Module 8 INFOSEC TECHNOLOGY COMPONENTS
Module 8 INFOSEC TECHNOLOGY COMPONENTS
Module 8 INFOSEC TECHNOLOGY COMPONENTS
SPSaS 2102
Learning Module
Module 08:
Information security
technology components
Introduction
Page 124
Foundation of Information Security
SPSaS 2102
Learning Module
The Industrial revolution was a good example where new technologies (industrial
engines) fundamentally re-designed manufacturing processes (production lines) and had
far reaching impacts on the people employed (not all of it good one might add) through
the dis-aggregation of skills, the re-balancing of power in favor of owners, urbanization
etc. and we cannot deny the fact that cyber security is a business issue. This means that
Management is accountable for ensuring that its organization’s cyber security strategy
meets business objectives and is adopted as a strategic risk. Discussions of cyber risk at
board level should include identifying which risks to avoid, accept, mitigate or transfer
(such as through cyber insurance), as well as reviewing specific plans associated with
each approach. The three fundamental domains of an effective cyber security strategy
are: people, processes and technology also these three key areas that will make or break
a good Information Security setup/ Infrastructure.
• People – are the most difficult portion of the program because everyone from the
CEO on down needs to play his part to ensure an effective program
• Process – are the glue that binds the people and technology components of your
program. The process must be very clear for everyone in the organization to follow
them.
• Technology – is often confusing and can sometimes establish false sense of
security in your organization.
Page 125
Foundation of Information Security
SPSaS 2102
Learning Module
According to Dutton J., 2017 it is a common misconception that cyber security is all about
technology (hardware and software). Technology is obviously a massive part of cyber
security, but alone it is not enough to protect you from modern cyber threats. A specific
enterprise may have the technology in place but if they don’t have proper processes and
haven’t trained their staff on how to use technology then they create vulnerabilities.
Cyber security consists of technologies, processes and measures that are designed to
protect individuals and organizations from cybercrimes. Effective cyber security reduces
the risk of a cyber-attack through the deliberate exploitation of systems, networks and
technologies. Cyber security is a sub-section of information security.
ISO 27001 – the standard that advocates the three pillars of cyber security
ISO 27001 is the international standard for an ISMS, and advocates the combination of
these three pillars (people, process and technology). Creating an ISO 27001 ISMS will
ensure every aspect of cyber security is addressed within your organization. ISO 27001 is
rapidly gaining momentum as the world’s leading cyber security standard, offering robust
defenses to those who implement it, as well as helping them win new business through
their commitment to security.
IT Governance’s ISO 27001 DIY packages enable any organization to implement ISO
27001 from anywhere in the world. Each package is a carefully selected mix of training,
tools and consultancy that help organizations with different internal competencies
implement the Standard.
According to Egan, M. & Mather, T. (2004) there are seven Information Security
Technology Components the following components are listed below:
Page 126
Foundation of Information Security
SPSaS 2102
Learning Module
• Ensures only authorized staff, customers, vendors, or partners can access your
systems
• Authentication is a process that determines who you are.
- Something you know such as password, something that you have such as a token, and
something that you are such as your fingerprints with biometrics and where you are such
as GPS satellites to locate you.
- Enables you to review who is accessing your systems and what are they doing.
Page 127
Foundation of Information Security
SPSaS 2102
Learning Module
Firewall technology:
- Packet filtering firewalls - provide protection by interrogating the header or address info
of a packet or message to identify potential issues (not examine the body or referred to as
‘payload’)
Page 128
Foundation of Information Security
SPSaS 2102
Learning Module
In this configuration, the Enterprise Manager Console and Management Server are
separated by a firewall.
Page 129
Foundation of Information Security
SPSaS 2102
Learning Module
Special configuration is not required for either the Console or the Management Server in
this case.
In this configuration, the Intelligent Agent that runs on the managed node and the
Management Server are on opposite sides of the firewall, as shown in the following
illustration.
