SlideShare a Scribd company logo
1 of 67
Guide to Network Security
First Edition
Chapter One
Introduction to Information Security
About the Presentations
• The presentations cover the objectives found in the
opening of each chapter.
• All chapter objectives are listed in the beginning of
each presentation.
• You may customize the presentations to fit your
class needs.
• Some figures from the chapters are included. A
complete set of images from the book can be found
on the Instructor Resources disc.
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Objectives
• Explain the relationships among the component
parts of information security, especially network
security
• Define the key terms and critical concepts of
information and network security
• Explain the business need for information and
network security
• Identify the threats posed to information and
network security, as well as the common attacks
associated with those threats
3
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Objectives (cont’d.)
• Distinguish between threats to information from
within systems and attacks against information
from within systems
• Describe the organizational roles of information
and network security professionals
• Define management’s role in the development,
maintenance, and enforcement of information
security policy, standards, practices, procedures,
and guidelines
4
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Objectives (cont’d.)
• Discuss how an organization institutionalizes
policies, standards, and practices using education,
training, and awareness programs
5
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Introduction
• Network security
– Critical to day-to-day IT operations of nearly every
organization
• Information security
– Field has matured in last 20 years
– Large in scope
6
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
What is Information Security?
• Protection of information and its critical elements
– Systems and hardware that use, store, and transmit
information
• Information security includes:
– Information security management
– Computer and data security
– Network security
7
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
What is Information Security? (cont’d.)
• Security layers
– Network security
• Protect components, connections, and contents
– Physical items or areas
– Personal security
• Protect people
– Operations security
• Protect details of activities
– Communications security
• Protect media, technology, and content
8
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Information Security Terminology
• Access
– Ability to use, modify, or affect another object
• Asset
– Organizational resource being protected
• Attack
– Act that causes damage to information or systems
• Control, safeguard, or countermeasure
– Security mechanisms, policies, or procedures
9
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Information Security Terminology
(cont’d.)
• Exploit
– Technique used to compromise a system
• Exposure
– Condition or state of being exposed to attack
• Intellectual property
– Works of the mind
– Inventions, literature, art, logos, and other creative
works
• Loss
– Single instance of damage to an information asset
10
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Information Security Terminology
(cont’d.)
• Protection profile or security posture
– Set of controls that protect an asset
• Risk
– Probability that something unwanted will happen
• Subject
– Agent used to conduct the attack
• Object
– Target entity of an attack
11
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 12
Figure 1-2 Computer as the subject and object of an attack
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Information Security Terminology
(cont’d.)
• Threat
– Entity presenting danger to an asset
• Threat agent
– Specific instance of a threat
– Examples: lightning strike, tornado, or specific
hacker
• Vulnerability
– Weakness or fault in a system
– Opens up the possibility of attack or damage
13
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Critical Characteristics of Information
• Characteristics of information determine its value
• Availability
– Ability to access information without obstruction
• Accuracy
– Information is free from errors
• Authenticity
– Quality or state of being genuine
• Confidentiality
– Protection from disclosure to unauthorized
individuals or systems
14
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Critical Characteristics of Information
(cont’d.)
• Data owners
– Responsible for the security and use of a particular
set of information
• Data custodians
– Responsible for information storage, maintenance,
and protections
• Data users
– End users who work with information
• Integrity
– Information remains whole, complete, uncorrupted
15
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Critical Characteristics of Information
(cont’d.)
• Utility
– Information has value for some purpose or end
• Possession
– Ownership or control of some object or item
• Privacy
– Information is used in accordance with legal
requirements
16
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Security Models
• Information security model
– Maps security goals to concrete ideas
• C.I.A. triad
– Original basis of computer security
17
Figure 1-3 C.I.A. triad
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Security Models (cont’d.)
• McCumber cube
– Graphical description of architectural approach
– Widely used in computer and information security
– 27 cells represent areas to address to secure
information systems
18
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Security Models (cont’d.)
19
Figure 1-4 McCumber cube
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Balancing Information Security and
Access
• Information security must balance protection and
availability
– Allow reasonable access
– Protect against threats
• Imbalance occurs when:
– Needs of end user are undermined
20
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Business Needs First
• Important organizational functions of an information
security program
– Protects organization’s ability to function
– Enables safe operation of applications
– Protects data
– Safeguards technology assets
21
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Business Needs First (cont’d.)
• Protecting the functionality of an organization
– General management and IT management are
responsible
– More to do with management than technology
• Enabling safe operation of applications
– Securing storage of business-critical data
– Ensuring integrity of key business transactions
– Making communications constantly available
22
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Business Needs First (cont’d.)
• Protecting data that organizations collect and use
– Data in motion
– Data at rest
• Safeguarding technology assets in organizations
– Security should match size and scope of asset
– Examples of assets: firewalls; caching network
appliances
23
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Threats to Information Security
• Wide range of threats pervade interconnected
world
• Threats are relatively well researched
• See Table 1-1
– 12 categories of danger to an organization’s people,
information, and systems
24
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 25
Table 1-1 Threats to information security
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Common Threats
• Cracker
– Individual who “cracks” (removes) software
protection
• Cyberterrorist
– Hacks systems to conduct terrorist activities
• Hackers
– Gain access without authorization
• Hacktivist or cyberactivist
– Disrupts or interferes with operations to protest
against an organization or government agency
26
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Common Threats (cont’d.)
• Malicious code or malicious software
– Computer viruses
• Macro or boot virus
– Worms
– Trojan horses
– Backdoor, trap door, or maintenance hook
– Rootkit
• Packet monkeys
• Phreaker
– Hacker who targets public telephone network
27
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Common Threats (cont’d.)
• Script kiddies
– Hackers of limited skill who use expertly written
software to attack a system
• Shoulder surfing
– Observing passwords of others
• Software piracy
– Unlawful use or duplication of software IP
28
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Attacks on Information Security
• Threats are always present
• Attacks occur through specific actions
– May cause business loss
29
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Malicious Code
• State-of-the-art malicious code attack
– Polymorphic (or multivector) worm
– Uses several attack vectors to exploit variety of
vulnerabilities
– See Table 1-2 for known attack vectors
30
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 31
Table 1-2 Attack replication vectors
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Password Attacks
• Password cracking
– Attempt to bypass access controls
– Guessing passwords
• Rainbow tables
– Used when the hash of the user’s password is known
• Brute force attacks
– Trying every possible combination
• Dictionary
– Trying specific, commonly used passwords
32
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Denial-of-Service (DoS) and
Distributed Denial-of-Service (DDoS)
Attacks
• Denial-of-service attack
– Attacker sends large number of requests to a target
– Target system cannot handle volume of requests
– System crashes
• Or cannot handle legitimate requests
• Distributed denial-of-service attack
– Coordinated stream of requests against a target
– Occurs from many locations simultaneously
33
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 34
Figure 1-5 Denial-of-service attacks
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Spoofing
• Technique used to gain unauthorized access to
computers
• Intruder sends messages with fake IP address of a
trusted host
– Modifies the packet headers with the trusted IP
• Newer routers and firewalls can offer protection
35
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 36
Figure 1-6 IP spoofing
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Man-in-the-Middle Attacks
• Attacker monitors packets from the network
• Modifies packets using IP spoofing techniques
• Inserts packets back into network
• Can be used to eavesdrop, modify, reroute, forge,
divert data
37
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 38
Figure 1-7 Man-in-the-middle attack
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
E-Mail Attacks
• Spam
– Malicious code may be embedded in attachments
• Mail bomb
– Attacker reroutes large quantities of e-mail to the
target system
– Poorly-configured e-mail systems at risk
39
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Sniffers
• Program or device monitoring data traveling over a
network
• Can be used for legitimate functions
– Also for stealing information
• Unauthorized sniffers virtually impossible to detect
• Shows all data going by including passwords
40
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Social Engineering
• Process of using social skills to convince people to
reveal access credentials
• Usually involves impersonation
– New employee
– Employee who needs assistance
– Someone higher in organizational hierarchy
41
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Buffer Overflow
• Application error
• Occurs when more data is sent to a buffer than it
can handle
• Attacker can take advantage of the consequence of
the failure
42
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Timing Attacks
• Measuring the time required to access a Web page
• Deducing that the user has visited the site before
– Presence of the page in browser’s cache
• Another type of timing attack:
– Side channel attack on cryptographic algorithms
43
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Security Professionals and the
Organization
• Information security program
– Supported by wide range of professionals
– Administrative support also required
• Executive management
– Chief information officer (CIO)
– Chief information security officer (CISO)
44
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Security Professionals and the
Organization (cont’d.)
• Information security project team
– Champion
– Team leader
– Security policy developers
– Risk assessment specialists
– Security professionals
– Systems, network, and storage administrators
– End users
45
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Information Security Policy, Standards,
and Practices
• Policy
– Guidance implemented by senior management
– Regulates activities
– Similar to laws
• Standards
– Detailed description of how to comply with policy
– De facto standards
– De jure standards
46
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 47
Figure 1-8 Policies, standards, and practices
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Information Security Policy, Standards,
and Practices (cont’d.)
• Management policy
– Basis for information security planning, design, and
deployment
• Criteria for effective policy
– Dissemination
– Review
– Comprehension
– Compliance
– Uniformity
48
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Enterprise Information Security Policy
(EISP)
• Other names for EISP
– General security policy
– IT security policy
– Information security policy
• Supports mission and vision of the organization
• Executive-level document
• Guides the security program
• Addresses legal compliance
49
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 50
Table 1-3 Components of the EISP
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Issue-Specific Security Policy (ISSP)
• States organization’s position on each issue
• Examples of topics
– Use of company-owned networks and the Internet
– Use of e-mail
– Prohibitions against hacking
– Use of personal equipment on company networks
51
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 52
Table 1-4 Components of
the ISSP
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Systems-Specific Policy (SysSP)
• Managerial guidance SysSPs
– Guides technology implementation and configuration
– Regulates behavior of people in organization
• Technical specification SysSPs
– Access control lists
– Capability table
– Access control matrix
• Configuration rule policies
– Specific instructions to regulate security system
53
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Frameworks and Industry Standards in
Information Security
• Security blueprint
– Used to implement the security program
– Basis for design, selection, and implementation of
program elements
• Security framework
– Outline of overall information security strategy
– Roadmap for planned changes to the environment
• Security models
– Can be used to develop a security blueprint
54
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
The ISO 27000 series
• One of the most widely referenced security models
• Gives recommendations for information security
management
• See Figure 1-9 for overall methodology
55
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 56
Figure 1-9 ISO/IEC 27002
major process steps
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 57
Table 1-6 ISO 27000 series current and planned standards (www.27000.org)
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
NIST Security Models
• Available from csrc.nist.gov
• Publicly available
• Free
• Reviewed by government and industry
professionals
• Many documents available
58
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
IETF Security Architecture
• Security area working group
– Acts as advisory board for IETF
• RFC 2196: Site security handbook
– Good reference
– Covers five basic areas of security
59
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Benchmarking and Best Business
Practices
• Methods used by some organizations
– To assess security practices
• Federal Agency Security Practices Web site
– Popular resource for best practices
• SANS Institute
– Cooperative information security research
organization
• Other sources
– www.cert.org
– http://www.us-cert.gov
60
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Benchmarking and Best Business
Practices (cont’d.)
• Spheres of security
– Shows that information is at risk from various
sources
– Illustrated in Figure 1-10
• Defense in depth
– Layered implementation of security
– Organization establishes multiple layers of security
controls
61
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 62
Figure 1-10 Spheres of security
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 63
Figure 1-11 Defense in depth
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Benchmarking and Best Business
Practices (cont’d.)
• Redundancy
– Implementing multiple types of technology
• Prevents failure of one system from compromising
security of another system
• Security perimeter
– Defines the boundary between organization’s
security and outside world
– Both electronic and physical
64
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 65
Figure 1-12 Security perimeters
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Summary
• Information security is the protection of information
– Information value comes from its characteristics
• A threat is an object, person, or entity that
represents a danger to an asset
• An attack is an action that takes advantage of a
vulnerability to compromise a controlled system
• Security models include the C.I.A. triad and the
McCumber cube
66
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Summary (cont’d.)
• Information security functions
– Protects organization’s ability to function
– Enables safe operation of applications
– Protects data
– Safeguards technology assets
• Many types of professionals support an information
security program
• Management policy is the basis for all information
security planning
67

More Related Content

What's hot

Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Domains of network security
Domains of network securityDomains of network security
Domains of network securityKeithThai1
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introductionVaibhav Khanna
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementimec.archive
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definitionVaibhav Khanna
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challengesVaibhav Khanna
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSIJNSA Journal
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS SurveyDeris Stiawan
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
 

What's hot (19)

Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Domains of network security
Domains of network securityDomains of network security
Domains of network security
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departement
 
Information and network security 2 nist security definition
Information and network security 2 nist security definitionInformation and network security 2 nist security definition
Information and network security 2 nist security definition
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile Environment
 

Viewers also liked

9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08Kristin Harrison
 
9780840024220 ppt ch05
9780840024220 ppt ch059780840024220 ppt ch05
9780840024220 ppt ch05Kristin Harrison
 
9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch039781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03Kristin Harrison
 
baim_ch10
baim_ch10baim_ch10
baim_ch10baim08
 
Ch02 records management
Ch02 records managementCh02 records management
Ch02 records managementxtin101
 
Ch06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notesCh06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notesfrancarter2
 
Ch07 records management
Ch07 records managementCh07 records management
Ch07 records managementxtin101
 
PowerPoint 2013 ch07
PowerPoint 2013 ch07PowerPoint 2013 ch07
PowerPoint 2013 ch07Kristin Harrison
 
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentWe Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentBESLER
 
She says culture_final
She says culture_finalShe says culture_final
She says culture_finalSheSaysSG
 

Viewers also liked (20)

9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
9780840024220 ppt ch05
9780840024220 ppt ch059780840024220 ppt ch05
9780840024220 ppt ch05
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch039781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
baim_ch10
baim_ch10baim_ch10
baim_ch10
 
Ch02 records management
Ch02 records managementCh02 records management
Ch02 records management
 
Ch06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notesCh06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notes
 
Ch07 records management
Ch07 records managementCh07 records management
Ch07 records management
 
PowerPoint 2013 ch07
PowerPoint 2013 ch07PowerPoint 2013 ch07
PowerPoint 2013 ch07
 
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentWe Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
 
She says culture_final
She says culture_finalShe says culture_final
She says culture_final
 
Vatly2013dantri
Vatly2013dantriVatly2013dantri
Vatly2013dantri
 

Similar to Guide Network Security Introduction

Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxdotco
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxTechnocracy2
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Securityprimeteacher32
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docxRoshniChauhan24
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docxRoshniChauhan24
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxnagwaAboElenein
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptAkfeteAssefa
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptxselvapriyabiher
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdfSameeraSarathchandra1
 

Similar to Guide Network Security Introduction (20)

Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docx
 
Cybersecurity.docx
Cybersecurity.docxCybersecurity.docx
Cybersecurity.docx
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdf
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 

More from Kristin Harrison

More from Kristin Harrison (15)

9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
 
9780840024220 ppt ch11
9780840024220 ppt ch119780840024220 ppt ch11
9780840024220 ppt ch11
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
9780840024220 ppt ch03
9780840024220 ppt ch039780840024220 ppt ch03
9780840024220 ppt ch03
 
9780840024220 ppt ch02
9780840024220 ppt ch029780840024220 ppt ch02
9780840024220 ppt ch02
 
9780840024220 ppt ch07
9780840024220 ppt ch079780840024220 ppt ch07
9780840024220 ppt ch07
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Ppt2013 ch10
Ppt2013 ch10Ppt2013 ch10
Ppt2013 ch10
 
Ppt2013 ch09
Ppt2013 ch09Ppt2013 ch09
Ppt2013 ch09
 
Ppt2013 ch08
Ppt2013 ch08Ppt2013 ch08
Ppt2013 ch08
 
Access2013 ch10
Access2013 ch10Access2013 ch10
Access2013 ch10
 
Access2013 ch09
Access2013 ch09Access2013 ch09
Access2013 ch09
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 

