Copyright, 1995-2012 1 COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Data Security GCSE ICT.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Copyright, Copyright, Copyright,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Chapter 6 of the Executive Guide manual Technology.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Information Systems Security
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer threats, Attacks and Assets upasana pandit T.E comp.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Network Security Overview
Securing Information Systems
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
I have many checklists: how do I get started with cyber security?
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Database Security &Threats
Presentation transcript:

Copyright, COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. ETS1 {.html,.ppt} ANU RSCS, 9 October 2012

Copyright, The Notion of Security A condition in which harm does not arise despite the occurrence of threatening events A set of safeguards whose purpose is to achieve that condition

Copyright, Information Security Data Secrecy Prevent access by those who should not see it

Copyright, Information Security Data Secrecy Prevent access by those who should not see it Data Quality / Data Integrity Prevent inappropriate change and deletion Data Accessibility Enable access by those who should have it

Copyright, IT Security Security of Service Integrity Reliability Robustness Resilience Accessibility Usability Security of Investment Assets The Business

Copyright, The Conventional Security Model Threats act on Vulnerabilities resulting in Harm Each Threatening Event is a Security Incident Safeguards are deployed to provide protection Countermeasures are used against Safeguards Safeguards have various purposes: Deterrence of Threats Prevention of Threatening Events Detection of Threatening Events, Vulnerabilities Support for the Investigation of Security Incidents Mitigation of Harm

Copyright, The Conventional IT Security Model Threats impinge on Vulnerabilities, resulting in Harm

Copyright, The Key Concepts A Threat is a circumstance that could result in Harm A Threatening Event is an instance of a generic Threat A Threat may be natural, accidental or intentional An intentional Threatening Event is an Attack A party that creates an Intentional Threat is an Attacker A Vulnerability is a susceptibility to a Threat Harm is any kind of deleterious consequence A Safeguard is a measure to counter a Threat A Countermeasure is an action to circumvent a Safeguard

Copyright, Categories of Threat Natural Threats, i.e. Acts of God or Nature Accidental Threats: By Humans who are directly involved By other Humans By Artefacts and their Designers Intentional Threats: By Humans who are directly involved By other Humans By the Designers of Artefacts

Copyright, Situations in Which Threats Arise

Copyright, Situations in Which Threats Arise Computing and Comms Facilities, incl. Data Storage Software Data Transmission of: The Organisation Service Providers Users Others Physical Premises housing relevant facilities Supporting Infrastructure, incl. data cabling, telecomms infrastructure, electrical supplies, air- conditioning, fire protection systems Manual Processes, Content and Data Storage

Copyright, Intentional Threats / Attacks Physical Intrusion Social Engineering Confidence Tricks Phishing Masquerade Abuse of Privilege Hardware Software Data Electronic Intrusion Interception Cracking / ‘Hacking’ Bugs Trojans Backdoors Masquerade Distributed Denial of Service (DDOS) Infiltration by Software with a Payload By Outsider, by Insiders – Host/Server-side, User/Client-side

Copyright, Categories of Harm Data Loss, Alteration, Access or Replication Reputation or Confidence Loss Asset Value Loss Financial Loss Opportunity Cost Personal Injury Property Damage

Copyright, Safeguards Measures to address Security Problems Safeguards have various purposes: Deter Threats Prevent Threatening Events Detect Threatening Events, Vulnerabilities Support the Investigation of Security Incidents Mitigate Harm

Copyright, IT and Data Security Safeguards The Physical Site Physical Access Control (locks, guards,...) Smoke Detectors, UPS,... Hardware Parity-checking, read-after-write Backup and Recovery Network Channel encryption Firewalls Intrusion Detection Software Authentication of data, of value, of (id)entity, and/or of attributes Access Control, User Authorisations Liveware Human Procedures Control Totals, Reconciliations Organisational Respy/Authy, Separation of duties Legal Duty Statements, Terms of Use, Contractual Commitments

Copyright, Summary of Key Terms Threat A circumstance that could result in Harm Vulnerability A susceptibility to a Threat Threatening Event An occurrence of a Threat Safeguard A measure to prevent, to enable detection or investigation of, or to mitigate Harm from, a Threatening Event Risk “The likelihood of Harm arising from a Threat” A measure of the likelihood and/or seriousness of Harm arising from a Threatening Event impinging on a Vulnerability and not being dealt with satisfactorily by the existing Safeguards

Copyright, The Business Processs of Risk Assessme nt

Copyright, Generic Risk Management Strategies Proactive Strategies Avoidance Deterrence Prevention Reactive Strategies Isolation Recovery Transference Insurance Non-Reactive Strategies Tolerance Abandonment Dignified Demise Graceless Degradation

Copyright, Costs of Risk Mitigation Executive Time, for assessment, planning, control Consultancy Time, for assessment, design Operational Staff Time for: Training, Rehearsals, Incident Handling, Backups Computer Time for backups Storage costs for on-site and off-site (‘fire backup’) copies of software, data and log-files Transmission Costs for database replication Loss of Service to clients during backup time Redundant Capacity (Hardware, Networks) Contracted Support from a 'hot-site' / 'warm-site'

Copyright, An Architecture for IT Security Safeguards

Copyright, An Architecture for IT Security Safeguards External Security Internal Security Perimeter Security

Copyright, Key IT Security Safeguards Categories External Security Content Transmission Security ('Confidentiality') e.g. SSL/TLS Authentication of Sender, Recipient, Content e.g. Dig Sigs, SSL/TLS, Tunnelling, VPNs 'White Hat Hacking' Network-Based Intrusion Detection (ID)...

Copyright, An Architecture for IT Security Safeguards External Security Internal Security Perimeter Security

Copyright, Key IT Security Safeguards Categories External Security Content Transmission Security ('Confidentiality') e.g. SSL/TLS Authentication of Sender, Recipient, Content e.g. Dig Sigs, SSL/TLS, Tunnelling, VPNs 'White Hat Hacking' Network-Based Intrusion Detection (ID)... Perimeter Security Inspection and Filtering Traffic, i.e. 'Firewalls' Malcontent, Malware

Copyright, An Architecture for IT Security Safeguards External Security Internal Security Perimeter Security

Copyright, Key IT Security Safeguards Categories External Security Content Transmission Security ('Confidentiality') e.g. SSL/TLS Authentication of Sender, Recipient, Content e.g. Dig Sigs, SSL/TLS, Tunnelling, VPNs 'White Hat Hacking' Network-Based Intrusion Detection (ID)... Perimeter Security Inspection and Filtering Traffic, i.e. 'Firewalls' Malcontent, Malware Internal Security Access Control Vulnerability Inspection Intrusion (Threat) Detection Safeguard Testing Backup, Recovery, 'Business Continuity Assurance', incl. 'warm-site', 'hot-site'

Copyright, A Key Safeguard – Access Control Protect System Resources against Unauthorised Access Give the right people convenient access to relevant data and software capabilities, by providing User Accounts with Privileges and Restrictions Prevent the wrong people from achieving access to data and software capabilities Person-Based, or Role-Based (RBAC)

Copyright, Access Control

Copyright, Threats to Passwords 1. Guessing 2. 'Brute Force' Guessing 3. Visual Observation 4. Electronic Observation 5. Interception 6. Phishing 7. Use of One Password for Multiple Accounts 8. Discovery of a Password Database 9. Compromise of the Password-Reset Process 10. Continued Use of a Compromised Password 11. Compromise of a Password Stored by a Service-Provider 12. Acquisition and Hacking of the Password-Hash File

Copyright, Australian Consumers' Password Practices When using the Internet, [do you] use hard to guess passwords which are changed regularly? Always – 18%Never – 58%

Copyright, Australian Consumers' Security Practices When using the Internet, [do you] use hard to guess passwords which are changed regularly? Always – 18%Never – 58% [Do you] use, and change regularly, passwords on your main mobile device? Always – 37%Never – 29%

Copyright, Australian Consumers' Security Practices When using the Internet, [do you] use hard to guess passwords which are changed regularly? Always – 18%Never – 58% [Do you] use, and change regularly, passwords on your main mobile device? Always – 37%Never – 29% Unisys Security Index (October 2010) Supplementary Questions to their standard push-poll

Copyright, Ways of Strengthening Access Control Channel Encryption, e.g. SSL/TLS, so that even if the password is intercepted, it is not ‘in clear’ Transmission of only a hash of the password Server-Side Storage of only a hash of the password One-Time Passwords

Copyright, Ways of Strengthening Access Control what you know password, 'shared secrets' what you have one-time password gadget, a digital signing key where you are your IP-address, device-ID what you are a biometric, e.g. fingerprint what you do time-signature of password- typing key-strikes who or what you are reputation, 'vouching' Channel Encryption, e.g. SSL/TLS, so that even if the password intercepted, it is not ‘in clear’ Transmission of only a hash of the password Server-Side Storage of only a hash of the password One-Time Passwords Multi-Factor Use Authentication:

Copyright, E-Trading Security Agenda 1. The Notion of Security 2.The Conventional Security Model 3.Conventional Security Processes Risk Assessment Risk Management 4.An Architecture for IT Safeguards 5.Access Control

Copyright, COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. ETS1 {.html,.ppt} ANU RSCS, 9 October 2012