SlideShare a Scribd company logo
1 of 25
Download to read offline
Foundations of Security 
Module 1 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
1 
Simplifying Security.
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
2 
Scenario 
Franklin, an employee working for an 
organization, downloads free software 
from a website. After installing the 
software, however, Franklin's system 
reboots and starts to malfunction. 
What might have gone 
wrong with Franklin’s system? 
What would you have done in 
Franklin’s place?
EAST LANSING, Mich. —Most home computers are vulnerable to hacker attacks because the users either mistakenly think they have 
enough security in place or they don’t believe they have enough valuable information that would be of interest to a hacker. 
That’s the point of a paper published this month by Michigan State University’s Rick Wash, who says that most home‐computer users rely 
on what are known as “folk models.” Those are beliefs about what hackers or viruses are that people use to make decisions about security 
– to keep their information safe. 
Unfortunately, they don’t often work the way they should. 
“Home security is hard because people are untrained in security,” said Wash, an assistant professor in the Department of 
Telecommunication, Information Studies and Media. “But it isn’t because people are idiots. Rather they try their best to make sense of 
what’s going on and frequently make choices that leave them vulnerable.” 
Copyright © by EC-Council 
Home‐computer Users at Risk Due to Use of ‘Folk Model’ Security 
All Rights Reserved. Reproduction is Strictly Prohibited. 
3 
May 23, 2011 
http://news.msu.edu
May 23, 2011 8:21:51 PM ET 
Copyright © by EC-Council 
'Fakefrag' Trojan Scares You into Paying Up 
A devious new Trojan is putting the fear of hard drive failure 
into computer owners, and then rushing in to "save" the day — 
at your expense. 
Once the "Fakefrag" Trojan finds its way onto your system via 
specially crafted malicious Web pages, it gets to work on the 
task of making you believe all your files have been erased from 
your hard drive, the security firm Symantec reported. 
Scareware scams, which try to convince users they have a 
computer virus, and then trick them into purchasing fake 
antivirus software, are nothing new. However, Fakefrag takes 
the crime a step further: it actually moves your files from the 
"All Users" folder to a temporary location, and hides files in the 
"Current User" folder, Symantec said. 
All Rights Reserved. Reproduction is Strictly Prohibited. 
4 
http://www.msnbc.msn.com
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
Module Objectives 
5 
Security Incidents 
Essential Terminologies 
Computer Security 
Why Security? 
Potential Losses Due to Security 
Attacks 
Elements of Security 
Fundamental Concepts of Security 
Layers of Security 
Security Risks to Home Users 
What to Secure? 
What Makes a Home Computer 
Vulnerable? 
What Makes a System Secure? 
Benefits of Computer Security 
Awareness 
Basic Computer Security Mechanisms
Copyright © by EC-Council 
What to 
Secure? 
All Rights Reserved. Reproduction is Strictly Prohibited. 
Computer 
Security 
6 
Potential 
Losses Due 
to Security 
Attacks 
Essential 
Terminologies 
Elements of 
Security 
What Makes 
a Home 
Computer 
Vulnerable? 
Benefits of 
Computer 
Security 
Awareness 
Basic 
Computer 
Security 
Mechanisms 
Module Flow 
Layers of 
Security 
Security 
Risks to 
Home Users
Security Incident Occurrences Over Time 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
7 
900 
700 
600 
500 
400 
300 
200 
100 
0 
6 14 23 
2002 2003 2004 2005 2006 2007 2008 2009 2010 
http://datalossdb.org 
800 
2011 
Report on January, 2011 
Security Incident Occurrences Over Time 
Years 
141 
537 511 
787 
604 
409 
10
Security Incidents by Breach Type - 2011 
Web Unknown 
Copyright © by EC-Council 
A security incident is “Any real or suspected adverse event in relation to the 
security of computer systems or computer networks.” 
All Rights Reserved. Reproduction is Strictly Prohibited. 
