NETWORK SECURITY

Transcription

NETWORK SECURITY
NETWORK SECURITY
From risk analysis
to protection strategies
Istituto Superiore delle Comunicazioni
e delle Tecnologie dell’Informazione
Ministero delle Comunicazioni
NETWORK SECURITY
From risk analysis
to protection strategies
The present document was written by:
Fabio Battelli
Danilo Bruschi
Roberta Bruzzone
Giuseppe Carducci Artenisio
Sebastiano D'Amore
Luisa Franchina
(Innovia Tech S.p.A.)
Salvatore Leotta
Paolino Madotto
Antonio Menghini
Simona Napoli
Gian Luca Petrillo
Daniele Perucchini
Massimo Piccirilli
Francesco Pirro
Gianfranco Pontevolpe
Andrea Rigoni
Marco Strano
Andrea Valboni
(Electronic Data Systems Italia S.p.A.)
(Università degli Studi di Milano)
(Innovia Tech S.p.A.)
(Securteam S.r.l.-Elsag [Gruppo Finmeccanica])
(PricewaterhouseCoopers Advisory S.r.l.)
(Istituto Superiore delle Comunicazioni
e delle Tecnologie dell’Informazione)
(Proge-Software S.r.l.)
(Electronic Data Systems Italia S.p.A.)
(KPMG S.p.A.)
(Consigliere del Ministro delle Comunicazioni)
(Fondazione “Ugo Bordoni”)
(Ministero delle Comunicazioni)
(CNIPA)
(CNIPA)
(Symantec S.r.l.)
(Polizia di Stato)
(Microsoft S.r.l.)
Cover and graphic project
Roberto Piraino (Graphics Lab - Istituto Superiore
delle Comunicazioni e delle Tecnologie dell’Informazione)
Editing Fonema S.p.A.
The present document has been reviewed
by Alessandro Di Nepi PhD
I
SECURITY NETWORK
from risk analysis to protection strategies
The opinions and considerations expressed in the present volume, in addition to the proposals set forth, are to be considered personal views of the
individual participants and do not necessarily reflect the positions of the
respective Bodies and Companies they belong to.
The contents of the present volume are to be considered merely as a technical/scientific study orientating to the problems inherent to the network security and communication protection.
Therefore, no responsibilities may be attributed to the authors or to the
Istituto Superiore delle Comunicazioni e delle Tecnologie dell'Informazione
that has published the volume, arising from any form of use of the contents
of the present text.
Mention of specific brands or product names present in the document are
quoted purely as examples, do not exhaust the number of possible commercial products and in no case represent evaluation elements or recommendations for the use of the same products.
The present volume is distributed free of charge and the authors have freely and with no time limit granted copyrights to the Istituto Superiore delle
Comunicazioni e delle Tecnologie dell'Informazione.
II
NETWORK SECURITY
From risk analysis
to protection strategies
Index
Introduction
7
Reading guide
13
1 Networks and Society
1.1 The network concept
1.2 ICT as a tool for the social and economic
development
1.3 The various types of network as premise
for Internet
1.4 The main subjects involved in network management
1.5 Security and privacy: two key aspects
1.6 The importance of the human factor for security
17
17
1
18
22
25
30
33
SECURITY NETWORK
from risk analysis to protection strategies
2 Network infrastructures and security issues
2.1 The network concept: physical and virtual
components
2.2 The network and its subjects
2.3 Network security
2.3.1 General overview of threats to security
2.4 An example of a secure network: the PA Unified Network
2.4.1 Technological infrastructure: network design
2.4.2 Security management
2.4.3 Network evolutions
37
37
39
41
56
3 3 The relevant legislation
3.1 The Reference General Legal Framework
3.1.1 Generalities
3.1.2 OECD And United Nations documents
3.1.3 EU Directives and other documents
3.1.4 Italian Laws and related rules
3.1.5 Ministerial documents, AIPA, CNIPA
65
65
3.2 Individuals And Rule Compliance
3.2.1 Generalities
3.2.2 Major liabilities for individuals: rights,
duties and accomplishments
3.2.3 The relationship with the judiciary
and inquiring authority
77
3.3 Cases Of Rules Violation
3.3.1 Information crimes
3.3.2 Non-compliance
3.4 Main Requirements of outsourcing contracts
3.5 Areas of possible normative integration
3.6 Conclusions
3.6.1 Users’ awareness and initiative
3.6.2 Legislative framework
82
2
83
86
86
Index
4 Risk Analysis and management: principles and methods
4.1 Security Management System
4.2 4.2 Risk Analysis
4.2.1 The importance of risk analysis
4.2.2 General notes about the different risk
analysis methodologies
4.2.3 Common elements among the main methodologies
4.2.4 Risk Management
4.2.5 Risk Analysis Support to the Privacy
Management System
91
91
93
5 Network Protection Measures
5.1 Technological measures
5.1.1 Firewall and VPN
5.1.2 Network/Host IDS
5.1.3 Access Server (RADIUS/TACACS)
5.1.4 Wireless Security
5.1.5 Antivirus
5.1.6 URL Filtering
5.1.7 Patch Management
5.1.8 Cryptography and Public Key Infrastructure
5.1.9 Single Sign-On (SSO)
5.1.10 Strong Authentication
5.1.11 User Provisioning
113
113
5.2 Organisational and process measures
5.2.1 Disaster Recovery and Business Continuity
5.2.2 Identity Management
5.2.3 Operational Security Management
137
3
SECURITY NETWORK
from risk analysis to protection strategies
6 Security Governance in the Public Administration
and Private Companies
6.1 Security governance as a factor of social
Guarantee for the networks use
6.2 Implementation of security governance
in the organisations
6.3 Network security, a national and
european asset to be promoted
Appendix 1
Appendix 2
Appendix 3
157
157
160
162
165
171
199
4
Index
NETWORK SECURITY
From risk analysis
to protection strategies
Index of Figures and Tables
INDEX OF FIGURES
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
Figure 2-6
Figure 2-7
Figure 4-1
Figure 4-2
Figure 5-1
Figure 5-2
Diagram of the ISO/OSI stack model
Servers equipped with protection measures
Use of security products within EU
Virus occurrences in the EU between
October 2000 and February 2001
RUPA general architecture
CG-I and services categories – CG-I
connects all the Central Administrations
and allows them the Internet access
through a high speed and secure link
SPC: Infrastructure, Rules
and Organizational Model
The most common vulnerability categories
Risk Management Life Cycle
ISO/OSI Levels and Protection Technologies
Firewall and Networks
5
39
43
46
50
57
59
63
104
108
114
115
SECURITY NETWORK
from risk analysis to protection strategies
Figure 5-3
Figure 5-4
Figure 5-5
Figure 5-6
Figure 5-7
Figure 5-8
Figure 5-9
Figure 5-10
Figure 5-11
Figure 5-12
Figure 5-13
Figure 5-14
Remote Access Server
Wireless Network equipped with
a RADIUS Authentication Server
Architecture of a URL Filtering Solution
Typical Patch Management Architecture
Typical Single Sign-On Architecture
Authentication Techniques
OTP Devices
Digital Certificates
Smart Card and USB Token
Biometric Technologies
Provisioning Architecture
for an Identity Management System
Alternative Solutions Diagram,
Costs vs. Implementation Time
119
122
124
126
130
132
133
134
135
135
136
141
INDEX OF TABLE
Table 3-1
Table 4-1
Table 5-1
Table 5-2
A Comparison between the OECD
document and the UN Resolution
Relation among threats,
attacks and vulnerabilities
Predominant Firewall Technologies
Synoptic Table of Strong Authentication
Technologies
6
69
106
116
132
NETWORK SECURITY
From risk analysis
to protection strategies
Introduction
The present volume arises from an initiative by the Istituto
Superiore delle Comunicazioni e delle Tecnologie dell'Informazione
and of the Observatory for the Security and Protection of Networks
and Communications, with the collaboration of authors that belong to
various public and private bodies.
The Istituto Superiore delle Comunicazioni e delle Tecnologie
dell'Informazione (Institute in the document’s remaining), constituted
in 1907, operates within the Ministry of Communications as a technical-scientific body. Its activities, which are specifically aimed at companies that operate in the ICT sector, to public administrations and users,
mainly relates to the regulation, experimentation and basic and applied
research, and to specialist training and instruction in the field of telecommunications.
The national and international technical regulations bear an
important role to ensure greater transparency and access to services, in
favour of users, producers and network providers, and within which
the Institute is active and propositional.
In this field the Institute has a double action: through CONCIT (Coordinating committee with European recognition, and made
up by CEI (Italian electronic committee), UNI (Italian national unification body and by the same Institute) conducts the transposition into
the national regulations of European norms and, at the same time,
represents the Administration in addressing and supporting national
7
SECURITY NETWORK
from risk analysis to protection strategies
groups within the various technical commissions and study groups of
the ITU (International Communications Union), of the CEPT
(Conférence Européenne des Postes et des Télécommunications) and
of ETSI (European Telecommunications Standard Institute).
The Institute manages the Scuola Superiore di
Specializzazione in Telecomunicazioni (active since 1923), which
manages the post-graduate specialisation in the field of electronic
communication and information technologies, and releases the related
diploma. In agreement with the faculty of Engineering of the Rome
Sapienza University, the School organises yearly courses the curricula
of which include laboratory work, seminars and stages.
The Institute also provides upgrade training for Ministry and
other public administration personnel in the field of electronic communication and information technologies, security, multimedia and
Quality of Service, by planning and realising training aimed at acquiring specialist know-how. In this view the Institute has set up a Test
Centre, credited with AICA for the issuing of European Computer
Driving Licence - ECDL.
Moreover, the Centre for the training of PA personnel in the
field of ICT security is currently being constituted.
The training Centre will implement large scale training and
sensitisation activities for PA employees on matters concerning ICT
security, through the centralised and coordinated preparation of a
Training and Sensitisation Plan that will spread the principles and
methods of security throughout the Public Administration.
Moreover, the Institute promotes divulging activities through
external communication events and publicises the activities and research conducted.
The Institute's research activities are oriented to the development and improvement of telecommunication services and of those
connected to information technologies. In pursuing these aims, activities cover all the areas in the sector, from telephone to television, from
signal processing and treatment, from network architecture to services
8
Introduction
implementation.
In view of the know-how and instrumental resources it has
available, the role of the Institute is relevant in taking part in European
projects for technological development for a more diffuse employment of European funding. These activities are both directly conducted, and through agreements with other Research Bodies, Universities
and International Study Centres.
Within the Information Society context, the actions being conducted in collaboration with the Fondazione Ugo Bordoni (FUB) in
the fields of telework, information security, remote-teaching and
access to communication services for the aged and disabled.
Thanks to the Institute's support, in the last years, the Ministry
has also been able to support a series of initiatives for the introduction, on communication networks, of new technologies and new
systems. Among these, we should highlight the feasibility studies for
the application of techniques and new television and multimedia services, the feasibility study for the macro-regional provisioning of digital satellite television services, the study for a European satellite system
for the provisioning of broadband multimedia and interactive services,
and the participation in the IST (Information Society Technologies)
research and technological development project of the European
Community called ATLAS.
Considering its role as an impartial public body, the added value
of the Institute, in terms of guarantee and competence, is the aspect
that distinguishes the technical support and counselling services provided to companies and subjects involved in the telecommunications sector. These services are made substantial not only by the traditional certification activities, realised thanks to the competence and instruments
of the Institute's laboratories that allow to verify the compliance of all
telematic systems to the various norms and reference recommendations, but also with specialist measurement campaigns for verifying the
Quality of Service (QoS), of network security and for assessing the
specific techniques of inter-operativeness of services within the scope
of inter-connection of the networks of various operators.
9
SECURITY NETWORK
from risk analysis to protection strategies
The Institute manages the database relative to the number
assignment of the national telecommunication network and the portability of numbers in GSM and UMTS technology, moreover, it manages the National Reference Clock (ONR) for the synchronisation of
the Italian Numerical Telecommunications Network and provides an
institutional support to those taking part in tender bids for the E-TEN
(Trans European Network for TLC). The Institute collaborates with
Certification Bodies for activities of verification and control of
Company Quality Systems in compliance with the UNI EN ISO 9000
rules, and is committed in control activities on Credited Laboratories
on the basis of the UNI CEI EN ISO/IEC 17025 rules and is a
Registered Body for activities conducted on the basis of the Law
Decree n° 269 of the 9th May 2001. The Institute has the role of
Certification Body for systems and commercial information products
security (OCSI) and is an evaluation centre (Ce.Va.) of ICT systems
and products that process classified data. Moreover, it is a Registered
Body in compliance with the Directive concerning radio devices and
terminal equipment for telecommunications and is Competent Body
and Registered Body relatively to electromagnetic compatibility. In
2002 it became international Certification Body on behalf of TETRA
MoU.
The present text was also realised with the contribution of
experts from the Observatory for the Security and Protection of
Networks and Communications.
The Observatory for the Security and Protection of Networks
and Communications is chaired by the Secretary General of the
Ministry of Communications and is made up of representatives from
the Ministry of Communications, of Justice, of the Interior, of
Defence, of Productive Activities, and the Presidency of the Council
of Ministers - department of Public Functions and department for
Innovation and Technologies, nominated with a specific inter-ministerial decree.
The present volume falls within the scope of activities conducted by the Communications Ministry during 2004 related to the
realisation of guidelines for:
10
Introduction
• Network security - risk analysis and protection strategies
• Network security in critical infrastructures
• Quality of Service in ICT networks
The purpose of the document, as detailed further in the following reading guide, is to provide an updated overview of the security
problems and related solutions in the use of the Internet and of connected geographical and local networks.
This volume is aimed at business users: professionals and professional firms, small and medium enterprises, and corporations. In the
case of professional firms and small and medium enterprises, there is
often no position dedicated to security: at best there is an ICT manager. Many of the chapters of the present volume are dedicated to this
position. For corporations the volume is aimed at the manager in charge of security. In all cases we hope that some parts will also be read by
top management in order to make them sensitive to the problems and
to distinctly perceive that the solutions do exist and can be sustained.
Further on, in the Reading Guide, there is a map that can
address readers to the paragraphs that they may be interested in.
The management of security starts from the knowledge of the
internal set up, critical issues and vulnerabilities. Through the proper
knowledge of one's structures and characteristics the investments in
security can be optimised, targeting the objectives and obtaining the
best results in terms of efficiency and effectiveness.
We want to thank all those, who with enthusiasm and professionalism, collaborated in the writing of the present document: Fabio
Battelli (Innovia Tech SpA), Danilo Bruschi (Università degli Studi di
Milano), Roberta Bruzzone (Innovia Tech SpA), Giuseppe Carducci
Artenisio (Securteam Srl - Elsag [Finmeccanica group]), Sebastiano
D'Amore (PriceWaterhouseCoopers Advisory Srl), Salvatore Leotta
(Electronic Data Systems Italia SpA), Paolino Madotto (Proge
Software Srl), Antonio Menghini (Electronic Data Systems Italia SpA),
Simona Napoli (KPMG SpA), Gian Luca Petrillo (Counsellor of the
Ministry of Communications), Daniele Perucchini (Ugo Bordoni
11
SECURITY NETWORK
from risk analysis to protection strategies
Foundation), Massimo Piccirilli (Ministry of Communications),
Francesco Pirro (CNIPA), Gianfranco Pontevolpe (CNIPA), Andrea
Rigoni (Symantec Srl), Marco Strano (Polizia di Stato), Andrea Valboni
(Microsoft Srl).
We also want to thank, for their contributions and suggestions:
Michele Boccadoro (Consorzio Thyraeus), Maurizio Bonanni
(Ministry of Communications), Stefania Caporalini Ajello (Consorzio
Thyraeus), Andrew Christian Dell (Consorzio Thyraeus), Renzo
Dell'Agnello (Elea SpA), Andrea Mariotti (KPMG SpA), Dario Nasca
(Symantec Srl), Claudio Petricca (Istituto Superiore delle
Comunicazioni e delle Tecnologie dell'Informazione), Giampaolo
Scafuro (Sicurezza e Sistemi Srl), Mario Terranova (CNIPA).
Rome, March 2005
Luisa Franchina, PhD
General Director
of Istituto Superiore delle Comunicazioni
e delle Tecnologie dell'Informazione.
12
NETWORK SECURITY
From risk analysis
to protection strategies
Reading Guide
The present document intends providing readers with a full
range framework relative to the process required for network security.
Modern ICT architectures are characterised by the quality of being a
network themselves that are in turn connected to wider networks and
to the Internet itself. These infrastructure features that have caused a
revolution in the information society during the past decade, leads to
high vulnerability that needs to be confronted through appropriate
protection systems.
This great interconnected system features the participation of
heterogeneous subjects: corporations, small-medium companies, organisations, government bodies, and private citizens. Each of these, that
exploit the network services, has an important role in ensuring the
security of the infrastructures, of the information and of related processing.
The first chapter - “The social structure of networks” - describes the current society and its features of dependency on information.
The birth and development of the Internet, the peculiar management
system that characterises it and the more general security and privacy
requirements that the citizen of the information society feels the need
of are recall.
13
SECURITY NETWORK
from risk analysis to protection strategies
The second chapter - “Network infrastructures and
security issues” - more technically describes the features of a network,
the correlated security criteria and concludes with an example of a safe
network identified in the Unit Network for the Public Administration.
Such a socially useful technology, which is also intrinsically critical, like ICT has obviously attracted the attention of legislators during the past decade. Justified by the large number of sectors of
social, economic, cultural and administrative life involved in the processing of electronic data, and prompted by EU regulations, a number
of directives have been issued to regulate and, in many cases, prescribe the use of protection mechanisms based on technologies and organisations aspects. An overview of the official documents issued by our
country and at EU level regarding information security is outlined in
the third chapter “Pertinent legal rules”.
The fourth chapter, “Risk analysis”, is dedicated to an
aspect that has recently been considered by experts and also by the
legislators, both European and Italian. The proliferation and rapid
evolution in time of the threats has led to the need to identify the
actual critical aspects of the assets to be protected, through a consistent approach, in order to appropriately address resources focusing
them on the more critical areas both from an economic and ethical
viewpoint. Risk analysis is also the basis for a modern way of approaching security, based on proactivity and a periodic review of risk levels
and critical assets. It is, in fact, through the analysis and management
of risks that countermeasures are identified and monitored in time.
The fifth chapter - “Technologies and tools for the protection
of networks” - illustrates the ingredients required to design a protection system, downstream from the previous risk analysis and management of risks. It is divided into two parts: the first deals with the hardware and software technologies and components, while the second
deals with services, which may be in-house or third party.
Lastly, the sixth chapter - “Governing security in PA
and the private world” - puts together all the topics dealt with within
14
Reading Guide
the scope of an ethical-political view of network protection, considered as one of the basic components of the more general concept of
Corporate Governance, a subject that, as is known, has become of
great relevance for all, including legislators, during the past years.
The present document, a picture of the current scenario, includes hypotheses and prompts for future improvements as a
useful resource for those who wish to confront and check their knowhow, in addition to being a source of stimulus and promotion for the
sensitisation for network security for the various subjects involved and
to identify improvement and progress opportunities from the technological and organisational viewpoint.
The following table addresses the various kinds of readers to the chapters that potentially feature the greatest interest for
their activities.
15
SECURITY NETWORK
from risk analysis to protection strategies
Top
management
ICT
Manager
Security
Manager
S/M Enterprises
& Professionals
PA
1.1
1.2
1.3
1.4
1.5
1.6
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
2.1
2.2
2.3.1
2.4.1
2.4.2
2.4.3
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.2.1
3.2.2
3.2.3
3.3.1
3.3.2
3.4
3.5
3.6.1
3.6.2
3.6.3
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
Legislators Legal Office
1
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
2
3
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
H
4
4.1
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
5
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8
5.1.9
5.1.10
5.1.11
5.2.1
5.2.2
5.2.3
6
H
H
16
NETWORK SECURITY
From risk analysis
to protection strategies
1 - Networks and Society
1.1 THE NETWORK CONCEPT
The term network, considering the great increase in the interconnections among computers during the past decade, has taken on a
rather broad significance that, in some contexts, has replaced the
acronym ICT (Information and Communication Technology).
With this meaning (that is extensively adopted within the present document and, especially, in the present chapter) networks are
interconnection structures (with the various wired and wireless technologies) and also the diverse machines, both hardware and software,
which are the objects of the interconnection between systems that
support the very interconnection. By extension, and to confirm the
title of this chapter, users are consistently a part of the network.
On the other hand, next to the holistic definition of the term,
in this case singular, there is also a practical and operative definition
that indicates a more limited portion of the system, normally characterised by the fact that it is the property and is managed by a specific
and identified subject. When we consider the issue in further detail, we
find local networks and small personal ones, which, in some rare
cases, are not interconnected to the wide network but constitute
closed systems.
17
SECURITY NETWORK
from risk analysis to protection strategies
Networks, whether large or small, are therefore made up of
static transmission components (copper wire, optical fibre, radio signals, etc.) and by a large number of components that we may define as
active, hardware and software.
The multiple and complex set-up of the components, to
which one must add the human users and operators, represent the
main reason for the high intrinsic vulnerability of the systems, and, on
the other hand, thanks to their mission in processing information, are
the elements to which security measures are addressed, in terms of
organizational, physical and logical, as will be dealt with further.
1.2 ICT AS A TOOL FOR SOCIAL AND ECONOMIC
DEVELOPMENT
“Knowledge is the new basis for wealth. This has never been before. In the
past, when capitalists spoke of their wealth, they referred to their properties in
terms of machines, equipment and natural resources. In the future, when capitalists will speak of their wealth they will mean their ability to control knowledge.” 1
These are the words that Lester Thurow2 effectively uses to
highlight the role taken on by informatics (or, ICT, intended as information and communications technologies) in economy and our every
day lives.
Just a decade ago, it was impossible to think of making a bank
remittance, a financial investment, or to buy and sell, from one’s home.
In these ten years the acceleration of technologies has determined a
historical change in the way of working and of spending one’s leisure
time.
It is now possible to face the challenges of globalisation in an
economy that is increasingly linked to the exchange of data and infor-
1
Lester C. Thurow, “The building of wealth”, 2000, Ed. Sole 24 Ore
2
Lecturer in Management and Economy at the MIT
18
1. Network and Society
mation because networks became the true nervous system around
which the vanguard western economies operate (not only western).
Many companies, nowadays, have become world-wide. There
are an increasing number of products that, thought of and created in
one location, are realised at thousands of kilometres from there. The
thread that connects the creative location to the productive one is
often optical fibre, a copper wire or a satellite link.
At the end of the 18th century, production locations were built
alongside water courses, in which boats could carry the goods produced, and where it was possible to draw water and discharge, rather
polluting, wastes; at the end of the 19th century the production locations were mainly close to electrical sources and railways. Nowadays,
modern service centres are located close to wired area, through which
great quantities of bandwidth along which to transfer data are available.
Another model that is emerging is based on the increasing
outsourcing of non-core services of the companies. It is increasingly common that pay-sheet management, accounting and logistics are
managed by external companies. A growing number of functions are
assigned to companies that offer a complete package of services. Once
again, networks are the link to these external activities.
Moreover, companies are increasingly employing ICT applications located with service companies that avoid their having to daily
manage the information systems. Without mentioning e-government
services that, even now, allow us to submit our income declaration,
view our tax position, request certificates from townships and the PA,
conduct estate checks, and more. Once again, networks are what make
this possible.
Europe has this scenario quite clear in mind, and the EU
Commission’s opinion is that “by favouring economy, information and communication technologies can create new and improved jobs and increase wealth. The
European governments want these advantages to be available to all and not only to
19
SECURITY NETWORK
from risk analysis to protection strategies
a minority. A new society based on knowledge must be open to all. Internet offers
enormous opportunities: any person who knows how to use a computer can take
part in the social life by clicking on a mouse. e-Europe and its programs (eLearning, e-Health, e-Government and e-Business) aim at fully exploiting this
potential in favour of social development”3
Knowledge, meant as a peculiar feature of our era, is made up
of four distinctive characteristics. The first is the extension of the
phenomenon: the knowledge acquired during the past twenty years are
greater in quantity than all the knowledge acquired in previous years.
Most of the products we use nowadays didn’t exist just twenty years
ago.
The second characteristic is a greater integration of the
knowledge used in realising products that is far more than ever
before. A modern car is a composite product of knowledge that
ranges from design to psychology, from marketing to electronics and
informatics, to aerodynamics, mechanics, chemistry and so on.
The third characteristic is represented by the de-materialisation of products. The weight of raw materials and direct labour has
progressively decreased in comparison with the immaterial components. Design, technology, know-how, patents and communication
have progressively taken on greater relevance.
The role assumed by knowledge modifies the traditional production model based on a sequence of theoretic research that leads to
a discovery, application research that leads to an invention and, lastly,
to the industrial development that leads to a prototype and the engineering of the production process that leads to mass production.
Finally, the last characteristic is the time contraction between
the discovery and the realisation of the product. For example, large
pharmaceutics or informatics companies, continue to invest in theo-
“Towards a Europe based on knowledge - The European Union and the information society” European Commission 2002.
3
20
1. Network and Society
retic research with the aim to identify scientific discoveries to patent
and sell. Patents, therefore, take on a new role: the exclusive rights to
exploit them set new questions, at an ethical level, to the citizens and
Society as a whole.
In an economy of knowledge the networks and information
become the lifeblood of economy. Internet is the great interconnection system that allows the diffusion of information world-wide.
The Internet, nowadays, transports everybody’s data, including
sensitive economic information: it is therefore necessary to acknowledge the new problems that the network opportunity sets.
“Internet is changing our way of life. Europe must enter the digital era
and base its economy on knowledge. The way in which the European Union will
manage this transition will affect the quality of life, work conditions and in general the competitiveness of European industry and services”4 This is how Europe
is preparing for the challenge.
A challenge that the European Union considers an ambition:
“The general objectives set by the leaders of the Union in Lisbon aim to making
the EU the knowledge based society the most competitive in the world within
2010”5
Internet is configured as high sea in which the information’s
navigate planet wide. As occur in the real sea it is necessary to take the
necessary safety measures. Nobody would ship his freight via the sea
if he were not aware of the possibility to track their route through the
satellite system, constantly monitor their position through the radio
and have the necessary protection offered by the military fleet.
During World War II, what was worrying Great Britain was the
continuous attacks by German submarines on the freight convoys
between the US and UK. The solution adopted was to protect them
within military escorts that could make the access safer. This is similar
4 ibid.
5 ibid.
21
SECURITY NETWORK
from risk analysis to protection strategies
to what is done with the data sent from one location to another
through a safe protocol that protects their integrity.
Within this context network security becomes increasingly
important, a neologism compared to the word insurance, which, in its
more common sense means getting an insurance policy that guarantees the possible damages caused by an unexpected event. Data security means to adopt those measures that protect the operations and
business of a company.
Within this framework, the European Union, in the quoted
document, continues: “The more networks and computers become a central element in trade and daily life, the more the need to protect data increases. Make networks and information systems safe is therefore the preliminary requisite in promoting e-trade and protecting privacy. To this purpose the EU has launched a
strategy based on its communications, on security and cyber-criminality and on the
directive concerning data protection”.
In recent months, ENISA (European Network Information
Security Agency) has become operative as the European Agency the
specific duty of which is the government of network security issues,
the birth of which was a major contribution of the Ministry of
Communications.
Knowledge, therefore, is the true stimulus of the economy we
are living, a knowledge that is increasingly encoded in computers, that
have taken over much of the processing work that done manually up
to just a few years ago.
1.3 THE VARIOUS TYPES OF NETWORK AS THE
PREMISE FOR INTERNET6
Before examining the genesis of the Internet in some detail,
The paragraph contains contributions from “Telecommunications networks in Italy” by the Ugo
Bordoni Foundation (2003)
6
22
1. Network and Society
and the various subjects that manage its functioning, it is interesting to
rapidly consider the characteristics of various types of network so far
developed and currently vastly used: the telephone network, the TV
network and the mobile phone network.
Built and developed during long decades, telephone and TV
networks (or rather, radio-TV networks) hardly resemble one another. The first, founded on connectivity, are networks with no contents,
because the contents are provided by the users at the two ends of the
line, with no involvement by the provider of the phone service. The
second, based on broadcasting, have always been content networks,
without which radio and TV would have been empty boxes. Moreover,
until recently, there was a sharp distinction, at company level, between
the property/management of phone networks and TV networks.
As a consequence, phone networks and TV networks have
never shared transmission resources. Both TV networks and phone
networks have, for years, been managed as monopolies, protected by
national boundaries and national and continental standards.
The third large network, the mobile phone one, was born
within this context, but since the so-called second generation (mid
Nineties) avoided the barriers of monopolistic management, while it
could not count on global standards, essentially because of competition between the parties involved.
The mobile phone network is technically an appendix of the
fixed network, to which it adds a new essential valence, that of continuous tracking, of mobility and the possibility of allowing personal
communications every time and everywhere.
Nowadays the development of mobile networks is the only
sector of telecommunications in which the rate of penetration in Italy
is not less than that of the leader countries. These rates are not only
higher than those in the USA but also are in line (in percentage) with
that of Scandinavian countries, pioneers and leaders in this field.
23
SECURITY NETWORK
from risk analysis to protection strategies
Thanks to the existence of the above networks (especially the
first two) and to its intrinsically distributed nature, the Internet has
developed over the past three decades with growth rates hitherto
unknown in the history of human kind, from the origins of Arpanet,
in the USA at the beginning of the Seventies, to the current web.
Internet and its applications are diffusing information and
knowledge with an extension that had never been experienced before
in the history of human kind. In practice, an irreversible democratisation of the flow of data process has been activated featuring an
enormous social impact.
From a logical viewpoint, Internet is configured as a network
which through millions of exchange nodes (routers) interconnects
hundreds of millions of computers, including not only the servers, but
also the devices owned by users (workstations, PCs, palm computers,
mobile phones with advanced processing and data communication
features).
The physical connections required for the transferral of data
between routers and computers is ensured locally (buildings, university campuses, industrial sites) by networks appropriately conceived as
LANs (Local Area Networks), while the coverage for metropolitan or
geographical distances are handled by infrastructures that belong to
phone companies, mobile phone companies or cable TV companies
(in the form of resources that are permanently assigned by contract or
allocated on the basis of single use).
The fact that Internet, relatively to the transmission functions,
does not have an independent infrastructure is basic in analysing the
current situation. In fact, one might say that it is only thanks to the systematic recourse to pre-existing transmission resources or that in any
case can be activated by those connectivity providers with a longstanding history that Internet has developed at the incredible rate mentioned above. In strictly economic terms, it is sufficient to say that
investments for Internet, at least in terms of transmission resources,
24
1. Network and Society
world-wide, have been mainly marginal, and do not imply laying ad hoc
cables or the realisation of costly civil structural works.
1.4 THE MAIN SUBJECTS INVOLVED IN NETWORK
MANAGEMENT
The birth of Internet has been dated 1st September 1969, with
the advent of ARPANET. This network connected the US State
Department and the universities with which it collaborated. It was
used both to share research but also for personal communication.
Soon it became necessary to split the two activities and in 1983
it was decided to separate the military aspects by creating a specific
network called MILNET, and assigning ARPANET (renamed
Internet) to the scientific aspects and collaboration among universities.
Between 1990 and 1995 the increasing diffusion of Internet led to an
explosion of connections between the first nucleus and others, both
public and private, that progressively form what we now call the
Network of Networks.
Internet developed with no surveillance authority but through
the agreement and collaboration between the various bodies that took
part in it. Often the authority of some universities and research centres was de facto acknowledged and the indications they provided were
adopted by the other bodies connected, both private and public.
However, in January 1992, the Internet Society7 is founded,
featuring the people who had created the basic technology among the
founders and animators. The Internet Society was assigned the respon-
www.isoc.org - www.isoc.it in Italy
www.iab.org
9
www.ietf.org
7
8
25
SECURITY NETWORK
from risk analysis to protection strategies
sibility for the coordination structures that had been formed in the
meantime such as the Internet Activity Board8 and the Internet
Engineering Task Force9.
The Internet Society (ISOC) is a non governmental international organisation for global cooperation and coordination for the
Internet network and its technologies and applications.
In 1999, the Internet Corporation for Assigned Names
and Numbers (ICANN)10 was founded, as a non profit organisation
for the management of the allocation of the address space on the
Internet and the domain name system and root server system functions.
In 1998 the Council of European National Top Level
Domain Registries – CENTR – is founded, with the purpose of supporting the exchange of information and guarantee the development
of best practice procedures among European registries for the coordination of first level domain names (e.g. those that end in “.it”).
Among other international bodies that deal with Internet and
the Domain Name System, the RIPE Network Coordination
Centre, which acts as a European Internet Regional Registry and deals
with coordinating the activities of organisations that are part of and
the Governmental Advisory Committee11 that gathers together representatives of all governments with the objective of supporting the
public-private relationship in managing the Network are especially
notable.
Within this web of competence there is also W3C (World
Wide Web Consortium)12 that has the objective of standardising the
technologies used in the Web that are essential for the Internet.
These bodies are often constituted through independent initiawww.icann.org
www.gac.org
12
www.w3c.org
10
11
26
1. Network and Society
tives by privates, universities and institutions and feature different
fields of activity. In many cases an affiliation process is not required, it
is sufficient to prove one has the required competence to be able to
contribute and propose one’s availability.
In order that all this functions shared and accepted rules are
required. The main basis for civil social relationships in the Network is
provided by a self-regulatory code termed netiquette13. This code,
which has been in existence for decades with periodic updates, states
the bases for civil relationships in the Network. Any breaches may be
denounced either to one’s provider or to the Italian Naming
Authority14. Such breaches may be punished with an exclusion from
the Network.
At a national level, in compliance with what has already happened in other countries, during the early 90s the creation of a group
for the Italian Naming Authority15 was formed. The Naming
Authority ITA-PE was established in October 1994 and since then
has formed an open work structure, basing its operative procedures on
the de-structured model of the groups in the Internet Engineering
Task Force (IETF).
Participation in the group was therefore free and work was
conducted both during periodic meetings of the same group and via
e-mail. Decisions were made on the basis of the widest consensus.
Later, the need to have a structure that could rapidly make
operative decisions and the difficulty in reaching full consensus at
times have led to a revision process at the work model and to the formal constitution of the Italian Naming Authority.
13
the official Italian translation of which is www.nic.it/NA/netiquette.txt
14
see below
15
www.nic.it
27
SECURITY NETWORK
from risk analysis to protection strategies
To this purpose its operative procedures have been modified
so as to provide greater organisation features. The Registration
Authority, the executive structure of the Naming Authority, is in
charge of assigning domain names with the .it suffix.
The Italian RA therefore has the task of managing the operative registries of Top Level Domains .it. The general operative methods and rules (Naming Rules) on the basis of which the Italian RA
operates are defined by the Italian Naming Authority. In addition to
managing .it, the RA is responsible for the assigning of names defined
by other standards. The activities of RA are conducted by the Istituto
di Informatica e Telematica of the Consiglio Nazionale delle
Ricerche (IIT-CNR).
Its role as Registration Authority is assigned to the CNR owing
to its position within the national and international scientific community as a public research body. Related activities are managed by technicians of the Istituto di Informatica e Telematica with the agreement
of IANA (Internet Assigned Number Authority16), on the basis of
acknowledged competence acquired.
The Italian Registration Authority holds a highly relevant role,
also at global level, for the development of the Domain Name System
and associated policies. Among the bodies of which RA is an active
member there are the CENTR17 and ICANN.
In conclusion, Internet has a confused history and yet, at the
same time, organised, that arises from the people who shared competence and responsibilities in giving life to this extraordinary phenomenon. The media and common sense often confuse these aspects with
computer piracy, hackers, viruses and whatever else. As a matter of
fact many of the people who made the Internet, such as Vinton Cerf
16
www.iana.org
17
www.centr.org
28
1. Network and Society
and Joseph Licklider (among the founders of ARPANET and
Internet), Tim Berners-Lee (inventor of the World Wide Web), Ray
Tomlinson (inventor of e-mail), Marc Andressen (inventor of the
Web Browser and later founder of Netscape), Bill Joy (inventor of Java
18 and of UNIX BSD), just to name a few, are all, in the best sense of
the word, hackers19.
This partial overview of the subjects that created and manage
the Network of Networks should lead to understanding that out
there, that is, out of our personal or company computer, there is a
diversified world of companies that provide network connections,
users (well or ill meaning), bodies, government and non, for management and control, etc..
This galaxy from which this extremely powerful tool arose that
requires a delicate balance between rules and freedom, sets us the challenge of security.
It is a common belief that one can assign one’s security to the
phone company or the well-known Service Provider to feel safe. As a
matter of fact it must be understood that security is a continuous culture and constant practice to be assigned to professionals who are able
A widespread technology for the distribution of applications on the network
The term hacker, which later took on a negative sense owing to a misunderstanding by the
media, was, in fact, originally a positive one that defined a model for work and knowledge sharing. A Hacker, in its initial meaning, is an enthusiast of his job, who is ready to share it in
order to increase common competence receiving a satisfactory compensation.
Since their origin, hackers follow a sort of code of honour that implies a challenge of intelligence
conducted through technologies. The term derives from the verb to hack: that is to build the products one needs with one’s work.
It is the term cracker that hackers use to define computer pirate-vandals. These are people who,
possessing technical know-how, use the tools of hackers to destroy the security of a system for theft
or vandalism. The word was coined in 85 by hackers to defend themselves by the mistaken use of
the word hacker by journalists.
18
19
29
SECURITY NETWORK
from risk analysis to protection strategies
to adequately support the companies and of which, in any case, a considerable portion remains assigned to the sense of responsibility and
know-how of the users. Security on the Internet is nor more no less
than like security on the roads. It is possible to circulate freely because
most citizens are honest and ready to denounce another who has committed a crime, but nobody can ensure that these may take place in
everyday life, such as a theft or a more serious crime.
1.5 SECURITY AND PRIVACY: TWO KEY ASPECTS
Nowadays any private or public organisation assigns most of
their processes, whether business or institutional, to information systems and hence to the information processed. When a damaging
event, whether natural or criminal, strikes the systems that manage the
information which an organisation requires (including networks), this
nearly always turns into a sudden interruption of the production
processes that can endanger the continuity of the organisation.
Today, more than before, being secure means confronting
any event, whether natural disasters (floods, fires, earthquakes) or
computer attacks, ensuring the integrity and continuity of the most
intimate and vital processes of an organisation.
In order to fully understand the basic principles on which to
base the meaning of security, and hence the protection strategies, it is
useful to make clear the following concepts.
A telecommunications network, and more in general, along
with it the information it carries, must satisfy at least the following requisites to be considered secure:
G
G
Confidentiality of the information, intended as the assurance that the data are accessed, known and treated exclusively by
who has the right to so.
Availability of the information, intended as the possibility of
30
1. Network and Society
accessing the data when required. The systems should have
sufficient capacities to satisfy the requests for access by users.
G
Integrity of the information, intended as the assurance that
the data are accurate and exempt from tampering, loss or
damage.
These three requisites (specifically the first) hold a primary role
in the concrete implementation of a juridical principle that has powerfully emerged during the past years: the protection of personal data of
individuals or entities, so as to ensure their privacy. Adequate security
measures must be foreseen, also by law, to this purpose.
More in general, essentially we must note that the overall vulnerability of networks and information systems throughout the world
depends on a new way of intending and managing the processes within the organisations.
Up to a few decades ago organisations were governed by internal collaboration flows and were scarcely communicative towards the
outside. Substantially, networks had not yet entered the world of ICT,
but the connections were mainly dedicated with centralised systems
(mainframes).
Therefore, security at that time was based on isolation and was
intended as a prevalently static and passive fact. Moreover, it is also
useful to stress that the use of data took place in a rather limited manner and the independence of the employee using the information system was virtually non-existent.
Essentially, the information system and the human resources it
consisted of were the catalyst of all the information requests arriving
from the rest of the company. Although also in similar scenarios, at the
time it was frequent to encounter procedures that were scarcely attentive to security, the threats were relatively low, because the same communication infrastructure did not feature the same vulnerability as
today.
31
SECURITY NETWORK
from risk analysis to protection strategies
With respect to these paradigms today’s organisations have
radically changed. They tend to externalise both sub-processes and
entire processes; they tend to distribute functions across the territory
because they are increasingly part of multinational realities; they dialogue in real time with their suppliers, customers and clients and,
above all, at different levels; they allow single users to directly dialogue
with most applications so as to rapidly find information.
The core of this important change is telecommunication networks. Thanks to the introduction and development of networks
today we can effectively speak of information sharing.
This greater aperture implies a greater usability of the data,
which exposes organisations to considerable risks. Compared to the
past, security becomes a dynamic fact to be faced in an active way. The
internal users of the organisation acquire an essential role with respect
to the information system and networks. The internal user – information system – network relationship is by far more critical than the
external user – information system – network relationship. The
reason is easily understood. Most of the operations required in the
management of the organisation are conducted with internal applications, which with the information and the network, make up the
Company Information System (CIS). It is natural to think that, differently from external users, who have access to a limited and controlled
number of services, internal users are involved in the exclusive and
privileged use of the CIS and therefore represent one of the main risk
factors for the information and network security.
Within this context, a further issue that contributes to the
requirement for security is the need to ensure privacy in the treatment
of information. Although this topic will be thoroughly dealt with further on, some basic aspects need to be understood.
The bases for privacy laws issued by the single governments of
the European Union contain some essential principles, which are
32
1. Network and Society
widely accepted, for the protection of personal data. Among these
there are:
G
G
G
G
G
G
G
Data must be collected in compliance with the laws
The information collected on single individuals may not be
diffused to other organisations or other individuals without an
explicit law permission or the approval of the individual concerned
The information collected must be accurate and updated
The use of the information must be related to the aim for
which data have been gathered and just for the necessary time
frame
Individuals have the right to correct and update their personal
information
The individuals to whom the information refer have the right
to receive a report on the personal information collected
and/or managed by the organisations
The transmission of personal data to locations different from
the original ones is prohibited if the existing security measures
are not at least equivalent.
During the past years, the need to comply with these principles
has strongly contributed to creating a growing interest and sensitivity
for the protection of network data.
1.6 THE IMPORTANCE OF THE HUMAN FACTOR
FOR SECURITY
In line with the statement by Philippe Queau, the cyberphilosopher: “we are faced with a new way of living this world, of thinking of
the world and of acting on it”, various international studies conducted
have undeniably highlighted that the wide scale introduction of ICT
33
SECURITY NETWORK
from risk analysis to protection strategies
has affected individuals’ learning schemes, actually inducing perception disturbances that, in various ways, affect the levels of awareness
of the subjects and the overall learning path that will lead, or not,
towards a choice of rules.
Having stated this, it has to be observed that behind each security technology there is a person that must use it and that even the
more sophisticated and apparently armoured security system, both
physical and logical, may be made vain by non trained users or scarcely convinced of its necessity.
The more advanced psychological research20 concerning computer crimes have in fact highlighted the existence of perceptive
changes induced by digital technologies, especially when such a technology mediates a relationship between the author of a crime and its
victim: performing an illegal action from one’s familiar and reassuring work station and, above all, without looking one’s victim in the
eyes is a less anxiety inducing scenario for an individual.
Human psychology is therefore a factor that must be considered when designing and managing information security. On the other
hand, in the more developed and modern work contexts psychology
Bruzzone R. “The importance of the human factor in information security policies” (Published
in ICT Security (February 2004)
Galdieri P, Giustozzi C., Strano M., “Sicurezza e privacy in azienda”, Apogeo Editore,
Milano, 2001.
Rogers M. “A social learning theory and moral disengagement analysis of criminal computer
behaviour: An explanatory study”. Unpublished dissertation, 2001
Rogers M,, “Psychological Theories of Crime and Hacking”, Department of Psychology,
University of Manitoba, Telematic Journal of Clincal Criminology; www.criminology.org, 2003
Strano M., “Computer crime”, Edizioni Apogeo, Milano 2000
Strano M., “Computer crimes in companies” in BYTE January 1999
Strano M., Bruzzone R., “Computer crimes in companies: insiders”, in: M. Strano, editor
“Manual of Clinical Criminology”, See Edizioni, Firenze 2003
Strano M., Battelli F., Bruzzone R., Giustozzi C., Boccardi M., “Inside attack: techniques for
intervention and prevention strategies”, In press, 2005
20
34
1. Network and Society
has already affected security procedures for a number of years.
Especially in the USA and UK the human factor is, for example, specially cared in the field of the security of people on their work
place. The function of psychologists in these environments is to convince people, beyond what is prescribed, to behave in a secure way,
also levering on their motivational sphere.
The workers of some vanguard work-sites, for example,
undergo psychological actions (training courses, focus groups, individual interviews) so as to instil the habit of using individual and collective protection tools in order to reduce casualties, and workers performing dangerous tasks are trained to comply with the security rules
under the supervision of a psychologist.
In terms of information security and the prevention of crimes
within organisations, the experiences of research and psychological
intervention seem to be more greatly aimed at assessing the level of
perception of the crime (in order to evaluate the risks related to internal users) and the perception of the risks of an attack (for the assessment of the vulnerability of security systems linked to the human factor).
The main aspects related to the human factor, to be considered relatively to information security, are the following:
G
G
Knowledge of the consequences of possible illegal actions,
because people, when they commit an illegal action, assess the
pros and cons also in terms of the damages caused and, in this
perspective, obtaining correct information allows to have an
exact perception of the consequences of one’s action increasing the level of awareness and diminishing the risks of underestimating the action
The knowledge and perception of risk, that is at the base of
superficial/non functional behaviour in some people because they consider that their work group or organisation does
not represent a target for an attack, hence showing a scarce
perception of the risks
35
SECURITY NETWORK
from risk analysis to protection strategies
G
Motivation to compliance with security procedures, because
often they are tiring/boring to be applied and hence it is
essential to motivate people to respect these procedures which
would otherwise not be systematically applied, jeopardising the
security of the overall organisation.
36
NETWORK SECURITY
From risk analysis
to protection strategies
2 - Network infrastructures and
security issues
2.1 THE NETWORK CONCEPT: PHYSICAL AND VIRTUAL COMPONENTS
The idea of a network connection is generally that of a wire
that connects two points. Along this wire information in the form of
bits travel, sent and received according to given rules that allow their
interpretation.
At the basis of this idea we have telegraph, on which, at the
beginning of the 20th century, an expert operator tapped a single key
sending Morse coded signals.
In the 70s the packet technology is born, which allowed sending a number of contemporary transmission flows along the same
wire. The more recent birth and diffusion of the Internet complicates
the basic concepts.
First of all, nowadays a network consists of very different
physical supports: there are satellite link, radio, GSM, GPRS and
UMTS based, copper, optical fibre, wireless, etc. Each of these physical supports feature different characteristics in terms of latency, transmission capacity, security, connection reliability, etc.
The modern complexity of networks can be managed thanks
to the TCP/IP protocol, the protocol used by Internet. This is a network protocol that allows two systems to share a dictionary, which is
37
SECURITY NETWORK
from risk analysis to protection strategies
able to translate the signals into information and ensure that these are
transmitted and received correctly. The protocol continues to transmit
for a certain period, also using alternate route, until it obtains an
acknowledge message.
Another important function of modern networks is routing,
performed by special devices (routers). These devices read the various
packages transmitted in the TCP/IP format and route them along the
various connections.
There is also the NAT/PAT (Network Address
Translation/Port Address Translation) protocol that allows using a
single IP address for an entire network. This technology allows having
a private network, invisible to the Internet. A network node takes care
of keeping track of the sender and the receiver so as to establish the
communication, from a point within the private network towards an
external point, as if they were directly connected.
Lastly, tunnelling allows creating virtual connections on conventional TCP/IP connections. Within these virtual connections
information is transferred ciphered, avoiding possible intruders to
intercept the data exchanged between sender and receiver. The information deciphering is performed at special network access points that
can consist of firewalls, routers, servers and even clients, according to
requirements.
Considering the above, it is obvious that it is now difficult to
track a physical connection. The network connections are increasingly
virtual, our information travels on segments of networks that we are
unable to know and are only ensured by the level of protection foreseen.
In this sense the MPLS (Multi Protocol Label Switching)
technology is especially interesting, because it allows senders to put
their information into a virtual envelope and by applying a label the
envelope travels within the network without being able to be seen by
intermediate nodes. MPLS represents an important novelty in the field
of networks because it allows sharing just about any physical support.
38
2. Network infrastructures and security issues
2.2 THE NETWORK AND ITS SUBJECTS
The paradigm that normally represents a network is represented by the ISO/OSI model. The ISO/OSI stack model consists of
seven levels and is shown in figure 2.1
ers
Us
r
ide
v
o
Pr
Figure 2.1 – Diagram of the ISO/OSI stack model
Each level of the stack is managed by different subjects that
offer specific services. Let us go through the stack to describe the different subjects.
Levels 1 and 2 (starting from the bottom) are the domain of
the telephone carrier that owns the physical connection, installs the
39
SECURITY NETWORK
from risk analysis to protection strategies
various segment planning its investments on the basis of traffic forecasts. The carrier owns both the backbones that connect two junction points with high capacity link, and the last mile, that represents
the final and more costly segment, from the telephone exchange to the
final users.
The risks connected to this level arise from operators that are
unable to offer secure and reliable services.
Levels from 3 to 5 are managed by the Internet Service
Providers (ISP) that provide the Internet connection by buying
access to the carrier infrastructures and then retail selling, so as to say,
the connection. The ISP also supplies a series of accessory services
that allow users to concentrate only on the communication content.
Usually, among these there is the management of the email server, registration of Internet domains, web and ftp servers management, video
streaming, video conference, and also security services such as the
configuration of secure networks through tunnelling techniques.
The risks deriving from the service providers arise from the
scarce presence of specific competence in this field. They are a type of
operator that recently appeared and that often does not offer the professionalism required to support the needs of the client organisations.
Another risk is an excessive assignment by companies that in this way
tend to free themselves from the technical competence. In fact, the
network asset should always be controlled by the customers, if necessary referring to third parties that are able to monitor the providers of
the services.
Levels 6 and 7 normally develop with the final users. Parts
can be assigned to consulting firms, system integrators or outsourcers.
The risks in this field are centred on the way in which the applications
are designed. Often the system integrators concentrate on the functional aspects of the applications, assigning security issues to the lower
operative levels.
40
2. Network infrastructures and security issues
2.3 NETWORK SECURITY
1
Threats to security are all those events that may cause the loss
of generic requisites, inter-dependent from one another, for information security (confidentiality, availability and integrity, as defined in
the previous paragraph 1.5).
All threats to security must be considered, not only those featuring a criminal intent. From the users’ viewpoint risks such as environmental disasters or human error that cause the crash of a network
are potentially just as damaging as a criminal attack.
The security of a network or an information system must
therefore be intended as the ability to resist unforeseen events or criminal actions that may endanger the availability, integrity or confidentiality of the data contained or transmitted as well as the services provided and accessed by means of the aforementioned network or system.
The purpose of the following paragraphs is to describe the
various types of threat.
2.3.1 General overview of threats to security
Interception of communications
Electronic communications may be intercepted and the data
they contain can be copied or modified. Interception may take on different forms, from the physical access to network lines (e.g. telephone
interception), to radio-transmission surveillance. The more vulnerable
and sensitive points to an interception of traffic are the management
and concentration points of the network such as, in the case of Internet
communications, routers, gateways, switches and network servers.
1 The paragraph contains contributions from “Communications of the Commission to the
European Parliament, to the Council, to the Economic and Social Committee, and to the RegionsCommittee – Networks and information security: proposal for a European strategic approach”,
available at: www.privacy.it/com2001-298.html
41
SECURITY NETWORK
from risk analysis to protection strategies
Illegal or criminal interceptions must be kept separate from
interception activities allowed by the laws. All the EU member states
permit, in special cases, the interception of communications for reasons
of public safety or enacting orders by the judiciary authorities.
An illicit interception may represent a breach of the right to privacy of a person or could be the premise for an illegal use of the intercepted data, such as a password or credit card data, either for looting or
sabotage. The diffuse perception of this kind of risk constitutes one of
the main obstacles to a more marked diffusion of electronic commerce
in Europe.
The defences against interceptions may be implemented by the
providers (network protection), as foreseen by directive 97/66/CE, or
by the users themselves (ciphering of the data transmitted via the network).
For the providers, protecting the network from possible interceptions is a complex and costly task.
In the past, telecommunication network operators used to protect the networks by setting physical devices to control accesses and by
giving appropriate security directives to the personnel. Traffic was only
occasionally ciphered.
Nowadays, for wireless networks, providing an adequate ciphering of radio-transmissions is costly. Mobile network operators cipher
the communications between the mobile device and the base stations.
Users can decide whether or not to cipher the data and voice
signals apart from the security measures foreseen by the network. An
adequate ciphering makes the data incomprehensible for anybody
except the authorised receiver, even in the case of an interception.
There is a wide range of ciphering software and hardware available for all kinds of communication. There are specific products aimed
at ciphering telephone conversations or fax transmissions. Also e-mail
can be ciphered by means of dedicated software, ciphering modules integrated in the word processors or in the e-mail client software.
42
2. Network infrastructures and security issues
The problem is that if the user ciphers an e-mail or a voice communication the receiver must be able to decipher it. It is therefore essential that the software and hardware must be inter-operative. In the same
way, the receiver must possess the ciphering key, which means that the
device must be able to receive and authenticate the key. The cost of
ciphering, in terms of time and costs, is high and users, who do not
always have knowledge of the necessary information concerning risks
and advantages, have problems in making the best choice.
One of the more diffuse security systems on the Internet is the
Secure Socket Layer (SSL) protocol, a system that ciphers communications between the web server and the users’ browsers. The diffusion of
this technology, and especially its more powerful 128 bit version, has
been limited by the United States restrictive regulations concerning
export control.
The US rules have recently been modified following a liberalisation of the control on exports of ciphering products and technologies.
Statistics show that the number of protected web servers in
Europe is largely lower than those in the USA (see figure).
Protected web server
(up to 100.000 users)
Source: OCSE (“Netcraft” Survey, July 2002)
Figure 2.2 – Servers equipped with protection measures
43
SECURITY NETWORK
from risk analysis to protection strategies
Operators, users and producers must face the problem of
competition and of the non inter-operative regulations that exist. For
example, concerning the email protection there are two standards that
compete for market supremacy. Europe’s importance in this field is
rather limited.
The result is a flood of non European products that apply
these standards and that the use of which by European users is subordinated to US policies concerning exports control. Some member
states are evaluating the possibility of employing open source software.
However, these activities are still in a pilot stage, with no coordination, and the will of the market may prevail over the isolated
efforts of public authorities. In order to confront the problem in the
best way it is necessary to conduct a global evaluation of the commercial off the shelf products available and of open source solutions.
Non authorised access to computers and networks
Access to computers and networks is normally authorised only
to those subjects who pass a user authentication process, which means
that the declared identity is clearly recognised.
For many applications and services adequate authentication
procedures are required: for example, this is the case for on-line contracts, the control and access to certain data or services (e.g. telework) or
for the authentication of web sites (e.g. for home banking services).
The authentication modes must contemplate the possibility of
anonymity because many services do not require knowledge of the
identity of the user but simply a reliable confirmation of certain criteria (anonymous credentials), such as, for example, the ability to pay.
Non authorised access to a computer or a network of computers generally has criminal intentions aimed at copying, modifying or
destroying data. From a technical viewpoint this is an intrusion and
can take place in various ways: the use of internal confidential information, deciphering passwords by means of so-called dictionary
44
2. Network infrastructures and security issues
attacks, front attacks (exploiting the users tendency to choose predictable passwords), social engineering (exploiting the tendency people have of diffusing information to apparently reliable people), or the
interception of passwords. Often, this type of attack is conducted
within an organisation.
Unauthorised access is often motivated by an intellectual challenge rather than the perspective of obtaining an economic gain,
although a phenomenon born as a simple disturbance has highlighted
the vulnerability of information networks and prompted computer
pirates with criminal intentions to exploit these weaknesses. The protection from unauthorised access to one’s personal data, for example
financial or health, is a subjective right. In the public sector or for companies the risk ranges from industrial espionage to the alteration of
public or company data up to the corruption of web sites.
Installing a password and/or a firewall are the most common
methods to protect oneself from unauthorised access. Nevertheless,
both methods offer a limited protection and must be integrated with
other security devices such as the device for attack recognition and
application intrusion detection (for instance those using the smart
card) The effectiveness of these systems depends on the way their
characteristics face the risks to a given environment. It is necessary to
reach a balance between network protection and free-access related
advantages.
The rapid technological evolution and the consequential new
threats for the networks make it necessary to perform a revision
which is continuous and independent from the security devices. Until
users and providers are not fully aware of the vulnerability of their
networks, potential solutions will remain unexplored. The following
picture shows the use of network protection products in the
European Union (the reported statistics are based on an investigation carried out in 2001 within the framework of the eEurope 2002
initiative).
45
SECURITY NETWORK
from risk analysis to protection strategies
Use of security products
(% of UE internet users)
Anti-virus
software
smart-cart or
other reader
encrypting
software
firewall
software
e-signature
software
Source: Eurobarometro (February 2001)
figure 2-3 Use of security products within EU
Network failure
Most of the networks are by now computerized or computer
controlled. In the past, network failures were often due to a malfunction of the control information system and attacks were often brought
to these computers. On the contrary, attacks causing today the most
serious interruptions exploit the weaknesses and the vulnerabilities of
the network components (operating system, router, switches, name
servers, etc.).
Similar aggressions carried out through the telephone network
did not result in significant problems in the past, but they are rather
frequent in the Internet. This is due to the fact that control telephone
signals are separate from traffic and may be protected. On the contrary
Internet users may directly contact the main computers that manage
the traffic.
46
2. Network infrastructures and security issues
However in the future, telephone networks could become
more vulnerable to these attacks because they will contain Internet
integrated elements and their control plans will be revealed to other
providers.
Similar attacks may be of different forms:
• attacks to domain name severs: Internet operation is based
on a domain name system (Domain Name System – DNS)
through which network addresses meaningful to the user (i.e.
europa.eu.int) are translated into abstract names (i.e.
IP:147.67.36.16) and vice-versa. If part of DNS does not
work, some web sites cannot be localized and the e-mail delivery system may stop working. The root server corruption of
the DNS system or other first level name servers could paralyze the network. Early in 2004 some failures have been identified in the software used by most of domain name severs.
• Attacks to routers: internet routing is extremely decentralised
and each router regularly communicates near routers which
networks they know and how to reach them. Vulnerability
means that this information cannot be verified because, due
to design reasons, each router has only a minimum knowledge
of the network topology. Thus each router may declare it as
the best way to a given destination so to intercept, block or
modify the traffic to that destination.
• Denial-of-Service attacks (DoS): those attacks paralyse the
network overcharging it with artificial messages that reduce or
prevent users’ legitimate access possibilities. These phenomena are similar to the block of facsimile devices caused by long
and repeated messages. Flooding in particular consists in
trying to overcharge web servers or the ability to process
Internet service providers with automatically produced messages.
• Interruptions damaged a number of prestigious web sites.
According to some estimates, damages from the most recent
47
SECURITY NETWORK
from risk analysis to protection strategies
attacks amount to several hundreds of millions euros, not
considering the intangible image-related damage. Companies
make more and more use of web sites to promote their own
activities and those depending on Internet for just in time
deliveries are particularly vulnerable to this kind of attacks.
• To defend oneself from attacks to DNS servers one must
expand DNS protocols by using for instance DNS extensions,
protected with a public key encryption. But this solution
requires the installation of new software on client devices and
it has not been adopted very often. Moreover, the effectiveness of the necessary administrative procedure to enlarge
confidence among DNS domains must still be improved.
• Attacks to the routing system on the contrary are much
more difficult to counter. Internet has been conceived in the
name of a flexible routing to reduce the possibilities of a
service interruption in case part of the network infrastructure
would fail. There are no efficient means to protect the routing protocols, especially the backbone ones.
• The volume of the transmitted data hinders an accurate traffic filter because such a check would result in a network block.
For the same reason, the network performs only not very
sophisticated filter and access control functions. More specific security functions (authentication, integrity, and encryption)
are implemented to the ends of the network, that is on terminals and servers working as endpoint. Thus this is where one
has to defend against Denial of Service-like attacks.
Execution of malicious software that modifies or
destroys data
Computers work with software applications, but such
applications may be also used to disable a computer, erase or modify
data it contains. As previously said, if the computer belongs to the network management system, an abnormal operation may reflect on
48
2. Network infrastructures and security issues
many other components of the network itself.
The virus is a kind of malicious software reproducing its own
code by joining other software so to the viral code is executed each
time the infected information software is launched.
Nevertheless malicious software may assume other forms:
some damage only the computer on which they are copied while others propagate to other network computers. There are software (dangerously called logic bombs) that remain unarmed until they are triggered by a given event, i.e. a date (very often like Friday 13). Other
software are apparently benign, but, once they are active they start a
destructive attack (this is why they are called Troy horses, or
Trojans). Others, so-called worms, do not infect other software but
self-duplicate in copies that reproduce again, and end up saturating the
system.
Viruses may by extremely destructive, as demonstrated from
the very serious damages caused by recent I love you, Melissa and
Kournikova viruses. The following picture shows the increase in computer viruses registered by Internet users between October 2000 and
February 2001 for each EU member state, almost 11% of Internet
European users have suffered an information virus-related infection in
their home PC.
The best defence are anti virus software, available in various
forms. Software working as virus scanner and cleaner may identify and
destroy all known viruses. Their main weakness is that they do not easily identify new viruses, even if they are regularly updated.
Integrity checker software constitutes another countermeasure. To infect a computer the virus must modify one element of the
system and the integrity check allows identifying any structural change,
even if it has been caused by the unknown virus.
Despite antivirus products are highly advanced, malign software-related problems increases for two major reasons: first of all the
Internet open structure allows hackers to inform each other and
design strategies to bypass security barriers. Secondarily, internet
49
SECURITY NETWORK
from risk analysis to protection strategies
expands and touches new users, and many of them are not aware of
the necessity to protect them. Security level depends on the effective
and generalized use of the anti-virus software.
Virus
% of internet users victims of virus
Source Eurobarometro
Oct. 2000
Feb 2001
Figure 2-4 Virus occurrences in the EU between October 2000 and February2001
50
2. Network infrastructures and security issues
Identity usurpation
When a link to the network is established or data are received,
the user infers the interlocutor’s identity according to the context of
the communication. The network presents a number of indicators to
assess that but the main risk of an attack is represented by the initiated, or those who are familiar with the communication context. By
composing a number or an e-mail address on the computer keyboard
the user must reach that given destination. If this is enough for many
applications, this is not so for the important commercial transactions
or the medical, financial or official communications, requiring a higher level of authentication, integrity and confidentiality.
Identity usurpation of persons or organisations may cause
different accidents. Costumers could unload malicious software from
a web site that claims to be a reliable source and could also reveal confidential information to the wrong person. Identity usurpation may
result in a null contract etc. As major damage, failed authentications
hinder new economic initiatives. Many studies affirm that the main
reason preventing companies from operating on Internet are just fears
on security. Would the identity of the interlocutor be certain, confidence level in Internet economic operation will increase.
The introduction of an authentication subjected to the adoption of the SSL system is a significant step forward in the matter of
network confidential data. Virtual Private Networks (VPN) use SSL
system and IPSec protocol to transmit on non-protected Internet networks and open links with a pre-defined protection level. Nevertheless
these solutions have a limited usage since they rely on electronic certificates which do not fully guarantee to be un-modified.
It is a third party, often called Certification Authority, or in
the EU directive on e-signature (see Att. 1-B), Certification Service
Provider, that grants such guarantees. The problem of this solution
diffusion is similar to that of encryption: the necessity of a key interoperability and management system.
51
SECURITY NETWORK
from risk analysis to protection strategies
PN networks do not have this problem, for which it is possible to develop some proprietary solutions while for public networks it
remains a major obstacle.
The e-signature directive sets rules aiming to facilitate e-signature recognition within the EU. It offers a framework enabling the
market to grow but it envisages also incentives for companies with
safer signatures for a legal recognition. The directive is actually being
transposed in the Member States and Italy is in the front row.
Environmental accidents and unexpected events
Many security accidents result from unexpected and non voluntary events such as:
• Natural catastrophes (hurricanes, floods, fires, earthquakes)
• Third parties alien to any contract with the operator or the
user (i.e. interruption for construction works)
• Third parties having a contract with the operator or the
user (i.e. failures of hardware, software components or delivered programs)
• Human error of the operator (including service provider) or
the user (i.e. problems in the network management, wrong
software installation)
Natural catastrophes may interrupt the network availability.
Unfortunately during these events the operation of all communication
lines is absolutely indispensable. Hardware failures or an incorrect
software design may cause vulnerabilities followed by an immediate
interruption of the network or may be exploited by computer pirates.
Even a non-accurate management of the network capacity may result
in congested traffic and slow down or paralyse communication links.
Within such context responsibility sharing among the interested parties is of crucial importance. In most of the cases, users shall
not bear liability for the situation but their chances of claiming compensation will be very scarce if not null.
52
2. Network infrastructures and security issues
Telecommunication network operators are well aware of the
risks of environmental accidents and for long time they have built
redundant networks and security devices for their infrastructures. A
stronger competition pressure could bear ambivalent consequences on
operator’s behaviour. On one side prices could push operators to
reduce such redundancies, but on the other side, a greater number of
operators on the market due to liberalization, makes it possible for
users to move to another operator if the used network is no more
available.
Relevant provisions of the Common Law force Member
States to take all necessary measures to assure available public networks in case of a catastrophic failure or of a natural catastrophe (ref.
interconnectivity directive 97/33/CE and vocal telephony directive
98/10/CE, Telecommunication Code). The growing number of interconnected networks makes one unaware of the security level of this
sector.
Competition should push hardware and software producers
to improve the security level of their products. But competition pressure does not allow for security-related investments especially because
security not always is the key element in deciding to buy. Security-related failures appear too late, once the damage has already occurred. With
a fair competitive behaviour on the information technology market,
there will be better conditions for the security development.
Human and technical error risks could be reduced through
training and awareness raising actions. Carrying out a proper security
policy in each single company could contribute to limit the risks.
The new challenges
Network and information security is bound to become a determining factor of the information society development since networks
play an ever important role in the economic and social life. In this context two main factors should be taken into consideration: potential
damage increase and new emerging technologies.
53
SECURITY NETWORK
from risk analysis to protection strategies
Networks and information systems contain more and more
often sensitive data and precious commercial information, making
computer pirates attacks more attracting. Attacks may occur at low
level with minor consequences at national level (corruption of a personal web site or hard disk re-formatted by a virus). But the interruption may occur on a much wider scale and interfere with very sensitive
communications, cause severe power interruption and cause serious
damages to companies through denial of service-like attacks or confidence violation.
It is difficult to assess real or potential damages of a networks
security violation. There is no systematic signalling system on the matter, even because many companies prefer not to disclosure that they
have been victim of computer attacks to avoid image-related damage.
Evidences collected to date are essentially story-based and costs
include not only direct costs (profit loss, loss of useful information,
and reinstatement of network) but also intangible costs in particular in
terms of image, difficult to assess.
Network and information security is an evolving problem.
Quickly technological changes present continuously new challenges;
yesterday problems are solved but today solutions are already overcame. The market produces new applications, new services and new
products every day. Nevertheless there are some developments that
will certainly represent important challenges for the security managers
of public and private sector.
• Digital works will be transmitted on the network (multimedia
works, downloadable software, mobile agents) with integrated
security characteristics. The notion of availability, considered
today as the possibility of network use, will be closer to that
of authorized use, just like the right of using a videogame for
a given period of time, the right of creating a single copy of
a software, etc.
• In the future, IP network operators will try to improve the
54
2. Network infrastructures and security issues
security level by means of a systematic supervision of the
communications that will allow just authorized traffic. These
measures should be anyway compatible with the relevant provisions concerning personal data protection.
• Users will choose permanent connections to internet and this
will multiply possible attacks and non protected terminals vulnerability allowing computer pirates to hide them to the identification devices.
• Domestic networks with a lot of devices will be very common
on large scale. This will increase users’ piracy and vulnerability (i.e. alarm systems could be remotely switched off).
• Large scale diffusion of wireless networks (i.e. wireless local
network or wireless local area network, third generation
mobile services) will raise the problem of an effective radio
transmitted data encryption. Hence, it will be ever more difficult to impose by law a low level encryption of signals.
• Network and information systems will be all over, in a mixed
wired and mobile configuration and they will represent the
environment intelligence, that is a number of independent
ad automatically activated functions which will take decisions
previously set by the users. The challenge will consist in avoiding an unacceptable vulnerability level and in integrating the
security element in the system architecture.
55
SECURITY NETWORK
from risk analysis to protection strategies
2.4 AN EXAMPLE OF SECURE NETWORK: THE PA
UNIFIED NETWORK2
Since the early 90s in Public Administration no system was targeted to a standard telecommunication system, hence there were many
data networks stemming from the different arising needs. In 1997 such
scenario was rationalized into one single network, which was homogeneous in terms of quality, security and costs. For Central
Administrations such network was the platform to develop applications.
Today R.U.P.A. (Rete Unitaria della Pubblica Amministrazione,
Public Administration Unified Network) connects all central public
administration offices with almost 20,000 accesses. All Regional up-todate active networks, for a global amount of 90 interconnected institutions between Central Public Administrations and Local Public
Administration, are connected to its backbone.
2.4.1. Technological infrastructure: network design
RUPA architectural design was conceived, in its designing and
implementation phases, in the respect of some principles that were
thought to be the requirements to assure adequate security standards to
the network. RUPA design has been based on two fundamental criteria:
• Use of the guidelines drawn from previous experiences of
structures with similar characteristics
• Adoption of a risk analysis model that macroscopically highlights
the potentially risky areas and the appropriate countermeasures.
2 The paragraph contains contributions from:
- “CNIPA – Sistema Pubblico di Connettività – Organizzazione della Sicurezza” (Issued
by gdl Organizzazione e Qualificazione – Coordinator Maria Terranova – Edizione 1.4
del 26/11/2003)
- “CNIPA – Sistema Pubblico di Connettività – Seminario Introduttivo” (Issued by gdl
SPC – coordinator Francesco Pirro – Edizione 3.2 07/04/2004)
- “Autorità per l’Informatica nella Pubblica Amministrazione – La sicurezza dei servizi in
rete – requisiti, modelli, metodi e strumenti” – Version 1.0 24/11/2001
56
2. Network infrastructures and security issues
Domain
network
Adm. 1
Inter-domain
network
Domain
network
Adm. 2
Figure 2 –5 RUPA general architecture
The guidelines used in designing the infrastructure of the
Management Centre, main control and management body, were meant to
stress the availability characteristics of the whole system, in particular:
• The redundant installation of all major components to guarantee the proper operation in case of failure
• Components have been selected on the basis of their intrinsic
fault resiliency characteristics
• The internal network is based on a matrix-like structure
• For all the components standard conformity (de jure and de
facto) criteria have been adopted to assure interoperability.
• The operational status of all used components has been measured
57
SECURITY NETWORK
from risk analysis to protection strategies
• Apart the above mentioned characteristics, a Risk Analysis
process has been used for the management part. It allowed
identifying actions able to damage the system integrity
(threats), the system vulnerabilities to threats and the impact
of any violation on the system.
2.4.2 Security management
It is particular important to underline the security infrastructure potential implemented for the services component monitoring.
The Management Centre has a very high level of control of messages
exchanged among Administrations and has highly performing security
characteristics for what concerns confidentiality, cryptography and
anti-intrusion aspects.
Network access and use conditions (on RUPA circulate every
day 37 gigabyte of data distributed in thousands of e-mail messages
and 5 millions WEB pages visited every day by the network users) are
constantly controlled by two concurrent monitor and verification
strategies:
• Monitor and verification activities include a periodical number
of tests of the network vulnerability and its devices. Tests
emulate known intrusion techniques and test the adopted
configuration according to ad hoc defined attack schemes
• Vulnerability test is part of the certification procedure of the
changes of the network infrastructure and of the system performance maintaining process.
Monitor activities constantly control the use of the infrastructure and alert the onset of abnormal behaviours through the use of
sensors installed in various network segments (reaction to the events).
The vulnerability test is performed through a set of procedures which automatically analyze the network and the Centre connected segments by setting a catalogue of components (IP addresses)
and available services (gates). Then, other procedures apply to the cat-
58
2. Network infrastructures and security issues
Figure 2-6 SPC: Infrastructure, Rules and Organizational Model
alogue components a number of actions belonging to a ruled set,
which check the behaviour of the same component after a service
request.
The two strategies are complementary to each other: the constant monitoring controls the network status while vulnerability tests
asses the sensor action threshold and supply the guidelines to configure each single sensor. Sensor signals identify the attack place and
address specific tests to particular components.
Such measures turned real effective and made it possible for
RUPA network, since its creation, to successfully reject virus attacks
that represent a considerable loss both in financial and image terms, to
other realities.
In the year 2001 RUPA has been subject to over 99 million
hostile activities, out of which 95 million (rejected) addressed to Web
59
SECURITY NETWORK
from risk analysis to protection strategies
sites hosted on RUPA; 79 million, until September 2002; in 2003, until
march only, over 15 million attacks to Web sites hosted on RUPA were
rejected.
Nimda attacks started on September 14 2001 on Internet. The
network records the first severe alarm at the end of September 18; the
peak occurs on September 19 with 9 million attacks, all of them were
rejected.
SQL SLAMMER worm attacks, detected in January 2003,
caused no impacts due to the correct and prompt implementation of
technological and architectural countermeasures.
In April 2003, the blocked attempt of Denial of Service
against an important Central Administration (mail of over 100,000
packages per minute) has been recorded.
2.4.3 Network evolutions
The Unified Network, as it is structured and used today, will
soon evolve and be included within the new PA infrastructure: the
SPC - Sistema Pubblico di Connettività - (Connectivity Public System) created by the Legislative Decree n. 42 of February 28, 2005.
The SPC system stems from the necessity to enable the many
stakeholders acting in a competitive market, such as the telematic service supply, to contribute to the technological innovation by implementing a confidence based system, with common interconnection rules,
allowing all PA to be interconnected each other with the appropriate
quality and security standards and assuring an integrate and homogeneous development of telematic services in line with the technological
evolution.
SPC system presents architectural characteristics that include a
multi-supplier network model in which each operator, SPC services
provider, has a given number of Administrations as costumers. Each
supplier’s quality and security will be guarantee through a qualification
process based on pre-established and agreed rules.
60
2. Network infrastructures and security issues
The following are the main targets of the SPC implementation:
• Provides interconnection services
whose fundamental
principles in terms of homogeneity, security and quality are
clearly defined, and, thanks to these characteristics, are widely configurable and adaptable to the characteristics and the
specific needs of each interconnected Institution Bodies
• Guarantees the expanded interconnection possibility and
allow all Internet subjects the interaction with Institutions and
Public Administrations.
• Provide, even safeguarding investment afforded until today, an
infrastructure of shared and homogeneous connection
among all PA networks.
• Provides services and infrastructures, to the interested
Administrations, that allow also interconnection within the
Domain of the same Administration.
• Implements a multi-provider service model in line and
consistent with the current market scenarios
• Guarantees, even through service provider operators’ qualification, a quality system in term of both performance and
availability and implements a data collecting and analyzing system for a constant monitoring of the Quality of Service provided.
• Guarantees security measures able to ensure the services
continuity and availability between the same Administrations
and toward citizens in order to minimize possible malfunctioning.
This last target (security guarantee and quality of service guarantee) is the key element characterizing the SPC.
61
SECURITY NETWORK
from risk analysis to protection strategies
The need to implement a System in which the communication
among the different Administration occurs with quality and security
characteristics assured end to end, within a multi-provider context,
implies the interconnection and control infrastructure and the definition of proper rules all involved players must observe. As a matter of
fact, due to the peculiarities of the architecture of a distributed network within which operate, organisations and structures different by
service typology and organisation processes, it is required the creation
of central and local government level, able to orient, harmonize and
coordinate the operation structures so to implement and operate as
one single virtual organisation.
The SPC Security System organization, which takes its inspiration from the International Standard Organisation (ISO) models, will
be articulated on several levels and will distinguish responsibilities and
fields of action in two main areas:
• A government area to identify policies and directives
• An operational area to implement and control measures and
procedures aiming to assure communication quality and security.
These areas will include the following groups:
The Coordination Structure is the main responsible for the
system security. It is a federal body chaired by CNIPA chairman, made
up of thirteen members six of which represent Central
Administrations and six local Administrations. It defines, according to
service users and providers requirements, security policies and issues
the relevant directives and recommendations to safeguard both the
interconnection system security and that of other connected networks.
The Coordination structure shall also run service provider qualification procedures.
62
2. Network infrastructures and security issues
QUALIFIED PROVIDERS SERVICE LIST
Qualified Internet
Local ISP
Regional ISP
National ISP
Security management
Structure
Citizens and
Enterprises
Quality Management
Structure
Figure 2-7 CG-I and services categories – CG-I connects all the Central Administrations and allows
them the Internet access through a high speed and secure link.
The Strategic Committee is a common structure dealing
with the global strategic orientation of security and distributes the
related funds. The Committee is made up of security and telecommunication experts and of representatives of the Ministry for Innovation
and Technologies and of users.
The Security Management Centre is in charge of the implementation of what has been issued by the Coordination Structure in
terms of implementation and application of the directives and recommendations for the safeguard of security. It also identifies the guidelines for the redaction of the security plan of all SPC subjects.
The Security Local Unit is a local structure, one per each network connected to the system that manages its security aspects. All
Security Units must be connected with service providers and the
CERT, to allow the best possible efficiency of secure information
exchange in case of reaction to attacks and/or abnormal events.
63
SECURITY NETWORK
from risk analysis to protection strategies
CERT SPC plays a fundamental role in preventing and reacting to security accidents. It makes available to all other structures
warnings, guidelines, check-list and all may turn useful for the correct
system management and operation.
Within SPC digital certificates are widely used for different
purposes. The PKI Technical Operator is a Certification Authority
in charge of the certificate issuing, of the management of the various
repositories in which they are stored and of what it is necessary to
guarantee the availability and accessibility of the users and system
authentication information.
64
NETWORK SECURITY
From risk analysis
to protection strategies
3 - The relevant legislation
3.1 THE REFERENCE GENERAL LEGAL FRAMEWORK
3.1.1 Generalities
The legislation framework of the ICT system is at once simple and complicate. In fact the legislative tools actually issued by the
Italian State for companies and private users are quite few while those
concerning the public sector, together with additional elements such
as the European directives, some documents issued by prestigious
international organizations (i.e. OECD) and especially documents
and circular letters issued by the Ministry for Innovation and
Technologies, by AIPA and CNIPA (that replaced AIPA), are rather
numerous.
Generally speaking, we may observe that, while for public sector laws aiming to promote the use of the network and to rule their
security, in particular during the last years, have been quite numerous
and able to promote, together with the technological progress, the
awareness of the security and their solutions, in the private sector the
way to go is still long. But, what has been done in the public sector
could turn a stimulus and a guide to companies and, with the due proportions, to private users.
In this document the illustration of the legislation framework
is divided into two parts. The first highlights so called legal value of
the document distinguishing between documents of non strictly government bodies even if of a sound reputation, organizations, EU rec65
SECURITY NETWORK
from risk analysis to protection strategies
ommendations, State laws, and documents meaningful for their
authoritative sources (AIPA, CNIPA, etc.). The second part identifies
the addressees of different documents and rules and makes the distinction between Public Administration, private companies and individual citizens.
In the following paragraph we tries to take out of the different legislative sources what could be useful to define a mandatory profile of protection measures as referred to the different subjects protagonists of the national system networks scenario. In this context we
have to observe that even with a legislative framework that in the last
decade has registered a remarkable increase in number and consistency of the foreseen countermeasures, both on the organisational and
technical level, subjects should not limit themselves to these suggestions that should be considered as a compulsory ground, to integrate
according to an appropriate risk analysis process.
The source list is reported in appendix 1 and includes, for sake
of completeness, what concerns the electronic and digital signature
field, that due to the peculiar functional case, is not to be considered
as a real structural network protection element. Since the informative
and practical characteristic of the document, these rules included in
more recent measures (this is the case of the rules preceding the legislative decree n. 196 of the 30 June 2003 – Code of personal data protection – included in the latter) have not been reported.
3.1.2 OECD and United Nations documents
The documents issued by the Organisations for Cooperation
and Economic Development (OECD in English, OCDE in French)
are a source of reference of the highest value for their credit to the
EU legislative bodies.
The Recommendation of the Council of July 25 is important
for the purposes of this document. The title of the document summarized hereunder is “OECD guidelines on system and information
structures security: toward a security culture”.
Under the common denominator of the security culture pro-
66
3.The relevant legislation
motion the following nine principle are enlisted:
1. Awareness – The interested parties shall be aware of the
necessity to protect the system and information network security and of the need for actions thy may undertake to strengthen security.
2. Responsibility – The interested parties are responsible for the
system information network security.
3. Response – The interested parties shall operate timely and in
a spirit of cooperation to prevent, identify and respond to
security incidents.
4. Ethics – The interested parties shall respect other parties’ legitimate interests.
5. Democracy – System and information networks security shall
be compatible with the fundamental values of a democratic
society.
6. Risk assessment – The interested parties shall proceed to
assess risks.
7. Notion and implementation of security – The interested
parties shall integrate security as essential element of systems
and information networks.
8. Security management – The interested parties shall adopt a
global approach to the management of security.
9. Security re-assessment – The interested parties shall examine
and re-assess system and information network security and
introduce appropriate changes in their security-related policies,
practices, actions and procedures.
It is also important to observe that (we are in the year 2002)
the subtitle of the document reads: “Towards a security culture” !
On the same line as OECD document ranges the UN resolution A/RES/58/199 of 23 December 2003, under the title: “Creation
of a global culture of cyber-security and the protection of critical
information infrastructures”.
67
SECURITY NETWORK
from risk analysis to protection strategies
The resolution invites States to consider 11 security principles
widely based on those adopted by March 2003 G8 meeting.
NISCC (National Infrastructure Security Information Centre)
Table 3-1 shows the principles of the U.N. resolution with the references to those proposed in the OECD document previously shown.
As we may see, with respect to the OECD document, widely oriented
to society, operators and users (principles 2, 4, 5), the U.N. resolution
is more specifically targeted to Governments and security forces (principle 6, 7, 9).
3.1.3 EU Directives and other documents
During the last years the Italian Government has timely implemented the EU directive on networks and information security. Worth of
note is the Council resolution (Transportations/Telecommunications) of
11 December 2001 “Resolution on network and information security”.
With the document Member States are asked by the end of 2002 to:
• Promote security culture through educational campaigns to
be carried out in administrations, private companies, ISP, etc.
• Promote security best practices based on international standards even and above all in medium and small enterprises.
• Promote security within ICT courses
• Enhance the computer emergency response teams
• Promote the knowledge and the adoption of the Common
Criteria Security Standard (CC) transposed in ISO 15408.
• Promote the study and the adoption of biometrical devices
• Promote information exchange and the cooperation among
members.
68
3.The relevant legislation
Topics
Principles of UN Resolution 58/199
Reference to OECD
principles
1. Having network facilities to issue warnings about inforWarnings and mation vulnerabilities, threats and accidents.
reaction to 5. Establishing and maintaining communication networks
3. Response
accidents
for crisis situations, testing them periodically to ensure their
efficiency in times of emergency.
Awareness
-raising and
training
2. Raising awareness so that all interested parties can more
easily appreciate the extent and nature of their critical information infrastructures and the role that each party has in
their protection.
1. Awareness-raising
8. Organizing training initiatives and drills to increase
responsiveness as well as testing continuity and crisis plans
in case of attacks against information infrastructures,
encouraging peers to carry out similar activities.
6. Risk assessment
Risk analysis
3. Examining infrastructures to identify their interdependen- 8. Security management
cies in order to improve their protection.
9. Security reassessment
Security
Technology
11. Promoting national and international research and deve7. Security awareness
lopment and favoring the introduction of security technoloand implementation
gies that are consistent with international standards.
Information
sharing and
international
cooperation
10. Embarking upon appropriate international cooperation
initiatives to enhance critical information system security,
also through the development and coordination of warning
and alert systems, through the sharing and dissemination of
information regarding vulnerabilities, threats and accidents
and coordinating investigations on attacks against informa3. Response
tion systems, in accordance with local legislation.
4. Promoting cooperation between both private and
public partners to share and analyze information referring
to critical infrastructures in order to prevent, investigate
on and react to attacks against infrastructures and possible damage.
Legal and
criminal
investigation
issues
9. Having adequate laws, both under the formal and substantial
viewpoint, and adequately trained staff to allow States to investigate and prosecute attacks against critical information
systems and coordinate such activities with other States when
necessary.
6. Making sure that laws regarding data availability take into
account the need to protect critical information systems.
7. Facilitating the tracking down of attacks against critical
information systems and, whenever appropriate, communicating information on such tracking activities to other States.
2. Responsibilities
Social and
political considerations
4. Ethics
5. Democracy
Table 3.1 – A Comparison between the OECD document and the UN Resolution
69
SECURITY NETWORK
from risk analysis to protection strategies
Noteworthy is also the Commission Communication to the
European Parliament, to the Council, to the economic and social
Committee, to the Committee of the Regions of June 2001, under the
title “Network and Information Security: proposals of an European
strategic approach”.
In this document the different threats and attacks (then
known, today others should be added) that may concern the networks
are examined as well as the related remedies. It is a useful document of
security planning, kept into consideration even for the drawing of the
following paragraphs of the section.
The 12th of July 2002 the “Directive 2002/58/CE on personal data treatment and the protection of private life in the sector of electronic communications” was issued. This rule, that fully
replaces the previous directive 97/66/CE, reflects the needs of regulation updating due to the technological evolution of the last five years,
and consequently of the greater risks of privacy violation in charge of
users. The rule also introduces the terms of electronic communication network and service as a consequence of the convergence of
voice and data services.
Such directive was widely accepted and became compulsory in
the Italian territory with the “Legislative decree n. 196 of the 30th
of June 2003 – Code of personal data protection” as mentioned in
the following paragraph explaining the Italian laws.
3.1.4 Italian Laws and related rules
Let us consider now the national legislative sources.
The first act showing the attention of the Italian legislator in
the field of ICT is the Law n. 547 of the 23rd of December 1963
“Amended and integrated provisions of the criminal code and
the code of criminal procedure on computer crimes”. This introduced the computer crime, which was not previously foreseen in our
law.
The law, in its context, introduced also the principle under
which the crime of undue intrusion into a system was meant as really
70
3.The relevant legislation
perpetrated only if the violated system was protected by security measures. Just to know, the law introduced also, for the first time, the notion
of computer document.
In 1996 the first regulation on privacy came to life; it was the
law n. 675/96 “Protection of people and other subjects with
respect to personal data processing”. This law introduced for the
first time compulsory protection measures for systems and networks
involved in personal data processing. The real specification of such a
minimum base of protection was issued with an ad hoc regulation on
July 27 1999. The two laws have been integrally included, enhanced
and re-elaborated in the recent legislative Decree n.196 on the 30th of
June 2003 which will be commented later on this document.
Through the law n.59 of the 15th march 1997 the Public
Administration Unified Network was established. This result represents one example of excellence for the Italian networks as a whole
and specifically for security.
In 2001 the legislative Decree n. 231/2001 was issued “Discipline of legal entity, company and association with no
legal entity according to article 11 of the law n. 300 of September
29 2000.” to be mentioned, for our use, for some reference that the
text include in law 547/93 at the beginning of the paragraph.
The decree applies to all legal entities and companies and associations with no legal entity, with the exclusion of the State, of territorial public institutions, of non economic public institutions and to
institution with constitutional functions.
Such decree introduces in the Italian constitution the notion of
corporate liability when physical persons commit a crime even in the
interest or to the advantage of the same company. For what concerns
this document, article 24 of the decree explicitly recalls such liability in
case of computer-related fraud damaging the State or a public institution.
As to the accomplishment context the above mentioned discipline does not define the technical specifications, but it rather identifies general principles: corporate liabilities for crimes perpetrated by its
employees it to be excluded if the same company has adopted before
71
SECURITY NETWORK
from risk analysis to protection strategies
the crime was committed an organisational, operational and control
model able to prevent crimes similar to that occurred. The result is an
obligation by the company to provide itself with a control system able
to prevent the possibilities to perpetrate computer-related frauds by
using its own systems and its own networks.
Under the pressure of an ever growing requirement for security certification in the information systems, on April 11 2002 was
issued the DPCM “National scheme for the evaluation and certification of security of information technology, for the protection
of classified information concerning the internal and external
State security” that provided to update and enhance the legislative
framework in the matter of information processing security certification within the context of the State secret: the extension to private
subjects would follow, as known, the next year.
In fact with the DPCM of the 30th of October 2003 (G.U. n.
98 of the 27th of April 2004), prepared by the Minister for Innovation
and Technology together with the Ministers for Communications,
Ministers for Productive Activities and Ministers for Economics and
Ministers for Finances, was set up the National Scheme for the evaluation and the certification of security of systems and products in the
sector of technology and information. The national scheme defines
the procedures and national rules necessary for the evaluation and certification of ICT systems and products, in compliance with the ITSEC
European criteria and the related ITSEM application methodology of
the international standards ISO/IEC IS-15408 (Common
Criteria).Within the framework of the National Scheme of evaluation
and certification it was created the Institution for the Information
Security Certification (O.C.S.I. Organismo per la Certificazione della
Sicurezza Informatica), mainly in charge of the National Scheme operation. The Higher Institute of Communication and Information
Technology (ISCOM Istituto Superiore delle Comunicazioni e delle
Tecnologie dell’Informazione) of the Communication Ministry is the
Body in charge of the Information Security Certification (OCSI) in
the field of Information Technology. The OCSI is fully operational
since February 17 2005, when the Decree of the Minister for
Innovation and Technology and of the Minister of Communication
bearing the “provisional guidelines for the application of the national
72
3.The relevant legislation
scheme for security evaluation and certification in the field of the
information technology. “
From a different but complementary viewpoint, of contents
rather than of infrastructures, on April 9 2003 it was issued the
Legislative Decree n. 68 “Implementation of the directive
2001/29/CE on the harmonization of some aspects of royalties
and related rights in the information society”.
The new decree provide also the extension of sanctions to illegal acts not provided before, such as the avoidance of technological
measures for data protection and their on-line diffusion (art. 23).
On July 29 2003 on the National Journal (Gazzetta Ufficiale)
it was issued the only source of the legislative scenario presented in
this work, that prescribes concrete, logical and physical organizational
security measures for the protection of networks and systems in the
private sector: it is the Legislative Decree n. 196 of the 30th of June
2003 – “Code in the matter of personal data protection”, that
includes, integrates and widens the entire Italian previous legislation
and implements the emanated European directives.
In fact this rule though refers to personal data and specifically
to personal data related cases, constitutes the only source that obliges
institutions and private companies to implement a consistent protection profile, leaving aside what has been independently implemented
by major companies.
The Decree strongly targets networks and integrates in the two
notions of network and electronic communication service both
aspects of voice and data in a perspective of technological neutrality
that makes it possible to apply measures to analogical, digital and wireless technologies. It includes and implements the European directive
2002/58/CE (Directive privacy in electronic communications)
which belongs to a fundamental group of five directives (2000 package), mentioned in appendix 1 ruling the different aspects of networks
and electronic communication services.
The implementation of the rule offers specifically to medium
and small companies an new opportunity to thoroughly face ICT protection issues since it is quite uncomfortable, except for some particu-
73
SECURITY NETWORK
from risk analysis to protection strategies
lar situations, to operate separate protection profile for personal and
not personal data (protection is designed and realized more easily if it
is targeted to the entire ICT infrastructure).
The Law provides the following security functions (art. 34):
• User’s authentication
• Adoption of the authentication credential management procedures.
• Use of Authorisation system.
• Periodic update of the identification of the processing range
allowed to individual in charge of and dedicated to the operation or the maintenance of the electronic tools.
• Protection of the electronic tools and data in respect with illegal treatment, not allowed accesses, and certain information
programs.
• Adoption of procedures for the custody of security copies
and the recovery of available data and systems.
• Update a programmatic document on security.
• Adoption of encryption techniques or identification codes for
the treatment of certain data suited to reveal the health conditions or the sexual life performed by heath institutions.
The adoption of the above mentioned security measures concerns personal data in general and in some cases only particular types
or situations (sensitive data, judicial data). In other cases the strength
of the adopted mechanism depends on the importance of the
processed information.
Apart the above-mentioned, the rule specifically provides several rules referred to as security organisational measures, specific for
the Electronic Communication sector, distributed in various articles
namely under Chapter X, Part II.
With the aim to extend to private sector the possibility of issuing security certifications of products and systems in a ITSEC and
74
3.The relevant legislation
Common Criteria perspective, on October 30th 2003 it was emanated
the DPCM “Definition of a National Scheme for the assessment
and certification of products and systems in the ICT sector”
This rule confers to the Istituto Superiore delle Comunicazioni
e delle Tecnologie dell’Informazione the ITSEC and Common Criteria
certification scheme management for the private sector. By doing so,
as soon as the Institute will complete the procedures to obtain the
mutual recognition with the Countries which have implemented the
above-mentioned schemes long time ago, the gap forcing Italian constructors to go abroad to obtain such certifications will be filled.
3.1.5 Ministerial documents, AIPA, CNIPA
The following documents constitute authoritative sources of
prescription (this is the case of the following DPCM) and the legislative and operational orientation.
On January 16th 2002 the Presidency of the Council of
Ministers, Department for Innovation and Technologies issued the
important Directive “Information and Telecommunication
Security in State Public Administration”
The directive covers two aspects: the census of the security
infrastructure existing within Public Administrations (implemented by
means of an attached questionnaire) and the prescription for PA to
conform to a minimum profile of protection, remarkably articulate
and detailed, also mentioned in an attached document
The rule also announced the creation, within a joint initiative
with the Ministry of Communications, of a National Technical
Committee on Information and Telecommunication Security within
Public Administrations, set up in the following months.
In march 2004 the concerned committee in line with its own
mission, produced a document entitled “Proposals in the matter of
information and telecommunication security for public administration”.
After an historical initial framework of the information security laws into force for Public Administrations, the document, part 1,
75
SECURITY NETWORK
from risk analysis to protection strategies
proposes a model for a governmental system of ICT security within
PA, based on the creation of a National Centre for Information
Security (CNSI) for prevention, identification, response and orientation.
It is suggested to create a CSIRT (Computer Security Incident
Response Team), which is being setting up today at CNIPA and it is
underlined the importance of the risk analysis, training of specialized
staff and users and the institution of security certification activities.
Part II examines back in more operative terms, the risk analysis aspect and defines the conformity criteria of a methodology to be
standardized with Public Administrations while it concludes by examining Business Continuity and Disaster Recovery processes.
In May 2004 CNIPA published the document “Guidelines for the
use of digital signature” with the aim to support users and companies in
the use of the digital signature. The document is very interesting and
really useful to the user (citizen, company and PA), it clarifies the situation (strong and weak signature) and explains how to obtain and
operate kit for the digital signature.
76
3.The relevant legislation
3.2. INDIVIDUALS AND RULE COMPLIANCE
3.2.1 Generalities
The wide production of legislative and orientation documents
on network protection, whose list we tried to synthetically but thoroughly reproduce in the first part of this chapter, fully covers the public sector by leaving space for reflection and improvement for private
users that could take advantage from the experience acquired by Public
Administration in this matter.
In fact obligations whose not observation is sanctioned concern substantially the Legislative decree 196/2003 (art. 33-36) which
anyway targets a specific type of information and not an infrastructural vision.
Law 547/93, from its side, has introduced the computer crime
without envisaging preventive compulsory measures, but only those
necessary to justify the crime hypothesis and the effectively criminal
nature of intrusive actions.
3.2.2 Major liabilities for individuals: rights, duties and
accomplishments
Electronic communication network operators
Both the Privacy Code (L.D. 196/2003) and the Electronic
Communication Code (D.L.259/2003) give a common definition of
electronic communication network: “transmission systems and, if it is
the case, switching or routing devices and other resources that make it possible to
transmit signals by cable, radio, by optical fibres or by other electromagnetic media
including satellite networks, terrestrial mobile and wired networks, circuit commutation and packet commutation networks, Internet included, the networks used for
the broadcasting of sound and television programmes, systems for electric power
transportation, as far as they are used to transmit signals, cable television networks
independently on the kind of transported information.”
Subjects operating these networks, which cannot be easily distinguished from electronic communication service operators, in addition to what provided for by articles 33-36 of Privacy Code, must
77
SECURITY NETWORK
from risk analysis to protection strategies
comply with the following measures provided for by articles 121-133
of the same rule:
(a) forbidden access to information contained in users’ and subscribers’ terminal
(a) drastic time limitations for storing transmitted messages in
one’s own memory
(b) time limitations for storing traffic data for billing or judicial
needs
(c) transparency and clarity obligations for subscriber as to traffic
data
(d) availability and flexibility of the caller identification service
(e) limitations and guarantees as to the use of user’s localisation
data
(f) availability of the block for call transfer service
(g) Guarantees and limitations of the inclusion of names in
provider repositories.
(h) Limitation of the spamming activity from the user side (no
control is envisaged for the electronic communication network
operator)
(i) Wish of the drawing of ethics and good conduct codes
(j) It is interesting to observe that among the above mentioned
points, sanctions are contemplate only for points (a) (by Law
547/1993), (b), (f), (h) and (i).
As we may notice once again the rule tends to force individuals to maintain given specific behaviours rather than propose infrastructural security measures, independent on the type of the processed
and transmitted data.
78
3.The relevant legislation
Electronic communication service providers
The privacy code in its art.4 defines electronic communication
services as follows: “any information exchanged or transmitted between a finite
number of individuals though an electronic communication service public accessible”
with the exception of radio broadcasting service.
The category of operators of these services, as we may understand, is hardly distinguished from the previous one considering the
strong functional and operational integration of the network and the
services. It is reasonable to think that all obligations described in the
previous paragraph may be also refer to this category.
Company users
Companies are obliged to implement minimal security measures by virtue of articles 33-36 of the Privacy Code, so exclusively in
relation to the owning and the treatment of data covered by the rule.
On the other side, Laws 547/1993 does not oblige but it simply envisages the need for appropriate security measures to identity and pursue the crime of undue intrusion.
Also in this case we may affirm that the structural approach
is null at least as far as the mandatory character is concerned.
Actually at least major companies and organizations of the
Italian landscape have prepared infrastructural security measures of a
certain importance. Nevertheless, in the last years resounding cases
indicating security related failures occurred.
The most important weakness we may identify is not related
with the purchase of protection hardware and software components,
but rather to human resources dedicated to the operation and the optimization of such components (organisational structure). The awareness that most of the effectiveness of installed hardware and software
protection measures depends on a correct and daily organization operation connected to suitably professionalized personals is not yet rooted in budget and company leaders.
79
SECURITY NETWORK
from risk analysis to protection strategies
Private users
Dangerous for the society represented by the lack of security
know-how of private users seems under evaluated. Private user’s universe, now massively connected to the net very often in an always-on
fashion since the rapid spreading of high speed connections, is not
even included in the scope of application of the privacy rule, which,
as we see, is the only one that imposes some obligations, even if within a peculiar data typology.
Private user’s liability in the (usually unaware) spreading of
worms is the most relevant aspect to consider; nevertheless it is not
the only one. Most of personal computers contain, apart owner’s
information, also correspondents’ data and similar. Moreover, a non
protected personal computer in the net constitutes an easy shore for
attacks to third parties.
3.2.3 The relationship with the judiciary and inquiring
authority
The relationship with the judiciary authority
For its own investigation needs the Judicial Authority is assisted by network and service operators. Their effective collaboration is
normally fruitful for Justice purposes and it is provided by law and the
companies are compensated for such activity.
With this aim, companies set up a quite complex, technical and
organizational apparatus, to show that with the proper motivations
even companies become sensitive to security organisational requirements.
The relationship with the investigation authority
Very often company leaders having suffered a computer crime
show a sceptical attitude to the real possibility of a Police action in
highly technological crimes. In addition to that, generally companies
are not very willing to denounce computer crimes against them to
avoid a possible consequent image damages.
80
3.The relevant legislation
Italian structures became significantly effective and reliable
showing a great commitment in the technical and professional updating implemented even by using know-how external to the institution.
Investigation actions are now performed with slightly intrusive
modes and generally they do cause no slowing in the normal operational and productive activities of the company. Certainly such investigative qualities may be highlighted and exploited by citizens only
when these special corps are get involved by a claim or by simply asking for an advice to try to prevent possible crimes.
The Postal and Communication Police provides the following
behavioural indications for those individuals that notice real or suspicious abuses:
• For each suspected abuse immediately call1 a specialized
police corp. It is necessary to facilitate the action of the information investigators called by the company, by helping them
to perform the internal preliminary investigation aiming at
assessing the real crime perpetration.
• Do not undertake any initiative before the arrival of the investigators to reduce to the minimum the incidental elimination/contamination of evidences.
• Set up an investigation support team made up of highly trusted persons. Investigators must be help to identify the elements of the concerned crime in order to identify the present
criminal case.
• Reduce to the minimum risks of further losses but at the same
time try to acquire useful elements to find out the offender.
These two activities are often logical antagonists between
them since the best system to interrupt an attack is switch off
the system and proceed to recharge cleaned system copies and
1 To consult the list of the territorial sections of the Communication Police look under the same
name at the web site www.poliziadistato.it
81
SECURITY NETWORK
from risk analysis to protection strategies
application programs. But in most of the cases this operation
reduces the possibilities of identifying the intruder.
• Keep the investigation highly confidential. Company structures should cooperate with the investigation bodies but
information on the ongoing investigation should be transmitted to the minimum number of persons to limit information
leakage within and outside the organisation. Thus information should be given only to those persons who will have to
know it.
• All communications (those indispensable) connected with the
ongoing investigation should be placed without information
systems (e-mail, internet etc.) to avoid whatever interception
by the insider or the intruder.
• In case of suspects on possible insider authors neither the
investigator nor the company employees should face or talk to
with these suspects not to give them the opportunity to
destroy the evidences.
3.3 CASES OF RULES VIOLATION
3.3.1 Information crimes
During the years the notion of computer crime has acquired a
very or even too wide meaning: today by computer crime we mean all
kind of crime perpetrated with the help of ICT means and hence of
the networks.
Certainly with such a wide meaning of the crime it is difficult
to identify solutions and draw rules. If the definition of information
crime seems to be legitimate in the case of a non authorised introduction in others’ system, the same definition is less acceptable for a commercial fraud or a paedophilia crime perpetrated with the help of the
network. It would be like classifying as a crime under the street law a
theft perpetrated with the help of a car.
82
3.The relevant legislation
It is worth saying that this so called wide meaning of the word
coincides with a non structured vision of the system network, but
with a vision of contents and behaviours supported by the same network.
For our purposes and more generally in line with the substance
of the Law 547/1993 that sets this kind of crime, the computer crime
is the crime that damages the information system as a whole or one
of its components (including the stored data). For physical persons
and legal entities information crimes according to the above-mentioned restricted meaning, are those envisaged by the above mentioned
Law 547/1993 that also establishes the conditions under which these
crimes may be pursued.
3.3.2 Non-compliance
To date possible non-compliance by legal entities (companies)
as referred to as omission of network protection, are limited to the
violation of the rules of the Legislative Decree 196/2003. Related
sanctions are included in article 169 of the rule. To date no possible
non-compliance may be attributed by physical persons.
3.4 MAIN REQUIREMENTS OF OUTSOURCING CONTRACTS
Nowadays, companies have to adapt rapidly to meet the
requirements of the specific competitive environment in which they
operate. As a consequence, their products/services have increasingly
shorter life cycles. In the past, the same car model, for example a Ford
“T”, could remain on the market for as much as 30 years and all it
needed was just small changes, while today each model has to undergo a comprehensive restyling after 2 or 3 years unless the manufacturer decides to stop its production. This ongoing adaptation to the
changing needs of their customers implies an ongoing adaptation of
the business activities involved in the production of a product/service. The companies are faced with continuous changes which they have
to address if they want to survive.
83
SECURITY NETWORK
from risk analysis to protection strategies
In such competitive environment, companies had to redesign
the way they operate, disregarding previous analysis of structures and
organization charts and focusing more and more on processes, that is
all the structured and focused activities designed to produce a specific output for a
specific market or customer2. Activities are re-classified based on the company’s specific Value Chain3 and the potentials for improvement of
each identified process or the technologies and roles needed to ensure
their functioning needs to be properly designed. Now companies plan
and make all the appropriate investments to make sure that they
achieve their own objectives.
In most processes, the main component of a comprehensive
business re-definition is represented by Information Technology,
which acts as the ‘nervous system’ of the new business models.
Flexibility and specialization become the pillars of a business organization in which both suppliers and customers are increasingly involved
in the Value Chain, which, as a consequence, turns into an inter-company chain. That is possible by outsourcing those business components which sometimes can affect the correct functioning of the
whole company. An example is given by the outsourcing of business
services on which the ICT management directly depends (ICT
Outsourcing).
The current tendency to outsource an increasing number of
business processes poses significant problems to companies with
regard to the security of the information they handle. Such problems
include the definition of adequate strategies to protect the information
and the need to comply with the legislation in force, especially the privacy code.
An ICT Outsourcing contract may be either full or selective.
For both types of outsourcing, it is essential to define adequate
requirements and criteria for the management of the security and con-
2 Davemport, T.H. “Innovazione dei Processi”, Franco Angeli, Milano, 1994, p.25
3 Porter, M.E. “Competitive Advantage”, Free Press, New York, 1985
84
3.The relevant legislation
fidentiality issues related to the information and the fixed assets transferred to the outsourcer. Such requirements and criteria have to be
characterised by levels of service consistent with the security policies
of the company outsourcing the product/service.
• Each security management service transferred to the outsourcer requires the definition of both parties’ obligations
without compromising the flexibility of the contract. The
types of security management services will be discussed in
details further on and be summarised as follows:
• Identity and Access Management (management of the users
who are allowed access to the ICT services available on the
infrastructure)
• Secure Content Management (operational processes which
makes it possible to prevent spam in e-mails, examine and filter their contents and protect outgoing messages against
viruses)
• Security Monitoring and Management
• Physical Security Management
• Secure Communication Services (identifying the processes and
tools which are necessary to spot false identities, attempts to
access confidential messages, unauthorised re-use of transmitted messages, falsification of sender’s name or address,
changes to the message contents, failure to deliver a message)
• Auditing and Reporting
• Compliance Management Services (verification of the actual
compliance with the established requirements)
• Security Training
In the most recent ICT Outsourcing contracts, the levels of
service associated with each one of the above listed services are measured taking into account not only the single components or the specific nature of each process, but above all the end user’s overall perception in terms of functionality and ergonomics.
85
SECURITY NETWORK
from risk analysis to protection strategies
However, in general, the companies those choose to outsource
their products/services seldom lay down, in their outsourcing contracts, the minimum security criteria (including inspections and controls) to be adopted by their partners.
3.5 AREAS OF POSSIBLE NORMATIVE INTEGRATION
In previous paragraphs, we saw that, in the last few years, the
regulations governing the functioning of the Public Administration
have been gradually integrated to address the new security needs especially after the recent approval of the Legislative Decree on the implementation of the Public Connectivity System. The same is not true in
the private sector (businesses and private users) where binding regulations are limited to specific types of handled information (Legislative
Decree 196/2003) and specific behaviours (Law 547/2003).
Preventive regulatory provisions specifically designed for network
infrastructures are lacking.
Such provisions should be introduced to affect network developers, network managers and network users alike according to criteria
of competence (role) and economic relevance (users), which is in line
with the fully connected topology which characterises networks.
The Legislative Decree on the implementation of the Public
Connectivity System requires the Public Administration to use only
those providers which comply with specific regulations ensuring the
security of IT transactions. Hopefully, these regulations will be adapted to form the basis for an ethical code shared by all providers of data
transmission services. That would represent a major guarantee for all
users: citizens, businesses, and private individuals in general.
3.6 CONCLUSIONS
The systematic and effective implementation of an adequate
level of protection for data networks (considered in their different
components) depends on a number of factors, not just the legal or
normative ones that we want to identify. Further on, we will discuss,
86
3.The relevant legislation
for some of them, the possible potentials for improvements with special regard to the normative framework.
Such factors include first of all, users’ initiative and awareness
levels; then, any awareness-raising programme developed by government bodies and, finally, the normative framework and any supportive
structure as well as shared and standardised methodologies.
All these factors are acknowledged not only at a national level,
but also by a European framework which is currently being developed
and consolidated.
3.6.1 Users’ awareness and initiative
At first, it is important to point out that, at this stage, we have
no scientific study of sufficient level and hence reliability (either at a
national or European level) offering a comprehensive picture of the
awareness level reached by institutions, businesses, public bodies and
private individuals on issues of network security.
Indeed, all the work published in the last few years are based
on generalizations and extrapolations of data collected from specific
sectors or on indirect evaluations, such as the recruitment of staff in
charge of business security, reports of virus-related attacks and other
attacks or telephone surveys conducted on insignificant samples.
The information provided here has no scientific value, either,
but at least is based on the experience of businesses which operate on
the market on a daily basis.
The EU recently announced its intention to conduct, in the
next few months and in all Member States, a fact-finding survey aimed
at assessing the awareness level of businesses and organizations with
regard to issues of network security and especially risk management
and operation continuity. However, this survey will focus only on the
private sector, thus excluding the Public Administration.
The general impression is that, for all the parties concerned,
initiative and awareness levels are still low and should be raised in
87
SECURITY NETWORK
from risk analysis to protection strategies
order to guarantee efficient and concrete results.
Low awareness levels translate into a general reluctance to
comply with existing regulations (whose number, in the private sector,
is still limited). Another major obstacle derives from the tendency of
most executives in both public and private sectors to consider network
security-related costs as unjustified and unlikely to prove rentable in
the long run either functionally or ethically.
It might be useful to make a comparison between network
security and similar concepts, such as road safety and public health
which, although well-established in our society, still pose major problems in terms of strategy and implementation.
Today, we are deeply aware of the impact that an epidemic
might have on a certain community both from an ethical perspective
(protection of human life) and in terms of social costs. That leads to
an adequate response in terms of awareness-raising, definition of specific regulations and sanctions and political and administrative organization.
The situation is completely different in the field of network
security. Indeed, professional associations, in the private sector, should
join their efforts to catch up with the achievements reached by government bodies in the public sector.
3.6.2 Legislative framework
In the present chapter, we explained that in Italy (see paragraph 3.1.4), the legislative framework concerning network security
obligations for the private sector consists of a small number of provisions contained in Legislative Decree 196/2003. In this regard, it is
important to note that:
Legislative Decree 196/2003 refers only to privacy policies and
the protection of personal data
this decree affects only businesses and private agencies, but
not private individuals
88
3.The relevant legislation
the high number and limited skills of private users, due to the
growing availability of high-speed always-on Internet connections,
represent a highly critical element.
It wouldn’t be strange to come up with a new specific legislative tool which, drawing on the provisions of articles 31-36 of
Legislative Decree 196/2003, could be extended and integrated so as
to include issues other than personal data envisaging:
minimum security measures affecting the whole infrastructure
rather than specific critical aspects of the data (which might form the
basis for a higher protection level)
minimum security measures designed for specific users: private
individuals, connectivity and application providers, businesses, agencies, Public Administration, etc.
On the other hand, the legislative decree that led to the development of the Public Connectivity System might be a valuable source
of network security measures and criteria also in the case of private
users (businesses, organizations and private individuals).
Indeed, a growing number of companies are either in favour
of ICT security certifications or have adopted them in their own working environment. In this regard, the reference provision is standard BS
7799, whose part 1 was converted into ISO/IEC standard 17799:2000.
89
SECURITY NETWORK
from risk analysis to protection strategies
90
NETWORK SECURITY
From risk analysis
to protection strategies
4 - Risk Analysis and management:
principles and methods
4.1 SECURITY MANAGEMENT SYSTEM
Before exposing the risk analysis and management and
networks protection measures, it is advisable to underline how hard
it is to adopt an effective protection system without considering the
most important elements of the security management system.
There are several standards and guidelines about the elements
of a proper security management system:
• OECD’s nine principles (see paragraph 3.1.2)
• The ISO 17799/BS7799 standards, including the BS7799:2000
part 2 document.
• The “Standard of Good Practice” of the Information Security
Forum (see the appendix 2.2).
It is important to consider also all the other standards and
guidelines about this topic, such as: the COSO Report on the
“Enterprise Risk Management”; the ISACA methodology for the ITT
Audit, also called Cobit; the ITSEC and “Common Criteria” standards, i.e. the guidelines of the CNIPA etc.
All these directives present several common parts that we can
summarize as follows.
91
SECURITY NETWORK
from risk analysis to protection strategies
Awareness
All the elements of a company must be aware of the need to
protect their resources starting from the top management to the whole
organization and different roles. A proper training level is needed to
reach the target.
Rules and organisation
It is necessary to define an organization model aimed to security by defying tasks and responsibilities. Security rules will be effective
only if maintained at high level, including, among their tasks, the
search of the best strategy, particular society targets and their performance assessment systems.
Risk analysis
As described in the paragraph 4.2, the risk analysis is crucial to
know threats and problems of the organisation as well as efforts and
resources (limited by definition) needed to protect the most threatened
areas.
Policy and procedures
Once explained the risk analysis, it is important to define policies and their procedures. They are characterised by three levels: general, describing the organisation, the government system, its goals and
principles; users, i.e. the daily user behaviour with respect of technologies; and technical, by which the ICT staff learns how to manage
the stages of technology implementation and maintenance.
Continuous monitoring and tuning of the protection system
The security management system must be designed in order to
guarantee the best monitoring, both operational and management,
allowing the organisation to react and adapt the whole system to the
changes of the risk domain.
92
4. Risk Analysis and management: principles and methods
4.2 RISK ANALYSIS
4.2.1 The importance of risk analysis
Nowadays, economic and social life cannot be separated by the
corresponding information resources and its communication networks.
Unlike the physical world, information and networks are vulnerable to risks of wide nature, often hidden and constantly evolving.
Furthermore it can be observed that:
• networks are more and more sophisticated and their changes
create new risks
• a complete protection leads to a limited and slowed down
usage of network resources
• the protection technique strictly depends on the considered
risk
• the costs of a high security system, that goes far beyond the
needs or extended to the lower impact elements, are often too
high.
Hence it is important to carry out a risk analysis in order to:
• define information threats against the organization
• Assess their impact in case of occurrence
• Define and implement countermeasures in order to mitigate
the risk with a commiserate effort to the potential impacts
The risk analysis is then crucial in order to choose the best
countermeasures without guessing them, balancing these countermeasures with respect of their costs and risks.
The risk analysis is one of the most important elements of the
security management system. It is furthermore required directly or
indirectly by EU, national laws (see chapter 3) and by the main reference standards such as:
• the ISO 17799 – BS7799 standard
93
SECURITY NETWORK
from risk analysis to protection strategies
• ISF Standard of Good Practice
• CobiT (ISACA “Control Objectives of IT Governance”)
• GMITS (“Guidelines for the management of IT Security”;
parts of these documents are also known as ISO 13335 standards).
The risk analysis assumes even more importance in wider context of corporate risk analysis and management such as the Corporate
Governance and the Basilea II document.
The latter is targeted to market and credit institutions and
provide for a management programme of all risks related to business
(from credit risk to market and financial risk) and operative, including
those related to the information systems (information risk).
The growing importance of the information risk analysis with
respect of the more general context of the corporate risks management is based on the growing support that Information Technologies
provide to the business and the corresponding corporate process.
So, the information risk (that is the risk related to the lack of
information system protection) influences and conditions more and
more the other risks categories (financial, market, operational risks,
etc.).
The risk analysis must be carried out a priori, periodically and
in a continuous/dynamical way (see paragraph 4.2.3), in order to
updates the protection system to the effective and real identified need,
allowing at the same time the best use of available resources.
4.2.2 General notes about the different risk analysis
methodologies
There are several risk analysis methodologies, with different
targets and features but most of them share some common concepts,
elements and procedures.
There is no best methodology: it is important to understand
which approach could be the best considering its feature with respect of:
94
4. Risk Analysis and management: principles and methods
• a more in-depth analysis
• risk measurement system
• repeatability and frequency of the analysis process.
A more in-depth analysis
Considering the broadening of the risk analysis executed it
allows to classify the implemented approach as a conceptual
approach, i.e. related to the management and addressed to the organisation and its processes, or as an operational approach, i.e. related to
the person in charge of the information systems and addressed to
technologies and the operative context.
The conceptual high level risk assessment allows:
• to define the risk profile at a strategic and organizing level
• to define the organization threats and the critical macro areas
or the risk context to address over time
• to define a plan of immediate enterprise interventions
• to define the general security policy.
Such an evaluation attains the importance of enhance the perception and awareness of the corporate top management about the
importance of the security management plan definition and implementation. It achieves also the commitment to guarantee the security plan and above all allows addressing the effort towards the most
critical areas (technological sites, simple systems, business networks) in
order to create a deeper risk analysis.
The operational risk analysis is target to a detailed and indepth security assessment of the single technologies, systems and specific network environment and aims the following macro targets:
• comprehension of vulnerabilities, threats and risk to which the
single technologies are exposed (application platform, systems, networks, etc.) and the processed information
95
SECURITY NETWORK
from risk analysis to protection strategies
• Define security architectures and technological standards
• check policies and system management procedures
• propose operational measures for the identified weakness corresponding to necessary security controls
• Achieve the compliance to the security technologies best practice.
Value quantification modes
In order to choose the best methodology it is important to
consider the metrics system used by the methodology itself for the different model elements with respect to the defined targets.
A quantitative measurement system, based on statistics and
monetary elements, allows the definition of an investment budget in a
more immediate way, but it could be too complex to elaborate and
could not entirely avoid subjective evaluations.
In order to use this approach all risks elements must be quantified (resource recovery cost, image damages for the company, etc.).
To achieve this it is necessary to have access to high quality information not easily available.
There are two variants inside this approach that could be
defined (other than a quantitative approach): the truth and the appearance. The first includes cases in which numbers that represent real
quantities are used. This is the case of the damage directly estimable
with the monetary unit.
The second case, which has been defined as apparent quantitative, i.e semi-quantitative, has been created to address the cases
where there is a need (related to a computer use) to convert qualitative
measures into numerical values.
For example, a criticality value, initially expressed with qualitative terms as: high, medium, low and void can be expressed with a
correspondent set of numeric values (i.e. 3, 2, 1, and 0) in order to
allow a logic product with another measure (i.e. the exposure risk
level).
96
4. Risk Analysis and management: principles and methods
The pure-quantitative approach, certainly more precise than
the qualitative one, is not easy to apply, mainly for two reasons.
The first is that often the values are not available (who can precisely define the value of a material good, for example an investment
fund, not managed by a bookkeeping procedure at the necessary analytical level and how to behave in case of image damage?).
The second is that, considering the lack of objectivity for such
values, the risk is to wrong estimate goods, assigning a numeric values
to something that express a qualitative evaluation.
Qualitative methodologies do not require statistical data
expressing values in terms such as low, medium, high, crucial and
critical.
Such approaches may seem superficial and less precise, but in
the reality it turns to be more honest also because generally the risk
analysis logical model ends with the countermeasures identification
which are expressible in discontinuous terms, vanishing the quantitative approach, assuming that it is possible to attribute affordable values to the different entities.
The main aspect the designer has to face with is the metric
balance, in terms of excursion, of the possible values for the different concepts and for the different metrics systems used, being qualitative based or quantitative based systems.
As a matter of fact, it is clear the relations and functions that
imply concepts measured according different scales which are not congruent could lead to inconsistent results.
The identification of a verification system for the consistency
assessment of the different metrics systems is an open issue up today.
The conclusion could be that the quantitative system is more indicated to the conceptual business context analysis, while the qualitative
one targetes the operative analysis where the countermeasure efficiency dominates the cost justification.
97
SECURITY NETWORK
from risk analysis to protection strategies
Repeatability and frequency of the analysis process
With respect of the repeatability/frequency of the risk
analysis process two different existing methodologies could be distinguished: the static approach and the dynamic/continuative
approach.
The static approaches:
• Provide a picture the actual security status;
• Require periodic revision, with different expiration date,
according to the deepness analysis level:
- Once a year in case of conceptual/organizational analyses;
- Every 3-4 months in case of operative/technological analyses.
• Have different targets according to the deepness analysis level:
- Definition of Security management policies and organizational infrastructure, in case of conceptual/organizational
analyses;
- Definition of Security architectures and technological/controls standard after the assessment of the vulnerabilities and
threats to which technologies are exposed (technological
analysis level).
• Involve all the organization, despite their dimension, and
specifically in the case of a first risk assessment analysis
• Usually are managed under specific corporate functions
responsibilities, generally in the ICT range (ICT manager,
Security Officer, Security Committee, etc.); thus the other corporate functions are passively involved.
The dynamic/continuative approaches:
• Do not evaluate security situation in a precise moment but
they offer the elements to analyse and manage the risk contin98
4. Risk Analysis and management: principles and methods
uously and dynamically.
• Risk evaluation and management are crucial parts in the
processes of implementation, maintenance and monitoring of
information systems.
• Are mainly based on quantitative risk measures (using tools
such as the Balance Scorecard and Key Performance indicators).
• Integrate the information risk management within the one of
all business risks and, particularly, into the one of ordinary
operational activities (implementation, change management
and operability).
• Lead to the decentralisation of risk management, involving all
business functions, furthermore, they require the commitment of all the members of the organization, including the
top management.
• Cover any analysis level and carry out both conceptual and
operative/technological analysis.
The current trend shows the more and more growing diffusion of approaches, and models of analysis and management of
dynamic and continuous risks, addressed to corporate business and
integrated with all the other analysis of corporate risks (operational,
credit and financial risks).
For further information about the best national and international methods, see the appendix n.2.
99
SECURITY NETWORK
from risk analysis to protection strategies
4.2.3 Common elements among the main methodologies
Apart from methodology in use, there are many elements and
stages of risk analysis common to all the methodologies. As a matter
of fact a risk assessment, independently from the used methodology
must allow to:
• Define the agreement for the carrying out of the analysis,
defying what to defend against the risk.
• Locate and evaluate hostile agents, threats, attacks and vulnerability.
• Define which the threats to face are.
• Calculate the final risk, evaluating the acceptable levels, and
define the countermeasures to keep the risk within them.
Most of today’s analysis methodologies include all the elements listed above, but they have different concepts and terms, often
not well defined and far from the prevailing meaning, which is defined
by the reference standards. This is the case of terms and concepts of
protection, danger, threat, attack, damage and, hence, risk.
This paragraph is important to pinpoint the prevailing meaning of the following concepts and their definitions:
• Boundary of intervention
• Information resources (census and classification)
• Protection attributes
• Threat census
• Vulnerability census
• Occurrence probability (Threat exposure)
• Impacts evaluation
• Countermeasures definition
• Risk reduction after the countermeasures implementation
100
4. Risk Analysis and management: principles and methods
Boundary of intervention and information resources
First of all we have to define the Boundary of intervention
and hence the interested society and the managed information.
Afterwards, we must proceed to an analytic census of information included into the border of intervention. The details of the
census depend on goals and types (conceptual/operative) of the risk
analysis to carry out.
In order to create a conceptual analysis, it’s enough to take a
census of the process data (billing, payments and staff) or the application system, while the operative analysis needs to consider even reference technologies (communication networks and hardwares/softwares used for the process).
Anyway, we must compare the single elements that made up
the information, such as data, software, technologies and all the
processes needed to locate the proper methods for information access.
All these elements must be classified for homogeneous categories in
order to evaluate threats and vulnerability.
Information networks characterize the communication and
processing systems (input, output and updating) of all the information, and hence it may be noted that they could be protected apart
from information they process. This could be true in some circumstances (for instance the back-bones of a telecommunication society).
Anyway, we must be aware of what it has to be protected and
how many resources are needed to protect all the elements of the
information asset, according to their criticality.
Goals and protection attributes
Before proceed it is important to define the goals of protection systems. It influences all the activities since business goals of a
profit society cannot be compared to the missions of no profit or
government organizations and thus the protection goals.
According to these goals there are some other features to
define and evaluate one by one. These influence the process of risk
assessment and the corresponding protection technique choiceness.
101
SECURITY NETWORK
from risk analysis to protection strategies
As underlined before (see paragraph 1.5), the current best
practice is characterised by three security attributes: confidentiality,
availability and integrity.
It is advisable to evaluate one by one these three attributes,
since they present different risk scenarios.
Threat census
The risk strictly depends on the concept of threat, which constitutes an equivalent concept without the two features of probability
and consequential damage. Furthermore, the risk can be considered as
a negative event that causes damage to someone or something. Threat
is as a matter of fact such event.
The threat can be thus defined as anything that causes lose of
the attributes of security, confidentiality, availability and integrity.
The threat is often an undesired event that can be a priori
potentially identified. It could be classified as an internal or external
event. A threat is actualized by attacks of different actuation.
There is a tendency to protect the boundary of intervention
mainly against external threats, maybe because of their exposure, with
respect of the internal ones. The reality is that internal risks are the
most frequent, so they can’t be underestimated. For instance, the survey CSI/FBI of 2003 underlines the importance of internal threats
(77% of partecipants).
Internal threats and the corresponding countermeasures strictly depend on the organization and the nature of the process of the
information, while external threats can be influenced by the technologies used, apart from people or processes.
The determination of internal threats must consider the specific organization environment while, the external ones can be treated
by more standardised solutions belonging to the mainly adopted technologies.
102
4. Risk Analysis and management: principles and methods
Vulnerability Census
Another important concept is that of subject exposure to a
defined threat. We must treat this concept together with another one
belonging to the list of the qualities of subject, that is the vulnerability.
The vulnerability is an organizational or technological condition that allows the threat actuation. Threats are present anyway but
vanish, ideally, in absence of threats. On the contrary, threats has a
greater chance to actuate in presence of numerous and important vulnerabilities.
The vulnerability can be organizational or procedural (for
instance, due to a lack of a vital corporate function, i.e. monitoring) or
a technological (technical weakness of BIOS, operating system, database, etc.).
Technical vulnerabilities can be located by means of special
scanners, i.e. automated products for the continuous scanning of
technical weaknesses, or by the activities of attack and penetration.
The figure 4-1 summarizes the most common vulnerability
categories as classified by a security survey carried out, in the year
2003, by Pricewaterhouse Coopers and CIO Magazine.
The main factors leading to vulnerability proliferations are:
• Faulty components
• Geographical distribution
• Dimensions and complexity
• Technological evolution
• Limited security problems know-how.
The level of vulnerability can be reduced through the implementation of proper security countermeasures, listed in the chapter 5.
The vulnerability cannot ever be totally eliminated, because even the
countermeasures present weakness.
103
SECURITY NETWORK
from risk analysis to protection strategies
Figure 4-1 – The most common vulnerability categories1
Occurrence probability
As indicated somewhere else in the document, the risk can be
identified as the product (logical or arithmetical) of the impact
(caused damage) and the occurrence probability of a particular
threat. The determination of this probability can be expressed by a
judgment or considering, when available, the statistics of accidents and
attacks or both of them.
All the elements that contributes to the risk and hence, threats,
attacks and vulnerabilities have to be analyzed in this phase. The table
4-1 relates some examples of threats with the corresponding attacks
and vulnerabilities.
1
Taken from “Information security: a strategic guide for buisiness” © PricewaterhouseCoopers 2003.
104
4. Risk Analysis and management: principles and methods
Impact evaluation
One of the most important aspects of the risk analysis process
is the determination of the impact upon the resources to be protected
and upon the enterprise as a whole when a threat is successfully actuated. The impact, as described in the previous, is the second component of the risk after the threat probability occurrence.
The condition for which a metric system (i.e. conceived to
measure) could be applied to a concept is that such concept can be
measured. That always happens for qualities, while for entities two
cases exist. The first is the one in which the entity itself is measurable
by means of its nature (i.e. damage); the second is the case when the
entity is not measurable by itself but it becomes so by means of its
qualities (it is the case of the subject, of which we measure the criticality).
For further information about quantitative and qualitative
approaches see the paragraph 4.2.2
Measurement and risk reduction
In formal terms, the risk is defined as the product (logical or
mathematic) between the event occurrence probability and the
damage (R=Pa*D). If, at least, one of the two terms of the product
goes to zero, the risk is very low.
For qualitative measurements it is necessary to identify a system measuring that allows the two components of the risk to be measured homogenously, through a properly set system of degrees.
In practice, it is useful to consider two aspects of the risk. The
first, called absolute or intrinsic risk and the second defined as
residual risk; this latter concept contrary to the first one takes into
account of the identified countermeasures effects.
105
SECURITY NETWORK
from risk analysis to protection strategies
Threat
An outsider
accesses
the private
network
of the
organization.
Attack
Vulnerability
The outsider accesses the
system through a backdoor
using a Wireless Local Area
Network (Wlan)
- Network Service Set Identifier (SSID) has not
been properly masked.
- The unauthorised access point has been
installed by an internal employee.
- Wired Equivalency Protocol (WEP) is weak
and the corresponding cryptography session
has been interrupted.
The outsider accesses acting a
password brute force attack
- Inadequate length of the password
- Weak passwords subjected to dictionary attack.
The outsider steals an authorised password
- The sequence of non cryptographic identification leads to intrusions
- Low level of monitoring
- Trojan Horse installed on the network
A disappointed ex employee
access to the systems in order
to obtain classified information
- Non deleted accounts and passwords after
the resignation
- The passwords for dial-in servers or WLan
access points have not been deleted after the
resignation
Financial
losses due to
fraudulent
operations
The attacker simulates a real
web operation
- Inadequate cryptography and identification in
communication application channels
The intruder accesses
the client’s credit cards records
- Access controls compromised on a critical
database
Loss of
critical data
A terrorist attack destroys a
database
- Inadequate backup and redundancy procedures
A “Troy Horse” program
deletes an hard drive
- The employees have not been sensitized to
the risk of downloading software from
unknown sources
- Not-updated antivirus software
“Denial of Service” attack
through the “ping” technique
overcharges servers paralyzing
them
- The router badly configured cannot detect
badly formatted packets
- The server operating system is not updated to
the most recent security standards
- Inadequate antivirus defences
An intruder re-configure the
router in order to block the
legitimate traffic
- Impossibility of resetting the default
administrative password on the system
Continuous demands
of applications saturates
the server resources
- Inadequate application development
- Inadequate identification controls allows
fraudulent calls to be accepted as genuine
Internet not
available,
causing loss
of revenues
due to
network
inactivity
Table 4-1 – Relation among threats, attacks and vulnerabilities 2
2
See note 1
106
4. Risk Analysis and management: principles and methods
Countermeasures definition
During the process of risk assessment an acceptable level of
risk needs to be identified and compared with the available budget.
The countermeasures indicate the organizational and technological measures able to face and reduce risks to a pre-defined
acceptable level.
Within the risk analysis process the countermeasures can be
defined generically, to be subjected to a deeper investigation and further analysis and definition in a more operative viewpoint. It is very
important to define acting modes, times and responsibilities in a proper implementation operative plan.
Final notes
In this section, we wanted to identify all the components of a
general model of risk analysis. Our goal is to identify a clear map of all
the elements of a generic model, in order to better understand the
schemes of the different models today available on the market. Some
of them are described in the appendix n.2
4.2.4 Risk Management
The previously described risk analysis makes it possible to
define the most adequate countermeasures to implement. The adoption, in other words implementation, of countermeasures, as well as
the management and long-term monitoring of the actual security status, all belong to the risk management environment.
Controllable and effective security measures must be adopted to effectively counter the risks identified and associated with the use
of infrastructures for data management, processing and exchange.
Information security must therefore be considered as a global
characteristic, able to meet the desired level of privacy, integrity and
availability of information and services, in keeping with the evolution
in time of needs and technologies.
An illustration of the activities involved in a complete risk
107
SECURITY NETWORK
from risk analysis to protection strategies
risk awareness
risk
control
risk
analysis
risk mitigation
Figure 4-2 – Risk Management Life Cycle
management process is presented under figure 4-2 below.
The illustration clearly shows that the risk management
process must be continuative and replicable.
To actually safeguard information security by means of
careful risk management, an adequate Security Management System
(SMS) must be integrated within the organisation responsible for creating, updating, deleting and maintaining information, and organised
according to the three dimensions of the problem:
• Processes
• Organisation
• Technologies.
Failure to analyse one of the three above-mentioned dimensions, or a fragmentary and limited approach without a homogeneous
overall assessment framework for the current state of information
security, entails the potential ineffectiveness of any corrective actions
undertaken because of the limited or incomplete assessment of an
identified problem.
108
4. Risk Analysis and management: principles and methods
Generally speaking, the issues to address are the following:
• Identification and definition of corporate processes and associated risk environments
• Compliance with national and international security standards
and provisions (e.g. Italian Law Decree 196/2003)
• Definition of a security management strategy
• Decision as to the guidelines a company intends to adopt in
terms of security management
• Preservation of investments previously or about to be made
on the security of IT systems.
Risk management essentially depends on:
• The corporate mission
• Compliance with laws and standards
• Economic availability.
One of the fundamental purposes of a Security Management
System is to reach a reasonable compromise between the cost of
security and the costs of non-security; the main objective is to
ensure a long-term, stable and optimum protection level.
According to the considerations made so far, risk analysis cannot be considered the only relevant element for comprehensive risk
management, but it is important to:
• Effectively implement adequate countermeasures and establish an interactive efficiency monitoring cycle
• Continuously update risk evaluation by periodically repeating
the process or implementing dynamic risk management systems
• Consider the entire security management context (see 4.1).
109
SECURITY NETWORK
from risk analysis to protection strategies
The global perception of the problem has led to the current
trend of converging risks analysis models and risk management systems, essentially by means of modern analytic methodologies and
dynamic evaluations. Such methodologies also take into account
changes that have an impact on information resources, and the outcome of the incidents/attacks monitoring which will influence the
updating of risk assessment criteria.
4.2.5 Risk Analysis Support to the Privacy Management
System
In Italy, Law Decree 196/2003 regulates the privacy management system (generally known as the Codice della Privacy (privacy law)).
This law guarantees that personal data is processed in compliance with the fundamental rights and freedoms, and with respect for
the dignity of the party concerned, especially in relation to privacy,
personal identity and the personal data protection right.
Consequently, companies have had to perform a series of both regulatory and technical-organisational accomplishments, including the
adoption of specific security measures.
One of the requested fulfilments is the adoption of the
Programmatic Security Document for the electronic processing of
sensitive personal data.
To prepare the document – one of the minimum security
measures provided for by art. 34 of the Code and point 19 of the
Technical Requirements, appendix B of the very Code – it is requested, among other activities, to perform a risk analysis on the personal
data processing system managed by companies or organisations.
On the basis of the above, especially with reference to the
principles and ratio of the law, it appears that the emphasis in the
application of risk analysis within the privacy management system differs from the general risk analysis supporting a corporate security
management system performed within the entire corporate information heritage.
It is interesting to pinpoint the differences between the two cases.
110
4. Risk Analysis and management: principles and methods
One difference lies in the objective that is to be reached: risk
analysis does not so much aim at identifying – thereby reducing – the
consequences of events that are potentially harmful for companies
that process their own data/business processes, but rather at identifying the consequences of harmful events for the subjects the data pertain to; in other words, the objective is to protect the processing of the
personal data of the subjects protected by the privacy law.
The object of analysis is different: when performing risk
analysis for a company, the objects of protection are the corporate
resources and information. Instead for risk analysis in a privacy context, only the data pertaining to the private sphere of the subjects concerned are examined (i.e. database or repositories containing such
data) and correlated to their processing within the company or the
organisation responsible for the processing.
• Thus, the very modus operandi of the risk analysis process is
different:
• Impact evaluation is no longer required
- It is no longer necessary to classify information according to
their criticality level, for the provisions supply a classification and make a two-level distinction of personal data:
- Sensitive
- Not sensitive (also referred as common or ordinary personal data)3.
Companies and organisations nevertheless still have the
uncommon task of having to identify the existence of ordinary and
sensitive data, both internally and with any outsourcing partners, and
correlating them to pertinent processes and applications.
3 The provisions indirectly identify a third data category: those that do not fall within the range of
application of the provisions.
111
SECURITY NETWORK
from risk analysis to protection strategies
112
NETWORK SECURITY
From risk analysis
to protection strategies
5 - Network Protection
Measures
5.1 TECHNOLOGICAL MEASURES
Current ICT technology is the direct product of the standardization activity launched in the eighties, when the international body
ISO/OSI defined a network reference model organised in seven different layers with a specific task each: Physical, Data Link,
Network, Transport, Session and Presentation.
With the exception of the first (Physical) layer, a protocol is
usually adopted for each layer of the ISO/OSI stack to enable communication and data transfer among users belonging to the same network, following pre-defined rules. When at least two systems need to
communicate, all the ISO/OSI stack layers are involved, from the
application layer, from which the information to be transmitted is
usually generated, to the physical layer, where the information is converted into digital signals that enable transmission to the final destination.
Information can be compromised as its transits through one
of the aforementioned layers, which is why network equipment must
be secured with specific countermeasures for each layers of the
ISO/OSI stack.
113
SECURITY NETWORK
from risk analysis to protection strategies
Data
Application
Internal Network
Perimeter
Figure 5-1 – ISO/OSI Levels and Protection Technologies
Figure 5-1 represents the main protection technologies and the
different assets they are able to protect. Technologies are actually quite
often able to secure several levels (from the network to applications),
though for an effective security strategy, it is important to fully understand the intervention range of each technology, and especially the
risks they are able to mitigate throughout the information life-cycle.
5.1.1 Firewall and VPN
A firewall is generally the privileged tool for protecting and
monitoring communications among the different networks of an
organisation. A firewall is a hardware and/or software system able to
control the traffic flow from untrusted networks whose security level
cannot be determined, towards trusted networks with known security
level that are equipped with the necessary protective measures.
114
5. Network Protection Measures
The market offers a large variety of firewall technologies that
have been designed specifically for the networks they are intended to
protect: from WAN (ADSL, ISDN, Frame Relay) to LAN (Ethernet,
Token Ring, etc.) networks. Modern firewall technologies are able to
check communication protocols from the lowest (physical level) to the
highest (applicative level) layer, while most controls are performed
on the layers that have a direct implication with the network.
Untrusted Network
Trusted Network
Figure 5-2 – Firewall and Networks
For the function to be effective, all traffic requiring protection
must pass through the firewall system that will apply the pre-defined
security policies to grant or deny access to the requested resources.
In the typical network equipment of a sufficiently computerized organisation, one usually talks about boundary protection and
internal protection when using a firewall system.
The former means securing communications between the
external boundary of the network (typically Internet/Extranet) and
the rest of the infrastructure. Instead, the latter refers to the necessary
countermeasures for protecting communication within the organisa-
115
SECURITY NETWORK
from risk analysis to protection strategies
tion. In this case a firewall can be adopted to further segment the internal network and protect particularly critical corporate networks.
The following table summarises firewall technologies of the
main products on the market.
Firewall Technology
OSI Layer
Characteristics
Packet Filtering
Network (3)
Limited security, high
performance, Network Address
Translation (NAT)
Application-Level Proxy
Application (7)
High security, low performance
Circuit-level Proxy
Session (5)
Stateful Inspection
From Network to
Application (2-7)
Medium security, medium
performance
Compromise between security
and performance
Table 5-1 – Predominant Firewall Technologies
VPNs (Virtual Private Network) are designed with technologies that enable the implementation on public physical connections of
protected, therefore private, virtual links. These technologies resort
to specific transaction secure protocols, for instance IPSec, that use
cryptographic algorithms both to identify users and guarantee the privacy of the information exchanged. The functions provided for
include key management that is performed transparently for the users.
For the system to be globally efficient traffic between the router and
the corporate router is usually encrypted, thereby excluding any local
networks within the company. In other words, the VPN function is
implemented on so-called enforced routers, as an addition to the ordinary routing function. VPNs can also be implemented between one
client and another.
5.1.2 Network/Host IDS
The Intrusion Detection System (IDS) is another piece of
technological protection equipment for systems and networks. Unlike
a firewall, considered an active protection system, an IDS is usually
116
5. Network Protection Measures
perceived as a passive measure, able to monitor and analyse network
events without interfering directly to prevent them.
An IDS collects information from hosts and network segments (DMZ, Internet backbones, LAN segments, etc.) to identify
potential violations (external or internal attacks). The technologies
adopted by modern IDS systems can be divided into two main categories:
• Pattern matching. The system analyses the package flow to
find sequences that can be associated to known attacks; these
sequences are stored in a regularly updated database. In this
sense, it is similar to an antivirus service that only identifies
known attacks.
• Statistical/Traffic anomaly based. Unlike the above, violations are identified thanks to the analysis of differences
between traffic quantity and typology, and the pre-established
thresholds considered normal or standard for the situation
examined. This approach makes it possible to identify
unknown attacks, though it is highly vulnerable to transitory
traffic variations that are in most cases not related to an attack.
Such systems are therefore considered less reliable than those
mentioned previously.
Despite the analysis technology implemented by IDS, one
tends to distinguish two common setups, depending on the nature of
the assets monitored: network based (analysis of network segments)
and host based (analysis of the single hosts).
• Network IDS. A NIDS (Network IDS) performs real time
analysis of the packages passing through the network they act
upon, searching for sequences that could derive from violations, attacks to the network, or simply the suspicious use of
resources. When a potential attack is identified, the IDS notifies administrators or security managers who will decide if
further preventive actions are to be taken.
117
SECURITY NETWORK
from risk analysis to protection strategies
• Host Based IDS. A HIDS (Host IDS) performs real time
analysis of the traffic destined to one specific host, to unveil
malicious or suspicious activity. These IDS systems are implemented directly on the monitored host. The approach also
makes it possible to analyse the intrinsic data of the host, such
as main system and log files.
Though the two systems seem similar, the following factors
must be considered carefully before deciding upon an IDS system:
• Network architecture (number and typology of network segments)
• Complexity level and security requirements
• Number and typology of hosts/servers to be protected
• Existing technologies characteristics
To achieve maximum benefits from an IDS system, the policies/parameters that regulate how the system works must be optimised (tuning), thus ensuring a minimum number of false positives
(notification of non-existing attacks) and false negatives (failure to
notify real attacks).
Lastly, in view of the huge quantity of data monitored by IDS
systems, it is important to carefully assess the hardware/software performances making up the IDS solution. Generally speaking, best performances are achieved by dedicated security appliances, which are
able to analyse large traffic quantities within the time unit.
5.1.3 Access Server (RADIUS/TACACS)
Generally speaking, any access from without the corporate
network is a potential threat for the organisation. However, need for
constant access to corporate data, even when access to the information system from the inside the organization is physically impossible,
requires technologies enabling direct access to the internal systems, for
118
5. Network Protection Measures
instance by means of a telephone connection from anywhere in the
world, despite the local time.
The infrastructure that allows for the above is commonly
known as remote access and is made up of a set of technologies that
transparently connect a remote computer to the internal corporate
network. Such infrastructure is especially useful to connect the laptop
of a staff member to the organisation network, allowing him/her to
use corporate services (e-mail, file server, intranet, etc.).
To prevent such access from becoming vulnerability factor for
the organisation, adequate protection technologies must absolutely be
adopted. Two among the most widespread standards for remote access
protection are: RADIUS (Remote Authentication Dial-In User
Service) and TACACS (Terminal Access Controller Access Control
System).
Integrated in access servers, the two above-mentioned technologies check the credentials of users who log-in from the outside,
through a user name and password pair, or, in the most advanced
versions, by means of strong authentication technologies (smart card,
token, digital ID, etc.).
User authentication
by means of
RADIUS/TACACS
Remote User
Headquarters with
Access server
Figure 5-3- Remote Access Server
119
SECURITY NETWORK
from risk analysis to protection strategies
RADIUS technology is used by many ISPs for user authentication. A user establishing a connection on a dial-in line will enter
his/her username and password; the RADIUS server will then make
sure the latter are correct and grant the user access to the system.
Lately, RADIUS technology is often used also within organisations, by means of a centralised authentication system for the management of network appliances or access via wireless devices.
The TACACS protocol is very popular in UNIX networks. It
enables remote access servers to communicate with an authentication server where authentication credentials for accessing the network
are verified.
To prevent credentials theft, both technologies usually encrypt
authentication information prior to introducing it onto the network.
5.1.4 Wireless Security
Wireless networks are those networks where all connections
occur via radio connections instead of wire connections. Basically,
in a wireless network, mobile devices (typically work stations, but
sometimes printers or other peripherals) communicate by radio signals, while wires connect fixed elements (network appliances, system
servers).
Compared to a wired network, wireless networks are potentially more vulnerable due to their intrinsically open nature. Thus, a set of
protection mechanisms have been defined with the purpose of ensuring comparable security on wireless and wired networks.
The security protocols are listed below, in the increasing order
of their protection level:
• Wired Equivalent Privacy (WEP): this is the first standard
protection mechanism for networks based on IEEE 802.11
protocol, which defines methodologies both for the encryption of data exchanged between a mobile client and an Access
Point (AP), and the authentication of mobile devices. The
120
5. Network Protection Measures
WEP protocol soon revealed weaknesses such as:
- The authentication protocol is not bi-directional (the AP
identifies the client, but the opposite does not apply).
- Only devices are identified, not users.
- There is no keys management, the keys are static, and can
therefore only be managed by means of manual configuration
operations.
To increase security levels, some APs implement a control
function for device authentication, based upon the identification of the network address of the device through which connection occurs; this technique is known as MAC Address
Authentication and uses a list of addresses configured on the
AP.
• IEEE 802.1X: to overcome the intrinsic limits of WEP protocol, IEEE 802.1x standards were defined, x being the letter
identifying its features. The family of 802.1x protocols
enables the authentication of a user on a wireless network
thanks to a central authentication system. The Extensible
Authentication Protocol (EAP), also used in point-to-point
networks, makes it possible to adopt different authentication
schemes that can be negotiated between mobile clients and
the AP during connection phase.
The most famous of such schemes is the Transport Layer
Security (EAP-TLS) used in environments that use certificates, usually stored on electronic cards, for remote authentication.
The Protected EAP (PEAP) was introduced to enhance the
security of the EAP protocol: encrypting credentials when
user log in to the network.
It is common to associate an authentication server using
RADIUS technology to the networks based on 802.1x and
121
SECURITY NETWORK
from risk analysis to protection strategies
EAP protocols. The advantage of such a solution is that it
becomes possible to identify any wireless device connected to
a network.
The figure illustrates a wireless network, equipped with a
RADIUS authentication server:
RADIUS
RADIUS
RADIUS
Figure 5-4- Wireless Network equipped with a RADIUS Authentication Server.
5.1.5 Antivirus
Computer viruses, like biological ones, have evolved considerably in time, especially in terms of the damages caused (known as virus
payload). Until recently, viruses were commonly considered as software that in the worst cases could alter the standard use of PCs.
The entity of the damage incurred has ranged from the simple
visualisation of messages or more or less ironical pictures, to the
122
5. Network Protection Measures
impossibility of using or even starting the system correctly, with the
consequence of requiring expert assistance. At that time, files were
principally exchanged on floppy disks that therefore represented the
main media for propagating viruses.
The global diffusion of the Internet and related communications technologies has made it possible for any Net user to exchange
files and software, thus de facto cancelling physical mediation. Though
the phenomenon on the one hand undeniably represents an advantage,
on the other, it has led to a huge increase in infection possibilities, both
in terms of propagation speed and the number of users affected at
once.
The first viruses able to fully exploit such an important innovation were soon to appear, generating new and worrying threats.
Remember the damage caused by the virus Melissa that literally
brought the world e-mail systems to their knees, at an incredible speed,
also thanks to the possibility of finding new victims in the addressbooks of infected PCs. Melissa was actually just a drop in the ocean;
indeed, the same process was used by viruses such as SirCam, Klez,
Sobig, which have introduced disquieting new methods to increase the
global nature and payload destructiveness of viruses, ranging from the
cancellation to the unauthorised diffusion of confidential documents.
In theory, antiviruses are of several kinds (scanner, integrity
checker, immunisers, etc.). In practice, those used predominantly
belong to the scanner typology and are based on the software capacity to identify particular suspicious patterns (signatures), within the
periodically explored and monitored media, listed in a database of
known patterns. Of course, the signature databases of such antiviruses must be periodically and promptly updated. The update distribution
procedure is a very important, though often neglected, operational
aspect of security equipment.
5.1.6 URL Filtering
Though the widespread use of the Internet in organisations
does indeed represent an extraordinary opportunity for improving
internal and external processes, thereby increasing individual produc-
123
SECURITY NETWORK
from risk analysis to protection strategies
tiveness, it can also entail intrinsic risks for individual users and organisations as a whole.
