Security fundamentals Topic 1 Addressing security threats and vulnerabilities.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Mr C Johnston ICT Teacher
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
APA of Isfahan University of Technology In the name of God.
Securing Information Systems
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Storage Security and Management: Security Framework
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Understanding Security Layers
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
1.1 System Performance Security Module 1 Version 5.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Software Security Testing Vinay Srinivasan cell:
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Information Systems Security Operations Security Domain #9.
12015/10/20 Muhammad Salman University of Indonesia.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Ingredients of Security
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Security
Risk management.
Secure Software Confidentiality Integrity Data Security Authentication
Answer the questions to reveal the blocks and guess the picture.
Operating System Security
Presentation transcript:

Security fundamentals Topic 1 Addressing security threats and vulnerabilities

Agenda Goals of security Risk assessment Common threats Types of attacks Common defences Security guidelines

Goals of security Confidentiality – Ensures that information is accessed only by those who are authorized to do so Integrity – Ensures that the information is modified or deleted only by those who are authorized to do so Availability – Ensures that information and equipment can be used only by those who are authorized to do so C-I-A triad – Trade-offs

Basic steps of risk assessment 1.Identifying assets, such as computers or data 2.Assigning a value to the assets 3.Assigning a likelihood that an event will occur that could cause loss or damage 4.Assigning values to that risk based on both the possible damage and the likelihood that an event will occur

Identifying assets Take an inventory of tangible and intangible assets. Tangible Assets – Physical items that the business owns, IT equipment, network, servers, desktops, applications, databases, procedures Intangible Assets – Goodwill, intellectual property, patents, copyrights, and trademarks, logos, reputation

Method Assign a value to the assets: 1.For tangible assets get the initial cost and adjust for depreciation 2.Make an estimate based on market value 3.Estimate of the value of revenue that could be generated from the asset 4.Compare to a similar asset’s value Assign a likelihood that an event will occur that could cause loss or damage: – Use a scale such as high, moderate, low Assign values to a risk based on both the possible damage and the likelihood that an event will occur: – Prioritise your risks

Key security terms 1.Risk 2.Threat 3.Vulnerability 4.Risk acceptance 5.Risk transfer 6.Risk avoidance 7.Risk mitigation

Risk management Identify the risks – List assets – Assign value to assets – Likelihood of damage – Assign priority Identify threats Identify vulnerabilities – Where are the weaknesses? Minimise risk – Minimise weakness by taking preventative steps Review

Identifying threats Disasters Natural disasters – eg flood, earthquake, fire Man made disasters – eg arson, loss of power Mishap – eg accidental deletion of data, misconfiguration Threats from attack – An attempt to bypass security controls – To defend from these threats you must understand the technology How severe will the impact be? What is the likelihood of the event happening?

Threats from attack Specific to business – DoS attack on the company Web Server Threats that are not directed – DDoS Widely known threats – worms, viruses External threats – originates from outside the company (not the network) Internal threats – originates from within the company (eg technically savvy users)

Intrusion points Physical access points – Access to the media (cable, devices, storage) – Security guards and locks and cameras Access points via the network – Wireless – Dial-in via phone lines – Hacking through security controls – Internet Data disposal – Printed material – Laptops and hard drives

Attack sources It is your responsibility to both defend against possible attacks and detect successful attacks. White hats: ethical security experts looking for vulnerabilities Black hats: hackers/crackers – Expert: finding areas of weakness – Intermediate: programmers creating exploits from the vulnerabilities – Novice: script kiddies – What motivates them?

Identifying attacks Scanning – Ping and port scans – is there an IP and an open port? Fingerprinting – What OS, applications and services are running, what versions and protocols? Denial of Service (DoS) – Shutting down or overloading a service so it becomes unavailable Spoofing – Disguising the source (IP, or others)

Identifying attacks Source routing – Route is specified in packet header and bypasses controls Man-in-middle – Messages are intercepted and reviewed or altered before being sent on to destination Back door – Unknown and undocumented way to access a program or system Left in by developers Installed by hackers

Identifying attacks Password guessing – Default passwords – Blank passwords – Easy to guess passwords – Short passwords – Common words – Automated scripts to find password hashes – Dictionary attack – Brute force attack

Identifying attacks Replay attack – Intercepting and recording a connection setup and replaying at a later time to gain authorised access Encryption breaking – Breaking the encryption algorithm or guessing the key used by the algorithm Hijacking – Taking over an existing connection- sending packets as if from source Malicious code – Viruses, worms and trojans

Identifying attacks Software exploitation – Buffer overflow attack – Cross site scripting – inserting malicious HTTP code on a webpage Social engineering – Manipulating people by exploiting their ignorance, fears or willingness to help – Impersonation, piggybacking entry into restricted areas – This is the most difficult to prevent

Defending against threats Defence in depth Must include multiple elements Layered defence Hacker must overcome multiple defence checks Each defence check is monitored and alarmed

Defending against threats Secure the network infrastructure – Network Access Control – Secure Communications Protocols – System hardening – systems, applications and resources (files and databases) Authenticating users – Passwords – Biometrics – Certificates – Tokens – Smart Cards Auditing – Monitoring operations – intrusion detection, logs

Basic security guidelines Physical security – Locks, facility access controls, surveillance – Circumvention threats, using bootable media to access hard drives, key loggers Trust – Trusting administrators – Trusting certificates – Servers trusting servers Privilege levels – Principle of least privilege – Standard, admin and root accounts

Maintaining documentation Document all procedures related to systems security: – Planning – Policies – Configurations – Monitoring and reporting – Archiving

Lesson summary Addressing security threats and vulnerabilities – Goals of security – Risks, threats and vulnerabilities – Risk assessment – Common threats – Types of attacks – Common defences – Basic security guidelines