The document discusses a technology and security class. It provides an agenda that covers IT news, an exam follow-up, and a focus on security. Under security news, it lists several recent computer virus and hacking incidents. It then discusses common security myths and holds a quick security assessment activity. The rest of the document outlines various security topics like definitions of security concepts, security risks, protection methods, and ways to assess security risks. It emphasizes the importance of backups, strong passwords, and keeping systems updated with patches.
Proactive Measures to Defeat Insider ThreatAndrew Case
This presentation was delivered at RSA 2016 and discussed measures to defeat insider threat. It focused on real investigations that I have performed and how the victim companies could have prevented the associated harm.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cyber Warfare is the current single greatest emerging threat to National Security. Network security has become an essential component of any computer network. As computer networks and systems become ever more fundamental to modern society, concerns about security has become increasingly important. There are a multitude of different applications open source and proprietary available for the protection +-system administrator, to decide on the most suitable format for their purpose requires knowledge of the available safety measures, their features and how they affect the quality of service, as well as the kind of data they will be allowing through un flagged. A majority of methods currently used to ensure the quality of a networks service are signature based. From this information, and details on the specifics of popular applications and their implementation methods, we have carried through the ideas, incorporating our own opinions, to formulate suggestions on how this could be done on a general level. The main objective was to design and develop an Intrusion Detection System. While the minor objectives were to; Design a port scanner to determine potential threats and mitigation techniques to withstand these attacks. Implement the system on a host and Run and test the designed IDS. In this project we set out to develop a Honey Pot IDS System. It would make it easy to listen on a range of ports and emulate a network protocol to track and identify any individuals trying to connect to your system. This IDS will use the following design approaches: Event correlation, Log analysis, Alerting, and policy enforcement. Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, we have developed a methodology for testing IDSs. The methodology consists of techniques from the field of software testing which we have adapted for the specific purpose of testing IDSs. In this paper, we identify a set of general IDS performance objectives which is the basis for the methodology. We present the details of the methodology, including strategies for test-case selection and specific testing procedures. We include quantitative results from testing experiments on the Network Security Monitor (NSM), an IDS developed at UC Davis. We present an overview of the software platform that we have used to create user-simulation scripts for testing experiments. The platform consists of the UNIX tool expect and enhancements that we have developed, including mechanisms for concurrent scripts and a record-and-replay feature. We also provide background information on intrusions and IDSs to motivate our work.
How to Build a Successful Incident Response ProgramResilient Systems
Building an incident response program can be a cumbersome task when done manually. From identifying incident types and severity to creating a response plan for each incident type, Co3 provides an easy to use, customizable solution for quickly assessing, responding to, and driving incidents to closure. Co3 customer, USA Funds, manages incidents in one tenth of the time that it took previously.
This webinar will guide security practitioners through the process of creating a basic incident response process using Co3's Security Incident Response module. Based on a list of accumulated best practices, this webinar will give team members a good start on creating a successful incident response program to use at their organization.
Our featured speakers for this timely webinar will be:
-Ted Julian, Chief Marketing Officer, Co3 Systems
-Tim Armstrong, Security Incident Response Specialist, Co3 Systems
Incident Response in the age of Nation State Cyber AttacksResilient Systems
One of the most important and yet least discussed aspects of any corporate structure is the incident response framework. As recent events have highlighted, the risk of intellectual property and critical infrastructure being the target of a cyber-attack is quite real. More than ever before, corporate preparation and response plans are necessary for any entity operating in the digital age.
This webinar will examine how an organization's incident response framework can help limit the exposure of intellectual property and critical infrastructure to outside, malicious parties. Our presenters will review how to construct corporate response plans that yield best-of-breed preparedness.
