Copyright © 2003 M. E. Kabay. All rights reserved.

Slides:



Advertisements
Similar presentations
1-1/29 Copyright © 2006 M. E. Kabay. All rights reserved. 08:15-09:00 INFORMATION WARFARE Part 1: Fundamentals Advanced Course in Engineering 2006 Cyber.
Advertisements

Application Design (2) Database – IS 240 Lecture #23 – M. E. Kabay, PhD, CISSP Dept of Computer Information Systems Norwich University
Managing Multi-User Databases (3) IS 240 – Database Management Lecture # Prof. M. E. Kabay, PhD, CISSP Norwich University
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Auditing Computer-Based Information Systems
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Overview of Cybercrime CJ341 – Cyberlaw & Cybercrime.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Introducing Computer and Network Security
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Computer Security: Principles and Practice
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
General Awareness Training
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 1: Overview modified from slides of Lawrie Brown.
Computer Security: Principles and Practice
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Architecture
C8- Securing Information Systems
SEC835 Practical aspects of security implementation Part 1.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Welcome Topic : Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Copyright © 2013 – Curt Hill Computer Security An Overview.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
CS457 Introduction to Information Security Systems
Issues and Protections
Errors, Fraud, Risk Management, and Internal Controls
Cyber Issues Facing Medical Practice Managers
Presentation transcript:

Copyright © 2003 M. E. Kabay. All rights reserved. The Parkerian Hexad CSH6 Chapter 3 “Toward a New Framework for Information Security” Donn B. Parker Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2004 M. E. Kabay. All rights reserved. Page 2 Topics The Classic Triad Parkerian Hexad Confidentiality Possession Integrity Authenticity Availability Utility Functions of INFOSEC Personnel CSH6 Ch 3 Copyright © 2004 M. E. Kabay. All rights reserved. Page 2

Copyright © 2004 M. E. Kabay. All rights reserved. Page 3 The Classic Triad “I would say that Vulnerability would be a frequently involved given the context of the incidents. Most incidents take advantage of how certain systems are designed, implemented, and/or how a system may be configured.” C – I – A Explain what these letters stand for. Can you think of other shorthand summaries of what information security involves? Copyright © 2004 M. E. Kabay. All rights reserved. Page 3

Copyright © 2004 M. E. Kabay. All rights reserved. Page 4 The Parkerian Hexad Protect the 6 atomic elements of INFOSEC: Confidentiality Possession or control Integrity Authenticity Availability Utility See Kabay, M. E. (1996). The NCSA Guide to Enterprise Security: Protecting Information Assets. McGraw-Hill (New York). ISBN 0-07-033147-2. xii + 388 pp. Index. for extensive discussion of these issues. Copyright © 2004 M. E. Kabay. All rights reserved. Page 4

Copyright © 2004 M. E. Kabay. All rights reserved. Page 5 Why “Parkerian?” http://technetcast.ddj.com/tnc_program.html?program_id=79 Donn Parker Donn B. Parker is a retired (1997) senior management consultant at SRI International in Menlo Park, California who has specialized in Information security and computer crime research for 30 of his 47 years in the computer field. He has written numerous books, papers, articles, and reports in his specialty based on interviews of over 200 computer criminals and reviews of the security of many large corporations. He received the 1992 Award for Outstanding Individual Achievement from the Information Systems Security Association and the 1994 National Computer System Security Award from U.S. NIST/NCSC, The Aerospace Computer Security Associates 1994 Distinguished Lecturer award, and The MIS Training Institute Infosecurity News 1996 Lifetime Achievement Award. The Information Security Magazine identified him as one of the five top Infosecurity Pioneers (1998). He formed the International Information Integrity Institute (I-4) at SRI that has been serving over 75 corporate members for 9 years to keep them aware of the most advanced information security concepts and controls. * * * Listen to (or watch) a 1 hour 49 minute audio conference on Early Computer Crime moderated by Donn Parker with pioneer researchers Whitfield Diffie (Sun Microsystems), John Markoff (The New York Times), Peter Neumann (Computer Science Lab at SRI) and Cliff Stoll (author of The Cuckoo’s Egg) recorded on 2000-03-27. See page http://technetcast.ddj.com/ tnc_program.html?program_id=79 for various audio and video streaming formats. Copyright © 2004 M. E. Kabay. All rights reserved. Page 5

