Uploaded by Ruel David

Week 1&2 Security Fundamentals

advertisement
Identifying Security
Fundamentals
Week 1 and 2 – Security +
Learning Objectives
• At the end of this lesson, student should be able to:
• Define Information Security in an IT spectrum.
• Explain the goals of Information Security
• Discuss the relationship between threats, vulnerabilities and risk in IS.
• Enumerate and explain the different types of attacks.
• Recommend security controls to counter attacks.
• Discuss the importance of Security Management Process in the
prevention / mitigation of damage to a network system.
Information Security
Information Security
• Refers to the protection of available information or
information resources from unauthorized access, attack,
theft, or data damage.
• Responsible individuals and organizations must secure their
confidential information.
• Advancement of business systems exposes crucial data from
different form of threats.***
Goals of Information Security
Goal of Information Security
• PREVENTION
• Personal information, company information, and information
about intellectual property must be protected.
• If there is a breach in security in any of these areas, then the
organization may have to put a lot of effort into recovering losses.
• Preventing entities from gaining unauthorized access to
confidential information should be the number one priority of
information security professionals.
Goal of Information Security
• DETECTION
• Detection occurs when a user is discovered trying to access
unauthorized data or after information has been lost.
• It can be accomplished by investigating individuals or by scanning
the data and networks for any traces left by the intruder in any
attack against the system.
Goal of Information Security
• RECOVERY
• When there is a disaster or an intrusion by unauthorized users,
system data can become compromised or damaged.
• It is in these cases that you need to employ a process to recover
vital data from a crashed system or data storage devices.
• Recovery can also pertain to physical resources.
RISK
• As applied to information systems, risk is a concept that indicates
exposure to the chance of damage or loss.
• It signifies the likelihood of a hazard or dangerous threat
occurring.
• Risk is the determining factor when looking at information
systems security.
• If an organization chooses to ignore risks to operations, it could
suffer a catastrophic outage that would limit its ability to survive.
RISK
• In Information Technology, risk is often associated with the
loss of a system, power, or network, and other physical
losses.
• Risk also affects people, practices, and processes.
Vulnerabilities
Vulnerability is any
condition that leaves
an information system
open to harm.
Vulnerabilities can
come in a wide variety
of forms, including:
• Improperly configured or installed
hardware or software.
• Delays in applying and testing software
and firmware patches.
• Untested software and firmware patches.
• Bugs in software or operating systems
• The misuse of software or
communication protocols.
• Poorly designed networks.
• Poor physical security.
• Insecure passwords.
• Design flaws in software or operating
systems.
• Unchecked user input.
Vulnerabilities
Threats
• A threat is any event or action that could potentially cause damage to an
asset.
• Threats are often in violation of a security requirement, policy, or procedure.
• Regardless of whether a violation is intentional or unintentional, malicious or not, it
is considered a threat.
• Potential threats to computer and network security include:
•
•
•
•
•
Unintentional or unauthorized access or changes to data.
The interruption of services.
The interruption of access to assets.
Damage to hardware.
Unauthorized access or damage to facilities.
Relationship of Threat to Risk
Hacker
Weak Firewall
Potential data
loss / stolen data
Information Security Threats
Attacks
• An attack is a technique used to exploit a vulnerability in any
application or physical computer system without the
authorization to do so.
• Attacks on a computer system and network security include:
• Physical security attacks.
• Software-based attacks.
• Social engineering attacks.
• Web application-based attacks.
• Network-based attacks, including wireless networks.
Physical Security Attacks
• Unauthorized access into areas
and theft of mobile devices,
storage devices or attempting
to login to a secured device to
access crucial data.
Software-Based Attacks
• Creating backdoors into your
device through use of cleverlydisguised third-party software,
or spyware / malware.
• Once successfully installed,
third parties can gain full
control of your device.
Social Engineering Attacks
• Social engineering is the term
used for a broad range of
malicious activities accomplished
through human interactions.
• It uses psychological
manipulation to trick users into
making security mistakes or
giving away sensitive
information.
Web-Application-Based / Cyber Attacks
• Serious weaknesses or
vulnerabilities that allows
criminals to gain direct and
public access to databases in
order to churn sensitive data.
Network-Based Attacks
• Network-based attacks are
attacks designed to compromise
network security by either
eavesdropping on or
intercepting and manipulating
network traffic.
• One of the most sophisticated
type of attacks.
HOW DO WE…
!!!
CONTROLS
Controls
• Controls are the countermeasures that you need to put in place to avoid,
mitigate, or counteract security risks due to threats or attacks.
• In other words, controls are solutions and activities that enable an
organization to meet the objectives of an information security strategy.
• Controls can be safeguards and countermeasures that are logical or
physical.
• Controls are broadly classified as PREVENTION, DETECTION, and
CORRECTION.
Types of Control
• Prevention Controls
• These help to prevent a threat or
attack from exposing a vulnerability
in the computer system.
• For example, a security lock on a
building's access door is a prevention
control.
Types of Control
• Detection Controls
• These help to discover if a threat or
vulnerability has entered into the
computer system.
• For example, surveillance cameras that
record everything that happens in and
around a building are detection
controls.
Types of Control
• Correction controls
• These help to mitigate the
consequences of a threat or attack
from adversely affecting the
computer system.
• For example, a security officer who
responds to a silent alarm detecting an
intrusion and who then stops the
intruder is a correction control.
SECURITY MANAGEMENT
PROCESS
Are the different phases of handling security measures of security
issues.
Phase 1: Identify security controls
• This involves detecting problems and determining how best to
protect a
• system:
• Find out when and where security breaches occur.
• Log details of the breaches, showing information regarding the failed
attempts, such as typing a wrong user name or password.
• Select the appropriate identification technique, such as a network
intrusion detection system (NIDS).
Phase 2: Implement security controls
• This involves installing control mechanisms to prevent problems
in a system:
• Authenticate users appropriately or control access to data and
resources.
• Match implementation security controls with the management
requirements in any organization.
• Install a security mechanism such as an intrusion detection system (IDS)
or an intrusion prevention system (IPS) to prevent any attacks on the
system.
Phase 3: Monitor security controls
• This involves detecting and solving any security issues that
arise after security controls are implemented:
• Run tests on the various controls installed to see if they are
working correctly and will remain effective against further attacks
on the system.
• Analyze important steps that improve the performance of controls.
• Document each control failure and determine if a control needs to
be upgraded or removed.
THAT’S ALL FOLKS.
Download