YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Security+ Ch01

About the Presentations

• The presentations cover the objectives found in the opening of each chapter.

• All chapter objectives are listed in the beginning of each presentation.

• You may customize the presentations to fit your class needs.

• Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc.

Page 2: Security+ Ch01

Security+ Guide to Network Security Fundamentals,

Fourth Edition

Chapter 1Introduction to Security

Page 3: Security+ Ch01

Objectives

• Describe the challenges of securing information

• Define information security and explain why it is important

• Identify the types of attackers that are common today

• List the basic steps of an attack

• Describe the five basic principles of defense

Security+ Guide to Network Security Fundamentals, Fourth Edition 3

Page 4: Security+ Ch01

Challenges of Securing Information

• Security figures prominently in 21st century world– Personal security– Information security

• Securing information– No simple solution– Many different types of attacks– Defending against attacks often difficult

Security+ Guide to Network Security Fundamentals, Fourth Edition 4

Page 5: Security+ Ch01

Today’s Security Attacks

• Advances in computing power– Make password-breaking easy

• Software vulnerabilities often not patched– Smartphones a new target

Security+ Guide to Network Security Fundamentals, Fourth Edition 5

Page 6: Security+ Ch01

Today’s Security Attacks (cont’d.)

• Examples of recent attacks – Bogus antivirus software

• Marketed by credit card thieves

– Online banking attacks– Hacking contest– Nigerian 419 advanced fee fraud

• Number one type of Internet fraud

– Identity theft using Firesheep– Malware– Infected USB flash drive devices

Security+ Guide to Network Security Fundamentals, Fourth Edition 6

Page 7: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Table 1-1 Selected security breaches involving personal information in a one-month period

Page 8: Security+ Ch01

Difficulties in Defending Against Attacks

• Universally connected devices

• Increased speed of attacks

• Greater sophistication of attacks

• Availability and simplicity of attack tools

• Faster detection of vulnerabilities

Security+ Guide to Network Security Fundamentals, Fourth Edition 8

Page 9: Security+ Ch01

Difficulties in Defending Against Attacks (cont’d.)

• Delays in patching– Weak distribution of patches

• Distributed attacks

• User confusion

Security+ Guide to Network Security Fundamentals, Fourth Edition 9

Page 10: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition 10

Table 1-2 Difficulties in defending against attacks

Page 11: Security+ Ch01

What Is Information Security?

• Before defense is possible, one must understand:– What information security is– Why it is important– Who the attackers are

Security+ Guide to Network Security Fundamentals, Fourth Edition 11

Page 12: Security+ Ch01

Defining Information Security

• Security– Steps to protect person or property from harm

• Harm may be intentional or nonintentional

– Sacrifices convenience for safety

• Information security– Guarding digitally-formatted information:

• That provides value to people and organizations

Security+ Guide to Network Security Fundamentals, Fourth Edition 12

Page 13: Security+ Ch01

Defining Information Security (cont’d.)

• Three types of information protection: often called CIA– Confidentiality

• Only approved individuals may access information

– Integrity• Information is correct and unaltered

– Availability• Information is accessible to authorized users

Security+ Guide to Network Security Fundamentals, Fourth Edition 13

Page 14: Security+ Ch01

Defining Information Security (cont’d.)

• Protections implemented to secure information– Identification

• Proof of who you are

– Authentication• Individual is who they claim to be

– Authorization• Grant ability to access information

– Accounting• Provides tracking of events

Security+ Guide to Network Security Fundamentals, Fourth Edition 14

Page 15: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Figure 1-3 Information security components© Cengage Learning 2012

Page 16: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition

Defining Information Security (cont’d.)

16

Table 1-3 Information security layers

Page 17: Security+ Ch01

Information Security Terminology

• Asset– Item of value

• Threat– Actions or events that have potential to cause harm

• Threat agent– Person or element with power to carry out a threat

Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Page 18: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition 18

Table 1-4 Information technology assets

Page 19: Security+ Ch01

Information Security Terminology (cont’d.)

• Vulnerability– Flaw or weakness

• Threat agent can bypass security

• Risk– Likelihood that threat agent will exploit vulnerability– Cannot be eliminated entirely

• Cost would be too high

• Take too long to implement

– Some degree of risk must be assumed

Security+ Guide to Network Security Fundamentals, Fourth Edition 19

Page 20: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition 20

Figure 1-4 Information security components analogy© Cengage Learning 2012

Page 21: Security+ Ch01

Information Security Terminology (cont’d.)

• Options to deal with risk– Accept

• Realize there is a chance of loss

– Diminish• Take precautions

• Most information security risks should be diminished

– Transfer risk to someone else• Example: purchasing insurance

Security+ Guide to Network Security Fundamentals, Fourth Edition 21

Page 22: Security+ Ch01

Understanding the Importance of Information Security

• Preventing data theft– Security often associated with theft prevention– Business data theft

• Proprietary information

– Individual data theft• Credit card numbers

Security+ Guide to Network Security Fundamentals, Fourth Edition 22

Page 23: Security+ Ch01

Understanding the Importance of Information Security (cont’d.)

• Thwarting identity theft– Using another’s personal information in unauthorized

manner• Usually for financial gain

– Example: • Steal person’s SSN

• Create new credit card account

• Charge purchases

• Leave unpaid

Security+ Guide to Network Security Fundamentals, Fourth Edition 23

Page 24: Security+ Ch01

Understanding the Importance of Information Security (cont’d.)

• Avoiding legal consequences– Laws protecting electronic data privacy

• The Health Insurance Portability and Accountability Act of 1996 (HIPAA)

• The Sarbanes-Oxley Act of 2002 (Sarbox)

• The Gramm-Leach-Bliley Act (GLBA)

• California’s Database Security Breach Notification Act (2003)

Security+ Guide to Network Security Fundamentals, Fourth Edition 24

Page 25: Security+ Ch01

Understanding the Importance of Information Security (cont’d.)

• Maintaining productivity– Post-attack clean up diverts resources

• Time and money

Security+ Guide to Network Security Fundamentals, Fourth Edition 25

Table 1-6 Cost of attacks

Page 26: Security+ Ch01

Understanding the Importance of Information Security (cont’d.)

• Foiling cyberterrorism– Premeditated, politically motivated attacks– Target: information, computer systems, data– Designed to:

• Cause panic

• Provoke violence

• Result in financial catastrophe

Security+ Guide to Network Security Fundamentals, Fourth Edition 26

Page 27: Security+ Ch01

Understanding the Importance of Information Security (cont’d.)

• Potential cyberterrorism targets– Banking– Military– Energy (power plants)– Transportation (air traffic control centers)– Water systems

Security+ Guide to Network Security Fundamentals, Fourth Edition 27

Page 28: Security+ Ch01

Who Are the Attackers?

• Categories of attackers– Hackers– Script kiddies– Spies– Insiders– Cybercriminals– Cyberterrorists

Security+ Guide to Network Security Fundamentals, Fourth Edition 28

Page 29: Security+ Ch01

Hackers

• Hacker– Person who uses computer skills to attack

computers– Term not common in security community

• White hat hackers– Goal to expose security flaws– Not to steal or corrupt data

• Black hat hackers– Goal is malicious and destructive

Security+ Guide to Network Security Fundamentals, Fourth Edition 29

Page 30: Security+ Ch01

Script Kiddies

• Script kiddies – Goal: break into computers to create damage– Unskilled users– Download automated hacking software (scripts)

• Use them to perform malicious acts

– Attack software today has menu systems• Attacks are even easier for unskilled users

– 40 percent of attacks performed by script kiddies

Security+ Guide to Network Security Fundamentals, Fourth Edition 30

Page 31: Security+ Ch01

Spies

• Computer spy– Person hired to break into a computer:

• To steal information

• Hired to attack a specific computer or system:– Containing sensitive information

• Goal: steal information without drawing attention to their actions

• Possess excellent computer skills:– To attack and cover their tracks

Security+ Guide to Network Security Fundamentals, Fourth Edition 31

Page 32: Security+ Ch01

Insiders

• Employees, contractors, and business partners

• 48 percent of breaches attributed to insiders

• Examples of insider attacks– Health care worker publicized celebrities’ health

records• Disgruntled over upcoming job termination

– Government employee planted malicious coding script

– Stock trader concealed losses through fake transactions

– U.S. Army private accessed sensitive documentsSecurity+ Guide to Network Security Fundamentals, Fourth Edition 32

Page 33: Security+ Ch01

Cybercriminals

• Network of attackers, identity thieves, spammers, financial fraudsters

• Difference from ordinary attackers– More highly motivated– Willing to take more risk– Better funded– More tenacious– Goal: financial gain

Security+ Guide to Network Security Fundamentals, Fourth Edition 33

Page 34: Security+ Ch01

Cybercriminals (cont’d.)

• Organized gangs of young attackers– Eastern European, Asian, and third-world regions

Security+ Guide to Network Security Fundamentals, Fourth Edition 34

Table 1-7 Characteristics of cybercriminals

Page 35: Security+ Ch01

Cybercriminals (cont’d.)

• Cybercrime– Targeted attacks against financial networks– Unauthorized access to information– Theft of personal information

• Financial cybercrime– Trafficking in stolen credit cards and financial

information– Using spam to commit fraud

Security+ Guide to Network Security Fundamentals, Fourth Edition 35

Page 36: Security+ Ch01

Cyberterrorists

• Cyberterrorists– Ideological motivation

• Attacking because of their principles and beliefs

• Goals of a cyberattack:– Deface electronic information

• Spread misinformation and propaganda

– Deny service to legitimate computer users– Commit unauthorized intrusions

• Results: critical infrastructure outages; corruption of vital data

Security+ Guide to Network Security Fundamentals, Fourth Edition 36

Page 37: Security+ Ch01

Attacks and Defenses

• Wide variety of attacks– Same basic steps used in attack

• To protect computers against attacks:– Follow five fundamental security principles

Security+ Guide to Network Security Fundamentals, Fourth Edition 37

Page 38: Security+ Ch01

Steps of an Attack

• Probe for information– Such as type of hardware or software used

• Penetrate any defenses– Launch the attack

• Modify security settings– Allows attacker to reenter compromised system

easily

• Circulate to other systems– Same tools directed toward other systems

• Paralyze networks and devicesSecurity+ Guide to Network Security Fundamentals, Fourth Edition 38

Page 39: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition 39

Figure 1-6 Steps of an attack© Cengage Learning 2012

Page 40: Security+ Ch01

Security+ Guide to Network Security Fundamentals, Fourth Edition

Defenses Against Attacks

• Fundamental security principles for defenses– Layering– Limiting– Diversity– Obscurity– Simplicity

40

Page 41: Security+ Ch01

Layering

• Information security must be created in layers– Single defense mechanism may be easy to

circumvent– Unlikely that attacker can break through all defense

layers

• Layered security approach– Can be useful in resisting a variety of attacks– Provides the most comprehensive protection

Security+ Guide to Network Security Fundamentals, Fourth Edition 41

Page 42: Security+ Ch01

Limiting

• Limiting access to information:– Reduces the threat against it

• Only those who must use data granted access– Amount of access limited to what that person needs

to know

• Methods of limiting access– Technology

• File permissions

– Procedural• Prohibiting document removal from premises

Security+ Guide to Network Security Fundamentals, Fourth Edition 42

Page 43: Security+ Ch01

Diversity

• Closely related to layering– Layers must be different (diverse)

• If attackers penetrate one layer:– Same techniques unsuccessful in breaking through

other layers

• Breaching one security layer does not compromise the whole system

• Example of diversity– Using security products from different manufacturers

Security+ Guide to Network Security Fundamentals, Fourth Edition 43

Page 44: Security+ Ch01

Obscurity

• Obscuring inside details to outsiders

• Example: not revealing details– Type of computer– Operating system version– Brand of software used

• Difficult for attacker to devise attack if system details are unknown

Security+ Guide to Network Security Fundamentals, Fourth Edition 44

Page 45: Security+ Ch01

Simplicity

• Nature of information security is complex

• Complex security systems– Difficult to understand and troubleshoot– Often compromised for ease of use by trusted users

• Secure system should be simple:– For insiders to understand and use

• Simple from the inside– Complex from the outside

Security+ Guide to Network Security Fundamentals, Fourth Edition 45

Page 46: Security+ Ch01

Summary

• Information security attacks growing exponentially in recent years

• Several reasons for difficulty defending against today’s attacks

• Information security protects information’s integrity, confidentiality, and availability:– On devices that store, manipulate, and transmit

information – Using products, people, and procedures

Security+ Guide to Network Security Fundamentals, Fourth Edition 46

Page 47: Security+ Ch01

Summary (cont’d.)

• Goals of information security– Prevent data theft– Thwart identity theft– Avoid legal consequences of not securing

information– Maintain productivity– Foil cyberterrorism

• Different types of people with different motivations conduct computer attacks

• An attack has five general steps

Security+ Guide to Network Security Fundamentals, Fourth Edition 47