About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information...

47
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations to fit your class needs. Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc.

Transcript of About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information...

Page 1: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

About the Presentations

• The presentations cover the objectives found in the

opening of each chapter.

• All chapter objectives are listed in the beginning of

each presentation.

• You may customize the presentations to fit your

class needs.

• Some figures from the chapters are included. A

complete set of images from the book can be found

on the Instructor Resources disc.

Page 2: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network

Security Fundamentals,

Fourth Edition

Chapter 1

Introduction to Security

Page 3: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Objectives

• Describe the challenges of securing information

• Define information security and explain why it is

important

• Identify the types of attackers that are common

today

• List the basic steps of an attack

• Describe the five basic principles of defense

Security+ Guide to Network Security Fundamentals, Fourth Edition 3

Page 4: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Challenges of Securing Information

• Security figures prominently in 21st century world

– Personal security

– Information security

• Securing information

– No simple solution

– Many different types of attacks

– Defending against attacks often difficult

Security+ Guide to Network Security Fundamentals, Fourth Edition 4

Page 5: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Today’s Security Attacks

• Advances in computing power

– Make password-breaking easy

• Software vulnerabilities often not patched

– Smartphones a new target

Security+ Guide to Network Security Fundamentals, Fourth Edition 5

Page 6: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Today’s Security Attacks (cont’d.)

• Examples of recent attacks

– Bogus antivirus software

• Marketed by credit card thieves

– Online banking attacks

– Hacking contest

– Nigerian 419 advanced fee fraud

• Number one type of Internet fraud

– Identity theft using Firesheep

– Malware

– Infected USB flash drive devices

Security+ Guide to Network Security Fundamentals, Fourth Edition 6

Page 7: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Table 1-1 Selected security breaches involving personal information in a one-month period

Page 8: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Difficulties in Defending Against

Attacks

• Universally connected devices

• Increased speed of attacks

• Greater sophistication of attacks

• Availability and simplicity of attack tools

• Faster detection of vulnerabilities

Security+ Guide to Network Security Fundamentals, Fourth Edition 8

Page 9: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Difficulties in Defending Against

Attacks (cont’d.)

• Delays in patching

– Weak distribution of patches

• Distributed attacks

• User confusion

Security+ Guide to Network Security Fundamentals, Fourth Edition 9

Page 10: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition 10

Table 1-2 Difficulties in defending against attacks

Page 11: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

What Is Information Security?

• Before defense is possible, one must understand:

– What information security is

– Why it is important

– Who the attackers are

Security+ Guide to Network Security Fundamentals, Fourth Edition 11

Page 12: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Defining Information Security

• Security

– Steps to protect person or property from harm

• Harm may be intentional or nonintentional

– Sacrifices convenience for safety

• Information security

– Guarding digitally-formatted information:

• That provides value to people and organizations

Security+ Guide to Network Security Fundamentals, Fourth Edition 12

Page 13: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Defining Information Security (cont’d.)

• Three types of information protection: often called

CIA

– Confidentiality

• Only approved individuals may access information

– Integrity

• Information is correct and unaltered

– Availability

• Information is accessible to authorized users

Security+ Guide to Network Security Fundamentals, Fourth Edition 13

Page 14: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Defining Information Security (cont’d.)

• Protections implemented to secure information

– Authentication

• Individual is who they claim to be

– Authorization

• Grant ability to access information

– Accounting

• Provides tracking of events

Security+ Guide to Network Security Fundamentals, Fourth Edition 14

Page 15: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Figure 1-3 Information security components © Cengage Learning 2012

Page 16: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition

Defining Information Security (cont’d.)

16

Table 1-3 Information security layers

Page 17: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Information Security Terminology

• Asset

– Item of value

• Threat

– Actions or events that have potential to cause harm

• Threat agent

– Person or element with power to carry out a threat

Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Page 18: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition 18

Table 1-4 Information technology assets

Page 19: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Information Security Terminology

(cont’d.)

• Vulnerability

– Flaw or weakness

• Threat agent can bypass security

• Risk

– Likelihood that threat agent will exploit vulnerability

– Cannot be eliminated entirely

• Cost would be too high

• Take too long to implement

– Some degree of risk must be assumed

Security+ Guide to Network Security Fundamentals, Fourth Edition 19

Page 20: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition 20

Figure 1-4 Information security components analogy © Cengage Learning 2012

Page 21: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Information Security Terminology

(cont’d.)

• Options to deal with risk

– Accept

• Realize there is a chance of loss

– Diminish

• Take precautions

• Most information security risks should be diminished

– Transfer risk to someone else

• Example: purchasing insurance

Security+ Guide to Network Security Fundamentals, Fourth Edition 21

Page 22: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Understanding the Importance of

Information Security

• Preventing data theft

– Security often associated with theft prevention

– Business data theft

• Proprietary information

– Individual data theft

• Credit card numbers

Security+ Guide to Network Security Fundamentals, Fourth Edition 22

Page 23: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Understanding the Importance of

Information Security (cont’d.)

• Thwarting identity theft

– Using another’s personal information in unauthorized

manner

• Usually for financial gain

– Example:

• Steal person’s SSN

• Create new credit card account

• Charge purchases

• Leave unpaid

Security+ Guide to Network Security Fundamentals, Fourth Edition 23

Page 24: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Understanding the Importance of

Information Security (cont’d.)

• Avoiding legal consequences

– Laws protecting electronic data privacy

• The Health Insurance Portability and Accountability

Act of 1996 (HIPAA)

• The Sarbanes-Oxley Act of 2002 (Sarbox)

• The Gramm-Leach-Bliley Act (GLBA)

• California’s Database Security Breach Notification Act

(2003)

Security+ Guide to Network Security Fundamentals, Fourth Edition 24

Page 25: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Understanding the Importance of

Information Security (cont’d.)

• Maintaining productivity

– Post-attack clean up diverts resources

• Time and money

Security+ Guide to Network Security Fundamentals, Fourth Edition 25

Table 1-6 Cost of attacks

Page 26: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Understanding the Importance of

Information Security (cont’d.)

• Foiling cyberterrorism

– Premeditated, politically motivated attacks

– Target: information, computer systems, data

– Designed to:

• Cause panic

• Provoke violence

• Result in financial catastrophe

Security+ Guide to Network Security Fundamentals, Fourth Edition 26

Page 27: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Understanding the Importance of

Information Security (cont’d.)

• Potential cyberterrorism targets

– Banking

– Military

– Energy (power plants)

– Transportation (air traffic control centers)

– Water systems

Security+ Guide to Network Security Fundamentals, Fourth Edition 27

Page 28: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Who Are the Attackers?

• Categories of attackers

– Hackers

– Script kiddies

– Spies

– Insiders

– Cybercriminals

– Cyberterrorists

Security+ Guide to Network Security Fundamentals, Fourth Edition 28

Page 29: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Hackers

• Hacker

– Person who uses computer skills to attack

computers

– Term not common in security community

• White hat hackers

– Goal to expose security flaws

– Not to steal or corrupt data

• Black hat hackers

– Goal is malicious and destructive

Security+ Guide to Network Security Fundamentals, Fourth Edition 29

Page 30: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Script Kiddies

• Script kiddies

– Goal: break into computers to create damage

– Unskilled users

– Download automated hacking software (scripts)

• Use them to perform malicious acts

– Attack software today has menu systems

• Attacks are even easier for unskilled users

– 40 percent of attacks performed by script kiddies

Security+ Guide to Network Security Fundamentals, Fourth Edition 30

Page 31: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Spies

• Computer spy

– Person hired to break into a computer:

• To steal information

• Hired to attack a specific computer or system:

– Containing sensitive information

• Goal: steal information without drawing attention to

their actions

• Possess excellent computer skills:

– To attack and cover their tracks

Security+ Guide to Network Security Fundamentals, Fourth Edition 31

Page 32: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Insiders

• Employees, contractors, and business partners

• 48 percent of breaches attributed to insiders

• Examples of insider attacks

– Health care worker publicized celebrities’ health

records

• Disgruntled over upcoming job termination

– Government employee planted malicious coding

script

– Stock trader concealed losses through fake

transactions

– U.S. Army private accessed sensitive documents Security+ Guide to Network Security Fundamentals, Fourth Edition 32

Page 33: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Cybercriminals

• Network of attackers, identity thieves, spammers,

financial fraudsters

• Difference from ordinary attackers

– More highly motivated

– Willing to take more risk

– Better funded

– More tenacious

– Goal: financial gain

Security+ Guide to Network Security Fundamentals, Fourth Edition 33

Page 34: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Cybercriminals (cont’d.)

