29
Information Security Rabie A. Ramadan GUC, Cairo [email protected] Room C7 -310 Lecture 2

Information Security Rabie A. Ramadan GUC, Cairo [email protected] Room C7 -310 Lecture 2

Embed Size (px)

Citation preview

Page 1: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Information Security

Rabie A. Ramadan

GUC, Cairo

[email protected]

Room C7 -310

Lecture 2

Page 2: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

DAD Triad

Complement of CIA Triad • Disclosure

• Alteration, and

• Denial

2

Page 3: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

DAD Triad

Disclosure

• Unauthorized individuals gain access to confidential information

Alteration

• Data is modified through some unauthorized mechanism

Denial

• Authorized users cannot gain access to a system for legitimate purposes

DAD activities may be malicious or accidental

Page 4: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Network Security

Security considerations include:• Physical security

• Operating System security• Windows, Linux, UNIX

• Communication security• Encryption

• Firewalls

• Intrusion detection systems

Page 5: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threats , vulnerability, Risk , and Attacks

5

Crossing the water to the right is a Threat to the man.

• Ex. The existence of a particular virus for example

Crossing the water through the wall crack is a Vulnerability.

• Ex. (Computer) Open ports

Page 6: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threats , vulnerability, Risk , and Attacks

Risk

• Occurs when a threat and a corresponding vulnerability both exist

Somebody or another system destroyed the wall is an Attack

• Ex. (Computer) sending an overwhelming set of messages to another system to block it.

6

Page 7: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threats , vulnerability, Risk , and Attacks

Threats

7

Page 8: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threats to Security Hacker

• Anyone who attempts to penetrate the security of an information system, regardless of intent

• Early definition included anyone very proficient in computer use

Malicious insider

• Someone from within the organization that attempts to go beyond the rights and permissions that they legitimately hold

• Security professionals and system administrators are particularly dangerous

Page 9: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threats to Security Malicious code object

• Virus, a program that attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels.

• Worm, a program that takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system. e.g. sending itself to all of the e-mail list in your computer.

• Trojan horse, a program that at first glance will appear to be useful software but will actually do damage once installed or run on your computer. It usually appears that is coming from a trusted source

A computer program that carries out malicious actions when run on a system

Page 10: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threat + Vulnerability = Risk

Risk analysis, assessment , and managing are required

10

Page 11: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Risk Analysis

Actions involved in risk analysis:• Determine which assets are most valuable

• Identify risks to assets

• Determine the likelihood of each risk occurring

• Take action to manage the risk

Security professionals formalize the risk analysis process

Page 12: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Asset Valuation Step 1 in risk analysis process: Asset valuation

• Identify the information assets in the organization• Hardware, software, and data

• Assign value to those assets using a valuation method

Page 13: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Asset Valuation

Common Valuation Methods

• Replacement cost valuation

• Replacement cost (also called current cost accounting or CCA) values assets based on what it would cost to replace them if they were acquired today.

• For example, if Utility Company were placing this same plant today, the materials would cost $530,000 and the installation would cost $56,000. The replacement cost value is $586,000.

Page 14: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Asset Valuation

• Original cost valuation

• Original cost (also called historic cost accounting or HCA) values assets based on what the company actually spent for the assets when they were acquired.

• Example: In 1990, Utility Company spent $500,000 to purchase the materials for its fixed lines and $50,000 to install them. The original cost value of these assets is $550,000 before depreciation.

14

Page 15: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Asset Valuation

• Depreciated valuation

• Uses the original cost less an allowance for value deterioration (original value – how much drop in its price since purchased)

• Qualitative valuation

• Assigns priorities to assets without using dollar values

15

Page 16: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Risk Assessment Step 2 in risk analysis process: Risk assessment

Risk assessment techniques:• Qualitative

• Quantitative

Page 17: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Risk Assessment Qualitative Risk Assessment:

• Focuses on analyzing intangible properties of an asset rather than financial value

• Prioritizes risks to aid in the assignment of security resources

• Relatively easy to conduct

Page 18: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Risk Assessment Quantitative Risk Assessment

• Assigns dollar values to each risk based on measures such as:

• asset value (AV),

• exposure factor (EF), expected portion (%) that can be destroyed by a given risk

• annualized rate of occurrence(ARO), number of times you expect the risk to occur

• single loss expectancy (SLE), amount of damage each time the risk occur (AV* EF)

• annualized loss expectancy (ALE) amount of damage each year from a given risk (ARO * SLE)

Uses potential loss amount to decide if it is worth implementing a security measure

Page 19: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Managing Risks Risk Avoidance

• Used when a risk overwhelms the benefits gained from having a particular mechanism available

• Avoid any possibility of risk by disabling the mechanism that is vulnerable

• Disabling e-mail is an example of risk avoidance

Risk Mitigation• Used when a threat poses a great risk to a system• Takes preventative measures to reduce the risk• A firewall is an example of risk mitigation

Page 20: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Managing Risk

Risk Acceptance• Do nothing to prevent or avoid the risk• Useful when risk or potential damage is small

Risk Transference• Ensure that someone else is liable if damage occurs• Buy insurance for example

Combinations of the above techniques are often used

Page 21: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Security Tradeoffs

Security can be seen as a tradeoff between risks and benefits• Cost of implementing the security mechanism and the

amount of damage it may prevent

Tradeoff considerations:• user convenience

• business goals

• expenses

Page 22: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Threats , vulnerability, Risk , and Attacks

Attacks

22

Page 23: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Attacks

23

Passive Attacks • Attempts to learn or make use of information from the system

but does not affect system resources.

• Eavesdropping or monitoring of transmissions

Active Attacks • Attempts to alter system resources or affect their operation.

Page 24: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Passive Attacks

24

Release of message contents / snooping

Page 25: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Passive Attacks (Cont.)

25

Traffic Analysis/ spoofing

Passive Attacks are hard to be detected

Page 26: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Active Attacks

26

Masquerade• One entity pretends to be a different entity

Page 27: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Active Attacks (Cont.)

27

Replay Attack • Passive capture of a data unit and its subsequent retransmission

to produce an unauthorized effect.

Page 28: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Active Attacks (Cont.)

28

Modification Attack • Some portion of a legitimate message is altered, or that messages

are reordered, to produce an unauthorized effect

Page 29: Information Security Rabie A. Ramadan GUC, Cairo Rabie.ramadan@guc.edu.eg Room C7 -310 Lecture 2

Active Attacks (Cont.)

29

Denial of Service• Prevents or inhibits the normal use or management of

communications facilities