date security introduction

35
DATA SECURITY

Upload: leo-mark-villar

Post on 17-Jan-2017

89 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Date security   introduction

DATA SECURITY

Page 2: Date security   introduction

INFORMATION SECURITY

• Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction• Protecting data from attackers invading networks,

natural disasters, adverse environmental conditions, power failures, theft or vandalism, or other undesirable states

Page 3: Date security   introduction

INFORMATION SECURITY

• In any environment, where we plan to put heightened levels of security in place, we also need to take into account the cost of replacing our assets if we do happen to lose them, and make sure we establish reasonable levels of protection for their value.• The cost of security we put in place should never

outstrip the value of what it is protecting.

Page 4: Date security   introduction

WHEN ARE WE SECURE ?

Even if our systems are properly patched, there will always be

new attacks to which we are vulnerable.

Page 5: Date security   introduction

WHEN ARE WE INSECURE ?

• Not patching our systems• Using weak passwords• Downloading programs from the internet• Opening email attachments from unknown

senders• Using wireless networks without encryption

Page 6: Date security   introduction

• The good thing is that once we are able to point out the areas in the environment that can cause it to be insecure, we can take steps to mitigate these issues. • This problem is akin to cutting something in

half over and over; there will always be some small portion left to cut again. • Although we may never get to state that we

can definitively call “secure”, we can take steps in the right direction.

Page 7: Date security   introduction

MODELS FOR DISCUSSING SECURITY ISSUES

• The Confidentiality, Integrity and Availability ( CIA ) Triad

Confidentiality

AvailabilityIntegrity

Page 8: Date security   introduction

CONFIDENTIALITY

• Refers to the ability to protect data from those who are not authorized to view it.

• Examples of breaches / compromised confidentiality• Loss of laptop containing data• Person looking over our shoulder while typing our

password• Email attachment sent to the wrong person• Attacker penetrating our systems

Page 9: Date security   introduction

INTEGRITY

• Refers to the ability to prevent data from being changed in an unauthorized or undesirable manner.

• Means to prevent unauthorized changes to the data• Means to reverse authorized changes that needs

to be undone.

• Example : undo, rollback

Page 10: Date security   introduction

AVAILABILITY

• Refers to the ability to access our data when we need it.

• Examples of loss of availability• Power loss• Operating system or application problems• Network attacks• Compromise of a system• Denial of service attack

Page 11: Date security   introduction

AVAILABILITY

• Refers to the ability to access our data when we need it.

• Examples of loss of availability• Power loss• Operating system or application problems• Network attacks• Compromise of a system• Denial of service attack

Page 12: Date security   introduction

THE PARKERIAN HEXAD

• Named after Donn Parker

Confidentiality Integrity AvailabilityPossession

or Control

Authenticity Utility

Page 13: Date security   introduction

CONFIDENTIALITY

• Refers to the ability to protect data from those who are not authorized to view it.

• Examples of breaches / compromised confidentiality• Loss of laptop containing data• Person looking over our shoulder while typing our

password• Email attachment sent to the wrong person• Attacker penetrating our systems

Page 14: Date security   introduction

INTEGRITY

• Refers to the state of data itself in the sense of completeness

Page 15: Date security   introduction

AVAILABILITY

• Refers to the ability to access our data when we need it.

• Examples of loss of availability• Power loss• Operating system or application problems• Network attacks• Compromise of a system• Denial of service attack

Page 16: Date security   introduction

POSSESSION OR CONTROL

• Refers to the physical disposition of the media on which the data is stored

Page 17: Date security   introduction

AUTHENTICITY

• Proper attribution as to the owner or creator of the data in question.

Page 18: Date security   introduction

UTILITY

• Refers to how useful the data is to us

Page 19: Date security   introduction

ATTACKS

• What makes up an attack ?• Type of attack that it represents• The risk the attack represents• Controls to use when mitigating the attack

Page 20: Date security   introduction

TYPES ATTACKS

Confidentiality • Interception

Integrity• Interruption• Modification• Fabrication

Availability• Interruption• Modification• Fabrication

Page 21: Date security   introduction

INTERCEPTION

• Attacks that allows unauthorized users to access data, applications or environments

• Examples :• Unauthorized file viewing or copying• Eavesdropping on phone conversations• Reading emails not yours

Page 22: Date security   introduction

INTERRUPTION

• Attacks that cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.

• Examples :• Denial of Service attack

Page 23: Date security   introduction

MODIFICATION

• Attacks that involves tampering with our assets.

Page 24: Date security   introduction

FABRICATION

• Attacks that involves generating data, processes, communications, or other similar activities with a system

Page 25: Date security   introduction

THREATS

• Things that have potential to cause harm to our assets• Identify the possibility of something happening

that can cause a security breach or network outage

• example : • Natural threats• Intentional

Page 26: Date security   introduction

VULNERABILITIES

• Weakness that can be used to harm the asset.• Holes that can be exploited by threats to cause

harm

• Example• Poor coding in software installed• OS vulnerabilities1. Problems in hardware or physical structure of the

machines

Page 27: Date security   introduction

RISK

• The likelihood that something bad will happen

• The best strategy is to spend our time mitigating the most likely attacks.

Page 28: Date security   introduction

RISK MANAGEMENT

• Evaluation of threats and the cost of protection

Page 29: Date security   introduction

IMPACT

• Effect that an attack can cause harm considering the value of the asset being threatened.

Page 30: Date security   introduction

CONTROL

• measures in place to help ensure that a given threat us accounted for.• Categories• Physical• Logical• Administrative

Page 31: Date security   introduction

PHYSICAL CONTROL

• Controls to protect the physical environment in which the system sits or where the data is stored

• examples :• Fences, gates, locks, guards, cameras, air conditioning

system, backup power generators

Page 32: Date security   introduction

LOGICAL CONTROL

• Also called Technical Controls• Controls that protect the system, network, and

environment that process, transmit, and store data

• examples :• Passwords, encryption, logical access controls, firewalls

Page 33: Date security   introduction

ADMINISTRATIVE CONTROL

• Controls based on rules, policies, laws, procedures, guidelines, and other items that are “paper” in nature.• Set out the rules for how users are expected in the

environment to behave• These controls must be totally enforced for

compliance.

• examples :• Change of password every 90 days• Differing levels of authority

Page 34: Date security   introduction

DEFENSE IN DEPTH

• Strategy to formulate a multi-layered defense what will allow to still mount a successful defense should one or more defensive measures fail.

Internal networkhostapplicationdata

external network

Page 35: Date security   introduction

DEFENSIVE IN DEPTH

EXTERNAL NETWORK

• DMZ• VPN• Logging• Auditing• Penetration

Testing• Vulnerability

Analysis

NETWORKPERIMETER

• Firewalls• Proxy• Logging• Stateful

Packet Inspection

• Auditing• Penetration

Testing• Vulnerability

Analysis

INTERNAL NETWORK

• IDS• IPS• Logging• Auditing• Penetration

Testing• Vulnerability

Analysis

HOST

• Authentication

• Antivirus• IDS• IPS• Password

Hashing• Logging• Auditing• Penetration

Testing• Vulnerability

Analysis

APPLICATION

• SSO• Content

Filtering• Data

Validation• Auditing• Penetration

Testing• Vulnerability

Analysis

DATA

• Encryption• Access

Controls• Backup• Penetration

Testing• Vulnerability

Analysis