Slide 03 - Internet & Information Security
Slide 03 - Internet & Information Security
Security
1
Introduction
As organisations continue to use the Internet to carry out business
processes, so does the security risks growing in accordance with it.
This course will examine, in detail, those areas which are central
to the task of managing security in the organizational context.
3
Learning Outcomes
There will be an in-depth examination of topics in the
management of information technology security
including:
Access control systems and methodology
Business continuity and disaster recovery planning
Legal issues in information system security
Ethics
Computer operations security
Physical security
Security architecture and models
7
Seven Types of Systems Security
• Computer Security focus on ensuring the availability and correct operation
of a computer system without concern for information stored or processed
by a computer E.g. Psd security, Left out Integrity & confidentiality
10
What is Network Security
Management Continue
• To specify an organization’s information protection requirements,
access controls, and audit requirements.
11
Value of Information/Data
• Information is a valuable asset in any organization, whether
it's printed or written on paper, stored electronically or sent
by mail or electronic means.
E.g. Banks, Passport Office, License Office, Insurance
12
Value of Information/Data
• In the context of ISO 27001 and ISO 27002, an asset is
any tangible or intangible thing that has value to an
organization.
13
Security Objectives
• Confidentiality
– “Preserving authorized restriction on information access and
disclosure, including means for protecting personal privacy
and proprietary information.” Confidentiality of ATM PIN
Number, Account Information
• Integrity
– “Guarding against improper information modification or
destruction, and includes ensuring information
nonrepudiation and authenticity.” E.g ensure inf is correct
• Availability
– “Ensuring timely and reliable access and use of information.”
– Eg, have my information whenever I need them
14
Security Goals
• C.I.A. Integrity
Confidentiality Availability
15
Importance of CIA Triad
Ensures:
• Confidentiality, Integrity, Availability Triad
• Business Continuity Planning -"identifies an organization's
exposure to internal and external threats and synthesizes hard and
soft assets to provide effective prevention and recovery for the
organization, while maintaining competitive advantage and value
system integrity”.
16
CIA Triad A Security Model
• The confidentiality, integrity, and availability triad
Three of the primary concepts in information
security are confidentiality, integrity, and
availability, commonly known as the confidentiality,
integrity, and availability (CIA) triad
• Administrators need a clear and comprehensive set of security practices that are
easy to find and follow.
Policy
• Can be considered as a "Statement of Intent" or a "Commitment". For that reason
at least, the decision makers can be held accountable for their policy after it has
been authorized.
• Policy merely guides actions toward those that are most likely to achieve a
desired outcome.
18
The term may be applicable to:
• Government sectors – MDA, Hospital, Schools, Banks,
Insurance Companies (SIC)
19
Authenticity
• Authenticity allows us to talk about the proper
attribution as to the owner or creator of the data in
question.
– For example, if we send an e-mail message that is
altered so as to appear to have come from a different e-
mail address than the one from which it was actually
sent, we would be violating the authenticity of the e-
mail.
– Authenticity can be enforced through the use of digital
signatures,
20
Security from Business
Perspective
Two types of Security from Businesses Perspective
• Service Orinted – e.g. Hospital, Schools, CSIR, Universities, Police, Fire Services
• Profit Oriented – Banks, Air Travel Org, Insurance Companies etc
Security Risks
• Security risks are growing in accordance as organisations continue to use the
Internet to carry out business processes.
21
Threat Intelligence
24
Threat Intelligence
Industrial Espionage
Stuxnet is a computer worm discovered in June 2010.
• While it is not the first time that hackers have targeted industrial systems, it
is the first discovered malware that spies on and subverts industrial systems,
and the first to include a programmable logic controller (PLC) root kit.
25
Threat Intelligence
Industrial Espionage
• Stuxnet targeted five Iranian organizations suspected to
be uranium enrichment infrastructure
26
Threat Intelligence
Malware Duqu
Duqu - computer worm discovered on 1 September 2011,
thought to be related to the Stuxnet worm.
• Duqu got its name from the prefix "~DQ" it gives to the
names of files it creates.
27
Threat Intelligence
Malware Duqu
• Duqu malware is a variety of software components that together provide
services to the attackers.
• Currently this includes information stealing capabilities and in the
background, kernel drivers and injection tools.
• Duqu flaw is the flaw in Microsoft Windows that is used in malicious files to
execute malware components of Duqu.
28
Threat Intelligence
Malware Duqu
Spyware - software that monitors a user's computers
• The presence of spyware is typically hidden from the user and can be
difficult to detect.
29
Threat Intelligence
Malware Duqu
• Spyware can also interfere with user control of a computer by
installing additional software or redirecting Web browsers.
http://www.zdnet.com/former-pentagon-analyst-china-has-backdoors-to-80-of-telecoms-7000000908/
31
Security Implementation
Principles
• Confidentiality, Integrity, Availability
• Need-to-know
– Users should only have access to information (or systems) that enable
them to perform their assigned job functions.
• Least privilege
– Users should only have sufficient access privilege that allow them to
perform their assigned work.
• Separation of duties
– No person should be responsible for completing a task involving
sensitive, valuable or critical information from the beginning to end.
– No single person should be responsible for approving his/her own
work.
32
The Need for Security Management
Although organizations may have established strong perimeter
security, it is only a first line of defence.
To effectively safeguard critical information:
• Integrate the latest security enabled devices and software's