Topic 6 Data Security Slides
Topic 6 Data Security Slides
Introduction
Content
• Data security concepts
• Threats and controls
• System vulnerability and abuse;
• System integrity;
• Security Controls;
• Disaster recovery and business continuity
planning;
• Data backup and restoration procedures
• Risk assessment;
• Risk mitigation strategies.
• Business value of data security
Intended Learning
Outcomes
• After reading this chapter, you will be
able to answer the following questions:
1. Why are information systems vulnerable to
destruction, error, and abuse?
2. What is the business value of security and
control?
3. What are the components of an organizational
framework for security and control?
4. What are the most important tools and
technologies for safeguarding information
resources?
Introduction
• Business assets ( resources
Value)
• System Vulnerability ( weak points
Threat Targets)
• System Security ( Shields)
• Database
• Internet System • Antivirus
Business System • Firewall
Assets • Network Vulnerability
• Wifi Securit
• Password • Security
y team
System Vulnerability
Data Threats
6
Data Threats
7
Forms of Computer/Cyber Crimes
Examples of Data Threats
Shapes of Cyber Crime
Here are some of the different ways cybercrime can take shape:
• Theft of personal data/Identity theft
• Copyright infringement
• Fraud/Click fraud
• Child pornography
• Cyberstalking
• Physical theft of ICT equipment
• Bullying/Cyberbullying
or cyberharassment
• Hacking
• Cracking
• Spoofing
• Social engineering
• Unethical internal employees
• Outsiders
9
Hacking
• Hacking is identifying weakness in
computer systems or networks to exploit
its weaknesses to gain access.
• This is done by hackers who can be
referred to as a White hat or a Black
hat.
– White hat: Persons who do hacking for good
reasons.
– Black hat: Person who do hacking with
malicious intentions.
10
Ethical Hacking
• Ethical hacking is also done by hackers but they
are done legally for checking systems and
software security.
• They try to find out the mistakes done by a
software developer mainly in security section of
networking, websites and software.
• They are used to develop the security system.
Ethical hackers are popularly called as White
hats. They are the persons who protect us from
black hats.
11
Cracking
12
Spoofing
• Spoofing
– Involves a cybercriminal
masquerading as a trusted
entity or device to steal
information
Sender Spoofing
Receiver Spoofing
Cont’
• Sniffing
A sniffer is a type of
eavesdropping program that
monitors information
traveling over a network.
Sniffers enable hackers to
steal proprietary information
from anywhere on a
network, including e-mail
messages, company files,
and
confidential reports.
Denial of Service
Attack
DOS
In a denial-of-service (DoS) attack, hackers
flood a network server or Web server with
many thousands of false communications or
requests for services to crash the network.
17
Outsiders
Service Providers
Service providers involved in storing the data of
companies on their servers can lose, destroy or
steal valuable data. Loss of data may be
intentional or accidental.
External individuals
External individuals can also gain access to a
computer or network and steal, damage and
delete the data. As indicated in the previous
section these individuals are often referred to as
hackers.
18
Social Engineering
20
Social Engineering
Techniques/Methods
1. Phone calls
The attacker may impersonate a person of authority, a person representing a
person of authority or a service provider to extract information from an
unsuspecting user. For example, a person claiming to be the CEO of the
company calls someone on the helpdesk, requesting for his password, which
he claims to have forgotten.
2. Phishing
A type of social engineering attack where the attacker sends an e- mail that
appears to come from a legitimate source (for example, a bank) and includes
links to fraudulent web pages which are made to look very similar to
legitimate web pages. The e-mail usually requests for verification of
information, sometimes warning of dire consequences if the recipient fails to
comply.
3. Shoulder surfing
This involves watching someone use his/her computer from “over his/her
shoulder” to get sensitive information such as username and password or PIN
numbers in an ATM booth or POS.
21
Social Engineering
Techniques/Methods
4 Pharming
• Pharming involves stealing personal
information from users by secretly
redirecting them to bad sites
• Phishing attempts to capture personal information
by getting users to click and visit a fake website
whilst pharming redirects users to false websites
without them even knowing it.
22
Pharming
23
Identity Theft
1. Information diving
Also known as Dumpster Diving, it is a method of obtaining personal or
private information by digging through a dumpster or trash bin for discarded
documents or material such as utility bills or credit card statements.
2. Skimming
Identity thieves use skimming as a method of capturing a victim’s personal
data by using a small electronic device. A skimmer is a device that is usually
attached to an ATM machine’s card slot. A victim may unwittingly slide his
card into the skimmer, which then reads and stores all the information from
the card’s magnetic strip.
3. Pretexting
This involves creating and using an invented scenario (the pretext) to
engage a targeted victim. The pretext increases the chance the victim will
reveal information or perform actions that would be unlikely in ordinary
circumstances – for example, someone pretending to be from a company
that provides you with a service might persuade you to share your bank
account details with them.
25
Malware
26
Common Malware
Trojan Horse
• A non-self-replicating malware that pretends to be
a harmless application.
• It secretly places illegal, destructive instructions in
the middle of a computer program. Once the
program is run, the Trojan becomes active. Trojans
can delete, block, modify or copy data.
• They can also disrupt the performance of a
computer or a network. Trojans typically enter a
computer system attached to a free game or other
utility. Unlike viruses, Trojans do not replicate
themselves.
27
Common Malware
Rootkit.
• This is another type of malware that is activated
each time a computer system boots (loads) up
and enables continued access to computers or
devices while hiding their presence.
• Rootkits are difficult to detect because they are
activated before the operating system (e.g. MS
Windows) has completely booted up.
• A rootkit often allows the installation of hidden
files, hidden processes and hidden user
accounts in the operating system of a computer.
28
Normal Malware
Backdoor.
• A backdoor is a method of bypassing normal
authentication in an attempt to remain undetected.
This is usually done in an attempt to secure remote
access to the computer.
• Backdoors are built into a software by the original
programmer, who can gain access to the computer
by entering a code locally or remotely.
• Typically programmers install a backdoor so that they
can access a program for troubleshooting purposes.
• However, hackers often use back doors that they
detect or install themselves to enter a computer
system.
29
Infectious Malware
Virus
• Malware that can replicate when triggered by a
human action and cause damage to a computer.
• A virus cannot be spread without human action.
Viruses are usually spread by sharing infected files
as email attachments or downloaded from websites.
• Virus attaches itself to a program or file and
spreads from one computer to another, leaving
infections as it travels.
• Almost all viruses are attached to an executable
(.exe) file.
30
Infectious Malware
Worm
• Self-replicating malware that uses a computer
network to send copies of itself to other computers.
• Worms spread from computer to computer, but
unlike viruses, worms are able to infect computer
systems without intervention from computer users.
For example, a worm can send copies of itself to all
contacts in an email address book.
• The worm replicates again and sends itself out to
everyone listed in each of the receiver's address.
Typically worms slow down computer systems and
networks.
31
Data theft
Malware
Adware:
• A software application that automatically displays
advertising banners while the program is running.
• Most common when you use freeware Software.
• The advertisements disappear when users stop running
the freeware software.
• Some freeware applications may contain adware which
tracks the Internet surfing habits of users and pass this
on to third parties, without the user's authorization or
knowledge.
• The users will then receive other advertisements that are
targeted to their Internet browsing habits etc. When the
adware becomes intrusive like this it is considered as
Spyware.
32
Data theft Malware
Spyware
• A program that secretly installs itself on computers and
collects information about users without their knowledge.
• Spyware programs can collect various types of personal
information, such as Internet surfing habits and sites that
have been visited.
Botnet
• A group of computers connected together for malicious
purposes.
• Each computer in a botnet is called a bot.
• These bots form a network of compromised computers
used to transmit malware or spam, or to launch attacks.
• Botnet attacks slow down a computer network or a
website.
33
Data theft Malware
Keystroke logging
• A program that allows the user to monitor what another
user types into a device.
• It involves recording consecutive key strokes on a
keyboard.
• Sensitive information such as usernames and passwords
that are keyed in the computer may be stolen through
such programs.
Dialer
• A is a program that causes the computer to dial
premium (high rate) telephone numbers without the
user’s knowledge or consent.
• This will result in high telephone bills.
• This is possible only if users are using a dial-up modem.
34
Value of Information
35
Value of Information
Protecting Commercially Sensitive Information
• Companies protect commercially sensitive
information such as client details, data about their
products and financial information.
• Companies safeguard details about their clients
because of data protection obligations and also to
safeguard their commercial interests. GDPR
36
Protecting Valuable Information
37
Secure Data
Management Practices
39
Correct Data Disposal
41
Protection Against Malware
43
Antivirus Protection
44
Antivirus Protection
45
Use of Virtual Private
Network (VPN)
• VPN is a technology that creates a safe and encrypted
connection over a less secure network, such as the
internet.
• VPN technology was developed as a way to allow
remote users and branch offices to securely access
corporate applications and other resources.
• To ensure safety, data travels through secure tunnels
and VPN users must use authentication methods
including passwords, tokens and other unique
identification methods to gain access to the VPN.
46
Virtual Private Network
(VPN)
48
Firewalls
56
WiFi Intrusion/Attack
Example
SSID Sniffing
Protecting Wireless
Networks using
Encryption
Several types of wireless network encryption are available:
• Wired Equivalent Privacy (WEP) is the oldest and least secure
wireless network encryption. This is used for hardware (routers)
that do not support Wi-Fi Protected Access.
• Wi-Fi Protected Access (WPA/WPA2) is a security standard to
secure computers connected to a Wi-Fi network. WPA/WPA2 is
more secure than the WEP. Network encryption is set through the
router’s/modem’s admin interface. This will generate a network
encryption key that will be used by each computer to connect to
the wireless network.
• A MAC (Media Access Control) address, sometimes referred to
as a hardware address or physical address, is an network interface
card (NIC) identification code that is assigned to any computer or
device (including printers) that has built-in networking capability
58
Using Biometric
Security
• This is a security mechanism that uses information about
the physical characteristics of a person to verify the
person’s identity and then provides access to a computer
network.
• Biometric security systems store human body
characteristics that do not change over an individual's
lifetime. e.g.
– Fingerprints
– eye texture
– voice
– hand patterns
– facial recognition
59
Advantages of Using
Biometric Security
• Biometrics are faster to capture thus saving registration time
• Better Security, Decreased Fraud
Unlike PINs and security questions, which can be more easily compromised, voice
biometrics ensures that the person calling is indeed who they say they are. Voice
biometrics is also much less susceptible to fraud, making it an ideal method for
validating callers in a contact center.
• Improved Customer Experience
With voice biometrics, callers no longer need to provide passcodes or PINs or provide
answers to challenge questions to verify their identity. Once a customer is enrolled, his
or her voiceprint can be leveraged across all of your company’s support channels
• Reduced Costs
Voice biometrics solutions can save costs by reducing the steps and time involved in the
user verification process.
• Non-transferrable
Voice biometrics ensures that every user has access to a unique set of biometrics unlike
PINs and passwords which can be shared.
• Spoof-proof
Voice biometrics are near-impossible to replicate with current technology. They are hard
to fake or steal.
60
Disadvantages of
Using Biometric
Security
• Costly to setup
Significant investment needed in biometrics for security
• Still prone to Data breaches
Biometric databases can still be hacked
• Privacy and Tracking concerns
Biometric devices like facial recognition systems can limit
privacy for users
• Bias
Machine learning and algorithms must be very advanced to
minimize biometric demographic bias
• False positives and inaccuracy
False rejects and false accepts can still occur preventing
select users from accessing systems
61
Browsing on Secure
Websites
65
Use of One-Time
Password to
authenticate
transactions
• This is a type of password that is valid
for only one use.
• It is a secure way to provide access to
an application or perform a transaction
only one time.
• The password becomes invalid after it
has been used and cannot be used
again.
