Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
1 MODULE 10 : Assuring Reliable and Secure IT Services Matakuliah: J0422 / Manajemen E-Corporation Tahun: 2005 Versi: 1 / 2.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information Security Policies and Standards
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
System and Network Security Practices COEN 351 E-Commerce Security.
Intrusion Detection Systems and Practices
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Controls for Information Security
Stephen S. Yau CSE , Fall Security Strategies.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Lecture 11 Reliability and Security in IT infrastructure.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 IS 8950 Managing Network Infrastructure and Operations.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Assuring Reliable and Secure IT Services Chapter 6.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Computer & Network Security
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
IS Network and Telecommunications Risks Chapter Six.
Note1 (Admi1) Overview of administering security.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Assuring Reliable and Secure IT Services Chapter 6.
CPT 123 Internet Skills Class Notes Internet Security Session B.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Risk management.
Secure Software Confidentiality Integrity Data Security Authentication
Wireless Network Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Security in Networking
Network Security: IP Spoofing and Firewall
Home Internet Vulnerabilities
Firewalls Routers, Switches, Hubs VPNs
INFORMATION SYSTEMS SECURITY and CONTROL
Intrusion Detection system
Security week 1 Introductions Class website Syllabus review
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm

Table of contents: Attackers Classification of threats Defensive measures Security management framework Risk & incident management of Security

Attackers Attackers: About 46% of companies and government agencies suffered security incident from 2007 until now. Who are the attackers? + Thrill seekers who like the challenge of defeating defense systems. + Other attackers who dislike their company and intended to steal the company’s proprietary data, such as credit card numbers or other online payment.

Classification of threats: Managers must understand the classification of threats: External Attacks: harm against computing infrastructure. +E.g.: DoS-Denial of Service: attackers send data packets more rapidly than the target machine can handle. Each packet begins to be authentic conversation with the victim computer, thus disable infrastructure devices.

Classified threats:

Classification of threats: Intrusion: gain access to a company’s internal IT infrastructure by various methods. e.g. obtaining user names & passwords. Intruders can use high-tech ways such as using “sniffer” software for LANs, or exploiting computer codes to gain access to systems. Hackers can scan IP exploitable addresses to their master computer. If a company does not know exactly about its system, customers & business partners will not trust security of data entrusted to the company.

Defensive Measures: To secure a company’s data, infrastructure components, and reputation, managers must build 6 defenses: 1. Security Policies: related to people who has company account, passwords, security features,… 2. Firewalls: collection of software/hardware to prevent system assess 3. Authentication: host/network/data authentication to control assesses 4. Encryption: renders the e-transmission unreadable 5. Patching and change management: change passwords regularly or keep important data in computer’s files or “fingerprints”. 6. Intrusion Detection and network monitoring: combine hardware probes and software diagnostic system to help network administrators recognize when their infrastructure is under attack.

Network intrusion detection system:

Security management frame work: Make Deliberate security decisions: Managers must not allow public internet in company and educate themselves on security relation and decision. Consider Security a Moving target: company must attack their own system and hire outside firm to audit, stay in source of CERT(Computer Emergency Response Team) Practice Disciplined Management: for process changes Educate users: to understand the dangers of sharing password and connection. Deploy Multilevel technical Measures: as may as needed be. Use security at host & network levels.

Risk Management: Managing before the incident: use sound infrastructure design, disciplined execution of operating procedure, careful documentation, established crisis management procedures and rehearsing incident response. Managing during the incident: human decision makers have obstacles to deal with: confusion/denial/fear responses. Awareness of psychological traps helps decision makers to avoid them. Managing after the incident: erase or rebuild parts of the infrastructure. Managers need to understand what incident happened, and connect with the company’s protecting entrusted information.