TUCoPS :: General Information :: itsec.txt

Interpol document: IT Security and Crime Prevention Methods


IT Security and crime prevention methods
Explanations

1.  IT Security: definitions
2.  Information precessing and IT Security
3.  Important IT Security functions
3.1 Information classification
3.2 Documentation
3.3 Administration and personnel
3.4 User identification and authorisation
    Identification - Authorisation
3.5.Logging
3.6.Back-up
3.7.Firewalls
3.8.Intrusion Detection Systems (IDS)
3.9.Incident Handling System
4.  Computer architecture
4.1.Microcomputers (stand-alone)
4.2.Network architectures and mini-computers
4.3.Mainframes
4.4.Hand-held computers
5.  Threats and crime prevention methods
5.1 Architecture-independent threats
    Members of staff - Unauthorised access from external
    sources - Media handling - Malicious program code -
    Electronic emission
5.2.Microcomputer (stand-alone, Personal Computer) systems
5.3.Network architectures and mini-computers systems
5.4.Mainframe-computer systems
6.  IT Security - International Workgroups



Introduction: Goals and objectives
----------------------------------------------------------------

This document gives an introduction to what an investigator
needs to know about Information Technology (IT) security
measures in order to be able to carry out investigations in an
IT environment and to give advice in crime prevention methods.

Information Technology has come to play an important and vital
role in all sectors of society. As a consequence, security has
become an essential component of Information Technology.
However, it is a complex subject and the appropriate measures
will often depend, to a large extent, on the type and location
of the IT equipment.

The potential security threats and risks have to be carefully
assessed in every situation and it is absolutely vital that all
concerned are made aware of the threats and risks that affect
them, and over which they have control. Only then will they
fully understand and apply the appropriate security procedures.

This report attempts to explain the various threats and risks
posed by criminal activity in IT environments and indicate
advice which the police can give about security procedures and
computer crime prevention methods. It is not intended to be a
comprehensive study. Threats to information systems may arise
from intentional or unintentional acts and may come from
internal or external sources. This guide will address only
intentional threats, made with criminal intent, to
confidentiality and integrity. Availability security functions
will only be addressed if they have an effect on confidentiality
and/or integrity. Examples of prevention methods will be given.

The prevention methods in this report can not only be used to
prevent crime in companies and authorities information
technology system, many of these can also be used to protect
private computer systems.



1. IT Security: definitions
----------------------------------------------------------------

CONFIDENTIALITY (Secrecy)

     Information and other resources are only disclosed for
     those 'users' (persons, entities or processes) who are
     authorised to have access to it.

INTEGRITY

     Information and other resources are modified only by
     those 'users' who have the right to do so. The
     accuracy and completeness of the data and information
     is also guaranteed.

AVAILABILITY

     Authorised 'users' can access information and other
     resources when needed.

THREAT

     A 'threat' is a potential undesirable incident.

RISK

     A 'risk' is the estimated probability that a 'threat'
     will be activated.

2. Information processing and IT Security
----------------------------------------------------------------

In order to protect the data held on a computer system, various
steps have to be taken: individual users should only be able to
read the information which is needed to do their job; they
should only be able to modify information which is specifically
their job to modify. Finally, some information should not be
accessible at all for individual users, e.g. the various log
records.

In simple terms, information processing involves the following
types of operation:

   * READ/CREATE/MODIFY/DELETE information
   * TRANSPORT (in one way or another) of information
   * STORE information (on computer 'media' to keep it
     somewhere).

i. READ/CREATE/MODIFY/DELETE

Information is 'Read/Created/Modified/Deleted' by a 'User'. A
'User' is a person or a process (e.g. a computer program).
Authorisation to 'Read' information is a question of
confidentiality while 'Create/Modify/Delete' is primarily a
question of integrity.

ii. TRANSPORT

One of the simplest ways of 'transporting' information is the
internal transport between the keyboard, the memory and the hard
disk in a Personal Computer. Another is the external 'transport'
of a diskette from one place to another. Information can also be
'transported' using a 'Local Area Network' (LAN) and/or a 'Wide
Area Network' (WAN). Insecure 'transport' affects both
confidentiality and integrity.

A special kind of undesirable 'transport' is 'Electronic
Emission' (see below).

iii. STORE information

Once the information has been 'stored' on some kind of media
(diskettes, tapes etc.), it may become the target of
unauthorised activities which will have an effect on the
confidentiality and/or integrity of the information.

3. Important IT Security functions
----------------------------------------------------------------

As well as knowledge of computer architecture, the investigator
also needs to be familiar with a number of important IT Security
functions and organisational matters if s/he is to be able to
give advice on prevention methods and conduct investigations.

Some important functions are:

   * Information classification
   * Documentation rules
   * Administration and personnel
   * User Identification and Authorisation
   * Logging
   * Back-up
   * Firewalls
   * Intrusion Detection System (IDS)
   * Incident Handling (IH)

3.1 Information classification

It is essential to classify the information according to the
appropriate level of availability, e.g. 'open', 'confidential',
'secret' or 'top secret'. Only then will it be possible to apply
the most effective security measures. The classification should
be carried out by the management or by the 'information owner'.

3.2 Documentation

All systems, but especially the 'Identification and
Authorisation system', 'Information Classification system' and
'Application systems', must be fully documented.

IT Security policy and the security rules for the organisation
as well as details of contingency plans in the event of a major
incident should be documented in a 'Security Handbook'. The
chapter on IT Security should have separate sections for each
user category, e.g. 'Management', 'System Administrators', 'End
Users' etc.

