Security in the Workplace: Information Assurance Team 1: Mohamed Eid, Wendy Eid, Veronica Austin and Laura Gunsell-Shields
What is a network? A network is defined as an interconnection of three or more communicating entities. These entities are usually passive electronic components that perform a specific function (usually limited in scope).
Security Management In Network Management, this is the set of functions that protect the system from unauthorized access by persons, acts or influences and that includes many sub functions.
Security Implementation Procedure Manual Internal/External Access Control Employee Customer Control of Information Security Alerts
Intrusion of Networks Main focus is to avoid intrusion and to protect against individuals from destroying and damaging your computer and files, whether intentionally or accidentally. Intrusion can cost a company millions of dollars.
Security Threats
Dangerous Computer Geeks!? *Old School Hackers *Cyber-Punks *Crackers *Coders
Hacking Techniques Scan the system Gain Initial Access Gain Full Access Drop a backdoor Get out quick without being detected
ATTACK TRENDS 1980’s : Password cracking 1990’s: Session Hijacking 2000’s : War Driving & Cyber Terrorism
SECURITY THREATS Electronic Infections Abuse of user privileges Denial of Service Proprietary Theft System penetration
CSI 2002 SURVEY REVEALED:
Risk Management
Security Concerns Managers are concerned with protecting assets and information and insuring integrity of business transactions. Customers are concerned with protecting privacy and financial transactions.
Improving Network Security Firewalls Anti-virus software Restrictions on user activity
Firewall Emphasis is to block traffic Serves as a security blanket for management Must be part of overall organizational security architecture
Guidelines for Anti-Virus Process Always run the anti-virus software Never open any files or macros attached to an email from an unknown source Delete Spam, chain, or other junk email without opening or forwarding Never download files from unknown sources Backup critical data Update anti-virus software periodically
Password Protection Frontline defense in computer/network security Change passwords on a regular basis
Characters of Weak Passwords Contain less than 8 characters Words found in the dictionary Common usage words, such as names of pets, family members etc.
Password Don’ts Do not reveal passwords over the phone Do not reveal password in an email Do not reveal password to a boss or co-worker Do not share passwords
Remote Access Users Passphrase is used for remote users by using public/private key authentication A key authentication defines the mathematical relationship between the public key (that is known) and the private key (known only to the user) A passphrase is a longer version of a password and is generally more secure
Recent Headlines
Security Watch How can we stop identity theft? - Identity theft is on the rise, with millions of dollars lost due to fraud each year. Ready to toss that old PC? - Identity thieves have a new hoax: stealing confidential information from used hard drives. What’s wrong with anti-virus apps? - It costs too much to keep anti-virus software up-to-date.
More Headlines…. Is IT overspending on security? - November 20, 2002 Open Source: Rebels at the gate - October 14, 2002
Any Questions?