52
CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Embed Size (px)

Citation preview

Page 1: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY

WEEK 1: INFORMATION SECURITY OVERVIEW

Page 2: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Security Definition

• In general, security is defined as “the quality or state of being secure—to be free from danger.”

• Security is often achieved by means of several strategies usually undertaken simultaneously or used in combination with one another.

Page 3: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Specialized areas of security

• Physical security, which encompasses strategies to protect people, physical assets, and the workplace from various threats including fire, unauthorized access, or natural disasters

• Personal security, which overlaps with physical security in the protection of the people within the organization

• Operations security, which focuses on securing the organization’s ability to carry out its operational activities without interruption or compromise

Page 4: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Communications security, which encompasses the protection of an organization’s communications media, technology, and content, and its ability to use these tools to achieve the organization’s objectives

• Network security, which addresses the protection of an organization’s data networking devices, connections, and contents, and the ability to use that network to accomplish the organization’s data communication functions

• Information security includes the broad areas of information security management, computer and data security, and network security.

Page 5: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

What is information security?

• Information security is defined by British Standard Institute as “preservation of confidentiality, integrity and availability of information; in addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved”

Page 6: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Properties of information security

• Confidentiality means that information is disclosed to an authorised user.

• Integrity means information is not modified by an unauthorised user.

• Availability means information is available when required to an authorised user.

Page 7: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Authenticity means a user attempting to access the information is in fact the user to whom the level of access belongs.

• Accountability means the user is responsible to the safeguarding of the information the user accesses.

• Non-repudiation means a sender of information cannot denies having sent the information.

• Reliability means information is being consistently processed according to its design.

Page 8: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

CIA Triangle

• The C.I.A. triangle - confidentiality, integrity, and availability - has expanded into a more comprehensive list of critical characteristics of information.

• C.I.A. triangle sometimes is called the pillars of information security.

Page 9: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

CIA - Triangle

CONFIDENTIALITYINTEGRITY

AVAILABILITY

Page 10: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Commercial Example

• Confidentiality —An employee should notcome to know the salary of his manager

• Integrity —An employee should not be ableto modify the employee's own salary

• Availability —Paychecks should be printed ontime as stipulated by law

Page 11: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Military Example

• Confidentiality —The target coordinates of amissile should not be improperly disclosed

• Integrity —The target coordinates of a missileshould not be improperly modified

• Availability —When the proper command isissued the missile should fire

Page 12: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Security Trends 2015

• Cybercriminals are becoming more sophisticated and collaborative with every coming year.

• To combat the threat in 2015, information security professionals must understand these five trends:

Page 13: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

1. Cybercrime

Page 14: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• The Internet is an increasingly attractive hunting ground for criminals, activists and terrorists motivated to make money, get noticed, cause disruption or even bring down corporations and governments through online attacks.

• Today's cybercriminals primarily operate out of the former Soviet states.

• They are highly skilled and equipped with very modern tools — they often use 21st century tools to take on 20th century systems.

Page 15: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• In 2015, organizations must be prepared for the unpredictable so they have the resilience to withstand unforeseen, high impact events.

• "Cybercrime, along with the increase in online causes (hacktivism), the increase in cost of compliance to deal with the uptick in regulatory requirements coupled with the relentless advances in technology against a backdrop of under investment in security departments, can all combine to cause the perfect threat storm.

Page 16: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Organizations that identify what the business relies on most will be well placed to quantify the business case to invest in resilience, therefore minimizing the impact of the unforeseen."

Page 17: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

2. Privacy and Regulation

• Most governments have already created, or are in the process of creating, regulations that impose conditions on the safeguard and use of Personally Identifiable Information (PII), with penalties for organizations that fail to sufficiently protect it.

• As a result, organizations need to treat privacy as both a compliance and business risk issue, in order to reduce regulatory sanctions and business costs such as reputational damage and loss of customers due to privacy breaches.

Page 18: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• The patchwork nature of regulation around the world is likely to become an increasing burden on organizations in 2015.

• Organizations should look upon the EU's struggles with data breach regulation and privacy regulation as a temperature gauge and plan accordingly.

Page 19: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

3. Threats From Third-Party Providers

• Supply chains are a vital component of every organization's global business operations and the backbone of today's global economy.

• However, security chiefs everywhere are growing more concerned about how open they are to numerous risk factors.

• A range of valuable and sensitive information is often shared with suppliers, and when that information is shared, direct control is lost.

• This leads to an increased risk of its confidentiality, integrity or availability being compromised.

Page 20: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

4. BYOx Trends in the Workplace

• The bring-your-own (BYO) trend is here to stay whether organizations like it or not, and few organizations have developed good policy guidelines to cope.

• As the trend of employees bringing mobile devices, applications and cloud-based storage and access in the workplace continues to grow, businesses of all sizes are seeing information security risks being exploited at a greater rate than ever before.

Page 21: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications.

• If you determine the BYO risks are too high for your organization today, you should at least make sure to stay abreast of developments.

• If you decide the risks are acceptable, make sure you establish a well-structured BYOx program.

Page 22: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

5. Engagement With Your People

• And that brings us full circle to every organization's greatest asset and most vulnerable target: people.

• Over the past few decades, organizations have spent millions, if not billions, of dollars on information security awareness activities.

• The rationale behind this approach was to take their biggest asset — people — and change their behavior, thus reducing risk by providing them with knowledge of their responsibilities and what they need to do.

Page 23: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• But this has been — and will continue to be — a losing proposition.

• Instead, organizations need to make positive security behaviors part of the business process, transforming employees from risks into the first line of defense in the organization's security posture.

• As we move into 2015, organizations need to shift from promoting awareness of the problem to creating solutions and embedding information security behaviors that affect risk positively.

• The risks are real because people remain a ‘wild card’.

Page 24: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Security Incidents

• What is an Information Security Incident?• Where university information is concerned, an

information security incident can be defined as any event or set of circumstances threatening its confidentiality, its integrity or its availability.

Page 25: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Examples of information security incidents

• Examples of information security incidents can include but are not limited to:

• The disclosure of confidential information to unauthorised individuals

• Loss or theft of paper records, data or equipment e.g.

• laptops, smartphones or memory sticks, on which data is stored

Page 26: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Inappropriate access controls allowing unauthorised use of information

• Suspected breach of the University IT and Communications Acceptable Use Policy

• Attempts to gain unauthorised access to computer systems, e, g hacking

• Records altered or deleted without authorisation by the data “owner”

• Virus or other security attack on IT equipment systems or networks

Page 27: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• “Blagging” offence where information is obtained by deception

• Breaches of physical security e.g. forcing of doors or windows into secure room or filing cabinet containing confidential information left unlocked in accessible area

• Leaving IT equipment unattended when logged-in to a user account without locking the screen to stop others accessing information

Page 28: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Covert or unauthorised recording of meetings and presentations

• Insecure disposal of paper documents or IT and communications equipment allowing others to recover and read confidentialinformation

Page 29: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Why Security?

• Computers and networks are the nerves of thebasic services and critical infrastructures inour society– Financial services and commerce– Transportation– Power grids– Etc.

• Computers and networks are targets of attacksby our adversaries.

Page 30: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• In today's high technology environment, organisations are becoming more and more dependent on their information systems.

• The public is increasingly concerned about the proper use of information, particularly personal data.

• The threats to information systems from criminals and terrorists are increasing.

• Many organisations will identify information as an area of their operation that needs to be protected as part of their system of internal control.

Page 31: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Competitive advantage … is dependent on superior access to information.

• Information is the oxygen of the modern age.• It seeps through the walls topped by barbed wire, it

wafts across the electrified borders.• It is vital to be worried about information security

because much of the value of a business is concentrated in the value of its information.

• Information is, as Grant says, the basis of competitive advantage.

Page 32: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• And in the not-for-profit sector, with increased public awareness of identity theft and the power of information, it is also, the area of an organisation's operations that most needs control.

• Without information, neither businesses nor the not-for-profit sector could function. Valuing and protecting information are crucial tasks for the modern organisation.

Page 33: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Growing IT Security Importance and New Career Opportunities

• The increased risk of cyber-attacks is driving a demand for cyber-security professionals.

• Telecommunications: Network architects are essential to the security infrastructure. Individuals with experience in creating and working with cloud networks—and who understand business processes and network-aware devices—will make the greatest contribution.

Page 34: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Programming: Experience working with secure life cycle development, along with an understanding of coding practices and code review, can translate into all aspects of security analysis—from basic event management to forensics and incident response.

Page 35: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Cloud Storage: As data moves into public and private clouds, professionals who have an understanding of how the cloud is being used from a variety of aspects—such as service planning, architecture and data flow through each layer in the cloud network—may be equipped to handle security and compliance controls.

Page 36: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Database: As we begin to take advantage of big data to analyze historical trends and correlations in our networks and beyond, we need people with a blend of knowledge about database technology, coupled with analytic, statistical and mathematical skills to sort through data elements and find valuable relationships.

Page 37: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Security Pros Need Soft Skills • Cyber-security professionals obviously need a

baseline of technology skills, but on its own, tech savvy is not enough. People in security also need to have soft skills and some distinctive personality traits. These include the following:

Page 38: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Inquisitive minds: Workers who display detective-like thought processes that enable them to analyze how to do and use things differently than intended are often the best analysts, researchers and operational specialists.

Page 39: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Knowledge of psychology, sociology and organizational behavior: With so many vulnerabilities created by human error, it is critical to be well-trained in business processes; be able to think the way users think; and be able to predict how users might deviate from best practices—inadvertently or not.

Page 40: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

cont

• Open-minded nature: The threat landscape changes rapidly. We may need to tear down infrastructure tomorrow that we built today. Cyber-professionals must be able to adapt quickly to situational changes.

Page 41: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Twelve (12) Information Security Principles

• Principle 1: Focus on the Business• Connect with business leaders to make sure

security is a part of business and risk management processes.

Page 42: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 2

• Deliver quality and value:• Communicate with stakeholders so that

changing security requirement can be met and to promote the value of information security both financial and non-financial.

Page 43: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 3

• Comply with relevant legal and regulatory requirement:

• Avoid civil or criminal penalties by identifying compliance obligations and translating the into information security requirements. The penalties should be made clear.

Page 44: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 4

• Accurately report security performance:• Use security metrics such as compliance,

incidents, control status and cost to demonstrate how security performance is helping the company meet its objectives.

Page 45: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 5

• Evaluate current and future threats:• Trends and security threats should be defined

and monitored so that you can address them proactively – before you have a security problem.

Page 46: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 6

• Promote continuous improvement:• Reduce costs, improve efficient and promote

culture of security by sharing information with your organization. Keep your IT department agile and always striving for improvement.

Page 47: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 7

• Adopt a risk-based approach:• Address options for assessing risk and

document procedures in consistent manner. Decide if your plan includes: accepting risk, avoid risk, transferring risk or mitigating risk.

Page 48: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 8

• Protect classified information:• Identify and classify information according to

its level of confidentiality and protect it accordingly through all stages of the information lifecycle.

Page 49: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 9

• Concentrate on critical business applications:• Prioritize security resources to protect

business applications where security incidents would have greatest impact on the business.

Page 50: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 10

• Develop system securely:• Build quality, cost-effective systems that

business can rely on. Make information security an integral part of the design.

Page 51: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 11

• Act in a professional and ethical manner:• Security rely on the ability of your team to

perform duties in a responsible way while understanding the integrity of the information they are protecting. Support respect the needs of the business.

Page 52: CS2216 – PRINCIPLES OF COMPUTER AND NETWORK SECURITY WEEK 1: INFORMATION SECURITY OVERVIEW

Principle 12

• Foster a security-positive culture:• Make information security part of “business-

as-usual”. Educate users on how to protect critical information and systems. Make users aware of the threats and risks they face.