SlideShare a Scribd company logo
1 of 57
Security+ Guide to Network
Security Fundamentals,
Fifth Edition
Chapter 1
INTRODUCTION TO SECURITY
Objectives
• Describe the challenges of securing information
• Define information security and explain why it is
important
• Identify the types of attackers that are common
today
• List the basic steps of an attack
• Describe the five basic principles of defense
Security+ Guide to Network Security Fundamentals, Fifth Edition 2
Challenges of Securing Information
• Today all citizens forced to continually protect
themselves from attacks by invisible foes
• Attacks not just physical but also include attacks on
information technology
• Attacks directed at individuals, schools,
businesses, and governments through desktop
computers, laptops, smartphones, and tablet
computers
• Information security is focused on protecting
electronic information of organizations and users
Security+ Guide to Network Security Fundamentals, Fifth Edition 3
Information Security Personnel
• Chief Information Security Officer (CISO) -
Responsible for assessing, managing, and
implementing security
• Security manager - Supervises technicians,
administrators, and security staff
• Security administrator - Manages daily operations
of security technology
• Security technician - Provide technical support to
configure security hardware, implement security
software, and diagnose and troubleshoot problems
Security+ Guide to Network Security Fundamentals, Fifth Edition 4
Information Security Employment
• Employees with certifications in security are in high
demand
• Security is rarely offshored or outsourced
• Job outlook for security professionals is
exceptionally strong
• U.S. Bureau of Labor Statistics (BLS)
“Occupational Outlook Handbook” indicates job
outlook for information security analysts through
end of decade expected to grow by 22 percent,
faster than average growth rate
Security+ Guide to Network Security Fundamentals, Fifth Edition 5
CompTIA Security+
• CompTIA Security+ certification is widely-
recognized and highly respected vendor-neutral
credential
• Requires passing current certification exam SY0-
401
• Tests knowledge and skills required to: identify
risks; provide infrastructure, application,
operational and information security; apply security
controls to maintain confidentiality, integrity, and
availability; and identify appropriate technologies
and products
Security+ Guide to Network Security Fundamentals, Fifth Edition 6
From comptia.org
Security+ Guide to Network Security Fundamentals, Fifth Edition 7
Cost
• List price voucher $302
• List price voucher with retake option $368
Security+ Guide to Network Security Fundamentals, Fifth Edition 8
Today’s Security Attacks
• Balances manipulated on prepaid debit cards
• Home Wi-Fi network attacked
• Twitter accounts exploited
• Ploutus ATM malware
• Exposed serial servers
• Manipulate aircraft and ocean vessels
• Computer cluster for cracking passwords
• Apple Mac vulnerabilities
• Electronic data records stolen
Security+ Guide to Network Security Fundamentals, Fifth Edition 9
Difficulties in Defending Against
Attacks
• Universally connected devices
• Increased speed of attacks
• Greater sophistication of attacks
• Availability and simplicity of attack tools
• Faster detection of vulnerabilities
• Delays in security updating
• Weak security update distribution
• Distributed attacks
• Introduction of BYOD
• User confusion
Security+ Guide to Network Security Fundamentals, Fifth Edition 10
Menu of Attack Tools (Figure 1-1)
Security+ Guide to Network Security Fundamentals, Fifth Edition 11
Difficulties in Defending (Table 1-2)
Security+ Guide to Network Security Fundamentals, Fifth Edition 12
What Is Information Security?
• Before defense is possible, one must understand:
– What is security
– What information security is
– Information security terminology
– Why it is important
Security+ Guide to Network Security Fundamentals, Fifth Edition 13
Understanding Security
• “Security” is defined as either the process (how to
achieve security) or the goal (what it means to
have security).
• In reality security is both: it is the goal to be free
from danger as well as the process that achieves
that freedom
• Security is the necessary steps to protect a person
or property from harm.
• This harm may come from one of two sources:
– Direct action
– Indirect and unintentional action
Security+ Guide to Network Security Fundamentals, Fifth Edition 14
Security and Convenience
• Relationship between security and convenience
• As security is increased, convenience is often
decreased
• Security is “inversely proportional” to convenience
• The more secure something is, the less convenient
it may become to use
• Security is sacrificing convenience for safety or
giving up short-term comfort for long-term
protection
Security+ Guide to Network Security Fundamentals, Fifth Edition 15
Relationship Security-Convenience
(Figure 1-2)
Security+ Guide to Network Security Fundamentals, Fifth Edition 16
Defining Information Security
• Information security - Tasks of securing
information in digital format:
– Manipulated by a microprocessor
– Stored on a storage device
– Transmitted over a network
• Protection - Information security cannot completely
prevent successful attacks or guarantee that a
system is totally secure
• Protective measures ward off attacks and prevent
total collapse of the system when a successful
attack does occur
Security+ Guide to Network Security Fundamentals, Fifth Edition 17
Three Protections
• Information – Provides value to people and
organizations
• Three protections that must be extended over
information (CIA):
– Confidentiality: Ensures only authorized parties can
view information
– Integrity: Ensures information not altered
– Availability: Ensures information accessible when
needed to authorized parties
Security+ Guide to Network Security Fundamentals, Fifth Edition 18
AAA
• Three additional protections that must be extended
over information (AAA):
– Authentication: Ensures that the individual is who
she claims to be (the authentic or genuine person)
and not an imposter
– Authorization: Providing permission or approval to
specific technology resources
– Accounting: Provides tracking of events
Security+ Guide to Network Security Fundamentals, Fifth Edition 19
Securing Devices
• Devices - Information security involves more than
protecting the information itself
• Information is:
– Stored on computer hardware
– Manipulated by software
– Transmitted by communications
• Each of these areas must also be protected
Security+ Guide to Network Security Fundamentals, Fifth Edition 20
Three Entities
• Entities - Information security is achieved through a
process that is a combination of three entities
• Information and the hardware, software, and
communications are protected in three layers:
– Products
– People
– Policies and procedures
• Procedures enable people to understand how to
use products to protect information
Security+ Guide to Network Security Fundamentals, Fifth Edition 21
Security Layers (Figure 1-3)
Security+ Guide to Network Security Fundamentals, Fifth Edition 22
Security Layers (Table 1-3)
Security+ Guide to Network Security Fundamentals, Fifth Edition 23
Information Security Definition
• Comprehensive definition of information security
involves both the goals and process
• Information security defined as that which protects
the integrity, confidentiality, and availability of
information on the devices that store, manipulate,
and transmit the information through products,
people, and procedures
Security+ Guide to Network Security Fundamentals, Fifth Edition 24
Information Security Terminology:
Asset
• Asset - An item that has value
• In organization assets have these qualities:
– They provide value to the organization
– They cannot easily be replaced without a significant
investment in expense, time, worker skill, and/or
resources
– They can form part of the organization's corporate
identity.
Security+ Guide to Network Security Fundamentals, Fifth Edition 25
Technology Assets (Table 1-4)
Security+ Guide to Network Security Fundamentals, Fifth Edition 26
Information Security Terminology:
Threat
• Threat - Action that has the potential to cause
harm
• Information security threats are events or actions
that represent a danger to information assets
• Threat by itself does not mean that security has
been compromised; rather, it simply means that the
potential for creating a loss is real
• Threat can result in the corruption or theft of
information, a delay in information being
transmitted, or loss of good will or reputation
Security+ Guide to Network Security Fundamentals, Fifth Edition 27
Information Security Terminology:
Threat Agent
• Threat agent - Person or element that has the
power to carry out a threat
• Threat agent can be:
– Person attempting to break into a secure computer
network
– Force of nature such as a hurricane that could
destroy computer equipment and thus destroy
information
– Malicious software that attacks the computer
network
Security+ Guide to Network Security Fundamentals, Fifth Edition 28
Information Security Terminology:
Vulnerability
• Vulnerability - Flaw or weakness that allows a
threat agent to bypass security
• Example is software defect in an operating system
that allows an unauthorized user to gain control of
a computer without the user’s knowledge or
permission
Security+ Guide to Network Security Fundamentals, Fifth Edition 29
