Chapter 1 - 1: Prof. Joseph Wilfred Dela Cruz
Chapter 1 - 1: Prof. Joseph Wilfred Dela Cruz
Chapter 1 - 1: Prof. Joseph Wilfred Dela Cruz
Professor
Corpus, Kathlene M.
Students
INFORMATION SECURITY
Outline
• Security in practice
• Models for data security
• Attacks
• Defense in depth
SECURITY IN PRACTICE
In 2018, 100 complaints with a combined reported loss of $100M. In the Payroll
Diversion scam.
53.92% higher.
Critical Infrastructure areas
• Telecommunications
• Electrical power systems
• Water supply systems
• Gas and oil pipelines
• Transportation
• Government services
• Emergency services
• Banking and finance
Threats – examples
Confidentiality
Availability
Integrity
o Authentication
o Authorization
o Non- repudiation
Confidentiality Refers to our ability to protect our data from those who are
not authorized to view it.
• Confidentiality
• Availability
• Integrity
• Possession
• Authenticity
• Utility
Types of Attacks
Confidentiality – interception
Interruption Cause our assets to become unusable or unavailable for our use,
on a temporary or permanent basis. Attacks often affect availability but can be
an attack on integrity as well.
Vulnerabilities Weaknesses that can be used to harm us. Holes that can be
exploited by threats in order to cause us harm.
Controls Physical – Controls that protect the physical environment in which our
systems sit, or where out data is stored.
Logical Technical controls, are those that protect the systems, networks, and
environments that process, transmit, and store our data. Include items such as
passwords, encryption, logical access controls, firewalls, and intrusion detection
systems.
Defense in Depth
• External Network
• Internal Network
• Host
• Application
• Data
Defense in each Layer
• External Network
o DMZ
o VPN
o Logging
o Auditing
o Penetration Testing
o Vulnerability Analysis
• Network Perimeter
o Firewalls
o Proxy
o Logging
o Stateful Packet Inspection
o Auditing
o Penetration Testing
o Vulnerability Analysis
• Internal Network
o IDS
o IPS
o Logging
o Auditing
o Penetration Testing
o Vulnerability Analysis
• Host
o Authentication
o Antivirus
o Firewalls
o IDS
o IPS
o Password Hashing
o Logging
o Auditing
o Penetration Testing
o Vulnerability Analysis
• Application
o SSO
o Content Filtering
o Data Validation
o Auditing
o Penetration Testing
o Vulnerability Analysis
• Data
o Encryption
o Access Controls
o Backup
o Penetration Testing
o Vulnerability Analysis