9781428340664_ppt_ch01
Post on 08-Apr-2018
216 Views
Preview:
TRANSCRIPT
-
8/6/2019 9781428340664_PPT_ch01
1/54
About the Presentations
The presentations cover the objectives found in theopening of each chapter.
All chapter objectives are listed in the beginning ofeach presentation.
You may customize the presentations to fit yourclass needs.
Some figures from the chapters are included. Acomplete set of images from the book can be foundon the Instructor Resources disc.
-
8/6/2019 9781428340664_PPT_ch01
2/54
Security+ Guide to Network
Security Fundamentals, Third
Edition
Chapter 1Introduction to Security
-
8/6/2019 9781428340664_PPT_ch01
3/54
Security+ Guide to Network Security Fundamentals, Third Edition
Objectives
Describe the challenges of securing information
Define information security and explain why it isimportant
Identify the types of attackers that are common today
3
-
8/6/2019 9781428340664_PPT_ch01
4/54
Security+ Guide to Network Security Fundamentals, Third Edition
Objectives (continued)
List the basic steps of an attack
Describe the five steps in a defense
Explain the different types of information securitycareers and how the Security+ certification canenhance a security career
4
-
8/6/2019 9781428340664_PPT_ch01
5/54
Security+ Guide to Network Security Fundamentals, Third Edition
Challenges of Securing Information
There is no simple solution to securing information
This can be seen through the different types ofattacks that users face today
As well as the difficulties in defending against theseattacks
5
-
8/6/2019 9781428340664_PPT_ch01
6/54
Security+ Guide to Network Security Fundamentals, Third Edition
Todays Security Attacks
Typical warnings:
A malicious program was introduced at some point inthe manufacturing process of a popular brand of digital
photo frames Nigerian e-mail scam claimed to be sent from the U.N.
Booby-trapped Web pages are growing at anincreasing rate
A new worm disables Microsoft Windows AutomaticUpdating and the Task Manager
Apple has issued an update to address 25 securityflaws in its operating system OS X
6
-
8/6/2019 9781428340664_PPT_ch01
7/54
-
8/6/2019 9781428340664_PPT_ch01
8/54
-
8/6/2019 9781428340664_PPT_ch01
9/54
Security+ Guide to Network Security Fundamentals, Third Edition 9
-
8/6/2019 9781428340664_PPT_ch01
10/54
Security+ Guide to Network Security Fundamentals, Third Edition
Difficulties in Defending against
Attacks Difficulties include the following:
Speed of attacks
Greater sophistication of attacks
Simplicity of attack tools
Attackers can detect vulnerabilities more quickly andmore readily exploit these vulnerabilities
Delays in patching hardware and software products
Most attacks are now distributed attacks, instead ofcoming from only one source
User confusion
10
-
8/6/2019 9781428340664_PPT_ch01
11/54
Security+ Guide to Network Security Fundamentals, Third Edition 11
-
8/6/2019 9781428340664_PPT_ch01
12/54
Security+ Guide to Network Security Fundamentals, Third Edition 12
-
8/6/2019 9781428340664_PPT_ch01
13/54
Security+ Guide to Network Security Fundamentals, Third Edition 13
Difficulties in Defending against
Attacks (continued)
-
8/6/2019 9781428340664_PPT_ch01
14/54
Security+ Guide to Network Security Fundamentals, Third Edition
What Is Information Security?
