The Information Security Problem



Similar documents
CSI Computer Crime and Security Survey

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security + Certification (ITSY 1076) Syllabus

Description: Objective: Attending students will learn:

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

CYBERTRON NETWORK SOLUTIONS

E-COMMERCE and SECURITY - 1DL018

Network Security Essentials:

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Content Teaching Academy at James Madison University

Bellevue University Cybersecurity Programs & Courses

COB 302 Management Information System (Lesson 8)

Networking: EC Council Network Security Administrator NSA

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Eleventh Hour Security+

Security aspects of e-tailing. Chapter 7

Fundamentals of Network Security - Theory and Practice-

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Introduction to Cyber Security / Information Security

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Network/Cyber Security

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Ethical Hacking Course Layout

BUY ONLINE FROM:

Chapter 1 The Principles of Auditing 1

Certified Cyber Security Analyst VS-1160

CEH Version8 Course Outline

ISM/ISC Middleware Module

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Detailed Description about course module wise:

Jort Kollerie SonicWALL

Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)

FORBIDDEN - Ethical Hacking Workshop Duration

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Cyber Security and Critical Information Infrastructure

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Information Security Basic Concepts

3 day Workshop on Cyber Security & Ethical Hacking

Lesson 5: Network perimeter security

Loophole+ with Ethical Hacking and Penetration Testing

Information Security Policy

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Information Security Threat Trends

Birst Security and Reliability

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Skoot Secure File Transfer

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Top tips for improved network security

Overview of computer and communications security

EC-Council. Certified Ethical Hacker. Program Brochure

COSC 472 Network Security

Network Security: A Practical Approach. Jan L. Harrington

The FBI and the Internet

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Practical Steps To Securing Process Control Networks

Section 12 MUST BE COMPLETED BY: 4/22

Certified Cyber Security Analyst VS-1160

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Certified Secure Computer User

Policies and Practices on Network Security of MIIT

BE SAFE ONLINE: Lesson Plan

Promoting Network Security (A Service Provider Perspective)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Security Goals Services

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Securing Information Systems

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

EC Council Certified Ethical Hacker V8

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Cybercrime in Canadian Criminal Law

Building Reference Security Architecture

CIS 253. Network Security

Information Security

Transcription:

Chapter 10

Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify and assess major technologies and methods for securing EC communications. Describe various types of controls and special defense mechanisms. Describe the role of business continuity and disaster recovery planning. 2

The Information Security Problem WHAT IS EC SECURITY? Refers to the protection of data, networks, computer programs, computer power and other elements of computerized information systems CSI Computer Crime and Security Survey Annual security survey of U.S. corporations, government agencies, financial and medical institutions, and universities conducted jointly by the FBI and the Computer Security Institute 3

4

5

The Information Security Problem THE DRIVERS OF EC SECURITY PROBLEMS The Internet s Vulnerable Design domain name system (DNS) Translates (converts) domain names to their numeric IP addresses IP address An address that uniquely identifies each computer connected to a network or the Internet 6

The Information Security Problem THE SHIFT TO PROFIT-INDUCED CRIMES The change from website hacking for fun and or fame to profit making crimes like identity theft. INTERNET UNDERGROUND ECONOMY Refers to e-markets for stolen information. Thousands of Web sites that sell credit card numbers, social security numbers, other data such as numbers of bank accounts, social network IDs, passwords, and much more; from criminals who are using them for illegal financial transactions. 7

Basic E-Commerce Security Issues and Landscape BASIC SECURITY TERMINOLOGY Business continuity plan Cybercrime Fraud Malware (malicious software) 8

Basic E-Commerce Security Issues and Landscape Phishing Social engineering Spam Vulnerability Zombies 9

Basic E-Commerce Security Issues and Landscape SECURITY SCENARIOS AND REQUIREMENTS IN E-COMMERCE EC Security Requirements authentication authorization nonrepudiation 10

Basic E-Commerce Security Issues and Landscape THE DEFENSE: DEFENDERS AND THEIR STRATEGY EC security strategy Deterring Measures Prevention Measures Detection Measures Information assurance (IA) 11

Technical Attack Methods Virus Worm Macro Virus (Macro-Worm) Trojan Horse Banking Trojan Denial Of Service (Dos) Attack Botnet 12

Phishing, Financial Fraud, and Spam PHISHING FRAUD ON THE INTERNET Click fraud Identity theft E-mail spam Search engine spam Spam site Splog Spyware 13

14

15

The Information Assurance Model CIA SECURITY TRIAD (CIA triad) Three security concepts important of protecting information on the Internet: Confidentiality Integrity Availability 16

17

Defense Strategy THE DEFENSE STRATEGY Prevention and deterrence Detection Containment Recovery Correction Awareness and compliance EC SECURITY PROGRAMS All the policies, procedures, documents, standards, hardware, software, training, and personnel that work together to protect information, and the ability to conduct business. 18

The Defense I: Access Control, Encryption, and PKI ACCESS CONTROL Passive token Active token Smart cards, chain tokens Biometric control & Biometric systems 19

The Defense I: Access Control, Encryption, and PKI ENCRYPTION AND THE ONE-KEY (SYMMETRIC) SYSTEM Encryption Symmetric (private) key encryption PUBLIC KEY INFRASTRUCTURE (PKI) A scheme for securing e-payments using public key encryption and various technical components Public (asymmetric) key encryption 20

The Defense I: Access Control, Encryption, and PKI DIGITAL SIGNATURE OR DIGITAL CERTIFICATE Hash Message Digest (MD) Digital Envelope Certificate Authorities (Cas) Secure Socket Layer (SSL) Transport Layer Security (TLS) 21

The Defense II: Securing E-Commerce Networks Firewall Demilitarized Zone (Dmz) Virtual Private Network (Vpn) Intrusion Detection System (Ids) Honeynet A network of honeypots Honeypot Penetration test (pen test) 22

23

The Defense III: General Controls and Other Defense Mechanisms GENERAL CONTROLS APPLICATION CONTROLS Intelligent agents: Software applications that have some degree of reactivity, autonomy, and adaptability as is needed in unpredictable attack situations. 24

The Defense III: General Controls and Other Defense Mechanisms PROTECTING AGAINST SPAM (CAN-SPAM) Act of 2003 Protection Against Splogs PROTECTING AGAINST POP-UP ADS Protection Against Phishing PROTECTING AGAINST SPYWARE 25

Business Continuity, Security Auditing, and Risk Management BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Disaster Avoidance ERP AUDITING INFORMATION SYSTEMS Audit and Assurance RISK-MANAGEMENT AND COST BENEFIT ANALYSIS Risk-Management Analysis Ethical Issues 26

Implementing Enterprise wide E-Commerce Security EC SECURITY POLICIES AND TRAINING Acceptable use policy (AUP) EC SECURITY PROCEDURES AND ENFORCEMENT Business impact analysis (BIA) 27

28

29

5 Tips For Protecting Against Spam Attacks 1. Watch out for social networking spam 2. Know how to respond properly 3. Don t click on links from emails you can't trust or not solicited 4. Keep your computer operating system and security software up to date 5. Install a dedicated anti-spam application 30