Information Security Terminology:
Threat Vector
• Threat vector - means by which an attack can
occur
• Example is attacker, knowing that a flaw in a web
server’s operating system has not been patched, is
using the threat vector (exploiting the vulnerability)
to steal user passwords
• Threat likelihood - probability that threat will come
to fruition
Security+ Guide to Network Security Fundamentals, Fifth Edition 30
Information Security Terminology: Risk
• Risk - situation that involves exposure to some
type of danger.
• Options when dealing with risk:
– Risk avoidance
– Acceptance
– Mitigation
– Deterrence
– Transference
Security+ Guide to Network Security Fundamentals, Fifth Edition 31
Understanding the Importance of
Information Security: Preventing Theft
• Preventing data theft – Stopping data from being
stolen cited as primary objective of information
security
• Business data theft is stealing proprietary business
information
• Personal data is prime target of attackers is credit
card numbers that can be used to purchase
thousands of dollars of merchandise
Security+ Guide to Network Security Fundamentals, Fifth Edition 32
Identity Theft
• Thwarting identity theft - Using another’s personal
information in unauthorized manner for financial
gain
• Example:
– Steal person’s SSN
– Create new credit card account
– Charge purchases
– Leave unpaid
• Serious problem for Internal Revenue Service
(IRS)
Security+ Guide to Network Security Fundamentals, Fifth Edition 33
Avoid Legal Consequences
• Avoiding legal consequences - Businesses that fail
to protect data they possess may face serious
financial penalties from federal or state laws
• Laws protecting electronic data privacy:
– Health Insurance Portability and Accountability
Act of 1996 (HIPAA)
– Sarbanes-Oxley Act of 2002 (Sarbox)
– Gramm-Leach-Bliley Act (GLBA)
– Payment Card Industry Data Security Standard
(PCI DSS)
– CA Database Security Breach Notification Act
Security+ Guide to Network Security Fundamentals, Fifth Edition 34
Cost of Attacks (Table 1-6)
• Maintaining productivity - Post-attack clean up
diverts resources like time and money
Security+ Guide to Network Security Fundamentals, Fifth Edition 35
Foiling Cyberterrorism
• Foiling cyberterrorism - Premeditated, politically
motivated attacks
• Targets are banking, military, power plants, air
traffic control centers
• Designed to:
– Cause panic
– Provoke violence
– Result in financial catastrophe
Security+ Guide to Network Security Fundamentals, Fifth Edition 36
Cyberterrorism Targets
• Potential cyberterrorism targets
– Banking
– Military
– Energy (power plants)
– Transportation (air traffic control centers)
– Water systems
Security+ Guide to Network Security Fundamentals, Fifth Edition 37
Who Are the Attackers?
• Hacker – Older term referred to a person who used
advanced computer skills to attack computers
• Black hat hackers - Attackers who violated
computer security for personal gain or to inflict
malicious damage
• White hat hackers - “Ethical attackers” who
received permission to probe system for any
weaknesses
• Gray hat hackers – Attackers who would break into
a computer system without permission and then
publically disclose vulnerability
Security+ Guide to Network Security Fundamentals, Fifth Edition 38
Cybercrimminals
• Cybercrimminals - Generic term describes
individuals who launch attacks against other users
and their computers
• A loose network of attackers, identity thieves, and
financial fraudsters who are highly motivated, less
risk-averse, well-funded, and tenacious
• Instead of attacking a computer to show off their
technology skills (fame), cybercriminals have a
more focused goal of financial gain (fortune):
cybercriminals steal information or launch attacks
to generate income
Security+ Guide to Network Security Fundamentals, Fifth Edition 39
Script Kiddies
• Script kiddies - Unskilled users with goal to break into
computers to create damage
• Download automated hacking software (scripts) to
use to perform malicious acts
• Attack software today has menu systems and
attacks are even easier for unskilled users
• 40 percent of attacks performed by script kiddies
Security+ Guide to Network Security Fundamentals, Fifth Edition 40
Brokers
• Brokers - Individuals who uncover vulnerabilities do not
report it to the software vendor but instead sell them to
the highest bidder
• These attackers sell their knowledge of a vulnerability
to other attackers or even governments
• Buyers are generally willing to pay a high price because
this vulnerability is unknown
Security+ Guide to Network Security Fundamentals, Fifth Edition 41
Insiders
• Insiders - Employees, contractors, and business
partners who steal from employer
• Most malicious insider attacks consist of the
sabotage or theft of intellectual property
• Offenders are usually employees who actually
believe that the accumulated data is owned by
them and not the organization
• Others are employees have been pressured into
stealing from their employer through blackmail or
the threat of violence
Security+ Guide to Network Security Fundamentals, Fifth Edition 42
Cyberterrorists
• Cyberterrorists – Attackers who have ideological
motivation
• Attacking because of their principles and beliefs
• Cyberterrorists can be inactive for several years
and then suddenly strike in a new way
• Targets may include a small group of computers or
networks that can affect the largest number of
users
• Example: computers that control the electrical
power grid of a state or region
Security+ Guide to Network Security Fundamentals, Fifth Edition 43
Hactivists
• Hactivists – Another group motivated by ideology
• Unlike cyberterrorists who launch attacks against
foreign nations to incite panic, hactivists generally
not as well-defined.
• Attacks can involve breaking into a website and
changing the contents on the site as a means of
making a political statement against those who
oppose their beliefs
• Other attacks can be retaliatory
Security+ Guide to Network Security Fundamentals, Fifth Edition 44
State-Sponsored Attackers
• State-sponsored attackers – Attackers supported
by governments for launching computer attacks
against their foes
• Attackers target foreign governments or even
citizens of the government who are considered
hostile or threatening
Security+ Guide to Network Security Fundamentals, Fifth Edition 45
Steps of an Attack (Steps 1-4)
• Reconnaissance - Probe for any information about
the system to reveal if the system is a viable target
for an attack and how it could be attacked
• Weaponization - Create an exploit and package it
into a deliverable payload that can be used against
the target
• Delivery - The weapon is transmitted to the target
• Exploitation - The exploitation stage triggers the
intruders’ exploit
Security+ Guide to Network Security Fundamentals, Fifth Edition 46
Steps of an Attack (Steps 5-7)
• Installation - The weapon is installed to either
attack the computer or install a remote “backdoor”
so the attacker can access the system.
• Command and Control – Often the compromised
system connects back to the attacker so that the
system can be remotely controlled by the attacker
and receive future instructions
• Actions on Objectives - Now attackers can start to
take actions to achieve their original objectives,
such as stealing user passwords or launching
attacks against other computers
Security+ Guide to Network Security Fundamentals, Fifth Edition 47
Cyber Kill Chain (Figure 1-6)
Security+ Guide to Network Security Fundamentals, Fifth Edition 48
Security+ Guide to Network Security Fundamentals, Fifth Edition
Defenses Against Attacks
• Fundamental security principles for defenses
– Layering
– Limiting
– Diversity
– Obscurity
– Simplicity
49
Layering
• Information security must be created in layers
• Single defense mechanism may be easy to
circumvent
• Unlikely that attacker can break through all defense
layers
• Layered security approach
– Can be useful in resisting a variety of attacks
– Provides the most comprehensive protection
Security+ Guide to Network Security Fundamentals, Fifth Edition 50
Limiting
• Limiting access to information reduces the threat
against it
• Only those who must use data granted access
• Amount of access limited to what that person
needs to know
• Methods of limiting access
– Technology (file permissions)
– Procedural (prohibiting document removal from
premises)
Security+ Guide to Network Security Fundamentals, Fifth Edition 51
Diversity
• Closely related to layering
• Layers must be different (diverse)
• If attackers penetrate one layer then same
techniques unsuccessful in breaking through other
layers
• Breaching one security layer does not compromise
the whole system
• Example of diversity is using security products from
different manufacturers
Security+ Guide to Network Security Fundamentals, Fifth Edition 52
Obscurity
• Obscuring inside details to outsiders
• Example: not revealing details
– Type of computer
– Operating system version
– Brand of software used
• Difficult for attacker to devise attack if system
details are unknown
Security+ Guide to Network Security Fundamentals, Fifth Edition 53
Things I’ve found along the way
Security+ Guide to Network Security Fundamentals, Fifth Edition 54
Things I’ve found along the way
Security+ Guide to Network Security Fundamentals, Fifth Edition 55
Security+ Guide to Network Security Fundamentals, Fifth Edition 56
Security+ Guide to Network
Security Fundamentals,
Fifth Edition
Chapter 1
INTRODUCTION TO SECURITY

More Related Content

What's hot

07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertisingmonchai sopitka
 
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slidesmonchai sopitka
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptsE commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptstintingregorio
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
E business technology
E business technologyE business technology
E business technologyRajThakuri
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4Qamar Farooq
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slidesmonchai sopitka
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Project
 

What's hot (20)

07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptsE commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
E business technology
E business technologyE business technology
E business technology
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
 
E -COMMERCE
E -COMMERCEE -COMMERCE
E -COMMERCE
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
IT security consultancy company profile
IT security consultancy company profileIT security consultancy company profile
IT security consultancy company profile
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 

Viewers also liked

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 PresentationAmy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
CDE InFocus Conference (London): Big data in education - theory and practice
CDE InFocus Conference (London): Big data in education - theory and practiceCDE InFocus Conference (London): Big data in education - theory and practice
CDE InFocus Conference (London): Big data in education - theory and practiceMike Moore
 
stephen_jackson_Security+
stephen_jackson_Security+stephen_jackson_Security+
stephen_jackson_Security+Stephen Jackson
 
Need Of Enterprise Integration
Need Of Enterprise IntegrationNeed Of Enterprise Integration
Need Of Enterprise Integrationkumar gaurav
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Testkhant14
 

Viewers also liked (20)

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
Ch01
Ch01Ch01
Ch01
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Web Scraping
Web ScrapingWeb Scraping
Web Scraping
 
