0% found this document useful (0 votes)
37 views

Computer Security Week1

The document discusses a course on computer security and information assurance. It provides an overview of topics covered in the course including security policies, authentication, access control, and common attack and defense methods. It also outlines the intended learning outcomes, course schedule, and importance of cyber security.

Uploaded by

Marvin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Computer Security Week1

The document discusses a course on computer security and information assurance. It provides an overview of topics covered in the course including security policies, authentication, access control, and common attack and defense methods. It also outlines the intended learning outcomes, course schedule, and importance of cyber security.

Uploaded by

Marvin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 66

Computer Security and

Information Assurance
Course Description

This course is a survey of the fundamental elements of


computer security and information assurance. Topics may
include confidentiality, integrity, and availability; security
policies; authentication; access control; risk management;
threat and vulnerability assessment; common attack/defense
methods; ethical issues.
Computation of the Grades
Prelim Term 30% Midterm 30%
Attendance 20% Attendance 20%
Class Participation 30% Class Participation 20%
Final exam 30% Final exam 20%
Research Paper 20% Seminar Certificates 40%

Final Term 40%


Attendance 20%
Final exam 20%
Seminar – 60%
PROGRAM INTENDED LEARNING
OUTCOMES

• Apply knowledge of computing, science, and mathematics


appropriate to the discipline.
• Analyze complex problems, and identify and define the
computing requirements appropriate to its solution.
• Identify and analyze user needs and take them into account
in the selection, creation, evaluation and administration of
computer based systems.
• Design, implement, and evaluate computer based systems,
processes, components, or programs to meet desired needs
and requirements under various constraints.
• Integrate IT-based solutions into the user environment
effectively.
• Assist in the creation of an effective IT project plan.
• Apply knowledge through the use of current techniques,
skills, tools and practices necessary for the IT profession.
Understand best practices and standards and their applications
• Analyze the local and global impact of computing
information technology on individuals, organizations,
and society.
• Understand professional, ethical, legal, security and
social issues and responsibilities in the utilization of
information technology.
• Recognize the need for and engage in planning self-
learning and improving performance as a foundation for
continuing professional development.
Week 1-2 Principles of
Cybersecurity

Interrelated components of the computing environment


Cybersecurity models
Variation on a theme: computer security, information security,
and information assurance
Week 3-4 Security Plans
and Policies

Levels of Planning
Planning misalignment
The System Security Plan
Policy Development and Implementation
Week 5-6 Risk Management

Principles of risk
Type of risk
Risk strategies
The Risk Management Framework (RMF)
Week 7 - Security Metrics and Key
Performance Indicators (KIPS)

The challenge of security metrics


What makes a good metric
Approaches to security metrics
Week 8 Physical Security and
Environmental Events

Physical and environmental threats


Physical and environmental controls
Week 9 – Security Technology
and Cloud Security
- Quiz (min of 20 – max of 30)
LEARNING OBJECTIVES

• To students should be able to understand the technical knowledge and


skills needed to protect and defend computer systems and networks.
• To students can plan, implement, and monitor cyber security
mechanisms to help ensure the protection of information technology
assets.
Level of Security

1. PERSONAL IDENTITY – online or offl ine transaction


2. WORK IDENTITY – private or public sectors
3. GOVERNMENT IDENTITY – public sectors
Advantages of Cybersecurity Tools
1. PROTECTION OF BUSINESS
2. INCREASE PRODUCTIVITY
3. INSPIRES CUSTOMERS CONFIDENCE
4. STOPS YOUR WEBSITE FROM CRASHING
5. PROTECTION OF YOUR CUSTOMERS
Importance of Cyber Security
 The Internet allows an attacker to work from anywhere on the planet.

 Risks caused by poor security knowledge and practice:


 Identity Theft – by uses the identity of a person.
 Monetary Theft – taking money of a person without permission.
 Legal Ramifications (for yourself and your organization) – consequences
of breaking the law.
 Sanctions or termination if policies are not followed.

 According to the SANS Institute, the top vectors for vulnerabilities


available to a cyber criminal are:
 Web Browser
 IM Clients
 Web Applications
Cyber Security
• Cyber security refers to the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack,
damage, or unauthorized access.
Cyber Security is Safety
• Security: We must protect our computers and data in the same way
that we secure the doors to our homes.
• Safety: We must behave in ways that protect us against risks and
threats that come with technology.
What is a Secure System? (CIA Triad)
• Confidentiality – restrict access to
authorized individuals

• Integrity – data has not been altered


in an unauthorized manner (access
level)
Availability
• Availability – information can be
accessed and modified by authorized
individuals in an appropriate
timeframe
CIA Triad

Confidentiality

Protecting Example:
information Criminal steals
from customers’ usernames,
passwords, or credit card
unauthorized
information
access and
disclosure
CIA Triad

Integrity

Protecting
information
from
unauthorized
modification
Example:
Someone alters payroll
information or a proposed
product design.
CIA Triad
Availability
Example:
Your customers are
unable to access your
online services.
Preventing
disruption in
how
information
is accessed
Cybersecurity Motivation

- Demand money or ransom


- Damage the reputation
- Disrupting business continuity
- Create confusion
- Achieve military objective
- Just for fun
Types of Hackers

Black Hat: Criminal Hackers


A black hat hacker is a cybercriminal who breaks into computer
systems with malicious or criminal intent. Black hat hackers are
probably what you think of when you picture a typical hacker or
cybercriminal.

