Friday, August 23, 2013

Threats

 Management must be informed of the various kinds of threats facing the organization
 A threat is an object, person, or other entity that represents a constant danger to an asset
 By examining each threat category in turn, management effectively protects its information through policy, education and training, and technology controls
 The 2002 CSI/FBI survey found:
– 90% of organizations responding detected computer security breaches within the last year
– 80% lost money to computer breaches, totaling over $455,848,000 up from
$377,828,700 reported in 2001
– The number of attacks that came across the Internet rose from 70% in 2001 to
74% in 2002
– Only 34% of organizations reported their attacks to law enforcement

 The 2002 CSI/FBI survey found:
– 90% of organizations responding detected computer security breaches within the last year
– 80% lost money to computer breaches, totaling over $455,848,000 up from
$377,828,700 reported in 2001
– The number of attacks that came across the Internet rose from 70% in 2001 to
74% in 2002

– Only 34% of organizations reported their attacks to law enforcement.


Acts of Human Error or Failure:
 Includes acts done without malicious intent
 Caused by:Tnlearners.com,edu.finstechnologies.com,webexpo Tnlearners.com,edu.finstechnologies.com,webexpo
– Inexperience
– Improper training
– Incorrect assumptions
– Other circumstances
 Employees are greatest threats to information security – They are closest to the organizational data.

Acts of Human Error or Failure:
 Employee mistakes can easily lead to the following:
– revelation of classified data
– entry of erroneous data
– accidental deletion or modification of data
– storage of data in unprotected areas
– failure to protect information
Many of these threats can be prevented with controls.

Deviations in Quality of Service by Service Providers:
 Situations of product or services not delivered as expected
 Information system depends on many inter-dependent support systems
 Three sets of service issues that dramatically affect the availability of information and systems are
– Internet service
– Communications
– Power irregularities

Internet Service Issues:
 Loss of Internet service can lead to considerable loss in the availability of information
– organizations have sales staff and telecommuters working at remote locationsTnlearners.com,edu.finstechnologies.com,webexpo Tnlearners.com,edu.finstechnologies.com,webexpo
 When an organization outsources its web servers, the outsourcer assumes responsibility for
– All Internet Services
– The hardware and operating system software used to operate the web site.

Services:
 Other utility services have potential impact
 Among these are
– telephone
– water & waste water
– trash pickup
– cable television
– natural or propane gas
– custodial services
 The threat of loss of services can lead to inability to function properly.

Power Irregularities:
Voltage levels can increase, decrease, or cease:
– spike – momentary increase
– surge – prolonged increase
– sag – momentary low voltage
– brownout – prolonged drop
– fault – momentary loss of power
– blackout – prolonged loss
 Electronic equipment is susceptible to fluctuations, controls can be applied to manage power quality.

Espionage/Trespass:
 Broad category of activities that breach confidentiality
– Unauthorized accessing of information
– Competitive intelligence (the legal and ethical collection and analysis of information regarding the capabilities, vulnerabilities, and intentions of business competitors) vs. espionage
– Shoulder surfing can occur any place a person is accessing confidential information
 Controls implemented to mark the boundaries of an organization‘s virtual territory giving notice to trespassers that they are encroaching on the organization‘s cyberspace
Hackers uses skill, guile, or fraud to steal the property of someone.

Espionage/Trespass:
 Generally two skill levels among hackers:
– Expert hacker
• develops software scripts and codes exploits
• usually a master of many skills
• will often create attack software and share with others
– Script kiddies
• hackers of limited skill
• use expert-written software to exploit a system
• do not usually fully understand the systems they hack
 Other terms for system rule breakers:
– Cracker - an individual who ―cracks‖ or removes protection designed to prevent unauthorized duplication
– Phreaker - hacks the public telephone network.

Information Extortion:
 Information extortion is an attacker or formerly trusted insider stealing information from a computer system and demanding compensation for its return or non-use
 Extortion found in credit card number theft.

Sabotage or Vandalism:
 Individual or group who want to deliberately sabotage the operations of a computer system or business, or perform acts of vandalism to either destroy an asset or damage the image of the organization
 These threats can range from petty vandalism to organized sabotage
 Organizations rely on image so Web defacing can lead to dropping consumer confidence and sales
 Rising threat of hacktivist or cyber-activist operations – the most extreme version is cyber-terrorism.

Deliberate Acts of Theft:
 Illegal taking of another‘s property - physical, electronic, or intellectual
 The value of information suffers when it is copied and taken away without the owner‘s
knowledge
 Physical theft can be controlled - a wide variety of measures used from locked doors to guards or alarm systems
 Electronic theft is a more complex problem to manage and control - organizations may not even know it has occurred.

Deliberate Software Attacks:
 When an individual or group designs software to attack systems, they create malicious code/software called malware
– Designed to damage, destroy, or deny service to the target systems
 Includes:
– macro virus
– boot virus
– worms
– Trojan horses
– logic bombs
– back door or trap door
– denial-of-service attacks
– polymorphic
– hoaxes

Compromises to Intellectual Property:
 Intellectual property is ―the ownership of ideas and control over the tangible or virtual representation of those ideas.
 Many organizations are in business to create intellectual property
– trade secrets
– copyrights
– trademarks
– patents
 Most common IP breaches involve software piracy
 Watchdog organizations investigate:
– Software & Information Industry Association (SIIA)
– Business Software Alliance (BSA)
 Enforcement of copyright has been attempted with technical security mechanisms.

Forces of Nature:
 Forces of nature, force majeure, or acts of God are dangerous because they are unexpected and can occur with very little warning
 Can disrupt not only the lives of individuals, but also the storage, transmission, and use of information
 Include fire, flood, earthquake, and lightning as well as volcanic eruption and insect infestation
 Since it is not possible to avoid many of these threats, management must implement controls to limit damage and also prepare contingency plans for continued operations.

Technical Hardware Failures or Errors:
 Technical hardware failures or errors occur when a manufacturer distributes to users equipment containing flaws
 These defects can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability
 Some errors are terminal, in that they result in the unrecoverable loss of the equipment
 Some errors are intermittent, in that they only periodically manifest themselves, resulting in faults that are not easily repeated
 This category of threats comes from purchasing software with unrevealed faults
 Large quantities of computer code are written, debugged, published, and sold only to determine that not all bugs were resolved
 Sometimes, unique combinations of certain software and hardware reveal new bugs
 Sometimes, these items aren‘t errors, but are purposeful shortcuts left by programmers for honest or dishonest reasons.

Technological Obsolescence:
 When the infrastructure becomes antiquated or outdated, it leads to unreliable and untrustworthy systems
 Management must recognize that when technology becomes outdated, there is a risk of loss of data integrity to threats and attacks
 Ideally, proper planning by management should prevent the risks from technology obsolesce, but when obsolescence is identified, management must take action
Attacks
 An attack is the deliberate act that exploits vulnerabilityTnlearners.com,edu.finstechnologies.com,webexpo Tnlearners.com,edu.finstechnologies.com,webexpo
 It is accomplished by a threat-agent to damage or steal an organization‘s information or
physical asset
– An exploit is a technique to compromise a system
– A vulnerability is an identified weakness of a controlled system whose controls
are not present or are no longer effective
– An attack is then the use of an exploit to achieve the compromise of a controlled system

No comments:

Post a Comment