SlideShare a Scribd company logo
DATA SECURITY
INFORMATION SECURITY
• Protecting information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction
• Protecting data from attackers invading networks, natural
disasters, adverse environmental conditions, power
failures, theft or vandalism, or other undesirable states
INFORMATION SECURITY
• In any environment, where we plan to put heightened
levels of security in place, we also need to take into
account the cost of replacing our assets if we do happen
to lose them, and make sure we establish reasonable
levels of protection for their value.
• The cost of security we put in place should never outstrip
the value of what it is protecting.
WHEN ARE WE SECURE ?
Even if our systems are
properly patched, there
will always be new attacks
to which we are
vulnerable.
WHEN ARE WE INSECURE ?
• Not patching our systems
• Using weak passwords
• Downloading programs from the internet
• Opening email attachments from unknown senders
• Using wireless networks without encryption
• The good thing is that once we are able to point out
the areas in the environment that can cause it to be
insecure, we can take steps to mitigate these issues.
• This problem is akin to cutting something in half over
and over; there will always be some small portion
left to cut again.
• Although we may never get to state that we can
definitively call “secure”, we can take steps in the
right direction.
MODELS FOR DISCUSSING SECURITY
ISSUES
• The Confidentiality, Integrity and Availability ( CIA ) Triad
Confidentiality
Availability
Integrity
CONFIDENTIALITY
• Refers to the ability to protect data from those who are
not authorized to view it.
• Examples of breaches / compromised confidentiality
• Loss of laptop containing data
• Person looking over our shoulder while typing our password
• Email attachment sent to the wrong person
• Attacker penetrating our systems
INTEGRITY
• Refers to the ability to prevent data from being changed
in an unauthorized or undesirable manner.
• Means to prevent unauthorized changes to the data
• Means to reverse authorized changes that needs to be
undone.
• Example : undo, rollback
AVAILABILITY
• Refers to the ability to access our data when we need it.
• Examples of loss of availability
• Power loss
• Operating system or application problems
• Network attacks
• Compromise of a system
• Denial of service attack
AVAILABILITY
• Refers to the ability to access our data when we need it.
• Examples of loss of availability
• Power loss
• Operating system or application problems
• Network attacks
• Compromise of a system
• Denial of service attack
THE PARKERIAN HEXAD
• Named after Donn Parker
Confidentiality Integrity Availability
Possession
or
Control
Authenticity Utility
CONFIDENTIALITY
• Refers to the ability to protect data from those who are
not authorized to view it.
• Examples of breaches / compromised confidentiality
• Loss of laptop containing data
• Person looking over our shoulder while typing our password
• Email attachment sent to the wrong person
• Attacker penetrating our systems
INTEGRITY
• Refers to the state of data itself in the sense of
completeness
AVAILABILITY
• Refers to the ability to access our data when we need it.
• Examples of loss of availability
• Power loss
• Operating system or application problems
• Network attacks
• Compromise of a system
• Denial of service attack
POSSESSION OR CONTROL
• Refers to the physical disposition of the media on which
the data is stored
AUTHENTICITY
• Proper attribution as to the owner or creator of the data in
question.
UTILITY
• Refers to how useful the data is to us
ATTACKS
• What makes up an attack ?
• Type of attack that it represents
• The risk the attack represents
• Controls to use when mitigating the attack
TYPES ATTACKS
Confidentiality • Interception
Integrity
• Interruption
• Modification
• Fabrication
Availability
• Interruption
• Modification
• Fabrication
INTERCEPTION
• Attacks that allows unauthorized users to access data,
applications or environments
• Examples :
• Unauthorized file viewing or copying
• Eavesdropping on phone conversations
• Reading emails not yours
INTERRUPTION
• Attacks that cause our assets to become unusable or
unavailable for our use, on a temporary or permanent
basis.
• Examples :
• Denial of Service attack
MODIFICATION
• Attacks that involves tampering with our assets.
FABRICATION
• Attacks that involves generating data, processes,
communications, or other similar activities with a system
THREATS
• Things that have potential to cause harm to our assets
• Identify the possibility of something happening that can
cause a security breach or network outage
• example :
• Natural threats
• Intentional
VULNERABILITIES
• Weakness that can be used to harm the asset.
• Holes that can be exploited by threats to cause harm
• Example
• Poor coding in software installed
• OS vulnerabilities
1. Problems in hardware or physical structure of the machines
RISK
• The likelihood that something bad will happen
• The best strategy is to spend our time mitigating the most
likely attacks.
RISK MANAGEMENT
• Evaluation of threats and the cost of protection
IMPACT
• Effect that an attack can cause harm considering the
value of the asset being threatened.
CONTROL
• measures in place to help ensure that a given threat us
accounted for.
• Categories
• Physical
• Logical
• Administrative
PHYSICAL CONTROL
• Controls to protect the physical environment in which the
system sits or where the data is stored
• examples :
• Fences, gates, locks, guards, cameras, air conditioning system,
backup power generators
LOGICAL CONTROL
• Also called Technical Controls
• Controls that protect the system, network, and
environment that process, transmit, and store data
• examples :
• Passwords, encryption, logical access controls, firewalls
ADMINISTRATIVE CONTROL
• Controls based on rules, policies, laws, procedures,
guidelines, and other items that are “paper” in nature.
• Set out the rules for how users are expected in the
environment to behave
• These controls must be totally enforced for compliance.
• examples :
• Change of password every 90 days
• Differing levels of authority
DEFENSE IN DEPTH
• Strategy to formulate a multi-layered defense what will
allow to still mount a successful defense should one or
more defensive measures fail.
Internal network
host
application
data
external network
DEFENSIVE IN DEPTH
EXTERNAL
NETWORK
• DMZ
• VPN
• Logging
• Auditing
• Penetration
Testing
• Vulnerability
Analysis
NETWORK
PERIMETER
• Firewalls
• Proxy
• Logging
• Stateful
Packet
Inspection
• Auditing
• Penetration
Testing
• Vulnerability
Analysis
INTERNAL
NETWORK
• IDS
• IPS
• Logging
• Auditing
• Penetration
Testing
• Vulnerability
Analysis
HOST
• Authentication
• Antivirus
• IDS
• IPS
• Password
Hashing
• Logging
• Auditing
• Penetration
Testing
• Vulnerability
Analysis
APPLICATION
• SSO
• Content
Filtering
• Data
Validation
• Auditing
• Penetration
Testing
• Vulnerability
Analysis
DATA
• Encryption
• Access
Controls
• Backup
• Penetration
Testing
• Vulnerability
Analysis

More Related Content

What's hot

Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
ibrahimzubairu2003
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architectureImran Khan
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romneywoyaoni
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Database security
Database securityDatabase security
Database security
Zubair Rahim
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
Vaibhav Khanna
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
Jack Kessler
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
Dr. Rosemarie Sibbaluca-Guirre
 
Software Security
Software SecuritySoftware Security
Software Security
AkNirojan
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
Al Balqa Applied University
 
Information security
Information securityInformation security
Information security
linalona515
 

What's hot (18)

Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Database security
Database securityDatabase security
Database security
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Data Security
Data SecurityData Security
Data Security
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
 
Software Security
Software SecuritySoftware Security
Software Security
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Information security
Information securityInformation security
Information security
 

Viewers also liked

Artofgifting (1)
Artofgifting (1)Artofgifting (1)
Artofgifting (1)
bazarmitragifts
 
Computer fundamentals-internet p2
Computer fundamentals-internet p2Computer fundamentals-internet p2
Computer fundamentals-internet p2
Leo Mark Villar
 
INTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OF
INTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OFINTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OF
INTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OFMani Shanker
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Boletín 121002
Boletín 121002Boletín 121002
Boletín 121002
Isabel Tc
 
Html
HtmlHtml
MCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MSMCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MSLubabalo Manzi
 
창발 업사이클링 14115340 전선영
창발 업사이클링 14115340 전선영창발 업사이클링 14115340 전선영
창발 업사이클링 14115340 전선영
jsy1012
 
Do Prolargentsize sex pills work?
Do Prolargentsize sex pills work?Do Prolargentsize sex pills work?
Do Prolargentsize sex pills work?
toldd3
 
Rubbens cubomatic bakwanden nl-en-fr
Rubbens cubomatic bakwanden nl-en-fr Rubbens cubomatic bakwanden nl-en-fr
Rubbens cubomatic bakwanden nl-en-fr
Rubbens grootkeukens
 
Texto 4 historia (corregido)
Texto 4 historia (corregido)Texto 4 historia (corregido)
Texto 4 historia (corregido)
Manuel Lavado
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
Leo Mark Villar
 
Documentación del Sistemas de Gestión de la Calidad
Documentación del Sistemas de Gestión de la Calidad Documentación del Sistemas de Gestión de la Calidad
Documentación del Sistemas de Gestión de la Calidad
Jose Sánchez Meza
 
The Fundamentals of Applying for and Obtaining a Security Clearance
The Fundamentals of Applying for and Obtaining a Security ClearanceThe Fundamentals of Applying for and Obtaining a Security Clearance
The Fundamentals of Applying for and Obtaining a Security Clearance
FedEmployeeLaw
 
Label based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQLLabel based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQL
Kohei KaiGai
 

Viewers also liked (18)

Artofgifting (1)
Artofgifting (1)Artofgifting (1)
Artofgifting (1)
 
Computer fundamentals-internet p2
Computer fundamentals-internet p2Computer fundamentals-internet p2
Computer fundamentals-internet p2
 
INTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OF
INTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OFINTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OF
INTERNSHIP PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OF
 
Bridging-the-gap-Final-Web
Bridging-the-gap-Final-WebBridging-the-gap-Final-Web
Bridging-the-gap-Final-Web
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Boletín 121002
Boletín 121002Boletín 121002
Boletín 121002
 
Curso responsable de calidad
Curso responsable de calidadCurso responsable de calidad
Curso responsable de calidad
 
Comp
CompComp
Comp
 
Html
HtmlHtml
Html
 
MCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MSMCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MS
 
창발 업사이클링 14115340 전선영
창발 업사이클링 14115340 전선영창발 업사이클링 14115340 전선영
창발 업사이클링 14115340 전선영
 
Do Prolargentsize sex pills work?
Do Prolargentsize sex pills work?Do Prolargentsize sex pills work?
Do Prolargentsize sex pills work?
 
Rubbens cubomatic bakwanden nl-en-fr
Rubbens cubomatic bakwanden nl-en-fr Rubbens cubomatic bakwanden nl-en-fr
Rubbens cubomatic bakwanden nl-en-fr
 
Texto 4 historia (corregido)
Texto 4 historia (corregido)Texto 4 historia (corregido)
Texto 4 historia (corregido)
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
 
Documentación del Sistemas de Gestión de la Calidad
Documentación del Sistemas de Gestión de la Calidad Documentación del Sistemas de Gestión de la Calidad
Documentación del Sistemas de Gestión de la Calidad
 
The Fundamentals of Applying for and Obtaining a Security Clearance
The Fundamentals of Applying for and Obtaining a Security ClearanceThe Fundamentals of Applying for and Obtaining a Security Clearance
The Fundamentals of Applying for and Obtaining a Security Clearance
 
Label based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQLLabel based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQL
 

Similar to Date security introduction

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
SubhadipDutta36
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
BhargaviGorde1
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
Awais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
Awais725629
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Nithin Raj
 
Creating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird RixfordCreating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird Rixford
Insurance Technologies Corporation (ITC)
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
dotco
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
Technocracy2
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
yasirkhokhar7
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Knoldus Inc.
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
Ndheh
 

Similar to Date security introduction (20)

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Creating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird RixfordCreating a Security Plan for Your Agency - Laird Rixford
Creating a Security Plan for Your Agency - Laird Rixford
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 

More from Leo Mark Villar

Date security identifcation and authentication
Date security   identifcation and authenticationDate security   identifcation and authentication
Date security identifcation and authentication
Leo Mark Villar
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
Leo Mark Villar
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
Leo Mark Villar
 
Web programming
Web programmingWeb programming
Web programming
Leo Mark Villar
 
Computer fundamentals-internet p1
Computer fundamentals-internet p1Computer fundamentals-internet p1
Computer fundamentals-internet p1
Leo Mark Villar
 
Team foundation server
Team foundation serverTeam foundation server
Team foundation server
Leo Mark Villar
 
Microsoft office 2013
Microsoft office 2013Microsoft office 2013
Microsoft office 2013
Leo Mark Villar
 
Sql performance tuning
Sql performance tuningSql performance tuning
Sql performance tuning
Leo Mark Villar
 
Angular js
Angular jsAngular js
Angular js
Leo Mark Villar
 

More from Leo Mark Villar (9)

Date security identifcation and authentication
Date security   identifcation and authenticationDate security   identifcation and authentication
Date security identifcation and authentication
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
 
Web programming
Web programmingWeb programming
Web programming
 
Computer fundamentals-internet p1
Computer fundamentals-internet p1Computer fundamentals-internet p1
Computer fundamentals-internet p1
 
Team foundation server
Team foundation serverTeam foundation server
Team foundation server
 
Microsoft office 2013
Microsoft office 2013Microsoft office 2013
Microsoft office 2013
 
Sql performance tuning
Sql performance tuningSql performance tuning
Sql performance tuning
 
Angular js
Angular jsAngular js
Angular js
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Date security introduction

