
lundi 16 janvier 2017
Security policy

Security
policy is a definition of what it means to be secure for a system, organization
or other entity. For an organization, it addresses the constraints on behavior
of its members as well as constraints imposed on adversaries by mechanisms such
as doors, locks, keys and walls. For systems, the security policy addresses
constraints on functions and flow among them, constraints on access by external
systems and adversaries including programs and access to data by people.
Significance
If it is
important to be secure, then it is important to be sure all of the security
policy is enforced by mechanisms that are strong enough. There are many
organized methodologies and risk assessment strategies to assure completeness
of security policies and assure that they are completely enforced. In complex
systems, such as information systems, policies can be decomposed into
sub-policies to facilitate the allocation of security mechanisms to enforce
sub-policies. However, this practice has pitfalls. It is too easy to simply go
directly to...
Network security policy

A network
security policy, or NSP,
is a generic document that outlines rules for computer network access, determines how policies are
enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is
usually several pages long and written by a committee. A security policy goes
far beyond the simple idea of "keep the bad guys out". It's a very
complex document, meant to govern data access, web-browsing habits,
use of passwords and encryption, email attachments
and more. It specifies these rules for individuals or groups of individuals
throughout the company.
Security policy should
keep the malicious users out and also exert control over potential risky users
within your organization. The first step in creating a policy is to understand
what information and services are available (and to which users), what the
potential is for damage and whether any protection is already in place to
prevent misuse.
In...
Network security

Network
security consists
of the policies and practices adopted to prevent and monitor unauthorized
access, misuse, modification, or denial of a computer network and
network-accessible resources. Network security involves the authorization of
access to data in a network, which is controlled by the network administrator.[citation
needed] Users choose or are assigned an ID and password or other
authenticating information that allows them access to information and programs
within their authority. Network security covers a variety of computer networks,
both public and private, that are used in everyday jobs; conducting
transactions and communications among businesses, government agencies and
individuals. Networks can be private, such as within a company, and others
which might be open to public access. Network security is involved in
organizations, enterprises, and other types of institutions. It does as its
title explains: It secures the network, as well as protecting and overseeing
operations being done. The most common and simple way...
Job market

Cybersecurity is a
fast-growing field of IT concerned with reducing organizations' risk of hack or
data breach. According to research from the Enterprise Strategy Group, 46% of
organizations say that they have a "problematic shortage" of
cybersecurity skills in 2016, up from 28% in 2015. Commercial, government and
non-governmental organizations all employ cybersecurity professionals. The
fastest increases in demand for cybersecurity workers are in industries
managing increasing volumes of consumer data such as finance, health care, and
retail. However, the use of the term "cybersecurity" is more
prevalent in government job descriptions.
Typical cybersecurity job
titles and descriptions include:
Security
analyst
Analyzes and assesses vulnerabilities in the
infrastructure (software, hardware, networks), investigates using available
tools and countermeasures to remedy the detected vulnerabilities, and
recommends solutions and best practices. Analyzes and assesses damage to the
data/infrastructure as a result of security incidents, examines...
Modern warfare

Cybersecurity is becoming
increasingly important as more information and technology is being made
available on cyberspace. There is growing concern among governments that
cyberspace will become the next theatre of warfare. As Mark Clayton from the Christian
Science Monitor described in an article titled "The New Cyber Arms
Race":
In the future, wars will
not just be fought by soldiers with guns or with planes that drop bombs. They
will also be fought with the click of a mouse a half a world away that unleashes
carefully weaponized computer programs that disrupt or destroy critical
industries like utilities, transportation, communications, and energy. Such
attacks could also disable military networks that control the movement of
troops, the path of jet fighters, the command and control of warships.
This has led to new terms
such as cyberwarfare and cyberterrorism. More and more critical
infrastructure is being controlled via computer programs that, while increasing
efficiency, exposes new vulnerabilities. The test will be to see...
National teams

Here are the main computer
emergency response teams around the world. Most countries have their own team
to protect network security.
Canada
On October 3, 2010, Public
Safety Canada unveiled Canada's Cyber Security Strategy, following a Speech
from the Throne commitment to boost the security of Canadian cyberspace. The
aim of the strategy is to strengthen Canada's "cyber systems and critical
infrastructure sectors, support economic growth and protect Canadians as they
connect to each other and to the world." Three main pillars define the
strategy: securing government systems, partnering to secure vital cyber systems
outside the federal government, and helping Canadians to be secure online. The
strategy involves multiple departments and agencies across the Government of
Canada. The Cyber Incident Management Framework for Canada outlines these
responsibilities, and provides a plan for coordinated response between
government and other partners in the event of a cyber incident. The Action Plan
2010–2015 for Canada's Cyber Security Strategy...
International actions

