Guide to Firewalls and VPNs, 3 rd Edition Chapter One Introduction to Information Security.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Principles of Information Security, 2nd Edition1 Threats and Attacks.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Lecture 1: Overview modified from slides of Lawrie Brown.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ISA 3200 NETWORK SECURITY Chapter 1: Introduction to Information Security.
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs,
Introducing Computer and Network Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Threats and Attacks Principles of Information Security, 2nd Edition
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
The Need for Security Chapter 2 Our bad neighbor makes us early stirrers, Which is both healthful and good husbandry. -- William Shakespeare (1564–1616),
Principles of Information Security, 4 th Edition 2 Introduction  Primary mission of information security is to ensure systems and contents stay the same.
Principles of Information Security, 2nd Edition1 Introduction.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
SEC835 Database and Web application security Information Security Architecture.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
The Need for Security Principles of Information Security Chapter 2.
CE3031 The Need for Security Slides based on Whitman, M. and Mattord, H., Principles of Information Security; Thomson Course Technology 2003.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Principles of Information Security, 2nd Edition2  Understand the business need for information security  Understand a successful information security.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Guide to Network Security First Edition Chapter One Introduction to Information Security.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
The Need for Information Security(1) Lecture 2. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part I.
Information Systems Security
CS457 Introduction to Information Security Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Introduction to Information Security
Security in Networking
Threats and Attacks Principles of Information Security, 2nd Edition
Chapter 1 Key Security Terms.
Presentation transcript:

Guide to Firewalls and VPNs, 3 rd Edition Chapter One Introduction to Information Security

Guide to Firewalls and VPNs, 3 rd Edition Objectives Explain the component parts of information security in general and network security in particular Define the key terms and critical concepts of information and network security Describe the organizational roles of information and network security professionals Discuss the business need for information and network security 2

Guide to Firewalls and VPNs, 3 rd Edition Objectives (cont’d.) Identify the threats posed to information and network security, as well as the common attacks associated with those threats Differentiate threats to information within systems from attacks against information within systems 3

Guide to Firewalls and VPNs, 3 rd Edition Introduction Network security –Critical activity for almost every organization Perimeter defense –Cornerstone of most network security programs –Effective firewall Properly configured to be safe and efficient Chapter 1 –Overview of the entire field of information security –How that broader field influences current trends in network security 4

Guide to Firewalls and VPNs, 3 rd Edition What Is Information Security? Information security (InfoSec) –Protection of information and its critical elements, –Includes the systems and hardware that use, store, and transmit that information Unified process encompasses –Network security –Physical security –Personnel security –Operations security –Communications security 5

Guide to Firewalls and VPNs, 3 rd Edition What Is Information Security? (cont’d.) C.I.A. triangle –Industry standard for computer security –Based on the three characteristics of information that make it valuable to organizations: Confidentiality Integrity Availability 6

Guide to Firewalls and VPNs, 3 rd Edition Critical Characteristics of Information Availability –Information is accessible by authorized users Accuracy –Information is free from mistakes or errors Authenticity –Information is genuine or original Confidentiality –Information is protected from disclosure or exposure 7

Guide to Firewalls and VPNs, 3 rd Edition Critical Characteristics of Information (cont’d.) Integrity –Information remains whole, complete, and uncorrupted Utility –Information has value for some purpose or end Possession –Information object or item is owned or controlled by somebody 8

Guide to Firewalls and VPNs, 3 rd Edition CNSS Security Model U.S. Committee on National Systems Security (CNSS) National Training Standard for Information Security Professionals NSTISSI No McCumber Cube –3 x 3 x 3 cube, with 27 cells representing the various areas that must be addressed to secure today’s information systems 9

Guide to Firewalls and VPNs, 3 rd Edition CNSS Security Model 10 Figure 1-1 The McCumber Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Balancing Information Security and Access Information security –Process, not an end state Balance protection of information and information assets with the availability of that information to authorized users Security must allow reasonable access –Yet protect against threats 11

Guide to Firewalls and VPNs, 3 rd Edition Business Needs First Protect the organization’s ability to function Enable the safe operation of applications implemented on the organization’s IT systems Protect the data the organization collects and uses Safeguard the technology assets in use at the organization 12

Guide to Firewalls and VPNs, 3 rd Edition Security Professionals and the Organization Wide range of professionals to support the complex information security program needed by a moderate or large organization Chief information officer (CIO) –Senior technology officer Chief information security officer (CISO) –Responsible for the assessment, management, and implementation of information security in the organization 13

Guide to Firewalls and VPNs, 3 rd Edition Security Professionals and the Organization (cont’d.) Information security project team –Champion –Team leader –Security policy developers –Risk assessment specialists –Security professionals –Systems, network, and storage administrators –End users 14

Guide to Firewalls and VPNs, 3 rd Edition Data Management Data owners –Responsible for the security and use of a particular set of information Data custodians –Responsible for the storage, maintenance, and protection of the information Data users –Allowed by the data owner to access and use the information to perform their daily jobs 15

Guide to Firewalls and VPNs, 3 rd Edition Key Information Security Terminology Security professional must be familiar with common terms –To effectively support any information security effort 16

Guide to Firewalls and VPNs, 3 rd Edition Threats and Attacks Threat –Category of object, person, or other entity that poses a potential risk of loss to an asset Asset –Anything that has value for the organization –Can be physical or logical Attack –Intentional or unintentional action that could represent the unauthorized modification, damage, or loss of an information asset 17

Guide to Firewalls and VPNs, 3 rd Edition Threats and Attacks (cont’d.) Subject of an attack –Used as an active tool to conduct the attack Object of an attack –Entity being attacked Direct attack –Hacker uses a personal computer to break into a system Indirect attack –System is compromised and used to attack other systems 18

Guide to Firewalls and VPNs, 3 rd Edition Vulnerabilities and Exploits Threat agent –Specific instance of a general threat Well-known vulnerabilities –Vulnerabilities that have been examined, documented, and published “Exploit” –Threat agents attempt to exploit a system or information asset –Specific recipe that an attacker creates to formulate an attack 19

Guide to Firewalls and VPNs, 3 rd Edition Vulnerabilities and Exploits (cont’d.) Controls, safeguards, or countermeasures –Synonymous terms –Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and generally improve the security within an organization 20

Guide to Firewalls and VPNs, 3 rd Edition Risk State of being unsecure, either partially or totally, and thus susceptible to attack Described in terms of likelihood Risk management –Involves risk identification, risk assessment or analysis, and risk control Risk appetite or risk tolerance –Amount of risk an organization chooses to live with 21

Guide to Firewalls and VPNs, 3 rd Edition Risk (cont’d.) Residual risk –Amount of risk that remains after an organization takes precautions, implements controls and safeguards, and performs other security activities To control risk: –Self-protection –Risk transfer –Self-insurance or acceptance –Avoidance 22

Guide to Firewalls and VPNs, 3 rd Edition Security Perimeter and Defense in Depth Security perimeter –Defines the boundary between the outer limit of an organization’s security and the beginning of the outside network –Perimeter does not protect against internal attacks –Organization may choose to set up security domains Defense in depth –Layered implementation of security Redundancy –Implementing technology in layers 23

Guide to Firewalls and VPNs, 3 rd Edition Security Perimeter and Defense in Depth (cont’d.) 24 Figure 1-3 Security Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Security Perimeter and Defense in Depth (cont’d.) 25 Figure 1-4 Defense in Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Threats to Information Security Table 1-1 –Reveals how many organizations have experienced the listed types of attack or misuse Table 1-2 –12 categories that represent a clear and present danger to an organization’s people, information, and systems 26

Guide to Firewalls and VPNs, 3 rd Edition Threats to Information Security (cont’d.) 27 Table 1-1 CSI/FBI Computer Crime and Security Survey (continues)

Guide to Firewalls and VPNs, 3 rd Edition28 Table 1-1 CSI/FBI Computer Crime and Security Survey (continues)

Guide to Firewalls and VPNs, 3 rd Edition29 Table 1-1 CSI/FBI Computer Crime and Security Survey (continues)

Guide to Firewalls and VPNs, 3 rd Edition30 Table 1-1 CSI/FBI Computer Crime and Security Survey (continued)

Guide to Firewalls and VPNs, 3 rd Edition31 Table 1-2 Threats to Information Security

Guide to Firewalls and VPNs, 3 rd Edition The TVA Triple “TVA Triple” of Threat-Vulnerability-Asset –Use to prioritize your work –T1-V1-A1—Vulnerability 1 that exists between Threat 1 and Asset 1 –T1-V2-A1—Vulnerability 2 that exists between Threat 1 and Asset 1 –T1-V1-A2—Vulnerability 1 that exists between Threat 1 and Asset 2 Organize in a TVA worksheet 32

Guide to Firewalls and VPNs, 3 rd Edition33 Table 1-3 Sample TVA spreadsheet

Guide to Firewalls and VPNs, 3 rd Edition Other Ways to View Threats Perspectives: –Intellectual property –Software piracy –Shoulder surfing –Hackers –Script kiddies –Packet monkeys –Cracker –Phreaker –Hacktivist or cyberactivist –Cyberterrorist 34

Guide to Firewalls and VPNs, 3 rd Edition Other Ways to View Threats (cont’d.) Malicious code, malicious software, or malware –Computer virus: macro virus, boot virus –Worms –Trojan horses –Backdoor, trapdoor, maintenance hook –Rootkit 35

Guide to Firewalls and VPNs, 3 rd Edition Other Ways to View Threats (cont’d.) Power irregularities –Spike (momentary increase) –Surge (prolonged increase) –Sag (momentary decrease) –Brownout (prolonged decrease) –Fault (momentary complete loss) –Blackout (prolonged complete loss) 36

Guide to Firewalls and VPNs, 3 rd Edition Attacks on Information Assets Attacks occur through a specific act that may cause a potential loss Each of the major types of attack used against controlled systems discussed 37

Guide to Firewalls and VPNs, 3 rd Edition Malicious Code Malicious code –Includes viruses, worms, Trojan horses, and active Web scripts –Executed with the intent to destroy or steal information Polymorphic, multivector worm –Constantly changes the way it looks –Uses multiple attack vectors to exploit a variety of vulnerabilities in commonly used software 38

Guide to Firewalls and VPNs, 3 rd Edition Malicious Code 39 Table 1-4 Attack Vectors

Guide to Firewalls and VPNs, 3 rd Edition Compromising Passwords Bypass access controls by guessing passwords Cracking –Obtaining passwords from hash values Brute force attack –Application of computing and network resources to try every possible combination of characters Dictionary attack –Variation on the brute force attack –Narrows the field by selecting specific target accounts and using a list of commonly used passwords 40

Guide to Firewalls and VPNs, 3 rd Edition Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Denial-of-service (DoS) attack –Attacker sends a large number of connection or information requests to a target –So many requests are made that the target system cannot handle them along with other, legitimate requests for service Distributed denial-of-service (DDoS) –Coordinated stream of requests against a target from many locations at the same time Any system connected to the Internet is a potential target for denial-of-service attacks 41

Guide to Firewalls and VPNs, 3 rd Edition Spoofing Intruder sends messages to IP addresses that indicate to the recipient that the messages are coming from a trusted host 42 Figure 1-6 IP Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Man-in-the-Middle Attacker monitors (or sniffs) packets from the network –Modifies them using IP spoofing techniques –Inserts them back into the network Allows the attacker to eavesdrop, change, delete, reroute, add, forge, or divert data 43

Guide to Firewalls and VPNs, 3 rd Edition Attacks –Vehicle for attacks rather than the attack itself Spam –Used as a means to make malicious code attacks more effective Mail bomb –Attacker routes large quantities of to the target system 44

Guide to Firewalls and VPNs, 3 rd Edition Sniffers Sniffer –Program or device that can monitor data traveling over a network –Used both for legitimate network management functions and for stealing information from a network Impossible to detect Can be inserted almost anywhere Packet sniffers –Work on TCP/IP networks 45

Guide to Firewalls and VPNs, 3 rd Edition Social Engineering Process of using social skills to convince people to reveal access credentials or other valuable information to the attacker “People are the weakest link. You can have the best technology, [then] somebody call[s] an unsuspecting employee. That’s all she wrote, baby. They got everything” –Kevin Mitnick 46

Guide to Firewalls and VPNs, 3 rd Edition Buffer Overflow Application error –Occurs when more data is sent to a buffer than it can handle Attacker can make the target system execute instructions Attacker can take advantage of some other unintended consequence of the failure 47