Chapter # : 05 - CISAChapter # : 05 - CISA 11
Security of InformationSecurity of Information
ASSETSASSETS
Chapter # : 05 - CISAChapter # : 05 - CISA 22
• Logical Access ExposuresLogical Access Exposures
• Trojan HorsesTrojan Horses
• Rounding DownRounding Down
• Salami TechniquesSalami Techniques
• VirusVirus
• WormsWorms
• Logic BombsLogic Bombs
• Trap DoorsTrap Doors
• Asynchronous AttacksAsynchronous Attacks
• Data LeakageData Leakage
• Wire-TappingWire-Tapping
• PiggybackingPiggybacking
• Computer ShutdownComputer Shutdown
• Daniel of ServicesDaniel of Services
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
Chapter # : 05 - CISAChapter # : 05 - CISA 33
• Logical Access Control Software :Logical Access Control Software :
To prevent unauthorized access and modificationTo prevent unauthorized access and modification
to sensitive data and critical functions. It shouldto sensitive data and critical functions. It should
be applied to networks, operating systems,be applied to networks, operating systems,
databases and application systemsdatabases and application systems
• General OS Access Control Functions:General OS Access Control Functions:
• Apply user ID and authenticationApply user ID and authentication
• Logon on specific terminalLogon on specific terminal
• Multi-level accessMulti-level access
• Individual accountability and auditabilityIndividual accountability and auditability
• Create or change user profilesCreate or change user profiles
• Log EventsLog Events
• Log User ActivitiesLog User Activities
• Report capabilitiesReport capabilities
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
Chapter # : 05 - CISAChapter # : 05 - CISA 44
• Identification and Authentications :Identification and Authentications :
Based on, somethingBased on, something You KnowYou Know, something, something
You haveYou have and somethingand something You AreYou Are
– Logon-IDs and PasswordsLogon-IDs and Passwords
Something you knowSomething you know
– Token Devices, One Time Access ControlToken Devices, One Time Access Control
Something you haveSomething you have
– Biometrics Security Access Control (through FingerBiometrics Security Access Control (through Finger
Prints, Eye Retina)Prints, Eye Retina)
Something you areSomething you are
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
Chapter # : 05 - CISAChapter # : 05 - CISA 55
• Features of Passwords :Features of Passwords :
• It should be easy to remember for user butIt should be easy to remember for user but
• Difficult for perpetrator to guessDifficult for perpetrator to guess
• Initial Password should be changed on first time log-onInitial Password should be changed on first time log-on
• In result of entering wrong password ID should be heldIn result of entering wrong password ID should be held
• Re-activation of ID should be on writtenRe-activation of ID should be on written
request/approval by security administrator.request/approval by security administrator.
• Password encryption and should be shadowedPassword encryption and should be shadowed
• Changed periodicallyChanged periodically
• Must be unique to each user ID.Must be unique to each user ID.
• Unused IDs should be deactivated and logged offUnused IDs should be deactivated and logged off
• Ideally length of Password is 5 to 8 charactersIdeally length of Password is 5 to 8 characters
• Usage of Alphabets, Numeric, Lower case and specialUsage of Alphabets, Numeric, Lower case and special
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
Chapter # : 05 - CISAChapter # : 05 - CISA 66
• Token Devices, Once-Time PasswordsToken Devices, Once-Time Passwords
• Biometrics :Biometrics :
• Palm : ridges, valleys etcPalm : ridges, valleys etc
• Hand Geometry : 3 dim perspective of handHand Geometry : 3 dim perspective of hand
• Iris : Eyes colored portion surroundedIris : Eyes colored portion surrounded
• RetinaRetina
• Finger PrintsFinger Prints
• FaceFace
• SignaturesSignatures
• Voice RecognitionVoice Recognition
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
Chapter # : 05 - CISAChapter # : 05 - CISA 77
• Single Sign-on (SSO)Single Sign-on (SSO)
• Advantages :Advantages :
• No need to remember multiple PWDsNo need to remember multiple PWDs
• Improves administrators ability to manage user profilesImproves administrators ability to manage user profiles
• Reduces Administrative overheadsReduces Administrative overheads
• Reduces the time taken by userReduces the time taken by user
• Disadvantages :Disadvantages :
• Support for all major OS is difficultSupport for all major OS is difficult
• Significant cost associated with SSO developmentSignificant cost associated with SSO development
• Single point of failure and total compromise of anSingle point of failure and total compromise of an
organization’s IS assetsorganization’s IS assets
LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
Chapter # : 05 - CISAChapter # : 05 - CISA 88
• ControlsControls
• Technical Qualified Operators,Technical Qualified Operators,
• Job rotation (wherever possible)Job rotation (wherever possible)
• Restricted operation of operators over operatorRestricted operation of operators over operator
activity logs etc.activity logs etc.
