11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Ch.5 It Security, Crime, Compliance, and Continuity
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Introduction to Network Defense
Chapter 3 Ethics, Privacy & Security
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Security Architecture
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Information Systems Security Operations Security Domain #9.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Module 6: Designing Security for Network Hosts
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Module 11: Designing Security for Network Perimeters.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Module 2: Designing Network Security
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
CONTROLLING INFORMATION SYSTEMS
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Module 7: Designing Security for Accounts and Services.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Module 5: Designing Physical Security for Network Resources
Information Systems Security
CS457 Introduction to Information Security Systems
Risk management.
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
Mohammad Alauthman Computer Security Mohammad Alauthman
Cyber Security For Civil Engineering
Presentation transcript:

11 ASSESSING THE NEED FOR SECURITY Chapter 1

Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts  Assets  Threats  Vulnerabilities  Countermeasures  Historical compromises  Security design concepts  Assets  Threats  Vulnerabilities  Countermeasures  Historical compromises

Chapter 1: Assessing the Need for Security3 SECURITY DESIGN INFLUENCES  Legal requirements  Business risk tolerance  Finance  Current events  Technology  Legal requirements  Business risk tolerance  Finance  Current events  Technology

Chapter 1: Assessing the Need for Security4 THE THREE PILLARS OF INFORMATION SECURITY  Confidentiality  Integrity  Availability  Confidentiality  Integrity  Availability

Chapter 1: Assessing the Need for Security5 DEFENSE-IN-DEPTH  Use multiple layers of defense. For example:  Security guards and security cameras  Network firewalls and host-based firewalls  Log on as a non-administrator and use antivirus software  Protects against any single vulnerability  Gives you time to test critical updates  Use multiple layers of defense. For example:  Security guards and security cameras  Network firewalls and host-based firewalls  Log on as a non-administrator and use antivirus software  Protects against any single vulnerability  Gives you time to test critical updates

Chapter 1: Assessing the Need for Security6 THE SCOPE OF SECURITY  Security architecture  Physical security  Cryptography  Access control  Network security  Security architecture  Physical security  Cryptography  Access control  Network security

Chapter 1: Assessing the Need for Security7 THE SCOPE OF SECURITY (CONT.)  Applications and systems development  Operations security  Security management practices  Law, investigations, and ethics  Business continuity planning  Applications and systems development  Operations security  Security management practices  Law, investigations, and ethics  Business continuity planning

Chapter 1: Assessing the Need for Security8 ATTACK COMPONENTS  Asset  Threat agent  Threat  Vulnerability  Compromise  Countermeasure  Asset  Threat agent  Threat  Vulnerability  Compromise  Countermeasure

Chapter 1: Assessing the Need for Security9 ASSET  Items that you have purchased:  Software  Hardware  Facilities  People  Information  Anything else deserving protection  Items that you have purchased:  Software  Hardware  Facilities  People  Information  Anything else deserving protection

Chapter 1: Assessing the Need for Security10 THREAT AGENT  The attacker:  Malicious attackers  Nonmalicious attackers  Mechanical failures  Catastrophic events  The attacker:  Malicious attackers  Nonmalicious attackers  Mechanical failures  Catastrophic events

Chapter 1: Assessing the Need for Security11 THREAT AGENT: MALICIOUS ATTACKERS  The classic hacker attacking from outside  Disgruntled employees attacking from inside  Likely to have specific goals and objectives  To anticipate their attacks, study their motivations  The classic hacker attacking from outside  Disgruntled employees attacking from inside  Likely to have specific goals and objectives  To anticipate their attacks, study their motivations

Chapter 1: Assessing the Need for Security12 THREAT AGENT: NONMALICIOUS ATTACKERS  People make mistakes that can cause damage such as invalid data or failed services  Examples: programming bugs, data-entry errors  Mitigate with:  Thorough testing procedures  Backups  Business continuity plans  People make mistakes that can cause damage such as invalid data or failed services  Examples: programming bugs, data-entry errors  Mitigate with:  Thorough testing procedures  Backups  Business continuity plans

Chapter 1: Assessing the Need for Security13 THREAT AGENT: MECHANICAL FAILURES  Power outages, hardware failures, network outages  Mitigate with:  Business continuity plans  Network redundancy  Server clustering  Service level guarantees  Power outages, hardware failures, network outages  Mitigate with:  Business continuity plans  Network redundancy  Server clustering  Service level guarantees

Chapter 1: Assessing the Need for Security14 THREAT AGENT: CATASTROPHIC EVENTS  Extreme weather: tornadoes, hurricanes, earthquakes, tsunami  Fire  Acts of war  Catastrophic events are rare, but the damage is tremendous. Therefore, the total risk is often high.  Extreme weather: tornadoes, hurricanes, earthquakes, tsunami  Fire  Acts of war  Catastrophic events are rare, but the damage is tremendous. Therefore, the total risk is often high.

Chapter 1: Assessing the Need for Security15 THREAT  Threat agent is the attacker, threat is the attack  Use STRIDE to remember the six main types of threat:  Spoofing identity  Tampering with data  Repudiation  Information disclosure  Denial-of-service  Elevation of Privilege  Threat agent is the attacker, threat is the attack  Use STRIDE to remember the six main types of threat:  Spoofing identity  Tampering with data  Repudiation  Information disclosure  Denial-of-service  Elevation of Privilege

Chapter 1: Assessing the Need for Security16 VULNERABILITY  Also known as a weakness  Has the potential to be a compromise when combined with a threat  Common vulnerability types:  Physical  Natural  Hardware and software  Media  Communications  Human  Also known as a weakness  Has the potential to be a compromise when combined with a threat  Common vulnerability types:  Physical  Natural  Hardware and software  Media  Communications  Human

Chapter 1: Assessing the Need for Security17 COMPROMISE  A successful attack, often called an exploit  Occurs when a threat agent creates a threat for an unprotected vulnerability  If the threat does not penetrate your defenses, you were merely attacked. Attacks are not a problem; compromises are a problem.  A successful attack, often called an exploit  Occurs when a threat agent creates a threat for an unprotected vulnerability  If the threat does not penetrate your defenses, you were merely attacked. Attacks are not a problem; compromises are a problem.

Chapter 1: Assessing the Need for Security18 COUNTERMEASURE  Also known as a safeguard  Reduce the likelihood of a vulnerability  Does not eliminate a vulnerability  Three main types:  Preventative  Detective  Reactive  Also known as a safeguard  Reduce the likelihood of a vulnerability  Does not eliminate a vulnerability  Three main types:  Preventative  Detective  Reactive

Chapter 1: Assessing the Need for Security19 PREVENTATIVE COUNTERMEASURES  Prevent threats from exploiting a vulnerability  Examples:  Firewalls  Software updates  Antivirus software  Employee security training  Prevent threats from exploiting a vulnerability  Examples:  Firewalls  Software updates  Antivirus software  Employee security training

Chapter 1: Assessing the Need for Security20 DETECTIVE COUNTERMEASURES  Used to detect an attack or a compromise  Can enable you to respond after an attack begins, but before a compromise occurs  Can also be used to detect a successful attack  Examples:  Intrusion-detection system  Security logs  Used to detect an attack or a compromise  Can enable you to respond after an attack begins, but before a compromise occurs  Can also be used to detect a successful attack  Examples:  Intrusion-detection system  Security logs

Chapter 1: Assessing the Need for Security21 REACTIVE COUNTERMEASURES  Used after a compromise  Examples:  On-site or off-site backups  Disaster recovery plans  Law enforcement  Used after a compromise  Examples:  On-site or off-site backups  Disaster recovery plans  Law enforcement

Chapter 1: Assessing the Need for Security22 ATTACK COMPONENTS

Chapter 1: Assessing the Need for Security23 HISTORICAL COMPROMISES  The fundamentals of security design remain constant throughout history  A Windows network will be subject to the same types of attack that were used before computers even existed  “Those who cannot learn from history are doomed to repeat it”  The fundamentals of security design remain constant throughout history  A Windows network will be subject to the same types of attack that were used before computers even existed  “Those who cannot learn from history are doomed to repeat it”

Chapter 1: Assessing the Need for Security : POLES BREAK NAZI ENCRYPTION  Nazis use encryption to communicate privately over public radio communications  Poles spend many years studying the communications  Poles break the encryption because of Nazi mistakes  Lesson: Humans make mistakes  Nazis use encryption to communicate privately over public radio communications  Poles spend many years studying the communications  Poles break the encryption because of Nazi mistakes  Lesson: Humans make mistakes

Chapter 1: Assessing the Need for Security : CAP’N CRUNCH CRACKS PHONE SYSTEM  Blind children discover that a whistle in a Cap’n Crunch cereal box makes a hertz (Hz) tone also used by telephone equipment  Blow the whistle and get free long-distance calls  Telephone company’s services are stolen, but catch John Draper (a threat agent) by monitoring usage logs  Lesson: Do not rely on security by obscurity and use detective countermeasures  Blind children discover that a whistle in a Cap’n Crunch cereal box makes a hertz (Hz) tone also used by telephone equipment  Blow the whistle and get free long-distance calls  Telephone company’s services are stolen, but catch John Draper (a threat agent) by monitoring usage logs  Lesson: Do not rely on security by obscurity and use detective countermeasures

Chapter 1: Assessing the Need for Security : MITNICK STEALS CODE FROM DEC  Kevin Mitnick uses social engineering to gain access to user credentials  Abuses credentials to access internal network  FBI monitors, arrests, and convicts Mitnick of multiple computer crimes  Lesson: Sophisticated attackers use unconventional attacks  Kevin Mitnick uses social engineering to gain access to user credentials  Abuses credentials to access internal network  FBI monitors, arrests, and convicts Mitnick of multiple computer crimes  Lesson: Sophisticated attackers use unconventional attacks

Chapter 1: Assessing the Need for Security : ATTACKER STEALS MICROSOFT SOURCE CODE  Microsoft employee runs Trojan horse received in  Trojan horse opens a back door that contacts threat agents  Threat agents use access to collect passwords and steal source code  Damage limited because credentials gave threat agents access to limited portions of the source code  Microsoft’s tarnished security reputation caused immeasurable damage  Lesson: Valuable data deserves expensive countermeasures  Microsoft employee runs Trojan horse received in  Trojan horse opens a back door that contacts threat agents  Threat agents use access to collect passwords and steal source code  Damage limited because credentials gave threat agents access to limited portions of the source code  Microsoft’s tarnished security reputation caused immeasurable damage  Lesson: Valuable data deserves expensive countermeasures

Chapter 1: Assessing the Need for Security28 SUMMARY  Technology is the least important of the influences to security design  Important assets deserve multiple layers of protection  Understand the components of an attack  Learn from the mistakes of other security designers  Technology is the least important of the influences to security design  Important assets deserve multiple layers of protection  Understand the components of an attack  Learn from the mistakes of other security designers