CDE InFocus Conference (London): Big data in education - theory and practice
CDE InFocus Conference (London): Big data in education - theory and practiceCDE InFocus Conference (London): Big data in education - theory and practice
CDE InFocus Conference (London): Big data in education - theory and practice
 
stephen_jackson_Security+
stephen_jackson_Security+stephen_jackson_Security+
stephen_jackson_Security+
 
Need Of Enterprise Integration
Need Of Enterprise IntegrationNeed Of Enterprise Integration
Need Of Enterprise Integration
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Test
 

Similar to Securing Networks Fundamentals Guide

1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasiNova Novelia
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERINGIT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERINGThumilvannanSambanda
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxJhaiJhai6
 

Similar to Securing Networks Fundamentals Guide (20)

1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
information security management
information security managementinformation security management
information security management
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERINGIT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 

More from primeteacher32

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceanilsa9823
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 

Recently uploaded (20)

Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 

Securing Networks Fundamentals Guide

  • 1. Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 1 INTRODUCTION TO SECURITY
  • 2. Objectives • Describe the challenges of securing information • Define information security and explain why it is important • Identify the types of attackers that are common today • List the basic steps of an attack • Describe the five basic principles of defense Security+ Guide to Network Security Fundamentals, Fifth Edition 2
  • 3. Challenges of Securing Information • Today all citizens forced to continually protect themselves from attacks by invisible foes • Attacks not just physical but also include attacks on information technology • Attacks directed at individuals, schools, businesses, and governments through desktop computers, laptops, smartphones, and tablet computers • Information security is focused on protecting electronic information of organizations and users Security+ Guide to Network Security Fundamentals, Fifth Edition 3
  • 4. Information Security Personnel • Chief Information Security Officer (CISO) - Responsible for assessing, managing, and implementing security • Security manager - Supervises technicians, administrators, and security staff • Security administrator - Manages daily operations of security technology • Security technician - Provide technical support to configure security hardware, implement security software, and diagnose and troubleshoot problems Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. Information Security Employment • Employees with certifications in security are in high demand • Security is rarely offshored or outsourced • Job outlook for security professionals is exceptionally strong • U.S. Bureau of Labor Statistics (BLS) “Occupational Outlook Handbook” indicates job outlook for information security analysts through end of decade expected to grow by 22 percent, faster than average growth rate Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. CompTIA Security+ • CompTIA Security+ certification is widely- recognized and highly respected vendor-neutral credential • Requires passing current certification exam SY0- 401 • Tests knowledge and skills required to: identify risks; provide infrastructure, application, operational and information security; apply security controls to maintain confidentiality, integrity, and availability; and identify appropriate technologies and products Security+ Guide to Network Security Fundamentals, Fifth Edition 6
  • 7. From comptia.org Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. Cost • List price voucher $302 • List price voucher with retake option $368 Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. Today’s Security Attacks • Balances manipulated on prepaid debit cards • Home Wi-Fi network attacked • Twitter accounts exploited • Ploutus ATM malware • Exposed serial servers • Manipulate aircraft and ocean vessels • Computer cluster for cracking passwords • Apple Mac vulnerabilities • Electronic data records stolen Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. Difficulties in Defending Against Attacks • Universally connected devices • Increased speed of attacks • Greater sophistication of attacks • Availability and simplicity of attack tools • Faster detection of vulnerabilities • Delays in security updating • Weak security update distribution • Distributed attacks • Introduction of BYOD • User confusion Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. Menu of Attack Tools (Figure 1-1) Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. Difficulties in Defending (Table 1-2) Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. What Is Information Security? • Before defense is possible, one must understand: – What is security – What information security is – Information security terminology – Why it is important Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. Understanding Security • “Security” is defined as either the process (how to achieve security) or the goal (what it means to have security). • In reality security is both: it is the goal to be free from danger as well as the process that achieves that freedom • Security is the necessary steps to protect a person or property from harm. • This harm may come from one of two sources: – Direct action – Indirect and unintentional action Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. Security and Convenience • Relationship between security and convenience • As security is increased, convenience is often decreased • Security is “inversely proportional” to convenience • The more secure something is, the less convenient it may become to use • Security is sacrificing convenience for safety or giving up short-term comfort for long-term protection Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. Relationship Security-Convenience (Figure 1-2) Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. Defining Information Security • Information security - Tasks of securing information in digital format: – Manipulated by a microprocessor – Stored on a storage device – Transmitted over a network • Protection - Information security cannot completely prevent successful attacks or guarantee that a system is totally secure • Protective measures ward off attacks and prevent total collapse of the system when a successful attack does occur Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. Three Protections • Information – Provides value to people and organizations • Three protections that must be extended over information (CIA): – Confidentiality: Ensures only authorized parties can view information – Integrity: Ensures information not altered – Availability: Ensures information accessible when needed to authorized parties Security+ Guide to Network Security Fundamentals, Fifth Edition 18
  • 19. AAA • Three additional protections that must be extended over information (AAA): – Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter – Authorization: Providing permission or approval to specific technology resources – Accounting: Provides tracking of events Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. Securing Devices • Devices - Information security involves more than protecting the information itself • Information is: – Stored on computer hardware – Manipulated by software – Transmitted by communications • Each of these areas must also be protected Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. Three Entities • Entities - Information security is achieved through a process that is a combination of three entities • Information and the hardware, software, and communications are protected in three layers: – Products – People – Policies and procedures • Procedures enable people to understand how to use products to protect information Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. Security Layers (Figure 1-3) Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. Security Layers (Table 1-3) Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. Information Security Definition • Comprehensive definition of information security involves both the goals and process • Information security defined as that which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. Information Security Terminology: Asset • Asset - An item that has value • In organization assets have these qualities: – They provide value to the organization – They cannot easily be replaced without a significant investment in expense, time, worker skill, and/or resources – They can form part of the organization's corporate identity. Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. Technology Assets (Table 1-4) Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. Information Security Terminology: Threat • Threat - Action that has the potential to cause harm • Information security threats are events or actions that represent a danger to information assets • Threat by itself does not mean that security has been compromised; rather, it simply means that the potential for creating a loss is real • Threat can result in the corruption or theft of information, a delay in information being transmitted, or loss of good will or reputation Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. Information Security Terminology: Threat Agent • Threat agent - Person or element that has the power to carry out a threat • Threat agent can be: – Person attempting to break into a secure computer network – Force of nature such as a hurricane that could destroy computer equipment and thus destroy information – Malicious software that attacks the computer network Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. Information Security Terminology: Vulnerability • Vulnerability - Flaw or weakness that allows a threat agent to bypass security • Example is software defect in an operating system that allows an unauthorized user to gain control of a computer without the user’s knowledge or permission Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. Information Security Terminology: Threat Vector • Threat vector - means by which an attack can occur • Example is attacker, knowing that a flaw in a web server’s operating system has not been patched, is using the threat vector (exploiting the vulnerability) to steal user passwords • Threat likelihood - probability that threat will come to fruition Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. Information Security Terminology: Risk • Risk - situation that involves exposure to some type of danger. • Options when dealing with risk: – Risk avoidance – Acceptance – Mitigation – Deterrence – Transference Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. Understanding the Importance of Information Security: Preventing Theft • Preventing data theft – Stopping data from being stolen cited as primary objective of information security • Business data theft is stealing proprietary business information • Personal data is prime target of attackers is credit card numbers that can be used to purchase thousands of dollars of merchandise Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. Identity Theft • Thwarting identity theft - Using another’s personal information in unauthorized manner for financial gain • Example: – Steal person’s SSN – Create new credit card account – Charge purchases – Leave unpaid • Serious problem for Internal Revenue Service (IRS) Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. Avoid Legal Consequences • Avoiding legal consequences - Businesses that fail to protect data they possess may face serious financial penalties from federal or state laws • Laws protecting electronic data privacy: – Health Insurance Portability and Accountability Act of 1996 (HIPAA) – Sarbanes-Oxley Act of 2002 (Sarbox) – Gramm-Leach-Bliley Act (GLBA) – Payment Card Industry Data Security Standard (PCI DSS) – CA Database Security Breach Notification Act Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. Cost of Attacks (Table 1-6) • Maintaining productivity - Post-attack clean up diverts resources like time and money Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. Foiling Cyberterrorism • Foiling cyberterrorism - Premeditated, politically motivated attacks • Targets are banking, military, power plants, air traffic control centers • Designed to: – Cause panic – Provoke violence – Result in financial catastrophe Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. Cyberterrorism Targets • Potential cyberterrorism targets – Banking – Military – Energy (power plants) – Transportation (air traffic control centers) – Water systems Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. Who Are the Attackers? • Hacker – Older term referred to a person who used advanced computer skills to attack computers • Black hat hackers - Attackers who violated computer security for personal gain or to inflict malicious damage • White hat hackers - “Ethical attackers” who received permission to probe system for any weaknesses • Gray hat hackers – Attackers who would break into a computer system without permission and then publically disclose vulnerability Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. Cybercrimminals • Cybercrimminals - Generic term describes individuals who launch attacks against other users and their computers • A loose network of attackers, identity thieves, and financial fraudsters who are highly motivated, less risk-averse, well-funded, and tenacious • Instead of attacking a computer to show off their technology skills (fame), cybercriminals have a more focused goal of financial gain (fortune): cybercriminals steal information or launch attacks to generate income Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. Script Kiddies • Script kiddies - Unskilled users with goal to break into computers to create damage • Download automated hacking software (scripts) to use to perform malicious acts • Attack software today has menu systems and attacks are even easier for unskilled users • 40 percent of attacks performed by script kiddies Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. Brokers • Brokers - Individuals who uncover vulnerabilities do not report it to the software vendor but instead sell them to the highest bidder • These attackers sell their knowledge of a vulnerability to other attackers or even governments • Buyers are generally willing to pay a high price because this vulnerability is unknown Security+ Guide to Network Security Fundamentals, Fifth Edition 41
  • 42. Insiders • Insiders - Employees, contractors, and business partners who steal from employer • Most malicious insider attacks consist of the sabotage or theft of intellectual property • Offenders are usually employees who actually believe that the accumulated data is owned by them and not the organization • Others are employees have been pressured into stealing from their employer through blackmail or the threat of violence Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. Cyberterrorists • Cyberterrorists – Attackers who have ideological motivation • Attacking because of their principles and beliefs • Cyberterrorists can be inactive for several years and then suddenly strike in a new way • Targets may include a small group of computers or networks that can affect the largest number of users • Example: computers that control the electrical power grid of a state or region Security+ Guide to Network Security Fundamentals, Fifth Edition 43
  • 44. Hactivists • Hactivists – Another group motivated by ideology • Unlike cyberterrorists who launch attacks against foreign nations to incite panic, hactivists generally not as well-defined. • Attacks can involve breaking into a website and changing the contents on the site as a means of making a political statement against those who oppose their beliefs • Other attacks can be retaliatory Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. State-Sponsored Attackers • State-sponsored attackers – Attackers supported by governments for launching computer attacks against their foes • Attackers target foreign governments or even citizens of the government who are considered hostile or threatening Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. Steps of an Attack (Steps 1-4) • Reconnaissance - Probe for any information about the system to reveal if the system is a viable target for an attack and how it could be attacked • Weaponization - Create an exploit and package it into a deliverable payload that can be used against the target • Delivery - The weapon is transmitted to the target • Exploitation - The exploitation stage triggers the intruders’ exploit Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. Steps of an Attack (Steps 5-7) • Installation - The weapon is installed to either attack the computer or install a remote “backdoor” so the attacker can access the system. • Command and Control – Often the compromised system connects back to the attacker so that the system can be remotely controlled by the attacker and receive future instructions • Actions on Objectives - Now attackers can start to take actions to achieve their original objectives, such as stealing user passwords or launching attacks against other computers Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. Cyber Kill Chain (Figure 1-6) Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. Security+ Guide to Network Security Fundamentals, Fifth Edition Defenses Against Attacks • Fundamental security principles for defenses – Layering – Limiting – Diversity – Obscurity – Simplicity 49
  • 50. Layering • Information security must be created in layers • Single defense mechanism may be easy to circumvent • Unlikely that attacker can break through all defense layers • Layered security approach – Can be useful in resisting a variety of attacks – Provides the most comprehensive protection Security+ Guide to Network Security Fundamentals, Fifth Edition 50
  • 51. Limiting • Limiting access to information reduces the threat against it • Only those who must use data granted access • Amount of access limited to what that person needs to know • Methods of limiting access – Technology (file permissions) – Procedural (prohibiting document removal from premises) Security+ Guide to Network Security Fundamentals, Fifth Edition 51
  • 52. Diversity • Closely related to layering • Layers must be different (diverse) • If attackers penetrate one layer then same techniques unsuccessful in breaking through other layers • Breaching one security layer does not compromise the whole system • Example of diversity is using security products from different manufacturers Security+ Guide to Network Security Fundamentals, Fifth Edition 52
  • 53. Obscurity • Obscuring inside details to outsiders • Example: not revealing details – Type of computer – Operating system version – Brand of software used • Difficult for attacker to devise attack if system details are unknown Security+ Guide to Network Security Fundamentals, Fifth Edition 53
  • 54. Things I’ve found along the way Security+ Guide to Network Security Fundamentals, Fifth Edition 54
  • 55. Things I’ve found along the way Security+ Guide to Network Security Fundamentals, Fifth Edition 55
  • 56. Security+ Guide to Network Security Fundamentals, Fifth Edition 56
  • 57. Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 1 INTRODUCTION TO SECURITY