Many different teams and
organisations exist, including:
The Forum of Incident Response
and Security Teams (FIRST) is the global association of CSIRTs. The US-CERT,
AT&T, Apple, Cisco, McAfee, Microsoft are all members of this
international team.
The Council of Europe helps
protect societies worldwide from the threat of cybercrime through the
Convention on Cybercrime.
The purpose of the Messaging
Anti-Abuse Working Group (MAAWG) is to bring the messaging industry
together to work collaboratively and to successfully address the various
forms of messaging abuse, such as spam, viruses, denial-of-service attacks
and other messaging exploitations. France Telecom, Facebook, AT&T, Apple,
Cisco, Sprint are some of the members of the MAAWG.
ENISA : The European
Network and Information Security Agency (ENISA) is an agency of the
European Union with the objective to improve network and information
security in the European Union.
Europe
CSIRTs in Europe
collaborate...
Actions and teams in the US

Legislation
The 1986 18 U.S.C. § 1030,
more commonly known as the Computer Fraud and Abuse Act is the key legislation.
It prohibits unauthorized access or damage of "protected computers"
as defined in 18 U.S.C. § 1030(e)(2).
Although various other
measures have been proposed, such as the "Cybersecurity Act of 2010 – S.
773" in 2009, the "International Cybercrime Reporting and Cooperation
Act – H.R.4962" and "Protecting Cyberspace as a National Asset Act of
2010 – S.3480" in 2010 – none of these has succeeded.
Executive order 13636 Improving
Critical Infrastructure Cybersecurity was signed February 12, 2013.
Agencies
The Department of Homeland
Security has a dedicated division responsible for the response system, risk
management program and requirements for cybersecurity in the United States
called the National Cyber Security Division. The division is home to US-CERT
operations and the National Cyber Alert System.[128] The National
Cybersecurity and Communications Integration Center brings together government
organizations...
Government

The role of the government
is to make regulations to force companies and organizations to protect their
systems, infrastructure and information from any cyber-attacks, but also to
protect its own national infrastructure such as the national power-grid.
The question of whether the
government should intervene or not in the regulation of the cyberspace is a
very polemical one. Indeed, for as long as it has existed and by definition,
the cyberspace is a virtual space free of any government intervention. Where
everyone agree that an improvement on cybersecurity is more than vital, is the
government the best actor to solve this issue? Many government officials and
experts think that the government should step in and that there is a crucial
need for regulation, mainly due to the failure of the private sector to solve
efficiently the cybersecurity problem. R. Clarke said during a panel discussion
at the RSA Security Conference in San Francisco, he believes that the
"industry only responds when you threaten regulation. If industry doesn't
respond...
Legal issues and global regulation

Conflict of laws in
cyberspace has become a major cause of concern for computer security community.
Some of the main challenges and complaints about the antivirus industry are the
lack of global web regulations, a global base of common rules to judge, and eventually
punish, cyber crimes and cyber criminals. There is no global cyber law and
cybersecurity treaty that can be invoked for enforcing global cybersecurity
issues.
International legal issues
of cyber attacks are complicated in nature. Even if an antivirus firm locates
the cyber criminal behind the creation of a particular virus or piece of malware
or form of cyber attack, often the local authorities cannot take action due to
lack of laws under which to prosecute. Authorship attribution for cyber crimes
and cyber attacks is a major problem for all law enforcement agencies.
"[Computer viruses]
switch from one country to another, from one jurisdiction to another – moving
around the world, using the fact that we don't have the capability to globally
police operations like...
Notable attacks and breaches

Further
information: List of cyber-attacks and List of data breaches
Some illustrative examples
of different types of computer security breaches are given below.
Robert
Morris and the first computer worm
Main
article: Morris worm
In 1988, only 60,000
computers were connected to the Internet, and most were mainframes,
minicomputers and professional workstations. On November 2, 1988, many started
to slow down, because they were running a malicious code that demanded
processor time and that spread itself to other computers – the first internet
"computer worm".The software was traced back to 23-year-old Cornell
University graduate student Robert Tappan Morris, Jr. who said 'he wanted to
count how many machines were connected to the Internet'.
Rome
Laboratory
In 1994, over a hundred
intrusions were made by unidentified crackers into the Rome Laboratory, the US
Air Force's main command and research facility. Using trojan horses, hackers
were able to obtain unrestricted access to Rome's networking systems and remove
traces of their activities....
Computer protection (countermeasures)

In computer security a
countermeasure is an action, device, procedure, or technique that reduces a threat,
a vulnerability, or an attack by eliminating or preventing it, by minimizing
the harm it can cause, or by discovering and reporting it so that corrective
action can be taken.
Some common countermeasures
are listed in the following sections:
Security
by design
Main
article: Secure by design
Security by design, or
alternately secure by design, means that the software has been designed from
the ground up to be secure. In this case, security is considered as a main
feature.
Some of the techniques in
this approach include:
The principle of least
privilege, where each part of the system has only the privileges that are
needed for its function. That way even if an attacker gains access to that
part, they have only limited access to the whole system.
Automated theorem proving to
prove the correctness of crucial software subsystems.
Code reviews and unit testing,
approaches to make modules more secure where formal...
Attacker motivation

As with physical security,
the motivations for breaches of computer security vary between attackers. Some
are thrill-seekers or vandals, others are activists or criminals looking for
financial gain. State-sponsored attackers are now common and well resourced,
but started with amateurs such as Markus Hess who hacked for the KGB, as
recounted by Clifford Stoll, in The Cuckoo's Egg.
A standard part of threat
modelling for any particular system is to identify what might motivate an
attack on that system, and who might be motivated to breach it. The level and
detail of precautions will vary depending on the system to be secured. A home personal
computer, bank, and classified military network face very different threats,
even when the underlying technologies in use are simil...
Impact of security breaches

Serious financial damage
has been caused by security breaches, but because there is no standard model
for estimating the cost of an incident, the only data available is that which
is made public by the organizations involved. "Several computer security
consulting firms produce estimates of total worldwide losses attributable to virus
and worm attacks and to hostile digital acts in general. The 2003 loss
estimates by these firms range from $13 billion (worms and viruses only) to
$226 billion (for all forms of covert attacks). The reliability of these
estimates is often challenged; the underlying methodology is basically
anecdotal."
However, reasonable
estimates of the financial cost of security breaches can actually help
organizations make rational investment decisions. According to the classic Gordon-Loeb
Model analyzing the optimal investment level in information security, one can
conclude that the amount a firm spends to protect information should generally
be only a small fraction of the expected loss (i.e., the expected value...
Systems at risk

Computer security is
critical in almost any industry which uses computers. Currently, most
electronic devices such as computers, laptops and cellphones come with built in
firewall security software, but despite this, computers are not 100 percent
accurate and dependable to protect our data (Smith, Grabosky & Urbas,
2004.) There are many different ways of hacking into computers. It can be done
through a network system, clicking into unknown links, connecting to unfamiliar
Wi-Fi, downloading software and files from unsafe sites, power consumption,
electromagnetic radiation waves, and many more. However, computers can be
protected through well built software and hardware. By having strong internal
interactions of properties, software complexity can prevent software crash and
security failure.
Financial
systems
Web sites and apps that
accept or store credit card numbers, brokerage accounts, and bank account
information are prominent hacking targets, because of the potential for
immediate financial gain from transferring money, making...
Vulnerabilities and attacks

Main
article: Vulnerability (computing)
A vulnerability is a system
susceptibility or flaw. Many vulnerabilities are documented in the Common
Vulnerabilities and Exposures (CVE) database. An exploitable
vulnerability is one for which at least one working attack or "exploit"
exists
To secure a computer
system, it is important to understand the attacks that can be made against it,
and these threats can typically be classified into one of the categories below:
Backdoors
A backdoor in a computer
system, a cryptosystem or an algorithm, is any secret method of bypassing
normal authentication or security controls. They may exist for a number of
reasons, including by original design or from poor configuration. They may have
been added by an authorized party to allow some legitimate access, or by an
attacker for malicious reasons; but regardless of the motives for their existence,
they create a vulnerability.
Denial-of-service
attack
Denial of service attacks
(DoS) are designed to make a machine or network resource unavailable to its
intended...