Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Information Security A Practical Introduction
What does “Security” mean? ?
What is Information Security About?
Viruses InfoSec is about… Viruses
Hackers InfoSec is about… Hackers
Vandalism InfoSec is about… Vandalism
Backups InfoSec is about… Backups
Theft InfoSec is about… Theft
InfoSec is about… Computer “Uptime”
Phones InfoSec is about… Phones
Information InfoSec is… about Information
Outcome Information Security as an Outcome are "Our systems are secure from hackers“ have "We have blocked 17,342 viruses to date“ “Our systems are all online“ cannot “Insiders cannot steal our information” “We have backups” “We are Secure”
Process Information Security as a Process improve “We want to improve security“ more "We need to protect against more threats" reduce "We want to reduce risk" increase "We want to increase customer confidence" decrease "We want to decrease the number of compromises" “We want to be more Secure”
Risk Management InfoSec is… Risk Management Identify Analyze Measure Plan Implement
What is at Risk? ConfidentialityIntegrityAvailability
Defence in Depth Defence in Depth lowers Risk Firewalls do not make you secure Anti-virus Anti-virus does not make you secure Policies Policies do not make you secure VPNs VPNs do not make you secure Guards do not make you secure Passwords Passwords do not make you secure MORE Together they all make you MORE secure
Threat: Denial of Service
Counter: Firewalls and Switches
excessive bandwidth An unpatched server was compromised and used to distributed 20 GB of videos with French language titles. The problem was discovered when the server was blocked for excessive bandwidth usage. ? Threat: Unintentional DoS
French Puppet Videos! French Puppet Videos The server was distributing 20 GB of French Puppet Videos. The cleanup time was 7 hours. If they had just asked we would have probably found someone to host the videos for them!
Change Management Counter: Change Management
Counter: Monitoring
Threat: SQL Injection Attack
Counter: Vulnerability Scanning
Counter: Developer Training
Counter: Web Application Firewall
Threat: The Man-in-the-Middle The Pineapple YOUR 1.Pretends to be YOUR home wifi network. 2.Records 2.Records what you do on the Internet.
Counter: 2 Factor Authentication YUBIKEYSecurID Google 2FA
Threat: Insiders
Counter: DLP and DPI Deep Packet Inspection (DPI): Firewalls inspect every packet on the network and rebuild the entire message. Data Loss Prevention (DLP): Uses DPI and pattern matching to look for suspicious content being sent FROM your network.
Threat: Malvertisements
rainspours Why D.I.D? It never rains… it pours 1.The OS Vendor stopped providing patches 2.The server was hacked 3.A hard disk failed 4.A cooling fan died & it crashes every 2hr 5.The software vendor wanted more money 6.Hardware support had not been paid for
Final Threat: The A.P.T. Advanced Persistent Threat
InfoSec is… Everyone’s Responsibility ConfidentialityIntegrityAvailability
Questions? Slides: