Cybersecurity Essentials Guide
Cybersecurity Essentials Guide
RNING OBJECTIVES
r reading tl11s chapter, you should be able to:
Understand the goals of information sec.unty.
Explain the me!hods us:d for defense againsl attack on c:ompuu•r s ._#.
Describe 1he different kinds of attacks on computer system,
Understand the firewalls and why do we need them
Understand the enterprise-wide security system.
Describe the encryption techniques used 111 secure transaction
Understand digital signatures and how they are used.
. n Bahree, 24, from New Dehli sold a CD containing the confidenta d-"ta• ct
sh bank accounts to an undercover reporter from the UK ba,ed ne-,,,N,p,er ' He
an employee of the calI centre called Infinity eSearch. ..\cc.ord rig lo Tb? 5.r.
at1on, which 111cludes addresses, passwords, phone number dJld dn, I\\', se .nf
ort details, Was purchased for £3 per customer F1nant1al 1ns11tut1on, ,uch ...
5 TSB, 1he Nationwide and HSBC were artPded A. i:all c.en1re 1, a rentra azi!'ll
1
unty mea:.ures in place. ln the physical world, crimes often leave evidence- : 2 lnilacnr
footprinb.. v.'imcsses. video on security cameras and so on. Online. a c'J-bcr-c.:nm.-\feler,a,,
physical. electronic evidence, but unless good securiry measures arc taken. 11 m.iy he difii
co trace the source of a cyber-crime. Utub
As seen i-n Figure 5.1, lhe goals of security are:
1. lntegntiy of the data sent and received.
2. Confidentiality of the dat.1 so lhat h is not accessible to others.
3. The data ought to be available ro the people for whom it i meant.
Availabillty
0 ·O
Information lnformatoon
source destrnatoon
(a) Normal
How
0 r0
(b) Interruption
(c)Interceptoon
0 -o
(d) Mod1ficat1on
(e) Fabncauon
11e1Awd.ditional! Y, e-hu s i n• c:-.,cs mu\t pro1,·d araIn,t thl' unl.nnY.n NcY. method\ of
atu,l f f r A j "u e 'a uc a ndcwbSI'ie s andnewnetwork i.ccuril) hole, uri: h,·1ng d1se<ncrcd
,,1th d1\turhn Pllllect l l f8y c cfullyplanning 11s nc1w111k .111J \H'h,11r ,ctunt, s"tcm
:rnc bu ine,t
be tdagainst many known and a, yet unl,;nnwn 1hr,·.1h \n c bu\1nl'" mu,t uh,01\
4• for n ct ork andwchs11e u11,11:I,;,, 111 1 "I,; th•· h"s ,,t ·•"••ts.
Pllltcct the ' v tmponantrcil on to prt>lt'd .m e hu 111<ss':. nct\\llr and Y.eb uc• I
'-t • ':'•ness· rclatmn lnp:. "ilh ah u1,111111.:1s l\li1t1) Internet u,c pcrceJ\e th.al
lllllaik p1a nsk totheirpiivacy and ,.•cu111y \\h,·_11,hey bu\ proJuct: ;in Cr\l 'or
luaal mfonnatmntlllhn•·· Although ihe pt·ri:rpuon ol risk 111:i) be greater than the
Security on the Internet
Looking at Table 5.1, one can see the amount of money being spent on secunt)' f
0 COfillll.•
systems. r,,:;
Network admJniiltrators have increasing concerns about the security ot !heir n I\\Ofi.>
W. dley expose their organization•s private data and networking mfrasm.1cture !Cl lnttm::
rmclrtr,To provide the required level of protection, an organization ncc<b a sc,;uri! f\ ·
'4 C41unaurhorized users from accessing resources on the private network and 1•• ·
apinet the unauthorized export of private information. Even il an organizartou i;,noi -o
;·
'P $c it may still want t{J establish an internal sel:urity policy to manage u,er-"
re port.ions of the network and protect sensitive or secret infurm,JUDII (>
· ;rt.fnndamental problem n1ay be that l:he Internet wa.<: not designed to t, ;,;)(
31
f,IICeU for the purposes of research was the prune ccrnsidcruuon r
. er wo,
s unpJcnicntcd.
• "f'
ll<>wcvcr, Ihc
11cno1ncn111s
1i, .
---
--- 203
101,•rtl ,J ction of d,1crcnr t)'l)C, ol ti,crs rnt:I I llCL1, , ul the Int
11 111 1
,he ,n1" ''.,.cicncies to the extent 1hm wi,ic '1?" 1l'thknl user h ,·rnct, coinb,ncd wnh
..t<un1· d,1fll:l.[!CS.
c,, ,, open I11!<',n
01hc1 ,actm, 111,·lnd th,· f II
· n " fr.1va1ed
,., s11,·, 11,1 inc hi: cx, 110g
.,ull n• ' o nw111 vn,, ' hrcJlt-1ns and
J tifrtrra/111' f('l'/IP ,<fn•ires. I\ IIIIIHhn I I .
,. \,., .. I ",,,. l(l'/11•
•nn be com11n111tM.:u ,,y • 1111wkdr,·ahh· - 1
·rv1<c, ,,re 11,11 ccurc 4ml
, 1 111r1111,., , ,•
nctw<11k111g cnVtr\111111\'III trn 1mprovmue. 11\'IWokr m1' '' 1·,I 111 11,,, 1, .area
1 1 1 1 llolc 'nt,it·nC, I
,nc.
J ... ._,
" c•r11:n1lly 1111I
, ll'n.tC of spying t111d S/1<,0jing. A tnaJ·11i1ty ' ncr.,hlc
•· ,,,..
.1sswords. ,,nd Ille
. can ', 1 1ntrrnt·t tnfl 1
rcap111ricI lrnn rcrs ll1: 11101111 orc11 ,111(1
. 11ncn ry111c<1 c-m 1
ai •
'
soflwarc Intruders can Lhcn reuse password .., using rc.,11,Jy-,a1 1,Me
l't
1II .. rcak int,, y 1c1ns.
\ without
• rdr
h
or t' e potential for abuse tit<ma y nr \Vltl c " " ' ' I
Many sites arc configured unint .01 . 11
regai of policy. fmin
uick • . - - n ntcmct =
• 1c 1n1i:rnc1· m
TCP/IP
1 services than they require for theiro=ruu _ _ .: d any Silcs P,.'Tlnll mote
• & . .- ons. anu u n<,t ,n mpt I0 I
access to m,·ormat1on about their compuLers thlll pro,.c \ ,. 11u«· hlc 10 intnJ1l,«m:«il
coul·u'
4. Complexity of conf!gu_ration. Host security_ acc-ess contml 111 oft n compk, 10
configure: and morulor. controls that are acc1dc111ally misconhgurcd c1tcn roult 111
unauthonzed access.
Sites that ignore these problems face some significant n i.. thal thi:y v,1!1 hi! atuckcd
)" rntn1ders and that they may provide intruders wnh a staging ground for 1tt:icks on
other networks. Even sites that do observe good ,ecurit> prm:1..1ccs. face prohlern, w11h llC'"
\Ulnerabilities in networking software and the pers15tcnce of some mtrudo:r;.
Some of the problems with Internet ecurity arc 1hc re ult of inherent vulncr3bthllc.s
1n the services (and the protocols that the services implement!. while mhcr an: :i rc,ul\ of
ho;t configuration and access controls that are poorly implemem.id orov,:rly cnmrkt 10
udmtru-ta This is further aggravated by the tremendoll5 growth of Lhe Lntemcl .intl th
".i 11 ,, used Bu5inesses and agencies now depend on the Internet for commu111ca1ion,
Jlld rc-,:nrch and thus have much more to lose if their sites are atl.l:lcked The following
,t:.:11on, d ,.nbe the
problems on the Internet and the factors thai contribute Lu lh.:s.: problem,·
411
I. Howsecure is the server software? Secunty hould Ix in pl.1-c to prt\Ct '
1
unauthonzed remote Jogon 10 the y,1em. IL should Ix e,trcmcl) J1ffi,ult ' m;i-c
change to the server software. The servers themwhi:, ,h,1ul.t be ph,,i,':11' l..x
10 a secure environment.
2 ff . . . . . , u. Jit .: ird · 111\ormJUOn ,1. d. , lhe
1 I L ·1" ., mu,t t>i- r1111c,; ic u
· ow tecure are com11111111tatw11 s?t usllllll<
.. . t
liCn,11,ve data that is being 1ransmlltt·li ,t<•ros, 11 11' '
J Ho i . . I 1· I , , t/11•'./,111111, ".. " it '"'"
• 1 11 s the data protetted 1111ce 11 I \, r 11•1•re, ,•
.... .
