INTRODUCTION TO NETWORK SECURITY. Nischit Vaidya, CISSP Instructor

Similar documents
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Observation and Findings

Security Defense Strategy Basics

Penetration Testing Service. By Comsec Information Security Consulting

DeltaV System Cyber-Security

SCAC Annual Conference. Cybersecurity Demystified

CS Ethical Hacking Spring 2016

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

Cybersecurity Definitions and Academic Landscape

ABB s approach concerning IS Security for Automation Systems

COB 302 Management Information System (Lesson 8)

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

EC-Council. Certified Ethical Hacker. Program Brochure

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Cybersecurity: What CFO s Need to Know

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

SECURITY CONSIDERATIONS FOR LAW FIRMS

Five keys to a more secure data environment

E Governance Security Standards Framework:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

N-Dimension Solutions Cyber Security for Utilities

Information Security Policy

CPSC 467: Cryptography and Computer Security

Chapter 11 Cloud Application Development

Top five strategies for combating modern threats Is anti-virus dead?

Network Security. Instructor: Adam Hahn

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Intrusion Detection for Mobile Ad Hoc Networks

Protect Web Sites from Cyber Attacks

Information Blue Valley Schools FEBRUARY 2015

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Cryptography and Network Security Chapter 1

CMPT 471 Networking II

How To Perform An External Security Vulnerability Assessment Of An External Computer System

CSC 474 Information Systems Security

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

CyberNEXS Global Services

INFORMATION TECHNOLOGY ENGINEER V

COSC 472 Network Security

The Protection Mission a constant endeavor

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

DATABASE SECURITY, INTEGRITY AND RECOVERY

Information Systems Security Certificate Program

Cryptography and Network Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Protecting Organizations from Cyber Attack

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

Department of Education. Network Security Controls. Information Technology Audit

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

Reference Architecture: Enterprise Security For The Cloud

Data Security Incident Response Plan. [Insert Organization Name]

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Basics of Internet Security

Defending Against Data Beaches: Internal Controls for Cybersecurity

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Deploying Firewalls Throughout Your Organization

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Security Transcends Technology

8. Firewall Design & Implementation

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

John P Zelsnack CISSP/CISM/CRISC/Securty+/ITILv3 Senior Technical Manager/Cyber Security Engineer General Dynamics - Advanced Information Systems

Common Cyber Threats. Common cyber threats include:

The Human Firewall How Security Awareness Impacts Your Control Environment

BM482E Introduction to Computer Security

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

SECURITY ISSUES INTERNET WORLD WIDE WEB FOR THE AND THE

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Internet Safety and Security: Strategies for Building an Internet Safety Wall

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Transcription:

INTRODUCTION TO NETWORK SECURITY Nischit Vaidya, CISSP Instructor COPYRIGHT ARGOTIS, INC. 2 0 1 3 1

INSTRUCTOR BIOGRAPHY Nischit Vaidya, CISSP, Security+ President/CEO of Argotis, Inc. - Providing Cybersecurity services, solutions, training, and information technology support M.Sc in Information Assurance (Capitol College 2012) B.Sc in Information Assurance (UMUC 2009) 15+ years in the Information Technology Field 3+ years teaching information security at colleges throughout Maryland Currently supporting Department of Defense as an Information Systems Security Engineer (ISSE) COPYRIGHT ARGOTIS, INC. 2 0 1 3 2

BEFORE WE BEGIN, LET S TAKE A POP QUIZ What is the biggest threat to a network? A. Virus B. Employees C. Lack of Training D. Hackers COPYRIGHT ARGOTIS, INC. 2 0 1 3 3

ANSWER B. Employees Employees are the biggest threat to the network security.. You may be asking yourself right now, How is this possible? I m an employee and I don t consider myself a threat! We will answer this question for you during this lecture, including helping you understand the purpose of network security COPYRIGHT ARGOTIS, INC. 2 0 1 3 4

LESSON OBJECTIVE Define and Discuss Network Security Define and Discuss the C.I.A triad Define and Discuss Defense-In-Depth Define and Discuss Risk, and insider threats Lesson Summary COPYRIGHT ARGOTIS, INC. 2 0 1 3 5

DEFINING A NETWORK Before we define network security, we need to understand what a network is A network is an internetworking of computers to provide users with information from different locations. Internetworking means connecting computers from different locations together The Internet is an example of a network COPYRIGHT ARGOTIS, INC. 2 0 1 3 6

DEFINING NETWORK SECURITY Network security is the protecting information that is stored on internetworked computers from threats More closely defined, network security is the practice of protecting internetworked computers from unauthorized access, misuse, and denial of service Examples of threats include computer virus and hackers Network Security involves ensuring the C.I.A of information is protected COPYRIGHT ARGOTIS, INC. 2 0 1 3 7

DEFINING THE C.I.A TRIAD Three letters that all network security professionals live by (also known as tenants: C. I. A which stands for: Confidentiality Protecting information from unauthorized access and disclosure Integrity Maintaining and assuring the accuracy of the information that is accessed Availability The information is readily available when authorized users need to access it Finding a balance in protecting these three tenants equals a balanced network security process COPYRIGHT ARGOTIS, INC. 2 0 1 3 8

DEFENSE IN DEPTH Defense in depth is what can help a network security professional ensure that the CIA of an information system is protected Defense-In-Depth (DiD) means applying a layered approach in providing a strong network security process A castle is an example of a Defense-In-Depth strategy Moat, drawbridge, guards, before access into the castle COPYRIGHT ARGOTIS, INC. 2 0 1 3 9

DEFENSE IN DEPTH In the computer world a defense-in-depth process is defined as having layers of security protecting the data A very basic structure would be the following: Internet => Router => Firewall => Intrusion Detection System => Anti-virus => Data on the computer Firewall, Intrusion Detection System, Routers are all security devices that control the information that comes in and goes out of the network. Good DiD implementation would make it much harder for an attacker to penetrate a network COPYRIGHT ARGOTIS, INC. 2 0 1 3 10

DEFINING RISK How would I know to implement a Defense-In-Depth security approach? This is accomplished by performing a risk assessment, which is the first step in implementing security Risk is defined as an action or activity that can lead to an intended or unintended harm and/or loss An information security professional uses a formula to ascertain risk prior to recommending a defense-in-depth solution Risk = Threat (x) Vulnerability Threat = the act that elicit the negative response Vulnerability = the weakness that the threat can compromise or take advantage of There is more detail about risk assessments and management we will discuss later in the course COPYRIGHT ARGOTIS, INC. 2 0 1 3 11

DISCUSSING RISK AND INSIDER THREAT We started our lecture with a quiz about employees being the biggest threat to a organization Employees have the most access to the organization s data including the inner working of their security structure Recall from our Risk slide about what a threat is, and employees pose the biggest threat due to their access Employees are known as insider threat COPYRIGHT ARGOTIS, INC. 2 0 1 3 12

SUMMARY Information security involves many facets in order to ensure that our data is protected In this lesson we learned about insider threats such as employees, defined risk, learned about defense-in-depth, and learned the basic security principle of the CIA Triad. Are there any questions? COPYRIGHT ARGOTIS, INC. 2 0 1 3 13