The Need for Security Chapter 2.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Principles of Information Security, 2nd Edition1 Threats and Attacks.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
1Principles of Information Security – Lecture by Sulafa Talha2012 The Need for Security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Principles of Information Security, 3rd Edition2  Recognize that organizations have a business need for information security  Understand that a successful.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Threats and Attacks Principles of Information Security, 2nd Edition
The Need for Security Chapter 2 Our bad neighbor makes us early stirrers, Which is both healthful and good husbandry. -- William Shakespeare (1564–1616),
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Principles of Information Security, 4 th Edition 2 Introduction  Primary mission of information security is to ensure systems and contents stay the same.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Learning Objectives Upon completion of this material, you should be able to: Demonstrate that organizations have a business need for information security.
Principals of Information Security, Fourth Edition
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
The Need for Security Principles of Information Security Chapter 2.
CE3031 The Need for Security Slides based on Whitman, M. and Mattord, H., Principles of Information Security; Thomson Course Technology 2003.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
The Need For Security. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions for an organization:
Principles of Information Security, 2nd Edition2  Understand the business need for information security  Understand a successful information security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Principals of Information Security, Fourth Edition Chapter 2 The Need for Security.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
CONTROLLING INFORMATION SYSTEMS
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
The Need for Information Security(1) Lecture 2. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
IT Security  .
Instructor Materials Chapter 7 Network Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Threats and Attacks Principles of Information Security, 2nd Edition
Faculty of Science IT Department By Raz Dara MA.
Test 3 review FTP & Cybersecurity
Presentation transcript:

The Need for Security Chapter 2

Information security’s primary mission is to ensure that systems and their contents remain the same!

“Organizations must understand the environment in which information systems operate so their information security programs can address actual and potential problems.”

Business Needs First Information Security Important Functions Protect the organization’s ability to function Enable the safe operation of applications Protect the data Safeguard technology assets

Information security has more to do with management than with technology ?

Threats Basics To protect organization’s information Know the information to be protected and the systems that store, transport and process Know the threats you face Computer Security Institute(CSI) 2009 - 64% of organizations responding malware infections 14% system penetration by outsider Loss = $234K per respondent Downward trend Security is improving Companies declining outsourcing security Climb 59% to 71% i.e. It is staying in house

“Computer systems are not vulnerable to attack “Computer systems are not vulnerable to attack. We are vulnerable to attack through our computer systems.” Robert Seacord

Threats to Information Security Categories of Threat Examples Compromises to intellectual property Piracy, copyright infringement Software attacks Viruses, worms, macros, DoS Deviations in quality of service ISP, power, WAN service issues from service providers Espionage or trespass Unauthorized access and/or data collection Forces of nature Fire, flood, earthquake, lightning Acts of human error or failure Accidents, employee mistakes

Threats to Information Security Categories of Threat Examples Information extortion Blackmail or information disclosure Deliberate acts of theft Illegal confiscation of equipment or information Missing, inadequate, or incomplete Loss of access to information systems due to disk drive failure, without proper backup and recovery plan Missing, inadequate, or incomplete controls Network compromised because no firewall security controls Sabotage or vandalism Destruction of systems or information

Threats to Information Security Categories of Threat Examples Theft Illegal confiscation of equipment or information Technical hardware failures or errors Equipment failure Technical software failures or errors Bugs, code problems, unknown loopholes Technological obsolescence Antiquated or outdated technologies

Intellectual Property “the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit.” Inquirer Software Piracy in Asia Exposed

Intellectual Property Includes Trade secrets Copyrights Trademarks Patents Breaches constitute a threat 2 watch dog agencies Software and Information Industry Association Business Software Alliance Most common breach Software piracy 1/3 of all software in use is pirated

Deliberate Software Attacks Malicious code Malicious software Malware First business hacked out of existence Denial-of-service attack Cloudnine British Internet service provider

Virus Segments of code Attaches itself to existing program Takes control of program access Replication

Worms Malicious program Replicates constantly Doesn’t require another program Can be initiated with or without the user download

Other Malware Trojan Horse Back door or trap door Polymorphism Hoaxes Hide their true nature Reveal the designed behavior only when activated Back door or trap door Allows access to system at will with special privileges Polymorphism Changes it apparent shape over time Makes it undetectable by techniques that look for preconfigured signatures Hoaxes

Espionage or Trespass Intelligence Gathering Trespass Legal – competitive intelligence Illegal – industrial espionage Thin line One technique – shoulder surfing Trespass Protect with Authentication Authorization

Hackers 2 levels Experts Novice Develop software scripts Develop program exploits Novice Script kiddie Use previously written software Packet monkeys Use automated exploits

System Rule Breakers Crackers Phreakers Individuals who crack or remove software protection designed to prevent unauthorized duplication Phreakers Use public networks to make free phone calls

Forces of Nature Pose some of most dangerous threats Unexpected and occur with little or no warning Fire Tornado Tsunami Electrostatic discharge Dust contamination Flood Earthquake Lightning Landslide Mudslide Hurricane/typhoon

Acts of Human Error or Failure Acts performed without intent or malicious purpose by and authorized user Greatest threat to org info security Organization’s own employees Closest to the data Mistakes Revelation of classified data Entry of erroneous data Accidental deletion or modification of data Storage of data in unprotected areas Failure to protect information

Acts of Human Error or Failure Prevention Training Ongoing awareness activities Controls Require user to type a critical command twice Verification of commands

Deliberate Acts Information Extortion Attacker or trusted insider steals information Demands compensation Agree not to disclose information

Missing, Inadequate or Incomplete Controls Security safeguards and information asset protection controls are Missing Misconfigured Antiquated Poorly designed or managed Make org more likely to suffer loss

Sabotage or Vandalism Deliberate sabotage of a computer system or business Acts to destroy an asset Damage to an image of an organization Hackterist or cyber activist Interfere with or disrupt systems Protest the operations, policies, or actions Cyber terrorism Theft

Theft Illegal taking of another’s property Physical Electronic Intellectual Constant Problem – crime not always readily apparent

Technical Hardware Failures or Errors Best known Intel Pentium II chip First ever chip recall Loss of over $475 million Technology obsolescence Can lead to unreliable and untrustworthy systems

Technical Software Failures or Errors Large quantities of code written, published, and sold with bugs Bugs undetected and unresolved Combinations of software can cause issues Weekly patches

Technology Obsolescence Outdated hardware or software Reliability problems Management problem Should have plan in place Non-support of legacy systems Can be costly to resolve

Attacks Vector Description IP scan and attack Infected system scans IP addresses and targets vulnerabilities Web browsing Infects web content files infectious Virus Infect other machines Unprotected shares Infects any device that is unprotected Mass mail e-mailing to all addresses in an address book Simple Network Management Protocol (SNMP) Use common password employed in early versions of the protocol the attacking program can gain control of device

Methods of Attack Password Crack Brute force Dictionary The design of the network infrastructure and communication protocols are a major contributor

Initial Communication Three-Way Handshake server client SYN (received by welcome port) SYN-ACK (Create communication port) ACK (establish connection)

Problem Half-open socket problem Server trusts the client that originates the handshake Leaves its port door open As long as half-open port remains open, an intruder can enter

Methods of Attack Social Engineering IP-Spoofing SYN spoofing Scanning IP address of the source element of the data packets are altered and replaced with bogus addresses SYN spoofing The server is overwhelmed by spoofed packets Scanning Way of determining which ports are open and can be used

Methods of Attack Denial of service Spam Mail bombing Sniffing Smurf send large amount of spoofed ping packets Overwhelms the system Can stop response Spam Mail bombing Sniffing Monitors data traveling over a network legitimated and non legitimate purposes Packet sniffing

Methods of Attack Man-in-the-Middle Monitors or sniffs packets from network Modifies the packets Inserts them back into the network Allows attacker to eavesdrop, change, delete, reroute, add, or divert data. Variant Spoofing involves the interception of an encryption key exchange

Man-in -Middle Alice Bob Joe Alice sends message to Bob Bob sends message to Alice Joe changes Alice message – sends to Bob Joe gets Alice message Bob gets Joes message and responds thinking its Alice Joe responds to Alice who thinks its from Bob Joe

Programming Errors Amit Yoran, former director of The Department of Homeland Security’s National Cyber Security Division “ only by improving the quality of our software and reducing the number of flaws can we hope to be successful in our security efforts”

Programming Errors 95 percent of software security bugs come from 19 ‘common, well-understood’ programming mistakes Software can be correct without being secure. There is an imbalance between our abilities as developers and the abilities and resources of the attacker.

Programming Errors January to August, 2003, CERT Coordination Center published 22 security advisories and 9 of them were directly related to buffer overflow. The root of the problem Application writes beyond array bounds Stack is corrupted Attacker gets to specify control information.

Other Buffer Overflow Problem Mismatch in process rates between 2 entities involved in communication Application error More data is sent to a buffer than it can handle Attacker can then make the target system execute instruction Some programming language more vulnerable than others C++ especially vulnerable Java less so Ways of handling

Timing Attack Explores the contents of a web browser’s cache Allows a Web designer to create a malicious form of cookie that is stored on the client’s system Cookie allow designer to collect information on how to access password protected sites