Our featured speakers for this timely webinar are:
-Mike Gibbons, Managing Director, Alvarez and Marsal, former FBI Special Agent as Unit Chief, overseeing all cyber crime investigations
-Art Ehuan, Managing Director, Alvarez and Marsal, former FBI Supervisory Special Agent assigned to the Computer Crimes Investigations Program
-Gant Redmon, Esq. CIPP/US General Counsel and Vice President of Business Development at Co3
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
Proactive Measures to Defeat Insider ThreatAndrew Case
This presentation was delivered at RSA 2016 and discussed measures to defeat insider threat. It focused on real investigations that I have performed and how the victim companies could have prevented the associated harm.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cyber Warfare is the current single greatest emerging threat to National Security. Network security has become an essential component of any computer network. As computer networks and systems become ever more fundamental to modern society, concerns about security has become increasingly important. There are a multitude of different applications open source and proprietary available for the protection +-system administrator, to decide on the most suitable format for their purpose requires knowledge of the available safety measures, their features and how they affect the quality of service, as well as the kind of data they will be allowing through un flagged. A majority of methods currently used to ensure the quality of a networks service are signature based. From this information, and details on the specifics of popular applications and their implementation methods, we have carried through the ideas, incorporating our own opinions, to formulate suggestions on how this could be done on a general level. The main objective was to design and develop an Intrusion Detection System. While the minor objectives were to; Design a port scanner to determine potential threats and mitigation techniques to withstand these attacks. Implement the system on a host and Run and test the designed IDS. In this project we set out to develop a Honey Pot IDS System. It would make it easy to listen on a range of ports and emulate a network protocol to track and identify any individuals trying to connect to your system. This IDS will use the following design approaches: Event correlation, Log analysis, Alerting, and policy enforcement. Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, we have developed a methodology for testing IDSs. The methodology consists of techniques from the field of software testing which we have adapted for the specific purpose of testing IDSs. In this paper, we identify a set of general IDS performance objectives which is the basis for the methodology. We present the details of the methodology, including strategies for test-case selection and specific testing procedures. We include quantitative results from testing experiments on the Network Security Monitor (NSM), an IDS developed at UC Davis. We present an overview of the software platform that we have used to create user-simulation scripts for testing experiments. The platform consists of the UNIX tool expect and enhancements that we have developed, including mechanisms for concurrent scripts and a record-and-replay feature. We also provide background information on intrusions and IDSs to motivate our work.
How to Build a Successful Incident Response ProgramResilient Systems
Building an incident response program can be a cumbersome task when done manually. From identifying incident types and severity to creating a response plan for each incident type, Co3 provides an easy to use, customizable solution for quickly assessing, responding to, and driving incidents to closure. Co3 customer, USA Funds, manages incidents in one tenth of the time that it took previously.
This webinar will guide security practitioners through the process of creating a basic incident response process using Co3's Security Incident Response module. Based on a list of accumulated best practices, this webinar will give team members a good start on creating a successful incident response program to use at their organization.
Our featured speakers for this timely webinar will be:
-Ted Julian, Chief Marketing Officer, Co3 Systems
-Tim Armstrong, Security Incident Response Specialist, Co3 Systems
Incident Response in the age of Nation State Cyber AttacksResilient Systems
One of the most important and yet least discussed aspects of any corporate structure is the incident response framework. As recent events have highlighted, the risk of intellectual property and critical infrastructure being the target of a cyber-attack is quite real. More than ever before, corporate preparation and response plans are necessary for any entity operating in the digital age.
This webinar will examine how an organization's incident response framework can help limit the exposure of intellectual property and critical infrastructure to outside, malicious parties. Our presenters will review how to construct corporate response plans that yield best-of-breed preparedness.
Our featured speakers for this timely webinar are:
-Mike Gibbons, Managing Director, Alvarez and Marsal, former FBI Special Agent as Unit Chief, overseeing all cyber crime investigations
-Art Ehuan, Managing Director, Alvarez and Marsal, former FBI Supervisory Special Agent assigned to the Computer Crimes Investigations Program
-Gant Redmon, Esq. CIPP/US General Counsel and Vice President of Business Development at Co3
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
5 Simple Actions to Make a Measurable Impact on Your Responsive Site5th Finger
Our President, Patrick Collins, presented at eTail East 2013 in Philadelphia, PA, on 5 Simple Actions to Make a Measurable Impact on Your Responsive Site. Listen to what he had to say, and contact him with any questions or comments at patrick.collins@5thfinger.com.
A hands-on introduction to the ELF Object file formatrety61
In our 6th semester we developed miASMa - a 2 pass Macro Assembler for an x86 machine. miASMa generates Relocatable Object Files that conforming to the ELF Format.
As soluções da NetWitness capturam todos os dados que circulam na rede e os contextualizam, filtrando o que pode ser crítico ou não. O usuario pode ver quem está indo aonde e vendo o quê.
"Cyberhunting" actively looks for signs of compromise within an organization and seeks to control and minimize the overall damage. These rare, but essential, breed of enterprise cyber defenders give proactive security a whole new meaning.
Check out the accompanying webinar: http://www.hosting.com/resources/webinars/?commid=228353
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
Security and Ethical Challenges
Contributors: Kim Wandersee, Les Pang
Computer Security
Computer Security Goals
Computer security must be viewed in a holistic manner and provide an end-to-end protection
as data moves through its lifecycle. Data originates from a user or sensor, passes over a
network to reach a computing system that hosts software. This computer system has software
and processes the data and stores in in a storage device. That data is backed up on a device
and finally archived. The elements that handle the data need to be secure. Computer security
pertains to all the means to protect the confidentiality, integrity, availability, authenticity,
utility, and possession of data throughout its lifecycle.
Confidentiality: A security principle that
works to ensure that data is not disclosed to
unauthorized persons.
Integrity: A security principle that makes sure
that information and systems are not
modified maliciously or accidentally.
Availability: A security principle that assures
reliable and timely access to data and
resources by authorized individuals.
Authenticity: A security principle that the
data, transactions, communications or
documents are genuine, valid, and not
fraudulent.
Utility: A security principle that addresses
that the information is usable for its intended
purpose. .
Possession: A security principle that works to
ensure that data remains under the control of
the authorized individuals.
Figure 1. Parkerian Hexad (PH) security model.
The Parerian Hexad (PH) model expands on the Confidentiality, Integrity, and Availability (CIA)
triad that has been the basic model of Information Security for over 20 years. This framework is
used to list all aspects of security at a basic level. It provides a complete security framework to
provide the means for information owners to protect their information from any adversaries
and vulnerabilities. It adds Authenticity, Utility, and Possession to CIA triad security model. It
addresses security aspects for data throughout its lifecycle.
The Center for Internet Security has identified 20 controls necessary to protect an organization
from known cyber-attack. The first 5 controls will provide effective defense against the most
common cyber-attacks, approximately 85% of attacks. The 5 controls are:
1. Inventory of Authorized and Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software
4. Continuous Vulnerability Assessment and Remediation
5. Controlled User of Administrative Privileges
A full explanation of all 20 controls is available at the Center for Internet Security website.
Search for CIS controls.
Security Standards and Regulations
The National Institute of Standards and Technology (NIST), Computer Security Division, provides
security standards in its Federal Information Processing Standards (.
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
Security and Ethical Challenges
Contributors: Kim Wandersee, Les Pang
Computer Security
Computer Security Goals
Computer security must be viewed in a holistic manner and provide an end-to-end protection
as data moves through its lifecycle. Data originates from a user or sensor, passes over a
network to reach a computing system that hosts software. This computer system has software
and processes the data and stores in in a storage device. That data is backed up on a device
and finally archived. The elements that handle the data need to be secure. Computer security
pertains to all the means to protect the confidentiality, integrity, availability, authenticity,
utility, and possession of data throughout its lifecycle.
Confidentiality: A security principle that
works to ensure that data is not disclosed to
unauthorized persons.
Integrity: A security principle that makes sure
that information and systems are not
modified maliciously or accidentally.
Availability: A security principle that assures
reliable and timely access to data and
resources by authorized individuals.
Authenticity: A security principle that the
data, transactions, communications or
documents are genuine, valid, and not
fraudulent.
Utility: A security principle that addresses
that the information is usable for its intended
purpose. .
Possession: A security principle that works to
ensure that data remains under the control of
the authorized individuals.
Figure 1. Parkerian Hexad (PH) security model.
The Parerian Hexad (PH) model expands on the Confidentiality, Integrity, and Availability (CIA)
triad that has been the basic model of Information Security for over 20 years. This framework is
used to list all aspects of security at a basic level. It provides a complete security framework to
provide the means for information owners to protect their information from any adversaries
and vulnerabilities. It adds Authenticity, Utility, and Possession to CIA triad security model. It
addresses security aspects for data throughout its lifecycle.
The Center for Internet Security has identified 20 controls necessary to protect an organization
from known cyber-attack. The first 5 controls will provide effective defense against the most
common cyber-attacks, approximately 85% of attacks. The 5 controls are:
1. Inventory of Authorized and Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software
4. Continuous Vulnerability Assessment and Remediation
5. Controlled User of Administrative Privileges
A full explanation of all 20 controls is available at the Center for Internet Security website.
Search for CIS controls.
Security Standards and Regulations
The National Institute of Standards and Technology (NIST), Computer Security Division, provides
security standards in its Federal Information Processing Standards ( ...
Cyber Security: A Hands on review on what is cyber security and how to prevent your devices from hacking and data breach. In today's era almost all devices are connected to internet are available for hackers to breach into and do their work. The data breach can be very dangerous and sometimes even more that it can demolish a company or a person.
In this presentation we will discuss about the ways and short description on Cyber Securty and Techniques.
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
Cutting through the APT hype to help businesses prevent, detect and mitigate advanced threats.
Sophisticated cyber-espionage operations aimed at pilfering
trade secrets and other sensitive data from corporate networks currently present the biggest threat to businesses. Advanced threat actors ranging from nation-state adversaries to organized cyber-crime gangs are using zero-day exploits, customized malware toolkits and clever social engineering tricks to break into corporate networks, avoid detection,
and steal valuable information over an extended period
of time.
In this presentation, we will cut through some of the hype
surrounding Advanced Persistent Threats (APTs), explain the
intricacies of these attacks and present recommendations to
help you improve your security posture through prevention,
detection and mitigation.
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Technology Computing Conference
Presenter: Andrew Pond, Palm Beach State College
“Just because you're paranoid doesn't mean they aren't after you”. Ever pause just a moment before clicking past that security warning about an unsafe email? What about installation instructions that explicitly state to turn off your firewall and virus protection? I think, well that can't be right… hmmm. Gain an understanding of which security essentials should be introduced to students. This session will cover best practices that keep your Windows 8 computer safe and survey some of the threats that are directed toward the corporate world. Be prepared for the next tech trivia challenge, when the category covers SSL, IPSEC, Spoofing, Encryption, and more. Between the pop-up alerts on your computer to paranoia from the news, each of us should be thankful that we get through the day without having our identity stolen and our computer destroyed. The TSA thinks we are all safer if we take or shoes off while traveling. Really? Let us not take a similar approach with our own computer security.
Information security awareness is an essential part of your information security program (ISMS - Information Security Management System). You can find a comprehensive set of security policies and frameworks at https://templatesit.com.
Cybersecurity is the practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks.
Topic Covered:
Cyber Security Introduction
Online & Offline Identities
Hackers and their types
Cyberwarfare
Cyber Attacks Concepts & Techniques
System, Software & Hardware Vulnerabilities
Security Vulnerabilities Categories
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
4. Security News
Computer spyware is newest weapon in Syrian conflict
A U.S.-based antivirus software maker, which analyzed one of the viruses at
CNN's request, said that it was recently written for a specific cyberespionage
campaign and that it passes information it robs from computers to a server at a
government-owned telecommunications company in Syria.
Virus infects computer at CCSU (Central CT State Univ.)
The virus, which perpetrated the infection, was a variant of the malevolent
software, ZBot said James Estrada, Spokesman of the university. According to
him, except for the Social Security Numbers, no other private detail was
compromised. Ctpost.com reported this on February 16, 2012.
Computer Infections to Rise During #Oscars ?
NORIS system shut down over virus
A critical computer network is down after falling victim to a sophisticated worm.
Friday, that system is down for the third day, impacting about 200 different
agencies, including police departments, jails and courts all over northwest Ohio.
High School student blamed for uploading virus to school PC
4-8% of computers in China have viruses
5. The List ….
Latest 5 virus alerts
2/27/12 W32/Autorun-BUY
2/27/12 Troj/ZBot-BNF
2/27/12 Troj/ZBot-BNE
2/27/12 Troj/JavaSMS-L
2/27/12 Mal/ZboCheman-A
Source: Sophos Anti-Virus
Top 5 viruses in October 2010
1 Troj/Invo-Zip
2 W32/Netsky
3 Mal/EncPk-EI
4 Troj/Pushdo-Gen
5 Troj/Agent-HFU
Source: Sophos Anti-Virus
6. Security Myths
Why should I care? I have nothing to hide.
