetrate systems by the path of least resistance without
authorization from the system owner.
c. Gray hat attempts to walk the line between the black hat and the
white hat. White hats will often state there is no “gray”; once a
hacker gives up on ethics and the strict rules of engagement, their
credibility as a white hat is compromised.
d. Hacktivists are motivated to use their skills for political purposes.
Hacktivists are becoming more common and can take the form of
script kiddies, the elite, or anywhere in between. Often, information
systems connected with political agendas or national security
systems are the targets of hacktivists.
B. Criminal Attackers- These attackers view the computer and its contents
as the target of a crime—it’s something to be stolen or it’s used to
perpetrate the crime. These individuals are motivated simply by profit and
greed. Since most large financial transactions occur on networks,
electronic crimes include fraud, extortion, theft, embezzlement, and
forgery.
C. Nation States- Nation states are motivated by espionage and economic
gain. While nation states spy on each other to gain political information,
nation states may also engage in industrial espionage.
D. National warfare, asymmetric warfare, and terrorism- Nations depend
on information systems to support the economy, infrastructure, and
defense, which are all important assets. They are now targets not only of
unfriendly foreign powers that are sources of highly structured threats but
also of terrorists who are somewhat less structured. Independent of
source, their actions constitute information warfare.
E. Information Warfare- Information warfare is using information technology
as a weapon to impact an adversary. Several recent examples have
shown how customized malware and computer viruses can dramatically
impact the progression of secret nuclear ambitions or severely cripple the
command and control infrastructure of an opponent.
Types of Attacks: For this type of attack, the attacker may create false content or
deface the appearance. This may damage the organization’s image and reputation in
terms of customer confidence and providing reliable services to its clients.
A. Technical Attacks- For this type of attack, the attacker may create false
content or deface the appearance. This may damage the organization’s
image and reputation in terms of customer confidence and providing
reliable services to its clients.
B. Social Engineering (SE) Attacks- rely on trust. These attacks are
performed over the phone after sufficient background information has
been obtained concerning the target. Electronic SE attacks seem to be
overtaking the phone SE attacks.
C. Physical Attacks- rely on weaknesses surrounding computer systems.
These may take the form of dumpster diving for changed passwords and
configuration information, organizing unauthorized access to a wiring
closet and installing a Wi-Fi bridge to hack from a parking lot outside.
There are several steps commonly used in executing an attack. First, the
perpetrator will profile the organization they want to attack. They will do simple things
such as Google the organization or use a Whois lookup. Armed with that data, they will
try to determine what systems are exposed by using tools such as Nmap or a ping
sweep. The third step is finger printing. Using knowledge of the exposed systems, they
will use tools such as a banner grab to identify the operating system and the open ports.
After intelligence gathering, the attack begins by the attacker searching for
vulnerabilities and exploits that match; then, they will systematically execute exploits.
Appropriate countermeasures are discussed later; however, significant protection
comes from simple steps such as limiting the amount of information exposed to the
outside world. This makes system hardening and patching even more effective.
7. Employee Sabotage- When considering deliberate human acts, you should
consider the motive means, and opportunity of the individual or group. As
mentioned earlier, disgruntled employees who know the internal technical details
of systems present a continuous threat to the organization. Employees may carry
out antisocial or unwanted actions, such as the following:
Damaging the organization’s key infrastructure.
Revealing secret and confidential information to competitors.
Creating tensions and rifts among employees by spreading hoaxes or
anonymous rumors.
Threatening the health and safety of others.
Stealing important documents
An employee might resort to sabotage because of the following:
Codes- differs from a cipher in that a code consists of letters, whole words, and phrases
with code groups (numbers and/or words) that replace the plain text. People desiring to
read the encoded message need a codebook to translate the code to plain text. For
example, a nine-digit customer account number is a code.
Ciphers- uses the individual letters as the basic plain-text units and uses a key (or
password), which tells the composition of letters in the cipher alphabet or the pattern of
rearranging letters in a message. Messages sent unencoded or unenciphered are in
plain language, in the clear, or in clear text.
Types of Encryption:
A. Symmetric Encryption- is when the sender and receiver use the same private
key to encrypt and decrypt a message. The key and the plain-text (unencrypted)
message are combined systematically to yield a cipher text. If the encryption is
secure, others cannot recover the message from the cipher text unless they
know both the key and the systematic process used (called the encryption
algorithm). Symmetric encryption is relatively fast.
B. Asymmetric Encryption- uses two different keys (one is public and the other is
kept private) and an algorithm for mathematic al functions that would require
extensive resources to break. One key, called a public key, is used to encrypt a
message, and a second key, called a private key, is used to decrypt the message
(using the mathematical function)
Encryption Key Escrow- When individuals use encryption without central mandatory
control, the availability of organizational data is threatened. Employees who are fired or
die unexpectedly are equally unlikely to return and provide the company with the
encryption keys that secure their important files. Senior leaders must ensure the
management of encryption is closely monitored. Organizations should implement rules
that include termination for unauthorized use of encryption.