Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Introduction and Security Trends Chapter 1.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

Ethics, Privacy and Information Security
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Lecture 1: Overview modified from slides of Lawrie Brown.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Lecture 11 Reliability and Security in IT infrastructure.
Threats and Attacks Principles of Information Security, 2nd Edition
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Computer Hacking Cybercrime (1).
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Computer Crime and Information Technology Security
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
By Hafez Barghouthi. Agenda Today Attack. Security policy. Measuring Security. Standard. Assest. Vulnerability. Threat. Risk and Risk Mitigation.
What does “secure” mean? Protecting Valuables
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Introduction to Computer Ethics
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Trends and Issues Basic Computer Concepts Education  Children are outpacing adults on the technology track. Education plays a major role in guiding.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Lesson 1-Introduction and Security Trends. Background  Terrorists have targeted people and physical structures. – The average citizens are more likely.
Safe’n’Sec IT security solutions for enterprises of any size.
Security Mindset Lesson Introduction Why is cyber security important?
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Computer Security Threats
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Principles of Computer Security, Fourth Edition Copyright © 2016 by McGraw-Hill Education. All rights reserved. Introduction and Security Trends Chapter.
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Threats By Dr. Shadi Masadeh.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 11 crime and security in the networked economy
CSI Survey 2007 Tiffany Gorman
Presentation transcript:

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Introduction and Security Trends Chapter 1

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Objectives List and discuss recent trends in computer security Describe simple steps to take to minimize the possibility of an attack on a system Describe various types of threats that exist for computers and networks Discuss recent computer crimes that have been committed

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Key Terms Critical infrastructures Elite hackers Hacker Hacking Hacktivist Highly structured threat Information warfare Ping sweep Port scan Script kiddies Structured threat Unstructured threat

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 The Security Problem Fifty years ago, computers and data were uncommon. Computer hardware was a high-value item and security was mainly a physical issue. Now, personal computers are ubiquitous and portable, making them much more difficult to secure physically. Computers are often connected to the Internet. The value of the data on computers often exceeds the value of the equipment.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Electronic crime can take a number of different forms, but the ones we will examine here fall into two basic categories: 1.Crimes in which the computer was the target 2.Incidents in which a computer was used to perpetrate the act Virus activity also existed prior to 1988, having started in the early 1980s. The Security Problem (continued)

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Sample of Security Incidents The Love Letter Virus (May 2000) The Code Red Worm (2001) Adil Yahya Zakaria Shakour (August 2001–May 2002) The Slammer Worm (2003) U.S. Electric Power Grid (1997–2009) Conficker (2008–2009) Fiber Cable Cut (2009) The Morris Worm (November 1988) Citibank and Vladimir Levin (June–October 1994) Kevin Mitnick (February 1995) Omega Engineering and Timothy Lloyd (July 1996) Worcester Airport and “Jester” (March 1997) Solar Sunrise (February 1998) The Melissa Virus (March 1999)

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Threats to Security Internal vs. external Elite hackers vs. script kiddies Unstructured threats to highly structured threats