There is nothing on my computer that
anyone would want.
I have the best security set-up.
I have a firewall/virus program.
Hackers usually go after big companies.
I use a MAC!
7. Quick Check!
On your own (5 minutes) – on the cards
1. Your name
2. What is computer security?
3. List 2 ways in which users put themselves at risk
4. On a scale of 1-10 (1=never safe, 10=totally secure), how safe do
you feel from computer threats (viruses, worms, hackers, etc.)?
5. On a scale of 1-10 (1=never, 10=always), how often do you
protect your computer from viruses?
6. On a scale of 1-10 (1=never, 10=always), how often do you
provide personal information on the web
8. What is the goal of
Computer Security?
To prevent and detect unauthorized actions by users of the
system
How do you achieve Computer Security?
– Security principles/concepts: explore general
principles/concepts that can be used as a guide to design
secure information processing systems
– Security mechanisms: explore some of the security
mechanisms that can be used to secure information
processing systems
– Physical/Organizational security: consider physical &
organizational security measures (policies)
Take a class in SECURITY
Get certified – CISSP
9. Security Defined
What is Computer Security (in reality)?
– Confidentiality: prevent unauthorized disclosure of information
– Integrity: prevent unauthorized modification of information
– Availability: prevent unauthorized withholding of information
CIA model is the basis of Information
Assurance
Additional criteria:
• Authenticity, accountability, reliability, safety,
dependability, survivability, currency, etc.
10. Security Defined (CIA)
Confidentiality: prevent unauthorized disclosure of
information
• privacy: protection of private data
• secrecy: protection of organizational data
• https:// pgp ssh ipsec
Integrity: prevent unauthorized modification of
information
• Preventing unauthorized writing or modifications
• Access control
Availability: prevent unauthorized withholding of
information
• Services are accessible and useable (without undue delay) whenever
needed by an authorized entity
• 24/7 – no DOS
12. Beyond CIA
Accountability
– Actions affecting security must be traceable to the responsible party (audits)
– Audit information must be kept and protected (compliance with SOX)
– Access control is needed
Reliability – deals with accidental damage (do you get consistent
performance)
Dependability – reliance can be justifiably placed on the system
(similar to integrity)
Survivability/Disaster Recovery/Business Continuity – deals with
the recovery of the system after massive failure (especially after
9/11)
13. Finding a Balance
• Security policies interfere with working patterns,
and can be very inconvenient
• Require a focus on new workflows
• Security mechanisms need additional computational
resources
• Security should be a forethought
• Managing security requires additional effort and
costs
• ROI is hard to determine
• Ideally, there should be a trade-off
14. Finding a Balance
Application Software
|
|
User ---------------------------|-------------------- Resource
(subject) | (object)
|
Hardware
The Dimensions of Computer Security
15. Asking the Right Questions
Should protection focus on data, operations, or users? (See the
onion.)
In which layer should we place security?
Could we place it in all layers?
Should security focus on simplicity (i.e., complexity, assurance, one
password entry, lots of passwords)?
Should security control tasks be given to a central entity, or left to
individual components (i.e., people, departments, divisions, etc. )?
Who controls the security policy? Hardware
OS
Services
Applications
17. Hardware
Hardware is more visible to criminals
It is easier to add/remove/change hardware devices,
intercept traffic, flood devices with traffic, and in
general control hardware devices’ functionality
Hardware is ignored in security training
Hardware can also be removed – VA laptop, DOD
laptop, hard drives lost, etc.
EX: UNC Since Jan. 1, the Chapel Hill Police Department has received reports of the theft of 45
laptops. Some were reportedly stolen in residential or business break-ins, others were taken
during armed robberies or when their owners left them unattended.
18. Software
Interruption (deletion): surprisingly easy!
Modification:
– Logic bomb – failure occurs when certain conditions are
met
– Buffer overflow – similar to logic or programming error
– Virus – a specific Trojan horse that can be used to spread its
“infection”
– Worm – self-reproducing program (usually spreads through
e-mails)
– Trapdoor – a program that has a specific entry point
Interception (theft): unauthorized copying
19. Software
Phishing
Ex.: During the 12 months that ended in May 2005, 73 million American adults who use the
Internet said that they "definitely" received or "thought they received" an average of more
than 50 phishing e-mails. That number was 28 percent higher than the previous year.
