19
INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A (Each question carries 2 mark, Answer any FIVE (5) questions. Q.No 8 - Compulsory) 1. Define Information Security. To protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training and awareness, and technology and Protecting the organization’s information. 2. Sketch the NSTISSC Security model National Security Telecommunications and Information Systems Security Committee (NSTISSC). NSTISSC is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. 3. What is threat? Threat is an object, person, or other entity that represents a constant danger to an asset. Management must be informed of the different threats facing the organization. Protects information through policy, education, training, and technology controls. 4. What are the types of virus? Common they are two types of Viruses are: Macro virus: It embedded in automatically executing macro code used by word processors, spread sheets, and database applications. Boot virus: It infects the key operating system files located in a computer’s boot sector. 5. What are fire suppression systems? Fire suppression systems are devices installed and maintained to detect and respond to a fire. They work to deny an environment of one of the three requirements for a fire to burn: heat, fuel, and oxygen. 6. What is firewall? A firewall is any device that prevents a specific type of information from moving between the outside network, known as the un trusted network, and the inside network, known as the trusted network. Is a network security system , either hardware or software to control incoming and outgoing network traffic. 7. Define Cryptography? Cryptography, which comes from the Greek words kryptos, meaning hidden, and graphein, meaning to write. The process of making and using codes to secure the transmission of information. 1

INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502

PART-A (Each question carries 2 mark, Answer any FIVE (5) questions. Q.No 8 - Compulsory)

1. Define Information Security.

To protect the confidentiality, integrity and availability of information assets, whether in storage,

processing, or transmission. It is achieved via the application of policy, education, training and awareness,

and technology and Protecting the organization’s information.

2. Sketch the NSTISSC Security model

National Security Telecommunications and Information Systems Security Committee (NSTISSC).

NSTISSC is the protection of information and its critical elements, including the systems and hardware

that use, store, and transmit that information.

3. What is threat?

• Threat is an object, person, or other entity that represents a constant danger to an asset.

• Management must be informed of the different threats facing the organization.

• Protects information through policy, education, training, and technology controls.

4. What are the types of virus?

• Common they are two types of Viruses are:

➢ Macro virus: It embedded in automatically executing macro code used by word processors, spread sheets, and database applications.

➢ Boot virus: It infects the key operating system files located in a computer’s boot sector.

5. What are fire suppression systems?

Fire suppression systems are devices installed and maintained to detect and respond to a fire. They

work to deny an environment of one of the three requirements for a fire to burn: heat, fuel, and oxygen.

6. What is firewall?

A firewall is any device that prevents a specific type of information from moving between the outside

network, known as the un trusted network, and the inside network, known as the trusted network. Is a

network security system , either hardware or software to control incoming and outgoing network traffic.

7. Define Cryptography? Cryptography, which comes from the Greek words kryptos, meaning hidden, and graphein, meaning to

write. The process of making and using codes to secure the transmission of information.

1

Page 2: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

8. List out the components of risk management.

Risk management is the process of identifying risk, as represented by vulnerabilities, to an

organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable

level. Risk management involves three major undertakings:

• Risk Identification

• Risk Assessment

• Risk Control.

PART – B

(Each question carries 3 mark Answer any FIVE (5) questions. Q.No 16 -

Compulsory) 9. Draw SDLC waterfall methodology diagram.

10. List out the components of an information system.

It consists set of following components:

➢ Software

➢ Hardware

➢ Data

➢ People

➢ Procedures

➢ Networks

11. What are mechanical locks?

The mechanical lock are mechanical devices which secure an opening by keeping a door

closed until a release mechanism is activated; usually a lever, knob, key, or thumb turn. There

are several types of mechanical locks, but they all provide the same basic function - to secure

a door. It relies on a key of carefully shaped pieces of metal that turn tumblers to release

secured loops of steel, aluminum, or brass (in brass padlocks).

