Understanding Security and Safe Computing
Understanding Security and Safe Computing
1. INTRODUCTION
System security involves the Availability of the system, the Integrity (correctness
and completeness) of the information and the programs within that system, and the
Confidentiality of the information. Loss of any of these aspects of security
constitutes a ‘Security breach’ and is caused by specific threats, which must be guard
against.
As organisations come to rely on systems more and more, a corporate plan for system
security is an essential part of the overall business strategy. Waiting for a security
breach to occur before considering counter measures to a particular threat is a very
expensive way of developing a security plan. Indeed, the effect of certain major
breaches of security may be so severe that the organisation may not get a second
chance to produce such a plan.
Loss of availability
Loss of integrity
Loss of confidentiality
Loss of Availability
This means that the system is not able to serve you when you require it. The
failure may be minor, perhaps due to a small hardware or software fault, or, in the
worst situation, it may be the result of a major physical disaster which has
destroyed the organisation’s central system that may be responsible for supplying
information and computing capabilities both centrally and to the organisation’s
branches or depots throughout the country.
Loss of Integrity
When system integrity is lost, the system no longer performs its functions
accurately. The software and/or the data held on system files may be corrupted, or
lost altogether. This may be the result of a deliberate act (sabotage), or it may be
accidental.
Loss of Confidentiality
Confidentiality is lost when system data of a sensitive nature, whether it is
personal data or company secret, becomes available to unauthorised personnel. In
the UK for example, the Data Protection Act (1984) specifically states that, where
systems hold personal data, ‘appropriate security measures shall be taken
against unauthorised access to, or alteration, disclosure or destruction of,
personal data and against accidental loss or damage’. It would mean quite
likely that the majority of system users would have to be registered since
‘personal’ data may range from someone’s complete life-history, down to
something as apparently innocuous as their job-title and current salary. Hence in
the UK, the Act may well force the issue of a security policy for most
organisations.
2
Is the site stable? Underground mine-workings or earth tremors, for
example, may cause movement which disrupts communication lines, or
even makes the building unsafe;
Are there any activities in the surrounding area which could jeopardise
your system’s security? The power output from a radar transmitter at a
nearby airport may cause corruption of magnetic media (tapes/floppy
disks), for example, to say nothing of the damage which would be
caused by an aircraft landing in your system room.
The building should be constructed using tried and tested materials proven
to be fire-resistant
Nooks and crannies should be kept to the barest minimum if not totally
avoided.
The system room should not be at or below ground level to reduce risk of
flooding
Water storage tanks should not be sited on top of the system room while
water pipes should not run through the room
Access doors to the system and its peripherals should be kept to the
minimum.
3
The System Room
The system room should be surrounded by fire resistant materials and these
materials should not produce toxic, corrosive fumes or dust which can damage
system hardware or be even dangerous to staff. The floor above the room should
be water proof. There would be little to gain if the system is saved from fire only
to be destroyed by flooding.
Protection of Information
It should be part of the organisation’s policy to store copies of software on a
separate site. The copies stored on the separate site should be updated regularly so
that they can be useful and relevant if ever required particularly in the event of a
major disaster.
Working copies or back-up copies kept in the system installation should be stored
in fire-proof safes when not in use. The fire-proof safes should also always be
kept locked for effective protection against threats of fire and theft. The data safe
manufacturer should be called in to open the safe if it does not open normally after
a fire incident to avoid destroying the content through forced opening.
Fire Detection
Fire detection systems for system installations should be automatic. Fire detectors
are based on two principles. The fires type detects fire in materials which generate
smoke early while the second detects fire in materials which burn quickly while
producing little smoke.
It is a good idea to have an equal mix of the two types of fire detectors to cover all
eventualities.
4
Fire Extinguishing Systems
Fire-fighting facilities should be present in system installations, to provide first
time response in cases of fire. There are two popular Fire Extinguishing Systems:
Gas Flooding systems, and
Sprinkler systems
Sprinkler Systems
Sprinkler systems are slower than gas systems. They are water based and the
resultant flooding could damage the system hardware where fire did not. They are
therefore operated as last resort.
