CHP 1 - Introduction To Computer and Network Security
CHP 1 - Introduction To Computer and Network Security
Chapter One
Introduction to Computer and Network
Security
Objectives
Explain the relationships among the component
parts of information security, especially network
security
Define the key terms and critical concepts of
information and network security
Explain the business need for information and
network security
Identify the threats posed to information and
network security, as well as the common attacks
associated with those threats
2013 Course Technology/Cengage Learning. All Rights Reserved.
Objectives (contd.)
Distinguish between threats to information from
within systems and attacks against information
from within systems
Describe the organizational roles of information
and network security professionals
Define managements role in the development,
maintenance, and enforcement of information
security policy, standards, practices, procedures,
and guidelines
Objectives (contd.)
Discuss how an organization institutionalizes
policies, standards, and practices using education,
training, and awareness programs
Introduction
Network security
Critical to day-to-day IT operations of nearly every
organization
Information security
Field has matured in last 20 years
Large in scope
Operations security
Protect details of activities
Communications security
Protect media, technology, and content
2013 Course Technology/Cengage Learning. All Rights Reserved.
Asset
Organizational resource being protected
Attack
Act that causes damage to information or systems
Exposure
Condition or state of being exposed to attack
Intellectual property
Works of the mind
Inventions, literature, art, logos, and other creative
works
Loss
Single instance of damage to an information asset
2013 Course Technology/Cengage Learning. All Rights Reserved.
Risk
Probability that something unwanted will happen
Subject
Agent used to conduct the attack
Object
Target entity of an attack
10
11
Threat agent
Specific instance of a threat
Examples: lightning strike, tornado, or specific
hacker
Vulnerability
Weakness or fault in a system
Opens up the possibility of attack or damage
12
Accuracy
Information is free from errors
Authenticity
Quality or state of being genuine
Confidentiality
Protection from disclosure to unauthorized
individuals or systems
2013 Course Technology/Cengage Learning. All Rights Reserved.
13
Data custodians
Responsible for information storage, maintenance,
and protections
Data users
End users who work with information
Integrity
Information remains whole, complete, uncorrupted
2013 Course Technology/Cengage Learning. All Rights Reserved.
14
Possession
Ownership or control of some object or item
Privacy
Information is used in accordance with legal
requirements
15
Security Models
Information security model
Maps security goals to concrete ideas
C.I.A. triad
Original basis of computer security
16
17
18
19
20
21
22
23
24
Common Threats
Cracker
Individual who cracks (removes) software
protection
Cyberterrorist
Hacks systems to conduct terrorist activities
Hackers
Gain access without authorization
Hacktivist or cyberactivist
Disrupts or interferes with operations to protest
against an organization or government agency
2013 Course Technology/Cengage Learning. All Rights Reserved.
25
Worms
Trojan horses
Backdoor, trap door, or maintenance hook
Rootkit
Packet monkeys
Phreaker
Hacker who targets public telephone network
2013 Course Technology/Cengage Learning. All Rights Reserved.
26
Shoulder surfing
Observing passwords of others
Software piracy
Unlawful use or duplication of software IP
27
28
Malicious Code
State-of-the-art malicious code attack
Polymorphic (or multivector) worm
Uses several attack vectors to exploit variety of
vulnerabilities
See Table 1-2 for known attack vectors
29
30
Password Attacks
Password cracking
Attempt to bypass access controls
Guessing passwords
Rainbow tables
Used when the hash of the users password is known
Dictionary
Trying specific, commonly used passwords
2013 Course Technology/Cengage Learning. All Rights Reserved.
31
32
33
Spoofing
Technique used to gain unauthorized access to
computers
Intruder sends messages with fake IP address of a
trusted host
Modifies the packet headers with the trusted IP
34
35
Man-in-the-Middle Attacks
36
37
E-Mail Attacks
Spam
Malicious code may be embedded in attachments
Mail bomb
Attacker reroutes large quantities of e-mail to the
target system
Poorly-configured e-mail systems at risk
38
Sniffers
Program or device monitoring data traveling over a
network
Can be used for legitimate functions
Also for stealing information
39
Social Engineering
Process of using social skills to convince people to
reveal access credentials
Usually involves impersonation
New employee
Employee who needs assistance
Someone higher in organizational hierarchy
40
Buffer Overflow
Application error
Occurs when more data is sent to a buffer than it
can handle
Attacker can take advantage of the consequence of
the failure
41
Timing Attacks
Measuring the time required to access a Web page
Deducing that the user has visited the site before
Presence of the page in browsers cache
42
Executive management
Chief information officer (CIO)
Chief information security officer (CISO)
43
Champion
Team leader
Security policy developers
Risk assessment specialists
Security professionals
Systems, network, and storage administrators
End users
44
Standards
Detailed description of how to comply with policy
De facto standards
De jure standards
45
46
Dissemination
Review
Comprehension
Compliance
Uniformity
47
48
49
50
51
52
Security framework
Outline of overall information security strategy
Roadmap for planned changes to the environment
Security models
Can be used to develop a security blueprint
53
54
55
Table 1-6 ISO 27000 series current and planned standards (www.27000.org)
Cengage Learning 2013
2013 Course Technology/Cengage Learning. All Rights Reserved.
56
57
58
SANS Institute
Cooperative information security research
organization
Other sources
www.cert.org
http://www.us-cert.gov
2013 Course Technology/Cengage Learning. All Rights Reserved.
59
Defense in depth
Layered implementation of security
Organization establishes multiple layers of security
controls
60
61
62
Security perimeter
Defines the boundary between organizations
security and outside world
Both electronic and physical
63
64
Summary
Information security is the protection of information
Information value comes from its characteristics
65
Summary (contd.)
Information security functions
66