2

Page 3: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

12. List out the risk control strategies.

Once ranked vulnerability risk worksheet complete, must choose one of five strategies to control each risk:

a) Defend [Apply safeguards)

b) Transfer [Transfer the risk)

c) Mitigate [Reduce impact)

d) Acceptance [Understand consequences and accept risk)

e) Terminate [Avoid activities that are too risky)

13. Define cost benefit analysis

It determines whether or not a particular control is worth its cost. CBAs may be calculated before a

control or safeguard is implemented to determine if the control is worth implementing. Once value of

assets is estimated, potential loss from exploitation of vulnerability is studied

14. Sketch the TCP packet structure.

15. List out the types of cipher methods.

a. Bit stream method b. Block cipher method.

• Substitution ciphers

• Transposition ciphers

• XOR function

• Vernam cipher

• Book or Running key ciphers

• Hash Functions

3

Page 4: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

16. Write a note on Worm.

Worm is a malicious program that replicates itself constantly, without requiring another program

environment. Worms can continue replicating themselves until they completely fill available

resources, such as memory, hard drive space, and network bandwidth.

Part-C 17 a) Explain in detail about security system development life cycle - [Define-1.list-1,diagram-

2,explanation-6]

Information security must be managed similar to any other major system implemented in an

organization.

• One approach for implementing an information security system in an organization with a little

security in place to use variation of SDLC.

Methodology and Phases:

• Methodology - The SDLC is a methodology for the design and implementation of an information

system in an organization.

• Phases – The traditional SDLC consists of six phases.

• The SDLC the phases (steps) range from 3 to 12.

• Each phase must be completed before the next phase can begin.

• Information and documentation is carried from one phase to another, which is known as the

Waterfall Model.

Feasibility

Analysis

Design

Implementation

Testing

Maintenance

How is the SDLC initiated?

• It is plan-driven (planned ahead of time) or event-driven. The event-driven may be caused by:

➢ Some occurrence in the business or community

➢ Inside the organization

➢ Within ranks of employees, customers, or stakeholders

4

Page 5: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

Investigation

• This phase begins with a directive from upper management, dictating the process, outcomes, and

goals of the project, as well as its budget and other constraints.

• Teams of responsible managers, employees, and contractors are organized.

• Problems are analyzed.

• Scope of the project, as well as specific goals and objectives, and any additional constraints not

covered in the program policy, are defined.

• Finally, an organizational feasibility analysis is performed to determine whether the organization

has the resources and commitment necessary to conduct a successful security analysis and design. Analysis

• In this phase, the documents from the investigation phase are studied.

• The risk management task also begins in this phase.

• Risk management is the process of identifying, assessing, and evaluating the levels of risk facing

the organization.

• Specifically the threats to the organization’s security and to the information stored and processed

by the organization. Logical design

• This phase creates and develops the blueprints for information security, and examines and

implements key policies.

• The team plans the incident response actions.

• Plans business response to disaster.

• Determines feasibility of continuing and outsourcing the project.

Physical design

• In this phase, the information security technology needed to support the blueprint outlined in the

logical design is evaluated.

• Alternative solutions are generated.

• Designs for physical security measures to support the proposed technological solutions are

created.

• At the end of this phase, a feasibility study should determine the readiness of the organization for

the proposed project.

5

Page 6: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

• At this phase, all parties involved have a chance to approve the project before implementation

begins. Implementation

• Similar to traditional SDLC

• The security solutions are acquired ( made or bought ), tested, implemented, and tested again

• Personnel issues are evaluated and specific training and education programs are conducted.

• Finally, the entire tested package is presented to upper management for final approval.

Maintenance and change

Information security system needs constant monitoring, testing, modification, updating, and

repairing to meet changing threats have been done in this phase.

(OR) b) Explain components of information system in detail. [10]

[List-2,Explanation-8]

COMPONENTS OF AN INFORMATION SYSTEM:-

• An Information system is much more than computer hardware.

• It consists set of following components

➢ Software

➢ Hardware

➢ Data

➢ People

➢ Procedures

➢ Networks

• These six critical components enable information to be input, processed, output and stored.

• Each of these components has its own strengths & weakness and its own characteristics.

• Each components of IS has its own security requirements.

6

Page 7: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

Software

• The software components of IS comprises of applications, operating systems, and assorted

command utilities.

• Software is the most difficult IS component to secure.

• The exploitation of errors in software programming accounts for a substantial portions of attack

on information.

