Download presentation
Presentation is loading. Please wait.
Published byReynold Neal Modified over 9 years ago
1
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013
2
Total Internet Security A gateway disconnected from the network, inside a safelock 100feet below surface, where the only person who has the keys …died last week.
3
Estimated Losses in Dollars
4
Causes of Incidents
5
Causes of Incidents from the Human Perspective
6
Main Threats
7
Motivation Low Cost of connection (media) Global Reach Exposed Products Implementation of Services Cost Reduction Survey Research and Development of New Products
8
Phases of a Security Project Study Phase Decision Phase Implementation Phase Maintenance Phase
9
Neutrality Curve (Study Phase)
10
Understanding the Neutrality Curve Evaluation of the impact of various scenarios Understanding of the implementation phases Rejection Pilot Immediate Identification of Security Needed Understanding of what really needs protection
11
Possibility Curve (Study Phase)
12
Understanding the Possibility Curve Identify Security Risks (possible atacks) Cost Evaluation Identify Policies and Procedures Define Responsibilities
13
Degree of Security (Decision Phase)
14
Understanding the Degree of Security Precise Identification of Cost Development of Policy Clear Idea of the Applicable Security Model Accessment of Stability
15
Sensitive Segment: Implementation Phase AB
16
Understanding Sensitive Segment Identifies the reference security point Enables the planning of project stages Assess cost for every stage of project Assess lenght of time for implementation Mobilization of local issues/resources Increase of quality of local security
17
Moving the Reference Line (Maintenance)
18
Natural Process Dynamic Nature Involves adaptation and refinement Support for new planning Understanding Line Movement
19
System Service Implementation Vulnerabilities
20
Failure of the OS Architecture Application failure Lack of updates of Sistema Operacional (SPs, patches) Bugs on OS Systems Failure
21
Bugs on application service Failure of application service configuration Weak passwords Access to passwords Visible passwords Permission to privileged accounts Service Failures
22
Lack of content protection Lack of security policy Lack of user group profiles Failure of usability policy Failure in implementing security Implementation Failures
23
DNS Brute force Altered Ping Network Sniffers Java and ActiveX Bugs on SendMail Attack on applications Applications based on ODBC/JDBC Browser failure Web servers Few Known Security Threats
24
Invasion Hacking of content Access to passwords Sabotage Unauthorized Access to e-mail Espionage Financial frauds Analysis of Risks
25
Physical security Logical security Service security Application security Policy and procedures Redundance and contingency Security Project
26
e-Applications should ensure (at data level) Integrity Unicity Auditing Confidentiality Access controls Ensure identity Authorization Criptography Security for E-Commerce
27
To ensure identity of: User / System Client / Server Quality of data By using identifiers By protecting against fraud Criptography Functions
28
Math functions Security key should resist testings The larger the key more exhaustive it is to break it Types: Symmetric Asymmetric How About Algorithms?
29
Symmetric System
30
Asymmetric System
31
Math functions Does not characterize users Key size is limited Possible vulnerability at protocol level Only guarantees servers’ authenticity SSL – Secure Socket Layer
32
Integration Topology: Adding DMZs
33
Change (mix) protocols Implementation of auditable systems Centralization and analysis of logins Individual filters Password controls Encrypted file system Permission controls Monitoring controls Automated management Security Integration (LAN)
34
Solutions can be based on hard or software Centralized security systems Part of security implementation Enables content controls (HTTP/MAIL) Controls allowed services (rule based) Controls the origin and destination of packages Firewall Solution Characteristics
35
Alternatives…
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.