Chapt-1 Netsec&mgt
Chapt-1 Netsec&mgt
Chapter 1
Security?
Information Security?
Cybersecurity?
Network Security?
Enterprise Security
Risk Management
Security threats &
Counter Measures
2
What is Security?
• Definitions:
– “The quality or state of being safe or free from danger”
_Information security is a “well-informed sense of assurance that the information
risks and controls are in balance.”
• Successful companies should have multiple security “tiers”:
– Physical security( E.g. CCTV cameras, motion sensors,
intruder alarms and smart alerting
technology like AI analytics, etc.)
– Personal security(E.g. Username · Passwords · Bank account
information · Credit card information · SSN)
– Operations security (E.g. Info. Classification · Info. Sec. Awareness Training ·
Encryption · Conversation Policies, secure Location, legal,
reputation, etc)
– Communications security( E.g. end-to end security)
– Network security
3
– Information security
4
Balancing Information Security and Access
5
Security vs. Access
Security
• CIO: Two-factor Access
authentication is necessary to • Student 1: I forgot my
protect private data authentication device
• Auditor: We need to comply • Student 2: It’s a hassle
with laws/regulations
6
What is Information Security?
7
Critical Characteristics of Information
10
What is Network Security?
11
What is Enterprise Security?
• ES is about building systems to remain reliable in the face of malice, error, or
mischance.
• It involves the various technologies, tactics, and processes used to protect
digital assets against unauthorized use, abuse, or infiltration by threat actors.
• ES requires cross-disciplinary expertise, ranging from cryptography and
computer security through hardware tamper-resistance and formal methods to a
knowledge of economics, applied psychology, organizations and the law.
• ES is focused on data center, networking, and web server operations in
practice, but technically begins with human resources.
• Their failure may endanger human life and the environment (as with nuclear
safety and control systems).
12
Enterprise Security Analysis Framework
17
18
19
Main Motives of Attackers:
20
Risk Management
• Risk: Probability that “something bad” happens times
expected damage to the organization
• Risk management: process of identifying and
controlling risks facing an organization
– Risk identification: process of examining
an org.’s current IT security situation
– Risk control: applying controls to reduce
risks to org.’s data and information systems
21
Overview: Risk Management
“If you know the enemy and know yourself, you need not
fear the result of a hundred battles. If you know yourself
but not the enemy, for every victory gained you will also
suffer a defeat. If you know neither the enemy nor
yourself, you will succumb in every battle.” – Sun Tzu,The
Art of War
This entails:
– Knowing yourself: identifying and understanding existing
information, systems in organization
– Knowing the enemy: identifying and understanding threats
facing org.
22
Risk Identification
• Assets: Anything that “has value” to organization
– Includes people, data, computers, …
– Attackers will target these (for various reasons)
• Risk management: identifying org.’s assets and
threats to them (including vulnerabilities)
• Risk identification: need to specify org.’s assets, assessing
their value
23
Identifying and Valuing Assets
26
Information Classification
27
Information Valuation
28
Data Classification and Management
• Military classification:
– Top Secret
– Secret
– Classified/Internal use only
– Public
• Elaborate schemes: overkill for some orgs?
29
Threat Identification
30
Sec. Threat Category Examples
Acts of human error or failure Accidents, employee mistakes
Intellectual property compromise Piracy, copyright infringement
Deliberate espionage or trespass Unauthorized access, data collection
Deliberate information extortion Blackmail of info. disclosure
Deliberate sabotage or vandalism Destruction of systems or info.
Deliberate theft Illegally taking equipment or info.
Deliberate software attacks Viruses, worms, denial of service
Forces of nature Fires, floods, earthquakes
Deviations in service from providers Power and Internet provider issues
Technological hardware failure Equipment failure
Technological software failures Bugs, code problems, unknown
loopholes
Technological obsolescence Antiquated or outdated technologies
31
Vulnerability Identification
32
Risk Control
33
Avoidance
34
Transference
35
Mitigation
• Attempts to reduce impact of vulnerability exploitation
via planning, preparation
• Approach includes three types of plans:
– Incident Response Plan (IRP): What actions to take if there’s
an incident in progress?
– Disaster Recovery Plan (DRP): Most common procedure
– Business Continuity Plan (BCP): What to do if catastrophe
strikes the organization?
36
Acceptance
• Doing nothing to protect a vulnerability, accepting outcome of its
exploitation
• Valid only when some function, service, information, or asset
does not justify protection cost
• Risk appetite: degree to which organization will accept risk as
trade-off vs. cost of controls
37
Selecting a Risk Control Strategy
38
Risk Handling Decision Points
39
Risk Control Cycle
40
Vulnerability, Threat, & Attack
• Vulnerability: Weakness or fault that can lead to an exposure.
• Threat: Generic term for objects, people who pose potential danger to
assets (via attacks)
_Management must be informed of the different threats
facing the organization
_By examining each threat category, management
effectively protects information through policy,education,
training, and technology controls
• Attacks: Act or action that exploits vulnerability (i.e.,an identified
weakness) in controlled system
_Accomplished by threat agent which damages or steals
organization’s information
41
Assignment
1) Select one research title, rigorously review five recent research articles published in
Scopus or Web of Science indexed journals. Identify research problems, research
materials and methods used, core research findings, research contributions, and
further research works.
i) Network Intrusion detection in Software Define Network using Machine Learning
and Deep learning.
ii) DDOS attack detection using Machine Learning and Deep learning.
iii) Ransomware attack detection using Machine Learning and Deep learning.
iv) Cross-site scripting(XSS) attack detection using Machine Learning and Deep
learning.
v) Comparative study on recent technologies for securing organizations networks.
vi) Best strategies for securing the organizations email and websites.
vii) Unified Framework for Mitigating Intentional Insider threats
viii) Developing strategies to improve energy use efficiency in IoT devices
ix) The impact of 5G technology on the development of smart city solutions.
x) The causes, consequences, and treatments of ransomware.
42
Thank You for your
Attention!
43