Professional Documents
Culture Documents
Securing Information
Securing Information
Securing Information
Course Details
Learning Outcomes
• Explain how to secure information.
• Identify and counteract social engineering exploits.
• Identify security issues with the network of an organization.
• Create a process to maintain file security
• Design policies to guard against security breaches
• Identify measures to prevent attacks on an organization’s network
Teaching and Learning Methods
Lecture
Quiz
Discussions
Presentation
Teaching and Learning Methods
Reading List
Simpson, M. (2006). Hands-on ethical hacking and network Defense.
Boston, MA: Thomson Course Technology.
Howlett, T. (2004). Open source security tools: A practical guide to security
applications. Upper Saddle River, New Jersey: Prentice Hall.
Harris, S., Harper, A., Eagle, C., & Ness, J. (2005). Gray hat hacking: The
ethical hacker’s handbook. McGraw Hill Osborne Media.
Information Security
“Information is an asset which, like other important business assets,
has value to an organization or individual and consequently needs to
be suitably protected.” (ISMS Parikh)
HIPAA affects all companies that use Electronic data interchange (EDI)
to communicate personal health records
Information Security
Any information that is confidential (not available for public use) must
be kept secure. Why?
6. Protect and Backup Data: Encrypt you data while in storage and when it is
being transmitted. Backup servers and operational data on a scheduled
bases.
7. Monitor and Test Your Systems: Be vigilant, test your internal and external
systems for inherent vulnerabilities, monitor network traffic for trend that
may infer nefarious activities, change and update your security policy to
mitigate new threats
• An Information Security Policy (ISP) is a set of rules that guide
individuals who work with IT assets. It should secure the
organization from all ends; it should cover all software, hardware
devices, physical parameters, human resource, information/data,
access control.
Status
Revenge
Financial gain
Industrial espionage
Threats to Network Security
Hackers
o Attempt to gain access to unauthorized resources
-Circumventing passwords, firewalls, or other protective measures
Disgruntled employees
Usually unhappy over perceived injustices
Steal information to give confidential information to
new employees
When an employee is terminated, security measures
should be taken immediately
Threats to Network Security
Terrorists
Attack computer systems for several reasons
Making a political statement
Achieving a political goal e.g: release of a jailed comrade
Causing damage to critical systems
Disrupting a target’s financial stability
Government Operations
• A number of countries see computer operations as a
spying technique
Threats to Network Security
Malicious Codes
Malware (e.g. intrusive software, worms , Trojan)
Use system’s well known vulnerabilities to spread
Viruses
Executable code that copies itself from one place to another
Can be benign or harmful
Spread methods
Running executable code
Sharing disks or memory sticks
Opening e-mail attachments
Viewing infected Web pages
Threats to Network Security
Worm
Creates files that copy themselves and consume disk space
Does not require user intervention to be launched
Some worms install back doors
-A way of gaining unauthorized access to computer or other resources
Others can destroy data on hard disks
E.g AIDS (AUTOEXEC)
Trojan program
Harmful computer program that appears to be something useful
Can create a back door to open system to additional attacks
E.g waterfalls.scr"
Threats to Network Security
Macro viruses
Macro is a type of script that automates repetitive tasks in Microsoft
Word or similar applications
Melissa Virus 1999 (email – 50 addresses)
1. Hacker
2. Cracker
3. Script kiddie,
4. Corporate spy
5. Unethical employee
6. Cyber extortionist
7. Cyber terrorist
Hacker : The term Hacker, although originally a complimentary
word for a computer enthusiast, now has a derogatory meaning and
refers to someone who accesses a computer or network illegally.
Some hackers claim the intent of their security breaches is to
improve security.
Network Infrastructure
Wireless access
User accounts
Firewalls
Physical
Software
Network monitoring software
Physical protection
Layers of Protection
Physical Location Devices
Building Flash Drive Data
Office Laptop Image Files
Home Workstation Text
Car Smartphone Spreadsheet
Briefcase Tablet Database
Data Center
Data Protection
Email
Encrypted
Digital Signatures
Security Threats
Phishing Mails
Storage devices
User authentication
Do not share passwords or accounts
PCI DSS(Payment Card Industry Data
Security Standards) Compliance
Making it Work
Education/Training/Accountability
Polices
Procedures
Documentation
Management
Accountability
Checks and balances
Implementing physical security
• Determine whether residual risk (that risk which remains after countermeasures
have been introduced) is acceptable
Risk management
The Certified Information Systems Auditor (CISA) Review Manual
2006 provides the following definition of risk management: