Saturday, May 25, 2024

AKTU MCA II CYBER SECURITY NOTES UNIT III

 

Unit III

Introduction to E-Commerce , Threats to E-Commerce, Electronic Payment System, e- Cash, Credit/Debit Cards. Digital Signature, Cryptography Developing Secure Information Systems, Application Development Security, Information Security Governance & Risk Management, Security Architecture & Design Security Issues in Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets - Access Control, CCTV, Backup Security Measures.

*************************************************************************************

Introduction to E-Commerce

E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet. These business transactions occur either as business-to-business (B2B), business-to-consumer (B2C), consumer-to-consumer or consumer-to-business.

E-commerce is basically the process of buying and selling commodities and goods over the Internet. In  E-commerce, transactions take place via digital methods via electronic funds and the processing of online transactions.

Since E-commerce deals with the transfer of money digitally, hackers and attackers use this as an opportunity to break into E-commerce websites and gain some financial profit from them.

 

Threats to E-Commerce

Types of threats to E-commerce:

         Tax Evasion: Organizations show the legal paper records of revenue to the IRS. But in the case of E-commerce shopping, online transactions take place due to which funds get transferred electronically due to which IRS is not able to count the transactions properly and there are high chances of tax evasions by these organizations.

         Payment conflict: In E-commerce, payment conflicts can arise between users and the E-commerce platforms. These electronic funds transferring systems might process extra transactions from the users which will lead to a payment conflict by the users due to some glitches or errors.

         Financial fraud: Whenever an online transaction or transfer of funds takes place, it always asks for some pin or passwords to authenticate and allows only the authorized person to process the transactions. But due to some spyware and viruses used by attackers, they can also process the transactions of the users by allowing the unauthorized person, which will lead to causing a financial fraud with the user.

         E-wallets: E-wallets are now an essential part of E-commerce platforms. Attack on E-wallets can lead to the leak of the sensitive banking credentials of the users which can be used by the attackers for their own profit. Regulators tend to monitor all the activities related to the financial security of the money of the users.

         Phishing:  It is one of the most common attacks nowadays on the users, where the attackers send emails and messages to a large number of users which contain a special link in it. When the users open that link in their browser, the malware starts downloading in the background and the attacker gets full control over the financial information about the users. They make fake websites to make the users believe their website and fill out their financial credentials.

         SQL injections: SQL injections are used by attackers to manipulate the database of large organizations. Attackers enter malicious code full of malware into the database and then they search for targeted queries in the database and then they collect all the sensitive information in the database.

         Cross-site scripting (XSS): Hackers target the website of E-commerce companies by entering malicious code into their codebase. It is a very harmful attack as the control of the entire website goes into the hands of the attackers. It can enable the attackers to track the users by using their browsing activity and their cookies. For More details please read the what is cross-site scripting XSS article.

         Trojans: Attackers make software that may appear to be useful before downloading, but after downloading the software it installs all the malicious programs on the computer. It collects data like personal details, address, email, financial credentials and it may cause data leaks.

         Brute force attacks: Hackers draw patterns and use random methods to crack into someone else’s account as an unauthorized user. It requires the use of multiple algorithms and permutations and combinations to crack the password of an account by the attacker.

         Bots: The hackers use a large number of bots on E-commerce websites to track the competitor in the E-commerce industry rankings and his user’s buying policies in order to scrap the sales and revenue of the competitor. It also decreases the ranking of their E-commerce website as compared to the competitors due to bad experiences faced by the users. It results in overall price decreasing and less revenue overall in sales.

         DDoS attacks: Distributed Denial of Service (DDoS) attacks are most commonly used by hackers to not allow original legitimate users to access and buy and sell products from the E-commerce platforms. Hackers use a large number of computers to flood the number of requests to the server so that at one time the server crashes out.

         Skimming: Skimming is a popular method to spread out the malware on the website’s main pages which are used by a large number of people. It steals and leaks all information entered by the users on that webpage and all this information goes to the attacker through skimming.

         Middlemen attack: In this type of attack, the attacker can clearly get all the information in the conversation taking place between the consumer and the E-commerce platform itself. The attacker sees the conversation between both of them and uses this as an opportunity to make the user face some vulnerability.

Prevent threats:

We can prevent the following E-commerce threats in the following ways:

         Anti-malware: We can deploy Anti-malware and Anti-virus software on all our computer systems so that we can prevent these conditions to happen. Anti-malware and Anti-virus software prevent all types of malware and viruses to infect the data on our computer.

         HTTPS:  HTTPS helps to keep the website data secure from any kind of digital attack. SSL and HTTPS encrypt all the data of the users which is harder to crack by the hackers.

         Payment gateway: We can secure the payment gateway used on the E-commerce websites which very high security and strict policies against leaking of any financial credentials of any user.

 

Electronic payment system

Electronic payment is the process where customers make payments by using electronic methods. Whether you want to pay for your favourite food or you want to pay your nearby retailer, you can do it easily via electronic payment solutions.

The different types of e-commerce payments in use today are:

 

Credit Card

The most popular form of payment for e-commerce transactions is through credit cards. It is simple to use; the customer has to just enter their credit card number and date of expiry in the appropriate area on the seller’s web page. To improve the security system, increased security measures, such as the use of a card verification number (CVN), have been introduced to on-line credit card payments. The CVN system helps detect fraud by comparing the CVN number with the cardholder's information

Debit Card

Debit cards are the second largest e-commerce payment medium in India. Customers who want to spend online within their financial limits prefer to pay with their Debit cards. With the debit card, the customer can only pay for purchased goods with the money that is already there in his/her bank account as opposed to the credit card where the amounts that the buyer spends are billed to him/her and payments are made at the end of the billing period.

Smart Card

It is a plastic card embedded with a microprocessor that has the customer’s personal information stored in it and can be loaded with funds to make online transactions and instant payment of bills. The money that is loaded in the smart card reduces as per the usage by the customer and has to be reloaded from his/her bank account.

E-Wallet

E-Wallet is a prepaid account that allows the customer to store multiple credit cards, debit card and bank account numbers in a secure environment. This eliminates the need to key in account information every time while making payments. Once the customer has registered and created E-Wallet profile, he/she can make payments faster.

Netbanking

This is another popular way of making e-commerce payments. It is a simple way of paying for online purchases directly from the customer’s bank. It uses a similar method to the debit card of paying money that is already there in the customer’s bank. Net banking does not require the user to have a card for payment purposes but the user needs to register with his/her bank for the net banking facility. While completing the purchase the customer just needs to put in their net banking id and pin.

Mobile Payment

One of the latest ways of making online payments are through mobile phones. Instead of using a credit card or cash, all the customer has to do is send a payment request to his/her service provider via text message; the customer’s mobile account or credit card is charged for the purchase. To set up the mobile payment system, the customer just has to download a software from his/her service provider’s website and then link the credit card or mobile billing information to the software.

 

eCash

eCash was a digital-based system that facilitated the transfer of funds anonymously. A pioneer in cryptocurrency, its goal was to secure the privacy of individuals that use the Internet for micropayments. eCash was created by Dr. David Chaum under his company, DigiCash, in 1990. Though there was interest in the platform from large banks, eCash never took off and DigiCash filed for bankruptcy in 1998. DigiCash, along with its eCash patents, was eventually sold off. In 2018, Chaum launched a new startup focused on cryptography.

Digital Signatures

 

“Digital Signatures is an authentication tool.”

 

Digital signatures are the public-key primitives of message authentication. In the physical world, it is common to use handwritten signatures on handwritten or typed messages. They are used to bind signatory to the message.

Similarly, a digital signature is a technique that binds a person/entity to the digital data. This binding can be independently verified by receiver as well as any third party.

Digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer.

In real world, the receiver of message needs assurance that the message belongs to the sender and he should not be able to repudiate the origination of that message. This requirement is very crucial in business applications, since likelihood of a dispute over exchanged data is very high.

Model of Digital Signature

As mentioned earlier, the digital signature scheme is based on public key cryptography. The model of digital signature scheme is depicted in the following illustration −

The following points explain the entire process in detail −

·        Each person adopting this scheme has a public-private key pair.

·        Generally, the key pairs used for encryption/decryption and signing/verifying are different. The private key used for signing is referred to as the signature key and the public key as the verification key.

·        Signer feeds data to the hash function and generates hash of data.

·        Hash value and signature key are then fed to the signature algorithm which produces the digital signature on given hash. Signature is appended to the data and then both are sent to the verifier.

·        Verifier feeds the digital signature and the verification key into the verification algorithm. The verification algorithm gives some value as output.

·        Verifier also runs same hash function on received data to generate hash value.

·        For verification, this hash value and output of verification algorithm are compared. Based on the comparison result, verifier decides whether the digital signature is valid.

·        Since digital signature is created by ‘private’ key of signer and no one else can have this key; the signer cannot repudiate signing the data in future.

It should be noticed that instead of signing data directly by signing algorithm, usually a hash of data is created. Since the hash of data is a unique representation of data, it is sufficient to sign the hash in place of data. The most important reason of using hash instead of data directly for signing is efficiency of the scheme.

Cryptography

 

Cryptography is a technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it.

 

Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”.

 

In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions.

 

 

 

Types Of Cryptography:


In general there are three types Of cryptography:

 

1.    Symmetric Key Cryptography:
It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is Data Encryption System(DES).

2.    Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.

3.    Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.

 

 

DEVELOPING SECURE INFORMATION SYSTEMS

 

Every information system is prone to threats like unauthorized access, disclosure, destruction, use or modification. So, for handling such threats we need to develop security programs or policies for the information system. The information security program help in selecting and implementing counter measures against any security breaches. A good security program helps in ensuring that everyone within organization works cooperatively to secure the whole system.

 

Thus, developing a security program is the first action to implement information security. A sell defined information security program outlines the strategies which need to be implemented for achieving the objectives of information system in a secure way. Information security program can also be used to integrate various aspects of an organization to meet business objectives. After developing an information security program, it is also necessary that everyone within the

 

organization should follow this program. This is important because computers are inherently very much vulnerable to a wide variety of threats and thus need to be periodically reviewed and tested.

So, for safeguarding the information system, information systems security programs are used to address the threats like hacking or accidental loss.

 

Information Security Program Objectives

 

The main objectives of an information security program are as follows: To protect information assets and ensure confidentiality, integrity and availability of information throughout the system

> To ensure that any information should not be revealed to persons who are not part of theOrganization

> To provide strength an internal controlling and prevention of improper or unauthorised access to information

>  To make sure that all security flaw or accident must be reported, so that proper analysis and handling of such cases can be done.

 

Management Commitment

Management commitment to security is very essential for developing a successful information security

 

System Management commitment helps in motivating the information resource owner and user and also provides the visibility which is needed by the information security team for ensuring the suppon of business units. All the individuals within the show commitment towards security by following the security guidelines and practices given by the authoritative sources Management support helps in better handling of security issues and leads to decrease in likelihood of failures. If the top management do not show support for information system security efforts, then their employees w also show less support for efforts If the organization emphasizes the negative effects of loss re information, then this will put pressure on business units and will motivate them to improve security Also if a ranking system for business units is established within the organization based on quality of their information security, then this will ensure an active participation of all the units in information security within the organization and will also apply pressure on the individual who do not

 

Information System Security Program Development Responsibilities

 

The information system security team should be responsible for developing the information security program. As an alternative, a management committee within the organization can be given the responsibility to draft security policies and guidelines. It is important that the team which will be making the information security program must be familiar with current business culture and technologies. This will help in making intelligent decisions. Knowing the business culture helps in designing an information security program that will ensure compatibility and familiarity with technology helps to know the limitations of technological solutions and security capabilities. The team ater considering all the important aspects of the information security, design a information security program to protect the system from threats

 

Application Development Security

 

Application development security includes foundation, principle and design guidelines which are based on basic aims of information security for developing safe applications.

 

The framework helps in secure development of applications which helps as a component to defense part of the system and at the same time protects information assets.

 

Foundation

 

Foundation includes the basic aspects of applications development which one needs to know before developing a secure application. It includes • Knowledge of company's security policy, methods and guidelines.

• Knowledge of application development methodology.

• Knowledge of programming languages and translators

 

Principles

 

The following principles need to be followed when developing a secure application.

Adhering to trusted standards. Protection of information assets.

 

Authentication

 

• Mechanism of overcoming failures.

• Use of accuracy in date and time.

• Users need to know how it works, rather that its implementation.

Login monitoring and auditing

• Use of security mechanisms

Security is implemented as a part of design.

Assuming hostile situations

• Minimize use of computing elements and there protection.

 

Design Guidelines

 

It guides the application development towards the use of best practices for securing the application The best known and widely accepted security methods are used for implementing the code for the application.

They are as follows

 

Input Validation

Exception Handling

Random Numbers

Canonical Representation

Cryptography.

 

Information Security Governance & Risk Management

Information security governance is defined as “a subset of enterprise governance that provides strategic direction, ensures that objectives are achieved, manages risk appropriately, uses organizational resources responsibly, and monitors the success or failure of the enterprise security program,” according to the Information Systems Audit and Control Association.

Need an Information Security Governance Framework?

While the definition sounds complex, it can be simplified. An information security governance framework helps you prepare for risks or events before they occur by forcing you to continually reevaluate critical IT and business functions through:

         Integrated risk management functions

         Threat and vulnerability analysis

         Data governance and threat protection

·         Aligning business strategy with IT strategy

Reactive Versus Proactive

Information security governance also helps an organization move from a reactive approach to cybersecurity to a proactive approach. It allows you to:

·         Categorize and mitigate risks and threats

         Prepare an organization for identifying, remediating, and recovering from a cyberattack or breach

         Provide a method for executive leadership to understand their risk posture and maturity levels

         Outline a risk-based approach to the people, systems, and technology that are used every day

Main Components of Information Security Governance?

There are four main components to the information security governance framework:

·         Strategy

         Implementation

         Operation

         Monitoring

Strategy

Information security should align with business objectives. IT strategic plans need to satisfy the current and future business requirements. The goal of information security governance is to align business and IT strategies with organizational objectives.

Implementation

Information security governance requires commitment, resources, assignment of responsibilities, and implementation of policies and procedures that address the controls within a chosen framework. Buy-in from senior management and above is critical to the implementation of the program.

Operation

It’s important that adequate resources are in place, projects that align with your overall strategy are deployed, and operational and technology risks are addressed and mitigated to appropriate levels.

Monitoring

Metrics and monitoring help document the effectiveness of the program provide information to help management make decisions, address any compliance issues, and establish information security controls with a more proactive approach.

Information security risk management or ISRM

Information security risk management, or ISRM, is the process of managing risks associated with the use of information technology. It involves identifying, assessing, and treating risks to the confidentiality, integrity, and availability of an organization’s assets. The end goal of this process is to treat risks in accordance with an organization’s overall risk tolerance. Businesses shouldn’t expect to eliminate all risks; rather, they should seek to identify and achieve an acceptable risk level for their organization.

Stages of ISRM:

Identification

Identify assets: What data, systems, or other assets would be considered your organization’s “crown jewels”? For example, which assets would have the most significant impact on your organization if their confidentiality, integrity or availability were compromised? It’s not hard to see why the confidentiality of data like social security numbers and intellectual property is important. But what about integrity? For example, if a business falls under Sarbanes-Oxley (SOX) regulatory requirements, a minor integrity problem in financial reporting data could result in an enormous cost. Or, if an organization is an online music streaming service and the availability of music files is compromised, then they could lose subscribers.

Identify vulnerabilities: What system-level or software vulnerabilities are putting the confidentiality, integrity, and availability of the assets at risk? What weaknesses or deficiencies in organizational processes could result in information being compromised?

Identify threats: What are some of the potential causes of assets or information becoming compromised? For example, is your organization’s data center located in a region where environmental threats, like tornadoes and floods, are more prevalent? Are industry peers being actively targeted and hacked by a known crime syndicate, hacktivist group, or government-sponsored entity? Threat modeling is an important activity that helps add context by tying risks to known threats and the different ways those threats can cause risks to become realized via exploiting vulnerabilities.

Identify controls: What do you already have in place to protect identified assets? A control directly addresses an identified vulnerability or threat by either completely fixing it (remediation) or lessening the likelihood and/or impact of a risk being realized (mitigation). For example, if you’ve identified a risk of terminated users continuing to have access to a specific application, then a control could be a process that automatically removes users from that application upon their termination. A compensating control is a “safety net” control that indirectly addresses a risk. Continuing with the same example above, a compensating control may be a quarterly access review process. During this review, the application user list is cross-referenced with the company’s user directory and termination lists to find users with unwarranted access and then reactively remove that unauthorized access when it’s found.

Assessment
This is the process of combining the information you’ve gathered about assets, vulnerabilities, and controls to define a risk. There are many frameworks and approaches for this, but you’ll probably use some variation of this equation:

Risk = (threat x vulnerability (exploit likelihood x exploit impact) x asset value ) - security controls

Note: this is a very simplified formula analogy. Calculating probabilistic risks is not nearly this straightforward, much to everyone’s dismay.

Treatment
Once a risk has been assessed and analyzed, an organization will need to select treatment options:

Remediation: Implementing a control that fully or nearly fully fixes the underlying risk.
Example: You have 
identified a vulnerability on a server where critical assets are stored, and you apply a patch for that vulnerability.

Mitigation: Lessening the likelihood and/or impact of the risk, but not fixing it entirely.
Example: You have identified a vulnerability on a server where critical assets are stored, but instead of patching the vulnerability, you implement a firewall rule that only allows specific systems to communicate with the vulnerable service on the server.

Transference: Transferring the risk to another entity so your organization can recover from incurred costs of the risk being realized.
Example: You purchase insurance that will cover any losses that would be incurred if vulnerable systems are exploited. (Note: this should be used to supplement risk remediation and mitigation but not replace them altogether.)

Risk acceptance: Not fixing the risk. This is appropriate in cases where the risk is clearly low and the time and effort it takes to fix the risk costs more than the costs that would be incurred if the risk were to be realized.
Example: You have identified a vulnerability on a server but concluded that there is nothing sensitive on that server; it cannot be used as an entry point to access other critical assets, and a successful exploit of the vulnerability is very complex. As a result, you decide you do not need to spend time and resources to fix the vulnerability.

Risk avoidance: Removing all exposure to an identified risk 
Example: You have identified servers with operating systems (OS) that are about to reach end-of-life and will no longer receive security patches from the OS creator. These servers process and store both sensitive and non-sensitive data. To avoid the risk of sensitive data being compromised, you quickly migrate that sensitive data to newer, patchable servers. The servers continue to run and process non-sensitive data while a plan is developed to decommission them and migrate non-sensitive data to other servers.

Communication
Regardless of how a risk is treated, the decision needs to be communicated within the organization. Stakeholders need to understand the costs of treating or not treating a risk and the rationale behind that decision. Responsibility and accountability needs to be clearly defined and associated with individuals
and teams in the organization to ensure the right people are engaged at the right times in the process.

Rinse and Repeat
This is an ongoing process. If you chose a treatment plan that requires implementing a control, that control needs to be continuously monitored. You’re likely inserting this control into a system that is changing over time. Ports being opened, code being changed, and any number of other factors could cause your control to break down in the months or years following its initial implementation.

 

Security Architecture & Design Security Issues in Hardware

Security architecture and Design

• Security Architecture and Design of a system means a bundle of following components:-hardware, software and operating system and how to use those component to design, architect, and evaluate secure computer systems.

• Security Architecture and Design is a three-part domain.

1. The first part covers the hardware and software required to have a secure computer system

2. The second part covers the logical models required to keep the system secure

3. and the third part covers evaluation models that quantify how secure the system really is.

Secure System Design Concept

We can design a secure system by implementing software and hardware specifically and including following principles

– Layering

– Abstraction

– Security domains

– The ring model

– Open-closed systems

• Layering

Layering separates hardware and software functionality into modular tiers.

A generic list of security architecture layers is as follows :

1. Hardware (bottom layer)

2. Kernel and device drivers

3. Operating System

4. Applications (Top Layer)

• Abstraction: Abstraction hides unnecessary details from the user.

• Complexity is the enemy of security:

– the more complex a process is, the less secure it is. That said, computers are tremendously complex machines.

• Abstraction provides a way to manage that complexity.

– For example ,while music is being played from a file through the speaker of the computer system. The user is only concerned with playing of music just with click without knowing the internal working of music player.

Security Domains : A security domain is the list of objects a subject is allowed to access.

• With respect to kernels, two domains are user mode and kernel mode.

– Kernel mode (also known as supervisor mode) is where the kernel lives, allowing low-level access to memory, CPU, disk, etc. It is the most trusted and powerful part of the system.

– User mode is where user accounts and their processes live. The two domains are separated: an error or security lapse in user mode should not affect the kernel.

The Ring Model:

• The ring model is a form of CPU hardware layering that separates and protects domains (such as kernel mode and user mode) from each other.

• Many CPUs, such as the Intel 86 family, have four rings, ranging from ring 0 (kernel) to ring 3.

• The rings are (theoretically) used as follows:

Ring 0: Kernel

Ring 1: Other OS components that do not fit into ring 0

Ring 2: Device drivers

Ring 3: User applications

 

Open and Closed Systems:

• An open system uses open hardware and standards, using standard components from a variety of vendors.

– Ex - Assembled Desktop computer

• Close systems- only use proprietary hardware or software from specific vendor.

– Ex- Branded Desktop (HP)

Secure hardware architecture

• Secure Hardware Architecture focuses on the physical computer hardware required to have a secure system.

• The hardware must provide confidentiality, integrity, and availability for processes, data, and users.

Security issues in 1.hardware, 2.data storage and 3.downloadable device

• Securing computer system means to protect all of its components that includes

– hardware, software, storage devices, operating system and peripheral devices.

• Each component has its own vulnerability or weakness.

– Hardware parts can be stolen and destroyed .

• Security of every component of the system is equally important.

– We need to be able to control our computer system completely so that the information asset can be protected.

Security Issues in Hardware

• Hardware is the component on which the entire computer system is based this include processor, hard drive and monitor.

• Hardware mainly faces security issues related to stealing, destruction, gaining unauthorized access and breaking the security code of conduct.

• Any breaking of code of conduct needs proper security measures such as placing the hardware with your controlled environment.

Counter Security Measures in hardware To secure H/W from unauthorized access, following mechanism should be used-

• Biometric access control.

• Authentication token (entry via smart card).

• Radio Frequency Identification (RFID).

• Use VPN to provide complete security over internet.

• Use strong passwords.

• Provide limited access to the devices.

 

2. Security Issues with Storage Devices

• Data storage devices are used to save information.

• Devices such as compact disk(CD), digital versatile disk(DVD), memory cards, flash drives etc.

• The main issue faced by these devices is-

– Loss and theft of data.

– Improper disposal of data.

– Introduction to malwares in your system.

– Denial of data i.e., attack on availability of data.

• All these issues can be overcome by using following measures-

– Making people aware of the various kinds of attacks.

– Educating people regarding various cyber laws of the nation.

– Making the people understandable the importance of security.

– Implement certain policies and procedures that provide security for the storage devices and data.

2. Security Issues with Storage Devices

• E.g. PD-USB: PDA, External Hard Drive

• Security Issues related to them are-

– Stealing of data.

– Destruction of data.

– External attacks (virus etc.).

• Measures include:

– Protection of data from theft/ manipulation

– Protection of devices from being stolen or destroyed

– Protection of environment from undesired access.

Physical Security of IT Assets

• An IT asset is a piece of software or hardware within an information technology environment.

• Tracking of IT assets within an IT asset management system can be crucial to the operational or financial success of an enterprise.

• IT assets are integral components of the organization’s systems and network infrastructure.Security of data and asset is equally important.

• Physical security of our asset, especially the IT asset is also very important.

– There are several issues that need to be countered in order to apply total security control.

• We may need to lock and other access control techniques to protect our asset from unwanted users.

Physical Security of IT Assets(Threats)

• Threats for physical security are as follows:-

(1) Physical access exposure to human beings : Organizations own employees are one of the main factors to cause physical security threats.

• Can be controlled through

– Strong authentication mechanism

– restricted use of resources

– Restricted area and building

– Proper standards for verification and validation of user identity.

(2) Physical access exposure to natural disasters:- Natural disasters may destroy your computer systems or all data storage systems and might interrupt your network.

– For example fire, lightening, or electronic interruption

– Can’t be controlled, but recovery measures could be taken.

• Measures to ensure physical security of IT assets-

(1)Physical access controls

• Through photo IDs, biometric authentication systems, entry logs, magnetic locks using electronic keycard, computer terminal locks.

(2)Electronic and visual surveillance systems

• Through closed circuit television (CCTV), RFID sensors

• CCTV cameras are also called the third eye because if human being missed noticing some people entering a restricted zone, these cameras could capture the event or photos.

(3) Intrusion Detection Systems (IDS):-

IDS are a way of dealing with unauthorized access to information system assets.

Physical Security of IT Assets (Measures)

Backup Security Measures

• Following practices should be performed for maintaining proper data backup security-

– Assigning responsibility, authority and accountability.

– Assessing risks.

– Developing data protection processes.

– Communicating the processes to the concerning people.

– Executing and testing the process.

1. Assign Accountability, Responsibility and Authority

• Make storage security a function of overall information security policies and architecture

• Divide duties where data is highly sensitive.

• ensure that the person authorizing access is not the person charged with responsibility for execution.

2. Assessing Risk

• Perform a Risk Analysis of the Entire Backup Process.

• Execute a Cost/Benefit Analysis on Backup Data Encryption

• Identify Sensitive Data.

3. Develop Data Protection Process

• Adopt a Multi-Layered Security Approach

. Authentication: Authorization: Encryption Auditing:

• Copy Your Backup Tapes

4. communicating the processes to the concerning people

• it is important to ensure that the people responsible for carrying out its security are informed and trained.

• Security policies are the most important aspect of assigning accountability, responsibility and authority.

5. Executing and testing the process

• Once the end-to-end plan has been developed, defined and communicated to the appropriate people, it is time to begin execution and testing process.

Access Control

• Access Control is the process or mechanism for giving the authority to access the specific resources, applications and system.

• Access control defines a set of conditions or criteria to access the system and its resources.

• There are three main accesses Control model first is Mandatory access control model, second is Discretionary access control model and third is Role based access control models.

Types of Access control

• Mandatory access control (MAC) :

in this security policy users do not have the authority to override the policies and it totally controlled centrally by the security policy administrator.

The security policy administrator defines the usage of resources and their access policy, which cannot be overridden by the end users, and the policy, will decide who has authority to access the particular programs and files.

MAC is mostly used in a system where priority is based on confidentiality.

 

• Discretionary access control (DAC) :

This policy Contrast with Mandatory Access Control (MAC) which is determined by the system administrator while DAC policies are determined by the end user with permission.

In DAC, user has the complete authority over the all resources it owns.and also determines the permissions for other users who have those resources and programs.

• Role-based access control (RBAC) :

This policy is very simple to use.

In RBAC roles are assigned by the system administrator statically. In which access is controlled depending on the roles that the users have in a system.

(RBAC) is mostly used to control the access to computer or network resources depending on the roles of individual users within an organization.

Due to the static role assignment it does not have complexity. Therefore it needs the low attention for maintenance.

CCTV

A closed-circuit television camera can produce images or recordings for surveillance or other private purposes. Cameras can be either video cameras, or digital stills camerasWalter Bruch was the inventor of the CCTV camera. The main purpose of a CCTV camera is to capture light and convert it into a video signal. Underpinning a CCTV camera is a CCD sensor (charge-coupled device). The CCD converts light into an electrical signal and then signal processing converts this electrical signal into a video signal that can be recorded or displayed on the screen

Data storage and downloadable devices

Data storage and downloadable devices are two important aspects of data management. Data storage refers to the physical or electronic media used to store data, while downloadable devices are devices that can be used to transfer data from one location to another.

There are many different types of data storage devices, including hard drives, solid-state drives (SSDs), optical discs (CDs, DVDs, and Blu-rays), and flash drives. Each type of device has its own advantages and disadvantages, such as capacity, speed, durability, and cost.

Downloadable devices include smartphones, tablets, laptops, and desktop computers. These devices can be used to download data from the internet, such as music, movies, software, and documents. They can also be used to transfer data between devices, such as transferring photos from a camera to a computer.

The choice of data storage device and downloadable device will depend on the specific needs of the user. For example, a user who needs to store a large amount of data may choose a hard drive, while a user who needs a portable device may choose a flash drive.

Here are some of the benefits of using data storage and downloadable devices:

·         Data security: Data storage devices can help to protect data from unauthorized access. For example, hard drives and SSDs can be encrypted to prevent unauthorized access to the data stored on them.

·         Data backup: Data storage devices can be used to backup data, which can help to protect data from loss in the event of a hardware failure or other disaster.

·         Data sharing: Data storage devices can be used to share data with others. For example, a user can share photos or documents with friends or family by transferring them to a flash drive or cloud storage.

Here are some of the risks associated with using data storage and downloadable devices:

·         Data loss: Data can be lost if a data storage device is damaged or lost.

·         Data corruption: Data can be corrupted if a data storage device is not properly formatted or if it is infected with a virus.

·         Data theft: Data can be stolen if a data storage device is lost or stolen.

It is important to take steps to protect data stored on data storage devices and downloadable devices. These steps include:

·         Encrypting data: Encrypting data can help to protect it from unauthorized access.

·         Backing up data: Backing up data can help to protect it from loss in the event of a hardware failure or other disaster.

·         Using strong passwords: Using strong passwords can help to protect data from unauthorized access.

·         Keeping data storage devices safe: Keeping data storage devices safe can help to protect them from damage, loss, or theft.

Data storage and downloadable devices are essential tools for data management. By understanding the benefits and risks of these devices, users can take steps to protect their data.

cctv :

What is CCTV?

CCTV stands for closed-circuit television. It is a system of video cameras that are used to transmit a signal to a specific place, on a limited set of monitors. CCTV systems are often used for security purposes, but they can also be used for other purposes, such as traffic monitoring or retail analytics.

How does CCTV work?

CCTV systems typically consist of three main components:

·         Video cameras: The cameras capture images of the area that is being monitored.

·         Recording devices: The recording devices store the images that are captured by the cameras.

·         Monitors: The monitors display the images that are captured by the cameras.

CCTV systems can be wired or wireless. Wired CCTV systems use cables to connect the cameras, recorders, and monitors. Wireless CCTV systems use radio waves to connect the cameras, recorders, and monitors.

Benefits of CCTV

CCTV systems offer a number of benefits, including:

·         Security: CCTV systems can help to deter crime and to identify criminals.

·         Safety: CCTV systems can help to keep people safe by providing a visual record of events.

·         Monitoring: CCTV systems can be used to monitor activities in a variety of settings, such as businesses, schools, and public areas.

·         Analytics: CCTV systems can be used to collect data about traffic patterns, customer behavior, and other activities.

Drawbacks of CCTV

CCTV systems also have some drawbacks, including:

·         Privacy concerns: Some people have concerns about the privacy implications of CCTV surveillance.

·         Cost: CCTV systems can be expensive to install and maintain.

·         Maintenance: CCTV systems require regular maintenance to ensure that they are working properly.

Backup security measures

 

Backup security measures are important to protect your data from unauthorized access, corruption, or loss. Here are some of the most important backup security measures to consider:

·         Use strong passwords and encryption: Your backup files should be encrypted with a strong password that you do not use for any other purpose. This will help to protect your data from unauthorized access.

·         Store your backups in a secure location: Your backup files should be stored in a secure location that is not accessible to unauthorized individuals. This could be a physical location, such as a safe or a locked cabinet, or a cloud-based storage service.

·         Encrypt your backup media: If you are using physical backup media, such as an external hard drive or a tape drive, you should encrypt the media with a strong password. This will help to protect your data from unauthorized access if the media is lost or stolen.

·         Rotate your backups: You should rotate your backups on a regular basis. This means that you should create new backups and delete old backups. This will help to protect your data from corruption or loss if one of your backups becomes corrupted or lost.

·         Test your backups regularly: You should test your backups regularly to make sure that they are working properly. This will help to ensure that you can restore your data if it is ever lost or corrupted.

By following these backup security measures, you can help to protect your data from unauthorized access, corruption, or loss.

Here are some additional backup security measures that you may want to consider:

·         Use a cloud-based backup service: Cloud-based backup services offer a number of security features, such as encryption, access control, and disaster recovery.

·         Use a backup software solution with security features: There are a number of backup software solutions that offer security features, such as encryption, access control, and auditing.

·         Keep your backup software up to date: Backup software vendors regularly release security updates. It is important to keep your backup software up to date to ensure that you are protected from the latest security threats.

 

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home