10 Basic of Information Security12
10 Basic of Information Security12
What Is Security?
“The quality or state of being secure--to be free
from danger”
To be protected from adversaries
A successful organization should have multiple
layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
What Is Information Security?
The protection of information and its critical
elements, including the systems and hardware that
use, store, and transmit that information
Tools, such as policy, awareness, training,
education, and technology are necessary
The C.I.A. triangle was the standard based on
confidentiality, integrity, and availability
The C.I.A. triangle has expanded into a list of
critical characteristics of information
Critical Characteristics Of Information
The value of information comes from the
characteristics it possesses.
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
Components of an Information System
Ploys
Pop-Ups
Scams
Spam
DID YOU KNOW?
In 1980 a computer cracked a 3-character
password within one minute.
A computer program
File corruption
Visual effects
Pop-Ups
Computer crashes
BIOLOGICAL METAPHORS
1. Bacterial Infection Model:
•Single bacterium
•Replication
•Dispersal
security
Ease of use is more
important than security
HACKER MOTIVATIONS
Display of dominance
Misdirected creativity
Embezzlement, greed
NETWORKS SECURITY
Open Closed
Communication Communication
w ill
I SP
My ct me?
e
prot
AND A FEW MORE….
Igot this disc from my (mother, boss, friend) so it
must be okay
You cannot get a virus by opening an attachment
from someone you know
Confirm:
that desktops have the latest anti-virus updates
BACK IT UP
Offline copies: Grandfather/father/son
(monthly/weekly/daily)
NIGERIA
Money
scam
Pyramid
$800 FROM MICROSOFT scheme
STOPPING THE TROJAN HORSE
The Horse must be “invited in” ….
Computer companies:
Usually refer you to an anti-virus vendor
are not in the anti-virus business
Points to “bad” IP
Address!
Definitions
Keystroke Logging:
Keystroke logging (often called keylogging) is a
diagnostic used in software development that captures
the user's keystrokes
Useful to determine sources of error in computer programs
Used to measure employee productivity on certain clerical tasks
Highly useful for law enforcement and espionage
Obtain passwords or encryption keys and thus bypassing other
security measures
Widely available on the internet and can be used by
anyone for the same purposes
Definitions
Keystroke Logging:
Can be achieved by both hardware and software means
Hardware key loggers are commercially available
devices which come in three types:
Inline devices that are attached to the keyboard cable
Devices installed inside standard keyboards
Keyboards that contain the key logger already built-in
Writing software applications for keylogging is trivial,
and like any computer program can be distributed as
malware (virus, trojan, etc.)
Keylogger Example
Potential/Growing Issues:
Liability for damage caused by bot-nets
Loss of corporate confidential information (financials, personnel)
Electronic Blackmail
Viruses, Bots, and Phish,
Oh My!
What Can We Do?
Security Assessment
Identify areas of risk
Identify potential for security breaches, collapses
Identify steps to mitigate
Security Application
Expert knowledge (train, hire, other)
Multi-layered Approach (there is no single solution)
Policies and Procedures
Viruses, Bots, and Phish,
Oh My!
What Can We Do?
Security Awareness
Not just for the geeks!
Security Training at all levels (external and/or internal)
Continuing education and awareness – not a one-time shot!
Make it part of the culture
Types of Security?
The quality or state of being secure—to be free from
danger”
A successful organization should have multiple layers of
security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
Characteristics of Information
The value of information comes from the characteristics it
possesses:
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
Firewalls
A software or hardware component that restricts network
communication between two computers or networks.
In buildings, a firewall is a fireproof wall that restricts the spread
of a fire.
Network firewall prevents threats from spreading from one
network to another
Prevent specific types of information from moving between the
outside world (untrusted networks) and the inside world (trusted
networks)
The firewall may be a separate computer system, a software
service running on an existing router all server, or a separate
network containing a number of supporting devices.
Internet Firewalls
The Internet Protocol Stack
What Firewalls do
Protects the resources of an internal network.
- Restrict external access.
- Log Network activities.
-Intrusion detection
-DoS
- Act as intermediary
- Centralized Security Management
Carefully administer one firewall to control internet traffic of
many machines.
Internal machines can be administered with less care.