Editor's Notes

  1. Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 1 INTRODUCTION TO SECURITY
  2. Objectives Describe the challenges of securing information Define information security and explain why it is important Identify the types of attackers that are common today List the basic steps of an attack Describe the five basic principles of defense
  3. Challenges of Securing Information Today all citizens forced to continually protect themselves from attacks by invisible foes Attacks not just physical but also include attacks on information technology Attacks directed at individuals, schools, businesses, and governments through desktop computers, laptops, smartphones, and tablet computers Information security is focused on protecting electronic information of organizations and users
  4. Information Security Personnel Chief Information Security Officer (CISO) - Responsible for assessing, managing, and implementing security Security manager - Supervises technicians, administrators, and security staff Security administrator - Manages daily operations of security technology Security technician - Provide technical support to configure security hardware, implement security software, and diagnose and troubleshoot problems
  5. Information Security Employment Employees with certifications in security are in high demand Security is rarely offshored or outsourced Job outlook for security professionals is exceptionally strong U.S. Bureau of Labor Statistics (BLS) “Occupational Outlook Handbook” indicates job outlook for information security analysts through end of decade expected to grow by 22 percent, faster than average growth rate
  6. CompTIA Security+ CompTIA Security+ certification is widely-recognized and highly respected vendor-neutral credential Requires passing current certification exam SY0-401 Tests knowledge and skills required to: identify risks; provide infrastructure, application, operational and information security; apply security controls to maintain confidentiality, integrity, and availability; and identify appropriate technologies and products
  7. Today’s Security Attacks Balances manipulated on prepaid debit cards Home Wi-Fi network attacked Twitter accounts exploited Ploutus ATM malware Exposed serial servers Manipulate aircraft and ocean vessels Computer cluster for cracking passwords Apple Mac vulnerabilities Electronic data records stolen
  8. Difficulties in Defending Against Attacks Universally connected devices Increased speed of attacks Greater sophistication of attacks Availability and simplicity of attack tools Faster detection of vulnerabilities Delays in security updating Weak security update distribution Distributed attacks Introduction of BYOD User confusion
  9. Menu of Attack Tools (Figure 1-1) A screenshot of the Kali Linux menu. There are four cascading menus displays. The first menu at the left has Kali Linux highlighted. The next menu to the right has Sniffing/Spoofing highlighted. The next menu has Web Sniffers highlighted. The last menu displays different Kali Linux Web sniffing tools.
  10. Difficulties in Defending (Table 1-2) A table with two columns and nine rows. The first row is composed of column headers: reason and description. Row 2. Reason: Universally connected devices. Description: Attackers from anywhere in the world can send attacks. Row 3. Reason: Increased speed of attacks. Description: Attackers can launch attacks against millions of computers within minutes. Row 4. Reason: Greater sophistication of attacks. Row 4. Description: Attack tools vary their behavior so the same attack appears differently each time. Row 5. Reason: Availability and simplicity of attack tools. Row 5. Description: Attacks are no longer limited to highly skilled attackers. Row 6. Reason: Faster detection of vulnerabilities. Row 6. Description: Attackers can discover security holes in hardware or software more quickly. Row 7. Reason: Delays security updating. Row 7. Description: Vendors are overwhelmed trying to keep pace updating their products against the latest attacks. Row 8. Reason: Weak security update distribution. Row 8. Description: Many software products lack a means to distribute security updates in a timely fashion. Row 9. Reason: Distributed attacks. Row 9. Description: Attackers use thousands of computers in an attack against a single computer or network. Row 10. Reason: Democratization of users. Row 10. Description: Organizations are having difficulty providing security for a wide array of personal devices. Row 11. Reason: User confusion. Row 11. Description: Users are required to make difficult security decisions with little or no instruction.
  11. What Is Information Security? Before defense is possible, one must understand: What is security What information security is Information security terminology Why it is important
  12. Understanding Security “Security” is defined as either the process (how to achieve security) or the goal (what it means to have security). In reality security is both: it is the goal to be free from danger as well as the process that achieves that freedom Security is the necessary steps to protect a person or property from harm. This harm may come from one of two sources: Direct action Indirect and unintentional action
  13. Security and Convenience Relationship between security and convenience As security is increased, convenience is often decreased Security is “inversely proportional” to convenience The more secure something is, the less convenient it may become to use Security is sacrificing convenience for safety or giving up short-term comfort for long-term protection
  14. Relationship Security-Convenience (Figure 1-2) Figure 1-2: Relationship of security to convenience. A graph with the X-axis labeled Security ranging form Low to High. The Y-axis is labeled Convenience ranging from Low to High. The line starts at High on the Y-axis Convenience and then decreases to High on the X-axis Security.
  15. Defining Information Security Information security - Tasks of securing information in digital format: Manipulated by a microprocessor Stored on a storage device Transmitted over a network Protection - Information security cannot completely prevent successful attacks or guarantee that a system is totally secure Protective measures ward off attacks and prevent total collapse of the system when a successful attack does occur
  16. Three Protections Information – Provides value to people and organizations Three protections that must be extended over information (CIA): Confidentiality: Ensures only authorized parties can view information Integrity: Ensures information not altered Availability: Ensures information accessible when needed to authorized parties
  17. AAA Three additional protections that must be extended over information (AAA): Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter Authorization: Providing permission or approval to specific technology resources Accounting: Provides tracking of events
  18. Securing Devices Devices - Information security involves more than protecting the information itself Information is: Stored on computer hardware Manipulated by software Transmitted by communications Each of these areas must also be protected
  19. Three Entities Entities - Information security is achieved through a process that is a combination of three entities Information and the hardware, software, and communications are protected in three layers: Products People Policies and procedures Procedures enable people to understand how to use products to protect information
  20. Security Layers (Figure 1-3) A figure of three concentric circles with a core in the middle. The core has Information in the center, with Confidentiality to the upper left, Integrity to the upper right, and Availability beneath it. Each are connected with a line to Information, and a padlock appears beneath each word. A circle encompasses this information. Communications overlaps the top of the circle with a group of individuals, while Hardware overlaps the lower left of the circle with the picture of a hard drive, while software overlaps the circle with a picture of a disc to the lower right. The first concentric circle outside this core is labeled Products (physical security) and has the picture of a computer. The second concentric circle is labeled People (personnel security) and has a picture of users. The third concentric circle is labeled Procedures (organizational security) and has a picture of a piece of paper.
  21. Security Layers (Table 1-3) A table with two columns and four rows. The first row is composed of column headers: Layer and Description. Row 2. Layer: Products. Row 2. Description: Form the security around the data. May be as basic as door locks or as complicated as network security equipment. Row 3. Layer: People. Row 3. Description: Those who implement and properly use security products to protect data. Row 4. Layer: Policies and procedures. Row 4. Description: Plans and policies established by an organization to ensure that people correctly use the products.
  22. Information Security Definition Comprehensive definition of information security involves both the goals and process Information security defined as that which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
  23. Information Security Terminology: Asset Asset - An item that has value In organization assets have these qualities: They provide value to the organization They cannot easily be replaced without a significant investment in expense, time, worker skill, and/or resources They can form part of the organization's corporate identity.
  24. Technology Assets (Table 1-4) A table with four columns and six rows. The first row is composed of column headers: Element name, Description, Example, and Critical asset?. Row 2. Element name: Information. Row 2. Description: Data that has been collected, classified, organized, and stored in various forms. Row 2. Example: Customer, personnel, production, sales, marketing, and finance databases. Row 2: Critical Asset? Yes: Extremely difficult to replace. Row 3. Element name: Customized business software. Row 3. Description: Software that supports the business processes of the organization. Row 3. Example: Customized order transaction application. Row 3. Critical Asset? Yes: Unique and customized for the organization. Row 4. Element name: System software. Row 4. Description: Software that provides the foundation for application software. Row 4. Example: Operating system. Row 4. Critical Asset? No: Can be easily replaced. Row 5. Element name: Physical items. Row 5. Description: Computers equipment, communications equipment, storage media, furniture, and fixtures. Row 5. Example: Servers, routers, DVDs, and power supplies. Row 5. Critical asset? No: Can be easily replaced. Row 6. Element name: Services. Row 6. Description: Outsourced computing services. Row 6. Example: Voice and data communications. Row 6. Critical asset? No: Can be easily replaced.
  25. Information Security Terminology: Threat Threat - Action that has the potential to cause harm Information security threats are events or actions that represent a danger to information assets Threat by itself does not mean that security has been compromised; rather, it simply means that the potential for creating a loss is real Threat can result in the corruption or theft of information, a delay in information being transmitted, or loss of good will or reputation
  26. Information Security Terminology: Threat Agent Threat agent - Person or element that has the power to carry out a threat Threat agent can be: Person attempting to break into a secure computer network Force of nature such as a hurricane that could destroy computer equipment and thus destroy information Malicious software that attacks the computer network
  27. Information Security Terminology: Vulnerability Information Security Terminology: Threat Agent Threat agent - Person or element that has the power to carry out a threat Threat agent can be: Person attempting to break into a secure computer network Force of nature such as a hurricane that could destroy computer equipment and thus destroy information Malicious software that attacks the computer network
  28. Information Security Terminology: Threat Vector Threat vector - means by which an attack can occur Example is attacker, knowing that a flaw in a web server’s operating system has not been patched, is using the threat vector (exploiting the vulnerability) to steal user passwords Threat likelihood - probability that threat will come to fruition
  29. Information Security Terminology: Risk Risk - situation that involves exposure to some type of danger. Options when dealing with risk: Risk avoidance Acceptance Mitigation Deterrence Transference
  30. Understanding the Importance of Information Security: Preventing Theft Preventing data theft – Stopping data from being stolen cited as primary objective of information security Business data theft is stealing proprietary business information Personal data is prime target of attackers is credit card numbers that can be used to purchase thousands of dollars of merchandise
  31. Identity Theft Thwarting identity theft - Using another’s personal information in unauthorized manner for financial gain Example: Steal person’s SSN Create new credit card account Charge purchases Leave unpaid Serious problem for Internal Revenue Service (IRS)
  32. Avoid Legal Consequences Avoiding legal consequences - Businesses that fail to protect data they possess may face serious financial penalties from federal or state laws Laws protecting electronic data privacy: Health Insurance Portability and Accountability Act of 1996 (HIPAA) Sarbanes-Oxley Act of 2002 (Sarbox) Gramm-Leach-Bliley Act (GLBA) Payment Card Industry Data Security Standard (PCI DSS) CA Database Security Breach Notification Act (2003)