Motives: to profit from data breaches


Types of Hackers

White Hat: Authorized Hackers


Similar to black hat hackers, white hat hackers are cybersecurity
experts who use their skills to find vulnerabilities in organizational
networks and computer systems.
Motives: help businesses prevent cybersecurity attacks
Types of Hackers

Gray Hat: “Just for Fun” Hackers


A gray hat hacker is a cybersecurity expert who finds ways to hack
into computer networks and systems but without the malicious intent
of a black hat hacker. Typically, they engage in hacking activities for
the pure enjoyment of finding gaps in computer systems.

Motives: personal enjoyment


Types of Hackers

Green Hat: Hackers in Training


A green hat hacker is someone who is new to the hacking world but is
intently focused on increasing their cyberattack skills. They primarily
focus on gaining knowledge of how to perform cyberattacks on the
same level as their black hat counterparts.
Motives: to learn how to become an experienced hacker
Types of Hackers

Blue Hat: Authorized Software Hackers


Blue hat hackers are hired by organizations to bug-test a new software
or system network before it’s released. Their role is to find loopholes
or security vulnerabilities in the new software and remedy them before
it launches.

Motives: to identify vulnerabilities in new organizational software


before it’s released.
Types of Hackers

Red Hat: Government-Hired Hackers


Red hat hackers are hired by government agencies to spot
vulnerabilities in security systems, with a specific focus on finding
and disarming black hat hackers. They’re known to be particularly
ruthless in their hunt for black hat criminals, and typically use any
means possible to take them down.

Motives: to find and destroy black hat hackers


Types of Hackers

Script Kiddies: Amateur Hackers


Script kiddies are amateur hackers who don’t possess the same level of
skill or expertise as more advanced hackers in the field. To make up
for this, they turn to existing malware created by other hackers to
carry out their attacks.

Motives: to cause disruption


Types of Hackers

State/Nation Sponsored Hackers: International Threat Prevention


Hackers

State/nation sponsored hackers are appointed by a country’s


government to gain access to another nation’s computer systems. They
use their cybersecurity skills are used to retrieve confidential
information from other countries.

Motives: to monitor and prevent international threats


Types of Hackers

Malicious Insider: Whistleblower Hackers

Malicious insider hackers are individuals who employ a cyberattack


from within the organization they work for. Also known as
whistleblowers, their motivation for attack can vary from acting on a
personal grudge they have against someone they work for to finding
and exposing illegal activity within the organization.

Motives: to expose or exploit an organization’s confidential


information
Types of Hackers

Hacktivists: Politically Motivated Hackers


A hacktivist is someone who hacks into government networks and
systems to draw attention to a political or social cause—hence why the
name “hacktivist” is a play on the word “activist.”

Motives: to shed light on an alarming social or political cause (or to


make a political or ideological statement)
Common Attacks in Cybersecurity
1. DOS (Denial of Service) – send multiple request (to flood)
the server request.
2. Malware – virus (thru email, website, malicious website)
3. Phishing – email links
4. Man in the Middle – hacker (computer and network)
5. Cross site script attack (Pop-up message in the website)
6. Password Attack – Guessing game from the hackers
7. Eavesdropping Attack – same with Man in the Middle.
8. SQL Injection Attack - Database
How to Secure your Data
• 2-Factor Authentication
• Secure your Password
• Password Complexity
• Regular Updates
• Updated Antivirus
• Firewall (Company)
• Spam Filtering (Spam Software)
• Encryption
• Secure DNS
• Daily Backup
Threats and Vulnerabilities