Guide Network Security Introduction

  • 1. Guide to Network Security First Edition Chapter One Introduction to Information Security
  • 2. About the Presentations • The presentations cover the objectives found in the opening of each chapter. • All chapter objectives are listed in the beginning of each presentation. • You may customize the presentations to fit your class needs. • Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc.
  • 3. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Objectives • Explain the relationships among the component parts of information security, especially network security • Define the key terms and critical concepts of information and network security • Explain the business need for information and network security • Identify the threats posed to information and network security, as well as the common attacks associated with those threats 3
  • 4. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Objectives (cont’d.) • Distinguish between threats to information from within systems and attacks against information from within systems • Describe the organizational roles of information and network security professionals • Define management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines 4
  • 5. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Objectives (cont’d.) • Discuss how an organization institutionalizes policies, standards, and practices using education, training, and awareness programs 5
  • 6. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Introduction • Network security – Critical to day-to-day IT operations of nearly every organization • Information security – Field has matured in last 20 years – Large in scope 6
  • 7. © 2013 Course Technology/Cengage Learning. All Rights Reserved. What is Information Security? • Protection of information and its critical elements – Systems and hardware that use, store, and transmit information • Information security includes: – Information security management – Computer and data security – Network security 7
  • 8. © 2013 Course Technology/Cengage Learning. All Rights Reserved. What is Information Security? (cont’d.) • Security layers – Network security • Protect components, connections, and contents – Physical items or areas – Personal security • Protect people – Operations security • Protect details of activities – Communications security • Protect media, technology, and content 8
  • 9. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Information Security Terminology • Access – Ability to use, modify, or affect another object • Asset – Organizational resource being protected • Attack – Act that causes damage to information or systems • Control, safeguard, or countermeasure – Security mechanisms, policies, or procedures 9
  • 10. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Information Security Terminology (cont’d.) • Exploit – Technique used to compromise a system • Exposure – Condition or state of being exposed to attack • Intellectual property – Works of the mind – Inventions, literature, art, logos, and other creative works • Loss – Single instance of damage to an information asset 10
  • 11. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Information Security Terminology (cont’d.) • Protection profile or security posture – Set of controls that protect an asset • Risk – Probability that something unwanted will happen • Subject – Agent used to conduct the attack • Object – Target entity of an attack 11
  • 12. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 12 Figure 1-2 Computer as the subject and object of an attack © Cengage Learning 2013
  • 13. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Information Security Terminology (cont’d.) • Threat – Entity presenting danger to an asset • Threat agent – Specific instance of a threat – Examples: lightning strike, tornado, or specific hacker • Vulnerability – Weakness or fault in a system – Opens up the possibility of attack or damage 13
  • 14. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Critical Characteristics of Information • Characteristics of information determine its value • Availability – Ability to access information without obstruction • Accuracy – Information is free from errors • Authenticity – Quality or state of being genuine • Confidentiality – Protection from disclosure to unauthorized individuals or systems 14
  • 15. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Critical Characteristics of Information (cont’d.) • Data owners – Responsible for the security and use of a particular set of information • Data custodians – Responsible for information storage, maintenance, and protections • Data users – End users who work with information • Integrity – Information remains whole, complete, uncorrupted 15
  • 16. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Critical Characteristics of Information (cont’d.) • Utility – Information has value for some purpose or end • Possession – Ownership or control of some object or item • Privacy – Information is used in accordance with legal requirements 16
  • 17. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Security Models • Information security model – Maps security goals to concrete ideas • C.I.A. triad – Original basis of computer security 17 Figure 1-3 C.I.A. triad © Cengage Learning 2013
  • 18. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Security Models (cont’d.) • McCumber cube – Graphical description of architectural approach – Widely used in computer and information security – 27 cells represent areas to address to secure information systems 18
  • 19. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Security Models (cont’d.) 19 Figure 1-4 McCumber cube © Cengage Learning 2013
  • 20. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Balancing Information Security and Access • Information security must balance protection and availability – Allow reasonable access – Protect against threats • Imbalance occurs when: – Needs of end user are undermined 20
  • 21. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Business Needs First • Important organizational functions of an information security program – Protects organization’s ability to function – Enables safe operation of applications – Protects data – Safeguards technology assets 21
