Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
21 views

Introduction To Computer & Systems Security

Uploaded by

edmore025
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Introduction To Computer & Systems Security

Uploaded by

edmore025
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

Introduction to

computer & systems


security
What is security?
 Security is management of access to a resource of a
system.

 A complete understanding of security should address


the following:
How does the system work?
How is the system vulnerable and what are the
threats?
How do we prevent harm to the system?
How do we detect and respond to attacks on the
system?

 An attack on a system is simply an unauthorised


access or an attempt to access a resource where no
access is permitted. 2
Security cont./
 Computer security rests on confidentiality, integrity, and
availability.

CONIDENTIALITY
 Confidentiality is the concealment of information or

resources.

 Access control mechanisms support confidentiality.

 One access control mechanism for preserving confidentiality


is cryptography, which scrambles data to make it
incomprehensible.

3
Security cont./
INTEGRITY
 Integrity refers to the trustworthiness of data or

resources, and is usually phrased in terms of preventing


improper or unauthorised change.

 Integrity mechanisms fall into two classes: prevention


mechanisms and detection mechanisms.

 Prevention mechanisms seek to maintain data integrity by


blocking any unauthorised attempts to change the data or
any attempts to change the data in unauthorised ways.

 Detection mechanisms do not try to prevent violations of


integrity; they simply report that the data's integrity is no
longer trustworthy. 4
Security cont./
AVAILABILITY
 Availability refers to the ability to use the information or

resource desired.

 Availability is an important aspect of reliability because an


unavailable system is at least as bad as no system at all.

 The aspect of availability that is relevant to security is that


someone may deliberately deny access to data or to a
service by making it unavailable.

 DoS (denial of service) is a type of attack that makes


data or a resource unavailable when it’s not supposed to.

5
Concepts
 AccessControl : The process of limiting access to the
resources of a system to only authorised persons,
programs, processes, or other systems.

 Authentication : The process to verify the identity of a


user, device, or other entity in a computer system,
often as a prerequisite to allowing access to resources.

 Non-repudiation : Method by which the sender is


provided with proof of delivery and the recipient is
assured of the sender’s identity, so that neither can
later deny having processed the data.

6
Security appliances & applications
 Firewall: A firewall can be either software or hardware that
is installed to separate a trusted network from a less-
trusted network.

 Firewalls in form of hardware (with integrated software) are


installed on networks and are usually configurable.

 Personal firewalls are in software form and reside on a host.

 A firewall monitors traffic entering or leaving either a


network or a machine and either allows or blocks traffic
based on a policy.

 A firewall will by default discard all inbound


connections/traffic that's not in response to outbound
connections/traffic. 7
Intrusion Detection/Prevention Systems

 A network intrusion is an unauthorised penetration


of a computer/system of an assigned domain.

 Intrusion Prevention System (IPS): IPS is an


active device that listens promiscuously to all
incoming traffic to identify intrusions. It works with
the firewall to modify rule templates to block traffic
from the intruder address(es) while the intrusion is
still in progress.

 Intrusion Detection System (IDS): IDS is a


passive device that listens promiscuously to all
incoming traffic to record and generate alerts and
issue TCP resets if necessary. 8
Threats
 Threats are potential dangers.
 Attacks are actions that exploit vulnerabilities.
 Attackers are individuals performing attacks.
 Hackers are individuals with high technical skills

(can be ethical or malicious).


• White Hat Hackers (Ethical Hackers)
• Black Hat Hackers (Malicious Hackers)
• Gray Hat Hackers
 Crackersare malicious individuals focused on
breaking security measures.

9
Types of Attacks
Passive Attacks
• Involves monitoring or eavesdropping on

communication without altering data.


• Information gathering or surveillance.

• Difficult to detect since no changes are made to data

or systems.
Active Attacks
• Involves direct interaction, altering or disrupting data

or systems.
• Modify data, disrupt communication, or take control

of systems.
• Easier to detect due to changes in data or network

operations.
10
Attacks
 There are three main classes of attacks that are commonly
found in today’s network environment:
• Access attacks
• Reconnaissance attacks
• Denial of service (DoS) attacks

ACCESS ATTACKS
 This is an attempt to access another user account or

network device through improper means.

 Unauthorized attacks are attempted via four means, all of


which try to by-pass some facet of the authentication
process:
(1) Password attacks (2) Trust exploitation
(3) Port redirection (4) Man-in-the-middle (MITM)
attacks. 11
Attacks cont./
RECONNAISSANCE ATTACKS
 The attacker surveys a network and collects data for a

future attack. Such information includes the following:


 Ports open on a server
 Ports open on a firewall
 IP addresses on the host network
 Hostnames associated with the IP addresses

 The four main subcategories or methods for gathering


network data:
(1) Packet sniffers (2) Ping sweeps
(3) Port scans (4) Information queries

Examples of utilities/programs that exploit the above


include: Wireshark, Ettercap, BackTrack, nmap etc. 12
Attacks cont./
DENIAL OF SERVICE (DoS) ATTACKS
 DoS attacks are often implemented by a attackers as a

means of denying a service that is normally available to a


user or organization.

 The three main forms of DoS are:


(1) Distributed DoS (DDoS) attack, (2) TCP SYN attack (3)
Smurf attack.

13
Attacks cont./
 DDoS
With Distributed DoS, multiple systems are compromised to send a DoS
attack to a specific target.
 The compromised systems are commonly called zombies or slaves.
 As a result of the attack, the targeted system denies service to valid
users.

14
Attacks cont./
TCP SYN
 In a TCP SYN attack, a SYN request is sent to a device with a
spoofed source IP address. The attacking system does not
acknowledge the resulting SYN-ACK, which causes the session
connection queues to fill up and stop taking new connection
requests.

15
Establishing a Security
Policy
 A security policy defines:
◦ Organization’s security requirements
◦ Controls and sanctions needed to meet the
requirements
 Security policies are formal rules and
guidelines dictating how an
organization's IT resources and
sensitive data should be protected.
 Ensure consistent behavior, guide

employee actions, protect assets, and


mitigate risks.
16
Establishing a Security Policy
(cont’d.)
 Areas of concern
◦ Email attachments
◦ Wireless devices
 VPN uses the Internet to relay
communications but maintains privacy
through security features
 Additional security includes encrypting

originating and receiving network


addresses

17
Establishing a Security Policy
(cont’d.)
Steps in Designing Security Policies:
 Identify assets to be protected.
 Conduct a risk assessment to identify

potential threats and vulnerabilities.


 Define the scope and objectives of the

policy.
 Involve stakeholders in the policy

creation process.
 Regularly review and update the policy.

18
Educating Employees, Contractors,
and Part-Time Workers
 Educate and motivate users to
understand and follow policy
 Discuss recent security incidents
 Help protect information systems by:

◦ Guarding passwords
◦ Not allowing sharing of passwords
◦ Applying strict access controls to protect
data
◦ Reporting all unusual activity
◦ Protecting portable computing and data
storage devices

19
Detection
 Detection systems
◦ Catch intruders in the act
 Intrusion detection system
◦ Monitors system/network resources and
activities
◦ Notifies the proper authority when it
identifies:
 Possible intrusions from outside the
organization
 Misuse from within the organization
◦ Knowledge-based approach
◦ Behavior-based approach
20
Detection Key components
 Monitoring Systems
 Alerting Mechanisms
 Behavioral Analytics
 Log Analysis:

21
Prevention
 Implement a layered security solution
◦ Make computer break-ins harder
 Installing a corporate firewall
◦ Limits network access
 Intrusion prevention systems
◦ Block viruses, malformed packets, and other
threats
 Installing antivirus software
◦ Scans for sequence of bytes or virus signature
◦ United States Computer Emergency Readiness
Team (US-CERT) serves as clearinghouse

22
Prevention
 Access Control
 Patch Management
 Firewall and Perimeter
 Encryption
 Security Awareness Training
 Regular Security Audits and

Vulnerability Assessments
 End point Protection

23
Response
 Response plan
◦ Develop well in advance of any incident
◦ Approved by:
 Legal department
 Senior management
 Primary goals
◦ Regain control and limit damage
◦ Not to monitor or catch an intruder

24
Response (cont’d.)
 Review
◦ Determine exactly what happened
◦ Evaluate how the organization responded
 Weigh carefully the amount of effort
required to capture the perpetrator
 Consider the potential for negative

publicity
 Legal precedent

◦ Hold organizations accountable for their own


IT security weaknesses

25
Response Key components
 Incident Containment
 Eradication
 Recovery
 Communication
 Post-Incident Review (Lessons Learned)

26
Key considerations in
Implementing Security Policies
 Ensure management buy-in and
support.
 Communicate the policy to all

employees.
 Provide training on the policy.
 Monitor compliance and enforce the

policy.

27
Risk Management
 Process of identifying, assessing, and
mitigating security risks to protect an
organization's assets.

28
Key Elements of Risk
Management
• Risk Identification: Identify assets and
potential threats (e.g., cyber-attacks,
insider threats, natural disasters).
• Risk Assessment: Determine the
likelihood and impact of identified risks.
• Risk Mitigation: Implement controls to
reduce risk (e.g., firewalls, encryption,
access controls).
• Risk Monitoring: Continuously monitor
and review risks to address new threats.

29
Vulnerability Assessments
 Identify and evaluate security
weaknesses in a system.
◦ Scanning for vulnerabilities (e.g., software
flaws, outdated systems).
◦ Evaluating the impact of discovered
vulnerabilities.
◦ Providing recommendations for fixing
vulnerabilities.

30
Penetration Testing
 Simulates real-world attacks to identify
exploitable vulnerabilities.
 External (from outside the network) and

internal (from within the network).


◦ Planning and reconnaissance.
◦ Scanning and gaining access.
◦ Maintaining access and exploitation.
◦ Reporting findings and remediation
suggestions.

31
Security Audits
 Assess overall security posture and
compliance with policies/regulations.
 Internal audits (by the organization)

and
 external audits (by third parties).

◦ Review of policies, procedures, and technical


controls.
◦ Assessment of security configurations and
access controls.
◦ Reporting compliance gaps and
recommendations.

32
The End

Questions??

You might also like