Create a checklist with guidelines concerning the actions which
have to be taken in case of an incident (e.g. immediate
reaction, who to contact). See chapter 'Incident Handling'.

3.3 Administration and Personnel

Success in information security work depends first and foremost
on developing good basic working practices and establishing
procedures to ensure that they are maintained. It is also
important to create a security-conscious atmosphere and
establish a disciplined approach.

If confidential information is to be handled, it is essential
that the people chosen for the job are absolutely reliable. They
should be security screened to a level equal to the highest
level of confidential information they are likely to be asked to
work on. Access to information should be restricted to that
which the individual 'needs to know' to do his job. Particularly
sensitive material should be split into sections so that only
authorised staff can handle each section; no member of staff
should have access to all the information.

Furthermore, security measures will only be effective if staff
are properly trained. It is essential that they understand the
problem. This can be achieved with in-house training. The
individual users must be trained how to use the network, how to
handle confidential information, making back-ups etc. Employees
can be taught what to do to counter certain threats, what they
should not do, whom they can call and where they can get help.
It is also very important to encourage employees to report
incidents so that steps can be taken to prevent any further
damage.

New or temporary employees should be given introductory
training, during which data security and data integrity can be
explained. It might also be useful to consider including a
clause on security and confidentiality obligations in employees’
contracts.

(a) Management responsibilities

To achieve functional and cost-effective IT Security, a number
of initial steps must be taken by the management:

Risk analysis What are the threats and what is the risk they
will be activated? Threats and risks, acceptable or
unacceptable, vary between different organisations. It is
important to analyse the risks to make it possible for the
management to form a policy with their security intentions.

Policy There must be an Information Security policy written and
approved by management. No management approved policy = no
resources. It should include the main security targets,
information classification principles, responsible persons, and
principles to reach the targets.

Security plan A plan has to be made to define how the targets
and the intentions in the policy document should be realised. A
priority list must be set up because it may not be possible to
realise everything in the policy at the same time. The plan is a
living document and has to be scrutinised by the IT security
officer.

Security Architecture With the risk analysis, the policy and the
plan as a base, security architecture must be chosen. Stet
Security architecture is a high level description of technical
security functions and organisational needs to fulfil the
security demands.

Implementation With the security architecture as a base,
different security functions and products must be selected to
implement the security architecture.

The main points requiring attention are as follows:

i. All senior management, and not just the computer security
manager, should be sufficiently familiar with the computer
systems in use, to enable them to know what is going on and why.

ii. The role of the system manager is crucial. He must be of the
highest degree of integrity, and sufficiently computer literate
to be able to administer the system in a secure and responsible
manner. The system manager access level should be restricted to
the minimum number of staff required. However it must be
possible for the IT security manager to check on the system
manager’s activities.

iii. The only way of establishing how a problem has occurred,
whether the origin is accidental or deliberate, is to examine
the logging information stored on the computer. (One of the
reasons for restricting privileges is that the logging
information of the system is available at this level). Analysis
of this information should show when, where and how the problem
occurred. In some cases careful examination will also indicate
who was responsible. It is essential therefore that the logging
capabilities of the particular system are fully understood and
utilised. If the logging functions on the system are inadequate,
consideration should be given to acquiring suitable software.

(b) User responsibilities

Users should be given specific guidelines about what they should
do - and more importantly - what they should not do. These
guidelines should be distributed in written form, and signed
for. This will counter the defence that they were unaware of the
contents of the guidelines and at the same time provide the
investigator with written proof. Specimen guidelines are given
below. They are certainly not exhaustive and others can be added
to take account of particular circumstances.

  i. Do not use any computer equipment without permission.
 ii. Do not try to access information unless you know you are
     authorised to do so.
iii. Do not alter any information on a computer system unless
     you know you are authorised to do so. (It is also important
     to provide a clear written statement of what information
     each user is allowed to access, to whom that information
     may be disclosed and what action will be taken if the rules
     are broken.)
 iv. Do not use a company or authority computer for personal
     matters without permission.
  v. Do not leave a working computer unattended, without using
     security options that demand retyping a password (e.g.
     screen saver password).
 vi. Make sure you know what to do in the event of a virus being
     discovered on the system. Use virus protection programs.
vii. Be aware of malicious program code, when loading files,
     mails etc. from the internet or other media.
viii.Keep your password and user-ID confidential.
 ix. Do not allow anyone else to use your password. (If people
     like engineers need access to the system, they should be
     referred to the system manager.)
  x. Do not use anyone else’s password.
 xi. Remember that anything done on the system using your ID and
     password can be your responsibility.

3.4 User Identification and Authorisation

Access to a computer (i.e. a Personal Computer) can be
restricted by means of controls based on various kinds of
'Identification and Authorisation' systems.

Identification is a two step function: (a) to Identify the user
and (b) to Authenticate (validate) the identity (i.e. confirm
that it is true).

The simplest systems rely on passwords only. More sophisticated
systems use cards (e.g. 'SmartCard') and/or 'biometric' methods
in combination with passwords.

3.4.1 Identification

(a) Password systems

These give some measure of protection against casual browsing of
information, but will rarely stop a determined criminal. A
computer password acts like a key to a computer. Allowing
several people to use the same password is like everyone using
the same key.