Copyright © 2004 M. E. Kabay. All rights reserved. Page 6 Confidentiality Restricting access to data Protecting against unauthorized disclosure of existence of data E.g., allowing industrial spy to deduce nature of clientele by looking at directory names Protecting against unauthorized disclosure of details of data E.g., allowing 13-yr old girl to examine HIV+ records in Florida clinic 1. The Canadian consumer-tracking service Air Miles inadvertently left 50,000 records of applicants for its loyalty program publicly accessible on their Web site for an undetermined length of time. The Web site was offline as of 21 January until the problem was fixed. 2. An error in the configuration or programming of the F. A. O. Schwarz Web site resulted paradoxically in weakening the security of transactions deliberately completed by FAX instead of through SSL. Customers who declined to send their credit-card numbers via SSL ended up having their personal details — address and so forth — stored in a Web page that could be accessed by anyone entering a URL with an appropriate (even if randomly chosen) numerical component. 3. Prof. Ross Anderson of Cambridge University analyzed requirements on the AMAZON.COM online bookstore for credit card number, password, and personal details such as phone number. He identified several risks: (1) merchant retention of credit card numbers poses a far higher risk of capture than of capture in transit; (2) adding a password increases the likelihood of compromise because so many naïve users choose bad passwords and then write them down; (3) even the British site for Amazon contravenes European rules on protecting consumer privacy; (3) such practices make it easier for banks to reject their clients' claims of fraudulent use of their credit-card numbers. Copyright © 2004 M. E. Kabay. All rights reserved. Page 6

Copyright © 2004 M. E. Kabay. All rights reserved. Page 7 Possession Control over information Preventing physical contact with data E.g., case of thief who recorded ATM PINs by radio (but never looked at them) Preventing copying or unauthorized use of intellectual property E.g., violations by software pirates 1. In Beijing, a court ordered two software pirates to compensate Microsoft for stealing their software and making illegal copies. This was the first case in which the Chinese justice system condemned miscreants for violations of intellectual property rights. 2. Hitachi, IBM, NEC, Pioneer and Sony (the ""Galaxy Group"") announced their agreement on a new digital watermark standard that would embed a cryptographic code in every frame of a digitial multimedia work. New digital equipment would not allow copies of such works." 3. The Norwegian company FAST makes software that can download MP3 files. The International Federation of the Phonographic Industry (IFPI) lodged a complaint that resulted in criminal prosecution of FAST for facilitating the theft of illegally posted copyrighted music from the Web. The IFPI was also contemplating a complaint against Lycos, whose search engine catalogs these illegal snippets of intellectual property. Copyright © 2004 M. E. Kabay. All rights reserved. Page 7

Confidentiality & Possession Losses Locating Disclosing Observing, monitoring, and acquiring Copying Taking or controlling Claiming ownership or custodianship Inferring Exposing to all of the other losses Endangering by exposing to any of the other losses Failure to engage in or to allow any of the other losses to occur when instructed to do so Copyright © 2004 M. E. Kabay. All rights reserved. Page 8

