Overview of Data Communications Security Concepts

Slides:



Advertisements
Similar presentations
Attacks Framework Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration.
Advertisements

Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
4 Information Security.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Crime and Security in the Networked Economy Part 4.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Recovering from an Attack Version 0.1 March, 2003 Bill Woodcock Packet Clearing House.
Security+ Guide to Network Security Fundamentals
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Lecture 11 Reliability and Security in IT infrastructure.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Information Systems Security Operations Security Domain #9.
Note1 (Admi1) Overview of administering security.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 11: Designing Security for Network Perimeters.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Safe’n’Sec IT security solutions for enterprises of any size.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Access Control Jeff Wicklund Computer Security Fall 2013.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
UNIT V Security Management of Information Technology.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Onsite CRM Security
Securing Network Servers
Outline The basic authentication problem
Stop Those Prying Eyes Getting to Your Data
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Chapter 15: Security.
Critical Security Controls
Network Security Basics: Malware and Attacks
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Managing Secure Network Systems
Configuring and Troubleshooting Routing and Remote Access
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risks of Insecure Networks
CHAPTER 4 Information Security.
NERC CIP Implementation – Lessons Learned and Path Forward
Securing Information Systems
Teaching Computing to GCSE
Introduction to Security: Modern Network Security Threats
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Identity & Access Management
Operating System Security
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Operating System Concepts
Test 3 review FTP & Cybersecurity
Protection Mechanisms in Security Management
Global One Communications
Presentation transcript:

Overview of Data Communications Security Concepts Version 1.0 March, 2003 Bill Woodcock Packet Clearing House

Context What to Protect What to Allow Types of Attacks What you can do

Mauritius on the World Stage SAFE cable system Connects to South Africa, India, and Malaysia STM768 total capacity, less than one year old Cyber-city initiative First-class IT hosting facility Regional center for banking and finance Prosperous economy, strong work ethic Already highly educated population New computer education programs

Risks, Costs, and Benefits As Mauritius comes to the world’s attention, both risks and potential benefit increase dramatically. The time to put your house in order is now, before it receives close scrutiny. A well-prepared country will attract business and investors.

What to Protect Physical security Cryptographic security Computing resources Storage (live and backups) Communications and remote access Support (power and cooling) Cryptographic security Hiding content Authenticating parties Protection against replays and man-in-the-middle Code execution and permissions Open source code (patches) Execution space and account structure Social engineering

What to Protect Define tight perimeters Compartmentalize Modularize Physical: secure rooms, not buildings People: delete old accounts, manage permissions Compartmentalize Firewalls: one per class of device Code: executes chroot with own uid Permissions: role accounts, sudo Modularize Code: auditable building-blocks, not monoliths People: cross-train and understand overall goals Physical: standard components, spares, images Firewalls: central management of rulesets, namespace

What to Allow Differential threshold of difficulty to authorized and unauthorized users How to authenticate? “Something you have and something you know.” Password, phrase, PIN, or challenge-response Key, token, modulator, or biometric property

What to Allow Permissions depend upon context Temporal: Physical: Some hours of the day or days of the week While they’re employed or contracted Physical: While they’re present in a facility Together with another user Complex: Depending upon pattern of prior actions

Types of Attacks Physical: Infrastructure destruction Theft of components Wiretapping and eavesdropping Vandalism

Types of Attacks Communications: Man-in-the-middle Denial of service Port scanning Stepping-stones and impersonation

Types of Attacks Code: Incompetence and DoS against labor Buffer overflows Permissions bootstrapping Worms and self-replication Viri and trojan horses Zombies and 0wn3rship

Types of Attacks People: Social engineering Co-option Moles or plants Inside jobs

What Can You Do? Define clear and specific policy 90% of security is human resources 9% is host configuration 1% is firewalls Only create policy which can be followed Only create policy which can be enforced

Why CEOs Must Lead Most serious security compromises come from within the organization. Most are failures of morale, alertness, or moral fiber on the part of employees. These problems can only be solved through good corporate culture. CEOs set the moral and ethical example which guide the corporation’s culture.

Bill Woodcock woody@pch.net www.pch.net/resources/papers/security-concepts