Passwords should:

  i. Be issued to an individual and kept confidential, they
     should not be shared with anyone. (The golden rule is ONE
     PERSON ONE PASSWORD). Should a temporary user need access
     to a system, it is usually fairly simple to add to the list
     of authorised users; once the temporary user has finished
     his work, his user-ID must be deleted from the system.)
 ii. Be distinct from the user-ID.
iii. Ideally be:
       a. alphanumeric and
       b. at least six characters long.
 iv. Be changed regularly, at least every 30 days. It is
     possible to warn the user automatically when his password
     expires. To ensure that he enters a new one, he will not be
     able to enter the system after the expiration date,
     although he may be allowed a limited number of 'grace'
     log-ins.
  v. Be properly managed. This will involve:
       a. Using a password history list, giving all the
          passwords used in the past year or two. New passwords
          will be checked against the list and not accepted if
          they have already been used.
       b. Making a list of frequently used passwords such as
          names, brands and other words that are easy to guess
          and therefore not suitable as passwords. This list
          will be used in the same way as the history list,
          except that new passwords will not be added; only the
          system manager will be able to change the list. N.B.
          Some systems conform to these standards and generate
          passwords automatically.
 vi. Be removed immediately if an employee leaves the
     organisation or gives notice of leaving.

Last but not least it is important to note that care should be
taken with the password used for remote maintenance. Standard
passwords which are often used to get access to different
systems, for maintenance purposes, should always be avoided.

(b) Other identification systems

The 'password' method is built on something you 'know' and might
be misused by someone getting hold of the password. A system
built on something you 'know' (password, PIN-code etc.) AND
something you 'have' (i.e. authorisation card) is a much
stronger system. Even if someone gets hold of your password it
is useless without the card. Today, the strongest method is
something you 'know', something you 'have' and something you
'are' (biometrics).

There are two main types of card:

  a. Magnetic strip card: As its name suggests, this type of
     card has a magnetic strip containing some confidential
     information to be used together with the holder’s personal
     code;
  b. Chip card: Instead of a magnetic strip, the card has a
     built in microchip. The simplest type contains a memory
     chip (e.g. telephone cards) containing some information but
     has no processing capability. The other, better, type is
     the 'Active' (or 'Smart') Card. It contains a microchip
     with both a memory to store some information and a
     processor. It is often used in combination with
     cryptographic techniques.

Biometric systems make use of specific personal characteristics
(biometrics) of a specific person e.g. fingerprint, voice,
keystroke characteristics or the 'pattern' of the retina.
Biometric systems are still quite expensive (except for the
keystroke system) and not very common.

However, even these sophisticated techniques are not infallible.

3.4.2 Authorisation

After identification and authentication of the user (subject)
there must be a function and set of rules to control what object
(files, devices etc.) each user is allowed to access. This is
the Access Control system.

3.5 Logging

Most computer systems have some kind of log. Even stand-alone
systems sometimes have identification and authorisation systems
(and a log) if different users, with different authorisation
levels, use them and/or when it is desirable to prevent users
from using the disk drive (as an anti-virus measure) or changing
files.

In a multi-user system (client-server-, mini-,
mainframe-systems) there are always logging functions and there
is often more than one kind of log.

The desired level of protection will only be achieved if the
various security measures are properly followed up with a log
that can be analysed as and when necessary. A proper log will
answer the questions:

   * WHO (user)
   * WHEN (time - date)
   * WHERE (place)
   * WHAT (event/activity)
   * ADDITIONAL (Additional information depending on activity)

There are often many different types of logs, e.g.:

   * HISTORY files (e.g. Internet activities)
   * TEMPORARY files
   * SYSTEMS log
   * TRANSACTION log
   * SECURITY SYSTEM log
   * DATABASE log
   * APPLICATION log
   * TECHNICAL log (mainly on mainframes)

Log information is one of the most important items for a
computer crime investigator to look for.

3.6 Back-up

Although modern computer systems are generally very reliable,
breakdowns and failures do occur, and users can make mistakes
that lead to the accidental destruction of information. To guard
against total loss of information under these circumstances, it
is necessary to set up procedures for making regular copies. The
information on the computer system should be copied to some form
of back-up medium. This medium can then be stored in a safe
place until it is needed.

For particularly valuable information several copies should be
made, and each copy stored in a different place and at least in
different buildings, if not different cities.

The frequency with which back-ups are taken should be based on
the frequency with which the information changes, the relative
value of the information, and the problems its loss would cause.
Regular back-up of data and system files are an essential
security measure. When combined with the logging information,
they should provide a comprehensive security information
package. The following guidelines may be of assistance when
making back-ups:

  i. Make sure that regular back-up copies are made of both data
     and system files.
 ii. Back-up cycles should be of sufficient length to be of some
     use in the future. 24-hour overwrite cycles are not
     recommended.
iii. Take a full back-up (both system and data) out of the cycle
     on a regular basis and archive it off site for an extended
     period.
 iv. Back-up tapes/diskettes should be kept in a safe place
     under lock and key and away from the computer and where
     they are secured from fire, flood, magnetic and electric
     fields etc., preferably off site.
  v. Periodically test the back-up to ensure that the
     information can actually be restored in an emergency; do
     not wait for disaster to strike to find the back-up system
     does not work.

Back-ups (including old back-ups) are another important source
of information for an investigator.

3.7 Firewalls

One frequently asked question is 'how to secure the internal
network from an external network such as the Internet?' One
solution is to set up a firewall system.

According to a definition in The Internet Firewall FAQ 'A
firewall is a system or group of systems that enforces an access
control policy between two networks. The actual means by which
this is accomplished varies widely, but in principle, the
firewall can be thought of as a pair of mechanisms: one, which
exists to lock traffic, and the other that exists to permit
traffic. Some firewalls place a greater emphasis on blocking
traffic, while others emphasise permitting traffic. Probably the
most important thing to recognise about a firewall is that it
implements an access control policy. If you don’t have a good
idea what kind of access you want to permit or deny, or you
simply permit someone or some product to configure a firewall
based on what they or it think it should do, then they are
making policy for your organisation as a whole.'