Copyright © 2004 M. E. Kabay. All rights reserved. Page 9 Integrity Internal consistency, validity, fitness for use Avoiding physical corruption E.g., database pointers trashed or data garbled Avoiding logical corruption E.g., inconsistencies between order header total sale & sum of costs of details 1. Sun Valley, ID uses a computer-based identification and authorization system using a computer-generated pass with a bar code, radio-linked scanners and computers, and so on. The system works very well. Unfortunately, after a hard disk crash in mid-December 1997, the operators found that — surprise — they had no backups for the data they lost. Thousands of users were asked to re-register with the area. 2. At the Stanford University Graduate School of Business, system administrators installed additional disk capacity to their servers. They then reloaded files from a corrupt backup tape on 7 Mar. The faculty and student files were destroyed, leaving many faculty members and graduate students without their research files. [This incident again demonstrates the importance of VERIFYING THE READABILITY of backups. It also strengthens my belief in the wisdom of making TWO backups before attempting to reload a system.] 3. The RAND Corporation reported that CD-ROMs can deteriorate within 5-10 years -- much faster than the 50 years usually quoted. This instability is quite apart from the even more serious problem of incompatibility of medium, where a perfectly good storage device becomes unreadable because of changes in technology. Ever try to read an 8-inch floppy disk from the 1970s on your DVD player? 4. Pity Mr Cody Johnston, a commercial trucker in Bozeman, MT. He admittedly broke speeding laws and paid a fine, but the local newspaper reported his misdemeanor as a sexual deviation charge, which potentially includes homosexuality and bestiality. Apparently the court computer system printed out a list of convictions using erroneous labels for the internal codes. Mr Johnston sued the court and the newspaper for libel. 5. A Social Security Administration employee who become angry with a woman with whom he argued in an Internet chat room used a fellow-employee's terminal to fill in a death date for the woman in her SSA records. She applied for a loan at her bank and discovered that she was ""cyberdead."" Jorge Yong admitted culpability, resigned and paid $800 in fines and damages. Copyright © 2004 M. E. Kabay. All rights reserved. Page 9

Integrity: JIT Comment I would think that Integrity is most frequently involved in a security incident. If your software is tampered with or if your server is hacked into it automatically loses integrity even if nothing was changed. Integrity is very fragile. Copyright © 2004 M. E. Kabay. All rights reserved. Page 10

Copyright © 2004 M. E. Kabay. All rights reserved. Page 11 Authenticity Correspondence to intended meaning Avoiding nonsense E.g., part number field actually contains cost Avoiding fraud E.g., sender’s name on e-mail is changed to someone else’s 1. According to the British National Criminal Intelligence Service, the explosion in credit-card counterfeiting and other credit fraud is largely due to increased activity by Asian Triads. Losses grew by 500% between 1991 and 1998, with total theft estimated at £25M in the UK in 1998. 2. In Newmarket, Ontario (near Toronto), thieves in cahoots with a gas-station employee installed a miniature camera focused on the debit-card PIN pad. Videos of customers punching in their PINs, coupled with account information provided by the criminal employee sufficed to let the gang create fake debit cards to pillage accounts. The criminals got into the habit of visiting ATMs at midnight so they could steal two days' worth of maximum withdrawals. Police reported total thefts in the hundreds of thousands of dollars. The criminals were arrested just before a planned expansion to five more gas stations. 3. The Transportation Federal Credit Union was robbed of over $1M by Asian crime groups which developed algorithms for generating valid debit-card numbers (with a success rate of about 50%). The fake cards were then used to extract money from the victimized accounts. Unfortunately, a software error at the Union precluded verification of the encrypted checksums on the cards' magnetic strips. 4. In Finland, high-tech thieves installed a ""small black card reader"" on top of the regular slot for inserting debit and credit cards in an ATM. With the codes from their extra card reader plus some standard shoulder-surfing to garner PINs, the thieves were able to create 60 counterfeit cards and stole the equivalent of U$36,600. 5. A father and his teenaged daughter were arrested in Michigan in mid-December after allegedly using a scanner, computer, and color printer to create counterfeit U$20 bills and spending $2,800 of the fake money on Christmas presents. Donald Gill of Fairgrove, MI was held in jail pending Federal felony charges. His 17-year-old girl was released on bail and charged under state laws (minors are not subject to federal felony laws). Copyright © 2004 M. E. Kabay. All rights reserved. Page 11

Integrity & Authenticity Losses Insertion, use, or production of false or unacceptable data Modification, replacement, removal, appending, aggregating, separating, or reordering Misrepresentation Repudiation (rejecting as untrue) Misuse or failure to use as required Copyright © 2004 M. E. Kabay. All rights reserved. Page 12