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Viruses and Worms It is important to draw a distinction between the writers of malware and those who release it. Viruses have no useful purpose. Viruses and worms are the most common problem that an organization faces. Antivirus software and system patching can eliminate the largest portion of this threat. Viruses and worms generally are non- discriminating threats. Viruses are easily detected and generally not the tool of choice for highly structured attacks.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Malware Viruses and worms are just two types of malware threats. The term “malware” comes from “malicious software.” Malware is software that has a nefarious purpose, designed to cause problems to an individual (for example, identity theft) or your system.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Intruders Hacking is the act of deliberately accessing computer systems and networks without authorization. Hackers are individuals who conduct this activity. Hacking is not what Hollywood would have you believe. Unstructured threats are conducted over short periods of time (lasting at most a few months), do not involve a large number of individuals, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Types of Intruders Script kiddies are individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities. They have enough understanding of computer systems to download and run scripts that others have developed. Script writers are those people who are capable of writing scripts to exploit known vulnerabilities. These individuals are much more technically competent than script kiddies and account for an estimated 8 to 12 percent of malicious Internet activity. Elite hackers are those highly technical individuals, who not only have the ability to write scripts that exploit vulnerabilities but also are capable of discovering new vulnerabilities. This group is the smallest of the lot, however, and is responsible for, at most, only 1 to 2 percent of intrusive activity.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Insiders Insiders are more dangerous in many respects than outside intruders because they have the access and knowledge necessary to cause immediate damage to an organization. Attacks by insiders are often the result of employees who have become disgruntled with their organization and are looking for ways to disrupt operations. It is also possible that an “attack” by an insider may be an accident and not intended as an attack at all.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Criminal Organizations As financial transactions over the Internet increased, criminal organizations followed the money. Fraud, extortion, theft, embezzlement, and forgery all take place in an electronic environment. A structured threat is characterized by a greater amount of planning, longer time to conduct the attack, and more financial backing than in an unstructured attack.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Terrorists and Information Warfare Computer systems are important assets that nations depend upon. As such, they are now targets of unfriendly foreign powers. Information warfare is the warfare conducted against the information and information processing equipment used by an adversary. Information warfare is a highly structured threat.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Critical Infrastructures During warfare, nations may choose targets other than the opposing army. Critical infrastructures are those whose loss or impairment would have severe repercussions on society. These include water, electricity, oil and gas refineries, banking, and telecommunications. Terrorists may also target these critical infrastructures.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Security Trends The trend has been away from large mainframes to smaller personal computers. As the level of sophistication of attacks has increased, the level of knowledge necessary to exploit vulnerabilities has decreased.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Security Trends (continued) The percent of organizations experiencing security incidents has declined (from 46 percent in 2007 to 43 percent in 2008). Four types of attacks are on the rise –Unauthorized access –Theft/loss of proprietary information –Misuse of web applications –DNS attacks The average loss due to theft of proprietary information was $5.69 million in The average loss due to financial fraud was $21.12 million in 2007.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Avenues of Attack There are two general reasons a particular system is attacked: –It is specifically targeted. –It is a target of opportunity. Equipment may be targeted because of the organization it belongs to or for political reasons. These attacks are decided before the software or equipment of the target is known. A hacktivist is a hacker who uses their skills for political purposes.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Avenues of Attack (continued) Targets of opportunity – attacks are conducted against a site that has software vulnerable to a specific exploit. In these instances, the attackers are not targeting the organization, instead they are targeting a vulnerable device that happens to belong to the organization. Targeted attacks – specifically targeted attacks generally are more difficult and take more time than targets of opportunity.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 The Steps in an Attack Step 1 ProfilingGather information on the target organization Check the SEC EDGAR web site ( whois look up, google 2Determine systems available Ping sweep with nmap or superscan 3 Finger printing Determine the OS and open ports Nmap or superscan, banner grab 4Discover applicable exploits Search web sites for vulnerabilities and exploits that exist for the OSes and services discovered 5Execute exploitSystematically execute exploits

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Minimizing Possible Avenues of Attack System hardening Involves reducing the services that are running on the system PatchingEnsures that your operating system and applications are up- to-date Limiting information Makes it more difficult for an attacker to develop the attack by limiting the information available about your organization

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Types of Attacks If successful, an attack may produce one or more of the following: –Loss of confidentiality – information is disclosed to individuals not authorized to see it. –Loss of integrity – information is modified by individuals not authorized to change it. –Loss of availability – information or the system processing it are not available for use by authorized users when they need the information.

Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Chapter Summary List and discuss recent trends in computer security Describe simple steps to take to minimize the possibility of an attack on a system Describe various types of threats that exist for computers and networks Discuss recent computer crimes that have been committed