Chapter 4.  Can technology alone provide the best security for your organization?

Slides:



Advertisements
Similar presentations
1 Identification Who are you? How do I know you are who you say you are?
Advertisements

Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Social Engineering – Threats & Concerns Avisek Ghosh, CISA CISSP Sr. Manager – Corporate Security Cognizant Technology Solutions.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
System Security Scanning and Discovery Chapter 14.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security Controls – What Works
CSA 223 network and web security Chapter one
1 An Overview of Computer Security computer security.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Information Networking Security and Assurance Lab National Chung Cheng University COUNTER HACK Chapter 5 Reconnaissance Information Networking Security.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Factors to be taken into account when designing ICT Security Policies
Network security policy: best practices
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
The Impact of Physical Security on Network Security
Program Objective Security Basics
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
The Role of People in Security
Security+ All-In-One Edition Chapter 2 – Organizational Security Brian E. Brzezicki.
The Islamic University of Gaza
Information Systems Security Computer System Life Cycle Security.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
What does “secure” mean? Protecting Valuables
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
FLOOR CANDY.
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 5: Basic Security.
P RINCIPLES OF N ETWORKING S ECURITY C HAPTERS 3 & 4 Matt Lavoie NST
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Policy 2 Dr.Talal Alkharobi. 2 Create Appropriate Policy Each organization may need different policies. Policy templates are useful to examine and to.
Lesson 4-General Security Concepts. The Role of People in Security  This presentation discusses: – The human element and the role that people play in.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Access Control for Security Management BY: CONNOR TYGER.
Computer Security Sample security policy Dr Alexei Vernitski.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Add video notes to lecture
3.6 Fundamentals of cyber security
Social Engineering Charniece Craven COSC 316.
Secure Software Confidentiality Integrity Data Security Authentication
The Role of People in Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
WELCOME.
Answer the questions to reveal the blocks and guess the picture.
Understand Core Security Principles
Social Engineering No class today! Dr. X.
Objectives Telecommunications and Network Physical and Personnel
The Role of People in Security
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Chapter Goals Discuss the CIA triad
Presentation transcript:

Chapter 4

 Can technology alone provide the best security for your organization?

 Your organization can have the best and the latest technology to provide security. But, if that technology is not used properly or ignored, then your organization is at risk.  The biggest threat for your organization is from internal sources.  People (Employees, Custodians, Consultants etc.) are the biggest security threat to an organization’s security.

 The users often pick something easy for them to remember, which means that the more you know about the user, the better your chances of discovering their passwords.

 Password Dilemma - The more difficult we make it for attackers to guess our passwords, and the more frequently we force password changes, the more difficult the passwords are for authorized uses to remember and the more likely they are to write them down.

 Piggybacking – is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or a building.

 Shoulder Surfing – is a similar procedure in which attackers position themselves in such a way as to be able to observe the authorized user entering the correct access code.

 Dumpster Diving – is the process of going through (searching) the target’s trash cans/ bins in order to find little bits of information that could be useful for a potential attack.

 System administrators should restrict the normal users from installing unnecessary hardware and software.  Software’s such as communication tools (messenger's and VOIP clients) and games should not be installed on your computer without the knowledge of the system administrator.

 When a normal user installs unauthorized software or hardware, he is setting up a backdoor.  Backdoor – Backdoors are avenues that can be used to access a system while circumventing normal security mechanisms.

 If any unauthorized person can gain physical access to a faculty, chances are very good that enough information has been collected to plan a potential attack, or carry out any unlawful activity.  Common method used to prevent unauthorized access is the use of identification badge/ card (id cards).  Problems with identification badge ◦ Easy to forge ◦ Often neglected or ignored

 How do you prevent genuine employees from planning an attack or collecting sensitive information?  Examples ◦ Consultants ◦ Business Partners ◦ Janitorial and security staff

 Social Engineering – is a technique in which the attacker uses various deceptive practices to obtain information they would normally not be privilege to, or to convince the target of the attack to do something they normally wouldn't. Attacker Target Attacker contacts the Target

 Reverse Social Engineering – in this technique, the attacker hopes to convince the target to initiate the contact. Attacker Target Target contacts the Attacker

 Social Engineering and Reverse Social Engineering are very common when the organization is going through some significant changes. ◦ Deployment of new software and hardware ◦ When two companies merge

 Employees/ People can be the biggest threat to the organization’s security, but, they can also be the best tool in defending against social engineering, reverse social engineering and other security breaches and break-ins.  Organization can implement stringent policies and procedure that establishes the roles and responsibilities for all the employees within an organization.

 Providing periodic security awareness and training programs to all the employees is the single most important step any organization can take to prevent against any attacks, especially social engineering and reverse social engineering.  Employees should know the importance of information and also, they should know what kind of information is sensitive to their organization.