Knowing why information security is important todayand who the attackers are is beneficial
14
-
8/6/2019 9781428340664_PPT_ch01
15/54
Security+ Guide to Network Security Fundamentals, Third Edition
Defining Information Security
Security can be considered as a state of freedomfrom a danger or risk
This state or condition of freedom exists because
protective measures are established and maintained Information security
The tasks of guarding information that is in a digitalformat
Ensures that protective measures are properlyimplemented
Cannot completely prevent attacks or guarantee thata system is totally secure
15
-
8/6/2019 9781428340664_PPT_ch01
16/54
Security+ Guide to Network Security Fundamentals, Third Edition
Defining Information Security
(continued) Information security is intended to protect
information that has value to people andorganizations
This value comes from the characteristics of theinformation:
Confidentiality
Integrity
Availability
Information security is achieved through acombination of three entities
16
-
8/6/2019 9781428340664_PPT_ch01
17/54
Security+ Guide to Network Security Fundamentals, Third Edition 17
-
8/6/2019 9781428340664_PPT_ch01
18/54
Security+ Guide to Network Security Fundamentals, Third Edition
Defining Information Security
(continued)
18
-
8/6/2019 9781428340664_PPT_ch01
19/54
Security+ Guide to Network Security Fundamentals, Third Edition
Defining Information Security
(continued) A more comprehensive definition of information
security is:
That which protects the integrity, confidentiality, and
availability of information on the devices that store,manipulate, and transmit the information through
products, people, and procedures
19
-
8/6/2019 9781428340664_PPT_ch01
20/54
Security+ Guide to Network Security Fundamentals, Third Edition
Information Security Terminology
Asset
Something that has a value
Threat An event or object that may defeat the security
measures in place and result in a loss
Threat agent
A person or thing that has the power to carry out athreat
20
-
8/6/2019 9781428340664_PPT_ch01
21/54
Security+ Guide to Network Security Fundamentals, Third Edition
Information Security Terminology
(continued) Vulnerability
Weakness that allows a threat agent to bypass
security Risk
The likelihood that a threat agent will exploit avulnerability
Realistically, risk cannot ever be entirely eliminated
21
-
8/6/2019 9781428340664_PPT_ch01
22/54
Security+ Guide to Network Security Fundamentals, Third Edition 22
Information Security Terminology
(continued)
-
8/6/2019 9781428340664_PPT_ch01
23/54
Security+ Guide to Network Security Fundamentals, Third Edition 23
Information Security Terminology
(continued)
-
8/6/2019 9781428340664_PPT_ch01
24/54
Security+ Guide to Network Security Fundamentals, Third Edition
Understanding the Importance of
Information Security Preventing data theft
Security is often associated with theft prevention
The theft of data is one of the largest causes offinancial loss due to an attack
Individuals are often victims of data thievery
Thwarting identity theft
Identity theft involves using someones personalinformation to establish bank or credit card accounts
Cards are then left unpaid, leaving the victim with thedebts and ruining their credit rating
24
-
8/6/2019 9781428340664_PPT_ch01
25/54
Security+ Guide to Network Security Fundamentals, Third Edition
Understanding the Importance of
Information Security (continued) Avoiding legal consequences
A number of federal and state laws have beenenacted to protect the privacy of electronic data
The Health Insurance Portability and Accountability Actof 1996 (HIPAA)
The Sarbanes-Oxley Act of 2002 (Sarbox)
The Gramm-Leach-Bliley Act (GLBA)
USA Patriot Act (2001) The California Database Security Breach Act (2003)
Childrens Online Privacy Protection Act of 1998(COPPA)
25
-
8/6/2019 9781428340664_PPT_ch01
26/54
Security+ Guide to Network Security Fundamentals, Third Edition
Understanding the Importance of
Information Security (continued) Maintaining Productivity
Cleaning up after an attack diverts resources such astime and money away from normal activities
26
-
8/6/2019 9781428340664_PPT_ch01
27/54
Security+ Guide to Network Security Fundamentals, Third Edition
Understanding the Importance of
Information Security (continued) Foiling cyberterrorism
Cyberterrorism
Attacks by terrorist groups using computer technologyand the Internet
Utility, telecommunications, and financial servicescompanies are considered prime targets ofcyberterrorists
27
-
8/6/2019 9781428340664_PPT_ch01
28/54
Security+ Guide to Network Security Fundamentals, Third Edition
Who Are the Attackers?