Page 130
Foundation of Information Security
SPSaS 2102
Learning Module
Port
Number Usage
1748, 1754 Management Server communicating with the Agent to discover new
targets.
7772 Agent communicating with the Management Server.
7773 Agent communicating with the Management Server via SSL.
No special setup and configuration is required for the Management Server or Intelligent
Agents in this situation.
If the Management Server and administered database (or other managed target) are
separated by a firewall, then the Management Server acts as a proxy for the Enterprise
Manager Console, resulting in the remote database viewing the Management Server as
the client. For this reason, there must be a SQL*Net proxy between the Management
Server and the administered database. If the Console is launched in Standalone Mode,
there must be a SQL*Net proxy between the Console and the Management Server, and
between the Management Server and ALL collections services (Data Gatherer)
connections.
Some firewalls use a feature called Network Address Translation (NAT). This feature
masks the true IP address of a client by translating it to a different IP address. Packets
sent from a remote client to a server through the firewall will be known to the server by
this translated address. As the client and server communicate, the NAT software handles
the mapping of the true IP address to its translated address. Of the two Enterprise
Manager configurations previously discussed, only an Enterprise Manager Console and
Management Server can be separated by firewalls using NAT. No changes are required
for Enterprise Manager to support NAT in this configuration.
The Management Server and Intelligent Agent cannot be separated by firewalls using
NAT because the Management Server and Agent communication includes the other's
host address information, which is stored in the data packet rather than in the IP header.
Since NAT only looks for (and translates) addresses in the IP header, NAT will not work
with Management Server/Agent communication.
Virtual Private Networks (VPNs) allow remote employees to connect in a secure fashion
to a corporate server located in the corporate Local Area Network (LAN) using the routing
infrastructure provided by a public network (such as the Internet). From the user's
Page 131
Foundation of Information Security
SPSaS 2102
Learning Module
perspective, the VPN is a point-to-point connection between the user's computer and a
corporate server. The nature of the intermediate network is irrelevant to the user because
it appears as if the data is being sent over a dedicated private link.
To create secure VPNs, VPN software typically operates in IPSEC Tunnel Mode. In this
mode, data sent from a client is first encrypted and then encapsulated before being
transmitted over an insecure, public network such as the Internet. Upon arriving at its
destination, VPN software unpacks, decrypts and authenticates the data received, then
forwards it on to its final destination.
Many e-businesses use both VPNs and firewalls as part of their security infrastructure. In
these configurations, the firewall must allow IPSEC-compliant traffic to pass through (port
500 is used by default). Application data that is sent via VPN is first encapsulated and
tunnelled through port 500 in the firewall, unpacked, and sent to its final destination.
Targets that have been set up to use VPN thus avoid having to open up additional ports in
Page 132
Foundation of Information Security
SPSaS 2102
Learning Module
the firewall. Applications that run on VPN-enabled nodes can also communicate safely
and securely across the firewall.
As previously discussed, VPNs that comply with IPSEC standards allow the secure
transfer of information over the internet: Remote clients can connect to a secure server
with minimum configuration and maximum security. It is also possible to use VPNs in
conjunction with firewalls. The following example shows a VPN environment with the
Enterprise Manager Console and the Management Server on opposite sides of the
firewall.
In this example, both the Console and Management Server machines have VPN software
configured to provide a secure communication channel between the two. Specifically, the
machine running Enterprise Manager client must have the VPN client software installed.
The machine running the Management Server must have the VPN gateway software
installed. Additionally, the firewall must be configured to allow only IPSEC traffic (IPSEC
by default uses port 500). In this configuration, all the network traffic between the Console
and the Management Server will be tunneled automatically through port 500 by the VPN
software.
No additional configuration is required for Enterprise Manager components since the VPN
software handles communication tasks automatically.
When the Enterprise Manager Console is launched, the user may be prompted by a VPN
client software dialog to enter user security information. Once a valid username and
Page 133
Foundation of Information Security
SPSaS 2102
Learning Module
password are provided to the VPN client, subsequent communication between the
Console and Management Server across the virtual network will appear seamless.