Firewall systems are typically the first line of defence between
an internal network (ex. of companies but also private networks)
and the outside world, especially its connection to the
Internet. It should be configured not only to allow certain
operations to occur (FTP, mail delivery, etc), but to make it
difficult or impossible for an attacker on the outside to use
the firewall to penetrate the internal nets.

There are primarily two types of firewall systems, the
packet-filtering firewall system and the application-level
gateway.

The major difference between the two techniques lies in the flow
of communication. A packet-filter gateway acts as a router
between the two networks; as packets flow from their source to
the destination, the gateway either forwards or blocks the
packets. With application gateways, all packets are addressed to
a user-level application on the gateway that relays the packets
between the two communication points.

Firewall system requirements

Firewall systems must support features that will do the
following:

   * Prevent unauthorised users from accessing the internal
     network.
   * Prevent unwanted IP service requests from being passed
     through it to the internal network.
   * Log its activities.
   * Be easy to administer.
   * Provide alarm mechanisms.
   * Preferably support SNMP.
   * Be configurable at the user, service, and IP host level.

Security Policy

If a firewall system will be deployed to secure the access to
the Internet, the configuration of the firewall system must
reflect the security policy of the organisation. The security
policy must address, at a minimum, the following questions:

     What is the policy on IP Addresses?
     Is the organisation's IP address space a registered IP
     address?
     Who is or will be the organisation's Internet service
     provider?
     What is the Internet service providers security
     policy? Is their network secure?
     Will firewall systems be used to secure the connection
     to the Internet?
     If so, what type of firewall system?
     What is the firewall system architecture?
     All entry and exit points to the Internet need to be
     identified. The firewall network architecture must be
     defined to control authorised inbound and outbound
     connections.
     What is the policy for inbound access to systems?
     Which specific protocols will be allowed to access
     nodes on the internal network?
     What is the policy on outbound access to nodes on the
     Internet?
     Do remote offices or branches connect to the home
     office?
     If so, are remote offices directly connected to the
     Internet or is their access to the Internet through
     the home office?
     If there is a direct connection between the remote
     office and the Internet, verify that if the security
     of the remote office is compromised, the security of
     the corporate network is not compromised.
     Are there external networks that are not trusted?
     Are there external networks that do need access to the
     internal network via the Internet?

3.8 Intrusion Detection Systems (IDS)

Do I need an Intrusion Detection System if I have a Firewall?

Yes, the main purpose with a Firewall is to protect against
unauthorised external attacks but it will normally leave the
network unprotected from internal attacks or intrusions. And,
Firewalls sometimes fail to protect from external intrusions
because:

   * It is hard to configure the Firewall properly
   * Hacker/Crackers can get some packets through most Firewalls
     and Firewalls don’t know what happens once someone gets
     through the Firewall
   * The software contains a software bug (software always has
     bugs)
   * Bad protocols can be blocked by the Firewall but HTTP is
     allowed through and 'hack' in HTTP will pass through
   * The Firewall can only protect against known problems

An intruder is somebody attempting to break into or misuse the
system. Intruders can be divided into two categories:

   * Outsiders Intruders from outside your own network who try
     to attack your system via dial-up lines, Internet, a vendor
     or other 'partner' etc.
   * Insiders Intruders that are authorised to use your internal
     network but are misusing their privileges.

There are different types of IDS. Two main types are:

   * Statistical detection The IDS looks for deviations from
     statistical measures to detect unusual behaviour. A set of
     variables is defined for subject and objects such as
     servers, files, users and other resources. A 'normal' value
     is set for each variable by looking at historical data or
     by setting expected values. When system activities occur
     the list of variables is maintained and updated for each
     subject or object.
   * Pattern (or Signature) matching detection This type of IDS
     compares activities against a collection of known attacks
     or a set of rules. The main idea is to watch for events
     that matches one of the patterns or violates the rules.

Why should I use a Firewall and IDS? Because most attacks come
from inside and every company or organisation needs a well
managed single point of entry as well. In addition, a Firewall
can keep hackers running automated intrusion programs out of the
internal network. Otherwise those programs can detect and
exploit holes in your security architecture. There is a lot of
information explaining different IDS on the Internet.

3.9 Incident Handling System

Even if you have installed a Firewall and an Intrusion Detection
System someone has to take care of an incident when it occurs
(not 'if' it occurs, because it will happen sooner or later). To
be well prepared is the best way to handle an incident. It is
very important to stay calm and not panic when an incident
occurs. It is very valuable to have a special form to register
incidents.

For example the SANS Institute has a step by step method for
incident handling and the latest information can be obtained
from the Internet at address ih@sans.org. Their method has six
stages:

   * preparation
   * detection
   * containment
   * eradication
   * recovery
   * follow-up

Preparation
This stage covers things like policy, management supports,
training and interfaces to law enforcement.

Identification
How to identify an incident, responsible staff, co-ordination
with network suppliers’ etc.

Containment
Create the on-site team to survey the situation. Backup of the
system. Risk determination (to let the system run) etc.

Eradication
Perform vulnerability analysis. Remove the cause of the incident
etc

Recovery
Restore the system. Validate the system etc

Follow-up
Develop a follow-up report.



4. Computer architecture
----------------------------------------------------------------

The main types of computer architecture are indicated below. In
many cases, the specific threats and risks to which a particular
system is exposed will depend on its architecture. However there
are a number of threats which can affect all systems,
irrespective of their architecture.

Main architecture types

   * Microcomputers
   * Network architectures and Mini-computers
   * Mainframes
   * Hand-held computers.

4.1 Microcomputers (stand-alone)

These computers have no facilities for permanent external
communications, apart from links to peripherals (e.g. printer,
scanner, streamer, extra disk drive etc.). Nowadays it is common
to have a modem and a temporary connection to the Internet.

This architecture is easiest to 'protect' but it is also the
architecture where the users are least aware of the possible
threats and risks. If it is connected to the Internet it can be
vulnerable to external attacks if it is not properly configured.
The user is responsible for back-ups, keeping media in a safe
place, protecting data from unauthorised access, etc.

Examples:  Personal Computer (IBM PC-compatible) - Desktop,
           Laptop
           Macintosh, Amiga, etc.



4.2 Network architectures and Mini-computers

A mini-computer is linked to several workstations to serve a
limited number of users. The workstations may consist of just a
keyboard and screen, or microcomputers (so-called 'intelligent'
terminals) may be used. Today, these mini-computers are often
referred to as 'servers' linked to their workstations through a
Local Area Network (LAN). Commonly known as client-server
architecture.

In many organisations the old mainframe architecture is now
being replaced with a number of 'servers' each of which has a
different set of functions. Connections from the LAN to Wide
Area Networks (WAN) are common.

The user is only responsible for backing up the files on the
hard disk on his own workstation (if it has one). One or more
administrators are responsible for all other back-ups, loading
new programs etc. Management of the network is normally left to
a Network Administrator.

Examples:    UNIX-systems, OS/2-servers, and IBM AS400
             Digital Micro VAX, etc.



4.3 Mainframes

Used in big organisations to serve a great number of users
and/or where considerable computing capacity is needed. A
special computer-room with air-conditioning is needed, too. This
is often located in a restricted area of the building and
specialists are required to operate the computer. Network
operators monitor the communication functions and assist users
if there are communication problems. System development and
programming is a task for specialised staff. The user is only
responsible for backing up the files on the hard disk of his
workstation (if it has a disk). Because of the very fast
technical development in the field of client-server it is today
not possible to clearly define the difference between mainframes
and servers.

4.4 Hand-held computers

This type of computer, like personal organisers, is completely
different from the others and is discussed in section 'Technical
devices & communications' in the Interpol Computer Crime Manual.
The most important prevention method is to keep the equipment in
a safe place and away from unauthorised persons.

5. Threats and crime prevention methods
----------------------------------------------------------------

This section gives examples of the threats that may occur. Some
may be encountered in all types of environment, others may only
occur with specific types of computer architecture.

The prevention methods mentioned are only given as examples. The
risk of the threat being activated must be assessed in each
organisation and depends on factors such as the company's
information policy, employees' awareness, etc.

In the following tables, the various threats to which a system
may be exposed are grouped according to where the information is
located in the IT process.

     READ/CREATE/MODIFY/DELETE refers to information (data
     and software) inside the computer system.

     TRANSPORT refers to information (data and software)
     'transported' via a network or on media.

     STORE refers to information (data and software) when
     it is stored on computer media and taken out of the
     computer system. (I.e. back-up tapes/diskettes).

5.1 Architecture-independent threats

There are a number of important 'architecture-independent
security targets':

   * Members of staff, with certain responsibilities, powers,
     information
   * Media handling
   * Malicious programs
   * Electronic Emission

5.1.1 Members of staff

Threat                          Prevention method

Disloyal staff                  See advice given above in
                                'Important IT security
                                functions'.
                                The strongest form of security
                                is often procedural security
                                with attendant staff awareness
                                and responsibility.

Unauthorised access to          Users should be given specific
information by users            written guidelines on what they
                                should and should not do.
                                Guidelines should be signed
                                for.

                                Install an 'Identification and
                                Authorisation' system. Adopt a
                                'two-man rule' for granting
                                privileges.

                                Do not reveal your password for
                                anyone.

                                Keep identification and
                                authorisation cards in a safe
                                place.

                                Regularly check logs.

                                Regularly check that
                                configuration is correct.

                                Install an Intrusion Detection
                                System.

                                See above, chapter 'Important
                                IT security functions'

Unauthorised access to          The same as above and:
information by system
administrators, programmers,    Use separate systems for
etc.                            program development and for
                                'production'.

                                Restrict access to equipment
                                with sensitive information;
                                adopt 'two-man rule'.

                                Restrict use of 'super
                                user'/'root' privileges.

Unauthorised access to          As for other staff and:
information by temporary
staff, e.g. consultants,        Limit their access to the
service engineers etc.          system to the time and day
                                required for the specific task.

                                Do not forget to cancel their
                                access rights and close their
                                temporary accounts.

                                Do not leave communication
                                lines for remote servicing open
                                when not needed.

5.1.2 Unauthorised access from external sources

Threat                   Prevention method

Unauthorised access      Install an 'Identification and
                         Authorisation' system. Adopt a
                         'two-man rule' for granting
                         privileges.

                         Regularly check logs.

                         Regularly check that configuration is
                         correct.Install a Firewall.

                         See above chapter 'Important IT
                         Security functions'

5.1.3 Media handling

Threat                         Prevention method

Total loss of information      Media should be kept in a safe
through theft of media         place under lock and key.

Loss (by copying or transfer)  Encrypt sensitive information.
of information as a result of  Staff handling the media should
unauthorised access to, or     not have access to the
loan of, media                 encryption keys.

                               'Two-man rule' for back-up.

                               'Two-man rule' for access to
                               archives.

Loss (by copying or transfer)  Never send equipment with
of information during          sensitive information on mounted
servicing                      media for servicing.
                               (It is not enough to 'Delete'
                               sensitive information because of
                               'Undelete /unerase'
                               possibilities)

5.1.4. Malicious program code

Threat                       Prevention method

Viruses and other malicious  Install 'Anti-virus software'. See
programs                     Chapter 'Investigations', Section
                             'Malicious program code' in the
                             Interpol Computer Crime Manual.

Programs altered to obtain   Depends on computer architecture.
access to, or manipulate,
information without          Use separate systems for program
authorisation                development and for 'production'.

                             If possible, restrict access to
                             'source code', 'compilers' and
                             'editors' in 'production' system
                             and restrict use or installation
                             of non-standard software packages.

                             An Intrusion Detection System
                             might detect this type of problem.
                             See above chapter 'Important IT
                             Security functions'

5.1.5. Electronic Emission

Threat                           Prevention method

Despite all precautions, it is   Use equipment with no or
still possible for a determined  limited signal leakage
intruder to eavesdrop on         ('tempest') or put the
information by picking up and    equipment in a shielded room.
interpreting electromagnetic     Although effective, those
emissions from the Personal      methods are expensive and are
Computer or workstation. In a    only to be recommended when
manner somewhat similar to the   there is an extremely high
way in which it is possible to   risk. Optical fibres can be
detect the operation of a        used to prevent emission
television receiver and          leakage from the lines running
determine which channel is       between peripherals and the
being watched. This type of      Local Area Network (LAN).
eavesdropping is most likely to
occur when very sensitive        Encryption of the Wide Area
information, such as that of     Network (WAN) will not stop
high commercial value or         electromagnetic emissions but
dealing with matters of          the eavesdropper will not be
national security is involved.   able to use the information
                                 without the encryption key.

5.2 Microcomputer (stand-alone, Personal Computer) systems

Much sensitive information is stored on personal computer
systems. The main risk is unauthorised access to that data, or
that the data may become corrupted or lost.

READ/CREATE/MODIFY/DELETE

Threat                        Prevention method

Corruption of files (program  Keep program diskettes
or data). A major cause of    write-protected at all times.
data loss and corruption is
the introduction of viruses   Do not keep data and software on
to computer systems.          the same diskette. Otherwise, if
                              software becomes corrupted or
                              infected, the data will usually
                              be lost as well.Making files
                              read-only will prevent them from
                              being infected by some viruses,
                              not all of them. All media should
                              be scanned for viruses before
                              use, preferably on a system
                              specially designated for the
                              purpose.

Unauthorised access of        Restrict physical access to the
information stored in the     Personal Computer, by locking the
computer                      door (and the machine if
                              possible) whenever it has to be
                              left unattended. Machines should
                              never be left switched on and
                              running, unless a reliable
                              software protection mechanism has
                              been installed.

Unauthorised use of the       As above.
computer

Malicious programs (i.e.      See Chapter 'Investigations',
viruses)                      Section 'Malicious program code'
                              in the Interpol Computer Crime
                              Manual.

Loss (by copying or           Never send equipment with
transfer) of information      sensitive information on mounted
during servicing              media for servicing.
                              (It is not enough to 'delete'
                              sensitive information because of
                              'undelete/unerase'
                              possibilities).

Theft of the computer         Restrict physical access to the
                              Personal Computer, by locking the
                              door (and the machine if
                              possible) whenever it has to be
                              left unattended.

                              Laptops are particularly at risk
                              when left unattended in hotel
                              rooms etc.

                              Use cryptography to protect
                              information from unauthorised
                              access.

TRANSPORT

Threat                           Prevention method

Loss of confidential or secret   Transport media in sealed
information during transport.    envelopes and/or locked boxes.

Manipulation of media during     As above and electronic seal
transport                        (cryptologic checksum) on
                                 information.

Total loss of media during       Never leave media unattended
transport                        in cars, hotel rooms etc.

STORE

Threat                   Prevention method

Loss (by copying or      Diskettes and other media should be
transfer) of             kept locked up in a safe place when
information              not in use.

Physical loss of         As above and it is advisable to
information              install removable hard disks, which
                         should be kept in a safe place.

Total loss of            Regular back-ups of data and system
information through      files are essential. Together with the
theft of computer        logging information, they will provide
and/or media             a comprehensive security information
                         package. For back-up guidelines, see
                         3.6

Loss (by copying or      See 'Architecture-independent threats'
transfer) of             above.
information as a result
of unauthorised access
to, or loan of, media

5.3 Network architectures and Mini-computer systems

Local Area Network (LAN)

If a Personal Computer is connected to a network, there are two
other possibilities for interfering with data, in addition to
the dangers of physical access to the machine (as mentioned
above).

Firstly, it becomes possible to access the information stored on
the Personal Computer via the network. Care should therefore be
taken to ensure networking software is correctly configured, and
that only that information which is intended to be generally
accessible is stored in directories which can be accessed via a
network.

Secondly, the danger of leaving a Personal Computer unattended
is much greater: not only can the data on the Personal Computer
itself be compromised, but there is also a risk that any data
which the rightful user of the Personal Computer may be able to
access over the network will also be compromised.

In a network environment, especially where sensitive material is
in use, it is essential to keep a central record of activity,
i.e. a log. This should be held on a machine that is known to be
secure, and should contain a record of ALL activity on the
network; there should also be a procedure for examining the log,
so that all suspicious events can be highlighted and
investigated.