  33. Cost of Attacks (Table 1-6) Maintaining productivity - Post-attack clean up diverts resources like time and money Table 1-6: Cost of attacks A table with six columns and five rows. The first row is composed of column headers: Number of total employees, Average hourly salary, Number of employees to combat attack, Hours required to stop attack and clean up, Total lost salaries, and Total lost hours of productivity. Row 2. Number of total employees: 100. Row 2. Average hourly salary: $25. Row 2. Number of employees to combat attack: 1. Row 2. Hours required to stop attack and clean up: 48. Row 2. Total lost salaries: $4,066. Row 2. Total lost hours of productivity: 81. Row 3. Number of total employees: 250. Row 3. Average hourly salary: $25. Row 3. Number of employees to combat attack: 3. Row 3. Hours required to stop attack and clean up: 72. Row 3. Total lost salaries: $17,050. Row 3. Total lost hours of productivity: 300. Row 4. Number of total employees: 500. Row 4. Average hourly salary: $30. Row 4. Number of employees to combat attack: 5. Row 4. Hours required to stop attack and clean up: 80. Row 4. Total lost salaries: $28,333. Row 4. Total lost hours of productivity: 483. Row 5. Number of total employees: 1,000. Row 5. Average hourly salary: $30. Row 5. Number of employees to combat attack: 10. Row 5. Hours required to stop attack and clean up: 96. Row 5. Total lost salaries: $220,000. Row 5. Total lost hours of productivity: 1,293.
  34. Foiling Cyberterrorism Foiling cyberterrorism - Premeditated, politically motivated attacks Targets are banking, military, power plants, air traffic control centers Designed to: Cause panic Provoke violence Result in financial catastrophe
  35. Cyberterrorism Targets Potential cyberterrorism targets Banking Military Energy (power plants) Transportation (air traffic control centers) Water systems
  36. Who Are the Attackers? Hacker – Older term referred to a person who used advanced computer skills to attack computers Black hat hackers - Attackers who violated computer security for personal gain or to inflict malicious damage White hat hackers - “Ethical attackers” who received permission to probe system for any weaknesses Gray hat hackers – Attackers who would break into a computer system without permission and then publically disclose vulnerability
  37. Cybercrimminals Cybercrimminals - Generic term describes individuals who launch attacks against other users and their computers A loose network of attackers, identity thieves, and financial fraudsters who are highly motivated, less risk-averse, well-funded, and tenacious Instead of attacking a computer to show off their technology skills (fame), cybercriminals have a more focused goal of financial gain (fortune): cybercriminals steal information or launch attacks to generate income
  38. Script Kiddies Script kiddies - Unskilled users with goal to break into computers to create damage Download automated hacking software (scripts) to use to perform malicious acts Attack software today has menu systems and attacks are even easier for unskilled users 40 percent of attacks performed by script kiddies
  39. Brokers Brokers - Individuals who uncover vulnerabilities do not report it to the software vendor but instead sell them to the highest bidder These attackers sell their knowledge of a vulnerability to other attackers or even governments Buyers are generally willing to pay a high price because this vulnerability is unknown
  40. Insiders Insiders - Employees, contractors, and business partners who steal from employer Most malicious insider attacks consist of the sabotage or theft of intellectual property Offenders are usually employees who actually believe that the accumulated data is owned by them and not the organization Others are employees have been pressured into stealing from their employer through blackmail or the threat of violence
  41. Cyberterrorists Cyberterrorists – Attackers who have ideological motivation Attacking because of their principles and beliefs Cyberterrorists can be inactive for several years and then suddenly strike in a new way Targets may include a small group of computers or networks that can affect the largest number of users Example: computers that control the electrical power grid of a state or region
  42. Hactivists Hactivists – Another group motivated by ideology Unlike cyberterrorists who launch attacks against foreign nations to incite panic, hacttivists generally not as well-defined. Attacks can involve breaking into a website and changing the contents on the site as a means of making a political statement against those who oppose their beliefs Other attacks can be retaliatory
  43. State-Sponsored Attackers State-sponsored attackers – Attackers supported by governments for launching computer attacks against their foes Attackers target foreign governments or even citizens of the government who are considered hostile or threatening
  44. Steps of an Attack (Steps 1-4) Reconnaissance - Probe for any information about the system to reveal if the system is a viable target for an attack and how it could be attacked Weaponization - Create an exploit and package it into a deliverable payload that can be used against the target Delivery - The weapon is transmitted to the target Exploitation - The exploitation stage triggers the intruders’ exploit
  45. Steps of an Attack (Steps 5-7) Installation - The weapon is installed to either attack the computer or install a remote “backdoor” so the attacker can access the system. Command and Control – Often the compromised system connects back to the attacker so that the system can be remotely controlled by the attacker and receive future instructions Actions on Objectives - Now attackers can start to take actions to achieve their original objectives, such as stealing user passwords or launching attacks against other computers
  46. Cyber Kill Chain (Figure 1-6) A figure of seven boxes each connected with an arrow to the next box in the sequence. The first box is Reconnaissance. The second box is Weaponization. The third box is Delivery. The fourth box is Exploitation. The fifth box is Installation. The sixth box is Command and Control. The seventh box is Actions on Objectives.
  47. Defenses Against Attacks Fundamental security principles for defenses Layering Limiting Diversity Obscurity Simplicity
  48. Layering Information security must be created in layers Single defense mechanism may be easy to circumvent Unlikely that attacker can break through all defense layers Layered security approach Can be useful in resisting a variety of attacks Provides the most comprehensive protection
  49. Limiting Limiting access to information reduces the threat against it Only those who must use data granted access Amount of access limited to what that person needs to know Methods of limiting access Technology (file permissions) Procedural (prohibiting document removal from premises)
  50. Diversity Closely related to layering Layers must be different (diverse) If attackers penetrate one layer then same techniques unsuccessful in breaking through other layers Breaching one security layer does not compromise the whole system Example of diversity is using security products from different manufacturers
  51. Obscurity Obscuring inside details to outsiders Example: not revealing details Type of computer Operating system version Brand of software used Difficult for attacker to devise attack if system details are unknown
  52. Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 1 INTRODUCTION TO SECURITY