information management and security -...

79
INFORMATION MANAGEMENT AND SECURITY Professional Training in Information and Communication Technology (ICT) and E-Governance For Class III Officers of the Government of Nepal 2016/05/24

Upload: dinhkhue

Post on 30-Mar-2018

216 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

INFORMATION MANAGEMENT AND

SECURITY

Professional Training in

Information and Communication Technology (ICT) and E-Governance

For Class III Officers of the Government of Nepal2016/05/24

Page 2: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Need to know

WE are now responsible for managing information in OUR

workplace.

Identifying and saving official records is a VERY important

part of OUR responsibility.

Managing information effectively ensures that information

is available (captured, organized, maintained, preserved),

protected and disposed of in accordance with legislation

and policy requirements.

“In an era where decisions get made on BlackBerry handhelds and

over mobile phones, the paper trail”

Page 3: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Outcome

Understand about data and information

Characteristics of data and information

Overview about information management

Understanding about the records and its types (official and transitory)

Importance of IM

How IM will benefit for you?

IM and its lifecycle

Types of information system

Understand policies and procedures

The goals of IM

Strategic to implement IM

Recommendations

Page 4: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Introduction about Data, Records and

Information

Page 5: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Data and Information

Ask yourself about data & information???

Page 6: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Definition

“It is said that information (or knowledge) is power, but

on the other hand, that information by itself is worthless

and cannot solve problems. Information has power only

when used and applied effectively.”

- (Boon 1992; Martin 1984; Paez-Urdaneta 1989)

Page 7: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Sources

Page 8: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Characteristics of Data & Information

Data that is:

Accurate and timely,

Specific and organized for a purpose,

Presented within a context that gives it meaning and relevance, and

Can lead to an increase in understanding and decrease in uncertainty.

Data mining is an emerging concept which is used to extract hidden and previouslyunknown information form the large amount of data.

Information is valuable because it can affect

Behavior,

A decision,

An outcome

For example, if a manager is told his/her company's net profit decreased in thepast month, he/she may use this information as a reason to cut financial spending for thenext month.

A piece of information is considered valueless if, after receiving it, things remainunchanged.

Page 9: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Records

A record is essential for the business;

They hold evidentiary value of either a business decision or

are kept for compliance reasons.

A record has strict rules associated with it and is mainly kept in

a separate repository from normal working documents.

Common example of records are;

Details of appointment, transfer, posting of, receipt of medical expenses,

availing of study leave, extra-ordinary leave, maternity leave, maternity

care leave and leave without pay by, civil employees shall be updated

in the seat roll (personal description) of the concerned employees

maintained in the Civil Employees Record Office. (Extracted from Civil Service

Rules, 2050 (1993))

Page 10: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Official Records

In order to ensure that the Government of Nepal and the

other organization can provide documentary evidence of all

of its activities, all government/public company’s employees

should maintain the official records.

All employees should be able to identify an official record

Official records means a document or provide evidence of an

activities

Save all of official records

This means email too

Current practices may be manual

Page 11: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Example of official records

Briefing notes, directives,

policies, final reports and

recommendations.

Workplans, schedules,

assignments and performance

results.

Materials that document a

decision, a transaction or the

position of the department.

Deliverables.

Materials of historical or

research importance.

Information and deliverables

from outside sources.

Agendas and meeting minutes.

Documents that result in a decision, or that result in the implementation of a policy or activity.

Documents that require a signature (must be printed and filed as hard copy).

Materials that would allow for the reconstruction of the evolution of policy and program decisions.

Materials that would be required to support a financial, administrative, or legal audit.

Page 12: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Transitory Records

Transitory records are information sources that are only required

for a limited period of time, in order to complete a routine action

or to prepare a subsequent record.

All employees regularly delete transitory records

Dispose of or delete transitory records once they have served

their purpose

BUT -

If you are ever in doubt about a record’s status….

Keep it!

Page 13: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Example of Transitory Records

Duplicate copies used for

convenience or reference

(originally maintained by

somebody else)

Information received as

part of a distribution list

Miscellaneous, “FYI”

notices or memoranda on

meetings, etc.

Casual communication and

personal messages

Any of the following would be considered transitory records:

Photocopies of departmental

publications

Draft documents where all

critical content changes

have been incorporated into

a subsequent document

Working versions not

communicated outside

Page 14: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Importance of Information

We must be able to easily produce all of the appropriateinformation when the public, or other departments, ask for it– transparency.

We must share information (make it accessible)appropriately among our colleagues, betweendepartments/agencies and across government to facilitate,enhance and make more efficient everyone’s work –collaboration.

We must be able to use the information that we have tomake effective and informed decisions.

Page 15: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Implementation of Information

Management

Page 16: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Information Management(IM)

Information management (IM) is the collection and managementof information from one or more sources

Distribution of that information to one or more audiences.

Control over the structure, processing and delivery of information.

Information may electronic and physical.

All information management throughout the information lifecycle.

Information will be collected regardless of source or format(data, paper documents, electronic documents, audio, video, etc.).

Information may delivery through multiple channels that mayinclude cell phones and web interfaces as well.

Page 17: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Architecture

Page 18: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Benefits of Information Management

Find the right information faster and easier - when we need it.

Reduce ‘level of effort’ by minimizing duplication of work.

Will be able to more easily share information with ourcolleagues.

Will be able to provide easy access to quality, reliableinformation to others in the department, inter-departmentally, inprivate industry and in the public, as appropriate.

Will be able to make informed decisions based on up-to-dateinformation,

Will increase our ability to meet business, legal andaccountability requirements, such as access to informationrequests, litigation and reports to the parliament and concerndepartment.

Page 19: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Information Management Life Cycle

Source: Association of Information and Image Management

Page 20: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Capture Information

Office Document

Forms

Rich Media

Micro Films

ERP

eForms

Finance

XML

Technologies used to capture information are:

OCR/HCR/ICR/OMR/IDR/MICR

Document Imaging

Forms processing

Web forms

Aggregation

COLD/ERM

Page 21: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Manage and Preserve Information

Electronic record management

Digital Assets Management

Document Management

Email Management

Web Management

Business Process Management

Collaboration

Work Flow

Technologies used to store information

are:

SAN, NAS, Magneto Optical, DVD, CD-

ROM, Tape, Magnetic Storage, RAID,

Optical Disc

Necessary archiving, their proper

retention and proper management to be

in place with appropriate technology.

Page 22: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Deliver Information

Print Distribution

Paper

Fax

Web Distribution

Internet

Extranet

Intranet

Portal

Email

Communication Distribution

Mobile Device

eStatment

Transformation Technology

COLD/ERM

Personalization

XML

Format

Compression

Syndication

Security Technologies

PKI

Watermark/Digital

Rights Management

XML

hgtfsf] ;"rgf ;DaGwL clwsf/sf] ;+/If0f ug{ / ;/sf/L /fhkq, P]g, gLlt, lgod, ljlgod, lgb]{lzsf, ah]6, sfo{qmdx? tyf ;/sf/L kmf/fdx? ;/nLs/0f u/L l8lh6fOh];g u/]/ ;fj{hlgs k|of]usf nflu ;/sf/L Portal df k|sfzg ul/g] / ;a} ;]jfu|fxLx?nfO{ pQm kmf/fdx? k|of]u ug{ k|f]T;fxg ul/g]5 . -;fef/– ;"rgf k|ljlw gLlt, @)^&_

Page 23: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Inline with Policies

Information management must always be aware of and respect the legislative and policy of requirements:

Privacy;

Security;

Copyright;

Retention;

Access to Information;

Language; etc.Governmental Documents Disposal Rules, 2027 (1971)

Information Technology Policy (2067)

The Electronic Transactions Act, 2063 (2008)

Electronic Transactions Rules 2064 (2007)

The Copyright Act, 2059 (2002)

Information Technology Guidelines (2012)

Page 24: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Information Management Overview

Information Management System

Page 25: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Information System

Information Description

Transaction Processing

System(TPS)

These are the information system application, which gets the data and process them

for business transaction.

Management Information

System(MIS)

Provided management oriented report in predetermined fixed format. This helps

managers on planning, monitoring, and controlling the various operation.

Decision Support System

(DSS)

Help user to make decision by providing useful information that support

unstructured decision. DSS identifies problems, purpose possible solutions, access to

information needed, analyze possible decisions and simulate their likely results.

Expert System (ES) Simulate the thinking of experts. This will be implemented with artificial intelligence

technology.

Office Information System

(OIS)

Support wide range of office activities for day to day operation. Supports and

improve workflow between workers regardless of their physical locations.

Personal and Workgroup

Information System

(PIS/WIS)

Personal information system is for individual productivity and design to support a

single user’s needs. Workgroup information system for meets the needs of work

group and increase the productivity of groups.

Page 26: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Goals of Information Management

Quality information is created and provided

Government program and service delivery is efficient

Decisions are documented

Information is available (captured, organized, accessible, maintained, preserved)

Information is protected in accordance with legislation and policy requirements

Information is disposed of in accordance with legislation and policy requirements.

Page 27: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Strategic to Implement

“Information is a strategic resource just as important to the business ofgovernment as human resources and financial resources!”

In recognition of this fact the government and public sector of Nepal should:

Fund tools and processes for the management of information;

Hire and develop specialists to look after the information, informationsystems and support employees in managing information;

Support all employees in their IM responsibilities through training andawareness;

Enforce managers to be responsible for the IM practices of theiremployees;

Enforce employees to manage their information.

Page 28: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Recommendations

Manage information as a key corporate resource;

Plan information needs;

Collect and create information to support program/activity and information needs;

Identify, file and organize information for quick and easy retrieval;

Provide access to information and respect the information, and privacy, rights of others;

Retain and dispose of information appropriately;

Protect information and the privacy rights of others;

Comply with information policy and legal requirements; and

Take responsibility for performance in the management of information .

Page 30: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Computer and Network Security Requirements

Confidentiality

o Requires information in a computer system only be accessible for reading by authorized parties

Integrity

o Assets can be modified by authorized parties only

Availability

o Assets be available to authorized parties

Authenticity

o Requires that a computer system be able to verify the identity of a user

Page 31: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Threats

Interruption

o An asset of the system is destroyed of

becomes unavailable or unusable

o Attack on availability

o Destruction of hardware

o Cutting of a communication line

o Disabling the file management system

Page 32: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Threats

Interception

o An unauthorized party gains access to

an asset

o Attack on confidentiality

o Wiretapping to capture data in a

network

o Illegal copying of files or programs

Page 33: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Threats

Modification

o An unauthorized party not only gains access but tampers with an asset

o Attack on integrity

o Changing values in a data file

o Altering a program so that it performs differently

o Modifying the content of messages being transmitted in a network

Page 34: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Threats

Fabrication

o An unauthorized party inserts counterfeit objects

into the system

o Attack on authenticity

o Insertion of spurious messages in a network

o Addition of records to a file

Page 35: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Computer System Assets

Hardware

o Threats include accidental and deliberate damage

Software

o Threats include deletion, alteration, damage

o Backups of the most recent versions can maintain high availability

Page 36: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Computer System Assets

Data & Information

o Involves files

o Security concerns fro availability,

secrecy, and integrity

o Statistical analysis can lead to

determination of individual information

which threatens privacy

Page 37: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Computer System Assets

Communication Lines and Networks –

Passive Attacks

o Release of message contents for a

telephone conversion, an electronic mail

message, and a transferred file are

subject to these threats

Page 38: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Computer System Assets

Communication Lines and Networks –

Active Attacks

o Masquerade takes place when one entity pretends to be a

different entity

o Replay involves the passive capture of a data unit and its

subsequent retransmission to produce an unauthorized effect

o Modification of messages means that some portion of a

legitimate message is altered, or that messages are

delayed or reordered, to produce an unauthorized effect

Page 39: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Protection

No protection

Isolation

o Each process operates separately from

other processes with no sharing or

communication

Page 40: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Protection

Share all or share nothing

o Owner of an object declares it public or

private

Share via access limitation

o checks the permissibility of each access

by a specific user to a specific object

Page 41: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

User-Oriented Access Control

Log on

o Requires both a user identifier (ID) and a password

o System only allows users to log on if the ID is known to the system and password associated with the ID is correct

o Users can reveal their password to others either intentionally or accidentally

o Hackers are skillful at guessing passwords

o ID/password file can be obtained

Page 42: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Data-Oriented Access Control

Associated with each user, there can be a

user profile that specifies permissible

operations and file accesses

Operating system enforces these rules

Database management system controls

access to specific records or portions of

records

Page 43: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Access Matrix

Subject

o An entity capable of accessing objects

Object

o Anything to which access is controlled

Access rights

o The way in which an object is accessed

by a subject

Page 44: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Access Matrix

Page 45: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Access Control List

Matrix decomposed by columns

For each object, an access control list

gives users and their permitted access

rights

Page 46: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Access Control List

Page 47: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Capability Tickets

Decomposition of access matrix by rows

Specifies authorized object and

operations for a user

Page 48: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Capability Tickets

Page 49: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Intrusion Techniques

Objective of intruder is the gain access to

the system or to increase the range of

privileges accessible on a system

Protected information that an intruder

acquires is a password

Page 50: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Techniques for Learning Passwords

Try default password used with standard

accounts shipped with computer

Exhaustively try all short passwords

Try words in dictionary or a list of likely

passwords

Collect information about users and use

these items as passwords

Page 51: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Techniques for Learning Passwords

Try user’s phone numbers, social security numbers, and room numbers

Try all legitimate license plate numbers for this state

Use a Trojan horse to bypass restrictions on access

Tap the line between a remote user and the host system

Page 52: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

ID Provides Security

Determines whether the user is authorized to gain

access to a system

Determines the privileges accorded to the user

o Guest or anonymous accounts have mover limited privileges

than others

ID is used for discretionary access control

o A user may grant permission to files to others by ID

Page 53: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Password Selection Strategies

Computer generated passwords

o Users have difficulty remembering them

o Need to write it down

o Have history of poor acceptance

Page 54: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Password Selection Strategies

Reactive password checking strategy

o System periodically runs its own password

cracker to find guessable passwords

o System cancels passwords that are guessed

and notifies user

o Consumes resources to do this

o Hacker can use this on their own machine

with a copy of the password file

Page 55: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Password Selection Strategies

Proactive password checker

o The system checks at the time of

selection if the password is allowable

o With guidance from the system users

can select memorable passwords that

are difficult to guess

Page 56: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Intrusion Detection

Assume the behavior of the intruder

differs from the legitimate user

Statistical anomaly detection

o Collect data related to the behavior of

legitimate users over a period of time

o Statistical tests are used to determine if

the behavior is not legitimate behavior

Page 57: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Intrusion Detection

Rule-based detection

o Rules are developed to detect deviation

form previous usage pattern

o Expert system searches for suspicious

behavior

Page 58: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Intrusion Detection

Audit record

o Native audit records

All operating systems include accounting software that collects information on user activity

o Detection-specific audit records

Collection facility can be implemented that generates audit records containing only that information required by the intrusion detection system

Page 59: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Malicious Programs

Those that need a host program

o Fragments of programs that cannot exist independently of some application program, utility, or system program

Independent

o Self-contained programs that can be scheduled and run by the operating system

Page 60: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Logic Bomb

Code embedded in a legitimate program

that is set to “explode” when certain

conditions are met

o Presence or absence of certain files

o Particular day of the week

o Particular user running application

Page 61: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Trojan Horse

Useful program that contains hidden code that when invoked performs some unwanted or harmful function

Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly

o User may set file permission so everyone has

Page 62: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Viruses

Program that can “infect” other programs

by modifying them

o Modification includes copy of virus

program

o The infected program can infect other

programs

Page 63: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Worms

Use network connections to spread form system to system

Electronic mail facilityo A worm mails a copy of itself to other systems

Remote execution capabilityo A worm executes a copy of itself on another system

Remote log-in capabilityo A worm logs on to a remote system as a user and then uses

commands to copy itself from one system to the other

Page 64: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Zombie

Program that secretly takes over another

Internet-attached computer

It uses that computer to launch attacks

that are difficult to trace to the zombie’s

creator

Page 65: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Virus Stages

Dormant phase

o Virus is idle

Propagation phase

o Virus places an identical copy of itself

into other programs or into certain

system areas on the disk

Page 66: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Virus Stages

Triggering phase

o Virus is activated to perform the

function for which it was intended

o Caused by a variety of system events

Execution phase

o Function is performed

Page 67: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Viruses

Parasitico Attaches itself to executable files and

replicateso When the infected program is executed, it

looks for other executables to infect Memory-resident

o Lodges in main memory as part of a resident system program

o Once in memory, it infects every program that executes

Page 68: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Viruses

Boot sector

o Infects boot record

o Spreads when system is booted from the disk containing the virus

Stealth

o Designed to hide itself form detection by antivirus software

o May use compression

Page 69: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Types of Viruses

Polymorphic

o Mutates with every infection, making detection by the “signature” of the virus impossible

o Mutation engine creates a random encryption key to encrypt the remainder of the virus

The key is stored with the virus

Page 70: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Macro Viruses

Platform independent

o Most infect Microsoft Word

Infect document, not executable portions

of code

Easily spread

Page 71: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Macro Viruses

A macro is an executable program embedded in a word processing document or other type of file

Autoexecuting macros in Word

o Autoexecute

Executes when Word is started

o Automacro

Executes when defined event occurs such as opening or closing a document

o Command macro

Executed when user invokes a command (e.g., File Save)

Page 72: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Antivirus Approaches

Detection

Identification

Removal

Page 73: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Generic Decryption

CPU emulator

o Instructions in an executable file are interpreted by the emulator rather than the processor

Virus signature scanner

o Scan target code looking for known

Emulation control module

o Controls the execution of the target code

Page 74: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Digital Immune System

Developed by IBM

Motivation has been the rising threat of

Internet-based virus propagation

o Integrated mail systems

o Mobile-program system

Page 75: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

E-mail Virus

Activated when recipient opens the e-mail

attachment

Activated by open an e-mail that contains

the virus

Uses Visual Basic scripting language

Propagates itself to all of the e-mail

addresses known to the infected host

Page 76: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Trusted Systems

Multilevel security

o Information organized into categories

o No read up

Only read objects of a less or equal security level

o No write down

Only write objects of greater or equal security level

Page 77: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Access Token

Security ID

o Identifies a user uniquely across all the machines on the network (logon name)

Group SIDs

o List of the groups to which this user belongs

Privileges

o List of security-sensitive system services that this user may call

Page 78: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Access token

Default owner

o If this process crates another object, this

field specifies who is the owner

Default ACL

o Initial list of protections applied to the

objects that the user creates

Page 79: INFORMATION MANAGEMENT AND SECURITY - NASCdms.nasc.org.np/sites/default/files/documents/Information... · INFORMATION MANAGEMENT AND SECURITY Professional Training in Information

Security Descriptor

Flagso Defines type and contents of a security descriptor

Ownero Owner of the object can generally perform any action on

the security descriptor

System Access Control List (SACL)o Specifies what kinds of operations on the object should

generate audit messages

Discretionary Access Control List (DACL)o Determines which users and groups can access this object for

which operations