Copyright © 2004 M. E. Kabay. All rights reserved. Page 13 Availability Timely access to data Avoid delays E.g., prevent system crashes & arrange for recovery plans Avoid inconvenience E.g., prevent mislabeling of files 1. Installation of some new software on the ETrade Web-based stock brokerage caused intermittent, serious failures that interrupted electronic trading for several hours on Wednesday 3 February. Some customers interviewed by R. Scott Raynovich, writing for Wired, stated that they would pull their brokerage business out of Etrade for failing to provide consistent service. An anonymous investor reportedly said, "I'm trusting these guys with thousands of dollars of my money, and they can't provide me consistent access to it," said one ETrade customer, who asked to remain unnamed because he feared retribution from ETrade officials as he attempted to transfer money to another service. Hours, sometimes days, go by with me unable to put money into a suddenly hot stock, pull out of one that's tanking, or try to get in on an IPO. I'm disgusted with this company." 2. E-Trade, the online stock trading firm, was severely embarrassed when its computers crashed on the 3rd, 4th and 5th of February because of software quality problems. Clients were up in arms over the difficulties they experienced in buying and selling stocks quickly -- the much-touted advantages of electronic trading via the Internet. 3. The Charles Schwab online stock brokerage computers went down at 09:37 on 1999-02-24 for about 90 minutes, causing disruption for its clients, who were normally placing an average of 153,000 trades a day online — 28% of the market for online securities trading. 4. On 21 Feb 1999, there was a 15 hour period when many ISPs in the UK were down due to (1) a problem on a transatlantic link maintained by Teleglobe and (2) the simultaneous upgrade of a mail server on the Cable Internet ISP. Malcolm Park noted in RISKS that many users of the affected ISPs complained about interference with their Net-dependent business. He pointed out that businesses should know that the Internet has no guarantee of service; at the very least, it would be appropriate for anyone dependent on the Net to have a contract with a backup ISP. [MK comments: here in Vermont, I have two ISPs -- and have often had to resort to the secondary one when the first one's local node is saturated or malfunctioning. Unfortunately, I still have only one set of wires between our home out in the boondocks and the central switch -- but at least the set includes three different phone numbers.] Copyright © 2004 M. E. Kabay. All rights reserved. Page 13

Availability: JIT Comment Availability seems to be the number one contender. A company many times are required to allow employees access into the company network and database so that they may be able to accomplish their everyday tasks. This is not for a lack of control by the company but out of production necessity. Therefore this scenario is most likely to be exploited due to availability. Copyright © 2004 M. E. Kabay. All rights reserved. Page 14

Copyright © 2004 M. E. Kabay. All rights reserved. Page 15 Utility Usefulness for specific purposes Avoid conversion to less useful form E.g., replacing dollar amounts by foreign currency equivalent Prevent impenetrable coding E.g., employee encrypts source code and "forgets" decryption key 1. The entire Y2K debacle is a case of a change in the environment’s rendering a data storage format less useful than it was previously. Copyright © 2004 M. E. Kabay. All rights reserved. Page 15

Availability & Utility Losses Destruction , damage, or contamination Denial, prolongation, acceleration, or delay in use or acquisition Movement or misplacement Conversion or obscuration Copyright © 2004 M. E. Kabay. All rights reserved. Page 16

Functions of INFOSEC Personnel (1) Avoid Deter Educate Detect Correct Prevent Recover Mitigate Punish/reward Transfer Investigate Copyright © 2004 M. E. Kabay. All rights reserved. Page 17

Functions of INFOSEC Personnel (2) Avoidance: e.g., prevent vulnerabilities and exposures Deterrence: make attack less likely Detection: quickly spot attack Prevention: prevent exploit Mitigation: reduce damage Transference: shift control for resolution Copyright © 2004 M. E. Kabay. All rights reserved. Page 18

Functions of INFOSEC Personnel (3) Investigation: characterize incident Sanctions & rewards: punish guilty, encourage effective responders Recovery: immediate response, repair Correction: never again Education: advance knowledge and teach others Copyright © 2004 M. E. Kabay. All rights reserved. Page 19

Copyright © 2003 M. E. Kabay. All rights reserved. Now go and study Copyright © 2003 M. E. Kabay. All rights reserved.