Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

Computer Fraud Chapter 5.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Lecture 1: Overview modified from slides of Lawrie Brown.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
CS CS 5150 Software Engineering Lecture 18 Security.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
ACM 511 Introduction to Computer Networks. Computer Networks.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Introduction to Information Security
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Information Systems Security
CS457 Introduction to Information Security Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Data and database administration
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
Security in Networking
Chapter 1: Information Security Fundamentals
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter 1: Information Security Fundamentals
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved in creating a secure network strategy Control access to a Windows 2000 server

Course ILT Topic A Topic A: Introduction to network security Topic B: Understanding security threats Topic C: Creating a secure network strategy Topic D: Windows 2000 server access control

Course ILT Network security defined Network security: –Process by which digital information assets are protected Goals of network security are to: –Protect confidentiality –Maintain integrity –Assure availability Assessing risk –Identify threats –Reduce vulnerabilities

Course ILT Information Security Tasks of guarding digital information, which is typically processed by a computer, stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network.

Course ILT An isolated computer What security threat do we have?

Course ILT Connected to the Internet What security threat do we have? The Internet

Course ILT Information vs. Network Most of the threat are from the network, that is why we chose the name “Network Security” instead of “Information Security”. But the intention is to secure the information. Information is an asset that must be protected.

Course ILT Financial Loss Without adequate protection or network security, a company is highly susceptible to a financial loss. The fear of security breach can cause financial loss as an actual breach.

Course ILT Each attack costs $213,000 After an attack on information security, clean-up efforts divert resources, such as time and money away from normal activities A Corporate IT Forum survey of major corporations showed: –Each attack costs a company an average of $213,000 in lost man-hours and related costs –One-third of corporations reported an average of more than 3,000 man-hours lost

Course ILT Information Security

Course ILT Threat vs. Vulnerability A threat is defined as any activity that poses a danger to our information. A vulnerability is a weakness in a system, such as misconfigured hardware or software, poor design, or end-user carelessness. Threats exploit vulnerabilities in order to gain unauthorized access to a network.

Course ILT Effect of Evolving technologies Mainframes LANs Firewalls Extranets Security systems –Intrusion detection –Authentication –Authorization –Vulnerability assessment

Course ILT Security build Trust Security is critical for all types of Internet business. By protecting systems from intrusion and corruption, security technologies help companies build trust A trust that information is protected and transactions are reliable

Course ILT Securing means Managing risk Users can perform only authorized tasks Users can obtain only authorized information Users cannot damage data, applications, or operating environment

Course ILT Errors and Equipment Failures Though “security” means protection against malicious attacks by outsiders. Security also involves controlling the effects of errors and equipment failures.

Course ILT Goals of network security - CIA The goal of implementing network security is to maintain an acceptable level of confidentiality, integrity and availability of information. Confidentiality –Protection of data from unauthorized disclosure to a third party Integrity –Assurance that data is not altered or destroyed in an unauthorized manner Availability –Continuous operation of computing systems

Course ILT Topic B Topic A: Introduction to network security Topic B: Understanding security threats Topic C: Creating a secure network strategy Topic D: Windows 2000 server access control

Course ILT Price of Intrusion Corporate espionage, –FBI estimates up to $100 billion loss Identity theft –up to 700,000 Americans Computer Viruses –up to $13.2 billion in 2001 –Lost revenues –Lost prestige –Lost productivity

Course ILT CERT Computer Emergency Response Team (CERT) security organization compiles statistics regarding number of reported attacks, including: –Speed of attacks –Sophistication of attacks –Faster detection of weaknesses –Distributed attacks –Difficulties of patching Established in 1988, the CERT® Coordination Center (CERT/CC) is a center of Internet security expertise, located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.Software Engineering InstituteCarnegie Mellon University

Course ILT Sources of threats Compromising of each of these three security goals can cost organization either –directly or –indirectly There are four causes for compromised security: –Technology weaknesses –Configuration weaknesses –Policy weaknesses –Human error or malice

Course ILT Technology weaknesses TCP/IP Operating systems Network equipment

Course ILT TECHNOLOGY WEAKNESSES are a part of each technology TCP/IP A communication protocol designed as an open standard. Application Presentation Session Transport Network Data Link Physical

Course ILT TECHNOLOGY WEAKNESSES are a part of each technology Operating Systems Windows, Linux, Unix, Each operating system has issues.

Course ILT TECHNOLOGY WEAKNESSES are a part of each system Networking equipment All networking equipment must be protected! PasswordsFirewalls ProtocolsAuthentication

Course ILT Configuration weaknesses Unsecured accounts System accounts with easily guessed passwords Misconfigured Internet services Unsecured default settings Misconfigured network equipment Trojan horse programs Vandals Viruses

Course ILT Policy weaknesses Lack of a written security policy Politics High turnover Concise access controls not applied Software and hardware installation and changes do not follow policy Proper security Nonexistent disaster recovery plan

Course ILT Human error and malice Accident Ignorance Workload Dishonesty Impersonation Disgruntled employees Snoops Denial-of-service attacks

Course ILT Topic C Topic A: Introduction to network security Topic B: Understanding security threats Topic C: Creating a secure network strategy Topic D: Windows 2000 server access control

Course ILT Network security strategies Achieve the state where any action that is not expressly permitted is prohibited Address both internal and external threats Define policies and procedures Reduce risk across perimeter security, the Internet, intranets, and LANs (continued)

Course ILT Network security strategies, continued Human factors Knowing your weaknesses Limiting access Achieving security through persistence Physical security Perimeter security (continued)

Course ILT Secure network strategy, cont’d Firewalls Web and file servers Access control Change management Encryption Intrusion detection systems (IDS)

Course ILT Topic D Topic A: Introduction to network security Topic B: Understanding security threats Topic C: Creating a secure network strategy Topic D: Windows 2000 server access control

Course ILT Access control Restricts access to a resource Security levels –Identify –Authenticate –Authorize

Course ILT MAC, DAC and RBAC Mandatory access control (MAC) –Non-discretionary control used in high- security locations Discretionary access control –Allows the owner of a file to dictate who can access the file and to what extent Role-based access control –Access is based on the role a user plays in the organization

Course ILT Unit summary Discussed network security Discussed the security threat trends and their ramifications Discussed the goals of network security and determined the factors involved in a secure network strategy Discussed methods of access control and their implementation on a Windows 2000 server