Uploaded by 4agereligion

Introduction to cybersecurity

advertisement
INTRODUCTION TO CYBERSECURITY
THE NEED FOR CYBERSECURITY
According to CyberEdge’s annual Cyberthreat Defense Report (CDR), there is an (almost)
exponential rise in the number of companies that have been attacked at least once during the past
8 years.
Orange Restricted
QUESTION
What can a company lose as a result of a cyberattack ?
Orange Restricted
QUESTION
What can a company lose as a result of a cyberattack ?
- Financial Loss
- Reputation
- Business Opportunities / Customers
Orange Restricted
WHAT IS CYBERSECURITY ?
-
Use of Tools ( Firewalls / IPS / Antivirus )
Policies and Procedures (UAP…)
User Training
Physical Security (Cable Locks / Access
Cards)
- Patch Management
- Encryption
- Strong Password
- Cybersecurity is the art of protecting networks, devices, and data
from unauthorized access or criminal use and the practice of
ensuring confidentiality, integrity, and availability of information.
Logical or physical access without
permission
Source : CISA
Orange Restricted
IMPORTANCE OF INFORMATION
- Data is the raw facts and statistics, whereas Information is Data that is accurate
and timely; specific and organized for a purpose; presented within a context that
gives it meaning and relevance; and can lead to an increase in understanding and
decrease in uncertainty.
- Used in decision-making process ( Competitive Edge….)
Orange Restricted
INFORMATION ASSURANCE
- Measures that protect and defend information and information systems by ensuring their
availability, integrity, authentication, confidentiality and non-repudiation.
- These measures include :
Providing for restoration of information systems by incorporating protection, detection and reaction
capabilities.
- Information Assurance is important to organizations because it ensures that user data is protected
both while in transit and at rest.
Orange Restricted
THE CIA TRIAD
Confidentiality : Confidentiality revolves around the principle of ‘least privilege.’ This
principle states that access to information, assets, etc. should be granted only on a
need-to-know basis so that information that is only available to some should not be
accessible by everyone.
Integrity : Integrity makes sure that the information is not tampered with whenever it
travels from source to destination or even stored at rest. Information stored in
underlying systems, databases, etc. must be protected through access controls and
there should be an accepted procedure to change the stored/transit data.
Availability : The availability concept is to make sure that the services of an
organization are available.
Source : InfoSec Institute
Orange Restricted
AUTHENTICATION AND NON-REPUDIABILITY
Authentication : The process of proving the claimed identity of an individual user, machine,
software component or any other entity.
Typical authentication mechanisms include conventional password schemes, biometrics
devices, cryptographic methods, and onetime passwords (usually implemented with token
based cards).
Non-Repudiability : Non-repudiation means a user cannot deny (repudiate) having
performed a transaction.
It combines authentication and integrity: non-repudiation authenticates the identity of a user
who performs a transaction and ensures the integrity of that transaction.
Orange Restricted
ENSURING CONFIDENTIALITY OF INFORMATION
- Encryption
In simple terms, Encryption is a way to render data unreadable to an unauthorized party
Bob
Alice
MITM
- Even if a Man In The Middle (MITM) is successful in intercepting the data , it will be
unreadable without the key.
Orange Restricted
SYMMETRIC ENCRYPTION (SECRET KEY CRYPTOGRAPHY)
Key
Plaintext
(“Some_Data”)
Encryption Algorithm
Ciphertext
(“xH87Juk!md”)
Plaintext data is cleartext data that is to be encrypted.
A Key is a mathematical value entered into the algorithm to produce Ciphertext, or
encrypted data.
Key
Ciphertext
(“xH87Juk!md”)
Decryption Algorithm
Orange Restricted
Plaintext
(“Some_Data”)
ASYMMETRIC ENCRYPTION
Limitation of Symmetric Encryption : Key Distribution
Key Distribution : How does Bob send the key to Alice in a secure way ?
Solution :
Public Key Cryptography (Asymmetric Encryption)
Bob
Unencrypted
Message
Encryption
Algorithm
Alice
Encrypted
Message
Alice’s
Public Key
Encryption
Algorithm
Alice’s
Private Key
Orange Restricted
Unencrypted
Message
ENSURING CONFIDENTIALITY OF INFORMATION
- Access Control Lists (ACLs)
An access control list (ACL) is made up of rules that either allow or deny access to a
computing environment. This enables administrators to ensure that, unless the proper
credentials are presented by the device, it cannot gain access.