 What are we protecting in and our stakeholders


information from?
Threats: Any circumstances or events that can potentially
harm an information system by destroying it, disclosing
the information stored on the system, adversely modifying
data, or making the system unavailable
Vulnerabilities:
Weakness in an information system or its
components that could be exploited.
 Phishing and
Spear- phishing
Attacks
 Social Engineering Scams
WHAT KINDS  Common Malware and
OF Ransomware
THREATS  Business Email
ARE THERE? Compromise
Fake websites that steal
data or infect devices
 And much more
Phishing
Phishing refers to the practice of creating fake emails or SMS that appear to come from
someone you trust, such as: Bank, Credit Card Company, Popular Websites
 The email/SMS will ask you to “confirm your account details or your vendor’s account
details”, and then direct you to a website that looks just like the real website, but
whose sole purpose is for steal information.
 Of course, if you enter your information, a cybercriminal could use it to steal your
identity and possible make fraudulent purchases with your money.
Example of Phishing
Social Engineering
 When attempting to steal information or a person’s
identity, a hacker will often try to trick you into giving
out sensitive information rather than breaking into your
computer.
 Social Engineering can happen:
 Over the phone
 By text message
 Instant message
 Email
Malware
 Malware = “malicious software”
 Malware is any kind of unwanted software that is installed
without your consent on your computer and other digital devices.
 Viruses, Worms, Trojan horses, Bombs, Spyware, Adware,
Ransomware are subgroups of malware.
Viruses
Avirus tries to infect a carrier, which in turn relies on the
carrier to spread the virus around.
Acomputer virus is a program that can replicate itself and
spread from one computer to another.
Bombs
 LogicBombs: is programming code that is designed to execute
or explode when a certain condition is reached.
 Most the time it goes off when a certain time is reached or a program
fails to execute. But it these bombs wait for a triggered event to
happen.
 Most common use of this is in the financial/business world.
 Most IT employees call this the disgruntled employee syndrome.
Trojans
 Trojan horse: is a program or software designed to look like a useful or
legitimate file.
 Once the program is installed and opened it steals information or deletes data.
 Trojan horses compared to other types of malware is that it usually runs only
once and then is done functioning.
 Some create back-door effects
 Another distribution of Trojans is by infecting a server that hosts websites.
 Downfall of Trojans: very reliant on the user.
Worms
 Worms and viruses get interchanged commonly in the media.
 In reality a worm is more dangerous than a virus.
 User Propagation vs. Self Propagation
 Worm is designed to replicate itself and disperse
throughout the user’s network.
 Email
Worms and Internet Worms are the two most common
worm.
Identity Theft
 Identity Theft
 Impersonation by private information
 Thief can ‘become’ the victim
 Reported incidents rising
Identity Theft
 Loss of privacy
 Personal information is stored electronically
Purchases are stored in a database
 Data is sold to other companies
 Public records on the Internet
 Internet use is monitored and logged
 None of these techniques are illegal
Ransomware

 is a type of malware that


locks and encrypts a
victim's data, files, devices
or systems, rendering them
inaccessible and unusable
until the attacker receives a
ransom payment.
Ransomware Controls

 Plan to Fail Well (Incident Response Plan)


 Know who to call!
 Training and Testing Your People
 Don’t Open that Email Link/Attachment
COVID-19 Cyber Threats
COVID-19 Cyber Threats
COVID-19 Cyber Threats
COVID-19 Cyber Threats
Cyber Crime
Cyber Crime is a generic term that refers to all criminal activities done using
the medium of communication devices, computers, mobile phones, tablets
etc. It can be categorized in three ways:
•The computer as a target – attacking the computers of others.
•The computer as a weapon- Using a computer to commit
“traditional crime” that we see in the physical world.
•The computer as an accessory- Using a computer as a “fancy filing cabinet”
to store illegal or stolen information.
Types of Cybercrime
• Phishing
• Identity Theft
• Malware
• Online Scams
• Harassment
• Piracy
• Cyberbullying
• Credit Card Theft
• Many more.
Which hat you want to wear?
Attacks today are AUTOMATED!
It’s not some dude sitting at his hacker desk all day typing out
ping commands to IP addresses via the command prompt
manually…
What does a Cyber Security Professional
look like?
What does a Cyber Security Professional
look like?
In reality…

David Ulevitch, Founder OpenDNS Katie Moussouris, Microsoft Bug Bounty creator

Eugene Kaspersky, CEO Kaspersky Labs, £1.1bn

Dr Laura Toogood, MD Digitalis Reputation


8
James Lyne, CTO, SANS
Erin Jacobs, CSO at UCB Financial Services
How We Protect Information?

 People
 Training, education, awareness, repetition

 Process
 Governance, oversight, policy, reporting

 Technology
 Firewalls, IDS/ISP, SIEM, anti-malware
 Strong passwords, Logging/monitoring
Social Engineering Best Practices
 USE YOUR SECURITY SPIDER SENSE!
 ALWAYS validate requests for
information if you’re not 100000%
sure
 Calla number YOU know
 Google it…
 ALWAYS ASK QUESTIONS!
 Is this who I think it is FOR SURE?
 Did someone mention this to me
personally, or was it discussed at a staff
meeting?
 Is this the FIRST I’m hearing about this?
Cyber Security and Privacy Starts and
Ends with Us!

Security Tips
Commit to a disciplined practice of information
security and continue to refresh yourself so you
don’t become a point of vulnerability in our
security defenses.
Ethical Hacking
ou !
k y
h a n
T

You might also like