CPIS 312 Chapter One: Introduction to Information Security By Dr. Daniyal Alghazzawi 2011 – Term2.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
CSA 223 network and web security Chapter one
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Data Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
What does “secure” mean? Protecting Valuables
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
12015/10/20 Muhammad Salman University of Indonesia.
Information Systems Security
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
By Liam Wright Manga comic group Japan SAFETY on your computer.
INTERNAL CONTROLS What are they? Why should I care?
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter One: Introduction to Information Security.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Computer Security Sample security policy Dr Alexei Vernitski.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Network System Security - Task 2. Russell Johnston.
Risk management.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Faculty of Science IT Department By Raz Dara MA.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

CPIS 312 Chapter One: Introduction to Information Security By Dr. Daniyal Alghazzawi 2011 – Term2

Index A.Introduction A.1 Why are Computer and Information Security Important? A.2 Cast of Characters B. Security Goals B.1 Confidentiality B.2 Integrity B.3 Availability C. Threats, Vulnerabilities and Controls C.1 Threats C.2 Vulnerabilities C.3 Controls D. Risk Management D.1 Introduction D.2 Procedures D.3 Executive Management 2

A. Introduction 3 What is Information Security?  The concepts, techniques, technical measures, and administrative measures used to protect information assets from deliberate or inadvertent unauthorized acquisition, damage, disclosure, manipulation, modification, loss, or use.

A.1. Why are Computer and Information Security Important? 4 Roughly 1 in 3 computer users has been a victim of viruses, spyware or phishing. U.S. consumers spent $7.8 billion over the last two years for computer repairs, parts and replacements because of malware attacks. 1/5 of all messages received by corporate servers are spam. 1 in 20 s are infected with malware. 60% of internet users who report computer problems do not know the source.

A.1. Why are Computer and Information Security Important? 5 Computer security threats, including viruses, worms and Trojan horses were up 48% in 2005 from the previous year. Total cybercrime losses in 2005 were $130.1 million; the majority of the losses were due to viruses, unauthorized access to computer systems and theft of propriety information.

Occasionally, we’ll require additional good guys, such as Charlie Charlie A.2. Cast of Characters 6 Alice and Bob are the good guys Alice Bob Charlie Trudy is a generic bad guy who is trying to attack the system in some way. Trudy is an “intruder” Trudy

7  The Terrorists, Inc., IT Department “In 2001, a reporter for The Wall Street Journal bought a used computer in Afghanistan. He found the hard drive contained what appeared to be files from a senior al Qaeda operative. Cullison reports that he turned the computer over to the FBI. In his story published in 2004 in The Atlantic, he carefully avoids revealing anything he thinks might be sensitive. The disk contained more than 1,000 documents, many of them encrypted with relatively weak encryption. Cullison found draft mission plans and white papers setting forth ideological and philosophical arguments for the attacks of 11 September There were also copies of news stories on terrorist activities. He also found documents indicating that al Qaeda were not originally interested in chemical, biological, or nuclear weapons, but became interested after reading public news articles accusing al Qaeda of having those capabilities. Perhaps most unexpected were messages of the kind one would find in a typical office: recommendations for promotions, justifications for petty cash expenditures, arguments concerning budgets. The computer appears to have been used by al Qaeda from 1999 to Cullison notes that Afghanistan in late 2001 was a scene of chaos, and it is likely the laptop's owner fled quickly, leaving the computer behind, where it fell into the hands of a secondhand merchant who did not know its contents. But this computer illustrates an important point of computer security and confidentiality: We can never predict the time at which a security disaster will strike, and thus we must always be prepared as if it will happen immediately.”

