Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Information Assurance and Security: Overview. Information Assurance “Measures that protect and defend information and information systems by ensuring.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Chapter 10: Authentication Guide to Computer Network Security.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
N ational I NFOSEC E ducation and T raining P rogram Educational Solutions for a Safer World http//
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
ECE Lecture 1 Security Services.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
ACM 511 Introduction to Computer Networks. Computer Networks.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
SECURITY IN E-COMMERCE Sheetal Chhabra. Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
DIGITAL SIGNATURE.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
E-Commerce & Bank Security By: Mark Reed COSC 480.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Information Management System Ali Saeed Khan 29 th April, 2016.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Securing Information Systems
Securing Information Systems
Lecture 8. Cyber Security, Ethics and Trust
Securing Information Systems
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Security By: Muhammed Anwar.
Presentation transcript:

Center of Excellence for IT at Bellevue College

Cyber security and information assurance refer to measures for protecting computer systems, networks, and information systems from disruption or unauthorized access, use, disclosure, modification, or destruction.

 Cyber security often refers to safety of the infrastructure and computer systems with a strong emphasis on the technology  Information assurance tends to have a boarder focus with emphasis on information management and business practices  The two areas overlap strongly and the terms are sometimes used interchangeably

Information assurance (IA) is the practice of managing information-related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, data integrity, authentication, availability, and non-repudiation. IA measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

Confidentiality has been defined by the International Organization for Standardization (ISO) as "ensuring that information is accessible only to those authorized to have access" and is one of the cornerstones of information security. Confidentiality is one of the design goals for many cryptosystems, made possible in practice by the techniques of modern cryptography.

Data integrity means that the data is "whole" or complete, and is identically maintained during any operation (such as transfer, storage or retrieval). Data integrity is the assurance that data is consistent and correct. Loss of integrity can result from:  Malicious altering, such as an attacker altering an account number in a bank transaction, or forgery of an identity document  Accidental altering, such as a transmission error, or a hard disk crash

Authentication is a security measure designed to establish the validity of a transmission, message, document or originator, or a means of verifying an individual's authorization to receive specific categories of information. Authentication technologies include:  passwords, digital signatures, keys and passports, biometrics

Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed = timely, reliable access to data and information services for authorized users.

Non-repudiation is the assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. Technologies include:  Digital certificates and signatures

 The global recession will lead to a rise of cybercrime worldwide according to 2009 cybercrime forecasts from leading IT security firms.  Approximately 1.5 million pieces of unique malware will have been identified by the end of the year, more than in the previous five years combined.  The optimal way to prevent malicious files from infecting PCs and corporate networks is active real-time content inspection technologies.

 The United States has bypassed China as the biggest purveyor of malware as well as sends the most spam worldwide, says Sophos Security Threat Report:  Not only is the USA relaying the most spam because too many of its computers have been compromised and are under the control of hackers, but it's also carrying the most malicious webpages.

 Cybercriminals will continue to exploit the best Web 2.0 technologies, such as Trojan technologies.  Cybercriminals are increasingly relying on Adobe PDF and Flash files, normally considered safe, to infect victims with malware.  Hackers have been breaking into Facebook and MySpace and implanting malware to distribute to a victim's social network.

 Increasing complexity of IT systems and networks  Convergence of IT and communication systems  Expanding wireless connectivity and multiplicity of wireless devices  Increasing amount of digital information collected  Increasing connectivity and accessibility of digital information systems  Globalization of IT and information systems  Increased web access to a wide range of web services and web applications  Increase in all forms of digital commerce  Trends towards data-marts and hosted data warehousing services

 Network security  Disaster recovery  Information system security technologies  Wireless system security  Internet security  Legal issues, standards and compliance  Cybercrime  Information management  Information audit and risk analysis  Digital forensics  Secure electronic commerce

 Types of intrusion and intrusion detection systems  Firewalls and access control  Cryptography  Digital certificates  Biometrics  Digital authentication and Public Key Infrastructure (PKI)  Data assurance and disaster recovery

 Cryptography systems  Identification and authentication systems  Operating system security  E-commerce security tools and strategies  Firewalls and proxy servers  Anti-malware and anti-spyware technology  Anti-piracy techniques  Network traffic analysis tools

 en.wikipedia.org/wiki/Cyber_security en.wikipedia.org/wiki/Cyber_security  en.wikipedia.org/wiki/Information_assurance en.wikipedia.org/wiki/Information_assurance       www2.cs.uidaho.edu/~oman/CS336_F08_syllabus.pdf www2.cs.uidaho.edu/~oman/CS336_F08_syllabus.pdf   bii.mc.maricopa.edu/degrees/checklists/CCLInformationAssurance5227.pdf bii.mc.maricopa.edu/degrees/checklists/CCLInformationAssurance5227.pdf