5 hours 20 minutes

Video Description

This lesson covers enterprise risks in databases which consists of: - Code injection - Scripting - Aggregation - Inference - Entity, semantic and referential integrity There are also enterprise risks in utilities which consist of: - Power - HVAC - Humidity - EMI - RFI The unit also covers enterprise risk in network components and users. Finally, the instructor offers a brief summary of the key points of the entire model: - Risk assessment overview - Risk assessment techniques and tools - Evaluating current controls - Risk and control analysis - Risk analysis methods - Enterprise architecture risks

Video Transcription

all right now, in considering continuing our ah assessment of risks within the enterprise, one of the risks that we have to think about is the potential for harm to our databases and the old joke. Why drop the bank? Because that's where the money is. Same idea applies to database. Why would you target a database? That's where the data is.
And, of course, as an attacker. That's what's appealing to me. Whether I'm after credit card information,
proprietary company information, whatever it may be, it's stored in the database. So when we think about databases, several different attacks, we wanna look at code injection scripting those two can kind of come together aggregation and inference. So when we talk about code injection,
ah, garbage in garbage out.
And the way people input the information into a database is through the use of forms. So, for instance, if I ask you to fill out a customer satisfaction survey on the Internet where you input your information is called the database form and what happens with that information in the form that you input goes to the back in database?
Well, if I don't do some sort of analysis of what? The general public
inputs. Then I would take anything the public inputs dump it into my database, and I can wind up with corrupt information. I can wind up with inconsistent information, but much, much worse is code injection. If you can input it and it can go to the back, end the database with processes.
And you do not have to be a sequel expert to know that the command drop tables
Not gonna be very helpful from a database perspective. Right? So what do we do with you? Input. Validation. Which means I'm on Lee going to allow you to input the bare minimum. And if you think about if you go to a website, you make a purchase.
And they asked how many items she want. They don't give you a text box where you type in one or I would like one item, please. Why? That's way too much freedom for me as an unknown entity. So what did they do? They give me a drop down here. Oh, there's not a lot of damage I can do by clicking the number one right.
So ultimately that's input validation. I am forcing you to inner
information in the proper format. As a matter of fact, if you've ever done in the study on security, architecture and design, one of the things they talk about a lot is they talk about security models and security models are concepts on which systems are designed.
And there's one that's my personal favorite called the Clark Wilson Security Model. And the Clark Wilson security model essentially says you can enforce well formed transactions through the use of the access triple. That's kind of it. In a nutshell. What does that mean? What that means is keep users out of your stuff
or they'll break it.
A so four shoes er's who are untrusted through an interface that is trusted
before they access your back in data, which is precious to you. Keep users out of your stuff. They will break it.
That's why we don't give users the password to our databases and say, going in there and enter whatever you want, right. They get a front end application that's very tightly controlled. Other things that are important not just to regulate on give them drop down errors whenever possible, regulate field size.
There's not a whole lot of damage I can do in two characters.
You give me 500 characters. We've got all kinds of problems that could be calls.
We also want to scan the input for things like data control language. Like I said,
nobody's last name is Johnny. Drop tables, right? We shouldn't have brackets in our name. So those things that are very common from a code injected objection Ah, code injection standpoint. We've gotta scan for We've gotta check those
aggregation and inference. Aggregation is the collection of information.
Once that information is collected, I can then make an inference. So the idea is, if I walk into your office and I see your roll index because really a Rolla Dex is a database and a very pure and simple form.
I see a whole lot of customers. Some have gold stars. Some have
brown stars, black stars. Whatever I may may make an inference about the value of those customers based on the color of the stars, for instance, and with database is one of the problems is one of the big problems that we would think about with databases
is sometimes you have to allow users access to information of course,
and that information may not seem significant. But if I give you enough low level, significant information, you might be able to pull that together and make a high level assumption. I'll give you an example.
I went out to lunch with some friends of mine, and ah, one of my friends kind of scooted into me. So I knew she had some good gossip for me. So I like to perk up my years. I just want to go on record as saying I am not a gossip,
but I will listen, I've always I've always got time to listen.
So she scooters in and she says, Hey, did you know Holly was pregnant?
And I said, No, that's great news. When did she tell you
and the answer totally crack me out because she said, Oh, she didn't tell me.
Well, how do you know?
she went out to dinner with us last Friday night,
and she didn't drink a thing.
that's not all. She went to the doctor last week.
That's not all that significant. That's not all. Ah, Karen saw her in the bathroom Tuesday morning, and she was sick, as she could be.
So what we have is we have an aggregation attack. All of these seemingly unrelated pieces of information. Ah, good gossip watches. And we'll pull that information together
when analyzing all the seemingly unimportant bits of information. When you pull it together, you can come to the conclusion of something in a much higher level of classification. Because we'll see instances like this in the military. If I give too much unclassified information, put too much out there,
someone might be able to pull that together
and make an assumption that I actually want to protect
the interesting thing about all this is my friend Holly was pregnant. So what? That shows you is sometimes aggregation and inference work.
Now, my friend Holly, if she really didn't want this information disclosure, she had two choices.
The first choice is she could have just said none of your business.
Okay. How come you're not drinking tonight, Holly? None of your business.
Uh, where have you been? It's kind of late for you to be getting in None of your business.
The problem is when I say it's none of your business to a gossip, that's like game on, right? That means. Oh, this is interesting. I'm gonna do a little more digging,
just like in the military when we label something top secret.
Oh, that tells me that is of a certain value. Just the label itself indicates this is no warning. This is important.
So, honestly, what Holly should have done is just lied.
I'm not encouraging. Lying. As a matter of fact, when I'm gonna call it lying, we're gonna call it Polly in Stan, she ation right off the bat. That sounds much better, right? Much better than lying. Polly in Stan, she ation multiple instances because of Holly had just said, Yeah, I'm not drinking because I'm a designated driver. Later, nobody would have given it a second thought
rather than saying she came back from the doctor. Say I came back from the dentist or I had an appointment, right? So the idea with Polly and Stan she ation and using that to protect information in our databases? Let's say I work in a naval base and I see a ship that's getting prepared. They're loading it up.
Ah, and I'm aware that it's it's gonna be leaving shortly.
Well, if I look at that information, and I see the location of the ship is top secret
right away. That tells me this is significant. Something meaningful is happening here.
But if instead as an unclassified individual, if I log onto the system and I'm given a view that says the ship is bringing food off the coast of Africa,
that's not particularly interesting to me. It's satisfied my curiosity case closed,
but someone with top secret clearance could log on to that database and see that it's actually bringing munitions somewhere out in the Middle East.
So what we have is multiple instances, and that's one of the ways that we can protect the sanctity of the information in our database.
There are lots of other things that we can do these air just a couple of ideas that we want to think about with databases as well. One other idea, and it's actually not on the slide. But I'll mention this to you.
Anything that I store in a database.
Let me back up on that personal information that I've stored in a database. I have an obligation to protect right personally identifiable information I've got to keep safe. It's appealing two Attackers
so some ideas around that
if you don't need it, don't store it
minimize it. So, for instance, I may ask for your credit card, your Social Security number. I'm a bank, and I want your Social Security number when we set up your account.
If I store that, I gotta protect it.
But if I just store the last four digits, I can use that his authentication information and that doesn't have the same value to an attacker as your full Social Security number. We refer to that as data minimization. So yeah, that's not on the slide. And quite honestly, that's not even a testable idea.
But just when we're thinking about risks and we're thinking about strategies to protect our databases,
those are some ideas. Okay, now gonna move on to utilities. Don't forget the world of utilities because,
first of all, risk management isn't just a IittIe facet, but second of all, man utilities play a huge part in providing clean power and a clean environment to our computing systems. So issues with power, too much power, not enough power. So what I have over here are some problems with power,
short term and long term.
So when we talk about a big increase in power, that's a spike. If it's a very short term, that is a surge. SAG is a temporary dip.
Brownout is much more long term fault. I always feel like the fault is when you're at work and the power flickers just long enough to let you think maybe we'll get out of work for the day
blackout. It's obviously much longer
H vac system heating, ventilation and air conditioning. We've got to think about. We want positive pressurization in our room so that air flows out. Contaminants flow out.
Humidity in a data center is very important. You wanted somewhere around 50% temperature in a database, or I'm in a data center or in your server room. And it's so important.
We want protection against electromagnetic interference and radio frequency interference as well. So utilities again can present a risk network.
You know, the network infrastructure itself, the equipment that we use their many types of attacks that are specifically directed towards switches and routers, proxy servers, network service is let me just tell you so we could spend a week talking about network components and the vulnerabilities and the configurations
