Course III
Course III
Security
Cyber Attacks and Counter Measures:
User Perspective
(PGDCS-03)
Title Cyber Attacks and Counter Measures: User
Perspective
Authors
Block I> Unit 2, Unit 3 & Unit4 Er. Samarth Sharma, Security Consultant,
Wipro Technologies, Bangalore
Block II> Unit 1, Unit 2, Unit 3 & Unit4 Er. Charanjeet Singh Chawla, Wing
Commander, Indian Air Force, Ministry of
Defence.
Block III> Unit 1, Unit 2, Unit 3 & Unit4 Dr. Jeetendra Pande, Assistant Professor-
School of CS & IT, Uttarakhand Open
University, Haldwani
ISBN: 978-93-84813-90-1
Acknowledgement
The University acknowledges with thanks the expertise and financial support provided by
Commonwealth Educational Media Centre for Asia(CEMCA), New Delhi, for the preparation of
this study material.
© Uttarakhand Open University, 2016. Cyber Attacks and Counter Measures: User Perspective
is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international):
http://creativecommons.org/licenses/by-sa/4.0/
It is attributed to the sources marked in the References, Article Sources and Contributors
section.
1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open
University, Haldwani
BLOCK I .................................................................................................................................................. 15
1.1 LEARNING OBJECTIVES ...................................................................................................................... 1
1.2 INTRODUCTION ................................................................................................................................. 1
1.3 CYBER ATTACK................................................................................................................................... 1
1.4 TYPES OF CYBER ATTACK OR THREATS ............................................................................................. 2
1.5 MOTIVATION ..................................................................................................................................... 5
1.6 SUMMERY ......................................................................................................................................... 7
1.7 CHECK YOUR PROGRESS ................................................................................................................... 8
1.8 ANSWERS TO CHECK YOUR PROGRESS ............................................................................................. 8
1.9 MODEL QUESTIONS .......................................................................................................................... 9
2.1 LEARNING OBJECTIVES .................................................................................................................... 10
2.2 INTRODUCTION TO ASSET ............................................................................................................... 10
2.2.1 Identification of assets ............................................................................................................. 10
2.2.1.1 Information assets ............................................................................................................ 11
2.2.1.2. Software assets ................................................................................................................ 11
2.2.1.3 Physical assets ................................................................................................................... 11
2.2.1.4 Services ............................................................................................................................. 11
2.2.2 Accountability of assets ........................................................................................................... 11
2.2.2.1 Assets valuation ................................................................................................................ 12
2.2.3 Preparing a schema for classification ...................................................................................... 12
2.2.4 Implementation of the classification schema .......................................................................... 13
2.3 VULNERABILITY AND THREATS........................................................................................................ 14
2.3.1 Types of threat ......................................................................................................................... 14
2.4 RISK MANAGEMENT........................................................................................................................ 15
2.4.1 Quantitative Risk Assessment .................................................................................................. 17
2.4.1.1 Advantages of Quantitative Risk Assessments ................................................................. 18
2.4.1.2 Disadvantages of Quantitative Risk Assessments ............................................................. 18
2.4.2 Qualitative Risk Assessment .................................................................................................... 18
2.4.2.1 Advantages of Qualitative Risk Assessments .................................................................... 18
2.4.2.2 Disadvantages of Qualitative Risk Assessments ............................................................... 18
2.5 SUMMARY ....................................................................................................................................... 18
2.6 MODEL QUESTIONS ........................................................................................................................ 19
3.1 LEARNING OBJECTIVES .................................................................................................................... 20
3.2 INTRODUCTION TO INFORMATION SECURITY FRAMEWORK ......................................................... 20
3.2.1 Advantage of Information Security framework ....................................................................... 20
3.2.2Many Standards, Best Practices and Frameworks .................................................................... 20
3.2.2.1 ISO 27001:2013 ................................................................................................................. 21
3.2.2.2 COSO ................................................................................................................................. 23
3.2.2.3 COBIT (IT Governance Framework)................................................................................... 24
3.3 POLICIES, STANDARDS, BASELINES, GUIDELINES AND PROCEDURES ............................................. 26
3.3.1 Security Policy .......................................................................................................................... 26
3.3.2Guidelines ................................................................................................................................. 27
3.3.3 Procedure ................................................................................................................................. 27
3.4 SUMMARY ....................................................................................................................................... 27
3.5 MODEL QUESTIONS ........................................................................................................................ 28
4.1 LEARNING OBJECTIVES .................................................................................................................... 29
4.2 INTRODUCTION TO INFORMATION SECURITY GOVERNANCE ........................................................ 29
4.2.1 Desired Outcome ..................................................................................................................... 29
4.2.2 Benefits of Information Security Governance ......................................................................... 30
4.3 IMPORTANCE OF INFORMATION SECURITY AND INFORMATION SECURITY GOVERNANCE ......... 30
4.4 LEGAL FRAMEWORKS...................................................................................................................... 31
4.4.1 Sarbanes-Oxley Act (SOX) ........................................................................................................ 31
4.4.2 Health Insurance Portability and Accountability Act (HIPAA).................................................. 31
4.4.3 Gramm-Leach-Bliley Act of 1999 (GLBA) ................................................................................. 31
4.5 SECURITY STANDARDS AND PROCEDURE ....................................................................................... 32
4.5.1 Why do we need security standards? ...................................................................................... 32
4.6 SUMMARY ....................................................................................................................................... 32
4.7 CHECK YOUR PROGRESS ........................................................................................................... 33
BLOCK II ................................................................................................................................................. 34
1.1 LEARNING OBJECTIVES .............................................................................................................. 35
1.2 INTRODUCTION ............................................................................................................................... 35
1.3 SECURITY BASICS ............................................................................................................................. 36
1.3.1 Physical Controls ...................................................................................................................... 37
1.3.2 Technical Controls .................................................................................................................... 37
1.3.3 Administrative Controls ........................................................................................................... 37
1.3.4 Physical security, protection on the inside .............................................................................. 37
1.3.5 Partitioning and protecting network boundaries with firewalls.............................................. 38
1.4 USER ACCESS CONTROLS ................................................................................................................ 39
1.4.1 Why Access Controls are required ........................................................................................... 39
1.4.2 What are Access Control Models ............................................................................................. 39
1.4.3.1 Discretionary Access Control (DAC) .................................................................................. 40
1.4.3.2 Mandatory Access Control (MAC) ..................................................................................... 40
1.4.3.3 Role Based Access Control (RBAC) .................................................................................... 41
1.4.4 Authentication ......................................................................................................................... 41
1.4.4.1 User password Authentication ......................................................................................... 42
1.4.4.2 Windows user based authentication ................................................................................ 42
1.4.4.3 Directory based authentication ........................................................................................ 42
1.4.4.4 Certificate based authentication ...................................................................................... 42
1.4.4.5 Smart card based authentication...................................................................................... 42
1.4.4.6 Biometrics ......................................................................................................................... 43
1.4.4.7 Grid based Authentication ................................................................................................ 43
1.4.4.8 Knowledge-based authentication ..................................................................................... 43
1.4.4.9 Machine Authentication ................................................................................................... 43
1.4.4.10 One time Password (OTP) ............................................................................................... 43
1.4.5 Access Control Framework (ACF) ............................................................................................. 43
1.4.6 Access Control Techniques and Technologies ......................................................................... 43
1.4.6.1 Rule Based Access control ................................................................................................ 44
1.4.6.2 Menu Based Access Control.............................................................................................. 44
1.4.6.3 Access Control List ............................................................................................................ 44
1.4.6.4 Content Based Access Control .......................................................................................... 44
1.4.6.5 Access control Markup Language (XACML) ...................................................................... 44
1.4.6.6 Security Assertion Markup Language (SAML) ................................................................... 44
1.5 TRAINING AND AWARENESS ........................................................................................................... 45
1.5.1 Types of Training ...................................................................................................................... 45
1.5.1.1 Classroom-Style Training .................................................................................................. 46
1.5.1.2 Security Awareness Website............................................................................................. 46
1.5.2 Helpful Hints ............................................................................................................................ 46
1.5.2.1 Visual Aids ......................................................................................................................... 47
1.5.2.2 Promotions........................................................................................................................ 47
1.5.2.3 Training Topics .................................................................................................................. 47
1.5.2.4 Physical Security................................................................................................................ 47
1.5.2.5 Desktop Security ............................................................................................................... 47
1.5.2.6 Wireless Networks and Security ....................................................................................... 48
1.5.2.7 Password Security ............................................................................................................. 48
1.5.2.8 Phishing ............................................................................................................................. 48
1.5.2.9 Hoaxes ............................................................................................................................... 49
1.5.2.10 Malware .......................................................................................................................... 49
1.5.2.11 Viruses ............................................................................................................................. 49
1.5.2.12 Worms ............................................................................................................................. 50
1.5.2.13 Trojans............................................................................................................................. 50
1.5.2.14 Spyware and Adware ...................................................................................................... 50
1.6 SUMMARY ....................................................................................................................................... 50
1.7 CHECK YOUR PROGRESS ................................................................................................................. 51
1.8 ANSWERS TO CHECK YOUR PROGRESS ........................................................................................... 51
1.9 MODEL QUESTIONS ........................................................................................................................ 51
2.1 LEARNING OBJECTIVES .................................................................................................................... 54
2.2 INTRODUCTION ............................................................................................................................... 54
2.3 TECHNICAL SECURITY CONTROLS ................................................................................................... 54
2.3.1 Preventive Technical Controls ................................................................................................. 54
2.3.1.1 Access Control Software ................................................................................................... 55
2.3.1.2 Antivirus Software............................................................................................................. 55
2.3.1.3 Library Control Systems .................................................................................................... 55
2.3.1.4 Passwords ......................................................................................................................... 55
2.3.1.5 Smart Cards ....................................................................................................................... 56
2.3.1.6 Encryption ......................................................................................................................... 56
2.3.1.7 Dial-Up Access Control and Callback Systems .................................................................. 56
2.3.2 Detective Technical Controls ................................................................................................... 56
2.3.2.1 Audit Trails ........................................................................................................................ 56
2.3.2.2 Intrusion Detection Systems ............................................................................................. 57
2.3.3 Corrective Technical Controls .................................................................................................. 57
2.3.3.1 OS Upgrade ....................................................................................................................... 57
2.3.3.2 Backup Data restoral ......................................................................................................... 57
2.3.3.3 Vulnerability Mitigation .................................................................................................... 57
2.4 PROTECTION FROM MALICIOUS ATTACKS...................................................................................... 57
2.5 NETWORKS AND COMMUNICAITON .............................................................................................. 60
2.5.1 Data Communication ............................................................................................................... 60
2.5.2 Characteristics of Data Communication .................................................................................. 60
2.5.3 Components of Data Communication ..................................................................................... 61
2.5.4 Data Representation ......................................................................................................... 61
2.5.5 Data Flow ................................................................................................................................. 62
2.5.5.1 Simplex .............................................................................................................................. 62
2.5.5.2 Half Duplex ........................................................................................................................ 62
2.5.5.3 Full Duplex......................................................................................................................... 62
2.6 COMPUTER NETWORK .................................................................................................................... 62
2.6.1 Categories of Network ............................................................................................................. 62
2.6.2 Protocol .................................................................................................................................... 63
2.6.2.1 Elements of a Protocol ...................................................................................................... 63
2.6.3 External Services ...................................................................................................................... 63
2.6.3.1 Policy on Use of External Services .................................................................................... 63
2.7 CLOUD COMPUTING ....................................................................................................................... 63
2.7.1 Cloud Computing Models ........................................................................................................ 64
2.7.2 Understanding Public and Private Clouds ................................................................................ 64
2.7.2.1 Public Cloud ...................................................................................................................... 64
2.7.2.2 Private Cloud ..................................................................................................................... 64
2.7.2.3 Hybrid Cloud ..................................................................................................................... 65
2.7.3 Cloud Computing Benefits ....................................................................................................... 65
2.7.4 Cloud Computing Challenges ................................................................................................... 65
2.7.5 IT Infrastructure ...................................................................................................................... 66
2.8 SUMMARY ....................................................................................................................................... 66
2.9 CHECK YOUR PROGRESS ................................................................................................................. 67
2.10 ANSWERS TO CHECK YOUR PROGRESS ......................................................................................... 68
2.11 MODEL QUESTIONS ...................................................................................................................... 68
3.1 LEARNING OBJECTIVES .................................................................................................................... 70
3.2 INTRODUCTION ............................................................................................................................... 70
3.3 SOFTWARE DEVELOPMENT LIFECYCLE (SDLC) ................................................................................ 70
3.3.1 Definition ................................................................................................................................. 70
3.3.2 Stages in SDLC .......................................................................................................................... 71
3.4 SDLC MODELS.................................................................................................................................. 72
3.5 WATERFALL MODEL ........................................................................................................................ 72
3.5.1 Waterfall Model Design ........................................................................................................... 72
3.5.2 Stages of the Waterfall model ................................................................................................. 73
3.5.3 Application ............................................................................................................................... 74
3.5.4 Advantages and Disadvantages of Waterfall Model ................................................................ 74
3.5.4.1 Advantages........................................................................................................................ 74
3.5.4.2 Disadvantages ................................................................................................................... 74
3.6 ITERATIVE MODEL ........................................................................................................................... 74
3.6.1 Iterative Model design ............................................................................................................. 74
3.6.2 Application ............................................................................................................................... 75
3.6.3 Advantages and Disadvantages of Iterative Model .......................................................... 76
3.6.3.1 Advantages........................................................................................................................ 76
3.6.3.2 Disadvantages ................................................................................................................... 76
3.7 SPIRAL MODEL ................................................................................................................................ 76
3.7.1 Spiral Model design.................................................................................................................. 76
3.7.2 Application ............................................................................................................................... 77
3.7.3 Advantages and Disadvantages of Spiral Model ............................................................... 77
3.7.3.1 Advantages........................................................................................................................ 77
3.7.3.2 Disadvantages ................................................................................................................... 78
3.8 V – MODEL ...................................................................................................................................... 78
3.8.1 V- Model design ....................................................................................................................... 78
3.8.2 Verification Phases ................................................................................................................... 78
3.8.3 Coding Phase ............................................................................................................................ 79
3.8.4 Validation Phases ..................................................................................................................... 79
3.8.5 Application ............................................................................................................................... 80
3.8.6 Advantages and Disadvantages of Software Prototyping V-Model ......................................... 80
3.8.6.1 Advantage ......................................................................................................................... 80
3.8.6.2 Disadvantage..................................................................................................................... 80
3.9 BIG BANG MODEL ........................................................................................................................... 80
3.9.1 Big Bang Model design and Application .................................................................................. 80
3.9.2 Advantages and Disadvantages of Waterfall Model ......................................................... 80
3.9.2.2 Disadvantage..................................................................................................................... 81
3.10 AGILE MODEL ................................................................................................................................ 81
3.10.1 Concept of Agility ................................................................................................................... 81
3.11 RAPID APPLICATION DEVELOPMENT MODEL ............................................................................... 82
3.11.1 RAD Concept .......................................................................................................................... 82
3.11.2 RAD Model Design ................................................................................................................. 82
3.11.3 RAD Model Applications ........................................................................................................ 83
3.11.4 Advantages and Disadvantages of RAD Model ................................................................ 84
3.11.4.1 Advantage ....................................................................................................................... 84
3.11.4.2 Disadvantage................................................................................................................... 84
3.12 SOFTWARE PROTOTYPING MODEL ............................................................................................... 84
3.12.1 Software Prototyping Concept .............................................................................................. 84
3.12.2 Steps involved in Software Prototyping................................................................................. 84
3.12.3 Software Prototyping Types................................................................................................... 85
3.12.4 Software Prototyping Application.......................................................................................... 85
3.13 SUMMARY ..................................................................................................................................... 86
3.14 CHECK YOUR PROGRESS ............................................................................................................... 86
3.15 NSWERS TO CHECK YOUR PROGRESS ....................................................................................... 87
3.16 MODEL QUESTIONS ...................................................................................................................... 87
BLOCK III ................................................................................................................................................ 88
1.1 LEARNING OBJECTIVES............................................................................................................ 89
1.2 INTRODUCTION ............................................................................................................................... 89
1.3 AUTHENTICATION ........................................................................................................................... 90
1.3.1 Definition of Authentication .................................................................................................... 90
1.3.2 Definition of Electronic Authentication ................................................................................... 90
1.3.3 Authentication vs. Authorization ............................................................................................. 90
1.3.4 Types of Authentication Factors .............................................................................................. 92
1.3.5 Multi Factor and Two Factor Authentication........................................................................... 94
1.4 AUTHENTICATOIN METHODS AND PROTOCOLS ............................................................................. 95
1.4.1 Kerberos ................................................................................................................................... 95
1.4.2 Secure Sockets Layer(SSL) ........................................................................................................ 96
1.4.3 Microsoft NTLM ....................................................................................................................... 97
1.4.4 Password Authentication Protocol .......................................................................................... 97
1.4.5 Challenge-Handshake Authentication Protocol(CHAP) ........................................................... 99
1.4.6 Microsoft Challenge Handshake Authentication Protocol(MS-CHAP)..................................... 99
1.4.7 Extensible Authentication Protocol ....................................................................................... 100
1.4.8 Remote Authentication Dial-In User Service (RADIUS) .......................................................... 100
1.4.9 Certificates ............................................................................................................................. 100
1.4.10 Security Tokens .................................................................................................................... 101
1.5 Selecting a Strong Password ......................................................................................................... 101
1.5.1 Bad Password Combinations.................................................................................................. 102
1.5.2 Tips for a Strong Password..................................................................................................... 102
1.6 SUMMERY .................................................................................................................................. 105
1.7 CHECK YOUR PROGRESS........................................................................................................ 106
1.8 ANSWERS TO CHECK YOUR PROGRESS ............................................................................. 106
1.9 FURTHER READING ................................................................................................................. 107
1.10 MODEL QUESTIONS ............................................................................................................... 107
2.1 LEARNING OBJECTIVES .................................................................................................................. 108
2.2 INTRODUCTION ............................................................................................................................. 108
2.3 SERVICE SET IDENTIFICATION (SSID) ............................................................................................. 108
2.3.1 Security of SSID hiding ........................................................................................................... 109
2.4 ENCRYPTION METHODS ................................................................................................................ 109
2.4.1 WEP (Wire Equivalent Privacy) .............................................................................................. 109
2.4.2 Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) .................................. 110
2.5 MAC Filtering ................................................................................................................................ 111
2.5.1 Configuration of Wireless MAC address filter on wireless router ......................................... 112
2.6 WIRELESS ROUTER ........................................................................................................................ 113
2.7 HOW TO CREATE A WIRELESS NETWORK ..................................................................................... 114
2.8 CONFIGURATION OF WIRELESS ROUTER .......................................................................... 116
2.9 WLAN ............................................................................................................................................ 116
2.9.1 Major issues with WLAN ........................................................................................................ 117
2.10 SUMMERY ................................................................................................................................... 119
2.11 CHECK YOUR PROGRESS ............................................................................................................. 120
2.12 ANSWERS TO CHECK YOUR PROGRESS ....................................................................................... 120
2.13 MODEL QUESTIONS ............................................................................................................... 120
3.1 LEARNING OBJECTIVES .................................................................................................................. 121
3.2 INTRODUCTION ............................................................................................................................. 121
3.2.1 Drivers behind this new cyber reality? .................................................................................. 121
3.2.2 Cyber Crime and Challenges Ahead ....................................................................................... 122
3.3 INVESTIGATION TECHNIQUES & COMPUTER FORENSICS ............................................................. 123
3.3.1 Digital Forensics System......................................................................................................... 123
3.3.1.1 Computer based crime.................................................................................................... 123
3.3.1.2 Computer facilitated crime ............................................................................................. 123
3.4 TYPES OF INVESTIGATION ............................................................................................................. 124
3.4.1 Criminal forensics................................................................................................................... 124
3.4.2 Intelligence gathering ............................................................................................................ 124
3.4.3 Electronic discovery (eDiscovery) .......................................................................................... 124
3.4.4 Intrusion investigation ........................................................................................................... 124
3.5EVIDENCE AND ANALYSIS............................................................................................................... 124
3.5.1Attribution .............................................................................................................................. 124
3.5.2 Alibis and statements............................................................................................................. 124
3.5.3 Intent...................................................................................................................................... 125
3.5.4 Evaluation of source............................................................................................................... 125
3.5.5 Document authentication ...................................................................................................... 125
3.6 STEPS IN FORENSICS INVESTIGATION ........................................................................................... 125
3.7 FORENSICS TOOLS ......................................................................................................................... 126
3.7.1 General forensic tools ............................................................................................................ 126
3.7.2 Specialist forensic tools.......................................................................................................... 127
3.7.3 Case management ................................................................................................................. 127
3.7.4 Useful software ...................................................................................................................... 127
3.8 INVESTIGATION ............................................................................................................................. 127
3.8.1 Some important terminologies .............................................................................................. 128
3.9 HOW EMAIL WORKS ..................................................................................................................... 131
3.10 COMMON TYPES OF E-MAIL ABUSE WHERE THE SENDER ADDRESS IS FORGED4 ...................... 132
3.10.1 Sender Addresses in E-Mails ................................................................................................ 133
3.10.2 Parts of an email .................................................................................................................. 133
3.10.3 How to Identify Fake EMail And Trace Sender's Location ................................................... 134
3.10.3.1 Fake Emails.................................................................................................................... 134
3.11 HOW TO TRACE LOCATION OF EMAIL SENDER ........................................................................... 138
3.11.1 What to do if IP is not there or Email is sent from Gmail .................................................... 138
3.12 RECOGNISE SCAM OR HIAX EMAIL AND WEBSITES .................................................................... 138
3.12.1 Scams ................................................................................................................................... 139
3.12.2 Steps to avoid online scams and hoaxes.............................................................................. 140
3.12.3 Points to Remember ............................................................................................................ 140
3.13 FAKE SOCIAL MEDIA PROFILE INVESTIGATION ........................................................................... 140
3.13.1 How to spot fake facebook account .................................................................................... 141
3.14 SUMMERY ................................................................................................................................... 145
3.15 ACTIVITY: DO IT YOURSELF.......................................................................................................... 146
3.16 CHECK YOUR PROGRESS ............................................................................................................. 146
3.17 ANSWERS TO CHECK YOUR PROGRESS ....................................................................................... 147
3.18 MODEL QUESTIONS .................................................................................................................... 147
4.1 LEARNING OBJECTIVES .................................................................................................................. 149
4.2 INTRODUCTION ............................................................................................................................. 149
4.2.1 Cryptography Objectives........................................................................................................ 150
4.2.2 Cryptography Glossary ........................................................................................................... 150
4.3 TYPES OF CRYPTOGRAPHY ............................................................................................................ 150
4.4 WHY OS ENCRYPTION IMPORTANT? ............................................................................................ 152
4.4.1 Why should Encryption be used? .......................................................................................... 152
4.4.2 How does it work? ................................................................................................................. 153
4.5 PUBLIC KEY CRYPTOGRAPHY ......................................................................................................... 154
4.5.1 Public keys and private keys .................................................................................................. 154
4.5.2 Combining public key and secret key cryptography .............................................................. 154
4.5.3 How public key cryptography works ...................................................................................... 154
4.6 APPLICATIONS OF PUBLIC KEY CRYPTOGRAPHY ........................................................................... 154
4.6.1 Secure Web communication .................................................................................................. 154
4.6.2 Secure content distribution ................................................................................................... 155
4.7 SECRET KEY CRYPTOGRAPHY ........................................................................................................ 155
4.7.1 Encryption and decryption using a secret key ....................................................................... 155
4.7.2 How to get the key to the recipient ....................................................................................... 155
4.7.3 How secret key cryptography works...................................................................................... 156
4.8 APPLICATIONS OF SECRET KEY CRYPTOGRAPHY........................................................................... 157
4.8.1 Hiding spoilers........................................................................................................................ 157
4.8.2 Encrypting the contents of hard disks ................................................................................... 157
4.8.3 Protecting pay TV transmissions ............................................................................................ 157
4.9 SUMMERY ..................................................................................................................................... 158
4.10 CHECK YOUR PROGRESS ............................................................................................................. 159
4.11 ANSWERS TO CHECK YOUR PROGRESS ....................................................................................... 159
4.12 MODEL QUESTIONS .................................................................................................................... 159
References, Article Source & Contributors ......................................................................................... 160
BLOCK I
UNIT I: CYBER ATTACKS, TYPES OF ATTACKS
MOTIVATION
1.1 LEARNING OBJECTIVES
This unit purports at making you understand:
1.2 INTRODUCTION
Everyone among us has one time or another has come across some form of attack. It could
be physical or emotional or of some other kind. The intent is to cause some sort of harm –
though sometimes it turn into a blessing in disguise. However, cyber attacks always aim at
causing harm. They can be varied in their nature of approach and type of harm they inflict,
depending on the motive, but the purpose is certainly malicious.
All of you must have encountered a situation when some unwanted changes, like installing
some software or change your search engine, are made to your system or seen unwanted
advertisements popping up while surfing Internet. These are examples of cyber attacks.
These can range from being minor nuisance, like occasional popups, to creating havoc, like
formatting hard disk.
A cyber attack is an attack initiated from a computer against a website, computer system or
individual computer (collectively, a computer) that compromises the confidentiality, integrity
or availability of the computer or information stored on it.
1
1.4 TYPES OF CYBER ATTACK OR THREATS
Anonymous3 gives a comprehensive list of cyber attacks/threats which is reproduced below:
Default passwords can function as backdoors if they are not changed by the user.
Some debugging features can also act as backdoors if they are not removed in the
release version.
Many computer worms, such as Sobig and Mydoom, install a backdoor on the
affected computer (generally a PC on broadband running Microsoft Windows and
Microsoft Outlook). Such backdoors appear to be installed so that spammers can send
junk e-mail from the infected machines. Others, such as the Sony/BMG rootkit
distributed silently on millions of music CDs through late 2005, are intended as DRM
measures—and, in that case, as data gathering agents, since both surreptitious
programs they installed routinely contacted central servers.
3
http://www.cybersecuritycrimes.com/types-of-cyber-attacks/
4
https://en.wikipedia.org/wiki/Backdoor_(computing)
2
connected to the Internet. DoS attack targets websites or services which are hosted on
the servers. This type of attack can aim bank servers and credit card payment
gateways.
3. Direct-access Attack – A direct-access attack simply means gaining physical access to
the computer or its part and performing various functions or installing various types
of devices to compromise security. The attacker can install software loaded with
worms or download important data, using portable devices.
4. Eavesdropping – As the name suggests, eavesdropping means secretly listening to a
conversation between the hosts on a network. There are various programs such as
Carnivore and NarusInsight that can be used to eavesdrop.
5. Spoofing – Spoofing is a cyber attack where a person or a program impersonate
another by creating false data in order to gain illegal access to a system. Such threats
are commonly found in emails where the sender‘s address is spoofed.
6. Tampering – Tampering is a web based attack where certain parameters in the URL
are changed without the customer‘s knowledge; and when the customer keys in that
URL, it looks and appears exactly the same. Tampering is basically done by hackers
and criminals to steal the identity and obtain illegal access to information.
7. Repudiation Attack – A repudiation attack occurs when the user denies the fact that he
or she has performed a certain action or has initiated a transaction. A user can simply
deny having knowledge of the transaction or communication and later claim that such
transaction or communication never took place.
8. Information Disclosure – Information disclosure breach means that the information
which is thought to be secured is released to unscrupulous elements who are not
trustworthy.
9. Privilege Escalation Attack – A privilege escalation attack is a type of network
intrusion which allows the user to have an elevated access to the network which was
primarily not allowed. The attacker takes the advantage of the programming errors
and permits an elevated access to the network.
10. Exploits – An exploit attack is basically a software designed to take advantage of a
flaw in the system. The attacker plans to gain easy access to a computer system and
gain control, allows privilege escalation or creates a DOS attack.
11. Social Engineering – An attack by a known or a malicious person is known as social
engineering. They have knowledge about the programs used and the firewall security
and thus it becomes easier to take advantage of trusted people and deceive them to
gain passwords or other necessary information for a large social engineering attack.
12. Indirect Attack – Indirect attack means an attack launched from a third party
computer as it becomes more difficult to track the origin of the attack.
13. Computer Crime – A crime undertaken with the use of a computer and a network is
called as a computer crime.
14. Malware – Malware refers to malicious software that are being designed to damage or
perform unwanted actions into the system. Malware is of many types like viruses,
worms, Trojan horses, etc., which can cause havoc on a computer‘s hard drive. They
3
can either delete some files or a directory or simply gather data without the actual
knowledge of the user.
15. Adware – Adware is a software that supports advertisements which renders ads to its
author. It has advertisements embedded in the application. So when the program is
running, it shows the advertisement. Basically, adware is similar to malware as it
uses ads to inflict computers with deadly viruses.
16. Bots – Bots is a software application that runs automated tasks which are simple and
repetitive in nature. Bots may or may not be malicious, but they are usually found to
initiate a DoS attack or a click fraud while using the internet.
17. Ransomware – Ransomware is a type of cyber security threat which will restrict
access to your computer system at first and will ask for a ransom in order for the
restriction to be removed. This ransom is to be paid through online payment methods
only which the user can be granted an access to their system.
18. Rootkits – A rootkit is a malicious software designed in such a way that hides certain
process or programs from normal anti virus scan detection and continues to enjoy a
privilege access to your system. It is that software which runs and gets activated each
time you boot your system and are difficult to detect and can install various files and
processes in the system.
19. Spyware – Spyware, as the name suggests, is a software which typically spies and
gathers information from the system through a user‘s internet connection without the
user‘s knowledge. A spyware software is majorly a hidden component of a freeware
program which can be downloaded from the internet.
20. Scareware – Scareware is a type of threat which acts as a genuine system message and
guides you to download and purchase useless and potentially dangerous software.
Such scareware pop-ups seem to be similar to any system messages, but actually
aren‘t. The main purpose of the scareware is to create anxiety among the users and
use that anxiety to coax them to download irrelevant softwares.
21. Trojan Horses – Trojan Horses are a form of threat that are malicious or harmful
codes hidden behind genuine programs or data which can allow complete access to
the system and can cause damage to the system or data corruption or loss/theft of data.
It acts as a backdoor and hence it is not easily detectable.
22. Virus – A computer virus is a self replicating program which, when executed,
replicates or even modifies by inserting copies of itself into another computer file and
infects the affected areas once the virus succeeds in replicating. This virus can be
harmful as it spreads like wildfire and can infect majority of the system in no time.
23. Worm – Just like a virus, worm is a self replicating program which relies on computer
network and performs malicious actions and spreads itself onto other computer
networks. Worms primarily rely on security failures to access the infected system.
24. Phishing – Phishing is a cyber threat which makes an attempt to gain sensitive
information like passwords, usernames and other details for malicious reasons. It is
basically an email fraud where the perpetrator sends a legitimate looking email and
attempts to gain personal information.
4
25. Identity Theft – Identity theft is a crime wherein your personal details are stolen and
these details are used to commit a fraud. An identity theft is committed when a
criminal impersonates individuals and use the information for some financial gain.
26. Intellectual Property Theft – Intellectual Property theft is a theft of copyrighted
material where it violates the copyrights and the patents. It is a cybercrime to get
hands onto some trade secrets and patented documents and research. It is basically a
theft of an idea, plan and the methodology being used.
27. Password Attacks – Password attack is a form of a threat to your system security
where attackers usually try ways to gain access to your system password. They either
simply guess the password or use an automated program to find the correct password
and gain an entry into the system.
28. Bluesnarfing – Bluesnarfing is a threat of information through unauthorized means.
The hackers can gain access to the information and data on a Bluetooth enabled phone
using the wireless technology of the Bluetooth without alerting the user of the phone.
29. Bluejacking – Bluejacking is simply sending of texts, images or sounds, to another
Bluetooth enabled device and is a harmless way of marketing. However, there is a
thin line between bluejacking and bluesnarfing and if crossed it results into an act of
threat.
30. DDoS – DDoS basically means a Distributed Denial of Service. It is an attempt to
make any online service temporarily unavailable by generating overwhelming traffic
from multiple sources or suspend services of a host connected to the internet.
31. Keylogger – A keylogger is a spyware that has the capability to spy on the happenings
on the computer system. It has the capability to record every stroke on the keyboard,
web sites visited and every information available on the system. This recorded log is
then sent to a specified receiver.
1.5 MOTIVATION
Depending on the motivation, according to Ray5, Verisign iDefense Security Intelligence
Services classifies cyber-attacks into three categories: hacktivism, cyber crime and cyber-
espionage.
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or
socially or ideologically motivated purpose. It is basically used as a means to promote an
agenda. Hacktivists are responsible for denial-of-service (DoS), distributed denial of service
(DDoS), information theft, data breaches, web site defacement, typosquatting(URL hijacking
relying on typographical errors in URL spelling) and many other acts of digital sabotage.
Cyber crime, though, in a broad sense, covers any illegal activity that is committed through a
digital means, here it refers to an activity with the monetary gain in mind. Such an activity
can be a direct one, e.g., fraudulent bank transaction, or an indirect one, e.g., selling stolen
5
http://www.circleid.com/posts/understanding_the_threat_landscape_cyber_attack_actors_and_motivations
5
information in black market. Frequently used cyber crime tools are ATM and point-of-sale
(PoS) skimming, RAM scrapping, code injection, key logging and phishing to extract
confidential personal information.
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the
permission of the holder of the information (personal, sensitive, proprietary or of classified
nature), from individuals, competitors, rivals, groups, governments and enemies for personal,
economic, political or military advantage using methods on the Internet, networks or
individual computers through the use of cracking techniques and malicious software
including Trojan horses and spyware. It may wholly be perpetrated online from computer
desks of professionals on bases in far away countries or may involve infiltration at home by
computer trained conventional spies and moles or in other cases may be the criminal
handiwork of amateur malicious hackers and software programmers.
John Arquilla (a US expert on national security affairs and defense analysis) added to new
dimension to motivation behind cyber attacks by coining the term cyber warfare or cyber
war. Cyberwarfare has been defined as "actions by a nation-state to penetrate another
nation's computers or networks for the purposes of causing damage or disruption," but other
definitions also include non-state actors, such as terrorist groups, companies, political or
ideological extremist groups, hacktivists, and transnational criminal organizations8.
The above definition of cyber espionage is very likely to raise some confusion as to whether
it does not cover cyber war. It does not, which has been made clear by Anonymous [8] as
below:
‗Cyber "war" is simply the act of fighting on an electronic battlefield with digital weapons.
To attack an adversary‘s capabilities in an effort to disable or destroy their ability to get
things done. This may be completely digital in nature (such as communication and
information systems) or the electronics that monitor and manage physical infrastructure, like
power and water systems. Hostile code like StuxNet is an example of such weapons for
cyber warfare.
Cyber "espionage" on the other hand is the act of obtaining information that is held in secrecy
by the adversary. This in itself is not the end game - this information is then used for some
sort of gain or strategic advantage. It must have an intrinsic value to the adversary, or its
useless. In many cases, this may be to gain financial / competitive advantage in the business
world, or strategic advantage over political communities of conflict.
Now here is where it gets complicated and is the source of much of the confusion. Cyber
espionage is routinely used as a precursor to a cyber warfare strike. This allows an adversary
6
http://www.pcmag.com/encyclopedia/term/64376/cyber-espionage
7
https://en.wikipedia.org/wiki/Cyber_spying
8
https://en.wikipedia.org/wiki/Cyberwarfare
6
to do reconnaissance in aid of an attack. In the movies, this would be sending in the recon
patrol in the military to disable an enemy‘s capabilities before a major attack, or sending a
spy into the enemy territory to gather intel before the strike. And this happens in the real
world too.
Typically though cyber espionage is a covert operation that takes months or years to commit.
It usually comes with signs of exfiltration and with the right tools can be tracked back to the
source, with some level of certainty. Cyber warfare is different. The attack is usually pretty
fast, striking in seconds and causing damage for use with other objectives.‘
It must be noted that a perpetrator may belong to more than category of attack. For example,
politically motivated cyber attacks may be carried out by members of extremist groups who
use cyberspace to spread propaganda, attack websites, and steal money to fund their activities
or to plan and coordinate physical-world crime9.
The figure below shows worldwide motivation statistics, typically for April 2015. It clearly
shows that most attacks (> 50%) fall under category ‗cyber crime‘ whereas about one third
belong to hacktivism. This is obvious from the fact that these two categories consist of
mainly individuals and groups and require less resources whereas ‗cyber espionage‘ and
‗cyber warfare‘ usually require greater resources and, in many cases, government backing.
1.6 SUMMERY
1. A cyber attack is an attack initiated from a computer against a website, computer
system or individual computer (collectively, a computer) that compromises the
confidentiality, integrity or availability of the computer or information stored on it.
9
https://en.wikipedia.org/wiki/Cyberwarfare
10
http://www.hackmageddon.com/category/security/cyber-attacks-statistics/
7
2. Hacktivism is the act of hacking, or breaking into a computer system, for a politically
or socially or ideologically motivated purpose.
3. Cyber crime, though, in a broad sense, covers any illegal activity that is committed
through a digital means, here it refers to an activity with the monetary gain in mind.
4. Cyber espionage is unauthorized spying by computer.
5. Cyber war is simply the act of fighting on an electronic battlefield with digital
weapons.
8
a. True
b. True
c. True
d. False
e. True
9
UNIT II: ASSET, THREAT AND RISK MANAGMENT
The task of identifying assets that need to be secure is a less glamorous aspect of information
security. But unless we know these assets, their locations and value, how are we going to
choose the amount of time, effort or money that we should spend on safeguarding the assets?
The major steps required for asset classification and controls are:
Identifying the critical assets is important for many reasons. You will come to know what is
critical and crucial for the business. You will be able to take suitable decisions regarding the
level of security that should be provided to safeguard the assets. You will also be able to
decide about the level of redundancy that is necessary by keeping an extra copy of the data or
an extra server that you should procure and keep as a hot standby.
10
2.2.1.1 Information assets
Every piece of information about your organization falls in this category. This information
has been collected, classified, organized and stored in various forms.
i. Databases: Information about customer, production, finances and other different areas
which are critical to the business. Confidentiality, Integrity and availability depends
upon the classification by the data owner. Operational and support procedures: These
have been developed over the years and provide detailed instructions on how to
perform various activities.
ii. Archived information: Information of previous months or business cycles to maintain
because of the law.
iii. Continuity plans, fall-back arrangements: These plans are created to overcome any
incident which can impact the business. Absence of these could result into the
discontinuity of the business for a shorter or longer period depends upon the severity
of the incident.
Most of the software under this category would be available off the shelf, unless the software
is obsolete or non-standard.
2.2.1.4 Services
Services that organization has outsourced to third party.
11
number of users for these assets. But the prime responsibility for accuracy will lie with the
asset owner. Any addition or modification to the information asset will only be done with the
consent of the asset owner. For example, any changes to customer information will be done
with the knowledge and consent of the marketing head. Information technology staff will
probably make the changes, physically. But ownership clearly lies with the business head
who has the prime responsibility for the content in the customer database.
Using these criteria, we have to identify the actual owners of each of the information assets.
This is also an important step for one more reason. Only an owner of the asset will be able to
decide the business value of the asset. Unless the correct business value of the asset is known,
we cannot identify the security requirement of the asset.
The next step is identifying owners of the application software. Application software
implements the business rules. As such the business process owner should be the owner of
application software. But the responsibility of maintaining application software to accurately
reflect business rules will be vested with the application developers. As such, the
accountability for application software should be with the application development manager.
System software ownership could be with the appropriate persons within the IT team. The
owner of these assets will be responsible for maintaining all the system software including
protecting the organization against software piracy.
Each asset needs to be evaluated against the above criteria and classified for easy
identification. Let us look at each category for classification.
12
Confidentiality could be defined in terms of:
a. Confidential: Where the access is restricted to a specific list of people. These could
be company plans, secret manufacturing processes, formulas, etc.
b. Company only: Where the access is restricted to internal employees only. These
could be customer databases, manufacturing procedures, etc.
c. Shared: Where the resources are shared within groups or with people outside of the
organization. This could be operational information and contact information like the
internal telephone book to be shared with business partners and agents.
d. Unclassified: Where the resources are publicly accessible. For example, the company
sales brochure and other publicity material.
Classification based on values could be high, medium or low value. Business justifications
should be needed to support this classification. Criticality of the assets depends upon the
impact it will create on the business. For example, a server who might not be very expensive
but it can have the data which is very critical to the organization.
Access rights need to be defined for individuals by the owners. It depends on who is allowed
to access the confidential information in the organization. Also who will approve to access
those data in the organization?
Destruction of the information is a controlled activity. The information that is not required by
the company any longer should be used by the competitor in the same business, that
information should be destroyed by the pre-decided schedule and method depends on the
confidentiality classification.
Let us take an example. A company's business plan is a confidential document. Let us trace
its journey in the corporate world. The plan will be discussed behind closed doors, known to
only a few senior members. In the next step the final plan will be prepared and stored on the
MD's computer or that of his secretary. A soft copy of this plan would be sent by email to all
executives who need to refer to it. The hard disk of every computer where the plan is stored
will also have a backup copy on floppy or other media. Each member will no doubt print it
and keep a hard copy folder for reference. An extra copy will also be prepared using the
copying machine. If the email is not available, the plan would be sent by fax, post or courier.
So the 'confidential' plan is now distributed across the organization, available on the hard
disks of computers belonging to each secretary and each senior executive. You get the
general idea. If this can happen to confidential information, imagine how easy it is to get hold
of other types of information. The information explosion has given rise to proliferation of
information in every nook and corner of the organization.
13
A practical implementation of classification schema thus becomes very important. The
classification label should not give an easy way of identification, which could be misused. It
should provide the right amount of protection. In the example given above, each and every
asset where the confidential information is residing or transiting through will have to be given
the same classification level as that of the information itself. It may be desirable to altogether
avoid transmission of confidential documents in soft copy format, for example as an
attachment to email. Only a restricted number of hard copies should be circulated. If it is
necessary to carry the soft copies, everyone should be instructed to encrypt information for
transmission and storage, and to memorize their passwords and keep them secret.
These frame works are used as plans or blueprints to design the security of an information
security program to mitigate risk and bring down the impact of the risks under the acceptance
criteria. Frameworks are often customized as per the requirement of the organizations.
Framework assists enterprise to achieve their objectives and deliver values through effective
governance and management.
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to
attack. Vulnerability may also refer to any type of weakness in a computer system itself, in a
set of procedures, or in anything that leaves information security exposed to a threat.
Threats can exploit the vulnerabilities to impact the performance of the systems. A threat, in
the context of information security, refers to anything that has the potential to cause serious
harm to a system. Threats can include everything from viruses, Trojans, and back doors to
outright attacks from hackers. A threat is something that may or may not happen, but has the
potential to cause serious damage. Threats can lead to attacks on computer systems, networks
and more.
The lack of access control in an office can be an example of vulnerability but unauthorized
person who intentionally or unintentionally want to access the office premises will act as a
threat which can exploit the absence of access control in the premises.
Physical damage
o fire
o water
o pollution
Natural events
o climatic
o seismic
o volcanic
14
Loss of essential services
o electrical power
o air conditioning
o telecommunication
Compromise of information
o eavesdropping,
o theft of media
o retrieval of discarded materials
Technical failures
o equipment
o software
o capacity saturation
Compromise of functions
o error in use
o abuse of rights
o denial of actions
Accidental
o equipment failure
o software failure
Environmental
o natural event
o loss of power supply
The risk management process help to create the organizational priorities and help
organization to identify risk appetite for them. Top level management is authorized to make
decisions about risk acceptance criteria.
Information security decisions should be managed by the top management. Only leadership
of the organization should be able to decide the risk acceptance criteria because they are the
stakeholders.
Risk assessment
Risk Mitigation
Risk assessment identifies, quantifies, and prioritizes risks against both criteria for risk
acceptance and intents related to the organization. The assessment will result into the proper
15
priorities of security risks and implementation of controls for securing those risks. The
assessment result into determining of appropriate management actions and priorities for
managing information security risks and for implementation of controls against them. The
assessment helps to identify the impact of the risk. It also helps to identify the amount of
resources needs to protect the assets. The scope of a risk assessment can be either whole
organization, parts of the organization, and individual information system, or even specific
system components or services. Performing risk assessment in a company infrastructure
includes vulnerability assessment to help quantify risks. This process of assessing risks and
helps to quantify them. This will also ensure that constantly evolving changes in security
requirements and/or significant changes are assessed. For example, IT will be implementing
new products or service each year and new additional risk may be introduced due to
vulnerabilities that can be exploited.
Monitor Mitigate
Identify Control
Risk
Asses Management Review
Once a risk assessment is finished, risk treatment/risk mitigation is the next step in the
process. For each of the risks identified during an assessment there should be a risk
mitigation needs to be made. Risk mitigation is a systematic methodology used by senior
management to reduce impact of the risk.
Risk mitigation can be completed through any of the following risk mitigation options:
Risk Assumption: To accept the potential risk and continue operating the IT system or
to implement controls to lower the risk to an acceptable level.
Risk Avoidance: To avoid the risk by eliminating the cause or root cause of the
system.
Risk Limitation: To avoid the risk by eliminating the risk cause and/or consequence
(e.g., for certain functions of the system or shut down the system when risks are
identified)
16
Once a risk assessment is finished, risk treatment/risk mitigation is the next step in the
process. For each of the risks identified during an assessment there should be a risk
mitigation needs to be made. Risk mitigation is a systematic methodology used by senior
management to reduce impact of the risk. Risk mitigation can be completed through any of
the following risk mitigation options:
Risk Assumption: To accept the potential risk and continue operating the IT system or
to implement controls to lower the risk to an acceptable level.
Risk Avoidance: To avoid the risk by eliminating the cause or root cause of the
system.
Risk Limitation: To avoid the risk by eliminating the risk cause and/or consequence
(e.g., for certain functions of the system or shut down the system when risks are
identified)
Risk Planning: To manage risk by developing risk mitigation plan that prioritizes,
implements, and maintains controls.
Risk Transfer: To transfer the risk by using other options to compensate for the loss,
such as purchasing insurance.
There are a variety of risk assessment tools and methodologies that can be used, but all are
basically divided into quantitative and qualitative risk assessments.
1. Single Loss Expectancy (SLE): What is the predictable loss from a single event?
Consider physical destruction or theft of assets, loss of data, stopped or delayed
processing, and interruption of business processes. Single-loss expectancy (SLE) is
the monetary value predictable from the occurrence of a risk on an asset.
SLE = Asset Value x Impact (percent of asset loss incurred after an event)
2. Annualized Rate of Occurrence (ARO): How many times is an event expected to
happen in a year?
For example, if insurance data suggests that a serious fire is likely to occur once in 25 years,
then the annualized rate of occurrence is 1/25 = 0.04.
3. Annual Loss Expectancy (ALO): The annualized loss expectancy (ALE) is the
product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE).
ALO = SLE * ARO.
17
2.4.1.1 Advantages of Quantitative Risk Assessments
Allows for a description and communication of consequences of event occurrence in
monetary terms.
It facilitates costs and benefits analysis for the selection of controls for the mitigation.
2.5 SUMMARY
1. Asset management is all about discovery, ownership, value, acceptable use,
protection, disposal of information related assets.
2. Information security vulnerabilities are weaknesses that expose an organization to
risk. A vulnerability is a weakness in a system that could allow an attacker to
compromise the security of the organization.
3. Threats can exploit the vulnerabilities to impact the performance of the systems. A
threat, in the context of information security, refers to anything that has the potential
to cause serious harm to a system.
18
4. Risk management is an activity to manage the assessment, mitigation and monitoring
of the risk in an organization
5. The risk management process help to create the organizational priorities and help
organization to identify risk appetite for them. Top level management is authorized to
make decisions about risk acceptance criteria.
6. Risk assessment identifies, quantifies, and prioritizes risks against both criteria for
risk acceptance and intents related to the organization.
7. Quantitative risk assessments attempt to allocate a monetary value to the assets being
measured, a monetary cost to the influence of an adverse event, and percentages to the
frequency of threats and the likelihood of events.
8. Qualitative risk assessments do not assign a financial value to the assets being
measured, or to the impact of an adverse event.
19
UNIT III: ORAGANIZATION SECURITY &
FRAMEWORKS
3.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
Information Security Frameworks
Types of framework and their advantage.
Organization structure, roles and responsibilities.
Overview of Policy, Procedures and Guidelines.
ISO/IEC 27000 series developed by ISO and IEC for the development and
management of ISMS.
20
Zachman framework is developed by ZohnZazhman for the development of enterprise
architectures.
TOGAF Model developed by the open group for the enterprise architectures
development.
MODAF Architecture framework used mainly in military support missions developed
by the British Ministry of Defense.
Corporate Governance
COSOis a set of internal corporate controls to help decrease the risk of financial fraud
developed by the Committee of Sponsoring Organizations (COSO) of the Treadway
Commission.
Process Management
ITIL Processes to permit for IT service management developed by the United
Kingdom‘s Office of Government Commerce.
Six Sigma Business management strategy that can be used to carry out process
improvement.
Capability Maturity Model Integration (CMMI) Organizational development for
process improvement developed by Carnegie Mellon.
Information Security Management System (ISMS) defines the control that need to be placed
(configuration management, physical security management, data protection, auditing etc.)
and explains how these should be treated during their whole lifecycle. ISMS provide a
complete picture of the security by aligning and placing controls strategically in the
organization. ISMS components should be integrated within the whole organization is should
not be practiced in certain departments of the organization.
21
ISO 27001:2013 has 14 domains and 114 controls. Refer to ISO 27001:2013 to understand
exactly the control structure. Due to intellectual property right we could list exact controls of
ISO 27001:2013 but control structure and their purposes are given below:
1. A.5 Information security policies – It defines the control on how policies are
documented and reviewed.
2. A.6 Organization of information security – It defines the control on the
responsibilities given to different individuals.
3. A.7 Human resources security – It defines the control before the employment,
during the employment and after employee left the organization.
4. A.8 Asset management – It defines the controls on information classification, media
handling and inventory of assets.
5. A.9 Access control – It defines controls on accessing user access management,
application, server and user responsibilities along with them.
6. A.10 Cryptography – It defines control related to encryption and decryption.
7. A.11 Physical and environmental security – It defines controls mentioning secure
areas, access control for entrance and exit, equipment security, protection against
threats, secure disposal, clear desk and clear screen.
8. A.12 Operational security– It defines controls related to change management,
capacity management, backup, logging, monitoring, installation, vulnerabilities etc.
9. A.13 Communications security– It defines control related to network security,
network services, transfer of information.
10. A.14 System acquisition, development and maintenance – It defines control for
mentioning security requirement and development and support process.
11. A.15 Supplier relationships – It defines control on agreements controls on what to
include in agreements, and how to monitor the suppliers
12. A.16 Information security incident management – It defines controls for reporting
incidents, defining weakness, response procedure and collection of evidence.
13. A.17 Information security aspects of business continuity management – It defines
the controls related to the plan of business continuity, procedures, verification and
reviewing.
14. A.18 Compliance – It defines controls requiring the identifying applicable laws and
regulation on intellectual property protection of personal data etc.
Documentation Standard used records and documentation There is no such distinction between control and
to cover all the requirements. records.
Document include policies, procedure and
guidelines.
Records include audit, schedules etc.
22
3.2.2.2 COSO
COBIT was derived from COSO framework which was developed by the Committee of
Sponsoring Organizations of the Treadway Commission (COSO). In 1985 to deal with
enterprise risk management, fraudulent activities, internal control and financial reporting. The
COSO internal control framework comprises of five interconnected components derived from
the way management manages a business. COSO assures that these components provide an
effective framework for describing and evaluating According to COSO, these components
provide an effective framework for describing and analyzing internal control system
integrated in an organization. The five components are the following:
1 Control environment: The control environment sets the tone of an organization,
influencing the control consciousness of its people. It is the foundation for all other
components of internal control, providing discipline and structure. Control
environment factors include the integrity, ethical values, management's operating
style, delegation of authority systems, as well as the processes for managing and
developing people in the organization.
2 Risk assessment: Every entity faces a variety of risks from external and internal
sources that must be assessed. A precondition to risk assessment is establishment of
objectives and thus risk assessment is the identification and analysis of relevant risks
to the achievement of assigned objectives. Risk assessment is a prerequisite for
determining how the risks should be managed.
3 Control activities: Control activities are the policies and procedures that help ensure
management directives are carried out. They help ensure that necessary actions are
taken to address the risks that may hinder the achievement of the entity's objectives.
Control activities occur throughout the organization, at all levels and in all functions.
They include a range of activities as diverse as approvals, authorizations,
verifications, reconciliations, reviews of operating performance, security of assets and
segregation of duties.
4 Information and communication: Information systems play a key role in internal
control systems as they produce reports, including operational, financial and
compliance-related information that make it possible to run and control the business.
In a broader sense, effective communication must ensure information flows down,
across and up the organization. For example, formalized procedures exist for people
to report suspected fraud. Effective communication should also be ensured with
external parties, such as customers, suppliers, regulators and shareholders about
related policy positions.
5 Monitoring: Internal control systems need to be monitored—a process that assesses
the quality of the system's performance over time. This is accomplished through
ongoing monitoring activities or separate evaluations. Internal control deficiencies
detected through these monitoring activities should be reported upstream and
corrective actions should be taken to ensure continuous improvement of the system.
23
Table 2: COSO framework
There are certain limitation as Framework recognize that as internal control provide
assurance of achieving the organizations objective, but limitation do exist as internal control
do not overcome bad judgments, external events etc. which can cause failing of achieving its
operational goal. Organization can face the failure from multiple factors:
Breakdown due to human failures.
Cases in which management override internal control.
External event beyond the organizations control.
Mistakes due to human intervention.
24
management support to be successful in the organization. IT Governance focuses majorly on
five areas given below:
1 Strategic alignment emphases on guaranteeing the linkage of business and IT plans;
describing, maintaining and validating the IT value; and aligning IT operations with
enterprise goals.
2 Value delivery is about accomplishing the value proposition throughout the delivery
cycle, confirming that IT delivers the promised benefits against the strategy, focused
on optimizing costs and proving the value of IT.
3 Resource management is about the optimum investment in, and the appropriate
management of, critical IT resources: applications, information, infrastructure and
people.
4 Risk management needs risk awareness by senior officers, a clear picture of the
enterprise‘s acceptance of the risk, understanding of compliance and technical
requirements.
5 Performance measurement monitors strategy implementation, project completion,
resource usage, process performance and service delivery, using balanced scorecards
that translate strategyinto action to achieve goals.
COBIT (Control objective for information and related technology) is a framework for
developing, implementing, monitoring and improving Information technology governance
and management practices. The COBIT framework is published by ISACA in 1996. The
framework support organization governance by aligning IT goals with business goals. It helps
enterprise to drive optimal value from IT by maintaining balance between resources use,
benefits and optimizing risk levels. Adoption of COBIT will allow the organization to
achieve the following goals:
Alignment of IT with the business goals.
Increased the importance of IT to business.
Risk reduction.
Continual improvement of IT.
Development of goals and scorecards for measurement of IT in a structured way.
COSO COBIT
COSO is a model for cooperate governance. COBIT is a model for IT governance.
COSO deals more at strategic level. COBIT focuses more at operational level.
25
3.3 POLICIES, STANDARDS, BASELINES, GUIDELINES AND
PROCEDURES
3.3.1 Security Policy
A Security policy is a statement given by the top management that reflects the role of security
in the organization. It can be organizational policy, issue related policy or specific system
related policy. Organization Security policy defines how the organization security program
will be executed, program goals, roles and responsibilities and outlines how enforcement
should be carried out. The organization security policy outlines how all security related
activities will be carried out in the organization.
Organization security policy should have several important characteristic that should be
understood and implemented:
• Policy should be aligned with the business objective, business should not be aligned
with the policy.
• It should be easily understood document that is used as a reference point for all
employee and management.
• It should be used to induce security into the business functions.
• It should be changed with any business function such as merger with the new
company, adoption of new technology or change of management/ownership.
• It should be tracked through version control.
• It should have clear and declarative statements.
• It should be reviewed on regular basis.
3.3.2Guidelines
Guidelines are recommended actions and operational instructions to users, IT staffs, where
specific standard does not apply. A guideline is used to determine the course of action
according to a set routine. Guidelines are the best practices used to achieve the goals
mentioned in the security policy.
3.3.3 Procedure
Procedure are detailed step-by-step that should be accomplished to reach a certain goal. This
apply to IT staff, Information security group members and others who need to carry out
specific tasks. Procedures are at the lower level where in the documentation series because
they are near to the computers and users. They provide detailed steps for configuration.
Procedure practically shows how policy, procedure and guidelines are actually implemented
in the practical scenario. If policy states that password should be alpha numeric then
procedure specifically explains how to configure the same on the systems.
3.4 SUMMARY
1. ISO 27001:2013 is a standard which explain the requirement to implement
Information Security Management System.
2. Information security framework is a collection of documented procedures that are
used to describe policies, procedures and guidelines around the implementation and
management of Information security controls as per the security requirements of the
enterprise requirements.
3. Frameworks are used to provide a structural approach to implement security in a
systematic approach.
4. IT governance is a management initiative to develop a structured framework which
allow organization to align the IT with the business goals while reducing risk and
improving continually.
5. COBIT is derived from the COSO framework
6. COSO deal with enterprise risk management, fraudulent activities, internal control
and financial reporting.
7. A Security policy is a statement given by the top management that reflects the role of
security in the organization. It can be organizational policy, issue related policy or
specific system related policy.
8. Procedure are detailed step-by-step that should be accomplished to reach a certain
goal. This apply to IT staff, Information security group members and others who need
to carry out specific tasks.
9. Guidelines are recommended actions and operational instructions to users, IT staffs,
where specific standard does not apply. A guideline is used to determine the course of
action according to a set routine.
27
10. The survival and integrity of any given network infrastructure of any company or
organization strongly depends on the application of computer forensics.
28
UNIT IV: INFORMATION SECURITY GOVERNANCE
To get an effective information security governance, board and senior members should have
clear picture of how to drive from organizations information security program. They should
know how to run the information security program, how to check the effectiveness of the
security program and how to decide the strategies of the effective information security
program.
29
3 Resource management by using information security knowledge andInfrastructure
proficiently and effectively.
4 Performance measurement by calculating, monitoring and reporting information security
governance metrics to ensure that organizational objectives are achieved.
5 Value delivery by optimizing information security investments in support of organizational
objectives
Information security covers all information processes, physical and electronic, regardless
whether they involve people and technology or relationships with trading partners, customers
and third parties.
30
4.4 LEGAL FRAMEWORKS
Legal issues are important to the companies because violation leads to damaging company‘s
reputation. Companies have lot of ethical and legal responsibilities and they are also liable to
protect their customer information. There are different legal compliances which are exercised
in different legal systems.
4.4.1 Sarbanes-Oxley Act (SOX)
The Sarbanes–Oxley Act of 2002, also known as the "Public Company Accounting Reform
and Investor Protection Act" and "Corporate and Auditing Accountability and Responsibility
Act" and more commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal
law that set new or expanded requirements for all U.S. public company boards, management
and public accounting firms. There are also a number of provisions of the Act that also apply
to privately held companies, for example the willful destruction of evidence to impede a
Federal investigation. SOX provides requirements for how companies must track, manage,
and report on financial information. This includes protection the data and guaranteeing its
integrity and authenticity. Most companies rely on computer equipment and electronic
storage for transacting and archiving data; therefore, processes and controls must be in-place
to protect the data. Failure to comply with the Sarbanes-Oxley Act can lead to stiff penalties
and potentially significant jail time for company executives, including the chief executive
officer (CEO), the chief financial officer (CFO), and others.
4.4.2 Health Insurance Portability and Accountability Act (HIPAA)
HIPPA (Health Insurance Portability and Accountability act of 1996) is United States
legislation that provide data privacy and security for protecting medical information. This
regulation provides a framework to ensure integrity, privacy and security when dealing with
confidential medical information. HIPAA defines how security should be achieved for any
facility that creates, accesses, shares or destroys medical information. Protected health
information (PHI) is any information about health status, provision of health care, or payment
for health care that can be linked to a specific individual. This is interpreted rather broadly
and includes any part of a patient's medical record or payment history. HIPAA mandates
steep federal penalties for noncompliance. If medical information is used in a way that
violates the privacy standards dictated by HIPAA, even by mistake, monetary penalties of
$100 per violation are enforced, up to $25,000 per year, per standard. If protected health
information is obtained or disclosed knowingly, the fines can be as much as $50,000 and one
year in prison. If the information is obtained or disclosed under false pretences, the cost can
go up to $250,000 with ten years in prison if there is intent to sell or use the information for
commercial advantage, personal gain, or malicious harm.
4.4.3 Gramm-Leach-Bliley Act of 1999 (GLBA)
The Gramm-Leach-Bliley Act of 1999 (GLBA) requires financial institutions to develop
privacy notices and give their customers the option to prohibit financial institutions from
sharing their information with non-affiliated third parties. The act dictates that the board of
directors is responsible for many of the security issues within a financial institution, that risk
management must be implemented, that all employees need to be trained on information
security issues, and that implemented security measures must be fully tested. It also requires
these institutions to have a written security policy in Place. Major components put into place
to govern the collection, disclosure, and protection Of consumers‘ non-public personal
information, or personally identifiable information.
It includes:
Financial Privacy Rule Provide each consumer with a privacy notice that explains the data
collected about the consumer, where that data are shared, how that data are used, and how that
data are protected. The notice must also identify the consumer‘s right to opt out of the data
31
being shared with unaffiliated parties pursuant to the provisions of the Fair Credit Reporting
Act. Safeguards Rule Develop a written information security plan that describes how
the company is prepared for, and plans to continue to protect clients‘ non-public
personal information.
Pretexting Protection Implement safeguards against pretexting (social engineering).
There are few other Legal frameworks are given below:
IT Act 2000( It act was ammendmant in year 2008)
Computer Fraud and Abuse Act
Federal Privacy Act of 1974
4.6 SUMMARY
1. Information security governance involves the advance, assessment and improvement
of risk policies and institutional risk management. Information security vulnerabilities
are weaknesses that expose an organization to risk.
32
3. The risk management process help to create the organizational priorities and help
organization to identify risk appetite for them. Top level management is authorized to
make decisions about risk acceptance criteria.
4. Information security standard provide the set of policies concerned with information security
management of IT. It is a methodical and organised method to managing information so that
it remains secure.
5. The Gramm-Leach-Bliley Act of 1999 (GLBA) requires financial institutions to
develop privacy notices and give their customers the option to prohibit financial
institutions from sharing their information with non-affiliated third parties.
6. HIPPA (Health Insurance Portability and Accountability act of 1996) is United States
legislation that provides data privacy and security for protecting medical information.
33
BLOCK II
34
UNIT I: SECURITY CONTROLS
1.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
1.2 INTRODUCTION
Securing the modern business network and IT infrastructure demands an end-to-end approach
and a firm grasp of vulnerabilities and associated protective measures. While such knowledge
cannot thwart all attempts at network incursion or system attack, it can empower network
engineers to eliminate certain general problems, greatly reduce potential damages, and
quickly detect breaches. With the ever-increasing number and complexity of attacks, vigilant
approaches to security in both large and small enterprises are a must. Prior to discussing
Procedural / People security controls we will start by defining security controls in general.
35
values, and competence of the entity‘s people; management‘s philosophy and operating style;
and the way management assigns authority and organizes and develops its people
The next step is to identify the potential ―threats‖. Threats can come from both internal and
external sources. They may be human based, automated or even non-intentional natural
phenomenon. The latter might more appropriately be categorized under system health threats
as opposed to security threats, but one issue can lead to the other. One example is a power
outage to a burglar alarm. The power outage could be intentional or through some natural
event such as a lightning strike. In either case security is diminished.
To help review or design security controls, they can be classified by several criteria, for
example according to the time that they act, relative to a security incident:
a. Preventive Controls are intended to prevent an incident from occurring i.e. these
controls are implemented before the event takes place. They exist to prevent the threat
from coming in contact with the weakness, e.g. by locking out unauthorized intruders.
b. Detective Controls are applied during the event and are intended to identify and
characterize an incident in progress. These exist to identify that the threat has landed
in our systems, e.g. by sounding the intruder alarm and alerting the security guards or
police.
c. Corrective Controls are executed after the event and are intended to limit the extent
of any damage caused by the incident. In other word they exist to mitigate or lessen
the effects of the threat being manifested, e.g. by recovering the organization to
normal working status as efficiently as possible.
Computer security is often divided into three distinct master categories, commonly referred to
as controls:
a. Physical
b. Technical
c. Administrative
36
These three broad categories define the main objectives of proper security implementation.
Within these controls are sub-categories that further detail the controls and how to implement
them.
i. Encryption
ii. Smart cards
iii. Network authentication
iv. User Access control
v. File integrity auditing software
37
physical access is possible. Fortunately there are all sorts of access control devices and secure
cabinets that can help with this problem.
A firewall is a mechanism by which a controlled barrier is used to control network traffic into
AND out of an organizational intranet. Firewalls are basically application specific routers.
They run on dedicated embedded systems such as an internet appliance or they can be
software programs running on a general server platform. In most cases these systems will
have two network interfaces, one for the external network such as the Internet and one for the
internal intranet side. The firewall process can tightly control what is allowed to traverse
from one side to the other. Firewalls can range from being fairly simple to very complex. As
with most aspects of security, deciding what type of firewall to use will depend upon factors
such as traffic levels, services needing protection and the complexity of rules required. The
greater the number of services that must be able to traverse the firewall the more complex the
requirement becomes. The difficulty for firewalls is distinguishing between legitimate and
illegitimate traffic.
What do firewalls protect against and what protection do they not provide? Firewalls are like
a lot of things; if configured correctly they can be a reasonable form of protection from
external threats including some denial of service (DOS) attacks. If not configured correctly
they can be major security holes in an organization. The most basic protection a firewall
provides is the ability to block network traffic to certain destinations. This includes both IP
addresses and particular network service ports. A site that wishes to provide external access
to a web server can restrict all traffic to port 80 (the standard http port). Usually this
restriction will only be applied for traffic originating from the un-trusted side. Traffic from
the trusted side is not restricted. All other traffic such as mail traffic, ftp, snmp, etc. would not
be allowed across the firewall and into the intranet.
An even simpler case is a firewall often used by people with home or small business cable or
DSL routers. Typically these firewalls are setup to restrict ALL external access and only
allow services originating from the inside. A careful reader might realize that in neither of
these cases is the firewall actually blocking all traffic from the outside. If that were the case
how could one surf the web and retrieve web pages? What the firewall is doing is restricting
connection requests from the outside. In the first case all connection requests from the inside
38
are passed to the outside as well as all subsequent data transfer on that connection. From the
exterior, only a connection request to the web server is allowed to complete and pass data, all
others are blocked. The second case is more stringent as connections can only be made from
the interior to the exterior.
More complex firewall rules can utilize what is called ―stateful inspection‖ techniques. This
approach adds to the basic port blocking approach by looking at traffic behaviours and
sequences to detect spoof attacks and denial of service attacks. The more complex the rules,
the greater the computing power of the firewall required.
One problem most organizations face is how to enable legitimate access to ―public‖ services
such as web, ftp and e-mail while maintaining tight security of the intranet. The typical
approach is to form what is known as a DMZ (demilitarized zone), a euphemism from the
cold war applied to the network. In this architecture there are two firewalls: one between the
external network and the DMZ, and another between the DMZ and the internal network. All
public servers are placed in the DMZ. With this setup, it is possible to have firewall rules
which allow public access to the public servers but the interior firewall can restrict all
incoming connections. By having the DMZ, the public servers are still provided more
protection than if they were just placed outside a single firewall site.
The section discusses the importance of selecting an access control model that fits with your
security needs to provide a lower total cost of ownership and enable strong identification. It
also discusses the various authentication solutions and weights their need to your
organization.
39
the specific business objectives they serve depend on the organization‘s need, culture, nature
of business, etc. We will discuss these models and examine their fitness with respect to an
organization‘s security policy and business goals.
The DAC model is flexible but complex. It creates a paradox in some complex situations. For
example, A is owner of resource R of organisation O and he has delegated permission P1 and
P2 to B who, in turn, has delegated permission P1 to C. Now, it A chooses to revoke
permission to B what will happen to the permission that B granted to C?
While the model above is complex, it is still flexible enough to handle various access control
needs, and therefore is used in various network management applications.
40
Figure 4: Mandatory Access Control
1.4.4 Authentication
Authentication or identification is the first step in any access solution. It is the process of
identifying the user to verify whether he/she is what he/she claims to be. Normally,
identification is done with the help of information that is known to everyone (i.e., user name
or user ID) and some personal information known only to the subject (i.e. password). Faced
with the threat of identity theft and increasing consequences associated with failing to secure
information, enterprises are increasingly looking for stronger forms of authentication to
enhance their overall security capabilities. At the same time, enterprises and governments
need to take into account other important considerations such as usability, total cost of
deployment and maintenance, and integration with existing security solution offerings.
Usernames and passwords are the most common authentication techniques. But most
organizations do not depend on user name authentication alone since username and
passwords are an authentication solution for low-value transactions and for accessing non-
sensitive information over the network. Also, experience has shown that usernames and
passwords provide relatively weak authentication because they can often be guessed or
stolen. They are often difficult to deploy because each application may implement its own
41
scheme, adding to both development cost and user complexity. Also, it is very difficult to
maintain and reset the password.. Determining the appropriate level of authentication that
meets your budget requirements is essential when implementing your secure identity
management solution. It is very crucial to identify the appropriate authentication technique
depending upon the nature of the business and sensitivity of the information. One has to
consider various authentication methods and their pros and cons. The means of
authentication are often discussed in terms of ―factors‖ of proof, such as:
A good authentication technique contains at least two of the above methods. In a client
server environment, strong authentication is a combination of server and client
authentication:
Server authentication is when the server proves its identity to the client.
Client authentications are when clients prove their identity to the server.
42
1.4.4.6 Biometrics
This is the strongest authentication. Known as third factor authentication, it is based on
something the user is. It works after the users have provided something the know (User name
password) and something they own (either a gird or token) or something they are (retina-
scan, thumbprint or thermal scan). It is required in cases where data is top confidential, such
as in Military/Defense.
43
1.4.6.1 Rule Based Access control
Rule based access control is based on rules defined on the object, as defined by the
administrator who decides on the operations that can be performed by subject. A rule can be
as simple as defining the day of the week on which the resource can be accessible.
A typical access control and authorization scenario includes three main entities - a subject, a
resource, and an action - - and their attributes. A subject makes a request for permission to
perform an action on a resource. For example, in the access request, ―Allow the Sys-admin to
create files in the root folder of the production server‖ the subject is the ―Sys-admin‖, the
target resource is the ―root folder of the production server‖, and the action is ―create files‖.
The single most important problem that SAML is trying to solve is the Web Browser single
sign-on (SSO) problem. Single sign-on solutions are abundant at the intranet level (using
cookies, for example) but extending these solutions beyond the intranet has been problematic
and has led to the proliferation of non-interoperable proprietary technologies. SAML has
become the definitive standard underlying many web single sign-on solutions in the
enterprise problem space.
44
The whole thrust of access control is to restrict unauthorized users from accessing
organization resources. The authentication techniques and access controls described in this
white paper can be chosen based on an organization‘s need. The authentication and access
control framework should be flexible enough to serve all the authentication techniques and
future evolution in the area such as Biometrics. The access control framework should be able
to handle an organization‘s authentication and authorization (access control) needs. Entrust
Get Access and Identify Guard is the products with such features.
The focus will be on uninformed users who can do harm to your network by visiting websites
infected with malware, responding to phishing e-mails, storing their login information in an
unsecured location, or even giving out sensitive information over the phone when exposed to
social engineering.
One of the best ways to make sure company employees will not make costly errors in regard
to information security is to institute company-wide security-awareness training initiatives
that include, but are not limited to classroom style training sessions, security awareness
website(s), helpful hints via e-mail, or even posters. These methods can help ensure
employees have a solid understanding of company security policy, procedure and best
practices. Some of the more important items to cover in your security awareness training are
your organization‘s security policy, data classification and handling, workspace and desktop
security, wireless networks, password security, phishing, hoaxes, malware, file sharing and
copyright.
―One in five workers (21%) let family and friends use company laptops and PCs to access the
Internet‖.
―More than half (51%) connect their own devices or gadgets to their work PC... a quarter of
who do so every day‖.
―One in ten confessed to downloading content at work they should not‖.
―Two thirds (62%) admitted they have a very limited knowledge of IT Security‖.
―More than half (51%) had no idea how to update the anti-virus protection on their company
PC‖.
―Five percent say they have accessed areas of their IT system they should not have‖.
45
Security awareness training can be performed in a variety of ways that can be utilized alone
or in conjunction with each other. Those mediums can consist of a more thorough classroom
style training, creation of a security-awareness website, pushing helpful hints onto computers
when they start up and/or e-mailing helpful hints on a weekly or monthly basis, and utilizing
visual aids like posters.
Some companies offer both live and web-based training and utilize a variety of methods such
as role-playing and simulation games so the interaction is more two-way than one-way. Other
companies offer videos, web-based training, and live trainers. The method you use is by no
means limited.
This type of training can vary in the amount of time it can take. The security awareness
training I have implemented at Washtenaw Community College takes about two hours, but it
has no real interactivity such as role-playing or simulations; just PowerPoint and Q&A.
Training time can depend on the effectiveness and the extent of the material discussed.
Training sessions could possibly take a full day if need be.
46
1.5.2.1 Visual Aids
Visual aids are another item that should not be used as the lone source of security awareness
training, but more as a supplement. The University of Michigan recently created a series of
catchy password security posters that compare passwords to underwear. One says to change
them often, another says to not leave passwords lying around, and another one says to not
share them with friends.
1.5.2.2 Promotions
Security tips can appear on flyers distributed across the user base and one could even go so
far as to hand out pencils and/or key chains with a catchy security-related phrase or reminder
(e.g. ―Unexpected attachments can mean unexpected chaos: Please do not open them‖). Now
that we have addressed possible methods in implementing security awareness training, what
should be covered in the training will be addressed.
Another item that could be addressed is to make sure users understand that it is important that
they shut down their computers at the end of the day. Sometimes this allows for valuable
updates to be applied and doing your own part for a greener environment. If somehow a
47
potential attacker gains access to a computer that is turned off, they will be less likely to
utilize it than one that is already turned on and unlocked.
Sharing passwords as well as leaving them out where anyone but the user could access them
should be strongly discouraged. Making this part of organization-wide policy could be very
helpful in this arena. If this is incorporated into policy, this should be addressed in the
training. Users need to be aware a policy is in place and general ―rules of thumb‖ to make
sure these policies are followed. Statistics could also be a good supplement. For example, a
delegated individual could go around to all of the offices and see if they can uncover any
unsecured passwords. They could even take this a step further and see how many computers
are left on as well as without password-protected screensavers. No specific individuals would
be singled out; just a number of instances out of the total number of computers would suffice.
Helpful hints and rules of thumb should also be a part of this section. For example, passwords
should not contain the username or any part of the user‘s full name. Passwords also should
not be based on personal information such as a spouse name, favourite team, or pet. Another
important point is to stress that the default password given to users should always be changed
immediately. Instructions on how to change passwords should also be included.
To round out the password security section, it can be very beneficial to define what
constitutes a poor choice of password as well as a listing of the most common passwords
used.
1.5.2.8 Phishing
When discussing phishing, the term as well as the purpose should always be defined.
Examples are key to this portion of security awareness training. Things to avoid (e.g. clicking
48
on links provided in e-mail, submitting banking and password information via email, etc.)
should be highly emphasized so people know what to look for. It could also be beneficial to
have users take a Phishing IQ Test. This way the bits and pieces that can identify a phishing
e-mail can be explained and displayed. Another item that should be addressed is how to
actually fight phishing attacks. A couple of web sites actually encourage the reporting and
tracking of phishing web sites and e-mails: PhishTank (www.phishtank.com) and The Anti-
Abuse Project (www.antiabuse.org), which address these issues.
1.5.2.9 Hoaxes
Hoaxes should be addressed in the training because a lot of time and resources can be spent
reading and forwarding hoax emails. The types of hoaxes as well as examples should be the
meat of this section. Using familiar hoaxes is the best option so it will be easier to grasp. It
could also be beneficial to compare hoaxes to viruses in that they are spread by continually
forwarding them. The dangers of hoaxes should also be addressed because some hoaxes warn
of a virus and tell users to delete valid and sometimes important system files.
Preventing the spread of hoaxes should also be covered. Hoaxes can be prevented by
checking a number of hoax sites on the Web and following a few rules of thumb. It is
important to point out that if something sounds too good to be true, it probably is and if
something seems suspicious it can be checked on one of the hoax sites
1.5.2.10 Malware
When addressing malware, it should always be defined and then broken down into its
categories: viruses, worms, Trojans, spyware, and adware. After each category is broken
down, address how they end up on systems.
1.5.2.11 Viruses
Start out by outlining what makes a virus a virus. It is important for users to be able to
identify a potential virus when they see one or to identify characteristics of a virus that has
already infiltrated the user‘s system. What a virus is capable of is also something that should
supplement the defining of what makes a virus what it is.
Defining what a virus is and how to identify one must be complemented with the important of
antivirus software. Most organizations will have this installed on all organization-wide
computers, but this might not be installed on laptops used by employees. Users also need to
learn the importance of not only performing regular scans of their computers, but also of any
file they download from a web site, e-mail, or thumb drive.
Another important tip to include is how vital it is to keep systems and applications up-to-date.
Never assume that a system or application is always going to update itself. Users should
proactively see if the systems and applications they are using need updated.
Finally, it is important to let users know what to do if their system does become infected.
Make sure not to incite a sense of panic that would steer employees toward hiding the
infection until it has gotten out of control or their machine is beyond repair. The main
49
procedure to address is what to do if and when a virus infects a work machine, since it would
differ considerably to what to do at home.
When your work machine becomes infected, do not do anything to the computer aside from
performing a scan with the anti-virus software on the machine. Phone the I.T. Department of
your business to come evaluate your machine and hopefully get rid of the virus.
If your machine at home (especially if you work from home) becomes infected, it is
important to follow the following steps outlined on Viruslist.com:
Do not panic
Disconnect from the Internet and any Local Area Network it may be connected to.
If computer cannot boot, try starting in Safe Mode or boot from the Windows boot
disk.
Back up any important data you cannot afford to lose to an external drive (scan the
file with your anti-virus software first) (floppy, CD, jump drive, etc).
If you do not have anti-virus software installed (which SHOULD not be the case),
install it and then update it.
Perform a full scan of your system.
1.5.2.12 Worms
The worms section can be handled much the same way the virus section is handled:
Definition, how to spot, what it is capable of, how to prevent, what to do if one invades the
system.
1.5.2.13 Trojans
Like the previous 2 sections, the Trojans portion should define what they are, what they can
do, what can be done to prevent them, and what to do in the event of one making it onto the
system. One item that should be emphasized is that Trojans are different from viruses and
why they are two different things.
1.6 SUMMARY
1. Security Controls are safeguards or countermeasures to avoid, detect, counteract, or
minimize security risks to physical property, information, computer systems, or other
assets.
2. All security systems rely on a set of measures employed to control access, verify
identity and protect disclosure of sensitive information.
3. The control environment sets the tone of an organization, influencing the control
consciousness of its people.
50
4. Control environment factors include the integrity, ethical values, and competence of
the entity‘s people; management‘s philosophy and operating style.
5. Controlling physical access to machines and network attach points is perhaps more
critical than any other aspect of security.
6. Besides the basic physical security of a site, the next most important aspect is
controlling digital access into and out of the organization‘s network.
7. Partitioning the boundary between the outside Internet and the internal intranet is a
critical security piece.
8. A firewall is a mechanism by which a controlled barrier is used to control network
traffic into and out of an organizational intranet.
9. The most basic protection a firewall provides is the ability to block network traffic to
certain destinations.
10. Authentication or identification is the first step in any access solution.
51
4. What are the three distinct master categories into which Computer security is
categorized?
5. What is a firewall?
6. What are stateful inspection techniques?
7. What is demilitarized zone in a network?
8. What is access control? Why access controls are required?
9. What are the different access control models?
10. What is access control framework?
11. Why training and awareness is an import aspect of security controls?
52
53
UNIT II: SECURITY CONTROL DESIGN
2.1 LEARNING OBJECTIVES
After going through this unit, you will be able to:
2.2 INTRODUCTION
Security controls are safeguards or countermeasures to avoid, detect, counteract, or
minimize security risks to physical property, information, computer systems, or other assets.
Controls help to reduce the risk of damage or loss by stopping, deterring, or slowing down an
attack against an asset. To help review or design security controls, they can be classified by
several criteria. The salient criteria are listed below:
a. Categorizing according to the time that they act, relative to a security incident.
i. Preventive controls are intended to prevent an incident from occurring e.g. by
locking out unauthorized intruders.
ii. Detective controls are intended to identify and characterize an incident in progress
e.g. by sounding the intruder alarm and alerting the security guards or police.
iii. Corrective controls are intended to limit the extent of any damage caused by the
incident e.g. by recovering the organization to normal working status as efficiently as
possible.
b. Security controls can also be categorized according to their nature.
i. Physical controls e.g. fences, doors, locks and fire extinguishers
ii. Procedural controls e.g. incident response processes, management oversight,
security awareness and training
iii. Technical controls e.g. user authentication (login) and logical access controls,
antivirus software, firewalls
iv. Legal and regulatory or compliance controls e.g. privacy laws, policies and clauses
In other words Security controls are technical or administrative safeguards to minimize loss
or unavailability due to threats acting on their matching vulnerability, i.e., security risk.
However, this unit restricts our scope to Technical Security Controls.
2.3.1.4 Passwords
Passwords are used to verify that the user of an ID is the owner of the ID. The ID-password
combination is unique to each user and therefore provides a means of holding users
accountable for their activity on the system. Fixed passwords that are used for a defined
period of time are often easy for hackers to compromise; therefore, great care must be
exercised to ensure that these passwords do not appear in any dictionary. Fixed passwords are
often used to control access to specific data bases. In this use, however, all persons who have
authorized access to the data base use the same password; therefore, no accountability can be
achieved. Currently, dynamic or one-time passwords, which are different for each log-on, are
preferred over fixed passwords. Dynamic passwords are created by a token that is
programmed to generate passwords randomly.
55
2.3.1.5 Smart Cards
Smart cards are usually about the size of a credit card and contain a chip with logic functions
and information that can be read at a remote terminal to identify a specific user‘s privileges.
Smart cards now carry prerecorded, usually encrypted access control information that is
compared with data that the user provides (e.g., a personal ID number or biometric data) to
verify authorization to access the computer or network.
2.3.1.6 Encryption
Encryption is defined as the transformation of plaintext (i.e., readable data) into ciphertext
(i.e., unreadable data) by cryptographic techniques. Encryption is currently considered to be
the only sure way of protecting data from disclosure during network transmissions.
Encryption can be implemented with either hardware or software. Software-based encryption
is the least expensive method and is suitable for applications involving low-volume
transmissions; the use of software for large volumes of data results in an unacceptable
increase in processing costs. Because there is no overhead associated with hardware
encryption, this method is preferred when large volumes of data are involved.
Currently, the best dial-up access controls use a microcomputer to intercept calls, verify the
identity of the caller (using a dynamic password mechanism), and switch the user to
authorized computing resources as requested. Previously, call-back systems intercepted dial-
up callers, verified their authorization and called them back at their registered number, which
at first proved effective; however, sophisticated hackers have learned how to defeat this
control using call-forwarding techniques.
56
2.3.2.2 Intrusion Detection Systems
These expert systems track users (on the basis of their personal profiles) while they are using
the system to determine whether their current activities are consistent with an established
norm. If not, the user‘s session can be terminated or a security officer can be called to
investigate. Intrusion detection can be especially effective in cases in which intruders are
pretending to be authorized users or when authorized users are involved in unauthorized
activities.
2.3.3.1 OS Upgrade
Keep any and all original software media from which to restore the system. The latest
upgrades of operating system should be maintained for system integrity.
In trying to find the best protection for your computer, there are several factors that you need
to consider. For instance, what kind of data do you store in your computer? And what's the
scope of this data? We need to understand that individuals with malicious intent usually make
use of different types of attacks when sabotaging different types of data. Consequently, the
methodology to be chosen should have the capability to protect whatever type of data you
store in your computer. Fortunately, there's no shortage of software companies that focus on
57
developing security programs. These defence systems are also constantly updated to ensure
that they can hinder new threats.
Here are some practical tips on how you can efficiently prevent malicious code from
wreaking havoc to your computer data.
a. Choose reliable anti-virus programs
b. Install real-time anti-spyware protection
c. Keep anti-malware applications current
d. Disable auto-run
e. Perform daily scans
f. Block suspicious files sent to your organization via email
g. Surf smart
h. Use a hardware-based firewall
i. Deploy DNS protection
Discussing each of the methods we can be more aware of the attacks and the mitigating
techniques that can be adopted for the safety of our systems.
1. Choose reliable anti-virus programs: Many computer users believe free antivirus
applications, such as those included with an Internet service provider's bundled
service offering, are sufficient to protect a computer from virus or spyware infection.
However, such free anti-malware programs typically don't provide adequate
protection from the ever-growing list of threats. Instead, all users should install
professional, business-grade antivirus software on their PCs. Pro-grade antivirus
programs update more frequently throughout the day (thereby providing timely
protection against fast-emerging vulnerabilities), protect against a wider range of
threats (such as rootkits), and enable additional protective features (such as custom
scans).
2. Install real-time anti-spyware protection: Many computer users mistakenly believe
that a single antivirus program with integrated spyware protection provides sufficient
safeguards from adware and spyware. Others think free anti-spyware applications,
combined with an antivirus utility, deliver capable protection from the skyrocketing
number of spyware threats. Unfortunately, that's just not the case. Most free anti-
spyware programs do not provide real-time, or active, protection from adware, Trojan,
and other spyware infections. While many free programs can detect spyware threats
once they've infected a system, typically professional (or fully paid and licensed) anti-
spyware programs are required to prevent infections and fully remove those infections
already present.
3. Keep anti-malware applications current: Antivirus and anti-spyware programs
require regular signature and database updates. Without these critical updates, anti-
malware programs are unable to protect systems from the latest threats. Statistics
reveal that a lot of serious computer threats are secretive and fast-moving. Many of
these infections are short-lived, but they're estimated to infect as many as 100,000 to
300,000 new Web sites a day. Computer users must keep their antivirus and anti-
spyware applications up to date. All users must take measures to prevent license
58
expiration, thereby ensuring that their anti-malware programs stay current and
continue providing protection against the most recent threats.
4. Perform daily scans: Occasionally, virus and spyware threats escape a system's active
protective engines and infect a system. The sheer number and volume of potential and
new threats make it inevitable that particularly inventive infections will outsmart
security software. In other cases, users may inadvertently instruct anti-malware
software to allow a virus or spyware program to run. Regardless of the infection
source, enabling complete, daily scans of a system's entire hard drive adds another
layer of protection. These daily scans can be invaluable in detecting, isolating, and
removing infections that initially escape security software's attention.
5. Disable auto run: Many viruses work by attaching themselves to a drive and
automatically installing themselves on any other media connected to the system. As a
result, connecting any network drives, external hard disks, or even thumb drives to a
system can result in the automatic propagation of such threats. Computer users can
disable the autorun feature by following the providers recommendations, which differ
by operating system.
6. Block suspicious files sent to your organization via email: It's a mantra most users
have heard repeatedly: Don't click on email links or attachments. Yet users frequently
fail to heed the warning. Whether distracted, trustful of friends or colleagues they
know, or simply fooled by a crafty email message, many users forget to be wary of
links and attachments included within email messages, regardless of the source.
Simply clicking on an email link or attachment can, within minutes, corrupt
Windows, infect other machines, and destroy critical data. Users should never click
on email attachments without at least first scanning them for viruses using a business-
class anti-malware application. As for clicking on links, users should access Web sites
by opening a browser and manually navigating to the sites in question.
7. Surf smart: Many business-class anti-malware applications include browser plug-ins
that help protect against drive-by infections, phishing attacks (in which pages purport
to serve one function when in fact they try to steal personal, financial, or other
sensitive information), and similar exploits. Still others provide "link protection," in
which Web links are checked against databases of known-bad pages. Whenever
possible, these preventive features should be deployed and enabled. Unless the plug-
ins interferes with normal Web browsing, users should leave them enabled. The same
is true for automatic pop-up blockers, included in browser toolbars. Regardless, users
should never enter user account, personal, financial, or other sensitive information on
any Web page at which they haven't manually arrived. They should instead open a
Web browser, enter the address of the page they need to reach, and enter their
information that way, instead of clicking on a hyperlink and assuming the link has
directed them to the proper URL. Hyperlinks contained within an e-mail message
often redirect users to fraudulent, fake, or unauthorized Web sites. By entering Web
addresses manually, users can help ensure that they arrive at the actual page they
intend which is also not fool proof.
8. Use a hardware-based firewall: Technology professionals and others argue the
benefits of software- versus hardware-based firewalls. Often, users encounter trouble
59
trying to share printers, access network resources, and perform other tasks when
deploying third-party software-based firewalls. As a result, users in many cases
simply disable firewalls altogether. But a reliable firewall is indispensable, as it
protects computers from a wide variety of exploits, malicious network traffic, viruses,
worms, and other vulnerabilities. Unfortunately, by itself, the software-based firewall
included with operating system isn't sufficient to protect systems from the myriad
robotic attacks affecting all Internet-connected systems. For this reason, all systems
connected to the Internet should be secured behind a capable hardware-based firewall.
9. Deploy DNS protection: Internet access introduces a wide variety of security risks.
Among the most disconcerting may be drive-by infections, in which users only need
to visit a compromised Web page to infect their own PCs (and potentially begin
infecting those of customers, colleagues, and other staff). Another worry is Web sites
that distribute infected programs, applications, and Trojan files. Still another threat
exists in the form of poisoned DNS attacks, whereby a compromised DNS server
directs you to an unauthorized Web server. These compromised DNS servers are
typically your ISP's systems. Users can protect themselves from all these threats by
changing the way their computers process DNS services. While a computer
professional may be required to implement the switch, OpenDNS offers free DNS
services to protect users against common phishing, spyware, and other Web-based
hazards.
a. Delivery: The data should be delivered to the correct destination and correct user.
60
b. Accuracy: The communication system should deliver the data accurately, without
introducing any errors. The data may get corrupted during transmission affecting the
accuracy of the delivered data.
c. Timeliness: Audio and Video data has to be delivered in a timely manner without any
delay; such a data delivery is called real time transmission of data.
d. Jitter: It is the variation in the packet arrival time. Uneven Jitter may affect the
timeliness of data being transmitted.
a. Text: Text includes combination of alphabets in small case as well as upper case. It is
stored as a pattern of bits. Prevalent encoding system: ASCII, Unicode etc.
b. Numbers: Numbers include combination of digits from 0 to 9. It is stored as a pattern
of bits. Prevalent encoding system: ASCII, Unicode etc.
c. Images: In computers images are digitally stored. A Pixel is the smallest element of
an image. To put it in simple terms, a picture or image is a matrix of pixel elements.
The pixels are represented in the form of bits. Depending upon the type of image
(black n white or color) each pixel would require different number of bits to represent
the value of a pixel. The size of an image depends upon the number of pixels (also
called resolution) and the bit pattern used to indicate the value of each pixel.
Commonly used Image formats: jpg, png, bmp, etc.
d. Audio Data: Audio Data can also be in the form of sound which can be recorded and
broadcasted. Example: What we hear on the radio is a source of data or information.
Audio data is continuous, not discrete. Commonly used audio formats: mp3 etc.
e. Video: Video refers to broadcasting of data in form of picture or movie. Commonly
used audio formats: mp4, mkv etc.
61
2.5.5 Data Flow
Devices on a network communicate with each other by sending and receiving data. The data
can flow between the two devices in the following ways.
a. Simplex
b. Half Duplex
c. Full Duplex
2.5.5.1 Simplex
In Simplex, communication is unidirectional only one of the devices sends the data and the
other one only receives the data. Example: a CPU sends data while a monitor only receives
data.
a. Local Area Network (LAN) is usually limited to a few kilometers of area. It may be
privately owned and could be a network inside an office on one of the floor of a
building or a LAN could be a network consisting of the computers in an entire
building.
b. Wide Area Network (WAN) is made of all the networks in a (geographically) large
area. The network in an entire state could be termed as a WAN.
c. Metropolitan Area Network (MAN) is of size between LAN & WAN. It is larger
than LAN but smaller than WAN. It may comprise the entire network in a city.
62
2.6.2 Protocol
A Protocol is one of the components of a data communications system which specifies the
rules for communication between two or more parties. Without protocol communication
cannot occur. The sending device cannot just send the data and expect the receiving device to
receive and further interpret it correctly. When the sender sends a message it may consist of
text, number, images, etc. which are converted into bits and grouped into blocks to be
transmitted and often certain additional information called control information is also added
to help the receiver interpret the data. For successful communication to occur, the sender and
receiver must agree upon certain rules called protocol. A Protocol is defined as a set of rules
that governs data communications. A protocol defines what is to be communicated, how it is
to be communicated and when it is to be communicated.
a. Syntax: It means the structure or format of the data. It is the arrangement of data in a
particular order.
b. Semantics: It tells the meaning of each section of bits and indicates the interpretation
of each section. It also tells what action/decision is to be taken based on the
interpretation.
c. Timing: It tells the sender about the readiness of the receiver to receive the data and
also intimates the sender at what rate the data should be sent to the receiver to avoid
overwhelming the receiver.
63
The idea of cloud computing is based on a very fundamental principal of „reusability of IT
capabilities'. The difference that cloud computing brings compared to traditional concepts of
―grid computing‖, ―distributed computing‖, ―utility computing‖, or ―autonomic computing‖
is to broaden horizons across organizational boundaries.
2.7.1 Cloud Computing Models
Cloud Providers offer services that can be grouped into three categories viz.
a. Software as a Service (SaaS): In this model, a complete application is offered to the
customer, as a service on demand. A single instance of the service runs on the cloud
& multiple end users are serviced. On the customers‟ side, there is no need for
upfront investment in servers or software licenses, while for the provider, the costs are
lowered, since only a single application needs to be hosted & maintained. Today SaaS
is offered by companies such as Google, Salesforce, Microsoft, Zoho, etc.
b. Platform as a Service (Paas): Here, a layer of software, or development environment
is encapsulated & offered as a service, upon which other higher levels of service can
be built. The customer has the freedom to build his own applications, which run on
the provider‘s infrastructure. To meet manageability and scalability requirements of
the applications, PaaS providers offer a predefined combination of OS and application
servers, such as LAMP platform (Linux, Apache, MySql and PHP), restricted J2EE,
Ruby etc. Google‟s App Engine, Force.com, etc are some of the popular PaaS
examples.
c. Infrastructure as a Service (Iaas): IaaS provides basic storage and computing
capabilities as standardized services over the network. Servers, storage systems,
networking equipment, data centre space etc. are pooled and made available to handle
workloads. The customer would typically deploy his own software on the
infrastructure. Some common examples are Amazon, GoGrid, 3 Tera, etc.
2.7.2 Understanding Public and Private Clouds
Enterprises can choose to deploy applications on Public, Private or Hybrid clouds. Cloud
Integrators can play a vital part in determining the right cloud path for each organization.
2.7.2.1 Public Cloud
Public clouds are owned and operated by third parties; they deliver superior economies of
scale to customers, as the infrastructure costs are spread among a mix of users, giving each
individual client an attractive low-cost, ―Pay-as-you-go‖ model. All customers share the same
infrastructure pool with limited configuration, security protections, and availability variances.
These are managed and supported by the cloud provider. One of the advantages of a Public
cloud is that they may be larger than an enterprises cloud, thus providing the ability to scale
seamlessly, on demand.
2.7.2.2 Private Cloud
Private clouds are built exclusively for a single enterprise. They aim to address concerns on
data security and offer greater control, which is typically lacking in a public cloud. There are
two variations to a private cloud: - On-premise Private Cloud: On-premise private clouds,
also known as internal clouds are hosted within one‘s own data center. This model provides a
more standardized process and protection, but is limited in aspects of size and scalability. IT
departments would also need to incur the capital and operational costs for the physical
64
resources. This is best suited for applications which require complete control and
configurability of the infrastructure and security. - Externally hosted Private Cloud: This type
of private cloud is hosted externally with a cloud provider, where the provider facilitates an
exclusive cloud environment with full guarantee of privacy. This is best suited for enterprises
that don‘t prefer a public cloud due to sharing of physical resources.
2.7.2.3 Hybrid Cloud
Hybrid Clouds combine both public and private cloud models. With a Hybrid Cloud, service
providers can utilize 3rd party Cloud Providers in a full or partial manner thus increasing the
flexibility of computing. The Hybrid cloud environment is capable of providing on-demand,
externally provisioned scale. The ability to augment a private cloud with the resources of a
public cloud can be used to manage any unexpected surges in workload.
2.7.3 Cloud Computing Benefits
Enterprises would need to align their applications, so as to exploit the architecture models
that Cloud Computing offers. Some of the typical benefits are listed below:
a. Reduced Cost: There are a number of reasons to attribute Cloud technology with
lower costs. The billing model is pay as per usage; the infrastructure is not purchased
thus lowering maintenance. Initial expense and recurring expenses are much lower
than traditional computing.
b. Increased Storage: With the massive Infrastructure that is offered by Cloud
providers today, storage & maintenance of large volumes of data is a reality. Sudden
workload spikes are also managed effectively & efficiently, since the cloud can scale
dynamically.
c. Flexibility: This is an extremely important characteristic. With enterprises having to
adapt, even more rapidly, to changing business conditions, speed to deliver is critical.
Cloud computing stresses on getting applications to market very quickly, by using the
most appropriate building blocks necessary for deployment.
2.7.4 Cloud Computing Challenges
Despite its growing influence, concerns regarding cloud computing still remain. In our
opinion, the benefits outweigh the drawbacks and the model is worth exploring. Some
common challenges are:
a. Data Protection: Data Security is a crucial element that warrants scrutiny.
Enterprises are reluctant to buy an assurance of business data security from vendors.
They fear losing data to competition and the data confidentiality of consumers. In
many instances, the actual storage location is not disclosed, adding onto the security
concerns of enterprises. In the existing models, firewalls across data centres (owned
by enterprises) protect this sensitive information. In the cloud model, Service
providers are responsible for maintaining data security and enterprises would have to
rely on them.
b. Data Recovery and Availability: All business applications have Service level
agreements that are stringently followed. Operational teams play a key role in
management of service level agreements and runtime governance of applications. In
production environments, operational teams support.
i. Appropriate clustering and Fail over
65
ii. Data Replication
iii. System monitoring (Transactions monitoring, logs monitoring and others)
iv. Maintenance (Runtime Governance)
v. Disaster recovery
vi. Capacity and performance management
If, any of the above mentioned services is under-served by a cloud provider, the
damage & impact could be severe.
c. Management Capabilities: Despite there being multiple cloud providers, the
management of platform and infrastructure is still in its infancy. Features like „Auto-
scaling‟ for example, are a crucial requirement for many enterprises. There is huge
potential to improve on the scalability and load balancing features provided today.
d. Regulatory and Compliance Restrictions: In some of the European countries,
Government regulations do not allow customer's personal information and other
sensitive information to be physically located outside the state or country. In order to
meet such requirements, cloud providers need to setup a data center or a storage site
exclusively within the country to comply with regulations. Having such an
infrastructure may not always be feasible and is a big challenge for cloud providers.
With cloud computing, the action moves to the interface — that is, to the interface between
service suppliers and multiple groups of service consumers. Cloud services will demand
expertise in distributed services, procurement, risk assessment and service negotiation —
areas that many enterprises are only modestly equipped to handle.
2.7.5 IT Infrastructure
IT infrastructure refers to the composite hardware, software, network resources and services
required for the existence, operation and management of an enterprise IT environment. It
allows an organization to deliver IT solutions and services to its employees, partners and/or
customers and is usually internal to an organization and deployed within owned facilities. In
other words, IT infrastructure consists of all components that somehow play a role in overall
IT and IT-enabled operations. It can be used for internal business operations or developing
customer IT or business solutions. Typically, a standard IT infrastructure consists of the
following components:
a. Hardware: Servers, computers, data centres, switches, hubs and routers, etc.
b. Software: Enterprise resource planning (ERP), customer relationship management
(CRM), productivity applications and more.
c. Network: Network enablement, Internet connectivity, firewall and security.
d. Meatware: Human users, such as network administrators (NA), developers, designers
and generic end users with access to any IT appliance or service are also part of an IT
infrastructure, specifically with the advent of user-centric IT service development.
2.8 SUMMARY
1. Security controls are safeguards or countermeasures to avoid, detect, counteract, or
minimize security risks to physical property, information, computer systems, or other
assets.
66
2. Technical security involves the use of safeguards incorporated in computer hardware,
operations or applications software, communications hardware and software, and
related devices.
3. The purpose of access control software is to control sharing of data and programs
between users.
4. After access to the system has been granted, the next step is to control access to the
data and programs residing in the system.
5. Passwords are used to verify that the user of an ID is the owner of the ID.
6. Dial-up access to a computer system increases the risk of intrusion by hackers.
7. In networks that contain personal computers or are connected to other networks, it is
difficult to determine whether dial-up access is available or not because of the ease
with which a modem can be added to a personal computer to turn it into a dial-up
access point.
8. An audit trail is a record of system activities that enables the reconstruction and
examination of the sequence of events of a transaction, from its inception to output of
final results.
9. Although the technology behind the development of protection methods continues to
improve in leaps and bounds, the threats against computers and the data, they contain,
still remain.
10. The word data refers to any information which is presented in a form that is agreed
and accepted upon is creators and users.
11. Data Communication is a process of exchanging data or information In case of
computer networks this exchange is done between two devices over a transmission
medium.
12. IT infrastructure refers to the composite hardware, software, network resources and
services required for the existence, operation and management of an enterprise IT
environment.
67
8. Currently, the best dial-up access controls use a ___________ to intercept calls, verify
the identity of the caller (using a dynamic password mechanism), and switch the user
to authorized computing resources as requested.
9. _____________ technical controls warn personnel of violations or attempted
violations of preventive technical controls.
10. __________ reports should be frequently and regularly reviewed by security officers
and data base owners to identify and investigate successful or unsuccessful
unauthorized accesses.
11. ____________ controls exist to mitigate or lessen the effects of the threat being
manifested.
12. A computer _________ can be defined as a collection of nodes which is used for data
communications.
13. ____________ is a computing paradigm, where a large pool of systems are connected
in private or public networks, to provide dynamically scalable infrastructure for
application, data and file storage.
14. In ____________ model, a complete application is offered to the customer, as a
service on demand.
68
8. What is the difference between data and information? Explain with the help of an
example.
9. What is data communication? What are its characteristics?
10. What is the difference between simplex, half duplex and full duplex communication?
11. What is a protocol? What are its elements?
69
UNIT III: SOFTWARE DEVELOPMENT LIFE CYCLE
(SDLC)
3.2 INTRODUCTION
We will initially start by briefly studying the concept of Software Development Life Cycle
(SDLC). SDLC is a process used by the industry to design, develop and test high quality
software. The process of SDLC aims to produce high quality software that meets or exceeds
customer experience and expectations while meeting the financial and time constraints. This
is also known as the Software Development Process for which tasks are pre – defined in the
Software Development Life Cycle (SDLC). ISO/IEC 12207 is the international standard for
software lifecycle processes. It aims to be the standard that defines all the tasks required for
developing and maintaining software.
70
3.3.2 Stages in SDLC
The various steps of Software Development Life Cycle are briefly described below:
1. Stage 1: Planning and Requirement Analysis: The most important and fundamental
stage in SDLC is Planning, which may also be referred to as Requirement Analysis. It
is performed by a team, generally having adequate seniority and experience, with
inputs from the customer, the sales department, market surveys and domain experts in
the industry. This information is then used to plan the basic project approach and to
conduct product feasibility study in the operational, technical and economical areas.
Planning for the quality assurance requirements and identification of the risks
associated with the project is also done in the planning stage. The outcome of the
technical feasibility study is to define the various technical approaches that can be
followed to implement the project successfully with minimum risks.
2. Stage 2: Defining Requirements: After the requirement analysis, the next step is to
clearly define and document the product requirements. This documentation is then
discussed with and is approved after incorporation of suggestions/variations by the
customer/analyst. This is done through SRS – Software Requirement Specification
document which consists of all the product requirements to be designed and
developed during the project life cycle.
3. Stage 3: Designing the product architecture: Software Requirement Specification
(SRS) document forms the basis for best product architecture of the product to be
developed. Based on the requirements specified in SRS, usually more than one design
approach for the product architecture is proposed and documented in Detailed Design
Document which may also be referred to as a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various
parameters as risk assessment, product robustness, design modularity , budget and
time constraints , the best design approach is selected for the product. A design
approach clearly defines all the architectural modules of the product along with its
communication and data flow representation with the external and third party modules
if any. The internal design of all the modules of the proposed architecture should be
clearly defined with the minutest of the details in DDS.
4. Stage 4: Building or Developing the Product: During this stage of SDLC the actual
development starts based on the DDS and the process for building of the product is
initiated. The programming code is written as per DDS during this stage. If the
designing is accomplished in a detailed and structured manner, error free code
generation can be achieved within short time frames. Developers have to follow the
coding guidelines defined by their organization and programming tools like
compilers, interpreters, debuggers etc. are used to generate the code. Different high
level programming languages such as C, C++, Pascal, Java, and PHP are used for
coding. The programming language is chosen with respect to the type of software
being developed.
5. Stage 5: Testing the Product: This stage is usually a subset of all the stages as in the
modern SDLC models, the testing activities are mostly involved in all the stages of
SDLC. However this stage refers to the testing only stage of the product where
71
products defects are reported, tracked, fixed and retested, until the product reaches the
quality standards defined in the SRS.
6. Stage 6: Deployment in the Market and Maintenance: After the product is tested
and ready it is released formally deployed in the appropriate market based on the
Business strategy of the organization. The product at this stage may be subjected to
Site Acceptance Trials (SAT) in a limited segment and later, tested in the real
business environment with the User testing the product in the real world scenario.
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the
market, its maintenance is done for the existing customer base.
72
neither overlap nor are retractable. In Waterfall model the outcome of one phase acts as the
input for the next phase sequentially.
73
All these phases are cascaded to each other in which progress is seen as flowing steadily
downwards like a waterfall through the phases. The next phase is started only after the
defined set of goals are achieved for previous phase and it is signed off, so the name
"Waterfall Model". In this model phases do not overlap.
3.5.3 Application
Every software developed is different and requires a suitable SDLC approach to be followed
based on the internal and external factors. Some situations where the use of Waterfall model
is most appropriate are:
74
Figure 7: Iterative Model
In incremental model the whole requirement is divided into various builds. During each
iteration, the development module goes through the requirements, design, implementation
and testing phases. Each subsequent release of the module adds function to the previous
release. The process continues till the complete system is ready as per the requirement.
The key to successful use of an iterative software development lifecycle is rigorous validation
of requirements, and verification & testing of each version of the software against those
requirements within each cycle of the model. As the software evolves through successive
cycles, tests have to be repeated and extended to verify each version of the software.
3.6.2 Application
Like other SDLC models, Iterative and incremental development has some specific
applications in the software industry. This model is most often used in the following
scenarios:
a. Requirements of the complete system are clearly defined and understood.
b. Major requirements must be defined; however, some functionalities or requested
enhancements may evolve with time.
c. There is a time to the market constraint.
d. A new technology is being used and is being learnt by the development team while
working on the project.
e. Resources with needed skill set are not available and are planned to be used on
contract basis for specific iterations.
f. There are some high risk features and goals which may change in the future.
75
3.6.3 Advantages and Disadvantages of Iterative Model
3.6.3.1 Advantages
The advantage of this model is that there is a working model of the system at a very early
stage of development which makes it easier to find functional or design flaws. Finding issues
at an early stage of development enables to take corrective measures in a limited budget.
3.6.3.2 Disadvantages
The disadvantage with this SDLC model is that it is applicable only to large and bulky
software development projects. This is because it is hard to break a small software system
into further small serviceable increments/modules.
Spiral model is a combination of iterative development process model and sequential linear
development model i.e. waterfall model with very high emphasis on risk analysis. It allows
for incremental releases of the product, or incremental refinement through each iteration
around the spiral.
3.7.1 Spiral Model design
The spiral model has four distinct phases. A software project repeatedly passes through these
phases in iterations called Spirals.
1. Planning (Determine Objectives): This phase starts with gathering and analyzing the
business requirements in the baseline spiral. In the subsequent spirals as the product
76
matures, identification of system requirements, subsystem requirements and unit
requirements are all done in this phase.
This also includes understanding the system requirements by continuous
communication between the customer and the system analyst. At the end of the spiral
the product is deployed in the identified market.
2. Design: Design phase starts with the conceptual design in the baseline spiral and
involves architectural design, logical design of modules, physical product design,
which may be referred to as a prototype, and final design in the subsequent spirals.
3. Construct or Build: Construct phase refers to production of the actual software
product at every spiral. In the baseline spiral when the product is just thought of and
the design is being developed a Proof of Concept (POC) is developed in this phase to
get customer feedback. Then in the subsequent spirals with higher clarity on
requirements and design details a working model of the software called build is
produced with a version number. These builds are sent to customer for feedback.
4. Evaluation and Risk Analysis: Risk Analysis includes identifying, estimating, and
monitoring technical feasibility and management risks, such as schedule slippage and
cost overrun. After testing the build, at the end of first iteration, the customer
evaluates the software and provides feedback.
3.7.2 Application
Spiral Model is very widely used in the software industry as it is in sync with the natural
development process of any product i.e. learning with maturity and also involves minimum
risk for the customer as well as the development firms. Following are the typical uses of
Spiral model:
a. When there is a budget constraint and risk evaluation is important.
b. For medium to high-risk projects.
c. Long-term project commitment because of potential changes to economic
priorities as the requirements change with time.
d. Customer is not sure of their requirement which is usually the case.
e. Requirements are complex and need evaluation to get clarity.
f. New product line which is released in phases to get enough customer
feedback.
g. Significant changes are expected in the product during the development cycle.
3.7.3 Advantages and Disadvantages of Spiral Model
3.7.3.1 Advantages
The advantage of spiral lifecycle model is that it allows for elements of the product to be
added in when they become available or known. This assures that there is no conflict with
previous requirements and design. This method is consistent with approaches that have
multiple software builds and releases and allows for making an orderly transition to a
maintenance activity. Another positive aspect is that the spiral model forces early user
involvement in the system development effort.
77
3.7.3.2 Disadvantages
On the other side, it takes very strict management to complete such products and there is a
risk of running the spiral in indefinite loop. So the discipline of change and the extent of
taking change requests is very important to develop and deploy the product successfully.
3.8 V – MODEL
The V - model is SDLC model where execution of processes happens in a sequential manner
in V shape. It is also known as Verification and Validation model. V - Model is an extension
of the waterfall model and is based on association of a testing phase for each corresponding
development stage. This means that for every single phase in the development cycle there is a
directly associated testing phase. This is a highly disciplined model and next phase starts only
after completion of the previous phase.
3.8.1 V- Model design
Under V-Model, the corresponding testing phase of the development phase is planned in
parallel. So there are Verification phases on one side of the V and Validation phases on the
other side (Please see Figure 5 below). Coding phase joins the two sides of the V-Model.
V
V A
E LI
RI D
FI A
C TI
A O
TI Figure 9:V Model N
O
N Phases
3.8.2 Verification
Following are the Verification phases in V-Model:
1. Business Requirement Analysis: This is the first phase in the development cycle
where the product requirements are understood from the customer perspective. This
phase involves detailed communication with the customer to understand his
expectations and exact requirement. This is a very important activity and need to be
78
managed well, as most of the customers are not sure about what exactly they need.
The acceptance test design planning is done at this stage as business requirements can
be used as an input for acceptance testing.
2. System Design: Once you have the clear and detailed product requirements, it‘s time
to design the complete system. System design would comprise of understanding and
detailing the complete hardware and communication setup for the product under
development. System test plan is developed based on the system design. Doing this at
an earlier stage leaves more time for actual test execution later.
3. Architectural Design: Architectural specifications are understood and designed in
this phase. Usually more than one technical approach is proposed and based on the
technical and financial feasibility the final decision is taken. System design is broken
down further into modules taking up different functionality. This is also referred to as
High Level Design (HLD). The data transfer and communication between the internal
modules and with the other systems is clearly understood and defined in this stage.
With this information, integration tests can be designed and documented during this
stage.
4. Module Design: In this phase the detailed internal design for all the system modules
is specified, referred to as Low Level Design (LLD). It is important that the design is
compatible with the other modules in the system architecture and the other external
systems. Unit tests are an essential part of any development process and helps
eliminate the maximum faults and errors at a very early stage. Unit tests can be
designed at this stage based on the internal module designs.
3.8.3 Coding Phase
The actual coding of the system modules designed in the design phase is taken up in the
Coding phase. The best suitable programming language is decided based on the system and
architectural requirements. The coding is performed based on the coding guidelines and
standards. The code goes through numerous code reviews and is optimized for best
performance before the final build is checked into the repository.
3.8.4 Validation Phases
Following are the Validation phases in V-Model:
1. Unit Testing: Unit tests designed in the module design phase are executed on the
code during this validation phase. Unit testing is the testing at code level and helps
eliminate bugs at an early stage, though all defects cannot be uncovered by unit
testing.
2. Integration Testing: Integration testing is associated with the architectural design
phase. Integration tests are performed to test the coexistence and communication of
the internal modules within the system.
3. System Testing: System testing is directly associated with the System design phase.
System tests check the entire system functionality and the communication of the
system under development with external systems. Most of the software and hardware
compatibility issues can be uncovered during system test execution.
4. Acceptance Testing: Acceptance testing is associated with the business requirement
analysis phase and involves testing the product in user environment. Acceptance tests
79
uncover the compatibility issues with the other systems available in the user
environment. It also discovers the non-functional issues such as load and performance
defects in the actual user environment.
3.8.5 Application
V- Model application is almost same as waterfall model, as both the models are of sequential
type. Requirements have to be very clear before the project starts, because it is usually
expensive to go back and make changes. This model is used in the medical development
field, as it is strictly disciplined domain. Following are the suitable scenarios to use V-Model:
a. Requirements are well defined, clearly documented and fixed.
b. Product definition is stable.
c. Technology is not dynamic and is well understood by the project team.
d. There are no ambiguous or undefined requirements.
e. The project is short.
3.8.6 Advantages and Disadvantages of Software Prototyping V-Model
3.8.6.1 Advantage
The advantage of V-Model is that it‘s very easy to understand and apply. The simplicity of
this model also makes it easier to manage.
3.8.6.2 Disadvantage
The disadvantage is that the model is not flexible to changes and just in case there is a
requirement change, which is very common in today‘s dynamic world, it becomes very
expensive to make the change.
80
3.9.2.2 Disadvantage
The Big Bang model is a very high risk model and changes in the requirements or
misunderstood requirements may even lead to complete reversal or scraping of the project. It
is ideal for repetitive or small projects with minimum risks.
Agile thought process had started early in the software development and started becoming
popular with time due to its flexibility and adaptability. The most popular agile methods
include Rational Unified Process 1994, Scrum 1995, Crystal Clear, Extreme Programming
81
1996, Adaptive Software Development, Feature Driven Development, and Dynamic Systems
Development Method DSDM 1995. These are now collectively referred to as agile
methodologies, after the Agile Manifesto was published in 2001.
Agile Manifesto principles are as follows:
1. Individuals and interactions - in Agile development, the factors that gain
importance are self-organization, motivation, interactions, co-location and pair
programming.
2. Working software - Demonstration working software is considered the best means of
communication with the customer to understand their requirement, instead of just
depending on documentation.
3. Customer collaboration - As the requirements cannot be gathered completely in the
beginning of the project due to various factors, continuous customer interaction is
very important to get proper product requirements.
4. Responding to change - Agile development is focused on quick responses to change
and continuous development.
82
2. Data Modeling: The information gathered in the Business Modeling phase is
reviewed and analyzed to form sets of data objects vital for the business. The
attributes of all data sets is identified and defined. The relation between these data
objects are established and defined in detail in relevance to the business model.
3. Process Modeling: The data object sets defined in the Data Modeling phase are
converted to establish the business information flow needed to achieve specific
business objectives as per the business model. The process model for any changes or
enhancements to the data object sets is defined in this phase. Process descriptions for
adding, deleting, retrieving or modifying a data object are given.
4. Application Generation: The actual system is built and coding is done by using
automation tools to convert process and data models into actual prototypes.
5. Testing and Turnover: The overall testing time is reduced in RAD model as the
prototypes are independently tested during iterations. However the data flow and the
interfaces between all the components need to be thoroughly tested with complete test
coverage. Since most of the programming components have already been tested, it
reduces the risk of any major issues.
83
d. RAD SDLC model should be chosen only if domain experts are available with
relevant business knowledge.
e. Should be used where the requirements change during the course of the project and
working prototypes are to be presented to customer in small iterations of 2-3 months.
3.11.4 Advantages and Disadvantages of RAD Model
3.11.4.1 Advantage
RAD model enables rapid delivery as it reduces the overall development time due to
reusability of the components and parallel development.
3.11.4.2 Disadvantage
RAD works well only if high skilled engineers are available and the customer is also
committed to achieve the targeted prototype in the given time frame. If there is commitment
lacking on either side the model may fail.
84
organized manner and used for further enhancements in the product under
development.
4. Revise and enhance the Prototype: The feedback and the review comments are
discussed during this stage and some negotiations happen with the customer based on
factors like, time and budget constraints and technical feasibility of actual
implementation. The changes accepted are again incorporated in the new Prototype
developed and the cycle repeats until customer expectations are met.
Prototypes can have horizontal or vertical dimensions. Horizontal prototype displays the user
interface for the product and gives a broader view of the entire system, without concentrating
on internal functions. A vertical prototype on the other side is a detailed elaboration of a
specific function or a sub system in the product.
3.12.3 Software Prototyping Types
There are different types of software prototypes used in the industry. Following are the major
software prototyping types used widely:
1. Throwaway/Rapid Prototyping: Throwaway prototyping is also called as rapid or
close ended prototyping. This type of prototyping uses very little efforts with
minimum requirement analysis to build a prototype. Once the actual requirements are
understood, the prototype is discarded and the actual system is developed with a
much clear understanding of user requirements.
2. Evolutionary Prototyping: Evolutionary prototyping also called as breadboard
prototyping is based on building actual functional prototypes with minimal
functionality in the beginning. The prototype developed forms the heart of the future
prototypes on top of which the entire system is built. Using evolutionary prototyping
only well understood requirements are included in the prototype and the requirements
are added as and when they are understood.
3. Incremental Prototyping: Incremental prototyping refers to building multiple
functional prototypes of the various sub systems and then integrating all the available
prototypes to form a complete system.
4. Extreme Prototyping: Extreme prototyping is used in the web development domain.
It consists of three sequential phases. First, a basic prototype with all the existing
pages is presented in the html format. Then the data processing is simulated using a
prototype services layer. Finally the services are implemented and integrated to the
final prototype. This process is called Extreme Prototyping used to draw attention to
the second phase of the process, where a fully functional UI is developed with very
little regard to the actual services.
3.12.4 Software Prototyping Application
Software Prototyping is most useful in development of systems having high level of user
interactions such as online systems. Systems which need users to fill out forms or go through
various screens before data is processed can use prototyping very effectively to give the exact
look and feel even before the actual software is developed. Software that involves too much
of data processing and most of the functionality is internal with very little user interface does
not usually benefit from prototyping. Prototype development could be an extra overhead in
such projects and may need lot of extra efforts. Software prototyping is used in typical cases
85
and the decision should be taken very carefully so that the efforts spent in building the
prototype add considerable value to the final software developed.
3.13 SUMMARY
1. This was about the various SDLC models available and the scenarios in which these
SDLC models are used. The information in this tutorial will help the project managers
decide what SDLC model would be suitable for their project and it would also help
the developers and testers understand basics of the development model being used for
their project.
2. We have discussed all the popular SDLC models in the industry, both traditional and
Modern. This tutorial also gives you an insight into the applications, advantages and
disadvantages of the SDLC models discussed.
3. Waterfall and V-model are traditional SDLC models and are of sequential type.
Sequential means that the next phase can start only after the completion of first phase.
Such models are suitable for projects with very clear product requirements and where
the requirements will not change dynamically during the course of project completion.
4. Iterative and Spiral models are more accommodative in terms of change and are
suitable for projects where the requirements are not so well defined, or the market
requirements change quite frequently.
5. Big Bang model is a random approach to Software development and is suitable for
small or academic projects.
6. Agile is the most popular model used in the industry. Agile introduces the concept of
fast delivery to customers using prototype approach. Agile divides the project into
small iterations with specific deliverable features. Customer interaction is the
backbone of Agile methodology, and open communication with minimum
documentation are the typical features of Agile development environment.
7. Rapid Application Development and Software Prototype are modern techniques to
understand the requirements in a better way early in the project cycle. These
techniques work on the concept of providing a working model to the customer and
stockholders to give the look and feel and collect the feedback. This feedback is used
in an organized manner to improve the product.
86
5. After the product is_________ and ready it is released formally deployed in the
appropriate market based on the Business strategy of the organization.
6. _________ model is often considered as the classic approach to the systems
development life cycle.
7. The advantage of waterfall development is that it allows for _____________
and___________ .
8. The advantage of __________ model is that there is a working model of the system
at a very early stage of development which makes it easier to find functional or design
flaws.
9. ______ model is also known as Verification and Validation model.
10. _________ SDLC model is a combination of iterative and incremental process models
with focus on process adaptability and customer satisfaction by rapid delivery of
working software product.
11. __________ is a working model of software with some limited functionality.
87
BLOCK III
88
UNIT I:AUTHENTICATION AND PASSWORD
SECURITY
1.2 INTRODUCTION
I hope all the readers are internet users! What is the first screen you encounter whenever you
open your Gmail, Yahoomail or Rediffmail account? Yes you have guessed it right, you are
landed to login page of the website.
Have you ever thought why we require to login? Why we are not landed to our mailbox
directly? You need to authenticate yourself before you are given access to your mailbox so
that the unauthorized person does not have access to your communication. So login-password
is the methods of authentication. Let us first discuss what authentication is!
89
1.3 AUTHENTICATION
1.3.1 Definition of Authentication
Authentication11 is the act of confirming the truth of an attribute of a single piece of data (a
datum) claimed true by an entity. In contrast with identification which refers to the act of
stating or otherwise indicating a claim purportedly attesting to a person or thing's identity,
authentication is the process of actually confirming that identity. It might involve confirming
the identity of a person by validating their identity documents, verifying the validity of a
Website with a digital certificate, tracing the age of an artifact by carbon dating, or ensuring
that a product is what its packaging and labeling claim to be. In other words, authentication
often involves verifying the validity of at least one form of identification. In digital world,
we perform electronic authentication. Let us now talk about e-authentication.
Authentication in the context of a user accessing an application tells an application who the
current user is and whether or not they're present13. A full authentication protocol will
probably also tell you a number of attributes about this user, such as a unique identifier, an
email address, and what to call them when the application says "Good Morning".
Authentication is all about the user and their presence with the application, and an internet-
scale authentication protocol needs to be able to do this across network and security
boundaries.
11
https://en.wikipedia.org/wiki/Authentication
12
https://en.wikipedia.org/wiki/Electronic_authentication
13
http://oauth.net/articles/authentication/
90
Principal
The teacher feeds the marks/attendance of the student in the School Management System. So
the teacher is given the write permission to enter the marks/attendance of a particular subject
and he can view/enter details pertaining to his subject only. The head of the department is one
level-up in the hierarchy and is responsible for all the subjects, teachers and students of a
particular department. So he may be given both read and write permission so that he can
view/enter the subjects allocated to him as well as view the details of the subjects under his
department. Principal is the head of the school. He is responsible for all the subjects, teachers
and students of the school. Some students may have short attendance and therefore are not
allowed to sit in the final examination due to short attendance. He student may submit
medical certificate or may produce an evidence of attending a school activity like sports,
cultural festival etc. After approval, he may need to modify the existing attendance. Marks,
etc. therefore, Principal may need all the three permissions like enter, view and modify.
Whenever a person login into the system, he may be asked for user login and password.
Login is for verifying who the user is and the password is for verifying the user who he
claims to be. Once it is verified that it‘s a teacher login, head login or principal log based on
authorization, the user may be allowed to perform one/all of the activities from write, view or
modify. After a person, program or computer has successfully been identified and
authenticated then it must be determined what informational resources they are permitted to
access and what actions they will be allowed to perform (run, view, create, delete, or change).
This is called authorization.
91
1.3.4 Types of Authentication Factors
In authentication, we generally talk about three ―factors‖ for determining identity14. A
―factor‖ is a broad category for establishing that you are who you claim to be. The three types
of authentication factors are:
A. Something you know (a password, a PIN, the answer to a “security question”, etc.)
Most of us are familiar with password authentication. To log onto a computer or
network, you enter a user account name and the password assigned to that account.
This password is checked against a database that contains all authorized users and
their passwords. In a Windows 2000 network, for example, this information is
contained in Active Directory. To preserve the security of the network, passwords
must be ―strong,‖ that is, they should contain a combination of alpha and numeric
characters and symbols, they should not be words that are found in a dictionary, and
they should be relatively long (eight characters or more). In short, they should not be
easily guessed. Password authentication is vulnerable to a password ―cracker‖ who
uses a brute force attack (trying every possible combination until hitting upon the
right one) or who uses a protocol ―sniffer‖ to capture packets if passwords are not
encrypted when they are sent over the network.
B. Something you have (an ATM card, a smart card, a one-time-password token, etc.)
Smart cards are credit card-sized devices that hold a small computer chip, which is
used to store public and private keys and other personal information used to identify a
person and authenticate him or her to the system. Logging onto the network with a
smart card requires that you physically insert the card into (or slide it through) a
reader and then enter a Personal Identification Number (PIN) in much the same way
that you use an ATM card to access an automatic teller machine. Smart cards use
cryptography-based authentication and provide stronger security than a password
because in order to gain access, the user must be in physical possession of the
card and must know the PIN.
14
https://securityblog.redhat.com/tag/two-factor-authentication/
92
Historically, most people have used the first of these three factors. Whenever you‘ve logged
into Facebook, you entered something you know: your user name and password. One of the
less common, but growing, authentication methods is biometrics. A couple years ago, a major
PC manufacturer ran a number of television commercials advertising their laptop models with
a fingerprint scanner. The claim was that it was easy and secure to unlock the machine with a
swipe of a finger. Similarly, Google introduced a service to unlock an Android smartphone
by using facial recognition with the phone‘s built-in camera.
Pay attention readers, because I am about to remove the scales from your eyes. Those three
factors I listed above? I listed them in decreasing order of security. ―But how can that be?‖,
you may ask. ―How can my unchangeable physical attributes be less secure than a password?
Everyone knows passwords aren‘t secure.‖ The confusion here is due to subtle but important
definitions in the meaning of ―security‖.
Most common passwords these days are considered ―insecure‖ because people tend to use
short passwords which by definition have a limited entropy pool (meaning it takes a smaller
amount of time to run through all the possible combinations in order to brute-force the
password or run through a password dictionary). However, the pure computational
complexity of the authentication mechanism is not the only contributor to security.
The second factor above, ―something you have‖ (known as a token), is almost always of
significantly higher entropy than anything you would ever use as a password. This is to
eliminate the brute-force vulnerability of passwords. But, it comes with a significant
downside as well: something you have is also something that can be physically removed from
you. Where a well-chosen password can only be removed from you by social engineering
(tricking you into giving it to an inappropriate recipient), a token might be slipped off your
desk while you are at lunch.
Both passwords and tokens have an important side-effect that most people never think about
until an intrusion has been caught: remediation. When someone has successfully learned your
password or stolen your token, you can call up your helpdesk and immediately ask them to
reset the password or disable the cryptographic seed in the token. Your security is now
restored and you can choose a new password and have a new token sent to you.
However, this is not the case with a biometric system. By its very nature, it is dependent upon
something that you cannot change. Moreover, the nature of its supposed security derives from
this very fact. The problem here is that it‘s significantly easier to acquire a copy of someone‘s
fingerprint, retinal scan or even blood for a DNA test than it is to steal a password or token
device and in many cases it can even be done without the victim knowing. Many consumer
retinal scanners can be fooled by a simple reasonably-high-resolution photograph of the
person‘s eye (which is extremely easy to accomplish with today‘s cameras). Some of the
more expensive models will also require a moving picture, but today‘s high-resolution
93
smartphone cameras and displays can defeat many of these mechanisms as well. It‘s well-
documented that Android‘s face-unlock feature can be beaten by a simple photograph.
These are all technological limitations and as such it‘s plausible that they can be overcome
over time with more sensitive equipment. However, the real problem with biometric security
lies with its inability to replace a compromised authentication device. Once someone has a
copy of your ten fingerprints, a drop of your blood from a stolen blood-sugar test, or a close-
up video of your eye from a scoped video camera, there is no way to change this data. You
can‘t ask helpdesk to send you new fingers, an eyeball, or DNA. Therefore, I contend that I
lied to you above. There is no full third factor for authentication, because, given a sufficient
amount of time, any use of biometrics will eventually degenerate into a non-factor. Given this
serious limitation, one should never under any circumstances use biometrics as the sole form
of authentication for any purpose whatsoever.
One other thought: have you ever heard the argument that you should never use the same
password on multiple websites because if it‘s stolen on one, they have access to the others?
Well, the same is true of your retina. If someone sticks malware on your cellphone to copy an
image of your eye that you were using for ―face unlock‖, guess what? They can probably use
that to get into your lab too.
The moral of the story is this: biometrics are minimally useful, since they are only viable
until the first exposure across all sites where they are used. As a result, if you are considering
initiating a biometric-based security model, I encourage you to look into a two-factor solution
involving passwords and a token of some kind.
15
http://www.go4expert.com/articles/understanding-authentication-t8842/
94
1.4 AUTHENTICATOIN METHODS AND PROTOCOLS
There are a large number of authentication methods and protocols that can be used,
depending on the application and security requirements. In the following sections, we will
discuss different types of popular authentication methods and protocols.
1.4.1 Kerberos
Kerberos16 is a network authentication protocol. It is designed to provide strong
authentication or client-server applications by using secret-key cryptography.It allows nodes
communicating over a non-secure network to prove their identity to one another in a secure
manner17. Its designers aimed it primarily at a client–server model and it provides mutual
authentication—both the user and the server verify each other's identity. Kerberos protocol
messages are protected against eavesdropping and replay attacks. It was developed by
Massachusetts Institute of Technology (MIT) developed Kerberos to protect network services
provided by Project Athena. The protocol is based on the earlier Needham–Schroeder
symmetric key protocol. The client authenticates itself to the Authentication Server (AS)
which forwards the username to a key distribution center (KDC). The KDC issues a ticket-
granting ticket (TGT), which is time stamped, encrypts it using the user's password and
returns the encrypted result to the user's workstation. This is done infrequently, typically at
user logon; the TGT expires at some point, though may be transparently renewed by the
user's session manager while they are logged in. When the client needs to communicate with
another node ("principal" in Kerberos parlance) the client sends the TGT to the ticket-
granting service (TGS), which usually shares the same host as the KDC. After verifying the
TGT is valid and the user is permitted to access the requested service, the TGS issues a ticket
and session keys, which are returned to the client. The client then sends the ticket to the
service server (SS) along with its service request.
16
http://computers.interactiva.org/Security/Authentication/Kerberos/
17
http://www.territorioscuola.com/enhancedwiki/en.php?title=Kerberos_(protocol)
95
1.4.2 Secure Sockets Layer(SSL)
The first thing you need to know about Secure Sockets Layer is that it is no longer called
that18. For purist reasons, the protocol formerly known as SSL is now called Transport Layer
Security, or TLS. The reasons for this name change are fairly esoteric and originate partly in
a description of networking architecture as the Open Systems Interconnection seven-layer
networking model. SSL hovered uncomfortably between the transport layer (4) and the
presentation layer(6), and some experts felt, long after the OSI model had fallen out of
fashion, that SSL was not really a layer at all. In the more recent TCP/IP model, which has
fewer layers, SSL operates somewhere between the transport and application layers. Also,
the protocol can - in principle - be applied to other networking protocols than just sockets,
even though the vast majority of global communication are now made using the socket
programming interface. Almost every product that implements TLS continues to refer to it as
SSL, usually with some weasel words added like more properly known as TLS. The SSL
protocol was originally invented by the Netscape Corporation as a way of providing secure
browsing in their web browser. The Netscape Corporation was absorbed into AOL now.
The symmetric-key encryption is considerably more efficient than public key encryption. So,
for encrypting bulk data transfer with high performance, symmetric-key encryption is a must.
But to use it, both partners in the conversation must know a single shared secret key. But how
do you share a secret key with a partner that you have never communicated with before? This
is known as the key exchange problem. An early solution to this problem was for a trusted
courier to carry the key, physically locked in a secure container, from one location to another.
This is highly secure, but expensive and inconvenient, and hardly practical for electronic
commerce. Furthermore, the same key is used for encrypting all traffic, which somewhat
simplifies the possibility of an attacker breaking the key.
SSL, in brief, is a solution to the key exchange problem that is suitable for electronic
communication. The two partners in the conversation must be identified as the client and the
server as their roles are different: the conversation is not symmetric. The conversation is
initiated by the client, who provides a list of suggested encryption techniques. The server
responds with a certificate containing the server's public key, and an encryption technique
that is acceptable to the client. The client validates the server's certificate, and uses the public
key within it to encrypt a random string called the pre-master-secret, which it sends to the
server. The server uses its private key to decrypt the pre-master-secret. At this point, the key
exchange problem is solved: the client and server can both use the pre-master-secret to
generate the key required by the mutually chosen encryption technique.
Both the client and server now possess a mutually chosen encryption algorithm and a key to
use with it. They are now in a position to exchange secret encrypted messages using fast
symmetric-key encryption, using a shared key that has never appeared in plain text in the
conversation. Furthermore, a different key is used for each conversation, limiting the
opportunity for an attacker to break it.
18
http://peter.havercan.net/computing/plain-persons-guide-to-secure-sockets-layer.html
96
1.4.3 Microsoft NTLM
NTLM19 is a suite of authentication and session security protocols used in various Microsoft
network protocol implementations and supported by the NTLM Security Support Provider
("NTLMSSP"). Originally used for authentication and negotiation of secure DCE/RPC,
NTLM is also used throughout Microsoft's systems as an integrated single sign-on
mechanism. It is probably best recognized as part of the "Integrated Windows
Authentication" stack for HTTP authentication; however, it is also used in Microsoft
implementations of SMTP, POP3, IMAP (all part of Exchange), CIFS/SMB, Telnet, SIP, and
possibly others.
The NTLM Security Support Provider provides authentication, integrity, and confidentiality
services within the Window Security Support Provider Interface (SSPI) framework. SSPI
specifies a core set of security functionality that is implemented by supporting providers; the
NTLMSSP is such a provider. The SSPI specifies, and the NTLMSSP implements, the
following core operations:
NTLM has been largely supplanted by Kerberos as the authentication protocol of choice for
domain-based scenarios. However, Kerberos is a trusted-third-party scheme, and cannot be
used in situations where no trusted third party exists; for example, member servers (servers
that are not part of a domain), local accounts, and authentication to resources in an untrusted
domain. In such scenarios, NTLM continues to be the primary authentication mechanism
(and likely will be for a long time).
19
http://davenport.sourceforge.net/ntlm.html Copyright © 2003, 2006 Eric Glass
20
https://en.wikipedia.org/wiki/Password_Authentication_Protocol
97
PAP transmits unencrypted ASCII passwords over the network and is therefore considered
insecure. PAP is the protocol where two entities share a password in advance and use the
password as the basis of authentication. Existing password authentication schemes can be
categorized into two types: weak-password authentication schemes and strong-password
authentication schemes. When compared to strong-password schemes, weak-password
schemes tend to have lighter computational overhead, the designs are simpler, and
implementation is easier, making them especially suitable for some constrained
environments.
PAP is simple authentication protocol but have some serious security issues associated with
it. First of all, it sends the username and the password as plain text, due to this becomes an
easy prey for the hackers. Secondly, it does not keep any upper limit on the number of
unsuccessful attempts on incorrect username and password, unlike most of the sites which
block the attempts after three consecutive unsuccessful attempts.
98
1.4.5 Challenge-Handshake Authentication Protocol(CHAP)
Challenge-Handshake Authentication Protocol challenges a system to verify identity21.
CHAP doesn‘t use userID/Password mechanism. Instead, the initiator sends a logon request
from the client to the server. The server sends a challenge back to the client. The challenge is
encrypted and then sent back to the server. The server compares the value from the client and,
if the information matches, grants authorization. If the response fails, the session fails, and
the request phase starts over.
The challenge is the hashed value of the client password concatenated to a random number.
The whole is hashed and represents the challenge. The main server sends the random number
to the client which in the same way calculates the challenge and sends it to the main server
for comparison.
21
http://www.go4expert.com/articles/understanding-authentication-t8842/
22
http://pychatter.wikidot.com/how-it-works
99
for virtual private networks. It is also used as an authentication option with RADIUS servers
which are used for WiFi security using the WPA-Enterprise protocol. It is further used as the
main authentication option of the Protected Extensible Authentication Protocol (PEAP).
1.4.9 Certificates
This is another common form of authentication26. A server or certificate authority (CA) can
issue a certificate that will be accepted by the challenging system. Certificates can either be
physical access devices, such as smart cards, or electronic certificates that are used as part of
the logon process. A certificate practice statement (CPS) outlines the rules used for issuing
and managing certificates. A certificate revocation list (CRL) lists the revocations that must
be addressed (often due to expiration) in order to stay current. A simple way to think of
certificates is like hall passes at school.
23
https://en.wikipedia.org/wiki/MS-CHAP
24
https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
25
https://en.wikipedia.org/wiki/RADIUS
26
http://www.go4expert.com/articles/understanding-authentication-t8842/
100
1.4.10 Security Tokens
These are similar to certificates. They contain the rights and access privileges of the token
bearer as part of the token. Think of a token as a small piece of data that holds a sliver of
information about the user. Many operating systems generate a token that is applied to every
action taken on the computer system. If your token don‘t grant you access to certain
information, then either that information won‘t be displayed or your access will be denied.
The authentication system creates a token every time a user connects or a session begins. At
the completion of a session, the token is destroyed.
The latest and most effective types of password attacks can attempt up to 350 billion guesses
per second, and that number will no doubt increase significantly over the next few years.
Creating a strong password today requires modern techniques. There are many different
approaches to generating a strong password, but password managers and passphrases are the
best. Creating a strong password and changing it frequently is one of the smartest things a
user can do to protect themselves when working online28. For many institutions, usernames
and domains are generated based on a common formula: for Uttarakhand Open University,
first initial and last name, with the [email protected]
Because of this, it‘s really not enough to rely fully on the security systems of the places that
you use your password on. Often times, the least important passwords becomes the most
important because hackers target those first. Sure, your bank is pretty secure. But if you use
the same password in multiple locations, or iterations of the same password, it doesn‘t matter
how secure your bank‘s security system is. Hackers start with the stupid websites that require
a username and password to process web payments, or logins to read the news or comment
on forums, or whatever. If the password you used to order a pizza last weekend is the same as
the one you use to access your student loans…. well, no amount of security is going to stop
someone when they know your password already.
27
https://en.support.wordpress.com/selecting-a-strong-password/
28
http://kb.cu-portland.edu/Password+Security
101
1.5.1 Bad Password Combinations
Here are some of the most common passwords or password configurations people use. If this
is you – it‘s time to change!
a. Length. As computers that process Brute Force attacks (just running different
combinations of passwords and usernames repeatedly until they get a result)
become more intelligent, length becomes the defining variable in passwords that
will take longer to process.
b. In conjunction with length, choose a pass phrase that means something to you
instead of a word, a name, or a title. For example: ―mydogslovetoeatswisscheese‖
is a better pass phrase than ―Fido123‖.
c. Although it‘s not the ‗rule‘ for unbreakable passwords anymore, randomizing
your capitalization and using special characters are still useful and effective in
making your password harder to crack.
d. Turn a phrase into a string of characters that look completely unrelated, but in
reality is easy to remember. So ―all creatures great and small‖ would become
―acg8@s‖ or something similar.
e. Don't use words that can be found in a dictionary or someone's name.
Password generators can crack these in no time. At the very least, use something
slightly off the beaten path.
f. Have problems remembering lots of different passwords? Try using an encrypted
password utility like Roboform, LastPass and KeePass for Windows,
or 1Password for Macs.
g. Changing your password often is important too, but not terribly effective if all you
do is change the number at the end of a word. Using passphrases instead of
passwords means you have to change them less often, and are more likely to
remember them when you do.
h. Make a note. Don‘t write your password down, but if you know you have trouble
remembering, slip a piece of paper in your wallet with a clue that‘s significant
only to you.
102
i. Create a Passphrase instead of a Password – A passphrase is similar to a
password, except that it‘s based on a random collection of words, rather than just
one. For example, copy indicate trap bright.
j. Because the length of a password is one of the primary factors in how strong it is,
passphrases are much more secure than traditional passwords. At the same time,
they are also much easier to remember and type.
k. They‘re not as strong as the kinds of passwords generated by password managers,
but they‘re still a good option if you don‘t want to use a password
manager. They‘re also the best way to generate the master password for a
password manager or your operating system account, since those can‘t be
automatically filled in by the password manager.
l. Don’t use the same password twice. Many popular websites fail to adequately
secure your password in their systems, and hackers routinely break into them and
access hundreds of millions of accounts. If you reuse passwords from site to site,
then someone who hacks into one site will be able to login to your account on
other sites. At the very least, make sure that you have unique passwords for all
sites that store financial or other sensitive data, or ones that could be used to hurt
your reputation.
m. Make sure your email password is also strong. With many online services like
WordPress.com, your email address serves as your identification. If a malicious
user gains access to your email, they can easily reset your passwords and login to
your account.
n. Don’t share your passwords. Even if you trust the person, it‘s possible an
attacker could intercept or eavesdrop on the transmission, or hack that person‘s
computer. If you suspect that someone else knows your password, you should
change it immediately.
o. Don’t send your password to anyone in an email. E-mails are rarely encrypted,
which makes them relatively easy for attackers to read. WordPress.com staff will
never ask you for your password. If you must share a password, use a secure
method of transmission like pwpush.com, and set the link to expire after the first
view.
p. Don’t save your passwords in a web browser. They often fail to store the
passwords in a secure manner, so use a password manager instead. See the section
on password managers above for more information.
q. Don’t save passwords or use “Remember Me” options on a public computer.
If you do, then the next person to use the computer will be able to access your
account. Also make sure you log out or close your browser when you are done.
r. Don’t write down your password. If it‘s written down somewhere and someone
can find it, it‘s not secure. Store passwords in a password manager instead, so that
they‘ll be encrypted. See the section on password managers above for more
information. The exception to this rule is storing unrecoverable passwords (like
the master password for a password manager, or your operating system account)
103
in a secure manner. One good way to secure them is to keep it in a safe deposit
box, or locked in a safe.
s. Don’t change your passwords, unless you suspect they’ve been
compromised. As long as you have the type of strong password recommended in
this article, changing it frequently will not do anything to minimize the risk of it
being compromised. Because changing them can be a burden, it often tempts
people to adopt bad practices in order to make the process easier, which increases
their vulnerability to attacks. If you suspect someone has gained access to your
account, though, then it‘s always a good precaution to change your password.
t. Use a Password Manager: A password manager is a software application on your
computer or mobile device that generates very strong passwords and stores them
in a secure database. You use a single passphrase to access the database, and then
the manager will automatically enter your username and password into a website‘s
login form for you. There are many different manager applications to choose
from, so you‘ll need to pick which one you‘d like to use, and then install it on
your computer. These are the general steps, but you may want to check the
documentation for your specific application for more details. Choose a password
manager. Some popular ones are:
Choose 4 random words. You can use the xkcd Passphrase Generator if
you‘d like, but it‘s better if you make up your own.
Add spaces between the words if you prefer.
Make a few of the letters upper-case.
Add in a few number and symbols.
104
1.6 SUMMERY
1. Authentication is the act of confirming the truth of an attribute of a single piece of
data (a datum) claimed true by an entity.
2. Identification which refers to the act of stating or otherwise indicating a claim
purportedly attesting to a person or thing's identity, authentication is the process of
actually confirming that identity.
3. Electronic authentication, also referred to as e-authentication is the process of
establishing confidence in user identities electronically presented to an information
system.
4. Authorization is the process of allocation of access rights to the used after the
identity of the person is confirmed through authorization.
5. The three types of authentication factors are: Something you know (a password, a
PIN, the answer to a ―security question‖, etc.), Something you have (an ATM card, a
smart card, a one-time-password token, etc.}, Something you are (your fingerprint,
retinal pattern, DNA)
6. When two or more access methods are included as part of the authentication process,
it is known as multi-factor system.
7. Some of the popular authentication methods and protocols are: Kerberos, SSL,
CHAP, PAP, MS-CHAP, MS-NTML,EAP, RADIUS, Certificate, Security tokens,
etc.
8. Kerberos is a network authentication protocol. It is designed to provide strong
authentication for client-server applications by using secret-key cryptography.
9. The SSL protocol was originally invented by the Netscape Corporation as a way of
providing secure browsing in their web browser.
10. Password authentication protocol (PAP) is an authentication protocol that uses
a password.
11. Extensible Authentication Protocol, or EAP, is an authentication framework
frequently used in wireless networks and point-to-point connections.
12. RADIUS is a networking protocol that provides centralized Authentication,
Authorization, and Accounting (AAA) management for users who connect and use a
network service.
13. This is another common form of authentication29. A server or certificate authority
(CA) can issue a certificate that will be accepted by the challenging system.
14. Security tokens are similar to certificates. They contain the rights and access
privileges of the token bearer as part of the token.
15. The weakest point in any security for your online accounts is usually your password.
16. The latest and most effective types of password attacks can attempt up to 350 billion
guesses per second, and that number will no doubt increase significantly over the next
few years.
29
http://www.go4expert.com/articles/understanding-authentication-t8842/
105
1.7 CHECK YOUR PROGRESS
1. Fill in the blanks:
I. State true or False: You should use the same password on multiple websites.
II. State true or False: Withdrawing of money from a cash machine is an example of
two-factor authentication.
III. State true or False: Kerberos is a network authentication protocol.
IV. State true or False: The symmetric-key encryption is considerably more efficient
than public key encryption.
V. State true or False: Don’t save your passwords in a web browser.
I. Identification
II. Login, password
III. Kerberos
IV. Transport Layer Security
V. Netscape Corporation
VI. Challenge-Handshake Authentication Protocol challenges
VII. Certificates
2. State True or False
I. False
II. True
III. True
IV. True
V. True
106
1.9 FURTHER READING
1. A mechanism for identity delegation at authentication level, N Ahmed, C Jensen - Identity and
Privacy in the Internet Age - Springer 2009
2. " New NIST Publications Describe Standards for Identity Credentials and Authentication
Systems" available at http://www.nist.gov/itl/csd/piv_090809.cfm
3. Forouzan (2007). Data Commn & Networking 4E Sie. McGraw-Hill Education (India) Pvt
Limited. pp. 352–. ISBN 978-0-07-063414-5. Retrieved 24 November 2012.
4. Lloyd, Brian; Simpson, William Allen (October 1992). "Password Authentication
Protocol". PPP Authentication Protocols. IETF. p. 2. RFC 1334. Retrieved 26 Sep. 2015
available at https://tools.ietf.org/html/rfc1334#page-2
5. "AAA and Network Security for Mobile Access. RADIUS, DIAMETER, EAP, PKI and IP
mobility". M Nakhjiri. John Wiley and Sons, Ltd
6. Hassell, Jonathan (2002). RADIUS - Securing Public Access to Private Resources.
O'Reilly & Associates. ISBN 0-596-00322-6.(Selecting a strong password, 2015)
107
UNIT II: WIRELESS SECURITY
2.1 LEARNING OBJECTIVES
After going through this unit, you will able to:
2.2 INTRODUCTION
Wireless security is the prevention of unauthorized access or damage to computers using
wireless networks. The most common types of wireless security are Wired Equivalent
Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security
standard. The password it uses can often be cracked in a few minutes with a basic laptop
computer and widely available software tools. WEP is an old IEEE 802.11 standard from
1999, which was outdated in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick
alternative to improve security over WEP. The current standard is WPA2; some hardware
cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption
device that encrypts the network with a 256-bit key; the longer key length improves security
over WEP.
Many laptop computers have wireless cards pre-installed. The ability to enter a network while
mobile has great benefits. However, wireless networking is prone to some security issues.
Hackers have found wireless networks relatively easy to break into, and even use wireless
technology to hack into wired networks. As a result, it is very important that enterprises
define effective wireless security policies that guard against unauthorized access to important
resources. Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection
Systems (WIDS) are commonly used to enforce wireless security policies.
An SSID is the name of a wireless local area network (WLAN). All wireless devices on a
WLAN must employ the same SSID in order to communicate with each other. A network
administrator often uses a public SSID that is set on the access point and broadcast to all
wireless devices in range. Some newer wireless access points disable the automatic SSID
broadcast feature in an attempt to improve network security.
108
A common, albeit incorrect assumption, is that an SSID is a string of human-readable
characters (such as ASCII), terminated by a NUL character (as in a C-string). SSIDs must be
treated and handled as what they are, a series of 0 to 32 octets, some of which may not be
human-readable. Note that the 2012 version of the 802.11 standard defines a primitive SSID
Encoding, an Enumeration of UNSPECIFIED and UTF-8, indicating how the array of octets
can be interpreted.
In an IBSS, the SSID is chosen by the client device that starts the network, and broadcasting
of the SSID is performed in a pseudo-random order by all devices that are members of the
network.
2.3.1 Security of SSID hiding
Every wireless router has the ability to broadcast its name, or SSID (Service Set Identifier).
Disabling SSID broadcasting means that your wireless network won‘t appear in the list of
―Available Wireless Networks‖ on any nearby computer. Theoretically, this makes your
network more secure. Since your neighbors won‘t be able to see your network, how could
they connect to it? Unfortunately, disabling the SSID does nothing to hide your wireless
network from hackers using programs that scan the airwaves for wireless networks. In fact, it
makes it look like you‘ve got something to hide, much like putting an expensive purchase in
the back of a hatchback and covering it with a blanket does. Additionally, disabling SSID
broadcasting makes it harder to troubleshoot connection problems, and also makes it difficult
for your guests to connect to your wireless network. Using WPA with a complex password
means your neighbors can see your network, but they can‘t access it.
109
wired network. WEP, recognizable by the key of 10 or 26 hexadecimal digits, was at one
time widely in use and was often the first security choice presented to users by router
configuration tools.
WEP is a notoriously weak security standard. The password it uses can often be cracked in a
few minutes with a basic laptop computer and widely available software tools. WEP is an old
IEEE 802.11 standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi Protected
Access. WPA was a quick alternative to improve security over WEP.
WPA become available in 2003 and was intended as an intermediate measure in anticipation
of the availability of the more secure and complex WPA2. WPA2 become available in 2004.
A feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security to
be bypassed and effectively broken in many situations. WPA and WPA2 security
implemented without using the Wi-Fi Protected Setup feature are unaffected by the security
vulnerability.
WPA offers the benefits Enhancement data security, robust key management, Data origin
authentication and Data integrity protection.
110
could be categorized as personal mode, more for home and personal use, which uses a Pre-
Shared Key. It does not require the .1x EAP exchange and it can be set simply by configuring
a pre-shared key manually.
In WPA though, both modes would use WEP as the encryption algorithm and we know that
is a vulnerable protocol and so some extra protection was built into WEP in the form of those
two protocols, the Temporal Key Integrity Protocol and the Message Integrity Check, which
basically added longer rotating keys and some integrity measures. Similar modes exist in
WPA2, which is an implementation of Wi-Fi Alliance of the IEEE 802.11i standard. The
main difference here is that WEP is no longer the encryption algorithm. The framework is
still 802.1x EAP or pre-shared keys, but again the encryption algorithm is now AES or
Advanced Encryption Standard.
111
MAC filtering is also used on enterprise wireless networks with multiple access points to
prevent clients from communicating with each other. The access point can be configured to
only allow clients to talk to the default gateway, but not other wireless clients. It increases the
efficiency of access to network.
2.5.1 Configuration of Wireless MAC address filter on wireless router
Step1: First step you need to open the web browser and then you have to type
http://192.168.0.1or http://192.168.1.1 after that press enter. The user name and password are
both ―admin‖
Step 2: In the second step Go to IP & MAC Binding->ARP List page, you can find the
MAC address of the all the devices which are connected to the router.
Step 3: In the third step Go to Wireless->Wireless MAC Filtering page, click the Add New button.
112
Step 4: In fourth step type in the MAC address you want to allow or deny to access the
router, and give a description for this item. The status should be Enabled and at last, click the
Save button. You need add items in this way one by one, 64 is the maximum number.
Step 5: In fifth step at the end, about the Filtering Rules, please choose Allow/Deny and
Enable the Wireless MAC Filtering function.
113
Although wireless routers have a lot of positives, there are some negatives. They can be very
unsafe. People can have the ability to tap into your computer. You can prevent this by setting
up security features. Firewalls, firmware, and other virus scanners are important to protect
your wireless router.
Radio Waves:
Wi-Fi uses radio waves like other wireless devices such as laptops and cellular phones, and
radios. For the most part, to communicate with the wireless network, there is a two-way radio
contact between computers. Because of this, the process that happens when wireless devices
communicate via Wi-Fi is simple. First, the computer‘s wireless adapter changes its data to
radio frequency and uses an antenna to send it out. Then, the computer‘s wireless router gets
the signal and translates it interprets the signal and sends the information to the internet using
an Ethernet connection. That is the process to send information. To receive information, the
process works in reverse.
Modem:
A modem is a device that converts the digital signals from a computer into specific
frequencies that can travel to television or telephone lines. It transfers the information from
the internet to the wireless router. At the destination point the receiving modem transfers the
data that was sent back into data information. The modem allows the computer to translate
information from one computer to another.
The modem can be either internal or external to the computer. Regardless if your cable
modem is outside or inside the computer all modems have a few key components:
114
Computer networking is a great way to collaborate with other computer users in your home
or office. While it is becoming increasingly easy for the basic computer user, it can still be a
difficult, frustrating experience for many people.
Step 2: Second, connect your wireless router. Locate your cable modem or DSL modem and
unplug it to turn it off. Next, connect your router to your modem. Next, plug in and turn on
your cable or DSL modem. Wait a few minutes to give it time to connect to the Internet, and
then plug in and turn on your wireless router. Your computer will wirelessly connect to your
router, and the router will send communications through your modem to the Internet. After a
minute, the WAN or WLAN light on your wireless router should light up, indicating that it
has been connected successfully.
Step 3: Configure your wireless router. Using the network cable that came with your wireless
router, you should temporarily connect your computer to one of the open network ports on
your wireless router. If you need to, turn your computer on and it should automatically
connect to your router. Next, open Internet Explorer and type in the address to configure your
router.
Step 4: Connect your computers. If your computer does not have wireless network support
built in, plug your network adapter into your USB port, and place the antenna on top of your
computer (in the case of a desktop computer), or insert the network adapter into an empty PC
card slot (in the case of a laptop). Windows XP will automatically detect the new adapter, and
may require you to insert the CD that came with your adapter. The on-screen instructions will
guide you through the configuration process.
Locate your cable modem or DSL modem and unplug it to turn it off. Next, connect your
router to your modem. Next, plug in and turn on your cable or DSL modem. Wait a few
minutes to give it time to connect to the Internet, and then plug in and turn on your wireless
115
router. Your computer will wirelessly connect to your router, and the router will send
communications through your modem to the Internet. After a minute, the WAN or WLAN
light on your wireless router should light up, indicating that it has been connected
successfully.
2.9 WLAN
A wireless local area network (WLAN) is a wireless computer network that links two or more
devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a
limited area such as a home, school, computer laboratory, or office building. This gives users
the ability to move around within a local coverage area and still be connected to the network,
and can provide a connection to the wider Internet. Most modern WLANs are based on IEEE
802.11 standards.
The other factors why WLANs are becoming more acceptable are:
116
1. No need to be connected physically with each other through any medium such as cables.
You can roam around freely in office premises, home or around.
2. WLANs are cost effective. Cabling all the way in the offices, hotels etc. are not needed.
So it‘s cheap and provide same quality of service.
3. Unreachable spots where a cable is hardly accessible, WLAN signals can reach out such
as big installations like airports. Also surfing outdoors is also convenient. Just install the
device called Access Points (AP) and you are done.
4. Less interruption and easy trouble shooting in case of failures as compared to cabled
networks.
5. More secure as most of APs support best encryption methods which protect them from
sniffing and other attacks.
Secure WLAN
Wireless Security mainly depends on these 3 factors:
How much is your wireless network secured in terms of encryption being used?
Monitoring for suspicious and unusual activities.
User awareness and education.
These are the combination of various approaches ranging from corporate to home networks.
These are also for users how to remain safe while surfing.
Wi-Fi at home
Wi-Fi at home is not a luxury anymore it has become a necessity. However, when the
question of security comes into the scene, the first thought that would arise in my mind is
how you can protect something which you cannot see, neither can you feel it?
Protecting a home wireless network is altogether a different side of the coin as compared to
wired networks. Most of wireless network device vendor‘s and Internet Service provider do
not provide any security settings by default and leave the customer to find for herself. So
make sure, your network is secured from being maliciously used. There is no silver bullet that
will protect your wireless network infrastructure. These are, however, some countermeasures
listed below that should be used in conjunction with each other to secure your wireless
network to the highest level:
1. Use most secure possible encryption: The first and most necessary step- use industry
standard encryptions. The old (however generally used) WEP-Wired Equivalent
Privacy, has been known to be broken. Even you use complex passwords it can be
117
broken and decrypted within minutes or hours. WEP uses 40 bit or 128 bits RC4
ciphers to encrypt the channel. Instead use secure protocols such as WPA 2 – Wi-Fi
Protected Access -2, which uses strong 128 bits AES ciphers and is typically
considered more robust encryption strategy available.
2. Use Firewall: All the wireless routers come with built-in firewalls. Enable them with
all the security features. You should block any anonymous ping requests and place
restrictions on website browsing, if required. Define additional security policies and
apply them.
3. Have a monitoring system in place: There‘s a saying- prevention is better than a
cure. If you are able to detect some suspicious activities before it penetrates your
network, you can block them or take precautionary measures. Deploy WIPS/WIDS
for monitoring suspicious activities.
4. Don’t use default credentials: Every wireless router comes with a set of default
username/password. Sometimes, people don‘t change them and keep using them for
long time. Username and passwords are used by computers or other devices to
connect to wireless router. If any hacker is able to guess them, he can connect to your
network easily. Studies show that majority of users use the same combination of
username/passwords as set by manufacturers. Some default username combinations
are: admin/admin, admin/password or admin/ ― ―.
5. Disable Auto-connect feature: Some devices or the computers/laptops have ‗Let this
tool manage your wireless networks‘ or ‗Connect automatically to available network‘.
Such users having this auto-connect feature enabled are prone to Phishing attack or
Rogue AP attack. Attackers keep their APs alive and kicking for such kind of
unsuspecting users. They also use luring names as ‗HotSpot‘, ‗SecureConnect‘, ‘Govt
Networks‘ etc. The user will never suspect them and keep surfing the wireless
network happily. Also if you have not changed the default password of your router,
the attacker will try to use this feature on their machine and automatically connect
using the easily guessable default passwords.
6. Don’t use public Wi-Fi spots to surf sensitive websites: Free and open wireless
networks available on airports, cafes, railway stations are not very secure by nature.
They do not use any encryption to secure the channel between your laptop to the
router. So any information which is not by default going on HTTPS from your
laptop/smart phone is susceptible to sniffing and even more your session could be
hijacked because the unencrypted channel may leak the active session ID used by
your website. All the attacker needs to do is to just install this tool in Firefox and start
sniffing the communications on a public unencrypted Wi-Fi. Some applications like
Facebook encrypts the login page [HTTPS] but internal pages are served on
unencrypted [HTTP] channel so your session ID can be leaked
7. Change the default SSID: Although this will not prevent hackers breaking into a
network, using a default SSID acts as an indication that the user is careless. So he may
be an obvious target to explore further to see if he still uses the default passwords as
well?
8. Restrict access by assigning static IP addresses and MAC filtering: Disable
automatic IP assigning feature and use private static IPs to the legitimate devices you
118
want to connect. This will help you in blocking unwanted devices from being
connected to your network. Also, enable MAC filtering- router remembers MAC of
each and every device connected to it and saves it as list. You can use this facility to
restrict access. Only a set of trusted devices can be allowed to connect. However
MAC spoofing is still possible but it raises an extra bar for your wireless network.
9. Turn off your router when not in use: Last but not least, a little obvious, but it will
save your network from all the attacks for that time period.
2.10 SUMMERY
1. Wireless security is the prevention of unauthorized access or damage to computers
using wireless networks.
2. Hackers have found wireless networks relatively easy to break into, and even use
wireless technology to hack into wired networks.
3. Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection
Systems (WIDS) are commonly used to enforce wireless security policies.
4. Service set identification (SSID) a series of 0 to 32 octets. It is used as a unique
identifier for a wireless LAN. Since this identifier must often be entered into devices
manually by a human user, it is often a human-readable string and thus commonly
called the "network name".
5. Every wireless router has the ability to broadcast its name, or SSID (Service Set
Identifier). Disabling SSID broadcasting means that your wireless network won‘t
appear in the list of ―Available Wireless Networks‖ on any nearby computer.
6. Encryption is used to hide or mask the data being sent through wireless transmission.
7. WEP is a notoriously weak security standard. The password it uses can often be
cracked in a few minutes with a basic laptop computer and widely available software
tools.
8. WPA offers the benefits Enhancement data security, robust key management, Data
origin authentication and Data integrity protection.
9. In computer networking, MAC Filtering refers to a security access control method
whereby the 48-bit address assigned to each network card is used to determine access
to the network.
10. MAC filtering is not an effective control in wireless networking as attackers can
eavesdrop on wireless transmissions.
11. A wireless router is the most important piece of equipment that allows the internet to
work.
12. Wi-Fi uses radio waves like other wireless devices such as laptops and cellular
phones, and radios
13. A modem is a device that converts the digital signals from a computer into specific
frequencies that can travel to television or telephone lines.
14. A wireless local area network (WLAN) is a wireless computer network that links two
or more devices using a wireless distribution method (often spread-spectrum or
OFDM radio) within a limited area such as a home, school, computer laboratory, or
office building.
119
15. WLAN are also as prone to various attacks as their counterpart wired LANs are.
120
UNIT III: INVESTIGATION AND DIGITAL
FORENSIC
3.2 INTRODUCTION
Welcome to the Post-PC Era, the era dominated by truly portable devices with embedded
GPS, near-field communication capabilities, microphones and HD video cameras and
processing power equal to or greater than traditional computers30. We ‗wear‘ our computers,
we are empowered. Our dependency on cyber space grows by the day, our access points and
networked devices are legion, and our cyber security systems are losing their foothold.
Passwords, firewalls, security keys, encrypted memory sticks: traditional security measures
no longer fully address the many sophisticated new challenges we face. To guarantee security
and trustworthiness of data, industry, governments, businesses and citizens are to align their
behaviors and interests to secure the growing digital-based economy and society. But what
are the drivers behind this new cyber reality?
30
http://cybersecuritymanifesto.com/
121
heralding new avenues for producing, sharing and managing information. A truly
globalized phenomenon, cloud computing is characterized by a services approach to
satisfy the technology needs of organizations and individuals alike. Such is the new
model in and for the IT-industry. Through this ―hyper outsourcing‖, information and
processes move beyond the company walls.
c. The Internet of things will accelerate operational dependency on the net: When all
kinds of physical devices contain embedded networked software paving the way for
‗the Internet of things‘ and so-called ‗smart cities‘, cyber security becomes even more
critical. The unique identification of citizens and objects in the virtual space may be
some way off, yet we must still be prepared. The creation of an interconnected world
and an ambient network will automatically create new possibilities for information
breaches, system attacks and privacy violations.
d. The increasing sophistication of hackers, supported by advanced tools, will turn
complex attacks into a simple click of a button: Amateurs turn professional, and the
tools they use evolve accordingly – such is the common pattern to any popular and
lucrative activity. The greater our dependency on the Internet and the more value we
create from it, the smarter and more agile cyber attackers get. At the same time,
hacking itself is becoming a commodity. For next to nothing you can buy the
necessary tools for reading the SSID‘s of the wireless routers within 3km radius of
you.
e. Regulatory constraints exercise a growing influence on information security:
Protecting the interest of data stakeholders, be they clients, shareholders or private or
public companies, is a raising issue for the regulators worldwide. For instance,
communication about cyber attacks consequences will soon be legally binding and
will lead organizations to ensure full transparent cyber security risk management.