Hardware

• Hardware is the physical technology that houses and executes the software, stores and carries the

data.

• Physical security policies deal with hardware as a physical asset and with the protection of these

physical assets from harm or theft.

• Applying the traditional tools of physical security, such as locks and keys, restricts access to and

interaction with the hardware components of an information system.

• Securing the physical location of computers and the computers themselves is important because a

break of physical security can result in a loss of information.

Data

• Data stored, processed, and transmitted through a computer system must be protected.

• Data is often the most valuable asset possessed by an organization and is the main target of

intentional attacks.

• The raw, unorganized, discrete (separate, isolated) potentially-useful facts and figures that are

later processed(manipulated) to produce information. People

• People have always been threatened to Information Security.

• People are the weakest link in an organization of Information Security.

• There are many roles for people in information systems. Common ones include

- Systems Analyst - Engineer

- Programmer - Network Manager

- Technician - MIS ( Manager of Information Systems )

- Engineer - Data entry operator

• Unless policy, education & training, awareness & technology are properly employed to prevent

people from intentionally or un intentiollaly damage or losing information. Procedures

• A procedure is a series of documented actions taken to achieve something.

• A procedure is more than a single simple task.

• Procedures – Written (documentation) instructions used to accomplish a task.

• If an unauthorized person acquires procedures, that can be a security breach.

7

Page 8: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

• Most organizations distribute procedures to their legitimate employees so they can access the

information system, but many of these companies often fail to provide proper education on the

protection of the procedures.

• Educating employees about safeguarding procedures is as important as physically securing the

information system. Networks

• The need for increased computer and information security is networking.

• When information systems are connected to each other to form Local Area Network (LANs),.

• These LANs are connected to other networks such as the Internet, new security challenges rapidly

emerge.

• Steps to provide network security are essential, as is the implementation of alarm and intrusion

systems to make system owners aware of ongoing compromises.

18) a) Explain any three categories of threats. -

[Any three]-[list-1,explanation-3+3+3 (any three)]

THREATS:

▪ Threat is an object, person, or other entity that represents a constant danger to an asset.

Management must be informed of the different threats facing the organization. ▪ By examining each threat category, management effectively protects information through policy,

education, training, and technology controls. Categories of Threat:

1. Compromises to Intellectual Property

2. Deliberate Software attacks

3. Deviations in Quality of Service

4. Espionage or trespass

5. Forces of nature

6. Human Error or Failure

7. Theft

8. Technical Hardware failures or errors

9. Technical Software failures or errors

10. Sabotage or Vandalism

a. Compromises to Intellectual Property:

▪ Intellectual property is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas.

▪ Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source.

▪ Intellectual property can be trade secrets, copyrights, trademarks, and patents.

▪ Eg: If the user copies the program to another computer without securing another license or transferring the license, he or she has violated the copyright.

b. Deliberate Software attacks:

8

Page 9: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

▪ Deliberate software attacks occur when an individual or group designs and deploys software to attack a system.

▪ Most of this software is referred to as malicious code or malicious software, or malware.

▪ These software components or programs are designed to damage, destroy, or deny service to the target systems.

▪ Some of the more common instances of malicious code are viruses and worms, Trojan horses,

logic bombs, and back doors.

(i) Virus: ▪ A computer virus consists of segments of code that perform malicious actions.

▪ The code attaches itself to an existing program and takes control of that program

▪ the most common methods of virus transmission is via e-mail attachment files

▪ Common types of Information System Viruses are

➢ Macro virus: It embedded in automatically executing macro code used by word processors, spread sheets, and database applications.

➢ Boot virus: It infects the key operating system files located in a computer’s boot sector.

(ii) Worm: ▪ Worm is a malicious program that replicates itself constantly, without requiring another program

environment.

(iii) Trojan Horses:

▪ Trojan horses are software programs that hide their true nature and reveal their designed behavior only when activated.

▪ Trojan horses are frequently disguised as helpful, interesting, or necessary pieces of software, such as readme.exe files.

(iv) Back door or Trap door:

▪ A virus or worm can have a payload that installs a back door or trap door component in a system, which allows the attacker to access the system

(v) Polymorphic Threats:

▪ A polymorphic threat is one that over time changes the way it appears to antivirus software programs.

c. Deviations in Quality of Service:

▪ An organization’s information system depends on the many interdependent support systems, including power grids, telecom networks, parts suppliers, service vendors, etc...

▪ Any one of these support systems can be interrupted by storms, employee illnesses, or other unforeseen events.

▪ Irregularities in Internet service, communications, and power supplies can dramatically affect the

availability of information and systems.

(i) Internet Service Issues: ▪ Internet service provider failures can considerably undermine the availability of information.

▪ Outsourced Web hosting provider, that provider assumes responsibility for all Internet services as

well as for the hardware and web site operating system software.

(ii) Communications & other service provider Issues: ▪ Other utility services can affect organizations as well.

9

Page 10: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

▪ Among these are telephone, water, wastewater, trash pickup, cable television, natural or propane gas, and custodial services.

▪ The loss of these services can impair the ability of an organization to function.

(iii) Power Irregularities:

▪ Irregularities from power utilities are common and can lead to fluctuations such as power

excesses, power shortages, and power losses.

d. Espionage or trespass : ▪ Human activities that can break the confidentiality of information.

▪ When an unauthorized individual gains access to the protected information of an organization.

▪ Attackers can use many different methods to access the information stored in an information system.

▪ Information gathering techniques - Competitive intelligence (legal)

- Industrial espionage (illegal) ▪ Shoulder Surfing: Anywhere a person access confidential information.

▪ Hackers: People who use and create computer software to gain access to information illegally.

e. Forces of nature: ▪ It is the most dangerous threat.

▪ Disrupt not only individual live, but also storage, Transmission & use of information.

▪ Common threats are listed,

(i) Fire (v) Landslide / Mudslide

(ii) Flood (vi) Tornado / windstorm

(iii) Earthquake (vii) Hurricane / typhoon

(iv) Lightning (viii) Tsunami and etc. f. Human Error or Failure:

▪ Includes acts performed without malicious intent.

▪ Causes include:

o Inexperience

o Improper training

o Incorrect assumptions

▪ Employees are among the greatest threats to an organization’s data.

▪ Employee mistakes can easily lead to:

o Revelation of classified data o Entry of erroneous data

o Accidental data deletion or modification

o Data storage in unprotected areas

o Failure to protect information ▪ Many of these threats can be prevented with controls.

g. Theft: ▪ Illegal taking of another’s physical, electronic, or intellectual property.

▪ Physical theft is controlled relatively easily.

▪ Electronic theft is more complex problem; evidence of crime not readily apparent.

h. Technical Hardware failures or errors:

10

Page 11: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

▪ Technical hardware failures or errors occur when a manufacturer distributes equipment containing a known or unknown flaw.

▪ These defects can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability.

i. Deliberate Act of Sabotage or Vandalism: ▪ It act aimed to destroy an information asset and, ultimately, damage the image of an organization

▪ Example:

➢ Hackers accessing a system and damaging/destroying critical data.

➢ Hackers mounting a false Web-page so as to erode consumer confidence and

organization’s reputation.

(OR)

b) Explain the codes of ethics and professional organization in detail [10] - [List 2, Explanation 8] ▪ Several professional organizations have established codes of conduct/ethics

▪ Codes of ethics can have positive effect; unfortunately, many employers do not encourage joining of these professional organizations

▪ Responsibility of security professionals to act ethically and according to policies of employer,

professional organization, and laws of society

Major Professional Organizations for IT: Association of Computing Machinery (ACM)

▪ ACM established in 1947 as “the world's first educational and scientific computing society”

▪ Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others’ privacy, and respecting others’ intellectual property

International Information Systems Security Certification Consortium, Inc. (ISC)2

▪ Non-profit organization focusing on development and implementation of information security certifications and credentials

▪ Code primarily designed for information security professionals who have certification from (ISC)2

▪ Code of ethics focuses on four mandatory canons

System Administration, Networking, and Security Institute (SANS)

▪ Professional organization with a large membership dedicated to protection of information and systems

▪ SANS offers set of certifications called Global Information Assurance Certification (GIAC)

Information Systems Audit and Control Association (ISACA) ▪ Professional association with focus on auditing, control, and security

▪ Concentrates on providing IT control practices and standards

▪ ISACA has code of ethics for its professionals

Computer Security Institute (CSI)

▪ Provides information and training to support computer, networking, and information security professionals

▪ Though without a code of ethics, has argued for adoption of ethical behavior among information security professionals

11

Page 12: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

Information Systems Security Association (ISSA)

▪ Nonprofit society of information security (IS) professionals

▪ Primary mission to bring together qualified IS practitioners for information exchange and educational development

▪ Promotes code of ethics similar to (ISC)2, ISACA and ACM

Other Security Organizations

▪ Internet Society (ISOC): promotes development and implementation of education, standards, policy and education to promote the Internet

▪ Computer Security Division (CSD): division of National Institute for Standards and Technology (NIST); promotes industry best practices and is important reference for information security professionals

▪ CERT Coordination Center (CERT/CC): center of Internet security expertise operated by Carnegie Mellon University

▪ Computer Professionals for Social Responsibility (CPSR): public organization for anyone concerned with impact of computer technology on society

19) a) Explain in detail about risk control strategies. [Explanation-8,List-2]

➢ Once ranked vulnerability risk worksheet complete, must choose one of five strategies to control each risk:

f) Defend [Apply safeguards)

g) Transfer [Transfer the risk)

h) Mitigate [Reduce impact)

i) Acceptance [Understand consequences and accept risk)

j) Terminate [Avoid activities that are too risky) 1. Defend:

➢ Attempts to prevent exploitation of the vulnerability

➢ Preferred approach; accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards

➢ Three common methods of risk avoidance:

❖ Application of policy

❖ Training and education

❖ Applying technology

2. Transfer: ➢ Control approach that attempts to shift risk to other assets, processes, or organizations.

➢ If lacking, organization should hire individuals/firms that provide security management and administration expertise.

➢ Organization may then transfer risk associated with management of complex systems to another organization experienced in dealing with those risks.

3. Mitigate:

➢ Attempts to reduce impact of vulnerability exploitation through planning and preparation

12

Page 13: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

➢ Approach includes three types of plans:

❖ Incident response plan (IRP)

❖ Disaster recovery plan (DRP)

❖ Business continuity plan (BCP)

4. Acceptance: ➢ Doing nothing to protect vulnerability and accepting the outcome of its exploitation.

➢ Valid only when the particular function, service, information, or asset does not justify cost of protection.

➢ Risk appetite describes the degree to which organization is willing to accept risk as trade-off to the expense of applying controls.

5. Terminate:

➢ Directs the organization to avoid those business activities that introduce uncontrollable risks.

➢ May seek an alternate mechanism to meet customer needs.

(OR) b ) Explain in details about risk identification with neat sketch. [flow chart- 2,Explanation-8]

• A risk management strategy requires that information security professionals know their

organizations information assets-that is, identify, classify, and prioritize them.

• Once the organizational assets have been identified, a threat assessment process identifies and

quantifies the risks facing each asset.

• When vulnerabilities are found, controls are identified and limit possible losses in the eventuality

of attack.

• The components of risk identification are shown in Figure.

Asset Identification:

This iterative process begins with the identification of assets, including all of the elements of an

organization’s system:

1. People

13

Page 14: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

2. Procedures

3. Data and Information

4. Software

5. Hardware

6. Networking elements.

People, Procedures, and Data Asset Identification:

Identifying human resources, documentation, and data assets is more difficult than identifying

hardware and software assets. People with knowledge, experience, and judgment should be assigned the

task. As the people, procedures, and data assets are identified, they should be recorded using a reliable

data-handling process.

❖ Asset attributes for people: Position name/number/ID (avoid names and stick to identifying positions, roles, or functions); supervisor; security clearance level; special skills.

❖ Asset attributes for procedures: Description; intended purpose; relationship to software, hardware, and networking elements; storage location for reference; storage location for update.

❖ Asset attributes for data: Classification; owner, creator, and manager; size

of data structure; data structure used (sequential or relational); online or offline; location; backup

procedures employed Hardware, Software, and Network Asset Identification:

Automated tools can sometimes uncover the system elements that make up the hardware,

software, and network components.

Once created and stored, the inventory listing must be kept current, often through a tool that periodically refreshes the data. Asset attributes to be considered are:

1. Name

2. IP address

3. MAC address

4. Element type

5. Serial number

6. Manufacturer name

❖ Name: Use the most common device or program name.

❖ IP address : This can be a useful identifier for network devices and servers.

❖ Media access control (MAC) address: MAC addresses are sometimes called electronic serial numbers or hardware addresses. As part of the TCP/IP standard, all network interface hardware

devices have a unique number. The MAC address number is used by the network operating system to identify a specific network device.

❖ Element type: For hardware, you can develop a list of element types, such as servers, desktops, networking devices, or test equipment, to whatever degree of detail you require.

❖ Serial number: For hardware devices, the serial number can uniquely identify a specific device.

❖ Physical location: Note where this element is located physically.

❖ Logical location: Note where this element can be found on the organization’s network..

14

Page 15: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

20) a )Explain VPN in detail - [Diagram-2, Type-1,Explanation-7]

▪ A VPN is a private and secure network connection between systems that uses the data communication capability of an unsecured and public network.

▪ Virtual private network technology can be used to enable remote offices and users to connect to private networks securely over public networks.

Types of VPN technologies:

▪ Trusted VPN - uses leased circuits from a service provider and conducts packet switching over these leased circuits.

▪ Secure VPN - use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet.

▪ Hybrid VPN - combines the two, providing encrypted transmissions (as in secure VPN) over some or all of a trusted VPN network.

VPN must accomplish:

o Encapsulation of incoming and outgoing data

o Encryption of incoming and outgoing data

o Authentication of remote computer and (perhaps) remote user as well Transport mode

In transport mode, the data within an IP packet is encrypted, but the header information

is not.

This allows the user to establish a secure link directly with the remote host, encrypting only the

data contents of the packet. There are two popular uses for transport mode VPNs.

1. The end-to-end transport of encrypted data.

2. A remote access worker or teleworker 1. The end-to-end transport of encrypted data.

In this model, two end users can communicate directly, encrypting and decrypting their

communications as needed. Each machine acts as the end node VPN server and client. 2. A remote access worker or teleworker

15

Page 16: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

• It connects to an office network over the Internet by connecting to a VPN server on the perimeter.

• The VPN server in this example acts as an intermediate node, encrypting traffic from the secure

intranet and transmitting it to the remote client, and decrypting traffic from the remote client and

transmitting it to its final destination.

• This model frequently allows the remote system to act as its own VPN server, which is a

weakness, since most work-at-home employees do not have the same level of physical and logical

security they would have if they worked in the office. Tunnel mode

• In tunnel mode, the organization establishes two perimeter tunnel servers.

• These servers serve as the encryption points, encrypting all traffic that will traverse an unsecured

network.

• In tunnel mode, the entire client packet is encrypted and added as the data portion of a packet

addressed from one tunneling server and to another.

• The receiving server decrypts the packet and sends it to the final address.

• The primary benefit to this model is that an intercepted packet reveals nothing about the true

destination system.

• Example of tunnel mode VPN: Microsoft’s Internet Security and Acceleration (ISA) Server

(OR)

b ) Describe any two type of intrusion detection and prevention systems detection methods. (Any

two)-[define-1,list-1,explanation-4+4]

Intrusion Detection

Intrusion Detection is a technique of detecting an unauthorized access to a computer system or a

computer network. Intrusion Prevention

Intrusion Prevention is a technique of preventing an unauthorized access of a systems resources. Intrusion Detection and Prevention Systems

Devices that detect and prevent unauthorized activity within the inner network or on

individual machines.

IDPS Terminology

o Alert or alarm

o False attack stimulus

o False negative

o False positive

o Noise

o Site policy

o Site policy awareness

o True attack stimulus

o Confidence value

16

Page 17: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

o Alarm filtering

Prevention

1. To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those

who would attack or otherwise abuse the system. 2. To detect attacks and other security violations that are not prevented by other security measures. 3. To detect and deal with the preambles to attacks (commonly experienced as network probes and other ―doorknob rattling‖ activities). 4. To document the existing threat to an organization. 5. To act as quality control for security design and administration, especially in large and complex

enterprises. 6. To provide useful information about intrusions that do take place, allowing improved diagnosis,

recovery, and correction of causative factors. IDPSs use a variety of detection methods to monitor and evaluate network traffic.