B. Security Goals 8 The purpose of computer security is to: Devise ways to prevent the weaknesses from being exploited.

B. Security Goals: When is any System Secure? 9

10 B.1. Confidentiality: computer-related assets are accessed only by authorized parties. Confidentiality is sometimes called secrecy or privacy B.2. Integrity: assets can be modified only by authorized parties or only in authorized ways B.3. Availability: assets are accessible to authorized parties at appropriate times

B.1. Confidentiality 11 It is not trivial to ensure confidentiality. For example,  Who determines which people or systems are authorized to access the current system?  By "accessing" data, do we mean that an authorized party can access a single bit? pieces of data out of context?  Can someone who is authorized disclose those data to other parties? Confidentiality is the security property we understand best because its meaning is narrower than the other two

B.2. Integrity 12 It is much harder to ensure integrity. One reason is that integrity means different things in different context For example, if we say that we have preserved the integrity of an item, we may mean that the item is:  precise  accurate  unmodified  modified only in acceptable ways  modified only by authorized people and processes  consistent

B.3. Availability 13 Availability applies both to data and to services (i.e., to information and to information processing), and it is similarly complex We say a data item, service, or system is available if  There is a timely response to our request  There is a fair allocation of resources, so that some requesters are not favored over others  The service or system involved are fault tolerant - hardware or software faults lead to graceful cessation of service or to work- arounds rather than to crashes and abrupt loss of information  The service or system can be used easily and in the way it was intended to be used

B. Security Goals: Relationship of Security Goals 14 A secure system must meet all three requirements. The challenge is how to find the right balance among the goals, which often conflict:  For example, it is easy to preserve a particular object's confidentiality in a secure system simply by preventing everyone from reading that object  However, this system is not secure, because it does not meet the requirement of availability for proper access  => There must be a balance between confidentiality and availability

15  Hollywood at Risk Do you think only banks, government sites, and universities are targets? Consider Hollywood. In 2001, Hollywood specifically the motion picture industry was hit with a series of attacks. Crackers entered computers and were able to obtain access to scripts for new projects, and digital versions of films in production, including Ocean's 11 at Warner Brothers and The One at Columbia Pictures. The attackers also retrieved and made public executives' messages. But, as is true of many computer security incidents, at least one attacker was an insider. Global Network Security Services, a security consulting firm hired by several Hollywood companies to test the security of their networks, found that an employee was copying the day's (digital) film, taking it home, and allowing his roommate to post it to an Internet site.11

C. Threats, Vulnerabilities and Controls 16 C.1. Threats: Something that can potentially cause damage to information assets. C.2. Vulnerabilities: A weakness in the organization, computer system, or network that can be exploited by threat. C.3. Control: an action, device, procedure, or technique that remove or reduce a vulnerabilities.

C. Threats, Vulnerabilities and Controls 17 A threat is blocked by control of a vulnerability

C.1. Threats 18 Definition: Something that can potentially cause damage to information assets. A malicious attacker must have three things (MOM):  Method: the skills, knowledge, tools, and other things with which to be able to pull off the attack.  Opportunity: the time and the access to accomplish the attack.  Motive: a reason to want to perform this attack against this system.

C.1. Threats: Types Interception: some unauthorized party has gained access to an asset, the outside party can be a person, a program, or computing system.  Example: illicit copying of program or data files, or wiretapping to obtain data in a network. (e.g. someone install a T- connector to a cable) ~ an attack on confidentiality

20 2. Interruption: an asset of the system becomes lost, unavailable, or unusable.  Example: malicious destruction of a hardware device, erasure of a program or data file, denial of service attacks. (e.g. Yahoo website was freeze for minutes due to DOS attach) ~ an attack on availability C.1. Threats: Types

21 3. Modification: alteration the values in a database, or programs to perform additional computation, or modify data being transmitted electronically.  Example: someone might change the values in a database, alter a program so that it performs an additional computation ~ an attack on integrity C.1. Threats: Types

22 4. Fabrication: An unauthorized party might create a fabrication of counterfeit objects on a computing system.  Example: the intruder may insert spurious transactions to a network communication system, or add records to an existing database. (e.g. the gas station and the ATM story) ~ an attack on authenticity C.1. Threats: Types

C.1. Threats: Examples 23 Steal, alter, or delete confidential files Steal hardware devices Virus infection Operation mistake Unauthorized access to the Internet Unauthorized break-in Internet Unauthorized access from the Internet