40% 
8 
http://www.cert.org 
10% 10% 10% 10% 10% 10% 
Stolen Stolen 
Lost 
Hack 
Laptop 
Document 
Laptop 
Disposal 
Document 
http://datalossdb.org
Threat Exploit Vulnerability 
Existence of a weakness, 
design, or implementation 
error that can lead to an 
unexpected, undesirable 
event compromising the 
security of the system 
Copyright © by EC-Council 
Essential Terminologies 
All Rights Reserved. Reproduction is Strictly Prohibited. 
A defined way to breach 
the security of an IT 
system through 
vulnerability 
9 
An action or event that 
has the potential to 
compromise and/or 
violate security 
Cracker, Attacker, 
or Intruder Attack Data Theft 
An individual who breaks 
into computer systems in 
order to steal, change, or 
destroy information 
Any action derived from 
intelligent threats to 
violate the security of the 
system 
Any action of stealing 
the information from the 
users’ system
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
1 2 
10 
Security is a state of well‐being 
of information and 
infrastructure 
Computer security refers to 
the protection of computer 
systems and the 
information a user stores or 
processes 
Users should focus on 
various security threats and 
countermeasures in order to 
protect their information 
assets 
Computer Security 
3
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
11 
Why Security? 
Computer security is 
important for protecting the 
confidentiality, integrity, and 
availability of computer 
systems and their resources 
Computer administration 
and management have 
become more complex 
which produces more attack 
avenues 
Network environments and 
network‐based applications 
provide more attack paths 
Evolution of technology has 
focused on the ease of use 
while the skill level needed 
for exploits has decreased
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
12 
Misuse of computer 
resources 
Data loss/theft 
Loss of trust 
Financial loss 
Unavailability of 
resources 
Identity theft 
Potential Losses Due to 
Security Attacks
Copyright © by EC-Council 
What to 
Secure? 
All Rights Reserved. Reproduction is Strictly Prohibited. 
13 
Module Flow 
Computer 
Security 
Potential 
Losses Due 
to Security 
Attacks 
Essential 
Terminologies 
Elements of 
Security 
What Makes 
a Home 
Computer 
Vulnerable? 
Benefits of 
Computer 
Security 
Awareness 
Basic 
Computer 
Security 
Mechanisms 
Layers of 
Security 
Security 
Risks to 
Home Users
Non‐repudiation is “ensuring that a 
party to a contract or a communication 
cannot deny the authenticity of their 
signature on a document” 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
Elements of Security 
Integrity is “ensuring that the 
information is accurate, 
complete, reliable, and is in its 
original form” 
14 
Confidentiality is “ensuring 
that information is accessible 
only to those authorized to 
have access” (ISO‐17799) 
Authenticity is “the 
identification and assurance 
of the origin of information” 
Availability is “ensuring that the 
information is accessible to 
authorized persons when 
required without delay” 
Non‐ 
Confidentiality Authenticity Integrity Availability Repudiation
The Security, Functionality, and Ease 
of Use Triangle 
Applications/software products by default are preconfigured for ease of use, which makes the 
user vulnerable to various security flaws 
Similarly, increased functionality (features) in an application make it difficult to use in addition 
to being less secure 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
15 
Functionality 
(Features) 
Ease of 
Use 
Security 
(Restrictions) 
Moving the ball toward 
security means moving 
away from the 
functionality and ease of 
use
Fundamental Concepts of Security 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
16 
Precaution 
Maintenance 
Reaction 
Adhering to the preventative measures while 
using computer system and applications 
Managing all the changes in the computer 
applications and keeping them up to date 
Acting timely when security incidents occur
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
Layers of Security 
17 
Layer 1 
Layer 2 
Layer 3 
Layer 4 
Layer 5 
Physical 
Security 
Safeguards the 
personnel, 
hardware, programs, 
networks, and data 
from physical 
threats 
Network 
Security 
Protects the 
networks and 
their services from 
unauthorized 
modification, 
destruction, or 
disclosure 
System 
Security 
Protects the system 
and its information 
from theft, 
corruption, 
unauthorized 
access, or misuse 
Application 
Security 
Covers the use of 
software, 
hardware, and 
procedural 
methods to protect 
applications from 
external threats 
User 
Security 
Ensures that a valid 
user is logged in 
and that the 
logged‐in user is 
allowed to use an 
application/ 
program
Security Risks to Home Users 
Home computers are prone to various cyber attacks as they provide attackers easy 
targets due to a low level of security awareness 
Security risk to home users arise from various computer attacks and accidents 
causing physical damage to computer systems 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
18 
Computer Attacks 
Malware attacks 
Email attacks 
Mobile code (Java/JavaScript/ActiveX) attacks 
Denial of service and cross‐site scripting attacks 
Identity theft and computer frauds 
Packet sniffing 
Being an intermediary for another attack 
(zombies) 
Computer Accidents 
Hard disk or other component failures 
Power failure and surges 
Theft of a computing device 
Note: These threats and their countermeasures will be discussed in detail in the later modules
Copyright © by EC-Council 
Hardware Software 
Information Communications 
All Rights Reserved. Reproduction is Strictly Prohibited. 
What to Secure? 
19 
Laptops, Desktop PCs, CPU, 
hard disk, storage devices, 
cables, etc. 
Operating system and software 
applications 
Personal identification such as 
Social Security Number (SSN), 
passwords, credit card numbers, 
etc. 
Emails, instant messengers, and 
browsing activites
Copyright © by EC-Council 
What to 
Secure? 
All Rights Reserved. Reproduction is Strictly Prohibited. 
20 
Module Flow 
Computer 
Security 
Potential 
Losses Due 
to Security 
Attacks 
Essential 
Terminologies 
Elements of 
Security 
What Makes 
a Home 
Computer 
Vulnerable? 
Benefits of 
Computer 
Security 
Awareness 
Basic 
Computer 
Security 
Mechanisms 
Layers of 
Security 
Security 
Risks to 
Home Users
Copyright © by EC-Council 
What Makes a Home Computer 
Vulnerable? 
All Rights Reserved. Reproduction is Strictly Prohibited. 
21 
Low level of 
security awareness 
Default computer and 
application settings 
Increasing online 
activities 
None or very little 
investment in 
security systems 
Not following any 
standard security 
policies or guidelines
What Makes a System Secure? 
System security measures help protect computers and information stored in the systems 
from accidental loss, malicious threats, unauthorized access, etc. 
Copyright © by EC-Council 
System Access Controls Data Access Controls 
All Rights Reserved. Reproduction is Strictly Prohibited. 
22 
System and Security 
Administration 
System Design 
Ensure that unauthorized users do not 
get into the system 
Force legal users to be conscious about 
security 
Monitor system activities such as who is 
accessing the data and for what purpose 
Define access rules based on the system 
security levels 
Perform regular system and security 
administration tasks such as configuring 
system settings, implementing security 
policies, monitoring system state, etc. 
Deploy various security characteristics in 
system hardware and software design 
such as memory segmentation, privilege 
isolation, etc.
Computer security awareness helps minimize the chances of computer attacks 
It helps users minimize losses in case of an accident that causes physical damage 
to computer systems 
It enables users to protect sensitive information and computing resources from 
unauthorized access 
Copyright © by EC-Council 
Benefits of Computer Security 
Awareness 
It helps prevent the loss of information stored on the systems 
It helps users to prevent cybercriminals from using their systems in order to 
launch attacks on the other computer systems 
All Rights Reserved. Reproduction is Strictly Prohibited. 
23
 Security is a state of well‐being of information and infrastructures 
 Computer security is the protection of computing systems and the data that they 
Copyright © by EC-Council 
All Rights Reserved. Reproduction is Strictly Prohibited. 
Module Summary 
24 
store or access 
 Confidentiality, integrity, non‐repudiation, authenticity, and availability are the 
elements of security 
 Security risk to home users arise from various computer attacks and accidents 
causing physical damage to computer systems 
 Computer security awareness helps minimize the chances of computer attacks and 
prevent the loss of information stored on the systems
Copyright © by EC-Council 
Basic Computer Security Checklist 
Regular update of operating system and other installed applications 
All Rights Reserved. Reproduction is Strictly Prohibited. 
Use of encryption techniques and digital signatures 
25 
Use of strong passwords 
Use of anti‐virus systems 
Regular backup of important files 
Use of firewall and intrusion detection systems 
Following standard guidelines for Internet activities 
Physical security of computing infrastructure 
Awareness of current security scenario and attack techniques

More Related Content

What's hot

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information security
Information security Information security
Information security AishaIshaq4
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Antonio Fontes
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)Denim Group
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 

What's hot (20)

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information security
Information security Information security
Information security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cloud security
Cloud securityCloud security
Cloud security
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 

Similar to Cscu module 01 foundations of security

Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptRamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIan Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptssuser6c59cb
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31cpashke
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 

Similar to Cscu module 01 foundations of security (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
need for NS.ppt
need for NS.pptneed for NS.ppt
need for NS.ppt
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Forensics
ForensicsForensics
Forensics
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
185
185185
185
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 

Cscu module 01 foundations of security

  • 1. Foundations of Security Module 1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 Simplifying Security.
  • 2. Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 2 Scenario Franklin, an employee working for an organization, downloads free software from a website. After installing the software, however, Franklin's system reboots and starts to malfunction. What might have gone wrong with Franklin’s system? What would you have done in Franklin’s place?
  • 3. EAST LANSING, Mich. —Most home computers are vulnerable to hacker attacks because the users either mistakenly think they have enough security in place or they don’t believe they have enough valuable information that would be of interest to a hacker. That’s the point of a paper published this month by Michigan State University’s Rick Wash, who says that most home‐computer users rely on what are known as “folk models.” Those are beliefs about what hackers or viruses are that people use to make decisions about security – to keep their information safe. Unfortunately, they don’t often work the way they should. “Home security is hard because people are untrained in security,” said Wash, an assistant professor in the Department of Telecommunication, Information Studies and Media. “But it isn’t because people are idiots. Rather they try their best to make sense of what’s going on and frequently make choices that leave them vulnerable.” Copyright © by EC-Council Home‐computer Users at Risk Due to Use of ‘Folk Model’ Security All Rights Reserved. Reproduction is Strictly Prohibited. 3 May 23, 2011 http://news.msu.edu
  • 4. May 23, 2011 8:21:51 PM ET Copyright © by EC-Council 'Fakefrag' Trojan Scares You into Paying Up A devious new Trojan is putting the fear of hard drive failure into computer owners, and then rushing in to "save" the day — at your expense. Once the "Fakefrag" Trojan finds its way onto your system via specially crafted malicious Web pages, it gets to work on the task of making you believe all your files have been erased from your hard drive, the security firm Symantec reported. Scareware scams, which try to convince users they have a computer virus, and then trick them into purchasing fake antivirus software, are nothing new. However, Fakefrag takes the crime a step further: it actually moves your files from the "All Users" folder to a temporary location, and hides files in the "Current User" folder, Symantec said. All Rights Reserved. Reproduction is Strictly Prohibited. 4 http://www.msnbc.msn.com
  • 5. Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module Objectives 5 Security Incidents Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security Fundamental Concepts of Security Layers of Security Security Risks to Home Users What to Secure? What Makes a Home Computer Vulnerable? What Makes a System Secure? Benefits of Computer Security Awareness Basic Computer Security Mechanisms
  • 6. Copyright © by EC-Council What to Secure? All Rights Reserved. Reproduction is Strictly Prohibited. Computer Security 6 Potential Losses Due to Security Attacks Essential Terminologies Elements of Security What Makes a Home Computer Vulnerable? Benefits of Computer Security Awareness Basic Computer Security Mechanisms Module Flow Layers of Security Security Risks to Home Users
  • 7. Security Incident Occurrences Over Time Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 7 900 700 600 500 400 300 200 100 0 6 14 23 2002 2003 2004 2005 2006 2007 2008 2009 2010 http://datalossdb.org 800 2011 Report on January, 2011 Security Incident Occurrences Over Time Years 141 537 511 787 604 409 10
  • 8. Security Incidents by Breach Type - 2011 Web Unknown Copyright © by EC-Council A security incident is “Any real or suspected adverse event in relation to the security of computer systems or computer networks.” All Rights Reserved. Reproduction is Strictly Prohibited. 40% 8 http://www.cert.org 10% 10% 10% 10% 10% 10% Stolen Stolen Lost Hack Laptop Document Laptop Disposal Document http://datalossdb.org
  • 9. Threat Exploit Vulnerability Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system Copyright © by EC-Council Essential Terminologies All Rights Reserved. Reproduction is Strictly Prohibited. A defined way to breach the security of an IT system through vulnerability 9 An action or event that has the potential to compromise and/or violate security Cracker, Attacker, or Intruder Attack Data Theft An individual who breaks into computer systems in order to steal, change, or destroy information Any action derived from intelligent threats to violate the security of the system Any action of stealing the information from the users’ system
  • 10. Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 2 10 Security is a state of well‐being of information and infrastructure Computer security refers to the protection of computer systems and the information a user stores or processes Users should focus on various security threats and countermeasures in order to protect their information assets Computer Security 3
  • 11. Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 11 Why Security? Computer security is important for protecting the confidentiality, integrity, and availability of computer systems and their resources Computer administration and management have become more complex which produces more attack avenues Network environments and network‐based applications provide more attack paths Evolution of technology has focused on the ease of use while the skill level needed for exploits has decreased
  • 12. Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 12 Misuse of computer resources Data loss/theft Loss of trust Financial loss Unavailability of resources Identity theft Potential Losses Due to Security Attacks
  • 13. Copyright © by EC-Council What to Secure? All Rights Reserved. Reproduction is Strictly Prohibited. 13 Module Flow Computer Security Potential Losses Due to Security Attacks Essential Terminologies Elements of Security What Makes a Home Computer Vulnerable? Benefits of Computer Security Awareness Basic Computer Security Mechanisms Layers of Security Security Risks to Home Users
  • 14. Non‐repudiation is “ensuring that a party to a contract or a communication cannot deny the authenticity of their signature on a document” Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Elements of Security Integrity is “ensuring that the information is accurate, complete, reliable, and is in its original form” 14 Confidentiality is “ensuring that information is accessible only to those authorized to have access” (ISO‐17799) Authenticity is “the identification and assurance of the origin of information” Availability is “ensuring that the information is accessible to authorized persons when required without delay” Non‐ Confidentiality Authenticity Integrity Availability Repudiation
  • 15. The Security, Functionality, and Ease of Use Triangle Applications/software products by default are preconfigured for ease of use, which makes the user vulnerable to various security flaws Similarly, increased functionality (features) in an application make it difficult to use in addition to being less secure Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 15 Functionality (Features) Ease of Use Security (Restrictions) Moving the ball toward security means moving away from the functionality and ease of use
  • 16. Fundamental Concepts of Security Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 16 Precaution Maintenance Reaction Adhering to the preventative measures while using computer system and applications Managing all the changes in the computer applications and keeping them up to date Acting timely when security incidents occur
  • 17. Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Layers of Security 17 Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Physical Security Safeguards the personnel, hardware, programs, networks, and data from physical threats Network Security Protects the networks and their services from unauthorized modification, destruction, or disclosure System Security Protects the system and its information from theft, corruption, unauthorized access, or misuse Application Security Covers the use of software, hardware, and procedural methods to protect applications from external threats User Security Ensures that a valid user is logged in and that the logged‐in user is allowed to use an application/ program
  • 18. Security Risks to Home Users Home computers are prone to various cyber attacks as they provide attackers easy targets due to a low level of security awareness Security risk to home users arise from various computer attacks and accidents causing physical damage to computer systems Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 18 Computer Attacks Malware attacks Email attacks Mobile code (Java/JavaScript/ActiveX) attacks Denial of service and cross‐site scripting attacks Identity theft and computer frauds Packet sniffing Being an intermediary for another attack (zombies) Computer Accidents Hard disk or other component failures Power failure and surges Theft of a computing device Note: These threats and their countermeasures will be discussed in detail in the later modules
  • 19. Copyright © by EC-Council Hardware Software Information Communications All Rights Reserved. Reproduction is Strictly Prohibited. What to Secure? 19 Laptops, Desktop PCs, CPU, hard disk, storage devices, cables, etc. Operating system and software applications Personal identification such as Social Security Number (SSN), passwords, credit card numbers, etc. Emails, instant messengers, and browsing activites
  • 20. Copyright © by EC-Council What to Secure? All Rights Reserved. Reproduction is Strictly Prohibited. 20 Module Flow Computer Security Potential Losses Due to Security Attacks Essential Terminologies Elements of Security What Makes a Home Computer Vulnerable? Benefits of Computer Security Awareness Basic Computer Security Mechanisms Layers of Security Security Risks to Home Users
  • 21. Copyright © by EC-Council What Makes a Home Computer Vulnerable? All Rights Reserved. Reproduction is Strictly Prohibited. 21 Low level of security awareness Default computer and application settings Increasing online activities None or very little investment in security systems Not following any standard security policies or guidelines
  • 22. What Makes a System Secure? System security measures help protect computers and information stored in the systems from accidental loss, malicious threats, unauthorized access, etc. Copyright © by EC-Council System Access Controls Data Access Controls All Rights Reserved. Reproduction is Strictly Prohibited. 22 System and Security Administration System Design Ensure that unauthorized users do not get into the system Force legal users to be conscious about security Monitor system activities such as who is accessing the data and for what purpose Define access rules based on the system security levels Perform regular system and security administration tasks such as configuring system settings, implementing security policies, monitoring system state, etc. Deploy various security characteristics in system hardware and software design such as memory segmentation, privilege isolation, etc.
  • 23. Computer security awareness helps minimize the chances of computer attacks It helps users minimize losses in case of an accident that causes physical damage to computer systems It enables users to protect sensitive information and computing resources from unauthorized access Copyright © by EC-Council Benefits of Computer Security Awareness It helps prevent the loss of information stored on the systems It helps users to prevent cybercriminals from using their systems in order to launch attacks on the other computer systems All Rights Reserved. Reproduction is Strictly Prohibited. 23
  • 24.  Security is a state of well‐being of information and infrastructures  Computer security is the protection of computing systems and the data that they Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module Summary 24 store or access  Confidentiality, integrity, non‐repudiation, authenticity, and availability are the elements of security  Security risk to home users arise from various computer attacks and accidents causing physical damage to computer systems  Computer security awareness helps minimize the chances of computer attacks and prevent the loss of information stored on the systems
  • 25. Copyright © by EC-Council Basic Computer Security Checklist Regular update of operating system and other installed applications All Rights Reserved. Reproduction is Strictly Prohibited. Use of encryption techniques and digital signatures 25 Use of strong passwords Use of anti‐virus systems Regular backup of important files Use of firewall and intrusion detection systems Following standard guidelines for Internet activities Physical security of computing infrastructure Awareness of current security scenario and attack techniques