There is also increasing pressure on companies accepting credit cards payments to
have their information system architecture certified by a third party, according to a
standard (Payment Card Industry Data Security Standard) and to conduct penetration
test campaigns with a frequency depending on payments volume.
With the growing incidence of cyber crime, and the increased adoption of digital devices,
digital forensics has gained significant importance in the recent past, augmenting what was
conventionally limited to the recovery and analysis of biological and chemical evidence
during criminal investigations31.
31
http://opensourceforu.efytimes.com/2011/03/digital-forensic-analysis-using-backtrack-part-1/
122
3.3 INVESTIGATION TECHNIQUES & COMPUTER
FORENSICS
Forensics32 is a discipline that dates back at least to the Roman era (and possibly event to
ancient China), when people accused of crimes (and the accuser) presented evidence in front
of a public audience (the Latin word forensics, means "of or before the forum"). In modern
times it has come to mean the application of scientific processes to recover evidence related
to crime or other legal action.
It was not until the 1980s that federal laws began to incorporate computer offences. Canada
was the first country to pass legislation in 1983. This was followed by the US
Federal Computer Fraud and Abuse Act in 1986, Australian amendments to their crimes acts
in 1989 and the British Computer Abuse Act in 1990.
Much of the forensic analysis during this period was performed on "live" systems, using
traditional (and non-specialist) system administration tools. Very few standards or guidelines
existed to help practitioners, and the evidence they produced was often rejected by courts.
Digital forensics is traditionally associated with criminal investigations and, as you would
expect, most types of investigation centre on some form of computer crime. This sort of
crime can take two forms; computer based crime and computer facilitated crime.
3.3.1.1 Computer based crime
This is criminal activity that is conducted purely on computers, for example cyber-bullying or
spam. As well as crimes newly defined by the computing age it also includes traditional
crime conducted purely on computers (for example, child pornography).
3.3.1.2 Computer facilitated crime
Crime conducted in the "real world" but facilitated by the use of computers. A classic
example of this sort of crime is fraud: computers are commonly used to communicate with
other fraudsters, to record/plan activities or to create fraudulent documents.
Not all digital forensics investigations focus on criminal behaviour; sometimes the techniques
are used in corporate (or private) settings to recover lost information or to rebuild the
activities of employees.
32
https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics/A_history
123
3.4 TYPES OF INVESTIGATION
There are four main types of investigation performed by digital forensics specialists. The first
three are broadly similar in the activities involve, but differ in terms of the legal restrictions
and guidelines imposed as well as the type of digital evidence and form of report.
3.5.1Attribution
Meta data and other logs can be used to attribute actions to an individual. For example,
personal documents on a computer drive might identify its owner.
3.5.2 Alibis and statements
Information provided by those involved can be cross checked with digital evidence.
124
3.5.3 Intent
Intent as well as finding objective evidence of a crime being committed, investigations can
also be used to prove the intent (known by the legal term mens rea).
3.5.4 Evaluation of source
File artifacts and meta-data can be used to identify the origin of a particular piece of data. for
example, older versions of Microsoft Word embedded a Global Unique Identifer into files
which identified the computer it had been created on. Proving whether a file was produced on
the digital device being examined or obtained from elsewhere (e.g., the Internet) can be very
important.
3.5.5 Document authentication
Related to "Evaluation of Source", meta data associated with digital documents can be easily
modified (for example, by changing the computer clock you can affect the created date of a
file). Document authentication relates to detecting and identifying falsification of such
details.
Identification
Data
Presentation
acquistion/preservation
125
3.7 FORENSICS TOOLS
In the early days of digital forensics analysts had to make do with existing system
administration or information security tools. Plenty of these existed, but they were not
particularly suited to the more formal approach of a forensic investigation. In particular much
of the software required you to run it on the live system, which introduced all manner of
problems with modifying evidence.
During the 1980s and 90s, however, increased funding and interest in the field encouraged
the development of a variety of specialist commercial and freeware tools. These can generally
be broken down into three categories:
General forensic tools: Tools allowing a wide variety of investigation, particularly
keyword searching, on digital media.
Specialist forensic tools: Which focus on a specific piece of forensic material for
investigation - perhaps images, or internet artifacts. Often relying on output from one
of the general tools.
Case Management tools These are used to track, audit and report on cases
In addition there is a "fourth" category of useful software, a normal piece of software which
can usefully be adapted for use in a forensic investigation. The next section makes mention of
several commercial tools. This is not an endorsement of the tools, they are intended to serve
as examples to explore
3.7.1 General forensic tools
Many of these tools are complex, commercially produced, and come with enterprise price
tags (in the region of thousands of dollars a year). The majority of commercial tools run on
Windows whilst free tools tend to run on Linux. Later on we will discuss the ways digital
media can be investigated in more depth, but for the moment it is important to understand
that general forensic software is usually centred around the act of keyword searching across a
piece of digital media. The two most common ways of performing such searches is "live
search" (where the digital media is parsed for a set of keywords and bookmarks of hit
locations is stored) and "indexing" (where a text index of the digital media is created,
allowing searches to be performed quickly using the index). Both styles have advantages and
disadvantages.
The "de facto" industry standard tool is usually considered to be EnCase, produced by
Guidance Software. It is a general forensics tool tailored for windows systems and focuses on
the live search method. It includes a scripting interface, dubbed EnScript, which is useful for
developing custom tools to extract information. EnCase is closely followed by Access
Data's Forensic Toolkit (or FTK). FTK focuses on indexing media and is often used in cases
where large volumes of data are being investigated, or where a large list of keywords needs to
be searched.
126
3.7.2 Specialist forensic tools
Specialist tools focus on a particular aspect of forensic investigation; for example
categorising images or recovering internet artefacts. The range of tools and software is vast,
including commercial and free offerings.
One of the better known is a free tool called "Categoriser 4 Pictures" which is a helper tool
for classifying images and presenting your results. C4P is a class of tool that relies on output
from EnCase, using an EnScript to parse and extract images for processing.
Another common theme for specialist tools is internet artefacts; this can range from
recovering internet cache data (web pages and other fragments) to analysing internet history
or recovering chat transcript. Internet artefacts often contain a large amount of useful
evidence and it is a common focus for investigations. Some notable tools include:
Netanalysis; commercial tool, parses internet history files (.dat) and allows
searching/analysis of the data.
Internet Evidence Finder; commercial, scans digital media for a variety of internet
artefacts (i.e. chat, webmail and internet history)
Virtual Forensic Computing; allows digital media containing an operating system to
be mounted as a virtual machine.
3.7.3 Case management
We already touched on case management in "Documenting evidence", but it is included here
for completeness. Very few (if any) software tools exist for complete case management
(although some practitioners adapt case management tools from the law field). Several free
cases note tools exist for creating audit-able notes; the primary example being CaseNotes.
Many analysts still use paper documents, partly because this is an audit trail that courts
understand and accept!
3.8 INVESTIGATION
Today, nearly all abusive e-mail messages carry fake sender addresses33. The victims whose
addresses are being abused often suffer from the consequences, because their reputation gets
diminished and they have to disclaim liability for the abuse, or waste their time sorting out
misdirected bounce messages.
33
http://www.openspf.org/Introduction
127
You probably have experienced one kind of abuse or another of your e-mail address yourself
in the past, e.g. when you received an error message saying that a message allegedly sent by
you could not be delivered to the recipient, although you never sent a message to that address.
Sender address forgery is a threat to users and companies alike, and it even undermines the e-
mail medium as a whole because it erodes people's confidence in its reliability. That is why
your bank never sends you information about your account by e-mail and keeps making a
point of that fact.
In the following sections we will touch upon how email works and techniques to find fake
email. But before that, we are going to introduce some important terminologies which we are
going to use throughout.
1. Protocol: Protocols are the set of rules and procedures governing the transmission of
data over network.
2. Internet Domains: Internet domain names are the alphanumeric identifiers we use to
refer to hosts on the Internet, like "LivingInternet.com". Internet domain names come
in four main types34:
top-level domains
second-level domains
third-level domains, and
country domains.
a. Top-level domains. Internet domain names are organized by their levels, with the
higher levels on the right. For example, for the domain "mail.twenty.net" the top-
level domain is "net", the second-level domain is "twenty.net", and the third-level
domain is "www.twenty.net". Some of the popular top level domain names are
.com, .net, .biz, .gov. etc/
b. Second-level domains. Top-level Internet domains like ".com" are shared by all
the organizations in the domain. Second-level domain names like "yahoo.com"
and "livinginternet.com" are registered by individuals and organizations. Second-
level domains are the addresses commonly used to host Internet applications
like web hosting and email addressing.
c. Third-level domains. Third-level Internet domain names are created by those that
own second-level domains. Third-level domains can be used to set up individual
domains for specific purposes, such as a domain for web access and one for mail,
or a separate site for a special purpose:
www.livinginternet.com
mail.livinginternet.com
34
http://www.livinginternet.com/e/ew.htm
128
rareorchids.livinginternet.com
3. The Domain Name System (DNS): DNS as a whole consists of a network of servers
that map Internet domain names like www.livinginternet.com to a local IP addresses.
The Domain Name System (DNS) servers distribute the job of mapping domain
names to IP addresses among servers allocated to each domain. Each second-level
domain must have at least one domain name server responsible for maintenance of
information about that domain and all subsidiary domains, and response to queries
about those domains from other computers on the Internet. For example, management
of domain name information and queries for the LivingInternet.com domain is
handled by a specific DNS server that takes care of the load required. This distributed
architecture was designed to enable the Internet to grow, where as the number of
domains grew, the number of DNS servers can grow to keep pace with the load.
Today, everyone who registers a second-level domain name must at the same time
designate two DNS servers to manage queries and return the current IP address for
addresses in that domain. The primary domain name server is always consulted first,
and the secondary domain name server is queried if the primary doesn't answer,
providing a backup and important support to overall Internet reliability.
Your computer asks your default DNS server if it knows the IP address for
www.livinginternet.com. If the DNS server has been asked that question
recently, then it will have the answer stored in its local cache, and can
answer immediately.
Otherwise, your DNS server queries the central zone files for the address
of the primary domain name server for livinginternet.com, and is answered
with something like "ns1.livinginternet.com".
Your DNS server will ask the livinginternet.com DNS server for the IP
address of www.livinginternet.com, which will then look up the answer
and send it back.
Your DNS server will store the IP address returned in its local cache, and
make the address available to your computer.
129
Your computer then contacts www.livinginternet.com with the standard
Internet routing protocols by using the returned IP address.
4. Email servers: Each Internet domain has an associated email server that manages all
email addresses at that domain. Each email address is expressed in the form
"name@domain" and is unique at that domain, as in for example "[email protected]".
5. IP Address: Every computer on the Internet has a unique numerical address, called
an Internet Protocol (IP) address, used to route packets to it across the Internet. Just as
your postal address enables the postal system to send mail to your house from
anywhere around the world, your computer's IP address gives the
Internet routing protocols the unique information they need to route packets of
information to your desktop from anywhere across the Internet. If a machine needs to
contact another by a domain name, it first looks up the corresponding IP address with
the domain name service. The IP address is the geographical descriptor of the virtual
world, and the addresses of both source and destination systems are stored in the
header of every packet that flows across the Internet. You can find your IP address on
a Windows computer by opening an MSDOS or Command window and typing one of
"winipcfg" or "ipconfig". You can find your IP address on a Mac computer by
checking your Network control panel. An IP address is made up of four bytes of
information (totaling 32 bits) expressed as four numbers between 0 and 255 shown
separated by periods. For example, your computer's IP address might be 238.17.159.4,
which is shown below in human-readable decimal form and in the binary form used
on the Internet.
Example IP Address
Decimal: 238 . 17 . 159 . 4
Binary: 11101110 00010001 10011111 00000100
Each of the four numbers uses eight bits of storage, and so can represent any of the
256 numbers in the range between zero (binary 00000000) and 255 (binary
11111111). Therefore, there are more than 4 billion possible different IP addresses in
all:
6. Email client: Your email client application communicates with an email server over
the Internet to login, get mail status, and send and receive email. The most common
email client are Internet Explorer, Morzila, Crome, etc.
7. POP3: Your email client talks to your email server to send it commands to login, get
mail status, and send and receive email. The most common protocol used by email
clients to communicate with email servers is the Post Office Protocol. POP3 has
become the most common email client connection protocol. The POP3 protocol
enables any email program anywhere on the Internet to connect to any email server to
130
perform the usual email functions, such as reading and sending, as long as they have a
valid account and password.
8. The Internet Message Access Protocol (IMAP): is a less common but more richly
featured email protocol than POP3. IMAP is a more modern protocol than POP3, first
invented at Stanford University in 1986. The current version is IMAP4, providing
similar services to the POP3 protocol, but with additional features. The IMAP features
can be useful in several situations, for example when you are travelling and don't want
to download your email onto a laptop because then you won't have them on your
home computer when you get back. It can also be useful for use on low-bandwidth
devices like personal digital assistants, enabling you to select a few email from a list
of subject headers before downloading just the ones you want.
9. Messaging Application Programming Interface (MAPI): is a Microsoft Windows
specific email interface.
10. Simple Mail Transfer Protocol (SMTP): is an Internet communication
protocol used to send and relay an email message between email servers. It is not used
to retrieve email messages from a server. Instead either IMAP or POP is used to
retrieve email messages.
35
http://ccm.net/contents/116-how-email-works-mta-mda-mua
131
Figure 25: Working of an email
To use a real-world analogy, MTAs act as the post office (the sorting area and mail carrier,
which handle message transportation), while MDAs act as mailboxes, which store messages
(as much as their volume will allow) until the recipients check the box. This means that it is
not necessary for recipients to be connected in order for them to be sent email.
To keep everyone from checking other users' emails, MDA is protected by a user name called
a login and by a password.
Retrieving mail is done using a software program called an MUA (Mail User Agent).
When the MUA is a program installed on the user's system, it is called an email client (such
as Mozilla Thunderbird, Microsoft Outlook, Eudora Mail, Incredimail or Lotus Notes).
132
3.10.1 Sender Addresses in E-Mails
Like paper mail letters, e-mail messages have at least two kinds of sender addresses: one on
the envelope and one in the letterhead.
The envelope sender address (sometimes also called the return-path) is used during
the transport of the message from mail server to mail server, e.g. to return the message
to the sender in the case of a delivery failure. It is usually not displayed to the user by
mail programs.
Header
Body
Signature
133
Figure 27: Fields of an email
One of the most important and useful applications of the internet is undoubtedly the sending
and receiving of emails36. Apart from their almost instant nature they are also effectively free.
Unfortunately this also makes email an ideal medium of abuse, in the sense that because it is
free to send an email, it is also free to send a million emails. The major ISP‘s estimate that of
the billions of emails being sent and receiving, about 50% of them are spam (or UCE –
Unsolicited Commercial Email). For many people who have the same email address for a
period of years, the amount of spam can be counted in thousands a day.
Then next section will discuss how to identify fake mails and procedure to identify the origin
of a fake email.
36
http://codeworks.gnomedia.com/westhost-introduction/email-system-part-1-the-main-components/
37
http://www.usethistip.com/2012/11/how-to-identify-fake-email-and-trace.html
134
Figure 28: A sample of fake email8
So you must know how to identify whether the email is fake or not.
See the sample email snapshot:
See the sender's name and email. It's Mark Zuckerberg from email
address [email protected].
This email is just an example. But these can be very harmful when sent by spammers.
Suppose it pretends to be sent from your bank and asks for your banking username or
password. There are so many examples which show why you must know about fake emails.
3.10.3.2 How to Identify Fake Email
It is really simple to identify a fake email. Click on the down arrow at the right side of the Me
as shown in the snapshot.
135
Figure 30: Procedure to find out the details of the sender
Here you will see some details about the email. If the email comes from a trusted source, you
will be able to see two more fields, Mailed By and Signed By. See the snap below:
This method can be applied only for the emails coming from big companies like Google,
Facebook, LinkedIn, Twitter and other companies which have their own servers. Email sent
from Gmail will be mailed by and signed by Gmail. But there are so many small companies
that does not have dedicated server. They use Gmail labs or their own hosting server. Email
136
coming from those may not show these two fields in mail. So we need to confirm this by one
more way.
Now we will see the header of email. To see the header of email, click on down arrow at the
right side of the reply icon and click on show original. Now it will open plain text email
content with header information in a new tab.
Header information looks like this. Search for Received: from in this page. If there are more
than one Received: from in the page, the go for the last one and see the domain there.
137
It shows emkei.cz in the fake mail sent by me. Now see the website emkei.cz and you will
know that the domain belongs to a fake mail sender website.
If you see the header of some other emails, you will see that header comes with too many
information which are not present in the header of this fake mail.
To get the IP address of the sender in the email header, search for X-originating-IP: and you
will get the IP address of the sender.
Now see the header of fake mail added above as snap by me, you will not find this field. It
means it does not reveal the IP address of sender.
If you get the IP address, now you can use any IP tracer online tool to get the IP address. Use
WhatIsMyAddress Ip Lookup tool available at https://www.whatismyip.com/ip-address-
lookup/
Note: If a person is using dialup connection with dynamic IP, IP Tracing will only trace up to
the IP address of the ISP. For getting exact location, you need to contact ISP which is
impossible without the permission of cyber police. If a person has purchased a dedicated IP
connection, you will get the exact location of it.
Here the time zone is +0100. Treat it as +01:00. Although, there will be so many countries
belongs to a timezone, but you may get an approx idea.
38
https://www.communications.gov.au/what-we-do/internet/stay-smart-online/your-identity/recognise-
scam-or-hoax-emails-and-websites
138
trick you into disclosing personal information such as bank account details,
passwords or credit card numbers.
con you into paying money for fake get-rich-quick offers, prizes or lottery wins, or
fraudulent or poor quality goods.
Be suspicious of emails from people or businesses you don't know, particularly if they
promise you money, good health or a solution to all your problems.
Be suspicious of unexpected emails from your bank or financial institution. Remember banks
don't do business via email and never ask for confidential information via email. Scammers
put a lot of time and money into making hoax emails and bogus websites look real. Don't be
fooled.
3.12.1 Scams
There is a huge range of scams on the internet, from promises of non-existent free products in
return for clicking through to a website (which make advertising profits), to sophisticated
targeted scams which can run for years and cost victims hundreds of thousands of dollars.
419 or 'Nigerian
letter' advance fee The writer is in another (usually underdeveloped)
country.
These messages
are sent to They own of a huge sum of money, but need the help
Email (or letter) claiming to be from a of a foreign partner (you) in order to access it.
thousands of
solicitor, barrister, public official or
people on the
some other authoritative person.
probability that Help them access the money and you will receive a
some will believe share of it.
the story and
forward the
You 'wire' them a small advance fee for some
advance fee.
contrived reason (for example clearance fees, tax).
139
Their profile pictures look professional and might
Dating and have been cut and pasted from a website or magazine.
romance
They attempt to become intimate quickly.
They attempt to Fake profiles on dating sites or
enter into an online responding to profiles with fake
personas They may say they live close by, but are unable to
relationship with
arrange a meeting or suddenly have to travel overseas.
the victim in order
to persuade them A friend request or message in social
to forward money media or a communications service such There are signs the correspondence might be cut and
or divulge personal as Skype. pasted or taken from template, for example wrong
details. names, inconsistent or disjointed grammar.
Generally, any offer that promises a large reward for a small fee is almost certainly
a scam.
Never provide personal details via emails or links from emails. If you are unsure,
double check by telephone with the company or institution.
Never follow the links in spam emails; these could lead to downloading unwanted
viruses, spyware or malware.
Ensure that you have up-to-date anti-virus and anti-spyware software installed on
your computer.
Install a firewall on your computer and make sure it is activated.
140
investigating a fake social media profile in one of the most common social media platform,
facebook in the next section.
2. Don't talk to strangers. At the least, think twice about accepting friend requests from
people you don't know and who are not connected to you through legitimate, verifiable
means. If you're not sure, do the following:
Ask them questions: What makes you want to be your friend? How did they find out
about you? Who do you know in common? By clicking on their name, you can see if
you have any mutual friends. If you do, contact your friend. If not—that's a big red
flag.
3. Do a little detective work. At the very least, it can be fun. You might also find out that
your would-be "friend" is really bad news.
4. Read the profile carefully. Does what is being said add up or are there some really hard-
to-believe statements being made? For example, maybe there is a photo of a very young
person next to claims of being a professor or a CEO. Does the embellishment seem more than
the usual "making oneself look good" and come across as simply implausible? Trust your
own senses on this one. You could even ask for proof of some of the things the person has
stated—they're approaching you, after all. You have every right to make sure they're
legitimate.
5. Check out their profile picture. Is there only one? Is it way too perfect or does it seem
touched up in any way? Maybe you've seen it before? A good photo — or a touched up one
— may not be a negative sign, but it could be that they've simple scoured Google for an
attractive photo, thinking nobody would ever find out. Try this:
Click and drag their profile picture to your desktop.
Launch Google Chrome or Firefox, and navigate to Google Images.
39
http://www.wikihow.com/Reveal-a-Fake-Facebook-Account
141
Figure 35: Google Image search
Drag and drop the profile pic into the search field: it will expand, as shown:
Google will either return an exact match (with information like names), or pictures
similar to the original.
6. Search their name online to see if it returns. This won't be so useful if the name is a
common one, but for a more unusual one there might be some interesting returns.
If they have a common name, add other information such as their location,
approximate age, or any other information you can glean from their profile.
Have they been tagged? A real person is generally tagged here and there as part of the
Facebook sharing experience.
7. Check out their friends. Are their friends global or local? The more local the friends, the
more likely the person is to be real. The more global their friendship list, with very few or no
142
local friends, start getting suspicious. The lack of local friends suggests that this is not a real
person you're dealing with but a fake account. This is often used by people pretending to be
attractive young women. They will often contact you with a line like "I saw your picture and
you looked nice."
8. Block the request. If you don't have a good feeling about somebody, there's a simple
solution: don't just turn down the request for friendship, block them completely.
Click on their Facebook name, and go to their Timeline. On the right, under the Cover
Photo, click on the Message settings.
You can block them from contacting you, or report them to Facebook if you feel they
are a threat or involved in illicit or illegal activities.
9. Create a "probationary period." If you're in the (not-so-great) habit of accepting friend
requests from friends of friends' friends, or friend people because they seem to have similar
tastes to yours in music, cooking, dancing, or whatever, then you leave yourself open to the
occasional fake.
While you can make wonderful connections in this way, try to always have
someone you do know vouch for this person first. And if that's not possible, be
alert to signs of weird behavior, such as suddenly bombarding you with likes,
comments, photos, etc. on a daily basis.
If you hardly know this person, they should be taking things slowly and
politely, not invading your space immediately.
If, after a week or two, you're not comfortable with your new friend, unfriend
them!
10. Beware interconnected faking. At one time it was probably reasonable to think that
if someone had a group of friends interacting with them and vouching for each other,
that that person must be real. Not anymore!
There are increasing cases of one person running numerous fake Facebook
accounts, pretending to be an array of different people, all vouching for one
another and all trying to be friends with someone real!
An excellent example is the case of Natalia Burgess, who wove a web of
deceit and caused many young males to fall for her various aliases — all
because she felt inadequately loved. Sadly, impostors of this sort go to
incredible lengths to create an array of fake accounts including other social
media accounts and websites to give the impression that their fake personas are
"real".
11. Look for and record inconsistencies. If you're being targeted by an elaborate web of
lies, eventually these start to unravel. This is most evident in someone who is trying to
maintain several fake Facebook accounts at once and eventually, they will drop the
ball and mix up their stories.
If you start noticing this in response to questions, or in their comments, take
note and remain alert for more inconsistencies.
12. Do a double take if the person says anything weird or "out-of-character".For
example: if an adult is pretending to be a teen, they may say something that dates
143
them by referring to a historic event or person that teens wouldn't really know much
about. Or they may prove to know way too much about a topic that someone they're
claiming to be would not.
Take note of what the suspicious person says, as everyone slips up! No one is
perfect, and they're bound to eventually say something that will give you a
hint that your hunch is correct.
13. Be really wary of undying declarations of love, affection, and romance. If
someone you've never met, who lives thousands of miles away from you, and who has
barely revealed themselves gets amorous with you, be suspicious. Sometimes the
faker does this because they love the feeling of playing with the life and feelings of
someone else; sometimes it's because they're in love with online love but are too
afraid to reveal their true selves (or they're in a relationship in real life); and other
times it could be that they're after something, like money, sex, or drugs.
Question your own feelings and motivations if you start to feel something for
a person who declares they love you online. Is it too sudden? Too weird? Too
freaky? A little bit icky? Trust those feelings and delete this fake friend from
your account.
If they ask you for sexy pictures, immediately be suspicious. A fake account is
a good shill for getting free pornographic material that then gets passed around
online.
14. Unfriend them! If you're suspicious, unsure, or uncomfortable with having them as
part of your Facebook friends, pull the plug. It's not like they're your real friends or
family, and they could cause you a lot of future problems.
Warn other friends of yours on Facebook if you know they have also friended
the fake account; one of the tactics of an impostor is to befriend others in your
circle of friends to try to make the friendship seem more "real
Tips
a. Be careful what you put online and what you tell people you don't
really know. Some people act very caring until they have enough
information about you and then they turn around and blackmail you
with it. If you don't know the person, no matter how friendly you've
become in the online context, keep back your private details and keep
everything very general.
b. Look for evidence of offline interaction with their Facebook friends.
However, keep in mind that even this can be faked if they're running
multiple Facebook accounts.
c. Check any links they've provided to personal websites, social media
pages, etc., to help you to see if things add up.
Warnings
144
b. Keep an eye on your teens. Young people are the most vulnerable to
building online relationships with people who don't exist. They fall in love
with an image of the perfect person and the faker is happy to oblige for
their own gratification or other reasons.
3.14 SUMMERY
1. The word ―cyber‖ is derived from the Greek term ―cybernetic‖ meaning ―skilled in
steering or governing‖.
2. Forensics is a discipline that dates back at least to the Roman era (and possibly event
to ancient China), when people accused of crimes (and the accuser) presented
evidence in front of a public audience (the Latin word forensis, means "of or before
the forum").
3. The first specific computer crimes were recognized in the 1978 Florida Computer
Crimes Act, which included legislation against the unauthorized modification or
deletion of data on a computer system.
4. Canada was the first country to pass legislation in 1983.
5. Computer based crime is a criminal activity that is conducted purely on computers,
for example cyber-bullying or spam.
6. Computer facilitated crime is a crime conducted in the "real world" but facilitated by
the use of computers.
7. There are four main types of investigation performed by digital forensics specialists.
They are criminal forensic, intelligence gathering, electronic discovery and intrusion
investigation.
8. A digital forensic investigation generally consists of five steps viz. identification, data
acquisition, data recovery, analysis and reporting.
9. Protocol are the set of rules and procedures governing the transmission of data over
network.
10. You can find your IP address on a Windows computer by opening an MSDOS or
Command window and typing one of "winipcfg" or "ipconfig".
11. The POP3 protocol enables any email program anywhere on the Internet to connect to
any email server to perform the usual email functions, such as reading and sending, as
long as they have a valid account and password.
12. IMAP is a more modern protocol than POP3.
13. The IMAP features can be useful in several situations, for example when you are
travelling and don't want to download your email onto a laptop because then you
won't have them on your home computer when you get back.
14. Spammers want to avoid receiving non-delivery notifications (bounces) to their real
addresses.
15. Fraudsters want to cover their tracks and remain anonymous.
16. Computer worms want to cause confusion or just don‘t care about which sender
addresses they use.
17. Phishers want to impersonate well-known, trusted identities in order to steal
passwords from users.
145
18. The envelope sender address is used during the transport of the message from mail
server to mail server, e.g. to return the message to the sender in the case of a delivery
failure.