  • 22. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Business Needs First (cont’d.) • Protecting the functionality of an organization – General management and IT management are responsible – More to do with management than technology • Enabling safe operation of applications – Securing storage of business-critical data – Ensuring integrity of key business transactions – Making communications constantly available 22
  • 23. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Business Needs First (cont’d.) • Protecting data that organizations collect and use – Data in motion – Data at rest • Safeguarding technology assets in organizations – Security should match size and scope of asset – Examples of assets: firewalls; caching network appliances 23
  • 24. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Threats to Information Security • Wide range of threats pervade interconnected world • Threats are relatively well researched • See Table 1-1 – 12 categories of danger to an organization’s people, information, and systems 24
  • 25. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 25 Table 1-1 Threats to information security © Cengage Learning 2013
  • 26. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Common Threats • Cracker – Individual who “cracks” (removes) software protection • Cyberterrorist – Hacks systems to conduct terrorist activities • Hackers – Gain access without authorization • Hacktivist or cyberactivist – Disrupts or interferes with operations to protest against an organization or government agency 26
  • 27. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Common Threats (cont’d.) • Malicious code or malicious software – Computer viruses • Macro or boot virus – Worms – Trojan horses – Backdoor, trap door, or maintenance hook – Rootkit • Packet monkeys • Phreaker – Hacker who targets public telephone network 27
  • 28. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Common Threats (cont’d.) • Script kiddies – Hackers of limited skill who use expertly written software to attack a system • Shoulder surfing – Observing passwords of others • Software piracy – Unlawful use or duplication of software IP 28
  • 29. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Attacks on Information Security • Threats are always present • Attacks occur through specific actions – May cause business loss 29
  • 30. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Malicious Code • State-of-the-art malicious code attack – Polymorphic (or multivector) worm – Uses several attack vectors to exploit variety of vulnerabilities – See Table 1-2 for known attack vectors 30
  • 31. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 31 Table 1-2 Attack replication vectors © Cengage Learning 2013
  • 32. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Password Attacks • Password cracking – Attempt to bypass access controls – Guessing passwords • Rainbow tables – Used when the hash of the user’s password is known • Brute force attacks – Trying every possible combination • Dictionary – Trying specific, commonly used passwords 32
  • 33. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks • Denial-of-service attack – Attacker sends large number of requests to a target – Target system cannot handle volume of requests – System crashes • Or cannot handle legitimate requests • Distributed denial-of-service attack – Coordinated stream of requests against a target – Occurs from many locations simultaneously 33
  • 34. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 34 Figure 1-5 Denial-of-service attacks © Cengage Learning 2013
  • 35. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Spoofing • Technique used to gain unauthorized access to computers • Intruder sends messages with fake IP address of a trusted host – Modifies the packet headers with the trusted IP • Newer routers and firewalls can offer protection 35
  • 36. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 36 Figure 1-6 IP spoofing © Cengage Learning 2013
  • 37. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Man-in-the-Middle Attacks • Attacker monitors packets from the network • Modifies packets using IP spoofing techniques • Inserts packets back into network • Can be used to eavesdrop, modify, reroute, forge, divert data 37
  • 38. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 38 Figure 1-7 Man-in-the-middle attack © Cengage Learning 2013
  • 39. © 2013 Course Technology/Cengage Learning. All Rights Reserved. E-Mail Attacks • Spam – Malicious code may be embedded in attachments • Mail bomb – Attacker reroutes large quantities of e-mail to the target system – Poorly-configured e-mail systems at risk 39
  • 40. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Sniffers • Program or device monitoring data traveling over a network • Can be used for legitimate functions – Also for stealing information • Unauthorized sniffers virtually impossible to detect • Shows all data going by including passwords 40
  • 41. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Social Engineering • Process of using social skills to convince people to reveal access credentials • Usually involves impersonation – New employee – Employee who needs assistance – Someone higher in organizational hierarchy 41
  • 42. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Buffer Overflow • Application error • Occurs when more data is sent to a buffer than it can handle • Attacker can take advantage of the consequence of the failure 42
  • 43. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Timing Attacks • Measuring the time required to access a Web page • Deducing that the user has visited the site before – Presence of the page in browser’s cache • Another type of timing attack: – Side channel attack on cryptographic algorithms 43
  • 44. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Security Professionals and the Organization • Information security program – Supported by wide range of professionals – Administrative support also required • Executive management – Chief information officer (CIO) – Chief information security officer (CISO) 44
