Documente Academic
Documente Profesional
Documente Cultură
A good risk assessment will determine whether good security policies and
controls are implemented. Vulnerabilities and weaknesses exist in security
policies because of poor security policies and the human factor, as shown
in the following diagram. Security policies that are too stringent are often
bypassed because people get tired of adhering to them (the human
factor), which creates vulnerabilities for security breaches and attacks.
Password policies
Administrative Responsibilities
User Responsibilities
E-mail policies
Internet policies
Password Policies
The security provided by a password system depends on the passwords
being kept secret at all times. Thus, a password is vulnerable to
compromise whenever it is used, stored, or even known. In a passwordbased authentication mechanism implemented on a system, passwords
are vulnerable to compromise due to five essential aspects of the
password system:
Administrative Responsibilities
Many systems come from the vendor with a few standard user logins
already enrolled in the system. Change the passwords for all standard
user logins before allowing the general user population to access the
system. For example, change administrator password when installing the
system.
The administrator is responsible for generating and assigning the initial
password for each user login. The user must then be informed of this
password. In some areas, it may be necessary to prevent exposure of the
password to the administrator. In other cases, the user can easily nullify
this exposure. To prevent the exposure of a password, it is possible to use
smart card encryption in conjunction with the user's username and
password. Even if the administrator knows the password, he or she will be
unable to use it without the smart card. When a user's initial password
must be exposed to the administrator, this exposure may be nullified by
having the user immediately change the password by the normal
procedure.
Occasionally, a user will forget the password or the administrator may
determine that a user's password may have been compromised. To be
able to correct these problems, it is recommended that the administrator
be permitted to change the password of any user by generating a new
one. The administrator should not have to know the user's password in
order to do this, but should follow the same rules for distributing the new
password that apply to initial password assignment. Positive identification
of the user by the administrator is required when a forgotten password
must be replaced.
User Responsibilities
Users should understand their responsibility to keep passwords private
and to report changes in their user status, suspected security violations,
and so forth. To assure security awareness among the user population, we
recommend that each user be required to sign a statement to
acknowledge understanding these responsibilities.
The simplest way to recover from the compromise of a password is to
change it. Therefore, passwords should be changed on a periodic basis to
counter the possibility of undetected password compromise. They should
be changed often enough so that there is an acceptably low probability of
compromise during a password's lifetime. To avoid needless exposure of
users' passwords to the administrator, users should be able to change
their passwords without intervention by the administrator.
Firewalls
Many organizations have connected or want to connect their private LANs
to the Internet so that their users can have convenient access to Internet
services. Since the Internet as a whole is not trustworthy, their private
systems are vulnerable to misuse and attack. A firewall is a safeguard that
one can use to control access between a trusted network and a less
trusted one. A firewall is not a single component; it is a strategy for
protecting an organization's Internet-reachable resources. A firewall
serves as the gatekeeper between the untrustworthy Internet and the
more trustworthy internal networks.
The major shortcoming to using the Internet for this purpose is the lack of
confidentiality of the data flowing over the Internet between the LANs, as
well as the vulnerability to spoofing and other attacks. Virtual private
networks use encryption to provide the required security services.
Typically encryption is performed between firewalls, and secure
connectivity is limited to a small number of sites.
One important consideration when creating virtual private networks is that
the security policies in use at each site must be equivalent. A VPN
essentially creates one large network out of what were previously multiple
independent networks. The security of the VPN will essentially fall to that
of the lowest common denominatorif one LAN allows unprotected dialup access, all resources on the VPN are potentially at risk.
Virus Detection
Anti-virus tools perform three basic functions. Tools may be used to
detect, identify, or remove viruses. Detection tools perform proactive
detection, active detection, or reactive detection. That is, they detect a
virus before it executes, during execution, or after execution. Identification
Remote Access
Increasingly, businesses require remote access to their information
systems. This may be driven by the need for traveling employees to
access e-mail, sales people to remotely enter orders, or as a business