from a C risk standpoint,
just some common basics. Okay, for any device, you always want to make sure that if a service isn't required, it's removed,
Right? So, for instance, maybe I have a device that supports both I p version for and I p version six. Well, if we don't use I p Version six on our network, we may want to consider removing it from our devices. Now, please understand when I talk about getting rid of unnecessary service is unnecessary protocols.
By no means
would I ever advocate doing that without going through the change control process. Because certainly in a Microsoft environment, you may not feel like you need i p six for your day to day. But so many service's rely on that being installed when you pull that off, and all of a sudden, hey, why is
branch cash not working? Or why's this element not working or another?
It comes back to I p. Version six. The importance of configuration management and change control cannot be overstated. So as a general rule, when you find elements that are not being used on your router switches, servers, whatever
start the process to examine whether or not they can be removed.
Change default settings. Ah, for a long time with certain devices. I believe Cisco's default administrative account was admin for a while, and the password was either password or Cisco or something very generic. And, of course you got to get into the box to set up the initial configuration.
I am stunned at the number of people that don't change those default settings, right.
You gotta change the default settings most of time of your usual link cysts or Netgear router, and a lot of small companies do. You can access that device at http 1921681.1 worth a try. Go ahead and give administrator a try and password to try for the password and that will work.
We gotta change those default settings.
Physical security. Don't forget. Lock your devices up. I was out at a shopping center the other day. Um, I think it was a A photo store. I was getting some pictures of my kids done something like that. At any rate,
I went to the restroom and I kid you not in the restroom on a shelf with their router, and they had the connections into the router. Little Link says Netgear route or something like that. And that's not really what we could would consider good security.
I could have walked out of there with a router. I could have reconfigured. I have done all these things.
again, it's not that necessarily. I would even be targeting this little photo shop in the mall,
But systems could be commandeered. Tow launch, downstream attacks.
Think about the information that was going through that router. So I give my credit card to pay, make a payment for the photos or whatever that information's going somewhere. Probably threw that unsecured router sitting in the bathroom, So we've got to make those just good common sense decisions. Some cable types are more secure than others.
Twisted pair is very easy to tap into. Its very susceptible to interference.
Um, fibers expensive though the cost of fibers coming down significantly so that maybe more viable option.
So many vulnerabilities come from the network. Absolutely. We gotta take care of our devices
enough set. Let's move on. Just getting users present a tremendous threat to the organization, and I was reading an article, and I'm just roughly what it says is 20% of your users will do the right thing because it's the right thing to do.
20% of them are just
absolutely beyond reproach. Regardless,
20% of users are going to see if they can find a way to get away with a little something
and the rest fall somewhere on a continuum.
So the idea is most people, the majority of folks, if there's enough pressure
and they get an opportunity and they have that ability to rationalize
many users that you wouldn't necessarily think would be involved in some fraudulent activity can be persuaded,
you know, think about pressure,
man. I'm on three months behind on my mortgage. All of a sudden I have access to a system, and maybe I could squirrel away just a couple of dollars from all these users.
1000 users there are gonna missed $3 from their bank account. They got that money to spare. There's your rationalization so those elements can come together and fraud could be anything from falsifying time sheets, salami attacks or what? I was just talking about taking a little bit of money. Ah, little bit of the time.
A term you may not be familiar with. It's called data diddling.
Um and I don't make these terms up. By the way, let's say you come through the drive thru Taco Bell and I tell you, Ah, this is gonna cost $5
and I ring it up his 50 cents and I pocket the other 4 50 That's Daddy's diddling. The benefit of that is, at the end of the night, my till was gonna come up right?
So can be difficult to track.
Hell hath no fury like a disgruntled employee, and I have story after story after story, and I'm sure many of you have your own stories. We have to have a good, solid process and set of procedures in place
to make sure that if there is a termination of an employee that it's handled gracefully and professionally and not to say the least securely so users can certainly present threats to us. So that was the data assessment element. We talk about assigning values to our risks.
Ah, and the idea behind that is that once we know the value for our risk,
ideally, we'd like a dollar value of the risk that will tell us the potential for loss and that will guide us in our decisions for risk mitigation, which is gonna be the next section. So we've done risk identification, enumerate the risks,
risk assessment, figure out a value forum. Our next step is gonna be respond to them.

Up Next


Archived Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor