8 Cyber Security
8 Cyber Security
Communication
Technologies (ICT)
Cybersecurity
Lecture 8
• Last week: Networks and Telecommunications:
• End devices, data transmission devices, data transmission
medium. Types of networks. Stack protocols: TCP/IP, OSI. IP
addressing. Local and global networks. Wired and wireless
networking technologies. DHCP. Technologies of connection to
the Internet. Telecommunication technologies
• Overview of Today’s Lecture
• Threats to information security and their classification
• Standards and specifications in the field of information security
• Measures and means of information protection
• Electronic digital signature. Encryption
• Malicious programs. Anti-virus programs
• Archivers
2
Objectives
• Understand the definition of information security
• Comprehend the history of computer security and
how it evolved into information security
• Understand the key terms and concepts of
information security
• Outline the phases of the security systems
development life cycle
• Understand the roles of professionals involved in
information security within an organization
3
Introduction
4
What is a Cyber Security?
‘Cybersecurity is the body of technologies, processes
and practices designed to protect networks,
computers, programs and data from attack, damage
or unauthorized’
http://whatis.techtarget.com/definition/cybersecurity
5
Cybersecurity
• Ensuring cybersecurity requires coordinated efforts
throughout an information system
• Elements of cybersecurity include:
Application security
Information security
Network security
Disaster recovery / business continuity planning
Operational security
End-user education
6
What is a Cyber Crime?
9
VS Graph - two sides of the same coin
Cyb u ri ty
e r S ec
r Cr e
ime Cyb
Cyber Crime
Cyber Security
11
What Is Security?
14
Components of an Information System
15
necessary to use information as a resource in the organization
Figure 5
Hardware
Software
People
Procedures
Data
Components of an Information System
16
Key Information Security Concepts
17
18
CNSS Security Model (cont’d.)
C.I.A. triangle
–Confidentiality, integrity, and availability
–Has expanded into a more comprehensive list
of critical characteristics of information
Exp
a nd
incl ed to
ud e Identification
Authentication
Authorization
Privacy
Accountability
22
Confidentiality
23
Integrity
24
Availability
25
Critical Characteristics of
Information
• The value of information comes from the
characteristics it possesses:
• Availability
• Accuracy
• Authenticity (originality)
• Confidentiality
• Integrity
• Utility
• Possession
26
Identification and Authentication
Identification
–An information system possesses the characteristic of
identification when it is able to recognize individual users
–Identification and authentication are essential to establishing
the level of access or authorization that an individual is
granted
Authentication
–Occurs when a control proves that a user possesses the
identity that he or she claims
27
Authorization
28
Privacy
29
Components of an Information
System
• Information System (IS) is entire set of software,
hardware, data, people, procedures, and networks
necessary to use information as a resource in the
organization
30
Securing Components
31
Figure 1-5 – Subject and Object
of Attack
32
Figure 5
Hardware
Software
People
Procedures
Data
Components of an Information System
33
Figure 6
Internet
35
Figure 7
Security
Access
Security
Functional Usability
ity
37
Balancing Information Security and Access
38
Figure 1-6 – Balancing Security
Balancing
and AccessInformation Security and Access
39
Principles of Information Security
Management
http://csrc.nist.gov/publications/PubsTC.html
40
Approaches to Information Security
Implementation: Bottom-Up Approach
41
What is Encryption ?
Encryption is the process of converting messages,
information, or data into a form unreadable by anyone
except the intended recipient. As shown in the figure
below, Encrypted data must be deciphered, or
decrypted, before it can be read by the recipient
43
Biometrics Devices
45
Biometrics Devices
47
Antivirus software
• Antivirus or anti-virus software (often abbreviated
as AV), sometimes known as anti-malware
software, is computer software used to prevent,
detect and remove malicious software.[1]
• Antivirus software was originally developed to
detect and remove computer viruses, hence the
name.
• However, with the proliferation of other kinds of
malware, antivirus software started to provide
protection from other computer threats.
https://en.wikipedia.org/wiki/Antivirus_software
48
The Best Antivirus Protection of
2019
http://www.pcmag.com/article2/0,2817,2372364,00.asp 49
REFERENCES
Authoritative Security Alert Information
• securityresponse.symantec.com/ (Symantec)
• www.microsoft.com/security
(Microsoft)
• www.apple.com/support/security/
(Apple)
50
Authoritative Anti-Virus Organizations
• www.cert.org
(Computer Emergency Response Team-CMU)
• www.ciac.org/ciac
(CIAC-Department of Energy)
• www.sans.org/aboutsans.php
(Server and Network Security)
• www.first.org
(Forum of Incident Response and Security
Teams)
• www.cirt.rutgers.edu 51
Authoritative Free Public Anti-Virus
Removal Tool Information
• securityresponse.symantec.com/avcenter/to
ols.list.html
• vil.nai.com/vil/averttools.asp
• mssg.rutgers.edu/documentation/viruses
(Rutgers)