Here are some of the most common consequences of the
improper use of the Internet:
• Reduction of individual productiveness
• Waste of computer resources (connectivity, server, etc.)
• Increase in the probability of being infected by malicious
codes
• Increase in the risks of internal/external intrusions
• Risk of being involved in legal disputes, for instance following
the unscrupulous use of Internet services (pornography,
copyright infringements, etc.)
A solution to the above-mentioned problems lies in the use of
URL Filtering technologies. These are hardware/software solutions
that make it possible to filter the Internet contents requested by the
users, according to pre-established policies.
Request approved
Request denied
Figure 5-5 – Architecture of a URL Filtering Solution
124
5. Network Protection Measures
Two methods are most commonly adopted among these tools:
• Black list. The address requested by the user is looked up on
a list of previously introduced unauthorised addresses. If the
outcome is positive, access to the resource is denied.
• URL database. This is the most sophisticated technique; it consists in a periodically updated database of Web addresses that
classify Internet content into special groups. Users are either
assigned to one or several groups or configured so as to be
excluded from some. It is thus possible to apply restrictions to
site categories, preventing the manual census of each address.
5.1.7 Patch Management
One of the most difficult aspects of information security
guarantee lies in the constant management of vulnerabilities that
affect most software programs.
It is actually extremely unlikely for a system to be devoid of
any development failures that to different extents could affect organisations’ security. The challenge nowadays for any security expert is to
intervene rapidly to solve any new vulnerability.
The battle can be won only with the commitment of software
producers who have the task of issuing security updates (patch) in the
shortest time possible.
Nevertheless, the greater the number of systems, the greater
the effort organisations must make to manage such issues. The difficulties are such that the problem is often not even considered, thus
opening a privileged channel for the violation of system security.
An automated vulnerability solution makes it possible to considerably reduce the effort, by significantly increasing the timeliness of
patch applications.
Such solutions are commonly referred to as patch management applications: they supply advanced functionalities for the analysis, collection and distribution of security updates for applications and
operative systems.
125
SECURITY NETWORK
from risk analysis to protection strategies
Patch
release
Patch distribution
Figure 5-6- Typical Patch Management Architecture
The typical architecture of a patch management system consists in a central server, a repository of patches that are automatically
downloaded from the producers of operative systems and applications, and a centralised console for the automatic management of
updates throughout the corporate network. The patch management
platform distributes the patches to the different systems.
The use of a patch management solution improves the security of corporate services, remarkably reducing vulnerability risks, and
streamlining protection processes.
5.1.8 Cryptography and Public Key Infrastructure
A Public Key Infrastructure (PKI) is a system of digital
certificates, certification authority (CA) and registration authorities (RA) that uses public key cryptography to control the legitimate
nature of the parties involved in an electronic transaction. PKI standards are still in evolution, though they are widely implemented as a
126
5. Network Protection Measures
necessary element for the diffusion of electronic commerce.
Several reasons underlie the choice of an organisation to setup
a public key infrastructure, even only internally:
• Advanced protection. Smart cards enable an advanced
authentication level. The privacy and integrity of the data
transmitted on the public networks is guaranteed by IP protection (IPSec) and the encryption of file management systems guarantees the privacy of stored data (for instance, EFS
– Encrypting File System for Windows 2000 and other
Microsoft operative systems).
• Simplified administration. The organisation can issue certificates instead of passwords. If necessary, certificates can be
revoked and their list can be published (CRL, Certificate
Revocation List).
• Encryption function. It is possible to safely exchange files
and data on public networks such as the Internet. A protected e-mail system can be implemented thanks to S/MIME
(Secure Multipurpose Internet Mail Extensions) extensions,
while Web connections are generally protected by SSL (Secure
Sockets Layer) or TLS (Transport Layer Security).
The following are some of the elements that enable an organisation to implement a public key infrastructure:
• Certificates. A certificate is essentially a digital credential
issued by an authority that guarantees the identity of the certificate owner. A certificate associates a public key with the
identity of a user, computer or service that detains the corresponding private key. Certificates are used by different public
key protection services and applications that ensure the
authentication and integrity of the data and secure communication services in the context of public networks such as the
Internet.
The standard certificate format is described under regulation
X.509v3. A X.509 certificate contains information on the per127
SECURITY NETWORK
from risk analysis to protection strategies
son or entity receiving the certificate, information on the certificate itself, as well as optional information on the issuing
certification authority. Information on the subject can include
the name of the entity, the public key, the public key algorithm
and an optional univocal ID of the subject. Standard extensions for version 3 certificates contain information on key
identifiers, the key use, certificate criteria, the names and alternative attributes, the constraints of the certification process
and information on credit revocation, including reasons for
revocation.
• Certified Services. A certification authority must establish
and guarantee the identity of certificate holders. The certification authority even revokes certificates if they are no longer
considered valid, and publishes Certificate Revocation Lists
(CRL) that will be used by certificate verifiers. The PKI is
made up of one main CA. However, most companies that
manage a public key infrastructure resort to several certification authorities, divided into trusted groups known as certification hierarchies.
One distinctive element of certified services is the CA Web
registration pages. The pages are displayed when a CA is
selected and allow users to send certificate requests by means
of a Web browser. Furthermore, CA Web pages can be
installed in servers where no certification authority has been
installed.
In this case, the Web pages are used to forward certificate
requests to a CA whose direct access is, for some reason, to be
denied to applicants.
• Certificates and Smart Cards. Certificates can be stored on
smart cards to facilitate access to a system, for authentication
via Web, the protection of e-mail messages and other security functions using public key cryptography.
• Public Key Criteria. Group criteria can be used in some systems for automatic certificate distribution to computers, to
128
5. Network Protection Measures
establish common lists of reliable certificates and trusted certification authorities, as well as to manage recovery criteria for
encrypted file management systems (as for instance EFS –
Encrypting File System).
5.1.9 Single Sign-On (SSO)
The proliferation of applications, sometimes also for temporary reasons, often makes it mandatory to follow several authentication
procedures. Thus, as shown below, in the case of Identity
Management, password management can become complicated, not
only for administrators, but also for users.
Ease of use is one of the conditions in designing security. The
more complicated the access to data and applications, the greater the
risk of losing privacy and integrity. This is the case for instance when
users who have to remember several passwords to access different
applications write then down, which no longer ensures privacy.
The solution of adopting a unified process for access to several applications is commonly referred to as Single Sign-On (SSO).
The technology supporting a SSO system consists of a user and credentials database, a variable number of interfaces towards applications
and systems (agents) and a series of functionalities enabling the perfect synchronisation of authentication processes (password synchronisation) for each system.
In very heterogeneous contexts, with very different operative
systems and applications, the setup of the SSO solution can be highly
complex. Furthermore, it is not always possible to adopt a single solution, thus making it advisable to customize and integrate different
technologies.
The combination between the SSO and the Identity
Management (see paragraph 5.2.2 below) ensures perfect effectiveness
of the user/application association, thus notably reducing the daily
work of ICT staff in addressing such issues. Also, thanks to additional
control and precision, the two systems consistently increase the security level, while at the same time reducing the human error incidence.
129
SECURITY NETWORK
from risk analysis to protection strategies
Authentication
Username
A
Password
G
E
Credentials Send
N
Credentials or
Users database
T
S
Figure 5-7- Single Sign-On typical architecture
5.1.10 Strong Authentication
The identity of a remote user is generally verified using two
main security functions: identification and authentication. The former is the stage at which users declare their identity to the system,
while the latter enables identity verification. The security of the asset
accessed by a user strictly depends on authentication. Weak systems
that are not able to guarantee the identity of remote users expose the
target to numerous risks. The most widespread authentication system
is the password. The username/password pair authenticates the
system user.
Nevertheless, several problems entail that the security offered
by such technology is very limited. A password can be written down
and stolen, lost, inferred, shared and forgotten; it is therefore unsuitable for systems requiring reasonable certainty as to the actual identity of users requesting access. Such limits can be overcome and the
security limits can be increased thanks to the Strong Authentication
or two-factor authentication technology. In this case, users have two
elements in addition to the ID: one to be remembered (password or
pin) and the other to be possessed (physical device).
130
5. Network Protection Measures
Authentication is only successful in the presence of both elements.
Authenticated users can be local or remote. The former can
connect to the system through a personal or corporate workstation by
means of a local network (LAN), or a network managed by the entity
hosting the accessed system. Instead, a remote user is any kind of user
that logs into the system via a connection outside the corporate network (Internet, VPN, extranet, dial-up, etc.)
The market offers several solutions that implement the Strong
Authentication technology, characterised by different user range and
security levels. Various factors must be considered before choosing the
most adequate system, such as the following:
• Value of the asset requiring protection
• Required security level
• Type of user requiring authentication (local or remote)
• Technical impact on user systems and on the target infrastructure
• Type of remote access (Internet, VPN, RAS, Extranet, etc.)
• Systems ease of use.
The typology of users accessing the system is a fundamental
parameter to consider carefully when choosing a strong authentication
solution. Some technologies are in fact more suitable for remote users
(especially mobile users), while others are more adequate for internal
corporate users (desktop or server).
The table below summarises the main strong authentication
technologies available on the market.
An overview of the different technologies able to ensure high
security level upon authentication is given below.
131
SECURITY NETWORK
from risk analysis to protection strategies
Method
Examples
Ownership
User/Password
Can be shared
Easy to identify
What you have
Smart Card
Digital ID
Token
Can be shared
Can be lost
Can be stolen
What you know
and what you have
Smart Card
+ Pin
Can be shared
Biometrics
Cannnot be shared
Unlikely repudiation
Difficult to duplicate
Cannot be lost or stolen
What you know
Individual
authentication
Fig 5-8 – Authentication Techniques
Solution
One Time
Password
Hardware
(OTP)
One Time
Password
Software
(OTP)
Digital ID
VPN
Suggested
Compatibility Utilisation range
Security
Level
Technical
Technical
Impact on Impact on
Workstations
Users
Yes
Remote user with
access to Web/VPN High
applications
Yes
Mobile remote user
with corporate
Medium-High High
Notebook, PDA,
SmartPhone, Palm
High
Yes
Local or Remote
user with Web/VPN Medium
applications access
Low
Smart
Yes
Card/Token
Local user with
corporate
workstation. Remote
user with corporate
desktop/notebook
Biometrics
Local user at corporate
High
workstation
Infrequent
None*
Medium-High
Medium-High High
High
*Provided use is limited to Web applications or compatible solutions
Table 5-2- Synoptic Table of Strong Authentication Technologies
132
Medium
Medium
High
5. Network Protection Measures
One Time Password (OTP)
OTP systems are based upon the generation of a dynamic
password – usually every 60 seconds – associated to a PIN known
by the user. The algorithm that produces the password is random,
which makes it highly unlikely for the produced numbers to be
repeated more than once. The user generally brings a pocketsize
device equipped with password-generating software. An authentication server, synchronised with the user device, verifies the credentials by applying the same algorithm. The authentication
process requires connectivity with the server. When such systems
are used for access to Web applications, or in combination with a
RAS, the client does not need any software, which means they are
particularly suitable when it is not possible to control the configuration of the accessing PC (third parties workstations). These systems ensure high security levels, though they can be defeated by
sophisticated technologies.
Figure 5-9- OTP Devices
Digital Certificates
Digital certificates for user authentication are usually associated to VPN clients (IpSec or SSL), or to Web browsers by means of the
SSL 3 protocol. A digital certificate must be issued by a private or public CA (Certification Authority) (see paragraph 5.1.8 above). During
access, the signature on the certificate is compared to the certificate of
the CA root that signed it, to guarantee its validity. In some cases, it is
possible to check other parameters contained in the certificate. For this
133
SECURITY NETWORK
from risk analysis to protection strategies
Figure 5-10 – Digital Certificate
reason, both certificates must be client-resident (the client requesting
access). The user certificate can alternatively also be smart card-resident (in compliance with protocol PKCS11) and be removed when the
latter is withdrawn. Security levels are high, though digital certificates
must be kept carefully. The technical impact on workstations is quite
high, since the certificate must be handed to the user and installed in
the client (browser, or any other client requesting access) together with
that of the issuing CA. In the presence of a large number of users, a
Public Key Infrastructure (PKI) must be implemented and may need
to be managed by qualified personnel.
Smart Card/Token
The use of Smart Cards and Tokens usually depends on the
utilisation of other technologies, such as dynamic passwords or digital
134
5. Network Protection Measures
certificates, which they store. Their use requires the presence of specific technical conditions, such as dedicated readers or USB peripherals,
which is why they are commonly adopted for corporate workstations
(desktop or notebook) whose configuration is fully controllable. They
can be used in different environments, from authentication to digital signatures, and data encryption. The technological impact is high and the
security level depends a lot on the market solution chosen.
Figure 5-11 – Smart Card and USB Token
Biometrics
Biometrics uses biological parameters or specific behaviour,
for user identification. Whatever technology is selected, from fingerprint reading to face recognition, retina scanning, full collaboration is
needed from the user submitted to authentication. Furthermore, in
order to complete the initial registration stage (enrolment), all users
must be involved at the beginning. Biometrics is generally limited to
corporate workstations and is rarely suitable for remote users. The
technical impact is high due to the use of specific appliances and readers, thus making integration with remote access solutions difficult.
Figure 5-12 – Biometric Technologies
135
SECURITY NETWORK
from risk analysis to protection strategies
5.1.11 User Provisioning
User management process has been made much more complicated by the constant increase of access to corporate assets by ever
more heterogeneous users.
In especially vast and complex environments, operations to
create, cancel or modify users may require a remarkable effort in
terms of human and time resources. Furthermore, bearing in mind
that the authentication process is fundamental to ensure information
security, often supporting all the others processes, it is fundamental to
manage the electronic identity of users in an effectively and timely
manner.
Identity Management (IdM) models will be discussed further
on, under paragraph 5.2.2. We will now refer to two key support functions that are part of an IdM solution, provisioning and de-provisioning.
Internal and External Users
Auditing
Service
Remote Access
Operative
Services
Directory
Database
Applications
Mainframe
Figure 5-13 – Provisioning Architecture for an Identity Management System
136
5. Network Protection Measures
The former deals with all aspects linked to the creation and
management of user profiles, while the latter has to do with user
divestment or suspension. Of course, when we refer to profiles, we
mean them as associated to different systems and applications users
need to access, for which manual and punctual management would
require unacceptable efforts. Nowadays, the market offers specific
software platforms that automate and rationalise both processes.
5.2 ORGANISATIONAL AND PROCESS MEASURES
5.2.1 Disaster Recovery and Business Continuity
Introduction and Terminology
This chapter presents the main aspects pertaining to the network-enabled continuity of ICT services, in relation to benefits,
opportunities, costs and applicability range.
The definition formulated by the British Standards Institute
(BSI©) for the Business Continuity Management concept is the following: “Holistic management process that identifies potential impacts threatening
an organization and provides a framework for building resilience and the capability for an effective response to safeguard the interests of its key stakeholders1, reputation, brand and value-creating activities”2.
Within the context of the Business Continuity Management
process, the planning and management of Disaster Recovery is the
technological component of the entire process, and is the specific subject of this chapter.
1 I.e. any physical or juridical person (shareholders, but not only) related to the corporate, and
therefore concerned with its performances, as well as correct and transparent management.
2 "holistic management process that identifies potential impacts that threaten an organization and
provides a framework for building resilience and the capability for an effective response that safeguards interests of its key stakeholders, reputation, brand and value-creating activities".
137
SECURITY NETWORK
from risk analysis to protection strategies
The Disaster Recovery Plan Stages
A Disaster Recovery plan is usually developed according to the
following stages.
Stage 1 – Classification of Critical Processes
The starting point for developing a Disaster Recovery plan
must be included in the early stages of the more general Business
Continuity Management process. This is the stage in which the
boundary of application of the business continuity management
process is defined, and the different processes contained in the
boundary are classified in the decreasing order of their criticalness.
Processes are classified according to their maximum tolerable suspension time (RTO, Recovery Time Objective concept). The principle,
according to which it is impossible to guarantee continuity for all
processes, is normally considered acceptable for economical reasons.
The objective is therefore to identify those processes whose operational continuity must be guaranteed.
Stage 2 – Definition of the Plan Criteria and Parameters.
At this stage, starting from the study of classified corporate
processes, by correlating the processes entailed in the plan with the relative software applications, a list is made of all the computer applications that are to be included in the Disaster Recovery plan.
Stage 3 – Definition of the Plan Requirements for a Disaster Recovery.
This is the stage at which the plan feasibility requirements are
established in relation to the objectives and defined intervention
boundary. The criteria and structural elements of the plan are supplied; after having been submitted to discussion and to the approval of
the management, it is possible to move on to the subsequent implementation stages on a solid basis, both in terms of the technical and
organisational context to be considered, and of the economic benefit.
The following topics must be defined at this stage:
• Mode and usage extent of systems at the Disaster Recovery
138
5. Network Protection Measures
stage, both in terms of the use and management of processing resources, and at a user level.
• Alternative system and network architectures
• Sources and solutions for the identification and availability of
alternative systems and networks
• Possible insurance policies
• Interfaces, exchanges and/or interconnections among the different procedure systems
• Verification of backup procedures for the applications included in the plan
• Definition of the organisational crisis management structure.
Stage 4 – Preparation of the Plan Details
This stage provides for the detailed definition of behavioural procedures and rules that must be followed by the personnel
involved, both during usual management and upon the declaration of
a crisis, and consequently, the implementation of the plan.
Stage 5 – Plan Implementation
This stage contains the final procedural draft, the necessary
organisational consolidation to implement procedures, and the purchase of the necessary software, hardware and logistic resources.
Stage 6 – Pre-operational Test
At this stage, the entire plan and relative training activity is
tested prior to reaching operational level.
Stage 7 – Periodic Operational Tests and Updates
This stage concerns the periodic tests for the partial and/or
total implementation of the plan, as well as the definition and applica-
139
SECURITY NETWORK
from risk analysis to protection strategies
tion of ordinary and extraordinary plan maintenance criteria.
Choosing Alternative Resources
Besides the definition of process criticalities, the most difficult
aspect in the definition of a Disaster Recovery plan lies in the choice
of the most suitable alternative solutions for the network and for the
system as a whole.
As far as the network is concerned, the most practical
approach is to ask your usual provider for an alternative solution, generally able to manage less traffic compared to the usual flow. The
nodes and routes of the new solution must of course be truly independent from the original ones so as not to be submitted to the events
that could jeopardise the original network.
As for the other system components (host, server, workstation, etc.) and their logistics, there are different solutions whose costs
generally increase with the decrease of the necessary implementation
time.
The figure below (Fig. 5-14) offers an overview of the available systems, and an explanation of the most commonly used terminology.
Cold Sites are areas containing basic equipment, though no
network appliances and connections. A Warm Site is a partially
equipped context: for example, connections to an external network,
though without any server or workstation. Hot Sites are fully
equipped areas, with an internal and external network. Mirroring is a
hot site where archives are updated in near real-time – with a few minutes delay at the most – compared to the main processing site.
The above shows that for finding optimal alternative
resources, the criticalities of the processes included in the Disaster
Recovery plan must be carefully analysed, also bearing in mind the
extensive cost range. The definition of disaster recovery solutions
should be supported by an adequate strategy, followed by feasibility
studies, to identify the best solutions for cost-benefit optimisation.
140
5. Network Protection Measures
Mirroring
C
o
s
t
Hot site
Warm site
Cold site
Implementation speed
Figure 5-14 – Alternative Solutions Diagram, Costs vs. Implementation Time
5.2.2 Identity Management
It is often believed that the main objective of an information
security management system is only to exclude unauthorised external
accesses to information systems, thus concentrating efforts on the
protection of the network boundaries and relevant information
devices.
Actually, the risk level coming from inside the organisations is
the same as the one from outside, though through the application
environment within organisations. There is at the same time an
increased request for new applications to extend access to a greater
and varied number of often unknown users such as business partners,
providers, agents, customers and personnel.
A solution for managing information risks can be found in
Identity Management (IdM) concepts, a nowadays widely-used
expression defined for the first time in a white paper prepared jointly
141
SECURITY NETWORK
from risk analysis to protection strategies
by the PricewaterhouseCoopers and Gartner Group3. IdM is a convergence of business technologies and processes. There is no one single
approach, since a strategy must respond to specific requests within the
technological and business context of each specific organisation. The
overall objective is to supply valid access to the right people at the
right time.
The function categories entailed in the IdM for the classification of all the technological, organisational and process elements are
the following: authentication, access control, user management,
and directory services.
Authentication is a mechanism enabling transactions, at different security levels, with certainty as to the identity of the parties
involved.
• Authentication mechanisms are for instance:
• Username and password
• Personal Identification Number (PIN)
• Digital certificates
• Token
• Biometrics
• Smart card.
From an organisational and process viewpoint, it is necessary
to define roles and analyse risks so as to identify who is to be allowed
access to what.
Access control ensures that users can only access the applications or resources they are entitled to use. This infrastructure is known
as Privileged Management Infrastructure (PMI).
3 “Identity Management: The business Context of Security.” Whitepaper © 2001
PricewaterhouseCoopers LLP, Interviews & case studies © 2001 Gartner, Inc.
142
5. Network Protection Measures
• The main features of the infrastructure are:
• Common structure for authentication and access authorisation to several applications
• A Single Sign On platform for information access
• Roles Definition (role-based access control)
• Access monitoring.
User management is the expression that defines technologies and processes to manage a large number of users. User
Provisioning is another term to define this environment (see paragraph 5.1.11).
The main functions of user management technologies and
processes are:
Automation of workflow processes to create participants and
grant them access to all the applications needed for their work (provisioning)
• Automatic removal of no longer existing users (de-provisioning)
• Users are given a high degree of controlled autonomy
• Delegation of access administration functions.
Directory Services make it possible to manage access to
directories. A directory is a software element that stores information.
Access generally occurs by means of the protocol known as
Lightweight Directory Access Protocol (LDAP). Technological
evolution has extended the concept to Meta Directories and Virtual
Directories, which tend to avoid duplication thanks to pointers that
find information without creating copies.
The main features of service directories are the following:
• Centralised, flexible and secure archive for user profiles
• Scalability to several million users
• Rapid response capability to hundreds of questions per second
143
SECURITY NETWORK
from risk analysis to protection strategies
• Integration based on main application standards.
The benefits entailed in the correct and complete implementation of an Identity Management solution include:
• Integration of technologies
• Lower management costs
• Productivity increase
• Process automation
• Greater overall efficiency
• Controlled autonomy granted to clients, personnel,
providers and partners
• Higher corporate data protection
• Integration of conformity rules (privacy, etc.)
• Active and conscious security
• Rational and organised definition of access profiles
• Constant auditing.
5.2.3 Operational Security Management
Generalities
The effectiveness of any countermeasure has always been
considered limited in time, either because of problems arising within
protection mechanisms, or the discovery of new vulnerabilities and
threats; however, such a concept has only recently become part of
security definitions and objectives.
Any countermeasure system must therefore be supported by
awareness capacity in terms of new vulnerabilities and threats.
Furthermore, if incidents were unfortunately to occur notwithstanding the existence of an effective protection infrastructure, quick identification and correct management are crucial.
The two aspects mentioned above are often known as Real
Time Security Monitoring and Incident Handling. In such a con-
144
5. Network Protection Measures
text, monitoring means incident identification, which is not to be mistaken with the monitoring of systems and networks to control correct
operativeness.
Indications of such an approach can be found in many national and international security documents of the past years, though it is
only lately, with the increase in the number of attacks and security incidents, that the indispensable nature of such functions has been
acknowledged.
The concepts of incident management and security control and monitoring already appeared in the Italian Prime Minister’s
Directive dated 16/1/2002, better known as the Stanca Directive.
The Ministry of Technological Innovation and the Ministry of
Communications, issued the previously-mentioned document “Strategy
Proposals on Information and Telecommunications Security for the
Administration”, published in March 2004, on the concepts of incident
monitoring and management to promote the survey of security activities through active monitoring and management of information incidents and early warning of threats.
Furthermore, CNIPA is preparing the implementation plan of
govcert.it, a body for the coordination and support of the Incident
Response Teams that will be created within the Administration.
As for international indications, The Information Security
Forum adopted the previously-described approach, supported by a
risk management methodology, known as FIRM, that since the first
pages defines security as a set of three areas: incident prevention,
incident detection and response4.
Today real-time security monitoring cannot be achieved by
simply purchasing technological devices, though the market does offer
a wide range of products to this end. The capability to correctly
launch some key processes of the security cycle is also necessary. The
components that determine the quality and effectiveness of such
processes are the following:
4 See Appendix 2.2
145
SECURITY NETWORK
from risk analysis to protection strategies
• Time coverage: new threats spread within a few minutes, what-
ever the time and geographical area. Monitoring must be
ensured 24 hours a day, 365 days a year, continuously and in real
time. Indicatively, 6 to 10 people are necessary to cover 24 hours.
• Knowledge: the analysis of security events requires a very
high level of competence that must be maintained in time.
The analysis of new threats, as well as the choice of adequate
procedures to manage the incident, requires very specific
knowledge of the technologies used in the organisation, as
well as consolidated experience in security analysis.
• Knowledge base: access to a security knowledge base is fundamental to enable incident analysis activity and to determine
incident management procedures.
• Identification and response to incidents: since people
manage identification and response activities, it is crucial to
have the support of correct management processes and technological platforms. It is advisable that processes pertaining
to the identification and response to incidents be compliant
with acknowledged internal standards such as BS 7799.
• Technology: several hardware/software platforms support
the functions of monitoring and response to incidents:
- Log centralisation systems
- Incident tracking systems
- Trouble ticketing systems
- Systems for the realisation of security portals
- Centralised systems for security control and management.
The market offers several services to support the knowledge
of new threats and vulnerabilities, as well as the launching and management of identification and response processes to the incidents
describes below:
146
5. Network Protection Measures
Managed Security Services
• Managed Security Services (or MSS) include two categories of
very different services:
• Security Management
• Real Time Security Monitoring
Security Management
The management services offered by a Managed Security
Service Provider (MSSP) have the purpose of supplying ordinary and
extraordinary management of security devices, in the form of outsource services. In particular, the security deivces are managed according to the three following aspects:
- Fault management
- Configuration management
- Performance management
Fault management manages client security devices to make
sure they always operate properly. This is usually, though not always,
achieved through an extended service on the 24h. Some of the typical
fault management services include:
- The periodic check-up of security devices to identify possible
problems
- The notification to customers every time that, for any reason,
the security devices ceases to function, and assistance/guidelines concerning appropriate measures to solve the problem
- Periodic reports to customers that summarizes the operational situation of their security devices over a pre-determined period of time.
147
SECURITY NETWORK
from risk analysis to protection strategies
Configuration management is used by the customer to outsource to the MSSP the configuration of his/her security devices. The
expert responsible for configuration management usually deals with
the following aspects:
- Modification and upgrading of the applications supporting
security devices, and of the operative systems
- Modification of the policies and signatures applied to the
security devices
- Daily, weekly or monthly reports listing all the new upgrades
and modifications to the clients’ security devices.
Performance management involves the collection and presentation of statistics on the performance recorded on the clients’ security devices. The reports include the following:
- Statistics on the speed and efficiency of the client network
- Identification of internal bottlenecks penalising network
performance
- Reports on overall performance, consolidating all the log data
generated by the clients’ security devices.
Real Time Security Management
Security monitoring requires a high degree of competence in
the security environment, as well as sophisticated architecture to support data analysis on different devices through a global organisation.
In the context of the monitoring services offered by the
MSSP, the word outsourcing must be taken cautiously: services
offered from the outside do not replace internal control, and the security control room remains within the organisation. External services
are to be considered as a useful support in identifying incidents.
• Real Time Security Monitoring services are made up of the
following functions:
• Data collection and standardization
148
5. Network Protection Measures
• Data mining
• Automatic correlation of security-related events
• Response to events
• Event report
Data collection and standardization is a process in which
data related to security devices (firewall log, IDS alert, etc.) are collected and transformed into a standard format, despite of the device
nature and provider. Data standardisation is essential for efficient security monitoring, since this enables the MSSP to use a set of standard
queries to analyse the security device data and to isolate traces of dangerous activity.
The data mining process is made up of an automated system
that constantly queries security devices to identify any sign of dangerous activity, thus separating suspicious from legitimate network traffic.
It is probably the central technological element in monitoring processes: a client has to make sure that an MSSP is able to scale down its
capacity in terms of data mining as the devices connected to the backend architecture increase. In other words, the MSSP must be capable
of developing ever-more sophisticated queries as new devices are
added to the network. Nevertheless, increasing the number of queries
does not necessarily mean improving the data mining process. In this
sector, the quality and constant fine-tuning of queries are extremely
important, as well as the timely creation of new queries able to constantly reveal evolving harmful activity. It is only thanks to highly
sophisticated data mining that an MSSP can ensure efficient correlations between data and attacks.
Another essential component for a truly effective monitoring
service is the automated correlation of security-related events, in
other words, the automatic grouping of specific harmful activity
traces, using logical criteria such as source, nature and destination of
the attack. Thanks to this process, attacks are rapidly reconstructed,
and analysts can view the entire attack. Without automatic correlation,
security analysts would be obliged to reconstruct the attack sequences
by manually going through millions of lines of data recorded by the
149
SECURITY NETWORK
from risk analysis to protection strategies
security appliances. Needless to say that such an operation is too
expensive in terms of the time involved and too complex at any scalability level, even on networks with low traffic volumes.
The response to events that have repercussions on security
follows and depends on the security analyst’s examination of the data
generated by the correlation process. According to the nature of the
event, the range of actions can vary from simple client notification to
immediate communication of the event to the competent police
authorities. The availability of a service enabling the analysis of security events by experts over the entire time arch (24x7) is decisive for
the management of any security service.
Event reporting is the process adopted to notify clients about
events identified on their network that have an impact on security.
According to the nature of the event, the reports can be transmitted
immediately by voice, e-mail, or by real-time notifications published on
the Web portal, or even, by means of periodic reports.
Monitoring services are usually offered for security platforms
that supply significant information on events (firewall, host and network intrusion detection system, etc.).
To enable effective real time security monitoring, a MSSP must
have all the above-mentioned features. Protection against vulnerabilities, real-time risk identification and management for network security
are impossible to achieve in the absence of just one of these services.
The difference between security management and simple
monitoring lies both in the availability of top level professional knowhow and a complex technical architecture able to perform global data
analysis on several platforms. This aspect was stressed in the article
“Top Guns” published in the Information Security review: “Security
software has made great progress in the capacity to consolidate, correlate and
analyse events and data logs on several appliances such as firewalls, IDS and
routers. However, according to experts at the control stations of the SOC (Security
Options Centre) of MSSPs, when analysing events with security impacts, the most
reliable, though oldest, tool is intuition”5.
5 R. Thieme, A. Briney - "Top Guns" in "Information Security", August 2002.
150
5. Network Protection Measures
Early Warning
The most numerous and frequent security incidents having
affected organisations worldwide derive from external threats such as
viruses, worms and other forms of malicious codes. Such threats are
global, since they indiscriminately affect organisations anywhere in
the world, and have not been devised to attack one specific organisation, even though they have lately become a means for perpetrating
targeted attacks by exploiting the technical vulnerabilities and weakened defence of organisations during emergencies.
In all recent famous cases (Blaster, My Doom, Sasser, etc.),
only a few hours passed between the first attack and the moment of
maximum diffusion.
This data, together with the fact that no environment is nowadays completely protected against any vulnerability, stresses the importance of adopting preventive and proactive strategies.
So-called early warning services, or preventive notification,
help organisations learn in advance about emerging vulnerabilities and
threats, and adopt correct countermeasures to prevent the phenomenon before it affects the organisation.
Early warning services can be divided into two categories:
• Vulnerability Notification: this is the service that warns an
organisation any time a new vulnerability is revealed.
However, since a consistent number of vulnerabilities are discovered every day, the most advanced services make it possible to receive notification only for vulnerabilities concerning
the technology and products installed in the organisation.
Free services also exist, in the form of mailing lists; nevertheless, they do not guarantee timely notifications, nor do they
allow any choice as to the kind of notification one wishes to
receive.
• Threat notification: vulnerability in itself is insufficient to
represent a risk for an organisation. It is the existence of technologies and methods that exploit vulnerabilities that make
them possible vectors for attacks and violations. Threat notification services are able to rapidly identify the existence of
151
SECURITY NETWORK
from risk analysis to protection strategies
activities that could exploit vulnerability and to send a notification to member organisations. There are currently not many
threat notification services, since they require a large, real-time
analysis and intelligence network of the provider, able to
immediately reveal the early signs of vulnerability exploitation.
Together with the notification of new threats, early warning
service providers supply a detailed description of the phenomenon, a list of vulnerable systems, possible impacts, propagation methods and actions suggested for risk mitigation or cancellation.
Incident Handling
Not all security infrastructures, even the best, are able to supply absolute protection guarantees for the IT system.
Notwithstanding the huge progress achieved in the past years by security enhancing devices, their effectiveness is still limited, and in no case
absolute. Adequate structures to manage all the events (incidents,
frauds, attacks, malfunctioning, etc) that threaten service and information continuity are therefore necessary.
This organisational structure is usually known as CERT
(Computer Emergency Response Team), and is responsible for
receiving, analysing and managing incidents pertaining to information
security. Furthermore, it also has the task of coordinating and monitoring several activities that are fundamental for ensuring an organisation with the most adequate security levels.
In the presence of a CERT, an organisation will be able to
manage all incidents centrally. The activation of a CERT will namely
enable an organisation to:
• Optimise resources, time, costs and incident management
tools thanks to the centralisation and coordination of activities
152
5. Network Protection Measures
• Safeguard its information heritage, preserving privacy, integrity and availability, even in compliance with the privacy protection measures
• Limit the incident occurrence and probability through monitoring and prevention activity
• Constantly monitor the security status of its information system.
Since the activation of a CERT is very complex and time-consuming activity, it is advisable to resort to a specialised company that
can offer advice as to the following:
• Definition of an organisational model
• Definition of the technological architecture of the security
operations centre that will host the CERT
• Launch the CERT, define processes and procedures
• Specialised resources for personnel training and incident management
• Support services (real-time security monitoring, early warning).
Specialised Help Desk
Specialised help desk services are very useful; whenever needed, they supply necessary support and expertise for problem/incident
solving. The range of specialised help desk and support services is
vast. Often, it is the security technology producers themselves that
supply support services, though they are in most cases limited to their
own platforms.
Below is a list of some factors to consider upon the purchase
of a help desk service:
• Hours covered (working hours or 24h)
• Typology of support (basic or specialised)
153
SECURITY NETWORK
from risk analysis to protection strategies
• Required expertise
• Presence of personnel specialised in the products used by the
organisation
• Ticket management modality in relation to the level of seriousness of the call
• Security procedures
• Service levels
• Existence of a portal (informative or interactive).
Periodic Security Assessment
The periodic security level assessment supplied by the information system is a good practice recommended by almost all national
and international security guidelines.
There are currently no consolidated assessment standards and
methodologies: each provider has developed its own methodology
based on market, open source or internally developed tools.
This explains the remarkable differences in the products existing on the market, whatever their name may be.
Here is a list of the most common activities:
• Vulnerability Assessment: the vulnerabilities existing in the
examined systems are assessed with the help of tools, known
as scanners that through a system by system analysis search
for known vulnerabilities. The outcome of such activity is a
list of the vulnerabilities identified in the system, divided
according to their level of seriousness.
• Penetration Test: the purpose of the Penetration Test, also
referred to as Ethical Hacking, is to analyse the vulnerabilities
of a system, trying to use them to assess its violability. This
activity is performed by a group of security experts often
known as the Tiger Team, which resorts to hacking techniques to reveal every vulnerable point in the system.
Penetration Tests can be performed in the following modalities:
154
5. Network Protection Measures
Blind: the Tiger Team receives no information on the system
submitted to its analysis; it will be up to the team to find all the necessary information for performing the analysis
Overt: the Tiger Team receives as much information as possible on the system it is to analyse, thus enabling a very detailed analysis.
Penetration Tests can be performed remotely, though only on
servers visible on Internet connections. Instead the analysis of internal systems must be performed inside the organisation.
• Policy Assessment: the activity has the purpose of verifying
organisation policies, controlling their correct implementation
on systems and applications. Special tools are normally used
to read and analyse the policies configured on systems and
applications. Policies found on the systems are compared with
corporate policies and standard international guidelines, as
well as with best practices.
• Security Assessment: Has the purpose of assessing an
organisation’s security plan, using different references, such as
BS7799, and the best practices produced by international bodies such as the Information Security Forum. The objective of
security assessment is to identify the areas most at risk and to
supply guidelines for the application of adequate corrective
actions.
• Application Assessment: assesses the security level offered
by some applications, especially Web applications. Such activity is extremely useful for any organisation with critical (i.e.
trans-national) Web applications that needs to assess its security level. The method is very similar to that of penetration
tests, and must be performed by highly qualified personnel
with thorough expertise in the field.
Since such assessment systems have no standard models, it is
important to consider the following aspects upon weighing the different market offers:
• Final results: outcome and presentation of final results (documents, discussion meetings, etc.)
155
SECURITY NETWORK
from risk analysis to protection strategies
• Know-how: service quality depends a lot on the know-how
and expertise of the consultants performing the assessment.
• Methodology: since most companies offering assessment
services have developed their own methodology, it is important to understand the underlying principles
• Best practice: when evaluating management processes and
modalities, it is necessary to preventively identify indications,
guidelines, internal policies or best practices
• Security: security assessment services require that the provider
be allowed access to confidential information of an organisation. It is important to check with the provider what procedures and security tools are adopted to ensure the protection
of any such information.
• Tools: sometimes tools are used for assessment activities. Ask
the provider to explain what tools will be used, and their invasiveness and impact levels on the infrastructure of the organisation. Furthermore, find out if the tools can be installed permanently within the infrastructure to facilitate any future
assessments.
156
NETWORK SECURITY
From risk analysis
to protection strategies
6 – Security Governance
in the Public Administration
and Private Companies
6.1 SECURITY GOVERNANCE AS A FACTOR OF
SOCIAL GUARANTEE FOR THE NETWORKS USE
Since a few years, the word governance has been introduced
to define any activity aimed at ensuring the correct management of a
specific process, or even the entire corporate process, not only to guarantee corporate efficiency and compliance with the law, but also to
defend shareholders and, more generally, stakeholders. The term also
has a strong ethical implication, in addition to creativeness and commonsense.
The requirement of codifying governance likely meets
two necessities:
• The need for a formal and shared framework to address the
current complexities rooted in business processes
• The need for a rigorous conceptual model making the imple-
mentation criteria of the governance process transparent,
even for stakeholders1 that are not directly involved in corporate management.
Of course, in an abstract descending order, security governance derives from the governance of ICT systems, which in turn is
1
See note 1, chapter 5.
157
SECURITY NETWORK
from risk analysis to protection strategies
part of the more extensive scope of corporate governance.
One of the first initiatives that introduced and developed such
concepts was the COSO project that recently supported and produced
a document entitled: “Enterprise Risk Management – Integrated
Framework”, in collaboration with Pricewaterhouse-Coopers. The document defines and illustrates the elements that together make up a corporate governance structure, with special emphasis on risk analysis. At
the beginning of the nineties, the COSO2 Committee issued a first
document on the same theme, entitled “Internal Control – Integrated
Framework”.
In the past years, the USA and Europe – and Italy as well –
suffered sensational cases of bad and fraudulent administrative business management, justifying specific law making initiatives, in addition
to private initiatives such as the one mentioned above, such as the
2002 “Sarbanes-Oxley Act” in the USA, and the “Legge Draghi” in Italy
(Law by decree 58/1998), and the more recent piece of legislation on
the reform of corporate law, enforced on January 1st 2004.
In some specific sectors, corporate governance objectives have
been emphasised by the code of self-discipline drafted by the
Committee of Public Companies listed on the Italian stock-market
(known as the “Preda Code”, amended in 2002); within the banking sector, the “Basel II” protocol has a European scope.
It is now interesting and constructive to analyse the concrete
and tangible components underlying the security governance concept,
even from a feasibility viewpoint.
We will now suggest a list, according to a scheme offering a
general overview of security governance3:
• Strategic security control
- Security promotion within an organisation – corporate man2
COSO – Committee of Sponsoring Organisations of the Treadway Commission – is a committee setup in 1985 that still exists thanks to the initiative of the five main US professional
financial organizations, to support the production of documents and methodologies to ensure ethicality, correctness and transparency in corporate administrative management.
3 The “capability model” © by KPMG for security governance
158
6 – Security Governance in the Public Administration and Private Companies
agement must be involved directly in supporting the implementation of a security management system; the commitment must be clear and visible from within and without the
organisation
- Security strategy – an overall strategic view to support individual activities pertaining to the implementation, maintenance and upgrading of the security management system
- ROI/Performance indicators – an indicator system for corporate management to assess the success of activities
undertaken and the system installed.
• Security plan
- Definition of a management plan for the different activities
within the context of a synergic initiatives programme
- Evaluation of resource and expertise availability.
• Security guidelines
- Directives, ranging from the ones issued by the management, to the operational ones, guidelines, procedures for
security implementation.
• Security management
- User and infrastructure management – processes and procedures to ensure operational management and security
administration
- Security monitoring – incident monitoring and management
to ensure the maintenance of security
- Privacy – protection of information privacy.
• Coordination with business functions
- Participation of final users – final users implication in the
assessment of business aspects
159
SECURITY NETWORK
from risk analysis to protection strategies
- User awareness – awareness level of final users concerning
existing responsibility, and the guarantees offered by the different systems.
• Security of the information assets
- Applicative security
- Database and repository security
- Server, workstation, desktop, etc. security
- Internal/external network security
- Antivirus
- System development.
• Technology protection and continuity
- Physical security and environmental protection
- Disaster recovery – procedures and plans for availability and
system recovery.
Good security governance depends on the presence of all the
previously mentioned components: a weakness in just one of the
abovementioned topic can entail the poor efficiency of the other components (for example, the lack of a strategic guide can cause incoherence between guidelines and/or management procedures, thus an
incorrect system configuration). In other words, there is a kind of hierarchic interrelation of cause and effect between each level of the proposed model and the following level.
It is also important to stress that the above-mentioned components are only partially technological: good security governance is a
management problem that can be solved thanks to the synergic
approach of people, processes and technologies.
6.2 IMPLEMENTATION OF SECURITY GOVERNANCE
IN THE ORGANISATIONS
The degree of formalisation and extension of each of
the above-mentioned components can of course vary from one situa-
160
6 – Security Governance in the Public Administration and Private Companies
tion to another. The so-called maturity model4 can be applied to each
situation, in other words, a conceptual model largely used in the context of the more general sense of governance systems assessment. The
model makes it possible to assess the degree of maturity of a given
process, according to the following scale from 0 to 5:
• Inexistent activity – 0
• Occasional and non-replicable activity – 1
• Regular activity with constant modalities – 2
• Documented activity of a widespread procedure within the
organisation, sometimes in compliance with the procedure – 3
• Documented activity of a procedure entailing the definition of
indicators enabling efficiency monitoring and performance
assessment – 4
• Automatically performed and monitored activity, in compliance with the highest standards available on the market – 5
The use of such a model, as well as the practical application of
security governance concepts, must be based on criteria that could be
defined of common sense, finding a balance between the desired
degree of maturity and the level of risk or complexity that the organisation wishes to assume. In other words, simple organisations that are
not exposed to high risk levels could be recommended to opt for quite
a low level of maturity (for example, in the above-mentioned scale,
level 2 or even 1, for some processes); instead, complex organisations
exposed to high risk levels should have a maturity level of 4 or 5 on
the indicated scale.
Another useful guide for implementing security governance
can be found in the often-mentioned BS779. Such standard has the
purpose of supporting the requirement of information protection
4
The content of this paragraph is explained in depth in the IT Governance Institute publication,
“CobiT® Management Guidelines”
161
SECURITY NETWORK
from risk analysis to protection strategies
(processed with electronic tools, but also kept on non-electronic supports, such as written paper documents) within a given organisation,
including interrelations with the outside.
The requirement can be met by implementing what is referred
to as an Information Security Management System (ISMS). An
ISMS is made up of the following:
• A security policy, supplying corporate directives on information security
• An organisation enabling correct information security management within the organisation itself
• Asset classification and control, ensuring the identification of
corporate assets – whereby assets also include information –,
definition and application of protection measures suited to
their value
• Personnel security, to reduce risks of errors, thefts, frauds, etc.
• Physical and environmental security to prevent unauthorised
access, damage and incidents
• Operational and communications management, ensuring the
correct and secure operational management of processes and
appliances
• Information access control
• Application development and upkeep, to make sure security is
incorporated in the information systems
• Operational continuity management, ensuring timely reaction
and operational interruption, and the protection of critical
activities from disasters and relevant incidents
• Compliance with the law, ensuring compliance with pertinent
laws and regulations.
6.3 NETWORK SECURITY, A NATIONAL AND EUROPEAN ASSET TO BE PROMOTED
IT security has ever more often taken on the meaning of corporate and individual security of knowledge, which must necessarily be guaranteed in a knowledge economy, in line with the recommendations of the European Commission and the commitments taken on
162
6 – Security Governance in the Public Administration and Private Companies
by the E.U at the Lisbon conference. The security of knowledge
concept focuses on persons (individual or legal) and on how they protect information that is crucial for competitiveness, or preserve the privacy right.
In preparing this document, the authors made a useful comparison of experiences and observations within the international and
European scenarios, assessing the best use practices, and re-examining
how companies today can address the issue of network and information protection.
The overall impression is that progress has been made in the
past years, with greater sensitiveness towards the problem, though
there is all in all still a long way to go.
In such a context, the creation of ENISA appears to be a great
opportunity, even for Italy, to define and implement shared policies
within the European Union and to develop security sensitivity and
awareness in Society.
Nevertheless, to prevent ENISA from appearing as a structure
that is far away from everyday problems and life, the creation of the
agency must go hand in hand with the commitment of all stakeholders. It would certainly be very useful to this end to continue the work
undertaken in this document, recording the indications supplied by
ENISA and promoting them at a national level, and vice-versa, submitting specific national requirements to the agency.
Institutions, security experts, users and companies can draw
great benefit from finding a common place of exchange to share experiences and requirements, and to propose information, training initiatives and recommendations. The need for security is on an upward
trend, opening the way to new realities aimed at meeting such a
demand. However, the requirement must be met with efficient
responses, expertise and know-how, so that security investments are
not turned into placebo drugs whose effects are only to reassure
investors while risk exposure remains unchanged.
In statistical surveys, the problem of security, which always
ranks first in the attention of citizens, is seen as a common requirement of Society. Public, road, and financial security are the most widely debated issues and the most needed. Knowledge security is gain163
SECURITY NETWORK
from risk analysis to protection strategies
ing ground in public attention, though not yet enough, but more so
than a few years ago, namely thanks to recent norms, such as for example the Consolidation Act on privacy, and the Basel II protocol concerning bank credits.
The authors of this document, together with the Ministry of
Communications and the Ministry for Innovation, wish it to be a first
concrete step towards an ongoing commitment towards the establishment of a security culture, thanks to an active and dialectic connection with the institutions and the implementation of a driving belt
with civil society, the corporate world and citizens. A commitment
intended in the sense expressed by de Toqueville of well-known
interest, the interest of individual citizens coinciding with the common interest of society, when pursued correctly.
An important part of such a commitment lies in the willingness to offer the Country shared interpretations of the recommendations of ENISA and the many international bodies/associations dealing with security, to pursue common policies for the diffusion of a
security culture, adopt approaches and methodologies suited to the
specific requirements of the Italian productive system -bearing in
mind the specificity of the Italian legal system and culture-, supply the
outcome of such activity also to lawmakers.
All the institutions, professionals, users and corporate associations must be involved in pursuing a project that was launched thanks
to the sensitivity of institutions, aimed at creating a new, concrete,
knowledge security tool.
164
NETWORK SECURITY
From risk analysis
to protection strategies
APPENDIX 1
Normative, Regulatory
and Best Practice References
A – Documents issued by OECD and the United Nations
Guidelines “Security of Systems and Information Networks: Towards
a Security Culture” – July 2002
www.innovazione.gov.it
Guidelines “Protecting Consumers from Fraudulent and Deceptive
Commercial Practices Across Borders” – June 2003
www.innovazione.gov.it
UN Resolution A/RES/58/199 dated 23.12.2003 “Creation
of a Global Culture of Cyber-Security and the Protection of
Critical Information Infrastructures”
www.apectel29.gov.hk/download/estg-13.pdf
B – E.U. Directives and other Documents
Directive 1999/93/EC of the European Parliament and the
Council data December 13 1999, concerning a community framework for electronic signatures.
www.innovazione.gov.it
“Resolution on Network and Information Security” (December 11
2001).
www.innovazione.gov.it
165
SECURITY NETWORK
from risk analysis to protection strategies
Communication of the Commission to the European
Parliament, the Council, the Economic and Social Committee
and the committee of Regions, Network Security and
Information Security: proposal for a European strategic
approach – (June 2001).
www.innovazione.gov.it
Directive 2002/19/EC – “Access to, and interconnection of, electronic communications networks and associated facilities” (Access
Directive).
Directive 2002/20/EC – “Authorisation of electronic communications networks and services” (Authorisation Directive).
Directive 2002/21/EC – “Common regulatory framework for electronic communications networks and services” (Framework Directive)
Directive 2002/22/EC – “Universal service and users’ rights relating
to electronic communications networks and services” (Universal Service
Directive)
Directive 2002/58/EC – “Processing of personal data and the protection of privacy in the electronic communications sector” (Directive on
Privacy…).
www.innovazione.gov.it
C – Italian Laws and Correlated Normative
Law n°547 dated December 23 1993: “Amendments and integrations to the penal code regulations and the penal procedure code on computer crime”.
Law n°59 dated March 15 1997: “Delegation to the government for
the conferral of functions and tasks to the regions and local authorities,
for the reform of the Public Administration and Administrative simplification” Art. 15 of the law has instituted the RUPA.
www.parlamento.it/parlam/leggi
166
APPENDIX 1
Law by decree dated May 13 1998, n°171, amended by Law by
decree n°28 December 2001, n°467 (Official Gazette June 3rd
1998, n°127).
“Disposition on the protection of privacy in the telecommunications sector, implementing directive 97/66/EC of the European Parliament and
Council and on journalistic activity”.
(Law modified by Law Decree n°467 dated December
2001)
www.interlex.it
Prime Minister’s Decree, February 8 1999, Official Gazette
n°87 dated April 15 1999, “Technical rules for the creation, transmission, conservation, duplication, reproduction and validation, even temporarily, of computer documents, in compliance with art. 3, paragraph 1, of
the Presidential Decree n°513 dated November 10 1997”.
www.innovazione.gov.it
“Consolidation Act on the provisions of the law and regulations on administrative documentation”, Presidential Decree n°445/2000,
December 28 2000, Heading II, Section I, Article 6 – 7,
Section II, Article 8 - 10, Section III, Article 14 – 17, Section
IV, Article 20, Section V, Article 22 – 29, Heading III, Article
38, Section III, Article 43, paragraph 6.
www.innovazione.gov.it
“Technical Rules for IT documents in the Public Administration”
November 23 2000, Resolution n°51/2000 dated November
23 2000. Defines the technical rules for the creation and conservation of IT documents in public administrations, in compliance with art. 18, paragraph 3, of the Presidential Decree n°
513, November 10 1997. The Authority for IT in the public
administration periodically adapts these rules to institutional,
organisational, scientific and technological requirements.
www.innovazione.gov.it
167
SECURITY NETWORK
from risk analysis to protection strategies
Prime Minister’s Decree, April 11 2002 – “National scheme for IT
security assessment and certification, to protect classified information on
national and foreign State security”.
www.innovazione.gov.it
Law Decree n°10, dated February 15 2002 – “Acknowledgement
of the Directive 1999/93/EC on electronic signatures”.
www.innovazione.gov.it
Presidential Decree, April 7 2003 – “Regulation bearing coordination measures on electronic signatures in compliance with article 13 of law
by decree n°10, January 23 2002”. April 7 2003.
Amends the “Consolidation Act of legislative measures and
regulations on administrative documentation”, Presidential
Decree 445/2000 (Text A).
www.innovazione.gov.it
Law Decree n°68, April 9 2003 “Implementation of Directive
2001/29/EC on the standardisation of some aspects of copyright and
IT-connected rights”.
The new regulations among other things provide for the
extension of sanctions to offences previously not provided
for, such as the avoidance of technological measures for data
protection and transmission on-line.
www.innovazione.gov.it
“Rules for the correct e-mailing of publicity” – May 29 2003
General measure of the Authority for the Protection of
Personal Data dated May 29 2003.
www.innovazione.gov.it
Law Decree n°196 dated June 30 2003 – “Code on the Personal
Data Protection”.
Published on the Official Gazette date July 29 2003, General
Series n°174, ordinary supplement n°123/L.
www.innovazione.gov.it
168
APPENDIX 1
Prime Minister’s Decree dated October 30 2003 – “Definition of
a national Scheme for the assessment and certification of the security of
IT systems and products”.
www.innovazione.gov.it
Prime Minister’s Decree January 13 2004 – “Technical Rules on
the creation, transmission, conservation, duplication , reproduction and
validation, even temporarily, of IT documents”.
www.innovazione.gov.it
Interdepartmental Decree, February 17 2005 – “Provisional guidelines for the application of the national scheme for the ICT security
assessment and certification”.
www.innovazione.gov.it
Law Decree n°42, February 28 2005 – “Institution of the public
system of connectivity and the international network of the public administration, in compliance with article 10, law n°229, dated July 29
2003”
www.innovation.gov.it
D – Ministerial Documents and AIPA/CNIPA
AIPA/CR/27 Circular, February 16 2001.
“Use of the digital signature in the Public Administrations”.
In the light of the prescriptive measures on the issue, the
AIPA/CR/27 Circular offers a synthesis and guidelines on the
operational indications and usage extent of the digital signature in the Public Administrations.
In compliance with Art. 17 of Presidential Decree n°513, date
November 10 1997.
www.innovazione.gov.it
“Guidelines on PA digitalisation for 2002”.
Directive of the Minister for Innovation and Technology,
169
SECURITY NETWORK
from risk analysis to protection strategies
December 21 2001.
www.innovazione.gov.it
Directive dated January 16 2002 of the Prime Minister –
Department for Innovation and Technology “Information
and Telecommunications Security in State Public
Administrations”.
www.innovazione.gov.it
Appendix 1 – Security Level Self-Assessment.
Self-assessment – The questionnaire has the purpose of guiding the Administration in the self-assessment process of the
internal security level, in relation to the minimum recommended basis.
Appendix 2 – Minimum Security Basis.
Indications to help the Ministries to identify the protection
measures that must be set-up and managed in absolute priority, to support Administrations both in the application of the
reference normative fulfilments (e.g. Legislative Decree 675
and 318), and in preventing any potential threat.
“Proposals on IT security for the Public Administration” (March
2004)
Book drafted by the National Technical Committee on IT
security in the Public Administrations.
www.innovazione.gov.it
“Guidelines for the use of digital signatures”.
Document drafted by the CNIPA (May 2004) to guide users
and companies on the use of the digital signature.
www.innovazione.gov.it
170
NETWORK SECURITY
From risk analysis
to protection strategies
APPENDIX 2
Examples of Risk Analysis
Methodologies and Approaches
This appendix contains the summary of some of the risk
analysis methodologies in the ICT sector, offering an overview of the
practical application of the different principles indicated in chapter 4.
The methodologies and the relative software applications presented in this appendix are examples of only some of the used
methodologies and products; their presence in this appendix does not
mean there are no other solutions, nor is it our intention to offer any
indication or recommendation.
The contributions have been supplied by the people and companies indicated in the chapters below.
Appendix 2.1 – Defender Manager
Information supplied by Giuseppe Carducci Artenisio from Securteam srl
– Elsag (Finmeccanica group)
Definition
Defender Manager® is an appliance created by Securteam
(Finmeccanica group), which implements a risk analysis model supporting decision-making in the field of security, in other words a computer system for information security management, supplying assistance at the following stages:
171
SECURITY NETWORK
from risk analysis to protection strategies
• Description of the intervention range and scope of interest
• Information ranking
• Threat identification and risk analysis
• Choice of protection measures proportionate to the outcome
of risk analysis
• Verification of the capability to meet the requirements of corporate security policy in the long term
• Definition of the protection measures that are to be implemented
• Documentation of implemented protection measures.
Defender Manager® is part of the cyclic security management
process, recording and documenting any intervention, upgrading existing risk levels and, generally speaking, for the management and stakeholders, giving visibility to the progress achieved in terms of protection.
To whom is it addressed?
Defender Manager® is suitable for medium/large companies,
including complex contexts such as large industrial groups made up of
several companies. It can be implemented in different areas/scenarios,
even belonging to one or several companies, but can also manage several protection interventions, according to different strategies and in
compliance with the different criteria chosen by each company.
The security management process involves several figures
within an organisation, at various levels and with different responsibilities (security expert, auditor, data owners, process owners, application
and infrastructure managers, etc.). It is therefore transversal to corporate processes and functions.
To encourage the participation of all those involved in the
security management process, Defender Manager® has been developed according to the WEB architecture: a detailed authorisation control system enables access to the functions of interest by simply using
a browser.
172
APPENDIX 2
Basic principles
The basic principles underlying Defender Manger® can be
summarised as follows:
• Data is the central element in the risk analysis process
• Privacy, integrity and availability are the security parameters
used for risk assessment
• Risk is the combination of the probability of a harmful event
occurring and the seriousness of its relative consequences
• The measures defined for achieving the security objectives are
proportionate with the relative risk levels of the three security parameters.
Structure of the Information Database
The information database of Defender Manager® is structured into three areas containing models of intervention boundaries,
the risk processing Policy and security documentation.
“Intervention Boundary Model” Database
For each parameter a security analysis model is defined
within Defender Manager®.
“Risk Processing Policy” Database
Defender Manager® has a database containing threats
against information security, the relative attacks and security measures considered suitable for fighting the afore-mentioned threats and attacks. The basic database version,
which can be personalised, is supplied with a risk processing Policy, in compliance with the ISO/IEC 17799 standard
for the risk analysis assessment for the BS 7799
Certification of the Information Security Management
System (ISMS).
173
SECURITY NETWORK
from risk analysis to protection strategies
“Security Documentation” Database
Defender Manager® provide for a public documentation
area with general information supporting the security management process (legal and corporate provisions, reference
standards and technical norms, guidelines, procedures,
operational instructions, etc.).
Risk Analysis and Processing
The risk level of each component is assessed in relation to pertinent threats. The assessment is made according to the threat exposure level (frequency of even unsuccessful attacks performed to perpetrate risk) and the asset value (criticality level of information in
terms of privacy, integrity and availability).
Depending on risk levels, countermeasures are selected from
the risk processing policy, at a level considered suitable for risk mitigation.
The process is performed for all components and involves the
definition of an optimal protection profile, in other words all protection measures for adequate risk mitigation.
The residual risk, i.e. the measurement of the difference with
the optimal protection profile, is calculated by comparing the protection measures with those defined in the optimal protection profile (gap
analysis). The gap analysis leads to the production of a plan that indicates (stressing the priorities) what interventions are necessary to
bridge the gap and approach the optimal protection profile.
The use of Defender Manager® within the context of structured security management makes it possible to:
• Highlight the compliance of implemented or planned protection measures with established security objectives
• Assess the suitability of implemented or planned measures in
relation to identified risks
• Assess implemented or planned measures in the light of security best practices
174
APPENDIX 2
• Indicate what measures must be implemented and/or
enhanced, and according to what priorities (Intervention
plans)
• Ensure the necessary transparency by documenting the rationale underlying the choices made
• Ensure constant process efficiency monitoring
• Facilitate the formulation of several indicative and operational
reports, and automatically supply the documentation foreseen
by BS 7799 – 2:2002, among which the Risk Assessment
Report, Risk Treatment Plan and Statement of Applicability.
Intervention
boundary
- Systems
- Components
Level of exposure
Asset value
(information criticality
class)
Implemented or
planned measures
Risk Processing
Intervention
Boundary Model
Risk Treatment
Policy
Vulnerability
Calculation
Intrinsic Risk Level
Calculation
Protection
Measures
Calculation
Optimal
Protection
Measures
Risk Analysis
Intrinsic Risk
Level
Boundary
Model
175
Residual Risk
Level Calculation
Residual Risk
Levels
Intervention
Plan
SECURITY NETWORK
from risk analysis to protection strategies
Appendix 2.2 – Information Security Forum
Methodologies and Analysis of Risks Specific to
Information Networks
Information
supplied
by
PricewaterhouseCoopers Advisory
Sebastiano
d’Amore,
from
The Information Security Forum (ISF) is an international,
independent and non-profit organisation, working exclusively in the
field of Information Security. It is supported by over 250 among the
largest world companies and organisations, and performs the following main activities:
• Publishes and updates the “Standard of Good Practice”
(SoGP, version 4.0 2003) that was created on the basis of the
experiences shared by its members and the principal international standards (BS 7799)
• Regularly organises an Information Security Survey to supply
benchmarks for members, and updates the overview of the
state of the art
• Develops projects, studies, guidelines and publications on
issues such as: Corporate Governance, Internet & Network
Security, Communication Security, Technical Architectures,
Cryptography, etc.
In the field of risk analysis, the ISF has three methodologies
that support the following features:
• SPRINT: High level Static Method
• SARA: More in-depth Static Method
• FIRM: Complete dynamic risk management system, with a
risk measurement system based on scorecards.
SPRINT
The system was developed with the intent of meeting a growing request for simplification in risk analysis activity, to enable business managers to also become an active part of the process. In fact,
176
APPENDIX 2
the methodology is business-oriented and can be used even by people
with limited specific experience. The methodology is fast to apply and
produces short reports that pinpoint key risks and action plans to scale
them down to acceptable levels.
In more detail, SPRINT is operational for the following three
macro-phases:
1 – Business Impact Assessment (BIA) & Overall
Classification: enables the calculation of consequences for
businesses of the loss of privacy, integrity and availability of
process-correlated information, using a qualitative scale of values for business impact rating.
Depending on the outcome of the special questionnaires (BIA
forms on privacy, integrity and availability respectively), the
analysed systems and applications are classified on a scale of
values representing different criticality levels (regular, important though not critical, critical).
In the event of a regular, in other words not critical, system
(lowest risk level), the SPRINT process end here; it is then sufficient to control the actual presence of the basic controls necessary for maintaining an optimal protection level for the system.
In the event of a system considered important though not
critical (average risk level), the remaining stages of the
SPRINT methodology are followed.
The approach provided by SARA (described below), a complementary methodology to SPRINT, is resorted to in the case
of a critical system (high risk level); its approach is more analytical and therefore requires specialised personnel.
2 – Threats, Vulnerabilities and Control Assessment: the
relative questionnaire makes it possible to:
•
Estimate and correlate threats and vulnerabilities
177
SECURITY NETWORK
from risk analysis to protection strategies
against the security parameters (privacy, integrity and
availability), according to a vulnerability rating scale
•
•
Calculate risk exposure levels
Identify the controls (security requisites) necessary for
opposing the calculated risks.
3 – Action Plan: enables an intervention plan to be defined
for the implementation of the controls identified at the previous stage.
SARA
This methodology is associated to SPRINT and targeted to
highly critical systems. In short, it uses the results obtained in
SPRINT, at the Business Impact Assessment stage, to perform the
Risk Assessment of critical systems, identifying in greater detail the
precise nature of risk, with a more accurate calculation of the level
upon which countermeasures are determined (security controls).
FIRM (Fundamental of Information Risk Management)
This complete risk analysis and management methodology
makes it possible to continuatively and dynamically monitor and manage the efficiency of the security Management System within complex
organisations:
• It supplies a methodology for continuous risk assessment and
monitoring, enabling all corporate personnel involved in the
security management process to have a clear view of the corporate risk scenario.
• It is made up of a series of actions that must be implement-
ed to bring the risk within an acceptable level for management
• It uses both qualitative and quantitative risk calculation metrics, based on a scorecard concept, that offer a general
overview of the different levels of detail
178
APPENDIX 2
• It supplies a method for recording incidents, ensuring dynam-
ic risk assessment measures, as well as other dynamic and
induced upgrading measures
• It can be conciliated with standard operational activities
(implementation of new systems, maintenance of existing
systems, operativeness).
The basic concept of the methodology is supported by the
Information Resource that highlights correlation among data, information, applications and information systems (Architectures, platforms and devices).
The main activity of FIRM is to cense and rank the information resources that establish the protection context. A systematic
approach is then used to:
• Define the monitoring scope and range: the purpose is name-
ly to keep top management informed on the evolution of the
information risk level within an organisation, and to encourage owner to lower risk to a level considered acceptable by
the top-management
• Offer a coherent definition of roles, responsibilities and com-
munication lines within the company; each corporate line
(from the owner to the top-management passing from monitoring process coordinators) plays a specific role and has precise responsibilities, with pre-determined standards and communication protocols
• Prepare sound fact-gathering tools for risk analysis and
management (balance scorecard for risk assessment, incident
assessment questionnaire, etc.)
• Set-up and manage a (constructive and continuative) dynamic
evaluation and monitoring process
• Prepare concise reports and presentations for the top-management.
179
SECURITY NETWORK
from risk analysis to protection strategies
The FIRM methodology is also supported by specific tools
(for example Citicus One) that allow the management of every phase
of the process by means of special computerised desks.
Actually, the fundamental element of the methodology is the precise and continuous cycle measurement system aimed at
supporting top-management and owners to:
• Extend the approach to the entire organisation, despite its
structure and hierarchic scale
• Support key Corporate Governance keys, to meet identification, monitoring and detection of fundamental operational
risks
• Cut costs, by better targeting specific investments, while also
assessing their efficiency (value reporting)
• Enhance corporate value by reducing the negative impact of
incidents and the interruption of fundamental services.
180
APPENDIX 2
NORA
The so far described ISF methodologies, like others, measure
the risks facing an organisation using generic models that are applicable to any information context.
Specific methodologies must be evaluated if the only focus is
a computerised communication network and a high defence level has
already been opted for (after a conceptual risk analysis or because the
network represents the main activity of an organisation).
For instance, PricewaterhouseCoopers resorts to the methodology it developed, known as NORA (Network Oriented Risk Assessment)
that uses the following basic elements in an analytic process:
• Network Access Path (NAP): description of network access
paths in terms of clients, servers and network functions
(O&M Billing, etc.)
• Threat Scenario: created on the basis of scenarios identified
within the information systems; NORA has pre-defined
“Threat Scenarios” that must be mapped on the specific situation of the company object of the analysis and assessed by
the NAPs
• The NSC matrix is determined by correlating the NAP and
the Threat Scenario (Nap/Scenario combination)
• Impact Criteria: impact assessment criteria (defined on a scale
from 1 to 5)
• Probability Scale: evaluation of the threat implementation
probability (on a scale form 1 to 5)
• Gravity Matrix: combination of the Impact Criteria and
Probability Scale to determine seriousness levels.
The methodology includes the following three stages and relative activities:
Stage 1: Initialization:
•
Identification of all network links
181
SECURITY NETWORK
from risk analysis to protection strategies
•
Identification of the organisational structure (organisation supporting the network)
•
•
Identification of technological platforms
•
Inventory of network documentation.
Collection of other information useful for setting-up
the analysis process (e.g. known threats and network
vulnerabilities, business driver)
Stage 2: Analysis:
Risk Assessment:
•
-
Mapping of Business communication on Network
Access Path (NAP)
-
Definition of possible combinations between the
Threat Scenario and NAP, according to an NSC
(Nap/Scenario combination) matrix
-
Assessment of possible impacts on threat scenarios,
with respect to RID parameters, determined according
to the Impact Criteria
-
Vulnerability analysis, performed by means of audit
programs, to determine the probability of a given
threat scenario happening (according to a probability
scale), with the purpose of defining a gravity matrix
(the Gravity Matrix is the outcome of the combination
of the impact and the occurrence probability)
Future developments:
•
-
Evaluation of future technological developments
Evaluation of the security impacts that such developments could involve.
182
APPENDIX 2
Stage 3: Action Plan
Definition of an action plan based upon generic solutions and
the assessment of what the market has to offer (i.e. state of the art); it
is typically structured on three levels, defined as follows:
•
Legacy system/Critical action, to mitigate highgravity risks
•
Legacy system/Complementary action, to mitigate
addressed risks in the medium-long term
•
The Way Forward, for a proactive planning of security measures addressing future network developments.
Appendix 2.3 – CRAMM
Information supplied by Giampaolo Scafuro from “Sicurezza e Sistemi”
(distributor in Italy of CRAMM)
Definition
CRAMM (CCTA Risk Analysis and Management Method) is a
support methodology to the risks analysis and management within
ICT systems, developed by CCTA (Central Computer
Telecommunications Agency). The methodology provides analysis
guidelines, with support software for information entering, storing and
processing. The market offers different, pre-defined versions of
CRAMM (UK Standard, NATO, NHS, Social Care, etc.) that can be
adapted to meet different requirements. CRAMM V is made up of two
different modalities for Risk analysis: Expert and Express.
The Express modality is faster to perform and is more suitable
for areas where time and resources are perhaps limited and the precision level of CRAMM Expert is not necessary. The description below
focuses mainly on the potentials offered by the Expert modality.
Basic Principle
CRAMM supplies a risk analysis process structured in different stages, each supported by questionnaires and guidelines.
183
SECURITY NETWORK
from risk analysis to protection strategies
It is within the analysis application domain that the
most significant resources for achieving the corporate mission are
identified, and resource models are created.
The Asset Model represents the schematisation used by the
CRAMM methodology to organise information pertaining to identified assets. The different types of assets that can be processed are:
•
Data Assets (files, databases, transmission data, documents, etc.)
•
Physical Assets (i.e. the technological components of
the intervention boundary)
•
•
Software Assets (i.e. the applicative components)
Location Assets (identify the rooms and buildings and
the physical locations making up the intervention
boundary)
A particular physical resource is what in CRAMM is defined as
an End-User Service (representing the transmission and processing
modality of the identified Data Assets).
To guarantee Privacy, Integrity and Availability for the identified Data Assets, it is necessary to protect the Software Assets,
Physical Assets and Location Assets supporting them. To this end, it
is important to define dependences among the different kinds of
assets by creating Asset Models.
184
APPENDIX 2
Asset evaluation is performed by estimating the criticality of
every asset, according to impacts and guidelines. Impacts essentially
assess the unavailability, destruction and loss of privacy and integrity
of information. Instead, guidelines define the scenarios within which
impacts can find an application.
Threat and vulnerability assessment makes it possible, by
means of a special questionnaire, to evaluate the probability level of
threat occurrence and vulnerability degree, in terms of the exposure to
threats of every previously identified asset.
The information enables the determination of the risk extent
that, according to the CRAMM methodology, depends on two distinctive aspects: the combination of threat and vulnerability, on the one
hand, and the impact on a specific resource caused by the occurrence
of a harmful event.
The assessment is performed on scale of values from 1 to 7,
by means of a risk matrix. The identified protection measures (countermeasures) represent the protection profile of each asset, and the
starting point of the risk management stage.
CRAMM selects the most suitable security measures by comparing risks associated to each identified threat with the security level
ensured by the countermeasure. This is the stage in which the differences between the security measures proposed by CRAMM and other
existing solutions are compared, so as to pinpoint any weaknesses or
areas with redundant security measures.
The security measures (hardware, software, communications,
procedural, physical, organisational) are grouped together according to
their objectives. For each of the above-mentioned stages, CRAMM
supplies a report summarising the achieved results.
CRAMM: BS 7799
CRAMM controls comply with the ISO 17799 standard. The
product can be used to support companies in evaluating compliance
with the 2002 BS 7799 part 2 standard, supplying to this aim a specific section enabling, among other things, a gap analysis according to the
185
SECURITY NETWORK
from risk analysis to protection strategies
plan, do, check, act principles, and the production of all necessary
documentation.
To whom is it addressed?
CRAMM is suitable for all medium/large companies, including complex entities such as large industrial groups. It can adapt very
well to IT environments, offering support for technical aspects (hardware, software, communication protocols, etc.) and physical security
(site, building, room). Some aspects also include punctual references to
organisational and procedural security.
The use of CRAMM in security management processes makes
it possible to:
• Support users throughout the structured security management
process, by means of supportive templates, applicative masks
and review schemes
• Assess the state of protection of the entire analysis boundary
by verifying the suitability of existing or planned protection
measures, compared to identified risks
• Assess the implemented or planned measures in the light of
security best practices
• Provide each asset with a protection profile indicating priori-
ties to easily identify those needing urgent intervention and
the ones for which it can be postponed
• Enable the constant monitoring of the process efficiency by
means of the review activities supplied by the product
• Support users in documenting security management processes,
thanks to the existence of guidelines and operational reports.
186
APPENDIX 2
Appendix 2.4 – RISKWATCH
Information supplied by Renzo Dell’Agnello from Elea S.p.A. (distributor in Italy of RiskWatch)
RiskWatch is a risk management system developed by
RiskWatch Inc. and used by large companies and public administrations worldwide. RiskWatch exists in different languages versions,
other than English: amongst them, the most relevant version for Italy
is the VPI version, developed by ELEA since it was first commercialised in Italy.
The specific features of the VPI version are its language
(Italian) and compliance with the Italian legislation (e.g. Law Decree
196/03 on privacy), in addition to its conformity with reference standards, namely ISO 17799/BS 7799. Furthermore, the VPI version has
additional characteristics compared to the international version.
The assessment of the security requirements of companies
and public administrations has revealed the need for different methodological analysis definitions, according to the type of analysis and
organisation, and the budget available for such activities. This is why
RiskWatch VPI supports quantitative (SQRM and TLQ), qualitative
(TLQ QUAL) and semi-quantitative (TLQ/SQRM) methodological
definitions.
SQRM is the standard RiskWatch methodology also available
in the international English version.
Instead TLQ QUAL is a qualitative methodology that enables
consistent time and cost reductions, at the same time allowing for
thorough assessment of the security level, as well as the identification
of possible risks in the context of the analysis. It generates particularly relevant indexes for risk level assessment, as for example the
Impact Relative Index.
The TLQ QUAL methodology is nothing but the qualitative
version of the TLQ methodology; the only difference is that it does not
include the final stage of the methodology in which quantitative data
are requested. Furthermore, since there are no quantitative results, it
187
SECURITY NETWORK
from risk analysis to protection strategies
has a different system reporting. The very characteristics of TLQ make
it possible to perform a cost/benefit analysis, like with the SQRM.
The TLQ/SQRM semi-quantitative methodologies sum up all
the advantages of methodological research in risk analysis and the processing and flexible possibilities of RiskWatch VPI.
This methodological setup makes it possible to achieve risk
level assessment with minimum impact to the real asset value (it
accepts the input of both quantitative and qualitative values, thanks to
a specific normalisation process), at the same time supplying the
Impact Relative Index and the Backward Traceability that characterise the TLQ and TLQ QUAL methodologies.
Some of the concepts and terms used in the previous description of the methodologies supported by RiskWatch VPI need to be
explained to those who have not been able to learn about the previously-described methodological definitions.
Once a risk value has been determined, Backward
Traceability makes it possible to define the risk percentage deriving
from the vulnerability areas that are relevant in terms of a specific
threat; this information enables the tracing of the fundamental riskengendering vulnerabilities.
The Impact Relative Index (IRI) is a relative risk measurement index, expressed within the range 0-100, which represents the
ratio between the effective risk level and the maximum risk level (0, no
risk, optimal protection; 100, maximum risk, no protection) of a specific threat. It also expresses the lack of protection against the threat
in question.
The idea underscoring the semi-quantitative TLQ/SQRM
methodology, in addition to the possibility of managing qualitative and
quantitative data, is to identify two kinds of substantially independent assessments making up the risk analysis process.
The first estimation concerns the value exposed to risk, in
other words the potential risk value without protection, which
amounts to maximum risk value.
The second estimation concerns the protection level, which
188
APPENDIX 2
can be determined through a comparison with a so-called state-ofthe-art protection model, in other words optimal for the current technical expertise, corresponding to the defined protection level.
The effective risk level is obtained from the two previously
mentioned assessments (RLE – Risk Level Estimated) expressed in a
metrics from 0 to 10. Once an acceptability threshold has been
defined, one can decide whether to intervene or not, depending on the
value, and where, thanks to backward traceability.
The answers to the questionnaires containing information on
the analysed environment are compatible and can therefore be used on
all methodological setups. It is therefore possible to start from a simpler setup, moving on to a more complete one in a modular and scalable way, recovering investments made.
RiskWatch VPI brings together flexibility within a methodological environment and complete operational support, with the possibility of obtaining information at Intranet and geographic network
level, either thanks to customized printed questionnaires, or by means
of special applications that interact directly with the people supplying
the information.
RiskWatch VPI has the data import/export features and the
extensive possibility of reporting with graphs and tables for the significant indexes of the analysis. There is also a complete auditing feature
of the analytic process and the identified data, in addition to statistical
findings.
189
SECURITY NETWORK
from risk analysis to protection strategies
Appendix 2.5 – Information Security Assessment (ISA),
Enterprise Security Architecture (ESA) and Risk
Analysis
Information supplied by Simona Napoli and Andrea Mariotti from KPGM
The risk analysis is targeted to identify the value of information managed within corporate processes and the pending risk level
and, hence, to outline the most adequate security countermeasures for
information protection. Furthermore, risk analysis enables the definition of security policies and standards in relation to the corporate
context.
In this sense, it represents a fundamental step, both in terms
of the evaluation of the actual state of security (Information Security
Assessment), and the definition of the requisites of the security management system that the company wishes to set-up (Enterprise
Security Architecture).
The correct application of risk analysis must thus allow for
the following:
• Identification of the security controls to be implemented by
means of the application of the most widespread international security standards (BS 7799-2, ISO 17799, etc.), drafted and developed with the active participation of KPGM, a
signee member of committee BSI-DISC BDD/2.
• Valorisation of internationally consolidated experiences and
best practices
• Easy adaptation to specific contexts by means of the modification of models in time, in the wake of technological innovation
• Production of consistent and structured documentation
• Definition of different grades of security measures, thus
optimising the cost-benefit ratio and simplifying user operativeness
190
APPENDIX 2
• Identification of key information needing protection, both
in business terms and to comply with the provisions in
force; such a characteristic is essential for making sure security policies are applied in coherence with business requisites
and in compliance with the law (e.g. Consolidation Act on
privacy)
• Constitution of interdisciplinary working groups to facilitate
the sharing of project objectives among the different functions, and to organise parallel training for the participants of
the working groups, to increase their awareness of problems
connected to risks, controls and the relative information
security requisites.
Lastly, another advantage lies in the use of tools that exploit
Intranet functions to facilitate the identification and management of
information needed for analysis, allowing for more efficient reassessment and operational management processes.
Reference Model
To identify critical business information and assess underlying
risk levels, it is important to first link them to the corporate processes using the information, and then identify the relative management
modalities.
Information mapping is made up of macro-data concerning
corporate processes; macro-data is a minimum set of information, or
a collection of data, representing a homogeneous group for the application of protection measures.
The criticality of macro-data depends on their value in terms
of privacy, integrity and availability within the process they belong to,
despite their type, format and storing equipment used.
Risk level is defined according to the value of the macro-data,
the level of threat they are submitted to and the vulnerability of the
support tools and infrastructures (applications, systems, networks,
191
SECURITY NETWORK
from risk analysis to protection strategies
location) that manage them:
Risk = f (Value, Threats, Vulnerability)
The reference model used for risk analysis can therefore be
summarised by the following graph:
PROCES 1
RESOURCE
AND DATA
FLOW
PROCES 2
SUBPROC. SUBPROC.
1
2
SUBPROC. SUBPROC.
1
2
RESOURCES 1
RESOURCES 2
RESOURCES 3
MAACRODATA 1
MAACRODATA 2
MAACRODATA 3
Location 1
Location 2
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Location 3
Risk Analysis Stages
To identify the macro-data embodying the corporate information asset, assess their criticality and relative risk exposure, and to
define suitable security countermeasures, the following stages must be
performed.
Stage 1: Identification of Corporate Macro-Processes
and Mapping of Information Systems
The main objective of stage 1 is the detection and classification of macro-processes and information systems supporting
192
Risk
SUPPORT INSTRUMENTS
AND INFRASTRUCTURES
Value
APPENDIX 2
corporate processes, precisely identifying the risk analysis
application environment.
The identification of macro-processes makes it possible to
outline the structure of the information flow generated in the
course of the different activities making up the processes. The
analysis is a starting point that will later support activities of
information classification, threat evaluation, vulnerability
analysis and risk level determination.
Stage 2: Classification of information Value
The classification of information, associated with its value for
the organisation, is an essential process representing the very
foundation of risk evaluation, at the same time enabling the
company to gain better knowledge of its information heritage.
The classification of information in terms of relative value –
an activity that can be performed at different aggregation levels, expressing the absolute value of the entire information
heritage - therefore reveals the sensitivity and criticality level
that a company attributes to itself.
The value of managed information is estimated by means of a
special matrix for each security parameter (privacy, integrity,
availability); an evaluation is made of the impact caused by the
possible occurrence of an event described in the different
columns of the matrix. Then, the aggregate value of the information is calculated by adding-up the value of the different
parameters. Lastly, according to the value obtained, the information is placed within a criticality category.
Stage 3: Threat Assessment and Vulnerability Analysis
Threat Assessment
Threat assessment is the process that leads on to the identification of events with a potentially negative impact on the
value of the information heritage.
Threat assessment consists in attributing a value representing
193
SECURITY NETWORK
from risk analysis to protection strategies
the perceived level of threat against corporate information.
The assessment is made for several threat categories, from the
source (e.g. internal/external), to the nature (e.g. hostile/nonhostile) and the complexity (structured/non-structured).
Vulnerability Analysis
The information system vulnerability definition process consists in the evaluation and identification of parameters that are
associated to previously identified threats. Vulnerabilities are
defined as a gap between the current state of information and
the protection expectations considered adequate and capable
of preventing an external agent from compromising information. The vulnerabilities analysed by the methodology concern
both technical aspects, connected to the logical or physical
security of the supporting tools and infrastructures, and
organisational aspects, pertaining for example to work procedures or personnel responsibility.
The vulnerability of applications can concern different categories: access control, development and maintenance, outsourcer management, auditing and log, backup, etc.
The vulnerability level of each application also depends on the
vulnerability of the network and the systems making it operational; they, in turn, can be classified into further categories
(security of operating systems, antivirus, backup and disaster
recovery, auditing and log, management of outsourcers for
what concerns systems; infrastructural security, remote access,
auditing and log, for the network).
Furthermore, since vulnerabilities also depend on the physical
location for the performance of corporate processes activities,
or where the supports and infrastructures are situated, the
location vulnerabilities are also evaluated and grouped into different categories: protection boundary, position and protection of appliances, behavioural standards, environmental control systems, physical access control, loading and unloading
areas, protection of in-coming and out-going appliances,
194
APPENDIX 2
cabling protection.
Each vulnerability is given a weight representing the level of
risk deriving from the presence of a given vulnerability.
Susceptibility is an indicator of information exposure to risk,
and is connected to the presence of vulnerabilities and threats.
The contribution of each vulnerability to the susceptibility
value depends on its weight and the presence of threats that
could exploit the vulnerability in question.
Stage 4: Risk Level Definition and Identification of
Recommended Security Measures
The risk model used by the methodology provide for that risks
are determined according to the combination of information
value, the nature of the existing threats, and vulnerabilities.
The information collected in the previous stages thus makes it
possible to determine a level of risk for each application,
defined as follows:
Risk = Value * Susceptibility
The value obtained leads to the attribution of a risk category
(low, average, high).
The risk assessment defined by such a methodology represents
the starting point for the application of corporate policies,
while homogeneous intervention plans are prepared for each
area, in compliance with centrally established requisites.
195
SECURITY NETWORK
from risk analysis to protection strategies
Appendix 2.6 Symantec
Methodology (SSRAM)
Security
Risk
Analysis
Information supplied by Andrea Rigoni from Symantec
Definition
Symantec Security Risk Analysis Methodology (SSRAM) is a
methodology developed by Symantec to help organisations
measure their level of exposure to risk, and identifies a suitable
countermeasure plan. SSRAM is also a reference framework
adopted by Symantec for creating Risk Management support
services.
To whom is it addressed?
SSRAM is for any organisation needing not only to measure
the risk levels of its information systems, but also to setup correct management and control processes for continuous risk
government.
Basic Principles
SSRAM is based on the ISO/IEC 17799 methodology for
total risk identification in relation to identified services and
assets. The approach supplies statistic information revealing
which services and components have high-risk exposure, thus
requiring additional protection. Basic risks are verified on the
basis of the assumption that no active security measures have
been implemented, thereby offering an objective overview of
the overall risk. The security controls involved in ISO/IEC
17799:2000 are grouped to form filters (sets of countermeasures) and used to calculate risk reduction following the application of the countermeasures. All the values produced are
based on the visibility offered by Symantec on new vulnerabilities, threats and their impact on ICT services.
196
Tools and Services
The SSRAM methodology provide for both a risk measurement, and a constant control stage.
To support customers in the use of this methodology, a
SSRAM Toolkit is available, a software tool that supports
clients during all the measurement, assessment and simulation
stages.
Vulnerabilities and threats change continuously: an average of
eight new vulnerabilities connected to technologies and commercial products are discovered every day. Furthermore, all latest global threats have affected the most vulnerable systems
within a few hours from their appearance. To support the continuous assessment of the vulnerability, threat and impact profile on services, SSRAM offers a classification and a series of
metrics for vulnerability and threat assessment, which can be
used to feed a database with external Security Intelligence
services.
Furthermore, a methodology connected to SSRAM is available
for launching control, monitoring and incident reaction
processes, to reduce or nullify the impacts.
197
SECURITY NETWORK
from risk analysis to protection strategies
198
APPENDIX 3
NETWORK SECURITY
From risk analysis
to protection strategies
Appendix 3 Acronyms and abbreviations
Acronym
Description
ADSL
AIPA
AP
BSI
CA
CC
CENTR
CERT
CERT-AM
CNIPA
CNR
CNSI
CObIT
COSO
CRAMM
CRL
CSIRT
DMZ
DNS
EAP
EFS
ENISA
Asymmetric Digital Subscriber Line
Autorità per l'Informatica nella Pubblica Amministrazione
Access Point
British Standards Institute
Certificazion Authority
Common Criteria
Council of European National Top Level Domain Registries
Computer Emergency Response Team
CERT dell'Amministrazione Pubblica
Centro nazionale per l'informatica nella pubblica amministrazione
Consiglio Nazionale delle Ricerche
Centro Nazionale per la Sicurezza Informatica
Control Objectives for Information and related Tecnology
Committee of Sponsoring Organizations of the Treadway Commission
Risk Analysis and Management Methodology
Certificate Revocation List
Computer Security Incident Response Team
Demilitarized Zone
Domain Name System
Extensible Authentication Protocol
Encrypting File System
European Network and Information Security Agency
199
SECURITY NETWORK
from risk analysis to protection strategies
Acronym
Description
GMITS
Guidelines for the Management of IT Security
GSM
Global System for Mobile Communication
GPRS
General Packet Radio Service
HIDS
Host Intrusion Detection System
IANA
Internet Assigned Number Authority
ICANN
Internet Corporation for Assigned Names and Numbers
ICT
Information & Communication Technology
IdM
Identity Management
IDS
Intrusion Detection System
IETF
Internet Engineering Task Force
IPSec
IP Security
ISACA
Information System Audit and Control Association
ISDN
Integrated Services Digital Network
ISF
Information Security Forum
ISMS
Information Security Management System
ISO
International Standard Organisation
ISOC
Internet Society
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
MPLS
Multi Protocol Label Switching
MSS
Managed Security Services
MSSP
Managed Security Service Provider
NAT
Network Address Traslation
NAT/PAT
Network Address Traslation/Port Address Traslation
NDA
non-disclosure agreement
NIDS
Network Intrusion Detection System
OCSE
Organizzazione per la Cooperazione e lo Sviluppo Economico
OTP
One time password
PA
Pubblica Amministrazione
PEAP
Protected Extensible Authentication Protocol
PIN
Personal Identification Number
PKI
Public Key Infrastructure
PMI
Privilege Management Infrastructure
PPAA
Pubbliche Amministrazioni
RADIUS
Remote Authentication Dial-In User Service
RAS
Remote Access Service
200
APPENDIX 3
Acronym
Description
RIPE NCC
ROI
RTO
RUPA
S/MIME
SIA
SOC
SPC
SSL
SSO
TACACS
TCP/IP
TLS
UE
UMTS
URL
VPN
W3C
WAN
WEP
Reseaux IP Européen Network Coordination Centre
Return on Investement
Recovery Time Objective
Rete Unitaria della Pubblica Amministrazione
Secure Multipurpose Internet Mail Extensions
Sistema Informativo Aziendale
Security Operations Center
Sistema Pubblico di Connettività
Secure Sockets Layer
Single Sign On
Terminal Access Controller Access Control System
Transmission Control Protocol/ Internet Protocol
Transport Layer Security
Unione Europea
Universal Mobile Telecommunications System
Uniform Resource Locator
Virtual Private Network
World Wid Web Consortium
Wide-Area Network
Wired Equivalent Privacy
201
Stampa: PrintArt
Via Tiburtina Km 18.700 - 00012 Guidonia (RM)
Ministero delle Comunicazioni