The Need for Security Principles of Information Security Chapter 2.

Slides:



Advertisements
Similar presentations
Principles of Information Security, 2nd Edition1 Threats and Attacks.
Advertisements

The Need for Security Chapter 2.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Principles of Information Security, 3rd Edition2  Recognize that organizations have a business need for information security  Understand that a successful.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
Threats and Attacks Principles of Information Security, 2nd Edition
The Need for Security Chapter 2 Our bad neighbor makes us early stirrers, Which is both healthful and good husbandry. -- William Shakespeare (1564–1616),
Principles of Information Security, 4 th Edition 2 Introduction  Primary mission of information security is to ensure systems and contents stay the same.
Chapter Threats in Networks Network Security / G. Steffen.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
C8- Securing Information Systems
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
7 Information Security.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
CE3031 The Need for Security Slides based on Whitman, M. and Mattord, H., Principles of Information Security; Thomson Course Technology 2003.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Guide to Firewalls and VPNs, 3 rd Edition Chapter One Introduction to Information Security.
Security CS Introduction to Operating Systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Topic 5: Basic Security.
The Need For Security. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions for an organization:
Principles of Information Security, 2nd Edition2  Understand the business need for information security  Understand a successful information security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Guide to Network Security First Edition Chapter One Introduction to Information Security.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
The Need for Information Security(1) Lecture 2. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
FOUNDATIONS OF INFORMATION SYSTEMS Topic 11 BIS 1202 Chapter 11 Information Systems Security,controls and computer audit.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
IT Security  .
Instructor Materials Chapter 7 Network Security
Securing Information Systems
Threats and Attacks Principles of Information Security, 2nd Edition
Presentation transcript:

The Need for Security Principles of Information Security Chapter 2

Chapter Objectives Explain the business need for security. Describe the responsibility of an organization's general management and IT management for a successful information security program. Identify threats to information security and common attacks associated with those threats. Differentiate between threats to information systems and attacks against the information systems. 2

Introduction The primary mission of information security is to ensure that systems and their contents remain the same. 3

4 Important Functions of Information Security Protect the ability to function. Enable the safe operation of applications. Protect data. Safeguard technology assets. 4

Protecting the Functionality of the Organization Shared responsibility between general management and IT managment ◦ Set security policy in compliance with legal requirements. ◦ Not really a technology issue Address information security in terms of ◦ Business impact ◦ Cost of business interruption 5

Enabling Safe Operation Organization requires integrated, efficient, and capable applications. ◦ Technologically complex. ◦ Must protect critical applications  Operating system platforms  Electronic mail  Instant messaging ◦ Infrastructure developed by  outsourcing to a service provider  develop internally ◦ Protection of the infrastructure must be overseen by management. 6

Protecting Data Data provides ◦ Record of transactions (e.g., banking) ◦ Ability to deliver value to customers ◦ Enable creation and movement of goods and services.  Data in motion (online transactions)  Data at rest (not online transaction) Information systems must support these transactions. 7

Safeguarding Technology Assets Must have secure infrastructure services based on the size and scope of the enterprise. ◦ Smaller businesses may require less protection.  and personal encryption. ◦ Additional services required for larger businesses.  Public Key Infrastructure (PKI) - more complex ◦ Needs change as network grows. 8

Threats Requirements to protect information ◦ Be familiar with  The information to be protected  The systems that store, transport and process it ◦ Know the threats you face An object, person, or entity that represents a constant danger to an asset. 9

12 General Categories of Threat 1. Acts of human error or failure – mistakes, sloppiness 2. Compromises to intellectual property - piracy, licensing 3. Deliberate acts of espionage or trespass ◦ shoulder surfing, hacking, script kiddies, cracker, phreaker 4. Deliberate acts of information extortion - demanding a ransom 5. Deliberate acts of sabotage or vandalism ◦ damage reputation, cyberactivist, cyberterrorism 6. Deliberate acts of theft - difficult to detect 7. Deliberate software attacks ◦ malware, virus, worm, trojan horses, back door, hoaxes 8. Forces of nature - fire, flood, earthquake, lightning, storms, etc. 9. Deviations in quality or service - service disruptions 10. Technical hardware failures or errors - hardware defects 11. Technical software failures or errors - accidental or intentional flaws 12. Technological obsolescence - unreliable and untrustworthy 10

The Endless Game of Cat and Mouse: Meet the Cast Hackers versus crackers White hats, black hats, all the shades of gray, and mysterious color changing Conferences? Web sites? Drills? s/Crackers.pdf s/Crackers.pdf 11

Meet the Players Top 10 And the othersothers ◦ From ws/hackers/ ws/hackers/ And where they congregate – do NOT go there unless you want to risk catching something …. 12

Attacks At act or action that takes advantage of a vulnerability to compromise a controlled system. Accomplished by a threat agent that damages or steals information or physical assets. Vulnerability ◦ an identified weakness in a controlled system, where controls are not present or no longer effective. Attacks exist when a specific action occurs that may cause a potential loss. Question: how will the attacker “identify weakness” and/or know what to attack? 13

Well-Known Types of Attack Against Controlled Systems Malicious Code Hoaxes Back Doors Password Crack Brute Force Dictionary Denial-of-Service (DoS) Distributed Denial-of- Service (DDoS) Spoofing Man-in-the-Middle Spam Mail Bombing Sniffers Social Engineering Buffer Overflow Timing Attack 14 Of course, any of these attacks can be distributed, and/or coming from a botnet.

Malicious Code Viruses, worms, Trojan horses, active web scripts. State-of-the-art ◦ Polymorphic or multivector worm ◦ CERT, Symantec, etc. warnings Known attack vectors ◦ IP scan and attack ◦ web browsing ◦ Virus ◦ unprotected shares ◦ mass mail ◦ SNMP 15

Hoaxes Transmit a virus hoax with a real virus attached. ◦ More readily transmitted by trusting users! 16

Back Doors Use known or previously discovered access mechanism to gain access to a system or network resource. ◦ May be left by system designers or maintenance staff. ◦ Referred to as trap doors. Hard to detect --- may be exempt from usual audit logging procedures. 17

Password Crack Reverse calculate a password. Component of many dictionary attacks. Security Account Manager (SAM) file is accessible ◦ contains hashed representation of the user's password. ◦ a guessed password can be hashed using the same algorithm and compared to the stored hash version of the real password. 18

Brute Force Attack AKA, password attack Try every possible combination of options for a password. Easier, if passwords are easy to guess or default passwords. Avoid using easy to guess passwords --- and don't use default passwords. Rarely used, if basic security precautions have been implemented (e.g., complex passwords) 19

Dictionary Attack Use a list of commonly used passwords (i.e., a dictionary) instead of random combinations. Takes less time to crack than a brute force attack. Use electronic dictionaries to enforce use of (more) complex passwords. 20

Denial of Service (DoS) Distributed Denial of Service (DDoS) Overload target with requests Many different flavors: ◦ TCP SYN flood attack: send many TCP connection requests. ◦ Send million s or faxes and clog the server DDoS ◦ Often uses compromised machines (called zombies, from a botnet) to attack the target system. ◦ The most difficult to defend against. ◦ No controls that any single organization can apply. ◦ Some cooperative efforts among service providers. ◦ MyDoom worm attack. 21

Spoofing Technique of sending messages to a computer using a source IP address that indicates the messages are coming from a trusted host. ◦ Must find an IP address for a trusted host. ◦ Must modify packet headers for the attack messages. Routers and firewalls can protect against spoofing attacks. 22

Man-in-the-Middle Attack AKA, TCP hijacking attack Attacker "sniffs" packets from the network, modifies them, then inserts them back into the network. ◦ Uses IP spoofing to impersonate another entity on the network. Allows the attacker to: ◦ eavesdrop, change, delete, reroute, add, forge, or divert data. Spoofing involves the interception of an encryption key exchange, which enables the hijacker to act as an eavesdropper (transparent to the network). 23

Spam Unsolicited commercial . ◦ Has been used as a vector for malicious code attacks. ◦ Wastes computer and human resources i.e. it is a DOS attack Methods to counteract spam ◦ Delete offending messages ◦ Use filtering technologies to stem the flow 24

Mail Bombing denial-of-service attack. ◦ Send large s with forged headers Mechanisms ◦ Social engineering ◦ SMTP flaws 25

Sniffers AKA, packet sniffers. A program or device that can monitor data traveling over a network. ◦ Use for legitimate network management functions or maliciously. Unauthorized sniffers are dangerous to security. ◦ Virtually impossible to detect. ◦ Can be inserted anywhere. 26

Social Engineering The process of using social skills to persuade people to reveal access credentials or other valuable information. ◦ Over the phone: “Hey, Joe, this is Andy from department C. Aaron (the boss) told me to ask you to give me the XYZ plans, the customers is demanding we fix the bugs by tomorrow. “ ◦ Over the phone or in person, to the secretarial support: “…” May involve impersonating someone higher in the organizational hierarchy (requesting information). ◦ “Hey, Joe, this is Aaron (the boss). What was the …. “ Tailgating, shoulder surfing, etc. May be a scam --- Nigerian banking, etc. 27

Physical (illegal) access War Driving: driving around trying to catch a signal ◦ Wireless without encryption ◦ Non-wireless el.magn. radiation Garbage Diving: looking through disposed documents Tapping: any cable that is not optical. Or, at exposed locations (switches, control panels, etc.) 28

Buffer Overflow “Buffer” is a term for data storage, on logical level (often called “queue” in networking) Buffers are used for many different reasons: for example, to temporarily store networking data when waiting to be processed, etc. Buffers are often implemented as “arrays” in code Arrays typically have fixed size A buffer overflow is a programming error that occurs when more data is sent to a buffer than it can handle AND the programmer did not specify what happens in that special case ◦ Attacker can take advantage of this programming error to cause unintended side effects. 29

Timing Attack Something bad happens when a certain time is reached Many different flavors. Examples: ◦ Explores web browser's cache.  Allows web designer to develop malicious cookie to be stored on user's system.  Could allow designer to collect information on how to access password-protected sites. 30

Port Scanning attacks/port-scan-attack Port scan sees which ports are available, which OS you are using, … attacks/port-scan-attack S/port_scan_detectors.shtml A view from the trenches S/port_scan_detectors.shtml A tool to detect port scans 31

Review NA-Security-Chapter-1-assessment NA-Security-Chapter-1-assessment Challenge: go through the PCWeek Hack on p.47 and try to understand each step the attacker took. 32