.  Understanding Information Security  Understanding the Goals of Information Security  Comprehending the Security Process  Authentication Issues.

Slides:



Advertisements
Similar presentations
General Security Concepts Ali SHAYAN ZAKARIA 12.May.2010 Kish Island – CITELEX 2010 " The best way to predict the future is to invent it. Alan Kay 1General.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Guide to Network Defense and Countermeasures Second Edition
Access Control Chapter 3 Part 3 Pages 209 to 227.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Access Control Methodologies
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 12 Network Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Virtual Private Network
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 10: Authentication Guide to Computer Network Security.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Troubleshooting Windows Vista Security Chapter 4.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Today’s Lecture Covers < Chapter 6 - IS Security
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 10 Securing the network perimeter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Privilege Management Chapter 22.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Access Control for Security Management BY: CONNOR TYGER.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Security fundamentals
CS457 Introduction to Information Security Systems
CompTIA Security+ Study Guide (SY0-401)
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

 Understanding Information Security  Understanding the Goals of Information Security  Comprehending the Security Process  Authentication Issues to Consider  Distinguishing between Security Topologies

 Protocol: an official set of steps or language for communication  Algorithm: a specific set of steps to solve a problem or do some task  String: a series of characters. Example if a character can be a-z and 0-9 an 8 character string might be “ar01z14b”  Control: a countermeasure or attempt to mitigate a security risk.  A firewall is technical control. Policies are HR controls. Encryption is a technical control.

 Security?  Physical security of servers and workstations  Protecting data from viruses and worms or from hackers and miscreants  The capability to restore files if a user accidentally deletes them  …  Problems with security:  It is next to impossible for everyone to agree on what it means  We don’t really mean that we want things to be completely secured  While everyone wants security, no one wants to be inconvenienced by it

 Protecting your assets and information from physical access by unauthorized persons  Threats often present themselves as service technicians, janitors, customers, vendors, or even employees  Components of physical security:  Making a physical location less tempting as a target  Detecting a penetration or theft  Recovering from a theft or loss of critical information or systems

 Operational security issues include:  Network access control (NAC),  Authentication,  Security topologies after the network installation is complete.  Daily operations of the network  Connections to other networks  Backup plans  Recovery plans  In short, operational security encompasses everything that isn’t related to design or physical security in the network

 Guidance, rules, and procedures for implementing a security environment  Policies need the support of management to be carried out well.  The issues that must be decided at the management and policy level affect the entire company and can greatly impact productivity, morale, and corporate culture

 A number of key policies are needed to secure a network. The following list identifies some broad areas that require thought and planning:  Administrative policies  Disaster recovery plans  Information policies  Security policies  Software design requirements  Usage policies  User management policies

 Administrative policies lay out guidelines and expectations for upgrades, monitoring, backups, and audits.  System administrators and maintenance staff use these policies to conduct business.  The policies must be:  Specific enough to help the administrative staff keep focused on the business of running the systems and networks  Flexible enough to allow for emergencies and unforeseen circumstances.

 Expensive to develop and to test, and it must be kept current.  Takes into consideration virtually every type of occurrence or failure possible  The key to its success is its completeness  Many large companies invest huge amounts of money in DRPs, including backup or hot sites.

 Refer to the various aspects of information security, including access, classifications, marking and storage, and the transmission and destruction of sensitive information.  Data classification matrix  Defines various classification levels  Public: For all advertisements and information posted on the Web  Internal: For all intranet-type information  Private: Personnel records, client data, and so on  Confidential: Public Key Infrastructure (PKI) information and other items restricted to all but those who must know them

 Define the configuration of systems and networks  Security policies also define computer room and data center security as well as how identification and authentication (I&A) occurs.  Things covered:  Determine how access control, audits, reports and network connectivity are handled.  Encryption and antivirus software  Establish procedures and methods used for password selection, account expiration, failed logon attempts, and related areas

 Software design requirements outline what the capabilities of the system must be  A software design policy should be specific about security requirements  If the design doesn’t include security as an integral part of the implementation, the network may have vulnerabilities.

 Cover how information and resources are used  Include statements about privacy, ownership, and the consequences of improper acts  Usage policies should also address how users should handle incidents

 Identify the various actions that must occur in the normal course of employee activities  These policies must address how new employees are added to the system as well as managed.  A user may acquire administrative privileges to the system by accident.

 Understanding Information Security  Understanding the Goals of Information Security  Comprehending the Security Process  Authentication Issues to Consider  Distinguishing between Security Topologies

 Prevention: preventing computer or information violations from occurring.  Detection: identifying events when they occur.  Response: developing strategies and techniques to deal with an attack or loss

 Understanding Information Security  Understanding the Goals of Information Security  Comprehending the Security Process  Authentication Issues to Consider  Distinguishing between Security Topologies

 Security is a combination of three Ps: processes, procedures, and policies.  There are several parts to this process  Appreciating Antivirus Software  Implementing Access Control  Authentication

 Mandatory Access Control (MAC):  A static model that uses a predefined set of access privileges for files on the system.  The system administrators establish these parameters and associate them with an account, files  MAC uses labels to identify the level of sensitivity that applies to objects.  When a user attempts to access an object, the label is examined to see if the access should take place or be denied.  One key element to remember is that when mandatory control is applied, labels are required and must exist for every object., or resources.

 Discretionary Access Control (DAC):  The owner of a resource establishes privileges to the information they own.  Labels are not mandatory but can be applied as needed.  Role-Based Access Control (RBAC):  A user acts in a certain predetermined manner based on the role the user holds in the organization.  The roles almost always shadow the organizational structure.  The RBAC model is common in network administrative roles.

 Authentication proves that a user or system is actually who they say they are.  Authentication systems or methods are based on one or more of these three factors:  Something you know, such as a password or PIN  Something you have, such as a smart card or an identification device  Something physically unique to you, such as your fingerprints or retinal pattern

 Use physical characteristics to identify the user  Hand scanners  Retinal scanners  DNA scanners (not available for now)

 Commonly used  A server or certificate authority (CA) can issue a certificate that will be accepted by the challenging system.  Certificate Practice Statement (CPS) outlines the rules used for issuing and managing certificate  Certificate Revocation List (CRL) lists the revocations that must be addressed (often due to expiration) in order to stay current

 CHAP doesn’t use a user ID/password mechanism  The initiator sends a logon request from the client to the server.  The server sends a challenge back to the client.  The challenge is encrypted and then sent back to the server.  The server compares the value from the client  If the information matches, grants authorization.  If the response fails, the session fails, and the request phase starts over

 Originally designed by MIT  Allows for a single sign-on to a distributed network.  Key Distribution Center (KDC) authenticates the principle (which can be a user, a program, or a system) and provides it with a ticket.  After this ticket is issued, it can be used to authenticate against other principles. This occurs automatically when a request or service is performed by another principle  KDC can be a single point of failure

 Two or more access methods are included as part of the authentication process

 Two or more parties authenticate each other  Mutual authentication ensures that the client is not unwittingly connecting and giving its credentials to a rogue server; which can then turn around and steal the data from the real server  Commonly, mutual authentication will be implemented when the data to be sent during the session is of a critical nature – such as financial or medical record

 One of the simplest forms of authentication  No true security  The username and password values are both sent to the server as clear text and checked for a match.  If they match, the user is granted access; if they don’t match, the user is denied access

 A small piece of data that holds a sliver of information about the user

 A type of badge or card that gives you access to resources, including buildings, parking lots, and computers.  Contains information about one’s identity and access privileges.  Each area or computer has a card scanner or a reader in which you insert your card.  Smart Cards often also require the use of a small password called a PIN (personal identification number); which further secures the smart card if lost by the true card holder, so that it cannot be used by someone else to gain access to data and resources.

 Understanding Information Security  Understanding the Goals of Information Security  Comprehending the Security Process  Authentication Issues to Consider  Distinguishing between Security Topologies

 Capabilities of people who will be working with policies.  Be wary of popular names or current trends that make certain passwords predictable.  Distinguish between identification process and authentication process

 Understanding Information Security  Understanding the Goals of Information Security  Comprehending the Security Process  Authentication Issues to Consider  Distinguishing between Security Topologies

 Design goals  Security zones  Technologies  Business requirements

 Design goals  Security zones  Technologies  Business requirements

 Confidentiality: Prevent or minimize unauthorized access to and disclosure of data and information  Integrity: Making sure that the data being worked with is the correct data  Availability: Protect data and prevent its loss  Accountability: Who owns the data or is responsible for making sure that it’s accurate

 Four most common security zones:  Internet  Intranet  Extranet  Demilitarized zone (DMZ)

 Extend intranets to include outside connections to partners  Connect to a partner via a private network or a connection using a secure communications channel across the Internet

 A demilitarized zone (DMZ) is an area where you can place a public server for access by people you might not trust otherwise  By isolating a server in a DMZ, you can hide or remove access to other areas of your network  Use firewalls to isolate your network

 Virtualization Technology (VT)  VLANs  Network Address Translation (NAT)  Tunneling

 Today’s x86 computer hardware was designed to run a single operating system and a single application, leaving most machines vastly underutilized.  Virtualization lets you run multiple virtual machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments.  Different virtual machines can run different operating systems and multiple applications on the same physical computer.

 Get more out of your existing resources  Reduce datacenter costs by reducing your physical infrastructure and improving your server to admin ratio  Increase availability of hardware and applications for improved business continuity  Gain operational flexibility  Improve desktop manageability and security

 A virtual local area network (VLAN) allows you to create groups of users and systems and segment them on the network.  This segmentation lets you hide segments of the network from other segments and thereby control access.  You can also set up VLANs to control the paths that data takes to get from one point to another. A VLAN is a good way to contain network traffic to a certain area in a network.

 Originally, NAT extended the number of usable Internet addresses  Allow an organization to present a single address to the Internet for all computer connections  The NAT server provides IP addresses to the hosts or systems in the network and tracks inbound and outbound traffic.

 Tunneling refers to creating a virtual dedicated connection between two systems or networks.  You create the tunnel between the two ends by encapsulating the data in a mutually agreed-upon protocol for transmission.  In most tunnels, the data passed through the tunnel appears at the other side as part of the network.  Tunneling protocols usually include data security as well as encryption. Several popular standards have emerged for tunneling, with the most popular being the Layer 2 Tunneling Protocol (L2TP).

 Tunneling sends private data across a public network by placing (encapsulating) that data into other packets. Most tunnels are virtual private networks (VPNs).