Information Society Security Risks.  Attacks  Origin  Consequences RISKS...

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

Ethics, Privacy and Information Security
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security+ Guide to Network Security Fundamentals
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
1 An Overview of Computer Security computer security.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Risks, Controls and Security Measures
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.
SEC835 Database and Web application security Information Security Architecture.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CS CS 5150 Software Engineering Lecture 18 Security.
Got Security? Information Assurance Considerations for Your Research, Course Projects, and Everyday Life James Cannady, Ph.D. Assistant Professor.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
IT in Business Issues in Information Technology Lecture – 13.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Cybercrime What is it, what does it cost, & how is it regulated?
Csci5233 computer security & integrity 1 An Overview of Computer Security.
ISO/IEC 27001:2013 Annex A.8 Asset management
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Role Of Network IDS in Network Perimeter Defense.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Security Issues in Information Technology
CS457 Introduction to Information Security Systems
Critical Security Controls
Design for Security Pepper.
Lecture 5. Security Threats
Chapter 17 Risks, Security and Disaster Recovery
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Security By: Muhammed Anwar.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Information Society Security Risks

 Attacks  Origin  Consequences RISKS...

The Attacks  Availability  Integrity  Confidentiality

The Origin ACCIDENTS  Physical Accidents Breakdowns  Loss of essentialservice Force majeure ERRORS  Operational, conceptual or implementation errors MALEVOLENCY  Theft - Sabotage Fraud  Logical Attacks Dispersion

The Consequences Direct and indirect losses Material and immaterial losses Supplementary Expenses and operational losses Losses of assets ( goods, money ) Civil responsibility Sabotage of the enterprise operations Injure the business image Damage the competitive capability

Risk Management  Prevention  Protection  Detection  After incident recovery  Transfer to insurance  Repression

The RISKS Major  Dead or alive  unacceptable  insurance inadequate Minor  probability of incident x severity  temporary acceptable  prevention and/or insurance

Types of Problems  Intrusion  Viruses  Quality of information  Confidentiality  Intellectual rights  Criminality - security

 Who is responsible ?  Who is the organizer ?  How identify the actors ?  Law applicable ? Questions

Intrusion  Alteration  Destruction  Access - theft  data  programs  Theft of resources

 Who can use the INTERNET ?  What can they do on the INTERNET ?  Who authorizes ?  How can it be controlled? INTERNET Usage Politics

Protection against Intrusion Barriers (firewalls) Access Control –identification –authentication   signature –authorization   classification Cost calculation Access Journalisation

Methods of Violation  CLASSIC  pass-word attacks  brute force  encryption and comparisons  social engineering

Methods of Violation (cont)  MODERN  interception of data  Ethernet sniffing  Keyboard Logging  Monitoring X-Windows  Modified Utilities (login, in.telnetd, in.ftpd, finger,...)  Attacks based on protocols  Encapsulated or wrong configured utilities (NIS, NFS, TELNET, FTP, WWW, R-commands, Sendmail, …)

FIREWALLS  Everything that is not permitted is forbidden ?  Everything that is not forbidden is allowed ? All the incoming and outgoing traffic should pass the firewall !

Limitations of FIREWALLS  Session-jacking  of a connected and authorized user  Tunnel  interfere with an authorized traffic  Circumvention  usage of an alternative access  Weaknesses of certain applications

Problems with FIREWALLS  Reduction of the network throughput  Recovery in case of breakdowns  Not 100 % reliable  Generate a blind confidence  Insufficient Installation Tests  Permanent Upgrades required  The danger is not only external  Logs control work  Static defense

Protection against Alteration Seal (electronic seal) Protection against destruction Safety copies

VIRUSES  Impossible to avoid  The ideal antidote does not exists  The viruses grow in number and complexity  Decontamination is a highly specialized job

QUALITY of INFORMATION Newspapers have degenerated. They may now be absolutely relied upon. Oscar Wilde ( ).

Data Reliability

 Access Control  Encryption  symmetric keys  asymmetric keys

Encryption Individual Society Legal Status of encryption ?

INFORMATION BATTLE  Espionage  Industrial Espionage  Criminality  Terrorism

Information Highway and Society Cost of access and usage Info-poors and info-riches Contents surveillance Impose access restrictions

 Code of conduct  Censure ?  Regulation ‘sensitive Information’ via the information highway

Protection of intellectual rights  Serial number  Copyright registration  Encryption  Product marks

Private life protection

ELECTRONIC COMMERCE  PARTY AUTHENTICATION  AUTHORIZATION  CONFIDENTIALITY  INTEGRITY - NON ALTERATION  JOURNALISATION  NON REFUSION at EMISSION and at RECEPTION

SECURITY is and will always be in the first place a HUMAN PROBLEM!

Not connecting is the only 100 % security