I. Introduction
Due to the increasing vulnerability to hacking in
today’s changing security environment, the protection of an organization’s Information Security Management System
(ISMS) has become a business imperative. With the access to the Internet by
anyone, anywhere and anytime, the Internet’s ubiquitous presence and global
accessibility can become an organization’s weakness because its security
controls can become more easily compromised by internal and external threats.
Hence, the purpose of this article is to strengthen the awareness of ethical hacking in the IT
Organization, also known as penetration
testing, by evaluating the effectiveness and efficiency of the ISMS.
II. What is Ethical
Hacking/Penetration Testing?
Ethical
hacking and penetration testing is a preventative measure which consists of a
chain of legitimate tools that identify and exploit a company’s security
weaknesses. It uses the same or similar techniques of malicious hackers to
attack key vulnerabilities in the
company’s security system, which then can be mitigated and closed. In other
words, penetration testing can be described as not “tapping the door”, but “breaking
through the door”. These tests reveal how easy an organization’s security
controls can be penetrated, and to obtain access to its confidential and
sensitive information asset by hackers. As a result, ethical hacking is an
effective tool that can help assist IT professionals to better understand the
organization’s information systems and its strategy, as well as to enhance the
level of assurance and IS audits if used properly.
III. Basic Characteristics of
Penetration Testing
Different Types of “Hat
Hackers”
There are different types of “hat
hackers” that should be distinguished: black, grey, and white. “Black hat hackers” perform unauthorized
penetration attacks against information systems, which may or may not be
illegal in the country they are conducting. On the other hand, ethical hackers
are known as “white hat hackers”
because they legitimately perform security tests bounded by a contractual
agreement. Their main purpose is to improve the system which can then be closed
before a real criminal hacker penetrates within the organization. “Grey hat hackers” are those in-between
the black and white that perform their activities within legal legislations and
regulations but may slightly go over the boundaries. Since penetration testing
is an authorized attempt to intrude into an organization’s network, the focus
of the paper will be on the “white hat hackers”.
IV. Threats/Risks Relevant to
Organizations
In order to
conduct a penetration testing, threats and risks should first be identified and
analyzed because this forms the basis of the test in which ethical hackers
would attempt to attack an organization’s system to expose those
vulnerabilities. In the same manner, IT practitioners should be fully aware of
the information security risks that are relevant to any organization because it
can adversely affect their business operations and cause their security systems
vulnerable to unauthorized access, increasing both business and information
risks respectively. In the following, two major risks will be discussed –
internal and external.
a. Internal
Threat/Risks
Regardless
of how strong a computer security system is designed, employees’ lack of
knowledge about security issues and other malicious employees can inflict
enormous damages to any organization. With limited employee security awareness,
simple actions of opening a “joke
email”, which may be infected with a virus, can place the organization at
risk with thousands of lost revenue. Key statistics from a medium-size company
case study have indicated that 100% of all employees use instant messaging,
which should have been prevented by the corporate firewalls, and 40 out of 100
users use common dictionary words as
legitimate and valid passwords which can be easily guessed by other
employees for unauthorized access. In addition, less than 25% of the employees
have used an external device to copy files off-site and 33% have transmitted
confidential documents to a laptop. Employees also run the chance of using cloud services, such as Google Docs or Dropbox, for the convenience of
transferring corporate data, and this bypasses the IT department for proper
procedures and policies. As a result, companies are now exposed in ways that
the cloud can compromise its sensitive and confidential information, increasing
the risk of rogue IT. This ultimately demonstrates that employees who are key
personnel to running an organization successfully may also be the greatest
weakness at the same time due to the unprotected exposure of unauthorized
access.
b. External Threat/Risks
External threats include a wide range of activities that are
performed by real criminal hackers. By identifying the security gaps in an
organization’s system, external hackers can exploit the system and gain
authorized access to copy or delete sensitive information, such as customer’s
credit card information.
In any security system, “information is crown”. This essentially means that whenever an
organization’s information asset is compromised, this is a security issue which
may be caused by technical issues, human errors or processing weaknesses. As a
result, both internal and external threats must be identified and proactively
addressed by organizations because it can bring financial and non-financial
losses, including lawsuits related to release of confidential, private,
commercial or other highly-sensitive
information, lost in revenue, damaged reputation, loss of credibility in
the eyes of customers and loss of control in computer system.
VI. Penetration Testing Techniques
There are various technical and non-technical techniques
that can be utilized as part of the penetration testing process to address the
internal and external threats. The following is a list of the most common tools
used in a penetration test:
1.
Web
Applications Software: Since many organizations sell many business applications
over the Internet, testing can consist of evaluating the level of encryption
used for processing confidential and sensitive information (128 or 256-bits), firewalls, the use of
cookies stored on their customers’ computers31, the length and strength of
passwords (upper and lower cases with numbers/letters) and the security of
software configurations. For instance, a message should not plainly indicate
that there was an incorrect password only, and no problem with the login
username.
2. Denial of Service: This testing depends on the
organization’s commitment of having continuous availability of the information
system. The red team evaluates the system’s vulnerability to attacks that will
either cause the system to deny service from legitimate access, or to become
totally unavailable due the inability to handle high volume of traffic, such as instantly sending millions of spam messages to the organization’s mail server.
3. War Dialing: This testing consists
of systematically calling numerous telephone numbers in order to identify “modems, remote access devices and
maintenance connections” that are present in an organization’s network.
Once identified, exploitation techniques, such as strategic attempts to guess
the username and password, are performed to assess whether the connection can
be used as a way to penetrate into its information security system.
4. Wireless
Network:
Penetration testers will drive or walk around the
office buildings to identify opened wireless networks of the organization that
should have not been present in the first place. The purpose is to identify
security gaps or errors in the “design,
implementation and operation” of a company’s wireless network system.
5. Social
Engineering:
Penetration testers would attempt to deceive the
organization’s employees and suppliers in order to gather sensitive information
and penetrate into an organization’s systems, such as claiming to be an IT
representative and asking for the users’
login and passwords. Even though this is a non-technical testing which involves human-related features, it is
viewed as equally important to determine whether unauthorized users can gain
access to the information system.
6. Google Hacking: Since Google is the one
of the most common search engines widely used by organizations, penetration
testers should consider Google hacking as an effective web security practice. It uses the search engine to locate personal
or sensitive information by taking advantage of Google’s function of optimizing
the search results anywhere in the websites. For instance, tests have found a
directory with the social insurance number of more than 70 million deceased
persons, and passport documents.
VII. Benefits of Penetration Testing
Penetration
testing can help close the gap between safeguarding of an organization’s
security system and the exposure of its security risks by assessing whether the
security controls are adequate and working effectively.
As IT
attacks are always changing in “nature,
complexity and method”, penetration testing can be viewed as a solution to
the evolving security threat environment and assist the organization’s IT
system to stay constantly attentive and updated as part of the its overall
security strategy. According to PCI and
ISO 27001, managing security risks and threats is an essential management
and IT process. The rationale behind this is that organizations should fully
understand their weaknesses before they can effectively defend and protect
themselves from unauthorized access. Hence, penetration testing can become a “hacker’s-eye” of any organization’s
security system. Instead of possessing the wrong attitude towards security in
hopes of not being hacked, organizations should take the appropriate actions to
mitigate and control risk. Penetration testing can strengthen an organization’s
security procedures and processes, as well as further improve the efficiency and effectiveness of its risk
management. It can also consist of increasing the degree of transparency by
assessing the type of sensitive data that can be potentially exposed, and how
the network can be compromised by human elements. Ultimately, the main benefit
is that organizations can learn from the penetration testing experience and
further improve its security systems by thoroughly analyzing its weaknesses,
properly implementing the changes, and informing all parties in a timely
manner.
VIII. Limitations of Penetration Testing
Penetration testing cannot be expected to identify all
possible security weaknesses, nor does it guarantee that it is 100% secure. New
technology and hacking methods can create new exposures not anticipated during
the penetration testing. Thus, it is certainly possible that after a
penetration testing, there could be hacking incidents thereafter because it is
impossible to have full but rather only good protection for an organization’s
security system.
In
addition, a penetration testing is usually performed within limited resources
over a specific period of time. Therefore, once an ethical hacker has
identified the current risk and threats exposed to the system, the organization
should immediately take corrective action to mitigate these security loopholes and decrease the
potential exposure to malicious hackers.
XIV: Conclusion
Penetration testing is an important component of an
organization’s overall security strategy and can definitely add value if there
are major security weaknesses in its system controls, and a high risk of
unauthorized access due to the nature and operations of the business. Through
controlled attempts to intrude into computer’s network system, a combination of
penetration testing techniques and strategies can be developed to fit an organization’s
needs in terms of nature of business, size and complexity of its operations.
This will in turn enhance the assurance provided from auditors in assessing a
company’s internal controls and security system at the same time. On the whole,
ethical hacking and penetration testing should be considered as an efficient
and effective means to mitigate and close security gaps and deficiencies before
malicious hackers can otherwise exploit them.
No comments:
Post a Comment