Information Systems Security Notes
Goal of Information Systems Security
The goal is to safeguard against threats and vulnerabilities.
Safeguards should block threats; otherwise, loss occurs.
A target is vulnerable to threats if there are no effective safeguards.
Sources of Threats
Human Error: Includes procedural mistakes, incorrect procedures, and accidents.- Examples: Disclosure of data, incorrect data modification, loss of infrastructure.
Computer Crime: Includes unauthorized data disclosure, pretexting, phishing, spoofing, sniffing, and hacking.- Also covers incorrect data modification, system errors, faulty service, denial of service (DoS), usurpation, and loss of property.
Natural Disasters: Can lead to disclosure during recovery, incorrect data recovery, loss of infrastructure, and service interruption.
Specific Examples of Threats and Consequences
Incorrect Data Modification Procedures:- Incorrectly designed procedures or not followed results in increasing customer discounts, modifying employee salaries, or placing incorrect data on a company website.
Improper internal controls on systems.
Faulty recovery actions after a disaster.
Faulty Service:- Results in incorrect data modification, systems working incorrectly, programming errors, IT installation errors, unintentional denial of service, and intentional denial-of-service attacks.
Loss of Infrastructure:- Due to human accidents, theft and terrorist events, cyber warfare (e.g., Stuxnet), disgruntled or terminated employees, natural disasters, and Advanced Persistent Threats (APT).
APT involves sophisticated, long-running computer hacks by well-funded organizations.
Balancing Risk and Cost
The goal is to find an appropriate trade-off between the risk of loss and the cost of implementing safeguards.
Examples of safeguards: using antivirus software and deleting browser cookies.
Proactive security involves making appropriate trade-offs for personal and business contexts.
Statistics on Cyber Attacks
Attack Types: Malware, phishing & web-based attacks, malicious botnets, stolen devices, denial of service attacks, malicious insiders, ransomware, social engineering.- Source: Accenture, The Cost of Cyber Crime Study, March 2019.
Average Annual Computer Crime Costs by Attack Type
Covers malware, phishing & web-based attacks, malicious botnets, stolen devices, denial of service, malicious insiders, ransomware, and social engineering.- Source: Accenture, The Cost of Cyber Crime Study, March 2019.
Ponemon Study Findings
No one knows the exact cost of computer crime.
Data loss is the single most expensive consequence of computer crime.
80% of respondents believe data on mobile devices poses significant risks.
Studies may be biased to promote a particular view or safeguard.
Ponemon 2019 Studies Summary
Ransomware and malicious insider attacks are increasingly serious security threats.
Information loss and business disruption are principal costs of computer crime.
Discovery and containment account for over half of the internal costs related to cyber intrusions.
Security safeguards work.
Organizational Response to Security Threats: Minimum Security Policy
What sensitive data will the organization store?
How will it process that data?
Will it share data with other organizations?
How can employees and others obtain copies of data stored about them?
How can employees and others request changes to inaccurate data?
Personal Security Safeguards
Take security seriously.
Create strong passwords and use multiple passwords.
Send no valuable data via email or IM.
Use https at trusted, reputable vendors.
Remove high-value assets from computers.
Clear browsing history, temporary files, and cookies (using CCleaner or equivalent).
Regularly update antivirus software.
Demonstrate security concern to your fellow workers.
Follow organizational security directives and guidelines.
Consider security for all business initiatives.
Technical Safeguards
Involve hardware, software, data, procedures, and people.
Include identification and authorization, encryption, firewalls, malware protection, and application design.
Data Safeguards
Data rights and responsibilities.
Passwords, encryption, backup, and recovery.
Physical security.
Human Safeguards
Hiring, training, education, procedure design, administration, assessment, compliance, and accountability.
Specific Technical Safeguards
Identification and Authentication
Encryption: Transforming clear text into coded, unintelligible text for secure storage or communication.- Symmetric encryption: Same key (a number) used to encode and decode (fast and preferred).
Asymmetric encryption (two keys): One key encodes the message, and the other key decodes the message.
Firewalls
Malware protection: Includes protection against spyware and adware.
Design for secure applications
Encryption
Symmetric encryption Uses the same key to encode and decode data. It is fast and preferred when speed is an issue.
Asymmetric encryption Uses two keys: one to encode a message and another to decode it. This provides enhanced security.
Use of Multiple Firewalls
Implementation often involves perimeter and internal firewalls, along with personal firewalls on individual computers, to create layered security.
Spyware and Adware Symptoms
Slow system startup.
Sluggish system performance.
Many pop-up advertisements.
Suspicious browser homepage changes.
Suspicious changes to the taskbar and other system interfaces.
Unusual hard-disk activity.
Malware Safeguards
Install antivirus and antispyware programs.
Set up anti-malware programs to scan frequently.
Update malware definitions.
Open email attachments only from known sources.
Promptly install software updates from legitimate sources.
Browse only in reputable Internet neighborhoods.
Data Safeguards
Define data policies.
Establish data rights and responsibilities, enforced by user accounts authenticated by passwords.
Implement data encryption.
Establish backup and recovery procedures.
Ensure physical security.
Human Safeguards
Position definition: Separate duties and authorities and determine least privilege.
Document position sensitivity.
Hiring and screening processes.
Dissemination and enforcement: Responsibility, accountability, and compliance.
Termination procedures (friendly and unfriendly).
Human Safeguards for Non-Employee Personnel
Harden site: Use special versions of operating systems by locking down or eliminating features and functions not required by the application.
Temporary personnel and vendors should have accounts and passwords with least privilege, and accounts terminated once the contract ends.
Account Administration
Account Management: Standards for new user accounts, modification of account permissions, and removal of unneeded accounts.
Password Management: Users should change passwords frequently.
Help Desk Policies.
What is a Data Breach
Data breach: Unauthorized person views, alters, or steals secured data.
1+ billion people affected by data breaches in the past 5 years, 75% of breaches happened in US
Average cost of a single data breach 3.5 million.
Average costs per stolen record in healthcare (359), education (294), pharmaceutical (227), financial (206), and communications (177) industries.
Costs of Handling a Data Breach
Direct Costs: Notification, detection, escalation, remediation, legal fees, and consultation.
Indirect Costs: Loss of reputation, abnormal customer turnover, and increased customer acquisition activities.
An additional 3.3 million per incident in the US.
Odds of Data Breaches
22% chance of losing 10,000 records over any given 24-month period.
Less than 1% chance of losing 100,000 records over the same period.
More likely to lose smaller amounts of data than larger amounts of data.
Why Do Data Breaches Happen?
67% are hackers trying to make money.
Personally identifiable information (PII): Names, addresses, dates of birth, Social Security numbers, credit card numbers, health records, bank account numbers, PINs, email addresses.
Rogue internal employees: Credit card fraud, identity theft, extortion, industrial espionage.
How Do Data Breaches Happen?
Phishing scam: Trick users into donating funds for a natural disaster.
Exploit new software vulnerability.
How Should Organizations Respond To Data Breaches?
Respond Quickly: Stop hackers from doing more damage (exfiltration or illegally transferring data out).
Immediately notify affected users.
Plan for a Data Breach: Walkthroughs, business continuity planning, and computer security incident response team (CSIRT).
Best Practices for Notifying Users of a Data Breach
Be transparent in your activity and demonstrate that you are getting the word out.- The Right Way: Directly email every affected user with details about the data breach and include a popup advisory on the company's most visited page.
The Wrong Way: Include a vague reference in a rarely-read press release that includes plenty of technical jargon. Only send the notification to a small number of users.
Follow your normal media routine.- The Right Way: Notification is set to local reporters that usually report on the organization as well as a typical press release.
The Wrong Way: Only send the notification to a small number of users.
Avoid absolutes.- The Right Way: State that, so far, the data breach has affected a certain number of users, but the investigation is still ongoing.
The Wrong Way: State that the breach only affected a certain number of users, and no more.
Avoid misleading statements.- The Right Way: "We are investigating the possibility of lost credit card data."
The Wrong Way: "We don't have any evidence that credit cards have been compromised." But you've received notification from a credit processor that an investigation is under way."
Don't attempt to withhold key details.- The Right Way: "It appears that at least 40 percent of user accounts were compromised."
The Wrong Way: "I can't comment on the number of accounts compromised at this time."
Stay focused and concise.- The Right Way: Give a brief, concise, and factual statement about the data breach.
The Wrong Way: Provide extraneous details about failings of internal backup, off-site data policies, and unrelated criminal investigations.
Regulatory Laws
Federal Information Security Management Act (FISMA): Requires security precautions for government agencies.
Gramm-Leach-Bliley Act (GLBA): Requires data protection for financial institutions.
Health Information Portability and Accountability Act (HIPAA): Requires data protection for healthcare institutions.
Payment Card Industry Data Security Standard (PCI DSS): Governs secure storage of cardholder data.
Family Educational Rights and Privacy Act (FERPA): Provides protection for student education records.
Preventing Data Breaches
Countermeasures are software or procedures used to prevent an attack.- Better phishing detection software
Better authentication (i.e., multifactor authentication)
Network intrusion detection system (NIDS) to examine traffic passing through the internal network
Data loss prevention systems (DLP) to prevent sensitive data from being released to unauthorized persons
Preventing Data Breaches (cont’d)
Appoint a chief information security officer (CISO) to ensure sufficient executive support and resources.