Computer & Info Security Instructor: David Wilkeson, CISSP Class Website: Grades.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Security and Personnel
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
StanSource Inc. is Information Technology services and solutions providing organization engaged in providing a full range of solutions and services to.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
INFORMATION SECURITY MANAGEMENT L ECTURE 10: P ERSONNEL & S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.
Chapter 14 Crime and Justice in the New Millennium
Computer Security and Penetration Testing
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Hands-On Ethical Hacking and Network Defense
An Overview to Information Security and Security Initiatives in India Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In)
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Security Certification
CYBER CRIME AND SECURITY TRENDS
What is CISSP Anyway? A Presentation by: George L. McMullin II, CISSP COO, CorpNet Security, Inc. Executive Director, NEbraskaCERT.
The Top Ten of Security. Ten best practices for securing your network. Ten best security web sites. Eight certifications.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Certification and Training Presented by Sam Jeyandran.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Combating cyber-crime: the context Justice Canada March 2005.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
ISQS 3360 Telecomm Security John R. Durrett, Ph.D. Fall 2010 Various Security Videos.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Cybercrime What is it, what does it cost, & how is it regulated?
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Securing Information Systems
41914F / 4A & 4B Laws, Investigations & Ethical Issues in Security (CIM3562) Test 1 Revision.
Securing Information Systems
Hands-On Ethical Hacking and Network Defense
Prepared By : Binay Tiwari
Cyber Security professions Overview
Introduction to Cybercrime and Security
ISQS 3360 Telecomm Security John R. Durrett, Ph.D. Fall 2010
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

Computer & Info Security Instructor: David Wilkeson, CISSP Class Website: Grades based on: 6 Homework Projects 6 Homework Projects 6 Papers 6 Papers Group Project Group Project Final Exam Final Exam

Text: All In One CISSP Certification Exam Guide Access Control Systems & Methodology Access Control Systems & Methodology Telecommunications & Network Solutions Telecommunications & Network Solutions Security Management Practices Security Management Practices Application & Systems Development Security Application & Systems Development Security Cryptography Cryptography Security Architecture & Models Security Architecture & Models Operations Security Operations Security Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP) Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP) Law, Investigations, and Ethics Law, Investigations, and Ethics Physical Security Physical Security

You and Jobs Backgrounds? Infosec Job Availability International Information Systems Security Certification Consortium (ISC 2 ) Certifications Certified Information Systems Security Professional (CISSP) Certified Information Systems Security Professional (CISSP) Systems Security Certified Practitioner (SSCP) Systems Security Certified Practitioner (SSCP)

Global Information Assurance Certifications (GIAC) Developed by The SANS (SysAdmin, Audit, Network, Security) Institute Developed by The SANS (SysAdmin, Audit, Network, Security) Institute GIAC Security Essentials Certification (GSEC) GIAC Security Essentials Certification (GSEC) GIAC Certified Firewall Analyst (GCFW) GIAC Certified Firewall Analyst (GCFW) GIAC Certified Intrusion Analyst (GCIA) GIAC Certified Intrusion Analyst (GCIA) Certified Information Systems Auditor (CISA) Vendor Specific Certifications Microsoft Microsoft Linux/Unix Linux/Unix Cisco Cisco Oracle Oracle CheckPoint CheckPoint

State of InfoSec - CERT Statistics -

- SANS Internet Storm Center Statistics -

cboss

Why? Computers no longer in “closed environment” More distributed computing More connectivity, more bandwidth, always on More neophyte computer users More computers in unstable/anti-Western countries More telecommuters, more connected business partners

How? Information Warfare Government vs. Government Government vs. Government Activist/Terror Group vs. Government/Corp Activist/Terror Group vs. Government/Corp Individual vs. Government/Corp/Group Individual vs. Government/Corp/GroupHactivism Corp vs. Corp Corp vs. Corp Communications disruption Chinese Code Red Virus Chinese Code Red VirusEspionage Public embarrassment Propaganda

Criminal Activities Electronic money theft Electronic money theft Blackmail Blackmail CD Universe incident Identity theft Identity theft Fraud, Ponzi schemes Fraud, Ponzi schemes Help get money out of Nigeria for a cut scam Great stock tip spam “Joy riding” Viruses – modern graffiti Viruses – modern graffiti Melissa Virus I Love You Web site defacement Web site defacement Denial of service attacks Denial of service attacks Attacks on Yahoo, eBay, Amazon, Buy.com in 2000

Financial Losses? Very hard to quantify No standard definition of “intrusion” No standard definition of “intrusion” What costs should be included? What costs should be included? Loss of “potential” revenue? IP? Loss of “potential” revenue? IP? Long term effects on revenue? Long term effects on revenue? According to FBI 2002 Computer Crime and Security Survey 2002 Computer Crime and Security Survey2002 Computer Crime and Security Survey 80% of respondents reports breeches resulting in financial loss 80% of respondents reports breeches resulting in financial loss 43% quantified losses at a combined $455,848,000 43% quantified losses at a combined $455,848, Survey quantified losses at $265,000, Survey quantified losses at $265,000,000 Only 34% reported losses to law enforcement (up from 16% in 1996) Only 34% reported losses to law enforcement (up from 16% in 1996)

Fighting Back! Increased awareness of computer security issues New, tougher laws Emphasis on computer security included in Homeland Security efforts More trained law enforcement Acceptance of Common Criteria indicates more Worldwide cooperation

The Researchers CERT Coordination Center ( SANS Institute ( SecurityFocus ( Neohapsis ( Internet Security Systems ( Microsoft (

The CyberCrime Fighters FBI Infrastructure Protection and Computer Intrusion Squad Infrastructure Protection and Computer Intrusion Squad Awareness of National Security Issues & Response (ANSIR) Awareness of National Security Issues & Response (ANSIR)CIANSA U.S. Dept. of Justice Computer Crime and Intellectual Property Section (CCIPS) Computer Crime and Intellectual Property Section (CCIPS) Dept. of Defense U.S. Army U.S. Army Defense Information Systems Agency ( Defense Information Systems Agency (

National Infrastructure Protection Center ( InfraGuard ( Ohio Attorney General’s Bureau of Criminal Investigation Computer Crimes Task Force Attorney General’s Bureau of Criminal Investigation Computer Crimes Task Force State Highway Patrol State Highway Patrol Every large police department Banking Institutions Healthcare Organizations Large and medium corporations

The Information Sources National Institute of Standards and Technology’s ICAT (icat.nist.gov) icat.nist.gov CERT/CCSecurityfocus Virus Databases Symantec Symantec Symantec McAfee McAfee McAfee F-Secure F-Secure F-Secure

Terminology & Jargon Hacker/CrackerPhreaker Script Kiddie White Hat Black Hat Grey Hat VulnerabilityExploitRiskCompromisePenetrationAttack Passive Active Countermeasure/ Safeguard InfoSecCIOCTOCSO

CVE Best Practices IDSFirewallCryptography Encryption Encryption Decryption DecryptionVirusWorm Trojan Horse Social Engineering Backdoor/Trapdoor Root kit DoS/DDoSVPNWEP