Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.



Similar documents
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Exam 1 - CSIS 3755 Information Assurance

Risk Management Guide for Information Technology Systems. NIST SP Overview

Computer Security: Principles and Practice

ISO Information Security Management Systems Foundation

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Network Security: Introduction

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

A Decision Maker s Guide to Securing an IT Infrastructure

Cybersecurity and internal audit. August 15, 2014

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Hackers: Detection and Prevention

A Systems Engineering Approach to Developing Cyber Security Professionals

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Cyber Security for SCADA/ICS Networks

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Information Systems Security Certificate Program

Wireless Network Security

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Vulnerability Assessments in Ethical Hacking

Security within a development lifecycle. Enhancing product security through development process improvement

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

The Protection Mission a constant endeavor

Cyber R &D Research Roundtable

Computer Networks & Computer Security

FERPA: Data & Transport Security Best Practices

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Bellevue University Cybersecurity Programs & Courses

Penetration Testing Service. By Comsec Information Security Consulting

Information Security Awareness Training

InfoSec Academy Application & Secure Code Track

Radware s Behavioral Server Cracking Protection

Security Controls What Works. Southside Virginia Community College: Security Awareness

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Network & Information Security Policy

Introduction to Cyber Security / Information Security

Secure Web Applications. The front line defense

Cryptography and Network Security

ISO Controls and Objectives

Information Security Office

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

IT Security Management 100 Success Secrets

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Information Security and Risk Management

NETWORK SECURITY ASPECTS & VULNERABILITIES

Data Security Incident Response Plan. [Insert Organization Name]

External Penetration Assessment and Database Access Review

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Cyber security trends & strategy for business (digital?)

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

locuz.com Professional Services Security Audit Services

What Directors need to know about Cybersecurity?

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Information Security Organizations trends are becoming increasingly reliant upon information technology in

10 Smart Ideas for. Keeping Data Safe. From Hackers

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Common Cyber Threats. Common cyber threats include:

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Web Engineering Web Application Security Issues

CRYPTUS DIPLOMA IN IT SECURITY

Reducing Application Vulnerabilities by Security Engineering

Network Security. Network Security Hierarchy. CISCO Security Curriculum

FORBIDDEN - Ethical Hacking Workshop Duration

Penetration testing & Ethical Hacking. Security Week 2014

CSC 474 Information Systems Security

Five keys to a more secure data environment

IY2760/CS3760: Part 6. IY2760: Part 6

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Loophole+ with Ethical Hacking and Penetration Testing

CYBER SECURITY GUIDANCE

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

Penetration Testing //Vulnerability Assessment //Remedy

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Unit 3 Cyber security

Minnesota State Community and Technical College Detroit Lakes Campus

Security + Certification (ITSY 1076) Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

INFORMATION SECURITY STRATEGIC PLAN

Transcription:

Principle of Information Security Asst. Prof. Kemathat Vibhatavanij Ph.D.

Security Challenges Evolution of technology focused on ease of use Compliance to government laws and regulations Direct impact of security breach on corporate asset base and goodwill Increased number of network-based applications Increasing complexity of computer infrastructure administration and management It is difficult to centralize security in a distributed computing environment

Information Security Threats Threat: A potential cause of an incident that may result in harm of systems and organization Natural threats Natural disasters e.g. floods, earthquakes, hurricanes Physical security threats Physical intrusion, loss or damage of system resources, sabotage Human threats Hackers, insiders, social engineering, lack of knowledge and awareness

Threats to an organization

Who is a hacker? Definition A person who ILLEGALLY BREAKS into a system or network WITHOUT ANY AUTHORIZATION to destroy, steal or perform malicious attacks Purpose of breaking systems Test his/her skill Hobby Gain knowledge and poking (intruding) Malicious intention

What does a hacker do? Reconnaissance Scanning Gaining access Maintaining access Covering track

Reconnaissance The meaning (preparatory phase) an attacker seeks to gather info. about a target prior to launching an attack The type Passive reconnaissance Acquire w/o interacting with the target Active reconnaissance Involve interacting with the target

Scanning Pre-attack phase Port scanner Scan the network for specific info. Use efficient tools to scan port/vulnerabilities Extract information Extracting information from scanning result

Gaining access

Maintaining access Attacker tries to RETAIN his/her ownership of the system Prevent attack from other attacker or the REAL system owner Attacker can upload download or manipulate data, applications or configuration on the owned system Use the compromised system to lunch further attack

Covering track

Effect of hacking, an Example

Secure our information, don t we?

Info. Sec. is everyone s responsibility

Security Awareness from Personal

To Enterprise

Security goals Maintain Confidentiality Integrity Protect Disclosure Modification Loss of availability Availability

Element of Information Security Confidentiality: accessed by those who have authorization Integrity: trustworthiness/preventing from improper and unauthorized changes Availability: assuring for delivering, storing and processing Authenticity: ensure the quality of being genuine Non-Repudiation: ensure that a party to a contract cannot deny the authenticity

SFU triangle

InfoSec and Org.Mgmt. Strategic management Vision, mission, core value Strategic and operational plan Risk management Known threats Unknown/Incident threats Business continuity Contingency plan

A requirement from professionals Information security and risk management Access control Cryptography Physical security Security architecture and design Business continuity and disaster recovery planning Telecommunication and network security Application security Operation security Legal, regulation, compliance and investigation

Types of Hacker Coders The programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes Admins The computer guys who use the tools and exploits prepared by the coders Script Kiddies The bunnies who use script and programs developed by others to attack computer systems and networks

Types of Hacker White Hat Hacker A computer guy who perform Ethical Hacking Black Hat Hacker A computer guy who performs Unethical Hacking Grey Hat Hacker A computer guy who sometimes acts legally, sometimes in good will, and sometimes not

Types of Hacker Hacktivist A person who try to broadcast political or social messages through their work to raise public awareness of an issue Cyber Terrorist A person who attack government computers or public utility infrastructures, crash critical systems or steal classified information.

Hackmagedon.com

Hackmagedon.com

Hackmagedon.com

Hackmagedon.com

Hackmagedon.com

Obstacles to the security Security is inconvenient Computers are powerful and complex Computer users are unsophisticated Computers created w/o a thought to security Current trend is to share, not protect Data accessible from anywhere Security is not about HW and SW The bad guys are very sophisticated Mgmt. sees security as a drain on the bottom line

Management Technics Two domains of knowledge ISMS Role and responsibility Risk management Resources management HR Framework, Policy Business Continuity Management Legal issues Protocol Cryptography AAA IEEE 802.1x WPA2 SSH SSL, VPN Penetration test Network monitoring

ISO 27000 series ISO/IEC 27000: Overview and vocabulary ISO/IEC 27001: Requirements ISO/IEC 27002: Code of practice for ISM ISO/IEC 27003: ISMS Implementation guidance ISO/IEC 27004: ISM Measurement ISO/IEC 27005: Information security risk management ISO/IEC 27006: Requirements for bodies providing audit and certification of ISMS ISO/IEC 27007: Guidelines for ISMS auditing ISO/IEC 27014: Information security governance

ISO 27001 (Information Security Management System) Intention To harmonize 27001 with other MgmtSysStd ISO/IEC 9000 Quality mgmt. sys. ISO/IEC 14000 Environmental mgmt. sys. Common model for Implementing ISMS Operating ISMS Monitoring ISMS operation Improving ISMS operation

ISO 27002: Code of Practice Risk assessment Security policy Organization of information security Asset management Human resource security Physical and environment security Communications and operations mgmt. Access control Information System acquisition development and maintenance Information security incident management Business continuity management Compliance

Ten steps building a secure org. Evaluate the risks and threats Beware of common misconception Provide security training for IT staff Think Outside the box Develop a culture of Security Identify and utilize built-in security features of the OS and applications Monitor systems Hire a third party to audit security Don t forget the basics

PDCA Plan for changes to bring about improvement Do changes on a small scale first to try them out Plan Do Act Check Act to get the greatest benefit from changes Check to see if changes are working and to investigate selected processes

Senior management Admin. support and technician Security professionals CEO, CRO, CFO, CIO, CISO Champion, team leader, manager Security policy developers Risk assessment specialists Security professionals System administrators End users

Info. Tech Law พรบ. ว าด วยธ รกรรมทางอ เลคทรอน กส พ.ศ. ๒๕๔๔ และฉบ บแก ไขเพ มเต ม (ฉบ บท ๒) พ.ศ. ๒๕๕๑ พรบ. ว าด วยการกระท าความผ ด เก ยวก บคอมพ วเตอร พ.ศ. ๒๕๕๐ พรฎ. ก าหนดประเภทธ รกรรมในทาง แพ งและพาณ ชย ท ยกเว นม ให น า กฎหมายว าด วยธ รกรรมทาง อ เลคทรอน กส มาใช บ งค บ พ.ศ. ๒๕๔๙ พรฎ. ก าหนดหล กเกณฑ และว ธ การใน การท าธ รกรรมทางอ เลคทรอน กส ภาคร ฐ พ.ศ. ๒๕๔๙ พรฎ. ว าด วยการควบค มด แลธ รก จ บร การการช าระเง นทางอ เลคทรอน กส พ.ศ. ๒๕๕๑ พรฎ. ว าด วยว ธ การแบบปลอดภ ยใน การท าธ รกรรมทางอ เลคทรอน กส พ.ศ. ๒๕๕๓

Community of interest Group of individuals united by similar interests/values within an organization Information security management and professionals Information technology management and professionals Organizational management and professionals

End of lecture_1