C.2. Vulnerabilities 24 Definition: A weakness in the organization, computer system, or network that can be exploited by threat. Examples:  Security policy is not set.  Roles and responsibilities are vague.  Security training of employees are inadequate.  Building entrance are not checked thoroughly.  There is not protection against computer viruses.  A software bug exists in the server OS.  No password rules are set.  Confidential data are sent over the network. Organization Computer System Network

C.2. Vulnerabilities: Example 1: Building Threats of building break-ins: 1. Theft of keys, ID cards, passwords, etc. 2. Following an authorized person. 3. Pretending to be a sweeper or deliveryman. Vulnerabilities: 1. Lost ID cards are not reported. 2. No guards to check entry. 3. Sweeper’s ID is not checked. 1. Entering with stolen ID cards 2. Following a person who unlocks the door 3. Entering with a stolen uniform of a deliveryman

C.2. Vulnerabilities: Example 2: Within the Office Threats in the Office: 1.Theft of documents or disks, and/or making copies. 2.Theft of hardware. 3.Theft of discarded documents Vulnerabilities: 1.Sensitive documents are not stored in locked cabinet. 2.Computers are not locked to desks. 3.Sensitive documents are not shredded. 1. Theft of documents or disks 2. Theft of computers 3. Picking up documents from a trash box

C.2. Vulnerabilities: Example 3: Computer System Threats to a computer system: 1.Illegally operate on an already logged-in computers. 2.Information theft from a client or server. 3.Change a system setting or account Vulnerabilities: 1.Computers are left unattended in a logged-in state. 2.No password is set. 3.Easy passwords are set on server. Personnel Database 1. Illegal use of logged-in computers. 3. Change a user account XXXX: user administrator 2. Theft of information on the disk

C.2. Vulnerabilities: Example 4: Network Threats using networks: 1.Intrusion through security holes in a router or firewall. 2.Intrusion through wireless LAN’s access point. 3.Theft or alteration of data during transmission on the network Vulnerabilities: 1.Router’s and firewall’s access list is improperly configured.. 2.Access point is not configured to prevent illegal access.. 3.Transmitted data are not encrypted. 2. Intrusion through an access point Firewall router Internet 3. Theft of data on the Internet 1. Intrusion through configuration mistakes in a firewall or router Data Access point

C.2. Vulnerabilities: Example 5: Software Software threats: 1.Buffer overflow attacks. 2.Malicious code 3.Denial of Service (DoS) attack Vulnerabilities: 1.Bugs in OSs or applications. 2.No protection against computer viruses. 3.Security hole exists in the server. 1. When receiving IDs that are too long, the system stops. (overflow) To: %% From: $$$ Attach: xxx virus 2. When a mail infected with a computer virus is opened 3. With too much access, the server stops ID: aaaaa-aaaaa

C.3. Controls 30 Definition: an action, device, procedure, or technique that remove or reduce a vulnerabilities Harm occurs when a threat is realized against a vulnerability. To protect against harm, we can neutralize the threat, close the vulnerability, or both The possibility for harm to occur is called risk

Encryption provides ~ confidentiality for data ~ integrity ~ basis for protocol METHODS OF DEFENSE METHODS OF DEFENSE SOFTWARE/HARDWARE CONTROLS ENCRYPTION POLICIES S/W controls: ~ Internal program ctrls ~ Operating system ctrls ~ Development ctrls H/W controls: ~ h/w devices : - smartcard (encryption) - circuit board ctrl disk drives in PCs ~ frequent changes of password ~ training ~ codes of ethics ~ locks of doors ~ backup copies of important s/w and data ~ physical site planning (reduce natural disasters) PHYSICAL CONTROLS C.3. Controls: Methods of Defense 31

C.3. Controls: What makes a system secure? System Access Control: Ensuring that unauthorized users don’t get into the system. 2. Data Access Controls: Monitoring who can access what data, and for what purpose. 3. System and Security Administration: Performing the offline procedures that make or break a secure system  ~ by clearly stated system administrator responsibilities,  ~ by training users appropriately etc. 4. System Design: Taking advantage of basic h/w and s/w security characteristics.

