Top Banner
1 08/24/15 Intr oduction to Information Security
65

Introduction IT Risk Management Chap1

Feb 16, 2018

Download

Documents

Fikri Arsyadi
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 1/65

108/24/15

Introduction toInformationSecurity

Page 2: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 2/65

208/24/15

Agenda

1. Introduction

2. In Through The Out Door

3.  The Security Management Cycle4. Specic Concept! " Technology

#. Summary " $ue!tion! 

Page 3: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 3/65

308/24/15

%&Commerce Internet 'eality

What makes the Internet powerful

also makes it insecure

Strengths of Internet

Ubiquitous andglobal network

Rapid evolution tomeet market needs

Eas to a!!ess " open andstandard inter#a!es

Internet Weaknesses

$onstant introdu!tion o#new vulnerabilities

%ultiple entr points t&at

are !onstantl evolving

E'posure to global sour!e

o# !ber atta!k

Page 4: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 4/65

408/24/15

(hat !ecurity )reeche! are youconcerned a)out*

+ Damage to data and net,or-*

+  Theft of corporate a!!et!*

+  Theft of cu!tomer data*+ Do,ntime a!!ociated ,ith DOS attac-!*

+ re!! a!!ociated ,ith attac-*

+ Internal attac-!*

Page 5: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 5/65

508/24/15

(hat ri!-! are you concerneda)out*

+ /o!! of re0enue*

+ Impact on !hareholder 0alue*

+ Damage to your )rand euity image*

+ Di!ruption in )u!ine!! and !ale! proce!!e!*

+ /o!! in Cu!tomer Tru!t*

Page 6: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 6/65

(08/24/15

I!!ue! rom the Out!ide&In

+ Common oal!5 6eed connecti0ity from )u!ine!! partner!

5 'emote u!er! need acce!! to o7ce application !y!tem!

5 ro0ide %MAI/ !er0ice! to !ta8 

5 ro0ide (%9 !er0ice! to cu!tomer!

+  Threat!5 Intru!ion from the Internet

5 Interception of pa!!,ord!

5 Modication of !y!tem! or data

5 Denial of Ser0ice

Section

2

Page 7: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 7/65)08/24/15

I!!ue! rom the In!ide&Out

+ Common oal!5 Connecti0ity to )u!ine!! partner!5 Connecti0ity to the Internet for ((( !er0ice!

5 Connecti0ity to AS for out&!ourced !er0ice!

5 Chec- and !end %MAI/+  Threat!

5 Intru!ion! from !ta8 

5 Interception of pa!!,ord!

5 Modication of !y!tem! or data5 :iru!

5 :andal

Page 8: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 8/65808/24/15

(hat I! Information Security*

Information security in today*s

enterprise is a + well-informed sense ofassurance that the information risksand controls are in balance., 

–Jim Anderson, Inovant (22!

Page 9: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 9/65-08/24/15

(hat I! Security*

. +&e qualit or state o# being se!ure "to be #ree #rom danger,

. o be prote!ted #rom adversaries

.   su!!ess#ul organiation s&ould &avemultiple laers o# se!urit in pla!e

 " &si!al se!urit

 " ersonal se!urit

 " perations se!urit

 " $ommuni!ations se!urit

 " etwork se!urit

Page 10: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 10/651008/24/15

(hat I! Information Security*

. &e prote!tion o# in#ormation and its !riti!alelements6 in!luding t&e sstems and &ardwaret&at use6 store6 and transmit t&at in#ormation

. ools6 su!& as poli!6 awareness6 training6edu!ation6 and te!&nolog are ne!essar

. &e $777 triangle was t&e standard based oncon#identialit6 integrit6 and availabilit

. &e $777 triangle &as e'panded into a listo# !riti!al !&ara!teristi!s o# in#ormation

Page 11: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 11/651108/24/15

Critical Characteri!tic! of Information

"he value of information comes from thecharacteristics it possesses.– Availability

– Accuracy– Authenticity– #onfidentiality

– Inte$rity– %tility– &ossession

Page 12: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 12/651208/24/15

6STISSC Security Model ;4<11=

6ational Security Telecommunication! and Information Sy!tem! SecurityCommittee

Page 13: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 13/65

Page 14: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 14/651408/24/15

Securing the Component!

' A computer can be either or both the sub*ect ofan attack and+or the ob*ect of an attack

' hen a computer is– the sub*ect of an attack, it is used as an

active tool to conduct the attack

– the ob*ect of an attack, it is the entity bein$attacked

Page 15: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 15/651508/24/15

Su)>ect and O)>ect of Attac-

Page 16: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 16/651(08/24/15

9alancing Security and Acce!!

' Impossible to obtain perfect security– security is not an absolute it is a process

'ecurity should be a balance between protectionand availability

' "o achieve balance, the level of security mustallow reasonable access, yet protect a$ainst

threats

Page 17: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 17/651)08/24/15

9alancing Security and Acce!!

Page 18: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 18/651808/24/15

9ottom ?p Approach

' ecurity from a $rass-roots effort– systems administrators attempt to improve thesecurity of their systems

' ey advanta$e – technical e/pertise of theindividual administrators

' eldom works since it lacks critical features0

– participant support

– or$ani)ational stayin$ power

Page 19: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 19/651-08/24/15

Approache! to Security Implementation

C%O

CO CIO COO

CISO :&6et,or-!:&Sy!tem!

!ecuritymanager

net,or-manager

!y!tem!manager

!ecurityadmin

net,or-admin

!y!tem!admin

!ecuritytech

net,or-tech

!y!tem!tech

FIGURE 1-7 Approaches to Security Implementation

Top-down approach Bottom-up approach

Page 20: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 20/652008/24/15

 Top&do,n Approach

' Initiated by upper mana$ement0– issue policy, procedures, and processes

– dictate the $oals and e/pected outcomes of the pro*ect

– determine who is accountable for each re1uired action

' &luses0

– stron$ upper mana$ement support

– dedicated champion

– dedicated fundin$– clear plannin$

– chance to influence or$ani)ational culture

Page 21: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 21/652108/24/15

 Top&do,n Approach

' ay also involve a formal development strate$yreferred to as a systems development life cycle

– ost successful top-down approach

Page 22: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 22/652208/24/15

So ,hat can )e done*

+Security is a process5A !tructured methodology ,ill help@

Page 23: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 23/652308/24/15

  Security I! A roce!!Section

3

 udit 9 Risk

 ssessment

oli! 9

:esign

ntegration 9

:eploment

 dministration9 raining

Emergen!

Response 9

Re!over %onitor 9

Resonse

Page 24: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 24/652408/24/15

Audit " 'i!- A!!e!!ment

+ Audit5 'e0ie,! the !ecurity !tatu!5 Compare! to internal and eternal !tandard!5 Operational admini!trati0e and technical

+ 'i!- A!!e!!ment5 $uantie! the lia)ility5 Ac-no,ledge! threat! and 0ulnera)ilitie!5 Can deri0e a BB 0alue

X=

Page 25: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 25/65

2508/24/15

olicy De0elopment

+ 'euirement! for net,or- and information !ecurity

+ olicy 5 0! 5 o!ture5 (hat are the goal! o)>ecti0e! and !tandard! for !ecurity*5 o, far ,ill you go )efore you thro, it all out the ,indo,*

+ Committee! may )e nece!!ary for larger organiation! to re0ie,

+  There are many ,ay! to gather the information5 ormal5 Informal

 Actual Security Practice

Security Policy 

Page 26: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 26/65

2(08/24/15

 The roce!! 5 9riti!h StandardEEFF

Page 27: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 27/65

2)08/24/15

De!ign

+ (ith policy in hand the de!ign can !tart5 De!ign !hould )e )a!ed upon reuirement! and !tandard!5 Mu!t a good )alance of !imple and complete

+ Mu!t )e a,are of many need!5 6et,or-ing5 Application!5 ?!er!

+ Security !y!tem! rapidly )ecome mi!!ion critical5 lan for high a0aila)ility

+ 9e !ure to ;de!ign* for u!er training and a,arene!!

Page 28: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 28/65

2808/24/15

De!ign Mu!t Con!ider A&I&C

Page 29: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 29/65

2-08/24/15

Integration " Deployment

+ Integration of !ecurity !y!tem! i! comple

+ May change many a!pect! of )oth net,or- and application!

+ Mu!t )e thoroughly te!ted

+ Don*t ru!h !ecurity !y!tem! integration5 May yield a multi&!tage proce!!5 Do not compromi!e5 Gno, in ad0ance ,hat ;done* mean!

Page 30: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 30/65

3008/24/15

Admini!tration " Training

+ Support !ta8 mu!t )e a,are of change! due to!ecurity

+ ro0ide technical training for !upport !ta8 

+ re0entati0e maintenance i! -ey

+ Chec- for ne, 0ulnera)ilitie! often andremediate

+ Change! ,ill impact u!er )a!e5 /ea0e time and )udget for training5 Continue ,ith a,arene!! campaign

Page 31: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 31/65

3108/24/15

%mergency 'e!pon!e "'eco0ery

+ 6o !ecurity !olution i! perfect5 A hac-er only ha! to )e right once5 lan for the i!!ue! in ad0ance

+ Con!ider di8erent !cenario!5 6et,or- or application !y!tem! compromi!e

5 Inappropriate relea!e of information

5 :iru! out)rea-

+ Should )e part of the )u!ine!! continuityplan!

+ Document and practice

Page 32: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 32/65

3208/24/15

Monitoring " 'e!pon!e

+ (ant an +ADT, of the Internet5 :igilant !ecurity analy!t! monitor the net,or- and

!y!tem! on a all&day all&night )a!i!5 Automated intelligent proce!!e! com)ined ,ith

eperience and >udgment to diagno!e !ecurityepo!ure!

5 Out!ourced monitoring !upplement! internal !ecuritymea!ure!

+ De0elop 'e!pon!e rocedure!5 (ho ,ill re!pond*5 (hat ,ill they do*

+ o, far are you ,illing to go*5 ro!ecution*5 Chain of e0idence5 See- legal ad0ice immediately

Page 33: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 33/65

3308/24/15

$ue!tion!

+ I! there e0er a perfectly !ecure net,or-*

+ I! !ecurity a product or proce!!*

Page 34: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 34/65

3408/24/15

Important ImplementationConcept!

+ Acce!! Control

+ Authentication

+ %ncryption

+ :6

+ Anti&:iru! Screening

+ ?'/ Content Screening

+ Intru!ion Detection

+ Secure Me!!aging

 udit 9 Risk

 ssessment

oli! 9:esign

ntegration 9

:eploment

 dministration9 raining

Emergen!

Response 9Re!over %onitor 9

Resonse

Page 35: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 35/65

3508/24/15

Acce!! Control

+ Separatenet ,or-ed!y!tem!

+ ate,ay H ire,all

+ ard,are Soft,are to enforcepolicie!

+ rotect multiple net,or-!5 In!ide5 Out!ide5 DMJ

+ Conguration i! 0ital5 Addre!! policy5 :alidation te!ting5 Maintenance

Page 36: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 36/65

3(08/24/15

 Type! of ire,all!

+ ac-et ilter

+ roy+ Stateful In!pection

+ y)rid

Chicago

InternetInternet

CorporateHQ network

Policy-based

Management Console

Page 37: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 37/65

3)08/24/15

Authentication

+ elp! pre!er0e condentiality

+ 'euired for non&repudiation

+ elp! the generation of audit trail!

+ Categorie!5 Something the u!er -no,! &assword5 Something the u!er ha! & To!en5 Something the u!er i! 5 Biometric

+ 6eed ;2= of the ;3= to )e +Strong,

+ (ithout authentication you are !hooting inthe dar-@

Page 38: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 38/65

3808/24/15

 Type! of Strong Authentication

+  To-en %ample!5  Time !ynchronou!5 Challenge 'e!pon!e5 Smart Card!

+ 9iometric %ample!5 ingerprint5 and or inger eometry5 alm attern or and :ein attern5 :oice or acial 'ecognition5 'etinal or Iri! Scanning

5 9ody Odor5 D6A5 Signature :erication5 Gey!tro-e Dynamic!

Page 39: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 39/65

3-08/24/15

%ncryption

+ %ncode! the data or tran!mi!!ion5 ayload 0! channel

+ Mu!t !hare information ;-ey!= to !et thi! up

+ (hen to encrypt*

5 If you data i! !en!iti0e5 If you tran!mit o0er pu)lic net,or-!

+ 6eed more proce!!ing capa)ility to encrypt H de&encrypt

+ If you encrypt log! and !creening may not ,or-

+ SS/ SS IS%C encryption are common and u!eful

Page 40: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 40/65

4008/24/15

:6

+ :irtual ri0ate 6et,or-+ :6 K %ncryption Authentication

+ 'emote Acce!!5 Secure connecti0ity for remote and mo)ile u!er!

+ Intranet5 Secure connecti0ity ,ithin the corporate net,or- or

)et,een multiple !ite!+ %tranet

5 Secure connecti0ity for cu!tomer! !upplier! and -ey)u!ine!! partner!

+ olicy i! !o 0ery important..5 :6 may ma-e the net,or- /%SS !ecure5 Gno, eactly ,hat you need to connect to

Customers

PartnersVPN-1 Gateway VPN-1 Gateway 

InternetInternetRemote Site

Mobile

User

VPN-1VPN-1

SecuRemoteSecuRemote

Page 41: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 41/65

4108/24/15

Content Screening

+ Anti:iru! Screening5 %mail and (e) page! for maliciou! code H content

+ ?'/ Content Screening5 (e) page! for content that doe! not meet policy

need!+ %mail Scanning

5 Search for -ey ,ord! or attachment!

Page 42: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 42/65

4208/24/15

Intru!ion Detection

+ Acti0ely monitor! tra7c on net,or- and -ey!er0er!

+  Threat !ignature! are matched !ome,hat li-eA: !y!tem!

+ 'e!pon!e! may )e pa!!i0e or acti0e

+ Can range from !mall to large !cale5 ome )road)and lin-! ;DS/HCa)le=

5 Internet connection at the o7ce

5 Internal net,or- !egment! at the o7ce+ Output i! u!eful need to ,atch it

Page 43: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 43/65

4308/24/15

Me!!aging

+ %mail may )e the mo!t important applicationyou ha0e5 Don*t ta-e it for granted it need! to )e protected

5  Ta-e control of your D6S record!

5 Scan for 0iru! and 0andal!

+ Geep !y!tem current5 /ot! of 0ulnera)ilitie! in email

5 roacti0e rather than reacti0e

+ repare for !ignature! and encryption

5 %mail me!!age! can ea!ily )e !poofed5 All mail !hould )e digitally !igned

5 %ncryption may )e nece!!ary for !en!iti0e content

5 Complicated if your company !can! mail for content

Page 44: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 44/65

4408/24/15

$ue!tion!

+ (hy ,ould you ,ant to authenticate!omeone*

+ (ould you encrypt patient data if !ent o0er

the Internet*

Page 45: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 45/65

4508/24/15

 Technology %0ol0e! 'apidly

VPN

PKI

Scanning

Intrusion

Detection

Anti

virus

URL filtering

Authentication

Email

Scanning

Accesscontrol

Firewall

Page 46: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 46/65

4(08/24/15

Admini!tration " Training

+ Sta8 S-ill !et

+ (or-load

 udit 9 Risk ssessment

oli! 9

:esign

ntegration 9

:eploment

 dministration

9 raining

Emergen!

Response 9Re!over %onitor 9

Resonse

Page 47: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 47/65

4)08/24/15

Security Admini!trator S-ill Set

+ 'euire! comprehen!i0e technical -no,ledge5 Soft,are Application!

5 Operating Sy!tem!

5 /ocal Area 6et,or-ing

5 (ide Area 6et,or-ing5 Admini!tration

5 Security Tool! and Techniue!

+ 6eed for Training

Page 48: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 48/65

4808/24/15

Security Admini!trator (or-load

' A hi$h volume of data to monitor– "ypical company e/ample

' 3 locations, 4 employees

' 2 e/tranet connections

' 546 of lo$s info to read 7AI89

" #B$% #B "% #B

Router &o'sFirewa((

 &o's

Ser)er &o's

Page 49: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 49/65

4-08/24/15

  Security Management Cycle

 udit 9 Risk

 ssessment

oli! 9:esign

ntegration 9:eploment

 dministration9 raining

Emergen!

Response 9Re!over %onitor 9

Resonse

Page 50: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 50/65

5008/24/15

(hy Security*

' Information security performs four importantfunctions for an or$ani)ation0

– &rotects the or$ani)ation*s ability to function

– :nables the safe operation of applicationsimplemented on the or$ani)ation*s I"systems

– &rotects the data the or$ani)ation collectsand uses

– afe$uards the technolo$y assets in use atthe or$ani)ation

Page 51: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 51/65

5108/24/15

rotecting the A)ility to unction

' ana$ement is responsible

' Information security is

– a mana$ement issue– a people issue

' #ommunities of interest must ar$ue for

information security in terms of impact and cost

Page 52: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 52/65

5208/24/15

%na)ling Safe Operation

' ;r$ani)ations must create inte$rated, efficient,

and capable applications

' ;r$ani)ation need environments that safe$uardapplications

' ana$ement must not abdicate to the I"

department its responsibility to make choicesand enforce decisions

Page 53: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 53/65

5308/24/15

rotecting Data

' ;ne of the most valuable assets is data

' ithout data, an or$ani)ation loses its record of

transactions and+or its ability to deliver value to itscustomers

' An effective information security pro$ram isessential to the protection of the inte$rity andvalue of the or$ani)ation*s data

Page 54: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 54/65

5408/24/15

Safeguarding Technology A!!et!

' ;r$ani)ations must have secure infrastructureservices based on the si)e and scope of theenterprise

' Additional security services may have to beprovided

' ore robust solutions may be needed to replace

security pro$rams the or$ani)ation has out$rown

Page 55: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 55/65

5508/24/15

 Threat!

' ana$ement must be informed of the variouskinds of threats facin$ the or$ani)ation

'A threat is an ob*ect, person, or other entity thatrepresents a constant dan$er to an asset

' 6y e/aminin$ each threat cate$ory in turn,mana$ement effectively protects its information

throu$h policy, education and trainin$, andtechnolo$y controls

Page 56: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 56/65

5(08/24/15

Categories of hreat !"amples

<. Acts of human error or failure Accidents, employee mistakes

2. #ompromises to intellectual property &iracy, copyri$ht infrin$ement

4. 7eliberate acts of espiona$e or trespass %nauthori)ed access and+or data collection=. 7eliberate acts of information e/tortion 6lackmail of information disclosure

3. 7eliberate acts of sabota$e or vandalism 7estruction of systems or information

>. 7eliberate acts of theft Ille$al confiscation of e1uipment or information

?. 7eliberate software attacks @iruses, worms, macros, denial-of-service

5. orces of nature ire, flood, earth1uake li$htnin$

B. 7eviations in 1uality of service fromservice providers

&ower and AC service issues

<. "echnical hardware failures or errors :1uipment failure

<<. "echnical software failures or errors 6u$s, code problems, unknown loopholes

<2. "echnolo$ical obsolescence Anti1uated or outdated technolo$ies

 Threat! to Information Security

 T*B&E +-1 Threats to Information Security4

Act! of uman %rror or ailure

Page 57: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 57/65

5)08/24/15

Act! of uman %rror or ailure

Page 58: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 58/65

5808/24/15

Shoulder Surng

- l

Page 59: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 59/65

5-08/24/15

ac-er role!

> -

Page 60: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 60/65

(008/24/15

 Tro>an or!e Attac-!

A - ' li i

Page 61: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 61/65

(108/24/15

Attac- 'eplication

#ector $escription

I& scan and attack Infected system scans random or local ran$e of I& addresses and tar$ets anyof several vulnerabilities known to hackers or left over from previous e/ploitssuch as #ode Ded, 6ack ;rifice, or &oi)on6o/

eb browsin$ If the infected system has write access to any eb pa$es, it makes all ebcontent files (html, asp, .c$i, and others! infectious, so that users who browseto these pa$es become infected

@irus :ach infected machine infects certain common e/ecutable or script files on allcomputers to which it can write with virus code that can cause infection

hares %sin$ vulnerabilities in file systems and the way many or$ani)ations confi$urethem, it copies the viral component to all locations it can reach

ass mail 6y sendin$ e-mail infections to addresses found in the infected system*saddress book, copies of the infection are sent to many users whose mail-readin$ pro$rams automatically run the pro$ram and infect other systems

imple Cetworkana$ement&rotocol (C&!

In early 22, the C& vulnerabilities known to many in the I" industry werebrou$ht to the attention of the multi vector attack community.

T*B&E +-+  Attack Replication Vectors 

D i l f S i Att -

Page 62: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 62/65

(208/24/15

Denial of Ser0ice! Attac-

I S

Page 63: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 63/65

(308/24/15

I Spoong

M i th Middl Att -

Page 64: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 64/65

(408/24/15

Man&in&the&Middle Attac-

Page 65: Introduction IT Risk Management Chap1

7/23/2019 Introduction IT Risk Management Chap1

http://slidepdf.com/reader/full/introduction-it-risk-management-chap1 65/65

&anks <ou