'-..ncrypted , .I
1 ,, 111111 ,h!f3!:t'
text files 111 the wch,tll'' b 11 1m ,' 11 11 ••
,. I' l , ,I l •..,.. 1
1.
4 Ho 111 I11 1, 1·1 11er,/ /11
11111/ '"'' " • ' • 11
• tran
4'e . credit card 1ra11.HtefilJ11., ,11,1 ' • ,11"' ,1, hi i... 11 111or,(-' ;:- r l<i'i
. ', 1
·
lhe users.
t-<:ommerc-e,A
. • ll I
204 J , b . lld'•o ,,,1,,.,
. ecure tec es. an e us oess should.
hno og1 - 1 rij,.,
Besides impJernenll:g one working iii an e-business should Und <levclop I<:
rocec1ures. v e . - Als o 1 f . e r $titn(lh· t
,-po l.i •e5 and P . t he bus iness s ecure. , a P an o acL 1on sh
1
11
c1 . for keeping . ould b is ,,, h
responsibiJiues teotialsecurity problem. . . . e rca,1;:,
deal with any po ·a1 -ecurity problem 1n an e-busmess 1s of huma ,,
n,e b• e akest link in any secunty system is e people using it ·r'
er tha,,
.
• st potenll
gin The we •
5 •
. • lh
r S . . n, rath
hee IA
efeCtr-OnlC on · understand the secunty po icy. omehmes, the St<: . lll l y
of an c-busine · ss may th nol 1
mployees are not able to follo,v 1t, . or refuse to follo ur ity
. "t
Pol,c y1
d:
bu(d me that e e w 11b, ,
so _ens_o cult for them to get their work done.Forexampl_e,employees may c/caul<: q
makes.it make frequent changes to logoo.passwords. At times, they may nofunanno)CiJ
at havmg f ecuricy measures. Educallng employees about rbe need for d r,,lilJill
the i.J11portance o s . . security
eir
. .tn the security processes . is essenttal. Table 5.2summarizes the general , il'(l
01
th
. ro 1 e
that businesses must c er. cu
issues e
- ons1d J
TABLE 5.2 General Security Issues
Comme
iiiil.i; ;' . Jsne m
Comiection to the Internet Private computer ne1works are at risk from potential tl1rcaLi fr
anywhere on the public Internet network.
Unknown risks New security boles and methods of attacking networks are
bcini '
'
discovered with alarming frequency.
Customer privacy and security Nol only must steps be taken to pro1ect the privacy of
of customer information cusJomei information. but also customers must be made aware of
thoseMeps and ha.ve confidence in them.
ty consciousness Management and employees must understand the importanc
Security risks associated with a network and a website can be addressed in some way1
• follows:
-
.
5ecunlY
205
"A II e-busi11css
·• must
ffk o protect
• I ,d itself against unauthort,cd
. 3 •
J.of-
11 crv1ce 11'8 vcr oa . nnd the in1r11 . cct to II compu1er networlc.
delll SlOll of deMruc1ivc v· .
1r11 cs.
• of-Service Attacks
oeoi-a1
oeninl-of-Servicc or DoS attack 1 un aunck 1111
A rk hy flooding 1t wilh usclc s 1ruflic or .anetwork lhal i dcMgncd tu dbuble Lhe
net"'O I. I uc1iv1ty. /\ d1Mnhutc Id I 1·
!)()S. 3uack use:. mu lip c computers to launch 3Dos att· ... . ·c en1a ·o -service, or
Dd,> n, technical damage,
· it, can do sub tantial Ini an.·. da_ck. Whtie a Dos attack dt,e not
b3r v second an us mcss s network or a eta1 ,unage l<J an c hus he
c- websne CJu e
ev. e 18
d . m -
The auackcr lirst breaks into hundreds (Jr ;hous.an;lwnr '.' mdayresult In lo,t revenue,,
d · , II· ·k · s O ran om. IMCCurc computer, on
the Internet an anstas an auac program. Then he coordinate them all toattack the till et
,imultaneously. Thereafter. the target is attacked from many place atonce· the tr.id·u g_t
defences just do not work, and the system crashes. · 1
ona
These attacks areincredibly difficult, if not impossible, to defend against Ina lr d l .l
· k h · · , a 1 1on<1
dcnial-of-serv1ce attac, te v1ctun s computer might be able to figure out where the attack
., com111g from and shut down those connections. Bul in a distributed attack, lhere 1s no
,ingle source. The computer should shut down all connections except the ones it know to
be trustworthy. but that docs not work for a public Internet site.
So far, these attacks are strictly denial-of-service. They do not affect the diita on the
websites. These attacks cannot steal credit card numbers or proprietary information. Th<..-y
cannot transfer money out of your bank account to trade stocks in your name. Aetacker;.
ca1mot gain financially from thc e allacks. Still. they arc very serious. For most big
corporations, the biggest risk of a security breach is loss of income or loss of reputation.
either of which is achieved by a conspicuous denial-of-service attack. The real problem 1,
that there are hundreds of thousands, possibly millions. of innocent, naive computer u.,er
who are vulnerable to attack. They are using DSL or cable modems. they' re always on th(
Internet with static IP addresses. and they can be taken over and used as launching pads
for these attacks.
Viruses
Viruses are the most common seeu.rity risk faced by e-busme ses lod:iy. A vlT\ls b a ,mJ.ll
program that insens itself into other program files that then become ..mfcrted'". Just a, n
virus in nature embeds Ltseif in normal human cells. The virus 1s spre-ad when an in1e.:t<'J
ogrctm is e,:ecuted, and this furtherinfects other programs. Exmnple of viru, effec s
m.:luJc lllability to boot. deletion of tiles or entire hard drives, inabilit) tu cre.1tc or ,a,e
nk, nnd thou and of other possibilities.A logic bomb is a v1111s IIho,e atrnd. 1 u·ig.i•·rtJ
h) ,,inc 1
event \Uch as the date ona c()mputcrs' sy tem .:lock A logic tximl'> lll.t) ,unpl) ret.:J,<' •
V tru5 0 • II • d , •J into a eomputer - ,t,·m
. r i t may be a virus hselr. Viruses a.re g,•nera Y 1111Tel u" . .••
via e-rna · i
1 Qr by unauthorized network access.
• .
V1nis ,ex.imp1•, 1c11 ·lud.
' s1nn,'tl \h, hdJn,_□P.
and AutoStan 9805.
·
lroJan b . . 11 •.' lli111J ,u1d i, ,1 ,p.-,,.,1 ,, 1x· .,t
•rus thoa rse. nus take!, IL\ name ft mn u shlfY Ill <Hilt! I II 1111 tll t'lll rl.llll(llt
·t emu1ates a ben•ign 11pphca1ton It 11ppcu1.s. t1I J,1 wmt'l un•i: '' '
-:-:----
2 06 =--=
: : : : : :· : : : :
as de st ro ying fl l es or c reat
. e ll s uch
111
' ' '"
nrli•n ,, , "tu,,
Spyware
Spyware is Internet jargon for Advertising Supported software (Adware). Tr isa W&} [01
shareware authors to make money from a product, other than by selling it to the users.
Tom are several large media companies that offer d1em to place banner ads in their
productms czcbange fora portion of the revenue fron1 banner sales. This way. you
do not ha e to pa) for the software and the developers are still getting paid. If you find the
banners annoying. lbae is usually an option to remove them, by paying the regular
licensing fee. This usually involves the tracking and sending of data and statistics via a
server installed on the user'< PC and the use of your Internet connection in the
background. Spyware examples indudt CoolWebSearch,Intemet Optimizer (also known as
DyFuCaZan£o (formerly 180Solution;t lfnntBar (also know as WinTools).
:care. th31
--=•
--wn prog.aru 1 running.
Adware . i s any_The
software
authors
application
of these applications
in which advertising
include banners
additional
arecode
JisplJveJ
• .,. ca c bc: viewed.through pop-up windows or through ;1 hur that ;ipr
'dlw llap ,,!;COit and hel :ustificauon for adware is lbat lt helps recover prognuiinun,
.,iAtt taliMbeen cri =:old dow the cost for the user. . , 1
usually I
SM,JW includes lie.iii
code g,1 puse,
that tracl-s : .
,1pam
use1s cause,,,naIt
per.J,•e.
H -. to thtrd .. on 1
y ,tAll!lpl,ii& ind\ldc Bearshare e , without the user's authorization ork nt'"":
8
• onzi Buddy, Comet Cursor and DivX
207
0 Adwre
■ Back.ooor
■ Warms
(] Vin.ts
70% 0 TrojanHorses
0 Spyware
D Others
,or8fwilcl/File:Malwar _sLalics_20 l
2 0 8 ------ -:= -
= :d
the 1nn rcr l'/111 1-. 111: ,11111( k 11.,111, ,,,,,,, ,,
11 1trt• e r,
1 ,I, I•\
-.,,and (com un . . ,uiion uho11r rli,· 1l·q1ir ..rnl 1111111 ,,
the couu- 11,. ti
(lnlllln Ill1O01 •. , lh I ,II II ,, ''"
Al requests c ,.11.rn,crcr::.. I 1,· 111.a.,11•1 p, "I" 11111\ 1 " 11
h
·st These . and (lt er,1 • I . , , '''" 1 i,•I,1
in its l1
f the :. the durauon. • ttisetl ho t:i, whc1l' I ll'11,11•1,v,1y .,.111 1 111 ,,
v,ctntl, rnson compror. '·hlly I, I'•,,,
o rcfina.tY usc:t progra, ' 111,1,1,
uo
.
'dents on the Internet
security /nc, ·,e prot,lems hove occmn:d w11h111 .,1110111,
• rhe
above. t h,c ·1 '11,,.J •I
j
As an evidence . otent b'l't"es in the UNIX sc11tl111:11 flH>/,\l'Jtl11 w1•11 cf,N ' ltr
vutnera i t 1 • i,v, r,,J
In rhe first. persis ed h . sendmnil programs. wen: hnced H> s1rn111hlr 11
which had nO t correct t e1r
bilities were auacketl. llow1:vi:r.t I1w lO Iii,· t ,,1111'111 ''''"' 1
programs fore their vuInera • iyi 'f
1
·1 be
ro..,.am d kl'ng soflware ,in gencrnl. three su 1s1·(1111·111 v,,,\11111 ' ' 111
sen mlll P ,,.
an networ ..,, .' ,I 1 ,,,,,1r
. s1•gruficant vulnen1bililies,.• hesL•nu111J11
d found to still contam • f
r1111 1,1111 I\ 0 1. 1
• ' · 1,1,
were
and . .,_ all lo ]unit access to sendmad tire lorc.:cc t11,c:wl 11111<kJy wJ
sites wnhout .._...w s 11 ,,,,
bl ms are found and vulnerabilities revealed. .
pro ;n the second,a version of a popular and a lree FTP sc ·:crwas Jrn1111I ,,, 11,111,11111
T r not o necessarily
'an horse that
thepermitted privileged
contaminated access
version. were,oagarn crvcr. Stolies
the, fon:_cd 11\111/! 1111,
·1acl f ,1 ,,J•
bu /
aciv Ci11d11IIJ
V('yI
quickly to this situation. Many sites rely on the wealth of,reco. ltw:11(,•1va1fol,lt
u,, lnteroet, especially security-related software that adds capability forJogg1111,:,,1n1 •
''"''' and integrity checking- that vendors often do nor provide as part or llw opl ralmy y
re111 While the software is often of high quality, sites 1nay have little rccou,M., 01hct ih,m
riire on the authors of the software if it is found to have vulnerabilities and olher
prohlcm
The third problem bas the strongest implications: intruders had broki.:11 111tr1 pqrcorulJ
thousands of systems throughout the Internet, including gateways b..:1wccn JTlilJIII 11.-rw,11
and installed sniffer programs to monitor network traffic for uscrm:11r1es ancLl ,tic p,1\ v.or.
typed in by users to connect to networked systems. The int.ruder, had w;ed v:m1111 J,nc,.•
rechniques for breaking into systems, as well as using passwords 1ha1 hull IJCcn "1n1llei'
One of_ the implications of this
incident is that static or reusable passworch urc oh olc•eI protecting access to user
accounts. In fact, a user connecting to a remote sy 1cm a,rn
Interner may be unintentionally placing that system at the risk of allacl.. hy 1111nrtld 11
could be monitoring the network traffic to the remote system.
Weak Authentication
IN•1klt>handli.n. g teams estt' mate1hat many .mc1. dents stem from the u e or we.ii,,,.11. a1hc
d" •ma 11
"ncrac•kon u.., I
th nternet can be e number of different way,. 1J11w , , ,, f' J w'
=•••
0,a m oc b oa nd s are by cracking the encrypted form of rhc password ;11111 h,> Jll""11,,n
, ...... ofnelsfor pa sword packets. The UNIX operating y 1 ·rn u,u.,II)P
,.,..)_.J siJm)apSlswords 1n a. file e read by normal u en,. .rht" p,t\(""'dI J.
that canb
die tho.ftlo 1.Y : ng
PIIIIWord
11
If it. . canercanalso berun
obtained hy a 11vmhe1
reacllly-availahlc o,l,rhcr rnr
1111"""' a, ;
111 on •uwd, an 1ntrud d ((ll
lie Clacked .:du!:: :ss"':'ords are weak, c.g le:,:, than I< ,1i.,,.,c1c,1
gam access inLo the system
f Ospying
209
,,1 e note u,:u when a user connects toher , , o1 na
,,. nt to
.1111pt,rta r's password travels across ,1ccoun
remote hi) t U \ni g..,
1 1"
the Inu:rnct
All,I hC u . mto . 10 moniti,r·unencrypted
18 . tir in pl;,j1t1.:,n ,T"
se .. ,1 for breaking
systems
. c net
. 1 them
1"
.I" ,h ' in
etJwu I
d a passwore,anu ,I h en using,
l u,c .
Cunncct1()fl:, t(l 'P
r • packets he• . IIU\,
n'
011
, l l" '
,r
111c on ., · · , · system fort • nil
,,U- .,.-
. r1d 1a
()rd is10 an aum1111s1.rn1or s 11cco1m1 tl)enth(!. ,. 1or111a1 login tr ,,.
pas $ W · I ' JO,, 01 oh1·1i1 • ' ,11e
, p111rc1110e neasier. As notedprevious y, hundreds and possihtytho, .u. ng privileg,edac<.:c,,
111Jd b 3 ve l)ecn penetrated as a rc ult of rnonilonng . . sands <1Y( Sltms aero .,
P
ic 1
tnlt
roet
II as the contents a- c net and flTt>c:,,sii)ns or
f 1 , 1 -uscmame.
b .,ollu_. p:is wiud!,
. I us we . d. b , •· , .an einrm11uretl d
.
J'-!113•1 t'on about a site an,ts usrness transactions.Most d .1n use,\ 1c,
0
Ji,,1111inforro:s me that e-mail is secure and thus safe fortransm ;: r:. n l encrypt c-m 1l,
;in,t iJieYa n gc n 111v..:inf1>rm 111,n
of Spoofing
(ase . d t b 'd
.,,,, IP address ofa osthl1s pre umeIP o e vah _and is theretore lrusted by TCP .tnl\ lllJP
,,. . A
<(('itC problem 1s at, using
CS· B. fl source
lP routing,
. an attacker's hosl' can m a sq uerade ""
· , hi.1st or a client. ne Y, source rout ing is an option t h at can be u • A , f
, IIUStea , . · a,;u o.u ''\)(!Cly
difeCI route toa desunat1on and relt\rn path back lo the origin. The route can mi·ohe
:ht use of other routers or hosts that normally would not be used to forward packei to
medestination. An example of how this can be used such th;it an attacker's sy tem could
Jll'A(!uerade as tht: trusted cliem of a. particuJar server is as follows:
I. Toe attacker wouId change her host's IP address to matcl:1 that o( the trtN.ed client.
2. The attacker would then construct a source route to the server, that specifies the
dlrec, palh the IP packets should take to the server and should take from lhe server
back to the attacker's host, using the trusted client as the ht.SLhop in the route to
lhe ,er.er
3. The attacker sends a client request to the server using the source route.
4. The server accepts the client's request as if it came directly from 1he uustc.d dt<!lll.
and returns a reply to the trusted client.
S, The trusted client, using lhe source route. forwards I.he packet on lo the atlilcker·, lu><L
Many UNIX hosts accept source routed packets and will pass them on a lhe ourct'
IOllle indicates. Many routers will accept source routed packets as well, wh.erea., ,nme ,1.1ut r
tan be con6gurec1 to block source routed packets.