• Audit trail of all operator activities and itsAudit trail of all operator activities and its
periodical review by operations management.periodical review by operations management.
• Availability of documented Network operationsAvailability of documented Network operations
standards and protocols to operators andstandards and protocols to operators and
periodical review to ensure compliance.periodical review to ensure compliance.
• Analysis for workload balance, fast responseAnalysis for workload balance, fast response
time and system efficiencytime and system efficiency
• Encryption should be used wherever requiredEncryption should be used wherever required
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 99
• LAN SecurityLAN Security
– Threats :Threats : Loss of Data & Programs, less versionLoss of Data & Programs, less version
control, Exposure to external Activities, viruses,control, Exposure to external Activities, viruses,
Improper disclosure of data, Violating SoftwareImproper disclosure of data, Violating Software
License, Illegal access by impersonating orLicense, Illegal access by impersonating or
masquerading, Internal user's Spoofingmasquerading, Internal user's Spoofing
– Remedies :Remedies : Declaring ownership of programs,Declaring ownership of programs,
files and storage, Limiting access to read only,files and storage, Limiting access to read only,
Record and File locking, enforcingRecord and File locking, enforcing
ID/Passwords procedures.ID/Passwords procedures.
– Dial Up ControlDial Up Control : Encrypted Passwords, Dial-: Encrypted Passwords, Dial-
back modems for verificationback modems for verification
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1010
• Client Server Security :Client Server Security :
– Disabling the floppy drivesDisabling the floppy drives
– Network Monitoring devices to inspect activitiesNetwork Monitoring devices to inspect activities
– Data EncryptionData Encryption
– Application level Access control programsApplication level Access control programs
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1111
• Internet Threats :Internet Threats :
– DisclosureDisclosure
– Masquerade or Spoofing (Disguise IP address etc)Masquerade or Spoofing (Disguise IP address etc)
– Unauthorized accessUnauthorized access
– Loss of IntegrityLoss of Integrity
– Denial of service (Sys Flooding of messages / requests and keepDenial of service (Sys Flooding of messages / requests and keep
machines busy)machines busy)
– Theft of service and resourcesTheft of service and resources
• Internet Security Controls:Internet Security Controls:
– Risk assessment of web based application.Risk assessment of web based application.
– Security awarenessSecurity awareness
– Firewall standardsFirewall standards
– Intrusion Detection standards securityIntrusion Detection standards security
– Remote Access for coordinating and controlling centrallyRemote Access for coordinating and controlling centrally
– Encryption techniquesEncryption techniques
– Monitoring usage of unauthorized usage and notification to them.Monitoring usage of unauthorized usage and notification to them.
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1212
• Firewall Security SystemsFirewall Security Systems ::
• General FeaturesGeneral Features
• Firewall TypesFirewall Types
Router Packet FilteringRouter Packet Filtering
Application firewallApplication firewall
Stateful inspectionStateful inspection
• Firewall IssuesFirewall Issues
• Creates false sense of securityCreates false sense of security
• Other entry points, connections direct though ModemsOther entry points, connections direct though Modems
• Mis-configurationMis-configuration
• Firewall without screening router is uselessFirewall without screening router is useless
• Irregular monitoring of activitiesIrregular monitoring of activities
• Irregular maintenance of Firewall policiesIrregular maintenance of Firewall policies
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1313
• Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS) ::
• Components of IDSComponents of IDS
Sensor, Analyzer, An administrator ConsoleSensor, Analyzer, An administrator Console
A user interfaceA user interface
• FeaturesFeatures
Intrusion DetectionIntrusion Detection
Gathering EvidenceGathering Evidence
Automated responseAutomated response
Security PolicySecurity Policy
Interface with system toolsInterface with system tools
Security Policy managementSecurity Policy management
• LimitationsLimitations
Weaknesses in the policy definitionWeaknesses in the policy definition
Application level vulnerabilitiesApplication level vulnerabilities
Backdoors into applicationBackdoors into application
Weakness in identification and authentication schemesWeakness in identification and authentication schemes
• Honeypots and HoneynetsHoneypots and Honeynets
Software application pretend to be unfortunately hackedSoftware application pretend to be unfortunately hacked
Network of honeypots making a false network for hackers to hack andNetwork of honeypots making a false network for hackers to hack and
caughtcaught
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1414
• EncryptionEncryption::
• Is a process of converting a plaintext into a secureIs a process of converting a plaintext into a secure
coded form of text (Cipher General Features)coded form of text (Cipher General Features)
• Key Elements of Encryption SystemsKey Elements of Encryption Systems
Encryption AlgorithmEncryption Algorithm
Encryption KeysEncryption Keys
Key LengthKey Length
• Private Key Cryptographic systemPrivate Key Cryptographic system
• Public Key Cryptographic SystemPublic Key Cryptographic System
• Digital SignaturesDigital Signatures
• Digital EnvalopDigital Envalop
• Is used to send encrypted information and relevantIs used to send encrypted information and relevant
keys along with it.keys along with it.
NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1515
Review network DiagramReview network Diagram
Identify Network DesignIdentify Network Design
Dissemination of policies and standardsDissemination of policies and standards
Experience/knowledge of security operators for internetExperience/knowledge of security operators for internet
legislative issues are considered against usage of internetlegislative issues are considered against usage of internet
based applicationbased application
Review of service level contract in case of outsourcing.Review of service level contract in case of outsourcing.
Hardware and software are well upgraded to counter newHardware and software are well upgraded to counter new
vulnerabilitiesvulnerabilities
– Auditing Remote AccessAuditing Remote Access
– Auditing internet “point of presence”Auditing internet “point of presence”
– Network penetration testsNetwork penetration tests
– Full network assessment reviewsFull network assessment reviews
– LAN network assessmentLAN network assessment
– Development and Authorization of network changeDevelopment and Authorization of network change
– Unauthorized changesUnauthorized changes
– Computer forensicsComputer forensics
AUDITING NETWORK INFRASTRUCTURE SECURITYAUDITING NETWORK INFRASTRUCTURE SECURITY ::
Chapter # : 05 - CISAChapter # : 05 - CISA 1616
• Environmental Issues and ExposuresEnvironmental Issues and Exposures ::
– Fire, Natural Disasters,Fire, Natural Disasters,
– Power FailurePower Failure
Total FailureTotal Failure
Severely reduced voltageSeverely reduced voltage
Sages, spikes and surgesSages, spikes and surges
Electromagnetic interferenceElectromagnetic interference
– Power SpikePower Spike
– Air conditioning FailureAir conditioning Failure
– Electric ShockElectric Shock
– Equipment FailureEquipment Failure
– Water Damage / FloodingWater Damage / Flooding
– Bomb Threat/attackBomb Threat/attack
ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS:
Chapter # : 05 - CISAChapter # : 05 - CISA 1717
ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS:
Controls for Environmental exposuresControls for Environmental exposures ::
– Alarm Control PanelAlarm Control Panel
– Water DetectorsWater Detectors
– Handheld Fire ExtinguishersHandheld Fire Extinguishers
– Manual Fire alarmsManual Fire alarms
– Smoke detectorsSmoke detectors
– Fire Suppression SystemFire Suppression System
Water-based, Halon system, FM-200, COWater-based, Halon system, FM-200, CO22 systemsystem
– Logically Locating the Computer RoomLogically Locating the Computer Room
– Regular Inspection by Fire DepartmentRegular Inspection by Fire Department
– Fire Proof Walls Floors and Ceilings surrounding the computer roomFire Proof Walls Floors and Ceilings surrounding the computer room
– Electrical surge ProtectorElectrical surge Protector
– UPS / GeneratorsUPS / Generators
– Emergency Power Off SwitchEmergency Power Off Switch
– Power leads from two substationsPower leads from two substations
– Wiring in electrical panels and conduitWiring in electrical panels and conduit
– Prohibiting against eating, drinking and smoking within theProhibiting against eating, drinking and smoking within the
information processing facilityinformation processing facility
– Fire resistant office materialFire resistant office material
– Documented and tested emergency Evacuation Plans.Documented and tested emergency Evacuation Plans.

More Related Content

PDF
Monitoring ICS Communications
PPTX
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
PDF
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
PDF
OSB180: Learn More About Ivanti Endpoint Security
PDF
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
PDF
S4xJapan Closing Keynote
PPT
Redefining Endpoint Security
PDF
Presentazione-CyberArk-MDM-v3
Monitoring ICS Communications
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
OSB180: Learn More About Ivanti Endpoint Security
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
S4xJapan Closing Keynote
Redefining Endpoint Security
Presentazione-CyberArk-MDM-v3

What's hot (20)

PDF
VIPER Labs - VOIP Security - SANS Summit
PPT
PDF
Attacking and Defending Autos Via OBD-II from escar Asia
PPTX
Owasp Proactive Controls for Web developer
PDF
Jump Start Your Application Security Knowledge
PDF
Waterfall Security Solutions Overview Q1 2012
PDF
Expand Your Control of Access to IBM i Systems and Data
PPTX
Vulnerability Inheritance in ICS (English)
PDF
Accelerating OT - A Case Study
PPTX
Using Assessment Tools on ICS (English)
PPTX
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
PDF
Skill Set Needed to work successfully in a SOC
PPTX
Confidentiality policies UNIT 2 (CSS)
PDF
Defcon 22-tim-mcguffin-one-man-shop
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PPTX
"EL ATAQUE INTERNO"
PPTX
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
PDF
DSS ITSEC 2012 ForeScout Technical RIGA
PDF
IBM Security QFlow & Vflow
PDF
Controlling Access to IBM i Systems and Data
VIPER Labs - VOIP Security - SANS Summit
Attacking and Defending Autos Via OBD-II from escar Asia
Owasp Proactive Controls for Web developer
Jump Start Your Application Security Knowledge
Waterfall Security Solutions Overview Q1 2012
Expand Your Control of Access to IBM i Systems and Data
Vulnerability Inheritance in ICS (English)
Accelerating OT - A Case Study
Using Assessment Tools on ICS (English)
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Skill Set Needed to work successfully in a SOC
Confidentiality policies UNIT 2 (CSS)
Defcon 22-tim-mcguffin-one-man-shop
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
"EL ATAQUE INTERNO"
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
DSS ITSEC 2012 ForeScout Technical RIGA
IBM Security QFlow & Vflow
Controlling Access to IBM i Systems and Data
Ad

Viewers also liked (20)

PPT
Wireless Security Basics
PDF
hackers
PDF
New Trends in Web Security
PDF
Evolution Of Web Security
PPTX
Introduction to Information Security
PDF
Web security 2012
PDF
2010: Mobile Security - Intense overview
PDF
Web Security - Introduction v.1.3
PPTX
Threats to information security
PDF
Overview of IoT and Security issues
PPS
Workshop on Wireless Security
PPT
Introduction to Information Security
PPT
Wireless LAN security
PPT
Wireless security presentation
PPTX
Information Security Lecture #1 ppt
PPT
Introduction To Information Security
PPT
Network Security
PPT
Information security
PDF
Ethical hacking & Information Security
PPT
Web Security
Wireless Security Basics
hackers
New Trends in Web Security
Evolution Of Web Security
Introduction to Information Security
Web security 2012
2010: Mobile Security - Intense overview
Web Security - Introduction v.1.3
Threats to information security
Overview of IoT and Security issues
Workshop on Wireless Security
Introduction to Information Security
Wireless LAN security
Wireless security presentation
Information Security Lecture #1 ppt
Introduction To Information Security
Network Security
Information security
Ethical hacking & Information Security
Web Security
Ad

Similar to Security of information asset (20)

PPTX
CISA Training - Chapter 5 - 2016
DOCX
Unit I Q&A.docx
PPTX
Security in Computer System
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PPT
