comp4 unit8b lecture slides

21
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015.

Upload: health-it-workforce-curriculum-2012

Post on 06-May-2017

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Comp4 Unit8b Lecture Slides

Introduction to Information and Computer Science

Security

Lecture b

This material (Comp4_Unit8b) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number

IU24OC000015.

Page 2: Comp4 Unit8b Lecture Slides

SecurityLearning Objectives

• List and describe common security concerns (Lecture a)• Describe safeguards against common security concerns

(Lecture b)• Describe security concerns for wireless networks and

how to address them (Lectures b and c)• List security concerns/regulations for health care

applications (Lecture c)• Describe security safeguards used for health care

applications (Lecture c)

2Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 3: Comp4 Unit8b Lecture Slides

Mitigating Security Issues• Security policy• User authentication• Firewalls• Antivirus software• Intrusion Protection Systems• Encrypt communications and stored data• Audit adherence to security policies

3Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 4: Comp4 Unit8b Lecture Slides

Security Policy• Most policies contain provisions related to:

– Security definition– Enforcement– User access to the network, devices, software, and data– Password management– Email and Internet use– Antivirus software– Backup and recovery– Intrusion detection– Auditing– Others

4Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 5: Comp4 Unit8b Lecture Slides

Authentication Factors - Proving User Identity

• Something the user knows– Username and password

• Something the user has– Smartcards and employee badges

• Something that is a part of the user (biometrics)– Fingerprints, retinal scans, etc.

5Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 6: Comp4 Unit8b Lecture Slides

Factor Authentication• One-factor authentication

– Simplest authentication process– Username and password needed

• Two-factor authentication– Username and password needed– Also need one of other authentication types

• Smartcard or fingerprint reader

• Three-factor authentication– All three authentication types used

• Such as username/password and smartcard and fingerprint reader

6Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 7: Comp4 Unit8b Lecture Slides

Firewalls• Software and/or hardware that blocks

unauthorized communications on computer• Windows OS provides Windows Firewall• Routers provide basic firewall protection

– Most ISP routers act as firewalls• Inspects each piece of communication• Permits or denies traffic based on rules

– For example, another user will not be able to connect to user’s computer unless firewall is configured to allow communication

7Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 8: Comp4 Unit8b Lecture Slides

Windows Firewall Example

(PD-US, 2011)

8Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 9: Comp4 Unit8b Lecture Slides

Antivirus (AV) Software• Detects and removes malware

– Can also protect against adware and spyware• Requires current virus pattern definitions

– Updates cost about $50/year• Searches all computer files for virus signatures• Monitors for malicious computer activity

– For example, if a running program attempts to perform some odd action, the AV software will stop and quarantine the program

9Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 10: Comp4 Unit8b Lecture Slides

Common Antivirus Software Vendors

• Avast! http://www.avast.com/index • AVG http://free.avg.com/us-en/homepage • HouseCall http://housecall.trendmicro.com/ • Kaspersky http://usa.kaspersky.com/ • McAfee http://www.mcafee.com/us/ • Symantec http://www.symantec.com/index.jsp

10Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 11: Comp4 Unit8b Lecture Slides

Intrusion Protection Systems (IPS)• Similar to firewall functionality–but more!• Hardware and/or software that monitors all

network traffic for malicious activity– Works to stop intrusions and alert network administrators

The Cisco Secure Intrusion Detection System (formerly NetRanger), is an enterprise-scale, real-time, intrusion detection system designed to detect, report, and terminate unauthorized activity throughout a network.

Approximate cost: $700(PD-US, 2011)

11Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 12: Comp4 Unit8b Lecture Slides

Encryption• Makes communication unreadable to

unauthorized viewers– Uses electronic private and public key set

• Authorized viewers provided with encryption key, with ability to encrypt and decrypt messages– Medical office encrypts data using its private key– Patient decrypts data using the medical office’s public

key• Encryption keeps data confidential

– Entities never share their private key

12Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 13: Comp4 Unit8b Lecture Slides

Encryption Example

Encrypting a Microsoft Excel 2010 document makes the spreadsheet unreadable to anyone who tries to open it without the encrypting password.

Any Microsoft Office file can be encrypted (password protected) in this way.

(PD-US, 2011)

13Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 14: Comp4 Unit8b Lecture Slides

Encryption Example (continued)Opening an encrypted document requires the user to enter the password used to encrypt it.

If the user does not enter the correct password, the encrypted document cannot be opened. Entering the correct password allows the document to be decrypted so that it can be viewed.

(PD-US, 2011)

(PD-US, 2011)

14Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 15: Comp4 Unit8b Lecture Slides

Encryption Example (continued)

Any file on a Windows-based PC can be encrypted. To encrypt a document:

1. Create a new folder.2. Right-click the folder and select Properties.3. Click Advanced.4. Click Encrypt contents to secure data.All files placed in this folder will be encrypted.

(PD-US, 2011)

15Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 16: Comp4 Unit8b Lecture Slides

Audit Security Policy Practices• Is organization doing what it says it will do?

– If nurses are to log off nursing stations when they leave the station, is this being done?

– Is the database server kept up to date with critical updates?

– Is all access of medical records logged?– Are backups being done regularly and stored according

to the security policy?– Do employees adhere to email policies?– Others?

16Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 17: Comp4 Unit8b Lecture Slides

Additional Steps to Take...• Educate employees

– Don’t open unsolicited attachments– Users lock screens when not at station– Don’t click on popup ads while surfing– Report strange activity to network admins

• Create secure software applications– Only authenticated and authorized use of software– Non-repudiation of network actions

• Means that a user or device cannot deny having done something

17Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 18: Comp4 Unit8b Lecture Slides

Additional Steps to Take...• Use of password policies

– Password complexity– Passwords changed regularly (60 days, etc.)– No reuse of old passwords– Passwords not written down anywhere

• Domain-based network environment– Server manages users, devices, and policies– No use of network assets unless part of domain– Restricted number of network administrators

18Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 19: Comp4 Unit8b Lecture Slides

Additional Steps to Take...• Physical security of assets

– Servers bolted to floor/wall in locked room– No unauthorized physical access of equipment– Protect devices with passwords at all times– UPS and power surge equipment used– No access to data without authentication

• Validation of data entered into database– All database entries validated before stored in database– Test for expected and unexpected database entries

19Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 20: Comp4 Unit8b Lecture Slides

SecuritySummary – Lecture b

•Describe safeguards against common security concerns

•Describe security concerns for wireless networks and how to address them

20Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b

Page 21: Comp4 Unit8b Lecture Slides

SecurityReferences – Lecture b

References• SANS. Information Security Policy Templates. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://www.sans.org/security-resources/policies. • GIAC. The Basics of an IT Security Policy. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://www.giac.org/certified_professionals/practicals/gsec/1863.php. • Wikipedia. Firewall (computing). [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Firewall_(computing). • Wikipedia. Antivirus software. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Antivirus_software. • Wikipedia. Malware. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Malware. • Wikipedia. Intrusion detection system. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Intrusion_detection_system. • IT Security. Create your own security audit. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://www.itsecurity.com/features/it-security-audit-010407/.

ImagesSlide 11: Cisco Secure Intrusion Detection System [image on the Internet]. c2010 [cited 2011 Nov 07]. Available from:

http://www.google.com/products/catalog?q=Intrusion+detection+system&cid=3672983121990923567&ei=wPGHTJblBomeiwSew5nYAg&sa=title&ved=0CEEQ8wIwBTgA#p.

21Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture b