Title: Security Awareness: Applying Practical Security in Your World
1Security Awareness Applying Practical Security
in Your World
- Chapter 1 Introduction to Security
2Objectives
- Define security and list the three basic goals of
security - Explain why information security is important
- List the six categories of individuals who break
into computers
3Objectives (continued)
- Describe the types of attacks on computers that
can occur - Explain how to safeguard a system
- Explain the big picture in information security
4Introduction to Security
- Security ? A state of freedom from a danger or
risk - Information security ? Process of protecting a
computer (or network of computers) from harmful
attacks - Three basic goals of information
securityIntegrity Confidentiality
Availability
5Three Goals of Information Security
- Integrity
- Data correct and unaltered
- Confidentiality
- Data only accessible to authorized parties
- Availability
- Authorized users allowed immediate access to the
data - Main goal MINIMIZE RISKS
6Why Information Security Is Important
- Prevent Data Theft
- Single largest cause of financial loss due to a
security breach - Thefts most commonly include proprietary business
information - Industrial espionage
- Individuals can also suffer from data theft
7Why Information Security Is Important (continued)
- Protect Intellectual Property
- Illegal copying or distribution deprives creator
or owner of compensation for their work (See
Figure 1-1 and 1-2) - Electronic formats easy and cheap to copy
- Digital rights management (DRM)
technologiesDigital watermarks Physical copy
protectionSoftware keys Activation code
8Protect Intellectual Property
Figure 1-1
9Protect Intellectual Property (continued)
Figure 1-2
10Why Information Security Is Important (continued)
- Thwart Identity Theft
- About 3.4 of Americans have been victims of
identity theft - Average 609 hours and 1500 out-of-pocket
expenses to repair damage
11Why Information Security Is Important (continued)
- Avoid Legal Consequencesfederal and state laws
include - HIPAA
- Sarbox
- GLBA
- USA Patriot Act
- COPPA
- California Database Security Breach Act
12Why Information Security Is Important (continued)
- Foil Cyberterrorism
- Cyberterrorism ? Attacks by terrorist group(s)
using computer technology - Can damage or disable electronic and commercial
infrastructure - Most targets are not government-owned or
operated security procedures difficult to
prescribe and enforce
13Why Information Security Is Important (continued)
- Maintain Productivity
- Resources diverted for clean-up activities
(See Table 1-1) -
- Spam unsolicited e-mail messages cost time
- Viruses and worms can be attached
14Attacker Profiles
- Hackers
- Crackers
- Script kiddies
- Spies
- Employees
- Cyberterrorists
15How Attackers Attack
- Social Engineering
- Trickery and deceit used rather than technical
skill - Difficult to defend against because it relies on
human nature and not on computer systems - Strongest defense
- Strict company policies
16How Attackers Attack (continued)
- Scanning ? Locating a vulnerable computer to
break into - Port scanning
- War driving (See Figure 1-3)
17How Attackers Attack (continued)
- Sniffing ? Listening to and analyzing traffic on
a network - Requires access to the wired network (or
information about the wireless network) and
special software - Sniffing output can reveal passwords and usernames
18How Attackers Attack (continued)
19How Attackers Attack (continued)
- Software Vulnerabilities ? Bugs are errors in
the programming code or logic of a computer
program - Buffer overflow (See Figures 1-5 and 1-6) is one
of the preferred attack methods for virus authors
20How Attackers Attack (continued)
21How Attackers Attack (continued)
- Malicious Code
- Virus
- Attaches to other programs
- Spreads by exchanging files or e-mail (See Table
1-3)
22How Attackers Attack (continued)
- Malicious Code (continued)
- Worm
- Similar in nature, but different from viruses
- Worms can travel alone
- Self-executing
- Logic Bombs
- Computer programs triggered by specific events
23How Attackers Attack (continued)
- Spyware ? Hardware or software that spies on what
the user is doing without their knowledge - Keystroke logger (See Figure 1-7)
- Software that records and reports user activities
24How Attackers Attack (continued)
25Safeguarding a System
- Identifying, Analyzing and Controlling Risks
- Risk management ? Systematic process of
identifying, analyzing and controlling risks - Risk assessment ? Process of evaluating risks
26Safeguarding a System (continued)
- Authentication, Access Control, and Accounting
- Restricting who can use the resource
and what they are allowed to do - Authentication ? Verifies, confirms and validates
the person requesting access to a resource - Access Control ? Limits what an authorized user
can do - Accounting ? Provides a historical record (audit
trail)
27Safeguarding a System (continued)
- Formalized Security Policy ? Tying it all
together - Outlines the importance of security to the
organization - Establishes
- Policys goals
- How the security program is organized
- Who is responsible at various levels
- Sketches out details
28Information Security The Big Picture
- Data at the centerLayeredprotection around
itPRODUCTSPEOPLEPROCEDURES
29Summary
- Security is a state of freedom from a danger or a
risk. - Information security protects the equipment and
information stored on it. - There are three basic goals of information
security - Integrity
- Confidentiality
- Availability of data
30Summary (continued)
- Reasons why information security is important
- Protect data from theft
- Prevent loss of productivity
- Curb theft of intellectual property
- Ensure compliance with law and avoid legal
consequences - Thwart personal identity theft
- Counter cyberterrorism
31Summary (continued)
- Six categories of attackersall have different
motives - Hackers
- Crackers
- Script kiddies
- Spies
- Employees
- Cyberterrorists
32Summary (continued)
- Five categories of attacks
- Social engineering
- Scanning and sniffing
- Software vulnerabilities
- Malicious code
- Spyware
33Summary (continued)
- Three steps to securing a system
- Risk management
- Identify bad things that can happen to it
- Authentication, access control and accounting
- Restrict who can legitimately use it
- Security policy
- Plan of action tying it all together