- 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
Security Alert: Latest Trends in Global Attacks, Sources and Impact Vince Steckler Vice President, Asia Pacific.
1 Telstra in Confidence Managing Security for our Mobile Technology.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Introducing Computer and Network Security
FIT3105 Security and Identity Management Lecture 1.
Network and Server Attacks and Penetration Chapter 12.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Web Server Security By Michael Huang. Web Server Security - Background Experts gets hacked (AOL, MSN, FBI, CIA, etc…) Loss of Trade Secrets, Company Embarrassment,
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
100 % UPTIME SLAs 27 | 8 DATA CLOUD CENTERSPODS SSAE-16, SOC 2 TYPE II, PCI-DSS, HIPAA, HITECH AT101, NIST , SAFE HARBOR COMPLIANT POWER INFRASTRUCTURE.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
SEC835 Database and Web application security Information Security Architecture.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
©Dr. Respickius Casmir IT Security & Cybercrime IT & Communication Summit 2010 March 8, 2010 By Respickius Casmir, PhD. University of Dar es Salaam Computing.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Page 1 8 Oct 2004 IT Security Awareness Dangers in the Networked World Lai Zit Seng NUS School of Computing.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Information Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Scott Charney Cybercrime and Risk Management PwC.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Michael Oehler. This is Hard We are an equal opportunity intrusion detector. –Alerts occur irrespective of the mission impact. We are still incident focused.
Computer Security By Duncan Hall.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
MIS323 – Business Telecommunications Chapter 10 Security.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Cyber Attack – Not a case of if, but when! Housing Technology 2016 Kevin Doran – Chief Technology Officer Tim Cowland – Principal Consultant.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Information Management System Ali Saeed Khan 29 th April, 2016.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber Security Zafar Sadik
ISSeG Integrated Site Security for Grids WP2 - Methodology
Secure Software Confidentiality Integrity Data Security Authentication
Today’s Risk. Today’s Solutions. Cyber security and
امنیت اطلاعات و ضرورت آن
Back-End Data Security
AMI Security Roadmap April 13, 2007.
Security week 1 Introductions Class website Syllabus review
Cybersecurity Threat Assessment
Presentation transcript:

- 1 - Information Security

- 2 - Agenda A Brief History of Internet security What is Security What I worry about

- 3 - The Internet

- 4 - The Internet Worm Incident 2 November 1988 Used vulnerabilities in: Fingerd Sendmail ‘r’ commands Cracked password Consumed CPU Aka. ‘The Morris Worm’

- 5 - Firewalls

- 6 - Intrusion Detection

- 7 - DoS and DDoS

- 8 - Code Red

- 9 - Broadband

CyberWar and …

… CyberTerrorism

Spy Ware / Ad Ware

CyberCrime

The CIA Triad Confidentiality Integrity Availability The state of being secret The state or quality of being entire or complete Present and ready for use The state of being secret The state or quality of being entire or complete Present and ready for use Security = Security

A Definition Security is a Methodology for Handling Threats to Confidentiality, Integrity and Availability - i.e. Risk Management

Things I Worry About Users IT People IT Vendors Nation-State conflict or Terrorists and Web Mobile Devices Anyone who thinks that I am responsible for Information Security

Further Reading Bruce Schneier SANS Internet Storm Centre SecurityFocus Titan Rain Jericho Forum