Upload
desmond-devendran
View
3.273
Download
0
Embed Size (px)
DESCRIPTION
Citation preview
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 1
Chapter 5
Protection of Information Assets
20072007 CISACISA Review Course Review Course
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 2
Chapter Overview
• Importance of Information Security Management
• Logical Access Exposures and Controls• Network Infrastructure Security• Auditing Information Security Management
Framework • Auditing Network Infrastructure Security• Environmental Exposures and Controls• Physical Access Exposures and Controls• Mobile Computing.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 3
Chapter Objective
Ensure that the CISA candidate…
“understands and can provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.”
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 4
Chapter 5 Summary
According to the CISA Certification Board, this content area will represent approximately 31% of the CISA examination. (approximately 62 questions)
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 5
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 6
5.1. Importance of Information Security Management
• Security objectives to meet organization’s business requirements include : – Ensure the continued availability of their information
systems.– Ensure the integrity of the information stored on their
computer systems.– Preserve the confidentiality of sensitive data.– Ensure conformity to applicable laws, regulations and
standards.– Ensure adherence to trust and obligation in relation to any
information relating to an identified or identifiable individual
– Preserve the confidentiality of sensitive data in store and in transit.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 7
5.1. Importance of Information Security Management
5.1.1. Key Elements of Information Security Management – Senior management commitment and support – Policies and procedures– Organization– Security awareness and education– Monitoring and compliance– Incident handling and response
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 8
5.1.2. Information Security Management Roles and Responsibilities- IS security steering committee- Executive management- Security advisory group– Chief Privacy Officer (CPO)– Chief security officer (CSO)– Process owners– Information assets owners and data owners– Users– External parties – Security specialists/advisors– IT developers– IS auditors
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 9
5.1. Importance of Information Security Management
5.1.3. Information Asset Inventories– Clear identification of asset– Location– Security/risk classification– Asset group– Owner
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 10
5.1.4. Classification of Information Assets– Who has access rights and to what?
– The level of access to be granted
– Who is responsible for determining the access rights and access levels?
– What approvals are needed for access?
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 11
5.1.5. System Access Permissions– Logically or physically based– Need-to-know basis– Four IT layers of security provided for
networks– Access to information resources– Access Capabilities– Reviews of access authorization
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 12
5.1. Importance of Information Security Management
5.1.6. Mandatory and Discretionary Access Controls
- Mandatory Enforces corporate security policy Compares sensitivity of information resources
• Discretionary- Enforces data-owner-defined sharing of information
resources.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 13
5.1.7. Privacy Management Issues and the Role of IS Auditors- The goals of a privacy impact assessment
Pinpoint the nature of personally identifiable information associated with business processes
• Document the collection, use, disclosure and destruction of personally identifiable information
• Ensure that accountability for privacy issues exists• Be the foundation for informed policy, operations and system
design decisions based on an understanding of privacy risk and the options available for mitigating that risk.
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 14
5.1.8. Critical success factors to information security management– Information Security Policy – Senior management commitment and
support on security training – Security Awareness Training– Professional Risk-based Approach
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 15
5.1.9. Information security and External Parties– Identification of Risks Related to External
Parties – Addressing Security When Dealing With Customers
– Addressing Security in Third-party Agreements
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 16
5.1.10. HUMAN RESOURCES SECURITY AND THIRD PARTIES – Screening – Terms and Conditions of Employment – During Employment – Termination or Change of Employment – Removal of Access Rights
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 17
5.1.11. Computer crime issues and exposures– Threats to business include the following:
Financial lossLegal repercussionsLoss of credibility or competitive edgeBlackmail/industrial espionage Disclosure of confidential, sensitive or
embarrassing informationSabotage
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 18
5.1.11. Computer crime issues and exposures (Cont.)– Computer crime vs. computer abuse– “Crime” depending on statistics of the
jurisdiction– Civil offense vs. criminal offence– When should a crime be suspected?
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 19
5.1.11. Computer crime issues and exposures (Cont.) • Possible perpetrators include:
- Hackers- Script Kiddies- Crackers- Employees (authorized or unauthorized)
IS personnelEnd users
- Former employees- Interested or educated outsiders- Part-time and temporary personnel- Third parties- Accidental ignorant
5.1. Importance of Information Security Management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 20
5.2. Logical Access Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 21
Logical access controls are the primary means of managing and protecting resources to reduce risks to a level acceptable to an organization.
5.2. Logical Access Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 22
5.2. Logical Access Exposures and Controls
• Trojan horses or Trojan horses or backdoors backdoors
• Rounding downRounding down• Salami techniquesSalami techniques• Viruses Viruses • WormsWorms• Logic bombsLogic bombs• Trap DoorsTrap Doors
• Asynchronous Asynchronous attacksattacks
• Data leakageData leakage• Wire-tappingWire-tapping• War drivingWar driving• PiggybackingPiggybacking• Computer Computer
shutdownshutdown• Denial of service Denial of service
attackattack
5.2.1. Logical Access Exposures
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 23
5.2.2. Familiarization with the organization's IT environment– These layers are:
the networkoperating system platformdatabase and application layers
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 24
5.2.3. Paths of Logical Access
– General points of entryNetwork connectivity
Remote access
Operator console
Online workstations or terminals
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 25
5.2.4. Logical Access Control Software
- Prevents unauthorized access and modification to an organization’s
sensitive data and use of system critical functions
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 26
5.2.4. Logical access control software functionality• General operating systems access control functions include:
- User identification and authentication mechanisms - Restricted logon IDs - Rules for access to specific information resources - Create individual accountability and auditability- Create or change user profiles - Log events - Log user activities - Report capabilities
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 27
5.2.4. Logical Access Control Software - Database and/or application-level access
control functions include: Create or change data files and database profiles Verify user authorization at the application and transaction
levels Verify user authorization within the application Verify user authorization at the field level for changes
within a database Verify subsystem authorization for the user at the file level Log database/data communications access activities for
monitoring access violations
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 28
5.2.5. Identification and Authentication– Logon-ids and passwords
Features of passwordsPassword syntax (format) rules
– Token devices- one time passwords
– Biometric• Management of Biometrics
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 29
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.5. Identification and Authentication
– Single sign-on (SSO)SSO is the process for the consolidating all organization platform-based administration, authentication and authorization functions into a single centralized administrative function. A single sign-on product that interfaces with:
client-server and distributed systems mainframe systems network security including remote access mechanisms
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 30
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.5. Identification and Authentication
– Single sign-on (SSO) advantages Multiple passwords are no longer required, therefore, whereby
a user may be more inclined and motivated to select a stronger password
It improves an administrator’s ability to manage users’ accounts and authorizations to all associates systems
It reduces administrative overhead in resetting forgotten passwords over multiple platforms and applications
It reduces the time taken by users to log into multiple applications and platforms
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 31
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.5. Identification and Authentication– Single sign-on (SSO) disadvantages include:
Support for all major operating system environments is difficultThe costs associated with SSO development can be
significant when considering the nature and extent of interface development and maintenance that may be necessary
The centralized nature of SSO presents the possibility of a single point of failure and total compromise of an organization’s information assets
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 32
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.6. Social EngineeringIs the human side of breaking into a corporate network. The best means of defense for social engineering is an ongoing security awareness program, wherein all employees are educated about the risks involved in attacks.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 33
5.2. Logical Access Exposures and Controls
• PhishingThis normally takes the form of an e-mail,though it may be a personal or telephone approach, pretending to be an authorized person or organization legitimately
requesting information.
5.2.6. Social Engineering
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 34
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization Issues
– Typical access restrictions at the file level include:
Read, inquiry or copy only Write, create, update or delete only Execute only A combination of the above
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 35
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues– Access control lists refer to:
Users (including groups, machines, processes)
who have been given permission to use a
particular system resourceThe types of access permitted
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 36
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues
- Logical access security administration
Centralized environment
Decentralized environment
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 37
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues- Advantages of conducting security in a
decentralized environment The security administration is on-site at the
distributed location Security issues are resolved in a more timely
manner Security controls are monitored on a more
frequent basis
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 38
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues- Risks associated with distributed
responsibility for security administration Local standards might be implemented rather
than those required Levels of security management might be below
chat can be maintained by central administration. Unavailability of management checks and audits.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 39
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues
Remote access securityToday’s organizations require remote access connectivity to their information resources for different types of users such as employees, vendors, consultants, business partners and customer representatives. In providing this capability, a variety of methods and procedures are available to satisfy an organization’s business need for this level of access.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 40
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues– Remote access security risks include:
Denial of service Malicious third partiesMisconfigured communications softwareMisconfigured devices on the corporate computing
infrastructureHost systems not secured appropriatelyPhysical security issues over remote users’ computers
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 41
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues– Remote access security controls include:
Policy and standards
Proper authorizations
Identification and authentication mechanisms
Encryption tools and techniques, such as the use of VPN
System and network management
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 42
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization5.2.7. Authorization IssuesIssues
Remote access using personal digital assistants (PDAs).Remote access using personal digital assistants (PDAs).- - Control issues to address include:Control issues to address include:
ComplianceCompliance Approval Approval Standard PDA applicationsStandard PDA applications Due careDue care Awareness training PDA applicationsPDA applications SynchronizationSynchronization EncryptionEncryption Virus detection and controlVirus detection and control Device registration Camera use
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 43
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization Issues5.2.7. Authorization Issues
• Access issues with mobile technologyAccess issues with mobile technology
These devices should be strictly controlled both by These devices should be strictly controlled both by policy and by denial of use. Possible actions include:policy and by denial of use. Possible actions include:Banning all use of transportable drives in the security policyBanning all use of transportable drives in the security policy
Where no authorized used of USB ports exists, disabling use with a Where no authorized used of USB ports exists, disabling use with a logon script which removes them form the system directorylogon script which removes them form the system directory
If they are considered necessary for business use, encrypting all data If they are considered necessary for business use, encrypting all data transported or saved by these devicestransported or saved by these devices
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 44
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues5.2.7. Authorization Issues
• Audit logging in monitoring system accessAudit logging in monitoring system access
provides management an audit trail to monitor provides management an audit trail to monitor activities of a suspicious nature, such as a activities of a suspicious nature, such as a hacker attempting brute force attacks on a hacker attempting brute force attacks on a privileged logon IDprivileged logon ID
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 45
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues5.2.7. Authorization Issues• Audit logging in monitoring system accessAudit logging in monitoring system access
- Access rights to system logs- Access rights to system logsA periodic review of system-generated logs A periodic review of system-generated logs can detect security problems, including can detect security problems, including attempts to exceed access authority or gain attempts to exceed access authority or gain system access during unusualsystem access during unusual hours.hours.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 46
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues5.2.7. Authorization Issues
• Audit logging in monitoring system accessAudit logging in monitoring system access
- Tools for audit trails (logs) analysis- Tools for audit trails (logs) analysis Audit reduction toolsAudit reduction tools
Trends/variance-detection toolsTrends/variance-detection tools
Attack signature-detection toolsAttack signature-detection tools
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 47
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization Issues5.2.7. Authorization Issues
• Audit logging in monitoring system accessAudit logging in monitoring system access- Cost considerationCost consideration- Audit concernsAudit concernsPatterns or trends that indicate abuse of access privileges, Patterns or trends that indicate abuse of access privileges, such as concentration on a sensitive applicationsuch as concentration on a sensitive applicationViolations (such as attempting computer file access that is not Violations (such as attempting computer file access that is not authorized) and/or use of incorrect passwordsauthorized) and/or use of incorrect passwords effectiveness of IDs and IPs and management of detected effectiveness of IDs and IPs and management of detected and prevented intrusionand prevented intrusion
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 48
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues5.2.7. Authorization Issues• Restrict and monitor access to computer Restrict and monitor access to computer
features that bypass cost considerationfeatures that bypass cost consideration- Generally, only system software Generally, only system software programmers should have access to:programmers should have access to: Bypass label processing (BLP)Bypass label processing (BLP) System exitsSystem exits Special system logon IDsSpecial system logon IDs
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 49
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls
5.2.7. Authorization Issues5.2.7. Authorization Issues• Naming conventions for logical access Naming conventions for logical access controlscontrols
- Are structures used to govern user access to Are structures used to govern user access to
the system and user authority to access/use the system and user authority to access/use
computer resources, such as files, programs computer resources, such as files, programs
and terminals.and terminals.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 50
5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.8. Storing, Retrieving, Transporting and Disposing of Confidential Information
- Management should define and implement procedures to prevent access to, or loss of, sensitive information and software from computers, disks, and other equipment or media when they are stored, disposed of or transferred to another user.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 51
Which of the following BEST provides access control to payroll data being processed on a local server?
A. Logging of access to personal informationB. Separate password for sensitive
transactions C. Software restricts access rules to authorized staff D. System access restricted to business hours
Chapter 5 Question 1Chapter 5 Question 1
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 52
A utility is available to update critical tables in case of data inconsistency. This utility can be executed at the OS prompt or as one of menu options in an application. The BEST control to mitigate the risk of unauthorized manipulation of data is to:A. delete the utility software and install it as and when required.B. provide access to the utility on a need-to-use basis.C. provide access to the utility to user management.D. define access so that the utility can be executed only in the menu option.
Chapter 5 Question 5Chapter 5 Question 5
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 53
An organization is proposing to install a single sign-on facility giving access to all systems. The organization should be aware that:A. maximum unauthorized access would be possible if a password is disclosed.B. user access rights would be restricted by the additional security parameters.C. the security administrator’s workload would increase.D. user access rights would be increased.
Chapter 5 Question 6Chapter 5 Question 6
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 54
5.3. Network Infrastructure Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 55
5.3.1. LAN SecurityLocal area networks facilitate the storage and retrieval of programs and data used by a group of people. LAN software and practices also need to provide for the security of these programs and data. – LAN risk and issues – Dial-up access controls
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 56
5.3.2. Client-Server Security – Control techniques in place
Securing access to data or applicationUse of network monitoring devicesData encryption techniquesAuthentication systemsUse of application level access control programs
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 57
5.3.2. Client/Server Security• Client/server risks and issues
Access controls may be weak in a client-server environment.
Change control and change management procedures.
The loss of network availability may have a serious impact on the business or service.
Obsolescence of the network components The use of modems to connect the network to
other networks
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 58
5.3.2. Client/Server Security• Client/server risks and issues
The connection of the network to public switched telephone networks may be weak
Changes to systems or data Access to confidential data and data
modification may be unauthorized Application code and data may not be located
on a single machine enclosed in a secure computer room, as with mainframe computing
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 59
5.3.3. Wireless Security Threats and Risk Mitigation– Threats categorization:
• Errors and omissions• Fraud and theft committed by authorized or
unauthorized users of the system• Employee sabotage• Loss of physical and infrastructure support• Malicious hackers• Industrial espionage• Malicious code• Foreign government espionage• Threats to personal privacy
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 60
5.3.3. Wireless Security Threats and Risk Mitigation– Security requirements
• Authenticity
• Nonrepudiation
• Accountability
• Network availability
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 61
5.3.4. Internet Threats and Security• Network Security Threats• Passive attacks
Network analysis Eavesdropping Traffic analysisActive attacks Brute-force attack Masquerading Packet replay Phishing Message modification Unauthorized access through the Internet or web-based
services Denial of service Dial-in penetration attacks E-mail bombing and spamming E-mail spoofing
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 62
5.3.4. Internet Threats and Security– Threat impact
Loss of incomeIncreased cost of recoveryIncreased cost of retrospectively securing systemsLoss of information Loss of trade secretsDamage to reputationLegal and regulatory noncomplianceFailure to meet contractual commitmentsLegal action by customers for loss of confidential data
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 63
5.3.4. Internet Threats and Security– Causal factors for internet attacks
Availability of tools and techniques on the Internet
Lack of security awareness and training Exploitation of security vulnerabilities Inadequate security over firewalls
– Internet security controls
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 64
• Firewall Security Systems
–Firewall general features
–Firewall typesRouter packet filteringApplication firewall systemsStateful inspection
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 65
• Firewall Security Systems
– Examples of firewall
implementations
Screened-host firewall
Dual-homed firewall
Demilitarized zone (DMZ)
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 66
• Firewall Security Systems
– Firewall issues
A false sense of security
The circumvention of firewall
Misconfigured firewalls
What constitutes a firewall
Monitoring activities may not occur on a regular basis
Firewall policies
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 67
5.3. Network Infrastructure Security
• Firewall Security Systems
• Firewall Platforms– Using hardware or software
– appliances versus normal servers
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 68
• Intrusion Detection Systems (IDS)
An IDS works in conjunction with routers and
firewalls by monitoring network usage anomalies.
• Network-based IDSs
• Host-based IDSs
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 69
• Intrusion Detection Systems (IDS)
Components:
• Sensors that are responsible for collecting data
• Analyzers that receive inputo from sensors and
determine intrusive activity
• An administration console
• A user interface
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 70
• Intrusion Detection Systems (IDS)
Types include:
• Signature-based
• Statistical-based
• Neural networks
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 71
• Intrusion Detection Systems (IDS)
Features:
• Intrusion detection
• Gathering evidence on intrusive activity
• Automated response
• Security monitoring
• Interface with system tolls
• Security policy management
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 72
• Intrusion Detection Systems (IDS)
Limitations:
• Weaknesses in the policy definition
• Application-level vulnerabilities
• Backdoors into applications
• Weaknesses in identification and authentication
schemes
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 73
5.3. Network Infrastructure Security
• Honeypots and Honeynets• High interaction – Give hackers a real
environment to attack
• Low interaction – Emulate production environments
5.3.4. Internet Threats and Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 74
5.3.5. Encryption
– Key elements of encryption systems
• Encryption algorithm
• Encryption key
• Key length
– Private key cryptographic systems
– Public key cryptographic systems
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 75
5.3.5. Encryption (Continued)
– Elliptical curve cryptosystem (ECC)
– Quantum cryptography
– Advanced Encryption Standard (AES)
– Digital signatures
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 76
5.3.5. Encryption (Continued)
– Digital signatures
Data integrity
Authentication
Nonrepudiation
Replay protection
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 77
5.3. Network Infrastructure Security
• Digital Envelope – Used to send encrypted information
and the relevant key along with it.
– The message to be sent, can be encrypted by using either:
• Asymmetric key
• Symmetric key
5.3.5. Encryption (Continued)
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 78
5.3.5. Encryption (Continued)– Public key infrastructure
• Digital certificates• Certificate authority (CA)• Registration authority (RA)• Certificate revocation list (CRL)• Certification practice statement (CPS)
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 79
5.3.5. Encryption (Continued)– Use of encryption in OSI protocols
Secure sockets layer (SSL)Secure Hypertext Transfer Protocol (S/HTTP)IP securitySSHSecure multipurpose Internet mail extensions
(S/MIME)Secure electronic transactions (SET)
5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 80
5.3. Network Infrastructure Security
• Encryption risks and password protection
• Viruses
• Virus and worm controls
• Technical controls
• Anti-virus software implementation strategies
5.3.5. Encryption (Continued)
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 81
5.3. Network Infrastructure Security
• Virus and Worm Controls
• Management Procedural Controls
• Technical controls
• Anti-virus software implementation strategies
5.3.6. Viruses
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 82
5.3. Network Infrastructure Security5.3.7. VOICE-OVER IP
- AdvantagesUnlike traditional telephony VoIP innovation
progresses at market rates
• Lower costs per call, or even free calls, especially for long-distance calls
• Lower infrastructure costs. Once IP infrastructure is installed, no or little additional telephony infrastructure is needed.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 83
5.3. Network Infrastructure Security
5.3.7. VOICE-OVER IP- VoIP Security Issues• Inherent poor security
– The current Internet architecture does not provide the same physical wire security as the phone lines.
• The key to securing VoIP – security mechanisms such as those
deployed in data networks (e.g., firewalls, encryption) to emulate the security level currently used by PSTN network users.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 84
5.3. Network Infrastructure Security
5.3.8. Private Branch Exchange (PBX )
- Attributes
- PBX Risks and Audit
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 85
Which of the following is the MOST effective anti-virus control?: A. Scanning e-mail attachments on the
mail server.
B. Restoring systems from clean copies.
C. Disabling floppy drives.
D. An online anti-virus scan with up-to-
date virus definitions.
Chapter 5 Question 2Chapter 5 Question 2
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 86
An IS auditor has just completed a review of an organization that has a mainframe and a client-server environment where all production data reside. Which of the following weaknesses would be considered the MOST serious?A. The security officer also serves as the database administrator.B. Password controls are not administered over the client-server environment.C. There is no business continuity plan for the mainframe system’s noncritical applications.D. Most local area networks do not back up file-server-fixed disks regularly.
Chapter 5 Question 4Chapter 5 Question 4
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 87
A B-to-C e-commerce web site as part of its information security program wants to monitor, detect and prevent hacking activities and alert the system administrator when suspicious activities occur. Which of the following infrastructure components could be used for this purpose?
A. Intrusion detection systemsB. FirewallsC. RoutersD. Asymmetric encryption
Chapter 5 Question 7Chapter 5 Question 7
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 88
Which of the following BEST determines whether complete encryption and authentication protocols for protecting information while being transmitted exist?
A. A digital signature with RSA has been implemented.
B. Work is being done in tunnel mode with the nested services of AH and ESP.
C. Digital certificates with RSA are being used.D. Work is being done in transport mode with the
nested services of AH and ESP..
Chapter 5 Question 8Chapter 5 Question 8
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 89
Which of the following concerns about the security of an electronic message would be addressed by digital signatures?
A. Unauthorized readingB. TheftC. Unauthorized copyingD. Alteration
Chapter 5 Question 9Chapter 5 Question 9
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 90
Which of the following would be MOST appropriate to ensure the confidentiality of transactions initiated via the Internet?
A. Digital signatureB. Data Encryption Standard (DES)C. Virtual private network (VPN)D. Public key encryption
Chapter 5 Question 10Chapter 5 Question 10
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 91
5.4. AuditingInformationSecurity Framework
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 92
5.4.1. AUDITING INFORMATION SECURITY FRAMEWORK
– Review written policies, procedures and standards
– Logical access security policies– Formal security awareness and training– Data ownership (data classification scheme)– Data owners
5.4. AUDITING INFORMATION SECURITY FRAMEWORK
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 93
5.4.1. Auditing Information Security Management (Cont.) – Data custodians– Security administrator– New IT Users– Data users– Documented authorizations– Terminated employee access– Access standards– Security Baselines– Access Standards
5.4. AUDITING INFORMATION SECURITY FRAMEWORK
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 94
5.4.2. Auditing Logical Access– Familiarization with the organization's IT
environment
– Documenting the access paths– Interviewing systems personnel– Reviewing reports from access control software– Reviewing application systems operations
manual
5.4. AUDITING INFORMATION SECURITY FRAMEWORK
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 95
5.4.3. Techniques for Testing Security– Use of terminal cards and keys
– Terminal identification
– Logon-ids and passwords
– Controls over production resources
– Logging and reporting of computer access violations
5.4. AUDITING INFORMATION SECURITY FRAMEWORK
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 96
5.4.3. Techniques for Testing Security
(Continued)
– Follow-up access violations
– Investigation of computer crime
– Protection of Evidence
– Identification of methods of bypassing security and compensating controls
– Review access controls and password administration
5.4. AUDITING INFORMATION SECURITY FRAMEWORK
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 97
5.4.4. INVESTIGATION
TECHNIQUES
– Investigation of Computer
Crime
– Protection of Evidence and
Chain of Custody
5.4. AUDITING INFORMATION SECURITY FRAMEWORK
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 98
An IS auditor reviewing the log of failed logon attempts would be MOST concerned if which of the following accounts was targeted?A. Network administratorB. System administratorC. Data administratorD. Database administrator
Chapter 5 Question 3Chapter 5 Question 3
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 99
5.5. Auditing Network
Infrastructure Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 100
5.5.1. Auditing Remote Access– Auditing Internet “Points of Presence”– Network penetration tests– Full network assessment reviews– LAN networks assessments– Development and authorization of
network changes– Unauthorized changes
5.5. Auditing Network 5.5. Auditing Network Infrastructure SecurityInfrastructure Security
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 101
5.5. Auditing Network Infrastructure Security
5.5.1. Auditing Remote Access
Computer Forensics
• “It is the process of identifying, preserving,
analyzing and presenting digital evidence in a
manner that is legally acceptable in any legal
proceedings”.
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 102
5.6. Environmental Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 103
5.6.1. Environmental Issues and
Exposures
Environmental exposures are due primarily to
naturally occurring events, such as lightning
storms, earthquakes, volcanic eruptions,
hurricanes, tornados and other types of extreme
weather conditions.
5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 104
5.6.1. Environmental Issues and Exposures
– Power failures can be grouped into distinct
categories Total failure (blackout)
Severely reduced voltage (brownout)
Sags, spikes and surges
Electromagnetic interference (EMI)
5.6. Environmental5.6. EnvironmentalExposures and Controls Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 105
5.6.2. Controls for Environmental Exposures
– Alarm control panels
– Water detectors
– Handheld fire extinguishers
– Manual fire alarms
– Smoke detectors
– Fire suppression systems
– Strategically locating the computer room
5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 106
5.6.2. Controls for Environmental Exposures (cont.)
– Regular inspection by fire department
– Fireproof walls, floors and ceilings surrounding the
computer room
– Electrical surge protectors
– Uninterruptible power supply/generator
– Emergency power-off switch
– Power leads from two substations
5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 107
5.6.2. Controls for Environmental Exposures
(cont.)
– Wiring placed in electrical panels and conduit
– Prohibiting against eating, drinking and smoking
within the information processing facility
– Fire resistant office materials
– Documented and tested emergency evacuation plans
5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 108
5.6.3. Auditing Environmental Controls– Water and smoke detectors– Handheld fire extinguishers– Fire suppression systems– Regular inspection by fire department– Fireproof walls, floors and ceilings
surrounding the computer room– Electrical surge protectors
5.6. Environmental 5.6. Environmental Exposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 109
5.6.3. Auditing Environmental Controls (cont.)– Power leads from two substations– Fully documented and tested business
continuity plan– Wiring placed in electrical panels and conduit– UPS/generator– Documented and tested emergency evacuation
plans– Humidity/temperature control
5.6. Environmental 5.6. Environmental Exposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 110
5.7. Physical Access Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 111
5.7.1. Physical Access Issues and Exposures
– Physical access exposures
• Unauthorized entry• Damage, vandalism or theft to equipment or documents• Copying or viewing of sensitive ore copyrighted
information• Alteration of sensitive equipment and information• Public disclosure of sensitive information• Abuse of data processing resources• Blackmail• Embezzlement
5.7. Physical Access 5.7. Physical Access Exposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 112
5.7.1. Physical Access Issues and Exposures
– Possible perpetratorsDisgruntled
On strike
Threatened by disciplinary action or dismissal
Addicted to a substance or gambling
Experiencing financial or emotional problems
Notified of their termination
5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 113
5.7.2. Physical Access Controls– Bolting door locks
– Combination door locks (cipher locks)
– Electronic door locks
– Biometric door locks
– Manual logging
– Electronic logging
5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 114
5.7.2. Physical Access Controls (continued)– Identification badges (photo IDs)– Video cameras– Security guards– Controlled visitor access– Bonded personnel– Deadman doors
5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 115
5.7.2. Physical Access Controls
(continued)– Not advertising the location of sensitive
facilities– Computer workstation locks– Controlled single entry point– Alarm system– Secured report/document distribution cart
5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 116
5.7.3. Auditing Physical Access
– Touring the information processing facility (IPF)
– Testing of physical safeguards
5.7. Physical Access5.7. Physical AccessExposures and Controls Exposures and Controls
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 117
5.8. Mobile Computing
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 118
5.9. Case Study
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 119
CASE STUDY SCENARIOManagement is currently considering ways in which to enhance the physical security and protection of its data center. The IS auditor has been asked to assist in this process by evaluating the current environment and making recommendations for improvement. The data center consists of 15,000 square feet (1,395 square meters) of raised flooring on the ground floor of the corporate headquarters building.
Chapter 5Chapter 5CASE STUDY
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 120
CASE STUDY SCENARIO (Cond…)A total of 22 operations personnel require regular access. Currently, access to the data center is obtained using a proximity card, which is assigned to each authorized individual. There are three entrances to the data center, each of which utilizes a card reader and has a camera monitoring the entrance. These cameras feed their signals to a monitor at the building reception desk, which cycles through these images along with views from other cameras inside and outside the building.
Chapter 5Chapter 5CASE STUDY
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 121
CASE STUDY SCENARIO (Cont…)Two of the doors to the data center also have key locks that bypass the electronic system so that a proximity card is not required for entry. Use of proximity cards is written to an electronic log. This log is retained for 45 days. During the review, the IS auditor noted that 64 proximity cards are currently active and issued to various personnel. The data center has no exterior windows, although one wall is glass and overlooks the entry foyer and reception area for the building.
Chapter 5Chapter 5CASE STUDY
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 122
5.10. Practice Questions
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 123
CASE STUDY QUESTIONS1. Which of the following risks would be
mitigated by supplementing the proximity card system with a biometric scanner to provide two-factor authentication?A. Piggybacking or tailgatingB. Sharing access cardsC. Failure to log accessD. Copying of keys
Chapter 5Chapter 5CASE STUDY
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 124
CASE STUDY QUESTIONS2. Which of the following access mechanisms
would present the greatest difficulty in terms of user acceptance?
A. Hand geometry recognition
B. Fingerprints
C. Retina scanning
D. Voice recognition
Chapter 5Chapter 5CASE STUDY
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 125
5.11. Answers to Practice Questions
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 126
5.12. Suggested Resources for
Reference
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 127
Group Discussion
Chapter 5Chapter 5RecapRecap