Information Security Rabie A. Ramadan GUC, Cairo Room C7 -310 Lecture 2.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cryptography and Network Security Chapter 1
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Lecture 1: Overview modified from slides of Lawrie Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Introduction (Pendahuluan)  Information Security.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Introduction (Based on Lecture slides by J. H. Wang)
BUSINESS B1 Information Security.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 1: Overview modified from slides of Lawrie Brown.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
 a crime committed on a computer network, esp. the Internet.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
CS457 Introduction to Information Security Systems
Computer and Network Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Instructor Materials Chapter 7 Network Security
BINF 711 Amr El Mougy Sherif Ismail.
Computer and Network Security
Forensics Week 12.
Faculty of Science IT Department By Raz Dara MA.
Cybersecurity Threat Assessment
Computer Security By: Muhammed Anwar.
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Basic Security Concepts
Security Attacks Network Security.
Presentation transcript:

Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2

DAD Triad Complement of CIA Triad Disclosure Alteration, and Denial 2

DAD Triad Disclosure Unauthorized individuals gain access to confidential information Alteration Data is modified through some unauthorized mechanism Denial Authorized users cannot gain access to a system for legitimate purposes DAD activities may be malicious or accidental

Network Security Security considerations include: Physical security Operating System security Windows, Linux, UNIX Communication security Encryption Firewalls Intrusion detection systems

Threats, vulnerability, Risk, and Attacks 5 Crossing the water to the right is a Threat to the man. Ex. The existence of a particular virus for example Crossing the water through the wall crack is a Vulnerability. Ex. (Computer) Open ports

Threats, vulnerability, Risk, and Attacks Risk Occurs when a threat and a corresponding vulnerability both exist Somebody or another system destroyed the wall is an Attack Ex. (Computer) sending an overwhelming set of messages to another system to block it. 6

Threats, vulnerability, Risk, and Attacks Threats 7

Threats to Security Hacker Anyone who attempts to penetrate the security of an information system, regardless of intent Early definition included anyone very proficient in computer use Malicious insider Someone from within the organization that attempts to go beyond the rights and permissions that they legitimately hold Security professionals and system administrators are particularly dangerous

Threats to Security Malicious code object Virus, a program that attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Worm, a program that takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system. e.g. sending itself to all of the list in your computer. Trojan horse, a program that at first glance will appear to be useful software but will actually do damage once installed or run on your computer. It usually appears that is coming from a trusted source A computer program that carries out malicious actions when run on a system

Threat + Vulnerability = Risk Risk analysis, assessment, and managing are required 10

Risk Analysis Actions involved in risk analysis: Determine which assets are most valuable Identify risks to assets Determine the likelihood of each risk occurring Take action to manage the risk Security professionals formalize the risk analysis process

Asset Valuation Step 1 in risk analysis process: Asset valuation Identify the information assets in the organization Hardware, software, and data Assign value to those assets using a valuation method

Asset Valuation Common Valuation Methods Replacement cost valuation Replacement cost (also called current cost accounting or CCA) values assets based on what it would cost to replace them if they were acquired today. For example, if Utility Company were placing this same plant today, the materials would cost $530,000 and the installation would cost $56,000. The replacement cost value is $586,000.

Asset Valuation Original cost valuation Original cost (also called historic cost accounting or HCA) values assets based on what the company actually spent for the assets when they were acquired. Example: In 1990, Utility Company spent $500,000 to purchase the materials for its fixed lines and $50,000 to install them. The original cost value of these assets is $550,000 before depreciation. 14

Asset Valuation Depreciated valuation Uses the original cost less an allowance for value deterioration (original value – how much drop in its price since purchased) Qualitative valuation Assigns priorities to assets without using dollar values 15

Risk Assessment Step 2 in risk analysis process: Risk assessment Risk assessment techniques: Qualitative Quantitative

Risk Assessment Qualitative Risk Assessment: Focuses on analyzing intangible properties of an asset rather than financial value Prioritizes risks to aid in the assignment of security resources Relatively easy to conduct

Risk Assessment Quantitative Risk Assessment Assigns dollar values to each risk based on measures such as: asset value (AV), exposure factor (EF), expected portion (%) that can be destroyed by a given risk annualized rate of occurrence(ARO), number of times you expect the risk to occur single loss expectancy (SLE), amount of damage each time the risk occur (AV* EF) annualized loss expectancy (ALE) amount of damage each year from a given risk (ARO * SLE) Uses potential loss amount to decide if it is worth implementing a security measure

Managing Risks Risk Avoidance Used when a risk overwhelms the benefits gained from having a particular mechanism available Avoid any possibility of risk by disabling the mechanism that is vulnerable Disabling is an example of risk avoidance Risk Mitigation Used when a threat poses a great risk to a system Takes preventative measures to reduce the risk A firewall is an example of risk mitigation

Managing Risk Risk Acceptance Do nothing to prevent or avoid the risk Useful when risk or potential damage is small Risk Transference Ensure that someone else is liable if damage occurs Buy insurance for example Combinations of the above techniques are often used

Security Tradeoffs Security can be seen as a tradeoff between risks and benefits Cost of implementing the security mechanism and the amount of damage it may prevent Tradeoff considerations: user convenience business goals expenses

Threats, vulnerability, Risk, and Attacks Attacks 22

Attacks 23 Passive Attacks Attempts to learn or make use of information from the system but does not affect system resources. Eavesdropping or monitoring of transmissions Active Attacks Attempts to alter system resources or affect their operation.

Passive Attacks 24 Release of message contents / snooping

Passive Attacks (Cont.) 25 Traffic Analysis/ spoofing Passive Attacks are hard to be detected

Active Attacks 26 Masquerade One entity pretends to be a different entity

Active Attacks (Cont.) 27 Replay Attack Passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

Active Attacks (Cont.) 28 Modification Attack Some portion of a legitimate message is altered, or that messages are reordered, to produce an unauthorized effect

Active Attacks (Cont.) 29 Denial of Service Prevents or inhibits the normal use or management of communications facilities