©Dr. Respickius Casmir IT Security In a Nutshell – Session 1 By Dr. Respickius Casmir.

Slides:



Advertisements
Similar presentations
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Network Security Ola Flygt Växjö University
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Chapter 1 – Introduction
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
FIT3105 Security and Identity Management Lecture 1.
Blekinge Institute of Technology, Sweden
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Introduction to Network Defense
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
SEC835 Database and Web application security Information Security Architecture.
Computer Crime and Information Technology Security
HIPAA COMPLIANCE WITH DELL
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Security in Computer System 491 CS-G(172) By Manesh T
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
©Dr. Respickius Casmir IT Security & Cybercrime IT & Communication Summit 2010 March 8, 2010 By Respickius Casmir, PhD. University of Dar es Salaam Computing.
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
System Implementation. © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Chapter 13 FIGURE 13-1 Systems development life cycle with the implementation.
Chap1: Is there a Security Problem in Computing?.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Computer Security By Duncan Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Network Security and Cryptography
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
8 – Protecting Data and Security
INFORMATION SYSTEMS SECURITY AND CONTROL.
Working at a Small-to-Medium Business or ISP – Chapter 8
Secure Software Confidentiality Integrity Data Security Authentication
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Faculty of Science IT Department By Raz Dara MA.
Information Security: Terminology
Network Security Ola Flygt Växjö University
Chapter 5 Computer Security
Presentation transcript:

©Dr. Respickius Casmir IT Security In a Nutshell – Session 1 By Dr. Respickius Casmir

©Dr. Respickius Casmir Outline Introduction to IT Security Security Attacks, Mechanisms, and Services Methods of Defense Steps for Launching an Attack Security Policy Basics

©Dr. Respickius Casmir Information security in a bigger picture It is easy to overlook the fact that information security affects an entire organisation. But ultimately, it is a business problem. Information security is more than setting up a firewall, applying patches to fix newly discovered vulnerabilities in your system software, or locking the cabinet with your backup tapes.

©Dr. Respickius Casmir Information security in a bigger picture (2) Information security is determining what needs to be protected and why; what it needs to be protected from; and how to protect it for as long as it exists The burning question, of course, is how to assure your organisation an adequate level of security over time.

©Dr. Respickius Casmir Information security in a bigger picture (3) There are many answers to this challenging question, just as there are many approaches to managing an organisation’s security Unfortunately, there is no silver bullet, no single solution that will solve all your security problems.

©Dr. Respickius Casmir Attacks, Services and Mechanisms Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

©Dr. Respickius Casmir Security Attacks

©Dr. Respickius Casmir Security Attacks Interruption: This is an attack on availability Interception: This is an attack on confidentiality Modification: This is an attack on integrity Fabrication: This is an attack on authenticity

©Dr. Respickius Casmir Security Goals Integrity Confidentiality Avalaibility

©Dr. Respickius Casmir

Security Services Confidentiality (privacy) Authentication (who created or sent the data) Integrity (has not been altered) Non-repudiation (the order is final) Access control (prevent misuse of resources) Availability (permanence, non-erasure) Denial of Service Attacks Virus that deletes files

©Dr. Respickius Casmir

Methods of Defense Encryption Software Controls (access limitations in a data base, in operating system protect each user from other users) Hardware Controls (smartcard) Policies (frequent changes of passwords) Physical Controls

©Dr. Respickius Casmir Steps for Launching an Attack Phase 1: Reconnaissance Phase 2: Scanning Phase 3: Gaining Access Phase 4: Maintaining Access Phase 5: Covering Tracks

©Dr. Respickius Casmir Phase 1: Reconnaissance When beginning an attack, the most effective attackers will do their homework to discover as much about their target as possible Inexperienced script kiddie will jump right in, indiscriminately trolling the Internet for weak systems without regard to who owns them More experienced attackers take their time by conducting detailed reconnaisance before launching a single attack packet against your network

©Dr. Respickius Casmir Phase 2: Scanning After the reconnaisance phase, the attacker is armed with some vital information about your infrastructure: a fee telephone numbers, domain names, IP addresses, technical contact information –a very good starting point Attackers will use this knowledge to begin scanning your systems looking for openings. This scaning phase is akin to a burglar turning doorknobs and trying to open windows to find a way into your house Unfortunately, this phase favours the attackers

©Dr. Respickius Casmir Phase 2: Scanning (2) Our goal as information security professionals is to secure every possible path into our systems; the attackers just have to find one way in to achieve their goals.

©Dr. Respickius Casmir Phase 3: Gaining Access Gaining Access at the Operating System and Application Level Gaining Access at the Nework Level Gaining Access and Denial-of-Service Attacks

©Dr. Respickius Casmir Phase 4: Maintaining Access After completing step 3, the attacker has gained access to the target systems or denied access to other legitemate users After gaining much-coveted access, attackers want to maintain that access To achieve this, attackers utilize techniques based on malicious software such as Trojan horses, backdoors, and rootKits.

©Dr. Respickius Casmir Phase 4: Maintaining Access (2) Traditional RootKits are a more insidious form of Trojan horse back door than their Application-level counterparts RootKits raise the ante by altering or replacing existing system components

©Dr. Respickius Casmir Phase 5: Covering Tracks After completing their missions, attackers will do everything it takes to cover their tracks

©Dr. Respickius Casmir Security Policy Development and mplementation Why do I need a formal security policy?

©Dr. Respickius Casmir Budgeting your security precautions You should now have a pretty good idea about what level of security you will be able to cost justify. This should include depreciable items (server hardware, firewalls, and construction of secured areas), as well as Recurring costs (security personnel, audits, and system maintenance).

©Dr. Respickius Casmir Budgeting your security precautions (2) Remember the old saying, “Do not place all of your eggs in one basket”?. This wisdom definitely applies to budgeting security. Do not spend all of your budget on one mode of protection. For example, it does little good to invest $15,000 in fire-walling technology if someone can simply walk through the front door and walk away with your corporate server.

©Dr. Respickius Casmir Budgeting your security precautions (3) The bottom line is to be creative. The further you can stretch your security budget, the more precautions you can take. Security is a proactive expenditure, meaning that we invest money in security precautions and procedures with hope that we will realize a return on our investment by not having to spend additional money later playing cleanup to a network disaster. The more precautions that can be taken, the less likely disaster is to strike.

©Dr. Respickius Casmir Documenting your findings You have now identified all your assets, analysed their worth to your day-to-day operations, and estimated the cost of recovery for each. Now take some time to formalize and document your findings. There are a number of reasons why this is worth your time.

©Dr. Respickius Casmir Documenting your findings (2) First, having some sort of document–whether electronic or hard copy gives you some backup when you begin the tedious process of justifying each of your countermeasures It is far more to argue with documented numbers and figures that it is to argue with an oral statement. This document should be considered fluid: expect to adjust it over time.

©Dr. Respickius Casmir Documenting your findings (4) This information is also extremely useful as you begin the process of formalizing a security policy. As you begin to generate your security policy, it is far easier to justify each policy item when you can place a dollar value on the cost on the cost of an intrusion or attack.

©Dr. Respickius Casmir Thank You! Dr. Respickius Casmir