Staff should be aware of, and practised in the correct cause of action stated in
these procedures. The procedures must be regularly reviewed to check that they
remain appropriate and sufficient.
Interruption of Services
The loss of essential services can pose significant threat to the integrity and
availability of any system. The two main services upon which systems depend are:
Electricity supply;
Communication lines
Unfortunately, organisations responsible for the provision of these services in our
country are yet to attain the desired level of reliability. Organisations therefore have to
provide support facilities to augment provisions from public utilities.
5
The Electricity Supply
Systems can not function without electricity supply. It is common for
organisations in Nigeria to install electric generators to provide a substantial part
of these electricity requirement particularly in the loss of public power supply. In
addition, the generators are supported with power stabilizers and Uninterrupted
Power Supply (UPS). Power stabilizers protect the system from the harmful
effects of fluctuations. UPS maintain the continuity of power supply in the gap
between the switch over from public supply to in-house Generator or Vice-versa.
Communication Lines
It is common within many organisations for systems to communicate with
terminals and indeed other systems in remote locations. The communication
facilities providing these links must be continuously operational for system
operations to be effective and reliable. It is common practise in Nigeria for back-
up communication facilities to be established to ensure continuity of functioning.
The backup facilities are based on a source different from the base of the primary
facility for effective protection.
The threats to a system which are attributable to people may relate to:
Authorised personnel, i.e persons with the authority to use the particular
aspect of the system being considered. They may be members of staff,
customers or suppliers to the organisation.
Unauthorised personnel, i.e persons not authorised to use that particular
aspect of the system. Such persons may be members of staff, customers,
suppliers, or persons not apparently connected with the organisation. They
may, or may not be authorised users of other aspects of the system.
The threats may involve actions which deliberately breach security, or may relate
to actions which do so unintentionally. The countermeasures which are required
may be as simple as a locking door to prevent unauthorised access to hardware, or
more complex, for example, involving security aspects being built into the
software.
6
Intellectual challenge: individuals internal or external to the organisation
may try to gain access to the system, just for the sport, but may cause
accidental corruption of data, or may come across confidential data which
they subsequently divulge to competitors, for example.
7
PART II: SYSTEM FRAUD
INTRODUCTION
Fraud has been in existence ever since. However, with the advent of the systems with
all its numerous advantages to process data speedily, system fraud also becomes
revolutionised.
A study once conducted in the United States of America showed that approximately
$500m is lost to system fraud annually. On the average, each system fraud involves
$500 as against $10000 per bank robbery and $19000 per conventional bank
embezzlement. System fraud has clearly demonstrated itself to be the unfortunate
aspect of the ‘utopian’ systemised society.
8
SOFTWARE RELATED SYSTEM FRAUD
Software related system fraud can exist in any of the following forms
Input fraud
Theft of software
Data interception
Fraudulent manipulation of software
Improper use of software
Antidotes
Separation of responsibilities, in particular the decoupling of authorisation and
duties
Batch totalling
Input data review by supervisory personnel
Consistent attention to error conditions and exceptional situations.
9
Intelligence i.e a competitor company may make it part of their elaborate espionage
scheme.
Profit: the culprit sells the stolen software for money to interested buyers
Private use: the culprit installs the software on a private machine for private use
The perpetrator of this act has to be somebody with access (physical or remote) to the
machine. This type of fraud is difficult to detect because unlike the other resource of
an organisation, system data can be stolen non-destructively – hence it is difficult to
know that it has been stolen.
Antidotes
Usual preventive measures include effective password system. To ensure a good
password the following rules should be observed:
Effective password system cannot help here as access to the system is not required.
The solution is data encryption. The unauthorised user may intercept the signals but
he will not be able to intercept them.
10
The intent of this category of fraud is similar to that of input fraud that is, to
misallocate money or company merchandise or to cover up management
incompetence. Here, the culprits by virtue of access and privileges modify programs
and data with malicious intent.
The culprit in both cases has to be a reasonably technical person with access to, and
privileges on the system.
Antidotes:
Enforcing adequate program library procedures
Review of consoles logs
Review of file access by unusual people at unusual times
Maintaining elaborate system of control totals – not only of batches but of
records and sensitive fields of records
Data encryption
Installing security packages that restrict and monitor file access
It is common for personnel to use system time for unofficial activities. This is alright
as long as the activities are minor – e.g. using a Word processor to produce a personal
letter. However, things like using a system time to analyse the data of other businesses
or the outright sale of system time to other organisation is fraudulent and should be
checked.
The usual antidotes to such activity is some form of continuous supervision of what
users do on the system – either by having work schedules which are adhered to or by
having the system generate logs of who uses what and when.
11
To destroy
To steal
To borrow (illegally)
Antidote
The best safeguard is to have up-to-date Backup copies of all important data at a
remote location that is secure.
The intention is either to use the information offensively or simply to deprive the
owner of its use. This act can only be perpetrated by someone with physical access to
the relevant hardware units.
Usual safeguards include adequate physical security and control procedures for the
hardware, offsite backup facilities and data encryption are other means of preventing
this fraud.
12
2.3 COMMUNICATION RELATED SYSTEM FRAUD
Antidotes:
There are two widely accepted barriers to this form of system fraud:
Data encryption – the culprit may intercept the data but he will not be able to
intercept it correctly or interchange it intelligently.
13
Every sensitive activity in the organisation should be identified and vigorous
procedures defined for it. Furthermore, guidelines on the strict observance of the
procedures should be built into the procedures.
Effective procedures prevent fraud because it demonstrates to the potential culprit that
detection is likely. A primary obstacle in the establishment of adequate procedures is
the identification of all activities that can be abused. This is because some seemingly
harmless activity may result in outrageously disastrous consequences when abused.
Below is an obviously incomplete list of activities that require carefully thought out
procedures.
Organisational Procedures
Top management involvement in data processing
System Centre Procedures
Access to system equipment
Access to media library
Movement of backup copies to offsite library
Input Preparation Procedures
Documentation of authorised input forms
Verification of control totals
Validation of inputs
Processing Procedures
Access to view information
Access to manipulate information
Review of processing logs
Programs testing
Output Procedures
Destruction of system output
Distribution of system output
Examination of system output to detect discrepancies
14
3 MOTIVATION
Systems on its own do not have the capacity to perpetrate fraud. It is human beings
that initiate the act. And more often than not, it is an insider. A most relevant question
is ‘why do system users commit system fraud?’
3.1 Greed
An employee with tendency of greedy manifestations may decide to defraud his
company. This is usually in the form of misallocation of money or company
merchandise.
3.3 Blackmail
An employee may be pressurised to commit system fraud by a third party. The
operative word here is pressurised, and the leverage is usually blackmail. For
example, threat:
To hurt a member of his family
To make public hidden secrets that cause severe embarrassment or cause
irreparable damage etc.
3.4 Crisis
An employee in a state of acute or crippling financial crisis may decide, against better
judgement, to defraud his company and use proceeds from the exercise to settle his
bills. In addition, an employee in a state of mental instability may commit fraud
because he is not in full control of his faculties.
3.5 Disgruntleness
A disgruntle employee who has an axe to grind with his employer may decide to
penalise his employer by committing system fraud. The overriding concern of the
disgruntled employee is that his employer should sustain a loss. He may not be
necessarily interested in benefiting from the exercise.
15
3.6 The Hacker Syndrome
A system hacker is a programmer who is consumed with the desire to understand and
conquer any system in his vicinity. To demonstrate that he has control over that
system he will perform some otherwise illegal operations and relish in the fact that the
system cannot refuse such improper overtures. His other source of reward, apart from
the ‘eureka’ cry is that he can boast of his programming wizardry amongst his
colleagues who will envy and respect him. A typical hacker is a very intelligent
programmer. The type you will turn to for direction when confusion gets in.
Fortunately, not all intelligent programmers demonstrate the hacker syndrome.