. . R-lllail on the Internet is particularly easy to spoof and. without nhancement, ,u.:h 3'
::'-1 si&natures, generally cannot be trusted. As a brief examrk constder the e,,han\
•I·?Q,-; Col)lacc
, ei l,llt.sting
whenofInternet hosts exchange
ASCU-chnracter comma .nds.
n1ail. TheAn
excbung.e .ou rta•"e
muud cales u<rnga
I{I •,i,11 t h , ,,
"ml':
·\111,·r \ \ T f ' i
•0n
Pia..· atceiv Telnet
• h to connect directly to a$y1;tem·s
t ng ost trusts lbis sending
. Sim1}le
I
1,1
\.ul Tran,fcrrr,:iio, ·ol l)' ,ofed
origin l•I th<· rn.,11 ' ,i'
host. aud l iu '' • . \ e,ull 11n
-...:·g a sender address Lhat is different lr nn 1he true .itltlr , ' ·
Pri\tilcges, can falsify orpoor e mail • 1ml w11h m0r
h 1
;,,A . )
. . . . ,. ., sue as Domain "o"' N
S) '7'111 Ut' "'lll\'1Cl '
Name $ervi1:t· (I • •
1J 1eJ "b.:n
h
Website Defacement
Website vandalism or deface.ment can be the result of a !Jacker breaking mto ;: f.ffl:lt.
accessing the website files, and modifying the HTML to physically change Web pa
only do websjte defacements embarrass an e-business, but some website detacemeo .21
have serious financial repercussjons. Aastrom Biosciences. Inc., a Michigan bai.:J
products company, experienced a serious defacement created to manipulate 1b 11oc pr;a •
FebIUary 2000, a bogus news release announcing a merger with a California
biopharmlll.'.-'-""
company, Geron Corporation, was posted on Aastrom's website. Stock pnces tor·
companies rose: Aastrom shares rose from $4 1to $4.41 and Geron shares ruse from $!"
to $S1. After discovering the defacement, Aastrom notified Geron, and ri:prc.,enwui
bolb companies advised officials with the NASDAQ index, where both Mock, an: traded tJ
dlrm was no merger.
c
1 pllln,onl, IUCb as a short. common word--a name or birthda,· ,ll that Illec,e ·
........ • • ofl'.\.
11
.. .,..:.; -,!" v.ordeully. One way hacker1,penetrnle nc1work secunl) ,, , u,ini:' :,c-
d>
7
'\ ur •
plUword by trying millions of common words until VI\<' 01 ih,'"
ll ijbl.l'lullkirda lhat requile • minimum length ofix char,1c1i:rl>in u mi, olIr. .
k I Ille number of potential puawordh in10 bilhom, ,ind m,11..: 11 rn.>l'C' t
It P II them. A computer user should also change p:h,,H,r<I' rt"gu\Jrc'
• I bilia IYIIODls, it is a good idea10 have d1lktt'nl PJ"''orci• on
.,,.,ir•rY -
r ---
wall ,s u software or a hardware u d ----- 213
A ":Crrorn 1.hc public net"' ork. A firewa lo•slilatc and pn,t .
a pet_.cr ys1crns behind it Firewall, c:in contrc,i'1 vrde, an ca,Y-toe;;,t• pnva1c ,y,1cm '"
f.-0111 the public network
flluJurles Lo Lhc private net e, type nt rnlorn,at, naglc entry P<nn1 tu
"';, I_ ,e m I 1c ou1s1de. Firew•11wor,- a, weI 1a,, wh·,n, .t ta.t •• IIowe:,! t"
acccssih r, I
o I
•· all lhv k . a ' can al,o 1 ' service, lll ·.,
irt'v e the networ 1s penetrated. og a1:tiv11y 11 ''"C 1h,,
lfll'I ,oJo.,a,
,uion detecuon. ts• t hc ab1l11y
. • to unulyze •. ' ' Pmvrdc an •uu11 .
• zedk access a,
h appens · rca1•lime d· dcte,t 1
., nctwor II Bu,inc
Juth<>n · , r · , e,can ala ug, •nd itop
· 10
un niror the networ" ,or real-time intrusi on.\a install intruMon <lctecw
·
d
••31 mo
•· dece.:ted ways. A n 1n1rus1on
. . d etectioo system can n drespond
f d
lo int11J\lon, rn a >n sys1cm\
variety
J,cr· • c en a web, 1· 1 "1
10 0 111ore servers 10 mcreasc 1he traffic lhcweb,• c ag..rn,1 Dos :itt 1
bl add 10 " manage tr,
affi1c,1and b y• h aving a backui> plasite n to
can reroute
handleJegni
b Y,ust11r. hltc :, .cand
.,
nack .• Cisco's Secure ntrus1 on Detccti<)o SyMem ad N
• K
w1e,
anJ ,lunr,
f ·• . etwork mate Ira.fl c
• n JCF.", !Cr
. ·re are 1wo exarnpIes o mtrus,on detection system\ . - pac Sccur11y e
Ill f . I d"
Viru< scao nmg so tware, m e u mg e-mail vini1, scan · h
.
.
(I (
. . f
rwork computers. Anllvtrus so tware should be kept updated C nmg, s ould be m,tall.:d
.
''°" II
Jose vulnerabihues.
O
. checking • . . Sccurily consulrnntssue
• "
cnda, . 1,;·",,
ecurilY 0
Sissues Sysicms Integration offer security audil• Inc, 11, 1
11 1
ftltilll.,y Systems. andPinkert nErnest &, Young, also offer security auditi ge"'i '1.i
1
secun . fi . such ns . 1ng c . ·
ACl-ounun mis.. al . counting firms use the Amencan lnslilule of Crv,ce\. \,
of the Big Five intemat: bT :st seal and audit criteria. The \VehTrusica nH, 1-i,;:
AC(OUn1ants (AICPA) . .. verified as being safe a.nd secure by the AICPA '"d1c,1t,'"
cusiome thsl. the webs1 e1 is
be'I business .
praclices. site .
security, and customer inform•The A
1111 0 If 1
audil critenaovcr s se their own audit seal instead of, or in addition " h Pll1, r
Some accounung 5rrnsu 10 ' t e Al(
WebTrost seal. h ·11 . . , . th ·
. security consultants w o w1
I p e u o rm e penetrat ion lest
-
rr,_. available to build and operate a network or until the e-bus1n.:s l'an .iu,,i,ull1
A d d. i aJl
uon Y, some e-businesses offer their employee lhe l'Pl"' 1tU'11
I) I
hoClpll'ationg
I <alt!· allowing an empl ,
1n I tJlu1, •
h1t owned ,enonal co ?Yee to use his or her home compulCt. 1 11 ,,i ,' •
rr 1
mputer m the employee's home Cer1ainly hu"ne,, nir <-
,..
- lbll indi¥idual
-•nc11 files atPC
home · ue to these factors, it ·is im11\H'1tmt
O
· l111
. ,111'•.i,11,111,'
1
are also at risk from hackers.
t' isk Management Issues
Llsiriess . . .
-b . si ulds h omanage 11s e-busmessdnsks as a bu ine. . iss ue not 1· 1
'd '
c,blJS 'ne i n ess roust cons1 er tI1e i rect financial impact
11
i _J•i \L11, a 1e1.hn,,I,,,
A1,. Aft e- $payments, and future revenue loss from c•busi11esnk1ed1 lc 1():,,\ ,,r rcvcn!t
i-lu 1153torY . , • • ri ,\uch ,. ·
,,n•P' . oess •,nterrupuons caused by websne defacem"nl en ,, It f • .
ord
1 su_ ·on and settlement costs over employees' inapp
51
. '· '-i. rVtt.c •llact
1.,ingau , ropriatc ll\c <Jf c-m· 1 •
Z· t·
tnterr,e • .I . . , '" and the
roctucl or service.c aunsagainst items advertised andsold viaa
.
3, b-related copyright, trademark, and patcnl infriogernenLla w_th,11c;
4• eural or weather-related disasters. w uits, and
5. Nat
siness should put in place. ao effective risk h
M e· bu rogram L 1ndudei
rnanagerocn •p at
'
11:e following: . . .
, Networ and website secunty and intruder detection programs
, Antivirus protection
, firewalls
, sound security policies and procedures
, Employee education.
Another important component of a risk management program is tbe transfer of risk
via insurance. Table 5.3 illustrates some of the different k.inds of insurance coveraie an
e-business sbQuld consider when developing an effective risk mar\'agemem 1>rogram. Lt 1,; a
l'1()d idea for an e-business's management LO consult with a commercial insurance
brn'ker tia.1 offers e-risk management services, to help develop a risk management plan
mcludlnt insurance coverage.
Coverage
Compu1er Virus Protects against losses that occur when 111ploy11es open mie.:tcJ
T l'allsnilssion e-mail attachine.nls or download virus-laden sotrware
01111&annd Responds to Internet eJttortioa demand and/or pays re..,.,mJ- lu help
Reward capture saboteurs.
. tJ • d tv acces 10 dutn :trid
Ullalltk...., •
Covers failure 10 pcote<:l aga tnst 11 r ·pa, r
cess/ transactions.
Network Security network sccunt)
· . 0ntl resul1111g l..,--t,
Re.spends 10 breach
or
·
Protects againsl inlcllecwal proper!) · frhi•c111e111 lo,.,_,,
10 Jttnt
. . h ·n t,.111lt11¥ ,,u1 I'
Covers defensive ancl oFfcnsivc co , c
infringen\lml issues.