33  Why Universities Are Prime Targets Universities make very good targets for attack, according to an Associated Press story from June Richard Power, editorial director for the Computer Security Institute, has reported that universities often run systems with vulnerabilities and little monitoring or management. Consider that the typical university research or teaching lab is managed by a faculty member who has many other responsibilities or by a student manager who may have had little training. Universities are havens for free exchange of ideas. Thus, their access controls typically are configured to promote sharing and wide access to a population that changes significantly every semester. A worse problem is that universities are really loose federations of departments and research groups. The administrator for one group's computers may not even know other administrators, let alone share intelligence or tools. Often, computers are bought for a teaching or research project, but there is not funding for ongoing maintenance, either buying upgrades or installing patches. Steve Hare, managing director of the computer security research group at Purdue University, noted that groups are usually strapped for resources.

D. Risk Management 34 “Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization.” CISA Review Manual 2006

Relationship between threat, vulnerability, and loss Threat Loss Vulnerability (threat) +(vulnerability)= (loss) computer virus +no anti-virus software installed= data destruction Risk: a possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset. D.1. Risk Analysis 35

D.1. Risk Analysis 36 What may happen if you omit the analysis?  Cannot detect vulnerabilities.  Introduce countermeasures without specific reason.  Remake the whole system.  Take huge cost and time. Risk analysis leads you to ….  Identify threats to your system.  Estimate damages and possibility of occurrence.  Develop countermeasures to minimize threats.

Risk analysis: Estimation of threats and vulnerabilities of information assets. Risk assessment: Overall process of risk analysis and risk evaluation. Risk management: Process of identifying, controlling, and minimizing or eliminating security risks that may affect information systems. Determination of scope of information security Creation of executive policy Development of systematic risk assessment method Identification of information assets Estimation of threats and vulnerabilities Risk evaluation Risk treatmen t Risk acceptance Risk assessment procedures List of assets Risk analysis table Risk assessment report Risk Management Risk assessment Risk Analysis Inventory of assets D.2. Procedures 37

D.3. Executive Management Executive Management can choose to:  “Accept the risk”? do nothing !  “Mitigate the risk”? Administrative Control Logical Control Physical Control  “Deny the risk”? Confidentiality Integrity Authenticity 38

39  Government's Computer Security Report Card The U.S. Congress requires to supply annual reports to the Office of Management and Budget (OMB) on the state of computer security in the agencies. The agencies must report efforts to protect their computer networks against crackers, terrorists, and other attackers. In November 2001, two-thirds of the government agencies received a grade of F (the lowest possible) on the computer security report card based on the OMB data. The good news is that in 2005 only 8 of 24 agencies received grades of F and 7 agencies received a grade of A. The bad, and certainly sad, news is that the average grade was D+. Also disturbing is that the grades of 7 agencies fell from 2004 to Among the failing agencies were Defense, State, Homeland Security, and Veterans Affairs. The Treasury Department received a D-. A grades went to Labor, Social Security Administration, and the National Science Foundation, among others. (Source: U.S. House of Representatives Government Reform Committee.)111

Terms and Concepts 40 Integrity Availability Risk Risk Management Risk Assessment Risk Analysis Information Assets Authorized Malware

Terms and Concepts 41 Malicious Cybercrime Threats Vulnerabilities Control Confidentiality

1. One control against accidental software deletion is to save all old versions of a program. Of course, this control is prohibitively expensive in terms of cost of storage. Suggest a less costly control against accidental software deletion. Is your control effective against all possible causes of software deletion? If not, what threats does it not cover? 2. Suppose a program to print paychecks secretly leaks a list of names of employees earning more than a certain amount each month. What controls could be instituted to limit the vulnerability of this leakage? 3. Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm? 42