Computer Security
Chapter-Seven
Administering Security
1
Outline
• Security planning
• Risk analysis
• Security policies
• Cyber security
• Ethics
2
1. Security planning
• Involves developing comprehensive strategies and actions to protect an
organization’s information assets against threats
• Ensure continuity of operations, and manage risk.
• Key Elements:
• Asset Identification: Cataloging all information assets that need protection, including data,
hardware, and software.
• Threat Assessment: Identifying potential threats to these assets, from cyber threats like
hacking and malware to physical threats such as theft or natural disasters.
• Vulnerability Analysis: Determining weaknesses in the organization's infrastructure that
could be exploited by threats. 3
1. Security planning
• Security Strategy Development:
• Creating a security strategy that addresses identified risks and aligns with
organizational objectives and compliance requirements.
• Implementation Plan:
• Outlining steps, timelines, and responsibilities for deploying security measures and
technologies.
• Review and Update:
• Regularly reviewing and updating the security plan to adapt to new threats and
changes in the organization.
4
2. Risk Analysis
• Risk analysis is the process of identifying, assessing, and evaluating potential risks to an
organization’s assets to determine the appropriate ways to mitigate them.
• Purpose of Risk Analysis:
• To arrange security efforts based on potential impact and probability of risks, ensuring that resources
are allocated effectively to protect critical assets.
• Steps in Risk Analysis:-
• Identification: List all assets, threats, and existing controls. Identify vulnerabilities that could be
exploited by threats.
• Assessment: Evaluate the likelihood of each risk occurring and its potential impact on the
organization.
• Evaluation: Compare the risks against risk criteria to determine their significance.
5
2. Risk Analysis
• Methods and Tools:
• Utilize quantitative methods (financial impact) and qualitative methods (scenario analysis) to
assess risks.
• Tools such as risk matrices and software applications help in visualizing and managing risks.
• Outcome:
• Produce a risk assessment report that ranks risks based on their severity and likelihood.
• This report guides the decision-making process for implementing controls.
• Continuous Monitoring and Review:
• Establish a routine of ongoing risk evaluation and adjustments to the risk management plan as
the organizational environment and external threats evolve.
6
3. Security Policies
• Security policies are formal, written statements that guide the protection of an
organization's assets.
• They serve as a framework for setting expectations and enforcing behaviors
regarding security.
• Purpose of Security Policies:
• To provide clear and consistent instructions on what is permissible and what is
prohibited,
• Help to ensure that all personnel understand their roles and responsibilities in
protecting the organization's assets. 7
3. Security Policies
• Key Elements of Effective Security Policies:
• Clearly defines what the policy covers and its objectives.
• Specifies who is responsible for various security actions.
• Includes detailed policies to different aspects of security, such as data protection,
network security, physical security, and response protocols.
• Outlines the legal and regulatory standards the organization must comply with.
8
3. Security Policies
• Development and Implementation:
• Involvement of Stakeholders: Engaging various stakeholders in the policy creation process to
ensure coverage of all critical areas and buy-in from the start.
• Clarity and Simplicity: Writing policies in clear, understandable language.
• Regular Reviews and Updates: Policies should be reviewed and updated regularly to adapt to new
security challenges and regulatory changes.
• Training and Awareness:
• Ensuring that all employees are aware of the policies through regular training sessions and updates.
• Training helps to reinforce the importance of compliance and the implications of security breaches.
9
4. Cyber Security
• Refers to the practice of protecting systems, networks, and programs from digital attacks.
• Cyber attacks are usually aimed at accessing, changing, or destroying sensitive
information;
• extorting money from users; or interrupting normal business processes.
• Importance of Cyber Security:
• As our dependency on digital systems grows, the potential risks and impacts of cyber
attacks increase.
• Effective cyber security measures are crucial for protecting data integrity, securing
information and assets, and ensuring continuity of operations.
1
0
4. Cyber Security
• Key Cyber Security Challenges:
• Cyber threats are constantly changing, requiring adaptive and dynamic security
strategies.
• Balancing cyber security needs with available resources can be challenging,
especially for smaller organizations.
• Modern IT environments are complex and interconnected, making them harder to
secure comprehensively.
11
5. Ethics in Security
• Refers to the moral principles that guide decisions and behavior in the field of
cybersecurity and information security.
• It involves the appropriate use and protection of information that is entrusted to
individuals and organizations.
• Importance of Ethics:-
• Ethical behavior is crucial in maintaining trust between organizations and the public,
• It protect privacy, and ensure the reliability and integrity of systems and data.
1
2
5. Ethics in Security
• Ethics helps to:-
• Building Trust:- Ethical practices in security help build and maintain trust between
service providers and their clients or users.
• Protecting Privacy:- Ethical security practices involve ensuring that information is
used responsibly, respecting individuals' privacy rights, and complying with laws
designed to safeguard personal data.
• Accountability:- Hold individuals and organizations accountable for their actions that
affect security and privacy.
1
3
5. Ethics in Security
• Challenges in Maintaining Ethical Standards:-
• Global Impact:- Addressing ethical considerations across different cultural and legal
frameworks internationally.
• Rapid Technological Changes:- Keeping ethical guidelines relevant and effective in
the face of rapidly evolving technologies and threat landscapes.
• Conflict of Interest:- Managing personal or organizational interests that might
interfere with impartial and unbiased decision-making.
1
4
5. Ethics in Security
• Promoting Ethical Practices:-
• Develop and enforce a code of conduct that outlines ethical behaviors and practices.
• Provide regular training on ethical issues in cybersecurity to promote awareness and
understanding among professionals.
• Monitor and Audit:- Regularly audit and assess how ethical policies are being
implemented and followed within the organization.
1
5
6. Digital Forensics
• The practice of uncovering and interpreting electronic data.
• The goal is to preserve any evidence in its most original form.
• Perform a structured investigation by collecting, identifying, and validating
the digital information for the purpose of reconstructing past events.
• Purpose of Digital Forensics:-
• The findings are often used in cybercrime investigations and legal proceedings to
support or refute a claim or criminal charge.
• Help organizations to understand the nature of a security breach and improve future
defenses.
1
Key Processes in Digital Forensics
• Identification:- Determining the scope of the data that is relevant to the investigation.
• Preservation:- Isolating, securing, and preserving the data to ensure that it is not altered,
deleted, or damaged.
• Analysis:- Examining the collected data to draw conclusions based on the evidence found.
• Documentation:- Keeping detailed and accurate records of all investigative processes and
findings to ensure the integrity and reproducibility of the investigation.
• Presentation:- Summarizing and presenting the findings in a manner that is
understandable to those who are not technically proficient.
• This may involve preparing detailed reports, exhibits, and other forms of documentation that explain
what was found and how.
1
Tools and Technologies in Digital Forensics
• Forensic Software Tools:-
• EnCase, FTK, and Autopsy, are used to perform comprehensive searches of hard
drives, recover deleted emails and files, and create timelines of computer usage.
• Mobile Forensics Tools:
• Cellebrite and Oxygen Forensic Suite are used to retrieve data from mobile devices,
including call histories, text messages, emails, and photos.
• Network Forensics Tools:-
• Wireshark and Network Miner that analyze network traffic and logs to identify
unauthorized access or anomalies.
1
8
7. Hackers
• A hacker is an individual who uses their technical knowledge and skills to
gain unauthorized access to systems, networks, or data.
• Hackers can exploit weakness for various purposes, ranging from kind to
malicious.
1
9
Types of Hackers
• White Hat Hackers:-
• Definition:- Ethical hackers who use their skills to improve security by finding and
fixing weakness in the system.
• Motivation:- Typically work with organizations to strengthen defenses and prevent
breaches.
• Tools:- Penetration testing tools like Nmap, Wireshark, Metasploit.
2
0
Types of Hackers
• Black Hat Hackers:-
• Definition:- Malicious hackers who exploit weakness of the system for personal gain,
• such as stealing data or causing disruptions.
• Motivation:- Financial gain, political agendas, or personal satisfaction.
• Tools:- Malware, phishing kits, keyloggers, exploit kits.
2
1
Types of Hackers
• Gray Hat Hackers:-
• Definition:- Hackers who operate between ethical and unethical hacking, often
exploiting vulnerabilities without malicious intent but without permission.
• Motivation:- Curiosity or Interest, challenge, or to inform the affected parties about
the vulnerabilities.
• Tools:- Similar to both white hat and black hat tools, such as scanning tools and
custom scripts.
2
2
Types of Hackers
• Script Kiddies:-
• Definition:- Innocent hackers who use pre-written hacking tools and scripts without
understanding how they work.
• Motivation:- Desire to impress peers, cause harm, or for personal enjoyment.
• Tools:- Automated scripts, downloadable hacking tools, and user-friendly hacking
software.
2
3
Types of Hackers
• Hacktivists:-
• Definition:- Hackers who use their skills for political or social activism, often to
promote a cause or deliver a message.
• Motivation:- Political agendas, social change, protest against organizations or
governments.
• Tools:- DDoS attack tools, website defacement tools, data breach methods.
2
4
Types of Hackers
• State-Sponsored Hackers:-
• Definition:- Hackers employed by governments to conduct espionage(surveillance),
cyber warfare, and sabotage or disruption.
• Motivation:- National security, intelligence gathering, disrupting adversaries.
• Tools:- Advanced persistent threats (APTs), zero-day exploits, custom malware.
2
5
End of Computer Security
Thanks !!!!
2
6