Information Systems Security IS 460 Notes by Thomas Hilton.

Slides:



Advertisements
Similar presentations
... Objective Internet Working ISP TOT, TT&T, CAT,SAMART Dial up ADSL Leased Line Satellite.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Managing Information Systems & Communication Technology By Thomas Hilton For My Friends in BSAD 101.
Separate Domains of IT Infrastructure
Chapter 21 Successfully Implementing The Information System
Security+ Guide to Network Security Fundamentals
IS Network and Telecommunications Risks
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Hardware/Software Computers? - computer-based society Hardware Trends - mobility, portability, wireless, Internet –Mainframes –Midrange –Micros (PCs) -
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 2000 by Carnegie Mellon.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Computer Networks IGCSE ICT Section 4.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Chapter 3 Ethics, Privacy & Security
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
SEC835 Database and Web application security Information Security Architecture.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Computer Networks S3 Prepared by May Lau
Computer & Network Security
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
1 Network + Tom McLaughlin b-admin, mcse, mous, a+, net+ (mct, linux)
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
7/12: Ch. 6 Telecommunications Business Value of Telecommunications Trends –Industry –Technology –Application Internet applications Network models –WANs,
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
1.05a.  Local Area Networks (LANs) ◦ Small networks in a limited geographical area  Wide-Area Networks (WANs) ◦ Extensive networks that may span hundreds.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Note1 (Admi1) Overview of administering security.
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
Internet Basics. What is it? RESOLUTION by The Federal Networking Council (FNC): "Internet" refers to the global information system that -- (i) is logically.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Networking Basics Objectives: 1. Utilize appropriate vocabulary to communicate effectively in a technological society. 6. Describe uses of a networked.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Higher Computing Networking. Networking – Local Area Networks.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Digital Literacy Lesson 2. Hardware Hardware: the physical components of a computer. Includes input devices, processing devices, storage devices, and.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Information Security tools for records managers Frank Rankin.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Securing Interconnect Networks By: Bryan Roberts.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Module 5: Designing Physical Security for Network Resources
CompTIA Security+ Study Guide (SY0-401)
Introduction to Computers
CompTIA Security+ Study Guide (SY0-401)
Jeopardy Security Risks Hardware & Software Computer Types Networking
الفصل الثالث نقل البيانات وشبكات الحاسوب
IS4680 Security Auditing for Compliance
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Professional Network Services
Networks 1 Key Revision Points.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Security week 1 Introductions Class website Syllabus review
Copyright 2005 Prentice- Hall, Inc.
Presentation transcript:

Information Systems Security IS 460 Notes by Thomas Hilton

Overview What is an Information System Personnel Security Procedural Security Facilities Security Technical Security Security Implementation

Security Perspective: What is an Information System The General Systems View… Intended Output Unintended Output Main Input Spurious Input Transformation Processes Output Interface Input Interface Control Processes

Security Perspective: What is an Information System Intended Output: High Quality Information Unintended Output: Mis-, Dis-, Untimely, Irrelevant, Unknown Origin Main Input: High Quality Data Spurious Input: Mis-, Dis-, Untimely, Irrelevant, Unknown Origin Transformation Processes: Hardware, Software, Procedures, People Output Interface: Video/Print/Audio/Tactile-Kinesthetic/Olfactory, /IM/Website/Telnet/Disks/Cable/Wireless, Conversations/Phone/Notes/Memos/Terminations/Departures Input Interface: Tactile-Kinesthetic/Audio/Video/Print/Olfactory, /IM/Web/Telnet/Disks/Cable/Wireless, Conversations/Phone/Notes/Memos/Hires/Arrivals Control Processes: …?

Scope of Security Subsystem a lá U.S. Department of Defense… Personnel Procedural Facilities Technical

Personnel Security Security Organization Steering Committee CSO Other security personnel Security responsibilities of all personnel Human Resources Hiring and Remuneration Vacation Termination

Procedural Security Risk Assessment Security Audit Security Policy Business Continuity Plan Training Plan

Facilities Security Proximity(Each other, Users, Threats) Perimeters(Boundaries, Access) Power(Electricity Availability, Quality) Etc. (Cooling, Hardening, …)

Technical Security Information C.I.A. Confidentiality Integrity Availability Event Management Deter Detect Mitigate Recover Debrief

Security Implementation IndividualWorkstation WorkgroupLAN EnterpriseWAN / Intranet E-CommerceInternet

Security Implementation Individual / Workstation Operating Systems and Applications User Account Management Data File Management Anti-Virus Software Personal Firewall Other Utilities

Security Implementation Workgroup / LAN All of the above Server security Eaves-dropping Topologies

Security Implementation Enterprise / WAN All of the above DMZs (multiple firewalls) Routers Cold/Hot Site synchronization VPNs

Security Implementation E-Commerce / Internet All of the above Internet visible systems HTML FTP SMTP Etc.