Where do they originate?
20. Data
Data are readily accessible
Attacks on data are more widespread
Data are everywhere …. We give it away
to everyone!
Fill out a credit card application, get a
free water bottle/coffee cup/t-shirt
What’s your zip code, your phone
number, etc?
23. Attacks
United States Department of Commerce has
compiled a list of the general categories of
computer attacks (Security Glossary):
•Remote or Local Penetration
•Remote or Local DOS
•Scanning (Ethereal)
•Password Crackers
•Sniffers
24. Protections
Basics
– Firewall (Zone Alarm, Norton, hardware solutions)
– Anti-virus (McAfee, Norton, Symantec)
– Patches (automatic updates)
– Strong passwords (> 20 characters)
– Where is your data? How is it protected? Do you
have it backed up?
26. Risk Assessment
A process of ………
– Including a Business Impact Analysis
– Identifying assets and ranking them
– Identifying risks and ranking them
– Associating specific risks with critical assets
– Recommending actions to be taken
See http://security.fsu.edu
27. Risk Assessment
Don’t assume physical security!!!!
VA laptop, DOD laptop, Los Alamos HD
issue
Why steal just the data when you can
steal the hardware?
Faculty offices, student laptops in
libraries
28. Risk Assessment
Use strong passwords on all accounts
– More than 20 characters
– Limited by keyboard
– Under 14 characters is “crackable”
Your password is a very important secret
Select one you can remember (new rules)
You can remember a long password (Peter
Henry Thesis)
29. Risk Assessment
Passwords
– Change yours often!
– Dont leave yours lying around!
– The longer the better!
– Dont share yours with friends!
– FYI – in healthcare, people write down passwords all
the time
– CHECK! (# passwords 1, 2, 3, 4, 5, 6, recycle)
30. Technology Approaches
Operating system software
– Keep it updated with necessary patches
Patching
– Make sure your computer has the latest
operating system release
– Auto setting is the best!
– New security bugs are discovered all the time
– Remember the CERT website
31. Technology Approaches
Firewall (hardware or software) – permits
passage of data based on security policies
Virtual private Network (VPN) – private
communications over public networks
(secured through authentication,
cryptography, tunneling protocols) using
Ipsec (IP Security), SSL (tunneling), and
others …
32. Technology Approaches
• Hardware can be replaced - Keep serial numbers in a secure location
•
Application software can be reloaded - Know what you have installed
• Data could be gone forever
• Data could be gone forever
• Data could be gone forever
• Data could be gone forever
• Ensure that adequate backups for your systems are done on a regular basis
34. Web Sites
Understand that e-mail is not secure.
KaZaA, etc. turned your computer into a distributor so that
people can download from your machine!
– NOTE: 45% of free files collected by KaZaA contained viruses,
Trojan horse programs and backdoors.
Sometimes you dont even know you are responsible for
security violations
– your computer gets hacked and is used to hack others (you have
no idea its being done).
35. E-mail & Social Engineering
E-mail:
– A day-to-day necessity in our educational
environment
– We take it for granted
Social Engineering
– “Smooth-talking your way into a system”
– Common types of social engineering:
• Impersonation / Important user / Pre-texting
• You can find out information on Facebook /
MySpace
• Surplus equipment, Tallahassee (Cash for Trash)
• War-driving & dumpster diving
37. Solutions
None! (Well, none that are completely secure.)
Assume you will be compromised.
The task is to get back up and running.
http://security.fsu.edu/
Reporting
Setting up VPN at FSU
Subscribe to CERT
Subscribe to US-CERT
38. CERT
http://www.cert.org/stats/cert_stats.ht
ml
http://www.us-cert.gov/
39. Getting a JOB
Computer Security (Network Security)
Information Assurance
– The technical and managerial measures
designed to ensure the confidentiality,
possession/control, integrity, authenticity,
availability, and utility of information and
information systems. This term originated with
government usage and is sometimes
synonymous with information security.
– Become a CISSP