You are on page 1of 8

Chapter 3 – Security Part I: Auditing Operating Systems and Networks - contains key information about the user, including

on about the user, including user ID, password, user group


and privileges granted to the user
AUDITING OPERATING SYSTEMS 3. Access Control List – assigned to each IT resource that contain information that
Operating System – computer’s control program that allows users and their applications to defines the access privileges for all valid users of the resources
share and access computer resources  When a user attempts to access a resource, the system compares his/her ID
and privileges contained in the access token with those contained in the
Operating System Objectives access control list.
4. Discretionary Access Privileges – granted to resource owners to allow them to grant
Three Main Tasks:
access privileges to other users
1. It translates high-level languages into machine-level language that the computer can
Threats to Operating System Integrity
execute
 Compilers and Interpreters – language translator modules of operating  Accidental threats include hardware failures that cause the operating
system system to crash.
2. It allocates computer resources to users, workgroups, and applications.  Errors in user application programs also cause operating system errors.
3. It manages the tasks of job scheduling and multiprogramming.  Accidental system failures may cause whole segment of memories to be
dumped to disks and printer, resulting in the unintentional disclosure of
Three ways in which jobs are submitted to the system:
confidential information.
1. Directly by the system operator  Intentional threats to the operating system are most commonly attempts to
2. From various batch-job queues illegally access data or violate user privacy for financial gain.
3. Through telecommunication links from remote workstations
Three Sources:
Five Fundamental Control Objectives:
1. Privileged personnel who abuse their authority
1. The operating system must protect itself from users. 2. Individuals, both internal and external to the organization
2. The operating system must protect users from each other. 3. Individuals who intentionally (or accidentally insert computer viruses
3. The operating system must protect users from themselves.
Operating System Controls and Audit Tests
4. The operating system must be protected from itself.
5. The operating system must be protected from its environment. Four areas that are examined:

Operating System Security 1. Access Privileges


 Management should ensure that individuals are not granted privileges that
Operating System Security – involves policies, procedures, and controls that determine who
are incompatible with their assigned duties
can access the operating system, which resources they can use, and what actions they can
2. Password Control
take.
 Password – secret code the user enters to gain access to systems,
Components in secure operating systems: applications, data files or a network server
 Most common forms of contra-security behaviour include:
1. Log-On Procedure – operating system’s first line of defense against unauthorized o Forgetting passwords and being locked out of the system
access. o Failing to change passwords on a frequent basis
 When the user initiates the process, he/she is presented with a dialog box o The post-it syndrome, whereby passwords are written down and
requesting ID and password. The system compares the ID and password to a displayed for others to see
database of valid users. o Simplistic passwords that a computer criminal easily anticipates
2. Access Token – created by the operating system when log-on attempt is successful
 Reusable Passwords – the user defines the password to the system once 1. Interception of Network Messages
and then reuses to gain future access  Sniffing – unauthorized interception of information by a node on the network
 One-Time Passwords – the user’s password changes continuously 2. Access to Corporate Databases – increases the risk that an employee will view,
3. Virus Control corrupt, change or copy data
 Malicious and destructive programs are responsible for millions of dollars of 3. Privileged Employees – middle managers, who often possess access privileges that
corporate losses that are measured in terms of data corruption and allow them to override controls, are the most often prosecuted for insider crimes
destruction, degraded computer performance, hardware destruction,  Reluctance to Prosecute – a factor that contributes to computer crime
violations of privacy and the personnel time devoted to repairing the
damage. Internet Risks
4. Audit Trail Control 1. IP Spoofing – a form of masquerading to gain unauthorized access to a Web server
 System audit trails – logs that record activity at the system, applications, and/or to penetrate an unlawful act without revealing one
and user level  A perpetrator modifies the IP address of the originating computer to disguise
 Consists of two types of audit logs: his/her identity.
o Detailed logs of individual keystrokes  A criminal makes a message packet appear to be coming from a trusted or
o Event-oriented logs authorized source and thus slip through control systems designed to accept
 Keystroke Monitoring – involves recording both the user’s keystrokes and transmissions from certain host computers and block out others.
the system’s responses 2. Denial of Service Attack – an assault on a Web browser to prevent it from servicing
- may be used after the fact to reconstruct the details of an event pr a its legitimate users
real-time control to prevent unauthorized intrusion
 Event Monitoring – summarizes key activities related to system resources Three common types are:
- record the IDs of all users accessing the system; the time and
 SYNchronize (SYN) Flood Attack – accomplished by not sending the final
duration of a user’s session; programs that were executed during the
acknowledgement to the server’s SYNchronize-ACKnowledgement (SYN-ACK)
session; and the files, databases, printers and other resources
response, which causes the server to keep signalling for acknowledgement until
accessed
the server times out
 Setting Audit Trail Objectives:
 Smurf Attack – involves three parties: the perpetrator, the intermediary, and
o Detecting Unauthorized Access
the victim
o Reconstructing Events
- accomplished by exploiting an Internet maintenance tool called a ping,
o Personal Accountability
which is used to test the state of network congestion and determine
AUDITING NETWORKS whether a particular host computer is connected and available on the
network
 The paradox of networking is that networks exist to provide user access to shared o This ping works by sending an echo request message (like a sonar
resources, yet the most important objective of any network is to control such access. ping) to the host computer and listening for a response (echo reply).
Hence, for every productivity argument in favour of remote access, there is security The ping signal is encapsulated in a message packet that also contains
argument against it. the IP address of the sender. A functioning and available host must
Intranet Risks return an echo reply message that contains the exact data received in
the echo message request packet.
Intranet – consists of small LANS and large wide area networks (WANS) that may contain o Intermediary – unwilling and unaware party who is also a victim and
thousands of individual nodes to some extent suffers the same type of network congestion
problems the target victim suffers
- used to connect employees within a single building, between buildings on the  Distributed Denial of Service (DDoS) – may take form of a SYN flood or smurf
same physical campus, and between geographically dispersed locations attack
- the perpetrator of DDoS attack may employ a virtual army of so-called can perform sophisticated functions such as user authentication
zombie or bot (robot) computers to launch the attack for specific tasks
- involves one or more Internet relay chat (IRC) networks as a source of - provide comprehensive transmission logging and auditing tools
zombies for reporting unauthorized activity
o Internet relay chat (IRC) – popular interactive service on the Internet 2. Controlling Denial of Service Attacks
that lets thousands of people from around the world engage in real-  For smurf attacks: the targeted organization can program its firewall to
time communications via their computers ignore all communication from the attacking site, once the attacker’s IP
o Botnets – collections of compromised computers that are under address is determined.
control of the perpetrator  For SYN flood attacks:
3. Equipment Failure – can disrupt, destroy or corrupt transmissions between senders o Internet hosts must embrace policy of social responsibility by
and receivers programming their firewalls to block outbound message packets
 Network topologies consists of various configurations of: that contain invalid internal IP addresses
o Communication lines o Security software is available for the targeted sites that scan half-
o Hardware components open conncections
o Software  For distributed denial of service attacks:
o Many organizations have invested in intrusion prevention system
Controlling Networks (IPS) that employ deep packet inspection (DPI) to determine
 We begin by reviewing several controls for dealing with subversive threats. This is whether an attack is in progress
followed by with the audit objectives and procedures associated with these controls. o DPI – uses a variety of analytical and statistical techniques to
The section then presents controls, audit objectives, and audit procedures related to evaluate the contents of message packets
threats from equipment failure. - searches the individual packets for protocol non-compliance
and employs predefined criteria to decide if a packet can
Controlling Risks from Subversive Threats proceed to its destination
- can identify malicious packets based on a database of known
1. Firewall – a system of software and hardware that prevents unauthorized access to
attack signatures
or from a private network
o IPS – works in line with a firewall at the perimeter of the network
- can be used to authenticate an outside user of the network, verify his/her level
to act as a filter that removes malicious packets from the flow
of access authority, and then direct the user to the program, data or service
before they can affect servers and networks
requested
- provides additional protection against careless laptop users
- can be grouped into two types:
who have been unknowingly infected with Trojan horse or
 Network-level firewalls – provide efficient but low-security access control
worm while working outside the protected network
- consists of screen router that examines the source and destination
environment
addresses that are attached to incoming message packets
3. Encryption – the conversion of data into a secret code for storage in databases and
- accepts or denies access requests based on filtering rules that have been
transmission over networks
programmed into it and directs incoming calls to the correct internal
- the sender uses an encryption algorithm to convert the original message (called
receiving mode
cleartext) into a coded equivalent (called ciphertext) which is then decoded
- insecure because they are designed to facilitate free flow of information
(decrypted) back into cleartext at the receiving end
rather than restrict it
 Key – mathematical value that the sender selects
 Application-level firewalls – provide higher level of customizable network
 Algorithm – procedure of shifting each letter in the cleartext message the
security, but they add overhead to connectivity
number of positions that the key value indicates
- configured to run security applications called proxies that permit
routine services, such as email to pass through the firewall but
Two methods of encryption: - the receiver uses the CA’s public key, which is widely publicized, to decrypt the
sender’s public key attached to the message
 Private Key Encryption - the sender’s public key is then used to decrypt the message
o Advance encryption standard (AES) – a 128-bit encryption technique  Public key infrastructure (PKI) – constitutes the policy and procedures for
that has become a U.S. government standard for private key administering the activity and consists of:
encryption o A CA that issues and revokes the digital certificate.
- uses a single key known to both the sender and the receiver of o A registration authority that verifies the identity of certificate
the message applicants.
o Triple-DES encryption – an enhancement to an older encryption o A certification repository, which is publicly accessible database
technique called data encryption standard (DES) that contains current information about current certificates and a
- provides considerably improved security over most single certification revocation list of certificates that have been revoked
encryption technique and whose two forms are: and the reasons for revocation.
a. EEE3 – uses three different keys to encrypt the message 6. Message Sequence Numbering – a sequence number is inserted in each message,
three times and any attempt of deleting a message from a stream of messages, changing the
b. EDE3 – uses one key to encrypt the message; a second key order of message received or duplicating a message, will become apparent at the
is used to decode it, which is then garbled (because of the receiving end
difference in decoding and encrypting); and a third key is 7. Message Transaction Log – records all incoming and outgoing messages,, as well as
used to encrypt the garbled message attempted (failed access), to prevent an intruder from penetrating the system by
 Public Key Encryption – uses two different keys: one for encoding messages trying different password and user ID combinations
and the other for decoding them - should record the user ID, time of the access, and the terminal location or
- each recipient has a private key that is kept secret and a public key that is telephone number from which the access originated
published 8. Request-Response Technique – a control message from the sender and a response
- the sender of a message uses the receiver’s public key to encrypt the from the receiver are sent at periodic, synchronized intervals to avoid intruder’s
message and the receiver then uses his/her private key to decode the attempt to prevent or delay the receipt of a message from the sender
message 9. Call-Back Devices – requires the dial-in user to enter a password and be identified,
o Rivest-Shamir-Adleman (RSA) – highly secure public key then the system breaks the connection to perform user authentication
cryptography method that is computationally intensive and much - dials the caller’s number to establish new connection if the caller is authorized
slower than the standard DES encryption - restricts access to unauthorized terminals or telephone numbers and prevents
o Digital Envelope – where RSA and DES are used together an intruder in masquerading as a legitimate user
- the actual message is encrypted using DES to provide fasted
decoding Controlling Risks from Equipment Failures
- the DES private key needed to decrypt the message is
encrypted using RSA and transmitted along with the message Line Errors – causes data loss which is the most common problem in data communications
- the receiver first decodes the DES key, which is then used to - the bit structure of the message can be corrupted through noise on the
decode the message communication lines, which is made up of random signals that can interfere with
4. Digital Signatures – electronic authentication that cannot be forged and ensures that the message signal when why reach a certain level
the message or document that the sender transmitted was not tampered with after
the signature was applied Two techniques commonly used to detect and correct such data errors:
5. Digital Certificate – issued by a trusted certification authority (CA) and is used in
1. Echo Check – involves the receiver of the message returning the message to the
conjunction with a public key encryption system to authenticate the sender of a
sender
message
- transmitted with the encrypted message to authenticate the sender
- the sender compares the returned message with a stored copy of the original  On the payment date, the buyer’s system automatically makes an EFT to its
and if there is a discrepancy, the message is retransmitted originating back (OBK).
2. Parity Check – incorporates an extra bit (the parity bit) into a structure of a bit string  OBK – removes funds from the buyer’s account and transmits them electronically to
when it is created or transmitted the automatic clearing house (ACH) bank
 ACH – transfers the funds from the OBK to the receiving bank (RBK), which in turn
AUDITING ELECTRONIC DATA INTERCHANGE (EDI) applies the funds to the seller’s account
Electronic Data Interchange (EDI) – intercompany exchange of computer-processable business EDI Controls
information in standard format
Transaction Authorization and Validation – can be accomplished in three points in the
Several important features: process:
1. EDI is an interorganization endeavour. 1. Some VANS have the capability of validating passwords and user ID codes for the
2. The information systems of the trading partners automatically process the vendor by matching these against a valid customer file. The VAN rejects any
transaction. unauthorized trading partner transactions before they reach the vendor’s system.
3. Transaction information is transmitted in a standardized format 2. Before being converted, the translation software can validate the trading partner’s ID
EDI Standards and password against a validation file in the firm’s database.
3. Before processing, the trading partner’s application software references the valid
American National Standards Institute (ANSI) X.12 format– standard in the United States customer and vendor files to validate the transaction.

X-12 electronic envelope – contains the electronic address of the receiver, communications Access Control
protocols, and control information
 To guard against unauthorized access, each company must establish valid vendor and
Functional group – a collection of transaction sets (electronic documents) for a particular customer files. Inquiries against databases can thus be validated, and unauthorized
business application, such as a group of sales invoice or POs attempts at access can be rejected.

Transaction set – composed of data segments and data elements EDI Audit Trail – one technique is to maintain a control log, which records the transaction’s
flow through each phase of the EDI system
Benefits of EDI
AUDITING PC-BASED ACCOUNTING SYSTEMS
Common EDI savings that justify the approach:
PC applications – tend to be general-purpose systems that serve a wide range of needs and
 Data keying
allows software vendors to mass-produce low-cost and error-free standard products
 Error reduction
 Reduction of paper PC Systems Risks and Controls:
 Postage
 Automated procedures 1. Operating System Weakness – PCs provide only minimal security for data files and
 Inventory reduction programs contained within them
2. Weak Access Control – a computer criminal attempting to circumvent the log-on
Financial EDI procedure may do so by forcing the computer to boot from CD-ROM, whereby an
uncontrolled operating system can be loaded into the computer’s memory
Electronic Funds Transfer – used for cash disbursement and cash receipts processing and is
3. Inadequate Segregation of Duties – employees in PC environments may have access
more complicated than using EDI for purchasing and selling activities
to multiple applications that constitute incompatible tasks
 The buyer’s EDI system receives the purchase invoices and automatically approves 4. Multilevel Password – used to restrict employees who are sharing the same
them for payment. computers to specific directories, programs and data files
5. Risk of Theft – because of their size, PCs are objects of theft and the portability of Protocols – rules and standards governing the design of hardware and software that permit
laptops places them at the highest risk users of networks, which different vendors have manufactured, to communicate and share
6. Weak Backup Procedures – primary cause of data loss in PC environments data
7. Risk of Virus Infection – one of the most common threats to PC integrity and system
availability  What Functions Do Protocols Perform?
1. They facilitate the physical connection between network devices.
APPENDIX 2. They synchronize the transfer of data between physical devices.
3. They provide a basis for error checking and measuring network performance.
Section A: Internet Technologies 4. They promote compatibility among network devices.
Internet – was developed for the U.S. military and later became used widely for academic and 5. They promote network designs that area flexible, expandable, and cost-effective.
government research whose growth is attributed to three factors:  The Layered Approach to Network Protocol – its purpose is to create a modular
environment that reduces complexity and permits changes to one layer without
1. In 1995, national commercial telecommunications companies took control of the adversely affecting another
backbone elements of the Internet and have continued to enhance their o Open system interface (OSI) – layered set of protocols developed the data
infrastructures. Large Internet service providers (ISPs) can link into these backbones communication community through International Standards Organization
to connect their subscribers, and smaller ISPs can connect directly to the national
backbones or into one of their larger ISPs. Internet Protocols
2. Online services connect to the internet for e-mail, which enables users of different Transfer control protocol/Internet protocol (TCP/IP) – basic protocol that permits
services to communicate with each other. communication between Internet sites
3. The development of graphics-based Web browsers has made accessing the Internet a
simple task. - controls how individual packets of data are formatted, transmitted, and received
- ensures that the total number of data bytes transmitted was received
Components:
Common protocols that area used for specific tasks:
1. Packet Switching – basis for communications technologies
2. Virtual Private Networks – private network within a public network 1. File Transfer Protocols (FTP) – used to transfer text files, programs, spreadsheets,
3. Extranets – password-controlled network for private users rather than the general and databases across the internet
public  TELNET – terminal emulation protocol used in TCP/IP-based networks, that
4. World Wide Web – an Internet facility that links user sites locally and around the allows to run programs and review data from a remote terminal or computer
world 2. Mail Protocols
5. Internet Addresses – uses three types of addresses for communications:  Simple network mail protocol (SNMP) – the most popular protocol for
 E-mail addresses – the format is USER NAME@DOMAIN NAME, from which transmitting e-mail messages
there are no spaces between any of the words  Post office protocol (POP) and Internet message access protocol (IMAP) –
 Web site URL addresses – the address that defines the path to a facility or file other e-mail protocols
of the Web 3. Security Protocols
 Internet Protocol (IP) addresses of individual computers attached to a  Security sockets layer (SSL) - low-level encryption scheme used to secure
network – currently represented by a 32-bit data packet transmissions in higher-level HTTP format
- the general format is four sets of number separated by periods  Private communications technology (PCT) – a security protocol that provides
- the decomposition of the code into its component varies depending on secure transactions over the Web
the class to which it is assigned  Secure electronic transmission (SET) – an encryption scheme developed by a
consortium of technology firms and banks to ensure credit card transactions
 Privacy enhanced mail (PEM) – standard for secure e-mail on the Internet that 4. Bus Topology – most popular LAN topology and is named because the nodes are all
supports encryption, digital signatures, and digital certificates, as well as both connected to a common cable – the bus, wherein one or more servers centrally
private and public key methods control communications and file transfers between workstations
4. Network News Transfer Protocol (NNTP) – used to connect to Usenet groups on the 5. Client-Server Topology – distributes the processing between client’s computer and
Internet the central file server
5. HTTP and HTTP-NG
 HTTP – controls Web browsers that access the Web NETWORK CONTROL – majority resides with software in the host computer, but control
- when the user clicks on a link to a Web page, a connection is established resides in servers and terminals at the nodes and in the switches located throughout the
and the Web page is displayed, then the connection is broken network
 HTTP-NG – stands for Hypertext transport protocol-next generation Purpose is to perform the following tasks:
- an enhanced version of HTTP protocol that maintains the simplicity of
HTTP while adding important features such as security and authentication 1. Establish communications sessions between the sender and receiver.
6. HTML – stands for Hypertext markup language 2. Manage the flow of data across the network.
- a document format used to produce Web pages and is used to lay out 3. Detect and resolve data collisions between competing nodes.
information for display in an appealing manner 4. Detect errors in data that line failure or signal degeneration cause.

Section B: Intranet Technologies Data Collision – two or more signals transmitted simultaneously that destroy both manages

NETWORK TOPOLOGIES – the physical arrangement of the components of the network Three basic methods of controlling data collusion

Local Area Networks and Wide Area Networks 1. Polling – one site, designated the master, polls the other slave sites to determine if
they have data to transmit
 LANs – often confined to a single room in a building, or they may link several - if a slave responds in the affirmative, the master site locks the network while the
buildings within close geographic, but can cover distances of several miles and data are transmitted and the remaining sites must wait until they are polled
connect hundreds of users before they can transmit
o Nodes – components connected to LAN
 WANs – when networks exceed the geographic limitations of the LAN, and are Advantages:
often commercial networks that the organization leases because of the distances
 Polling is noncontentious, meaning, because nodes can send data only when
involved and high cost of telecommunication infrastructure
the master nodes request, two nodes can never access the network at the
Network Interface Cards (NIC) – achieves the physical connection of workstations to the LAN, same time.
which fits into one of the expansion slots in the microcomputer  An organization can set priorities for data communications across the
network
Servers – special-purpose computers that manage common resources shared by LAN modes 2. Token Passing – involves transmitting a special signal – the token – around the
Five Basic Network Topologies: network from node to node in a specific sequence
- each node on the network receives the token, regenerates it, and passes it to the
1. Star Topology – describes a network of computers with a large central computer (the next node from which only the node processing the token is allowed to transmit
host) at the hub that has direct connections to a periphery of smaller computers data
2. Hierarchical Topology – one in which a host computer is connected to several levels Advantage: its deterministic access method, which avoids data collisions
of subordinate, smaller computers in a master-slave relationship 3. Carrier Sensing – a random access technique that detects collisions when they occur
3. Ring Topology – a peer-to-peer arrangement in which all nodes are of equal status; - formally labelled carrier-sensed multiple access with collision detection
thus, responsibility for managing communications is distributed among nodes (CSMA/CD) and is used with bus topology
- the node wishing to transmit, listens to the bus to determine if it is in use, and
transmits its message if it senses no transmission
 Ethernet – best-known LAN software that uses CSMA/CD
Advantages over token ring:
1. The technology, being relatively simple, is well suited to the less costly
twisted-pair cabling.
2. The network interface cards that Ethernet uses are much less
expensive.
3. Ethernet uses a bus topology, which is easier to expand.

Section C: Malicious and Destructive Programs

VIRUS – a program that attaches itself to legitimate program to penetrate the operating
system and destroy application programs, data files, and the operating system itself. I

Files where virus programs attach:

1. An .EXE or .COM program file


2. An .OVL (overlay) program file
3. The boot sector of the disk
4. A device driver program

WORM – a software program that virtually burrows into the computer’s memory and
replicates itself into areas of idle memory

LOGIC BOMB – a destructive program that some predetermined event triggers

BACK DOOR – a software program that allows unauthorized access to a system without going
through the normal log-on procedure

TROJAN HORSE – a program whose purpose is to capture IDs and passwords from
unsuspecting users

You might also like