• Organized gangs of young attackers

– Eastern European, Asian, and third-world regions

Security+ Guide to Network Security Fundamentals, Fourth Edition 34

Table 1-7 Characteristics of cybercriminals

Page 35: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Cybercriminals (cont’d.)

• Cybercrime

– Targeted attacks against financial networks

– Unauthorized access to information

– Theft of personal information

• Financial cybercrime

– Trafficking in stolen credit cards and financial

information

– Using spam to commit fraud

Security+ Guide to Network Security Fundamentals, Fourth Edition 35

Page 36: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Cyberterrorists

• Cyberterrorists

– Ideological motivation

• Attacking because of their principles and beliefs

• Goals of a cyberattack:

– Deface electronic information

• Spread misinformation and propaganda

– Deny service to legitimate computer users

– Commit unauthorized intrusions

• Results: critical infrastructure outages; corruption of

vital data

Security+ Guide to Network Security Fundamentals, Fourth Edition 36

Page 37: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Attacks and Defenses

• Wide variety of attacks

– Same basic steps used in attack

• To protect computers against attacks:

– Follow five fundamental security principles

Security+ Guide to Network Security Fundamentals, Fourth Edition 37

Page 38: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Steps of an Attack

• Probe for information

– Such as type of hardware or software used

• Penetrate any defenses

– Launch the attack

• Modify security settings

– Allows attacker to reenter compromised system

easily

• Circulate to other systems

– Same tools directed toward other systems

• Paralyze networks and devices

Security+ Guide to Network Security Fundamentals, Fourth Edition 38

Page 39: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition 39

Figure 1-6

Steps of an attack © Cengage Learning 2012

Page 40: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Security+ Guide to Network Security Fundamentals, Fourth Edition

Defenses Against Attacks

• Fundamental security principles for defenses

– Layering

– Limiting

– Diversity

– Obscurity

– Simplicity

40

Page 41: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Layering

• Information security must be created in layers

– Single defense mechanism may be easy to

circumvent

– Unlikely that attacker can break through all defense

layers

• Layered security approach

– Can be useful in resisting a variety of attacks

– Provides the most comprehensive protection

Security+ Guide to Network Security Fundamentals, Fourth Edition 41

Page 42: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Limiting

• Limiting access to information:

– Reduces the threat against it

• Only those who must use data granted access

– Amount of access limited to what that person needs

to know

• Methods of limiting access

– Technology

• File permissions

– Procedural

• Prohibiting document removal from premises

Security+ Guide to Network Security Fundamentals, Fourth Edition 42

Page 43: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Diversity

• Closely related to layering

– Layers must be different (diverse)

• If attackers penetrate one layer:

– Same techniques unsuccessful in breaking through

other layers

• Breaching one security layer does not compromise

the whole system

• Example of diversity

– Using security products from different manufacturers

Security+ Guide to Network Security Fundamentals, Fourth Edition 43

Page 44: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Obscurity

• Obscuring inside details to outsiders

• Example: not revealing details

– Type of computer

– Operating system version

– Brand of software used

• Difficult for attacker to devise attack if system

details are unknown

Security+ Guide to Network Security Fundamentals, Fourth Edition 44

Page 45: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Simplicity

• Nature of information security is complex

• Complex security systems

– Difficult to understand and troubleshoot

– Often compromised for ease of use by trusted users

• Secure system should be simple:

– For insiders to understand and use

• Simple from the inside

– Complex from the outside

Security+ Guide to Network Security Fundamentals, Fourth Edition 45

Page 46: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Summary

• Information security attacks growing exponentially

in recent years

• Several reasons for difficulty defending against

today’s attacks

• Information security protects information’s integrity,

confidentiality, and availability:

– On devices that store, manipulate, and transmit

information

– Using products, people, and procedures

Security+ Guide to Network Security Fundamentals, Fourth Edition 46

Page 47: About the Presentationscf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch1.pdf · •Information security attacks growing exponentially in recent years •Several reasons for difficulty

Summary (cont’d.)

• Goals of information security

– Prevent data theft

– Thwart identity theft

– Avoid legal consequences of not securing

information

– Maintain productivity

– Foil cyberterrorism

• Different types of people with different motivations

conduct computer attacks

• An attack has five general steps

Security+ Guide to Network Security Fundamentals, Fourth Edition 47