  • 45. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Security Professionals and the Organization (cont’d.) • Information security project team – Champion – Team leader – Security policy developers – Risk assessment specialists – Security professionals – Systems, network, and storage administrators – End users 45
  • 46. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Information Security Policy, Standards, and Practices • Policy – Guidance implemented by senior management – Regulates activities – Similar to laws • Standards – Detailed description of how to comply with policy – De facto standards – De jure standards 46
  • 47. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 47 Figure 1-8 Policies, standards, and practices © Cengage Learning 2013
  • 48. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Information Security Policy, Standards, and Practices (cont’d.) • Management policy – Basis for information security planning, design, and deployment • Criteria for effective policy – Dissemination – Review – Comprehension – Compliance – Uniformity 48
  • 49. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Enterprise Information Security Policy (EISP) • Other names for EISP – General security policy – IT security policy – Information security policy • Supports mission and vision of the organization • Executive-level document • Guides the security program • Addresses legal compliance 49
  • 50. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 50 Table 1-3 Components of the EISP © Cengage Learning 2013
  • 51. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Issue-Specific Security Policy (ISSP) • States organization’s position on each issue • Examples of topics – Use of company-owned networks and the Internet – Use of e-mail – Prohibitions against hacking – Use of personal equipment on company networks 51
  • 52. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 52 Table 1-4 Components of the ISSP © Cengage Learning 2013
  • 53. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Systems-Specific Policy (SysSP) • Managerial guidance SysSPs – Guides technology implementation and configuration – Regulates behavior of people in organization • Technical specification SysSPs – Access control lists – Capability table – Access control matrix • Configuration rule policies – Specific instructions to regulate security system 53
  • 54. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Frameworks and Industry Standards in Information Security • Security blueprint – Used to implement the security program – Basis for design, selection, and implementation of program elements • Security framework – Outline of overall information security strategy – Roadmap for planned changes to the environment • Security models – Can be used to develop a security blueprint 54
  • 55. © 2013 Course Technology/Cengage Learning. All Rights Reserved. The ISO 27000 series • One of the most widely referenced security models • Gives recommendations for information security management • See Figure 1-9 for overall methodology 55
  • 56. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 56 Figure 1-9 ISO/IEC 27002 major process steps © Cengage Learning 2013
  • 57. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 57 Table 1-6 ISO 27000 series current and planned standards (www.27000.org) © Cengage Learning 2013
  • 58. © 2013 Course Technology/Cengage Learning. All Rights Reserved. NIST Security Models • Available from csrc.nist.gov • Publicly available • Free • Reviewed by government and industry professionals • Many documents available 58
  • 59. © 2013 Course Technology/Cengage Learning. All Rights Reserved. IETF Security Architecture • Security area working group – Acts as advisory board for IETF • RFC 2196: Site security handbook – Good reference – Covers five basic areas of security 59
  • 60. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Benchmarking and Best Business Practices • Methods used by some organizations – To assess security practices • Federal Agency Security Practices Web site – Popular resource for best practices • SANS Institute – Cooperative information security research organization • Other sources – www.cert.org – http://www.us-cert.gov 60
  • 61. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Benchmarking and Best Business Practices (cont’d.) • Spheres of security – Shows that information is at risk from various sources – Illustrated in Figure 1-10 • Defense in depth – Layered implementation of security – Organization establishes multiple layers of security controls 61
  • 62. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 62 Figure 1-10 Spheres of security © Cengage Learning 2013
  • 63. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 63 Figure 1-11 Defense in depth © Cengage Learning 2013
  • 64. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Benchmarking and Best Business Practices (cont’d.) • Redundancy – Implementing multiple types of technology • Prevents failure of one system from compromising security of another system • Security perimeter – Defines the boundary between organization’s security and outside world – Both electronic and physical 64
  • 65. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 65 Figure 1-12 Security perimeters © Cengage Learning 2013
  • 66. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Summary • Information security is the protection of information – Information value comes from its characteristics • A threat is an object, person, or entity that represents a danger to an asset • An attack is an action that takes advantage of a vulnerability to compromise a controlled system • Security models include the C.I.A. triad and the McCumber cube 66
  • 67. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Summary (cont’d.) • Information security functions – Protects organization’s ability to function – Enables safe operation of applications – Protects data – Safeguards technology assets • Many types of professionals support an information security program • Management policy is the basis for all information security planning 67