4. WARNING SIGNALS
These are 12 warning signals indicating that the potential for system crime exists:
1. The system seems to run the company; management just reacts
2. Management expects system to solve major existing problems
3. Management does not (cannot) communicate with the EDP staff
4. Users are told how their systems will be designed
5. There are no documented standards for the development of new applications
or the maintenance of existing ones
6. Technical management is actively involved in programming troubleshooting
7. Programmers are uncontrolled; they can do what they want with the system
8. EDP staff has easy access to data and to program libraries
9. Errors occur so frequently that adequate investigation is not possible
10. Auditors treat the system like a mysterious black box
11. Management fails to implement audit recommendations; and
12. No EDP audit is performed.
16
PART III: PRACTICAL APPROACH TO SAFE
COMPUTING
If you connect to the Internet, allow other people to use your system, or share files
with others, you should take steps to protect your system from harm. Why? Because
there are system criminals (sometimes called hackers or crackers) who attack other
people's systems. These people can attack directly, by breaking into your system
through the Internet and stealing your personal information, or indirectly, by creating
malicious software (or malware) designed to harm your system.
Fortunately, you can protect yourself by taking a few simple precautions. This article
describes the threats and what you can do to defend against them.
Check your security status with Windows Security
Center
Windows Security Center is your headquarters for system security. It shows
your system's current security status and recommends anything that you
should do to help make your system more secure.
Security Center checks your system for these security essentials:
Firewall. A firewall can help protect your system by preventing hackers or
malicious software from gaining access to it.
Automatic updating. Windows can routinely check for updates for your
system and install them automatically.
Malware protection. Antivirus software can help protect your system against
viruses, worms, and other security threats. Antispyware software can help
protect your system from spyware and other potentially unwanted software.
Other security settings. Security Center checks for proper Internet security
17
Click the notification to open Security Center, where you can learn how to fix the
problem.
Note
To turn off security notifications or hide the Security Center icon in the
notification area, open Security Center, click Change the way Security Center
alerts me, and then choose an option. Even if you turn off notifications,
Security Center will continue to check and display security status.
Use a firewall
A firewall is software or hardware that checks information coming from the Internet
or a network and then either turns it away or allows it to pass through to your system,
depending on your firewall settings. In this way, a firewall helps prevent hackers and
malicious software from gaining access to your system.
Windows Firewall is built into Windows and is turned on automatically.
How a firewall work
If you run a program such as an instant messaging program or a multiplayer network
game that needs to receive information from the Internet or a network, the firewall
asks if you want to block or unblock (allow) the connection. If you choose to unblock
the connection, Windows Firewall creates an exception so that the firewall won't
bother you when that program needs to receive information in the future.
Use virus protection
Viruses, worms, and Trojan horses are programs created by hackers that use the
Internet to infect vulnerable systems. Viruses and worms can replicate themselves
from system to system, while Trojan horses enter a system by hiding inside an
apparently legitimate program, such as a screen saver. Destructive viruses, worms,
and Trojan horses can erase information from your hard disk or completely disable
your system. Others don't cause direct damage, but worsen your system's performance
and stability.
Antivirus programs scan e-mail and other files on your system for viruses, worms,
and Trojan horses. If one is found, the antivirus program either quarantines (isolates)
it or deletes it entirely before it damages your system and files.
Windows does not have a built-in antivirus program, but your system manufacturer
might have installed one. Check Security Center to find out if your system has
antivirus protection. If not, go to the Microsoft Antivirus Partners webpage to find an
antivirus program.
Because new viruses are identified every day, it's important to select an antivirus
program with an automatic update capability. When the antivirus software is updated,
18
it adds new viruses to its list of viruses to check for, helping to protect your system
from new attacks. If the list of viruses is out of date, your system is vulnerable to new
threats. Updates usually require an annual subscription fee. Keep the subscription
current to receive regular updates.
Warning
If you do not use antivirus software, you expose your system to damage from
malicious software. You also run the risk of spreading viruses to other
systems.
Use spyware protection
Spyware is software that can display advertisements, collect information about you, or
change settings on your system, generally without appropriately obtaining your
consent. For example, spyware can install unwanted toolbars, links, or favorites in
your web browser, change your default home page, or display pop-up ads frequently.
Some spyware displays no symptoms that you can detect, but it secretly collects
sensitive information, such as which websites you visit or text that you type. Most
spyware is installed through free software that you download, but in some cases
simply visiting a website results in a spyware infection.
To help protect your system from spyware, use an antispyware program. This version
of Windows has a built-in antispyware program called Windows Defender, which is
turned on by default. Windows Defender alerts you when spyware tries to install itself
on your system. It also can scan your system for existing spyware and then remove it.
Because new spyware appears every day, Windows Defender must be regularly
updated to detect and guard against the latest spyware threats. Windows Defender is
updated as needed whenever you update Windows. For the highest level of protection,
set Windows to install updates automatically.
Update Windows automatically
Microsoft regularly offers important updates to Windows that can help protect your
system against new viruses and other security threats. To ensure that you receive these
updates as quickly as possible, turn on automatic updating. That way, you don't have
to worry that critical fixes for Windows might be missing from your system.
Updates are downloaded behind the scenes when you're connected to the Internet. The
updates are installed at 3:00 A.M. unless you specify a different time. If you turn off
your system before then, you can install updates before shutting down. Otherwise,
Windows will install them the next time you start your system.
To turn on automatic updating
1. Click to open Windows Update.
19
2. Click Change settings.
3. Make sure Install updates automatically (recommended) is selected. Windows
will install important updates for your system as they become available.
Important updates provide significant benefits, such as improved security and
reliability.
4. Under Recommended updates, make sure the Include recommended updates
when downloading, installing, or notifying me about updates check box is
selected, and then click OK. Recommended updates can address non-critical
20
Use the Phishing Filter in Internet Explorer. Phishing is the practice of
creating fraudulent e-mail messages and websites in order to trick system
users into revealing personal or financial information. The fraudulent e-mail
message or website appears to be from a trusted source, such as a bank, credit
card company, or reputable online merchant. The Phishing Filter helps detect
phishing websites to protect you from scams.
Be careful when clicking hyperlinks in e-mail messages. Hyperlinks (links
that open websites when you click them) are often used as part of phishing and
spyware scams, but they can also transmit viruses. Only click links in e-mail
messages that you trust.
Only install add-ons from websites that you trust. Web browser add-ons,
including ActiveX controls, allow webpages to display things like toolbars,
stock tickers, video, and animation. However, add-ons can also install spyware
or other malicious software. If a website asks you to install an add-on, make
sure that you trust it before doing so.
21
browsing the web. These settings can help protect against known security threats,
such as websites installing add-ons or other programs without your knowledge.
How can I protect my privacy when I'm online?
Internet Explorer provides the following features that can help protect your privacy
when you're online:
Privacy settings that specify how your system handles cookies.
Privacy alerts that let you know when you try to go to a website that doesn't
meet the criteria in your privacy settings.
The ability to view a website's privacy statement.
Why am I getting a message that reads "Your security setting level puts
your system at risk"?
You are getting this message because certain security settings are at a lower level than
is recommended. By default, Internet Explorer has a minimum level for some settings
that can help protect your system from websites that are trying to install malicious or
unwanted software without your knowledge or permission.
How do I know which settings are not at recommended levels?
To see which security settings are not at recommended levels, follow these steps:
To view Internet Explorer security settings
1. Click to open Internet Explorer.
2. Click the Tools button, and then click Internet Options.
3. Click the Security tab.
4. Click the Internet icon, and then click Custom level.
Settings that are not at recommended levels are highlighted in red.
22
Settings that are not at recommended levels are highlighted in red.
How do I change my Internet Explorer security settings?
To change your Internet Explorer security settings
1. Click to open Internet Explorer.
2. Click the Tools button, and then click Internet Options.
3. Click the Security tab.
4. Click the Internet icon.
5. Do one of the following:
o To pick a preset security level, drag the slider.
o To change individual security settings, click Custom level. Change the
settings as desired and click OK when you are done.
o To set Internet Explorer back to the default security level, click Default
level.
6. When you are finished making changes to the security settings, click OK.
How do I change my Internet Explorer privacy settings?
To change your Internet Explorer privacy settings
1. Click to open Internet Explorer.
2. Click the Tools button, and then click Internet Options.
3. Click the Privacy tab.
4. Under Settings, do either of the following:
o To allow or block cookies from specific websites, click Sites.
o To load a customized settings file, click Import. These are files that
modify the rules that Internet Explorer uses handle cookies. Since
these files can override default settings, you should only import them if
you know and trust the source.
5. When you are finished making changes to your privacy settings, click OK.
23