Reader small image

You're reading from  Certified Information Security Manager Exam Prep Guide - Second Edition

Product typeBook
Published inDec 2022
PublisherPackt
ISBN-139781804610633
Edition2nd Edition
Right arrow
Author (1)
Hemang Doshi
Hemang Doshi
author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Right arrow

Information Security Monitoring Tools and Techniques

In this chapter, you will learn about the methods, tools, and techniques for monitoring information security. You will explore the technical aspects of firewall implementation and understand the functions of intrusion prevention systems (IPSs) and intrusion detection systems (IDSs). You will also discover some important aspects of digital signatures, public key infrastructure (PKI), and asymmetric encryption, which are very important from the CISM exam perspective.

The following topics will be covered in this chapter:

  • Firewall Types and Implementations
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • Digital Signatures
  • Elements of Public Key Infrastructure
  • Cryptography
  • Penetration Testing

Firewall Types and Implementations

A firewall is a device that monitors and controls network traffic. It is generally placed between an enterprise's internal network and the internet to protect the organization's systems and infrastructure.

A security manager should understand the following types of firewalls, as well as how they should be structured for better protection of information assets:

Figure 8.1: Types of firewalls

Types of Firewalls

The following are the basic characteristics of these different types of firewalls.

Packet filtering Router

A packet filtering router is the simplest, and the standard, version of a firewall. It tracks the IP addresses and port numbers of both the destination and source and acts (either to allow or deny the connection) as per the defined rules. A packet filtering router functions at the network layer of the Open Systems Interconnection (OSI) model.

Stateful Inspection

A stateful inspection firewall...

Intrusion Detection Systems and Intrusion Prevention Systems

Monitoring security events is a very important aspect of information security. Two important monitoring tools are Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs).

Intrusion Detection Systems

An IDS helps to monitor a network (network-based IDS) or a single system (host-based IDS) with the objective of recognizing and detecting intrusions.

Network-Based and Host-Based IDSs

The following table differentiates between network-based and host-based IDSs:

...

Digital Signatures

A digital signature is a method in which a unique code is attached to an electronic message. This unique code acts as a signature. It helps to verify a document's integrity and the sender's identity.

Steps for Creating a Digital Signature

  1. Create a hash of the message. A hash is also known as a message digest.
  2. Encrypt the hash (from Step 1) with the private key of the sender.

The following figure explains the process in detail:

Figure 8.14: Digital signature

What is a Hash or a Message Digest?

A hash value is a value derived from a message using a mathematical algorithm. A hash value is unique for each message. If a message changes, its hash value also changes.

The following figure further illustrates this:

Figure 8.15: Hash value

The following is a screenshot of software showing a hash value of the message Meeting at 8 AM:

Figure 8.16: Hash software

...

Public Key Infrastructure

A public key infrastructure (PKI) is a set of rules and procedures used for the creation, management, distribution, storage, and use of a digital certificate and public key encryption.

PKI Terminology

CISM aspirants should have a basic understanding of the following terms with respect to PKI:

  • Digital certificate: A digital certificate is an electronic document that proves the ownership of a public key. A digital certificate includes details about the key, details about the owner, and a digital signature of its issuer. It is also known as a public key certificate.
  • Certificate Authority: A certificate authority (CA) is an entity that is responsible for issuing digital certificates.
  • Registration Authority: A registration authority (RA) is an entity that verifies user requests for digital signatures and recommends the CA issue certificates.
  • Certificate Revocation List: A certificate revocation list (CRL) is a list of digital...

Cryptography

Cryptography is defined as the art or science of secret writing with the use of techniques such as encryption. Encryption is the process of converting data into unreadable code so it cannot be accessed or read by unauthorized people. This unreadable data can again be converted into a readable form by the process of decryption. Different types of algorithms are available for encryption and decryption.

Symmetric Encryption vis-à-vis Asymmetric Encryption

Encryption can be of two types, that is, symmetric encryption and asymmetric encryption. The following table will help you understand the differences between the two:

Network-based IDS

Host-based IDS

Monitors activity on the entire network

Monitors activity of a single system or host

Has high false positives (that is, high rates of false alarms)

Has low false positives (that is, low rates of false alarms)

Penetration Testing

In penetration testing, a tester deploys the same tools, techniques, and methods that hackers use to obtain unauthorized access to systems and networks. Penetration testing helps the organization determine its security environment. Gaps and vulnerabilities identified by penetration testing are evaluated and remediated to improve the security posture of the organization. It aids in the identification of any risks to the information systems' confidentiality, integrity, and availability. Only a qualified and experienced professional should conduct penetration testing.

Aspects to be Covered within the Scope of Penetration Testing

From a risk perspective, the following aspects need to be covered within the scope of penetration testing:

  • The scope should contain the exact details of the IP address to be tested.
  • The scope should include the testing technique to be deployed (SQL injection, DoS/DDoS, social engineering, and so forth).
  • The scope...

Summary

In this chapter, you learned about information security monitoring tools and techniques, such as firewall implementation and various types of IDSs and IPSs. This chapter will help the CISM candidate understand the important methods, tools, and techniques used to develop an effective and robust security program. You also explored digital signatures and encryption technology from an information security perspective.

The next chapter will provide an overview of incident management procedures.

Revision Questions

  1. A disadvantage of emailing a password-protected ZIP file is that:
    1. It does not use strong encryption
    2. The firewall administrator can read the file
    3. It may be quarantined by the firewall or mail filters
    4. It utilizes a high network bandwidth
  2. An area of primary concern for a security manager reviewing a firewall configuration is:
    1. The firewall allows source routing
    2. The firewall server is standalone
    3. The firewall rules are reviewed on an ad hoc basis
    4. The firewall allows unregistered ports
  3. What is the best method to prevent external individuals from accessing and modifying a critical database of the organization?
    1. A screened subnet
    2. An acceptable usage policy
    3. Role-based access control
    4. An intrusion detection system
  4. A device that can normally be placed in a DMZ is:
    1. A financial database
    2. A web server
    3. An operational database
    4. A print server
  5. Generally, an intranet is placed:
    1. On the internal network
    2. Outside the firewall
    3. In a demilitarized zone
    4. On an external router
  6. An area of major...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Certified Information Security Manager Exam Prep Guide - Second Edition
Published in: Dec 2022Publisher: PacktISBN-13: 9781804610633
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Symmetric Encryption

Asymmetric Encryption

A single key is used to encrypt and decrypt messages

Two keys are used: one for encryption and another for decryption.

It is known as symmetric...