IT Security
IT Security
A Practical Approach
Indian Elango
1
Information Security
Concepts
2
Understanding Information Security
3
Goals of Information Security
5
Information Security Risks
6
Risks
7
Risk factors
8
Who are the Attackers?
• Nation-states
• Individual crackers
• Black hat groups
• Terror groups
• Script kiddies
9
Types of Attacks
10
Steps of an Attack
• Footprinting
• Scanning
• Escalating privileges
• Gaining the access
• Attack
• Covering Tracks
11
System Threats and Risks
• Trojan • Phishing
• Virus • Cookies
• Worms • DDos
• Spyware • Browser Hijackers
• Keylogger • Lack of Input validation
• Adware
• Backdoor
• Exploit
12
Network Vulnerabilities
• SQL injection
– Attacker sends simple text-based attacks that exploit the
syntax of the targeted interpreter
• Broken Authentication and session management
– Attacker uses leaks or flaws in the authentication or session
management functions (e.g., exposed accounts, passwords,
session IDs) to impersonate users.
• Cross Site Scripting (XSS) (CSS)
– Attacker sends textbased attack scripts that exploit the
interpreter in the browser.
13
Network Vulnerabilities contd..
• Security Misconfigurations
– Attacker accesses default accounts, unused pages, unpatched
flaws, unprotected files and directories, etc. to gain
unauthorized access to or knowledge of the system. Sensitive
data exposure
– anonymous external attackers as well as users with their own
accounts that may attempt to compromise the system.
• Cross site request forgery
– Attacker creates forged HTTP requests and tricks a victim into
submitting them via image tags, XSS, or numerous other
techniques.
• Missing functional level access control
– Anyone with network access can send your application a
request
14
Understanding Social Engineering
15
Importance of
Auditing
• IT audit is important because
• It gives assurance that the IT systems are
adequately protected
• It provides reliable information to users and
• The infrastructure is properly managed to
achieve their intended benefits
16
Infrastructure and connectivity
17
18
19
20
Network Monitoring and Defenses
21
Network Monitoring
22
Understanding IDS
23
Understanding IPS
24
Understanding Protocol Analyzers
25
Implementing a Secure Network
26
Implementing a Secure Network
27
Defining Security Baseline
Examples of Baselines
– Configurations for intrusion detection systems
– Configurations for Firewalls
– System Hardening
28
System Hardening
29
Network Hardening
30
Application Hardening
31
32
Securing Network and
Environment
33
Securing Network and Environment
34
Understanding Physical Security
35
36
Business Continuity
Planning
A set of activities, plans and procedures that enable
businesses to:
– Recover from events threatening / destroying
– Continuity of critical business operations
– Repair and replace damaged assets as soon as possible
– Minimize loss occasioned from the event
37
Disaster Recovery Planning
38
Policies, Standards, and Guidelines
39
Security Policy – Good practices
40
Security Standards
Examples of Standards
– Specific anti-virus software
– Specific access control system
– Specific firewall system
41
Security Guidelines
• Examples of Guidelines
– CoBIT™, ISO series, BS: 7799, etc
42
Cryptograph
y
43
Cryptosystems
44
Plain text and Cipher text
1. Plaintext
A message in a readable format
2. Cipher text
Message altered to be unreadable by anyone except the
intended recipients
3. Key
Sequence that controls the operation and behavior of the
cryptographic algorithm
4. Key space
Total number of possible values of keys in a crypto
algorithm
45
Encryption
The Process
Process of Encryption
46
Symmetric Cryptosystem
• Authentication
• Non repudiation
• Data integrity
47
Asymmetric Cryptosystem
Public key
Private key
Digital signature
Hashing
48
Features of Encryption
Confidentiality – No unauthorized access
Authentication – Source Validation
Data Integrity – Data not modified in transit
Non-repudiation – sender cannot deny sending the
message later.
Answers :
Confidentiality – Encryption
Authentication – Digital Certificate
Data Integrity – Hashing / Message Digest
Non-repudiation – Digital Signature
49
Cryptography Standards and Protocols
Symmetric Algorithms
DES
3DES
AES
CAST
Asymmetric Algorithms
RSA
Diffie Hellman
Elgammal
Elliptical Curve (ECC)
50
Encryption standards
51
Hash standards
• MD5
• SHA-1
• SHA-2
• HMAC
52
Digital Signature standards
53
Public-key infrastructure (PKI)
standards
54
Wireless Standards
55
Security Policies and
Procedures
56
Access Control
57
Identity
• Identity is a claim
• I am Mr.Asokan
58
Authentication
59
Security
Administration
60
Physical security management
• Emergency procedures
• Evacuation of personnel & systems
• Emergency system shut down
• Bomb / Terrorist threats
• Test of emergency procedures
61
Physical security management
62
Awareness & Education
63
64
Questions?
Indian Elango
[email protected]
65