Introduction To Computer & Systems Security
Introduction To Computer & Systems Security
CONIDENTIALITY
Confidentiality is the concealment of information or
resources.
3
Security cont./
INTEGRITY
Integrity refers to the trustworthiness of data or
resource desired.
5
Concepts
AccessControl : The process of limiting access to the
resources of a system to only authorised persons,
programs, processes, or other systems.
6
Security appliances & applications
Firewall: A firewall can be either software or hardware that
is installed to separate a trusted network from a less-
trusted network.
9
Types of Attacks
Passive Attacks
• Involves monitoring or eavesdropping on
or systems.
Active Attacks
• Involves direct interaction, altering or disrupting data
or systems.
• Modify data, disrupt communication, or take control
of systems.
• Easier to detect due to changes in data or network
operations.
10
Attacks
There are three main classes of attacks that are commonly
found in today’s network environment:
• Access attacks
• Reconnaissance attacks
• Denial of service (DoS) attacks
ACCESS ATTACKS
This is an attempt to access another user account or
13
Attacks cont./
DDoS
With Distributed DoS, multiple systems are compromised to send a DoS
attack to a specific target.
The compromised systems are commonly called zombies or slaves.
As a result of the attack, the targeted system denies service to valid
users.
14
Attacks cont./
TCP SYN
In a TCP SYN attack, a SYN request is sent to a device with a
spoofed source IP address. The attacking system does not
acknowledge the resulting SYN-ACK, which causes the session
connection queues to fill up and stop taking new connection
requests.
15
Establishing a Security
Policy
A security policy defines:
◦ Organization’s security requirements
◦ Controls and sanctions needed to meet the
requirements
Security policies are formal rules and
guidelines dictating how an
organization's IT resources and
sensitive data should be protected.
Ensure consistent behavior, guide
17
Establishing a Security Policy
(cont’d.)
Steps in Designing Security Policies:
Identify assets to be protected.
Conduct a risk assessment to identify
policy.
Involve stakeholders in the policy
creation process.
Regularly review and update the policy.
18
Educating Employees, Contractors,
and Part-Time Workers
Educate and motivate users to
understand and follow policy
Discuss recent security incidents
Help protect information systems by:
◦ Guarding passwords
◦ Not allowing sharing of passwords
◦ Applying strict access controls to protect
data
◦ Reporting all unusual activity
◦ Protecting portable computing and data
storage devices
19
Detection
Detection systems
◦ Catch intruders in the act
Intrusion detection system
◦ Monitors system/network resources and
activities
◦ Notifies the proper authority when it
identifies:
Possible intrusions from outside the
organization
Misuse from within the organization
◦ Knowledge-based approach
◦ Behavior-based approach
20
Detection Key components
Monitoring Systems
Alerting Mechanisms
Behavioral Analytics
Log Analysis:
21
Prevention
Implement a layered security solution
◦ Make computer break-ins harder
Installing a corporate firewall
◦ Limits network access
Intrusion prevention systems
◦ Block viruses, malformed packets, and other
threats
Installing antivirus software
◦ Scans for sequence of bytes or virus signature
◦ United States Computer Emergency Readiness
Team (US-CERT) serves as clearinghouse
22
Prevention
Access Control
Patch Management
Firewall and Perimeter
Encryption
Security Awareness Training
Regular Security Audits and
Vulnerability Assessments
End point Protection
23
Response
Response plan
◦ Develop well in advance of any incident
◦ Approved by:
Legal department
Senior management
Primary goals
◦ Regain control and limit damage
◦ Not to monitor or catch an intruder
24
Response (cont’d.)
Review
◦ Determine exactly what happened
◦ Evaluate how the organization responded
Weigh carefully the amount of effort
required to capture the perpetrator
Consider the potential for negative
publicity
Legal precedent
25
Response Key components
Incident Containment
Eradication
Recovery
Communication
Post-Incident Review (Lessons Learned)
26
Key considerations in
Implementing Security Policies
Ensure management buy-in and
support.
Communicate the policy to all
employees.
Provide training on the policy.
Monitor compliance and enforce the
policy.
27
Risk Management
Process of identifying, assessing, and
mitigating security risks to protect an
organization's assets.
28
Key Elements of Risk
Management
• Risk Identification: Identify assets and
potential threats (e.g., cyber-attacks,
insider threats, natural disasters).
• Risk Assessment: Determine the
likelihood and impact of identified risks.
• Risk Mitigation: Implement controls to
reduce risk (e.g., firewalls, encryption,
access controls).
• Risk Monitoring: Continuously monitor
and review risks to address new threats.
29
Vulnerability Assessments
Identify and evaluate security
weaknesses in a system.
◦ Scanning for vulnerabilities (e.g., software
flaws, outdated systems).
◦ Evaluating the impact of discovered
vulnerabilities.
◦ Providing recommendations for fixing
vulnerabilities.
30
Penetration Testing
Simulates real-world attacks to identify
exploitable vulnerabilities.
External (from outside the network) and
31
Security Audits
Assess overall security posture and
compliance with policies/regulations.
Internal audits (by the organization)
and
external audits (by third parties).
32
The End
Questions??