Basics of IT security

39
IT SECURITY AWARENESS CAS - SUR

Transcript of Basics of IT security

Page 1: Basics of IT security

IT SECURITY AWARENESS CAS - SUR

Page 2: Basics of IT security

Hardware (Physical Assets) Software System interfaces (e.g., internal and externa

l connectivity) Data and information Persons who support and use the IT system System mission (e.g., the processes perform

ed by the IT system) System and data criticality (e.g., the system’

s value or importance to an organization) System and data sensitivity

NIST SP 800-30

Page 3: Basics of IT security

Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected

ISO/IEC17799: 2000

Page 4: Basics of IT security

Business Requirements Client / customer / stakeholder Marketing Trustworthy Internal management tool

Legal Requirements Revenue Department Stock Exchange of Thailand Copyright, patents, ….

Page 5: Basics of IT security

Information security protects information from wide range of threats in order toEnsure Business ContinuityMinimize Business DamageMaximize ROI and Business Opportunities

Business : Stable service to customer Education : Availability of resources and integrity of

information e.g. grade, profile, etc. ISO/IEC17799: 2000 page iii, Introduction

Page 6: Basics of IT security

Security is preservation of confidentiality, integrity and availability of information

Confidentiality Ensuring that information is accessible only to those

authorized to have access Integrity

Safeguarding the accuracy and completeness of information and processing methods

Availability Ensuring that authorized users have access to

information and associated assets when required BS7799-2: 2002 page3, 3.1, 3.2, 3.3

Page 7: Basics of IT security

Policy/Process/PocedureClearCoverageCompliance – Legal, Standard, guideline etc.

PeopleAwareness (e.g. Password on screen) Discipline

TechnologyEnablersManagement Tools

Page 8: Basics of IT security

Could be anything that harm your system e.g.UserHacker/ crackerVirusSpamEtc.

Page 9: Basics of IT security

Non-Computerized systemMasqueradeSocial EngineeringTheftSystem malfunction (disaster, power

interruption) IT Network Threat

Network LevelApplication Level

Page 10: Basics of IT security

Denial of ServicesServices has been disable by excessive

workload. Information sniffing

Information has been tapped and viewed by unauthorized person

Unauthorized accessLow level worker can access to critical

information.

Page 11: Basics of IT security

Snooping

- - - - - - - - -m y p a s s w o r d

Telnet 203.152.145.121username:daengpassword:

203.152.145.121

202.104.10.5

Page 12: Basics of IT security

3-way handshake

SYN REQ

SYN ACK

ACK

DATA TRANSFER

WWW

- 3 way handshake

Page 13: Basics of IT security

SYN attack

WWWInternet

203.152.145.121

Attacker

SYN REQ D=203.152.145.121 S=202.104.10.5

202.104.10.5SYN ACK D=202.104.10.5 S=203.152.145.121

WAIT

1

2

Page 14: Basics of IT security

Smurf Attack

192.168.1.0

1921681255 2031521492ICMP REQ D= . . . S= . . .

2031521491 19216811ICMP REPLY D= . . . S= . . .

2031521491 19216812ICMP REPLY D= . . . S= . . .

2031521491 19216813ICMP REPLY D= . . . S= . . .

2031521491 19216815ICMP REPLY D= . . . S= . . .

2031521491 19216814ICMP REPLY D= . . . S= . . .

2031521491 19216816ICMP REPLY D= . . . S= . . .

2031521491 19216817

2031521491 19216818ICMP REPLY D= . . . S= . . .

203.152.149.1

Internet

Page 15: Basics of IT security

Virus vs Worms..? Virus

Viruses are computer programs that are designed to spread themselves from one file to another on a single computer.

A virus might rapidly infect every application file on an individual computer, or slowly infect the documents on that computer,

but it does not intentionally try to spread itself from that computer to other computers.

Worms Worms, on the other hand, are insidious because they rely less (or not at all) upon human

behavior in order to spread themselves from one computer to others.

The computer worm is a program that is designed to copy itself from one computer to another over a network (e.g. by using e-mail).

Page 16: Basics of IT security

E-mail spoofingPretend to be someone e.g.

[email protected], Spam Mail

Unsolicited or unwanted e-mail or Phising

Page 17: Basics of IT security

Desktop Threat Viruses, worms, Trojan, Backdoor Cookies Java Script and Java Applet Zombies network Key logger (Game-Online)

Page 18: Basics of IT security

We need “control” which are Policy & Process security control to provide

guideline and framework People to control user behaviorTechnology will be a tool in order to

enforced Policy throughout the organization effectively.

Page 19: Basics of IT security

Policy Compliance ISO 17799

Compliance CheckingCobiT Audit Tools

NIST security standard guidelineNIST – 800 series

Organization ControlBusiness Continuity Plan

Page 20: Basics of IT security

Security Awareness Training Security Learning Continuum

Awareness, Training, Education Responsibility Control

Need to know basis

Page 21: Basics of IT security

Computer Security is the process of preventing and detecting unauthorized use of your computer

Prevention measures help you to stop unauthorized users (intruders) from accessing any part of you computer network

Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

Network and Host Based Security Security Devices (Hardware) or Security Software

Page 22: Basics of IT security

Firewall (Access control) IDS/IPS VPN & SSL VPN (Data Encryption) Anti-Spam (preventing un-wanted email) QoS (Quality of Services - Bandwidth

Management) Web Content Filtering IM & P2P

Page 23: Basics of IT security

Web Traffic— customers, partners, employees

Email Traffic

Applications/Web Services Traffic partners, customers, internal

VPN Trafficremote and mobile users

Internal security threatContractors/disgruntled employees

Remote user

Page 24: Basics of IT security

Type of firewallPacket filteringApplication FirewallStateful Inspection

Type of implementationPacket FilterScreened host Dual home HostScreen Subnet (DMZ)

References: CISSP Certification

Packet Filter

Screened Host

Dual home Host

Screened Subnet

Page 25: Basics of IT security
Page 26: Basics of IT security

Known

Attacks DOS/DDOS

Zero-day

Attacks

Laptop Desktop Server Core Edge Branch Office

Host IPS Network IPS

Page 27: Basics of IT security

Detection & Prevention System Signature & Behavior & Anomaly based

Page 28: Basics of IT security

Encryption & Decryption Public Key & Private Key Encryption Technology

DES3DESAES

Page 29: Basics of IT security

Source: Symantec/ Brightmail

Page 30: Basics of IT security

Why do they spam?0.0005$ vs 1.21$ -> 0.02B vs 48.4B1/100,000 count as success

How much does spam is? <spamcorp.net>~6 e-mail/sec 360 e-mail/min 21,600

e-mail/hr How do they get my e-mail?

Webboard, forum, etc. Does spam legal? How to Protect yourself from getting

spam?

Page 31: Basics of IT security
Page 32: Basics of IT security
Page 33: Basics of IT security
Page 34: Basics of IT security
Page 35: Basics of IT security

Cracks and Hacks Tools WebsiteSpyware, Trojan, Virus, etc.

Banner & AdvertisingAdware, Toolbar, Spam – Subscribe, Credit

card no., etc. Drugs, Gambling, Weapon, etc. Pornography, Nude, Adult Materials Shopping Online (Credit card issues)

Page 36: Basics of IT security

Anti – Virus VPN - Client Personal Firewall IDS Web-Filtering

Small group, Home used, Computer Laboratory, etc.

Page 37: Basics of IT security
Page 38: Basics of IT security

IMVirusExploitVoice Chat

P2PBandwidth UsageSpywareBackDoor

Page 39: Basics of IT security

Questions