Information Systems Security

Download Report

Transcript Information Systems Security

Information Systems
Security
A comprehensive guide
© Clyne G. H. Namuo, Ph.D. – Security+
Outline









CIA Triangle
Threat Analysis and Asset Inventory
General Security Concepts
Communication Security
Network Security
Physical Security
Disaster Recovery
Security Policies and Procedures
Security in small vs. large companies
© Clyne G. H. Namuo, Ph.D. – Security+
CIA Triangle
Confidentiality

Confidentiality


Preventing unauthorized
access to systems
Integrity
Ensure data is what
it claims to be
 Ensure accuracy of data


Integrity
Availability

Ensure systems and data
are available when they are needed
© Clyne G. H. Namuo, Ph.D. – Security+
Availability
Threat Analysis and Asset Inventory

Asset Inventory


Hardware, Software, Data, Expertise
Threat Categories
External Intentional (Hackers)
 External Accidental (Remote Users)
 Internal Intentional (Disgruntled Employees)
 Internal Accidental (Untrained Employees)
 Natural Disasters (Fires, Floods, Earthquakes)


Worksheet
© Clyne G. H. Namuo, Ph.D. – Security+
General Security Concepts

Malicious Code
Viruses : software designed to infect and cause
‘damage’ to a computer
 Worm : propagate through email or through
network connections. Do not depend on other
programs
 Trojan Horse : program pretending to be
something legitimate
 Logic Bomb : execute when certain conditions are
met

© Clyne G. H. Namuo, Ph.D. – Security+
General Security Concepts (con’t)

Social Engineering


“Hello, I’m calling from the IT department, I need
your password to fix your PC”
TCP/IP Attacks
Network Sniffers (Wireshark)
 Port Scans (NMAP)
 Denial of Service Attacks (UDP Flooder)

© Clyne G. H. Namuo, Ph.D. – Security+
General Security Concepts (con’t)



Man in the middle Attacks
Spoofing Attacks
Back Door Attacks


Software/Operating system vulnerabilities
Password Guessing Attacks
Dictionary Attacks (Lophtcrack)
 Brute Force Attack (Cain and Abel)

© Clyne G. H. Namuo, Ph.D. – Security+
Communication Security

E-mail Security
Phishing
 Hoaxes and Spam
 Viruses traveling as e-mail attachments
 PGP Encryption (www.pgpi.org)

© Clyne G. H. Namuo, Ph.D. – Security+
Communication Security (Con’t)

Web Security
SSL or HTTPS
 Buffer Overflow
 Denial of service attacks


Wireless Security
Wireless Access Points
 Unsecure communication method
 WEP->WPA->WPA2

© Clyne G. H. Namuo, Ph.D. – Security+
Network Security




Firewalls
Intrusion Detection Systems
OS Updates, Patches and Service Packs
Access control lists
Usernames and passwords
 Rights and privileges

© Clyne G. H. Namuo, Ph.D. – Security+
Physical Security



Locks on doors to protect systems
Access badges
Biometrics
Hand scan
 Retina scan
 Voice recognition


Fire Suppression

Sprinkler system? No, FM-200 gas fire suppression
© Clyne G. H. Namuo, Ph.D. – Security+
Disaster Recovery



September 11th lesson
Natural Disasters
Backups




Daily, weekly, monthly
Off site storage
Disaster Recovery Plan
Testing your plan
© Clyne G. H. Namuo, Ph.D. – Security+
Security Policies and Procedures



Policies, Procedures and Consequences
Cost-effective solution
Acceptable use policy
Use of company email
 Appropriate surfing policy
 Coordination with Human Resources Dept


Communicate policies effectively
© Clyne G. H. Namuo, Ph.D. – Security+
Security in small vs. large companies
3rd Security Conference
April 14/15, 2004
Current Security Practices
of SMEs: A Case Study
Namuo, Weiner, and Jennex
San Diego State University
Presentation by:
Clyne G. H. Namuo, Ph.D.
© Clyne G. H. Namuo, Ph.D. – Security+
Survey Background

Component of Generic Security Plan for SMEs


Respondents







32 questions regarding computer security (jump to survey)
218 total
All in San Diego (planned extension/expansion to other cities)
56% Large corporations (123)
44% SMEs (95) (Companies with less than 500 employees)
Working professionals
Industry professionals
Hypothesis


SMEs lack knowledge and resources to implement property security
measures/barriers and will exhibit less knowledge about their security plans
Literature on SMEs supports this but found little quantitative data to support
this
© Clyne G. H. Namuo, Ph.D. – Security+
SME vs. Large Implementation of Security Measures
SMEs
Large
100%
90%
90%
89% 88%
88%
86%
85%
82%
80%
84%
80%
76%
67% 68% 67%
70%
71%
68%
61%
60%
57%
57%
43%
40%
30%
49%
48%48% 46%
42%
38%
36%
31%
61%
54%
51%
50% 47%
68%
65% 65%
34%
33%
31%
28%
26%
24%
20%
10%
v
co
re
s
dis
les
wi
re
up
s
ts
ou
n
cc
ka
oli
c
pw
dp
ne
tw
or
© Clyne G. H. Namuo, Ph.D. – Security+
ies
es
av
ids
pa
tch
os
do
cu
m
en
te
d
sp
ec
ific
re
vie
we
d
tra
co
ine
ns
d
eq
ue
nc
es
inv
en
th
to
re
ry
at
an
aly
si s
of
ba
fsi
ck
te
up
ste
ste
us
d
er
ac
co
un
ts
ph
ys
i ca
l
fir
ew
al
ls
0%
© Clyne G. H. Namuo, Ph.D. – Security+
4.5
4.0
4.2
3.9
3.7
3.6
SMEs
Large
3.7
3.4
3.5
3.2
3.2
3.0
2.6
2.4
2.5
2.0
1.5
1.5
1.5
1.0
0.5
0.0
comfortable
adequate
confident
rely
I am comfortable our security plan protects our critical data
We have adequate knowledge about IS security
I am confident my company won't have a IS security problem
We rely on one or two key people to manage our IS security
Our security rules are a burden to follow
I stay awake nights worrying about my company's data and networks
5=Agree
4=Somewhat agree
3=Neutral
2=Somewhat disagree
© Clyne G. H. Namuo, Ph.D. – Security+
burden
1=Disagree
worry
Conclusions



SMEs have less knowledge of security and their
security plans than their counter parts in large
companies
However, personnel in SMEs are just about as
comfortable with their security as their counter
parts in large companies
No one is losing sleep over their security plan
© Clyne G. H. Namuo, Ph.D. – Security+
Conclusion









CIA Triangle
Threat Analysis and Asset Inventory
General Security Concepts
Communication Security
Network Security
Physical Security
Disaster Recovery
Security Policies and Procedures
Security in small vs. large companies
© Clyne G. H. Namuo, Ph.D. – Security+