- ,s, > 11hen
ll for cm,rs .111<1 ' 11. 11
Protects .:abusincss s a1ln111,1 I10 b II)' . .• . .1,1111
1,,
-
Why Firewalls?
Thegeneral reasoning behind firewall usage is that withouL a firewall, a subnet's ;i,n:•
exposethemselves ehrent l ·insecure services, and to probes and am1.:k 1·n,01 •"''
lom· Y
elsewhere on the net k fi I 1 · . iol 'lli l , ,n
1n . woe • t rewa l -less environment,
. network securit) .r l ' , e · · I
a •mus •m Ia sense, cooperat e to achieve a uni formI\
h
hosts
of
ost secu
.
rity and all 11••h··• 1 1(
Concentrated Security
A firewall can actually be less expensive for an organization in lhaL all or most modined
software and additionalsecurity software could be located on the firewall !.y 1e= as oppo,ed
to beingdjstribured onman.y hosts. In particular, one-lime password <\}'Stems and other
add· onauthenticationsoftwarecould be located at I.be firewall as opposed to .:ach sy<t.em
that
needed to be accessed from the[ntemet.
Enhanced Privacy
Pnvacy is of great concern tocertain sites, since what would nonnalb be ci)n,idertd
i3nn0<:uom
infonnation m iohtactuallycontainclues thal would be usef ul io an ,tt ta c k c r .
' " d · N S e t , cc
U ,' .n g f i rc Y .i l l , O
some F m i !cr
sites wishdtoblock
1 , pl services
:i,' such as finger an 1 · •1 d Oth.·r
· . . · · • bom•1uhtner thacncv h,1,c rcttLI n1:,11 .m
<
nfonnauoo aboutuser•s such as their Lasl 1ogin umkt:w c b 0
· I h ·)\\ .ot1cn J ,},tcm. is u-.,J•
1
items. But, fingercould leak information toauac·ers a. . 1 ,.. svstcm ould tx·
au.icJ..cJ
1
whether thesystem hasactive users connected. and 11
hcllli:
·••
without. drawingattention. bl ·k . !It'. s, ,tcm, thu,. the
til"'Lll
trewalls can also beused to
DNS oc1nformat10 1 1 ,v ln·t.:ni.:t• ho,b \,>11\L' ,1tc,
· , .
F . .
Id 111,t be uvt\l a,,1 10
1 b.
1
of sitey wms wuu, ' h d ng 1.111tl£11\at1•11n
names and 1 1 t\t""l iu\J olh n11,.: c
TPaddres•.ses• "
feel that by blocking this informa11on. 1hcy :m: •
useful to attackers.
! 218
Need for Usag
e- -==-:::: . Network
f- <·omnir,c-0,
all ac:«SS 10and fro . • , about network usage. A l1rcwa.Jl, withupn. •tn lot
Ifd
providev al abletansucs •,, I ·1 ,,1onri111, •t...,
an bell u . · , .. ,1 occu rs, cun also prov1uc c elm s onWht•th, t 11lilrni
soundw d
suspiciousac11v c, lhc hr,
1)
. robed or attucke · t1>.•IJ
netw<>Ck are beingP llect statistics about network u ugc and cviut;n,•.
11. 1s•
. mportanl
• 10 co
Of •mary, importance ,s. . k•nowI11g c o1 Pr,)h 1 ,.t 'll\J
. wI HllI 1cr the l1rcwa1t
be of reasons. pn b I ·1 , I,\ 111,u Or•
D I I I
. ... , , and auacks. and determining whet er .
D r •contro:, on the hrcwau. I1"•.n,1
. .,..,_. - t1e JcJ
NW-eork t .. 1,,.s arc also in1portant as rnpul 11110 netw<)rk 4(<:qt.._
requircr,n
usages1a11s 1.... 0c rs \tu-...
risk analysis ac. uv1.1. ltt 1.-
1es.
Policy Enforcement
Lastly. but perhaps most importantly.
. a firewall provides tbe
. means for implem,COhng W!l;j
enforcing a network access pohcy. In_effect. a firewall provides access 10
u., l"l Jr.I
control
services. Thus,a network access llcy can be enforc d by a firewall, whcrca, lluhoura
firewall. sucha policydepends en ely on the cooperatlon _of the users.. A site ma: heab:.;
to depend on its own users for their cooperation. However. ll cannot or tt should nm depe,
on the Internet users in general.
Firewall Components
The primary components (or aspects) of a firewall are:
I. Network policy
2. Advanced authentication mechanisms
3. Packet filtering
4. Application gateways.
111d• pcm
the service ace ess policy
• should focus on Jntemet-,p,·u
. r 1•' •usr11',,,.111.l
It''•
i,e' uccess u , L e
• ti access polic
service ource in th -
ore
a implemen ting rewaJ\. A Y must be . e organ· .. Fllr a lirewall
be,, k
reat1·s11·c polircea1_. 1slic andou. l11
nuIL<1aUdon.
rotecring the networ. from known risk y is one tlial : n should be drafted
r·ources. 1f a firewall system denies or '. While Still providinprov1desa balance
betwee11 res restricts s
r lo prevem thel1rewa1r.·,e.rv1ces, g users a
lite service access po icy il usually reui ccc s tc,network
"OC basis. Only a management-backeds s,tctcss controh frttm. " tes thestrength of
v e1ng
ad A firt1wall can rmplcmcnt a numb • ound can provid e th ·. od1' fi
" p fr 1 edon ru,
°.
er o servic e
ic y
. . is.
m
• • '!1le e ffectiveness .Ot'<>n used. the use of proper fi1rewa II procedures epend 1,n1' 11•J
p0licy.)
of firewall implementa • . , and the I t
type . Ci,,i,_,
access policy. .
Advanced Authentication .
Secur ity laps e s o n the identity of Internet users have occurred
h 10 bpart
· due to
d. the
.weadk11t . h t a d itional passwords. For years, users ave e en v ised to
choose . a, ' 1
associate w,1 r al h . d El Pa sv. o ,,
thal wouId be fficuJL guess or not to revc· t eu passwor s. owcver even
• . . .' u1e
i., 1
dl 10
u·
follow thisadvice (and many do not), the fact that mtruderscan•_iddomonitor the lme l
, . , passwords that are transmitted in the clear bas rend ered tr a<liu ona lpasswords O\isoJ
, o Advanced
r authentication measures such as smartcar ds, aut en.11catJon
h . .tokens,bioroe«it1
Cl
r·
ltlVIIICel1 authentication permits unauthenticated application traffic, such ns Tdnct•>1 .11'
.41iud1 to site 5Ystems. If the hosts do not use advanced authentication, then intruders coulJ
Ip crack passwords or could monitor the network for login sessions tlutt W(>Ultl uiclu-"
, .. . w o r da. The figure also si ' te w·ith a firewall u l.llg advanced ttllll''.•ntl a u. on.
.iiini! h t h a t. ..
shows a,
·llfflUI'""'""" aIIItDa.ea t-.o_ r FI'P sessions ori g ·mau· ng from the Internet to site systt·1n, 11111.st
•n·a" tll' .,.._...,cation
' before be· • · · 1
1 •111, 1ni
,.. .l1 ltM: p a s o r da ma
perm1ued- u, . .1 :abefore
t i permitting access. However 1hc c
the site systems. The "' s•'
iJ lll'
pas:.wor(b woii .1,i
_. on, even if the ' 1, advun•
.lllMnt ....••A ft•'-- passwords arc monitored, a1-long as tic "1,r
.»
i'!:T"J:'l"ffl'l"':-
, i 1n111
1
-r firewall component11prevent. .mtrudi.:rs t.rom, 11r
pc c
,
2.2.,
Unauthenticated
Telnet, FTP Traffle
I ,,....--
Firewall System Authenucated
Packet Filtering
IP pack-et filtering is done. usually. usin"o- a a filten•ng rou1er d•sum·d r
P c ·1
ket
packets, as they pass between the router's interfaces.A pack ·et fil1erin"2· ,irn utt'n- ne
e c
ro ute
Jilter JP packelS based on some or all of the following fields: - r Uliua ) can
1. Source 1P address
2. Destination JP address
3. TCP/UDP source port
4. TCP/UDP destination port.
Not all packet filtering routers currently filter the source TCP/UDP port. though ,en,for,
ha,•e now staned incorporating this capability. Some routers ex.amine th.: router·, nct"ork
interfaces in whicha packet arrives. and then use thi asan additional till ring ntenon
Some UNIX hosts provide packet filtering capability. aJ1hough most dt' not
Filtering can be used in .a variety of ways to block connecuon, fr,,m ,ir 1,, sp,x1t1-
bosts or networks, and to block connections to specific ports. A ite nug.h1 \\ 1,h Ill t> t,l,.
·I connections from certainaddresses, such as from hosts or site$ that 1t .:om,id<'r' Ill t>e h,,,t,le
or untrustworthy. Alternatively,a si1e may \Visb lO block conn .:u,,n li,,m - II a1'ddr<'; '
CJ;ternal to the site (with certain exceptions. such as SM TP for rece 1 v 1ng -m; u l ) 1
oun,
r U ) I . .- r 1al11'1"...,,nnn-
As an example of packet Ii ltering. conshkr a po l)tlh
1 '') rn '1 .n , t,, ,,nh 1,n<'h,,-1.
1
I lO a network of address 12· ·34 *· ·* . Telnet connectums \\.Ill b,1111
. i l l\ n \ < 1
I 'i : \1 11' ,·,',11
• l 11
,,,111 1,·, "' '
23-4-5.6, which may be the site's Telnet applicatwn g:He\\':\\.• h: t· 111,, et.-,•1n1n1,
be 11 'i S h ·b n1·11 b, 1 ' '1 " ' •
_a Owedto two hosL , 123.4.5.7 and i 23.4.• '· " ic • 11 1 ·d ,11th 11 ..,m 1h..- ,11•'
N,,mNIIaiT,1,"
l gateways NNTP (Network New
. I;1 4 ...Q :111,I "• •
Tran fc:r Pnito. .:,,I )
. N
N TI '
111 1"'
· · 48 ·-?54 • ,inti only
S\'l'\l'I. - • • •
P feed system' 1296 llll' "
<N All nthN "'" 1 ..0 t 111, cr, ar,· "' ,.:-
.-,·,u ' •
etwork Time Protocol) is allowed w ull ho\1 "· •
blocked. An example of the rule-set 1s in T:iblt- 'i...l.
t SMTP Traffic only PacketFIitering Router
... ,.lnJterne 1
-·-
Figure s.s Representation of packet filtering on Telnet and SMTP.
1bc first rule allows TCP packets from any source address and port gre ter Lhan ; :
CIII tbe
Internet to the destination address of 123.4.5.6 and port of 23 al the site. i>o. g(li
die port uaociatedwith e Telnet server. and all Telnet client should_hav: un::' ,-er,
,. poda of 1024 or higher. The second and third rules work m a srn11lar (ashi •ucJ
.... .lodeatination addresses 123.4.5.7 and 123.4.5.8, and·port 25 for S1-tTP. are 11
,,
'Illefounh rule pennits packets to the site's NNTP server, but only from sour, \N11'
.6.48.254to deatination address 123.4.5.9 and port t 19 (129.6.48.254 i theon/ 10,1(11
-••-.·.. •lite should receive news from, thus access to the site for NNTI' 10 "" ,-er.
-) The ...... xiseL1 tu
• - • ...... rule pennits NTP traffic 1 which uses UDP as opt ' . II u1h,-r
9 • toany
t,'.l destination address at the site. Finally, the sixth rule 0 0• •a,bc1>·
• ii IIOl pre&ent, the router may or may not deoy nil oubscqucnt i;1,11 11 1
,,......!llltPwaemple of Packet filtering. Actualrulespermit more complex
•
V'hik sornc ol 1hcsc ,c,vkc• 'l .
. ., ' IC1l 'I\ 'I
223
. • 111 thc,,cc1v1<:c,- con1pk-1<.:1y ,nauh '· c •H:1 or VI p
u•• '' " ' I
• r • i ,cqunc.
accc:-, lo ull , l' loo,,,.
sc, vicc, 11 <INltL a nrc
lo1 inhcnmll Y nsky, hlockinu
Sll•p
lly
••uc •
· I iten1et to on y I 1 IHS yl'
Mcm, 1 ·01 cxu1111,1 m 1 my \lie, N 1 "'
. c, rc ,n 1;,1u 'I' . ·
th• I
1hut ,c llllII\' Ihe IIC o, ,, I •Ystem,
C1n 1 ur F(l>
11
,•,isl St•rvircs Nuch n, NNTJ> muyhccn, 111 . , cc , c:111 imi1rovc !he ,c Mee.- from
u,111 ,hos,· ,yMl'lll thm nccd them hcl11•· lpo 11111(, lhrcat. hu1 rc,1rict 1nvuri1,y oJ U\cl'\ a1
1, 1 '
1 1 1 1. ., o crc·11c t 11:sc ,crv·
1
. ,
1
• :, ccan1;1 network · · ice,
ttt'> thl' liJ..c 1100< o cxplnilalhm liorny 1l11 11,scnv• • I env1rnnmcnt and
r<< l1 c1c1vulncrah1l11rc\ und ihrew,
c 1ic
,4ppfication Gateway ' ·
counte,r()Im: ol lhcWcakncs\Ch ussoo,uicd w1·il
r·c11,of1ware • • 1 p ckc1ltlicr' ,
1
u,;-rl'
upp 1cu111111s lo lorwar<l anll fillerc 0
Such an apphca111111 . . . ts rclcrri;d
. to ti\ a pmxynncctmn
.
.
. · r,1 ring
. , rr>ulcrh.
·. such
services
fircw;.lls need t<i
a 'Iclnt:t ant!
l r ., Cl vice, wl11((! Iht: h, l
t•ivire is re ,cm;u 10 as an applicaLion Ap . . . 1s runmng the I pro y
P 1
' gateway . ·
router can be combmed lo provide higher levels of IC, tlum gateway1, , 1nd . k
. · _'_ p ac et h lcnng
wen.:. "d·•l1)nc security and rlcx1b1lity than if either
U!' ·
- Once the decision is made to use firewaU technology Lo implement an organization's ,ccuntv
policy. the next step is lo procure a Arewall that providc-s the appropriate level ol
protecuo and is cost-effective. However, whal features should a firewall have. al a
rmnimum, 10 provide effective protection? One cannot answer this qucsuon entirely with
spec1lics. but ii is possible to recommend that, in general. a firewall should have the
following ,gruricant features or attributes.
L .Be able to support a "deny all services except those specifically penmttetl" de>1gn
policy, even if that is not lhe policy used;
2. Support your securily policy, not impose one; _ _
3. Be flexible and able to accommodate new services and needs ii the ecunt} policy of
the organization changes: . • . r. . ,
4. Contain advanced authentication measures, or should contmn the hl ok, .or in,ia1rn
advanced authentication measures; . Ii d h l,t ",tem, J.'
5. Employ filtering techniques io permit or deny service to specLc l, ·,· '
needed; . . . • .. rTP and Tcln<'l. s11 that advan,rd uu1h,·n·
6. Use proxy services for services uch as . iire,,all 11 ,<'I'\ 1,c, ,u,h
. . I d and centrali1ct 1 al I1\C . d
t1cation measures can be emp oye • .. sh(luld cnntuin the .:t1!'Ti."s1x1n ,ni:
11
r as NNTP, http, or gopher arc required, thc firew,i
d proxy services; r ,Ju.:c thr<'ct s 1TP conm.•c-ti,,: ,
1 11
7. Contain the abilily LO ccn1rali1c Thi
SMTP s n:acl·css.
ults 111 l:<''.. inliicd
• h,inJlinf ol sile e,mau
f bet
· ween &ite and remote systems · · ,1
11trmuuon cJn !::
blI'c 111s,;r'< '
, .· IC such 1hal pu J w1 re,1u1r<"
8• Accommodate public access to 1I1c s, · · .. ttc ,s,i,·111, 1h.1l '1 1
protected by , . ,re11•itcd 111111,1 ·
h
the firewall bul can c sq_! =-•
the public access;
224 ---------- -------:.::·" "'"'t<>,A
concen u:ate and filter
d dial-in
, . acceg 5
, d'
'4.n-.
h.
,,
eon :..
_._:,'
'n the auu 1Yto I0 gging traf1ic an susp1c1ous activity
1
'-."ii.
9. meehanisms are readable and understanda_bla· nd alsu ,,"·
JO eon-· . for· gs
· for log so thato1 e,
th and correct_ness is verifi•
redueu_oanmanner
10 that its s1reng
""t
i,1
e developed th3I it can be undcrslood and mam1 inec1; able, It, .
JJ. B , fl •
simpl e designso and other bug xes,I a1 ar l une '"'I I
" 'I,
in regu inte
h
pd8 red wilh patee
5
rva1 .
12. Beu • operating system such UNIX, a ecu d ·
all requires an U ·th h re v...
"- If the m
w<-w d be a part of the firewa . w1 ot er securitylOOls --•100
aperating sys1erosh ul 't The operating $ystem should have all patches necc1s1
ensure firewallh sl= e should be flexible. user-frien_d_Jyro programa. 1t.11IC1 1 l\J1,
The IP fil nng 7,ossible including source and destinal1on TP address shou1 fili
on as many attnbutesasTCP/UDP
and desunauon port, and inbound• and outbound
h interface···Protl\cc.111);·
source nd btably more issues and reqwrements. owever many or
There arehu ·t 0: own needs. A thorough requirements definition and hlo11
llll Will
specific to eac s 1e . • he\ ""
'dentify most issues and requirements; 1owever 1t should b ee e- b ...
assessment w1•ui , rk N 1vu1nerabil"1t1es can arisemp,.,a;itio
. [nlem et is a constantly changmg
.
oetwo '. ew ·a1 d'ff i . '
•tah an
t d enhancements toother serv ices may represent potenu 1 cuh1 cs for a n,,u ,
services
teh . , 6ll'lllll
installation. Therefore, flexibility to adapt lo changmg nee1 • 1s an 1mportan1 considera1illl.
.
Technology Polley
Al,- aovc towards the unioo of elemeob. the 1.ontrub en, 1ro
.._ • P a-tovcngc. la Wi unden.tand these 1hrec elem nb md1\ldualh
Pert• 1- COft dcuw:n1 i, the most important, The people l"knll"DI romp -.;;
• •• R>lea ad rapomibilities wilhio the organaz1111t111. l hc-..c
arc lht· p(\ r,n:
,. • I lfllc1e I '° ..,,.,.. aad li!lpp,)rt the procc" A fr ic role.-, 1n,lud
J
rmN m
• b:::::U.S. 'Yllem Ind IT admm1stra1t1r-,. end u..er,, and 11ud1wr;
1 1
,.... 4 U -.Glllprila lhe ICCurity \'i ion 1atenK"nt, se, uni\ poh.-. ao<l
•• [ p •-
'ML
• .... 11ba111cally 1he riucn sec-uni) c.-n,1ronnl('OI
D11'W'L:-
I I .,;n Ider IO ror direction und 1!Uiilitn.:,•.
II
-- rt la;;; 1!■ lool1, mclhoch. and1ncchani-m, an pl:i,c 10 ,u
· y 1001---cmhraccd hy lhc o,·g·in . , - -
• .;ccUr1 1 l _- 227
c: 1Z..:tllon
th• nil" anti opcra11(1nal lonls lhat will f .. , I l IC leth11ology !hen i• lh I
1110 111111 .,. uC1Hate 1hcpmcc , ,, e en01ccmcn1,
fhe concept 1s that each core clement couldh. ..
,ssues can he mea,urcd against thc mudcl cdmca,urcdlt,r cffec11vcncs\ nndc•>vcr-i".
1,1,0. ·
h, , , ctcrm,nc wh· , be
,sue 'fhC t>hJCCllVC I <:n IS LO l110VC issue,· into11,le <11 CUl\lrol \;l)Vt.:ruoc fnr lh·1
1·· i·n·il ob•ecovc
1hC 1 • .
111of muvlng the issue llllo v ,h... -' 1" "111crscct1nn
ldl "'urea, • "
ol the element, "-wnh
c11 0J"c • 1 ot
• . 5,,re· i dcn111icd,heach tcp lof manage
'
ii into th .st. covc111ge,
Iogy. 1 the . the is
, . ,uc r i s kw ·1,I ,, .one ' c,f gn.::u A, ri k
· ' l e policy, or r<:solvud 1 1emcms of
.,.,op • lh . core c
rec no issue 0111: lht: cl• · d
,.- f the tither clements can ' '- WI nt a drcs,ini
enhance Lhi rcsoluuon A lh , cments. ,tJ h
one o,ils environment and uultzcd . . . concert the · ' e Core clemcnt, ., arc addc 111
conlr• ·
• . •. 111 issueisth rtJso1 Ie
'
s coverage 1s g1cater. ·· n V<:u un scv ral lrtmts- lhc
co111rOl·
8. Install Firewall +
Train Firewall Administrator
C.Install Firewall +
Train Firewall Adm1n1Strator
Write Firewall
Standards
A.Install Firewall
Policy
Technology
Business
Initiatives &
Decision Drivers Threats
Processes
j
Technology Vulnerability
and
C
Cl>
' E
Design : e
Phase €
E Policy ' ll.
fl)
E (/)
Ill
8
'E
a, 1
E
Cl>
C
0,
«l
C
(U
Security Model e
::E
·0
c
l C
m
0,
C
C
l>
Security Architecture and C
Implementation en
Phase Technical Stc1ndards "
Administrative and End-user
Guidelines and Procedures
1
Enforcement
Processes Monitoring Recovery
Processes Proceses
oUgh? Arc 1
•1
\r,· ilw "1111• .•
tt-,colt- ...,....,..,,1hlf:e door lrumcs strong cm111g 1
"' I .
.
---- -=-=::-:::
111:e, c· = = =" -.
v, 11 e· 'I n Ind
'◄np
230 . D 0 1he hys·,cal barriers extend from real ll "1,.,,
. .-.f with grills? P • .• O()rl
IY 1g. and real ceilmg through which so
.O
r\!41,.• 1,
sc,c111"" false ce1 111 . h . llleboo "'''Iii
tif1Jl gllP 1,ecween akest link while assessing l e pcnmcter tlefe Y t<iuld t, 1
is there aeed 10 detecl the we oatrolled through card-contrQlled cmry gainc 110,,t.,i,
•,,? We n rded? Are they c . e,•1A i,t
11
•
points gua . ·ng the entry points.? re ,,., lh I\•
,coess recep1ionisl moniton c
guatdS or ontrols. O ly tbe authorized · personsI should be allowedac.
C c_..s to
en c . Id be nachjeved by hav inga c ear access control Po l t11e 't<:,
.
area. - T hiso, b,ective co . ..;. olicy appropr iate measures sI1ou b e .in place Tichy def1n1n, ',',i
u . Id
. hts Based o n " " " P • I" e s.wipe . c •"'
access ng · f a c c ess co ntrol conLroll ccl nic._ ,ri,
. k d
dev ices th I
car d
may take e fonn. s and visible identification badges. tior , liii 11 ,,
information about v1s1tor ,1
Secunng . o f1i ces, roo ms and facilities. Location of . the
k secure. .office wahin lhc Phh1
secure
. hould be chosen with care. AU the ns·s perta1111ng lo fire. Ho0c1, C.lf1
penmelers d d. t exp\01·
d other forms of natural or man-ma
t e threat e 1sas er should be considered . Iii>1
al ban
civilIdunres .
from neighbouring prenuses. caused b Y l ea"age
,. of water, spread·
cou so
fire. 1btr . ·a1 E b lk . 10a ,
or storage of toxic/inflammable/explos1:e maten . ven u · supplies like Sla\i4
should not be stored within the secUie prellllses.
The secure location should not be publicized in any manner. No display board,
bannen signs to indicate the presence of any important information processing activity.
Even internal telephone directories should not be readily accessible to outsiders.
Support facilities like photocopier, fax machines. which are constantly acces a b)
everyone, should be located away from the secure area. Suitable intrusion detection
£ystemi lite CCTV, motion sensors etc. should be installed and regularly tested.
Working in secure areas. Security equipment like CCTV and swipe-card controlk,J
gates are of no use if the persons working in these locations are not trustworthy or of!
incompetent, or simply lack awareness of their responsibility. They should be hand-pitkC!l
and ttained for these operations. They should not brag about their nature of work or locaoon
Also, information should be provided on need-to-know basis. Segregation of duties houl,I
be scrupulously followed with strict supervision. Third-party personnel should be gr nttd
cled access. No photographic, video, audio or other recording equipment must be allo111
IIIBide the premises, unless authorized.
!-'•tedlellivery and loading areas. We have taken care of every aspect of physical,,-.: :,
18
lbe above P graphs, but do we know how canteen facilities get into secured pre:01_''.·
How lbe trash takenout? How the courier delivers lhc parcels? In indu tnttl pr,ou-c;,
18
... co,slclbe ovement of i•ncom·ing and outgoingmaterial. AIJ tlr·n, tr,,iftlc l\ N'
constanmt
to• uolaled from the secure offi .
ce area, so that 1t does not pose a threat
Security of the Equipment
111d protect1o ·1· of lll<
. n. Our next concern is the appropriate $ecun) \("1cl
cessmg equipm r 1 11et
. en t needs to be handled careful 1 'l'ht.. 11tht'
on phyaical location. The location should nunim 1.e
1
ror uni
we
II
1c cs ury
ihdl ai.
aCC<'S'-, as
asI
L
lC
well prevent
as
nsk lrum
.
.
nut \noop1n u
--
l
should -
231
,
i,k ,
tJI • I · 1
urn tl1,astc t 1. "" such a6 01
1· c.Jer nsks hl-c e cclnca1 and ch:clmma, ... · r, 1ke fire, flood . m1mnu1,e •lu:
-u n,1 gilChc mterfc . · chemicals e tc Al
, , ,iics. .
lnfonnat1on proccsking w· ii rc ncc, humidit y etc. , so.
pu11•e11111
• • 1 come I h I
ly This .:ould be lhc WOJ'bl lypc ol a den,·I I f Q u l '" lhe ab;encc of, ..
, i l 'J ' , 111 n1 is nccossm y to understand lhe ima '•service au ck. A thorougah,hu11 t,le power
, , , ., e =
· ·irions, cd I I . pact c.,n nun . I b . usme,;, n h
B.i• 011 11c cva ua11011, llppmpn lc •. •ava1a 1lny or pnwcr f . . ·
t1u1, 11,csc couldbe: measures need tu he taken. or certam
Cabling security. We really need co remember every detail. including the proverbial la,t
nail. Do we know the physical layout of power cables and commumcation cable, m our
premises? The first step will be lo obtain wiring diagrams and update them. Then. do
physical inspection and assess the protection needs against damage. interference or1merception
F.,tablish the best practices for laying the network cables as well as power cable .
anJen.,ure that 1hcse are actually implemented. The next step is todecide on additional secunty
protect1 1n required for the network. This could be ex.pensive for an old in mllation.
Saiet} measure, like use of aanoured conduit cables, underground ducts. or fibre optic
cabling will require huge investment and need to be justified based on risk assessment
But simple measurt! like providiQg locks to the communication cable
patch board, which are often 11,er-looked.
should be immediately implemented.
Equipment maintenance. ll is noanally expected tha1 due cartl 1, taken for equipment
• . . d F ·ecur·11v ''""k t\\\l mOrt! mca,ure,
mamtenance, and proper records arc mamtame . roma s . • =•,:. • , _ , , 1,,
1
are required. One is to maintain record of faults that were nolu:ed. uml ' ,ccmid ,tr, th
maintain records of aU equipment sent off the premises form:Hntcmmc,·.
S · • 11 1
,· 11f cnmpu1er, aml l''-P·mdin ' ' c
e c 1ur1ty of equipment off premises. Shnnkrng 11 •xtrcmdy
$LI mt'h 11', Pw.,., ' ·111 • "di a,,
· .1,
ar e a ne works have made the computer cqui
•
pmt:i r ll i• uh hn \t'I! I
stora . · II 1:· ,. Moon.·, 1,1,, •1 •
g e capacny of mobile devices has been to owm,. .. tr. \ 11wu, ,·1>ntn•h
m o n s. St h ecurm<>
. . these devices is as .tmportallt sec °' the. d,lla .,en
111 I c..,,r1x•r.11e poll,) ' 111
lha1 h <> ' • 11..1 •, I'•urin"
kll p,•n111ssu,n,
'
·8 . 1 ' ' , .• ,
c q u iJ disposed _ M ·or of dat.a from lhe 'deleted' storage devj:nt sen1 rnr
e, qr---
u , )
I IY ·bJe lO """"1ng d . tin d es. Ev t
toa thorough erasing an overwn g t eMroy the !11thi,"'
,111111"' be sot,jeeted could be recovered even after multiple overw .• data_ i.. llt\,
k-- ,
di . . n l !n & a
,- .,.uclaim that the dapthaysically l e me a con ta1 rung top secr e t . nd
WO dcSirable to 1nfol'.l'ctai· ill!,.
h fl"ll'tiii.• ,
destroy
SecUN! BehavioUr . .
cl screen policy. Our concern for tnformatrno security ,
aeardeskaad and equipment. SensiLive information could be acshouldalll11
securing the premise 5 h .f tess1b.J ·
al 1t c e 10- identify
.IS o essarv and protect
• 'fy t e m ormation in all ll S.<1nca 1n n i, ;
. a t, ,
. J
fc,ml&th
: and
. f • -' o n na ti on will help to . ., ut having a n
e
b
C)assdicallOll o 1w, • ,,
1denu sen s 1t 1v .
"clear desk and clear screen po!Lcycould ensure actu apro1ect1on.
uy,
l _
.
. it
In bnef, organii :tl!rii
_- - ,i , , . nder lock and key and do not allow anybody to snoop. Theg gu1i1e11li,
foUowin ·
c ; n , , 1,. . . . . .g U
should be issued: ..
• Lock up all documents and media when not being used.
• Prorect the computers and terminals through use of key locks, password .il]}d
savers.
• Fax.and telex machines used for confidemial information should not be teftunai1endli)
• Access to photocopiers and scanners is restricted after office hours.
• Printing of classified information should be supervised and all printouts mllliii
mnoved immediately.
JlftnO'qJ ofproperty. Any movement of equipment, information or oftware shoold«
only with proper authorization. All these movements should be logged and
recordsmainJ3iwJ for all outgoing and incoming items. In these days of storage media
capable of conulin gigabytes of infonnation, this procedure becomes very important.
Employees should bemm! aware that spot checks would be carried out to ensure full
compliance.
Security is being paranoid about threats. Physical security is very demonstrative abOOIlhi>
,. •• But, it also sets the tone about the organization's concern about information see,Jlll)
112 C(IOli1"1
but it is fast becoming a factor for companies to,11ihl_lT
............
r..e. quirement
111
' •·A" and reliable"
envkonment-defined by st rongc P dus1ri_1; lltivefor thegrowth
and future
· · success of Lhe!TES-BPibcl (li:ill in · pushing
ve
1h.il thi.s
,r -
cause and ensuring a · u1 n,,.-
benchmarks with the best across the gloll<'- In
secllritY Environment in India
1na: ,,",mpan1c, I urc \..nown tor their quality llch vc•.ra ble, Intern· I I
<l()( l went ,1 ong wa) m e,1abh,h1ng 1h,, rcputat,on I 1k a. iona ctruhc lmn like
10
rJ, n 1nforma1io,nccunl) 1s .ilso helping ewisc tollo1111ng mu:rn u,mal
Ind 1
'1•rs Whilemo,1lndian BP() firms arc r«og' "1zcdom,pamc, hu,h.l crcd1h1hty amon
10 c · . . . · e or high nualll
c, nformauon secw-ny practices aced to be constant\ ., Y proce and
!Cl'.._ : 1
;p,dlychaogmgenv1ronmcn1 Customerdatadcmayndrc,,ev. dlaf updated accordmg
10 u,.,
nd
pe"a ocus
JnJiancompame have ro .hu,1security pracuce, comparable 10 lho,e 1o11owed by111c 1cm
r
..,.,,,..-.-,·,c, Indian 1.:ompCames pa• ma.nly comply wnh BS 7799-·•, ghiha,l tandard
that co,cn all Jornains of ,c unty ompamcs ,1gn Service Lc,cl Agreements tSLA). v.hich
have Ct} stn<ct onlidenuahty and security clau<,e, built into them at th.. net O k and dau
level S11th
I
st.A, aho co er all relevant law, that the companies want it, ofhhorc provu.le to co I
,ih ndacuons that can be taken in case of breaches. mp
l 11
Law, ,uch as the IT Act, 2000, Indian Copyright Al.:I, lndi.m Penal Code Act and the
IDdiill ContractAct, I972 provide adequate safeguard to companies off honn., .,.or\; \;S
anJ UK Most of the BPO compamcs pro,iding ,er,;ices to UK client eMurc comp c
with UK DataProtccuon Act, 1998 (DPAI through contrnctual agreement,
Companies dealtng with US clienb require compliance depending uron the
industry
icned. e.g. HealthcarerequlfCScompliance w1lh HIPAA, fmanctal ,er\lcCS require comp
v,uh GLBA To en urecompliance with such law,, Indian ,cndors follov. =nt)
pncu
as specified by clientssuchas security awareness. protection of informationn n-disd ur
aireements. screening oremployee:., etc. f·urther. cheat, conduct P' n, iic audlb to ensilJ
compliance.Manycompanies inIndia are undergoing/ha,c undergone S.\5·0 Audit
1 ,.s.
11 ignmenb help:. servicecompanies operaung from India to 1mplerrn nJ
1
1mpro,c
COOUUls, cn:.urc minimaldisrupuon to bu!>ine,s from clients' uull1tor and pot t marl
tool 10 the face of increasing competition.
EXERCISES
I. Describe how onlincweb,itc opcrution, .111 h,· prott-tcd frum
2. WOu 1 h•at 1s the role of a
3firewall' c, to en re lo m,e 'un
t
,,1
111 111
' tsidc hrewalh, what arc the 111a111r t<•t·1 11"•tl
1l e
4• What ts the use of a prolly ,c cr'! · ·
,3: 4::: £-com_ :..:.;.::.ITl(':.::..:.:rc::e:.'.. n l
n tda, 1