2. What is Network Security?
consists of the provisions
and policies adopted by the network
administrator to prevent and
monitor unauthorized access, misuse, m
odification, or denial of the computer
network and network-accessible
resources.
3. Security Challenges
Computer Security Institute (CSI)
Survey: over 70% networks have
experienced security breach
From the 70%, 60% have undergone
internal breaches and only 40% are
external or perimeter breaches.
4. 2 Main reasons why security has
became more important as an issue
over time
The hacking and attack tools have
become more and more
dangerous, where an attack can cause
serious financial damage to a company
The hacking and attack tools have
become easier to use- in most
cases, they are automated, allowing
even a novice to use them.
5. Security Roles
Have changed over the years
In the past networks were closed to the
outside world, thus attack didn’t cause
much damage
Mid 1990s, Internet has exploded which
increases the possibility of security
breach
6. Security Issues
Security is a business problem not just a
technology problem
The concept of security is an illusion
Managing security means managing the
perception of others
There are many different security
technologies to choose from
You must create a comprehensive
security policy
7. Security Goals
Create and implement a
single, cohesive, company-wide security
policy
Don’t allow products to dictate security
policies – policies should drive the
products that you choose
Centralize security management
8. Security Components
Security is a relative or subjective problem
Authentication
Authorization
Privacy
Integrity
Availability
Nonrepudiation
Accounting
12. Integrity
Validating that information was not
changed (verifying that the information
that was received has not been modified
or tampered with)
13. Availability
Providing redundancy for security
(ensuring that you have a fallback
solution in the event of failure or security
compromise)
14. Nonrepudiation
Proving that a transaction took place
between two entities (when using online
transactions, having verifiable proof that
the transaction took place between 2
entities)
15. Accounting
Recording information about an
employee’s actions when interacting
with data and systems as well as
information about the operation
(including security events) of your
networking devices
16. Data Classification for
Public/Government Agencies
Unclassified data
- data has few or no confidentiality
requirements.
Sensitive but unclassified (SBU) data
- data could prove embarrassing if
revealed, but no serious security breach
would occur.
Confidential data
- Lowest level of classified data, where data
protection must meet confidentiality
requirements
17. Data Classification for
Public/Government Agencies
Secret data
- A significant effort must be made to
secure data, limiting access to a small
number of people
Top Secret data
- Great effort and cost is used to secure
data, limiting access to a very small
number of people (need to know access)
18. Data Classification for private
companies or nongovernment
Public data - data is publicly
available, as on a website
Sensitive data - similar to SBU
Private data – data is important to a
company; an effort must be made to
secure it and verify that it is accurate
Confidential data – data is very
important to a company, like trade
secrets and employee records
20. Classification Procedures
Who is responsible for the data?
How should the information be
classified, with any exceptions?
How are the controls used for
classification policies?
When and how does declassification of
data occur?
21. Classification Roles
Role Description Performed By
Owner Is ultimately responsible for the
data
Typically a member of the
management staff
Custodian Is responsible for the security of
the data on a day-to-day basis
Typically a member of the IT
staff
User Is responsible for using the data
according to defined policies
and operating procedures
Your typical user, who can
“see the trees, but not the
forest” in the company and
who has a ground-level view
of certain data
22. Security Controls
Preventive – used to prevent a data
compromise
Deterrent – used to scare away a certain
number of ill-doers
Detective – used to detect access to
data
23. 3 Categories that control the
implementation of the security control
Administrative – policy and procedural
controls
Technical – electronics, hardware, and
software controls
Physical – mechanical controls
24. Security Breaches: Prosecuting
attackers and hackers
Motive
Why did they do it?
Opportunity
Were they available to commit the crime?
Means
Did they have the capability to commit the
crime?
25. Liability: Legal and
Governmental Issues
A company should practice due
diligence and due care when protecting
sensitive data and resources.
A company can be sued by its
customers or employees if a breach on
sensitive data happens
Deal with government laws that
requiring a minimal security level when
protecting certain resources.
26. On the Job
Examine security in your network from
endpoint to endpoint, from where traffic
enters your network, to where your
users connect (switches, access
points, and remote access VPN
gateways)
Select a product solution that focuses on
end-to-end security
27. Questions
What are the benefits that an
organization would get from properly
classifying data?
Research about the 10 commandments
of computer ethics by the Computer
Ethics Institute