Security Management. Security Management is the organizational processes and relationships for managing risk – Policies, Procedures, Standards, Guidelines,

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Chapter 9: Privacy, Crime, and Security
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8: Protecting Yourself Online.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
Security+ Guide to Network Security Fundamentals
Lesson 8: Protecting Yourself Online. Lesson 8 Objectives  Discuss "The Right to Be Forgotten"  Identify ways to minimize the spam you receive  Define.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
L ESSON 9: I NTERNET S ERVICES AND T OOLS FOR B USINESS.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Data Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved LESSON 9  Internet Services and Tools for Business.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Chap1: Is there a Security Problem in Computing?.
Malicious Software.
VIRUS.
Computer Skills and Applications Computer Security.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Security and Ethics Safeguards and Codes of Conduct.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Security Issues in Information Technology
Internet Business Associate v2.0
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Security Management

Security Management is the organizational processes and relationships for managing risk – Policies, Procedures, Standards, Guidelines, Baselines – Organizational Structures – Roles and Responsibilities Security Management practices involve balancing security processes and proper management and oversight Risk Management is a big part of managing holistic security of an organization

Goals of Security Confidentiality – Allowing only authorized subjects access to information Integrity – Allowing only authorized subjects to modify information Availability – Ensuring that information and resources are accessible when needed

Goals of Security Confidentiality – Preventing unauthorized subjects from accessing information Integrity – Preventing unauthorized subjects from modifying information Availability – Preventing information and resources from being inaccessible when needed

Computer Security Computer and Network security was not at all well known, even about 12 years ago Today, it is something everyone is aware of the need, but not sure what is really means Interesting topic of threats, countermeasures, risks, stories, events and paranoia – With some mathematics, algorithms, designs and software issues mixed in – Yet, not enough people, even security specialists understand the issues and implications

Malicious Software

SECURITY INNOVATION ©2003 A Subject Overview Viruses Worms Trojans

malicious programs “ Malicious Programs” may be installed by hand on a single machine. They may also be built into widely distributed commercial software packages. These are very hard to detect before the payload activates (Trojan Horses, Trap Doors, and Logic Bombs). Virus - code that copies itself into other programs. A “Bacteria” replicates until it fills all disk space, or CPU cycles. Payload - harmful things the malicious program does, after it has had time to spread. Worm - a program that replicates itself across the network (usually riding on messages or attached documents (e.g., macro viruses). Trojan Horse - instructions in an otherwise good program that cause bad things to happen (sending your data or password to an attacker over the net). Logic Bomb - malicious code that activates on an event (e.g., date). Trap Door (or Back Door) - undocumented entry point written into code for debugging that can allow unwanted users. Easter Egg - extraneous code that does something “cool.” A way for programmers to show that they control the product.

Telnet Telnet is a remote host connection You log on to a server and access information as if you were sitting in front of the server Telnet provides a login shell (an environment that allows you to issue commands) Requires an account and password on the host computer A generic user name and password allow access to public servers SSH (Secure Shell) is a secure form of Telnet

File Transfer Protocol (FTP) Used to transfer files between two computers Public FTP servers generally allow anonymous logon and allow downloading of files only Files are downloaded via the FTP “get” command Corporate FTP servers usually require a user name and password (you may upload files if you have permission) Files are uploaded via the FTP “put” command You can use command-line FTP, a browser’s built-in FTP client, or a specialized FTP client Secure versions of FTP include: – Secure Copy (SCP) – SSH File Transfer Protocol (S/FTP) – SSL/TLS-enabled FTP (FTPS)

Managing Download Files You may need to define MIME types for files that you download Many files downloaded from FTP servers are compressed (using a compression utility) and must be decompressed before you can use them Common compression utilities include: – Zip/unzip – Bzip2/bunzip2 – Bzip/bunzip – Gzip/gunzip – Compress/uncompress – RAR/WinRAR

Virtual Network Computing (VNC) VNC allows you to control a computer at a remote location as if you were sitting in front of it VNC consists of two components: the server and the viewer VNC provides a fill GUI display and allows authenticated users to log on and see the same display they would see if they were sitting in front of the (server) computer The viewer and server do not need to be running the same operating system

Instant Messaging (IM) Computer-based method of communication in which users can type and view messages sent to one or more recipients and view the responses immediately Contacts must be online to receive messages Can also be used to send files, view photos, send Web links and talk to contacts Becoming very popular in the workplace Requires an instant messaging client and an account for instant messaging service There are several IM services, clients and servers in widespread use

Peer-to-Peer Networks In a peer-to-per network, each computer has both client and server capabilities On the Internet, a P2P network allows a group of users to connect with each other and directly share files among their hard drives P2P networks are inexpensive and allow users to share bandwidth

Lightweight Directory Access Protocol (LDAP) LDAP directories contain contact information (name, address, address, public keys, etc.) Simplified version of X.500 Supports TCP/IP Makes global directory service available to everyone Modern clients are capable of searching an LDAP directory

Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 7: Internet Security

Objectives Identify the three types of encryption Identify ways that authentication provides Web security Identify ways that firewalls provide Web security Identify malware (malicious software) Identify ways to detect and prevent virus attacks Define spyware Define patches and updates Identify ways that screen savers provide workstation security Define list servers and listserve groups Identify security-related ethical and legal issues faced by IT professionals

Encryption Encryption – encoding or scrambling information using specific algorithms Three types of encryption: – Symmetric-key (secret-key) encryption – the same key is used to encrypt and decrypt messages – Asymmetric-key (public-key) encryption – two keys are used to encrypt and decrypt messages: a public key and a private key – Hash (one-way) encryption – uses hashes to verify the integrity of transmitted messages

Authentication User names and passwords – use to log on to private and public networks, including the Internet Digital certificates – attachments to electronic transmissions that supply a verifiable signature – Digital signatures – electronic signatures that verify the identity of the message sender Non-repudiation – digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action

Firewalls Firewall – a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks Use firewalls to: – Prevent unauthorized Internet users from accessing private networks – Retain control of proprietary information – Prevent unauthorized export of proprietary information Firewalls may prevent access to external providers or external servers

Malware (Malicious Software) Virus – damages computers and networks, often alters files to damage or destroy data Worm – resides in active memory and replicates itself until an entire disk is full Trojan horse – appears to be harmless (such as a computer game) but produces harmful results Illicit server – installs hidden services on systems – Client code – allows remote access to a computer by an attacker – Server code – infects destination computer and enables the attacker to control it

Virus Detection and Prevention Corporate IT departments are often the first line of defense against viruses Common ways to contract viruses: – Receive infected disk from colleague or friend – Download infected file – Download illicit server attachment – Copy to your hard disk a document infected with a macro virus

Virus Detection and Prevention (cont’d) Common ways to protect against viruses: – Do not open or attachments from unknown senders – Configure browser and security to highest levels – Use antivirus software – Keep antivirus software current – Stay informed about the latest virus threats – Make backup copies of important files

Virus Detection and Prevention (cont’d) If you receive an attachment you do not recognize: – Do not open the attachment – Contact the sender to determine whether the attachment is legitimate – If you cannot contact the sender, delete the attachment from the message – Delete the attachment from the Deleted Items folder

Virus Detection and Prevention (cont’d) If you suspect a virus attack: – Use antivirus software to remove the virus – If you cannot launch antivirus software, reboot from a known clean system disk, then launch the antivirus software – Remove virus from all disks, files and programs – If damage is too extensive, reformat hard disk, restore data and reinstall programs (last resort only)

Spyware Spyware – an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes Also known as adware Cookies are not spyware because: – The user is aware of their presence – The user has the option to disable outside access to cookie information Use spyware detection applications to detect and eliminate spyware

Updates and Patches Update – a software upgrade that permanently fixes known bugs and improves software performance Patch – a temporary bug fix Virus update – files of virus signature profiles you use to keep your antivirus software current

Screen Savers Screen saver – a utility program that displays images or animation on your monitor when your computer is idle Use to hide your work while you are away from your desk Specify screen saver and amount of time computer is idle before screen saver displays

List Servers and Listserve Groups List server – collects and distributes information to and from listserve groups List servers: – LISTSERV ( – Majordomo ( – Lyris ( Listserve group – Participants who subscribe to a mailing list through a list server Mailing list Web sites (not list servers): – Topica (lists.topica.com) – Yahoo! Groups (groups.yahoo.com)

Security-Related Ethical and Legal Issues Privacy concerns: – Your computer activities are no longer private – You may receive malware and spam – Organizations may monitor employee and restrict access to Internet sites – Network administrators may audit the contents of employee hard drives Use home computer for personal communications and Internet searches

Security-Related Ethical and Legal Issues (cont’d) Copyright issues: – Copyright laws extend to works of authorship on the Internet – There is no international copyright – You must obtain copyrights from the appropriate agency in your home country – Court cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permission

Security-Related Ethical and Legal Issues (cont’d) Licensing: – To license copyright-protected material, you must obtain permission from the author Trademarks: – To register a trademark, you must contact the appropriate agency in your home country Encryption policies: – Determine the risk of transmitting or ing unencrypted proprietary or sensitive data