Similar documents
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

CHAPTER 10: COMPUTER SECURITY AND RISKS

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Network Incident Report

Managed Security Services

COB 302 Management Information System (Lesson 8)

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Cyber Security Awareness

Information Security

COSC 472 Network Security

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Security Policy JUNE 1, SalesNOW. Security Policy v v

Computer Networks & Computer Security

Loophole+ with Ethical Hacking and Penetration Testing

FORBIDDEN - Ethical Hacking Workshop Duration

Network Security: Introduction

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Information Technology Security Procedures

Course: Information Security Management in e-governance

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Cyber Security Awareness

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Hackers: Detection and Prevention

Chapter 8: Security Measures Test your knowledge

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

information security and its Describe what drives the need for information security.

The Self-Hack Audit Stephen James Payoff

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Security Goals Services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Common Cyber Threats. Common cyber threats include:

Section 12 MUST BE COMPLETED BY: 4/22

Firewalls, Tunnels, and Network Intrusion Detection

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Banking Security using Honeypot

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Cisco Advanced Services for Network Security

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Computer Viruses: How to Avoid Infection

Firewalls for small business

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

CISCO IOS NETWORK SECURITY (IINS)

Ethical Hacking Course Layout

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

HIPAA Security COMPLIANCE Checklist For Employers

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Chapter 7 Information System Security and Control

By David G. Holmberg, Ph.D., Member ASHRAE

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Best Practices For Department Server and Enterprise System Checklist

TELE 301 Network Management. Lecture 18: Network Security

PC Security and Maintenance

Data Security Incident Response Plan. [Insert Organization Name]

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Security Issues with Integrated Smart Buildings

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Cybersecurity Best Practices

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Ovation Security Center Data Sheet

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Detailed Description about course module wise:

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS5008: Internet Computing

3.2 Current developmental situation of computer network security

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Top tips for improved network security

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Introduction to Computer Security Table of Contents

Ovation Security Center Data Sheet

DEVELOPING A NETWORK SECURITY PLAN

Getting a Secure Intranet

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Data Management & Protection: Common Definitions

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Content Teaching Academy at James Madison University

Transcription:

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com

Outline of Information Security Introduction Impact of information Need of Information Security. Objectives of Information Security. Areas of Information Security. Types of attackers Why attacks? Methods of Attacking on the Information Methods of Defending the Information Tips for the Information Security

Introduction Information Security is a complicated area and can be addressed by well-trained and experienced Professionals. When there is an attack on the system with the help of different threats, it means that our system is working very slowly, damaged and our information are unsecured is called Information insecurity. This is a very big problem. The Information Security is the solution for it.

Importance of Information Our work is based on records (information). We spend minimum half our day with documents 15% of Rs. spent managing documents. Can t work without data, record or information

Need of Information Security To privacy of our Data/Information To safely data saving Theft own Data/Information To avoid bad use of our data Lack of time Lack of money Lack of human resources

Objectives of Data/Inf. Security Availability Confidentiality Objectives of Data/Info. security Integrity Authenticity

Security Areas Basically three areas of security 1. Physical security 2. Network security 3. Database Security

Physical Security Keep the servers in locked room with network and power cables snipped off. Security of other hardware and machinery

Network Security Network security all entry points to a network should be guarded. Unprotected Network Switch Server Internet Printer Workstation Modem Firewall Protected LAN Scanner

Database Security Database Integrity User Authentication Access Control Availability

Types of Attackers Hackers Lone criminals Police Malicious insiders Press/media Terrorists Industrial espionage National intelligence organizations Info warriors

Hackers Attacks for the challenge Own subculture with names, lingo and rules Stereotypically young, male and socially Can have considerable expertise and passion for attacks

Lone criminals Attack for financial gain Cause the bulk of computer-related related crimes Usually target a single method for the attack

Malicious insiders Already inside the system Knows weaknesses and tendencies of the organization Very difficult to catch

Press/media Gather information for a story to sell papers/ commercial time Police Lines are sometimes crossed when gathering information to pursue a case

Terrorists Goal is disruption and damage. Most have few resources and skilled.

National Intelligence Organizations To investigation of different cases Industrial Espionage To discover a competitors strategic marketing

Info warriors Military based group targeting information or networking infrastructures Lots of resources Willing to take high risks for short term gain

Why attacks? To publicity To financial gain Jealousness To fun To competition with the person of same field

Specific types of attacks Engineering attacks Physical attacks Environmental attacks

Viruses Worms Engineering attacks String of computer code that attaches to other programs and replicates Replicates itself to multiple systems Rarely dangerous, mostly annoying Trojan Horses Collects information and sends to known site on the network Also can allow external takeover of your system

Cont colleague Attacker Virus Our system

Password sniffing Cont.. Collect first parts of data packet and look for login attempts IP Spoofing Fake packet to hijack a session and gain access -Port scanning Automated process that looks for open networking ports Logs positive hits for later exploits

Physical attacks Equipment failure arising from defective components. Temperature and humidity. Physical destruction of hardware and equipment Theft or sabotage.

Environmental Attacks Natural Disasters Fire, Earthquakes etc. Man-Made Made Disasters War, Chemical Leaks etc.

Methods of Information Security Threats Backups Antivirus Software Cryptography Biometrics Honey pots Firewalls Burglar alarms

Backups Backups allow us to restore damaged or destroyed data. We can set up backup servers on the network. Backup media are- Floppy disks, external hard disks, ISP online backup.

Antivirus Antivirus is a program that we can install on our computer to detect and remove viruses. It is used to scan hard disks, floppy disks, CDs, for viruses and scan e-mail messages and individual files, downloads from the Net.

Cryptography Cryptography is the art of converting info. Into a secret code that can be interpreted only by a person who knows how to decode it. Encrypted Plain text Cipher text Decrypted

Example of Cryptography Original message Sender Original message Receiver Encrypted Decrypted

Bioinformatics The bioinformetics authentication process uses a person s unique physical characteristics to authentically the identity. Bioinformatics authentication method fingerprint recognition, voice authentication, face recognition, keystroke dynamics and retina. Fingerprint Retina

Honey pots A honey pots is a tool used for detecting an intrusion attempt. A honey pots simulates a vulnerable computer on a network. It contains no critical data or application but has enough data to lure an intruder.

Honey pots Intruder Honey pots

Firewall A firewall is a tool for the network security that stand between trusted and entrusted networks and inspecting all traffic that flows between them. In simple language firewall is a filter machine that monitors the type of traffic that flows in and out of the network.

Firewall Private network Firewall Internet

Burglar alarms Traps set on specific networked objects that go off if accessed

Tips for information Security Use of strong password Adopt a security policy Use of anti-virus. Information security officer Use of firewalls Use of bioinformatics Beware to malicious insiders Security training Use of other security tools