19. The header sender address of an e-mail message is contained in the "From" or
"Sender" header and is what is displayed to the user by mail programs.
20. Fake emails or fake mails are those emails which pretend to come from a specific
email address but are sent from some fake email senders.
21. Use WhatIsMyAddress Ip Lookup tool available at https://www.whatismyip.com/ip-
address-lookup/ to lookup the origin of an IP address.
3.15 ACTIVITY: DO IT YOURSELF
1. Google the term identity theft and find out more on the topic.
2. Google the term social engineering attacks and find out how hackers use this
techniques to find out your personal information.
3. Find out more about ―Internet of things(IOT)‖. Study about the lattest application
of IOT.
I. US was the first country to pass legislation for computer offence in 1983.
III. Focus is criminal forensic on forensically sound data extraction and producing
report/evidence in simple terms that a lay man will understand.
IV. Meta data and other logs can be used to attribute actions to an individual.
146
X. The envelope sender address is used during the transport of the message from
mail server to mail server.
i. False
ii. False
iii. True
iv. True
v. True
vi. False
vii. False
viii. False
ix. False
x. True
2. Fill in the blanks
i. Bring Your Own Device.
ii. Payment Card Industry Data Security Standard.
iii. Intrusion investigation
iv. Artefacts
v. Categoriser 4 Pictures.
vi. Mail Transport Agent.
147
8. What is ― live search‖?
9. What are internet domains?
10. What is the difference between POP3 protocol and IMAP protocol. Which is
better?
11. What is an IP address.
12. How email works? Explain with a help of a diagram.
13. Explain the different types of email abuse.
14. Explain the steps to trace the location of an email sender.
15. Explain the motivation behind designing scam or hoax websites.
148
UNIT IV:INTRODUCTION TO CRYPTOGRAPHY
4.2 INTRODUCTION
Cryptography is "Art of writing or hiding secret". It is a science of protecting the information
from theft or unauthorized access. To do so, important or confidential information is hided as
or converted to some other form of gibberish data. Now original information can be
recovered only by the right person or application40.
Cryptography was developed to create secure communication while there was a third-party
present also known as adverseries41. In the beginning, the cryptographic codes were written
by hand to convert plaintext to cipher-text and vise-versa. Early cryptography was messages
written in a language the other party could not read or words that were written in reverse
order. Cryptography was used mainly by military officers and spies to secure the
confidentiality of the messages.
Cryptography is the art of writing and solving code. It is used to secure files and is similar to
a puzzle in which the message is scrambled using algorithms and unscrambled using another
set of algorithms. Encryption is used in protecting passwords, securing classified messages
and also used to protect personal and sensitive data.
The example of cryptography can be seen everywhere in our daily lives. For example the e-
mails we send through g-mail or other mail servers are encrypted using algorithm to make
sure no one else can intercept the messages being send and read them. The way the computer
hides the password when we log in is also a form of cryptography.
40
http://www.go4expert.com/articles/introduction-cryptography-t24529/
41
http://icsproject.wikispaces.com/Cryptography
149
4.2.1 Cryptography Objectives
Cryptography is needed in various scenarios varying from simple encryption of a small file to
the complicated usages of smart cards used for windows authentications.
Fundamentally, it is used in below mentioned scenarios
Data at Motion - Cryptography is required when communicating over any non trusted
medium. This medium can be internet, mobile phones, bank automatic teller machines,
wireless intercom systems, Bluetooth devices, wireless microphones and portable storage
disks. These days, organizations invest heavily to secure all the business communications
like emails using cryptographic techniques and products. This is to ensure that no one else
other than the trusted recipient can read the message.
Data at Rest - Cryptography is must in securely storing all the sensitive and vital data.
This is a basic provision mentioned in most of the compliances which an organization
must meet. A simple example for this is Encrypting File system (EFS) which is a file
system introduced in Windows operating system to provide file system level protection.
Data integrity - Cryptography not only protects the information, but also verifies the
integrity of data. This is necessary to ensure that the transferred data has not been
tampered by a hacker.
Before discussing cryptography in detail, let us first gear up with some common
terminologies used frequently in cryptography.
4.2.2 Cryptography Glossary
1. Key- In the world of cryptography, ―Key‖ refers to a digital data or file which
mathematically determines the output of a cryptographic algorithm when applied to an
input message.
2. Encryption- Encryption is a process of transforming information, using mathematical
algorithms, to some sort of ―nonsense‖ data. To encrypt a message or plain text, one
needs to select an Encryption algorithm and a key (or a key – pair, based on encryption
algorithm)
3. Decryption- Decryption is the reverse process of encryption, in which the encrypted
message is processed and transformed back to the original message.
Decryption can succeed if and only if, the correct algorithm (the one used during
encryption process) and authentic keys are used.
4. Digital certificates- Digital certificates are file used for proving the authenticity of the
user or sender. Digital certificates have information about the authority, which has issued
the certificate and also, to whom the certificate is issued. Now, there are worldwide
trusted certifying authorities (CA) like VeriSign, etc. So, any certificate issued by a
Trusted CA, can be trusted as authentic and any information (generally cryptographic
keys) contained in the certificate can be safely assumed to be from a trusted source.
42
https://learn.saylor.org/course/cs409
150
privacy or confidentiality, integrity, and non-repudiation. To meet these security
requirements, we employ secret key (or symmetric) cryptography, public-key (or
asymmetric) cryptography, and hash functions.
151
The public key is meant to be distributed publicly whereas the corresponding private
key must be kept much secured, ideally in a HSM (Hardware Security Module)
device.
If some information is encrypted by a public key, it can be decrypted only by the
corresponding private key. Thus, in this scheme, it is not necessary for the sending
and receiving users to share the common secret. The recipient distributes his public
key. Sender encrypts the data using this public key. Now the data can be decrypted
only by the receiver because he only has the correct private key.
3. Hash functions - Hash functions are one-way cryptographic schemes. In this method,
a plain text is processed by the hash algorithm and the output is the hashed value of
the original text. From this hashed value, it is impossible to recover the original
information. Now a days, Hashing function and algorithms are used in the
Authentication module of almost every application including the Windows
authentication mechanism.
4.4 WHY OS ENCRYPTION IMPORTANT?43
Do you know who may be reading your E-Mail? It is transmitted in plain text over unknown
pathways and resides for various periods of time on computer files over which you have no
control. Whether you're planning a political campaign, discussing your finances, having an
affair, completing a business deal, or engaging in some totally innocuous activity, your
messages have less privacy than if you sent all of your written correspondence on postcards.
Cryptography today involves more than encryption and decryption of messages. It also
provides mechanisms for authenticating documents using a digital signature, which binds a
document to the possessor of a particular key, while a digital timestamp binds a document to
its creation at a particular time. These are important functions which must take the place of
equivalent manual authentication procedures as we move into the digital age. Cryptography
43
https://www.efa.org.au/Issues/Crypto/crypto1.html
152
also plays an important part in the developing field of digital cash and electronic funds
transfer.
Public key cryptography systems work with public and secret (or private) keys. You generate
these yourself as a once-only task. You distribute your public key to anyone who may need to
send you encrypted information, or you can place it on one of the many public-key
repositories around the globe. Your public key is then used by others to encrypt messages
sent to you. Only you can decrypt such a message since the secret key is needed to perform
this task. In practice, because public key encryption is a time-consuming process, many
cryptosystems only use the public key to encrypt a random session key, which is then used to
encrypt the actual message.
153
4.5 PUBLIC KEY CRYPTOGRAPHY44
4.5.1 Public keys and private keys
When using public key cryptography, Alice and Bob both have their own key pairs. A key
pair consists of a public key and a private key. If the public key is used to encrypt something,
then it can be decrypted only using the private key. And similarly, if the private key is used to
encrypt something, then it can be decrypted only using the public key. It is not possible to
figure out what the private key is given only the public key, or vice versa. This makes it
possible for Alice and Bob to simply send their public keys to one another, even if the
channel they are using to do so is insecure. It is no problem that Eve now gets a copy of the
public keys. If Alice wants to send a secret message to Bob, she encrypts the message using
Bob's public key. Bob then takes his private key to decrypt the message. Since Eve does not
have a copy of Bob's private key, she cannot decrypt the message. Of course this means that
Bob has to carefully guard his private key. With public key cryptography it is thus possible
for two people who have never met to securely exchange messages.
4.5.2 Combining public key and secret key cryptography
A problem with public key cryptography is that it is very slow. Encrypting a message that is
several megabytes long takes a very long time, much longer than when using secret key
cryptography. For this reason few people use only public key cryptography. What Alice
usually does is encrypt the message using a secret key encryption algorithm and a key she
made up on the spot. She then encrypts this key (called the session key) using Bob's public
key. Bob can then obtain the session key by decrypting it using his private key. And with the
session key he can decrypt the message. This way a long message is encrypted very quickly
and Alice can still send it to Bob without needing a secure way of agreeing on the key.
4.5.3 How public key cryptography works
Public key cryptography systems are usually based on the assumption that a particular
mathematical operation is easy to do, but difficult to undo unless you know some particular
secret. This particular secret that serves as the private key. The two most famous public key
cryptography systems are Diffie-Hellman and the RSA system, named after its inventors
Rivest, Shamir and Adleman. More recently public key cryptography based on so-called
elliptic curves has gotten a lot of attention. Using public key cryptography it is possible to
easily encrypt a message for multiple recipients. It is even possible to later authorize
recipients to read the message. The message is simply encrypted with a session key. The
session key is encrypted multiple times, once for every recipient using his public key. If later
another recipient needs to be added, the session key is simply then also encrypted using his
public key. Every recipient can now decrypt the session key independently from every other
recipient.
4.6 APPLICATIONS OF PUBLIC KEY CRYPTOGRAPHY
4.6.1 Secure Web communication
One important application of public key cryptography is encrypted communication with a
Web server. This enables Alice to securely place an order and to transmit her credit card
details. Alice's Web browser generates a random number which will be used to encrypt all
44
http://www.iusmentis.com/technology/encryption/crashcourse/publickeycrypto/
154
communication with the server using secret key cryptography. The browser obtains a copy of
the public key of the server and uses this public key to encrypt this random number (called
the session key). The result is sent to the server. After that, browser and server can encrypt all
information so that Eve cannot read it.
Alternatively, it is the server that generates the session key. This requires that the browser
sends its own public key to the server so that the session key can be transmitted securely.
This makes it easier to upgrade the hardware or software that generates the session key.
4.6.2 Secure content distribution
Content such as music or video can be distributed in encrypted form. To be able to play it
back, the recipient needs the decryption key. To avoid having to encrypt the entire movie or
song again for every recipient, the content is encrypted with a session key. Every recipient
receives the encrypted content together with the session key. The session key is of course
encrypted using the recipient's public key. This way only a very small amount of data needs
to be encrypted again for every recipient.
It is even possible to distribute the encrypted content in advance. If the recipient wants to
play back the content, he can at any time contact the distributor and obtain (purchase) a copy
of the session key encrypted using his public key. This is sometimes called 'superdistribution'.
If Alice and Bob cannot meet in private to agree on the key, it is very difficult for them to use
secret key cryptography. If they simply agree on a key by e-mail for example, Eve could be
listening in on their e-mail conversation and thus also learn what the key is. If Alice and Bob
45
http://www.iusmentis.com/technology/encryption/crashcourse/secretkeycrypto/
155
had a secure channel that Eve could not tap, they could use that channel to agree on a secret
key. However, then they could also use the secure channel to simply transmit their messages.
This problem is solved by using public key cryptography, which is discussed in the next
section.
4.7.3 How secret key cryptography works
Secret key cryptography transforms (scrambles) a message into something resembling
random noise. The precise transformation is determined by the key. Mathematically seen, a
cryptographic algorithm is a function that maps a message onto a ciphertext (an encrypted
message). By using keys, it is possible to encrypt many different messages using one
particular cryptographic algorithm in different ways. And keeping the key a secret is much
easier than keeping a complete algorithm a secret.
Some cryptographic algorithms operate on single characters of the message. These are called
stream ciphers. Others operate on entire blocks, and therefore are called block ciphers.
Stream ciphers are easier to implement in hardware than block ciphers, and they are also
generally faster. Block ciphers tend to be harder to crack. We will discuss an example of a
secret key cryptographic system to further elaborate the concept.
A very simple technique to encrypt messages is to replace every letter of the message with
one that is a certain number of positions further in the alphabet. The key then is the number
of positions. For example, the message "This is an example" can be encrypted using the key
"1 position" into the encrypted message "Uijt jt bo fybnqmf". Taking the letter that is 1
position previous in the alphabet results in the original message again.
This system is of course not very secure. There are only twenty-six possible keys. Eve can
simply try out all the keys to see which one results in a readable message. Furthermore, it is a
well-known fact that certain letters occur more often in messages than others. The letter "e" is
the most frequently used letter in the English language, for example. Using this fact Eve can
simply count which letter occurs the most often in the encrypted message and replace that
one with the letter "e". She then knows how many positions she has to rotate to get from "e"
to the encrypted version of "e" and thus she immediately knows the key.
In principle, all cryptographic systems can be broken. At the very least, Eve can try out all
different keys until she finds one that successfully decrypts the message. Eve might also be
able to break one of the mathematical principles behind the cryptographic algorithm that
Alice and Bob use. For example, some cryptographic systems assume that it is very difficult
to divide a number into its prime factors. Eve might find a quick way to do this. This then
enables Eve to read Alice and Bob's messages or to recover their keys.
There is one cryptographic algorithm that cannot be broken. This algorithm is called the one-
time pad (OTP). According to this algorithm, Alice generates a very large sequence of
random numbers. The numbers in the sequence serve as the key. The sequence is called the
"pad". Alice communicates the sequence to Bob in a secure way, so that Eve cannot obtain a
copy of the key.
Every character in the message that Alice wants to send to Bob is encrypted with a different
number in the sequence. In practice this means that the first character of the message will be
encrypted with the first number in the sequence, the second character with the second
number, and so on. When Bob receives the encrypted message, he takes out his copy of the
156
sequence and simply decrypts the first character with the first number in the sequence, the
second character with the second number, and so on.
Because every character of the message is encrypted with a different key, there is nothing
Eve can do to guess the key. Even if she knew that the first words of the message were "Dear
Bob", she could not use this information to recover the key of other words in the message.
Every number is chosen randomly, so Eve has no way to know which number is the right
one, even if Eve knew how to decrypt all other characters.
It is absolutely essential that every number in the sequence is chosen randomly and is only
used once. If Eve can recover some of the numbers in the sequence and use those to predict
other numbers, she can eventually reconstruct the entire sequence and thereby decrypt the
message. For this reason it is not a good idea to use a random number generator implemented
in software. Those generators are unable to generate really random numbers. They use a
mathematical function that generates a set of numbers that appears to be random. But if you
know the mathematical function and the number that it last generated, you can immediately
compute the next "random" number.
To achieve this unbreakability, Alice and Bob must have very large sequences that contain
only really random numbers. This makes an OTP very difficult to manage. It is said to have
been used for the "hotline" between Washington and Moscow during the Cold War. In a case
like that, it is practical to send couriers carrying suitcases chained to their arms to securely
transmit the pad.
4.8 APPLICATIONS OF SECRET KEY CRYPTOGRAPHY
Secret key encryption is most often used to encrypt data to be stored on a particular location.
If the encrypted data has to be transmitted, there always is the problem of how to get the
secret key to the recipient in a safe way. Usually the key is encrypted using public key
encryption so it can be transmitted safely.
4.8.1 Hiding spoilers
Even though it is not secure, the simple alphabet shifting system is still in use on the Internet.
It is used to hide "spoilers" (revealing plot twists in movies or books) and potentially
offensive messages from unsuspecting readers. Such messages are encrypted using the key
"13 positions". Anyone can thus decrypt the message by simply taking the letter that is 13
positions previous in the alphabet. However, this requires some active step by the reader, and
so he should then not be surprised or upset if the decrypted message reveals something about
the plot of a movie he wanted to see. This system is commonly known as "ROT-13".
4.8.2 Encrypting the contents of hard disks
Using secret key encryption Alice can encrypt her entire hard disk so the data on it is safe if
the disk (or laptop containing it) is ever stolen. Disk encryption programs exist that can
encrypt and decrypt data as it is being written and read to and from the hard disk. This way
Alice does not notice that her data is stored encrypted, except for the fact that disk access
might be a bit slower. Once she turns off her computer, it is not possible anymore for Eve to
read the data.
4.8.3 Protecting pay TV transmissions
Secret key encryption and smart cards are used for example in pay TV applications.
Sometimes this is referred to as "conditional access" television. Television programs (usually
157
premium movies, football or soccer matches and adult content) are encrypted using a secret
key. To make it difficult for Eve to obtain this key, the secret key is changed every few
minutes or sometimes even every few seconds. This way, even if Eve can successfully use a
brute force attack to guess the key, she only has a very small portion of the television
program. Alice has a set-top box and a smart card that allows her to decrypt the television
programs. The set-top box passes the decrypted television program on to the television.
Originally these boxes were designed to be placed on top of the television set, hence the
name.
Special messages, called Entitlement Control Messages (ECMs), are sent along with the
program. These messages contain the secret keys. Of course the ECMs themselves are also
encrypted, this time using a key stored on the smart card. Alice's set-top box receives the
ECMs and passes them on to the smart card. The smart card decrypts the ECMs and extracts
the secret keys contained therein. This allows the set-top box to decrypt the television
program.
The keys needed to decrypt the ECMs can be programmed on the smart card in advance. By
regularly changing these keys, Alice is forced to purchase a new smart card every month or
so. If Eve manages to make a copy of the smart card, or to extract the keys from it, she will
only be able to watch the programs for the rest of that particular month.
Another option is to regularly send out so-called Entitlement Management Messages (EMMs)
that contain the keys needed to decrypt the ECMs. The EMMs themselves are then encrypted
with keys stored on the smart card. The service provider then every month simply sends out a
new EMM. This provides much greater flexibility, and Alice does not have to go to the store
every month. Every smart card can now have a different key. The service provider sends out
different EMMs for all the smart cards in the system. Every EMM thus is readable only by
one smart card. If the service provider thinks a particular smart card has been copied illegally,
he simply does not send out a new EMM for that particular smart card.
4.9 SUMMERY
1. Cryptography is art of writing or hiding secret.
2. Encryption is used in protecting passwords, securing classified messages and also
used to protect personal and sensitive data.
3. Key refers to a digital data or file which mathematically determines the output of a
cryptographic algorithm when applied to an input message.
4. Digital certificates are file used for proving the authenticity of the user or sender.
5. In secret key cryptography the information is encrypted using a ―secret‖ key. For
decrypting the information, the user must possess the secret key.
6. In public key cryptography, two keys or Key-pair are invloved, one is a Public key
and the other one is private key. Public and private keys are mathematically related
and it is impossible to calculate the private or public half of the pair given one key
(private or public) of the key pair.
7. In Hash functions method, a plain text is processed by the hash algorithm and the
output is the hashed value of the original text. From this hashed value, it is impossible
to recover the original information.
158
4.10 CHECK YOUR PROGRESS
1. Fill in the blanks.
i. Cryptography was developed to create secure communication while there was a third-
party present also known as ________________.
ii. ________________ is used in protecting passwords, securing classified messages and
also used to protect personal and sensitive data.
iii. Cryptography not only protects the information, but also verifies the ________________
of data.
iv. ________________ is the reverse process of encryption.
v. EMM stands for ________________.
vi. ________________are file used for proving the authenticity of the user or sender
vii. OTP stands for ________________.
i. adverseries
ii. Encryption
iii. integrity
iv. Decryption
v. Entitlement Management Messages
vi. Digital certificates
vii. One Time Pad
i. False
ii. True
iii. True
iv. False
159
3. Define:
a. Encryption
b. Decryption
c. Key
d. Digital Certificate
4. Explain the importance of using encryption.
5. Define public key cryptography in details.
6. Explain various public key cryptography examples.
7. How secret key cryptography works.
8. Explain various secrets key cryptography examples.
[4]. Babu B., S., & Venkataram, P. Wireless and Mobile Security 1st Edition. Mcgraw Hill
Education.
[6]. Bunting, S., & Wei, W. (2006). The Official EnCE: EnCase Certified ExaminorStudy Guide.
Wiley Publishing Inc.
[9]. CYBER SECURITY MANIFESTO 2.0. (2012, Oct. 01). Retrieved Sep. 26, 2015, from
cybersecuritymanifesto: http://cybersecuritymanifesto.com/
[10]. CYBER SECURITY MANIFESTO 2.0. (2012, Oct. 01). Retrieved Sep. 28, 2015, from
cybersecuritymanifesto.com: http://cybersecuritymanifesto.com/
[11]. Edson, J. (2011, July 25). A Brief History Of Forensic Science. Retrieved Oct. 04, 2015,
from riaus.org.au: http://riaus.org.au/articles/a-brief-history-of-forensic-science/
[12]. Gallagher, S. (2013, Oct. 02). We are not who we are. Retrieved Sep. 26, 2015, from
Security Blog: https://securityblog.redhat.com/tag/two-factor-authentication/
160
[14]. Glass, E. (2003). The NTLM Authentication Protocol and Security Support Provider.
Retrieved Sep. 26, 2015, from Sourceforge: http://davenport.sourceforge.net/ntlm.html
[15]. (1998). How Email Works. In P. Grall, How Internet Works (p. 85). Que Corporation.
[16]. Gupta, A. (2011, March 01). Digital Forensic Analysis Using BackTrack, Part 1.
Retrieved Sep. 26, 2015, from opensourceforu:
http://opensourceforu.efytimes.com/2011/03/digital-forensic-analysis-using-backtrack-part-
1/
[17]. Gupta, A. (2011, March 01). Digital Forensic Analysis Using BackTrack, Part 1.
Retrieved Oct. 03, 2015, from OpenSourceForU:
http://opensourceforu.efytimes.com/2011/03/digital-forensic-analysis-using-backtrack-part-
1/
[18]. Havercan, P. (2015, July 17). A plain person's guide to Secure Sockets Layer.
Retrieved Sep. 26, 2015, from http://peter.havercan.net/computing/plain-persons-guide-to-
secure-sockets-layer.html
[19]. How it works. (2010, Jan. 17). Retrieved Sep. 26, 2015, from Wikidot:
http://pychatter.wikidot.com/how-it-works
[20]. How to Reveal a Fake Facebook Account. (n.d.). Retrieved Sep. 27, 2015, from
www.wikihow.com: http://www.wikihow.com/Reveal-a-Fake-Facebook-Account
[21]. Introduction to computer forensics. (n.d.). Retrieved Oct. 03, 2015, from Forensic
Control: https://forensiccontrol.com/resources/beginners-guide-computer-forensics/
[22]. Introduction to computer forensics. (n.d.). Retrieved Oct. 03, 2015, from Forensic
Control: https://forensiccontrol.com/resources/beginners-guide-computer-forensics/
[23]. Introduction to Cryptography. (2001, Feb. 24). Retrieved Oct. 01, 2015, from
efa.org.au: https://www.efa.org.au/Issues/Crypto/crypto1.html
[24]. Introduction to Digital Forensics. (2011, Nov. 16). Retrieved Sep. 28, 2015, from
Wikibooks: https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics
[25]. Kerberos Authentication. (n.d.). Retrieved Sep. 26, 2015, from Interactiva:
http://computers.interactiva.org/Security/Authentication/Kerberos/
[30]. Mehnle, J. (2010, April 17). Sender Policy Framework. Retrieved Sep. 28, 2015, from
Openspf: http://www.openspf.org/Introduction
161
[31]. Morton, T. (2013, Sep. 13). Types of investigations. Retrieved Oct. 04, 2015, from
Introduction to Digital Forensics:
https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics/Types
[32]. Nelson, B., Phillips, A., & Steuart, C. (2009). Guide to Computer Forensics and
Investigations. Cengage Learning.
[33]. Nichols, R. K., & Lekkas, P. C. Wireless Security: Models, Threats, and Solutions.
McGraw Hill TELECOM.
[34]. Nolan, R., O’Sullivan, C., Branson, J., & Waits, C. (2005). First Responders guide to
Computer Forensic. CERT Training and Education.
[35]. Pachghare, V. K. (2008). Cryptography and Information Security: Second Edition. PHI.
[36]. Password Authentication Protocol. (2015, July 17). Retrieved Sep. 26, 2015, from
WIKIPEDIA: https://en.wikipedia.org/wiki/Password_Authentication_Protocol
[37]. Peterson, D. (2015, July 06). Computer Forensics Miami. Retrieved Oct. 03, 2015,
from computer-forensics.wikidot: http://computer-forensics.wikidot.com/
[38]. Public key cryptography. (2005, Oct. 01). Retrieved Oct. 01, 2015, from
iusmentis.com:
http://www.iusmentis.com/technology/encryption/crashcourse/publickeycrypto/
[39]. Quirk, S. (2014, Mar. 13). Concordia Password Security Policy. Retrieved Sep. 26,
2015, from http://kb.cu-portland.edu/Password+Security
[40]. Recognise scam or hoax emails and websites. (n.d.). Retrieved Sep. 27, 2015, from
https://www.communications.gov.au: https://www.communications.gov.au/what-we-
do/internet/stay-smart-online/your-identity/recognise-scam-or-hoax-emails-and-websites
[42]. Saylor, A. (2015). CRYPTOGRAPHY. Retrieved Oct. 01, 2015, from learn.saylor.org:
https://learn.saylor.org/course/cs409
[43]. Sbh. (2011, Jan. 14). An Introduction to Cryptography. Retrieved 10 01, 2015, from
go4experts: http://www.go4expert.com/articles/introduction-cryptography-t24529/
[45]. Secret key cryptography. (2005, Oct. 01). Retrieved Oct. 01, 2015, from
iusmentis.com:
http://www.iusmentis.com/technology/encryption/crashcourse/secretkeycrypto/
[46]. Selecting a strong password. (2015, Sep. 10). Retrieved Sep. 26, 2015, from
Wordpress: https://en.support.wordpress.com/selecting-a-strong-password/
162
[47]. Singh, S. (1999). The Code Book: The Evolution Of Secrecy From Mary, Queen Of
Scots To Quantum Cryptography. New york: Doubleday.
[48]. Stewart, W. (2000, Jan. 07). How Email Works. Retrieved Sep. 28, 2015, from
http://www.livinginternet.com/: http://www.livinginternet.com/e/ew.htm
[49]. The National Archives. (2011). Digital Continuity to Support Forensic Readiness.
Retrieved Oct. 04, 2015, from nationalarchives:
http://www.nationalarchives.gov.uk/documents/information-management/forensic-
readiness.pdf
[50]. Tutorials Point. (n.d.). Retrieved Dec. 07, 2015, from www.tutorialspoint.com
[51]. Understanding Authentication. (2008, Feb. 14). Retrieved Sep. 26, 2015, from
Go4Experts: http://www.go4expert.com/articles/understanding-authentication-t8842/
[52]. Verma, D. (2012, Nov. 05). How To Identify Fake EMail And Trace Sender's Location.
Retrieved Sep. 27, 2015, from http://www.usethistip.com:
http://www.usethistip.com/2012/11/how-to-identify-fake-email-and-trace.html
[53]. Wheelbarger, S. (2009, Aug. 27). CyberForensics. Retrieved Oct. 04, 2015, from
Wikidot: http://colbycriminaljustice.wikidot.com/cyberforensics
[56]. Xiao, Y., Shen, X., & Du, D. (2011). Wireless Network Security. Springer.
163
Dr. Nihar Ranjan Pande
Assistant Professor, Dept. Of Management Studies, Graphic Era University, Dehradun
(Uttarakhand)
Email: [email protected]
164
Er. Charanjeet Singh Chawla
Wing Commander, Indian Air Force, Ministry of Defence, India
Email: [email protected]
165