The types of people behind computer attacks aregenerally divided into several categories
These include hackers, script kiddies, spies,employees, cybercriminals, and cyberterrorists
28
-
8/6/2019 9781428340664_PPT_ch01
29/54
Security+ Guide to Network Security Fundamentals, Third Edition
Hackers
Hacker
Generic sense: anyone who illegally breaks into orattempts to break into a computer system
Narrow sense: a person who uses advancedcomputer skills to attack computers only to exposesecurity flaws
Although breaking into another persons computer
system is illegal Some hackers believe it is ethical as long as they do
not commit theft, vandalism, or breach anyconfidentiality
29
-
8/6/2019 9781428340664_PPT_ch01
30/54
Security+ Guide to Network Security Fundamentals, Third Edition
Script Kiddies
Script kiddies
Want to break into computers to create damage
Unskilled users
Download automated hacking software (scripts) fromWeb sites and use it to break into computers
They are sometimes considered more dangerousthan hackers
Script kiddies tend to be computer users who havealmost unlimited amounts of leisure time, which theycan use to attack systems
30
-
8/6/2019 9781428340664_PPT_ch01
31/54
Security+ Guide to Network Security Fundamentals, Third Edition
Spies
Computerspy
A person who has been hired to break into acomputer and steal information
Spies are hired to attack a specific computer orsystem that contains sensitive information
Their goal is to break into that computer or systemand take the information without drawing anyattention to their actions
Spies, like hackers, possess excellent computerskills
31
-
8/6/2019 9781428340664_PPT_ch01
32/54
Security+ Guide to Network Security Fundamentals, Third Edition
Employees
One of the largest information security threats to abusiness actually comes from its employees
Reasons An employee might want to show the company a
weakness in their security
Disgruntled employees may be intent on retaliatingagainst the company
Industrial espionage
Blackmailing
32
-
8/6/2019 9781428340664_PPT_ch01
33/54
Security+ Guide to Network Security Fundamentals, Third Edition
Cybercriminals
Cybercriminals
A loose-knit network of attackers, identity thieves, andfinancial fraudsters
More highly motivated, less risk-averse, betterfunded, and more tenacious than hackers
Many security experts believe that cybercriminalsbelong to organized gangs of young and mostlyEastern European attackers
Cybercriminals have a more focused goal that canbe summed up in a single word: money
33
-
8/6/2019 9781428340664_PPT_ch01
34/54
Security+ Guide to Network Security Fundamentals, Third Edition 34
Cybercriminals (continued)
-
8/6/2019 9781428340664_PPT_ch01
35/54
Security+ Guide to Network Security Fundamentals, Third Edition
Cybercriminals (continued)
Cybercrime
Targeted attacks against financial networks,unauthorized access to information, and the theft ofpersonal information
Financial cybercrime is often divided into twocategories
Trafficking in stolen credit card numbers and financialinformation
Using spam to commit fraud
35
-
8/6/2019 9781428340664_PPT_ch01
36/54
Security+ Guide to Network Security Fundamentals, Third Edition
Cyberterrorists
Cyberterrorists
Their motivation may be defined as ideology, or
attacking for the sake of their principles or beliefs Goals of a cyberattack:
To deface electronic information and spreadmisinformation and propaganda
To deny service to legitimate computer users To commit unauthorized intrusions into systems and
networks that result in critical infrastructure outagesand corruption of vital data
36
-
8/6/2019 9781428340664_PPT_ch01
37/54
Security+ Guide to Network Security Fundamentals, Third Edition
Attacks and Defenses
Although there are a wide variety of attacks that canbe launched against a computer or network
The same basic steps are used in most attacks
Protecting computers against these steps in anattack calls for five fundamental security principles
37
-
8/6/2019 9781428340664_PPT_ch01
38/54
Security+ Guide to Network Security Fundamentals, Third Edition
Steps of an Attack
The five steps that make up an attack
Probe for information
Penetrate any defenses
Modify security settings
Circulate to other systems
Paralyze networks and devices
38
-
8/6/2019 9781428340664_PPT_ch01
39/54
Security+ Guide to Network Security Fundamentals, Third Edition 39
-
8/6/2019 9781428340664_PPT_ch01
40/54
Security+ Guide to Network Security Fundamentals, Third Edition
Defenses against Attacks
Although multiple defenses may be necessary towithstand an attack
These defenses should be based on five fundamental
security principles: Protecting systems by layering
Limiting
Diversity
Obscurity Simplicity
40
-
8/6/2019 9781428340664_PPT_ch01
41/54
-
8/6/2019 9781428340664_PPT_ch01
42/54
Security+ Guide to Network Security Fundamentals, Third Edition
Limiting
Limiting access to information reduces the threatagainst it
Only those who must use data should have access
to it In addition, the amount of access granted to someone
should be limited to what that person needs to know
Some ways to limit access are technology-based,
while others are procedural
42
-
8/6/2019 9781428340664_PPT_ch01
43/54
Security+ Guide to Network Security Fundamentals, Third Edition
Diversity
Layers must be different (diverse)
If attackers penetrate one layer, they cannot use thesame techniques to break through all other layers
Using diverse layers of defense means thatbreaching one security layer does not compromisethe whole system
43
-
8/6/2019 9781428340664_PPT_ch01
44/54
Security+ Guide to Network Security Fundamentals, Third Edition
Obscurity
An example of obscurity would be not revealing thetype of computer, operating system, software, andnetwork connection a computer uses
An attacker who knows that information can moreeasily determine the weaknesses of the system toattack it
Obscuring information can be an important way to
protect information
44
-
8/6/2019 9781428340664_PPT_ch01
45/54
Security+ Guide to Network Security Fundamentals, Third Edition
Simplicity
Information security is by its very nature complex
Complex security systems can be hard tounderstand, troubleshoot, and feel secure about
As much as possible, a secure system should besimple for those on the inside to understand and use
Complex security schemes are often compromisedto make them easier for trusted users to work with
Keeping a system simple from the inside but complexon the outside can sometimes be difficult but reaps amajor benefit
45
-
8/6/2019 9781428340664_PPT_ch01
46/54
Security+ Guide to Network Security Fundamentals, Third Edition
Surveying Information SecurityCareers and the Security+ Certification
Today, businesses and organizations requireemployees and even prospective applicants
To demonstrate that they are familiar with computer
security practices Many organizations use the CompTIA Security+
certification to verify security competency
46
-
8/6/2019 9781428340664_PPT_ch01
47/54
Security+ Guide to Network Security Fundamentals, Third Edition
Types of Information Security Jobs
Information assurance (IA)
A superset of information security including securityissues that do not involve computers
Covers a broader area than just basic technologydefense tools and tactics
Also includes reliability, strategic risk management,and corporate governance issues such as privacy,
compliance, audits, business continuity, and disasterrecovery
Is interdisciplinary; individuals who are employed in itmay come from different fields of study
47
-
8/6/2019 9781428340664_PPT_ch01
48/54
Security+ Guide to Network Security Fundamentals, Third Edition
Types of Information Security Jobs(continued)
Information security, also called computer security
Involves the tools and tactics to defend againstcomputer attacks
Does not include security issues that do not involvecomputers
Two broad categories of information securitypositions
Information security managerial position Information security technical position
48
-
8/6/2019 9781428340664_PPT_ch01
49/54
Security+ Guide to Network Security Fundamentals, Third Edition 49
-
8/6/2019 9781428340664_PPT_ch01
50/54
Security+ Guide to Network Security Fundamentals, Third Edition
CompTIA Security+ Certification
The CompTIA Security+ (2008 Edition) Certificationis the premiere vendor-neutral credential
The Security+ exam is an internationally recognized
validation of foundation-level security skills andknowledge
Used by organizations and security professionalsaround the world
The skills and knowledge measured by theSecurity+ exam are derived from an industry-wideJob Task Analysis (JTA)
50
-
8/6/2019 9781428340664_PPT_ch01
51/54
Security+ Guide to Network Security Fundamentals, Third Edition
CompTIA Security+ Certification(continued)
The six domains covered by the Security+ exam:
Systems Security, Network Infrastructure, AccessControl, Assessments and Audits, Cryptography, and
Organizational Security
51
-
8/6/2019 9781428340664_PPT_ch01
52/54
Security+ Guide to Network Security Fundamentals, Third Edition
Summary
Attacks against information security have grownexponentially in recent years
There are several reasons why it is difficult to defend
against todays attacks Information security may be defined as that which
protects the integrity, confidentiality, and availabilityof information on the devices that store, manipulate,
and transmit the information through products,people, and procedures
52
-
8/6/2019 9781428340664_PPT_ch01
53/54
Security+ Guide to Network Security Fundamentals, Third Edition
Summary (continued)
The main goals of information security are to preventdata theft, thwart identity theft, avoid the legalconsequences of not securing information, maintainproductivity, and foil cyberterrorism
The types of people behind computer attacks aregenerally divided into several categories
There are five general steps that make up an attack:
probe for information, penetrate any defenses, modifysecurity settings, circulate to other systems, andparalyze networks and devices
53
-
8/6/2019 9781428340664_PPT_ch01
54/54
Security+ Guide to Network Security Fundamentals Third Edition
Summary (continued)
The demand for IT professionals who know how tosecure networks and computers from attacks is at anall-time high
54
top related