Security+ Guide To Network Security Fundamentals, Fifth Edition
Security+ Guide To Network Security Fundamentals, Fifth Edition
Security Fundamentals,
Fifth Edition
Chapter 1
INTRODUCTION TO SECURITY
Objectives
Describe the challenges of securing information
Define information security and explain why it is
important
Identify the types of attackers that are common
today
List the basic steps of an attack
Describe the five basic principles of defense
CompTIA Security+
CompTIA Security+ certification is widelyrecognized and highly respected vendor-neutral
credential
Requires passing current certification exam SY0401
Tests knowledge and skills required to: identify
risks; provide infrastructure, application, operational
and information security; apply security controls to
maintain confidentiality, integrity, and availability;
and identify appropriate technologies and products
Security+ Guide to Network Security Fundamentals, Fifth Edition
10
What is security
What information security is
Information security terminology
Why it is important
11
Understanding Security
Security is defined as either the process (how to
achieve security) or the goal (what it means to have
security).
In reality security is both: it is the goal to be free from
danger as well as the process that achieves that
freedom
Security is the necessary steps to protect a person or
property from harm.
This harm may come from one of two sources:
Direct action
Indirect and unintentional action
Security+ Guide to Network Security Fundamentals, Fifth Edition
12
13
Relationship Security-Convenience
(Figure 1-2)
14
15
Three Protections
Information Provides value to people and
organizations
Three protections that must be extended over
information (CIA):
Confidentiality: Ensures only authorized parties can
view information
Integrity: Ensures information not altered
Availability: Ensures information accessible when
needed to authorized parties
16
AAA
Three additional protections that must be extended
over information (AAA):
Authentication: Ensures that the individual is who
she claims to be (the authentic or genuine person)
and not an imposter
Authorization: Providing permission or approval to
specific technology resources
Accounting: Provides tracking of events
17
Securing Devices
Devices - Information security involves more than
protecting the information itself
Information is:
Stored on computer hardware
Manipulated by software
Transmitted by communications
18
Three Entities
Entities - Information security is achieved through a
process that is a combination of three entities
Information and the hardware, software, and
communications are protected in three layers:
Products
People
Policies and procedures
19
20
21
22
23
24
25
26
27
28
Risk avoidance
Acceptance
Mitigation
Deterrence
Transference
29
30
Identity Theft
Thwarting identity theft - Using anothers personal
information in unauthorized manner for financial
gain
Example:
31
32
33
Foiling Cyberterrorism
Foiling cyberterrorism - Premeditated, politically
motivated attacks
Targets are banking, military, power plants, air
traffic control centers
Designed to:
Cause panic
Provoke violence
Result in financial catastrophe
34
Cyberterrorism Targets
Potential cyberterrorism targets
Banking
Military
Energy (power plants)
Transportation (air traffic control centers)
Water systems
35
36
Cybercrimminals
Cybercrimminals - Generic term describes
individuals who launch attacks against other users
and their computers
A loose network of attackers, identity thieves, and
financial fraudsters who are highly motivated, less
risk-averse, well-funded, and tenacious
Instead of attacking a computer to show off their
technology skills (fame), cybercriminals have a
more focused goal of financial gain (fortune):
cybercriminals steal information or launch attacks to
generate income
Security+ Guide to Network Security Fundamentals, Fifth Edition
37
Script Kiddies
Script kiddies - Unskilled users with goal to break into
computers to create damage
38
Brokers
Brokers - Individuals who uncover vulnerabilities do not
report it to the software vendor but instead sell them to
the highest bidder
These attackers sell their knowledge of a vulnerability
to other attackers or even governments
Buyers are generally willing to pay a high price because
this vulnerability is unknown
39
Insiders
Insiders - Employees, contractors, and business
partners who steal from employer
Most malicious insider attacks consist of the
sabotage or theft of intellectual property
Offenders are usually employees who actually
believe that the accumulated data is owned by
them and not the organization
Others are employees have been pressured into
stealing from their employer through blackmail or
the threat of violence
Security+ Guide to Network Security Fundamentals, Fifth Edition
40
Cyberterrorists
Cyberterrorists Attackers who have ideological
motivation
Attacking because of their principles and beliefs
Cyberterrorists can be inactive for several years
and then suddenly strike in a new way
Targets may include a small group of computers or
networks that can affect the largest number of
users
Example: computers that control the electrical
power grid of a state or region
Security+ Guide to Network Security Fundamentals, Fifth Edition
41
Hactivists
Hactivists Another group motivated by ideology
Unlike cyberterrorists who launch attacks against
foreign nations to incite panic, hactivists generally
not as well-defined.
Attacks can involve breaking into a website and
changing the contents on the site as a means of
making a political statement against those who
oppose their beliefs
Other attacks can be retaliatory
42
State-Sponsored Attackers
State-sponsored attackers Attackers supported
by governments for launching computer attacks
against their foes
Attackers target foreign governments or even
citizens of the government who are considered
hostile or threatening
43
44
45
46
Layering
Limiting
Diversity
Obscurity
Simplicity
47
Layering
Information security must be created in layers
Single defense mechanism may be easy to
circumvent
Unlikely that attacker can break through all defense
layers
Layered security approach
Can be useful in resisting a variety of attacks
Provides the most comprehensive protection
48
Limiting
Limiting access to information reduces the threat
against it
Only those who must use data granted access
Amount of access limited to what that person
needs to know
Methods of limiting access
Technology (file permissions)
Procedural (prohibiting document removal from
premises)
49
Diversity
Closely related to layering
Layers must be different (diverse)
If attackers penetrate one layer then same
techniques unsuccessful in breaking through other
layers
Breaching one security layer does not compromise
the whole system
Example of diversity is using security products from
different manufacturers
Security+ Guide to Network Security Fundamentals, Fifth Edition
50
Obscurity
Obscuring inside details to outsiders
Example: not revealing details
Type of computer
Operating system version
Brand of software used
51