System Security
System Security
UNIT-I
Introduction to IT system
security
• IT system security covers everything from prevention, detection and
response to improper access from within and outside an organization,
to protect information and systems.
• As the critical importance of IT systems grows daily, so does the
volume of targeted attacks, internal fraud and other security risks
from which IT systems need to be defended.
• Elements of IT system security
Vulnerability
Threat
Risk
Exposure
Countermeasure or Safeguard
The Relation Between the Security Elements
Goals of IT System Security
• IT security generally is comprised of five main goals:
Integrity: guaranteeing that the data are those that they
are believed to be
Confidentiality: ensuring that only authorized individuals
have access to the resources being exchanged
Availability: guaranteeing the system's proper operation
Non-repudiation: guaranteeing that an operation cannot
be denied
Authentication: ensuring that only authorized individuals
have access to the resources
Elements of IT System Security
• Vulnerability
• Threat
• Risk
• Exposure
Threats to IT systems
Threats to IT systems
Threats to IT systems
Technical controls in IT system security
Technical controls in IT system security
Technical controls in IT system security
System security coverage
System security risk management
The process of risk assessment involves following activities:
– determining the assessment's scope and methodology
– collecting and analyzing data
– interpreting the risk analysis results
Chapter-3
What is Endpoint Security
• Security is top of mind for today’s CIO/CISO and endpoints are the new
target.
• Criminals are targeting employees and using their devices to gain access to
networks.
• Compromise is inevitable but a breach can be prevented. Anti-virus
solutions are important but they no longer offer complete protection to the
organization.
• The terms Endpoint Security or Endpoint Protection are generally used to
refer to corporate products that include a range of security features. These
typically include:
• Malware removal based on existing signature files and heuristic algorithms
• Built-in antispyware protection
• Ingress/Egress firewall
• IPS/IDS sensors and warning systems
• Application control and user management
Endpoint Security
• Endpoint security products may contain features and
functionality such as:
• Data loss prevention
• Insider threat protection
• Disk, endpoint, and email encryption
• Application whitelisting or control
• Network access control
• Data classification
• Endpoint detection and response
• Privileged user control
Critical Components of Endpoint Security
• Endpoint encryption fully encrypts your enterprise data on
endpoints, including laptops, mobile devices, and other
endpoints, as well as in individual folders, files, and removable
storage devices like CDs and USB drives.
• Application control prevents the execution of unauthorized
applications on endpoints, a core component of comprehensive
endpoint security measures.
• Application control solves the challenge of employees
downloading unauthorized or dangerous applications on
mobile devices, which could create network vulnerabilities and
lead to unauthorized access.
Endpoint security perspectives: Consumer
versus corporate
there is no central administration:
• Signature and application updates are received from the
developer's control servers via the Internet.
• Endpoint security apps are configured on each computer.
• Alert and log entries are only available on the affected computer.
Centralized administration allows:
• Single sign-on web interface for configuring endpoints.
• All log entries and alerts to be sent to one location, the controlling
server.
• Downloading of signature and application updates once, then the
server application pushes the files out to all endpoints.
Pillars of Endpoint Security
• Four Pillars of Endpoint Security include:
• Endpoint hardening - protect the endpoint from attack
• Endpoint resiliency - make the endpoint auto-healing
• Network prioritization - guard network bandwidth
• Network resiliency - make the network auto-healing
There are four tenets of security: identity, authentication, access control, and
authorization.
• Identity - how principals, such as users, are represented.
• Authentication - how identity is established. For example, a user in
possession of a smartcard provisioned with a trusted X.509 certificate,
plus knowledge of the smartcard PIN, will use the card to authenticate,
thereby establishing his or her identity within the system.
• Access control - the ability of the system to selectively allow or deny
principals to perform actions on protected objects. Access control
enforces authorization rules.
• Authorization - the process by which access control rules are expressed.
• Endpoint Hardening: The goal of the first pillar - endpoint
hardening - is to ensure that network assets are using the latest
technologies to defend against threats. Typical threats include
unsafe email attachments, worm-like viruses that propagate over
the network, and related threats to your web browsers.
• Objective: Reduce the attack surface and minimize
vulnerabilities on individual devices.
The following technologies can aid in endpoint hardening:
• Antivirus and anti-malware software
• Mandatory integrity levels: Least Privilege Principle
• Auditing of network resource access: Helps detecting and
responding to unauthorized access
Endpoint Resiliency
• The goal of endpoint resiliency is to ensure that health information on devices
and applications is continuously gathered and monitored. That way failed
devices or applications can be automatically repaired, thus allowing operations to
continue.
• Objective: Ensure that endpoints can resist, recover from, and adapt to security
incidents effectively.
The following technologies can make endpoints more resilient:
• Network access control (NAC): NAC enhances endpoint resilience by
preventing unauthorized or compromised devices from accessing the
network, reducing the risk of attacks and limiting the potential impact of security
incidents
• Configuration baselining: Configuration baselining enhances endpoint
resilience by maintaining a consistent and secure configuration, reducing the
attack surface and vulnerabilities.
• Patching: Patching contributes to endpoint resilience by proactively addressing
vulnerabilities and reducing the likelihood of successful attacks.
• Antivirus and anti-malware software: Detect and mitigate threats
• Centralized policy and confirmation management: Ensuring uniform security
Network Prioritization
• The goal of network prioritization is to ensure that the available
infrastructure can always meet application bandwidth needs.
This consideration applies not only at well-known peak demand
times, but also when there are unexpected surges on network loads
and distributed external and internal attacks.
• Objective: Optimize network resources, enhance performance, and
prioritize critical activities.
Network Resiliency
• The goal of network resiliency is to allow for seamless asset
failover. Techniques in this area ideally afford reconfiguring the
network in real-time as performance degrades.
• This pillar is similar to endpoint resiliency in that the goal is to
facilitate network self-healing in order to minimize the
management burden.
• Objective: Ensure the network can resist disruptions, adapt to
changes, and maintain continuous operation.
Endpoint Security in BYOD
• Four Pillars of Endpoint Security in Bring your own device (BYOD)
• Endpoint hardening - Technologies like platform attestation allow server-
side resources to extract high-assurance security claims from mobile
devices.
• This helps to keep sensitive data off malware and rootkit infested devices
and can also be used to enforce client attributes, such as the use of
hardware-based disk encryption.
• The latest generation of mobile devices supports a variety of high-
integrity security features, including TPMs (Trusted Platform Module, a
secure cryptoprocessor), SIMs (Subscriber Identity Modules, a smart
cards that store cryptographic identifiable information of subscribers ),
and other hardened cryptographic and data protection features.
• Endpoint reliability -Enforcing patching and platform updates is key to
maintaining endpoint reliability; technologies exist to do this across all
platforms.
Endpoint Security in BYOD
• Network prioritization
• link encryption is a must-have.
• All web applications should enforce Transport Layer Security (TLS);
all clients support it.
• Bandwidth waste is on unencrypted or untrusted requests is avoided.
• Network Resiliency –
• Implementing advanced threat protection measures to detect and
mitigate security threats arising from various devices.
• Segmenting the network to isolate BYOD devices from critical
infrastructure, reducing the potential impact of a security incident.
Endpoint Encryption
Defining endpoint encryption and its difference modes
Disk Encryption: Endpoint encryption (which typically includes disk
encryption and removable media encryption) protects this data,
rendering it unreadable to unauthorized users. Endpoint encryption
describes the differences between disk encryption and file
encryption, details how disk encryption and removable media
encryption work, and addresses recovery mechanisms.
– Removable Media Encryption: Removable media encryption
software provides the ability to encrypt files on removable storage
devices. When a user copies files of a system onto a removable
storage device, each file is encrypted to a password, a shared key or
a certificate. At the same time, utilities for Windows or Mac systems
can be copied (if permitted by policy) allowing authorized access to
data without the endpoint client installed on a machine.
Driver influence endpoint security
• Explaining the business drivers that influence the
endpoint security
Correct and reliable operation
Service-level agreements
IT asset value
Protection of the business asset value or brand image
Legal and regulatory compliance
Contractual obligation
Financial loss and liability
Critical infrastructure
Safety and survival
Driver influence endpoint security
• Explaining the IT drivers that influence the endpoint security
– Internal threats and threat agents
– External threats and threat agents
– IT service management commitments
– IT environment complexity
– Business environment complexity
– Audit and traceability
– IT vulnerabilities: Configuration
– IT vulnerabilities: Flaws
– IT vulnerabilities: Exploits
– End User Complexity
– Fast-Growing Web Threats
– VPN Security Challenges
Challenges of Endpoint Security
– Complacency and Risk: Complacency among users and
organizations regarding security practices can lead to increased
risk. Users may neglect security protocols, such as updating
software or avoiding risky behavior, assuming that security
measures are foolproof.
• IT management bandwidth: IT teams are often overwhelmed by
the sheer volume of endpoints they need to manage
• More flexible and mobile workforce: Endpoints can connect from
various locations and networks, making it challenging to enforce
consistent security measures.
• Lack of integration: Security solutions may not be fully integrated
across the organization's IT infrastructure.
• Fast moving security threats: Cyber threats evolve rapidly, with
attackers constantly developing new techniques and exploiting
vulnerabilities.
Challenges of Endpoint Security
– Business Challenges: The business challenges of endpoint security reflect
the difficulties organizations face in adequately securing their endpoints
due to various constraints.
• Lack of IT resources: May lack the necessary IT resources, including
personnel, budget, and infrastructure, to implement and maintain robust
endpoint security measures.
• No in-house expertise: May not have dedicated cybersecurity experts or
professionals with specialized knowledge in endpoint security on their
staff.
• Ad-hoc PC management: Ad-hoc PC management refers to an approach
where the management and maintenance of personal computers (PCs)
are carried out in an unplanned, reactive, and often inconsistent manner.
• Focus on more important tasks: Endpoint security may not be prioritized
adequately due to competing demands for other tasks.
• – The Threats Keep Coming
Endpoint Security Solutions
General aspects covered by an Endpoint Solution
Personal Firewall: Monitors and controls incoming and outgoing network traffic on the
endpoint device.
Wireless Security: Guards against unauthorized access to Wi-Fi networks and protects
data transmitted over wireless connections.
Port Control: Prevents unauthorized devices or data transfers through specific ports.
Data Encryption: Protects sensitive information from being intercepted or accessed by
unauthorized individuals.
USB and Storage Device Security: Controls and monitors the use of USB and other storage
devices.
Application Control: Prevents the execution of malicious or unauthorized applications,
enhancing overall system security.
Integrity and Remediation: Detects and addresses unauthorized changes to system files or
settings, ensuring the system's integrity.
Client Self-Defense: Enhances the resilience of the endpoint security solution against
tampering or disabling attempts.
Alerts Monitoring: Monitors security events and issues alerts in response to potential
threats.
Endpoint Security Solutions
Gartner’s Magic Quadrant
Endpoint protection platforms capabilities & things include in EPP
Antimalware
Personal firewall
Port and device control
EPP solutions also often include:
• Vulnerability assessment
• Application control and application sandboxing
• Memory protection
• Behavioral monitoring of application code
• Endpoint detection and remediation technology
• Full-disk and file encryption, also known as mobile data protection
• Endpoint data loss prevention (DLP)
• Enterprise mobility management (EMM), typically in a parallel non -
integrated product
Quadrant Descriptions
Explaining the quadrant descriptions
Leaders: Leaders demonstrate balanced progress and effort in all
execution and vision categories.
• Challengers: Challengers are good at competing on basic functions,
rather than on advanced features.
• Visionaries: Visionaries can affect the course of technological
developments in the market, but they haven't yet demonstrated
execution.
• Niche Players: Niche Players have not demonstrated sufficient
focus on the core needs of buyers, despite long tenures in this
market.
Evaluation Criteria Definitions
Ability to Execute
Product/Service, Overall Viability, Sales Execution/Pricing
Market Responsiveness/Record
Marketing Execution
Customer Experience
Operations
Completeness of Vision Market Understanding
Marketing Strategy
Sales Strategy
Offering (Product) Strategy
Business Model
Innovation
Vendor Strengths and Limitations
• Bitdefender: Bitdefender still generates the majority of its revenue from
consumer sales, but the gap between consumer sales and enterprise sales
narrowed in 2015.
• The company is investing heavily into its sales operations in Europe and the
U.S. Updates to the enterprise offering included improvements in security
event feeds from endpoints to the management console, formulating better
insights into the presence of malware, unwanted applications, advanced
threats and remediation.
Strengths
• Bitdefender provides very good malware detection capabilities, including a
sandboxed application emulation environment, automatic unknown file
analysis and continuous behavior monitoring, resulting in very good public
test scores.
Limitations
Bitdefender does not offer full feature parity between Windows, OS X and
Linux. The Windows offering supports anti-malware, firewall, content control
and device control. OS X and Linux have only anti-malware capabilities.
Vendor Strengths and Limitations
Check Point Software Technologies
• Check Point Software Technologies is a well-known network
security company. Its venture into the EPP market, starting with
the 2004 acquisition of ZoneAlarm, continues to suffer from poor
marketing and channel execution.
Strengths
• Endpoint's URL filtering capability enables an off-LAN URL
filtering security policy synchronized with a firewall blade policy.
Limitations
• Check Point's application control capabilities (which it calls
"program control") remain largely unchanged for this year.
Application control capabilities continue to rely on URL filtering,
anti-bot and anti-malware for restricting unapproved and
suspicious applications.
Application Server Security
Chapter-4
Application Server Security Overview
Application Server Security Overview
7-73
Need of Security
• Application Server Threats and Countermeasures
– Network Eavesdropping:
– Unauthorized Access
– Viruses, Worms, and Trojan Horses
Introduction to Oracle Application Server
Introduction to Oracle Application Server and security objectives
Providing Basic Security Services
Supporting Standards
Ensuring Deployment and Configuration Flexibility
Minimizing Application Development and Deployment Cost
Providing Security in Depth
Security architecture of oracle
application server
Oracle Application Server Security Best
Practices
Best practices for HTTPS Use
Best Practices for Cookie Security
Best Practices for Certificates Use
Review Code and Content Against Already Known Attack
Follow Common Sense Firewall Practices
Leverage Declarative Security
Use Switched Connections in DMZ
Place Application Server in the DMZ
Secure Sockets Layer
Web Application Server Security best
practices
– Use separate servers for internal and external applications
– Use Separate Development Server for Testing and Debugging Apps
– Audit Website activity and store logs in a secure location
– Education of developers on sound security coding practices
– Patching Operating System and Web Server
– Use of Application Scanners
Introduction to OWASP
The Open Worldwide Application Security Project (OWASP) is a
nonprofit foundation dedicated to improving software security. It
operates under an “open community” model, which means that
anyone can participate in and contribute to OWASP-related
online chats, projects, and more.
Top 10 OWASP
Insecure Data Storage: Leading to unauthorized access or data compromise.
Weak Server-Side Controls: May allow unauthorized access and manipulation of sensitive data.
Insufficient Transport Layer Protection: May expose information to interception and
manipulation.
Client-Side Injection: May enable attacks like Cross-Site Scripting (XSS) and compromising user
data.
Poor Authorization and Authentication: May potentially lead to unauthorized access and data
breaches.
Improper Session Handling: May potentially allow unauthorized users to gain access to sensitive
information.
Security Decisions via Untrusted Inputs: May lead to security decisions based on unreliable or
manipulated data.
Side Channel Data Leakage: Data Is Obtained from Web caches, Keystroke logging, Screenshots,
Logs, Temp directories
Broken Cryptography: May risk confidentiality and integrity of sensitive data.
Sensitive Information Disclosure: May potentially expose critical data to unauthorized
individuals or entities.
Mobile Application Security Testing
Dynamic Analysis: Involves testing an application while it's running
to assess its behavior, performance, and security.
Black Box Security Testing: Evaluates the security of an application
without knowledge of its internal code or structure. The tester
feeds the application with inputs and observes the response.
Static Analysis & Code Review: Examines the source code and its
structure without executing the program. With static analysis, the
business logic and the security of the application are covered.
Identifying and protecting
Every piece of data is sensitive. Data cannot be classified as sensitive and non-
sensitive. Users enter data into an application under the assumption that security
will not be compromised. Considering the importance users give to data,
applications should be designed to treat every little piece of user data as sensitive.
Chapter-5
Introduction to Database Server Security
•
Acquiring Database and Server Security
Chapter-6
Identification of risk
Organizational Assets Used in Systems
Threat Identification
Prioritizing System Vulnerabilities
Prepare for Selecting Security Controls
Initial Security Control Baseline
Apply Scoping Guidance
Apply Scoping Guidance
The application of appropriate scoping guidance to the initial
baseline
• – Apply Security Objective-related Considerations
• – Apply Common Control-related Considerations
• – System Component Allocation-related Considerations
• – Apply Scalability-related Considerations
• – Document the Decisions in the Security Plan
Analyzing System Environment
A brief description of the technical system is provided which
includes any environmental or technical factors that raise special
security concerns, such as:
The system is connected to the Internet;
It is located in a harsh or overseas environment;
Software is rapidly implemented;
The software resides on an open network used by the general
public or with overseas access;
The application is processed at a facility outside of the
organization's control; or
The general support mainframe has dial-up lines.
Planning for security in the system
lifecycle
Few basic phases of IT system lifecycle
Initiation Phase
Development/Acquisition Phase
Implementation Phase
Operation/Maintenance Phase
Applying Operational Controls
• Personnel Security
• Physical and Environmental Protection