Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Rodney Buike IT Pro Advisor, Microsoft Canada
Attacks Framework Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL

7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Security Chapter 9 Copyright 2004 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 5 th edition.
COS 338 Day 16. DAY 16 Agenda Capstone Proposals Overdue 3 accepted, 3 in mediation Capstone progress reports still overdue I forgot to mark in calendar.
A Look at the 2004 CSI/FBI Computer Crime and Security Survey Robert Richardson Editorial Director Computer Security Institute How to Use Statistics in.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
FIT3105 Security and Identity Management Lecture 1.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Introduction & Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Revised by Huei Lee.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Issues Raised by ICT.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 11 Security and Privacy: Computers and the Internet.
Computer Crime and CyberCrime Why we need Computer Forensics.
Network Security Overview Ali Shayan Network Security Management’s Perspective Dangers: – Negligence – Dereliction of duty – Liable for damaged.
Copyright, 2005 Pinnacle Entertainment, Inc. 1 Auditing the Windows Network Bart A. Lewin Chief Technology Officer Pinnacle Entertainment, Inc. CS 3-2.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
USDA Cyber Security Awareness IDS Briefing Gregory Tepe Director, Federal Security Solutions.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.
PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Desktop Security: Making Sure Your Office Environment is Secure.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
The Cost of Bad Computer Security And The Effects It Has By: Steve Baker.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
A threat to global security and economy Koushik Mannepalli CMPE 294.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Information Security: Current Threats Marc Scarborough Information Security Officer
MIS323 – Business Telecommunications Chapter 10 Security.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Securing Information Systems
Threats to computers Andrew Cormack UKERNA.
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
Today’s Risk. Today’s Solutions. Cyber security and
Security Threats Severity Analysis
Figure 1-7: Eavesdropping on a Dialog
CSI/FBI 2007, 2009, 2010/11 Key findings.
Philip Nichilo Vincent Carestia
Las Positas College Flex Day
Forensic and Investigative Accounting
Strategic threat assessment
Presentation transcript:

Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall

2 Figure 1-1: CSI/FBI Computer Crime and Security Survey How Bad is the Threat? Survey conducted by the Computer Security Institute (  Based on replies from 503 U.S. Computer Security Professionals.  If fewer than 20 firms reported quantified dollar losses, data for the threat are not shown.

3 Figure 1-1: CSI/FBI Computer Crime and Security Survey ThreatPercent Reporting an Incident 1997 Percent Reporting an Incident 2002 Average Annual Loss per Firm (x1000) 1997 Average Annual Loss per Firm (x1000) 2002 Viruses82%85%$76$283 Laptop Theft58%65%$38$89 Denial of Service 24%40%$77$297 System Penetration 20%40%$132$226 Unauthorized Access by Insiders 40%38%NA

4 Figure 1-1: CSI/FBI Computer Crime and Security Survey ThreatPercent Reporting an Incident 1997 Percent Reporting an Incident 2002 Average Annual Loss per Firm (x1000) 1997 Average Annual Loss per Firm (x1000) 2002 Theft of Intell. Prop. 20% $954$6,571 Fin. Fraud12% $958$4,632 Sabotage14%8%$164$541 Telecom Fraud 27%9%NA Telecom Eavesdrop. 11%6%NA Act. Wiretap3%1%NA

5 Figure 1-2: Other Empirical Attack Data Riptech  Analyzed 5.5 billion firewall log entries in 300 firms in five-month period  Detected 128,678 attacks—an annual rate of 1,000 per firm  Only 39% of attacks after viruses were removed were directed at individual firms

6 Figure 1-2: Other Empirical Attack Data Riptech  23% of all firms experienced a highly aggressive attack in a 6-month period  Only one percent of all attacks, highly aggressive attacks are 26 times more likely to do severe damage than even moderately sophisticated aggressive attacks

7 Figure 1-2: Other Empirical Attack Data SecurityFocus  Data from 10,000 firms in 2001  Attack Frequency 129 million network scanning probes (13,000 per firm) 29 million website attacks (3,000 per firm) 6 million denial-of-service attacks (600 per firm)

8 Figure 1-2: Other Empirical Attack Data SecurityFocus  Attack Targets 31 million Windows-specific attacks 22 million UNIX/LINUX attacks 7 million Cisco IOS attacks All operating systems are attacked!

9 Figure 1-2: Other Empirical Attack Data U.K. Department of Trade and Industry  Two-thirds of U.K. firms surveyed lost less than $15,000 from their worst incident  But 4% lost more than $725,000

10 Figure 1-2: Other Empirical Attack Data MessageLabs  One in every 200 to 400 messages is infected  Most users are sent infected several times each year  The percentage of s that are infected is rising

11 Figure 1-2: Other Empirical Attack Data Honeynet project  Fake networks set up for adversaries to attack  To understand how adversaries attack  Windows 98 PC with open shares and no password compromised 5 times in 4 days  LINUX PCs took 3 days on average to compromise