Security week 1 Introductions Class website Syllabus review Course outline Homework Security overview Scenario – evaluating two attacks Packet Tracer scenario
Network Security Organizations CERT - CERT Coordination Center (CERT/CC) CERT is chartered to work with the internet community in detecting and resolving computer security incidents, as well as taking steps to prevent future incidents. Part of US-CERT. US-CERT - Computer Emergency Readiness Team. Established in 2003 to protect the nation's Internet infrastructure. Coordinates defense against and responses to cyber attacks. IETF - Internet Engineering Task Force Open international community of network designers, operators, vendors, and researchers concerned with the evolution and operation of the Internet. SANS - SysAdmin, Audit, Network, Security Source for information security, training and certification
Security Certifications International Information Systems Security Certification Consortium (ISC)2 CISSP - Certified Information System Security Professional SSCP - Systems Security Certified Practitioner CheckPoint CCSA - Check Point Certified Security Administrator CCSE - Check Point Certified Security Engineer Cisco CCNA Security CCNP Security CCIE Security Comptia Security+
Security Regulations HIPAA (Health Insurance Portability & Accountability Act of 1996) Improved efficiency in healthcare delivery by standardizing electronic data interchange, and Protection of confidentiality and security of health data through setting and enforcing standards.
The Security Process Identify and assess assets Identify and assess threats and risks Create security policy Design network security implementation Test security design- modify as appropriate Implement security design Educate users Monitor per security policy Test, re-evaluate and modify periodically Handle incidents, modify security implementation/policy as appropriate, document
What are your assets/items that need to be protected? Exercise - In groups, see how many assets/items you can identify that warrant protection by IS.
Some Network Assets Cabling/wireless - bandwidth Patch panels Switches Routers Firewalls Servers and workstations- cpu, memory and hard disks Network services - WEB, FTP, email, application, database Data Personnel - time, productivity Business assets - Reputation, good will, secrets Other?
How do you assess risk? Risk= cost of loss x level of threat Example – customer data base If unavailable for a while If irretrievably lost If improperly modified If acquired by a competitor
How do you evaluate threat? By type of threat Human conduct Intentional – Damaging, stealing, exploring Negligent, inadvertent Events – disasters, etc Device failures By source of threat Internal v external
How do you invoke security? Fault tolerance/redundancy/high availability Protective procedures - testing security, backups, monitoring Protective policies (acceptable use, saving procedures) Physical security Protective software (anti-virus) Protective configurations (strong passwords) Protective implementations - using encryption, VPNs, certificates Protective devices – firewalls, routers, switches, etc User education Other?
Evaluating two attacks on the United States Russian election interference – 2016 Pearl Harbor – December 7, 1941
Exercise – List United States assets
Exercise – Evaluate damage to US assets from each attack