Network Security and Security in Industry
Download
Report
Transcript Network Security and Security in Industry
Network Security and
Security in Industry
Paul Curtis
Road Map
Brief History of Network Security
Some Significant Problems in Network
Security
Traditional Methods of Network Security
Methods to improve network security and
our policies
The Future of Network Security
Some History
1960s – Students as first ‘hackers’
1970s – Phone ‘phreaking’
1980s – Various virus types appear
1986 – Computer Fraud and Abuse Act
1990s – More complex virus types
1995 – Kevin Mitnick hacked government
1997 – AOL hacked
2000s – DoS Attacks, Worm viruses
Some Significant Problems
Possible Consequences of Vulnerabilities
– Webcam access
– Microphone access
– Trojan access
– Security of sensitive data
– Personal Privacy
– Theft of copyrighted material
– Theft of trade secrets
Traditional Methods
Authentication
– User names
– Passwords
Protection
– Anti-virus programs
– Firewalls
– Internet security suites
Improving Network Security
Google Chrome
Focused on Three Key Factors
– Severity of vulnerabilities
Improved defenses between the browser and the
OS
– Window of vulnerability
Made updates easier and more painless to install
– Frequency of Exposure
Increased attempts to warn users before they
access a malicious site
Improving Network Security
No One Solution
Security must be constantly strived for
Things to Consider
– Take into consideration the skill, motivation,
and opportunity of attacks
Require more skill to be hacked
Reduce the opportunity that an attacker has
– Put oneself in the shoes of an attacker
Improving Network Security
Implement Security Measures on both
network devices as well as on end-user
machines
Use of Encryption in both the end-user
machine and network devices
Consistent internet security advances and
updates
The Future
Psychological Profiling
Standardizing Biometric Implementation
– Linguistic Analysis
– Fingerprint scanners
– Iris Recognition
– Facial Recognition
– Typing Rhythm
– Use of combined biometric technologies
The Future
Artificial Intelligence could provide instant
alerts about possible attacks
– Use of Gatekeepers as Monitors
– Track blocked and failed connections for
investigation
– Detect odd or unexpected behavior on a
legitimate user’s account
Review
Brief History of Network Security
Traditional Methods of Network Security
Methods to improve network security and
our policies
The Future of Network Security
Sources
Lacey, David. "The future of network security." The future of
network
security. NetworkWorld.com. Web. 18 Feb. 2010.
<http://www.networkworld.com/columnists/2008/013008jericho-network-security.html>.
Mallard, Steve. "The History behind Network Security." The History
behind Network Security. Bright Hub. Web. 18 Feb. 2010.
<http://www.brighthub.com/computing/smbsecurity/articles/4779.aspx>.
Reis, Charles, Adam Barth, and Carlos Pizano. "Browser Security:
Lessons from Google Chrome." ACM Queue 7.5 (2009).
Browser Security - ACM Queue. ACM. Web. 18 Feb.
2010.<http://queue.acm.org/detail.cfm?id=1556050>.
Wadlow, Thomas. "The Answer is 42 of Course." ACM
Queue
3.5 (2005). The Answer is 42 of Course ACM Queue.
ACM.
Web. 18 Feb. 2010.
<http://queue.acm.org/detail.cfm?id=1071727>.
Questions?