  • 2. INFORMATION SECURITY • Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction • Protecting data from attackers invading networks, natural disasters, adverse environmental conditions, power failures, theft or vandalism, or other undesirable states
  • 3. INFORMATION SECURITY • In any environment, where we plan to put heightened levels of security in place, we also need to take into account the cost of replacing our assets if we do happen to lose them, and make sure we establish reasonable levels of protection for their value. • The cost of security we put in place should never outstrip the value of what it is protecting.
  • 4. WHEN ARE WE SECURE ? Even if our systems are properly patched, there will always be new attacks to which we are vulnerable.
  • 5. WHEN ARE WE INSECURE ? • Not patching our systems • Using weak passwords • Downloading programs from the internet • Opening email attachments from unknown senders • Using wireless networks without encryption
  • 6. • The good thing is that once we are able to point out the areas in the environment that can cause it to be insecure, we can take steps to mitigate these issues. • This problem is akin to cutting something in half over and over; there will always be some small portion left to cut again. • Although we may never get to state that we can definitively call “secure”, we can take steps in the right direction.
  • 7. MODELS FOR DISCUSSING SECURITY ISSUES • The Confidentiality, Integrity and Availability ( CIA ) Triad Confidentiality Availability Integrity
  • 8. CONFIDENTIALITY • Refers to the ability to protect data from those who are not authorized to view it. • Examples of breaches / compromised confidentiality • Loss of laptop containing data • Person looking over our shoulder while typing our password • Email attachment sent to the wrong person • Attacker penetrating our systems
  • 9. INTEGRITY • Refers to the ability to prevent data from being changed in an unauthorized or undesirable manner. • Means to prevent unauthorized changes to the data • Means to reverse authorized changes that needs to be undone. • Example : undo, rollback
  • 10. AVAILABILITY • Refers to the ability to access our data when we need it. • Examples of loss of availability • Power loss • Operating system or application problems • Network attacks • Compromise of a system • Denial of service attack
  • 11. AVAILABILITY • Refers to the ability to access our data when we need it. • Examples of loss of availability • Power loss • Operating system or application problems • Network attacks • Compromise of a system • Denial of service attack
  • 12. THE PARKERIAN HEXAD • Named after Donn Parker Confidentiality Integrity Availability Possession or Control Authenticity Utility
  • 13. CONFIDENTIALITY • Refers to the ability to protect data from those who are not authorized to view it. • Examples of breaches / compromised confidentiality • Loss of laptop containing data • Person looking over our shoulder while typing our password • Email attachment sent to the wrong person • Attacker penetrating our systems
  • 14. INTEGRITY • Refers to the state of data itself in the sense of completeness
  • 15. AVAILABILITY • Refers to the ability to access our data when we need it. • Examples of loss of availability • Power loss • Operating system or application problems • Network attacks • Compromise of a system • Denial of service attack
  • 16. POSSESSION OR CONTROL • Refers to the physical disposition of the media on which the data is stored
  • 17. AUTHENTICITY • Proper attribution as to the owner or creator of the data in question.
  • 18. UTILITY • Refers to how useful the data is to us
  • 19. ATTACKS • What makes up an attack ? • Type of attack that it represents • The risk the attack represents • Controls to use when mitigating the attack
  • 20. TYPES ATTACKS Confidentiality • Interception Integrity • Interruption • Modification • Fabrication Availability • Interruption • Modification • Fabrication
  • 21. INTERCEPTION • Attacks that allows unauthorized users to access data, applications or environments • Examples : • Unauthorized file viewing or copying • Eavesdropping on phone conversations • Reading emails not yours
  • 22. INTERRUPTION • Attacks that cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis. • Examples : • Denial of Service attack
  • 23. MODIFICATION • Attacks that involves tampering with our assets.
  • 24. FABRICATION • Attacks that involves generating data, processes, communications, or other similar activities with a system
  • 25. THREATS • Things that have potential to cause harm to our assets • Identify the possibility of something happening that can cause a security breach or network outage • example : • Natural threats • Intentional
  • 26. VULNERABILITIES • Weakness that can be used to harm the asset. • Holes that can be exploited by threats to cause harm • Example • Poor coding in software installed • OS vulnerabilities 1. Problems in hardware or physical structure of the machines
  • 27. RISK • The likelihood that something bad will happen • The best strategy is to spend our time mitigating the most likely attacks.
  • 28. RISK MANAGEMENT • Evaluation of threats and the cost of protection
  • 29. IMPACT • Effect that an attack can cause harm considering the value of the asset being threatened.
  • 30. CONTROL • measures in place to help ensure that a given threat us accounted for. • Categories • Physical • Logical • Administrative
  • 31. PHYSICAL CONTROL • Controls to protect the physical environment in which the system sits or where the data is stored • examples : • Fences, gates, locks, guards, cameras, air conditioning system, backup power generators
  • 32. LOGICAL CONTROL • Also called Technical Controls • Controls that protect the system, network, and environment that process, transmit, and store data • examples : • Passwords, encryption, logical access controls, firewalls
  • 33. ADMINISTRATIVE CONTROL • Controls based on rules, policies, laws, procedures, guidelines, and other items that are “paper” in nature. • Set out the rules for how users are expected in the environment to behave • These controls must be totally enforced for compliance. • examples : • Change of password every 90 days • Differing levels of authority
  • 34. DEFENSE IN DEPTH • Strategy to formulate a multi-layered defense what will allow to still mount a successful defense should one or more defensive measures fail. Internal network host application data external network
  • 35. DEFENSIVE IN DEPTH EXTERNAL NETWORK • DMZ • VPN • Logging • Auditing • Penetration Testing • Vulnerability Analysis NETWORK PERIMETER • Firewalls • Proxy • Logging • Stateful Packet Inspection • Auditing • Penetration Testing • Vulnerability Analysis INTERNAL NETWORK • IDS • IPS • Logging • Auditing • Penetration Testing • Vulnerability Analysis HOST • Authentication • Antivirus • IDS • IPS • Password Hashing • Logging • Auditing • Penetration Testing • Vulnerability Analysis APPLICATION • SSO • Content Filtering • Data Validation • Auditing • Penetration Testing • Vulnerability Analysis DATA • Encryption • Access Controls • Backup • Penetration Testing • Vulnerability Analysis