Understanding Security Layers

Slides:



Advertisements
Similar presentations
Chapter 7: Physical & Environmental Security
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
4 Information Security.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Lecture 1: Overview modified from slides of Lawrie Brown.
CSA 223 network and web security Chapter one
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
Microsoft Technology Associate
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
The Impact of Physical Security on Network Security
Information Security Technological Security Implementation and Privacy Protection.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
What does “secure” mean? Protecting Valuables
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Chapter 2 Securing Network Server and User Workstations.
Physical (Environmental) Security
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Topic 5: Basic Security.
Introduction to Information Security
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Module 2: Designing Network Security
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Physical security By Ola Abd el-latif Abbass Hassan.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
IS3220 Information Technology Infrastructure Security
Access Control Jeff Wicklund Computer Security Fall 2013.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Module 5: Designing Physical Security for Network Resources
CS457 Introduction to Information Security Systems
ISSeG Integrated Site Security for Grids WP2 - Methodology
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security in Networking
Understanding Security Layers
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Understanding Security Layers Lesson 1

Objectives This should also be a review for the 70-642.

Security What you are trying to protect Why does it needs to be protected What you’re protecting it from

CIA Confidentiality Integrity Availability

Confidentiality Confidentiality is the characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems.  Confidentiality deals with keeping information, networks, and systems secure from unauthorized access.  There are several technologies that support confidentiality in an enterprise security implementation.  Strong encryption Strong authentication Stringent access controls

Integrity Integrity is defined as the consistency, accuracy, and validity of data or information.  One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. 

Availability Availability describes a resource being accessible to a user, application, or computer system when required.  In other words, availability means that when a user needs to get to information, he or she has the ability to do so. Typically, threats to availability come in two types: accidental and deliberate. 

Risk Management Risk management is the process of identifying, assessing, and prioritizing threats and risks.  A risk is generally defined as the probability that an event will occur.  A threat, which is defined as an action or occurrence that could result in the breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities. The goal of any risk management plan is to remove risks when possible and to minimize the consequences of risks that cannot be eliminated. Risk assessments are used to identify the risks that might impact your particular environment.

Dealing with Risks After you have prioritized your risks, you are ready to choose from among the four generally accepted responses to these risks. They include: Avoidance Acceptance Mitigation Transfer

Principle of Least Privilege The principle of least privilege is a security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job. 

Attack Surface An attack surface consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage.  The larger the attack surface of a particular environment, the greater the risk of a successful attack.

Social Engineering Social engineering is a method used to gain access to data, systems, or networks, primarily through misrepresentation.  This technique typically relies on the trusting nature of the person being attacked.

Security and Cost Security costs money. You should also strive to make the security measures as seamless as possible to authorized users who are accessing the confidential information or resource. If security becomes a heavy burden, users will often look for methods to circumvent the measures you have established. Training goes a long way in protecting your confidential information and resources because it shows users what warning signs to watch for.

Physical Security Physical security is the first line of defense. There are a number of factors to consider when designing, implementing, or reviewing physical security measures taken to protect assets, systems, networks, and information.  These include understanding site security and computer security; securing removable devices and drives; access control; mobile device security; disabling the Log On Locally capability; and identifying and removing keyloggers.

Access Control Access control is the process of restricting access to a resource to only permitted users, applications, or computer systems.

Defense in Depth Defense in depth means using multiple layers of security to defend your assets.  That way, even if an attacker breaches one layer of your defense, you have additional layers to keep that person out of the critical areas of your environment.

Goals in Physical Security There are several other goals to keep in mind when designing a physical security plan: Authentication: Site security must address the need to identify and authenticate the people who are permitted access to an area. Access control: Once a person’s identity has been proven and authenticated, site security must determine what areas that person has access to. Auditing: Site security must also provide the ability to audit activities within the facility. This can be done by reviewing camera footage, badge reader logs, visitor registration logs, or other mechanisms.

Physical Premises For the purposes of this lesson, we will break the physical premises into three logical areas: External perimeter Internal perimeter Secure areas

External Perimeter Security The external security perimeter is the first line of defense surrounding your office. Common security measures you may encounter with respect to an organization’s external perimeter include the following: Security cameras Parking lot lights Perimeter fence Gate with guard Gate with access badge reader Guard patrols

Internal Security Perimeter The internal security perimeter starts with the building walls and exterior doors and includes any internal security measures, with the exception of secure areas within the building.  Some of the features you may use to secure an internal perimeter include the following: Locks (on exterior doors, internal doors, office doors, desks, filing cabinets, etc.) Security cameras Badge readers (on doors and elevators) Guard desks and patrols Smoke detectors Turnstiles and mantraps

Secure Areas Areas that not only to restrict external attackers, but also to limit internal employee access.  Secure area security technologies include the following: Badge readers and Keypads Biometric technologies (e.g., fingerprint scanners, retinal scanners, voice recognition systems, etc.) Security doors X-ray scanners and Metal detectors Cameras Intrusion detection systems (light beam, infrared, microwave, and/or ultrasonic)

Computer Security Computer security consists of the processes, procedures, policies, and technologies used to protect computer systems.  Servers Desktop Computers Mobile Computers

Mobile Devices Mobile devices are one of the largest challenges facing many security professionals today.  Mobile devices such as laptops, PDAs, and smartphones are used to process information, send and receive mail, store enormous amounts of data, surf the Internet, and interact remotely with internal networks and systems.  Docking stations Laptop security cables Laptop safes Theft recovery software Laptop alarms:

Removable Devices A removable device or drive is a storage device that is designed to be taken out of a computer without turning the computer off. Include memory cards, flash drives, floppy disks, CDs, and DVDs Removable devices typically connect to a computer through a drive, through external communications ports like USB or Firewire, or, in the case of memory cards, through built-in or USB-based readers.

Removable Devices

Removable Devices There are three basic types of security issues associated with removable storage: Loss Theft Espionage

Keylogger A keylogger is a physical or logical device used to capture keystrokes. An attacker will either place a device between the keyboard and the computer or install a software program to record each keystroke taken, and then he or she can use software to replay the data and capture critical information like user IDs and passwords, credit card numbers, Social Security numbers, or even confidential emails or other data.

Summary Before you can start securing your environment, you need to have a fundamental understanding of the standard concepts of security. CIA, short for confidentiality, integrity, and availability, represents the core goals of an information security program. Confidentiality deals with keeping information, networks, and systems secure from unauthorized access. One of the goals of a successful information security program is to ensure integrity, or that information is protected against any unauthorized or accidental changes.

Summary Availability is defined as the characteristic of a resource being accessible to a user, application, or computer system when required. Threat and risk management is the process of identifying, assessing, and prioritizing threats and risks. A risk is generally defined as the probability that an event will occur. Once you have prioritized your risks, there are four generally accepted responses to these risks: avoidance, acceptance, mitigation, and transfer.

Summary The principle of least privilege is a security discipline that requires that a user, system, or application be given no more privilege than necessary to perform its function or job. An attack surface consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage. The larger the attack surface of an environment, the greater the risk of a successful attack. The key to thwarting a social engineering attack is employee awareness. If your employees know what to look out for, an attacker will find little success.

Summary Physical security uses a defense in depth or layered security approach that controls who can physically access an organization’s resources. Physical premises can be divided into three logical areas: the external perimeter, the internal perimeter, and secure areas. Computer security consists of the processes, procedures, policies, and technologies used to protect computer systems.

Summary Mobile devices and mobile storage devices are among the biggest challenges facing many security professionals today because of their size and portability. A keylogger is a physical or logical device used to capture keystrokes.