0% found this document useful (0 votes)
44 views26 pages

System Security and Disaster Recovery Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views26 pages

System Security and Disaster Recovery Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter 7: System Security, Disaster Recovery

Planning and Ethics in System


Development
Silas Gebretsadik
MU-MIT

E-mail: [Link]@[Link]
System Security

Security: Policies, procedures and technical measures used to prevent unauthorized access, alteration,
theft, or physical damage to information systems
Controls: Methods, policies, and organizational procedures that ensure safety of organization’s assets;
accuracy and reliability of records; and operational adherence to management standards.
Basic Principles of Information Systems Security
Confidentiality
This principle is applied to information by enforcing rules about who is allowed to know it.
Preserving personal privacy is one of the major objectives of confidentiality.
It prevents the unauthorized disclosure of information and restricts the data access to only those who
are authorized.
System Security…

Basic Principles of Information Systems Security ..


Integrity
In any business organization having IS, the values of data stored and manipulated,
such as maintaining the correct signs and symbols is an important issue of concern.
This issue is referred to integrity within an organization which is the prevention of
the unauthorized modification.
Availability
Availability is referred to as accessibility of information and in usable form when
and where it is required. Sometimes it is also explained as the prevention of
unauthorized withholding of data or resources. Within any organization today
availability of resources and data is an important issue of concern since system
failure is an organizational security issue
System Security…

Why systems are vulnerable


Accessibility of networks
Hardware problems (breakdowns, configuration errors, damage from
improper use or crime)
Software problems (programming errors, installation errors,
unauthorized changes)
Disasters
Use of networks/computers outside of firm’s control
Loss and theft of portable devices
System Security…
Internet vulnerabilities
Network open to anyone
Size of Internet means abuses can have wide impact
Use of fixed Internet addresses with cable or DSL modems creates
fixed targets hackers
Unencrypted VOIP
E-mail, P2P, IM
Interception
Attachments with malicious software
Transmitting trade secrets
System Security…

Wireless security challenges


Radio frequency bands easy to scan
SSIDs (service set identifiers)
 access points
 Eavesdroppers drive by buildings and try to detect SSID and gain access to network and resources
WEP (Wired Equivalent Privacy): Wired Equivalent Privacy (WEP) is a security algorithm for
IEEE 802.11 wireless networks.
 Security standard for 802.11; use is optional
 Uses shared password for both users and access point
 Users often fail to implement WEP or stronger systems
System Security…

Malware (malicious software)


Programs exploiting system vulnerabilities
known as malicious software or malware
Program fragments that need a host program
e.g. viruses, logic bombs, and backdoors
independent self-contained programs
e.g. worms, bots
replicating or not
sophisticated threat to computer systems
System Security…
Malware Terminology
Virus
Worm
Logic bomb
Trojan horse
Backdoor (trapdoor)
Mobile code
Auto-rooter Kit (virus generator)
Spammer and Flooder programs
Keyloggers
Rootkit
Zombie, bot
System Security…
Viruses
 Piece of software that infects programs
 modifying them to include a copy of the virus
 so it executes secretly when host program is run
 specific to operating system and hardware
 taking advantage of their details and weaknesses
 a typical virus goes through phases of:
 Dormant
 Propagation
 Triggering
 execution
 components:
 infection mechanism - enables replication
 trigger - event that makes payload activate
 payload - what it does, malicious or benign
 prepended / postpended / embedded
System Security…

Worms

 replicating program that propagates over net

 using email, remote exec, remote login

 has phases like a virus:

 dormant, propagation, triggering, execution

 propagation phase: searches for other systems, connects to it, copies self to it and runs

 may disguise itself as a system process

Morris Worm

 one of known worms

 released by Robert Morris in 1988

 various attacks on UNIX systems

 cracking password file to use login/password to logon to other systems


System Security…
Bot
 ”Bot” is derived from the word ”robot” and is an automated process that interacts with other network services.
 Bots often automate tasks and provide information or services that would otherwise be conducted by a human being.
 Bots can be used for either good or malicious intent. A malicious bot is self-propagating malware designed to infect a host
and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of
compromised devices, or ”botnet.” With a botnet, attackers can launch broad-based, ”remote-control,” flood-type attacks
against their target(s).
 hard to trace attacks
 characteristics:
 remote control facility
 via IRC(Internet Relay Chat)/HTTP etc
 spreading mechanism
 attack software, vulnerability, scanning strategy
System Security…

Trojan horses
Software program that appears to be benign but then does something other than expected.
SQL injection attacks
Hackers submit data to Web forms that exploits site’s unprotectedsoftware and sends rogue SQL
query to database
Spyware
Small programs install themselves surreptitiously on computers to monitor user Web surfing
activity and serve up advertising
Key loggers
Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
General controls
Identification and Authentication
User Authentication
 fundamental security building block
 basis of access control & user accountability
 is the process of verifying an identity claimed by or for a system entity
 has two steps:
 identification - specify identifier
 verification - bind entity (person) and identifier
 distinct from message authentication
Means of User Authentication
 four means of authenticating user’s identity
 password, PIN
 key, token, smartcard
 static biometrics - e.g. fingerprint, retina
 dynamic biometrics - e.g. voice, sign
 can use alone or combined, all can provide user authentication
General controls…
Identification and Authentication …
Password Authentication
 widely used user authentication method
 user provides name/login and password
 system compares password with that saved for specified login
 authenticates ID of user logging and
 that the user is authorized to access system
 determines the users privileges
Passwords
 Sequence of characters
 Examples: 10 digits, a string of letters, etc.
 Generated randomly, by user, by computer with user input
 Sequence of words
 Examples: pass-phrases
 Algorithms
 Examples: challenge-response, one-time passwords
General controls…
Identification and Authentication ..
Passwords .. Dictionary attack
General controls…
Identification and Authentication ..

Token Authentication

 Object user possesses to authenticate, e.g.

 embossed card

 magnetic stripe card

 memory card

 smartcard

Biometric Authentication

 authenticate user based on one of their physical characteristics

 Automated measurement of biological, behavioral features that identify a person

 Fingerprints: optical or electrical techniques

 Maps fingerprint into a graph, then compares with database

 Measurements imprecise, so approximate matching algorithms used

 Voices: speaker verification or recognition

 Verification: uses statistical techniques to test hypothesis that speaker is who is claimed (speaker dependent)

 Recognition: checks content of answers (speaker independent)


General controls…

Identification and Authentication ..


Biometric Authentication ..
Can use several other characteristics
Eyes: patterns in irises unique
 Measure patterns, determine if differences are random; or correlate images using statistical tests
Faces: image, or specific characteristics like distance from nose to chin
 Lighting, view of face, other noise can hinder this
Keystroke dynamics: believed to be unique
 Keystroke intervals, pressure, duration of stroke, where key is struck
 Statistical tests used
General controls…
Identification and Authentication …
Biometric Authentication…
General controls…

Administrative controls
Ensure organizational policies, procedures and standards and enforced
Segregation of functions to reduce errors and fraud
Supervision of personal to ensure policies and procedures are being
adhered to
Application controls
Unique to each computerized application
Include input, processing, and output controls
General controls…
Administrative controls ..

Input controls

 Data is accurate and consistent on entry

 Direct keying of data, double entry or automated input

 Data conversion, editing and error handling

 Field validation on entry

 Input authorization and auditing

 Checks on totals to catch errors

Processing controls

 Data is accurate and complete on processing

 Checks on totals to catch errors

 Compare to master records to catch errors

 Field validation on update

Output controls
Disaster recovery plan

 Runs business in event of computer outage


 Load balancing: Distributes large number of requests for access among multiple servers.
 Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption in
service.
 Clustering: Linking two computers together so that a second computer can act as a backup to the primary
computer or speed up processing
Firewalls
 Prevent unauthorized users from accessing private networks
 Two types: proxies and stateful inspection
 Intrusion Detection System
 Monitors vulnerable points in network to detect and deter unauthorized intruders
Ethics in System Development

Treat the money like it’s your own

 If you make financial decisions as if it were your own money you’ll always make the best decisions you can for your client.

Care for your community

 Your project affects a diverse range of stakeholders. Know who they are and how you will change their lives. And know
how you will explain your project to your families and friends.

Account for the full product life cycle

 Todays new product is tomorrows landfill. Understand the true cost of ownership by full lifecycle costing, from sourcing
materials to disposal.

Do the best you can

 When you turn up for work, remind yourself that you are there to do

the best job you can. Be active, creative and efficient.


Ethics in System Development…

Deal fairly with your suppliers

Honesty all the time

 Never lie by omission.

 Never lie by vagueness.

 Never lie by delaying.

 Never lie by clutter.

 Never lie by jargon.

 Never lie!!

Help others along

 Projects are not just delivered by teams. They are delivered by communities, workforces and professions. You have a place
in these groups; there is always someone to learn from and someone to help along. Share what you know and receive help
when you need it.
Ethics in System Development…

Don’t waste resources


The End of The course!!!
Thanks for your attention
If you have any question?

You might also like