Filesystem ACLs: These work as filters, managing access to directories or files. A
filesystem ACL gives the operating system instructions as to the users that are allowed
to access the system, as well as the privileges they are entitled to once they are inside.
Networking ACLs: Networking ACLs manage access to a network. To do this, they
provide instructions to switches and routers as to the kinds of traffic that are allowed to
interface with the network. They also dictate what each user or device can do once they
are inside.
Orange Restricted
ENSURING INTEGRITY OF INFORMATION
Hashing
-
Hashing is a method used to convert any form of data (File or Message) into a unique string of text (Hash
Value).
-
The purpose of hashing is to verify that a file or a piece of data hasn’t been altered.
In other words, it is used to verify that data has maintained its integrity.
Hash values are irreversible : Original message (Plain Text) cannot be recovered. (One-way)
Even a small change should make a change in the entire hash value. Also known as the avalanche effect.
The most widely used hashing functions are MD5, SHA1 and SHA-256.
-
Orange Restricted
ENSURING AVAILABILITY OF INFORMATION
Availability
Redundancy
- Backup
- Load Balancing
Network and Security Devices
- Firewalls
- Failover mechanism
Orange Restricted
ENSURING AUTHENTICATION AND NON-REPUDATION
Authentication :
Username / Passwords
Hashing
Non-Repudiation :
Digital Signatures
Orange Restricted
PILLARS OF CYBERSECURITY
- Policies / Procedures
- Incident Management
Process
- Training and Awareness
People
Technology
Orange Restricted
- Antivirus
- Firewalls
- IDP / IPS
- Firewalls
TECHNOLOGY
At its most basic, a firewall is a network security device/software that filters incoming and
outgoing traffic based on certain conditions (Rules) that are set by IT administrators.
The Rules that are set are based on IP, port number and protocol.
- Next Generation Firewalls
Provide additional services :
1) Secure Sockets Layer (SSL) Inspection
2) Web Filtering
3) Antivirus
4) Sandboxing
Orange Restricted
TECHNOLOGY
- Intrusion Detection Systems
An intrusion detection system (IDS) is a software application or hardware appliance that
monitors traffic moving on networks and through systems to search for suspicious activity and
known threats.
The purpose of Intrusion Detection Systems is to inform IT personnel that an intrusion may be
taking place.
Alerting information will generally include :
- The source address of the intrusion
- The target/victim’s address
- The type of attack that is suspected
Orange Restricted
TECHNOLOGY
- Intrusion Prevention Systems
An intrusion prevention system (IPS) is a network security tool (which can be a hardware device
or software) that continuously monitors a network for malicious activity and takes action to
prevent it, including reporting, blocking, or dropping it, when it does occur.
There are several techniques that intrusion prevention systems use to identify threats:
Signature-based: This method matches the activity to signatures of well-known threats. One
drawback to this method is that it can only stop previously identified attacks and won’t be able
to recognize new ones.
Anomaly-based: This method monitors for abnormal behavior by comparing random samples
of network activity against a baseline standard. It is more robust than signature-based
monitoring, but it can sometimes produce false positives. Some newer and more advanced
intrusion prevention systems use artificial intelligence and machine learning technology to
support anomaly-based monitoring.
Orange Restricted
PROCESS
- Policies
An IT Security Policy identifies the rules for all individuals accessing and using an organization's
IT assets and resources.
• Acceptable use of information and IT resources
Protecting personal, private, sensitive, or confidential information from unauthorized use or
disclosure
• Unacceptable use
Installing, downloading, or running software that has not been approved following appropriate
security, legal, and/or IT review in accordance with organizational policies;
Orange Restricted
PROCESS
- Procedures
Procedures define how the policies should be enacted in the organization. They are
characterized by their very detailed, step-by-step approach toward implementing security
standards and guidelines that support the policies.
• Each user is allocated an individual username and password. Logon passwords must not be
written down or disclosed to another individual. The owner of a particular username will be
held responsible for all actions performed using this username.
Orange Restricted
PROCESS
- Incident Management
• Incident management is the management of activities to detect,
analyze, respond to, and correct an organization’s security
situation.
• Even though all the operational measures taken by an
organization decreases the probability of an incident occurring,
the risk still exists.
Orange Restricted
PEOPLE
- Training and Awareness
•
Security training and awareness helps employees understand the security risks associated
with their actions and to identify cyber attacks they may encounter via email or the web.
Orange Restricted
THANK YOU
QUESTIONS ?
Orange Restricted
Download