No additional changes are required for the firewall configuration if IPSEC traffic is already
allowed.
Some VPN providers may allow server processes on different nodes to communicate. In
these configurations, it is possible to deploy the Management Server on one VPN-
enabled node and the Agent on another VPN-enabled node. The same principles as
described in the previous section apply. It is important to note that communication
between the Management Server node and Agent node is bi-directional, so each would
need to function as both a VPN client and VPN server. Hence, both the VPN client and
server software must be installed on each node.
3. Anti-virus software
x Protects your IT assets from malicious code.
x Like the vaccinations that we all receive o prevent certain diseases such as polio
and chicken pox, anti-virus software helps to prevent your computers from
becoming infected by computer viruses, worms, and Trojan horses.
x Hackers create hundreds of new viruses each month, which means that you have
to update your anti-virus software regularly with new virus definitions to ensure that
you will always have the latest cure available.
x Virus can spread by several methods, including email and CDs, but they require an
action on the part of the user, such as opening an email attachment to take effect.
Anti-virus software can identify and block many viruses before they can infect your
computer. Once you install anti-virus software, it is important to keep it up to date.
According to US-CERT Publications here are some security tips in understanding Anti-
Virus software:
Page 134
Foundation of Information Security
SPSaS 2102
Learning Module
4. Vulnerability management
x Regular program to address possible vulnerabilities proactively
Page 135
Foundation of Information Security
SPSaS 2102
Learning Module
Based on WhiteSource blog by Ayala Goldstein (2020) There are things that an enterprise
needs to know in Vulnerability Management since Vulnerability Management is becoming
increasingly important to companies due to the rising threat of cyber security attacks and
regulations like PCI DSS, HIPAA, NIST 800-731 and more. Vulnerability management is a
comprehensive process implemented to continuously identify, evaluate, classify,
remediate, and report on security vulnerabilities.
While vulnerability management isn’t a novel concept for most companies, it’s become
clear that formerly accepted practices — such as quarterly vulnerability scans and
remediation management plans — are severely deficient means of defense.
Today, minimizing your attack surface and overall risk exposure requires a continuous
approach that increases visibility over vulnerabilities and enables rapid remediation.
While the term vulnerability management is often used interchangeably with patch
management, they are not the same thing. Rather, the decision to use a patch, or not,
falls within the broader context of vulnerability management.
Vulnerability management includes much more than scanning and patching. It requires a
holistic view in order to make informed decisions about which vulnerabilities to address
first and how to mitigate them. Most vulnerability management programs focus on four
stages.
#1 Identification
The first stage in your vulnerability management program will be to identify all of the
vulnerabilities that exist across your IT ecosystems. In order to achieve this you will need
to define your IT assets and find the right vulnerability scanners for each asset.
Page 136
Foundation of Information Security
SPSaS 2102
Learning Module
The vulnerability scanner you’ll use to identify vulnerabilities in your network and in your
applications will not be the same. When it comes to application security, you will need to
use at least two different technologies in order to detect vulnerabilities in your proprietary
code and open source libraries.
According to the Center for Internet Security, organizations should perform automated
vulnerability scans at least once a week. More frequent scanning will give you greater
clarity on the progress of your remediation and help you identify new risks based on
updated vulnerability information.
#2 Evaluation
After you’ve identified the vulnerabilities that exist across your systems, the next step is to
evaluate the risks they pose and determine how to manage them. While it’s important to
understand the risk ratings that your vulnerability management solution provides, such as
Common Vulnerability Scoring System (CVSS) scores, you will also want to understand
other real-world risk factors.
x How easily could someone exploit this vulnerability, and is there published exploit code
available?
x Do we have any existing security protocols that would reduce the likelihood/consequence
It’s also important to know whether any identified vulnerabilities are false positives. With
tools and techniques that enable vulnerability validation, such as penetration testing, you
can identify false positives and focus on the vulnerabilities that pose the biggest risk to
your organization.
#3 Remediation
Page 137
Foundation of Information Security
SPSaS 2102
Learning Module
After you’ve identified and evaluated vulnerabilities, the next step is to determine how to
prioritize and address them.
temporary solution that organizations use until they can remediate the vulnerability.
this when the cost of remediating the vulnerability is much higher than the consequences
of it being exploited.
After you’ve finished the remediation process, you can check to see that the vulnerability
was completely resolved by performing another scan.
#4 Reporting
By making vulnerability assessments a routine practice, you’ll gain greater insight into the
efficacy, speed, and cost of your vulnerability management program.
Most vulnerability management systems let you export the data from your various
vulnerability scanners so your security team can more easily understand the security
posture of each asset and track it with time to identify trends like increased vulnerability
detection or decreased remediation velocity.
Consistent reporting will help your security team to comply with your organization’s risk
management KPIs as well as regulatory requirements.
Page 138
Foundation of Information Security
SPSaS 2102
Learning Module
Another important aspect you must take into consideration is that in order to change the
mindset of your teams, you need to implement continuous processes that will impact their
day-to-day work. Periodical testing and remediation are not enough if you want to ensure
that you are on top of your security status, or to shift the mindset of your teams.
This type of continuity requires automation. Automating the repetitive tasks to carry out
those practices can save you valuable resources and help avoid human error.
Prioritization Is Key
The goal of security teams is to fix all vulnerabilities detected in the company’s assets.
The problem is that this is nearly an impossible goal, which overloads the system and
makes many teams frustrated with vulnerability management processes.
Therefore, prioritization is the key to a successful implementation of new vulnerability
management programs.
You need to ensure that clear guidelines are set for each asset regarding which
vulnerabilities should be remediated and which should not. Many vulnerability
management consultants can help define a risk based prioritization procedure based on
the company’s assets and market.
5. Intrusion Detection
x IDS (Intrusion Detection System)
x Reacts to unauthorized access to your network
x Monitor traffic and events on your network and clients, looking for patterns that
might indicate an attack is occurring or occurred in the past.
1. Signature-based recognition
- Would recognize the pattern or signature of this attack and report it.
2. Anomaly detection
- Relies on determining patterns for normal behavior and then detecting behavior that is
different from the norm.
Page 139
Foundation of Information Security
SPSaS 2102
Learning Module
Barracuda official website explained that an intrusion detection system (IDS) is a device
or software application that monitors a network for malicious activity or policy violations.
Any malicious activity or violation is typically reported or collected centrally using a
security information and event management system. Some IDS’s are capable of
responding to detected intrusion upon discovery. These are classified as intrusion
prevention systems (IPS).
There is a wide array of IDS, ranging from antivirus software to tiered monitoring systems
that follow the traffic of an entire network. The most common classifications are:
There is also subset of IDS types. The most common variants are based on signature
detection and anomaly detection.
When placed at a strategic point or points within a network to monitor traffic to and from
all devices on the network, an IDS will perform an analysis of passing traffic, and match
the traffic that is passed on the subnets to the library of known attacks. Once an attack is
identified, or abnormal behavior is sensed, the alert can be sent to the administrator.
Page 140
Foundation of Information Security
SPSaS 2102
Learning Module
Evasion Techniques
Being aware of the techniques available to cyber criminals who are trying to breach a
secure network can help IT departments understand how IDS systems can be tricked into
not missing actionable threats:
x Fragmentation: Sending fragmented packets allow the attacker to stay under the
radar, bypassing the detection system's ability to detect the attack signature.
x Avoiding defaults: A port utilized by a protocol does not always provide an
indication to the protocol that’s being transported. If an attacker had reconfigured it
to use a different port, the IDS may not be able to detect the presence of a trojan.
x Coordinated, low-bandwidth attacks: coordinating a scan among numerous
attackers, or even allocating various ports or hosts to different attackers. This
makes it difficult for the IDS to correlate the captured packets and deduce that a
network scan is in progress.
x Address spoofing/proxying: attackers can obscure the source of the attack by using
poorly secured or incorrectly configured proxy servers to bounce an attack. If the
source is spoofed and bounced by a server, it makes it very difficult to detect.
x Pattern change evasion: IDS rely on pattern matching to detect attacks. By making
slight adjust to the attack architecture, detection can be avoided.
Modern networked business environments require a high level of security to ensure safe
and trusted communication of information between various organizations. An intrusion
detection system acts as an adaptable safeguard technology for system security after
traditional technologies fail. Cyber-attacks will only become more sophisticated, so it is
important that protection technologies adapt along with their threats.
6. Content Filtering
x The internet contains a vast amount of information, the majority of which helpful
and appropriate for all audiences.
x Content filtering tools can filter this information ensuring that children or your
employees are not able to access it.
x 2 major categories of tools
1. web/internet filter
2. email filter
x Ensures that personnel do not access inappropriate material using your company’s
network.
Page 141
Foundation of Information Security
SPSaS 2102
Learning Module
7. Encryption
• Is the process of converting data into a format that unauthorized person cannot
easily read.
• 2 main forms:
- Symmetric - both parties use the same secret key for encrypting &
decrypting messages
- Asymmetric - (more secure) has public and private key for encryption and
decryption
Page 142
Foundation of Information Security
SPSaS 2102
Learning Module
Keys are usually generated with random number generators, or computer algorithms that
mimic random number generators. A more complex way that computers can create keys is
by using user mouse movement to create unique seeds. Modern systems that
have forward secrecy involve generating a fresh key for every session, to add another
layer of security.
x Private Key (or Symmetric Key): This means that the encryption and decryption keys
are the same. The two parties must have the same key before they can achieve
secure communication.
x Public Key: This means that the encryption key is published and available for anyone
to use. Only the receiving party has access to the decryption key that enables them to
read the message.
Cipher: An algorithm used for encryption or decryption. It is a set of steps that are followed
as a procedure to encrypt information. There are two main types of ciphers, block ciphers
and stream ciphers.
Algorithm: An algorithm is the procedure that the encryption process follows. The specific
algorithm is called the cipher, or code. There are many types of encryption algorithms. The
encryption’s goal and level of security determines the most effective solution. Triple DES,
RSA and Blowfish are some examples of encryption algorithms, or ciphers.
Page 143
Foundation of Information Security
SPSaS 2102
Learning Module
Cryptanalysis: The study of ciphers and cryptosystems to find weaknesses in them that
would allow access to the information without knowing the key or algorithm.
Search Encrypt uses multiple methods of encryption to ensure maximum security. All
requests to Search Encrypt are made over SSL (secure socket layer), which is the
preferred method for websites that deal with sensitive information like financial information,
social security numbers or passwords.
Unlike basic encryption which would use one key, SSL uses a public and a private key
together to create a secure connection. Sites like Google, that track user data, use this
method to encrypt information about its users.
To protect our users’ information even more, we use a short lived key for client side
encryption of search history. This means that even if someone accesses your computer,
your searches are gone. The short lived key has expired, and then information can’t be
decrypted. Search Encrypt uses this expiring key to ensure perfect forward secrecy.
Search Encrypt is a privacy-based search engine. It was created and designed with
privacy as its number one priority.
Page 144
Foundation of Information Security
SPSaS 2102
Learning Module
Page 145
Foundation of Information Security
SPSaS 2102
Learning Module
Page 146
Foundation of Information Security
SPSaS 2102
Learning Module
02. Explain why Enterprise IS program elements are interconnected and always
dependent to each other. (10pts)
Page 147
Foundation of Information Security
SPSaS 2102
Learning Module
Activity 03:
1. Identify the 7 IS Technology Components and discuss how it works. You may
also expand the table and/or use separate pages if needed (10 pts each)
Page 148