Introduction Network security

27
Information Security What is Information Security?

Transcript of Introduction Network security

Information Security

What is Information Security?

Information Security

Information SecurityInformation Security is the name given to the preventative stepspreventative steps we take to guard our informationinformation and our capabilitiescapabilities.

Measures adopted to prevent the unauthorized use, misuse, modification, or denial of use of knowledge, facts ,data or capabilities.

Critical Characteristics of Information

AvailabilityAccuracyAuthenticityConfidentialityIntegrity

Availability

Enables users who need to accessaccess information to do so without interference interference and receive it in requiredrequired format.format.

The information is availableavailable only to the authorizedauthorized users.

Accuracy

Information is accurate when it is free free from mistakesfrom mistakes or errors and it has the value that the end user expects.

Authenticity

Authenticity of information is the quality or state of being genuine or original,genuine or original, rather than a reproduction or fabrication.

e.g. Email SpoofingEmail Spoofing The unauthorized use of a third-party The unauthorized use of a third-party

domain name as the sender's name in an e-domain name as the sender's name in an e-mail messagemail message

http://blockstatus.com/anonymous-mailer

Confidentiality

Information is available only to people with rightful access.rightful access.

Ensuring that only those with the rights rights and privilegesprivileges to accessaccess a particular set of information are able to do so.

It is closely related with the privacyprivacy of information.

Integrity Information can only be changedchanged by

authorizedauthorized personnel. The quality or state of being whole, complete whole, complete

and uncorrupted uncorrupted is the integrity of information. Three goals of Integrity

Prevention of Modification by unauthorized users. Prevention of unauthorized modification by authorized users. Preservation of Internal and External Consistency.

Integrity check can be done through: File size File hashing

Hashing is the transformation of a string of character s into a usually shorter fixed-length value or key that represents the original string

Components of an Information System

SoftwareHardwareDataPeopleProcedures

Software

Comprises of OSOS,,ApplicationsApplications and command command utilitiesutilities.

BugsBugs, WeaknessesWeaknesses and HolesHoles. An error or defect in software or hardware that causes a program to

malfunction

Security Hole( something you need to fix now) Security Warning( something you need to fix soon) Security Note (something you need to fix when you get around to it, or just

some information that you should consider)

Service PacksService Packs, PatchesPatches and Hot fixesHot fixes. Security is least Priorityleast Priority in Software

development

Hardware

HousesHouses and ExecutesExecutes a software.Stores and carries the data.Provides InterfacesInterfaces for the entry and

removal of information from the system.

Physical security policies Physical security policies deal with the deal with the H/WH/W.

Data

MainMain object of intentionalintentional attacks

People

Main threatMain threat to information security.

Often OverlookedOverlooked

Procedures

Procedures are written instructionswritten instructions for accomplishingaccomplishing a specific tasktask.

Another frequently overlookedoverlooked component

What is Network Security?

Effort to create a secure computingsecure computing platformplatform, so users or programs cannot perform actionscannot perform actions that they are not allowed to do.

Network Security is the protectionprotection of networking componentsnetworking components, connectionsconnections and contentscontents.

Network Security as a Continuous Process

Network security is a continuous processcontinuous process built around a security policy.Step 1: SecureStep 2: MonitorStep 3: TestStep 4: Improve

Step 1: Secure the Network

Implement security solutions to preventprevent unauthorized accessunauthorized access and to protectprotect information.information.AuthenticationEncryptionFirewallsVulnerability Patching

Step 2: Monitor Security

Detects violationsDetects violations to the security policy

Involves system auditingsystem auditing and real-time intrusion intrusion detectiondetection

ValidatesValidates the securitysecurity implementation in Step 1

Step 3: Test Security

Validates effectivenessValidates effectiveness of the security policy through system auditing and network scanningnetwork scanning

Step 4: Improve Security

Use information from the monitor and test phases to make improvements improvements to the security implementation.

Adjust the security policy as security holessecurity holes and risksrisks are identified.

Terms related to Security

Assets Threats Attack Vulnerability Risk Analysis Countermeasures Hacking

Asset

An asset is the organizational resourceorganizational resource that is being protected.

It can be logicallogical like website, information, data.

It can be physicalphysical like computer system or other tangible object.

Threats, Vulnerability and Controls

Threat a person, thing, event or idea which poses some danger to an asset

(in terms of confidentiality, integrity, availability). a possible means by which a security policy may be breached.

An attack is a realization of a threat.

Vulnerability A weakness in the system that can be exploited to cause loss or

harm Control, Countermeasure, safeguard

An action, device, procedure or technique that removes or reduces a vulnerability.

Risk = Threat + Vulnerability

Threats without vulnerabilities pose no risk.Likewise, vulnerabilities without threats

pose no risk.

Risk is the probability that something can happen.

Risk analysis can be quantitative or qualitative.

Cont…

Risk can be qualitatively defined in three levels:

LowLow- Action to remove the vulnerability should be taken if possible

MediumMedium- Action to remove the vulnerability is advisable

HighHigh-- Action should be taken immediately to remove this vulnerability

Hacking

Can be defined positively and negatively:To write computer programs for enjoyment.To gain access to a computer illegally.

Summary

What is Information Security?What is Network Security?Assets, Threats and Countermeasures