Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

Security+ All-In-One Edition Chapter 17 – Risk Management
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Lecture 1: Overview modified from slides of Lawrie Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Introduction to Network Defense
Storage Security and Management: Security Framework
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Security Computer System Life Cycle Security.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
What does “secure” mean? Protecting Valuables
Lecture 1: Overview modified from slides of Lawrie Brown.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer & Network Security
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Operating system Security By Murtaza K. Madraswala.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Alaa Mubaied Risk Management Alaa Mubaied
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Introduction to Information Security
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Information Systems Security
Computer and Network Security
Risk management.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Security Risk Analysis & Management
TOPIC 3 RISK MANAGEMENT.
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BINF 711 Amr El Mougy Sherif Ismail.
Security in Networking
Networking for Home and Small Businesses – Chapter 8
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Introducing Computer and Network Security

Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re asking –Network administrator has a different perspective than an end user or a security professional –“A computer is secure if you can depend on it and its software to behave as you expect” [Garfinkel,Spafford]

Computer Security Basics CIA Triad –Goals for implementing security practices –Confidentiality, Integrity, and Availability DAD Triad –Goals for defeating the security of an organization –Disclosure, Alteration, and Denial

CIA Triad

Confidentiality –Confidential information should not be accessible to unauthorized users Integrity –Data may only be modified through an authorized mechanism Availability –Authorized users should be able to access data for legitimate purposes as necessary

DAD Triad

Disclosure –Unauthorized individuals gain access to confidential information Alteration –Data is modified through some unauthorized mechanism Denial –Authorized users cannot gain access to a system for legitimate purposes DAD activities may be malicious or accidental

Network Security Security considerations include: –Physical security –Operating System security Windows, Linux, UNIX, Cisco IOS –Communication security Encryption Firewalls Intrusion detection systems

Threats to Security Hacker –Anyone who attempts to penetrate the security of an information system, regardless of intent –Early definition included anyone very proficient in computer use Malicious code object –Virus, worm, Trojan horse –A computer program that carries out malicious actions when run on a system

Threats to Security Malicious insider –Someone from within the organization that attempts to go beyond the rights and permissions that they legitimately hold –Security professionals and system administrators are particularly dangerous

Risk Analysis Actions involved in risk analysis: –Determine which assets are most valuable –Identify risks to assets –Determine the likelihood of each risk occurring –Take action to manage the risk Security professionals formalize the risk analysis process

Asset Valuation Step 1 in risk analysis process: Asset valuation Identify the information assets in the organization –Hardware, software, and data Assign value to those assets using a valuation method Assigning value to assets is the foundation for decisions about cost/benefit tradeoffs

Asset Valuation Common valuation methods –Replacement cost valuation Uses the replacement cost as the value of an asset –Original cost valuation Uses the original purchase price as the value of an asset –Depreciated valuation Uses the original cost less an allowance for value deterioration –Qualitative valuation Assigns priorities to assets without using dollar values

Risk Assessment Step 2 in risk analysis process: Risk assessment Risk assessment techniques: –Qualitative –Quantitative Vulnerability –An internal weakness in a system that may potentially be exploited –Not having antivirus software is an example –Not patched at the latest level

Risk Assessment Threat –A set of external circumstances that may allow a vulnerability to be exploited –The existence of a particular virus for example Risk – occurs when a threat and a corresponding vulnerability both exist

Risk Assessment

Qualitative Risk Assessment: –Focuses on analyzing intangible properties of an asset rather than monetary value –Prioritizes risks to aid in the assignment of security resources –Relatively easy to conduct

Risk Assessment Quantitative Risk Assessment –Assigns dollar values to each risk based on measures such as asset value, exposure factor, annualized rate of occurrence, single loss expectancy, and annualized loss expectancy –Uses potential loss amount to decide if it is worth implementing a security measure

Managing Risks Risk Avoidance –Used when a risk overwhelms the benefits gained from having a particular mechanism available –Avoid any possibility of risk by disabling the mechanism that is vulnerable –Disabling is an example of risk avoidance Risk Mitigation –Used when a threat poses a great risk to a system –Takes preventative measures to reduce the risk –A firewall is an example of risk mitigation

Managing Risk Risk Acceptance –Do nothing to prevent or avoid the risk –Useful when risk or potential damage is small Risk Transference –Ensure that someone else is liable if damage occurs –Buy insurance for example Combinations of the above techniques are often used

Security Tradeoffs Security can be looked at as a tradeoff between risks and benefits –Cost of implementing the security mechanism and the amount of damage it may prevent Tradeoff considerations: –security –user convenience –business goals –expenses

Security Tradeoffs An important tradeoff involves user convenience –Between difficulty of use and willingness of users –If users won’t use a system because of cumbersome security mechanisms, there is no benefit to having security –If users go out of their way to circumvent security, the system may be even more vulnerable

Policy and Education Cornerstone of a security effort is to: –Implement proper policies –Educate users about those policies Information security policies should be: –Flexible enough not to require frequent rewrites –Comprehensive enough to ensure coverage of situations –Available to all members of the organization –Readable and understandable

References SANS CERT NIST 26/sp pdf