Information Security Seminar

4,612 views
4,340 views

Published on

It is clear that information security technology has advanced much faster than
the number of people who are knowledgeable to apply it. It is even clearer that with these advancements come more difficulties in keeping networks secure from intruders, viruses and other threats.

0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,612
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
0
Comments
0
Likes
6
Embeds 0
No embeds

No notes for slide
  • Information Security is the protection of information against unauthorized access, modification, transfer, loss and destruction whether accidental or intentional.
  • 1) The Independent Hacker tends to be young and opportunistic. To him, hacking is a sport; he enjoys beating the system undetected. 2) The Disgruntled Employee is an insider. Perhaps he just got fired. Maybe he did not get the pay raise he wanted.
  • Macro Viruses – commands embedded in software infect and spread to other files viewed by that software. Worms – duplicate themselves and use communications such as email to spread. They can look at your email address book and send themselves to users in your address book File Viruses – attach themselves to other software. When the software is run, the virus first loads itself into memory so that in can further infect other files or begin damaging the computer. Trojan Horses – a program that claims to perform a particular function, but does something different. Backdoor Trojans – a program that allow other computer users to remotely control your computer via a local area network or the Internet. Boot Sector Viruses – an older type of virus and not so common. They used to infect a computer's startup program to activate the virus.
  • Denial of Service – attempt by attackers to prevent legitimate users of obtaining access by flooding a network or disrupting connections between two machines and rendering it incapable of responding to requests in a timely manner. Insider Abuse of Network – current and former employees and on-site contractors with authorized access to facilities and networks continue to pose the most significant risk to intellectual property such as research data, customer files and financial information. Unauthorized Access – use of a computer or system without permission. Typically performed by hackers or crackers. Packet Sniffer – a program that captures data from information packets as they travel over the network. Data could include passwords, user names and proprietary information that travels over the network in clear text. Probe or Scan – a probe is an unusual attempt to gain access to a system or to discover information about the system. A scan is simply a large number of probes.
  • Training & Awareness – employees play a critical role by adhering to the security policy and protecting the IT systems. Security Policy – security policies are the foundation of a security strategy and form the guidelines for system administrators and acceptable activities for the users. The security policy should also include a risk analysis and security-related procedures. Physical Security – organizations should define physical security zones to prevent environmental damage and penetration of unauthorized people. Dedicated Management – a dedicated staff provides the framework to initiate, Implement, maintain and manage security. They are also responsible for Auditing & Administration.
  • Viruses – Anti-virus software should be installed on all network servers and desktop computers. Firewalls – primary means of enforcing the security policy by creating a choke point between a private network and the public Internet. Intrusion Detection – complements firewalls to detect if internal assets are being hacked or exploited. There are both Network-based and Host-based intrusion detection services. Authentication & Authorization – determines what someone needs to know (password) , have (entry card), or are (fingerprint) to ensure they only access what they are supposed to. ATM cards use two authentication factors. Encryption – protects data in transit by making it unreadable by using algorithms. Virtual Private Networking, Secure Sockets Layer and S-MIME are popular encryption technologies. Data & Information Backup – this is a must have for disaster recovery and business continuity. Should include daily & periodic backups and stored at an off-site location.
  • Ask participants for questions?? Ask again.
  • Information Security Seminar

    1. 1. Information Technology: The Best Offense is a Good Defense
    2. 2. Agenda <ul><li>Is Your Network at Risk? </li></ul><ul><li>Security Statistics </li></ul><ul><li>Types of Attacks </li></ul><ul><li>Security Strategies </li></ul><ul><li>Top 5 Security Tips </li></ul><ul><li>About Acend Corporate Learning </li></ul><ul><li>Questions? </li></ul>
    3. 3. Is Your Network at Risk? <ul><li>Regularly impacted by viruses and Internet outages? </li></ul><ul><li>Users keep their password on post it notes? </li></ul><ul><li>Transferring files and documents? </li></ul><ul><li>Employees instant messaging through their computers? </li></ul><ul><li>Don’t regularly audit your security policies? </li></ul>
    4. 4. <ul><li>Security breaches can cause end user downtime </li></ul><ul><li>Reactive recovery measures can impact IT productivity and ability to deliver essential business services </li></ul><ul><li>You can lose significant amount of staff hours </li></ul><ul><li>Your company can suffer devastating loss of credibility with customers resulting in loss of Market Opportunities </li></ul><ul><li>Intellectual Property or Customer Information can be lost </li></ul><ul><li>Suffer Legal Liabilities as a result </li></ul>Why is Information Security Important to Your Business? BOTTOM LINE: Billions of dollars are lost at the affected Web sites, losses in market capitalization, and the amount that will be spent on upgrading security infrastructures as a result of security breaches.
    5. 5. How Does this Happen? <ul><li>Basic Security Breaches Involve Loss of: </li></ul><ul><li>Confidentiality: Information is read or copied by someone with unauthorized access </li></ul><ul><li>Integrity: Information is modified by someone whether by accident or intentional </li></ul><ul><li>Availability: Information is inaccessible to people who are authorized to use it </li></ul>
    6. 6. <ul><li>An insider attack against a large company could cause an average loss of $2.7 million in damages. (reported by the Computer Security Institute and the FBI) </li></ul><ul><li>Most common attacks reported by companies were virus attacks (82%) and insider abuse of network access (80%). (reported by the Computer Security Institute and the FBI) </li></ul><ul><li>In the 2003 Global Security Survey, 39% of respondents acknowledged that their systems had been compromised in some way within the last year. (reported in the Deloitte Touche 2003 Global Security Survey) </li></ul><ul><li>Hackers, worms and other high-tech interference caused $11.1 billion in damages. (reported by The Orange County Register, “Hacker Trackers” 2003) </li></ul>How Bad is the Problem? January, 2004: MyDoom virus has become the fastest spreading virus to date, causing $22.6 Billion in damages in its first 72 hours, according to the mi2g Intelligence Unit
    7. 7. Security Attacks Reported from 1990-2003
    8. 8. Likely Sources of Attacks Independent Hacker Disgruntled Employee
    9. 9. Types of Attacks <ul><li>Viruses – #1 type of attack with over 70,000 known viruses </li></ul><ul><ul><ul><li>Macro Viruses </li></ul></ul></ul><ul><ul><ul><li>Worms </li></ul></ul></ul><ul><ul><ul><li>File Viruses </li></ul></ul></ul><ul><ul><ul><li>Trojan Horses </li></ul></ul></ul><ul><ul><ul><li>Backdoor Trojans </li></ul></ul></ul><ul><ul><ul><li>Boot Sector Viruses </li></ul></ul></ul><ul><ul><li>System Entry </li></ul></ul><ul><ul><ul><li>Floppy disks, CD-ROM, e-mail, Internet, programs and documents. </li></ul></ul></ul><ul><ul><li>Anti-virus Programs </li></ul></ul><ul><ul><ul><li>Network and Desktop . </li></ul></ul></ul>
    10. 10. Types of Attacks <ul><li>Denial of Service </li></ul><ul><li>Insider Abuse of Network </li></ul><ul><li>Unauthorized Access </li></ul><ul><li>Packet Sniffer </li></ul><ul><li>Probe or Scan </li></ul>
    11. 11. Security Strategies: Personnel <ul><li>Training & Awareness </li></ul><ul><li>Security Policy </li></ul><ul><li>Physical Security Dedicated Management </li></ul>
    12. 12. Security Strategies: Technology <ul><li>Viruses </li></ul><ul><li>Firewalls </li></ul><ul><li>Intrusion Detection </li></ul><ul><li>Authentication & Authorization </li></ul><ul><li>Encryption </li></ul><ul><li>Data & Information Backup </li></ul>
    13. 13. Top 5 Security Tips <ul><li>Passwords </li></ul><ul><ul><li>Encourage employees to choose passwords that are a minimum of eight characters, a combination of upper & lowercase characters, and mixed with symbols. </li></ul></ul><ul><ul><li>Require new passwords at least every 90 days. </li></ul></ul><ul><ul><li>Employees should never share passwords or write them down. </li></ul></ul><ul><li>Software </li></ul><ul><ul><li>Anti-Virus: Constantly monitor your anti-virus software to make sure that is kept current. Check for updates and patches offered by the creator of the anti-virus software. </li></ul></ul><ul><ul><li>Server: Make sure that your server software is the latest version and that all patches and updates are current. Do not provide any network services to all employees unless necessary. </li></ul></ul><ul><li>Security Policies </li></ul><ul><ul><li>Guidelines for organization. </li></ul></ul><ul><ul><li>Define acceptable and unacceptable activities. </li></ul></ul><ul><ul><li>When an employee leaves a company, remove their access. </li></ul></ul>
    14. 14. Top 5 Security Tips <ul><li>Network Administration: </li></ul><ul><ul><li>Continuously monitor the network and look for new ways to protect it. </li></ul></ul><ul><ul><li>If you are using a web host or ISP, make sure that your security goals align with your web host. </li></ul></ul><ul><ul><li>Deploy encryption where available. </li></ul></ul><ul><li>Education: </li></ul><ul><ul><li>Ensure Network Administrators have the latest and greatest security training. </li></ul></ul><ul><ul><li>Train employees on the use of email attachments and the simple steps they can take to protect their PCs. </li></ul></ul><ul><ul><li>Make sure anti-virus software is installed on every machine and that employees know how to use it before opening any attachments. </li></ul></ul><ul><ul><li>Mandate computer security awareness and training based on company policy that teaches knowledge, attitude and behavior. </li></ul></ul>
    15. 15. How Acend can Help <ul><li>Customized Learning Plan to your personal needs </li></ul><ul><li>Minimize the difficulty of scheduling your employees to be out of the environment </li></ul><ul><li>Lessen the impact of having employees away on training </li></ul><ul><li>More effective learning </li></ul><ul><li>One-on-one instruction </li></ul>
    16. 16. Thank You for Coming! <ul><li>Your Next Steps </li></ul><ul><li>Attend an Information Security Class for a hands on experience </li></ul><ul><li>Readiness meeting with your Solutions Executive to review your Information Security goals </li></ul>
    17. 17. For More Information… <ul><li>Computer Security Institute: </li></ul><ul><ul><li>http://www.gocsi.com </li></ul></ul><ul><li>CERT ® Coordination Center: </li></ul><ul><ul><li>http://www.cert.org </li></ul></ul><ul><li>On Acend Corporate Learning: </li></ul><ul><ul><li>www.acend.com </li></ul></ul>
    18. 18. Any Questions?

    ×