66
Cookies
68
Characteristics of Information Security
Characteristics of
Information Security
1.Confidentiality
2.Integrity
3.Availability
4.(Non-repudiation)
70
Characteristics of
Information Security
The policies for information security within an
organization are based on these characteristics:
1. Confidentiality:
• A set of rules that limits access to information.
• Confidentiality prevents sensitive information
from reaching the wrong people, while making
sure that the right people can get it.
• Some methods used to achive confidentiality
include data encryption, passwords, two-
factor authentication and biometric
verification.
71
Characteristics of
Information Security
2. Integrity
• This is the assurance that the information is trustworthy and
accurate.
• Integrity involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle.
• Data must not be changed whilst being transmitted.
• Steps must be taken to ensure that data cannot be altered by
unauthorized people.
• In addition, processes must be in place to detect any changes
in data that might occur as a result of computer failure (e.g.
server crash).
• Backup copies of data must be available to restore data when
this is damaged, changed or lost.
72
Characteristics of
Information Security
3. Availability of information
• This refers to ensuring that authorized people are able to
access the information when needed.
• Information is unavailable when it is lost, or when access to it
is denied or delayed.
• For example, information on a website may not be readily
available to users because the web server is under denial-of-
service attack.
• Measures to ensure that information is available include
regular maintenance of hardware, implementing emergency
backup power (e.g. uninterruptible power supply &
generators), keeping off-site backup of data, providing
adequate communications bandwidth, guarding against
denial-of-service (DoS) attacks.
73
Characteristics of
Information Security
4. Non-repudiation
• This refers to ensuring that actions are not denied by the
actors on digital platforms.
74
Protecting Yourself
Online
• Use appropriate privacy settings on social networking
sites to limit access to your information, pictures etc.
• Be careful how much information you divulge about
yourself on social networking sites.
• Avoid posting comments and pictures which embarrass
you if seen by family members, colleagues, students,
and your present or future employer.
• Posting particular messages on walls of social
networking sites may not always be appropriate.
• Avoid posting sensitive information including when you
plan to be away from home, confidential data about your
company etc. Use private messaging when appropriate.
75
Business Value of Data Security
Class objectives
•
Business Value of Security and Control
•
Security controls
•
Risk assessment and management
Business Value of Security
and Controls
Logical Controls
• Software safeguards for an organization's systems,
including user identification and password access,
authenticating, access rights and authority levels.
These measures are to ensure that only authorized
users are able to perform actions or access
information in a network or a workstation.
Application controls
These are specific controls unique to each computer
application.
They include both automated and manual procedures
They ensure that only authorized data are completely
and accurately processed by that application. They
Include:
vi. Making sure that the information and systems used to support organizational
vii. Confirming that trained personnel are complying with related information
Authentication
Authorization
Access control lists
Logging
Session controls
Disaster Recovery and
Business Continuity Planning
Disaster Recovery Planning
Network Security
Symmetric keys
Firewall Techniques Asymmetric keys
Packet filtering
Stateful Inspection
Digital Certificates
Network Address
Certificate Authority
Translation
Proxy services
Intrusion Detection
Systems
Ensuring System
Availability
•
Online Transaction This can be achieved
downtime.
Security Issues For
Cloud Computing And
The Mobile Digital
Platform
• Responsibility over corporate data remains with
the client and not the cloud service provider.
• The client should therefore ensure that the cloud
service provider can guarantee data security.
• This can be done through:
– Finding out how the cloud provider segregates their
corporate data from those of other companies.
– asking for proof that encryption mechanisms are
sound
– knowing how the cloud provider will respond if a
disaster strikes, whether the provider will be able to
completely restore your data, and how long this
should take.
Mobile Device
Security
• Mobile computing devices can be secured through:
– tools to authorize all devices in use;
– maintaining accurate inventory records on all
mobile devices, users, and applications;
– to control updates to applications; and to lock
down lost devices so they can’t be compromised.
– Firms should develop guidelines stipulating
approved mobile platforms and software
applications as well as the required software and
procedures
– Companies will need to ensure that all
smartphones are up to date with the latest
security patches and antivirus/anti-spam
software,
– encrypting communication whenever possible.
Questions
Any Questions?