Wide Area Network (WAN)

Networks are connected either by cable, by microwave or
satellite. The latter are vulnerable to interception as are any
radio transmissions unless the data is encrypted. The
transmission of electronic signals is governed by standards that
are called 'protocols'. There are many standards, the most
common is the TCP/IP which is the standard packet-switching
protocol used for the Internet. Such connection can be protected
against improper use or interception in various ways. The best
way is to use Identification, Authentication and Cryptography as
well as firewall and Intrusion Detection Systems (IDS).

Costs have also to be considered. Telecommunication companies
can offer the use of dedicated lines - as often used by
financial institutions, which means that these lines are not
available for normal public use and are protected against
intrusion, but they cost substantially more. This also applies
to encryption. There are a number of encryption standards and
devices ranging from small logical keys installed on sending and
receiving equipment to higher levels of coding which use
complicated mathematical cycles and algorithms. The decision to
implement such higher level systems will have to be taken in the
light of the value of transmitted data.

It must also be remembered that encryption is not an infallible
solution and that its use raises various problems, e.g. several
countries are developing, or discussing the development of a
specific law to regulate the use of encryption.

Even when communications are well protected, problems of
unauthorised access can occur if a well-protected system is
linked directly to another that is not protected. Any given
system is only as secure as those to which it is connected.

INTERNET

Victims of Internet attacks are often organisations that did not
bother too much about their security or who trusted some sales
person who said that the Internet connection was absolutely
safe.

A lot of safeguards are mentioned above and they are applicable
for the Internet as well. Some additions are :

   * Do not connect computers or entire networks, which contain
     your critical information (e.g. financial, confidential,
     privacy) to the Internet.
   * If possible restrict the way to the Internet to just one
     single point of connection.
   * Do not store your password or identification number on your
     hard disk, protect it otherwise from unauthorised access.
     Create a password policy (see chapter 3.4.1, identification
     - password systems).
   * Check and update your list of user accounts.
   * Install a firewall system and an IDS.
   * Do not download files or open emails which you do not
     trust.
   * Install an anti-virus-software and update it frequently.
   * Be aware of shared-files which might be accessed of
     unauthorised persons.
   * Be aware of cookies, Java and ActiveX applets etc.
   * Install only minimal options.

THREATS

READ/CREATE/MODIFY/DELETE

Threat                          Prevention method

Manipulations or unauthorised   See chapter 5.2. Microcomputer
access to software or           systems
information in each
workstation (Personal
Computer) in the network

Unauthorised access to          Users should be given specific
information in the 'server' by  written guidelines on what
users                           they are allowed and not
                                allowed to do. Guidelines
                                should be signed for.

                                Install an 'Identification and
                                Authorisation' system. Adopt a
                                'two-man rule' for granting
                                privileges.

                                Regularly check logs.

                                Regularly check that
                                configuration is correct. IDS
                                should be installed.

Unauthorised access to          As above and:
information by system
administrators, programmers’    Use separate systems for
etc.                            program development and for
                                'production'.

                                Restrict access to server;
                                adopt 'two-man rule'.

                                Restrict use of 'super
                                user'/'root' privileges.

Corruption of files (program    All media should be scanned
or data).A major cause of data  for viruses, preferably on a
loss and corruption is the      system specially designated
introduction of viruses to      for the purpose, before use.
computer systems.
                                Erase all unnecessary codes,
                                default and unused procedures.

Total loss of information       Regular back-ups of data and
through 'disk crash' or         system files are essential.
deliberate destroying of files  Together with the logging
                                information, they will provide
                                a comprehensive security
                                information package. For
                                back-up guidelines, see 3.6

Loss (by copying or transfer)   Some mini-server servicing can
of information during           be done 'on-site' but in the
servicing                       case of some hardware problems
                                the equipment will have to be
                                taken away for repair by the
                                service company/vendor.

                                Never send equipment with
                                sensitive information on media
                                for servicing without a
                                verifiable guarantee that the
                                information will be destroyed.
                                (It is not enough to 'delete'
                                the sensitive information
                                because of 'undelete' and
                                'unformatted' possibilities)

                                Remember that after repair,
                                the disk drives could be
                                reused somewhere else and your
                                information might be
                                compromised.

                                If it is decided to replace a
                                disk with sensitive
                                information, destroy it
                                yourself.

Theft of the server             The server should be kept
                                locked up in a safe place.

TRANSPORT in Local Area Network (LAN)

Threat                        Prevention method

Interception of cables        Segmentation of the LAN.

                              Use optical fibres.

                              Regularly inspect LAN.

                              Encrypt LAN.

Interception of networks      Restrict physical access to
components (like 'routers',   components.
'bridges', 'gateways',
'repeaters' etc.)             Regularly check that the
                              configuration of each individual
                              component is correct.

Manipulation of network       As above.
components

Unapproved workstations       The system should be set up in a
                              way that the management must
                              approve the workstations before
                              they can be used.

                              Regularly check that the
                              configuration is correct.

Network administrator         Network Administrators should be
accessing user files          given specific written guidelines
                              on what they should and should
                              not do. Guidelines should be
                              signed for.

                              Restrict use of 'administrator'
                              privileges.

                              Install an 'Identification and
                              Authorisation' system.

                              Adopt a 'two-man rule' for
                              granting privileges.

Access to the LAN from        Provide guidelines for the use of
'outside'                     modems or other connections.

                              IDS and firewall should be used.

                              Regularly check that the
                              configuration is correct.

TRANSPORT in Wide Area Network (WAN)

Threat                           Prevention method

Interception of cables           Communications can be
                                 encrypted, but there may be
                                 legal restrictions.

Interception of radio            As above.
communications

Intruders                        Use special modems at each
('hacking'/'cracking')           end, which recognise each
                                 other’s signals (mutual
                                 signal recognition).

                                 Install an 'Identification
                                 and Authorisation' system.
                                 Adopt a 'two-man rule' for
                                 granting privileges.

                                 IDS and firewall should be
                                 used.

                                 For password rules, see
                                 chapter 3.4., User
                                 Identification and
                                 Authorisation.

TRANSPORT of media

Threat                           Prevention method

Loss of confidential or secret   Transport media in sealed
information during transport     envelopes or locked boxes.
                                 Cryptography should be used.

Manipulation of media during     As above and:
transport
                                 Electronic seal (cryptologic
                                 checksum) on information.

Total loss of media during       Never leave media unattended
transport                        in cars etc.

STORE

Threat                        Prevention method

Loss (by copying or           Media should be kept in a safe
transfer) of information      place under lock and key.

                              'Two-man' rule for access to
                              archives.

Total loss of information     Regular back-ups of data and
through theft of media        system files are essential.
                              Together with the logging
                              information, they will provide a
                              comprehensive security
                              information package. For back-up
                              guidelines, see 3.6.

5.4 Mainframe-computer systems

There is normally some kind of access system to a mainframe via
terminals or a number of LANs with workstations, which will be
subject to the threats mentioned above. In that connection, see
5.1 (Architecture-independent threats), 5.2 (Microcomputer
systems), and 5.3 (Network architectures and Mini-computer
systems), as appropriate.

THREATS

READ/CREATE/MODIFY/DELETE

Threat                          Prevention method

Manipulations or unauthorised   Use separate computers for
access to software              system/program development and
                                'production'.

                                If possible, restrict access to
                                'source code', 'compilers' and
                                'editors' in 'production'
                                system.

Unauthorised access to          Users should be given specific
information                     written guidelines on what they
                                should and should not do.
                                Guidelines should be signed
                                for.

                                Install an 'Identification and
                                Authorisation' system. Adopt a
                                'two-man rule' for granting
                                privileges.

                                IDS and firewall should be
                                used.

                                Regularly check logs.

                                Regularly check that
                                configuration is correct.

Unauthorised access to          As above and:
information by system
administrators, programmers     Separate test/development
etc.                            systems from production
                                systems.

                                Restrict access to the computer
                                room. 'Closed shop' for all
                                other than those working in the
                                computer room.

                                Restrict use of 'super
                                user'/'root' privileges.

                                Cryptography should be used for
                                confidential information.

Corruption of files (program    Use 'checksums' on sensitive
or data) by malicious programs  software to make it possible to
                                control that it has not been
                                changed deliberately.

                                Erase all unnecessary codes,
                                default and unused procedures.

Loss (by copying or transfer)   Servicing of mainframe systems
of information during           is done 'on site'. In the case
servicing                       of hardware problems with disk
                                drives they should be replaced
                                and the faulty ones sent to the
                                vendor for repair, if possible.
                                They can later be used as
                                replacements, perhaps at
                                another site.

                                Never send equipment with
                                sensitive information on media
                                for servicing without a
                                verifiable guarantee that the
                                information will be destroyed.
                                (It is not enough to 'Delete'
                                sensitive information because
                                of 'Undelete' and 'Unformat'
                                possibilities).

                                Cryptography should be used for
                                confidential information.

TRANSPORT in Local Area Network (LAN)

Threat                         Prevention method

Same as above. See 5.3         See 5.3 (Network architectures
(Network Architectures and     and Mini-computer systems)
Mini-computer systems)

TRANSPORT in Wide Area Network (WAN)

Threat                         Prevention method

Same as above. See 5.3         See 5.3 (Network architectures
(Network Architectures and     and Mini-computer systems)
Mini-computer systems)

TRANSPORT of media

Threat                          Prevention method

Loss of confidential or secret  Transport media in sealed
information during transport    envelopes or locked boxes.
                                Cryptography should be used
                                for confidential information.

Manipulation of media during    As above and electronic seal
transport                       (cryptologic checksum) on
                                information.

Total loss of media during      Never leave media unattended
transport                       in cars etc.

STORE

Threat                        Prevention method

Loss (by copying or           Media should be kept in a safe
transfer) of information      place under lock and key.

                              'Two-man rule' for access to
                              archives.

Total loss of information     Regular back-ups of data and
through theft of media        system files are essential.
                              Together with the logging
                              information, they will provide a
                              comprehensive security
                              information package. For back-up
                              guidelines, see 3.6.

6. IT Security - International workgroups
----------------------------------------------------------------

The European Commission has recognised the need for a
comprehensive approach to information system security to protect
the individual, the business community and public
administrations against increasingly sophisticated threats and
combinations of threats.

Consequently, the Commission took the initiative of proposing an
overall 'framework' in which information security problems could
be assessed and an appropriate set of solutions identified and
developed.

The evaluation of the security of information systems has been a
key activity with regard to the implementation of a number of
the action lines. The European criteria ITSEC (IT Security
Evaluation Criteria), and associated methodology (ITSEM), has
been the subject of many of the INFOSEC projects. The art of US
evaluation criteria (TCSEC, Trusted Computer System Evaluation
Criteria) is commonly known as the 'Orange Book'. A new standard
– the CC (Common Criteria) – has been adopted as new
international standard and will replace ITSEC and TCSEC in a
period. However, ITSEC and TCSEC will be used parallel with CC
for some time.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH