Chapter 1: Information Security Fundamentals. Security+ Guide to Network Security Fundamentals Second Edition



Similar documents
The Business Case for Security Information Management

Securing Critical Information Assets: A Business Case for Managed Security Services

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

UF IT Risk Assessment Standard

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

CPSC 467: Cryptography and Computer Security

Information Security and Risk Management

Information Technology Risk Management

Security Controls What Works. Southside Virginia Community College: Security Awareness

Information Technology Security Review April 16, 2012

What is required of a compliant Risk Assessment?

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA Security Rule Compliance

Data Management & Protection: Common Definitions

The Value of Vulnerability Management*

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Cyber R &D Research Roundtable

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Vulnerability Management Policy

HIPAA Compliance Guide

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

AUTOMATED PENETRATION TESTING PRODUCTS

HIPAA Compliance Guide

Network Security: Policies and Guidelines for Effective Network Management

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

FACT SHEET: Ransomware and HIPAA

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

AUTOMATED PENETRATION TESTING PRODUCTS

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

SECURITY. Risk & Compliance Services

Information Security for Managers

Information Security Services

HIPAA Security Alert

Data Management Policies. Sage ERP Online

Big Data, Big Risk, Big Rewards. Hussein Syed

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

IT Security Management Risk Analysis and Controls

Cyber Security a Global Challenge; What and how Thailand is doing

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Securing Data on Portable Media.

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

Computer Security: Principles and Practice

CSC 474 Information Systems Security

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

10 Smart Ideas for. Keeping Data Safe. From Hackers

Overview of the HIPAA Security Rule

Third Party Security Requirements Policy

Datto Compliance 101 1

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

Network and Workstation Acceptable Use Policy

Cybersecurity Awareness. Part 1

Compliance and Industry Regulations

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

HIPAA: In Plain English

Compliance in 5 Steps

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Comprehensive Approach to Database Security

HIPAA: Privacy/Info Security

Risk Assessment Guide

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Transcription:

Chapter 1: Information Security Fundamentals Fundamentals Second Edition

Objectives Identify the challenges for information security Define information security Explain the importance of information security List and define information security terminology Describe the CompTIA Security+ certification exam Describe information security careers

Identifying the Challenges for Information Security Challenge of keeping networks and computers secure has never been greater A number of trends illustrate why security is becoming increasingly difficult Many trends have resulted in security attacks growing at an alarming rate

Identifying the Challenges for Information Security (continued) Computer Emergency Response Team (CERT) security organization compiles statistics regarding number of reported attacks, including: Speed of attacks Sophistication of attacks Faster detection of weaknesses Distributed attacks Difficulties of patching

Identifying the Challenges for Information Security (continued)

Identifying the Challenges for Information Security (continued)

Defining Information Security Information security: (continued) Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network spacing

Defining Information Security (continued) Ensures that protective measures are properly implemented Is intended to protect information Involves more than protecting the information itself

Defining Information Security Information security is intended to protect information that has value to people and organizations This value comes from the characteristics of the information: Confidentiality Integrity Availability (continued) Information security is achieved through a combination of three entities

Defining Information Security (continued) Confidentiality: Prevention of unauthorized disclosure of information. Or keeping unwanted parties from accessing assets of a computer system Also known as: secrecy or privacy Integrity: Prevention of unauthorized modification of information. Availability: Prevention of unauthorized withholding of information or resources. Or keeping system available

Defining Information Security (continued)

Defining Information Security (continued)

Defining Information Security (continued) A more comprehensive definition of information security is: That which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures

Understanding the Importance of Information Security Information security is important to businesses: Prevents data theft Avoids legal consequences of not securing information Maintains productivity Foils cyberterrorism Thwarts identity theft

Preventing Data Theft Security often associated with theft prevention Drivers install security systems on their cars to prevent the cars from being stolen Same is true with information securitybusinesses cite preventing data theft as primary goal of information security

Preventing Data Theft (continued) Theft of data is single largest cause of financial loss due to a security breach One of the most important objectives of information security is to protect important business and personal data from theft

Avoiding Legal Consequences Businesses that fail to protect data may face serious penalties Laws include: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) The Sarbanes-Oxley Act of 2002 (Sarbox) The Cramm-Leach-Blilely Act (GLBA) USA PATRIOT Act 2001

Maintaining Productivity After an attack on information security, clean-up efforts divert resources, such as time and money away from normal activities A Corporate IT Forum survey of major corporations showed: Each attack costs a company an average of $213,000 in lost man-hours and related costs One-third of corporations reported an average of more than 3,000 man-hours lost

Maintaining Productivity (continued)

Foiling Cyberterrorism An area of growing concern among defense experts are surprise attacks by terrorist groups using computer technology and the Internet (cyberterrorism) These attacks could cripple a nation s electronic and commercial infrastructure Our challenge in combating cyberterrorism is that many prime targets are not owned and managed by the federal government

Thwarting Identity Theft Identity theft involves using someone s personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating National, state, and local legislation continues to be enacted to deal with this growing problem The Fair and Accurate Credit Transactions Act of 2003 is a federal law that addresses identity theft

Asset Information Security Terminology (continued) Something that has a value Threat An event or object that may defeat the security measures in place and result in a loss Threat agent A person or thing that has the power to carry out a threat Fundamentals, Third Edition

Information Security Terminology (continued) Vulnerability Weakness that allows a threat agent to bypass security Risk The likelihood that a threat agent will exploit a vulnerability Realistically, risk cannot ever be entirely eliminated Fundamentals, Third Edition

Information Security Terminology (continued) Fundamentals, Third Edition

Information Security Terminology (continued) Fundamentals, Third Edition

Exploring the CompTIA Security+ Certification Exam (continued) Since 1982, the Computing Technology Industry Association (CompTIA) has been working to advance the growth of the IT industry CompTIA is the world s largest developer of vendorneutral IT certification exams The CompTIA Security+ certification tests for mastery in security concepts and practices

Exploring the CompTIA Security+ Certification Exam (continued) The Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge Used by organizations and security professionals around the world The six domains covered by the Security+ exam: Systems Security, Network Infrastructure, Access Control, Assessments and Audits, Cryptography, and Organizational Security

Surveying Information Security Careers Information security is one of the fastest growing career fields As information attacks increase, companies are becoming more aware of their vulnerabilities and are looking for ways to reduce their risks and liabilities

Surveying Information Security Careers (continued) Sometimes divided into three general roles: Security manager develops corporate security plans and policies, provides education and awareness, and communicates with executive management about security issues Security engineer designs, builds, and tests security solutions to meet policies and address business needs Security administrator configures and maintains security solutions to ensure proper service levels and availability

Summary The challenge of keeping computers secure is becoming increasingly difficult Attacks can be launched without human intervention and infect millions of computers in a few hours Information security protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures

Summary (continued) Information security has its own set of terminology A threat is an event or an action that can defeat security measures and result in a loss Many organizations use the CompTIA Security+ certification to verify security competency