9781428340664_ppt_ch01

Upload: anish-sharma

Post on 08-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 9781428340664_PPT_ch01

    1/54

    About the Presentations

    The presentations cover the objectives found in theopening of each chapter.

    All chapter objectives are listed in the beginning ofeach presentation.

    You may customize the presentations to fit yourclass needs.

    Some figures from the chapters are included. Acomplete set of images from the book can be foundon the Instructor Resources disc.

  • 8/6/2019 9781428340664_PPT_ch01

    2/54

    Security+ Guide to Network

    Security Fundamentals, Third

    Edition

    Chapter 1Introduction to Security

  • 8/6/2019 9781428340664_PPT_ch01

    3/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Objectives

    Describe the challenges of securing information

    Define information security and explain why it isimportant

    Identify the types of attackers that are common today

    3

  • 8/6/2019 9781428340664_PPT_ch01

    4/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Objectives (continued)

    List the basic steps of an attack

    Describe the five steps in a defense

    Explain the different types of information securitycareers and how the Security+ certification canenhance a security career

    4

  • 8/6/2019 9781428340664_PPT_ch01

    5/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Challenges of Securing Information

    There is no simple solution to securing information

    This can be seen through the different types ofattacks that users face today

    As well as the difficulties in defending against theseattacks

    5

  • 8/6/2019 9781428340664_PPT_ch01

    6/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Todays Security Attacks

    Typical warnings:

    A malicious program was introduced at some point inthe manufacturing process of a popular brand of digital

    photo frames Nigerian e-mail scam claimed to be sent from the U.N.

    Booby-trapped Web pages are growing at anincreasing rate

    A new worm disables Microsoft Windows AutomaticUpdating and the Task Manager

    Apple has issued an update to address 25 securityflaws in its operating system OS X

    6

  • 8/6/2019 9781428340664_PPT_ch01

    7/54

  • 8/6/2019 9781428340664_PPT_ch01

    8/54

  • 8/6/2019 9781428340664_PPT_ch01

    9/54

    Security+ Guide to Network Security Fundamentals, Third Edition 9

  • 8/6/2019 9781428340664_PPT_ch01

    10/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Difficulties in Defending against

    Attacks Difficulties include the following:

    Speed of attacks

    Greater sophistication of attacks

    Simplicity of attack tools

    Attackers can detect vulnerabilities more quickly andmore readily exploit these vulnerabilities

    Delays in patching hardware and software products

    Most attacks are now distributed attacks, instead ofcoming from only one source

    User confusion

    10

  • 8/6/2019 9781428340664_PPT_ch01

    11/54

    Security+ Guide to Network Security Fundamentals, Third Edition 11

  • 8/6/2019 9781428340664_PPT_ch01

    12/54

    Security+ Guide to Network Security Fundamentals, Third Edition 12

  • 8/6/2019 9781428340664_PPT_ch01

    13/54

    Security+ Guide to Network Security Fundamentals, Third Edition 13

    Difficulties in Defending against

    Attacks (continued)

  • 8/6/2019 9781428340664_PPT_ch01

    14/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    What Is Information Security?

    Knowing why information security is important todayand who the attackers are is beneficial

    14

  • 8/6/2019 9781428340664_PPT_ch01

    15/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Defining Information Security

    Security can be considered as a state of freedomfrom a danger or risk

    This state or condition of freedom exists because

    protective measures are established and maintained Information security

    The tasks of guarding information that is in a digitalformat

    Ensures that protective measures are properlyimplemented

    Cannot completely prevent attacks or guarantee thata system is totally secure

    15

  • 8/6/2019 9781428340664_PPT_ch01

    16/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Defining Information Security

    (continued) Information security is intended to protect

    information that has value to people andorganizations

    This value comes from the characteristics of theinformation:

    Confidentiality

    Integrity

    Availability

    Information security is achieved through acombination of three entities

    16

  • 8/6/2019 9781428340664_PPT_ch01

    17/54

    Security+ Guide to Network Security Fundamentals, Third Edition 17

  • 8/6/2019 9781428340664_PPT_ch01

    18/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Defining Information Security

    (continued)

    18

  • 8/6/2019 9781428340664_PPT_ch01

    19/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Defining Information Security

    (continued) A more comprehensive definition of information

    security is:

    That which protects the integrity, confidentiality, and

    availability of information on the devices that store,manipulate, and transmit the information through

    products, people, and procedures

    19

  • 8/6/2019 9781428340664_PPT_ch01

    20/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Information Security Terminology

    Asset

    Something that has a value

    Threat An event or object that may defeat the security

    measures in place and result in a loss

    Threat agent

    A person or thing that has the power to carry out athreat

    20

  • 8/6/2019 9781428340664_PPT_ch01

    21/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Information Security Terminology

    (continued) Vulnerability

    Weakness that allows a threat agent to bypass

    security Risk

    The likelihood that a threat agent will exploit avulnerability

    Realistically, risk cannot ever be entirely eliminated

    21

  • 8/6/2019 9781428340664_PPT_ch01

    22/54

    Security+ Guide to Network Security Fundamentals, Third Edition 22

    Information Security Terminology

    (continued)

  • 8/6/2019 9781428340664_PPT_ch01

    23/54

    Security+ Guide to Network Security Fundamentals, Third Edition 23

    Information Security Terminology

    (continued)

  • 8/6/2019 9781428340664_PPT_ch01

    24/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Understanding the Importance of

    Information Security Preventing data theft

    Security is often associated with theft prevention

    The theft of data is one of the largest causes offinancial loss due to an attack

    Individuals are often victims of data thievery

    Thwarting identity theft

    Identity theft involves using someones personalinformation to establish bank or credit card accounts

    Cards are then left unpaid, leaving the victim with thedebts and ruining their credit rating

    24

  • 8/6/2019 9781428340664_PPT_ch01

    25/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Understanding the Importance of

    Information Security (continued) Avoiding legal consequences

    A number of federal and state laws have beenenacted to protect the privacy of electronic data

    The Health Insurance Portability and Accountability Actof 1996 (HIPAA)

    The Sarbanes-Oxley Act of 2002 (Sarbox)

    The Gramm-Leach-Bliley Act (GLBA)

    USA Patriot Act (2001) The California Database Security Breach Act (2003)

    Childrens Online Privacy Protection Act of 1998(COPPA)

    25

  • 8/6/2019 9781428340664_PPT_ch01

    26/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Understanding the Importance of

    Information Security (continued) Maintaining Productivity

    Cleaning up after an attack diverts resources such astime and money away from normal activities

    26

  • 8/6/2019 9781428340664_PPT_ch01

    27/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Understanding the Importance of

    Information Security (continued) Foiling cyberterrorism

    Cyberterrorism

    Attacks by terrorist groups using computer technologyand the Internet

    Utility, telecommunications, and financial servicescompanies are considered prime targets ofcyberterrorists

    27

  • 8/6/2019 9781428340664_PPT_ch01

    28/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Who Are the Attackers?

    The types of people behind computer attacks aregenerally divided into several categories

    These include hackers, script kiddies, spies,employees, cybercriminals, and cyberterrorists

    28

  • 8/6/2019 9781428340664_PPT_ch01

    29/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Hackers

    Hacker

    Generic sense: anyone who illegally breaks into orattempts to break into a computer system

    Narrow sense: a person who uses advancedcomputer skills to attack computers only to exposesecurity flaws

    Although breaking into another persons computer

    system is illegal Some hackers believe it is ethical as long as they do

    not commit theft, vandalism, or breach anyconfidentiality

    29

  • 8/6/2019 9781428340664_PPT_ch01

    30/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Script Kiddies

    Script kiddies

    Want to break into computers to create damage

    Unskilled users

    Download automated hacking software (scripts) fromWeb sites and use it to break into computers

    They are sometimes considered more dangerousthan hackers

    Script kiddies tend to be computer users who havealmost unlimited amounts of leisure time, which theycan use to attack systems

    30

  • 8/6/2019 9781428340664_PPT_ch01

    31/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Spies

    Computerspy

    A person who has been hired to break into acomputer and steal information

    Spies are hired to attack a specific computer orsystem that contains sensitive information

    Their goal is to break into that computer or systemand take the information without drawing anyattention to their actions

    Spies, like hackers, possess excellent computerskills

    31

  • 8/6/2019 9781428340664_PPT_ch01

    32/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Employees

    One of the largest information security threats to abusiness actually comes from its employees

    Reasons An employee might want to show the company a

    weakness in their security

    Disgruntled employees may be intent on retaliatingagainst the company

    Industrial espionage

    Blackmailing

    32

  • 8/6/2019 9781428340664_PPT_ch01

    33/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Cybercriminals

    Cybercriminals

    A loose-knit network of attackers, identity thieves, andfinancial fraudsters

    More highly motivated, less risk-averse, betterfunded, and more tenacious than hackers

    Many security experts believe that cybercriminalsbelong to organized gangs of young and mostlyEastern European attackers

    Cybercriminals have a more focused goal that canbe summed up in a single word: money

    33

  • 8/6/2019 9781428340664_PPT_ch01

    34/54

    Security+ Guide to Network Security Fundamentals, Third Edition 34

    Cybercriminals (continued)

  • 8/6/2019 9781428340664_PPT_ch01

    35/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Cybercriminals (continued)

    Cybercrime

    Targeted attacks against financial networks,unauthorized access to information, and the theft ofpersonal information

    Financial cybercrime is often divided into twocategories

    Trafficking in stolen credit card numbers and financialinformation

    Using spam to commit fraud

    35

  • 8/6/2019 9781428340664_PPT_ch01

    36/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Cyberterrorists

    Cyberterrorists

    Their motivation may be defined as ideology, or

    attacking for the sake of their principles or beliefs Goals of a cyberattack:

    To deface electronic information and spreadmisinformation and propaganda

    To deny service to legitimate computer users To commit unauthorized intrusions into systems and

    networks that result in critical infrastructure outagesand corruption of vital data

    36

  • 8/6/2019 9781428340664_PPT_ch01

    37/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Attacks and Defenses

    Although there are a wide variety of attacks that canbe launched against a computer or network

    The same basic steps are used in most attacks

    Protecting computers against these steps in anattack calls for five fundamental security principles

    37

  • 8/6/2019 9781428340664_PPT_ch01

    38/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Steps of an Attack

    The five steps that make up an attack

    Probe for information

    Penetrate any defenses

    Modify security settings

    Circulate to other systems

    Paralyze networks and devices

    38

  • 8/6/2019 9781428340664_PPT_ch01

    39/54

    Security+ Guide to Network Security Fundamentals, Third Edition 39

  • 8/6/2019 9781428340664_PPT_ch01

    40/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Defenses against Attacks

    Although multiple defenses may be necessary towithstand an attack

    These defenses should be based on five fundamental

    security principles: Protecting systems by layering

    Limiting

    Diversity

    Obscurity Simplicity

    40

  • 8/6/2019 9781428340664_PPT_ch01

    41/54

  • 8/6/2019 9781428340664_PPT_ch01

    42/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Limiting

    Limiting access to information reduces the threatagainst it

    Only those who must use data should have access

    to it In addition, the amount of access granted to someone

    should be limited to what that person needs to know

    Some ways to limit access are technology-based,

    while others are procedural

    42

  • 8/6/2019 9781428340664_PPT_ch01

    43/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Diversity

    Layers must be different (diverse)

    If attackers penetrate one layer, they cannot use thesame techniques to break through all other layers

    Using diverse layers of defense means thatbreaching one security layer does not compromisethe whole system

    43

  • 8/6/2019 9781428340664_PPT_ch01

    44/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Obscurity

    An example of obscurity would be not revealing thetype of computer, operating system, software, andnetwork connection a computer uses

    An attacker who knows that information can moreeasily determine the weaknesses of the system toattack it

    Obscuring information can be an important way to

    protect information

    44

  • 8/6/2019 9781428340664_PPT_ch01

    45/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Simplicity

    Information security is by its very nature complex

    Complex security systems can be hard tounderstand, troubleshoot, and feel secure about

    As much as possible, a secure system should besimple for those on the inside to understand and use

    Complex security schemes are often compromisedto make them easier for trusted users to work with

    Keeping a system simple from the inside but complexon the outside can sometimes be difficult but reaps amajor benefit

    45

  • 8/6/2019 9781428340664_PPT_ch01

    46/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Surveying Information SecurityCareers and the Security+ Certification

    Today, businesses and organizations requireemployees and even prospective applicants

    To demonstrate that they are familiar with computer

    security practices Many organizations use the CompTIA Security+

    certification to verify security competency

    46

  • 8/6/2019 9781428340664_PPT_ch01

    47/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Types of Information Security Jobs

    Information assurance (IA)

    A superset of information security including securityissues that do not involve computers

    Covers a broader area than just basic technologydefense tools and tactics

    Also includes reliability, strategic risk management,and corporate governance issues such as privacy,

    compliance, audits, business continuity, and disasterrecovery

    Is interdisciplinary; individuals who are employed in itmay come from different fields of study

    47

  • 8/6/2019 9781428340664_PPT_ch01

    48/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Types of Information Security Jobs(continued)

    Information security, also called computer security

    Involves the tools and tactics to defend againstcomputer attacks

    Does not include security issues that do not involvecomputers

    Two broad categories of information securitypositions

    Information security managerial position Information security technical position

    48

  • 8/6/2019 9781428340664_PPT_ch01

    49/54

    Security+ Guide to Network Security Fundamentals, Third Edition 49

  • 8/6/2019 9781428340664_PPT_ch01

    50/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    CompTIA Security+ Certification

    The CompTIA Security+ (2008 Edition) Certificationis the premiere vendor-neutral credential

    The Security+ exam is an internationally recognized

    validation of foundation-level security skills andknowledge

    Used by organizations and security professionalsaround the world

    The skills and knowledge measured by theSecurity+ exam are derived from an industry-wideJob Task Analysis (JTA)

    50

  • 8/6/2019 9781428340664_PPT_ch01

    51/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    CompTIA Security+ Certification(continued)

    The six domains covered by the Security+ exam:

    Systems Security, Network Infrastructure, AccessControl, Assessments and Audits, Cryptography, and

    Organizational Security

    51

  • 8/6/2019 9781428340664_PPT_ch01

    52/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Summary

    Attacks against information security have grownexponentially in recent years

    There are several reasons why it is difficult to defend

    against todays attacks Information security may be defined as that which

    protects the integrity, confidentiality, and availabilityof information on the devices that store, manipulate,

    and transmit the information through products,people, and procedures

    52

  • 8/6/2019 9781428340664_PPT_ch01

    53/54

    Security+ Guide to Network Security Fundamentals, Third Edition

    Summary (continued)

    The main goals of information security are to preventdata theft, thwart identity theft, avoid the legalconsequences of not securing information, maintainproductivity, and foil cyberterrorism

    The types of people behind computer attacks aregenerally divided into several categories

    There are five general steps that make up an attack:

    probe for information, penetrate any defenses, modifysecurity settings, circulate to other systems, andparalyze networks and devices

    53

  • 8/6/2019 9781428340664_PPT_ch01

    54/54

    Security+ Guide to Network Security Fundamentals Third Edition

    Summary (continued)

    The demand for IT professionals who know how tosecure networks and computers from attacks is at anall-time high

    54