educational content,educational content,educational content,
PPTX
Network security and firewalls
PPT
2.4.1 - Intro to Cyber Security for students.ppt
PPT
Ch01 Introduction to Security
PDF
Security in computer systems fundamentals
PPT
sect1--ch1--intro.ppt
PPTX
Cyber Security # Lec 4
PDF
Need for cyber security
PDF
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
PPTX
security in is.pptx
PPT
NewIinternet security
DOC
CIS 502 Life of the Mind/newtonhelp.com   
DOC
CIS 502 Focus Dreams/newtonhelp.com
DOC
CIS 502 Imagine Your Future/newtonhelp.com   
PPT
New internet security
CISA Training - Chapter 5 - 2016
Unit I Q&A.docx
Security in Computer System
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
educational content,educational content,educational content,
Network security and firewalls
2.4.1 - Intro to Cyber Security for students.ppt
Ch01 Introduction to Security
Security in computer systems fundamentals
sect1--ch1--intro.ppt
Cyber Security # Lec 4
Need for cyber security
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
security in is.pptx
NewIinternet security
CIS 502 Life of the Mind/newtonhelp.com   
CIS 502 Focus Dreams/newtonhelp.com
CIS 502 Imagine Your Future/newtonhelp.com   
New internet security

More from University of Central Punjab (7)

PPTX
Microsoft windows
PPTX
Remote desktop and print server
PPT
Social and ethical issues in commerce
PPT
Need for security
PPTX
VIOP , SKYPE and OOVOO
Microsoft windows
Remote desktop and print server
Social and ethical issues in commerce
Need for security
VIOP , SKYPE and OOVOO

Recently uploaded (20)

PDF
Leading with Empathy: How Bangladesh Can Build Inclusive Growth
PDF
Entrepreneurial_Spirit_Among_University_Students_i.pdf
PPTX
EXT.-EDU-809-EXTENSION-POLICY-AND-GOALS-.pptx
PPTX
Company Presentation for a company for you to look at the company for ppt
PDF
Improvement_Proposal_DMAIC dan Tools yang digunakan
PPTX
Personnel Management work in medical field
PDF
Peter Oeij - Industry 5.0 for shaping sustainable and inclusive futures
PPTX
People Strategies LXP BTS Readiness Plan
PPTX
Supply Chain Management in Leadership.pptx
PPT
L2 - Determinants and Dimensions of Culture.ppt
PDF
Patrick Wentland_ The Power of Leadership in Driving Organizational Growth.pdf
PPT
L6 - Diversity and Multicultural Teams.ppt
PDF
Sales Enablement in the Age of AI: Unlocking Growth
PPTX
AWAKE-Redefining-Luxury-Through-Sustainability - Copy (1).pptx
PPTX
Transformative and Charismatic leadership.pptx
PPTX
Rotaract New and Prospective Membership Orientation
PPTX
4 Ways To Create More Value For Meetings.pptx
PDF
SpatzAI Real-time Micro-Conflict Manager - Fairer Teamwork Globally
PDF
Empathetic vision to improve living standards of poors people in society to l...
PDF
Dr Usman Zafar Portfolio 2025 - Senior Board Advisor
Leading with Empathy: How Bangladesh Can Build Inclusive Growth
Entrepreneurial_Spirit_Among_University_Students_i.pdf
EXT.-EDU-809-EXTENSION-POLICY-AND-GOALS-.pptx
Company Presentation for a company for you to look at the company for ppt
Improvement_Proposal_DMAIC dan Tools yang digunakan
Personnel Management work in medical field
Peter Oeij - Industry 5.0 for shaping sustainable and inclusive futures
People Strategies LXP BTS Readiness Plan
Supply Chain Management in Leadership.pptx
L2 - Determinants and Dimensions of Culture.ppt
Patrick Wentland_ The Power of Leadership in Driving Organizational Growth.pdf
L6 - Diversity and Multicultural Teams.ppt
Sales Enablement in the Age of AI: Unlocking Growth
AWAKE-Redefining-Luxury-Through-Sustainability - Copy (1).pptx
Transformative and Charismatic leadership.pptx
Rotaract New and Prospective Membership Orientation
4 Ways To Create More Value For Meetings.pptx
SpatzAI Real-time Micro-Conflict Manager - Fairer Teamwork Globally
Empathetic vision to improve living standards of poors people in society to l...
Dr Usman Zafar Portfolio 2025 - Senior Board Advisor

Security of information asset

  • 1. Chapter # : 05 - CISAChapter # : 05 - CISA 11 Security of InformationSecurity of Information ASSETSASSETS
  • 2. Chapter # : 05 - CISAChapter # : 05 - CISA 22 • Logical Access ExposuresLogical Access Exposures • Trojan HorsesTrojan Horses • Rounding DownRounding Down • Salami TechniquesSalami Techniques • VirusVirus • WormsWorms • Logic BombsLogic Bombs • Trap DoorsTrap Doors • Asynchronous AttacksAsynchronous Attacks • Data LeakageData Leakage • Wire-TappingWire-Tapping • PiggybackingPiggybacking • Computer ShutdownComputer Shutdown • Daniel of ServicesDaniel of Services LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
  • 3. Chapter # : 05 - CISAChapter # : 05 - CISA 33 • Logical Access Control Software :Logical Access Control Software : To prevent unauthorized access and modificationTo prevent unauthorized access and modification to sensitive data and critical functions. It shouldto sensitive data and critical functions. It should be applied to networks, operating systems,be applied to networks, operating systems, databases and application systemsdatabases and application systems • General OS Access Control Functions:General OS Access Control Functions: • Apply user ID and authenticationApply user ID and authentication • Logon on specific terminalLogon on specific terminal • Multi-level accessMulti-level access • Individual accountability and auditabilityIndividual accountability and auditability • Create or change user profilesCreate or change user profiles • Log EventsLog Events • Log User ActivitiesLog User Activities • Report capabilitiesReport capabilities LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
  • 4. Chapter # : 05 - CISAChapter # : 05 - CISA 44 • Identification and Authentications :Identification and Authentications : Based on, somethingBased on, something You KnowYou Know, something, something You haveYou have and somethingand something You AreYou Are – Logon-IDs and PasswordsLogon-IDs and Passwords Something you knowSomething you know – Token Devices, One Time Access ControlToken Devices, One Time Access Control Something you haveSomething you have – Biometrics Security Access Control (through FingerBiometrics Security Access Control (through Finger Prints, Eye Retina)Prints, Eye Retina) Something you areSomething you are LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES ::
  • 5. Chapter # : 05 - CISAChapter # : 05 - CISA 55 • Features of Passwords :Features of Passwords : • It should be easy to remember for user butIt should be easy to remember for user but • Difficult for perpetrator to guessDifficult for perpetrator to guess • Initial Password should be changed on first time log-onInitial Password should be changed on first time log-on • In result of entering wrong password ID should be heldIn result of entering wrong password ID should be held • Re-activation of ID should be on writtenRe-activation of ID should be on written request/approval by security administrator.request/approval by security administrator. • Password encryption and should be shadowedPassword encryption and should be shadowed • Changed periodicallyChanged periodically • Must be unique to each user ID.Must be unique to each user ID. • Unused IDs should be deactivated and logged offUnused IDs should be deactivated and logged off • Ideally length of Password is 5 to 8 charactersIdeally length of Password is 5 to 8 characters • Usage of Alphabets, Numeric, Lower case and specialUsage of Alphabets, Numeric, Lower case and special LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
  • 6. Chapter # : 05 - CISAChapter # : 05 - CISA 66 • Token Devices, Once-Time PasswordsToken Devices, Once-Time Passwords • Biometrics :Biometrics : • Palm : ridges, valleys etcPalm : ridges, valleys etc • Hand Geometry : 3 dim perspective of handHand Geometry : 3 dim perspective of hand • Iris : Eyes colored portion surroundedIris : Eyes colored portion surrounded • RetinaRetina • Finger PrintsFinger Prints • FaceFace • SignaturesSignatures • Voice RecognitionVoice Recognition LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
  • 7. Chapter # : 05 - CISAChapter # : 05 - CISA 77 • Single Sign-on (SSO)Single Sign-on (SSO) • Advantages :Advantages : • No need to remember multiple PWDsNo need to remember multiple PWDs • Improves administrators ability to manage user profilesImproves administrators ability to manage user profiles • Reduces Administrative overheadsReduces Administrative overheads • Reduces the time taken by userReduces the time taken by user • Disadvantages :Disadvantages : • Support for all major OS is difficultSupport for all major OS is difficult • Significant cost associated with SSO developmentSignificant cost associated with SSO development • Single point of failure and total compromise of anSingle point of failure and total compromise of an organization’s IS assetsorganization’s IS assets LOGICAL ACCESS EXPOSURESLOGICAL ACCESS EXPOSURES : I&A: I&A
  • 8. Chapter # : 05 - CISAChapter # : 05 - CISA 88 • ControlsControls • Technical Qualified Operators,Technical Qualified Operators, • Job rotation (wherever possible)Job rotation (wherever possible) • Restricted operation of operators over operatorRestricted operation of operators over operator activity logs etc.activity logs etc. • Audit trail of all operator activities and itsAudit trail of all operator activities and its periodical review by operations management.periodical review by operations management. • Availability of documented Network operationsAvailability of documented Network operations standards and protocols to operators andstandards and protocols to operators and periodical review to ensure compliance.periodical review to ensure compliance. • Analysis for workload balance, fast responseAnalysis for workload balance, fast response time and system efficiencytime and system efficiency • Encryption should be used wherever requiredEncryption should be used wherever required NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 9. Chapter # : 05 - CISAChapter # : 05 - CISA 99 • LAN SecurityLAN Security – Threats :Threats : Loss of Data & Programs, less versionLoss of Data & Programs, less version control, Exposure to external Activities, viruses,control, Exposure to external Activities, viruses, Improper disclosure of data, Violating SoftwareImproper disclosure of data, Violating Software License, Illegal access by impersonating orLicense, Illegal access by impersonating or masquerading, Internal user's Spoofingmasquerading, Internal user's Spoofing – Remedies :Remedies : Declaring ownership of programs,Declaring ownership of programs, files and storage, Limiting access to read only,files and storage, Limiting access to read only, Record and File locking, enforcingRecord and File locking, enforcing ID/Passwords procedures.ID/Passwords procedures. – Dial Up ControlDial Up Control : Encrypted Passwords, Dial-: Encrypted Passwords, Dial- back modems for verificationback modems for verification NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 10. Chapter # : 05 - CISAChapter # : 05 - CISA 1010 • Client Server Security :Client Server Security : – Disabling the floppy drivesDisabling the floppy drives – Network Monitoring devices to inspect activitiesNetwork Monitoring devices to inspect activities – Data EncryptionData Encryption – Application level Access control programsApplication level Access control programs NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 11. Chapter # : 05 - CISAChapter # : 05 - CISA 1111 • Internet Threats :Internet Threats : – DisclosureDisclosure – Masquerade or Spoofing (Disguise IP address etc)Masquerade or Spoofing (Disguise IP address etc) – Unauthorized accessUnauthorized access – Loss of IntegrityLoss of Integrity – Denial of service (Sys Flooding of messages / requests and keepDenial of service (Sys Flooding of messages / requests and keep machines busy)machines busy) – Theft of service and resourcesTheft of service and resources • Internet Security Controls:Internet Security Controls: – Risk assessment of web based application.Risk assessment of web based application. – Security awarenessSecurity awareness – Firewall standardsFirewall standards – Intrusion Detection standards securityIntrusion Detection standards security – Remote Access for coordinating and controlling centrallyRemote Access for coordinating and controlling centrally – Encryption techniquesEncryption techniques – Monitoring usage of unauthorized usage and notification to them.Monitoring usage of unauthorized usage and notification to them. NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 12. Chapter # : 05 - CISAChapter # : 05 - CISA 1212 • Firewall Security SystemsFirewall Security Systems :: • General FeaturesGeneral Features • Firewall TypesFirewall Types Router Packet FilteringRouter Packet Filtering Application firewallApplication firewall Stateful inspectionStateful inspection • Firewall IssuesFirewall Issues • Creates false sense of securityCreates false sense of security • Other entry points, connections direct though ModemsOther entry points, connections direct though Modems • Mis-configurationMis-configuration • Firewall without screening router is uselessFirewall without screening router is useless • Irregular monitoring of activitiesIrregular monitoring of activities • Irregular maintenance of Firewall policiesIrregular maintenance of Firewall policies NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 13. Chapter # : 05 - CISAChapter # : 05 - CISA 1313 • Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS) :: • Components of IDSComponents of IDS Sensor, Analyzer, An administrator ConsoleSensor, Analyzer, An administrator Console A user interfaceA user interface • FeaturesFeatures Intrusion DetectionIntrusion Detection Gathering EvidenceGathering Evidence Automated responseAutomated response Security PolicySecurity Policy Interface with system toolsInterface with system tools Security Policy managementSecurity Policy management • LimitationsLimitations Weaknesses in the policy definitionWeaknesses in the policy definition Application level vulnerabilitiesApplication level vulnerabilities Backdoors into applicationBackdoors into application Weakness in identification and authentication schemesWeakness in identification and authentication schemes • Honeypots and HoneynetsHoneypots and Honeynets Software application pretend to be unfortunately hackedSoftware application pretend to be unfortunately hacked Network of honeypots making a false network for hackers to hack andNetwork of honeypots making a false network for hackers to hack and caughtcaught NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 14. Chapter # : 05 - CISAChapter # : 05 - CISA 1414 • EncryptionEncryption:: • Is a process of converting a plaintext into a secureIs a process of converting a plaintext into a secure coded form of text (Cipher General Features)coded form of text (Cipher General Features) • Key Elements of Encryption SystemsKey Elements of Encryption Systems Encryption AlgorithmEncryption Algorithm Encryption KeysEncryption Keys Key LengthKey Length • Private Key Cryptographic systemPrivate Key Cryptographic system • Public Key Cryptographic SystemPublic Key Cryptographic System • Digital SignaturesDigital Signatures • Digital EnvalopDigital Envalop • Is used to send encrypted information and relevantIs used to send encrypted information and relevant keys along with it.keys along with it. NETWORK INFRASTRUCTURE SECURITYNETWORK INFRASTRUCTURE SECURITY ::
  • 15. Chapter # : 05 - CISAChapter # : 05 - CISA 1515 Review network DiagramReview network Diagram Identify Network DesignIdentify Network Design Dissemination of policies and standardsDissemination of policies and standards Experience/knowledge of security operators for internetExperience/knowledge of security operators for internet legislative issues are considered against usage of internetlegislative issues are considered against usage of internet based applicationbased application Review of service level contract in case of outsourcing.Review of service level contract in case of outsourcing. Hardware and software are well upgraded to counter newHardware and software are well upgraded to counter new vulnerabilitiesvulnerabilities – Auditing Remote AccessAuditing Remote Access – Auditing internet “point of presence”Auditing internet “point of presence” – Network penetration testsNetwork penetration tests – Full network assessment reviewsFull network assessment reviews – LAN network assessmentLAN network assessment – Development and Authorization of network changeDevelopment and Authorization of network change – Unauthorized changesUnauthorized changes – Computer forensicsComputer forensics AUDITING NETWORK INFRASTRUCTURE SECURITYAUDITING NETWORK INFRASTRUCTURE SECURITY ::
  • 16. Chapter # : 05 - CISAChapter # : 05 - CISA 1616 • Environmental Issues and ExposuresEnvironmental Issues and Exposures :: – Fire, Natural Disasters,Fire, Natural Disasters, – Power FailurePower Failure Total FailureTotal Failure Severely reduced voltageSeverely reduced voltage Sages, spikes and surgesSages, spikes and surges Electromagnetic interferenceElectromagnetic interference – Power SpikePower Spike – Air conditioning FailureAir conditioning Failure – Electric ShockElectric Shock – Equipment FailureEquipment Failure – Water Damage / FloodingWater Damage / Flooding – Bomb Threat/attackBomb Threat/attack ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS:
  • 17. Chapter # : 05 - CISAChapter # : 05 - CISA 1717 ENVIRONMENTAL EXPOSURES AND CONTORLS:ENVIRONMENTAL EXPOSURES AND CONTORLS: Controls for Environmental exposuresControls for Environmental exposures :: – Alarm Control PanelAlarm Control Panel – Water DetectorsWater Detectors – Handheld Fire ExtinguishersHandheld Fire Extinguishers – Manual Fire alarmsManual Fire alarms – Smoke detectorsSmoke detectors – Fire Suppression SystemFire Suppression System Water-based, Halon system, FM-200, COWater-based, Halon system, FM-200, CO22 systemsystem – Logically Locating the Computer RoomLogically Locating the Computer Room – Regular Inspection by Fire DepartmentRegular Inspection by Fire Department – Fire Proof Walls Floors and Ceilings surrounding the computer roomFire Proof Walls Floors and Ceilings surrounding the computer room – Electrical surge ProtectorElectrical surge Protector – UPS / GeneratorsUPS / Generators – Emergency Power Off SwitchEmergency Power Off Switch – Power leads from two substationsPower leads from two substations – Wiring in electrical panels and conduitWiring in electrical panels and conduit – Prohibiting against eating, drinking and smoking within theProhibiting against eating, drinking and smoking within the information processing facilityinformation processing facility – Fire resistant office materialFire resistant office material – Documented and tested emergency Evacuation Plans.Documented and tested emergency Evacuation Plans.