Security and Systems. Three tenets of security Confidentiality Integrity Availability.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security Controls – What Works
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Risks, Controls and Security Measures
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Securing Information Systems
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Joseph Ferracin Director IT Security Solutions Managing Security.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Software Security Testing Vinay Srinivasan cell:
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Systems Security Operations Security Domain #9.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Ingredients of Security
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Module 2: Designing Network Security
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Securing Information Systems
Securing Information Systems
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
INFORMATION SYSTEMS SECURITY and CONTROL
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Security and Systems

Three tenets of security Confidentiality Integrity Availability

e-Security –the problem is real 90% of companies surveyed by the FBI have detected cyber attacks recently Disgruntled employees, industrial espionage, and data theft are responsible for 70-80% of security breaches Increase in external threats from hackers, ex-employees, competitors and cyber terrorists The rise of “Script Kiddies” - Hackers who do not target specific organizations, but run scripts scanning the net for ANY vulnerable network

Security Myths Nobody would want our data. Who knows us? We are anonymous There is no danger to my network at all. I am not on the Internet, I am safe. I don’t need any security devices. I have a Firewall I have an antivirus on my server. I am safe All our employees are very committed & reliable!

Know your IT law Cyber crimes – Hacking, damage to computer source code, publishing lascivious information in an electronic form, breach of privacy / confidentiality, publishing digital signature, etc. Interception by Government – intercept any information transmitted through any computer resource if the same is necessary in the interest of the sovereignty or integrity of India, Digital Signatures legally valid and enforceable.

Know your IT law Authentication of electronic records in India shall be effected by the use of asymmetric crypto system and hash function If someone uses your network to attack an external network and the attacked complains, you are liable to be penalized Companies must have a detailed I T Security Policy in tune with the mandatory specific provisions of the IT Act and IT Rules.

Threats to data

Protectable Data assets Business Information – contracts, SLAs, financial data, customer details, etc Intellectual property – source codes, inventions, research papers, etc National secrets E-commerce

Threats to data Accessed by External hackers Divulged by ignorant employees Corrupted by virus attacks Hardware failures Inadequate access controls Badly designed applications Clear transmission over public internet Last but not the least system administrators !!

Types of External Attacks Malicious code attacks Corporate espionage Web graffiti Denial-of-service Database hacks Installing Back doors Identity Theft

Typical Network Attack locate system to attack gain privilege access gain user access Cover tracks Install backdoors attack other hosts engage in other unauthorized activity take or alter Information

Methods adopted in attacks Pinging Sniffing Probing Flooding Hacking Cracking Scripting Buffer Overflow Reverse engineering

Gain user access Identity theft Masquerading Eavesdropping Spoofing Piggy backing Social Engineering

Alter or steal information Sniffing Man-in-the middle attacks Cookies Sabotage by employees

Common Reasons Flawed design or implementation of network infrastructure Rapidly changing technologies Lack of management understanding New & mutating attacks Inherent product weaknesses

Internal Threats Unrestricted access to internal systems Bad security practices Ignorant users Lack of management understanding New & mutating attacks Inherent product weaknesses

Protection mechanisms

Data Lifecycle – Creation – Storage – Movement – Destruction

Key security elements – Security Policy – Identity management – Robust Perimeter Security – Storage Security – Secure Transmission of data – Good Security Practices

Identity Accurate and positive identification of network users, hosts, applications, services, and resources. Standard technologies – Kerberos – one-time password Technologies used – digital certificates – smart cards – directory services (e.g. LDAP, ADS)

Perimeter Security Deals with controlling data that is passed between LAN and public internet Perimeter is controlled by – Routers and switches – Firewalls – IDS / IPS – Antivirus – URL Filters – Network Traffic Analyzers

Secure transmission The ability to provide authenticated, confidential communication between systems Data privacy is achieved by – Layer 2 Tunneling Protocol (L2TP) – IPsec – Data Encryption – PGP

Layered Security 23

Security Standards / Laws BS7799 / IS17799 Data Protection Act HIPAA SOX IT Act (Indian cyberlaws)

BS7799, ISO 9000 & BS ISO 9001 (QMS) Standard Process Approach [P-D-C-A] ISO 9001 (QMS) Standard Process Approach [P-D-C-A] BS BS 7799  BS 7799-certified companies are automatically Compliant with security section of BS  BS & BS 7799 adopt the P-D-C-A Process Approach of ISO 9001: 2000 QMS Standard

Policy Management Defining a clear security objective Articulating clear policy Implemented by suitable procedures Audited regularly to ensure compliance Training users Improvising the procedures

Good Security Practices

Proactive measures

Testing methods – Vulnerability assessment – Penetration testing – Detection measures – Response measures

Best Practices Understanding of the business needs A security mission statement Identification & Risk Analysis on Data A strong commitment from upper management to allocate necessary resources Clearly defined implemented and documented security policies and procedures

Best Practices A suite of host and network based security auditing and improvement tools A security awareness program that reaches everyone in the organization A dedicated team of trained security professionals and consultants to make it all happen

To conclude No technology used to protect your organization is 100% hackerproof Good policies drive good implementation Best policies without necessary awareness among personnel is in vain Security is not a one-size-fits-all solution. Security of organization assets is everyone’s responsibility.

Prudenté Solution Pvt Ltd Phone: