Download presentation
Presentation is loading. Please wait.
1
Information Society Security Risks
3
Attacks Origin Consequences RISKS...
4
The Attacks Availability Integrity Confidentiality
5
The Origin ACCIDENTS Physical Accidents Breakdowns Loss of essentialservice Force majeure ERRORS Operational, conceptual or implementation errors MALEVOLENCY Theft - Sabotage Fraud Logical Attacks Dispersion
6
The Consequences Direct and indirect losses Material and immaterial losses Supplementary Expenses and operational losses Losses of assets ( goods, money ) Civil responsibility Sabotage of the enterprise operations Injure the business image Damage the competitive capability
7
Risk Management Prevention Protection Detection After incident recovery Transfer to insurance Repression
8
The RISKS Major Dead or alive unacceptable insurance inadequate Minor probability of incident x severity temporary acceptable prevention and/or insurance
9
Types of Problems Intrusion Viruses Quality of information Confidentiality Intellectual rights Criminality - security
10
Who is responsible ? Who is the organizer ? How identify the actors ? Law applicable ? Questions
11
Intrusion Alteration Destruction Access - theft data programs Theft of resources
12
Who can use the INTERNET ? What can they do on the INTERNET ? Who authorizes ? How can it be controlled? INTERNET Usage Politics
13
Protection against Intrusion Barriers (firewalls) Access Control –identification –authentication signature –authorization classification Cost calculation Access Journalisation
14
Methods of Violation CLASSIC pass-word attacks brute force encryption and comparisons social engineering
15
Methods of Violation (cont) MODERN interception of data Ethernet sniffing Keyboard Logging Monitoring X-Windows Modified Utilities (login, in.telnetd, in.ftpd, finger,...) Attacks based on protocols Encapsulated or wrong configured utilities (NIS, NFS, TELNET, FTP, WWW, R-commands, Sendmail, …)
16
FIREWALLS Everything that is not permitted is forbidden ? Everything that is not forbidden is allowed ? All the incoming and outgoing traffic should pass the firewall !
17
Limitations of FIREWALLS Session-jacking of a connected and authorized user Tunnel interfere with an authorized traffic Circumvention usage of an alternative access Weaknesses of certain applications
18
Problems with FIREWALLS Reduction of the network throughput Recovery in case of breakdowns Not 100 % reliable Generate a blind confidence Insufficient Installation Tests Permanent Upgrades required The danger is not only external Logs control work Static defense
19
Protection against Alteration Seal (electronic seal) Protection against destruction Safety copies
20
VIRUSES Impossible to avoid The ideal antidote does not exists The viruses grow in number and complexity Decontamination is a highly specialized job
21
QUALITY of INFORMATION Newspapers have degenerated. They may now be absolutely relied upon. Oscar Wilde (1856-1900).
22
Data Reliability
23
Access Control Encryption symmetric keys asymmetric keys
24
Encryption Individual Society Legal Status of encryption ?
25
INFORMATION BATTLE Espionage Industrial Espionage Criminality Terrorism
26
Information Highway and Society Cost of access and usage Info-poors and info-riches Contents surveillance Impose access restrictions
27
Code of conduct Censure ? Regulation ‘sensitive Information’ via the information highway
28
Protection of intellectual rights Serial number Copyright registration Encryption Product marks
29
Private life protection
30
ELECTRONIC COMMERCE PARTY AUTHENTICATION AUTHORIZATION CONFIDENTIALITY INTEGRITY - NON ALTERATION JOURNALISATION NON REFUSION at EMISSION and at RECEPTION
31
SECURITY is and will always be in the first place a HUMAN PROBLEM!
32
Not connecting is the only 100 % security
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.