Top Banner
Information Information Security Security By By Bhupendra Ratha, Lecturer Bhupendra Ratha, Lecturer School of Library & Information School of Library & Information Science Science D.A.V.V., Indore D.A.V.V., Indore E-mail:[email protected] E-mail:[email protected]
38

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected].

Dec 25, 2015

Download

Documents

Leslie Wilson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Information Security Information Security

ByBy

Bhupendra Ratha, LecturerBhupendra Ratha, LecturerSchool of Library & Information ScienceSchool of Library & Information Science

D.A.V.V., IndoreD.A.V.V., IndoreE-mail:[email protected]:[email protected]

Page 2: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Outline of Information SecurityOutline of Information Security IntroductionIntroduction Impact of informationImpact of information Need of Information Security.Need of Information Security. Objectives of Information Security.Objectives of Information Security. Areas of Information Security. Areas of Information Security. Types of attackersTypes of attackers Why attacks?Why attacks? Methods of Attacking on the InformationMethods of Attacking on the Information Methods of Defending the InformationMethods of Defending the Information Tips for the Information SecurityTips for the Information Security

Page 3: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

IntroductionIntroduction

Information Security is a complicated area and can Information Security is a complicated area and can be addressed by well-trained and experienced be addressed by well-trained and experienced Professionals.Professionals.

““When there is an attack on the system with the When there is an attack on the system with the help of different threats, it means that our system help of different threats, it means that our system is working very slowly, damaged and our is working very slowly, damaged and our information are unsecured” is called Information information are unsecured” is called Information insecurity. This is a very big problem. insecurity. This is a very big problem.

The The Information SecurityInformation Security is the solution for it. is the solution for it.

Page 4: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Importance of InformationImportance of Information Our work is based on records (information).Our work is based on records (information). We spend minimum half our day with documentsWe spend minimum half our day with documents 15% of Rs. spent managing documents.15% of Rs. spent managing documents. Can’t work without data, record or informationCan’t work without data, record or information

Page 5: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Need of Information SecurityNeed of Information Security To privacy of our Data/InformationTo privacy of our Data/Information To safely data savingTo safely data saving Theft own Data/InformationTheft own Data/Information To avoid bad use of our dataTo avoid bad use of our data Lack of time Lack of time Lack of moneyLack of money Lack of human resourcesLack of human resources

Page 6: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Objectives of Data/Inf. SecurityObjectives of Data/Inf. Security

Objectives of Data/Info. security

Integrity

Confidentiality

Authenticity

Availability

Page 7: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Security AreasSecurity Areas

Basically three areas of securityBasically three areas of security

1.1. Physical securityPhysical security

2.2. Network securityNetwork security

3.3. Database SecurityDatabase Security

Page 8: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Physical SecurityPhysical Security Keep the servers in locked room with network and Keep the servers in locked room with network and

power cables snipped off.power cables snipped off. Security of other hardware and machinery Security of other hardware and machinery

Page 9: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Network SecurityNetwork Security Network security all entry points to a network should be guarded.Network security all entry points to a network should be guarded.

FirewallModem

Internet

Switch

Scanner

Workstation

Printer

ServerUnprotected Network

Protected LAN

Page 10: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Database SecurityDatabase Security

Database IntegrityDatabase Integrity User AuthenticationUser Authentication Access ControlAccess Control AvailabilityAvailability

Page 11: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Types of AttackersTypes of Attackers

HackersHackers Lone criminalsLone criminals PolicePolice Malicious insidersMalicious insiders Press/mediaPress/media TerroristsTerrorists Industrial espionage Industrial espionage National intelligence organizationsNational intelligence organizations Info warriorsInfo warriors

Page 12: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

HackersHackers

– Attacks for the challengeAttacks for the challenge

– Own subculture with names, lingo and rulesOwn subculture with names, lingo and rules

– Stereotypically young, male and socially Stereotypically young, male and socially

– Can have considerable expertise and passion for Can have considerable expertise and passion for attacksattacks

Page 13: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Lone criminalsLone criminals

– Attack for financial gainAttack for financial gain

– Cause the bulk of computer-related crimesCause the bulk of computer-related crimes

– Usually target a single method for the attackUsually target a single method for the attack

Page 14: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Malicious insidersMalicious insiders

– Already inside the systemAlready inside the system

– Knows weaknesses and tendencies of the Knows weaknesses and tendencies of the organizationorganization

– Very difficult to catchVery difficult to catch

Page 15: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Press/mediaPress/media

– Gather information for a story to sell papers/ Gather information for a story to sell papers/ commercial timecommercial time

PolicePolice–Lines are sometimes crossed when gathering information Lines are sometimes crossed when gathering information to pursue a caseto pursue a case

Page 16: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

TTerrorists

–Goal is disruption and damage. Goal is disruption and damage.

–Most have few resources and skilled.Most have few resources and skilled.

Page 17: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

National Intelligence OrganizationsNational Intelligence Organizations

To investigation of different casesTo investigation of different cases

Industrial EspionageIndustrial Espionage

• To discover a competitors strategic marketingTo discover a competitors strategic marketing

Page 18: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Info warriorsInfo warriors– Military based group targeting information or Military based group targeting information or

networking infrastructuresnetworking infrastructures

– Lots of resourcesLots of resources

– Willing to take high risks for short term gainWilling to take high risks for short term gain

Page 19: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Why attacks?Why attacks?

To publicity To publicity To financial gainTo financial gain JealousnessJealousness To funTo fun To competition with the person of same fieldTo competition with the person of same field

Page 20: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Specific types of attacksSpecific types of attacks

Engineering attacksEngineering attacks Physical attacksPhysical attacks Environmental attacksEnvironmental attacks

Page 21: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Engineering attacksEngineering attacks VirusesViruses

String of computer code that attaches to other programs and replicatesString of computer code that attaches to other programs and replicates

WormsWorms Replicates itself to multiple systemsReplicates itself to multiple systems Rarely dangerous, mostly annoyingRarely dangerous, mostly annoying

Trojan HorsesTrojan Horses Collects information and sends to known site on the networkCollects information and sends to known site on the network Also can allow external takeover of your systemAlso can allow external takeover of your system

Page 22: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Cont…Cont…

Attacker

Virus

Our system

colleague

Page 23: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Cont..Cont..– Password sniffingPassword sniffing

Collect first parts of data packet and look for login Collect first parts of data packet and look for login attemptsattempts

– IP Spoofing IP Spoofing Fake packet to “hijack” a session and gain accessFake packet to “hijack” a session and gain access

-Port scanning-Port scanning Automated process that looks for open networking portsAutomated process that looks for open networking ports Logs positive hits for later exploitsLogs positive hits for later exploits

Page 24: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Physical attacksPhysical attacks

Equipment failure arising from defective Equipment failure arising from defective components.components.

Temperature and humidity.Temperature and humidity. Physical destruction of hardware and equipmentPhysical destruction of hardware and equipment Theft or sabotage.Theft or sabotage.

Page 25: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Environmental AttacksEnvironmental Attacks

Natural DisastersNatural Disasters

Fire, Earthquakes etc.Fire, Earthquakes etc.

Man-Made DisastersMan-Made Disasters

War, Chemical Leaks etc.War, Chemical Leaks etc.

Page 26: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Methods of Information Security ThreatsMethods of Information Security Threats

BackupsBackups Antivirus SoftwareAntivirus Software CryptographyCryptography BiometricsBiometrics Honey potsHoney pots Firewalls Firewalls Burglar alarmsBurglar alarms

Page 27: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Backups Backups

Backups allow us to restore damaged or Backups allow us to restore damaged or destroyed data.destroyed data.

We can set up backup servers on the network.We can set up backup servers on the network. Backup media are- Floppy disks, external hard Backup media are- Floppy disks, external hard

disks, ISP online backup.disks, ISP online backup.

Page 28: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

AntivirusAntivirus

Antivirus is a program that we can install on Antivirus is a program that we can install on our computer to detect and remove viruses.our computer to detect and remove viruses.

It is used to scan hard disks, floppy disks, It is used to scan hard disks, floppy disks, CDs, for viruses and scan e-mail messages and CDs, for viruses and scan e-mail messages and individual files, downloads from the Net.individual files, downloads from the Net.

Page 29: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

CryptographyCryptography

Cryptography is the art of converting info. Into a Cryptography is the art of converting info. Into a secret code that can be interpreted only by a person secret code that can be interpreted only by a person who knows how to decode it.who knows how to decode it.

Cipher text

Encrypted

Decrypted

Plain text

Page 30: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Example of CryptographyExample of Cryptography

Original message Sender

Original message Receiver

Encrypted Decrypted

Page 31: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

BioinformaticsBioinformatics

The bioinformetics authentication process uses a The bioinformetics authentication process uses a person’s unique physical characteristics to person’s unique physical characteristics to authentically the identity.authentically the identity.

Bioinformatics authentication method fingerprint Bioinformatics authentication method fingerprint recognition, voice authentication, face recognition, recognition, voice authentication, face recognition, keystroke dynamics and retina.keystroke dynamics and retina.

FingerprintFingerprint RetinaRetina

Page 32: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Honey potsHoney pots

A honey pots is a tool used for detecting an A honey pots is a tool used for detecting an intrusion attempt.intrusion attempt.

A honey pots simulates a vulnerable computer A honey pots simulates a vulnerable computer on a network.on a network.

It contains no critical data or application but has It contains no critical data or application but has enough data to lure an intruder.enough data to lure an intruder.

Page 33: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Honey potsHoney pots

Honey potsIntruder

Page 34: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

FirewallFirewall

A firewall is a tool for the network security A firewall is a tool for the network security that stand between trusted and entrusted that stand between trusted and entrusted networks and inspecting all traffic that flows networks and inspecting all traffic that flows between them.between them.

In simple language firewall is a filter In simple language firewall is a filter machine that monitors the type of traffic that machine that monitors the type of traffic that flows in and out of the network.flows in and out of the network.

Page 35: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Private network

FirewallFirewall

Internet

FirewallFirewall

Page 36: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Burglar alarmsBurglar alarms Traps set on specific networked objects that Traps set on specific networked objects that

go off if accessedgo off if accessed

Page 37: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.

Tips for information SecurityTips for information Security Use of strong passwordUse of strong password Adopt a security policy Adopt a security policy Use of anti-virus.Use of anti-virus. Information security officerInformation security officer Use of firewallsUse of firewalls Use of bioinformaticsUse of bioinformatics Beware to malicious insidersBeware to malicious insiders Security training Security training Use of other security toolsUse of other security tools

Page 38: Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com.