course ilt security overview unit objectives discuss network security discuss security threat trends...
Post on 15-Jan-2016
218 views
TRANSCRIPT
![Page 1: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/1.jpg)
Cou
rse
ILT
Security overview
Unit objectives Discuss network security Discuss security threat trends and
their ramifications Determine the factors involved in
creating a secure network strategy Control access to a Windows 2000
server
![Page 2: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/2.jpg)
Cou
rse
ILT
Topic A
Topic A: Introduction to network security
Topic B: Understanding security threats
Topic C: Creating a secure network strategy
Topic D: Windows 2000 server access control
![Page 3: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/3.jpg)
Cou
rse
ILT
Network security defined
Network security:– Process by which digital information
assets are protected
Goals of network security are to:– Protect confidentiality– Maintain integrity– Assure availability
Assessing risk– Identify threats– Reduce vulnerabilities
![Page 4: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/4.jpg)
Cou
rse
ILT
Information Security
Tasks of guarding digital information, which is typically processed by a computer, stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted over a network.
![Page 5: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/5.jpg)
Cou
rse
ILT
An isolated computer
What security threat do we have?
![Page 6: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/6.jpg)
Cou
rse
ILT
Connected to the Internet
What security threat do we have?
The InternetThe Internet
![Page 7: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/7.jpg)
Cou
rse
ILT
Information vs. Network
Most of the threat are from the network, that is why we chose the name “Network Security” instead of “Information Security”.
But the intention is to secure the information.
Information is an asset that must be protected.
![Page 8: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/8.jpg)
Cou
rse
ILT
Financial Loss
Without adequate protection or network security, a company is highly susceptible to a financial loss.
The fear of security breach can cause financial loss as an actual breach.
![Page 9: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/9.jpg)
Cou
rse
ILT
Each attack costs $213,000
After an attack on information security, clean-up efforts divert resources, such as time and money away from normal activities
A Corporate IT Forum survey of major corporations showed:– Each attack costs a company an average
of $213,000 in lost man-hours and related costs
– One-third of corporations reported an average of more than 3,000 man-hours lost
![Page 10: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/10.jpg)
Cou
rse
ILT
Information Security
![Page 11: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/11.jpg)
Cou
rse
ILT
Threat vs. Vulnerability
A threat is defined as any activity that poses a danger to our information.
A vulnerability is a weakness in a system, such as misconfigured hardware or software, poor design, or end-user carelessness.
Threats exploit vulnerabilities in order to gain unauthorized access to a network.
![Page 12: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/12.jpg)
Cou
rse
ILT
Effect of Evolving technologies
Mainframes LANs Firewalls Extranets Security systems
– Intrusion detection– Authentication– Authorization– Vulnerability assessment
![Page 13: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/13.jpg)
Cou
rse
ILT
Security build Trust
Security is critical for all types of Internet business.
By protecting systems from intrusion and corruption, security technologies help companies build trust
A trust that information is protected and transactions are reliable
![Page 14: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/14.jpg)
Cou
rse
ILT
Securing means Managing risk
Users can perform only authorized tasks
Users can obtain only authorized information
Users cannot damage data, applications, or operating environment
![Page 15: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/15.jpg)
Cou
rse
ILT
Errors and Equipment Failures
Though “security” means protection against malicious attacks by outsiders.
Security also involves controlling the effects of errors and equipment failures.
![Page 16: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/16.jpg)
Cou
rse
ILT
Goals of network security - CIA
The goal of implementing network security is to maintain an acceptable level of confidentiality, integrity and availability of information.
Confidentiality– Protection of data from unauthorized disclosure
to a third party
Integrity– Assurance that data is not altered or destroyed
in an unauthorized manner
Availability– Continuous operation of computing systems
![Page 17: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/17.jpg)
Cou
rse
ILT
Topic B
Topic A: Introduction to network security
Topic B: Understanding security threats
Topic C: Creating a secure network strategy
Topic D: Windows 2000 server access control
![Page 18: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/18.jpg)
Cou
rse
ILT
Price of Intrusion
Corporate espionage, – FBI estimates up to $100 billion loss
Identity theft – up to 700,000 Americans
Computer Viruses– up to $13.2 billion in 2001
– Lost revenues– Lost prestige– Lost productivity
![Page 19: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/19.jpg)
Cou
rse
ILT
CERT Computer Emergency Response Team (CERT)
security organization compiles statistics regarding number of reported attacks, including:– Speed of attacks– Sophistication of attacks– Faster detection of weaknesses– Distributed attacks– Difficulties of patching
http://www.cert.org/ Established in 1988, the CERT® Coordination
Center (CERT/CC) is a center of Internet security expertise, located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.
![Page 20: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/20.jpg)
Cou
rse
ILT
Sources of threats
Compromising of each of these three security goals can cost organization either – directly or – indirectly
There are four causes for compromised security:– Technology weaknesses– Configuration weaknesses– Policy weaknesses– Human error or malice
![Page 21: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/21.jpg)
Cou
rse
ILT
Technology weaknesses
TCP/IP Operating systems Network equipment
![Page 22: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/22.jpg)
Cou
rse
ILT
TECHNOLOGY WEAKNESSESare a part of each technology
TCP/IP
A communication protocoldesigned as an open standard.
Application
Presentation
Session
Transport
Network
Data Link
Physical
![Page 23: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/23.jpg)
Cou
rse
ILT
TECHNOLOGY WEAKNESSESare a part of each technology
Operating Systems
Windows, Linux, Unix,
Each operating system has issues.
![Page 24: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/24.jpg)
Cou
rse
ILT
TECHNOLOGY WEAKNESSESare a part of each system
Networking equipment
All networking equipment must be protected!
Passwords Firewalls
Protocols Authentication
![Page 25: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/25.jpg)
Cou
rse
ILT
Configuration weaknesses
Unsecured accounts System accounts with easily guessed
passwords Misconfigured Internet services Unsecured default settings Misconfigured network equipment Trojan horse programs Vandals Viruses
![Page 26: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/26.jpg)
Cou
rse
ILT
Policy weaknesses
Lack of a written security policy Politics High turnover Concise access controls not applied Software and hardware installation
and changes do not follow policy Proper security Nonexistent disaster recovery plan
![Page 27: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/27.jpg)
Cou
rse
ILT
Human error and malice
Accident Ignorance Workload Dishonesty Impersonation Disgruntled employees Snoops Denial-of-service attacks
![Page 28: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/28.jpg)
Cou
rse
ILT
Topic C
Topic A: Introduction to network security
Topic B: Understanding security threats
Topic C: Creating a secure network strategy
Topic D: Windows 2000 server access control
![Page 29: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/29.jpg)
Cou
rse
ILT
Network security strategies
Achieve the state where any action that is not expressly permitted is prohibited
Address both internal and external threats
Define policies and procedures Reduce risk across perimeter security,
the Internet, intranets, and LANs
(continued)
![Page 30: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/30.jpg)
Cou
rse
ILT
Network security strategies, continued
Human factors Knowing your weaknesses Limiting access Achieving security through persistence Physical security Perimeter security
(continued)
![Page 31: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/31.jpg)
Cou
rse
ILT
Secure network strategy, cont’d
Firewalls Web and file servers Access control Change management Encryption Intrusion detection systems (IDS)
![Page 32: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/32.jpg)
Cou
rse
ILT
Topic D
Topic A: Introduction to network security
Topic B: Understanding security threats
Topic C: Creating a secure network strategy
Topic D: Windows 2000 server access control
![Page 33: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/33.jpg)
Cou
rse
ILT
Access control
Restricts access to a resource Security levels
– Identify– Authenticate– Authorize
![Page 34: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/34.jpg)
Cou
rse
ILT
MAC, DAC and RBAC
Mandatory access control (MAC)– Non-discretionary control used in high-
security locations
Discretionary access control– Allows the owner of a file to dictate who
can access the file and to what extent
Role-based access control – Access is based on the role a user plays
in the organization
![Page 35: Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved](https://reader035.vdocument.in/reader035/viewer/2022081514/56649d295503460f949fe050/html5/thumbnails/35.jpg)
Cou
rse
ILT
Unit summary
Discussed network security Discussed the security threat trends
and their ramifications Discussed the goals of network
security and determined the factors involved in a secure network strategy
Discussed methods of access control and their implementation on a Windows 2000 server