There are 3 detection methods are available

a) Signature-based

b) Statistical anomaly-based

c) Stateful protocol analysis.

a) Signature-Based Detection:

• This method of detection utilizes signatures, which are attack patterns that are preconfigured and

predetermined.

• A signature-based intrusion prevention system monitors the network traffic for matches to these

signatures.

• Once a match is found the intrusion prevention system takes the appropriate action.

• Signatures can be exploit-based or vulnerability-based.

b) Statistical anomaly-based detection:

• This method of detection baselines performance of average network traffic conditions.

• After a baseline is created, the system intermittently samples network traffic, using statistical

analysis to compare the sample to the set baseline.

• If the activity is outside the baseline parameters, the intrusion prevention system takes the

appropriate action.

c) Stateful Protocol Analysis Detection:

➢ This method identifies deviations of protocol states by comparing observed events with

―predetermined profiles of generally accepted definitions of benign activity.

17

Page 18: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

21) a) Explain in detail about fire detection systems.- [define-2, explanation-8]

Fire Detection

➢ Before a fire can be suppressed, it must be detected

➢ Fire detection systems fall into two general categories:

- Manual fire detection

- Automatic fire detection

Manual fire detection:

➢ Manual fire detection systems include human responses, such as calling the fire department, as well as manually activated alarms, such as sprinklers and gaseous systems.

➢ Part of a complete fire safety program includes individuals that monitor the chaos of a fire

evacuation to prevent an attacker accessing offices.

There are three basic types of fire detection systems:

▪ Thermal detection

▪ Smoke detection

▪ Flame detection

a) Thermal detection: The thermal detection systems contain a sophisticated heat

sensor that operates in one of two ways, fixed temperature, and rate-of-rise.

b) Smoke detection: Smoke-detection systems are perhaps the most common

means of detecting a potentially dangerous fire, and are required by building codes:

i. Photoelectric: Photoelectric sensors project and detect an infrared beam, if interrupted activates

alarm or suppression systems.

ii. Ionization : ionization sensors contains a small amount of a harmless radioactive material within a

detection chamber.

iii. Air-aspirating: air-aspirating detectors take in air, filtering it, and moving it through a chamber

containing a laser beam. If the laser beam is diverted or refracted by smoke particles, the

system is activated.

c) Flame detection: The flame detector is a sensor that detects the infrared or

ultraviolet light produced by an open flame.

(OR) b) Explain in detail about interception of data mobile and portable system.

[list-2,Explanation-8]

The software reliability is defined as the probability of failure – free software operation in

a specified . There are three methods of data interception:

i) Direct observation

ii) Interception of data transmission

iii) Electromagnetic interception. Mobile and portable system:

18

Page 19: INFORMATION SECURITY: SUB CODE- 35242 QPCODE:-502 PART-A

With the increased threat to information security for laptops, handhelds, and PDAs, mobile computing

requires more security than average in-house system.

➢ Many mobile computing systems have corporate information stored within them; some are configured to facilitate user’s access into organization’s secure computing facilities.

➢ Controls support security and retrieval of lost or stolen laptops

➢ Computer Trace software, stored on laptop; reports to a central monitoring center.

➢ Burglar alarms made up of a PC card that contains a motion detector.

➢ Don’t leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage, and

never leave it in plain sight, even if the vehicle is locked—that’s just inviting trouble. If you must leave your laptop in a vehicle, the best place is in a locked trunk. If you don’t have a trunk, cover

it up and lock the doors.

➢ Parking garages are likely areas for thefts from vehicles, as they provide numerous choices and cover for thieves. Again, never leave your laptop in plain sight; cover it or put it in the trunk.

➢ Do be aware of the damage extreme temperatures can cause to computers.

Date

Location

: :

Prepared by

LEENA J [41205203]

Part Time / Guest Lecture

120, Government Polytechnic College,

Purasaiwakkam, Chennai – 12.

19