Security Guide to Network Security Fundamentals Fourth Edition
- Slides: 46
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 1 Introduction to Security
Objectives • Describe the challenges of securing information • Define information security and explain why it is important • Identify the types of attackers that are common today • List the basic steps of an attack • Describe the five basic principles of defense Security+ Guide to Network Security Fundamentals, Fourth 2
Challenges of Securing Information • Security figures prominently in 21 st century world – Personal security – Information security • Securing information – No simple solution – Many different types of attacks – Defending against attacks often difficult Security+ Guide to Network Security Fundamentals, Fourth 3
Today’s Security Attacks • Advances in computing power – Make password-breaking easy • Software vulnerabilities often not patched – Smartphones a new target Security+ Guide to Network Security Fundamentals, Fourth 4
Today’s Security Attacks (cont’d. ) • Examples of recent attacks – Bogus antivirus software • Marketed by credit card thieves – Online banking attacks – Hacking contest – Nigerian 419 advanced fee fraud • Number one type of Internet fraud – Identity theft using Firesheep – Malware – Infected USB flash drive devices Security+ Guide to Network Security Fundamentals, Fourth 5
Table 1 -1 Selected security breaches involving personal information in a one-month period Security+ Guide to Network Security Fundamentals, Fourth 6
Difficulties in Defending Against Attacks • • • Universally connected devices Increased speed of attacks Greater sophistication of attacks Availability and simplicity of attack tools Faster detection of vulnerabilities Security+ Guide to Network Security Fundamentals, Fourth 7
Difficulties in Defending Against Attacks (cont’d. ) • Delays in patching – Weak distribution of patches • Distributed attacks • User confusion Security+ Guide to Network Security Fundamentals, Fourth 8
Table 1 -2 Difficulties in defending against attacks Security+ Guide to Network Security Fundamentals, Fourth 9
What Is Information Security? • Before defense is possible, one must understand: – What information security is – Why it is important – Who the attackers are Security+ Guide to Network Security Fundamentals, Fourth 10
Defining Information Security • Security – Steps to protect person or property from harm • Harm may be intentional or nonintentional – Sacrifices convenience for safety • Information security – Guarding digitally-formatted information: • That provides value to people and organizations Security+ Guide to Network Security Fundamentals, Fourth 11
Defining Information Security (cont’d. ) • Three types of information protection: often called CIA – Confidentiality • Only approved individuals may access information – Integrity • Information is correct and unaltered – Availability • Information is accessible to authorized users Security+ Guide to Network Security Fundamentals, Fourth 12
Defining Information Security (cont’d. ) • Protections implemented to secure information – Authentication • Individual is who they claim to be – Authorization • Grant ability to access information – Accounting • Provides tracking of events Security+ Guide to Network Security Fundamentals, Fourth 13
Figure 1 -3 Information security components © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth 14
Defining Information Security (cont’d. ) Table 1 -3 Information security layers Security+ Guide to Network Security Fundamentals, Fourth 15
Information Security Terminology • Asset – Item of value • Threat – Actions or events that have potential to cause harm • Threat agent – Person or element with power to carry out a threat Security+ Guide to Network Security Fundamentals, Fourth 16
Table 1 -4 Information technology assets Security+ Guide to Network Security Fundamentals, Fourth 17
Information Security Terminology (cont’d. ) • Vulnerability – Flaw or weakness • Threat agent can bypass security • Risk – Likelihood that threat agent will exploit vulnerability – Cannot be eliminated entirely • Cost would be too high • Take too long to implement – Some degree of risk must be assumed Security+ Guide to Network Security Fundamentals, Fourth 18
Figure 1 -4 Information security components analogy © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth 19
Information Security Terminology (cont’d. ) • Options to deal with risk – Accept • Realize there is a chance of loss – Diminish • Take precautions • Most information security risks should be diminished – Transfer risk to someone else • Example: purchasing insurance Security+ Guide to Network Security Fundamentals, Fourth 20
Understanding the Importance of Information Security • Preventing data theft – Security often associated with theft prevention – Business data theft • Proprietary information – Individual data theft • Credit card numbers Security+ Guide to Network Security Fundamentals, Fourth 21
Understanding the Importance of Information Security (cont’d. ) • Thwarting identity theft – Using another’s personal information in unauthorized manner • Usually for financial gain – Example: • • Steal person’s SSN Create new credit card account Charge purchases Leave unpaid Security+ Guide to Network Security Fundamentals, Fourth 22
Understanding the Importance of Information Security (cont’d. ) • Avoiding legal consequences – Laws protecting electronic data privacy • The Health Insurance Portability and Accountability Act of 1996 (HIPAA) • The Sarbanes-Oxley Act of 2002 (Sarbox) • The Gramm-Leach-Bliley Act (GLBA) • California’s Database Security Breach Notification Act (2003) Security+ Guide to Network Security Fundamentals, Fourth 23
Understanding the Importance of Information Security (cont’d. ) • Maintaining productivity – Post-attack clean up diverts resources • Time and money Table 1 -6 Cost of attacks Security+ Guide to Network Security Fundamentals, Fourth 24
Understanding the Importance of Information Security (cont’d. ) • Foiling cyberterrorism – Premeditated, politically motivated attacks – Target: information, computer systems, data – Designed to: • Cause panic • Provoke violence • Result in financial catastrophe Security+ Guide to Network Security Fundamentals, Fourth 25
Understanding the Importance of Information Security (cont’d. ) • Potential cyberterrorism targets – – – Banking Military Energy (power plants) Transportation (air traffic control centers) Water systems Security+ Guide to Network Security Fundamentals, Fourth 26
Who Are the Attackers? • Categories of attackers – – – Hackers Script kiddies Spies Insiders Cybercriminals Cyberterrorists Security+ Guide to Network Security Fundamentals, Fourth 27
Hackers • Hacker – Person who uses computer skills to attack computers – Term not common in security community • White hat hackers – Goal to expose security flaws – Not to steal or corrupt data • Black hat hackers – Goal is malicious and destructive Security+ Guide to Network Security Fundamentals, Fourth 28
Script Kiddies • Script kiddies – Goal: break into computers to create damage – Unskilled users – Download automated hacking software (scripts) • Use them to perform malicious acts – Attack software today has menu systems • Attacks are even easier for unskilled users – 40 percent of attacks performed by script kiddies Security+ Guide to Network Security Fundamentals, Fourth 29
Spies • Computer spy – Person hired to break into a computer: • To steal information • Hired to attack a specific computer or system: – Containing sensitive information • Goal: steal information without drawing attention to their actions • Possess excellent computer skills: – To attack and cover their tracks Security+ Guide to Network Security Fundamentals, Fourth 30
Insiders • Employees, contractors, and business partners • 48 percent of breaches attributed to insiders • Examples of insider attacks – Health care worker publicized celebrities’ health records • Disgruntled over upcoming job termination – Government employee planted malicious coding script – Stock trader concealed losses through fake transactions – U. S. Army private accessed sensitive documents Security+ Guide to Network Security Fundamentals, Fourth 31
Cybercriminals • Network of attackers, identity thieves, spammers, financial fraudsters • Difference from ordinary attackers – – – More highly motivated Willing to take more risk Better funded More tenacious Goal: financial gain Security+ Guide to Network Security Fundamentals, Fourth 32
Cybercriminals (cont’d. ) • Organized gangs of young attackers – Eastern European, Asian, and third-world regions Table 1 -7 Characteristics of cybercriminals Security+ Guide to Network Security Fundamentals, Fourth 33
Cybercriminals (cont’d. ) • Cybercrime – Targeted attacks against financial networks – Unauthorized access to information – Theft of personal information • Financial cybercrime – Trafficking in stolen credit cards and financial information – Using spam to commit fraud Security+ Guide to Network Security Fundamentals, Fourth 34
Cyberterrorists • Cyberterrorists – Ideological motivation • Attacking because of their principles and beliefs • Goals of a cyberattack: – Deface electronic information • Spread misinformation and propaganda – Deny service to legitimate computer users – Commit unauthorized intrusions • Results: critical infrastructure outages; corruption of vital data Security+ Guide to Network Security Fundamentals, Fourth 35
Attacks and Defenses • Wide variety of attacks – Same basic steps used in attack • To protect computers against attacks: – Follow five fundamental security principles Security+ Guide to Network Security Fundamentals, Fourth 36
Steps of an Attack • Probe for information – Such as type of hardware or software used • Penetrate any defenses – Launch the attack • Modify security settings – Allows attacker to reenter compromised system easily • Circulate to other systems – Same tools directed toward other systems • Paralyze networks and devices Security+ Guide to Network Security Fundamentals, Fourth 37
Figure 1 -6 Steps of an attack © Cengage Learning 2012 Security+ Guide to Network Security Fundamentals, Fourth 38
Defenses Against Attacks • Fundamental security principles for defenses – – – Layering Limiting Diversity Obscurity Simplicity Security+ Guide to Network Security Fundamentals, Fourth 39
Layering • Information security must be created in layers – Single defense mechanism may be easy to circumvent – Unlikely that attacker can break through all defense layers • Layered security approach – Can be useful in resisting a variety of attacks – Provides the most comprehensive protection Security+ Guide to Network Security Fundamentals, Fourth 40
Limiting • Limiting access to information: – Reduces the threat against it • Only those who must use data granted access – Amount of access limited to what that person needs to know • Methods of limiting access – Technology • File permissions – Procedural • Prohibiting document removal from premises Security+ Guide to Network Security Fundamentals, Fourth 41
Diversity • Closely related to layering – Layers must be different (diverse) • If attackers penetrate one layer: – Same techniques unsuccessful in breaking through other layers • Breaching one security layer does not compromise the whole system • Example of diversity – Using security products from different manufacturers Security+ Guide to Network Security Fundamentals, Fourth 42
Obscurity • Obscuring inside details to outsiders • Example: not revealing details – Type of computer – Operating system version – Brand of software used • Difficult for attacker to devise attack if system details are unknown Security+ Guide to Network Security Fundamentals, Fourth 43
Simplicity • Nature of information security is complex • Complex security systems – Difficult to understand troubleshoot – Often compromised for ease of use by trusted users • Secure system should be simple: – For insiders to understand use • Simple from the inside – Complex from the outside Security+ Guide to Network Security Fundamentals, Fourth 44
Summary • Information security attacks growing exponentially in recent years • Several reasons for difficulty defending against today’s attacks • Information security protects information’s integrity, confidentiality, and availability: – On devices that store, manipulate, and transmit information – Using products, people, and procedures Security+ Guide to Network Security Fundamentals, Fourth 45
Summary (cont’d. ) • Goals of information security – Prevent data theft – Thwart identity theft – Avoid legal consequences of not securing information – Maintain productivity – Foil cyberterrorism • Different types of people with different motivations conduct computer attacks • An attack has five general steps Security+ Guide to Network Security Fundamentals, Fourth 46
- Guide to network security
- Security guide to network security fundamentals
- Security guide to network security fundamentals
- Computer security fundamentals 4th edition
- Project 2 fourth edition
- Algebra 2 module 1 answer key
- Ethics in information technology fourth edition
- Ethics in information technology 6th edition answers
- Project 4 fourth edition
- Susanna s epp
- Expert systems: principles and programming, fourth edition
- Network security essentials 5th edition pdf
- Cryptography and network security 6th edition
- Cryptography and network security 6th edition pdf
- Cryptography and network security 4th edition
- Network security essentials 5th edition
- Cryptography and network security pearson
- Fundamentals of information systems 9th edition
- Fundamentals of information systems 9th edition
- No slip condition
- Floyd digital fundamentals
- Machining fundamentals 10th edition
- Fundamentals of organizational communication
- Fundamentals of organizational communication 9th edition
- Sujata madan
- Digital fundamentals floyd 10th edition
- Digital fundamentals floyd ppt
- Dc/ac fundamentals 1st edition
- Management fundamentals 8th edition
- Fundamentals of information systems 9th edition
- Fundamentals of corporate finance canadian edition
- Fundamentals of corporate finance fifth edition
- Corporate finance 6th edition
- Abnormal psychology ronald j comer 9th edition
- Fundamentals of information systems 9th edition
- Fundamentals of heat and mass transfer 4th edition
- The fundamentals of political science research 2nd edition
- Osi security architecture model with neat diagram
- Wireless security in cryptography
- Electronic mail security in network security
- Mis chapter 6
- Using mis 10th edition
- Private secruity
- Intermediary devices
- Campus network design fundamentals
- Florida real estate broker's guide 6th edition
- Florida real estate broker's guide