Lecture 7: IT Security PAD 6710.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chapter 9: Privacy, Crime, and Security
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet safety By Lydia Snowden.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
IT Security Class 3 – April 6, 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Lecture 7: IT Security PAD 6710.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Types of Electronic Infection
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Sample security policy Dr Alexei Vernitski.
Information Management System Ali Saeed Khan 29 th April, 2016.
Securing Information Systems
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
Network Security (the Internet Security)
Secure Software Confidentiality Integrity Data Security Authentication
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
COMPUTER CRIME.
Security of a Local Area Network
Securing Information Systems
Tool Server Workstation Router Universal
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Confidentiality and Privacy Controls
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Security.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Operating System Concepts
Lesson 2- Protecting Yourself Online
Presentation transcript:

Lecture 7: IT Security PAD 6710

IT Security Threats Security Threats Intrusion threats External- Intrusion Threats Network- Technological Threats Internal- Organizational Threats Intrusion threats Hacking: Unauthorized access and use of sensitive information Compromising National security data Compromising Personnel data, e.g SSN, Credit cards Compromising Personal data Cyber crimes ID thefts: on the rise Carding Forums: Criminal websites dedicated to the sale of stolen personal and financial information

IT Security Threats Network threats System vulnerabilities/ compromises Malicious software Viruses: Programs that attach to files, enabling them to spread from one computer to another; can damage hardware, software or files. Worms: Self-propagating viruses Spyware: Programs that are installed without user’s knowledge, and can potentially monitor activities or steal sensitive information Phishing: Legitimate looking emails that tricks user into providing sensitive information Internet Piracy Online software scams that could potentially be a security threat [see: http://www.bsa.org/files/Internet_Piracy_Report.pdf ] Wireless insecurities Wireless is more prone to security threats than wired connections Open wireless communities (e.g. Wi-FI hotspots in public places that do not require a password) are particularly vulnerable

IT Security Threats Internal organizational threats Employee security—who is to guard the guard? Lax management – governments are extensive data repositories; lax management could compromise the data Problems of security threats Corruption of Information Disclosure of Information to unauthorized parties Theft of Service Denial-of-service to legitimate users

Need for IT security Authentication Confidentiality Integrity Provides the assurance that the person affixing a signature to an electronic document is who he or she claims to be Confidentiality Access to the content of the document is limited to authorized persons Integrity Assurance that the message is whole, complete, and not changed in transmission Nonrepudiation Neither party to a transaction can later claim that the transaction did not take place, or that the signature is not valid

Processes of Network Attacks

Information Destruction Vulnerabilities PERPETRATORS Operators Programmers Data Entry Internal Outside Intruders Physical Destruction Bombing Short circuits Information Destruction Erasing Disks Malicious software Via modem Data Diddling False data entry Theft of Services Theft as user Unauthorized action Browsing Theft of media Unauthorized access Theft of Information VULNERABILITIES

Attackers & Motivations

Containing Security Threats Legislation and Executive Branch Actions Covers legal action against security threats Computer Security Act (1987) –security guidelines and standards for government computers Government Information Security Reform Act (GISRA – 2000) –complemented CSA Homeland Security Act (HSA – 2002): CIO authority for overseeing coordination and consolidation of data Fair and Accurate Credit Transactions Act (FACTA – 2003) Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act of 2003)

Containing Security Threats SECURITY AUDIT AND VULNERABILITY ASSESSMENT Update software Install the latest software patches Install antivirus software with frequent updates Attack halting Stops the attack, whether it is a program or a hacker Attack blocking Closes the loop-hole through which the attacker gained access Attack alerting Either pop-up to an online admin, or email or SMS to a remote admin Information collecting On what is done by the attack to the network, and from where the attack came - helps gather forensic evidence should a prosecution become necessary or possible Full reporting Learn from mistakes; prevent future problems

Containing Security Threats Intrusion Detection Systems Firewalls Access limitations Super Power passwords CAPTCHAs (Completely Automated Turing Test To Tell Computers and Humans Apart) Multi level access control Discretionary access control (DAC) Mandatory access control (MAC) Role based access control Task based access control

Containing Security Threats Fail-safe features Encryption of data to authenticate identity of individuals attempting to access the governmental computer systems In paper document, sender has written signature and seals the envelope; receiver checks document integrity by checking the seal Similarly, in electronic documents, sender puts an electronic signature and encrypts document; receiver performs decrypting (a message digest/hashing algorithm) to verify document

Containing security threats Public Key Infrastructure (PKI) PKI is based upon Public Key Cryptography (PKC), an internationally accepted method for securing electronic communications PKC involves a pair of mathematically related keys (large prime numbers of 1024 characters in length) Public key: Distributed freely to anyone whom the public key owner wishes to communicate securely Private Key: Known only by the signer; used to sign a message that only the public key can verify PKI Process User gets certificate of authority Certificate creates a public key for the user Certificate also issues matching private key User can employ the private key to send messages Another user can decrypt messages by using the public key Federal ID Cards for federal employees and contractors (Smartcards) Virtual Private Network (VPN) tunneling through secure channels

Containing Security Threats PENETRATION TESTS Agency-Level Security Policies Security governance and reporting Physical Security Systems Security Checks and Clearances Biometrics Configuration Management Secure System Design Red Teams – teams of experts Honey Pots – proactive security strategies

Containing Security Threats Comprehensive Security Policy: 1. Risk Management Structure 2. Data Stewardship 3. Risk Tracking 4. Risk Notification 5. Authentication 6. Encryption 7. Data Security 8. Data Sharing 9. Data Disposal 10. Security Training